Compare commits
3925 Commits
OpenSSL_0_
...
OpenSSL-fi
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
1278ce48a5 | ||
|
|
a0f8d282d7 | ||
|
|
0f38e9cd78 | ||
|
|
34f39b062c | ||
|
|
6db8e3bdc9 | ||
|
|
50e2a0ea46 | ||
|
|
3f137e6f1d | ||
|
|
97fbb0c88c | ||
|
|
5837e90f08 | ||
|
|
874faf2ffb | ||
|
|
0b45df73d2 | ||
|
|
2bd3976ed0 | ||
|
|
c6d109051d | ||
|
|
083ed53def | ||
|
|
b84813ec01 | ||
|
|
7447e65fcc | ||
|
|
60cd2b7206 | ||
|
|
7fb7844f3b | ||
|
|
005563bbce | ||
|
|
3b43568d5b | ||
|
|
2659a2aa7c | ||
|
|
200f249b8c | ||
|
|
4089bd6080 | ||
|
|
baab0cf780 | ||
|
|
7e98d95f56 | ||
|
|
b0ee17ad47 | ||
|
|
4f6c4c1896 | ||
|
|
2d183e4c44 | ||
|
|
7049d13c5f | ||
|
|
c616200172 | ||
|
|
7b899c10cd | ||
|
|
6b2e340bdd | ||
|
|
1de6a62222 | ||
|
|
ac381944ac | ||
|
|
24fadf2a20 | ||
|
|
409abd2fec | ||
|
|
421de62232 | ||
|
|
c567812fa6 | ||
|
|
49dbcbaa4b | ||
|
|
df0884ffb7 | ||
|
|
0e480d5553 | ||
|
|
7c0d30038f | ||
|
|
81fc8cd029 | ||
|
|
1d235039d6 | ||
|
|
58886fdefc | ||
|
|
61c3085d47 | ||
|
|
32b56fe4d2 | ||
|
|
efd031abca | ||
|
|
dd4eefdb7b | ||
|
|
fcd3e8e97b | ||
|
|
476e7e4972 | ||
|
|
5e900f3cef | ||
|
|
75b250a4ed | ||
|
|
44cb365eaf | ||
|
|
9bd2dde42f | ||
|
|
31bf5f13e0 | ||
|
|
7dcdc0d94d | ||
|
|
6ecd287acc | ||
|
|
0e508c12e0 | ||
|
|
f6385248f6 | ||
|
|
52876c3100 | ||
|
|
c08128acc2 | ||
|
|
901b9b5c36 | ||
|
|
9eca2399f1 | ||
|
|
3b4fb53221 | ||
|
|
7437036cdf | ||
|
|
ffa76736fa | ||
|
|
cbed6cfcaa | ||
|
|
be6dc7e56b | ||
|
|
bb25a72881 | ||
|
|
1562ce17cb | ||
|
|
68b2f55b90 | ||
|
|
79f2c9d1cd | ||
|
|
8a794abd9d | ||
|
|
03eae35352 | ||
|
|
df64f34e84 | ||
|
|
21a5cb2696 | ||
|
|
01fc2c1598 | ||
|
|
04c8062636 | ||
|
|
6fcc2bbce8 | ||
|
|
f2b0cf9178 | ||
|
|
485ef852ac | ||
|
|
b7de76b74d | ||
|
|
8ab0d50c43 | ||
|
|
cb47a7107f | ||
|
|
d5939062d7 | ||
|
|
8b8096d082 | ||
|
|
9ab6d6813e | ||
|
|
45e5f551ac | ||
|
|
51035e733c | ||
|
|
319c7264b0 | ||
|
|
0684e77866 | ||
|
|
f2784994ec | ||
|
|
507b0d9d38 | ||
|
|
181fbb77f3 | ||
|
|
f59a5d6079 | ||
|
|
005cdace99 | ||
|
|
8b8d2dccf1 | ||
|
|
5fd722600b | ||
|
|
5b198d5eea | ||
|
|
16190a71ff | ||
|
|
8d742dd561 | ||
|
|
0cde099f86 | ||
|
|
dfe9a47519 | ||
|
|
af4bfa151c | ||
|
|
3b5930442d | ||
|
|
033a25cef5 | ||
|
|
43760a2cf0 | ||
|
|
5f132a0356 | ||
|
|
d528caa725 | ||
|
|
d22870bc00 | ||
|
|
4ff2999e88 | ||
|
|
5e4eb9954b | ||
|
|
227a822ab6 | ||
|
|
a9cf0b81fa | ||
|
|
552e412abc | ||
|
|
3ee4d41fe1 | ||
|
|
f391750205 | ||
|
|
e5641d7f05 | ||
|
|
6d4c65835d | ||
|
|
0a7fcce8df | ||
|
|
6b0ac883d0 | ||
|
|
7d8bb91233 | ||
|
|
e0d6132b8c | ||
|
|
e3fed9f41e | ||
|
|
3e00b4c9db | ||
|
|
4c3a7a0263 | ||
|
|
10db9f9f48 | ||
|
|
9f0d2e1464 | ||
|
|
5d77cdc591 | ||
|
|
07904e0c6c | ||
|
|
4010b341b7 | ||
|
|
5a326467dc | ||
|
|
3b7c14bb90 | ||
|
|
e2473dcc7d | ||
|
|
1db4a63bc3 | ||
|
|
78f288d5c9 | ||
|
|
8329e2e776 | ||
|
|
3f66f2040a | ||
|
|
2534891874 | ||
|
|
79ba545c09 | ||
|
|
993adc0531 | ||
|
|
bc1b04d255 | ||
|
|
8fcdb1e60f | ||
|
|
e1db7c4e7a | ||
|
|
ffbfbef943 | ||
|
|
1fb2e0f940 | ||
|
|
41a846c694 | ||
|
|
3335b6f265 | ||
|
|
027026df9f | ||
|
|
9ee5916d97 | ||
|
|
af9b610cef | ||
|
|
8bfc6479a8 | ||
|
|
4f2015742d | ||
|
|
0a06ad76a1 | ||
|
|
bf6d2f986d | ||
|
|
9d74befd23 | ||
|
|
8b37d33a94 | ||
|
|
3ddc06f082 | ||
|
|
cdfe0fdde6 | ||
|
|
5936521495 | ||
|
|
35882b60d8 | ||
|
|
ce01482e0f | ||
|
|
7fc78f11e8 | ||
|
|
98bc806749 | ||
|
|
a2b6dc97f6 | ||
|
|
df36faaaa2 | ||
|
|
e15acd9d9e | ||
|
|
a854818ea9 | ||
|
|
c1f63b5cb3 | ||
|
|
cf61940534 | ||
|
|
dafd5b5d74 | ||
|
|
6c8ce3c2ff | ||
|
|
3231e42d72 | ||
|
|
cd366cf7ec | ||
|
|
a59163f6b6 | ||
|
|
fe4394cf1d | ||
|
|
84a75ba38c | ||
|
|
eb47b2fb13 | ||
|
|
a0f21307e0 | ||
|
|
7d7c13cbab | ||
|
|
0feb83e222 | ||
|
|
ccbb9badba | ||
|
|
42753a4f67 | ||
|
|
b1d3e9de63 | ||
|
|
7bd4095b12 | ||
|
|
58b75e9c26 | ||
|
|
08d62e9f1a | ||
|
|
549cd657fd | ||
|
|
43206a2d7c | ||
|
|
6dd547398a | ||
|
|
66bb328e11 | ||
|
|
50452b2e60 | ||
|
|
d18762f7c9 | ||
|
|
149ca7128c | ||
|
|
4cc2bbab67 | ||
|
|
04c3aa5c1a | ||
|
|
3edc26a256 | ||
|
|
10465aca60 | ||
|
|
3f1ebb8f42 | ||
|
|
2bfeb7dc83 | ||
|
|
55831cd6ee | ||
|
|
884c33b5c4 | ||
|
|
54bb3f68e1 | ||
|
|
112726486d | ||
|
|
fca38e350b | ||
|
|
a846a7ff32 | ||
|
|
bac3db9cc1 | ||
|
|
4ec93a10bd | ||
|
|
d18a0df0a6 | ||
|
|
1579e65604 | ||
|
|
c2035bffe7 | ||
|
|
1d7392f219 | ||
|
|
07dda896cb | ||
|
|
af70f1a35d | ||
|
|
ddf00ffab8 | ||
|
|
cb71870dfa | ||
|
|
456d883a25 | ||
|
|
d57cc97f24 | ||
|
|
05272d4c51 | ||
|
|
4420b3b17a | ||
|
|
e74ac3f830 | ||
|
|
a5799bdc48 | ||
|
|
2b1f17f83f | ||
|
|
7470276a25 | ||
|
|
d2fd65f6f6 | ||
|
|
819cf4b886 | ||
|
|
45fcfcb99f | ||
|
|
e248740d67 | ||
|
|
b63698b70d | ||
|
|
8ca28da0a7 | ||
|
|
b889a6046b | ||
|
|
00b0f2cb3e | ||
|
|
03e389cf04 | ||
|
|
93256bf5d1 | ||
|
|
d47d0d2b0d | ||
|
|
15094852de | ||
|
|
a11f06b2dc | ||
|
|
361d18a208 | ||
|
|
de2132de93 | ||
|
|
9e56c99e1a | ||
|
|
543dfa9f0e | ||
|
|
a87ff751b7 | ||
|
|
288fe07a6e | ||
|
|
7fdcb45745 | ||
|
|
e4588dc486 | ||
|
|
d98360392a | ||
|
|
33987f2f45 | ||
|
|
bbb19418e6 | ||
|
|
ed28aef8b4 | ||
|
|
0486cce653 | ||
|
|
0f8d4d49dc | ||
|
|
f952716745 | ||
|
|
dd83d0f4a7 | ||
|
|
ea17b0feec | ||
|
|
7634137b8a | ||
|
|
2c472780c0 | ||
|
|
c519e89f5c | ||
|
|
612fcfbd29 | ||
|
|
e7928282d0 | ||
|
|
837e1b6812 | ||
|
|
ae53b299fa | ||
|
|
03a64ef56d | ||
|
|
f0ecb86666 | ||
|
|
acb4ab34a4 | ||
|
|
74c40744ca | ||
|
|
1567b3904c | ||
|
|
06e771b580 | ||
|
|
eb9e63df61 | ||
|
|
fa85c1dbf5 | ||
|
|
a60cc6b4f0 | ||
|
|
2c1f5ce4b1 | ||
|
|
c41b505459 | ||
|
|
74e056edbc | ||
|
|
ff7231043f | ||
|
|
5e92fd244c | ||
|
|
d41ce00b8c | ||
|
|
04485c5bc0 | ||
|
|
d77a970669 | ||
|
|
f7924634d4 | ||
|
|
d3f6a5a01d | ||
|
|
d35c284b73 | ||
|
|
00220f8111 | ||
|
|
cfdbff23ab | ||
|
|
f7eb0ab9ac | ||
|
|
2abaa9caaf | ||
|
|
f55f5f775e | ||
|
|
7daf0efad9 | ||
|
|
edd4d402c6 | ||
|
|
e6133727fb | ||
|
|
c608171d9c | ||
|
|
c2d4c2867b | ||
|
|
46883b67de | ||
|
|
6c01cbb6a0 | ||
|
|
c20de0386a | ||
|
|
eea98320a0 | ||
|
|
4c1d92c56f | ||
|
|
d341e40264 | ||
|
|
142625b534 | ||
|
|
7cbab63f5a | ||
|
|
9015ee1826 | ||
|
|
1f59a84308 | ||
|
|
bf3dfe7fee | ||
|
|
e7d1363d12 | ||
|
|
f744bcfd73 | ||
|
|
10bd69bf4f | ||
|
|
ae8b47f07f | ||
|
|
272ba87017 | ||
|
|
361512da0d | ||
|
|
20735f4c81 | ||
|
|
ab1ec69843 | ||
|
|
19ad345739 | ||
|
|
513e28c0a4 | ||
|
|
7f06921eca | ||
|
|
37f010e248 | ||
|
|
85ec54a417 | ||
|
|
20f12e63ff | ||
|
|
b38fd40db4 | ||
|
|
8d7fbd021b | ||
|
|
49e9b97885 | ||
|
|
267b481c47 | ||
|
|
8a8cc84f74 | ||
|
|
28dd49faec | ||
|
|
3699ec6056 | ||
|
|
a678580bb8 | ||
|
|
fe8aeffa92 | ||
|
|
31475a370c | ||
|
|
d09677ac45 | ||
|
|
2667162d33 | ||
|
|
66b86a4fd5 | ||
|
|
1d5121552d | ||
|
|
057037e719 | ||
|
|
b7724f6f55 | ||
|
|
167cb62537 | ||
|
|
4f275f248e | ||
|
|
1ad2e14aaa | ||
|
|
7b41f350d4 | ||
|
|
be9a8cc2af | ||
|
|
dafce90ae5 | ||
|
|
0445ab3ae0 | ||
|
|
bb48f4ce6e | ||
|
|
9df286b13a | ||
|
|
81c2920849 | ||
|
|
87873f4328 | ||
|
|
9fe51d5f73 | ||
|
|
b79853c262 | ||
|
|
b429c4cbb9 | ||
|
|
2966c2ec31 | ||
|
|
4195a369fd | ||
|
|
146e1fc7b3 | ||
|
|
7532071aa3 | ||
|
|
a355cf9bf5 | ||
|
|
735ebc2de7 | ||
|
|
b520e4b1d5 | ||
|
|
449f2517c6 | ||
|
|
6179f06077 | ||
|
|
01a9a7592e | ||
|
|
6fa4c7c43b | ||
|
|
169a274a41 | ||
|
|
02a73e2bed | ||
|
|
c540aa2fb1 | ||
|
|
eca7358be3 | ||
|
|
da5e9871e9 | ||
|
|
94c64f9a1c | ||
|
|
1f77a27c16 | ||
|
|
e780b5f1f1 | ||
|
|
01f06617b1 | ||
|
|
be6ddecb8b | ||
|
|
450853cd04 | ||
|
|
5a0876cb8c | ||
|
|
a908b711ac | ||
|
|
2036c9a59a | ||
|
|
b247f7387f | ||
|
|
bdd454973d | ||
|
|
12b1b9a4fa | ||
|
|
0c237e42a4 | ||
|
|
0772f3b4f6 | ||
|
|
0a9a692e4e | ||
|
|
fc30530402 | ||
|
|
a96b90b66b | ||
|
|
d1a70cc9eb | ||
|
|
9fa8f3a610 | ||
|
|
dbfa236977 | ||
|
|
419989d2ec | ||
|
|
021270af37 | ||
|
|
ab688c234d | ||
|
|
9a4be82388 | ||
|
|
861a7e5c9f | ||
|
|
8038e7e44c | ||
|
|
b507284c7e | ||
|
|
cb551bfab7 | ||
|
|
2d9fda6241 | ||
|
|
ce02589259 | ||
|
|
93dd7d3848 | ||
|
|
a52b7b44b2 | ||
|
|
ff053fc847 | ||
|
|
279a0001b6 | ||
|
|
af17d99245 | ||
|
|
ee033faa43 | ||
|
|
9ebc37e667 | ||
|
|
a2ab6986e4 | ||
|
|
0b41fcc2cb | ||
|
|
6cdcb92513 | ||
|
|
9945b460e2 | ||
|
|
b234848879 | ||
|
|
fdb65c836c | ||
|
|
c3de647e7d | ||
|
|
e66cb363d6 | ||
|
|
70051b1d88 | ||
|
|
bd6386f59c | ||
|
|
1d55dd86dd | ||
|
|
38f90d06d7 | ||
|
|
19cd2049f7 | ||
|
|
b08e372bf6 | ||
|
|
0435dc1902 | ||
|
|
e6e7b4e825 | ||
|
|
f41154b206 | ||
|
|
3096d53b46 | ||
|
|
068291cd44 | ||
|
|
a1a8a71cf7 | ||
|
|
603bc9395c | ||
|
|
da9234130a | ||
|
|
ca9335760b | ||
|
|
4960411e1f | ||
|
|
6b6abd627c | ||
|
|
7eabad423c | ||
|
|
7f0d1be3a6 | ||
|
|
1c13c122d8 | ||
|
|
644ce07ecd | ||
|
|
17f121de9d | ||
|
|
4d01f2761d | ||
|
|
301799b803 | ||
|
|
8d515259e2 | ||
|
|
4f8f8bf3a4 | ||
|
|
b8b90804b6 | ||
|
|
549c4ad35b | ||
|
|
267229b141 | ||
|
|
946f57105f | ||
|
|
2280dc7c43 | ||
|
|
0cabe4e172 | ||
|
|
b6df360b9e | ||
|
|
e7ee10d3dc | ||
|
|
bce1af7762 | ||
|
|
654ac273c1 | ||
|
|
8f119a0357 | ||
|
|
06843f826f | ||
|
|
1b2047c5c0 | ||
|
|
eda3766b53 | ||
|
|
62b6c5c404 | ||
|
|
e76cbcf686 | ||
|
|
d1fff483d6 | ||
|
|
8da721ee2b | ||
|
|
3e2e231852 | ||
|
|
87829ac926 | ||
|
|
fe9a5107be | ||
|
|
afa4b38671 | ||
|
|
18f5603c53 | ||
|
|
0c149802a2 | ||
|
|
c33066900c | ||
|
|
f87ff24bc4 | ||
|
|
cf3aeae419 | ||
|
|
9a205e5981 | ||
|
|
f44cb15fab | ||
|
|
986289604e | ||
|
|
4bb90087d7 | ||
|
|
6715034002 | ||
|
|
0ca9a483af | ||
|
|
0dff8ba248 | ||
|
|
eb62cd807b | ||
|
|
64f5178d67 | ||
|
|
e558c2aa3f | ||
|
|
ed0a35f222 | ||
|
|
2bc3ad28b3 | ||
|
|
d67813f878 | ||
|
|
ecfe2d1753 | ||
|
|
ebc5e72fe5 | ||
|
|
3d52f1d52b | ||
|
|
fd60dfa0f2 | ||
|
|
be1242cbd1 | ||
|
|
a26e245ecd | ||
|
|
992bdde62d | ||
|
|
bbcf3a9b30 | ||
|
|
006b54a8eb | ||
|
|
44ddb27fa6 | ||
|
|
7832d6ab1c | ||
|
|
ee4b5cebef | ||
|
|
238b63613b | ||
|
|
87f6b97e89 | ||
|
|
6a99984b57 | ||
|
|
67d8487bb8 | ||
|
|
760d2551fb | ||
|
|
73ab341130 | ||
|
|
62f29eb1cf | ||
|
|
f8501464cc | ||
|
|
96abea332c | ||
|
|
2e75ed332f | ||
|
|
d8ea368c41 | ||
|
|
fdf6dac859 | ||
|
|
f37f20ffd3 | ||
|
|
101e6e19f2 | ||
|
|
086e32a6c7 | ||
|
|
05b4fc6c22 | ||
|
|
0fba7a8fa8 | ||
|
|
92b4d936cb | ||
|
|
4f7533eb84 | ||
|
|
fb2f3411ea | ||
|
|
c30a2505e2 | ||
|
|
c7b903e01d | ||
|
|
ddc20d4da9 | ||
|
|
b50842036f | ||
|
|
b906422149 | ||
|
|
a3e07010b4 | ||
|
|
9c437e2fad | ||
|
|
2b9a8ca15b | ||
|
|
afebe623c5 | ||
|
|
b5c6aab57e | ||
|
|
b9b0a177f8 | ||
|
|
9609ea869d | ||
|
|
ff636340f5 | ||
|
|
3ece592886 | ||
|
|
a75829deef | ||
|
|
d39c495130 | ||
|
|
855a54a9a5 | ||
|
|
8f82912460 | ||
|
|
f76b1baf86 | ||
|
|
b1d00b9611 | ||
|
|
c76e024dde | ||
|
|
4f7a2ab8b1 | ||
|
|
b0188c4f07 | ||
|
|
f24e95b72c | ||
|
|
fc101f88b6 | ||
|
|
2f38b38986 | ||
|
|
c2fd598994 | ||
|
|
5024b79f5c | ||
|
|
c5ee394b58 | ||
|
|
21a40da045 | ||
|
|
7919c07947 | ||
|
|
ab67c517ae | ||
|
|
31b46ebb62 | ||
|
|
dc7995eeb8 | ||
|
|
a2f9200fba | ||
|
|
0b59755f43 | ||
|
|
1fb97e1313 | ||
|
|
fc683d7213 | ||
|
|
03bc500a9f | ||
|
|
bfe1d2f895 | ||
|
|
ed1afd327d | ||
|
|
dacdd5203d | ||
|
|
56c5f703c1 | ||
|
|
58cc21fdea | ||
|
|
4fa3c4c3e9 | ||
|
|
524289baa5 | ||
|
|
2677d85631 | ||
|
|
ad4784953d | ||
|
|
6b7be581e5 | ||
|
|
c184711124 | ||
|
|
925596f85b | ||
|
|
8d3cdd5b58 | ||
|
|
75359644d0 | ||
|
|
6313d628da | ||
|
|
c7d0d0ae09 | ||
|
|
c9adde0699 | ||
|
|
614dd926cb | ||
|
|
034688ec4d | ||
|
|
d16765919d | ||
|
|
a95bbadb57 | ||
|
|
e350458a63 | ||
|
|
e9093c9832 | ||
|
|
2e2a962aad | ||
|
|
9243a86d75 | ||
|
|
fc98a4377d | ||
|
|
fd600c0037 | ||
|
|
a32ad6891b | ||
|
|
2325315ba3 | ||
|
|
8a2024ea59 | ||
|
|
42c7c6764e | ||
|
|
9f7b2c76b1 | ||
|
|
1c6807c9d6 | ||
|
|
bd4b0137fc | ||
|
|
2f6efd6acb | ||
|
|
823df31be7 | ||
|
|
ee872e99f7 | ||
|
|
9a85e53813 | ||
|
|
7409d7ad51 | ||
|
|
08557cf22c | ||
|
|
c4d162873f | ||
|
|
1eb8939695 | ||
|
|
7c50694f05 | ||
|
|
7979626995 | ||
|
|
c36ce81cf5 | ||
|
|
3f0d14055b | ||
|
|
f855b9d719 | ||
|
|
ce67647605 | ||
|
|
171edf7ff4 | ||
|
|
69a80f7d5e | ||
|
|
dc03504d09 | ||
|
|
383bc117bb | ||
|
|
e0d1a2f80a | ||
|
|
cac4fb58e0 | ||
|
|
9e5fe439b4 | ||
|
|
74fac927b0 | ||
|
|
da9ead8db2 | ||
|
|
bef5013961 | ||
|
|
79170bc97a | ||
|
|
95c9e774f9 | ||
|
|
e161120eff | ||
|
|
84ed90f88b | ||
|
|
065d050e7a | ||
|
|
b8b6a13a56 | ||
|
|
7608978861 | ||
|
|
14264b19de | ||
|
|
8da18ea1a5 | ||
|
|
7aaa88e55c | ||
|
|
84c7a8f7dc | ||
|
|
daaf5088fd | ||
|
|
e382e4e603 | ||
|
|
cb1b3aa151 | ||
|
|
8c7096835b | ||
|
|
befcced53e | ||
|
|
b5dd178740 | ||
|
|
98279c1629 | ||
|
|
a0cc46f8e4 | ||
|
|
70d01a7f82 | ||
|
|
5f1b10ed2e | ||
|
|
62dc7ed67c | ||
|
|
b3a45e7db5 | ||
|
|
2391681082 | ||
|
|
6386b1b34d | ||
|
|
3b4a855778 | ||
|
|
ca8630ba81 | ||
|
|
5fabb88a78 | ||
|
|
764ef43962 | ||
|
|
7e5b4d6779 | ||
|
|
75707a324f | ||
|
|
45321c41e2 | ||
|
|
bf8131f79f | ||
|
|
06b7e5a0e4 | ||
|
|
706735aea3 | ||
|
|
8f331999f5 | ||
|
|
9338f290d1 | ||
|
|
8038511c27 | ||
|
|
a6311f856b | ||
|
|
ac892b7aa6 | ||
|
|
77394d7e8f | ||
|
|
114c8e220b | ||
|
|
32a2d8ddfe | ||
|
|
4bd1e895fa | ||
|
|
9b08dbe903 | ||
|
|
3d607309e6 | ||
|
|
49cb5e0b40 | ||
|
|
e2abfd58cc | ||
|
|
364ce53cef | ||
|
|
6223352683 | ||
|
|
1a4d93bfb5 | ||
|
|
63c82f8abb | ||
|
|
4fd7256b77 | ||
|
|
1ccc003b82 | ||
|
|
48da9b8f2a | ||
|
|
6909dccc32 | ||
|
|
b93e331ba4 | ||
|
|
f9bf6314ea | ||
|
|
ac319dd82b | ||
|
|
284e2d2b37 | ||
|
|
4582626544 | ||
|
|
ccc5784e37 | ||
|
|
8742ae6e19 | ||
|
|
c105c96bac | ||
|
|
6ceb1e8efb | ||
|
|
1f91af5e56 | ||
|
|
55e328f580 | ||
|
|
f3823ddfcf | ||
|
|
68ea88b8d1 | ||
|
|
31360957fb | ||
|
|
d80399a357 | ||
|
|
d7a3ce989c | ||
|
|
1ee49722dc | ||
|
|
6653c6f2e8 | ||
|
|
4c8855b975 | ||
|
|
e71bbd26e7 | ||
|
|
acd410dc15 | ||
|
|
161cc82df1 | ||
|
|
42bd0a6b3c | ||
|
|
05e24c87dd | ||
|
|
cab0595c14 | ||
|
|
856650deb0 | ||
|
|
ab1415d2f5 | ||
|
|
f4bd65dae3 | ||
|
|
ac1ee8e877 | ||
|
|
8776ef63c1 | ||
|
|
7af0400297 | ||
|
|
1d59fe5267 | ||
|
|
ded1999702 | ||
|
|
a255e5bc98 | ||
|
|
4058861f69 | ||
|
|
f74a0c0c93 | ||
|
|
6e28b60aa5 | ||
|
|
3b5c1dc565 | ||
|
|
e512375186 | ||
|
|
1e86318091 | ||
|
|
d8d958323b | ||
|
|
30b26b551f | ||
|
|
7d48743b95 | ||
|
|
b26f324824 | ||
|
|
02eb92abad | ||
|
|
e5cadaf8db | ||
|
|
8cf88778ea | ||
|
|
c4acfb1fd0 | ||
|
|
3f7468318d | ||
|
|
011c865640 | ||
|
|
212a08080c | ||
|
|
e06de4dd35 | ||
|
|
52b6ee8245 | ||
|
|
bb61a6c80d | ||
|
|
79837e8c10 | ||
|
|
5198009885 | ||
|
|
cd22dfbf01 | ||
|
|
d4178c8fb1 | ||
|
|
3a660e7364 | ||
|
|
dad7851485 | ||
|
|
9db6974f77 | ||
|
|
8e5dbc23df | ||
|
|
bd7e6bd44b | ||
|
|
97057a1a7d | ||
|
|
8e51aef611 | ||
|
|
4ec3e8ca51 | ||
|
|
5d0137aa14 | ||
|
|
30fafdebf3 | ||
|
|
e775bbc464 | ||
|
|
d8ba2a42e9 | ||
|
|
af267e4315 | ||
|
|
d15467d582 | ||
|
|
9507979228 | ||
|
|
c6dbe90895 | ||
|
|
37942b93af | ||
|
|
399aa6b5ff | ||
|
|
487b023f3d | ||
|
|
1f9c2b3f71 | ||
|
|
486ec55503 | ||
|
|
4fc02f1229 | ||
|
|
beb895083c | ||
|
|
2d1122b802 | ||
|
|
f0d9196237 | ||
|
|
8ecef24a66 | ||
|
|
3d62b1f22d | ||
|
|
9e67d24743 | ||
|
|
537c982306 | ||
|
|
5904882eaa | ||
|
|
1e803100de | ||
|
|
96ec46f7c0 | ||
|
|
27131fe8f7 | ||
|
|
23bc7961d2 | ||
|
|
fbbabb646c | ||
|
|
8cd3d99f57 | ||
|
|
d4f3dd5fb6 | ||
|
|
aa24c4a736 | ||
|
|
d70fcb96ac | ||
|
|
5e374d2ee8 | ||
|
|
0deea0e03c | ||
|
|
edc032b5e3 | ||
|
|
0c4e67102e | ||
|
|
1b76fac5ae | ||
|
|
329c744f51 | ||
|
|
4d5d28675e | ||
|
|
1acc24a8ba | ||
|
|
f52e552a93 | ||
|
|
8857b380e2 | ||
|
|
a6de7133bb | ||
|
|
0fa714a4f0 | ||
|
|
3c9baf25f1 | ||
|
|
0392f94fbc | ||
|
|
11e80de3ee | ||
|
|
bc91494e06 | ||
|
|
a1e7883edb | ||
|
|
dd0d2df562 | ||
|
|
ce57f0d5c2 | ||
|
|
c34a652e1e | ||
|
|
12b77cbec3 | ||
|
|
e45c6c4e25 | ||
|
|
ff4a19a471 | ||
|
|
868f12988c | ||
|
|
591cbfae3c | ||
|
|
a000759a5c | ||
|
|
bc5b136c5c | ||
|
|
16cb0d9591 | ||
|
|
0ab8fd58e1 | ||
|
|
8aa6cff40f | ||
|
|
949c6f8ccf | ||
|
|
199e92bb57 | ||
|
|
30ff3278ae | ||
|
|
071eb6b592 | ||
|
|
548b4763e1 | ||
|
|
227d6a9347 | ||
|
|
f6e76a67f0 | ||
|
|
d989e4f8c2 | ||
|
|
558ddad34f | ||
|
|
f8c39f3cd0 | ||
|
|
324abf1d20 | ||
|
|
6d7f706d08 | ||
|
|
227437d292 | ||
|
|
3e446ba347 | ||
|
|
147e6f4465 | ||
|
|
94a0a96cd8 | ||
|
|
83dfcd727b | ||
|
|
4e712c48ab | ||
|
|
bfba6e05b8 | ||
|
|
f18c19f5e8 | ||
|
|
b7056b6414 | ||
|
|
620baecf91 | ||
|
|
37eae9909a | ||
|
|
6892d0eb03 | ||
|
|
3deb010dc0 | ||
|
|
4a716f5beb | ||
|
|
e3496215a2 | ||
|
|
eead69f5ed | ||
|
|
ab8a4e54db | ||
|
|
947ff113d2 | ||
|
|
acf254f86e | ||
|
|
5d439d6955 | ||
|
|
38bae7baa5 | ||
|
|
d47691ecfe | ||
|
|
223ef1db41 | ||
|
|
01ad8195aa | ||
|
|
d87f52cb94 | ||
|
|
a3654f0586 | ||
|
|
017bc57bf9 | ||
|
|
d749e1080a | ||
|
|
0fbf8f447b | ||
|
|
c81f8f59be | ||
|
|
225a9e296b | ||
|
|
25c6542944 | ||
|
|
14567b1451 | ||
|
|
fe082202c0 | ||
|
|
fbc164ec2f | ||
|
|
943a0ceed0 | ||
|
|
5d2f1538a0 | ||
|
|
fe26d066ff | ||
|
|
c876a4b7b1 | ||
|
|
c966120412 | ||
|
|
84b08eee4b | ||
|
|
bf2546f947 | ||
|
|
133291f8e7 | ||
|
|
e990b4f838 | ||
|
|
e47af46cd8 | ||
|
|
36246be915 | ||
|
|
c9a90645a5 | ||
|
|
b331016124 | ||
|
|
afb4191304 | ||
|
|
874b0bd968 | ||
|
|
a6d915e0ef | ||
|
|
975138edaa | ||
|
|
30b56225cc | ||
|
|
dc527a62a1 | ||
|
|
ed12c2f7ca | ||
|
|
16a7fcc447 | ||
|
|
a1a5885b64 | ||
|
|
f84a8ea526 | ||
|
|
01be5db64e | ||
|
|
a4113c52b2 | ||
|
|
b3d8022edd | ||
|
|
632d83f0a3 | ||
|
|
d3fad7cb51 | ||
|
|
f4bfe97fc9 | ||
|
|
c415adc26f | ||
|
|
9afe95099d | ||
|
|
9dd346c90d | ||
|
|
9770924f9b | ||
|
|
f4001a0d19 | ||
|
|
cea73f9db3 | ||
|
|
1f2502eb58 | ||
|
|
bdaa54155c | ||
|
|
fd3dbc1dbf | ||
|
|
d45087c672 | ||
|
|
634b66186a | ||
|
|
3da0ca796c | ||
|
|
f9678b8b57 | ||
|
|
83e9c36261 | ||
|
|
b68c13154e | ||
|
|
68e2586bd3 | ||
|
|
61f477f4ab | ||
|
|
7e95116064 | ||
|
|
06b433acad | ||
|
|
14ae26f2e4 | ||
|
|
3710d1aae9 | ||
|
|
cc5c772abd | ||
|
|
65041aa27e | ||
|
|
7dbbd4b357 | ||
|
|
544c84b720 | ||
|
|
65847ca378 | ||
|
|
53f7633739 | ||
|
|
c2a459315a | ||
|
|
e2b798c8b3 | ||
|
|
9bda745876 | ||
|
|
88f2a4cf9c | ||
|
|
9d0397e977 | ||
|
|
2440d8b1db | ||
|
|
ee9884654b | ||
|
|
5f885f1ea4 | ||
|
|
7a4ec19a5f | ||
|
|
a5b196a22c | ||
|
|
b6104f9ad8 | ||
|
|
96d5997f5b | ||
|
|
92eb4c551d | ||
|
|
89f63d06f8 | ||
|
|
2ecc150530 | ||
|
|
3c2c4cc5f2 | ||
|
|
5eedacc904 | ||
|
|
7f64c26588 | ||
|
|
3dd9b31dc4 | ||
|
|
eb164d0b12 | ||
|
|
225c272193 | ||
|
|
9fdb2cc592 | ||
|
|
cc8bd54569 | ||
|
|
0c02a37548 | ||
|
|
166c9cb0b8 | ||
|
|
5084af288d | ||
|
|
7e23e857f6 | ||
|
|
44f54a130b | ||
|
|
7edfe67456 | ||
|
|
d8ad2e6112 | ||
|
|
1097bde192 | ||
|
|
7cc684f4f7 | ||
|
|
e36d6b8f79 | ||
|
|
aa87945f47 | ||
|
|
7c8ced94c3 | ||
|
|
d5df1b3f0d | ||
|
|
6ff9c48811 | ||
|
|
ad6019d6c0 | ||
|
|
a27de7b7fd | ||
|
|
54e02a234c | ||
|
|
879bd6e38c | ||
|
|
6f1a3a310c | ||
|
|
6f4b3e7c09 | ||
|
|
6dff52e858 | ||
|
|
df6de39fe7 | ||
|
|
5ca9cb7cbd | ||
|
|
83c3410b94 | ||
|
|
20818e00fd | ||
|
|
c553721e8b | ||
|
|
1588a3cae7 | ||
|
|
7a4bd34a4f | ||
|
|
4ead4e5241 | ||
|
|
1ab2f7f1cb | ||
|
|
9bafd8f7b3 | ||
|
|
373048395e | ||
|
|
3d6a8954f8 | ||
|
|
c11845a4ab | ||
|
|
ec3657f81f | ||
|
|
d69c6653ef | ||
|
|
aaff7a0464 | ||
|
|
1d44454d6d | ||
|
|
5d3bfb9066 | ||
|
|
aeb8996c38 | ||
|
|
2b4b28dc32 | ||
|
|
72a267331a | ||
|
|
13a5519208 | ||
|
|
f7a2afa652 | ||
|
|
245a7eee17 | ||
|
|
6e0375d504 | ||
|
|
7d05edd12e | ||
|
|
fef1c40bf1 | ||
|
|
a428ac4750 | ||
|
|
0aa1aedbce | ||
|
|
dd616752a1 | ||
|
|
198ce9a611 | ||
|
|
78c4572296 | ||
|
|
d3f17e5ed3 | ||
|
|
ff66ff0a9b | ||
|
|
105d62cbf1 | ||
|
|
c13d7c0296 | ||
|
|
114f511f17 | ||
|
|
778b14b72d | ||
|
|
7b1a04519f | ||
|
|
5b301b2fe3 | ||
|
|
722521594c | ||
|
|
a47577164c | ||
|
|
09d84e03e8 | ||
|
|
85881c1d92 | ||
|
|
968062b7d3 | ||
|
|
e82f75577b | ||
|
|
88ea810e25 | ||
|
|
2b3936e882 | ||
|
|
c596b2ab5b | ||
|
|
c329c6bac7 | ||
|
|
b7ef916c38 | ||
|
|
d7d5a55d22 | ||
|
|
cc4c230653 | ||
|
|
de3bb266f4 | ||
|
|
05e4fbf801 | ||
|
|
ef3026a325 | ||
|
|
420ce9eb98 | ||
|
|
73334e8da1 | ||
|
|
6f413ef406 | ||
|
|
85171f83b8 | ||
|
|
a550d351fc | ||
|
|
cbecd29a27 | ||
|
|
09c1dc850c | ||
|
|
4585fd0734 | ||
|
|
e3c1854b0c | ||
|
|
e822c756b6 | ||
|
|
300b1d76fe | ||
|
|
ae3fff5034 | ||
|
|
d0205686bb | ||
|
|
290be870d6 | ||
|
|
fa71cc7bce | ||
|
|
e77906b9fa | ||
|
|
f830c68f4d | ||
|
|
6f678c4081 | ||
|
|
e9be051f3a | ||
|
|
46fc96d4ba | ||
|
|
da64e0d898 | ||
|
|
88868c0786 | ||
|
|
c5ef4bb49a | ||
|
|
01bfc480c6 | ||
|
|
2631a0210e | ||
|
|
feb592bcc9 | ||
|
|
fbd7d524be | ||
|
|
d5dfa7cd82 | ||
|
|
c8f0610d99 | ||
|
|
dd128715a2 | ||
|
|
ec44f0ebfa | ||
|
|
6377953816 | ||
|
|
e322fa2872 | ||
|
|
9ac0708f37 | ||
|
|
6b02f9fafb | ||
|
|
4878ad687f | ||
|
|
908df4d0f7 | ||
|
|
6c1982c5ce | ||
|
|
40844c9f68 | ||
|
|
b71f815f6b | ||
|
|
833ebea189 | ||
|
|
91f0828c95 | ||
|
|
70a5f5f9ab | ||
|
|
ac7797a722 | ||
|
|
7d5686d355 | ||
|
|
732d31beee | ||
|
|
f7d2f17a07 | ||
|
|
ad889de097 | ||
|
|
e15320f652 | ||
|
|
e827b58711 | ||
|
|
80f0bcbabb | ||
|
|
eba2b51d9e | ||
|
|
838ea7f824 | ||
|
|
da7b0b2261 | ||
|
|
beee17c428 | ||
|
|
c242dda4a4 | ||
|
|
bb55003882 | ||
|
|
ca32ceb773 | ||
|
|
776654adff | ||
|
|
d6522548dd | ||
|
|
e49af2ac38 | ||
|
|
5759425810 | ||
|
|
983768997e | ||
|
|
8ec3fa0597 | ||
|
|
0c7246ed4b | ||
|
|
7e0de9e8a6 | ||
|
|
0d638dc1f6 | ||
|
|
c17171c625 | ||
|
|
39239280f3 | ||
|
|
5ad83922ca | ||
|
|
d466588788 | ||
|
|
da4d239dad | ||
|
|
0985473636 | ||
|
|
8986e37249 | ||
|
|
90ba3a28f8 | ||
|
|
bc9092f726 | ||
|
|
f8927c89d0 | ||
|
|
3739a772e9 | ||
|
|
c504f0a921 | ||
|
|
6415dd7b2f | ||
|
|
dd4a0af370 | ||
|
|
7d1f55e9d9 | ||
|
|
d52d5ad147 | ||
|
|
a3b0c44b1b | ||
|
|
4b2603e46c | ||
|
|
bf48836c7c | ||
|
|
d9a268b9f9 | ||
|
|
5df2a2497a | ||
|
|
4ed7b78b56 | ||
|
|
2ec4ccee1f | ||
|
|
396cb5657b | ||
|
|
eb8ef241eb | ||
|
|
1b5af90b45 | ||
|
|
bdd5350804 | ||
|
|
7b3a9b0099 | ||
|
|
7c2d4fee25 | ||
|
|
f16176dab4 | ||
|
|
76af94eb27 | ||
|
|
04daec862c | ||
|
|
d3bb63fc68 | ||
|
|
44959ee456 | ||
|
|
c94f7f657b | ||
|
|
173350bcca | ||
|
|
1e024f05b2 | ||
|
|
f2c88f5282 | ||
|
|
836ea45350 | ||
|
|
72f421934a | ||
|
|
3fdd168ffc | ||
|
|
0b789adc67 | ||
|
|
33d9c8348a | ||
|
|
dbe3611bbd | ||
|
|
f71c6aceeb | ||
|
|
30ab7af242 | ||
|
|
2948fbab3a | ||
|
|
081464fa14 | ||
|
|
ee2ffc2794 | ||
|
|
b122e482f9 | ||
|
|
3c530fef67 | ||
|
|
a7a6aade9d | ||
|
|
20d171377f | ||
|
|
149b18078e | ||
|
|
39438ff6e2 | ||
|
|
d5fe8c3459 | ||
|
|
6219d2c294 | ||
|
|
85e28dfa6f | ||
|
|
6559b40df0 | ||
|
|
3d85668ba2 | ||
|
|
058d83cfe9 | ||
|
|
a9e790b95a | ||
|
|
02f358da49 | ||
|
|
133a7f9a50 | ||
|
|
eb1c48be6f | ||
|
|
2fd9664b0b | ||
|
|
aa763c0f6d | ||
|
|
75a96dd059 | ||
|
|
843b5a250a | ||
|
|
18f3385dea | ||
|
|
d7d119a3c9 | ||
|
|
223c59eae5 | ||
|
|
7bbd0de88d | ||
|
|
f96ccf36ff | ||
|
|
b9e7793dd7 | ||
|
|
d135da5192 | ||
|
|
75db4b2f7b | ||
|
|
b730b03f2f | ||
|
|
1dc02bbaf5 | ||
|
|
cad6650f52 | ||
|
|
26064d7f77 | ||
|
|
c981086d40 | ||
|
|
2d22e08083 | ||
|
|
0852f90c30 | ||
|
|
2765001610 | ||
|
|
653215a127 | ||
|
|
6acb4ff389 | ||
|
|
874a3757af | ||
|
|
1cbdca7bf2 | ||
|
|
e216cd6ee9 | ||
|
|
396df7311e | ||
|
|
f04f3873f8 | ||
|
|
df72970951 | ||
|
|
7c5889bf7a | ||
|
|
dc53a037b0 | ||
|
|
acbcc271b1 | ||
|
|
b28750877c | ||
|
|
d9218e11e2 | ||
|
|
c32fcca6f4 | ||
|
|
9674de7d3d | ||
|
|
a7c64928c8 | ||
|
|
c8bbd98a2b | ||
|
|
57ae37a003 | ||
|
|
d364506a24 | ||
|
|
04e2b793d6 | ||
|
|
8525950e7e | ||
|
|
d08eae1bda | ||
|
|
e8107c35b1 | ||
|
|
3cbb15ee81 | ||
|
|
2d060267b1 | ||
|
|
f9a152bd90 | ||
|
|
af9fafdbd1 | ||
|
|
eadfa019b3 | ||
|
|
9799937510 | ||
|
|
417a24dba5 | ||
|
|
4e96633ac7 | ||
|
|
77cf9e09b0 | ||
|
|
cb877ccb35 | ||
|
|
3d4fc82c0e | ||
|
|
e747f4d418 | ||
|
|
19a45b8d47 | ||
|
|
07e29c1234 | ||
|
|
fb2d5a91e9 | ||
|
|
ae7c67cace | ||
|
|
ca96d38981 | ||
|
|
9f08866940 | ||
|
|
aa6d91e85b | ||
|
|
fdce8a355f | ||
|
|
7837c7ec45 | ||
|
|
acf635b9b2 | ||
|
|
19674b5a1d | ||
|
|
e855d538de | ||
|
|
629fd3aa91 | ||
|
|
1aa8a6297c | ||
|
|
c1f092d14e | ||
|
|
ea7239cf15 | ||
|
|
046ea30864 | ||
|
|
3efe51a407 | ||
|
|
0e3ef596e5 | ||
|
|
f472ec8c2f | ||
|
|
8a682556b4 | ||
|
|
827f3d5f39 | ||
|
|
6006ae148c | ||
|
|
efcf5f1c50 | ||
|
|
a033c3c72b | ||
|
|
359b0c9fb8 | ||
|
|
19f7e5e24a | ||
|
|
bb92e2c89b | ||
|
|
5e19ee96f6 | ||
|
|
8a1c92ce49 | ||
|
|
d183244b43 | ||
|
|
5e60dba84f | ||
|
|
9a8a7d58af | ||
|
|
1bf508c9cf | ||
|
|
799668c1ce | ||
|
|
7f7f155103 | ||
|
|
45078e6c52 | ||
|
|
d7f573fea6 | ||
|
|
1fd79f66ea | ||
|
|
4f39edbff1 | ||
|
|
8decc967dc | ||
|
|
6a1823b371 | ||
|
|
45106caab7 | ||
|
|
5d1a50ac2a | ||
|
|
af73b08ac0 | ||
|
|
934e22e814 | ||
|
|
3122d1d382 | ||
|
|
b7463c8818 | ||
|
|
109757d254 | ||
|
|
49535cc409 | ||
|
|
a595baff9f | ||
|
|
67a315b60b | ||
|
|
6c83629bd9 | ||
|
|
fead253986 | ||
|
|
9a649f3b46 | ||
|
|
f62df694ad | ||
|
|
42feba4797 | ||
|
|
3c01a1e89e | ||
|
|
6a79b3cb93 | ||
|
|
d23f4e9d5a | ||
|
|
172f6b2d62 | ||
|
|
c0b8eb606f | ||
|
|
d4a45bf31a | ||
|
|
60e24554bb | ||
|
|
ff12f88b8e | ||
|
|
47e6a60e42 | ||
|
|
87a37cbadd | ||
|
|
00a37b5a9b | ||
|
|
bc494872b8 | ||
|
|
4b0771c146 | ||
|
|
a1a80e0786 | ||
|
|
1676bec94c | ||
|
|
c25a0aae6b | ||
|
|
46bdf0f34d | ||
|
|
471d0eb397 | ||
|
|
97a6a01f0f | ||
|
|
2a460c1aa8 | ||
|
|
216811b216 | ||
|
|
3ac75e21a1 | ||
|
|
14021cb821 | ||
|
|
08df41277a | ||
|
|
ac495542a6 | ||
|
|
085e5f4859 | ||
|
|
3e8b6485b3 | ||
|
|
f2e8488b85 | ||
|
|
a3a06e6543 | ||
|
|
26c00de46d | ||
|
|
3dd303129f | ||
|
|
c3473126b1 | ||
|
|
82f385d71d | ||
|
|
f2fccce4bd | ||
|
|
480cd6ab6e | ||
|
|
6c6bdd543d | ||
|
|
e19f6678f5 | ||
|
|
624fbfcadb | ||
|
|
510777f2fc | ||
|
|
be449448dc | ||
|
|
4c623cddbe | ||
|
|
8d207ee3d1 | ||
|
|
cdb182b55a | ||
|
|
00947cea0c | ||
|
|
e45c32fabf | ||
|
|
fb75f349b7 | ||
|
|
a907165250 | ||
|
|
e62774c3b9 | ||
|
|
f093794e55 | ||
|
|
f26cf9957f | ||
|
|
17c63d1cca | ||
|
|
877669d69c | ||
|
|
1c8d92997d | ||
|
|
bf8883b351 | ||
|
|
e8254d406f | ||
|
|
85522a074c | ||
|
|
31d66c2a98 | ||
|
|
ce25c7207b | ||
|
|
77163b6234 | ||
|
|
e3a510f8a6 | ||
|
|
b17bdc7734 | ||
|
|
a0e4a8e10a | ||
|
|
d6eebf6d8a | ||
|
|
2262beef2e | ||
|
|
31904ecdf3 | ||
|
|
a4d9c12f99 | ||
|
|
809cd0a22d | ||
|
|
bea29921a8 | ||
|
|
7ed485bc9f | ||
|
|
069d4cfea5 | ||
|
|
49436b59b5 | ||
|
|
9ef6fe8c2e | ||
|
|
63b825c9d4 | ||
|
|
77f4b6ba4f | ||
|
|
a5667732b9 | ||
|
|
1708456220 | ||
|
|
ff04bbe363 | ||
|
|
148924c1f4 | ||
|
|
fa1ba589f3 | ||
|
|
8c4ce7bab2 | ||
|
|
bb845ee044 | ||
|
|
b5cfc2f590 | ||
|
|
ebaa2cf5b2 | ||
|
|
cca1cd9a34 | ||
|
|
2c772c8700 | ||
|
|
e7f5b1cd42 | ||
|
|
80dfadfdf3 | ||
|
|
d8c7bd6e11 | ||
|
|
f84c85b0e3 | ||
|
|
a05b8d0ede | ||
|
|
ff2fdbf2f8 | ||
|
|
da3955256d | ||
|
|
5e28ccb798 | ||
|
|
a6575572c6 | ||
|
|
c3951d8973 | ||
|
|
19ec2f4194 | ||
|
|
2b13f80360 | ||
|
|
40c5eaeeec | ||
|
|
c1ca9d3238 | ||
|
|
48435b2098 | ||
|
|
37c541faed | ||
|
|
0f776277bc | ||
|
|
5814d829e6 | ||
|
|
f6bb465f87 | ||
|
|
db28aa86e0 | ||
|
|
2da2ff5065 | ||
|
|
fbd2164044 | ||
|
|
04e4b82726 | ||
|
|
9b3d75706e | ||
|
|
b1efb7161f | ||
|
|
df4c395c6d | ||
|
|
385a488c43 | ||
|
|
ea746dad5e | ||
|
|
d976f99294 | ||
|
|
e5a4de9e44 | ||
|
|
7d3d1788a5 | ||
|
|
2d9dcd4ff0 | ||
|
|
a839755329 | ||
|
|
69582a592e | ||
|
|
7512141162 | ||
|
|
c2c49969e2 | ||
|
|
47e0a1c335 | ||
|
|
439aab3afc | ||
|
|
8d934c2585 | ||
|
|
1458b931eb | ||
|
|
20eb7238cb | ||
|
|
79cfc3ac54 | ||
|
|
918a5d04e4 | ||
|
|
f959598866 | ||
|
|
5a9e3f05ff | ||
|
|
29e722f031 | ||
|
|
05566760da | ||
|
|
e3e31ff482 | ||
|
|
bae060c06a | ||
|
|
0ff907caf8 | ||
|
|
c8ef656df2 | ||
|
|
8c968e0355 | ||
|
|
cc0661374f | ||
|
|
089f02c577 | ||
|
|
c2bf720842 | ||
|
|
c95bf51167 | ||
|
|
2712a2f625 | ||
|
|
17ebc10ffa | ||
|
|
434745dc19 | ||
|
|
b380f9b884 | ||
|
|
749af8cb61 | ||
|
|
1d62de0395 | ||
|
|
d7b99700c0 | ||
|
|
cd6bc02b29 | ||
|
|
da454e4c67 | ||
|
|
08c239701b | ||
|
|
92714455af | ||
|
|
00b525781b | ||
|
|
891d3c7a60 | ||
|
|
9fb6fd34f8 | ||
|
|
c2963f5b87 | ||
|
|
99b36a8c31 | ||
|
|
89e56aebef | ||
|
|
4ba1aa393b | ||
|
|
1e27847d4e | ||
|
|
407a410136 | ||
|
|
9921f865e4 | ||
|
|
c8c07be883 | ||
|
|
d5e7f2f2c3 | ||
|
|
1bfdbd8e75 | ||
|
|
e92f9f45e8 | ||
|
|
8c02119e39 | ||
|
|
ca9f55f710 | ||
|
|
58c0da84dd | ||
|
|
964ed94649 | ||
|
|
cab6de03a2 | ||
|
|
2d851ab919 | ||
|
|
04dbf0272e | ||
|
|
d15dd388c1 | ||
|
|
c3502985b2 | ||
|
|
6fa0608eaf | ||
|
|
3f2a98acbf | ||
|
|
bc120a54c9 | ||
|
|
82a66ce313 | ||
|
|
7676eebf42 | ||
|
|
21a5c040e5 | ||
|
|
ba64ae6cd1 | ||
|
|
3a88efd48c | ||
|
|
3243698f1d | ||
|
|
55f39a199d | ||
|
|
49371e3acb | ||
|
|
eb125795d2 | ||
|
|
3ec5f38b47 | ||
|
|
a70e377fd8 | ||
|
|
b3020393f2 | ||
|
|
071ef65cfa | ||
|
|
d5e8d8b547 | ||
|
|
0debb681e1 | ||
|
|
46c42e78ff | ||
|
|
ee2b8ed2f5 | ||
|
|
7a6e0901ff | ||
|
|
91fdacb2c3 | ||
|
|
d582c98d8f | ||
|
|
78a533cb93 | ||
|
|
4f38565204 | ||
|
|
4407700c40 | ||
|
|
72a9776abc | ||
|
|
8d39d2800a | ||
|
|
598b562a7f | ||
|
|
dac40f87df | ||
|
|
031c78901b | ||
|
|
ce1ec9c35e | ||
|
|
bd5f21a4ae | ||
|
|
1b31b5ad56 | ||
|
|
97438f38df | ||
|
|
0e0c6821fa | ||
|
|
423c66f10e | ||
|
|
74f2260694 | ||
|
|
25d1d62275 | ||
|
|
9b5ca55695 | ||
|
|
cba9ffc32a | ||
|
|
76998a71bc | ||
|
|
dd792d6222 | ||
|
|
82a107eaa8 | ||
|
|
f8e1ab79f5 | ||
|
|
1f23001d07 | ||
|
|
dacdcf3c15 | ||
|
|
60c52245e1 | ||
|
|
2a30fec786 | ||
|
|
3ddf85033d | ||
|
|
6084c797a8 | ||
|
|
2be3d6ebc8 | ||
|
|
e6f418bcb7 | ||
|
|
5e63121758 | ||
|
|
2f4c1dc86c | ||
|
|
f87e307875 | ||
|
|
70b76d392f | ||
|
|
6a9d28f9e4 | ||
|
|
3fc2efd241 | ||
|
|
76774c5ea1 | ||
|
|
35b0ea4efe | ||
|
|
73527122c9 | ||
|
|
d68015764e | ||
|
|
b57599b70c | ||
|
|
cb3b9b1323 | ||
|
|
beef714599 | ||
|
|
d741cf2267 | ||
|
|
b4b48a107c | ||
|
|
7e765bf29a | ||
|
|
8580f8015f | ||
|
|
f21516075f | ||
|
|
7427379e9b | ||
|
|
fbed9f8158 | ||
|
|
e50858c559 | ||
|
|
ef51b4b9b4 | ||
|
|
c27c9cb4f7 | ||
|
|
22c2155595 | ||
|
|
b5c002d5a8 | ||
|
|
4db82571ba | ||
|
|
89408580ed | ||
|
|
a8640f0a7d | ||
|
|
338a61b94e | ||
|
|
e4bcadb302 | ||
|
|
fdb2c6e4e5 | ||
|
|
7661ccadf0 | ||
|
|
82e610e2cf | ||
|
|
5430200b8b | ||
|
|
13f6d57b1e | ||
|
|
8025e25113 | ||
|
|
637f374ad4 | ||
|
|
7e4cae1d2f | ||
|
|
9d9530255b | ||
|
|
3533ab1fee | ||
|
|
ec7d16ffdd | ||
|
|
5656f33cea | ||
|
|
7f354fa42d | ||
|
|
6732e14278 | ||
|
|
499684404c | ||
|
|
606c46fb6f | ||
|
|
fed8dbf46d | ||
|
|
c2f0203da0 | ||
|
|
b6bf9e2ea7 | ||
|
|
d2a53c2238 | ||
|
|
480af99ef4 | ||
|
|
f2334630a7 | ||
|
|
007f7ec1bd | ||
|
|
3d63b3966f | ||
|
|
451038b40c | ||
|
|
7766bc1a19 | ||
|
|
6cef3a7f9c | ||
|
|
4d09323a63 | ||
|
|
64abf5e657 | ||
|
|
446a6a8af7 | ||
|
|
320d3fd6af | ||
|
|
cca3ea1e71 | ||
|
|
a83f83aac8 | ||
|
|
5727f1f790 | ||
|
|
53f73afc4d | ||
|
|
10232bdc0e | ||
|
|
55ff3aff8c | ||
|
|
b7cec490fa | ||
|
|
2335e8a9cc | ||
|
|
6f766a4181 | ||
|
|
f741382b3c | ||
|
|
c18e51ba5e | ||
|
|
773b63d6f9 | ||
|
|
0a02d1db34 | ||
|
|
ff094bc2d1 | ||
|
|
860c3dd1b6 | ||
|
|
2942dde56c | ||
|
|
0f6e21385e | ||
|
|
709a395d1c | ||
|
|
b599006751 | ||
|
|
e0e7997212 | ||
|
|
befbd0619b | ||
|
|
f423c63bb0 | ||
|
|
9acc65006c | ||
|
|
7ba3838a4b | ||
|
|
4398222457 | ||
|
|
71af26b57b | ||
|
|
2008e714f3 | ||
|
|
245d2ee3d0 | ||
|
|
4b4ba6a887 | ||
|
|
bb4060c5b5 | ||
|
|
661dc1431f | ||
|
|
213f08a65a | ||
|
|
3e24d43931 | ||
|
|
b57329ba90 | ||
|
|
d4be92896c | ||
|
|
8844a69cd3 | ||
|
|
970097ae2c | ||
|
|
dafd83334a | ||
|
|
d6245b8952 | ||
|
|
13d7524698 | ||
|
|
dd57b657a8 | ||
|
|
45cd59ac71 | ||
|
|
d11d977da4 | ||
|
|
4a1b71fb0c | ||
|
|
19a9d0fcea | ||
|
|
6aa1770c6d | ||
|
|
122276a7b4 | ||
|
|
1e6b8d39f1 | ||
|
|
e05d6c7d3c | ||
|
|
a5b37fca0a | ||
|
|
9074df8684 | ||
|
|
6c17629f91 | ||
|
|
db57663241 | ||
|
|
53246488bd | ||
|
|
1f164f5ed9 | ||
|
|
b8c182a499 | ||
|
|
11c4c02ce3 | ||
|
|
c6bec6ef0d | ||
|
|
7c3908dd19 | ||
|
|
3477592385 | ||
|
|
be45636661 | ||
|
|
6fb3233778 | ||
|
|
636b6b450d | ||
|
|
2c55c0d367 | ||
|
|
0431941ec5 | ||
|
|
42733b3bea | ||
|
|
8aab301b66 | ||
|
|
19a0192b42 | ||
|
|
f99f41cf5c | ||
|
|
b34d449c42 | ||
|
|
04f9095d9e | ||
|
|
0e039aa797 | ||
|
|
c21869fb07 | ||
|
|
9a0c776c60 | ||
|
|
77db140f94 | ||
|
|
fecef70773 | ||
|
|
b48315d9b6 | ||
|
|
e8a682f223 | ||
|
|
98fbfff417 | ||
|
|
78ca13a272 | ||
|
|
d4778ae47e | ||
|
|
ff613640e2 | ||
|
|
aec13c1a9f | ||
|
|
64f0f80eb6 | ||
|
|
d71061122c | ||
|
|
fb552ac616 | ||
|
|
18e503f30f | ||
|
|
37fc562bd8 | ||
|
|
a0b3e0de6c | ||
|
|
b6dcdbfc94 | ||
|
|
cd4f7cddc7 | ||
|
|
3db244261d | ||
|
|
acf20c7dbd | ||
|
|
7c75f462e8 | ||
|
|
d636aa7109 | ||
|
|
1d42dbaf1e | ||
|
|
44c8b81eea | ||
|
|
23129dec6f | ||
|
|
0287ead9aa | ||
|
|
282feebab3 | ||
|
|
e9f613acea | ||
|
|
a25f33d28a | ||
|
|
94480b57db | ||
|
|
7689ed34d3 | ||
|
|
33130b07ce | ||
|
|
08882ac5be | ||
|
|
1fc3ac806d | ||
|
|
0c28f277d1 | ||
|
|
8c7168698e | ||
|
|
b5ca7df5aa | ||
|
|
14b148d390 | ||
|
|
e0d4e97c1a | ||
|
|
f4274da164 | ||
|
|
07a9d1a2c2 | ||
|
|
88a3dd7896 | ||
|
|
4f59432c06 | ||
|
|
2d1cbca960 | ||
|
|
fc68056917 | ||
|
|
17b5326ba9 | ||
|
|
3d9b105fe0 | ||
|
|
70dc09ebe4 | ||
|
|
1771668096 | ||
|
|
38663fcc82 | ||
|
|
a6dab873d9 | ||
|
|
480b9e5d29 | ||
|
|
19c5314f28 | ||
|
|
c372482c1b | ||
|
|
ba4526e071 | ||
|
|
98c08a6312 | ||
|
|
3ed3603b60 | ||
|
|
f2589af1cf | ||
|
|
0e37c90925 | ||
|
|
b972fbaa8f | ||
|
|
77c7f17a5e | ||
|
|
b318cfb169 | ||
|
|
e33d290159 | ||
|
|
6727565a84 | ||
|
|
a0778bfae5 | ||
|
|
0f1d77a870 | ||
|
|
d9d0f1b52c | ||
|
|
e075341d66 | ||
|
|
bc32dbbea9 | ||
|
|
f10f4447da | ||
|
|
d76b8c89ec | ||
|
|
512d359e26 | ||
|
|
c869da8839 | ||
|
|
d80866041e | ||
|
|
75a86fa024 | ||
|
|
6b3bf0edf3 | ||
|
|
3ca16bfdd9 | ||
|
|
59281ca03a | ||
|
|
6aa220c935 | ||
|
|
3fa39ed723 | ||
|
|
0f65d5eba5 | ||
|
|
1587761819 | ||
|
|
83019f7e12 | ||
|
|
bdfa4ff947 | ||
|
|
8b69d9d2b5 | ||
|
|
3c630352e2 | ||
|
|
4a620922e2 | ||
|
|
4b06d778ad | ||
|
|
6bb7dc1e90 | ||
|
|
3f7c592082 | ||
|
|
0e4bc56347 | ||
|
|
5c168710ac | ||
|
|
6053ef80e5 | ||
|
|
55a4a77a52 | ||
|
|
1e8569398c | ||
|
|
6e0c9e6008 | ||
|
|
c55d27ac33 | ||
|
|
4e9de7aa3a | ||
|
|
fc007d021e | ||
|
|
baacd8d4e5 | ||
|
|
6c495bdb5d | ||
|
|
8b96875052 | ||
|
|
b53e076988 | ||
|
|
0e698584a0 | ||
|
|
15c7adb0c9 | ||
|
|
9a6d8ee5b5 | ||
|
|
9458530d45 | ||
|
|
9de014a7f8 | ||
|
|
4f761f5956 | ||
|
|
db99779bee | ||
|
|
e5b2b0f91f | ||
|
|
ccf117510d | ||
|
|
746570e575 | ||
|
|
508c535221 | ||
|
|
9a5faeaa42 | ||
|
|
d2f6d28298 | ||
|
|
a5f78bf3ba | ||
|
|
ce92bb54d1 | ||
|
|
f3be6c7b7d | ||
|
|
4aa902ebaf | ||
|
|
e30dd20c0e | ||
|
|
2693812db2 | ||
|
|
f20339e6d7 | ||
|
|
fd621f7dfd | ||
|
|
c05353c50a | ||
|
|
73ea416070 | ||
|
|
4f33534c8a | ||
|
|
eddee61671 | ||
|
|
d70323f1c5 | ||
|
|
716cddc03c | ||
|
|
f0288f05b9 | ||
|
|
31db43df08 | ||
|
|
512cab0128 | ||
|
|
779558b9e5 | ||
|
|
21b25ed4b8 | ||
|
|
58f41a926a | ||
|
|
81d06ef2fd | ||
|
|
225f303a9d | ||
|
|
ff6e530359 | ||
|
|
0176842592 | ||
|
|
d741ccadb5 | ||
|
|
6cf41fec72 | ||
|
|
8132d3ac40 | ||
|
|
43e12b6f1c | ||
|
|
0b36857866 | ||
|
|
cc9001cb3f | ||
|
|
b1b9530165 | ||
|
|
caa97ef149 | ||
|
|
d0b72cf45b | ||
|
|
4243a7f796 | ||
|
|
046f210112 | ||
|
|
16cd15e688 | ||
|
|
98a711b479 | ||
|
|
481547f0fe | ||
|
|
8d932f6fd7 | ||
|
|
48fd490c6d | ||
|
|
9289f21b7d | ||
|
|
d3d4f9f5e9 | ||
|
|
eb38b26dbc | ||
|
|
8bbe29f2ca | ||
|
|
cc8cc9a3a1 | ||
|
|
af55c09d9f | ||
|
|
4531c1aa5e | ||
|
|
761393bba7 | ||
|
|
6f71e5ee6a | ||
|
|
715feb3104 | ||
|
|
83d8fa7dd1 | ||
|
|
586723138e | ||
|
|
5cd91b5055 | ||
|
|
6dd9066e0e | ||
|
|
3dccfc1e68 | ||
|
|
804ab1e0a4 | ||
|
|
8002e3073b | ||
|
|
ac6f377754 | ||
|
|
71b7858b1d | ||
|
|
7da74281d2 | ||
|
|
e6b0c0007f | ||
|
|
eb2b33c2b9 | ||
|
|
eed15a831c | ||
|
|
5d6a017931 | ||
|
|
6022fe81a2 | ||
|
|
8b6fe84404 | ||
|
|
3b58c74c98 | ||
|
|
7752d34c61 | ||
|
|
01483c269e | ||
|
|
03e13ca3f1 | ||
|
|
065c5d6328 | ||
|
|
f00fdcd14d | ||
|
|
194274cb68 | ||
|
|
0fe4621e19 | ||
|
|
c5036d785a | ||
|
|
d608b4d662 | ||
|
|
b3f6fe919a | ||
|
|
d1417be75c | ||
|
|
e7deff3cdf | ||
|
|
5f8f94a661 | ||
|
|
3c3f98dc93 | ||
|
|
f8a2233457 | ||
|
|
051742fb6c | ||
|
|
b066c3cd50 | ||
|
|
eda2da3235 | ||
|
|
c0b03d44fb | ||
|
|
d64a7232d4 | ||
|
|
876708c67d | ||
|
|
d4f0339c66 | ||
|
|
127186bf57 | ||
|
|
f06d0072fc | ||
|
|
f81e86d791 | ||
|
|
2ff2710ccf | ||
|
|
ff65e94e04 | ||
|
|
6c8b9259fc | ||
|
|
75d448dde4 | ||
|
|
e303f55fc7 | ||
|
|
d2617165ad | ||
|
|
7184ef1210 | ||
|
|
93caba129b | ||
|
|
6e177343f7 | ||
|
|
ef236ec3b2 | ||
|
|
8711efb498 | ||
|
|
e5fa864f62 | ||
|
|
22c98d4aad | ||
|
|
cc7399e79c | ||
|
|
14b3f1007e | ||
|
|
645532b999 | ||
|
|
220bd84911 | ||
|
|
dec95a126a | ||
|
|
a79b668b8f | ||
|
|
06ddf8eb08 | ||
|
|
71fca64d96 | ||
|
|
14023fe352 | ||
|
|
b6b0b0d7a5 | ||
|
|
d6e460d44c | ||
|
|
0089a9dfa8 | ||
|
|
a5910673a6 | ||
|
|
8e93eff8c6 | ||
|
|
70b2186e24 | ||
|
|
64ecdaeca9 | ||
|
|
4e74239df1 | ||
|
|
aaf35f11d7 | ||
|
|
093f5d2c15 | ||
|
|
7f1c086b21 | ||
|
|
77ea8c3002 | ||
|
|
ddcfc25a6d | ||
|
|
4d7b7c62c3 | ||
|
|
dd009fe655 | ||
|
|
73ba116e96 | ||
|
|
80b2ff978d | ||
|
|
7ce8c95d58 | ||
|
|
38b6e6c07b | ||
|
|
e4e949192b | ||
|
|
4e52b9845e | ||
|
|
e22b864846 | ||
|
|
b6af2c7e3e | ||
|
|
57db09906b | ||
|
|
4c78bc05c4 | ||
|
|
ef8e772805 | ||
|
|
54571ba004 | ||
|
|
237d7b6cae | ||
|
|
854a225a27 | ||
|
|
e39acc1c90 | ||
|
|
a0b76569b2 | ||
|
|
78625cac82 | ||
|
|
c28a9165f2 | ||
|
|
617298dca3 | ||
|
|
33ab2e31f3 | ||
|
|
bb7ccdfbe2 | ||
|
|
c836f8ef73 | ||
|
|
4df100935f | ||
|
|
2a0ff7ad20 | ||
|
|
c2a548a884 | ||
|
|
77202a85a0 | ||
|
|
73bfcf2226 | ||
|
|
2121f15daf | ||
|
|
b2cf7c6452 | ||
|
|
7587347bc4 | ||
|
|
ae3b4f2336 | ||
|
|
605b04f661 | ||
|
|
97132a0f8e | ||
|
|
30e5e39a3d | ||
|
|
2c618ab993 | ||
|
|
b5d5c0a21f | ||
|
|
f8ea4757cc | ||
|
|
0ed6b52687 | ||
|
|
a63bf2c53c | ||
|
|
b3f3407850 | ||
|
|
477fd4596f | ||
|
|
30b1b28aff | ||
|
|
46400c97a9 | ||
|
|
c558c99fd8 | ||
|
|
13c3a1defa | ||
|
|
aaa29f9e83 | ||
|
|
ede6ef5e08 | ||
|
|
0f529cbdc3 | ||
|
|
eb55b9fc19 | ||
|
|
7012d2a8fa | ||
|
|
8626230a02 | ||
|
|
c23632d3f1 | ||
|
|
3859d7ee78 | ||
|
|
d615bceb2d | ||
|
|
7ca1cfbac3 | ||
|
|
d8e8fc4803 | ||
|
|
57f39cc826 | ||
|
|
6489573224 | ||
|
|
079e00e646 | ||
|
|
5871ddb016 | ||
|
|
c7ba21493a | ||
|
|
8bf5001612 | ||
|
|
6ed9dfb23a | ||
|
|
7f62532030 | ||
|
|
c2c99e2860 | ||
|
|
8125d9f99c | ||
|
|
8e6925b0cd | ||
|
|
d7ecd42255 | ||
|
|
41b7619596 | ||
|
|
211655fcdd | ||
|
|
363bd0b48e | ||
|
|
60aee6ce15 | ||
|
|
bab534057b | ||
|
|
cec2af7510 | ||
|
|
6de3683908 | ||
|
|
fceac0bc74 | ||
|
|
792bbc2374 | ||
|
|
4a94003a51 | ||
|
|
ab4d689832 | ||
|
|
23b973e600 | ||
|
|
b3b201b6f7 | ||
|
|
d41c785d69 | ||
|
|
a370537bde | ||
|
|
2bd45dc94c | ||
|
|
121f9e743c | ||
|
|
0eab41fb78 | ||
|
|
8aa02e97a7 | ||
|
|
a68c7b9171 | ||
|
|
5cabcf96e7 | ||
|
|
85e878f224 | ||
|
|
fe1c7fecf1 | ||
|
|
0e941da6fa | ||
|
|
2d1cbc85c8 | ||
|
|
d195d60a5f | ||
|
|
e81695205e | ||
|
|
fe150ac25d | ||
|
|
bec45a35bb | ||
|
|
3b0ee0d2bf | ||
|
|
dde5b979d2 | ||
|
|
57a6ac7c4f | ||
|
|
9b9cb004f7 | ||
|
|
6ba71a7173 | ||
|
|
4ded7b44a8 | ||
|
|
1457619e13 | ||
|
|
ccf529928f | ||
|
|
5ceb595dfa | ||
|
|
44390fadc0 | ||
|
|
974d05a323 | ||
|
|
0f76640fba | ||
|
|
a11974180f | ||
|
|
5d48a66a6a | ||
|
|
63fc7f848d | ||
|
|
830457ce4f | ||
|
|
ea4d5005d9 | ||
|
|
9f03d0fc04 | ||
|
|
2140659b00 | ||
|
|
e527201f6b | ||
|
|
70531c147c | ||
|
|
75bbf6e14c | ||
|
|
702e742515 | ||
|
|
be01f79d3d | ||
|
|
bf785c9849 | ||
|
|
4db4882402 | ||
|
|
6786f52ada | ||
|
|
2e6a7b3efc | ||
|
|
63461b8db1 | ||
|
|
e77228ba11 | ||
|
|
5c60b1637a | ||
|
|
26397d2e8c | ||
|
|
85b2c0ce7f | ||
|
|
f826bf7798 | ||
|
|
3ebbe8853f | ||
|
|
ac71d81e84 | ||
|
|
a9dbe71ee0 | ||
|
|
ecd3370ba0 | ||
|
|
19d300d07c | ||
|
|
071920d9f6 | ||
|
|
1f6e9bce21 | ||
|
|
434ba03ca9 | ||
|
|
d88d941c87 | ||
|
|
9d44cd1642 | ||
|
|
1d4e879106 | ||
|
|
ae381fef5c | ||
|
|
48114ec952 | ||
|
|
7a76219774 | ||
|
|
2900fc8ae1 | ||
|
|
e9afa08cd1 | ||
|
|
bcaa36fd11 | ||
|
|
71702f7ed0 | ||
|
|
fd252de312 | ||
|
|
349e78e2e8 | ||
|
|
79bd20fd17 | ||
|
|
d0c3628834 | ||
|
|
31636a3ed1 | ||
|
|
f3b7bdadbc | ||
|
|
ad7159ea84 | ||
|
|
0b0dbb2cac | ||
|
|
12bf56c017 | ||
|
|
93c4ba07d7 | ||
|
|
36d46234c7 | ||
|
|
774b2fe700 | ||
|
|
6c901ae8c1 | ||
|
|
90c65a9838 | ||
|
|
5eba1ab346 | ||
|
|
4e50072d56 | ||
|
|
dd9557a8ba | ||
|
|
ed551cddf7 | ||
|
|
5aca224ecd | ||
|
|
dab6293482 | ||
|
|
1416aec60d | ||
|
|
aa8f38e49b | ||
|
|
8525377265 | ||
|
|
2fbc8a2aad | ||
|
|
6343829a39 | ||
|
|
2401debe83 | ||
|
|
5c61111bff | ||
|
|
bc645199c0 | ||
|
|
0a8c9f7de1 | ||
|
|
7b808412c9 | ||
|
|
706c5a4d35 | ||
|
|
0afc9f5bc0 | ||
|
|
2e5975285e | ||
|
|
5947ca0409 | ||
|
|
d40a1b865f | ||
|
|
f80921b6a6 | ||
|
|
9be5481297 | ||
|
|
8fe8bae15a | ||
|
|
f2c0230518 | ||
|
|
e6e0c9018c | ||
|
|
9619b730b4 | ||
|
|
2766515fca | ||
|
|
87d52468aa | ||
|
|
70d71f6185 | ||
|
|
5ee92a5ec1 | ||
|
|
c76fd290be | ||
|
|
d0a20cafa1 | ||
|
|
8da07655ee | ||
|
|
befe1fbc29 | ||
|
|
5e4430e70d | ||
|
|
4d6e1e4f29 | ||
|
|
122396f2db | ||
|
|
09a60c9833 | ||
|
|
b444ac3e6f | ||
|
|
f768be81d8 | ||
|
|
91173829db | ||
|
|
bfaead2b12 | ||
|
|
e6b4578540 | ||
|
|
0dd4850ee0 | ||
|
|
c650168a4f | ||
|
|
ea71ec1b11 | ||
|
|
f1455b3063 | ||
|
|
b764f82c64 | ||
|
|
436bdcff4e | ||
|
|
27f864e8ac | ||
|
|
80aa9cc985 | ||
|
|
ab7e09f59b | ||
|
|
e9eda23ae6 | ||
|
|
6caa4edd3e | ||
|
|
ac786241a2 | ||
|
|
df0681e554 | ||
|
|
e19106f5fb | ||
|
|
ae7ec4c71d | ||
|
|
020d67fb89 | ||
|
|
3fdc6c11aa | ||
|
|
dcf6b3e9b6 | ||
|
|
606f6c477a | ||
|
|
1581f82243 | ||
|
|
0d6f9c7181 | ||
|
|
640b86cb24 | ||
|
|
111a6e2a23 | ||
|
|
d764e7edb8 | ||
|
|
aff8259510 | ||
|
|
256b3e9c5f | ||
|
|
762a2e3cab | ||
|
|
28b6d5020e | ||
|
|
d5bbead449 | ||
|
|
0f7efbc859 | ||
|
|
a7ae4abfd9 | ||
|
|
30661b1b01 | ||
|
|
1ea6472e60 | ||
|
|
b8dfde2a36 | ||
|
|
570006f3a2 | ||
|
|
babb379849 | ||
|
|
6665ef303e | ||
|
|
7e7af0bc51 | ||
|
|
87d3a0cd90 | ||
|
|
1e369b375e | ||
|
|
6bf24568bc | ||
|
|
837f2fc7a4 | ||
|
|
1a489c9af1 | ||
|
|
8c864e5466 | ||
|
|
be5707c820 | ||
|
|
4a4f3071ec | ||
|
|
d7235a9d68 | ||
|
|
fa0f834c20 | ||
|
|
96562f2fb3 | ||
|
|
b9790c1cd4 | ||
|
|
fcbdde0dfe | ||
|
|
51ec776b7d | ||
|
|
e65bcbcef0 | ||
|
|
e710de12ce | ||
|
|
db99c52509 | ||
|
|
f8d6be3f81 | ||
|
|
d493899579 | ||
|
|
492279f6f3 | ||
|
|
3ad74edce8 | ||
|
|
2b7b1cad10 | ||
|
|
43048d13c8 | ||
|
|
e8da6a1d0f | ||
|
|
305514000c | ||
|
|
0702150f53 | ||
|
|
a0ee081515 | ||
|
|
d43c4497ce | ||
|
|
4b96839f06 | ||
|
|
249a77f5fb | ||
|
|
d0fff69dc9 | ||
|
|
8c9bd89338 | ||
|
|
2e415778f2 | ||
|
|
1cbf663a6c | ||
|
|
9be8035b11 | ||
|
|
2ecd2edede | ||
|
|
9d84d4ed5e | ||
|
|
2e0c7db950 | ||
|
|
002e66c0e8 | ||
|
|
e9746e03ee | ||
|
|
ab9c689ad3 | ||
|
|
4c3296960d | ||
|
|
96826bfc84 | ||
|
|
eb1aa135d8 | ||
|
|
99649b5990 | ||
|
|
6d6c47980e | ||
|
|
474b3b1cc8 | ||
|
|
3e727a3b37 | ||
|
|
a9ff742e42 | ||
|
|
787287af40 | ||
|
|
5cbd203302 | ||
|
|
592a207b94 | ||
|
|
6bcbac0abb | ||
|
|
4c048211f1 | ||
|
|
b94551e823 | ||
|
|
9b634c9b37 | ||
|
|
5b331ab77a | ||
|
|
dd6f479ea8 | ||
|
|
87facba376 | ||
|
|
e4662fdb62 | ||
|
|
efa73a77e4 | ||
|
|
89778b7f3f | ||
|
|
c79c5a256b | ||
|
|
9960bdc6fa | ||
|
|
23dcb447ff | ||
|
|
39c63e162c | ||
|
|
34d05a4023 | ||
|
|
dcc0c29876 | ||
|
|
db50661fce | ||
|
|
f9afd9f861 | ||
|
|
d4cdbab99b | ||
|
|
5f834ab123 | ||
|
|
8528128b2a | ||
|
|
a0f3679b52 | ||
|
|
8228fd89fc | ||
|
|
869eb9e767 | ||
|
|
6c2878344f | ||
|
|
2836cb3816 | ||
|
|
46d4782888 | ||
|
|
a01a351cc2 | ||
|
|
adb92d56eb | ||
|
|
ce04f91951 | ||
|
|
6cb9fca70d | ||
|
|
ec0bfca7e7 | ||
|
|
1cd504e7be | ||
|
|
11f3cee93b | ||
|
|
6bf79e30ea | ||
|
|
7555c9337f | ||
|
|
ffc2b3e927 | ||
|
|
9ab89286a2 | ||
|
|
5329130333 | ||
|
|
e1451bb51d | ||
|
|
0b44c26d78 | ||
|
|
4db9677bac | ||
|
|
1381bf90f4 | ||
|
|
e0f7b87227 | ||
|
|
985de86340 | ||
|
|
b814c01a76 | ||
|
|
c07a126fb2 | ||
|
|
09a6e19431 | ||
|
|
863d447e0b | ||
|
|
5ce278a77b | ||
|
|
37cf49a3df | ||
|
|
f79262e94b | ||
|
|
7d537d4fc7 | ||
|
|
ca89fc1fb4 | ||
|
|
59d2d48f64 | ||
|
|
b3c8dd4eab | ||
|
|
45d3767d28 | ||
|
|
8671b89860 | ||
|
|
4f7f411719 | ||
|
|
eac442ddd3 | ||
|
|
55bef26d8a | ||
|
|
2aa2a5775f | ||
|
|
c451bd828f | ||
|
|
8ecfbedd85 | ||
|
|
c173fce4e2 | ||
|
|
953174f46e | ||
|
|
c621c7e432 | ||
|
|
2bbe8f9129 | ||
|
|
4be0a5d429 | ||
|
|
bdfe932dca | ||
|
|
3fc59c8406 | ||
|
|
c61915c659 | ||
|
|
368888bcb6 | ||
|
|
eafd6e5110 | ||
|
|
05935c47b2 | ||
|
|
d8bd55a364 | ||
|
|
841c91d6e4 | ||
|
|
a4792168ec | ||
|
|
90b96776cd | ||
|
|
408f906592 | ||
|
|
7a18ecb2df | ||
|
|
174c86a216 | ||
|
|
c6ddacf7f8 | ||
|
|
ab3eafd5b5 | ||
|
|
dd043cd501 | ||
|
|
a75c662fd1 | ||
|
|
83574cf808 | ||
|
|
2cd81830ef | ||
|
|
e194fe8f47 | ||
|
|
40a706286f | ||
|
|
c6f6c380c7 | ||
|
|
8f395e0f4d | ||
|
|
595852f3b5 | ||
|
|
0a56761f19 | ||
|
|
220903f92e | ||
|
|
3c1d6bbc92 | ||
|
|
cab14b9803 | ||
|
|
17a4a4dff8 | ||
|
|
c2c2e7a438 | ||
|
|
d18ef847f4 | ||
|
|
5c0d90a699 | ||
|
|
f434730524 | ||
|
|
65fd877515 | ||
|
|
64ddafc6b6 | ||
|
|
781f0a9bb5 | ||
|
|
3de5a7745f | ||
|
|
94fd382f8b | ||
|
|
4bd4afa34e | ||
|
|
148bb9515c | ||
|
|
51e00db226 | ||
|
|
a92ebf2290 | ||
|
|
f49c687507 | ||
|
|
8b99c79fae | ||
|
|
718f8f7a9e | ||
|
|
e718520cc5 | ||
|
|
4f46934269 | ||
|
|
fabe640f5e | ||
|
|
19048b5c8d | ||
|
|
156ee88285 | ||
|
|
c386f8ac38 | ||
|
|
4a954b56c9 | ||
|
|
d05a474556 | ||
|
|
8a2062fefe | ||
|
|
2f63ad5b35 | ||
|
|
c78bba2343 | ||
|
|
d26c905c67 | ||
|
|
8fcc9caecc | ||
|
|
e7b097f558 | ||
|
|
5ee6f96cea | ||
|
|
dc634aff25 | ||
|
|
8e3b2dbb31 | ||
|
|
ba6f95e81b | ||
|
|
281066cb03 | ||
|
|
830b8877ba | ||
|
|
9912ab6770 | ||
|
|
299ab428ce | ||
|
|
e6ef05d5f3 | ||
|
|
0f401ff08b | ||
|
|
5558128541 | ||
|
|
e33c72dfc6 | ||
|
|
44a877aa88 | ||
|
|
6b6fe3d8e4 | ||
|
|
4c1a6e004a | ||
|
|
6e6ada18c6 | ||
|
|
b35a131069 | ||
|
|
1728756255 | ||
|
|
a12a6b9962 | ||
|
|
852bd35065 | ||
|
|
a5db50d005 | ||
|
|
f3eba36c4c | ||
|
|
529d329ce1 | ||
|
|
47a6d388c7 | ||
|
|
c02b6b6b21 | ||
|
|
3b28bc9910 | ||
|
|
fc003bcecb | ||
|
|
38d3a73808 | ||
|
|
73b3c2d861 | ||
|
|
4670e00ff5 | ||
|
|
287df2fe49 | ||
|
|
e0fbd07309 | ||
|
|
eaee098e1f | ||
|
|
43d9e9d07f | ||
|
|
c420fab52b | ||
|
|
6469a1fda3 | ||
|
|
7f50d9a4b0 | ||
|
|
da6ea110b5 | ||
|
|
fb777e1f79 | ||
|
|
360bb61d86 | ||
|
|
847e551f39 | ||
|
|
d4122504a2 | ||
|
|
2c4226c42b | ||
|
|
86173db853 | ||
|
|
9034c56c6c | ||
|
|
e33ffaca12 | ||
|
|
853eae51e0 | ||
|
|
b4be380889 | ||
|
|
ff80280b01 | ||
|
|
e45641bd17 | ||
|
|
d5a37b0293 | ||
|
|
6819050722 | ||
|
|
88db4e6b9e | ||
|
|
be86dd85e4 | ||
|
|
3df9357103 | ||
|
|
992e92a46e | ||
|
|
3247812e34 | ||
|
|
a5cdb7d5bd | ||
|
|
4a6bb116c4 | ||
|
|
2819ffb520 | ||
|
|
964c7e8f6d | ||
|
|
f6a45ac5ac | ||
|
|
2e86f0d8d7 | ||
|
|
e2a29d49ca | ||
|
|
b99674103d | ||
|
|
41f81a0143 | ||
|
|
36309aa2be | ||
|
|
eb9d8d8cd4 | ||
|
|
f7ccba3edf | ||
|
|
eb77ebe26c | ||
|
|
f5e2354c9d | ||
|
|
f4cc56f494 | ||
|
|
be86c7fc87 | ||
|
|
6205171362 | ||
|
|
ab568a17cf | ||
|
|
fe591284be | ||
|
|
7122aafce5 | ||
|
|
5ffba305c8 | ||
|
|
ceee538af5 | ||
|
|
054307e7ed | ||
|
|
8cd358bef8 | ||
|
|
eeb9cdfc94 | ||
|
|
16fe5f8b50 | ||
|
|
041e7f2eee | ||
|
|
ab12438030 | ||
|
|
c220e58f9e | ||
|
|
6bd05ad472 | ||
|
|
90ec4c0af0 | ||
|
|
52e9196d7e | ||
|
|
f7e85c371e | ||
|
|
f5cbf8fbe1 | ||
|
|
7d7e640e0b | ||
|
|
e4f0e40eac | ||
|
|
6e3bc4f073 | ||
|
|
c36e936b60 | ||
|
|
761ffa729f | ||
|
|
1e26a8baed | ||
|
|
7c337e00d2 | ||
|
|
7e8481afd1 | ||
|
|
1266cec2fe | ||
|
|
3667a6f5b3 | ||
|
|
deb21fbae9 | ||
|
|
057039f782 | ||
|
|
d7c738a09a | ||
|
|
a981e2adbc | ||
|
|
88fce8539f | ||
|
|
4f1aa191b3 | ||
|
|
e540d1cd77 | ||
|
|
fd47c36136 | ||
|
|
d9f5f07e28 | ||
|
|
b31db9ee96 | ||
|
|
1021f9aa5e | ||
|
|
320bfc1be7 | ||
|
|
b820455c6e | ||
|
|
5c4436c977 | ||
|
|
a78a03744d | ||
|
|
a329fdde51 | ||
|
|
31d3c84422 | ||
|
|
afff52a3ba | ||
|
|
8931b30d84 | ||
|
|
27dc105f51 | ||
|
|
3964038fe6 | ||
|
|
b510d77535 | ||
|
|
56c7754cab | ||
|
|
92e2c81aff | ||
|
|
a70a49a018 | ||
|
|
61b05a0025 | ||
|
|
7c9882eb24 | ||
|
|
0d7f6fc76a | ||
|
|
a9e96d724d | ||
|
|
d9e427f09c | ||
|
|
a23e3dbee1 | ||
|
|
400ca0e467 | ||
|
|
9536b85c07 | ||
|
|
4d318c79b2 | ||
|
|
1ad90a916b | ||
|
|
8ab9025e31 | ||
|
|
9e5df8e448 | ||
|
|
96d13fe62b | ||
|
|
089458b096 | ||
|
|
7c1722c60d | ||
|
|
c020c3213e | ||
|
|
930875ef77 | ||
|
|
3b979c5450 | ||
|
|
339ad7ce73 | ||
|
|
676517e08e | ||
|
|
52108cecc0 | ||
|
|
addd641f3a | ||
|
|
f63e4be392 | ||
|
|
ca55d11f84 | ||
|
|
abe7f8b457 | ||
|
|
a078befcbe | ||
|
|
f12797a447 | ||
|
|
fa8e921f66 | ||
|
|
4287ade5b4 | ||
|
|
7398053149 | ||
|
|
4d1f3f7a6c | ||
|
|
aff686df91 | ||
|
|
637f90621d | ||
|
|
6d0624aca3 | ||
|
|
085ea80371 | ||
|
|
ab0ff06205 | ||
|
|
79eeb47031 | ||
|
|
9911b7496f | ||
|
|
3dbd453f41 | ||
|
|
731339627f | ||
|
|
26e71a1850 | ||
|
|
db01bad30f | ||
|
|
6ff28e017d | ||
|
|
4664eb5230 | ||
|
|
744ecaa5b6 | ||
|
|
76d761ccd3 | ||
|
|
eef0c1f34c | ||
|
|
82a2431327 | ||
|
|
96fc37f145 | ||
|
|
3a87756fed | ||
|
|
c8ec4a1b0b | ||
|
|
699e1a3a82 | ||
|
|
64214a2183 | ||
|
|
0fcb905b0d | ||
|
|
4be63cfb55 | ||
|
|
ca64056836 | ||
|
|
df77428443 | ||
|
|
3e583572b3 | ||
|
|
43d8f27dca | ||
|
|
b045299113 | ||
|
|
13baedc55b | ||
|
|
9400d9ac83 | ||
|
|
341e18b497 | ||
|
|
339a1820fd | ||
|
|
cec2538ca9 | ||
|
|
28f7e60d47 | ||
|
|
544b82e493 | ||
|
|
8789af8db8 | ||
|
|
1ad6a1b5e9 | ||
|
|
6e150083bb | ||
|
|
98d8baabbd | ||
|
|
c1d2e00ec5 | ||
|
|
ad8bd4ece8 | ||
|
|
2f0550c4c1 | ||
|
|
98057eba77 | ||
|
|
097f9d8c52 | ||
|
|
60447e59ef | ||
|
|
94e6ae7a69 | ||
|
|
f670738987 | ||
|
|
b6a338cb29 | ||
|
|
4726fcfc25 | ||
|
|
15bd07e923 | ||
|
|
fdf355878c | ||
|
|
da989402f2 | ||
|
|
10f0c85cfc | ||
|
|
70ba4ee5d5 | ||
|
|
31f528b15d | ||
|
|
86140095b5 | ||
|
|
8e1d3ba50e | ||
|
|
37210fe7e2 | ||
|
|
0e1dba934f | ||
|
|
11d01d371f | ||
|
|
76c3ef7446 | ||
|
|
659f7f3168 | ||
|
|
3d3bf9c730 | ||
|
|
4017e8706c | ||
|
|
3ce54f35b3 | ||
|
|
ebc06fba67 | ||
|
|
e979c039f9 | ||
|
|
90acf770b5 | ||
|
|
0d89e45690 | ||
|
|
1948c7e6dd | ||
|
|
a6db6a0070 | ||
|
|
fdb2fe6dc2 | ||
|
|
a2115c5d17 | ||
|
|
4fe55663df | ||
|
|
ae1552ee99 | ||
|
|
debf380122 | ||
|
|
ddb038d349 | ||
|
|
b7cc9dffac | ||
|
|
e1b81fed33 | ||
|
|
5d58f1bbfe | ||
|
|
fcd1cb666c | ||
|
|
4f19a9cb9f | ||
|
|
0023adb47a | ||
|
|
81fe8dcfe1 | ||
|
|
d527834a1d | ||
|
|
89c333e3e5 | ||
|
|
0d97d00b6c | ||
|
|
e7adda52b3 | ||
|
|
7432d073af | ||
|
|
04e2ab2c02 | ||
|
|
b7fcc08976 | ||
|
|
7722e53f12 | ||
|
|
2c3ee16272 | ||
|
|
19112771d6 | ||
|
|
4c7c5ff667 | ||
|
|
d7e915616d | ||
|
|
67c8e7f414 | ||
|
|
74eb3e0914 | ||
|
|
79fe664f19 | ||
|
|
5f0477f47b | ||
|
|
7bbce69721 | ||
|
|
870d6541f2 | ||
|
|
02c27b113c | ||
|
|
86d4bc3aea | ||
|
|
761772d7e1 | ||
|
|
54ef01b54b | ||
|
|
9311c4421a | ||
|
|
aaa4f448cf | ||
|
|
5f8b524619 | ||
|
|
08111768a2 | ||
|
|
1b827d7b6f | ||
|
|
a005fb019f | ||
|
|
b5e5760d01 | ||
|
|
cf2bc94e5c | ||
|
|
26f0cf69d3 | ||
|
|
61836c1b70 | ||
|
|
2a1b0c8d65 | ||
|
|
75a8e30f4f | ||
|
|
716b87a026 | ||
|
|
08b229e13f | ||
|
|
a529a80108 | ||
|
|
c81898cbc4 | ||
|
|
330591fdfc | ||
|
|
c7503f5240 | ||
|
|
eff371c866 | ||
|
|
8dc899dee4 | ||
|
|
cc3d7bd0fc | ||
|
|
7df4c86bdd | ||
|
|
c313e32a8b | ||
|
|
77519b51db | ||
|
|
1a01868e35 | ||
|
|
563d3e5948 | ||
|
|
1187ee7dad | ||
|
|
7c5921e736 | ||
|
|
399f94bfb4 | ||
|
|
1fa29843fa | ||
|
|
ee0449b17c | ||
|
|
e28eddc51f | ||
|
|
d82a612a90 | ||
|
|
e7e8f4b333 | ||
|
|
a6fbcb4220 | ||
|
|
8164032a2e | ||
|
|
a5804a750b | ||
|
|
81025661a9 | ||
|
|
4ece7eb6f4 | ||
|
|
0bb01b7df0 | ||
|
|
1c56e95e28 | ||
|
|
446124a258 | ||
|
|
583b0b67ab | ||
|
|
584502d4a0 | ||
|
|
d8803d5ae6 | ||
|
|
acfb4b5b9f | ||
|
|
0ddd3ea217 | ||
|
|
6a8517f274 | ||
|
|
94d511cdbd | ||
|
|
ec5d747328 | ||
|
|
c6880b2533 | ||
|
|
eb6eb3e630 | ||
|
|
ae4eb3c9ac | ||
|
|
ba0e826d83 | ||
|
|
f3fef74b09 | ||
|
|
014f62b649 | ||
|
|
55eab3b74b | ||
|
|
dc0fcb98df | ||
|
|
d24a9c8f5a | ||
|
|
42fe218b9f | ||
|
|
956006b741 | ||
|
|
167066fed4 | ||
|
|
525de5d335 | ||
|
|
367eb1f125 | ||
|
|
3444961787 | ||
|
|
710069c19e | ||
|
|
ddd3a617ca | ||
|
|
6434abbfc6 | ||
|
|
e45c100762 | ||
|
|
5a22a8e7f9 | ||
|
|
d6c764573c | ||
|
|
9d35d08ab6 | ||
|
|
f7b61702a0 | ||
|
|
983180bb8b | ||
|
|
cdb0392159 | ||
|
|
1891f5b395 | ||
|
|
a3963619f6 | ||
|
|
34994068a4 | ||
|
|
afaad0ada6 | ||
|
|
05f9cb3b77 | ||
|
|
1988a456a7 | ||
|
|
69216cc5a5 | ||
|
|
2cf6fa4c8b | ||
|
|
a61710b868 | ||
|
|
20f7563f3d | ||
|
|
3df2eff4bd | ||
|
|
a415ebd026 | ||
|
|
52ee3d01ae | ||
|
|
e59f992be6 | ||
|
|
8bae7722a2 | ||
|
|
0d7dba92c8 | ||
|
|
ce1390aedc | ||
|
|
287a9ee76e | ||
|
|
96b0f6c16d | ||
|
|
e1612ea59d | ||
|
|
71f4ea44eb | ||
|
|
35295bdbee | ||
|
|
aa8d6f3e86 | ||
|
|
62aa5dd415 | ||
|
|
673c55a2fe | ||
|
|
949ce10e88 | ||
|
|
8dee823e61 | ||
|
|
5d86336746 | ||
|
|
5b89f78a89 | ||
|
|
85a5668dba | ||
|
|
c943ca5404 | ||
|
|
1c7f8707fd | ||
|
|
a21c46e70b | ||
|
|
f3c26535ad | ||
|
|
2329694222 | ||
|
|
206a975752 | ||
|
|
9677bf0f30 | ||
|
|
6d6496ed52 | ||
|
|
7d9cf7c0bb | ||
|
|
55525742f4 | ||
|
|
c693b5a55c | ||
|
|
6b6443dead | ||
|
|
54b5fd537f | ||
|
|
0b99d4f1d1 | ||
|
|
3c07d3a3d3 | ||
|
|
1d1a64653c | ||
|
|
297e6f1917 | ||
|
|
b948e2c59e | ||
|
|
18096abb29 | ||
|
|
0aa08a2e34 | ||
|
|
f20af72312 | ||
|
|
7ef643360d | ||
|
|
76c828c627 | ||
|
|
281cfff026 | ||
|
|
64a5c5d1be | ||
|
|
7b8b797375 | ||
|
|
a1a382dbc9 | ||
|
|
19f6c524bf | ||
|
|
8dbdf6314c | ||
|
|
9c54e18bf0 | ||
|
|
9aba74e55a | ||
|
|
e4317d2031 | ||
|
|
61775daf00 | ||
|
|
86d8f3ee19 | ||
|
|
cb1fbf9f63 | ||
|
|
3005764c18 | ||
|
|
b1e8b4e65d | ||
|
|
c6149e2f02 | ||
|
|
aa5c99fa01 | ||
|
|
9c200f5471 | ||
|
|
ec06417d52 | ||
|
|
a4346646f1 | ||
|
|
a70c09e2a2 | ||
|
|
0f9e0abbee | ||
|
|
e77dbf325f | ||
|
|
f03620ea15 | ||
|
|
47b2e238e5 | ||
|
|
ad35cdac74 | ||
|
|
4eba5d8c86 | ||
|
|
e69adea539 | ||
|
|
9660cbcd6b | ||
|
|
9c9c83ccb9 | ||
|
|
1d42fb5f4a | ||
|
|
e119769480 | ||
|
|
b2dba9bf1f | ||
|
|
932cc129ee | ||
|
|
1a42839ba7 | ||
|
|
232a938c75 | ||
|
|
69ab085290 | ||
|
|
5f09d0ecc2 | ||
|
|
76b46e7707 | ||
|
|
6217896145 | ||
|
|
ee7ca0941a | ||
|
|
f8492ffeaa | ||
|
|
308595638a | ||
|
|
0bd8d6e2e1 | ||
|
|
160065c5bb | ||
|
|
ae0d6e3e36 | ||
|
|
6fa8a01c72 | ||
|
|
3f6916cf29 | ||
|
|
a4470ae7b2 | ||
|
|
251718e4c1 | ||
|
|
c504a5e783 | ||
|
|
f6fb2c95ef | ||
|
|
708311267a | ||
|
|
cdd1d7a618 | ||
|
|
2f324768b2 | ||
|
|
6ef18c21c9 | ||
|
|
b38c0add30 | ||
|
|
b900df5258 | ||
|
|
a2a54ffc5f | ||
|
|
20c04a13e6 | ||
|
|
a291745eeb | ||
|
|
0862caf27e | ||
|
|
cb1bab1a04 | ||
|
|
96afc1cfd5 | ||
|
|
24a8c25ab5 | ||
|
|
d1e7d1d96c | ||
|
|
18f547734e | ||
|
|
be3b365a34 | ||
|
|
b2b2dafc28 | ||
|
|
14ab6cdd69 | ||
|
|
eeec060df0 | ||
|
|
0efb7b1eea | ||
|
|
f000f705ea | ||
|
|
2749cc1ede | ||
|
|
a44e4f2cf8 | ||
|
|
30b10f947a | ||
|
|
731c6802d7 | ||
|
|
4cfb986f27 | ||
|
|
9cfc8a9d5c | ||
|
|
18327cd0e4 | ||
|
|
2022cfe07e | ||
|
|
47b71e6ee9 | ||
|
|
74633553a9 | ||
|
|
376bf1d4aa | ||
|
|
d318fb79d2 | ||
|
|
0cc361f3e7 | ||
|
|
baecb96e8a | ||
|
|
6181f5e404 | ||
|
|
d952c79a7b | ||
|
|
3dfb6b3353 | ||
|
|
48bd505c0b | ||
|
|
ab2d91bd6b | ||
|
|
3b2eead381 | ||
|
|
f3d2a9db09 | ||
|
|
8bbf6ac010 | ||
|
|
38e952e8ae | ||
|
|
fa9fed1c3a | ||
|
|
f6301f6888 | ||
|
|
44907e6064 | ||
|
|
907e99623c | ||
|
|
231671b9ff | ||
|
|
4f1a0b2c21 | ||
|
|
260c497cdd | ||
|
|
313fce7b61 | ||
|
|
2f877235a3 | ||
|
|
309fa55bbb | ||
|
|
4b8747e440 | ||
|
|
2ff7a0edef | ||
|
|
442cbb062d | ||
|
|
c971ca4c86 | ||
|
|
9babf3929b | ||
|
|
2ec0be9e77 | ||
|
|
c2d1c2d319 | ||
|
|
162f677def | ||
|
|
2875462425 | ||
|
|
a1d915990b | ||
|
|
b002265ee3 | ||
|
|
bd31fb2145 | ||
|
|
b506821d43 | ||
|
|
4bfb49b3cf | ||
|
|
9981a51e42 | ||
|
|
ebb326afe6 | ||
|
|
0d1aa74d6f | ||
|
|
0f32c841a6 | ||
|
|
41a8d5167f | ||
|
|
8f41e4fa4d | ||
|
|
de50494505 | ||
|
|
3d1def0132 | ||
|
|
0a29f5110d | ||
|
|
8b71d35458 | ||
|
|
760e353528 | ||
|
|
3627fedbea | ||
|
|
bbb5cf05db | ||
|
|
ebb01b84b8 | ||
|
|
a0d48e7e7e | ||
|
|
1fcfa22222 | ||
|
|
c9fb4e2c8d | ||
|
|
6e7ca5e1eb | ||
|
|
954b274789 | ||
|
|
0d5ac5a738 | ||
|
|
c209a35820 | ||
|
|
dd2b6750db | ||
|
|
4bb89bca9e | ||
|
|
ac63b8370e | ||
|
|
882d29dd87 | ||
|
|
ee373e7f19 | ||
|
|
8d72476e2b | ||
|
|
02756aa8ba | ||
|
|
072dfb9e4e | ||
|
|
0636c39bb1 | ||
|
|
a2e623c011 | ||
|
|
aa79dd6895 | ||
|
|
60cad2caed | ||
|
|
114c9c36b1 | ||
|
|
fd5bc65cc8 | ||
|
|
e041863905 | ||
|
|
0a05123a6c | ||
|
|
2afe316721 | ||
|
|
7e69565fe6 | ||
|
|
ccae144d62 | ||
|
|
5d5ca32fa1 | ||
|
|
52b8dad8ec | ||
|
|
cc684e330b | ||
|
|
85c6749216 | ||
|
|
30e5e8aca5 | ||
|
|
b900a6b42f | ||
|
|
15780a1ea0 | ||
|
|
92ada7cc52 | ||
|
|
53ca4761cc | ||
|
|
52cfa39716 | ||
|
|
b3bad17d1a | ||
|
|
feaaf1dbea | ||
|
|
82bf227e91 | ||
|
|
8807a2dfc4 | ||
|
|
bcb38217c4 | ||
|
|
af32f9fdda | ||
|
|
357d5de5b9 | ||
|
|
0501f02b06 | ||
|
|
689f9faba4 | ||
|
|
82686bdcaa | ||
|
|
14b1d089b6 | ||
|
|
a296239bdd | ||
|
|
0b0896cdd2 | ||
|
|
2d3e956ae0 | ||
|
|
36b7c06975 | ||
|
|
42182852f5 | ||
|
|
560b79cbff | ||
|
|
a6d799d705 | ||
|
|
64aecc6720 | ||
|
|
8ac40b4dea | ||
|
|
43b8fe1cd0 | ||
|
|
39d764ed58 | ||
|
|
a6ebe229e3 | ||
|
|
5c914f204a | ||
|
|
8876e58f34 | ||
|
|
7321a84d4c | ||
|
|
bb11c28246 | ||
|
|
8d9f136d06 | ||
|
|
00b4e083fd | ||
|
|
4cfe3df1f5 | ||
|
|
8f2d60ec26 | ||
|
|
123b23fa95 | ||
|
|
423a5d54a1 | ||
|
|
8bbf6bcf17 | ||
|
|
ea46f5e0e5 | ||
|
|
7f6c848242 | ||
|
|
559d50138f | ||
|
|
11d8cdc6ad | ||
|
|
e49978dafe | ||
|
|
e1d9e533b5 | ||
|
|
f946dd7198 | ||
|
|
1702c8c4bf | ||
|
|
afda1385bd | ||
|
|
fec38ca4ed | ||
|
|
ec1edeb5fa | ||
|
|
b0ec114685 | ||
|
|
c92da5a605 | ||
|
|
06e2dd037e | ||
|
|
34f0a19309 | ||
|
|
772e3c07b4 | ||
|
|
360ff3cf58 | ||
|
|
5dfe910023 | ||
|
|
91b73acb19 | ||
|
|
87d3af6475 | ||
|
|
98c1509f34 | ||
|
|
98939a05b6 | ||
|
|
d28134b8f3 | ||
|
|
8583eba015 | ||
|
|
5894b98f99 | ||
|
|
5de3a0ff3d | ||
|
|
10ca15f3fa | ||
|
|
da736b31b2 | ||
|
|
fa9ac569b8 | ||
|
|
10a10fb834 | ||
|
|
0f997d0dc3 | ||
|
|
b0eedd77f6 | ||
|
|
502aef5aaf | ||
|
|
9f8cfb1c62 | ||
|
|
c163b5f7a0 | ||
|
|
20da8b8f90 | ||
|
|
ae93dc13ab | ||
|
|
77e87e6148 | ||
|
|
a6e700e665 | ||
|
|
4d7aff707e | ||
|
|
d137b56a5b | ||
|
|
7806f3dd4b | ||
|
|
1e24b3a09e | ||
|
|
73b979e601 | ||
|
|
ebae8092cb | ||
|
|
2e21922eb6 | ||
|
|
1c3d2b94be | ||
|
|
48d2335d73 | ||
|
|
96ea4ae91c | ||
|
|
7af5726108 | ||
|
|
69d4646f4e | ||
|
|
8bd11f3ec2 | ||
|
|
47a9d527ab | ||
|
|
d9907c972b | ||
|
|
1444bfb2c8 | ||
|
|
14975faa60 | ||
|
|
3f12464861 | ||
|
|
de12116417 | ||
|
|
28b987aec9 | ||
|
|
fb596f3bb7 | ||
|
|
84948b39df | ||
|
|
cf32ad7fe3 | ||
|
|
ad0e439604 | ||
|
|
5456583294 | ||
|
|
f1845cbee8 | ||
|
|
51cc37b69d | ||
|
|
ff1b10dca1 | ||
|
|
ebeb17e2e0 | ||
|
|
137de5b157 | ||
|
|
224328e404 | ||
|
|
1611b9ed80 | ||
|
|
8a4af56fc6 | ||
|
|
05cfe06607 | ||
|
|
b37a68cc8f | ||
|
|
a2688c872d | ||
|
|
5b50f99e1e | ||
|
|
b8994b6130 | ||
|
|
d7917c584a | ||
|
|
544d845585 | ||
|
|
a6efc2d1b8 | ||
|
|
3189772e07 | ||
|
|
08a638237d | ||
|
|
d8cdd1567f | ||
|
|
cbfb39d1be | ||
|
|
a4d64c7f49 | ||
|
|
1e7b6c029c | ||
|
|
3634d7e97a | ||
|
|
53d7efea76 | ||
|
|
002684d693 | ||
|
|
c038b8aa56 | ||
|
|
c5f17d45c1 | ||
|
|
31439046e0 | ||
|
|
11d0ebc841 | ||
|
|
cecfdbf72d | ||
|
|
f0f61f6d0d | ||
|
|
d68ff71004 | ||
|
|
591e85e928 | ||
|
|
c69ed6ea39 | ||
|
|
55a08fac68 | ||
|
|
2fc281d01f | ||
|
|
d326582cab | ||
|
|
f4c630abb3 | ||
|
|
c2cccfc585 | ||
|
|
3c5406b35c | ||
|
|
5e3225cc44 | ||
|
|
61118caa86 | ||
|
|
348be7ec60 | ||
|
|
3ff55e9680 | ||
|
|
cbb92dfaf0 | ||
|
|
019bfef899 | ||
|
|
0709249f4c | ||
|
|
89c9c66736 | ||
|
|
347ed3b93c | ||
|
|
5b73c3609b | ||
|
|
eebeb52b29 | ||
|
|
6ec6cfc767 | ||
|
|
44181ea836 | ||
|
|
c80c7bf999 | ||
|
|
ffa5ebf3f4 | ||
|
|
926c41bd29 | ||
|
|
1182301ca7 | ||
|
|
010fa0b331 | ||
|
|
4ca7d975af | ||
|
|
b774111020 | ||
|
|
78260d890b | ||
|
|
4b67fefe5a | ||
|
|
3a8012cbf2 | ||
|
|
a53cdc5b08 | ||
|
|
5d20c4fb35 | ||
|
|
a04549cc75 | ||
|
|
bc7535bc7f | ||
|
|
83357f047d | ||
|
|
b6699c3f07 | ||
|
|
016bc5ceb3 | ||
|
|
ed65f7dc34 | ||
|
|
4d50a2b4d6 | ||
|
|
7f4301668f | ||
|
|
29a1bb07e5 | ||
|
|
99e9a90081 | ||
|
|
715020e334 | ||
|
|
2952886010 | ||
|
|
613e7d2a65 | ||
|
|
6a2c471077 | ||
|
|
b79aa05e3b | ||
|
|
500b5a181d | ||
|
|
2b8a5406f9 | ||
|
|
2f35ae90fe | ||
|
|
0fca32a7aa | ||
|
|
02c9b66a6c | ||
|
|
539d4c1030 | ||
|
|
aa6d1a0c19 | ||
|
|
777c47acbe | ||
|
|
5776c3c4c6 | ||
|
|
0c3d346cb7 | ||
|
|
1c23bc5670 | ||
|
|
8ea975d070 | ||
|
|
6c69aa532e | ||
|
|
6264c9b2a9 | ||
|
|
fc92414273 | ||
|
|
53154d71c3 | ||
|
|
8cebec9802 | ||
|
|
0209d1605d | ||
|
|
c8a0d0aaf9 | ||
|
|
0cc46efa09 | ||
|
|
22c268e6c9 | ||
|
|
dd0514e2cc | ||
|
|
f6e7d01450 | ||
|
|
edc540211c | ||
|
|
2eed3a3cc8 | ||
|
|
1aa44cc797 | ||
|
|
37c8fd0eba | ||
|
|
786aa98da1 | ||
|
|
413e0853d7 | ||
|
|
8e4560c42f | ||
|
|
450ea83495 | ||
|
|
af8c1d81a3 | ||
|
|
b589427941 | ||
|
|
f0fa285f75 | ||
|
|
a0b5b07010 | ||
|
|
5c95c2ac23 | ||
|
|
454dbbc593 | ||
|
|
c1c6c0bf45 | ||
|
|
dff2922aa7 | ||
|
|
f253a058d3 | ||
|
|
b3c6a33185 | ||
|
|
31780d0e26 | ||
|
|
f489ab3147 | ||
|
|
29cf84c692 | ||
|
|
e454929558 | ||
|
|
105f6a6323 | ||
|
|
8845701719 | ||
|
|
b7683e3a5d | ||
|
|
0ee2166cc5 | ||
|
|
067707e367 | ||
|
|
8211a33c7f | ||
|
|
7441052be6 | ||
|
|
90ccf05f82 | ||
|
|
112161bd33 | ||
|
|
5ba4bf35c5 | ||
|
|
aa93b18c2c | ||
|
|
ba702545fc | ||
|
|
436369100d | ||
|
|
6535bd42e6 | ||
|
|
64cee65ebc | ||
|
|
ba544377fb | ||
|
|
5165148f72 | ||
|
|
8d970ca70b | ||
|
|
383b8b8ca9 | ||
|
|
5ce60a20f2 | ||
|
|
49131a7d94 | ||
|
|
d884c5bad1 | ||
|
|
86bdc0a3ee | ||
|
|
1a4e245f3e | ||
|
|
975efcbaee | ||
|
|
90e1b1fd7d | ||
|
|
86207c1960 | ||
|
|
9c62bca11a | ||
|
|
75d61b33bc | ||
|
|
3df760b83a | ||
|
|
e34aa5a3b3 | ||
|
|
985e4c4154 | ||
|
|
9598fa8759 | ||
|
|
ac8173515a | ||
|
|
944f858021 | ||
|
|
27a3d9f9aa | ||
|
|
48fc582f66 | ||
|
|
81de1028bc | ||
|
|
850815cb6e | ||
|
|
c4e7870ac1 | ||
|
|
4584eccea0 | ||
|
|
ed3ecd801e | ||
|
|
b166f13eb5 | ||
|
|
076944d920 | ||
|
|
09e20e0bd8 | ||
|
|
a717831da4 | ||
|
|
4dfc8f1f0b | ||
|
|
5b57fe0a1e | ||
|
|
89bbe14c50 | ||
|
|
6635b48cd1 | ||
|
|
675f605d44 | ||
|
|
6a983d4287 | ||
|
|
1a159e08af | ||
|
|
dd030860c4 | ||
|
|
2d09372434 | ||
|
|
67912e0032 | ||
|
|
f3dea9a595 | ||
|
|
fb7b393278 | ||
|
|
61e5ec4b1e | ||
|
|
6f344eab03 | ||
|
|
41eacc84a0 | ||
|
|
01b8b3c7d2 | ||
|
|
8fecd4b4f1 | ||
|
|
41fc5f2dbe | ||
|
|
bcfd3d68f5 | ||
|
|
d3a6461d71 | ||
|
|
17478fdede | ||
|
|
4dca00cec8 | ||
|
|
061d774b99 | ||
|
|
20469da285 | ||
|
|
e18e3eba76 | ||
|
|
de9fcfe348 | ||
|
|
7e5b06813d | ||
|
|
1892c8bf97 | ||
|
|
5e428e7d0d | ||
|
|
c9777d2659 | ||
|
|
3aedd213a9 | ||
|
|
e0c1ea9038 | ||
|
|
6f88c6a634 | ||
|
|
58aa573ac2 | ||
|
|
0ed110b969 | ||
|
|
b28dea4e10 | ||
|
|
21f0db692d | ||
|
|
4d4e08ec1c | ||
|
|
25074d6c22 | ||
|
|
0cfc80c4c3 | ||
|
|
b8bb15fb51 | ||
|
|
994df5a248 | ||
|
|
6657b9c73a | ||
|
|
ba0d04a986 | ||
|
|
3cb9eb30d3 | ||
|
|
e0b624e20e | ||
|
|
c27309edcb | ||
|
|
3207e61222 | ||
|
|
3671233089 | ||
|
|
3a828611e9 | ||
|
|
8bdcef40e4 | ||
|
|
91c9e62123 | ||
|
|
0e3453536e | ||
|
|
eaff5a1412 | ||
|
|
216e0d5b91 | ||
|
|
0965991600 | ||
|
|
74aa1a4378 | ||
|
|
5531192151 | ||
|
|
a620626a33 | ||
|
|
f13a71c66b | ||
|
|
3ef3e07a49 | ||
|
|
76fa8f1838 | ||
|
|
f2b139ed1f | ||
|
|
a6e7fcd140 | ||
|
|
76cf3fcb43 | ||
|
|
121dd39f9f | ||
|
|
a263253545 | ||
|
|
76d6ac4b06 | ||
|
|
60f20632e2 | ||
|
|
ae519a247f | ||
|
|
8de916bcee | ||
|
|
1631d5f9b9 | ||
|
|
98c82b899e | ||
|
|
6d3a1eac3b | ||
|
|
b8f702a0af | ||
|
|
43c9825c2a | ||
|
|
fbf6643607 | ||
|
|
3f36baa9f4 | ||
|
|
b0e69a0500 | ||
|
|
856640b54f | ||
|
|
76240b3a39 | ||
|
|
34b3c72e4e | ||
|
|
c264592d69 | ||
|
|
1bd06bd0c4 | ||
|
|
9540ccdf1f | ||
|
|
98bf13c36b | ||
|
|
7e76e56387 | ||
|
|
759d8ac6ee | ||
|
|
959e8dfe06 | ||
|
|
7f57b076a6 | ||
|
|
7144c4212a | ||
|
|
399a6f0bd1 | ||
|
|
3d47929968 | ||
|
|
03919683f9 | ||
|
|
5cda6c4582 | ||
|
|
83ed49149c | ||
|
|
67d990904e | ||
|
|
f3df90b2bb | ||
|
|
11e46bd7ae | ||
|
|
c09a0318b7 | ||
|
|
fe716ba686 | ||
|
|
9a97800813 | ||
|
|
e881f6175a | ||
|
|
36e77b1059 | ||
|
|
a9c32ace06 | ||
|
|
2c5d4daac5 | ||
|
|
b46343583c | ||
|
|
816c2b5a79 | ||
|
|
a78568b7e9 | ||
|
|
ee5b2a1e51 | ||
|
|
e4b21c74fc | ||
|
|
4edcb93dca | ||
|
|
15f80eea31 | ||
|
|
81cebb8b79 | ||
|
|
a4e75b3dfd | ||
|
|
cddaba8ede | ||
|
|
49c5f38d3d | ||
|
|
f8296228f1 | ||
|
|
930b0c4b8a | ||
|
|
3d153f7985 | ||
|
|
ee1d9ec019 | ||
|
|
614b448a67 | ||
|
|
a19c9f179d | ||
|
|
a784b943c1 | ||
|
|
d202709808 | ||
|
|
51ff0abb05 | ||
|
|
492a9e2415 | ||
|
|
7bf7333d68 | ||
|
|
c20276e4ae | ||
|
|
9ca7047d71 | ||
|
|
ba3b2f1538 | ||
|
|
b010b7c434 | ||
|
|
9dc17a2536 | ||
|
|
5950bf7943 | ||
|
|
4141c803d8 | ||
|
|
ba1ba5f0fb | ||
|
|
51aa7bd321 | ||
|
|
09b88a4a55 | ||
|
|
f3481ca28f | ||
|
|
ba30bad57b | ||
|
|
ffb1ac674c | ||
|
|
3be34589e8 | ||
|
|
d87e615209 | ||
|
|
92511cff48 | ||
|
|
7b82159865 | ||
|
|
52c11dce31 | ||
|
|
3ba0885a3e | ||
|
|
023c9d8dd5 | ||
|
|
4c97a04e2e | ||
|
|
fb05e1cdf6 | ||
|
|
ceb4678956 | ||
|
|
0cb8499b73 | ||
|
|
4d62ec32e0 | ||
|
|
75ef718820 | ||
|
|
c927df3fa1 | ||
|
|
4700aea951 | ||
|
|
60cdb821db | ||
|
|
0ef888cd3e | ||
|
|
26c777d516 | ||
|
|
9555339007 | ||
|
|
2fbe371f53 | ||
|
|
15181d7811 | ||
|
|
1edba2110f | ||
|
|
54d853ebc3 | ||
|
|
f5cda4cbb1 | ||
|
|
f9a6348a53 | ||
|
|
a7ffd9d19c | ||
|
|
29db322e8f | ||
|
|
25dc89eb9b | ||
|
|
716630c0eb | ||
|
|
4f59b6587f | ||
|
|
9befdf1d20 | ||
|
|
75d44c0452 | ||
|
|
a58a636838 | ||
|
|
9fdab72dd7 | ||
|
|
b2a97be7f4 | ||
|
|
6471c9f478 | ||
|
|
4a3dc3c0e3 | ||
|
|
a2318e86bd | ||
|
|
a9164153d1 | ||
|
|
8795d38906 | ||
|
|
8cd44e3630 | ||
|
|
07e970c7e6 | ||
|
|
d1aa0d38c5 | ||
|
|
9e4d0f0be2 | ||
|
|
cd7638980a | ||
|
|
f733a5ef0e | ||
|
|
5da98aa687 | ||
|
|
0b6f3c66cd | ||
|
|
a01d9ac558 | ||
|
|
e46691a0bc | ||
|
|
732a40e107 | ||
|
|
29da3ade3c | ||
|
|
de908d6319 | ||
|
|
9c9c98ad2e | ||
|
|
5e0e9fce5d | ||
|
|
53ec8809cf | ||
|
|
863779065e | ||
|
|
0b33dac310 | ||
|
|
e2bce37720 | ||
|
|
228b4e426b | ||
|
|
a4974de937 | ||
|
|
22f41c9b99 | ||
|
|
a123c552cd | ||
|
|
b2172f4f8e | ||
|
|
dc1d1b6934 | ||
|
|
67475a7ed7 | ||
|
|
362ab3e4f9 | ||
|
|
2aed84d16b | ||
|
|
5deea1c015 | ||
|
|
99516f81b1 | ||
|
|
d6091d5a39 | ||
|
|
5a47825ece | ||
|
|
16f66ae794 | ||
|
|
7ce1d9e9a6 | ||
|
|
a70183bc80 | ||
|
|
332737217a | ||
|
|
bcbe37b716 | ||
|
|
f393b7449d | ||
|
|
531308d929 | ||
|
|
74e564cd46 | ||
|
|
42eae426df | ||
|
|
246e09319c | ||
|
|
f7a3296d8c | ||
|
|
3e4585c8fd | ||
|
|
3e84b6e15f | ||
|
|
d505d1ef4a | ||
|
|
70b2ae3edf | ||
|
|
9e5dba197c | ||
|
|
a61114c38b | ||
|
|
db98bbc114 | ||
|
|
e42633140e | ||
|
|
bd50e31325 | ||
|
|
b2c0518e6a | ||
|
|
d82e2718e2 | ||
|
|
18e377b4ff | ||
|
|
043b2e9c2e | ||
|
|
1b593194be | ||
|
|
35208f368c | ||
|
|
c788e59365 | ||
|
|
cb08f4a6a3 | ||
|
|
adbc603d24 | ||
|
|
6f81892e6b | ||
|
|
448be74335 | ||
|
|
1a5a1a93f6 | ||
|
|
d917188a46 | ||
|
|
b4e88ccb28 | ||
|
|
d916ba1ba1 | ||
|
|
33af4421f2 | ||
|
|
95e362c6da | ||
|
|
c58d983e3b | ||
|
|
a84c9d1ed9 | ||
|
|
c6a27f0178 | ||
|
|
67b6f1ca88 | ||
|
|
a4ff392503 | ||
|
|
40f51f506c | ||
|
|
eeb821f707 | ||
|
|
47d5566646 | ||
|
|
90bdfd97a6 | ||
|
|
b9865f110e | ||
|
|
07ef612968 | ||
|
|
019fdc7850 | ||
|
|
7c382796be | ||
|
|
b6acb8d0de | ||
|
|
6adbcb9755 | ||
|
|
e968089485 | ||
|
|
c2cd422ac6 | ||
|
|
36ca4ba63d | ||
|
|
ed4a1d12b9 | ||
|
|
a0aa8b4b61 | ||
|
|
2c059d58d9 | ||
|
|
cd346d3e22 | ||
|
|
561d93aa00 | ||
|
|
ddac197404 | ||
|
|
0e8e6f19b2 | ||
|
|
c03e4f9bf0 | ||
|
|
c3bb1f8166 | ||
|
|
959a7201b8 | ||
|
|
6c73d01142 | ||
|
|
2932ad5677 | ||
|
|
036bbcc53f | ||
|
|
6384e46da3 | ||
|
|
6e2fcc44bd | ||
|
|
8721fc2d0b | ||
|
|
c1facbb681 | ||
|
|
f2c33fa6fd | ||
|
|
5aae935038 | ||
|
|
11503177d1 | ||
|
|
9ab899a660 | ||
|
|
8937a13e0c | ||
|
|
19017d4061 | ||
|
|
f53ac639c6 | ||
|
|
f71165b556 | ||
|
|
350a404cb8 | ||
|
|
827c55741b | ||
|
|
e0c8c08936 | ||
|
|
4e397d07ea | ||
|
|
9eb8794149 | ||
|
|
dc24110311 | ||
|
|
b3e72fc37f | ||
|
|
90076b96df | ||
|
|
9c339a7227 | ||
|
|
e7a8b47f1a | ||
|
|
7ac7a4bc37 | ||
|
|
a628901dda | ||
|
|
2ab75dee27 | ||
|
|
a3f586cdab | ||
|
|
fcfd87168a | ||
|
|
95a0e8ab31 | ||
|
|
0c9caf04de | ||
|
|
21e8bbf290 | ||
|
|
3b408d83fe | ||
|
|
8573552e8c | ||
|
|
c7235be6e3 | ||
|
|
1c17d91c53 | ||
|
|
a070f0dac5 | ||
|
|
b480283c56 | ||
|
|
f5ce5e1465 | ||
|
|
d7db77a0cb | ||
|
|
346ac30120 | ||
|
|
07bb51b6b4 | ||
|
|
bbab9b61dd | ||
|
|
82e8372f17 | ||
|
|
e67ed82877 | ||
|
|
15ac971681 | ||
|
|
0c21e13012 | ||
|
|
d5fd72fd0d | ||
|
|
c7474d077b | ||
|
|
826b52d26f | ||
|
|
8c5a2bd6bb | ||
|
|
25a58453ff | ||
|
|
00fe865dbe | ||
|
|
9e9bececa9 | ||
|
|
90890074b0 | ||
|
|
31676a3540 | ||
|
|
6b9e941ee3 | ||
|
|
802d7fa6d5 | ||
|
|
3798cb8182 | ||
|
|
2c5fadbce3 | ||
|
|
58ece83395 | ||
|
|
c75c096aa8 | ||
|
|
ab961dc8b0 | ||
|
|
6ad47e83b4 | ||
|
|
241520e66d | ||
|
|
a13c20f603 | ||
|
|
db6251ad54 | ||
|
|
51eb1b81f6 | ||
|
|
2adc42e43e | ||
|
|
52cc46a237 | ||
|
|
a07b4dc038 | ||
|
|
739a543ea8 | ||
|
|
01c76c6606 | ||
|
|
d32f888db1 | ||
|
|
f7914dbf9a | ||
|
|
3ff94a009b | ||
|
|
1aeb3da83f | ||
|
|
e8e5b46e2b | ||
|
|
c9d67d4ddf | ||
|
|
8de5b7f548 | ||
|
|
9ee0f7b7e0 | ||
|
|
f1fd4544a3 | ||
|
|
349eb12fd5 | ||
|
|
6a8f17de1e | ||
|
|
b1277b9902 | ||
|
|
ed3883d21b | ||
|
|
ea558241e0 | ||
|
|
61aa2134a4 | ||
|
|
4eb76e2397 | ||
|
|
68e575362f | ||
|
|
aab3bb04cf | ||
|
|
481d81cb76 | ||
|
|
c6cb42e4fb | ||
|
|
2d43a89488 | ||
|
|
302ea8c260 | ||
|
|
a1f3462bc0 | ||
|
|
7476f3ac3b | ||
|
|
68b64fb610 | ||
|
|
34b537ee66 | ||
|
|
7a5dbeb782 | ||
|
|
6c06918ede | ||
|
|
ee8f293701 | ||
|
|
3b4a0225e2 | ||
|
|
c8e1edaae5 | ||
|
|
63d3fc9106 | ||
|
|
5d7324e42d | ||
|
|
be7b4458f2 | ||
|
|
7304956e39 | ||
|
|
c510eec090 | ||
|
|
1b167a4343 | ||
|
|
9ab5170197 | ||
|
|
a00e414faf | ||
|
|
4c5e19b6c6 | ||
|
|
ed26604a71 | ||
|
|
0fbd4bf044 | ||
|
|
d719e60cb4 | ||
|
|
0cb9d93d0c | ||
|
|
f5826b8014 | ||
|
|
4a47f55639 | ||
|
|
b884556ed8 | ||
|
|
c06b0f3d5e | ||
|
|
68ea60683a | ||
|
|
6df8c74d5b | ||
|
|
877e8e970c | ||
|
|
d56349a2aa | ||
|
|
67c03ff185 | ||
|
|
35e00cc2d8 | ||
|
|
064f6cb6f2 | ||
|
|
20ab8b4b41 | ||
|
|
7395d852c3 | ||
|
|
3ebf898e88 | ||
|
|
a4c886e4c8 | ||
|
|
1291dfdead | ||
|
|
df278aff3e | ||
|
|
7c510d6f43 | ||
|
|
7bbcb2f690 | ||
|
|
ad2695b1b7 | ||
|
|
9cbf062a70 | ||
|
|
ec645d9017 | ||
|
|
0d894c9dbe | ||
|
|
c6709b89c4 | ||
|
|
061bebc0d8 | ||
|
|
802e1d692b | ||
|
|
dbf33b344c | ||
|
|
b40228a61d | ||
|
|
da5a0e8722 | ||
|
|
200fc02848 | ||
|
|
7096217d39 | ||
|
|
f1eb83a013 | ||
|
|
fec82dbc86 | ||
|
|
7b1b47a8e6 | ||
|
|
8b9afce53a | ||
|
|
137db78b46 | ||
|
|
a3344c8e5e | ||
|
|
c173d09c56 | ||
|
|
cb49a3cfa1 | ||
|
|
adab80053d | ||
|
|
f106fb85d4 | ||
|
|
5fa6d850a2 | ||
|
|
4adfe93cc5 | ||
|
|
d1593e6b15 | ||
|
|
a53cb070e3 | ||
|
|
452ae49db5 | ||
|
|
8c5c5b6517 | ||
|
|
6f44d4d247 | ||
|
|
d804f86b88 | ||
|
|
8dee9f844f | ||
|
|
963ba10012 | ||
|
|
07645deeb8 | ||
|
|
c52c82ffc1 | ||
|
|
d6a03a23a8 | ||
|
|
e347b0da2b | ||
|
|
52b1fbbd99 | ||
|
|
65613f23ba | ||
|
|
4f92a764f1 | ||
|
|
6a3a7f3076 | ||
|
|
63d3a9c5ea | ||
|
|
2c730f6fc2 | ||
|
|
df8dae1df4 | ||
|
|
2e9f1bf0e1 | ||
|
|
b1e0ccbaa8 | ||
|
|
bd2abcae37 | ||
|
|
f1fbd4c7d1 | ||
|
|
eed22ac4ac | ||
|
|
176a614899 | ||
|
|
f858d222f2 | ||
|
|
16094305bc | ||
|
|
fbf002bb88 | ||
|
|
9135fddb0e | ||
|
|
d88fcf73f1 | ||
|
|
a950f28762 | ||
|
|
c629204688 | ||
|
|
e22f63f231 | ||
|
|
d256b95768 | ||
|
|
f530138876 | ||
|
|
0a39d8f207 | ||
|
|
6852d1d8c3 | ||
|
|
a1ad253f17 | ||
|
|
ffa101872f | ||
|
|
4d24b4c466 | ||
|
|
474b8a9716 | ||
|
|
53261831f1 | ||
|
|
49e3c9d8e6 | ||
|
|
1715e4885a | ||
|
|
eff7cb41d1 | ||
|
|
7a6f825f0f | ||
|
|
29afd31dd1 | ||
|
|
d86b0f1f5f | ||
|
|
998ac55e19 | ||
|
|
d6f25d70f1 | ||
|
|
b02da8eb50 | ||
|
|
2f52a41054 | ||
|
|
99c675b2f7 | ||
|
|
72dce7685e | ||
|
|
ee8836c442 | ||
|
|
a1006c373d | ||
|
|
755c5b3330 | ||
|
|
ce6aa1e496 | ||
|
|
6c1fc273f3 | ||
|
|
aa8b03b415 | ||
|
|
96ec4abd07 | ||
|
|
70532b7d6b | ||
|
|
a4d729f31d | ||
|
|
fcbc5a3fdd | ||
|
|
8c0ceb17a2 | ||
|
|
c2012f9b82 | ||
|
|
aa2be094ae | ||
|
|
4d524040bc | ||
|
|
0fe120ba25 | ||
|
|
2e7aa150f7 | ||
|
|
04fac37311 | ||
|
|
bcb43bb358 | ||
|
|
89ec4332ec | ||
|
|
34736de4c0 | ||
|
|
5f50d597f2 | ||
|
|
df94f187b9 | ||
|
|
b92c0df834 | ||
|
|
d357be38b9 | ||
|
|
912e296070 | ||
|
|
35593b33f4 | ||
|
|
54f3d200d3 | ||
|
|
3f67e11fab | ||
|
|
c1de1a190d | ||
|
|
566dda07ba | ||
|
|
7a2f4cbfe8 | ||
|
|
5ac7bde7c9 | ||
|
|
9b4eab501a | ||
|
|
ca04d7a208 | ||
|
|
40a3c12305 | ||
|
|
3001a770ed | ||
|
|
2608383c5e | ||
|
|
3d6312e807 | ||
|
|
22cd982566 | ||
|
|
682b112abc | ||
|
|
e738280547 | ||
|
|
8265328def | ||
|
|
231b98a5e1 | ||
|
|
13e4670c29 | ||
|
|
d08b6b44ba | ||
|
|
09b6c2ef15 | ||
|
|
cc29c1204b | ||
|
|
94c00f3d4d | ||
|
|
3c2b73672e | ||
|
|
23acb0eeb2 | ||
|
|
bfa4b8c5ab | ||
|
|
ce75ca04b1 | ||
|
|
9dba0554a5 | ||
|
|
59947880f4 | ||
|
|
61094cf3dc | ||
|
|
6d00101e9d | ||
|
|
7a06050cd3 | ||
|
|
6f9afa68cd | ||
|
|
c038b90619 | ||
|
|
9c4fe78260 | ||
|
|
60dd08573d | ||
|
|
f5204c61fb | ||
|
|
9ddeefe39d | ||
|
|
0293371a1b | ||
|
|
dd31c6fcb0 | ||
|
|
6708df7bf0 | ||
|
|
6d9c46b811 | ||
|
|
af2c2823a7 | ||
|
|
b17ecb642b | ||
|
|
ba12070f7e | ||
|
|
29b9763d9f | ||
|
|
270da80bfa | ||
|
|
701d35d12f | ||
|
|
2238e8e477 | ||
|
|
4b08da5538 | ||
|
|
8a616a5a5f | ||
|
|
9455d430cb | ||
|
|
137023dd0c | ||
|
|
2a45408c4a | ||
|
|
9e201014f8 | ||
|
|
0c072a0b46 | ||
|
|
c11c64fbe0 | ||
|
|
f022c177db | ||
|
|
5f10073c95 | ||
|
|
33ac8b3139 | ||
|
|
244847591f | ||
|
|
5abe32d861 | ||
|
|
9194296de8 | ||
|
|
6273a91cb7 | ||
|
|
1ef7acfe92 | ||
|
|
a0156a926f | ||
|
|
96998822b5 | ||
|
|
8215e7a938 | ||
|
|
f7622f86d9 | ||
|
|
337e368239 | ||
|
|
64b6840d8d | ||
|
|
6e119bb02e | ||
|
|
2c2e46dbf5 | ||
|
|
770bc596e1 | ||
|
|
7534d131d6 | ||
|
|
7f3c9036ea | ||
|
|
725111f7cb | ||
|
|
bf3d6c0c9b | ||
|
|
b8e8ccdc79 | ||
|
|
6b80c20bdb | ||
|
|
eea374fd19 | ||
|
|
2e8879fa6e | ||
|
|
f5a07779dd | ||
|
|
c51f2d4238 | ||
|
|
45e2738585 | ||
|
|
b173acfc96 | ||
|
|
4ebb342fcd | ||
|
|
8e5ef8538a | ||
|
|
ff82bf3b07 | ||
|
|
5147c3c914 | ||
|
|
fbbbffc5a8 | ||
|
|
7cfe2a5e65 | ||
|
|
df2a346b30 | ||
|
|
270512ab12 | ||
|
|
eba63ef58b | ||
|
|
01a9792f05 | ||
|
|
0491e05833 | ||
|
|
9a1a5b8785 | ||
|
|
f3b656b246 | ||
|
|
53b38d37a9 | ||
|
|
8f2e4fdf86 | ||
|
|
11de71b04c | ||
|
|
19bd66fe74 | ||
|
|
45771abbd6 | ||
|
|
573969cd53 | ||
|
|
34be0bb1a5 | ||
|
|
2031eca588 | ||
|
|
6321c3a034 | ||
|
|
1fda6c4f8c | ||
|
|
11a4e58fc1 | ||
|
|
8a35fb3bea | ||
|
|
e85d67af9f | ||
|
|
b37fb16dcb | ||
|
|
1e1c5047f2 | ||
|
|
b2be099d16 | ||
|
|
28d8362934 | ||
|
|
01039d0bff | ||
|
|
c755c5fd8b | ||
|
|
5c8e9139d1 | ||
|
|
56defd9a98 | ||
|
|
8eb7217580 | ||
|
|
b2a9d36a7f | ||
|
|
04f15edb91 | ||
|
|
4e98a44593 | ||
|
|
1385ddbb14 | ||
|
|
7f0c65703a | ||
|
|
3a6dec8a05 | ||
|
|
209b12814f | ||
|
|
f920c5b590 | ||
|
|
05fc7018f8 | ||
|
|
a384002724 | ||
|
|
0260405c68 | ||
|
|
0537f9689c | ||
|
|
0c010a1517 | ||
|
|
0745d0892d | ||
|
|
5e64f8c44c | ||
|
|
4a5b8a5bee | ||
|
|
b3836ed3cb | ||
|
|
47738cbad7 | ||
|
|
0a882b6394 | ||
|
|
612a91110f | ||
|
|
2337eb5823 | ||
|
|
9aa9d70ddb | ||
|
|
231493c93c | ||
|
|
20a90e3a76 | ||
|
|
17a2994dbd | ||
|
|
b554eef43b | ||
|
|
0066590f98 | ||
|
|
165a28abae | ||
|
|
63999e5299 | ||
|
|
2802ec65c2 | ||
|
|
b3f56e8b38 | ||
|
|
5826e4f481 | ||
|
|
66ee67be03 | ||
|
|
a7ad2afa5e | ||
|
|
0f04379d9c | ||
|
|
7e4d335943 | ||
|
|
26c07054a1 | ||
|
|
843d9d0b39 | ||
|
|
4ac210c16a | ||
|
|
02703c74a4 | ||
|
|
ef428d5681 | ||
|
|
afbe674edb | ||
|
|
f42e6d24f2 | ||
|
|
449bd384ed | ||
|
|
3eeaab4bed | ||
|
|
57eb1d3250 | ||
|
|
b4f5e5c959 | ||
|
|
0d2848b3ba | ||
|
|
e84b663a93 | ||
|
|
d85185217b | ||
|
|
8f3bdc72d0 | ||
|
|
7d368fcbd8 | ||
|
|
2bd2cd9b78 | ||
|
|
c83101248a | ||
|
|
8d3509b937 | ||
|
|
1875e6db29 | ||
|
|
0962fbbf98 | ||
|
|
cbdac46d58 | ||
|
|
d2e0c81720 | ||
|
|
109080ae48 | ||
|
|
31efffbdba | ||
|
|
aaa5dc614f | ||
|
|
8be97c01d1 | ||
|
|
9e1a112336 | ||
|
|
4e28f13209 | ||
|
|
53a20bfd94 | ||
|
|
a28062338c | ||
|
|
1c2f1fe505 | ||
|
|
14365bd820 | ||
|
|
a51a97262d | ||
|
|
45d8574b93 | ||
|
|
417f8973ff | ||
|
|
b3b72cd92c | ||
|
|
bb00084863 | ||
|
|
db22e5faa6 | ||
|
|
55d03c3179 | ||
|
|
7e0a494f13 | ||
|
|
83e68987b3 | ||
|
|
53bb3bee34 | ||
|
|
c9edf6fe98 | ||
|
|
14cc0aaf7b | ||
|
|
2f3c39bc62 | ||
|
|
c5de8b2a27 | ||
|
|
a4022932ee | ||
|
|
0e3b6b70df | ||
|
|
c49a0aa08d | ||
|
|
5503b6a352 | ||
|
|
60021d9165 | ||
|
|
97b708910a | ||
|
|
2f6ebed1dc | ||
|
|
156f657209 | ||
|
|
816f74d1c7 | ||
|
|
ec14c80c7c | ||
|
|
543b4ecc13 | ||
|
|
1110cea007 | ||
|
|
0ed64ce310 | ||
|
|
0e441bc2be | ||
|
|
d996a9af2b | ||
|
|
ab6cf1b8a2 | ||
|
|
c25f2f1cbf | ||
|
|
62526671e9 | ||
|
|
88ebf53577 | ||
|
|
a41b0aade2 | ||
|
|
02c31fa461 | ||
|
|
5df70a9e21 | ||
|
|
cbe52c3166 | ||
|
|
7858cc03da | ||
|
|
bbada33271 | ||
|
|
f5d51a9362 | ||
|
|
0fc6b2c9e2 | ||
|
|
7a5ad5d5a1 | ||
|
|
44eff497e8 | ||
|
|
8b452002e8 | ||
|
|
e442c36252 | ||
|
|
50ec3951dc | ||
|
|
11cd239707 | ||
|
|
f6098f2dda | ||
|
|
857c6092b6 | ||
|
|
eef468e330 | ||
|
|
4bd46774bb | ||
|
|
283c3e2437 | ||
|
|
306aae6cee | ||
|
|
edb0600583 | ||
|
|
ac86d923fc | ||
|
|
fbd63d0784 | ||
|
|
78ebeee2c4 | ||
|
|
55805fd2d0 | ||
|
|
7ebd220a8f | ||
|
|
e8a1f6d190 | ||
|
|
034bae10fc | ||
|
|
a7c924c041 | ||
|
|
27b762af60 | ||
|
|
b764ab9537 | ||
|
|
a761b89d2f | ||
|
|
a136862afe | ||
|
|
f0747cd950 | ||
|
|
21ac2b964b | ||
|
|
79e1dd65ab | ||
|
|
13e393607b | ||
|
|
052ec89927 | ||
|
|
2073d95fb4 | ||
|
|
cbed917fee | ||
|
|
dffdb56b7f | ||
|
|
a78c0632ed | ||
|
|
8fa6a40be2 | ||
|
|
4b5598682a | ||
|
|
e9f5428d3a | ||
|
|
34f0b26424 | ||
|
|
cd27b13b1d | ||
|
|
3ecbd099eb | ||
|
|
e43d03e30e | ||
|
|
d1acb9b44f | ||
|
|
acd1c4b5af | ||
|
|
40808cedc1 | ||
|
|
51054a1b39 | ||
|
|
e774a3299e | ||
|
|
99febc8b9a | ||
|
|
1ce8efbdda | ||
|
|
0b0a60d861 | ||
|
|
9e5b378081 | ||
|
|
7ed876533a | ||
|
|
b2d91a6913 | ||
|
|
ce074604c4 | ||
|
|
19ac190252 | ||
|
|
02c5ddf91e | ||
|
|
1aaeaf8a3d | ||
|
|
5d6c4985d1 | ||
|
|
b615ad90c8 | ||
|
|
c7aaf3918d | ||
|
|
d51204f1b1 | ||
|
|
b3f6325988 | ||
|
|
3129acbd83 | ||
|
|
12f89d32b5 | ||
|
|
1d42741a19 | ||
|
|
88737991d2 | ||
|
|
75c00536ba | ||
|
|
63d740752f | ||
|
|
6e04afb8c5 | ||
|
|
165fca51e0 | ||
|
|
db6b4e3791 | ||
|
|
20a85e9f69 | ||
|
|
2a6144a1b6 | ||
|
|
f8bc3e1bd8 | ||
|
|
5b737a0731 | ||
|
|
6e0ef10915 | ||
|
|
7017605dce | ||
|
|
b29228836a | ||
|
|
188b05792f | ||
|
|
575901e537 | ||
|
|
2333d65880 | ||
|
|
ffd1df0579 |
10
.cvsignore
10
.cvsignore
@@ -1,8 +1,8 @@
|
|||||||
openssl.pc
|
openssl.pc
|
||||||
|
libcrypto.pc
|
||||||
|
libssl.pc
|
||||||
MINFO
|
MINFO
|
||||||
makefile.one
|
makefile.one
|
||||||
tmp
|
|
||||||
out
|
|
||||||
outinc
|
outinc
|
||||||
rehash.time
|
rehash.time
|
||||||
testlog
|
testlog
|
||||||
@@ -11,8 +11,10 @@ maketest.log
|
|||||||
cctest
|
cctest
|
||||||
cctest.c
|
cctest.c
|
||||||
cctest.a
|
cctest.a
|
||||||
libcrypto.so.*
|
|
||||||
libssl.so.*
|
|
||||||
*.flc
|
*.flc
|
||||||
semantic.cache
|
semantic.cache
|
||||||
Makefile
|
Makefile
|
||||||
|
*.dll*
|
||||||
|
*.so*
|
||||||
|
*.sl*
|
||||||
|
*.dylib*
|
||||||
|
|||||||
25
ACKNOWLEDGMENTS
Normal file
25
ACKNOWLEDGMENTS
Normal file
@@ -0,0 +1,25 @@
|
|||||||
|
The OpenSSL project depends on volunteer efforts and financial support from
|
||||||
|
the end user community. That support comes in the form of donations and paid
|
||||||
|
sponsorships, software support contracts, paid consulting services
|
||||||
|
and commissioned software development.
|
||||||
|
|
||||||
|
Since all these activities support the continued development and improvement
|
||||||
|
of OpenSSL we consider all these clients and customers as sponsors of the
|
||||||
|
OpenSSL project.
|
||||||
|
|
||||||
|
We would like to identify and thank the following such sponsors for their past
|
||||||
|
or current significant support of the OpenSSL project:
|
||||||
|
|
||||||
|
Very significant support:
|
||||||
|
|
||||||
|
OpenGear: www.opengear.com
|
||||||
|
|
||||||
|
Significant support:
|
||||||
|
|
||||||
|
PSW Group: www.psw.net
|
||||||
|
|
||||||
|
Please note that we ask permission to identify sponsors and that some sponsors
|
||||||
|
we consider eligible for inclusion here have requested to remain anonymous.
|
||||||
|
|
||||||
|
Additional sponsorship or financial support is always welcome: for more
|
||||||
|
information please contact the OpenSSL Software Foundation.
|
||||||
@@ -148,7 +148,7 @@ eric (about to go bushwalking for the 4 day easter break :-)
|
|||||||
This would tend to cause memory overwrites since SSLv3 has
|
This would tend to cause memory overwrites since SSLv3 has
|
||||||
a maximum packet size of 16k. If your program uses
|
a maximum packet size of 16k. If your program uses
|
||||||
buffers <= 16k, you would probably never see this problem.
|
buffers <= 16k, you would probably never see this problem.
|
||||||
- Fixed a new errors that were cause by malloc() not returning
|
- Fixed a few errors that were cause by malloc() not returning
|
||||||
0 initialised memory..
|
0 initialised memory..
|
||||||
- SSL_OP_NETSCAPE_CA_DN_BUG was being switched on when using
|
- SSL_OP_NETSCAPE_CA_DN_BUG was being switched on when using
|
||||||
SSL_CTX_set_options(ssl_ctx,SSL_OP_ALL); which was a bad thing
|
SSL_CTX_set_options(ssl_ctx,SSL_OP_ALL); which was a bad thing
|
||||||
|
|||||||
@@ -1,163 +0,0 @@
|
|||||||
This file, together with ChangeLog.0_9_7-stable_not-in-head_FIPS,
|
|
||||||
provides a collection of those CVS change log entries for the
|
|
||||||
0.9.7 branch (OpenSSL_0_9_7-stable) that do not appear similarly in
|
|
||||||
0.9.8-dev (CVS head).
|
|
||||||
|
|
||||||
ChangeLog.0_9_7-stable_not-in-head_FIPS - "FIPS" related changes
|
|
||||||
ChangeLog.0_9_7-stable_not-in-head - everything else
|
|
||||||
|
|
||||||
Some obvious false positives have been eliminated: e.g., we do not
|
|
||||||
care about a simple "make update"; and we don't care about changes
|
|
||||||
identified to the 0.9.7 branch that were explicitly identified as
|
|
||||||
backports from head.
|
|
||||||
|
|
||||||
Eliminating all other entries (and finally this file and its
|
|
||||||
compantion), either as false positives or as things that should go
|
|
||||||
into 0.9.8, remains to be done. Any additional changes to 0.9.7 that
|
|
||||||
are not immediately put into 0.9.8, but belong there as well, should
|
|
||||||
be added to the end of this file.
|
|
||||||
|
|
||||||
|
|
||||||
2002-11-04 17:33 levitte
|
|
||||||
|
|
||||||
Changed:
|
|
||||||
Configure (1.314.2.38), "Exp", lines: +4 -2
|
|
||||||
|
|
||||||
Return my normal debug targets to something not so extreme, and
|
|
||||||
make the extreme ones special (or 'extreme', if you will :-)).
|
|
||||||
|
|
||||||
2002-12-16 19:17 appro
|
|
||||||
|
|
||||||
Changed:
|
|
||||||
crypto/bn/bn_lcl.h (1.23.2.3), "Exp", lines: +3 -0
|
|
||||||
crypto/bn/bn_mul.c (1.28.2.4), "Exp", lines: +84 -445
|
|
||||||
|
|
||||||
This is rollback to 0.9.6h bn_mul.c to address problem reported in
|
|
||||||
RT#272.
|
|
||||||
|
|
||||||
2003-07-27 15:46 ben
|
|
||||||
|
|
||||||
Changed:
|
|
||||||
crypto/aes/aes.h (1.1.2.5), "Exp", lines: +3 -0
|
|
||||||
crypto/aes/aes_cfb.c (1.1.2.4), "Exp", lines: +57 -0
|
|
||||||
|
|
||||||
Add untested CFB-r mode. Will be tested soon.
|
|
||||||
|
|
||||||
2003-07-28 17:07 ben
|
|
||||||
|
|
||||||
Changed:
|
|
||||||
Makefile.org (1.154.2.69), "Exp", lines: +5 -1
|
|
||||||
crypto/aes/aes.h (1.1.2.6), "Exp", lines: +3 -0
|
|
||||||
crypto/aes/aes_cfb.c (1.1.2.5), "Exp", lines: +19 -0
|
|
||||||
crypto/dsa/Makefile.ssl (1.49.2.6), "Exp", lines: +3 -2
|
|
||||||
crypto/err/Makefile.ssl (1.48.2.4), "Exp", lines: +17 -16
|
|
||||||
crypto/evp/e_aes.c (1.6.2.5), "Exp", lines: +8 -0
|
|
||||||
crypto/evp/e_des.c (1.5.2.2), "Exp", lines: +1 -1
|
|
||||||
crypto/evp/e_des3.c (1.8.2.3), "Exp", lines: +2 -2
|
|
||||||
crypto/evp/evp.h (1.86.2.11), "Exp", lines: +28 -11
|
|
||||||
crypto/evp/evp_locl.h (1.7.2.3), "Exp", lines: +2 -2
|
|
||||||
crypto/objects/obj_dat.h (1.49.2.13), "Exp", lines: +10 -5
|
|
||||||
crypto/objects/obj_mac.h (1.19.2.13), "Exp", lines: +5 -0
|
|
||||||
crypto/objects/obj_mac.num (1.15.2.9), "Exp", lines: +1 -0
|
|
||||||
crypto/objects/objects.txt (1.20.2.14), "Exp", lines: +4 -0
|
|
||||||
fips/Makefile.ssl (1.1.2.3), "Exp", lines: +7 -0
|
|
||||||
fips/aes/Makefile.ssl (1.1.2.2), "Exp", lines: +23 -1
|
|
||||||
fips/aes/fips_aesavs.c (1.1.2.3), "Exp", lines: +9 -1
|
|
||||||
test/Makefile.ssl (1.84.2.30), "Exp", lines: +101 -43
|
|
||||||
|
|
||||||
Add support for partial CFB modes, make tests work, update
|
|
||||||
dependencies.
|
|
||||||
|
|
||||||
2003-07-29 12:56 ben
|
|
||||||
|
|
||||||
Changed:
|
|
||||||
crypto/aes/aes_cfb.c (1.1.2.6), "Exp", lines: +9 -6
|
|
||||||
crypto/evp/c_allc.c (1.8.2.3), "Exp", lines: +1 -0
|
|
||||||
crypto/evp/evp_test.c (1.14.2.11), "Exp", lines: +17 -8
|
|
||||||
crypto/evp/evptests.txt (1.9.2.2), "Exp", lines: +48 -1
|
|
||||||
|
|
||||||
Working CFB1 and test vectors.
|
|
||||||
|
|
||||||
2003-07-29 15:24 ben
|
|
||||||
|
|
||||||
Changed:
|
|
||||||
crypto/evp/e_aes.c (1.6.2.6), "Exp", lines: +14 -0
|
|
||||||
crypto/objects/obj_dat.h (1.49.2.14), "Exp", lines: +15 -5
|
|
||||||
crypto/objects/obj_mac.h (1.19.2.14), "Exp", lines: +10 -0
|
|
||||||
crypto/objects/obj_mac.num (1.15.2.10), "Exp", lines: +2 -0
|
|
||||||
crypto/objects/objects.txt (1.20.2.15), "Exp", lines: +2 -0
|
|
||||||
fips/aes/Makefile.ssl (1.1.2.3), "Exp", lines: +1 -1
|
|
||||||
fips/aes/fips_aesavs.c (1.1.2.4), "Exp", lines: +34 -19
|
|
||||||
|
|
||||||
The rest of the keysizes for CFB1, working AES AVS test for CFB1.
|
|
||||||
|
|
||||||
2003-07-29 19:05 ben
|
|
||||||
|
|
||||||
Changed:
|
|
||||||
crypto/aes/aes.h (1.1.2.7), "Exp", lines: +3 -0
|
|
||||||
crypto/aes/aes_cfb.c (1.1.2.7), "Exp", lines: +14 -0
|
|
||||||
crypto/evp/c_allc.c (1.8.2.4), "Exp", lines: +1 -0
|
|
||||||
crypto/evp/e_aes.c (1.6.2.7), "Exp", lines: +4 -9
|
|
||||||
crypto/evp/evptests.txt (1.9.2.3), "Exp", lines: +48 -0
|
|
||||||
crypto/objects/obj_dat.h (1.49.2.15), "Exp", lines: +20 -5
|
|
||||||
crypto/objects/obj_mac.h (1.19.2.15), "Exp", lines: +15 -0
|
|
||||||
crypto/objects/obj_mac.num (1.15.2.11), "Exp", lines: +3 -0
|
|
||||||
crypto/objects/objects.txt (1.20.2.16), "Exp", lines: +3 -0
|
|
||||||
fips/aes/fips_aesavs.c (1.1.2.7), "Exp", lines: +11 -0
|
|
||||||
|
|
||||||
AES CFB8.
|
|
||||||
|
|
||||||
2003-07-30 20:30 ben
|
|
||||||
|
|
||||||
Changed:
|
|
||||||
Makefile.org (1.154.2.70), "Exp", lines: +16 -5
|
|
||||||
crypto/des/cfb_enc.c (1.7.2.1), "Exp", lines: +2 -1
|
|
||||||
crypto/des/des_enc.c (1.11.2.2), "Exp", lines: +4 -0
|
|
||||||
crypto/evp/e_aes.c (1.6.2.8), "Exp", lines: +7 -14
|
|
||||||
crypto/evp/e_des.c (1.5.2.3), "Exp", lines: +37 -1
|
|
||||||
crypto/evp/evp.h (1.86.2.12), "Exp", lines: +6 -0
|
|
||||||
crypto/evp/evp_locl.h (1.7.2.4), "Exp", lines: +9 -0
|
|
||||||
crypto/objects/obj_dat.h (1.49.2.16), "Exp", lines: +48 -23
|
|
||||||
crypto/objects/obj_mac.h (1.19.2.16), "Exp", lines: +31 -6
|
|
||||||
crypto/objects/obj_mac.num (1.15.2.12), "Exp", lines: +5 -0
|
|
||||||
crypto/objects/objects.txt (1.20.2.17), "Exp", lines: +12 -6
|
|
||||||
fips/Makefile.ssl (1.1.2.4), "Exp", lines: +8 -1
|
|
||||||
fips/fips_make_sha1 (1.1.2.3), "Exp", lines: +3 -0
|
|
||||||
fips/aes/Makefile.ssl (1.1.2.4), "Exp", lines: +1 -1
|
|
||||||
fips/des/.cvsignore (1.1.2.1), "Exp", lines: +3 -0
|
|
||||||
fips/des/Makefile.ssl (1.1.2.1), "Exp", lines: +96 -0
|
|
||||||
fips/des/fingerprint.sha1 (1.1.2.1), "Exp", lines: +2 -0
|
|
||||||
fips/des/fips_des_enc.c (1.1.2.1), "Exp", lines: +288 -0
|
|
||||||
fips/des/fips_des_locl.h (1.1.2.1), "Exp", lines: +428 -0
|
|
||||||
fips/des/fips_desmovs.c (1.1.2.1), "Exp", lines: +659 -0
|
|
||||||
|
|
||||||
Whoops, forgot FIPS DES, also add EVPs for DES CFB1 and 8.
|
|
||||||
|
|
||||||
2003-08-01 12:25 ben
|
|
||||||
|
|
||||||
Changed:
|
|
||||||
crypto/des/cfb_enc.c (1.7.2.2), "Exp", lines: +45 -36
|
|
||||||
crypto/evp/c_allc.c (1.8.2.5), "Exp", lines: +2 -0
|
|
||||||
crypto/evp/e_des.c (1.5.2.4), "Exp", lines: +8 -3
|
|
||||||
crypto/evp/evptests.txt (1.9.2.4), "Exp", lines: +6 -0
|
|
||||||
|
|
||||||
Fix DES CFB-r.
|
|
||||||
|
|
||||||
2003-08-01 12:31 ben
|
|
||||||
|
|
||||||
Changed:
|
|
||||||
crypto/evp/evptests.txt (1.9.2.5), "Exp", lines: +4 -0
|
|
||||||
|
|
||||||
DES CFB8 test.
|
|
||||||
|
|
||||||
2005-04-19 16:21 appro
|
|
||||||
|
|
||||||
Changed:
|
|
||||||
Configure (1.314.2.117), "Exp", lines: +24 -21
|
|
||||||
Makefile.org (1.154.2.100), "Exp", lines: +1 -11
|
|
||||||
TABLE (1.99.2.52), "Exp", lines: +20 -20
|
|
||||||
apps/Makefile (1.1.4.15), "Exp", lines: +1 -1
|
|
||||||
test/Makefile (1.1.4.12), "Exp", lines: +1 -1
|
|
||||||
|
|
||||||
Enable shared link on HP-UX.
|
|
||||||
|
|
||||||
File diff suppressed because it is too large
Load Diff
127
FAQ
127
FAQ
@@ -32,6 +32,7 @@ OpenSSL - Frequently Asked Questions
|
|||||||
* How do I install a CA certificate into a browser?
|
* How do I install a CA certificate into a browser?
|
||||||
* Why is OpenSSL x509 DN output not conformant to RFC2253?
|
* Why is OpenSSL x509 DN output not conformant to RFC2253?
|
||||||
* What is a "128 bit certificate"? Can I create one with OpenSSL?
|
* What is a "128 bit certificate"? Can I create one with OpenSSL?
|
||||||
|
* Why does OpenSSL set the authority key identifier extension incorrectly?
|
||||||
* How can I set up a bundle of commercial root CA certificates?
|
* How can I set up a bundle of commercial root CA certificates?
|
||||||
|
|
||||||
[BUILD] Questions about building and testing OpenSSL
|
[BUILD] Questions about building and testing OpenSSL
|
||||||
@@ -51,6 +52,9 @@ OpenSSL - Frequently Asked Questions
|
|||||||
* Why does the OpenSSL test suite fail in sha512t on x86 CPU?
|
* Why does the OpenSSL test suite fail in sha512t on x86 CPU?
|
||||||
* Why does compiler fail to compile sha512.c?
|
* Why does compiler fail to compile sha512.c?
|
||||||
* Test suite still fails, what to do?
|
* Test suite still fails, what to do?
|
||||||
|
* I think I've found a bug, what should I do?
|
||||||
|
* I'm SURE I've found a bug, how do I report it?
|
||||||
|
* I've found a security issue, how do I report it?
|
||||||
|
|
||||||
[PROG] Questions about programming with OpenSSL
|
[PROG] Questions about programming with OpenSSL
|
||||||
|
|
||||||
@@ -68,6 +72,8 @@ OpenSSL - Frequently Asked Questions
|
|||||||
* Why does compilation fail due to an undefined symbol NID_uniqueIdentifier?
|
* Why does compilation fail due to an undefined symbol NID_uniqueIdentifier?
|
||||||
* I think I've detected a memory leak, is this a bug?
|
* I think I've detected a memory leak, is this a bug?
|
||||||
* Why does Valgrind complain about the use of uninitialized data?
|
* Why does Valgrind complain about the use of uninitialized data?
|
||||||
|
* Why doesn't a memory BIO work when a file does?
|
||||||
|
* Where are the declarations and implementations of d2i_X509() etc?
|
||||||
|
|
||||||
===============================================================================
|
===============================================================================
|
||||||
|
|
||||||
@@ -76,7 +82,7 @@ OpenSSL - Frequently Asked Questions
|
|||||||
* Which is the current version of OpenSSL?
|
* Which is the current version of OpenSSL?
|
||||||
|
|
||||||
The current version is available from <URL: http://www.openssl.org>.
|
The current version is available from <URL: http://www.openssl.org>.
|
||||||
OpenSSL 0.9.8h was released on May 28th, 2008.
|
OpenSSL 1.0.0e was released on Sep 6th, 2011.
|
||||||
|
|
||||||
In addition to the current stable release, you can also access daily
|
In addition to the current stable release, you can also access daily
|
||||||
snapshots of the OpenSSL development version at <URL:
|
snapshots of the OpenSSL development version at <URL:
|
||||||
@@ -92,14 +98,17 @@ explains how to install this library.
|
|||||||
|
|
||||||
OpenSSL includes a command line utility that can be used to perform a
|
OpenSSL includes a command line utility that can be used to perform a
|
||||||
variety of cryptographic functions. It is described in the openssl(1)
|
variety of cryptographic functions. It is described in the openssl(1)
|
||||||
manpage. Documentation for developers is currently being written. A
|
manpage. Documentation for developers is currently being written. Many
|
||||||
few manual pages already are available; overviews over libcrypto and
|
manual pages are available; overviews over libcrypto and
|
||||||
libssl are given in the crypto(3) and ssl(3) manpages.
|
libssl are given in the crypto(3) and ssl(3) manpages.
|
||||||
|
|
||||||
The OpenSSL manpages are installed in /usr/local/ssl/man/ (or a
|
The OpenSSL manpages are installed in /usr/local/ssl/man/ (or a
|
||||||
different directory if you specified one as described in INSTALL).
|
different directory if you specified one as described in INSTALL).
|
||||||
In addition, you can read the most current versions at
|
In addition, you can read the most current versions at
|
||||||
<URL: http://www.openssl.org/docs/>.
|
<URL: http://www.openssl.org/docs/>. Note that the online documents refer
|
||||||
|
to the very latest development versions of OpenSSL and may include features
|
||||||
|
not present in released versions. If in doubt refer to the documentation
|
||||||
|
that came with the version of OpenSSL you are using.
|
||||||
|
|
||||||
For information on parts of libcrypto that are not yet documented, you
|
For information on parts of libcrypto that are not yet documented, you
|
||||||
might want to read Ariel Glenn's documentation on SSLeay 0.9, OpenSSL's
|
might want to read Ariel Glenn's documentation on SSLeay 0.9, OpenSSL's
|
||||||
@@ -125,7 +134,7 @@ OpenSSL. Information on the OpenSSL mailing lists is available from
|
|||||||
* Where can I get a compiled version of OpenSSL?
|
* Where can I get a compiled version of OpenSSL?
|
||||||
|
|
||||||
You can finder pointers to binary distributions in
|
You can finder pointers to binary distributions in
|
||||||
http://www.openssl.org/related/binaries.html .
|
<URL: http://www.openssl.org/related/binaries.html> .
|
||||||
|
|
||||||
Some applications that use OpenSSL are distributed in binary form.
|
Some applications that use OpenSSL are distributed in binary form.
|
||||||
When using such an application, you don't need to install OpenSSL
|
When using such an application, you don't need to install OpenSSL
|
||||||
@@ -403,10 +412,10 @@ You can't generally create such a certificate using OpenSSL but there is no
|
|||||||
need to any more. Nowadays web browsers using unrestricted strong encryption
|
need to any more. Nowadays web browsers using unrestricted strong encryption
|
||||||
are generally available.
|
are generally available.
|
||||||
|
|
||||||
When there were tight export restrictions on the export of strong encryption
|
When there were tight restrictions on the export of strong encryption
|
||||||
software from the US only weak encryption algorithms could be freely exported
|
software from the US only weak encryption algorithms could be freely exported
|
||||||
(initially 40 bit and then 56 bit). It was widely recognised that this was
|
(initially 40 bit and then 56 bit). It was widely recognised that this was
|
||||||
inadequate. A relaxation the rules allowed the use of strong encryption but
|
inadequate. A relaxation of the rules allowed the use of strong encryption but
|
||||||
only to an authorised server.
|
only to an authorised server.
|
||||||
|
|
||||||
Two slighly different techniques were developed to support this, one used by
|
Two slighly different techniques were developed to support this, one used by
|
||||||
@@ -427,6 +436,25 @@ The export laws were later changed to allow almost unrestricted use of strong
|
|||||||
encryption so these certificates are now obsolete.
|
encryption so these certificates are now obsolete.
|
||||||
|
|
||||||
|
|
||||||
|
* Why does OpenSSL set the authority key identifier (AKID) extension incorrectly?
|
||||||
|
|
||||||
|
It doesn't: this extension is often the cause of confusion.
|
||||||
|
|
||||||
|
Consider a certificate chain A->B->C so that A signs B and B signs C. Suppose
|
||||||
|
certificate C contains AKID.
|
||||||
|
|
||||||
|
The purpose of this extension is to identify the authority certificate B. This
|
||||||
|
can be done either by including the subject key identifier of B or its issuer
|
||||||
|
name and serial number.
|
||||||
|
|
||||||
|
In this latter case because it is identifying certifcate B it must contain the
|
||||||
|
issuer name and serial number of B.
|
||||||
|
|
||||||
|
It is often wrongly assumed that it should contain the subject name of B. If it
|
||||||
|
did this would be redundant information because it would duplicate the issuer
|
||||||
|
name of C.
|
||||||
|
|
||||||
|
|
||||||
* How can I set up a bundle of commercial root CA certificates?
|
* How can I set up a bundle of commercial root CA certificates?
|
||||||
|
|
||||||
The OpenSSL software is shipped without any root CA certificate as the
|
The OpenSSL software is shipped without any root CA certificate as the
|
||||||
@@ -438,7 +466,7 @@ administrators.
|
|||||||
Other projects do have other policies so you can for example extract the CA
|
Other projects do have other policies so you can for example extract the CA
|
||||||
bundle used by Mozilla and/or modssl as described in this article:
|
bundle used by Mozilla and/or modssl as described in this article:
|
||||||
|
|
||||||
http://www.mail-archive.com/modssl-users@modssl.org/msg16980.html
|
<URL: http://www.mail-archive.com/modssl-users@modssl.org/msg16980.html>
|
||||||
|
|
||||||
|
|
||||||
[BUILD] =======================================================================
|
[BUILD] =======================================================================
|
||||||
@@ -480,7 +508,7 @@ when you run the test suite (using "make test"). The message returned is
|
|||||||
"bc: 1 not implemented".
|
"bc: 1 not implemented".
|
||||||
|
|
||||||
The best way to deal with this is to find another implementation of bc
|
The best way to deal with this is to find another implementation of bc
|
||||||
and compile/install it. GNU bc (see http://www.gnu.org/software/software.html
|
and compile/install it. GNU bc (see <URL: http://www.gnu.org/software/software.html>
|
||||||
for download instructions) can be safely used, for example.
|
for download instructions) can be safely used, for example.
|
||||||
|
|
||||||
|
|
||||||
@@ -491,7 +519,7 @@ that the OpenSSL bntest throws at it. This gets triggered when you run the
|
|||||||
test suite (using "make test"). The message returned is "bc: stack empty".
|
test suite (using "make test"). The message returned is "bc: stack empty".
|
||||||
|
|
||||||
The best way to deal with this is to find another implementation of bc
|
The best way to deal with this is to find another implementation of bc
|
||||||
and compile/install it. GNU bc (see http://www.gnu.org/software/software.html
|
and compile/install it. GNU bc (see <URL: http://www.gnu.org/software/software.html>
|
||||||
for download instructions) can be safely used, for example.
|
for download instructions) can be safely used, for example.
|
||||||
|
|
||||||
|
|
||||||
@@ -684,6 +712,46 @@ never make sense, and tend to emerge when you least expect them. In order
|
|||||||
to identify one, drop optimization level, e.g. by editing CFLAG line in
|
to identify one, drop optimization level, e.g. by editing CFLAG line in
|
||||||
top-level Makefile, recompile and re-run the test.
|
top-level Makefile, recompile and re-run the test.
|
||||||
|
|
||||||
|
* I think I've found a bug, what should I do?
|
||||||
|
|
||||||
|
If you are a new user then it is quite likely you haven't found a bug and
|
||||||
|
something is happening you aren't familiar with. Check this FAQ, the associated
|
||||||
|
documentation and the mailing lists for similar queries. If you are still
|
||||||
|
unsure whether it is a bug or not submit a query to the openssl-users mailing
|
||||||
|
list.
|
||||||
|
|
||||||
|
|
||||||
|
* I'm SURE I've found a bug, how do I report it?
|
||||||
|
|
||||||
|
Bug reports with no security implications should be sent to the request
|
||||||
|
tracker. This can be done by mailing the report to <rt@openssl.org> (or its
|
||||||
|
alias <openssl-bugs@openssl.org>), please note that messages sent to the
|
||||||
|
request tracker also appear in the public openssl-dev mailing list.
|
||||||
|
|
||||||
|
The report should be in plain text. Any patches should be sent as
|
||||||
|
plain text attachments because some mailers corrupt patches sent inline.
|
||||||
|
If your issue affects multiple versions of OpenSSL check any patches apply
|
||||||
|
cleanly and, if possible include patches to each affected version.
|
||||||
|
|
||||||
|
The report should be given a meaningful subject line briefly summarising the
|
||||||
|
issue. Just "bug in OpenSSL" or "bug in OpenSSL 0.9.8n" is not very helpful.
|
||||||
|
|
||||||
|
By sending reports to the request tracker the bug can then be given a priority
|
||||||
|
and assigned to the appropriate maintainer. The history of discussions can be
|
||||||
|
accessed and if the issue has been addressed or a reason why not. If patches
|
||||||
|
are only sent to openssl-dev they can be mislaid if a team member has to
|
||||||
|
wade through months of old messages to review the discussion.
|
||||||
|
|
||||||
|
See also <URL: http://www.openssl.org/support/rt.html>
|
||||||
|
|
||||||
|
|
||||||
|
* I've found a security issue, how do I report it?
|
||||||
|
|
||||||
|
If you think your bug has security implications then please send it to
|
||||||
|
openssl-security@openssl.org if you don't get a prompt reply at least
|
||||||
|
acknowledging receipt then resend or mail it directly to one of the
|
||||||
|
more active team members (e.g. Steve).
|
||||||
|
|
||||||
[PROG] ========================================================================
|
[PROG] ========================================================================
|
||||||
|
|
||||||
* Is OpenSSL thread-safe?
|
* Is OpenSSL thread-safe?
|
||||||
@@ -696,8 +764,10 @@ file.
|
|||||||
|
|
||||||
Multi-threaded applications must provide two callback functions to
|
Multi-threaded applications must provide two callback functions to
|
||||||
OpenSSL by calling CRYPTO_set_locking_callback() and
|
OpenSSL by calling CRYPTO_set_locking_callback() and
|
||||||
CRYPTO_set_id_callback(). This is described in the threads(3)
|
CRYPTO_set_id_callback(), for all versions of OpenSSL up to and
|
||||||
manpage.
|
including 0.9.8[abc...]. As of version 1.0.0, CRYPTO_set_id_callback()
|
||||||
|
and associated APIs are deprecated by CRYPTO_THREADID_set_callback()
|
||||||
|
and friends. This is described in the threads(3) manpage.
|
||||||
|
|
||||||
* I've compiled a program under Windows and it crashes: why?
|
* I've compiled a program under Windows and it crashes: why?
|
||||||
|
|
||||||
@@ -920,5 +990,36 @@ OpenSSL library has been compiled with the PURIFY macro defined (-DPURIFY)
|
|||||||
to get rid of these warnings.
|
to get rid of these warnings.
|
||||||
|
|
||||||
|
|
||||||
===============================================================================
|
* Why doesn't a memory BIO work when a file does?
|
||||||
|
|
||||||
|
This can occur in several cases for example reading an S/MIME email message.
|
||||||
|
The reason is that a memory BIO can do one of two things when all the data
|
||||||
|
has been read from it.
|
||||||
|
|
||||||
|
The default behaviour is to indicate that no more data is available and that
|
||||||
|
the call should be retried, this is to allow the application to fill up the BIO
|
||||||
|
again if necessary.
|
||||||
|
|
||||||
|
Alternatively it can indicate that no more data is available and that EOF has
|
||||||
|
been reached.
|
||||||
|
|
||||||
|
If a memory BIO is to behave in the same way as a file this second behaviour
|
||||||
|
is needed. This must be done by calling:
|
||||||
|
|
||||||
|
BIO_set_mem_eof_return(bio, 0);
|
||||||
|
|
||||||
|
See the manual pages for more details.
|
||||||
|
|
||||||
|
|
||||||
|
* Where are the declarations and implementations of d2i_X509() etc?
|
||||||
|
|
||||||
|
These are defined and implemented by macros of the form:
|
||||||
|
|
||||||
|
|
||||||
|
DECLARE_ASN1_FUNCTIONS(X509) and IMPLEMENT_ASN1_FUNCTIONS(X509)
|
||||||
|
|
||||||
|
The implementation passes an ASN1 "template" defining the structure into an
|
||||||
|
ASN1 interpreter using generalised functions such as ASN1_item_d2i().
|
||||||
|
|
||||||
|
|
||||||
|
===============================================================================
|
||||||
|
|||||||
6
INSTALL
6
INSTALL
@@ -98,7 +98,7 @@
|
|||||||
The crypto/<cipher> directory can be removed after running
|
The crypto/<cipher> directory can be removed after running
|
||||||
"make depend".
|
"make depend".
|
||||||
|
|
||||||
-Dxxx, -lxxx, -Lxxx, -fxxx, -mxxx, -Kxxx These system specific options will
|
-Dxxx, -lxxx, -Lxxx, -fxxx, -mXXX, -Kxxx These system specific options will
|
||||||
be passed through to the compiler to allow you to
|
be passed through to the compiler to allow you to
|
||||||
define preprocessor symbols, specify additional libraries,
|
define preprocessor symbols, specify additional libraries,
|
||||||
library directories or other compiler options.
|
library directories or other compiler options.
|
||||||
@@ -206,6 +206,10 @@
|
|||||||
compile programs with libcrypto or libssl.
|
compile programs with libcrypto or libssl.
|
||||||
lib Contains the OpenSSL library files themselves.
|
lib Contains the OpenSSL library files themselves.
|
||||||
|
|
||||||
|
Use "make install_sw" to install the software without documentation,
|
||||||
|
and "install_docs_html" to install HTML renditions of the manual
|
||||||
|
pages.
|
||||||
|
|
||||||
Package builders who want to configure the library for standard
|
Package builders who want to configure the library for standard
|
||||||
locations, but have the package installed somewhere else so that
|
locations, but have the package installed somewhere else so that
|
||||||
it can easily be packaged, can use
|
it can easily be packaged, can use
|
||||||
|
|||||||
52
INSTALL.VMS
52
INSTALL.VMS
@@ -71,7 +71,7 @@ the top to understand how to use them. However, if you want to
|
|||||||
compile all you can get, the simplest is to use MAKEVMS.COM in the top
|
compile all you can get, the simplest is to use MAKEVMS.COM in the top
|
||||||
directory. The syntax is the following:
|
directory. The syntax is the following:
|
||||||
|
|
||||||
@MAKEVMS <option> <rsaref-p> <debug-p> [<compiler>]
|
@MAKEVMS <option> <bits> <debug-p> [<compiler>]
|
||||||
|
|
||||||
<option> must be one of the following:
|
<option> must be one of the following:
|
||||||
|
|
||||||
@@ -87,24 +87,11 @@ directory. The syntax is the following:
|
|||||||
TEST Just build the "[.xxx.EXE.TEST]" test programs for OpenSSL.
|
TEST Just build the "[.xxx.EXE.TEST]" test programs for OpenSSL.
|
||||||
APPS Just build the "[.xxx.EXE.APPS]" application programs for OpenSSL.
|
APPS Just build the "[.xxx.EXE.APPS]" application programs for OpenSSL.
|
||||||
|
|
||||||
<rsaref-p> must be one of the following:
|
<bits> must be one of the following:
|
||||||
|
|
||||||
RSAREF compile using the RSAREF Library
|
"" compile using default pointer size
|
||||||
NORSAREF compile without using RSAREF
|
32 compile using 32 bit pointer size
|
||||||
|
64 compile using 64 bit pointer size
|
||||||
Note 0: The RSAREF library IS NO LONGER NEEDED. The RSA patent
|
|
||||||
expires September 20, 2000, and RSA Security chose to make
|
|
||||||
the algorithm public domain two weeks before that.
|
|
||||||
|
|
||||||
Note 1: If you still want to use RSAREF, the library is NOT INCLUDED
|
|
||||||
and you have to download it. RSA Security doesn't carry it
|
|
||||||
any more, but there are a number of places where you can find
|
|
||||||
it. You have to get the ".tar-Z" file as the ".zip" file
|
|
||||||
doesn't have the directory structure stored. You have to
|
|
||||||
extract the file into the [.RSAREF] directory as that is where
|
|
||||||
the scripts will look for the files.
|
|
||||||
|
|
||||||
Note 2: I have never done this, so I've no idea if it works or not.
|
|
||||||
|
|
||||||
<debug-p> must be one of the following:
|
<debug-p> must be one of the following:
|
||||||
|
|
||||||
@@ -117,12 +104,13 @@ Note 2: I have never done this, so I've no idea if it works or not.
|
|||||||
GNUC For GNU C.
|
GNUC For GNU C.
|
||||||
|
|
||||||
|
|
||||||
You will find the crypto library in [.xxx.EXE.CRYPTO], called LIBCRYPTO.OLB,
|
You will find the crypto library in [.xxx.EXE.CRYPTO] (where xxx is VAX,
|
||||||
where xxx is VAX or AXP. You will find the SSL library in [.xxx.EXE.SSL],
|
ALPHA or IA64), called SSL_LIBCRYPTO32.OLB or SSL_LIBCRYPTO.OLB depending
|
||||||
named LIBSSL.OLB, and you will find a bunch of useful programs in
|
on how it was built. You will find the SSL library in [.xxx.EXE.SSL],
|
||||||
[.xxx.EXE.APPS]. However, these shouldn't be used right off unless it's
|
named SSL_LIBSSL32.OLB or SSL_LIBSSL.OLB, and you will find a bunch of
|
||||||
just to test them. For production use, make sure you install first, see
|
useful programs in [.xxx.EXE.APPS]. However, these shouldn't be used
|
||||||
Installation below.
|
right off unless it's just to test them. For production use, make sure
|
||||||
|
you install first, see Installation below.
|
||||||
|
|
||||||
Note 1: Some programs in this package require a TCP/IP library.
|
Note 1: Some programs in this package require a TCP/IP library.
|
||||||
|
|
||||||
@@ -170,12 +158,14 @@ Installation:
|
|||||||
|
|
||||||
Installation is easy, just do the following:
|
Installation is easy, just do the following:
|
||||||
|
|
||||||
@INSTALL <root>
|
@INSTALL <root> <bits>
|
||||||
|
|
||||||
<root> is the directory in which everything will be installed,
|
<root> is the directory in which everything will be installed,
|
||||||
subdirectories, libraries, header files, programs and startup command
|
subdirectories, libraries, header files, programs and startup command
|
||||||
procedures.
|
procedures.
|
||||||
|
|
||||||
|
<bits> works the same way as for MAKEVMS.COM
|
||||||
|
|
||||||
N.B.: INSTALL.COM builds a new directory structure, different from
|
N.B.: INSTALL.COM builds a new directory structure, different from
|
||||||
the directory tree where you have now build OpenSSL.
|
the directory tree where you have now build OpenSSL.
|
||||||
|
|
||||||
@@ -196,6 +186,10 @@ following command procedures:
|
|||||||
sets up the symbols to the applications. Should be called
|
sets up the symbols to the applications. Should be called
|
||||||
from for example SYS$MANAGER:SYLOGIN.COM
|
from for example SYS$MANAGER:SYLOGIN.COM
|
||||||
|
|
||||||
|
OPENSSL_UNDO.COM
|
||||||
|
|
||||||
|
deassigns the logical names created with OPENSSL_STARTUP.COM.
|
||||||
|
|
||||||
The logical names that are set up are the following:
|
The logical names that are set up are the following:
|
||||||
|
|
||||||
SSLROOT a dotted concealed logical name pointing at the
|
SSLROOT a dotted concealed logical name pointing at the
|
||||||
@@ -203,7 +197,6 @@ The logical names that are set up are the following:
|
|||||||
|
|
||||||
SSLCERTS Initially an empty directory, this is the default
|
SSLCERTS Initially an empty directory, this is the default
|
||||||
location for certificate files.
|
location for certificate files.
|
||||||
SSLMISC Various scripts.
|
|
||||||
SSLPRIVATE Initially an empty directory, this is the default
|
SSLPRIVATE Initially an empty directory, this is the default
|
||||||
location for private key files.
|
location for private key files.
|
||||||
|
|
||||||
@@ -211,8 +204,9 @@ The logical names that are set up are the following:
|
|||||||
programs.
|
programs.
|
||||||
SSLINCLUDE Contains the header files needed if you want to
|
SSLINCLUDE Contains the header files needed if you want to
|
||||||
compile programs with libcrypto or libssl.
|
compile programs with libcrypto or libssl.
|
||||||
SSLLIB Contains the OpenSSL library files (LIBCRYPTO.OLB
|
SSLLIB Contains the OpenSSL library files themselves:
|
||||||
and LIBSSL.OLB) themselves.
|
- SSL_LIBCRYPTO32.OLB and SSL_LIBSSL32.OLB or
|
||||||
|
- SSL_LIBCRYPTO.OLB and SSL_LIBSSL.OLB
|
||||||
|
|
||||||
OPENSSL Same as SSLINCLUDE. This is because the standard
|
OPENSSL Same as SSLINCLUDE. This is because the standard
|
||||||
way to include OpenSSL header files from version
|
way to include OpenSSL header files from version
|
||||||
@@ -296,4 +290,4 @@ have any ideas.
|
|||||||
|
|
||||||
--
|
--
|
||||||
Richard Levitte <richard@levitte.org>
|
Richard Levitte <richard@levitte.org>
|
||||||
2000-02-27
|
2000-02-27, 2011-03-18
|
||||||
|
|||||||
178
INSTALL.W32
178
INSTALL.W32
@@ -5,19 +5,30 @@
|
|||||||
[Instructions for building for Windows CE can be found in INSTALL.WCE]
|
[Instructions for building for Windows CE can be found in INSTALL.WCE]
|
||||||
[Instructions for building for Win64 can be found in INSTALL.W64]
|
[Instructions for building for Win64 can be found in INSTALL.W64]
|
||||||
|
|
||||||
Heres a few comments about building OpenSSL in Windows environments. Most
|
Here are a few comments about building OpenSSL for Win32 environments,
|
||||||
of this is tested on Win32 but it may also work in Win 3.1 with some
|
such as Windows NT and Windows 9x. It should be noted though that
|
||||||
modification.
|
Windows 9x are not ordinarily tested. Its mention merely means that we
|
||||||
|
attempt to maintain certain programming discipline and pay attention
|
||||||
|
to backward compatibility issues, in other words it's kind of expected
|
||||||
|
to work on Windows 9x, but no regression tests are actually performed.
|
||||||
|
|
||||||
You need Perl for Win32. Unless you will build on Cygwin, you will need
|
On additional note newer OpenSSL versions are compiled and linked with
|
||||||
|
Winsock 2. This means that minimum OS requirement was elevated to NT 4
|
||||||
|
and Windows 98 [there is Winsock 2 update for Windows 95 though].
|
||||||
|
|
||||||
|
- you need Perl for Win32. Unless you will build on Cygwin, you will need
|
||||||
ActiveState Perl, available from http://www.activestate.com/ActivePerl.
|
ActiveState Perl, available from http://www.activestate.com/ActivePerl.
|
||||||
|
|
||||||
and one of the following C compilers:
|
- one of the following C compilers:
|
||||||
|
|
||||||
* Visual C++
|
* Visual C++
|
||||||
* Borland C
|
* Borland C
|
||||||
* GNU C (Cygwin or MinGW)
|
* GNU C (Cygwin or MinGW)
|
||||||
|
|
||||||
|
- Netwide Assembler, a.k.a. NASM, available from http://nasm.sourceforge.net/
|
||||||
|
is required if you intend to utilize assembler modules. Note that NASM
|
||||||
|
is now the only supported assembler.
|
||||||
|
|
||||||
If you are compiling from a tarball or a CVS snapshot then the Win32 files
|
If you are compiling from a tarball or a CVS snapshot then the Win32 files
|
||||||
may well be not up to date. This may mean that some "tweaking" is required to
|
may well be not up to date. This may mean that some "tweaking" is required to
|
||||||
get it all to work. See the trouble shooting section later on for if (when?)
|
get it all to work. See the trouble shooting section later on for if (when?)
|
||||||
@@ -26,39 +37,18 @@
|
|||||||
Visual C++
|
Visual C++
|
||||||
----------
|
----------
|
||||||
|
|
||||||
If you want to compile in the assembly language routines with Visual C++ then
|
If you want to compile in the assembly language routines with Visual
|
||||||
you will need an assembler. This is worth doing because it will result in
|
C++, then you will need already mentioned Netwide Assembler binary,
|
||||||
faster code: for example it will typically result in a 2 times speedup in the
|
nasmw.exe or nasm.exe, to be available on your %PATH%.
|
||||||
RSA routines. Currently the following assemblers are supported:
|
|
||||||
|
|
||||||
* Microsoft MASM (aka "ml")
|
Firstly you should run Configure with platform VC-WIN32:
|
||||||
* Free Netwide Assembler NASM.
|
|
||||||
|
|
||||||
MASM is distributed with most versions of VC++. For the versions where it is
|
> perl Configure VC-WIN32 --prefix=c:\some\openssl\dir
|
||||||
not included in VC++, it is also distributed with some Microsoft DDKs, for
|
|
||||||
example the Windows NT 4.0 DDK and the Windows 98 DDK. If you do not have
|
|
||||||
either of these DDKs then you can just download the binaries for the Windows
|
|
||||||
98 DDK and extract and rename the two files XXXXXml.exe and XXXXXml.err, to
|
|
||||||
ml.exe and ml.err and install somewhere on your PATH. Both DDKs can be
|
|
||||||
downloaded from the Microsoft developers site www.msdn.com.
|
|
||||||
|
|
||||||
NASM is freely available. Version 0.98 was used during testing: other versions
|
Where the prefix argument specifies where OpenSSL will be installed to.
|
||||||
may also work. It is available from many places, see for example:
|
|
||||||
http://www.kernel.org/pub/software/devel/nasm/binaries/win32/
|
|
||||||
The NASM binary nasmw.exe needs to be installed anywhere on your PATH.
|
|
||||||
|
|
||||||
Firstly you should run Configure:
|
Next you need to build the Makefiles and optionally the assembly
|
||||||
|
language files:
|
||||||
> perl Configure VC-WIN32 --prefix=c:/some/openssl/dir
|
|
||||||
|
|
||||||
Where the prefix argument specifies where OpenSSL will be installed to.
|
|
||||||
|
|
||||||
Next you need to build the Makefiles and optionally the assembly language
|
|
||||||
files:
|
|
||||||
|
|
||||||
- If you are using MASM then run:
|
|
||||||
|
|
||||||
> ms\do_masm
|
|
||||||
|
|
||||||
- If you are using NASM then run:
|
- If you are using NASM then run:
|
||||||
|
|
||||||
@@ -66,6 +56,7 @@ Where the prefix argument specifies where OpenSSL will be installed to.
|
|||||||
|
|
||||||
- If you don't want to use the assembly language files at all then run:
|
- If you don't want to use the assembly language files at all then run:
|
||||||
|
|
||||||
|
> perl Configure VC-WIN32 no-asm --prefix=c:/some/openssl/dir
|
||||||
> ms\do_ms
|
> ms\do_ms
|
||||||
|
|
||||||
If you get errors about things not having numbers assigned then check the
|
If you get errors about things not having numbers assigned then check the
|
||||||
@@ -76,42 +67,39 @@ Where the prefix argument specifies where OpenSSL will be installed to.
|
|||||||
|
|
||||||
> nmake -f ms\ntdll.mak
|
> nmake -f ms\ntdll.mak
|
||||||
|
|
||||||
If all is well it should compile and you will have some DLLs and executables
|
If all is well it should compile and you will have some DLLs and
|
||||||
in out32dll. If you want to try the tests then do:
|
executables in out32dll. If you want to try the tests then do:
|
||||||
|
|
||||||
> nmake -f ms\ntdll.mak test
|
> nmake -f ms\ntdll.mak test
|
||||||
|
|
||||||
|
|
||||||
To install OpenSSL to the specified location do:
|
To install OpenSSL to the specified location do:
|
||||||
|
|
||||||
> nmake -f ms\ntdll.mak install
|
> nmake -f ms\ntdll.mak install
|
||||||
|
|
||||||
Tweaks:
|
Tweaks:
|
||||||
|
|
||||||
There are various changes you can make to the Win32 compile environment. By
|
There are various changes you can make to the Win32 compile
|
||||||
default the library is not compiled with debugging symbols. If you add 'debug'
|
environment. By default the library is not compiled with debugging
|
||||||
to the mk1mf.pl lines in the do_* batch file then debugging symbols will be
|
symbols. If you use the platform debug-VC-WIN32 instead of VC-WIN32
|
||||||
compiled in. Note that mk1mf.pl expects the platform to be the last argument
|
then debugging symbols will be compiled in.
|
||||||
on the command line, so 'debug' must appear before that, as all other options.
|
|
||||||
|
|
||||||
|
By default in 1.0.0 OpenSSL will compile builtin ENGINES into the
|
||||||
By default in 0.9.8 OpenSSL will compile builtin ENGINES into the libeay32.dll
|
separate shared librariesy. If you specify the "enable-static-engine"
|
||||||
shared library. If you specify the "no-static-engine" option on the command
|
option on the command line to Configure the shared library build
|
||||||
line to Configure the shared library build (ms\ntdll.mak) will compile the
|
(ms\ntdll.mak) will compile the engines into libeay32.dll instead.
|
||||||
engines as separate DLLs.
|
|
||||||
|
|
||||||
The default Win32 environment is to leave out any Windows NT specific
|
The default Win32 environment is to leave out any Windows NT specific
|
||||||
features.
|
features.
|
||||||
|
|
||||||
If you want to enable the NT specific features of OpenSSL (currently only the
|
If you want to enable the NT specific features of OpenSSL (currently
|
||||||
logging BIO) follow the instructions above but call the batch file do_nt.bat
|
only the logging BIO) follow the instructions above but call the batch
|
||||||
instead of do_ms.bat.
|
file do_nt.bat instead of do_ms.bat.
|
||||||
|
|
||||||
You can also build a static version of the library using the Makefile
|
You can also build a static version of the library using the Makefile
|
||||||
ms\nt.mak
|
ms\nt.mak
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Borland C++ builder 5
|
Borland C++ builder 5
|
||||||
---------------------
|
---------------------
|
||||||
|
|
||||||
@@ -137,17 +125,13 @@ To install OpenSSL to the specified location do:
|
|||||||
GNU C (Cygwin)
|
GNU C (Cygwin)
|
||||||
--------------
|
--------------
|
||||||
|
|
||||||
Cygwin provides a bash shell and GNU tools environment running
|
Cygwin implements a Posix/Unix runtime system (cygwin1.dll) on top of
|
||||||
on NT 4.0, Windows 9x, Windows ME, Windows 2000, and Windows XP.
|
Win32 subsystem and provides a bash shell and GNU tools environment.
|
||||||
Consequently, a make of OpenSSL with Cygwin is closer to a GNU
|
Consequently, a make of OpenSSL with Cygwin is virtually identical to
|
||||||
bash environment such as Linux than to other the other Win32
|
Unix procedure. It is also possible to create Win32 binaries that only
|
||||||
makes.
|
use the Microsoft C runtime system (msvcrt.dll or crtdll.dll) using
|
||||||
|
MinGW. MinGW can be used in the Cygwin development environment or in a
|
||||||
Cygwin implements a Posix/Unix runtime system (cygwin1.dll).
|
standalone setup as described in the following section.
|
||||||
It is also possible to create Win32 binaries that only use the
|
|
||||||
Microsoft C runtime system (msvcrt.dll or crtdll.dll) using
|
|
||||||
MinGW. MinGW can be used in the Cygwin development environment
|
|
||||||
or in a standalone setup as described in the following section.
|
|
||||||
|
|
||||||
To build OpenSSL using Cygwin:
|
To build OpenSSL using Cygwin:
|
||||||
|
|
||||||
@@ -192,35 +176,44 @@ To install OpenSSL to the specified location do:
|
|||||||
non-fatal error in "make test" but is otherwise harmless. If
|
non-fatal error in "make test" but is otherwise harmless. If
|
||||||
desired and needed, GNU bc can be built with Cygwin without change.
|
desired and needed, GNU bc can be built with Cygwin without change.
|
||||||
|
|
||||||
GNU C (MinGW)
|
GNU C (MinGW/MSYS)
|
||||||
-------------
|
-------------
|
||||||
|
|
||||||
* Compiler installation:
|
* Compiler and shell environment installation:
|
||||||
|
|
||||||
MinGW is available from http://www.mingw.org. Run the installer and
|
MinGW and MSYS are available from http://www.mingw.org/, both are
|
||||||
set the MinGW bin directory to the PATH in "System Properties" or
|
required. Run the installers and do whatever magic they say it takes
|
||||||
autoexec.bat.
|
to start MSYS bash shell with GNU tools on its PATH.
|
||||||
|
|
||||||
|
N.B. Since source tar-ball can contain symbolic links, it's essential
|
||||||
|
that you use accompanying MSYS tar to unpack the source. It will
|
||||||
|
either handle them in one way or another or fail to extract them,
|
||||||
|
which does the trick too. Latter means that you may safely ignore all
|
||||||
|
"cannot create symlink" messages, as they will be "re-created" at
|
||||||
|
configure stage by copying corresponding files. Alternative programs
|
||||||
|
were observed to create empty files instead, which results in build
|
||||||
|
failure.
|
||||||
|
|
||||||
* Compile OpenSSL:
|
* Compile OpenSSL:
|
||||||
|
|
||||||
> ms\mingw32
|
$ ./config
|
||||||
|
[...]
|
||||||
|
$ make
|
||||||
|
[...]
|
||||||
|
$ make test
|
||||||
|
|
||||||
This will create the library and binaries in out. In case any problems
|
This will create the library and binaries in root source directory
|
||||||
occur, try
|
and openssl.exe application in apps directory.
|
||||||
> ms\mingw32 no-asm
|
|
||||||
instead.
|
It is also possible to cross-compile it on Linux by configuring
|
||||||
|
with './Configure --cross-compile-prefix=i386-mingw32- mingw ...'.
|
||||||
|
'make test' is naturally not applicable then.
|
||||||
|
|
||||||
libcrypto.a and libssl.a are the static libraries. To use the DLLs,
|
libcrypto.a and libssl.a are the static libraries. To use the DLLs,
|
||||||
link with libeay32.a and libssl32.a instead.
|
link with libeay32.a and libssl32.a instead.
|
||||||
|
|
||||||
See troubleshooting if you get error messages about functions not having
|
See troubleshooting if you get error messages about functions not
|
||||||
a number assigned.
|
having a number assigned.
|
||||||
|
|
||||||
* You can now try the tests:
|
|
||||||
|
|
||||||
> cd out
|
|
||||||
> ..\ms\test
|
|
||||||
|
|
||||||
|
|
||||||
Installation
|
Installation
|
||||||
------------
|
------------
|
||||||
@@ -307,13 +300,24 @@ To install OpenSSL to the specified location do:
|
|||||||
|
|
||||||
If you link with static OpenSSL libraries [those built with ms/nt.mak],
|
If you link with static OpenSSL libraries [those built with ms/nt.mak],
|
||||||
then you're expected to additionally link your application with
|
then you're expected to additionally link your application with
|
||||||
WSOCK32.LIB, ADVAPI32.LIB, GDI32.LIB and USER32.LIB. Those developing
|
WS2_32.LIB, ADVAPI32.LIB, GDI32.LIB and USER32.LIB. Those developing
|
||||||
non-interactive service applications might feel concerned about linking
|
non-interactive service applications might feel concerned about linking
|
||||||
with latter two, as they are justly associated with interactive desktop,
|
with the latter two, as they are justly associated with interactive
|
||||||
which is not available to service processes. The toolkit is designed
|
desktop, which is not available to service processes. The toolkit is
|
||||||
to detect in which context it's currently executed, GUI, console app
|
designed to detect in which context it's currently executed, GUI,
|
||||||
or service, and act accordingly, namely whether or not to actually make
|
console app or service, and act accordingly, namely whether or not to
|
||||||
GUI calls.
|
actually make GUI calls. Additionally those who wish to
|
||||||
|
/DELAYLOAD:GDI32.DLL and /DELAYLOAD:USER32.DLL and actually keep them
|
||||||
|
off service process should consider implementing and exporting from
|
||||||
|
.exe image in question own _OPENSSL_isservice not relying on USER32.DLL.
|
||||||
|
E.g., on Windows Vista and later you could:
|
||||||
|
|
||||||
|
__declspec(dllexport) __cdecl BOOL _OPENSSL_isservice(void)
|
||||||
|
{ DWORD sess;
|
||||||
|
if (ProcessIdToSessionId(GetCurrentProcessId(),&sess))
|
||||||
|
return sess==0;
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
|
|
||||||
If you link with OpenSSL .DLLs, then you're expected to include into
|
If you link with OpenSSL .DLLs, then you're expected to include into
|
||||||
your application code small "shim" snippet, which provides glue between
|
your application code small "shim" snippet, which provides glue between
|
||||||
|
|||||||
75
INSTALL.WCE
75
INSTALL.WCE
@@ -4,27 +4,36 @@
|
|||||||
|
|
||||||
Building OpenSSL for Windows CE requires the following external tools:
|
Building OpenSSL for Windows CE requires the following external tools:
|
||||||
|
|
||||||
* Microsoft eMbedded Visual C++ 3.0
|
* Microsoft eMbedded Visual C++ 3.0 or later
|
||||||
* wcecompat compatibility library (www.essemer.com.au)
|
* Appropriate SDK might be required
|
||||||
* Optionally ceutils for running automated tests (www.essemer.com.au)
|
* Perl for Win32 [commonly recommended ActiveState Perl is available
|
||||||
|
from http://www.activestate.com/Products/ActivePerl/]
|
||||||
|
|
||||||
You also need Perl for Win32. You will need ActiveState Perl, available
|
* wcecompat compatibility library available at
|
||||||
from http://www.activestate.com/ActivePerl.
|
http://www.essemer.com.au/windowsce/
|
||||||
|
* Optionally ceutils for running automated tests (same location)
|
||||||
|
|
||||||
Windows CE support in OpenSSL relies on wcecompat and therefore it's
|
_or_
|
||||||
appropriate to check http://www.essemer.com.au/windowsce/ for updates in
|
|
||||||
case of compilation problems. As for the moment of this writing version
|
|
||||||
1.1 is available and actually required for WCE 4.2 and newer platforms.
|
|
||||||
All Windows CE specific issues should be directed to www.essemer.com.au.
|
|
||||||
|
|
||||||
The C Runtime Library implementation for Windows CE that is included with
|
* PocketConsole driver and PortSDK available at
|
||||||
Microsoft eMbedded Visual C++ 3.0 is incomplete and in some places
|
http://www.symbolictools.de/public/pocketconsole/
|
||||||
incorrect. wcecompat plugs the holes and tries to bring the Windows CE
|
* CMD command interpreter (same location)
|
||||||
CRT to a level that is more compatible with ANSI C. wcecompat goes further
|
|
||||||
and provides low-level IO and stream IO support for stdin/stdout/stderr
|
As Windows CE support in OpenSSL relies on 3rd party compatibility
|
||||||
(which Windows CE does not provide). This IO functionality is not needed
|
library, it's appropriate to check corresponding URL for updates. For
|
||||||
by the OpenSSL library itself but is used for the tests and openssl.exe.
|
example if you choose wcecompat, note that as for the moment of this
|
||||||
More information is available at www.essemer.com.au.
|
writing version 1.2 is available and actually required for WCE 4.2
|
||||||
|
and newer platforms. All wcecompat issues should be directed to
|
||||||
|
www.essemer.com.au.
|
||||||
|
|
||||||
|
Why compatibility library at all? The C Runtime Library implementation
|
||||||
|
for Windows CE that is included with Microsoft eMbedded Visual C++ is
|
||||||
|
incomplete and in some places incorrect. Compatibility library plugs
|
||||||
|
the holes and tries to bring the Windows CE CRT to [more] usable level.
|
||||||
|
Most gaping hole in CRT is support for stdin/stdout/stderr IO, which
|
||||||
|
proposed compatibility libraries solve in two different ways: wcecompat
|
||||||
|
redirects IO to active sync link, while PortSDK - to NT-like console
|
||||||
|
driver on the handheld itself.
|
||||||
|
|
||||||
Building
|
Building
|
||||||
--------
|
--------
|
||||||
@@ -34,9 +43,21 @@
|
|||||||
|
|
||||||
> "C:\Program Files\Microsoft eMbedded Tools\EVC\WCE300\BIN\WCEARM.BAT"
|
> "C:\Program Files\Microsoft eMbedded Tools\EVC\WCE300\BIN\WCEARM.BAT"
|
||||||
|
|
||||||
Next indicate where wcecompat is located:
|
Next pick compatibility library according to your preferences.
|
||||||
|
|
||||||
|
1. To choose wcecompat set up WCECOMPAT environment variable pointing
|
||||||
|
at the location of wcecompat tree "root":
|
||||||
|
|
||||||
> set WCECOMPAT=C:\wcecompat
|
> set WCECOMPAT=C:\wcecompat
|
||||||
|
> set PORTSDK_LIBPATH=
|
||||||
|
|
||||||
|
2. To choose PortSDK set up PORTSDK_LIBPATH to point at hardware-
|
||||||
|
specific location where your portlib.lib is installed:
|
||||||
|
|
||||||
|
> set PORTSDK_LIBPATH=C:\PortSDK\lib\ARM
|
||||||
|
> set WCECOMPAT=
|
||||||
|
|
||||||
|
Note that you may not set both variables.
|
||||||
|
|
||||||
Next you should run Configure:
|
Next you should run Configure:
|
||||||
|
|
||||||
@@ -52,16 +73,16 @@
|
|||||||
|
|
||||||
Then from the VC++ environment at a prompt do:
|
Then from the VC++ environment at a prompt do:
|
||||||
|
|
||||||
- to build static libraries:
|
|
||||||
|
|
||||||
> nmake -f ms\ce.mak
|
|
||||||
|
|
||||||
- or to build DLLs:
|
|
||||||
|
|
||||||
> nmake -f ms\cedll.mak
|
> nmake -f ms\cedll.mak
|
||||||
|
|
||||||
If all is well it should compile and you will have some static libraries and
|
[note that static builds are not supported under CE]
|
||||||
executables in out32, or some DLLs and executables in out32dll. If you want
|
|
||||||
|
If all is well it should compile and you will have some DLLs and executables
|
||||||
|
in out32dll*.
|
||||||
|
|
||||||
|
<<< everyting below needs revision in respect to wcecompat vs. PortSDK >>>
|
||||||
|
|
||||||
|
If you want
|
||||||
to try the tests then make sure the ceutils are in the path and do:
|
to try the tests then make sure the ceutils are in the path and do:
|
||||||
|
|
||||||
> cd out32
|
> cd out32
|
||||||
|
|||||||
2
LICENSE
2
LICENSE
@@ -12,7 +12,7 @@
|
|||||||
---------------
|
---------------
|
||||||
|
|
||||||
/* ====================================================================
|
/* ====================================================================
|
||||||
* Copyright (c) 1998-2008 The OpenSSL Project. All rights reserved.
|
* Copyright (c) 1998-2011 The OpenSSL Project. All rights reserved.
|
||||||
*
|
*
|
||||||
* Redistribution and use in source and binary forms, with or without
|
* Redistribution and use in source and binary forms, with or without
|
||||||
* modification, are permitted provided that the following conditions
|
* modification, are permitted provided that the following conditions
|
||||||
|
|||||||
@@ -1,62 +0,0 @@
|
|||||||
/**************** BEGIN GUSI CONFIGURATION ****************************
|
|
||||||
*
|
|
||||||
* GUSI Configuration section generated by GUSI Configurator
|
|
||||||
* last modified: Wed Jan 5 20:33:51 2000
|
|
||||||
*
|
|
||||||
* This section will be overwritten by the next run of Configurator.
|
|
||||||
*/
|
|
||||||
|
|
||||||
#define GUSI_SOURCE
|
|
||||||
#include <GUSIConfig.h>
|
|
||||||
#include <sys/cdefs.h>
|
|
||||||
|
|
||||||
/* Declarations of Socket Factories */
|
|
||||||
|
|
||||||
__BEGIN_DECLS
|
|
||||||
void GUSIwithInetSockets();
|
|
||||||
void GUSIwithLocalSockets();
|
|
||||||
void GUSIwithMTInetSockets();
|
|
||||||
void GUSIwithMTTcpSockets();
|
|
||||||
void GUSIwithMTUdpSockets();
|
|
||||||
void GUSIwithOTInetSockets();
|
|
||||||
void GUSIwithOTTcpSockets();
|
|
||||||
void GUSIwithOTUdpSockets();
|
|
||||||
void GUSIwithPPCSockets();
|
|
||||||
void GUSISetupFactories();
|
|
||||||
__END_DECLS
|
|
||||||
|
|
||||||
/* Configure Socket Factories */
|
|
||||||
|
|
||||||
void GUSISetupFactories()
|
|
||||||
{
|
|
||||||
#ifdef GUSISetupFactories_BeginHook
|
|
||||||
GUSISetupFactories_BeginHook
|
|
||||||
#endif
|
|
||||||
GUSIwithInetSockets();
|
|
||||||
#ifdef GUSISetupFactories_EndHook
|
|
||||||
GUSISetupFactories_EndHook
|
|
||||||
#endif
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Declarations of File Devices */
|
|
||||||
|
|
||||||
__BEGIN_DECLS
|
|
||||||
void GUSIwithDConSockets();
|
|
||||||
void GUSIwithNullSockets();
|
|
||||||
void GUSISetupDevices();
|
|
||||||
__END_DECLS
|
|
||||||
|
|
||||||
/* Configure File Devices */
|
|
||||||
|
|
||||||
void GUSISetupDevices()
|
|
||||||
{
|
|
||||||
#ifdef GUSISetupDevices_BeginHook
|
|
||||||
GUSISetupDevices_BeginHook
|
|
||||||
#endif
|
|
||||||
GUSIwithNullSockets();
|
|
||||||
#ifdef GUSISetupDevices_EndHook
|
|
||||||
GUSISetupDevices_EndHook
|
|
||||||
#endif
|
|
||||||
}
|
|
||||||
|
|
||||||
/**************** END GUSI CONFIGURATION *************************/
|
|
||||||
File diff suppressed because it is too large
Load Diff
@@ -1,104 +0,0 @@
|
|||||||
#pragma once
|
|
||||||
|
|
||||||
#ifdef __cplusplus
|
|
||||||
extern "C" {
|
|
||||||
#endif
|
|
||||||
|
|
||||||
void CopyPStrToCStr(const unsigned char *thePStr,char *theCStr,const int maxCStrLength);
|
|
||||||
void CopyPStrToPStr(const unsigned char *theSrcPStr,unsigned char *theDstPStr,const int maxDstStrLength);
|
|
||||||
void CopyCStrToCStr(const char *theSrcCStr,char *theDstCStr,const int maxDstStrLength);
|
|
||||||
void CopyCStrToPStr(const char *theSrcCStr,unsigned char *theDstPStr,const int maxDstStrLength);
|
|
||||||
void ConcatPStrToCStr(const unsigned char *thePStr,char *theCStr,const int maxCStrLength);
|
|
||||||
void ConcatPStrToPStr(const unsigned char *theSrcPStr,unsigned char *theDstPStr,const int maxDstStrLength);
|
|
||||||
void ConcatCStrToPStr(const char *theSrcCStr,unsigned char *theDstPStr,const int maxDstStrLength);
|
|
||||||
void ConcatCStrToCStr(const char *theSrcCStr,char *theDstCStr,const int maxCStrLength);
|
|
||||||
|
|
||||||
void ConcatCharToCStr(const char theChar,char *theDstCStr,const int maxCStrLength);
|
|
||||||
void ConcatCharToPStr(const char theChar,unsigned char *theDstPStr,const int maxPStrLength);
|
|
||||||
|
|
||||||
int ComparePStrs(const unsigned char *theFirstPStr,const unsigned char *theSecondPStr,const Boolean ignoreCase = true);
|
|
||||||
int CompareCStrs(const char *theFirstCStr,const char *theSecondCStr,const Boolean ignoreCase = true);
|
|
||||||
int CompareCStrToPStr(const char *theCStr,const unsigned char *thePStr,const Boolean ignoreCase = true);
|
|
||||||
|
|
||||||
Boolean CStrsAreEqual(const char *theFirstCStr,const char *theSecondCStr,const Boolean ignoreCase = true);
|
|
||||||
Boolean PStrsAreEqual(const unsigned char *theFirstCStr,const unsigned char *theSecondCStr,const Boolean ignoreCase = true);
|
|
||||||
|
|
||||||
void CopyLongIntToCStr(const long theNum,char *theCStr,const int maxCStrLength,const int numDigits = -1);
|
|
||||||
void CopyUnsignedLongIntToCStr(const unsigned long theNum,char *theCStr,const int maxCStrLength);
|
|
||||||
void ConcatLongIntToCStr(const long theNum,char *theCStr,const int maxCStrLength,const int numDigits = -1);
|
|
||||||
void CopyCStrAndConcatLongIntToCStr(const char *theSrcCStr,const long theNum,char *theDstCStr,const int maxDstStrLength);
|
|
||||||
|
|
||||||
void CopyLongIntToPStr(const long theNum,unsigned char *thePStr,const int maxPStrLength,const int numDigits = -1);
|
|
||||||
void ConcatLongIntToPStr(const long theNum,unsigned char *thePStr,const int maxPStrLength,const int numDigits = -1);
|
|
||||||
|
|
||||||
long CStrLength(const char *theCString);
|
|
||||||
long PStrLength(const unsigned char *thePString);
|
|
||||||
|
|
||||||
OSErr CopyCStrToExistingHandle(const char *theCString,Handle theHandle);
|
|
||||||
OSErr CopyLongIntToExistingHandle(const long inTheLongInt,Handle theHandle);
|
|
||||||
|
|
||||||
OSErr CopyCStrToNewHandle(const char *theCString,Handle *theHandle);
|
|
||||||
OSErr CopyPStrToNewHandle(const unsigned char *thePString,Handle *theHandle);
|
|
||||||
OSErr CopyLongIntToNewHandle(const long inTheLongInt,Handle *theHandle);
|
|
||||||
|
|
||||||
OSErr AppendCStrToHandle(const char *theCString,Handle theHandle,long *currentLength = nil,long *maxLength = nil);
|
|
||||||
OSErr AppendCharsToHandle(const char *theChars,const int numChars,Handle theHandle,long *currentLength = nil,long *maxLength = nil);
|
|
||||||
OSErr AppendPStrToHandle(const unsigned char *thePString,Handle theHandle,long *currentLength = nil);
|
|
||||||
OSErr AppendLongIntToHandle(const long inTheLongInt,Handle theHandle,long *currentLength = nil);
|
|
||||||
|
|
||||||
void ZeroMem(void *theMemPtr,const unsigned long numBytes);
|
|
||||||
|
|
||||||
char *FindCharInCStr(const char theChar,const char *theCString);
|
|
||||||
long FindCharOffsetInCStr(const char theChar,const char *theCString,const Boolean inIgnoreCase = false);
|
|
||||||
long FindCStrOffsetInCStr(const char *theCSubstring,const char *theCString,const Boolean inIgnoreCase = false);
|
|
||||||
|
|
||||||
void CopyCSubstrToCStr(const char *theSrcCStr,const int maxCharsToCopy,char *theDstCStr,const int maxDstStrLength);
|
|
||||||
void CopyCSubstrToPStr(const char *theSrcCStr,const int maxCharsToCopy,unsigned char *theDstPStr,const int maxDstStrLength);
|
|
||||||
|
|
||||||
void InsertCStrIntoCStr(const char *theSrcCStr,const int theInsertionOffset,char *theDstCStr,const int maxDstStrLength);
|
|
||||||
void InsertPStrIntoCStr(const unsigned char *theSrcPStr,const int theInsertionOffset,char *theDstCStr,const int maxDstStrLength);
|
|
||||||
OSErr InsertCStrIntoHandle(const char *theCString,Handle theHandle,const long inInsertOffset);
|
|
||||||
|
|
||||||
void CopyCStrAndInsertCStrIntoCStr(const char *theSrcCStr,const char *theInsertCStr,char *theDstCStr,const int maxDstStrLength);
|
|
||||||
|
|
||||||
void CopyCStrAndInsertCStrsLongIntsIntoCStr(const char *theSrcCStr,const char **theInsertCStrs,const long *theLongInts,char *theDstCStr,const int maxDstStrLength);
|
|
||||||
|
|
||||||
void CopyCStrAndInsert1LongIntIntoCStr(const char *theSrcCStr,const long theNum,char *theDstCStr,const int maxDstStrLength);
|
|
||||||
void CopyCStrAndInsert2LongIntsIntoCStr(const char *theSrcCStr,const long long1,const long long2,char *theDstCStr,const int maxDstStrLength);
|
|
||||||
void CopyCStrAndInsert3LongIntsIntoCStr(const char *theSrcCStr,const long long1,const long long2,const long long3,char *theDstCStr,const int maxDstStrLength);
|
|
||||||
|
|
||||||
void CopyCStrAndInsertCStrLongIntIntoCStr(const char *theSrcCStr,const char *theInsertCStr,const long theNum,char *theDstCStr,const int maxDstStrLength);
|
|
||||||
OSErr CopyCStrAndInsertCStrLongIntIntoHandle(const char *theSrcCStr,const char *theInsertCStr,const long theNum,Handle *theHandle);
|
|
||||||
|
|
||||||
|
|
||||||
OSErr CopyIndexedWordToCStr(char *theSrcCStr,int whichWord,char *theDstCStr,int maxDstCStrLength);
|
|
||||||
OSErr CopyIndexedWordToNewHandle(char *theSrcCStr,int whichWord,Handle *outTheHandle);
|
|
||||||
|
|
||||||
OSErr CopyIndexedLineToCStr(const char *theSrcCStr,int inWhichLine,int *lineEndIndex,Boolean *gotLastLine,char *theDstCStr,const int maxDstCStrLength);
|
|
||||||
OSErr CopyIndexedLineToNewHandle(const char *theSrcCStr,int inWhichLine,Handle *outNewHandle);
|
|
||||||
|
|
||||||
OSErr ExtractIntFromCStr(const char *theSrcCStr,int *outInt,Boolean skipLeadingSpaces = true);
|
|
||||||
OSErr ExtractIntFromPStr(const unsigned char *theSrcPStr,int *outInt,Boolean skipLeadingSpaces = true);
|
|
||||||
|
|
||||||
|
|
||||||
void ConvertCStrToUpperCase(char *theSrcCStr);
|
|
||||||
|
|
||||||
|
|
||||||
int CountOccurencesOfCharInCStr(const char inChar,const char *inSrcCStr);
|
|
||||||
int CountWordsInCStr(const char *inSrcCStr);
|
|
||||||
|
|
||||||
OSErr CountDigits(const char *inCStr,int *outNumIntegerDigits,int *outNumFractDigits);
|
|
||||||
|
|
||||||
void ExtractCStrItemFromCStr(const char *inSrcCStr,const char inItemDelimiter,const int inItemNumber,Boolean *foundItem,char *outDstCharPtr,const int inDstCharPtrMaxLength,const Boolean inTreatMultipleDelimsAsSingleDelim = false);
|
|
||||||
OSErr ExtractCStrItemFromCStrIntoNewHandle(const char *inSrcCStr,const char inItemDelimiter,const int inItemNumber,Boolean *foundItem,Handle *outNewHandle,const Boolean inTreatMultipleDelimsAsSingleDelim = false);
|
|
||||||
|
|
||||||
|
|
||||||
OSErr ExtractFloatFromCStr(const char *inCString,extended80 *outFloat);
|
|
||||||
OSErr CopyFloatToCStr(const extended80 *theFloat,char *theCStr,const int maxCStrLength,const int inMaxNumIntDigits = -1,const int inMaxNumFractDigits = -1);
|
|
||||||
|
|
||||||
void SkipWhiteSpace(char **ioSrcCharPtr,const Boolean inStopAtEOL = false);
|
|
||||||
|
|
||||||
|
|
||||||
#ifdef __cplusplus
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
@@ -1,147 +0,0 @@
|
|||||||
#ifdef __cplusplus
|
|
||||||
extern "C" {
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#ifndef kGenericError
|
|
||||||
#define kGenericError -1
|
|
||||||
#endif
|
|
||||||
|
|
||||||
extern char *gErrorMessage;
|
|
||||||
|
|
||||||
|
|
||||||
void SetErrorMessage(const char *theErrorMessage);
|
|
||||||
void SetErrorMessageAndAppendLongInt(const char *theErrorMessage,const long theLongInt);
|
|
||||||
void SetErrorMessageAndCStrAndLongInt(const char *theErrorMessage,const char * theCStr,const long theLongInt);
|
|
||||||
void SetErrorMessageAndCStr(const char *theErrorMessage,const char * theCStr);
|
|
||||||
void AppendCStrToErrorMessage(const char *theErrorMessage);
|
|
||||||
void AppendLongIntToErrorMessage(const long theLongInt);
|
|
||||||
|
|
||||||
|
|
||||||
char *GetErrorMessage(void);
|
|
||||||
OSErr GetErrorMessageInNewHandle(Handle *inoutHandle);
|
|
||||||
OSErr GetErrorMessageInExistingHandle(Handle inoutHandle);
|
|
||||||
OSErr AppendErrorMessageToHandle(Handle inoutHandle);
|
|
||||||
|
|
||||||
|
|
||||||
#ifdef __EXCEPTIONS_ENABLED__
|
|
||||||
void ThrowErrorMessageException(void);
|
|
||||||
#endif
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
// A bunch of evil macros that would be uneccessary if I were always using C++ !
|
|
||||||
|
|
||||||
#define SetErrorMessageAndBailIfNil(theArg,theMessage) \
|
|
||||||
{ \
|
|
||||||
if (theArg == nil) \
|
|
||||||
{ \
|
|
||||||
SetErrorMessage(theMessage); \
|
|
||||||
errCode = kGenericError; \
|
|
||||||
goto EXITPOINT; \
|
|
||||||
} \
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
#define SetErrorMessageAndBail(theMessage) \
|
|
||||||
{ \
|
|
||||||
SetErrorMessage(theMessage); \
|
|
||||||
errCode = kGenericError; \
|
|
||||||
goto EXITPOINT; \
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
#define SetErrorMessageAndLongIntAndBail(theMessage,theLongInt) \
|
|
||||||
{ \
|
|
||||||
SetErrorMessageAndAppendLongInt(theMessage,theLongInt); \
|
|
||||||
errCode = kGenericError; \
|
|
||||||
goto EXITPOINT; \
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
#define SetErrorMessageAndLongIntAndBailIfError(theErrCode,theMessage,theLongInt) \
|
|
||||||
{ \
|
|
||||||
if (theErrCode != noErr) \
|
|
||||||
{ \
|
|
||||||
SetErrorMessageAndAppendLongInt(theMessage,theLongInt); \
|
|
||||||
errCode = theErrCode; \
|
|
||||||
goto EXITPOINT; \
|
|
||||||
} \
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
#define SetErrorMessageCStrLongIntAndBailIfError(theErrCode,theMessage,theCStr,theLongInt) \
|
|
||||||
{ \
|
|
||||||
if (theErrCode != noErr) \
|
|
||||||
{ \
|
|
||||||
SetErrorMessageAndCStrAndLongInt(theMessage,theCStr,theLongInt); \
|
|
||||||
errCode = theErrCode; \
|
|
||||||
goto EXITPOINT; \
|
|
||||||
} \
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
#define SetErrorMessageAndCStrAndBail(theMessage,theCStr) \
|
|
||||||
{ \
|
|
||||||
SetErrorMessageAndCStr(theMessage,theCStr); \
|
|
||||||
errCode = kGenericError; \
|
|
||||||
goto EXITPOINT; \
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
#define SetErrorMessageAndBailIfError(theErrCode,theMessage) \
|
|
||||||
{ \
|
|
||||||
if (theErrCode != noErr) \
|
|
||||||
{ \
|
|
||||||
SetErrorMessage(theMessage); \
|
|
||||||
errCode = theErrCode; \
|
|
||||||
goto EXITPOINT; \
|
|
||||||
} \
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
#define SetErrorMessageAndLongIntAndBailIfNil(theArg,theMessage,theLongInt) \
|
|
||||||
{ \
|
|
||||||
if (theArg == nil) \
|
|
||||||
{ \
|
|
||||||
SetErrorMessageAndAppendLongInt(theMessage,theLongInt); \
|
|
||||||
errCode = kGenericError; \
|
|
||||||
goto EXITPOINT; \
|
|
||||||
} \
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
#define BailIfError(theErrCode) \
|
|
||||||
{ \
|
|
||||||
if ((theErrCode) != noErr) \
|
|
||||||
{ \
|
|
||||||
goto EXITPOINT; \
|
|
||||||
} \
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
#define SetErrCodeAndBail(theErrCode) \
|
|
||||||
{ \
|
|
||||||
errCode = theErrCode; \
|
|
||||||
\
|
|
||||||
goto EXITPOINT; \
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
#define SetErrorCodeAndMessageAndBail(theErrCode,theMessage) \
|
|
||||||
{ \
|
|
||||||
SetErrorMessage(theMessage); \
|
|
||||||
errCode = theErrCode; \
|
|
||||||
goto EXITPOINT; \
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
#define BailNow() \
|
|
||||||
{ \
|
|
||||||
errCode = kGenericError; \
|
|
||||||
goto EXITPOINT; \
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
#ifdef __cplusplus
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
@@ -1,209 +0,0 @@
|
|||||||
/*
|
|
||||||
* An demo illustrating how to retrieve a URI from a secure HTTP server.
|
|
||||||
*
|
|
||||||
* Author: Roy Wood
|
|
||||||
* Date: September 7, 1999
|
|
||||||
* Comments: This relies heavily on my MacSockets library.
|
|
||||||
* This project is also set up so that it expects the OpenSSL source folder (0.9.4 as I write this)
|
|
||||||
* to live in a folder called "OpenSSL-0.9.4" in this project's parent folder. For example:
|
|
||||||
*
|
|
||||||
* Macintosh HD:
|
|
||||||
* Development:
|
|
||||||
* OpenSSL-0.9.4:
|
|
||||||
* (OpenSSL sources here)
|
|
||||||
* OpenSSL Example:
|
|
||||||
* (OpenSSL example junk here)
|
|
||||||
*
|
|
||||||
*
|
|
||||||
* Also-- before attempting to compile this, make sure the aliases in "OpenSSL-0.9.4:include:openssl"
|
|
||||||
* are installed! Use the AppleScript applet in the "openssl-0.9.4" folder to do this!
|
|
||||||
*/
|
|
||||||
/* modified to seed the PRNG */
|
|
||||||
/* modified to use CRandomizer for seeding */
|
|
||||||
|
|
||||||
|
|
||||||
// Include some funky libs I've developed over time
|
|
||||||
|
|
||||||
#include "CPStringUtils.hpp"
|
|
||||||
#include "ErrorHandling.hpp"
|
|
||||||
#include "MacSocket.h"
|
|
||||||
#include "Randomizer.h"
|
|
||||||
|
|
||||||
// We use the OpenSSL implementation of SSL....
|
|
||||||
// This was a lot of work to finally get going, though you wouldn't know it by the results!
|
|
||||||
|
|
||||||
#include <openssl/ssl.h>
|
|
||||||
#include <openssl/err.h>
|
|
||||||
|
|
||||||
#include <timer.h>
|
|
||||||
|
|
||||||
// Let's try grabbing some data from here:
|
|
||||||
|
|
||||||
#define kHTTPS_DNS "www.apache-ssl.org"
|
|
||||||
#define kHTTPS_Port 443
|
|
||||||
#define kHTTPS_URI "/"
|
|
||||||
|
|
||||||
|
|
||||||
// Forward-declare this
|
|
||||||
|
|
||||||
OSErr MyMacSocket_IdleWaitCallback(void *inUserRefPtr);
|
|
||||||
|
|
||||||
// My idle-wait callback. Doesn't do much, does it? Silly cooperative multitasking.
|
|
||||||
|
|
||||||
OSErr MyMacSocket_IdleWaitCallback(void *inUserRefPtr)
|
|
||||||
{
|
|
||||||
#pragma unused(inUserRefPtr)
|
|
||||||
|
|
||||||
EventRecord theEvent;
|
|
||||||
::EventAvail(everyEvent,&theEvent);
|
|
||||||
|
|
||||||
CRandomizer *randomizer = (CRandomizer*)inUserRefPtr;
|
|
||||||
if (randomizer)
|
|
||||||
randomizer->PeriodicAction();
|
|
||||||
|
|
||||||
return(noErr);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
// Finally!
|
|
||||||
|
|
||||||
void main(void)
|
|
||||||
{
|
|
||||||
OSErr errCode;
|
|
||||||
int theSocket = -1;
|
|
||||||
int theTimeout = 30;
|
|
||||||
|
|
||||||
SSL_CTX *ssl_ctx = nil;
|
|
||||||
SSL *ssl = nil;
|
|
||||||
|
|
||||||
char tempString[256];
|
|
||||||
UnsignedWide microTickCount;
|
|
||||||
|
|
||||||
|
|
||||||
CRandomizer randomizer;
|
|
||||||
|
|
||||||
printf("OpenSSL Demo by Roy Wood, roy@centricsystems.ca\n\n");
|
|
||||||
|
|
||||||
BailIfError(errCode = MacSocket_Startup());
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
// Create a socket-like object
|
|
||||||
|
|
||||||
BailIfError(errCode = MacSocket_socket(&theSocket,false,theTimeout * 60,MyMacSocket_IdleWaitCallback,&randomizer));
|
|
||||||
|
|
||||||
|
|
||||||
// Set up the connect string and try to connect
|
|
||||||
|
|
||||||
CopyCStrAndInsertCStrLongIntIntoCStr("%s:%ld",kHTTPS_DNS,kHTTPS_Port,tempString,sizeof(tempString));
|
|
||||||
|
|
||||||
printf("Connecting to %s....\n",tempString);
|
|
||||||
|
|
||||||
BailIfError(errCode = MacSocket_connect(theSocket,tempString));
|
|
||||||
|
|
||||||
|
|
||||||
// Init SSL stuff
|
|
||||||
|
|
||||||
SSL_load_error_strings();
|
|
||||||
|
|
||||||
SSLeay_add_ssl_algorithms();
|
|
||||||
|
|
||||||
|
|
||||||
// Pick the SSL method
|
|
||||||
|
|
||||||
// ssl_ctx = SSL_CTX_new(SSLv2_client_method());
|
|
||||||
ssl_ctx = SSL_CTX_new(SSLv23_client_method());
|
|
||||||
// ssl_ctx = SSL_CTX_new(SSLv3_client_method());
|
|
||||||
|
|
||||||
|
|
||||||
// Create an SSL thingey and try to negotiate the connection
|
|
||||||
|
|
||||||
ssl = SSL_new(ssl_ctx);
|
|
||||||
|
|
||||||
SSL_set_fd(ssl,theSocket);
|
|
||||||
|
|
||||||
errCode = SSL_connect(ssl);
|
|
||||||
|
|
||||||
if (errCode < 0)
|
|
||||||
{
|
|
||||||
SetErrorMessageAndLongIntAndBail("OpenSSL: Can't initiate SSL connection, SSL_connect() = ",errCode);
|
|
||||||
}
|
|
||||||
|
|
||||||
// Request the URI from the host
|
|
||||||
|
|
||||||
CopyCStrToCStr("GET ",tempString,sizeof(tempString));
|
|
||||||
ConcatCStrToCStr(kHTTPS_URI,tempString,sizeof(tempString));
|
|
||||||
ConcatCStrToCStr(" HTTP/1.0\r\n\r\n",tempString,sizeof(tempString));
|
|
||||||
|
|
||||||
|
|
||||||
errCode = SSL_write(ssl,tempString,CStrLength(tempString));
|
|
||||||
|
|
||||||
if (errCode < 0)
|
|
||||||
{
|
|
||||||
SetErrorMessageAndLongIntAndBail("OpenSSL: Error writing data via ssl, SSL_write() = ",errCode);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
for (;;)
|
|
||||||
{
|
|
||||||
char tempString[256];
|
|
||||||
int bytesRead;
|
|
||||||
|
|
||||||
|
|
||||||
// Read some bytes and dump them to the console
|
|
||||||
|
|
||||||
bytesRead = SSL_read(ssl,tempString,sizeof(tempString) - 1);
|
|
||||||
|
|
||||||
if (bytesRead == 0 && MacSocket_RemoteEndIsClosing(theSocket))
|
|
||||||
{
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
|
|
||||||
else if (bytesRead < 0)
|
|
||||||
{
|
|
||||||
SetErrorMessageAndLongIntAndBail("OpenSSL: Error reading data via ssl, SSL_read() = ",bytesRead);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
tempString[bytesRead] = '\0';
|
|
||||||
|
|
||||||
printf("%s", tempString);
|
|
||||||
}
|
|
||||||
|
|
||||||
printf("\n\n\n");
|
|
||||||
|
|
||||||
// All done!
|
|
||||||
|
|
||||||
errCode = noErr;
|
|
||||||
|
|
||||||
|
|
||||||
EXITPOINT:
|
|
||||||
|
|
||||||
// Clean up and go home
|
|
||||||
|
|
||||||
if (theSocket >= 0)
|
|
||||||
{
|
|
||||||
MacSocket_close(theSocket);
|
|
||||||
}
|
|
||||||
|
|
||||||
if (ssl != nil)
|
|
||||||
{
|
|
||||||
SSL_free(ssl);
|
|
||||||
}
|
|
||||||
|
|
||||||
if (ssl_ctx != nil)
|
|
||||||
{
|
|
||||||
SSL_CTX_free(ssl_ctx);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
if (errCode != noErr)
|
|
||||||
{
|
|
||||||
printf("An error occurred:\n");
|
|
||||||
|
|
||||||
printf("%s",GetErrorMessage());
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
MacSocket_Shutdown();
|
|
||||||
}
|
|
||||||
File diff suppressed because it is too large
Load Diff
@@ -1,103 +0,0 @@
|
|||||||
#pragma once
|
|
||||||
|
|
||||||
|
|
||||||
#ifdef __cplusplus
|
|
||||||
extern "C" {
|
|
||||||
#endif
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
enum
|
|
||||||
{
|
|
||||||
kMacSocket_TimeoutErr = -2
|
|
||||||
};
|
|
||||||
|
|
||||||
|
|
||||||
// Since MacSocket does busy waiting, I do a callback while waiting
|
|
||||||
|
|
||||||
typedef OSErr (*MacSocket_IdleWaitCallback)(void *);
|
|
||||||
|
|
||||||
|
|
||||||
// Call this before anything else!
|
|
||||||
|
|
||||||
OSErr MacSocket_Startup(void);
|
|
||||||
|
|
||||||
|
|
||||||
// Call this to cleanup before quitting
|
|
||||||
|
|
||||||
OSErr MacSocket_Shutdown(void);
|
|
||||||
|
|
||||||
|
|
||||||
// Call this to allocate a "socket" (reference number is returned in outSocketNum)
|
|
||||||
// Note that inDoThreadSwitching is pretty much irrelevant right now, since I ignore it
|
|
||||||
// The inTimeoutTicks parameter is applied during reads/writes of data
|
|
||||||
// The inIdleWaitCallback parameter specifies a callback which is called during busy-waiting periods
|
|
||||||
// The inUserRefPtr parameter is passed back to the idle-wait callback
|
|
||||||
|
|
||||||
OSErr MacSocket_socket(int *outSocketNum,const Boolean inDoThreadSwitching,const long inTimeoutTicks,MacSocket_IdleWaitCallback inIdleWaitCallback,void *inUserRefPtr);
|
|
||||||
|
|
||||||
|
|
||||||
// Call this to connect to an IP/DNS address
|
|
||||||
// Note that inTargetAddressAndPort is in "IP:port" format-- e.g. 10.1.1.1:123
|
|
||||||
|
|
||||||
OSErr MacSocket_connect(const int inSocketNum,char *inTargetAddressAndPort);
|
|
||||||
|
|
||||||
|
|
||||||
// Call this to listen on a port
|
|
||||||
// Since this a low-performance implementation, I allow a maximum of 1 (one!) incoming request when I listen
|
|
||||||
|
|
||||||
OSErr MacSocket_listen(const int inSocketNum,const int inPortNum);
|
|
||||||
|
|
||||||
|
|
||||||
// Call this to close a socket
|
|
||||||
|
|
||||||
OSErr MacSocket_close(const int inSocketNum);
|
|
||||||
|
|
||||||
|
|
||||||
// Call this to receive data on a socket
|
|
||||||
// Most parameters' purpose are obvious-- except maybe "inBlock" which controls whether I wait for data or return immediately
|
|
||||||
|
|
||||||
int MacSocket_recv(const int inSocketNum,void *outBuff,int outBuffLength,const Boolean inBlock);
|
|
||||||
|
|
||||||
|
|
||||||
// Call this to send data on a socket
|
|
||||||
|
|
||||||
int MacSocket_send(const int inSocketNum,const void *inBuff,int inBuffLength);
|
|
||||||
|
|
||||||
|
|
||||||
// If zero bytes were read in a call to MacSocket_recv(), it may be that the remote end has done a half-close
|
|
||||||
// This function will let you check whether that's true or not
|
|
||||||
|
|
||||||
Boolean MacSocket_RemoteEndIsClosing(const int inSocketNum);
|
|
||||||
|
|
||||||
|
|
||||||
// Call this to see if the listen has completed after a call to MacSocket_listen()
|
|
||||||
|
|
||||||
Boolean MacSocket_ListenCompleted(const int inSocketNum);
|
|
||||||
|
|
||||||
|
|
||||||
// These really aren't very useful anymore
|
|
||||||
|
|
||||||
Boolean MacSocket_LocalEndIsOpen(const int inSocketNum);
|
|
||||||
Boolean MacSocket_RemoteEndIsOpen(const int inSocketNum);
|
|
||||||
|
|
||||||
|
|
||||||
// You may wish to change the userRefPtr for a socket callback-- use this to do it
|
|
||||||
|
|
||||||
void MacSocket_SetUserRefPtr(const int inSocketNum,void *inNewRefPtr);
|
|
||||||
|
|
||||||
|
|
||||||
// Call these to get the socket's IP:port descriptor
|
|
||||||
|
|
||||||
void MacSocket_GetLocalIPAndPort(const int inSocketNum,char *outIPAndPort,const int inIPAndPortLength);
|
|
||||||
void MacSocket_GetRemoteIPAndPort(const int inSocketNum,char *outIPAndPort,const int inIPAndPortLength);
|
|
||||||
|
|
||||||
|
|
||||||
// Call this to get error info from a socket
|
|
||||||
|
|
||||||
void MacSocket_GetSocketErrorInfo(const int inSocketNum,int *outSocketErrCode,char *outSocketErrString,const int inSocketErrStringMaxLength);
|
|
||||||
|
|
||||||
|
|
||||||
#ifdef __cplusplus
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
File diff suppressed because it is too large
Load Diff
@@ -1,476 +0,0 @@
|
|||||||
/*
|
|
||||||
------- Strong random data generation on a Macintosh (pre - OS X) ------
|
|
||||||
|
|
||||||
-- GENERAL: We aim to generate unpredictable bits without explicit
|
|
||||||
user interaction. A general review of the problem may be found
|
|
||||||
in RFC 1750, "Randomness Recommendations for Security", and some
|
|
||||||
more discussion, of general and Mac-specific issues has appeared
|
|
||||||
in "Using and Creating Cryptographic- Quality Random Numbers" by
|
|
||||||
Jon Callas (www.merrymeet.com/jon/usingrandom.html).
|
|
||||||
|
|
||||||
The data and entropy estimates provided below are based on my
|
|
||||||
limited experimentation and estimates, rather than by any
|
|
||||||
rigorous study, and the entropy estimates tend to be optimistic.
|
|
||||||
They should not be considered absolute.
|
|
||||||
|
|
||||||
Some of the information being collected may be correlated in
|
|
||||||
subtle ways. That includes mouse positions, timings, and disk
|
|
||||||
size measurements. Some obvious correlations will be eliminated
|
|
||||||
by the programmer, but other, weaker ones may remain. The
|
|
||||||
reliability of the code depends on such correlations being
|
|
||||||
poorly understood, both by us and by potential interceptors.
|
|
||||||
|
|
||||||
This package has been planned to be used with OpenSSL, v. 0.9.5.
|
|
||||||
It requires the OpenSSL function RAND_add.
|
|
||||||
|
|
||||||
-- OTHER WORK: Some source code and other details have been
|
|
||||||
published elsewhere, but I haven't found any to be satisfactory
|
|
||||||
for the Mac per se:
|
|
||||||
|
|
||||||
* The Linux random number generator (by Theodore Ts'o, in
|
|
||||||
drivers/char/random.c), is a carefully designed open-source
|
|
||||||
crypto random number package. It collects data from a variety
|
|
||||||
of sources, including mouse, keyboard and other interrupts.
|
|
||||||
One nice feature is that it explicitly estimates the entropy
|
|
||||||
of the data it collects. Some of its features (e.g. interrupt
|
|
||||||
timing) cannot be reliably exported to the Mac without using
|
|
||||||
undocumented APIs.
|
|
||||||
|
|
||||||
* Truerand by Don P. Mitchell and Matt Blaze uses variations
|
|
||||||
between different timing mechanisms on the same system. This
|
|
||||||
has not been tested on the Mac, but requires preemptive
|
|
||||||
multitasking, and is hardware-dependent, and can't be relied
|
|
||||||
on to work well if only one oscillator is present.
|
|
||||||
|
|
||||||
* Cryptlib's RNG for the Mac (RNDMAC.C by Peter Gutmann),
|
|
||||||
gathers a lot of information about the machine and system
|
|
||||||
environment. Unfortunately, much of it is constant from one
|
|
||||||
startup to the next. In other words, the random seed could be
|
|
||||||
the same from one day to the next. Some of the APIs are
|
|
||||||
hardware-dependent, and not all are compatible with Carbon (OS
|
|
||||||
X). Incidentally, the EGD library is based on the UNIX entropy
|
|
||||||
gathering methods in cryptlib, and isn't suitable for MacOS
|
|
||||||
either.
|
|
||||||
|
|
||||||
* Mozilla (and perhaps earlier versions of Netscape) uses the
|
|
||||||
time of day (in seconds) and an uninitialized local variable
|
|
||||||
to seed the random number generator. The time of day is known
|
|
||||||
to an outside interceptor (to within the accuracy of the
|
|
||||||
system clock). The uninitialized variable could easily be
|
|
||||||
identical between subsequent launches of an application, if it
|
|
||||||
is reached through the same path.
|
|
||||||
|
|
||||||
* OpenSSL provides the function RAND_screen(), by G. van
|
|
||||||
Oosten, which hashes the contents of the screen to generate a
|
|
||||||
seed. This is not useful for an extension or for an
|
|
||||||
application which launches at startup time, since the screen
|
|
||||||
is likely to look identical from one launch to the next. This
|
|
||||||
method is also rather slow.
|
|
||||||
|
|
||||||
* Using variations in disk drive seek times has been proposed
|
|
||||||
(Davis, Ihaka and Fenstermacher, world.std.com/~dtd/;
|
|
||||||
Jakobsson, Shriver, Hillyer and Juels,
|
|
||||||
www.bell-labs.com/user/shriver/random.html). These variations
|
|
||||||
appear to be due to air turbulence inside the disk drive
|
|
||||||
mechanism, and are very strongly unpredictable. Unfortunately
|
|
||||||
this technique is slow, and some implementations of it may be
|
|
||||||
patented (see Shriver's page above.) It of course cannot be
|
|
||||||
used with a RAM disk.
|
|
||||||
|
|
||||||
-- TIMING: On the 601 PowerPC the time base register is guaranteed
|
|
||||||
to change at least once every 10 addi instructions, i.e. 10
|
|
||||||
cycles. On a 60 MHz machine (slowest PowerPC) this translates to
|
|
||||||
a resolution of 1/6 usec. Newer machines seem to be using a 10
|
|
||||||
cycle resolution as well.
|
|
||||||
|
|
||||||
For 68K Macs, the Microseconds() call may be used. See Develop
|
|
||||||
issue 29 on the Apple developer site
|
|
||||||
(developer.apple.com/dev/techsupport/develop/issue29/minow.html)
|
|
||||||
for information on its accuracy and resolution. The code below
|
|
||||||
has been tested only on PowerPC based machines.
|
|
||||||
|
|
||||||
The time from machine startup to the launch of an application in
|
|
||||||
the startup folder has a variance of about 1.6 msec on a new G4
|
|
||||||
machine with a defragmented and optimized disk, most extensions
|
|
||||||
off and no icons on the desktop. This can be reasonably taken as
|
|
||||||
a lower bound on the variance. Most of this variation is likely
|
|
||||||
due to disk seek time variability. The distribution of startup
|
|
||||||
times is probably not entirely even or uncorrelated. This needs
|
|
||||||
to be investigated, but I am guessing that it not a majpor
|
|
||||||
problem. Entropy = log2 (1600/0.166) ~= 13 bits on a 60 MHz
|
|
||||||
machine, ~16 bits for a 450 MHz machine.
|
|
||||||
|
|
||||||
User-launched application startup times will have a variance of
|
|
||||||
a second or more relative to machine startup time. Entropy >~22
|
|
||||||
bits.
|
|
||||||
|
|
||||||
Machine startup time is available with a 1-second resolution. It
|
|
||||||
is predictable to no better a minute or two, in the case of
|
|
||||||
people who show up punctually to work at the same time and
|
|
||||||
immediately start their computer. Using the scheduled startup
|
|
||||||
feature (when available) will cause the machine to start up at
|
|
||||||
the same time every day, making the value predictable. Entropy
|
|
||||||
>~7 bits, or 0 bits with scheduled startup.
|
|
||||||
|
|
||||||
The time of day is of course known to an outsider and thus has 0
|
|
||||||
entropy if the system clock is regularly calibrated.
|
|
||||||
|
|
||||||
-- KEY TIMING: A very fast typist (120 wpm) will have a typical
|
|
||||||
inter-key timing interval of 100 msec. We can assume a variance
|
|
||||||
of no less than 2 msec -- maybe. Do good typists have a constant
|
|
||||||
rhythm, like drummers? Since what we measure is not the
|
|
||||||
key-generated interrupt but the time at which the key event was
|
|
||||||
taken off the event queue, our resolution is roughly the time
|
|
||||||
between process switches, at best 1 tick (17 msec). I therefore
|
|
||||||
consider this technique questionable and not very useful for
|
|
||||||
obtaining high entropy data on the Mac.
|
|
||||||
|
|
||||||
-- MOUSE POSITION AND TIMING: The high bits of the mouse position
|
|
||||||
are far from arbitrary, since the mouse tends to stay in a few
|
|
||||||
limited areas of the screen. I am guessing that the position of
|
|
||||||
the mouse is arbitrary within a 6 pixel square. Since the mouse
|
|
||||||
stays still for long periods of time, it should be sampled only
|
|
||||||
after it was moved, to avoid correlated data. This gives an
|
|
||||||
entropy of log2(6*6) ~= 5 bits per measurement.
|
|
||||||
|
|
||||||
The time during which the mouse stays still can vary from zero
|
|
||||||
to, say, 5 seconds (occasionally longer). If the still time is
|
|
||||||
measured by sampling the mouse during null events, and null
|
|
||||||
events are received once per tick, its resolution is 1/60th of a
|
|
||||||
second, giving an entropy of log2 (60*5) ~= 8 bits per
|
|
||||||
measurement. Since the distribution of still times is uneven,
|
|
||||||
this estimate is on the high side.
|
|
||||||
|
|
||||||
For simplicity and compatibility across system versions, the
|
|
||||||
mouse is to be sampled explicitly (e.g. in the event loop),
|
|
||||||
rather than in a time manager task.
|
|
||||||
|
|
||||||
-- STARTUP DISK TOTAL FILE SIZE: Varies typically by at least 20k
|
|
||||||
from one startup to the next, with 'minimal' computer use. Won't
|
|
||||||
vary at all if machine is started again immediately after
|
|
||||||
startup (unless virtual memory is on), but any application which
|
|
||||||
uses the web and caches information to disk is likely to cause
|
|
||||||
this much variation or more. The variation is probably not
|
|
||||||
random, but I don't know in what way. File sizes tend to be
|
|
||||||
divisible by 4 bytes since file format fields are often
|
|
||||||
long-aligned. Entropy > log2 (20000/4) ~= 12 bits.
|
|
||||||
|
|
||||||
-- STARTUP DISK FIRST AVAILABLE ALLOCATION BLOCK: As the volume
|
|
||||||
gets fragmented this could be anywhere in principle. In a
|
|
||||||
perfectly unfragmented volume this will be strongly correlated
|
|
||||||
with the total file size on the disk. With more fragmentation
|
|
||||||
comes less certainty. I took the variation in this value to be
|
|
||||||
1/8 of the total file size on the volume.
|
|
||||||
|
|
||||||
-- SYSTEM REQUIREMENTS: The code here requires System 7.0 and above
|
|
||||||
(for Gestalt and Microseconds calls). All the calls used are
|
|
||||||
Carbon-compatible.
|
|
||||||
*/
|
|
||||||
|
|
||||||
/*------------------------------ Includes ----------------------------*/
|
|
||||||
|
|
||||||
#include "Randomizer.h"
|
|
||||||
|
|
||||||
// Mac OS API
|
|
||||||
#include <Files.h>
|
|
||||||
#include <Folders.h>
|
|
||||||
#include <Events.h>
|
|
||||||
#include <Processes.h>
|
|
||||||
#include <Gestalt.h>
|
|
||||||
#include <Resources.h>
|
|
||||||
#include <LowMem.h>
|
|
||||||
|
|
||||||
// Standard C library
|
|
||||||
#include <stdlib.h>
|
|
||||||
#include <math.h>
|
|
||||||
|
|
||||||
/*---------------------- Function declarations -----------------------*/
|
|
||||||
|
|
||||||
// declared in OpenSSL/crypto/rand/rand.h
|
|
||||||
extern "C" void RAND_add (const void *buf, int num, double entropy);
|
|
||||||
|
|
||||||
unsigned long GetPPCTimer (bool is601); // Make it global if needed
|
|
||||||
// elsewhere
|
|
||||||
|
|
||||||
/*---------------------------- Constants -----------------------------*/
|
|
||||||
|
|
||||||
#define kMouseResolution 6 // Mouse position has to differ
|
|
||||||
// from the last one by this
|
|
||||||
// much to be entered
|
|
||||||
#define kMousePositionEntropy 5.16 // log2 (kMouseResolution**2)
|
|
||||||
#define kTypicalMouseIdleTicks 300.0 // I am guessing that a typical
|
|
||||||
// amount of time between mouse
|
|
||||||
// moves is 5 seconds
|
|
||||||
#define kVolumeBytesEntropy 12.0 // about log2 (20000/4),
|
|
||||||
// assuming a variation of 20K
|
|
||||||
// in total file size and
|
|
||||||
// long-aligned file formats.
|
|
||||||
#define kApplicationUpTimeEntropy 6.0 // Variance > 1 second, uptime
|
|
||||||
// in ticks
|
|
||||||
#define kSysStartupEntropy 7.0 // Entropy for machine startup
|
|
||||||
// time
|
|
||||||
|
|
||||||
|
|
||||||
/*------------------------ Function definitions ----------------------*/
|
|
||||||
|
|
||||||
CRandomizer::CRandomizer (void)
|
|
||||||
{
|
|
||||||
long result;
|
|
||||||
|
|
||||||
mSupportsLargeVolumes =
|
|
||||||
(Gestalt(gestaltFSAttr, &result) == noErr) &&
|
|
||||||
((result & (1L << gestaltFSSupports2TBVols)) != 0);
|
|
||||||
|
|
||||||
if (Gestalt (gestaltNativeCPUtype, &result) != noErr)
|
|
||||||
{
|
|
||||||
mIsPowerPC = false;
|
|
||||||
mIs601 = false;
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
mIs601 = (result == gestaltCPU601);
|
|
||||||
mIsPowerPC = (result >= gestaltCPU601);
|
|
||||||
}
|
|
||||||
mLastMouse.h = mLastMouse.v = -10; // First mouse will
|
|
||||||
// always be recorded
|
|
||||||
mLastPeriodicTicks = TickCount();
|
|
||||||
GetTimeBaseResolution ();
|
|
||||||
|
|
||||||
// Add initial entropy
|
|
||||||
AddTimeSinceMachineStartup ();
|
|
||||||
AddAbsoluteSystemStartupTime ();
|
|
||||||
AddStartupVolumeInfo ();
|
|
||||||
AddFiller ();
|
|
||||||
}
|
|
||||||
|
|
||||||
void CRandomizer::PeriodicAction (void)
|
|
||||||
{
|
|
||||||
AddCurrentMouse ();
|
|
||||||
AddNow (0.0); // Should have a better entropy estimate here
|
|
||||||
mLastPeriodicTicks = TickCount();
|
|
||||||
}
|
|
||||||
|
|
||||||
/*------------------------- Private Methods --------------------------*/
|
|
||||||
|
|
||||||
void CRandomizer::AddCurrentMouse (void)
|
|
||||||
{
|
|
||||||
Point mouseLoc;
|
|
||||||
unsigned long lastCheck; // Ticks since mouse was last
|
|
||||||
// sampled
|
|
||||||
|
|
||||||
#if TARGET_API_MAC_CARBON
|
|
||||||
GetGlobalMouse (&mouseLoc);
|
|
||||||
#else
|
|
||||||
mouseLoc = LMGetMouseLocation();
|
|
||||||
#endif
|
|
||||||
|
|
||||||
if (labs (mLastMouse.h - mouseLoc.h) > kMouseResolution/2 &&
|
|
||||||
labs (mLastMouse.v - mouseLoc.v) > kMouseResolution/2)
|
|
||||||
AddBytes (&mouseLoc, sizeof (mouseLoc),
|
|
||||||
kMousePositionEntropy);
|
|
||||||
|
|
||||||
if (mLastMouse.h == mouseLoc.h && mLastMouse.v == mouseLoc.v)
|
|
||||||
mMouseStill ++;
|
|
||||||
else
|
|
||||||
{
|
|
||||||
double entropy;
|
|
||||||
|
|
||||||
// Mouse has moved. Add the number of measurements for
|
|
||||||
// which it's been still. If the resolution is too
|
|
||||||
// coarse, assume the entropy is 0.
|
|
||||||
|
|
||||||
lastCheck = TickCount() - mLastPeriodicTicks;
|
|
||||||
if (lastCheck <= 0)
|
|
||||||
lastCheck = 1;
|
|
||||||
entropy = log2l
|
|
||||||
(kTypicalMouseIdleTicks/(double)lastCheck);
|
|
||||||
if (entropy < 0.0)
|
|
||||||
entropy = 0.0;
|
|
||||||
AddBytes (&mMouseStill, sizeof (mMouseStill), entropy);
|
|
||||||
mMouseStill = 0;
|
|
||||||
}
|
|
||||||
mLastMouse = mouseLoc;
|
|
||||||
}
|
|
||||||
|
|
||||||
void CRandomizer::AddAbsoluteSystemStartupTime (void)
|
|
||||||
{
|
|
||||||
unsigned long now; // Time in seconds since
|
|
||||||
// 1/1/1904
|
|
||||||
GetDateTime (&now);
|
|
||||||
now -= TickCount() / 60; // Time in ticks since machine
|
|
||||||
// startup
|
|
||||||
AddBytes (&now, sizeof (now), kSysStartupEntropy);
|
|
||||||
}
|
|
||||||
|
|
||||||
void CRandomizer::AddTimeSinceMachineStartup (void)
|
|
||||||
{
|
|
||||||
AddNow (1.5); // Uncertainty in app startup
|
|
||||||
// time is > 1.5 msec (for
|
|
||||||
// automated app startup).
|
|
||||||
}
|
|
||||||
|
|
||||||
void CRandomizer::AddAppRunningTime (void)
|
|
||||||
{
|
|
||||||
ProcessSerialNumber PSN;
|
|
||||||
ProcessInfoRec ProcessInfo;
|
|
||||||
|
|
||||||
ProcessInfo.processInfoLength = sizeof (ProcessInfoRec);
|
|
||||||
ProcessInfo.processName = nil;
|
|
||||||
ProcessInfo.processAppSpec = nil;
|
|
||||||
|
|
||||||
GetCurrentProcess (&PSN);
|
|
||||||
GetProcessInformation (&PSN, &ProcessInfo);
|
|
||||||
|
|
||||||
// Now add the amount of time in ticks that the current process
|
|
||||||
// has been active
|
|
||||||
|
|
||||||
AddBytes (&ProcessInfo, sizeof (ProcessInfoRec),
|
|
||||||
kApplicationUpTimeEntropy);
|
|
||||||
}
|
|
||||||
|
|
||||||
void CRandomizer::AddStartupVolumeInfo (void)
|
|
||||||
{
|
|
||||||
short vRefNum;
|
|
||||||
long dirID;
|
|
||||||
XVolumeParam pb;
|
|
||||||
OSErr err;
|
|
||||||
|
|
||||||
if (!mSupportsLargeVolumes)
|
|
||||||
return;
|
|
||||||
|
|
||||||
FindFolder (kOnSystemDisk, kSystemFolderType, kDontCreateFolder,
|
|
||||||
&vRefNum, &dirID);
|
|
||||||
pb.ioVRefNum = vRefNum;
|
|
||||||
pb.ioCompletion = 0;
|
|
||||||
pb.ioNamePtr = 0;
|
|
||||||
pb.ioVolIndex = 0;
|
|
||||||
err = PBXGetVolInfoSync (&pb);
|
|
||||||
if (err != noErr)
|
|
||||||
return;
|
|
||||||
|
|
||||||
// Base the entropy on the amount of space used on the disk and
|
|
||||||
// on the next available allocation block. A lot else might be
|
|
||||||
// unpredictable, so might as well toss the whole block in. See
|
|
||||||
// comments for entropy estimate justifications.
|
|
||||||
|
|
||||||
AddBytes (&pb, sizeof (pb),
|
|
||||||
kVolumeBytesEntropy +
|
|
||||||
log2l (((pb.ioVTotalBytes.hi - pb.ioVFreeBytes.hi)
|
|
||||||
* 4294967296.0D +
|
|
||||||
(pb.ioVTotalBytes.lo - pb.ioVFreeBytes.lo))
|
|
||||||
/ pb.ioVAlBlkSiz - 3.0));
|
|
||||||
}
|
|
||||||
|
|
||||||
/*
|
|
||||||
On a typical startup CRandomizer will come up with about 60
|
|
||||||
bits of good, unpredictable data. Assuming no more input will
|
|
||||||
be available, we'll need some more lower-quality data to give
|
|
||||||
OpenSSL the 128 bits of entropy it desires. AddFiller adds some
|
|
||||||
relatively predictable data into the soup.
|
|
||||||
*/
|
|
||||||
|
|
||||||
void CRandomizer::AddFiller (void)
|
|
||||||
{
|
|
||||||
struct
|
|
||||||
{
|
|
||||||
ProcessSerialNumber psn; // Front process serial
|
|
||||||
// number
|
|
||||||
RGBColor hiliteRGBValue; // User-selected
|
|
||||||
// highlight color
|
|
||||||
long processCount; // Number of active
|
|
||||||
// processes
|
|
||||||
long cpuSpeed; // Processor speed
|
|
||||||
long totalMemory; // Total logical memory
|
|
||||||
// (incl. virtual one)
|
|
||||||
long systemVersion; // OS version
|
|
||||||
short resFile; // Current resource file
|
|
||||||
} data;
|
|
||||||
|
|
||||||
GetNextProcess ((ProcessSerialNumber*) kNoProcess);
|
|
||||||
while (GetNextProcess (&data.psn) == noErr)
|
|
||||||
data.processCount++;
|
|
||||||
GetFrontProcess (&data.psn);
|
|
||||||
LMGetHiliteRGB (&data.hiliteRGBValue);
|
|
||||||
Gestalt (gestaltProcClkSpeed, &data.cpuSpeed);
|
|
||||||
Gestalt (gestaltLogicalRAMSize, &data.totalMemory);
|
|
||||||
Gestalt (gestaltSystemVersion, &data.systemVersion);
|
|
||||||
data.resFile = CurResFile ();
|
|
||||||
|
|
||||||
// Here we pretend to feed the PRNG completely random data. This
|
|
||||||
// is of course false, as much of the above data is predictable
|
|
||||||
// by an outsider. At this point we don't have any more
|
|
||||||
// randomness to add, but with OpenSSL we must have a 128 bit
|
|
||||||
// seed before we can start. We just add what we can, without a
|
|
||||||
// real entropy estimate, and hope for the best.
|
|
||||||
|
|
||||||
AddBytes (&data, sizeof(data), 8.0 * sizeof(data));
|
|
||||||
AddCurrentMouse ();
|
|
||||||
AddNow (1.0);
|
|
||||||
}
|
|
||||||
|
|
||||||
//------------------- LOW LEVEL ---------------------
|
|
||||||
|
|
||||||
void CRandomizer::AddBytes (void *data, long size, double entropy)
|
|
||||||
{
|
|
||||||
RAND_add (data, size, entropy * 0.125); // Convert entropy bits
|
|
||||||
// to bytes
|
|
||||||
}
|
|
||||||
|
|
||||||
void CRandomizer::AddNow (double millisecondUncertainty)
|
|
||||||
{
|
|
||||||
long time = SysTimer();
|
|
||||||
AddBytes (&time, sizeof (time), log2l (millisecondUncertainty *
|
|
||||||
mTimebaseTicksPerMillisec));
|
|
||||||
}
|
|
||||||
|
|
||||||
//----------------- TIMING SUPPORT ------------------
|
|
||||||
|
|
||||||
void CRandomizer::GetTimeBaseResolution (void)
|
|
||||||
{
|
|
||||||
#ifdef __powerc
|
|
||||||
long speed;
|
|
||||||
|
|
||||||
// gestaltProcClkSpeed available on System 7.5.2 and above
|
|
||||||
if (Gestalt (gestaltProcClkSpeed, &speed) != noErr)
|
|
||||||
// Only PowerPCs running pre-7.5.2 are 60-80 MHz
|
|
||||||
// machines.
|
|
||||||
mTimebaseTicksPerMillisec = 6000.0D;
|
|
||||||
// Assume 10 cycles per clock update, as in 601 spec. Seems true
|
|
||||||
// for later chips as well.
|
|
||||||
mTimebaseTicksPerMillisec = speed / 1.0e4D;
|
|
||||||
#else
|
|
||||||
// 68K VIA-based machines (see Develop Magazine no. 29)
|
|
||||||
mTimebaseTicksPerMillisec = 783.360D;
|
|
||||||
#endif
|
|
||||||
}
|
|
||||||
|
|
||||||
unsigned long CRandomizer::SysTimer (void) // returns the lower 32
|
|
||||||
// bit of the chip timer
|
|
||||||
{
|
|
||||||
#ifdef __powerc
|
|
||||||
return GetPPCTimer (mIs601);
|
|
||||||
#else
|
|
||||||
UnsignedWide usec;
|
|
||||||
Microseconds (&usec);
|
|
||||||
return usec.lo;
|
|
||||||
#endif
|
|
||||||
}
|
|
||||||
|
|
||||||
#ifdef __powerc
|
|
||||||
// The timebase is available through mfspr on 601, mftb on later chips.
|
|
||||||
// Motorola recommends that an 601 implementation map mftb to mfspr
|
|
||||||
// through an exception, but I haven't tested to see if MacOS actually
|
|
||||||
// does this. We only sample the lower 32 bits of the timer (i.e. a
|
|
||||||
// few minutes of resolution)
|
|
||||||
|
|
||||||
asm unsigned long GetPPCTimer (register bool is601)
|
|
||||||
{
|
|
||||||
cmplwi is601, 0 // Check if 601
|
|
||||||
bne _601 // if non-zero goto _601
|
|
||||||
mftb r3 // Available on 603 and later.
|
|
||||||
blr // return with result in r3
|
|
||||||
_601:
|
|
||||||
mfspr r3, spr5 // Available on 601 only.
|
|
||||||
// blr inserted automatically
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
@@ -1,43 +0,0 @@
|
|||||||
|
|
||||||
// Gathers unpredictable system data to be used for generating
|
|
||||||
// random bits
|
|
||||||
|
|
||||||
#include <MacTypes.h>
|
|
||||||
|
|
||||||
class CRandomizer
|
|
||||||
{
|
|
||||||
public:
|
|
||||||
CRandomizer (void);
|
|
||||||
void PeriodicAction (void);
|
|
||||||
|
|
||||||
private:
|
|
||||||
|
|
||||||
// Private calls
|
|
||||||
|
|
||||||
void AddTimeSinceMachineStartup (void);
|
|
||||||
void AddAbsoluteSystemStartupTime (void);
|
|
||||||
void AddAppRunningTime (void);
|
|
||||||
void AddStartupVolumeInfo (void);
|
|
||||||
void AddFiller (void);
|
|
||||||
|
|
||||||
void AddCurrentMouse (void);
|
|
||||||
void AddNow (double millisecondUncertainty);
|
|
||||||
void AddBytes (void *data, long size, double entropy);
|
|
||||||
|
|
||||||
void GetTimeBaseResolution (void);
|
|
||||||
unsigned long SysTimer (void);
|
|
||||||
|
|
||||||
// System Info
|
|
||||||
bool mSupportsLargeVolumes;
|
|
||||||
bool mIsPowerPC;
|
|
||||||
bool mIs601;
|
|
||||||
|
|
||||||
// Time info
|
|
||||||
double mTimebaseTicksPerMillisec;
|
|
||||||
unsigned long mLastPeriodicTicks;
|
|
||||||
|
|
||||||
// Mouse info
|
|
||||||
long mSamplePeriod;
|
|
||||||
Point mLastMouse;
|
|
||||||
long mMouseStill;
|
|
||||||
};
|
|
||||||
18
MacOS/TODO
18
MacOS/TODO
@@ -1,18 +0,0 @@
|
|||||||
-------------------------------------------------------------------
|
|
||||||
Verify server certificate
|
|
||||||
-------------------------------------------------------------------
|
|
||||||
Currently omitted from the project:
|
|
||||||
|
|
||||||
crypto/tmdiff.c
|
|
||||||
crypto/bio/bss_conn.c
|
|
||||||
crypto/bio/b_sock.c
|
|
||||||
crypto/bio/bss_acpt.c
|
|
||||||
crypto/bio/bss_log.h
|
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
|
||||||
Build libraries to link with...
|
|
||||||
-------------------------------------------------------------------
|
|
||||||
Port openssl application.
|
|
||||||
-------------------------------------------------------------------
|
|
||||||
BN optimizations (currently PPC version is compiled with BN_LLONG)
|
|
||||||
-------------------------------------------------------------------
|
|
||||||
@@ -1,9 +0,0 @@
|
|||||||
#include <MacHeaders.h>
|
|
||||||
#define B_ENDIAN
|
|
||||||
#ifdef __POWERPC__
|
|
||||||
#pragma longlong on
|
|
||||||
#endif
|
|
||||||
#if 1
|
|
||||||
#define MAC_OS_GUSI_SOURCE
|
|
||||||
#endif
|
|
||||||
#define MONOLITH
|
|
||||||
@@ -1,9 +0,0 @@
|
|||||||
#include <MacHeaders.h>
|
|
||||||
#define B_ENDIAN
|
|
||||||
#ifdef __POWERPC__
|
|
||||||
#pragma longlong on
|
|
||||||
#endif
|
|
||||||
#if 0
|
|
||||||
#define MAC_OS_GUSI_SOURCE
|
|
||||||
#endif
|
|
||||||
#define MONOLITH
|
|
||||||
@@ -1,5 +0,0 @@
|
|||||||
#ifndef MK1MF_BUILD
|
|
||||||
# define CFLAGS "-DB_ENDIAN"
|
|
||||||
# define PLATFORM "macos"
|
|
||||||
# define DATE "Sun Feb 27 19:44:16 MET 2000"
|
|
||||||
#endif
|
|
||||||
@@ -1,820 +0,0 @@
|
|||||||
(This file must be converted with BinHex 4.0)
|
|
||||||
|
|
||||||
:#QeVE'PZDh-ZBA-!39"36'&`E(3J!!!!!!!!!*LiI6m!!!!!!3!!!*G#!!#@3J!
|
|
||||||
!!AChFQPd!!!!K3)"!3m(Fh9`F'pbG!!!!)B#!3%$"(0eFQ8!!!#(!J-%"!3("3C
|
|
||||||
cGfPdBfJ!!!#)!J%"#39cH@jMD!!!!)N#"J%$!`-&"3-'FhPcG'9Y!!!!LJ)&"3)
|
|
||||||
%!J8("!-#!`4dB@*X!!!!L`))!3-$!`-$!`-$"(4PE'`!!!#-!J)"#38$G'KP!!!
|
|
||||||
!M3))(J)@!Ki#!J))!K)#!`)B!Kd%G'KPE3!!!)i#!J%&#`4dD'9j!!!!M`)#!J)
|
|
||||||
#$3TdD(*[G@GSEh9d!!!!N!!#!3%&"(4TCQB!!!#4!J%"!`4dD@eP!!!!NJ)"!JS
|
|
||||||
#!h4T!!!!'N!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!H!!!!!!!#!!!!!!
|
|
||||||
!!!!!!!!!!!!!rrrrr`!!!$3!!!!N!!!!!#"[!!5JAb"[!!5K++!M6R9$9'mJFR9
|
|
||||||
Z)(4SDA-JFf0bDA"d)'&`F'aTBf&dD@pZ,#"jEh8JEA9cG#"QDA*cG#"TER0dB@a
|
|
||||||
X)%&`F'aP8f0bDA"d,J!!!)C8D'Pc)(0MFQP`G#"MFQ9KG'9c)#iZ,fPZBfaeC'8
|
|
||||||
[Eh"PER0cE#"KEQ3JCQPXE(-JDA3JGfPdD#"ZC@0PFh0KFRNJB@aTBA0PFbi0$8P
|
|
||||||
d)'eTCfKd)(4KDf8JB5"hD'PXC5"dEb"MEfe`E'9dC5"cEb"`E'9KFf8JBQ8JF'&
|
|
||||||
dD@9ZG$SY+3!!!#S!!J!!!!!!$3!+!"!!!!!-!!!!!!!!!!!!63!0!!S!%!%!!!`
|
|
||||||
!!!!!!!!!!!!B!!!!+!!!!!!!!!!)!!!!)!#N2c`!!DR`!!!!l!!!!!&19[ri,`0
|
|
||||||
f!#m$-$bKVDG'*KmY52ri,`-`2+LITdBQ(b!ZrrLa`'FJ,`-J2'0`ER4"l[rm)NL
|
|
||||||
KV5+)*Kp+3'B)5Ulrr'F#GJ%3!bBZrr41ANje6PB!!#m-@Bm[2%j29%Nr2!#!U"m
|
|
||||||
SAb!-CJK`!cm!UFKJ+#m-UC)J9#!)d+J!'#&!!"JJ9#!)d+J!(#&!!"a9Mbm8)&q
|
|
||||||
JAMk!9%mSE[rm6Pj1G8j@!!![$%kkre4+!'FU@Bm[2'&`E(3[2(0MF(4`)DJU+&m
|
|
||||||
J$'F5@Bm[$#mm!!!!!A!!U#UTp&K26VVrG#KZrra1ANje!!!!('&`E(3!!!!"4P*
|
|
||||||
&4J!!!!!!J%P$6L-!!!!!!*B!!!!"!!!!!!G"8&"-!!!!!!!"!!!"!!!!!S!!!!4
|
|
||||||
!!!"i)!!!K"!!!3))!!)#"!!%"!)!#!J"!"!8!)!J)J"!3%%!)2#!J"#*!%!)KJ!
|
|
||||||
J")3!)!*!!"!")!!3!K!!%!3)!"!)"!!J%!)!3#!"!)"!!S%!J!5#!3!)4!)!#%J
|
|
||||||
%!!KB#!!%C"!!!m)J!!!"3!!!!)!!!!%!!!!$J!!!"m!!!(rJ!!$rm!!"rrJ!!rr
|
|
||||||
m!!IrrJ!2rrm!(rrrJ$rrrm"rrrrJrrrrm2rrrrMrrrrmrrrrrRrrrrmrrrrq(rr
|
|
||||||
rr!rrrrJ(rrr`!rrri!(rrm!$rrq!"rrr!!rrrJ!2rr`!$rri!!IRm!!$`q!!!!(
|
|
||||||
!!!!!J!!!!!)!!!!!!!!!!!m!!!!!!!!!!!!!!!!!!!$`m!!!!!!!!!!!!!!!!!!
|
|
||||||
2!!m!!!!!!!!!!!!!!!rrm!!!m!!!!!!!!!!!!!$`c0m!!!m!!!!!!!!!!!!2!!c
|
|
||||||
-m!!!m!!!!!!!!!!!m!$-cI!!!!m!!!!!!!!!$`!-c0m!!!!!m!!!!!!!!2!!c-h
|
|
||||||
`!!!!!!m!!!!!!!m!$-cIh`!!!!!!m!!!!!$`!-c0rGh`!!!!!!m!!!!2!!c-hph
|
|
||||||
-h`!!!!!!m!!!rrr-cIhF`-h`!!!!!!m!!2lFr0rGc!`-h`!!!!!!m!$pc-rph-$
|
|
||||||
!`-h`!!!!!!m!r-`2cF`-$!!-r3!!!!!!m!m!`-c!`-!!$0m!!!!!$-m!m!`-$!`
|
|
||||||
!!-cI!!!!!-c`!!m!`-$!!!`-h`!!!!c2!!!!m!`-!!$!c0m!!!$-m!!!!!m!`!!
|
|
||||||
-$-hm!!!-c`!!!!!!m!!!`-cIc!!!c2!!!!!!!!m!$!c0r-`!$-m!!!!!!!$pm-$
|
|
||||||
-hmc!!-c`!!!!!!!2hI`-cIc-!!c2!!!!!!!!rGc2c0r-`!$-m!!!!!!!!2h-cmh
|
|
||||||
mc!!-c`!!!!!!!!$mc!rIr-!!c2!!!!!!!!!!$m$2m!r-$-m!!!!!!!!!!!$rr`!
|
|
||||||
!r-c`!!!!!!!!!!!!!!!!!!r2!!!!!!!!!!!!!!!!!!!!m!!!!!!!!!!!!!"!!B!
|
|
||||||
13"%J)4"##18%Q)+3!%&!)5!L%%3BL#83*L!G3!#!!B!2`"rJ2r"rq2rmrrlrrhr
|
|
||||||
r2riIr"ri2r!ri"h!!)!!!!#!!!!!$r!!!!!!!2r`$`!!!!!2$!m!m!!!!2$!c`!
|
|
||||||
2!!!2$!c`!!$`!2r`cpm!!!m!rGrpc2!!!2$p$p`-c`!!$`m!`-$0m!$2!2!-$-h
|
|
||||||
`$2!!$`$-hm$2!!!2m-hm$2!!!2h2hm$2!!!!r-rm$2!!!!!2r`r2!!!!!!!!!2!
|
|
||||||
!!!!!!!#D8f0bDA"d)%&`F'aTBf&dD@pZ$3e8D'Pc)(0MFQP`G#"MFQ9KG'9c)#i
|
|
||||||
Z,fPZBfaeC'8[Eh"PER0cE#"KEQ3JCQPXE(-JDA3JGfPdD#"ZC@0PFh0KFRNJB@a
|
|
||||||
TBA0PFbi0$8Pd)'eTCfKd)(4KDf8JB5"hD'PXC5"dEb"MEfe`E'9dC5"cEb"`E'9
|
|
||||||
KFf8JBQ8JF'&dD@9ZG$SY+3!!!")!!J!!!!!!!!!!!!%!"J!'%iN!!!!+@1!!!b!
|
|
||||||
!!!-J!!!!!"3!+`!(!Cm#@!!V!!F"f!*B!!!!!3!!M`C'BA0N98&6)$%Z-6!a,M%
|
|
||||||
`$J!!!!32rrm!!3!#!!-"rrm!!!d!!3!"D`!!!!!!!!!%!J!%!!)!"3!'$3!&!!*
|
|
||||||
X!!)!!!U`!!IrrJd!"`!#6`!!!!!+X!!)!!N0!!J!!@X!!!!%#Um!#J)!#J!#!!X
|
|
||||||
!$!d!#`!#E!!#!!3!"2rprr`"rrd!!!(rr!!!!J!-!!)!$3!1$3!0!!*X!!%!"!!
|
|
||||||
%rrX!$`(rq`!!$!!2!&N!8b"(CA3JF'&dD#"dEb"dD'Pc)%&`F'aP8f0bDA"d)'&
|
|
||||||
`F'aPG$XJGA0P)'Pd)(4[)'C[FQdJG'KP)("KG'JJG'mJG'KP)'PZBfaeC'8JCQp
|
|
||||||
XC'9b!!)!!!)!$J!#!"!!%3d!%!!#E!!"!!3!"2rk!")"rrS!!!`!%J!Q!#!JB@j
|
|
||||||
N)(4SC5"[G'KPFL"bC@aPGQ&ZG#"QEfaNCA*c,J!#!!!#!"%!!J!6!"30!"-!!R-
|
|
||||||
!!!!%!"%!&3!@$3!9!!*M!!!!"!!1!"F!'!d!&`!#E!!&!!3!$!!CrrN0!"N!!Qi
|
|
||||||
!!!!%!!`!'J!E$3!D!!)d!!!!"3!-rrJ!(!Vrq!!%#Q0[BQS0!"`!!Q`!"3!'!!X
|
|
||||||
!(Irh$3!G!!0*!!)!"J!,rrB!([re#[rf!"JZC@&bFfCQC(*KE'Pc!!!!!!!!)!"
|
|
||||||
KCQ4b$3!H!!"Q!!!!"J!(![re!!!"rrF!!!d!'`!"E3!!!!3!"3!I$`!I!6J)ER9
|
|
||||||
XE!!!!!!!!Gq!rrm!!!!A"NCTEQ4PFJ!!(`*[Me!!ASfm!Qq,i!"HA[!!I&M!!!!
|
|
||||||
!!!!!'mi!!JN#!Qq-1!!!Kb%#Ei`J!!!!!%C14&*038e"3e-!!"%!B@aTF`!!!!!
|
|
||||||
!fJ!#!!!-6@&MD@jdEh0S)%K%!!!!!!!!!!!!!!!!!!!!XSA5h%*%!!!!!!!A"NC
|
|
||||||
TEQ4PFJ!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
|
|
||||||
!!!!!!!!!!!!!!!!!!!!!3rLc#@a!4Nj%8Ne"3e2rrrrr!!!!!!!!!!!!!!!!!!!
|
|
||||||
!!!!!!!e6HA0dC@dJ4QpXC'9b!!!"!!3!!!!A!!)!)8eKBfPZG'pcD#")4$T6HA0
|
|
||||||
dC@dJ4QpXC'9b1NCTEQ4PFJ$rr`!!!Irj!!!0!"J!!@d!!!!-!!hrp!Vrp!!%#Q0
|
|
||||||
dH(30!"B!!@m!!!!!!!$rm`[rm`!5-!!(G'KPF'&dD!!(G'KP8'&dD!)!&!!#!#!
|
|
||||||
!)3d!)!!#E!!#!")!%[rbrr%"rr)!!!(rm3!!!J!K!!)!)J!M$3!L!!*b!!!!%J!
|
|
||||||
A!#3!*3d!*!!#EJ!$!")!&3!Q!#F0!#B!!6%!!!!6!"Arm!Vrm!!%#R4iC'`0!#F
|
|
||||||
!!6%!!!!5!"2rl`Vrl`!%#Q&cBh)0!#8!!@m!!!!!!!$rlJ[rlJ!F-!!-G'KPEfa
|
|
||||||
NC'9XD@ec!!adD'92E'4%C@aTEA-#!#-!!J!S!#N0!#J!!R)!!!!B!"d!+J!V$3!
|
|
||||||
U!!&Y!!!!'!!C!#`-!#`!"`!"1J!#!!!0!#X!!Qi!!`!!!!!!,3!Z$3!Y!!%a!!!
|
|
||||||
!'J!Frqd+rqd!"!TdH'4X$3!Z!!%a!!!!'3!Drq`+rq`!"!TKFf0b!J!T!!)!,`!
|
|
||||||
`$3![!!*X!!)!(J!Hrq[rkJ(rk`!!!IrU!!!#!$!!!J!a!$)0!$%!!R)!!!!H!#X
|
|
||||||
!-`!d$3!c!!*X!!8!(J!T!$Ark3d!03!#EJ!!!"i!+3!f!$F0!$B!!cF"!!!I!#R
|
|
||||||
rk!!i!$N+rqJ!"!TMDA4Y$3!i!!&Y!!!!)`!PrqF$rqF!!3d!13!"E3!!!#B!+2r
|
|
||||||
Q!rrQrrd0!$F!!@m!!!!H!"rrj3[rj3!5-!!(G'KPF'&dD!!(G'KP8'&dD!(rk3!
|
|
||||||
!$3!d!!&[!!!!!!!!rq3,rq3!)$!!$R4SCA"bEfTPBh4`BA4S!!jdD'93FQpUC@0
|
|
||||||
d8'&dD!)!-J!#!$S!1`d!1J!#FJ!!!#`!1`!m!$d0!$`!!Q-!!!!X!$N!2J!r$3!
|
|
||||||
q!!*X!!8!,!!h!%$ri`d!3!!#EJ!!!#`!0`""!%)0!%%!!cF"!!!Y!$IriJ"$!%3
|
|
||||||
+rq)!"!TMDA4Y$3"$!!&Y!!!!-3!crq%$rq%!!3d!4!!"E3!!!$3!0[rJ!rrJrri
|
|
||||||
0!%)!!@m!!!!X!#hrh`[rh`!5-!!(G'KPF'&dD!!(G'KP8'&dD!(ri`!!$3!r!!&
|
|
||||||
Y!!!!0`!irpi+rpi!"!T849K8$3!p!!&[!!!!!!!!rpd,rpd!&M!!#A4SC@ePF'&
|
|
||||||
dD!!*G'KP6@93BA4S!J!l!!)!43"'$3"&!!*X!!)!2!!mrpcrf`(rh!!!!IrE!!!
|
|
||||||
#!%B!!J"(!%J0!%F!!R)!!!!m!%8!53"+$3"*!!*M!!!!2!""!%X!6!d!5`!#BJ!
|
|
||||||
!!$`!2`"0!%i0!%d!!@m!!!!m!$hrfJ[rfJ!J-!!1G'KPF(*[DQ9MG("KG'J!$R4
|
|
||||||
SC9"bEfTPBh43BA4S$3"1!!&Y!!!!23!q!%m-!%m!$3!(D@jME(9NC3!#!!!0!%`
|
|
||||||
!!@d!!!!r!%$rf3Vrf3!%#P4&@&30!%S!!@m!!!!!!!$rf![rf!!Q-!!4D@jME(9
|
|
||||||
NC@C[E'4PFR"KG'J!%@PZBfaeC'9'EfaNCA*3BA4S!J")!!)!8!"4$3"3!!*b!!!
|
|
||||||
!4J"9!&)!8`d!8J!#B`!!!%B!83"8!&80!&3!!Q)!!!"'!%m!9J"A$3"@!!*L!!!
|
|
||||||
!4J",!&J!@3d!@!!"E`!!!%B!4rrA#rrA!#!`!!jdD'9`FQpUC@0dF'&dD!!1G'K
|
|
||||||
P8(*[DQ9MG&"KG'J0!&N!!@d!!!"(!%S!@J`!@J!0!!GTEQ0XG@4P!!)!!!d!9`!
|
|
||||||
"E3!!!%X!6J"E$!"E!!d!"fp`C@jcFf`!!J!!$3"9!!&Y!!!!6`"3rpB+rpB!"!T
|
|
||||||
849K8$3"6!!&[!!!!!!!!rp8,rp8!0$!!''p`C@jcFfaTEQ0XG@4PCQpXC'9bF'&
|
|
||||||
dD!!BEh"PEP066%PZBfaeC'9'EfaNCA*3BA4S!J"4!!)!A!"G$3"F!!*b!!!!9J"
|
|
||||||
K!&i!A`d!AJ!#B`!!!&B!A3"J!'%0!'!!!Q)!!!"@!&X!BJ"M$3"L!!&[!!!!9J"
|
|
||||||
Arp3,rp3!)$!!$R4SCA"bEfTPBh4`BA4S!!jdD'93FQpUC@0d8'&dD!d!B`!"E3!
|
|
||||||
!!&F!@J"N$!"N!!`!"Q0bHA"dE`!#!!!0!'%!!@d!!!"E!&crd`Vrd`!%#P4&@&3
|
|
||||||
0!&m!!@m!!!!!!!$rdJ[rdJ!N-!!3Bh*jF(4[CQpXC'9bF'&dD!!3Bh*jF(4[4Qp
|
|
||||||
XC'9b8'&dD!)!A3!#!'8!CJd!C3!#FJ!!!')!E3"R!'J0!'F!!Q-!!!"L!'N!D3"
|
|
||||||
U$3"T!!*L!!!!BJ"R!'X!E!d!D`!"E`!!!')!Brr4#rr4!#!`!!jdD'9`FQpUC@0
|
|
||||||
dF'&dD!!1G'KP8(*[DQ9MG&"KG'J0!'`!!@d!!!"M!'B!E3`!E3!*!!0cFf`!!J!
|
|
||||||
!$3"U!!&Y!!!!C`"Srp!+rp!!"!T849K8$3"S!!&[!!!!!!!!rmm,rmm!(M!!$A0
|
|
||||||
cE'C[E'4PFR"KG'J!$A0cE%C[E'4PFP"KG'J#!'B!!J"Z!'m0!'i!!R)!!!"Z!(8
|
|
||||||
!F!"a$3"`!!*M!!!!EJ"a!()!F`d!FJ!"E`!!!'i!Err1#rr1!#!`!!jdD'9`FQp
|
|
||||||
UC@0dF'&dD!!1G'KP8(*[DQ9MG&"KG'J0!(-!!@d!!!"[!($rc3Vrc3!%#P4&@&3
|
|
||||||
0!(%!!@m!!!!!!!$rc![rc!!Q-!!4Eh"PER0cE'C[E'4PFR"KG'J!%@p`C@jcFfa
|
|
||||||
'EfaNCA*3BA4S!J"[!!)!G!"e$3"d!!*X!!)!GJ"frm[rbJ(rb`!!!Ir+!!!#!(8
|
|
||||||
!!J"f!(F0!(B!!R)!!!"f!(X!H!"j$3"i!!&[!!!!GJ"hrmN,rmN!($!!$(4SC@p
|
|
||||||
XC'4PE'PYF`!-G'KP6faN4'9XD@ec$3"j!!*Z!!-!!!!!!(S!H`d!HJ!"-3!!!(J
|
|
||||||
!H[r)#[r)!!3+G(KNE!d!H`!"-3!!!(F!H2r(#[r(!!3+BA0MFJ)!G`!#!(`!I3d
|
|
||||||
!I!!#E!!#!(`!I2r'rm8"rmB!!!(ra3!!!J"p!!)!IJ"r$3"q!!*X!!%!I!"mrm3
|
|
||||||
!J!(ra!!!$!#!!%!!1L"NC@aPG'8JEfaN)'PZBfaeC'8kEh"PER0cE#"QEfaNCA)
|
|
||||||
JB@jN)(*PBh*PBA4P)'Pd)'0XC@&ZE(N!!J!!!J"r!!)!J3##$3#"!!*X!!)!I!"
|
|
||||||
mrm2r`J(r``!!!Ir#!!!#!))!!J#$!)30!)-!!e%!!!"m!+8!K3#'!)F0!)8!!@X
|
|
||||||
!!!"r!*`!L!)!L!!#!)N!LJd!L3!$53!#!(m!N[r"!)[r`!Vr`3!B,QeTFf0cE'0
|
|
||||||
d+LSU+J!!!!!!!*!!!#SU+LS0!)X!!Qi!!!"r!)i!M!#0$3#-!!)d!!!!K`#1rlm
|
|
||||||
!MJVr[`!%#Q0QEf`0!)i!!@d!!!#+!)d!M``!M`!0!!G[F'9ZFh0X!!)!!!d!M3!
|
|
||||||
#0!!!!(m!Krqq!*!!#[qq!!3+BfC[E!d!N!!!!@m!!!#$!)Er[3[r[3!Q-!!4D@j
|
|
||||||
ME(9NC@C[E'4PFR"KG'J!%@PZBfaeC'9'EfaNCA*3BA4S![r!!!!#!)S!!J#4rl`
|
|
||||||
0!*%!!dN!!J#6!*crZ`#5rlS+rlX!'#jMEh*PC'9XEbSU+LS!!!!!!!#3!!!U+LS
|
|
||||||
U$3#5!!%a!!!!N`#BrlN+rlN!"!TcC@aP![qk!!!#rl`!!!d!KJ!$8J!!!!!!!2q
|
|
||||||
irlIrYJVrZ!!B,Q&cBh*PFR)J+LSU+J!!!!!!!*!!!#SU+LS"rlF!!!,rYJ!!$3#
|
|
||||||
(!!*X!!%!T!#Nrl8!N`(rY3!!$!#6!"-!$5"TCfj[FQ8JCA*bEh)!!J!!!J#%!!)
|
|
||||||
!P!#9$3#8!!*X!!)!TJ#Qrl6rX`(rY!!!!Iqc!!!#!*8!!J#@!*F0!*B!!dN!!J#
|
|
||||||
Q!,lrX[qa!*J+rl)!'#jMEh*PBh*PE#SU+LS!!!!!!!#3!!"ZG@aX!Iqa!!!'!*J
|
|
||||||
!!rq`!*N!QJVrX!!%#QY[Bf`0!*N!!@d!!!#U!+hrV`VrV`!%#Q0QEf`'!*S!!rq
|
|
||||||
Z!*[rV3VrVJ!%#QPZFfJ0!*X!!M3!!!#`!,MrV!#F#[qX!!3+BfC[E!d!R!!"E`!
|
|
||||||
!!,3!YrqV#rqV!#B`!"&TEQ0XG@4PCQpXC'9bF'&dD!!4D@jME(9NC8C[E'4PFP"
|
|
||||||
KG'J'rkd!!!)!P`!#!*d!RJd!R3!#FJ!!!,m!aJ#I!+!0!*m!!Q`"!!#r!-)!SIq
|
|
||||||
U$3#K!!%a!!!![`$#rkN+rkN!"!TbFfad!IqU!!!0!+!!!@m!!!!!!!$rU![rU!!
|
|
||||||
Z-!!9G'KPEQ9hCQpXC'9bFQ9QCA*PEQ0P!"9dD'91CAG'EfaNCA*5C@CPFQ9ZBf8
|
|
||||||
#!*i!!J#L!+-0!+)!!dN!!J$(!-lrT`#NrkB+rkF!'#jYDA0MFfaMG#SU+LS!!!!
|
|
||||||
!!!#3!!!U+LSU$3#N!!&[!!!!a`$+rk8,rk8!,M!!&A4SC@jPGfC[E'4PFR*PCQ9
|
|
||||||
bC@jMC3!9G'KP6Q9h4QpXC'9b8Q9QCA*PEQ0P![qQ!!!#!+-!!J#P!+B0!+8!!R)
|
|
||||||
!!!$2!0`!T`#S$3#R!!&Y!!!!c`$5!+N-!+N!$3!(Eh"PER0cE!!#!!!0!+J!!Qi
|
|
||||||
!!!!!!!!!UJ#V$3#U!!%a!!!!e`$Erk3+rk3!"!T`EQ&Y$3#V!!%a!!!!dJ$Ark-
|
|
||||||
+rk-!"!TcC@aP!J#Q!!)!V!#Y$3#X!!*X!!)!h3$Grk,rS3(rSJ!!!IqK!!!#!+d
|
|
||||||
!!J#Z!+m0!+i!!Q`!!3$G!0hrS!#`!IqJ!!!-!,!!(`!C)&0dBA*d)'eKDfPZCb"
|
|
||||||
dD'8JB@aTBA0PF`!#!!!#!+m!!J#a!,)0!,%!!dN!!J$G!3ArRrqH!,-+rjm!'#j
|
|
||||||
MEh*PBh*PE#SU+LS!!!!!!!#3!!"ZG@aX!IqH!!!'!,-!!rqG!,3!Y3VrR3!%#QY
|
|
||||||
[Bf`0!,3!!@d!!!$K!16rR!VrR!!%#Q&XD@%'!,8!!rqE!,B!Y`VrQ`!%#QPZFfJ
|
|
||||||
0!,B!!M3!!!$R!1rrQJ#i#[qD!!3+BfC[E!d!Z!!"E`!!!1X!l[qC#rqC!$3`!"K
|
|
||||||
[F'9ZFh0XD@jME(9NC@C[E'4PFR"KG'J!''p`C@j68da*EQ0XG@4P4QpXC'9b8'&
|
|
||||||
dD!B!Y`!$rjJ!ZIqA#[qB!!3+G'mJ)!d!Z3!#EJ!!!2)!r`#k!,X0!,S!!M3!!!$
|
|
||||||
i!2rrPJ#m#[q@!!3+CQPXC3d![!!"E3!!!2X!rJ#p$!#p!"-!$@p`C@jcFfaMEfj
|
|
||||||
Q,QJ!!J!!$3#l!!)d!!!!mJ$irj8![JVrP3!%#Q0QEf`0!,i!!@m!!!$f!2IrP![
|
|
||||||
rP!!@-!!*G'KPE@9`BA4S!!PdD'90C9"KG'J'rjF!!!)!XJ!#!,m!`!d![`!#E!!
|
|
||||||
#!3B""[q6rj)"rj-!!!(rNJ!!!J$!!!)!`3$#$3$"!!*b!!!""J%4!--!a!d!``!
|
|
||||||
#BJ!!!3B"$3$&!-B0!-8!!@m!!!%'!3RrN3[rN3!N-!!3Bh*jF(4[CQpXC'9bF'&
|
|
||||||
dD!!3Bh*jF(4[4QpXC'9b8'&dD!d!aJ!"E3!!!3N"$!$($!$(!!X!"6TKFfia!!)
|
|
||||||
!!!d!a!!"E`!!!!!!!2q3!![rN!!!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!)!`J!
|
|
||||||
#!-J!b3d!b!!$53!#!4)"22q2rii!bJVrM`!B,Q0[FQ9MFQ9X+LSU+J!!!!!!!*!
|
|
||||||
!!'jeE'`"rii!!!B!bJ!$rid!b`$-#[q0!!3+DfpME!d!b`!"E3!!!4B"'Iq-#[q
|
|
||||||
-!!3+B@aTB3B!c!!$riX!c3$1#[q,!!3+D@jcD!d!c3!#0!!!!4`"*2q+!-m+riS
|
|
||||||
!"!TMCQpX$3$2!!&[!!!")!%MriN,riN!0$!!''p`C@jcFfaTEQ0XG@4PCQpXC'9
|
|
||||||
bF'&dD!!BEh"PEP066%PZBfaeC'9'EfaNCA*3BA4S"J$1!!2rL!$3riF+riJ!"!T
|
|
||||||
dEb!J$3$3!!*Z!!!"*`%f!0%!dJd!d3!#0!!!!5m"0[q'!0-+riB!"!TQD@aP$3$
|
|
||||||
6!!&Y!!!"-J%e!03-!03!$!!'BA0Z-5jS!!)!!!d!dJ!#0!!!!5F",rq&!08+ri8
|
|
||||||
!"!TMCQpX$3$9!!&[!!!"+`%Zri3,ri3!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!E
|
|
||||||
rK`!!!J$*!!)!eJ$A$3$@!!0*!!)"23&Rri2rJJ$B#[q$!"JZBfpbC@0bC@`U+LS
|
|
||||||
U!!!!!!!!N!!!ER9XE!(rJJ!!"J$B!!2rJ3$C!0S+ri%!"!TVEf0X$3$C!!&Y!!!
|
|
||||||
"33&%ri!+ri!!"!TKE'PK"J$D!!2rI`$E!0`+rhm!"!TTER0S$3$E!!)d!!!"4`&
|
|
||||||
2rhi!h3VrIJ!%#Q0QEf`0!0d!!@m!!!&,!8lrI3[rI3!d-!!BEh"PER0cE'PZBfa
|
|
||||||
eC'9QEfaNCA*`BA4S!"K[F'9Z8e0-5@jME(9NC8C[E'4PFP"KG'J'!0`!!rpm!0l
|
|
||||||
rH`VrI!!%#R4[)#!0!0i!!Qi!!!&5!@%!h`$J$3$I!!)d!!!"@J&KrhS!i3VrHJ!
|
|
||||||
%#QCTE'80!1%!!@d!!!&G!@!!iJ`!iJ!3!!TKFfiaAfeKBbjS!!)!!!d!i!!#0!!
|
|
||||||
!!9)"@[pj!1-+rhN!"!TMCQpX$3$M!!&[!!!"9J&CrhJ,rhJ!&$!!#(4PEA"`BA4
|
|
||||||
S!!KdC@e`8'&dD!ErH`!!!J$A!!)!j!$P$3$N!!*X!!)"D!&SrhIrGJ(rG`!!!Ip
|
|
||||||
f!!!#!18!!J$Q!1F0!1B!!R)!!!&S!A-!k!$T$3$S!!*L!!!"D!&[!1S!k`d!kJ!
|
|
||||||
"E`!!!@J"Drpe#rpe!#3`!""MFRP`G'pQEfaNCA*`BA4S!""MFRP`G'p'EfaNCA*
|
|
||||||
3BA4S$3$V!!&Y!!!"D`&Z!1`-!1`!#J!%1Q*TE`!#!!!0!1N!!@m!!!!!!!$rG![
|
|
||||||
rG!!8-!!)G'9YF("KG'J!#(4PEA"3BA4S!J$R!!)!l3$Z$3$Y!!0*!!)"G!'Hrh2
|
|
||||||
rFJ$[#[pc!"JZBfpbC@0bC@`U+LSU!!!!!!!!N!!!ER9XE!(rFJ!!"J$[!!2rF3$
|
|
||||||
`!2%+rh%!"!TVEf0X$3$`!!&Y!!!"H!&lrh!+rh!!"!TKE'PK"J$a!!2rE`$b!2-
|
|
||||||
+rfm!"!TTER0S$3$b!!)d!!!"IJ''rfi!p!VrEJ!%#Q0QEf`0!23!!@m!!!'#!BA
|
|
||||||
rE3[rE3!d-!!BEh"PER0cE'PZBfaeC'9QEfaNCA*`BA4S!"K[F'9Z8e0-5@jME(9
|
|
||||||
NC8C[E'4PFP"KG'J'!2-!!rpX!2ArD`VrE!!%#R4[)#!0!28!!Qi!!!'*!CJ!pJ$
|
|
||||||
h$3$f!!)d!!!"N3'BrfS!q!VrDJ!%#QCTE'80!2J!!@d!!!'8!CF!q3`!q3!,!!9
|
|
||||||
LD@mZD!!#!!!0!2F!!M3!!!'*!C(rD3$k#[pT!!3+BfC[E!d!qJ!"E`!!!Bd"N!$
|
|
||||||
rD![rD!!8-!!)G'9YF("KG'J!#(4PEA"3BA4S"[pV!!!#!1i!!J$l!2`0!2X!!Q`
|
|
||||||
!!J'I!CrrCrpQ!IpR!!!"rfB!!!)!r!!#!2d!rJd!r3!#FJ!!!Cm"UJ$r!3!0!2m
|
|
||||||
!!Q)!!!'I!DB"!3%#$3%"!!&[!!!"R`'Lrf8,rf8!*$!!%'0bHA"dEfC[E'4PFR"
|
|
||||||
KG'J!%'0bHA"dEdC[E'4PFP"KG'J0!3)!!@d!!!'L!D8"!``"!`!*!!-kBQB!!J!
|
|
||||||
!$3%!!!&[!!!!!!!!rf3,rf3!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!)!rJ!#!33
|
|
||||||
""3d""!!$53!#!DX"eIpMrf)""JVrB`!B,Q0[FQ9MFQ9X+LSU+J!!!!!!!*!!!'j
|
|
||||||
eE'`"rf)!!!B""J!$rf%""`%)#[pK!!3+DfpME!d""`!"E3!!!Dm"X[pJ#[pJ!!3
|
|
||||||
+B@aTB3B"#!!$rem"#3%+#[pI!!3+D@jcD!d"#3!#0!!!!E8"[IpH!3X+rei!"!T
|
|
||||||
MCQpX$3%,!!&[!!!"Z3'mred,red!0$!!''p`C@jcFfaTEQ0XG@4PCQpXC'9bF'&
|
|
||||||
dD!!BEh"PEP066%PZBfaeC'9'EfaNCA*3BA4S"J%+!!2rA!%-reX+re`!"!TdEb!
|
|
||||||
J$3%-!!*Z!!!"`!(2!3d"$Jd"$3!#0!!!!FJ"crpD!3m+reS!"!TQD@aP$3%2!!&
|
|
||||||
Y!!!"b`(1!4!-!4!!%!!+BQa[GfCTFfJZD!!#!!!0!3i!!M3!!!(!!FMr@3%4#[p
|
|
||||||
C!!3+BfC[E!d"%3!"E`!!!F3"arpB#rpB!"3`!!KdC@e`F'&dD!!)G'9YF&"KG'J
|
|
||||||
'reX!!!)""3!#!4)"%`d"%J!#E!!#!GB"e[pAreB"reF!!!(r9J!!!J%6!!)"&!%
|
|
||||||
9$3%8!!*b!!!"eJ(K!4B"&`d"&J!#BJ!!!GB"h3%B!4N0!4J!!@m!!!(@!GRr93[
|
|
||||||
r93!N-!!3Bh*jF(4[CQpXC'9bF'&dD!!3Bh*jF(4[4QpXC'9b8'&dD!d"'3!"E3!
|
|
||||||
!!GN"h!%D$!%D!!N!!cTLEJ!#!!!0!4F!!@m!!!!!!!$r9![r9!!8-!!)G'9YF("
|
|
||||||
KG'J!#(4PEA"3BA4S!J%9!!)"'`%F$3%E!!0*!!)"iJ)-re2r8J%G#[p6!"JZBfp
|
|
||||||
bC@0bC@`U+LSU!!!!!!!!N!!!ER9XE!(r8J!!"J%G!!2r83%H!4m+re%!"!TVEf0
|
|
||||||
X$3%H!!&Y!!!"jJ(Tre!+re!!"!TKE'PK"J%I!!2r6`%J!5%+rdm!"!TTER0S$3%
|
|
||||||
J!!)d!!!"l!(drdi")JVr6J!%#Q0QEf`0!5)!!@m!!!(`!I2r63[r63!d-!!BEh"
|
|
||||||
PER0cE'PZBfaeC'9QEfaNCA*`BA4S!"K[F'9Z8e0-5@jME(9NC8C[E'4PFP"KG'J
|
|
||||||
'!5%!!rp-!52r5`Vr6!!%#R4[)#!0!5-!!Qi!!!(h!JB"*!%P$3%N!!)d!!!"r`)
|
|
||||||
'rdS"*JVr5J!%#QCTE'80!5B!!@d!!!)#!J8"*``"*`!+!!4LELjS!!)!!!d"*3!
|
|
||||||
#0!!!!IF"rrp*!5J+rdN!"!TMCQpX$3%S!!&[!!!"q`(qrdJ,rdJ!&$!!#(4PEA"
|
|
||||||
`BA4S!!KdC@e`8'&dD!Er5`!!!J%F!!)"+3%U$3%T!!*X!!)#$3)0rdIr4J(r4`!
|
|
||||||
!!Ip'!!!#!5S!!J%V!5`0!5X!!R)!!!)0!KJ",3%Z$3%Y!!*L!!!#$3)8!5m"-!d
|
|
||||||
",`!"E`!!!Jd#%2p&#rp&!#3`!""MFRP`G'pQEfaNCA*`BA4S!""MFRP`G'p'Efa
|
|
||||||
NCA*3BA4S$3%`!!&Y!!!#%!)6!6%-!6%!$3!(1Q*eCQCPFJ!#!!!0!5i!!@m!!!!
|
|
||||||
!!!$r4![r4!!8-!!)G'9YF("KG'J!#(4PEA"3BA4S!J%X!!)"-J%c$3%b!!0*!!)
|
|
||||||
#'3*$rd2r3J%d#[p$!"JZBfpbC@0bC@`U+LSU!!!!!!!!N!!!ER9XE!(r3J!!"J%
|
|
||||||
d!!2r33%e!6B+rd%!"!TVEf0X$3%e!!&Y!!!#(3)Jrd!+rd!!"!TKE'PK"J%f!!2
|
|
||||||
r2`%h!6J+rcm!"!TTER0S$3%h!!)d!!!#)`)Vrci"13Vr2J!%#Q0QEf`0!6N!!@m
|
|
||||||
!!!)R!LVr23[r23!d-!!BEh"PER0cE'PZBfaeC'9QEfaNCA*`BA4S!"K[F'9Z8e0
|
|
||||||
-5@jME(9NC8C[E'4PFP"KG'J'!6J!!rmm!6Vr1`Vr2!!%#R4[)#!0!6S!!Qi!!!)
|
|
||||||
Z!Md"1`%m$3%l!!)d!!!#0J)prcS"23Vr1J!%#QCTE'80!6d!!@d!!!)j!M`"2J`
|
|
||||||
"2J!1!!KLG@CQCA)ZD!!#!!!0!6`!!M3!!!)Z!MEr13%r#[mj!!3+BfC[E!d"2`!
|
|
||||||
"E`!!!M)#0Imi#rmi!"3`!!KdC@e`F'&dD!!)G'9YF&"KG'J'rcX!!!)"-`!#!8!
|
|
||||||
"33d"3!!#E!!#!N3#42mhrcB"rcF!!!(r0J!!!J&"!!)"3J&$$3&#!!*b!!!#4!*
|
|
||||||
2!83"43d"4!!#BJ!!!N3#5`&'!8F0!8B!!@m!!!*%!NIr03[r03!N-!!3Bh*jF(4
|
|
||||||
[CQpXC'9bF'&dD!!3Bh*jF(4[4QpXC'9b8'&dD!d"4`!"E3!!!NF#5J&)$!&)!!X
|
|
||||||
!"6TMBA0d!!)!!!d"43!"E`!!!!!!!2md#rmd!"3`!!KdC@e`F'&dD!!)G'9YF&"
|
|
||||||
KG'J#!8-!!J&*!8S0!8N!!dN!!J*3!RVr-rmb!8X+rc-!'#jMEh*PBh*PE#SU+LS
|
|
||||||
!!!!!!!#3!!"ZG@aX!Imb!!!'!8X!!rma!8`"63Vr-3!%#QY[Bf`0!8`!!@d!!!*
|
|
||||||
8!PIr-!Vr-!!%#Q&XD@%'!8d!!rm[!8i"6`Vr,`!%#QPZFfJ0!8i!!M3!!!*D!Q,
|
|
||||||
r,J&3#[mZ!!3+BfC[E!d"8!!"E`!!!Pi#BImY#rmY!$3`!"K[F'9ZFh0XD@jME(9
|
|
||||||
NC@C[E'4PFR"KG'J!''p`C@j68da*EQ0XG@4P4QpXC'9b8'&dD!B"6`!$rb`"8Im
|
|
||||||
V#[mX!!3+G'mJ)!d"83!#EJ!!!Q8#G!&5!9-0!9)!!M3!!!*Y!R6r+J&8#[mU!!3
|
|
||||||
+CQPXC3d"9!!"E3!!!R!#F`&9$!&9!!`!"Q0KFh3ZD!!#!!!0!9-!!M3!!!*P!Qh
|
|
||||||
r+3&@#[mT!!3+BfC[E!d"9J!"E`!!!QN#E2mS#rmS!"3`!!KdC@e`F'&dD!!)G'9
|
|
||||||
YF&"KG'J'rbX!!!)"5J!#!9F"@!d"9`!#E!!#!RX#HrmRrbB"rbF!!!(r*J!!!J&
|
|
||||||
B!!)"@3&D$3&C!!*b!!!#H`+'!9X"A!d"@`!#BJ!!!RX#JJ&G!9i0!9d!!@m!!!*
|
|
||||||
l!Rlr*3[r*3!N-!!3Bh*jF(4[CQpXC'9bF'&dD!!3Bh*jF(4[4QpXC'9b8'&dD!d
|
|
||||||
"AJ!"E3!!!Ri#J3&I$!&I!!X!"6TMEfe`!!)!!!d"A!!"E`!!!!!!!2mN#rmN!"3
|
|
||||||
`!!KdC@e`F'&dD!!)G'9YF&"KG'J#!9S!!J&J!@%0!@!!!dN!!J+(!V(r)rmL!@)
|
|
||||||
+rb-!'#jMEh*PBh*PE#SU+LS!!!!!!!#3!!"ZG@aX!ImL!!!'!@)!!rmK!@-"C!V
|
|
||||||
r)3!%#QY[Bf`0!@-!!@d!!!+,!Slr)!Vr)!!%#Q&XD@%'!@3!!rmI!@8"CJVr(`!
|
|
||||||
%#QPZFfJ0!@8!!M3!!!+4!TRr(J&R#[mH!!3+BfC[E!d"C`!"E`!!!T8#Q2mG#rm
|
|
||||||
G!$3`!"K[F'9ZFh0XD@jME(9NC@C[E'4PFR"KG'J!''p`C@j68da*EQ0XG@4P4Qp
|
|
||||||
XC'9b8'&dD!B"CJ!$ra`"D2mE#[mF!!3+G'mJ)!d"D!!#EJ!!!T`#U`&T!@S0!@N
|
|
||||||
!!M3!!!+N!U[r'J&V#[mD!!3+CQPXC3d"D`!"E3!!!UF#UJ&X$!&X!!`!"Q0[EA!
|
|
||||||
ZD!!#!!!0!@S!!M3!!!+F!U6r'3&Y#[mC!!3+BfC[E!d"E3!"E`!!!U!#SrmB#rm
|
|
||||||
B!"3`!!KdC@e`F'&dD!!)G'9YF&"KG'J'raX!!!)"B3!#!@i"E`d"EJ!#E!!#!V)
|
|
||||||
#X[mAraB"raF!!!(r&J!!!J&[!!)"F!&a$3&`!!*b!!!#XJ+p!A)"F`d"FJ!#BJ!
|
|
||||||
!!V)#Z3&d!A80!A3!!@m!!!+b!VAr&3[r&3!N-!!3Bh*jF(4[CQpXC'9bF'&dD!!
|
|
||||||
3Bh*jF(4[4QpXC'9b8'&dD!d"G3!"E3!!!V8#Z!&f$!&f!!X!"6TMEfjQ!!)!!!d
|
|
||||||
"F`!"E`!!!!!!!2m8#rm8!"3`!!KdC@e`F'&dD!!)G'9YF&"KG'J#!A%!!J&h!AJ
|
|
||||||
0!AF!!dN!!J+q!ZMr%rm5!AN+ra-!'#jMEh*PBh*PE#SU+LS!!!!!!!#3!!"ZG@a
|
|
||||||
X!Im5!!!'!AN!!rm4!AS"H`Vr%3!%#QY[Bf`0!AS!!@d!!!,#!XAr%!Vr%!!%#Q&
|
|
||||||
XD@%'!AX!!rm2!A`"I3Vr$`!%#QPZFfJ0!A`!!M3!!!,)!Y$r$J&q#[m1!!3+BfC
|
|
||||||
[E!d"IJ!"E`!!!X`#crm0#rm0!$3`!"K[F'9ZFh0XD@jME(9NC@C[E'4PFR"KG'J
|
|
||||||
!''p`C@j68da*EQ0XG@4P4QpXC'9b8'&dD!B"I3!$r``"Irm,#[m-!!3+G'mJ)!d
|
|
||||||
"I`!#EJ!!!Y-#iJ'!!B%0!B!!!M3!!!,E!Z,r#J'##[m+!!3+CQPXC3d"JJ!"E3!
|
|
||||||
!!Yi#i3'$$!'$!!`!"Q0[EQBZD!!#!!!0!B%!!M3!!!,6!Y[r#3'%#[m*!!3+BfC
|
|
||||||
[E!d"K!!"E`!!!YF#f[m)#rm)!"3`!!KdC@e`F'&dD!!)G'9YF&"KG'J'r`X!!!)
|
|
||||||
"H!!#!B8"KJd"K3!#E!!#!ZN#kIm(r`B"r`F!!!(r"J!!!J''!!)"K`')$3'(!!*
|
|
||||||
b!!!#k3,d!BN"LJd"L3!#BJ!!!ZN#m!',!B`0!BX!!@m!!!,T!Zcr"3[r"3!N-!!
|
|
||||||
3Bh*jF(4[CQpXC'9bF'&dD!!3Bh*jF(4[4QpXC'9b8'&dD!d"M!!"E3!!!Z`#l`'
|
|
||||||
0$!'0!!S!"$TNCA-!!J!!$3'+!!&[!!!!!!!!r`3,r`3!&$!!#(4PEA"`BA4S!!K
|
|
||||||
dC@e`8'&dD!)"L!!#!Bi"M`d"MJ!$53!#![8$(rm$r`)"N!!+r`-!'#jMEh*PBh*
|
|
||||||
PE#SU+LS!!!!!!!#3!!"ZG@aX!Im#!!!'!C!!!!2r!3'4!C)+r`%!"!TVEf0X$3'
|
|
||||||
4!!&Y!!!#q3,mr`!+r`!!"!TKE'PK"J'5!!2qr`'6!C3+r[m!"!TTER0S$3'6!!)
|
|
||||||
d!!!#r`-(r[i"P3VqrJ!%#Q0QEf`0!C8!!@m!!!-$!`Eqr3[qr3!d-!!BEh"PER0
|
|
||||||
cE'PZBfaeC'9QEfaNCA*`BA4S!"K[F'9Z8e0-5@jME(9NC8C[E'4PFP"KG'J'!C3
|
|
||||||
!!rlm!CEqq`Vqr!!%#R4[)#!0!CB!!Qi!!!-+!aN"P`'B$3'A!!)d!!!$%J-Cr[S
|
|
||||||
"Q3VqqJ!%#QCTE'80!CN!!@d!!!-9!aJ"QJ`"QJ!,!!9NCA-ZD!!#!!!0!CJ!!M3
|
|
||||||
!!!-+!a,qq3'E#[lj!!3+BfC[E!d"Q`!"E`!!!`i$%Ili#rli!"3`!!KdC@e`F'&
|
|
||||||
dD!!)G'9YF&"KG'J'r[X!!!)"M`!#!C`"R3d"R!!#E!!#!b!$)2lhr[B"r[F!!!(
|
|
||||||
qpJ!!!J'G!!)"RJ'I$3'H!!*b!!!$)!-V!D!"S3d"S!!#BJ!!!b!$*`'L!D-0!D)
|
|
||||||
!!@m!!!-J!b2qp3[qp3!N-!!3Bh*jF(4[CQpXC'9bF'&dD!!3Bh*jF(4[4QpXC'9
|
|
||||||
b8'&dD!d"S`!"E3!!!b-$*J'N$!'N!!N!!cTND!!#!!!0!D%!!@m!!!!!!!$qp![
|
|
||||||
qp!!8-!!)G'9YF("KG'J!#(4PEA"3BA4S!J'I!!)"T3'Q$3'P!!0*!!)$,!0@r[2
|
|
||||||
qmJ'R#[lc!"JZBfpbC@0bC@`U+LSU!!!!!!!!N!!!ER9XE!(qmJ!!"J'R!!2qm3'
|
|
||||||
S!DN+r[%!"!TVEf0X$3'S!!&Y!!!$-!-cr[!+r[!!"!TKE'PK"J'T!!2ql`'U!DX
|
|
||||||
+rZm!"!TTER0S$3'U!!)d!!!$0J-qrZi"V!VqlJ!%#Q0QEf`0!D`!!@m!!!-k!ch
|
|
||||||
ql3[ql3!d-!!BEh"PER0cE'PZBfaeC'9QEfaNCA*`BA4S!"K[F'9Z8e0-5@jME(9
|
|
||||||
NC8C[E'4PFP"KG'J'!DX!!rlX!Dhqk`Vql!!%#R4[)#!0!Dd!!Qi!!!0"!e!"VJ'
|
|
||||||
[$3'Z!!)d!!!$5303rZS"X!VqkJ!%#QCTE'80!E!!!@d!!!0-!dm"X3`"X3!+!!4
|
|
||||||
ND#jS!!)!!!d"V`!#0!!!!d%$5IlT!E)+rZN!"!TMCQpX$3'b!!&[!!!$430)rZJ
|
|
||||||
,rZJ!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!Eqk`!!!J'Q!!)"X`'d$3'c!!*X!!)
|
|
||||||
$9`0ArZIqjJ(qj`!!!IlQ!!!#!E3!!J'e!EB0!E8!!R)!!!0A!f)"Y`'i$3'h!!*
|
|
||||||
L!!!$9`0H!EN"ZJd"Z3!"E`!!!eF$@[lP#rlP!#3`!""MFRP`G'pQEfaNCA*`BA4
|
|
||||||
S!""MFRP`G'p'EfaNCA*3BA4S$3'k!!&Y!!!$@J0G!EX-!EX!#J!%1Q4cB3!#!!!
|
|
||||||
0!EJ!!@m!!!!!!!$qj![qj!!8-!!)G'9YF("KG'J!#(4PEA"3BA4S!J'f!!)"[!'
|
|
||||||
p$3'm!!0*!!)$B`10rZ2qiJ'q#[lM!"JZBfpbC@0bC@`U+LSU!!!!!!!!N!!!ER9
|
|
||||||
XE!(qiJ!!"J'q!!2qi3'r!F!+rZ%!"!TVEf0X$3'r!!&Y!!!$C`0UrZ!+rZ!!"!T
|
|
||||||
KE'PK"J(!!!2qh`("!F)+rYm!"!TTER0S$3("!!)d!!!$E30erYi"``VqhJ!%#Q0
|
|
||||||
QEf`0!F-!!@m!!!0a!h6qh3[qh3!d-!!BEh"PER0cE'PZBfaeC'9QEfaNCA*`BA4
|
|
||||||
S!"K[F'9Z8e0-5@jME(9NC8C[E'4PFP"KG'J'!F)!!rlF!F6qf`Vqh!!%#R4[)#!
|
|
||||||
0!F3!!Qi!!!0i!iF"a3('$3(&!!)d!!!$J!1(rYS"a`VqfJ!%#QCTE'80!FF!!@d
|
|
||||||
!!!1$!iB"b!`"b!!,!!9NFf%ZD!!#!!!0!FB!!M3!!!0i!i$qf3(*#[lC!!3+BfC
|
|
||||||
[E!d"b3!"E`!!!h`$IrlB#rlB!"3`!!KdC@e`F'&dD!!)G'9YF&"KG'J'rYX!!!)
|
|
||||||
"[3!#!FS"b`d"bJ!#E!!#!ii$M[lArYB"rYF!!!(qeJ!!!J(,!!)"c!(0$3(-!!*
|
|
||||||
b!!!$MJ1C!Fi"c`d"cJ!#BJ!!!ii$P3(3!G%0!G!!!@m!!!11!j(qe3[qe3!N-!!
|
|
||||||
3Bh*jF(4[CQpXC'9bF'&dD!!3Bh*jF(4[4QpXC'9b8'&dD!d"d3!"E3!!!j%$P!(
|
|
||||||
5$!(5!!S!"$TPFR)!!J!!$3(2!!&[!!!!!!!!rY3,rY3!&$!!#(4PEA"`BA4S!!K
|
|
||||||
dC@e`8'&dD!)"c3!#!G-"e!d"d`!$53!#!jS$a2l6rY)"e3Vqd`!B,Q0[FQ9MFQ9
|
|
||||||
X+LSU+J!!!!!!!*!!!'jeE'`"rY)!!!B"e3!$rY%"eJ(A#[l4!!3+DfpME!d"eJ!
|
|
||||||
"E3!!!ji$SIl3#[l3!!3+B@aTB3B"e`!$rXm"f!(C#[l2!!3+D@jcD!d"f!!#0!!
|
|
||||||
!!k3$V2l1!GS+rXi!"!TMCQpX$3(D!!&[!!!$U!1VrXd,rXd!0$!!''p`C@jcFfa
|
|
||||||
TEQ0XG@4PCQpXC'9bF'&dD!!BEh"PEP066%PZBfaeC'9'EfaNCA*3BA4S"J(C!!2
|
|
||||||
qc!(ErXX+rX`!"!TdEb!J$3(E!!*Z!!!$V`1q!G`"h3d"h!!#0!!!!lF$[[l+!Gi
|
|
||||||
+rXS!"!TQD@aP$3(H!!&Y!!!$ZJ1p!Gm-!Gm!#`!&CA*b,QJ!!J!!$3(G!!)d!!!
|
|
||||||
$V`1hrXN"i!Vqb3!%#Q0QEf`0!H!!!@m!!!1c!lEqb![qb!!8-!!)G'9YF("KG'J
|
|
||||||
!#(4PEA"3BA4S"[l,!!!#!G3!!J(K!H)0!H%!!Q`!!J2&!mAqarl'!Il(!!!"rXB
|
|
||||||
!!!)"iJ!#!H-"j!d"i`!#FJ!!!m8$d!(P!HB0!H8!!Q)!!!2&!m`"j`(S$3(R!!&
|
|
||||||
[!!!$a32)rX8,rX8!*$!!%'0bHA"dEfC[E'4PFR"KG'J!%'0bHA"dEdC[E'4PFP"
|
|
||||||
KG'J0!HJ!!@d!!!2)!mX"k3`"k3!+!!3kCAC`!!)!!!d"jJ!"E`!!!!!!!2l%#rl
|
|
||||||
%!"3`!!KdC@e`F'&dD!!)G'9YF&"KG'J#!H3!!J(U!HX0!HS!!dN!!J24!r[q`rl
|
|
||||||
#!H`+rX-!'#jMEh*PBh*PE#SU+LS!!!!!!!#3!!"ZG@aX!Il#!!!'!H`!!rl"!Hd
|
|
||||||
"lJVq`3!%#QY[Bf`0!Hd!!@d!!!29!pMq`!Vq`!!%#Q&XD@%'!Hi!!rkr!Hm"m!V
|
|
||||||
q[`!%#QPZFfJ0!Hm!!M3!!!2E!q2q[J(a#[kq!!3+BfC[E!d"m3!"E`!!!pm$i[k
|
|
||||||
p#rkp!$3`!"K[F'9ZFh0XD@jME(9NC@C[E'4PFR"KG'J!''p`C@j68da*EQ0XG@4
|
|
||||||
P4QpXC'9b8'&dD!B"m!!$rV`"m[kl#[km!!3+G'mJ)!d"mJ!#EJ!!!qB$p3(c!I3
|
|
||||||
0!I-!!M3!!!2Z!rAqZJ(e#[kk!!3+CQPXC3d"p3!"E3!!!r%$p!(f$!(f!!X!"@9
|
|
||||||
fF#jS!!)!!!d"p!!#0!!!!qB$l[kj!IF+rVN!"!TMCQpX$3(h!!&[!!!$kJ2YrVJ
|
|
||||||
,rVJ!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!EqZ`!!!J(V!!)"q!(j$3(i!!*X!!)
|
|
||||||
$r!2mrVIqYJ(qY`!!!Ikf!!!#!IN!!J(k!IX0!IS!!R)!!!2m"!F"r!(p$3(m!!*
|
|
||||||
L!!!$r!3$!Ii"r`d"rJ!"E`!!!r`$rrke#rke!#3`!""MFRP`G'pQEfaNCA*`BA4
|
|
||||||
S!""MFRP`G'p'EfaNCA*3BA4S$3(r!!&Y!!!$r`3#!J!-!J!!#`!&1QKYB@-!!J!
|
|
||||||
!$3(p!!&[!!!!!!!!rV3,rV3!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!)"q`!#!J%
|
|
||||||
#!Jd#!3!$53!#"!J%-[kcrV)#!`VqX`!B,Q0[FQ9MFQ9X+LSU+J!!!!!!!*!!!'j
|
|
||||||
eE'`"rV)!!!B#!`!$rV%#"!)&#[ka!!3+DfpME!d#"!!"E3!!"!`%$rk`#[k`!!3
|
|
||||||
+B@aTB3B#"3!$rUm#"J)(#[k[!!3+D@jcD!d#"J!#0!!!"")%'[kZ!JJ+rUi!"!T
|
|
||||||
MCQpX$3))!!&[!!!%&J3CrUd,rUd!0$!!''p`C@jcFfaTEQ0XG@4PCQpXC'9bF'&
|
|
||||||
dD!!BEh"PEP066%PZBfaeC'9'EfaNCA*3BA4S"J)(!!2qV!)*rUX+rU`!"!TdEb!
|
|
||||||
J$3)*!!*Z!!!%(33X!JS##`d##J!#0!!!"#8%,2kU!J`+rUS!"!TQD@aP$3)-!!&
|
|
||||||
Y!!!%+!3V!Jd-!Jd!$!!'D'eKBbjS!!)!!!d##`!#0!!!""d%*IkT!Ji+rUN!"!T
|
|
||||||
MCQpX$3)1!!&[!!!%)33NrUJ,rUJ!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!EqU`!
|
|
||||||
!!J)#!!)#$`)3$3)2!!*X!!)%-`3crUIqTJ(qT`!!!IkQ!!!#!K!!!J)4!K)0!K%
|
|
||||||
!!R)!!!3c"$i#%`)8$3)6!!*L!!!%-`3k!K8#&Jd#&3!"E`!!"$-%0[kP#rkP!#3
|
|
||||||
`!""MFRP`G'pQEfaNCA*`BA4S!""MFRP`G'p'EfaNCA*3BA4S$3)@!!&Y!!!%0J3
|
|
||||||
j!KF-!KF!#`!&1QPNC@%!!J!!$3)8!!&[!!!!!!!!rU3,rU3!&$!!#(4PEA"`BA4
|
|
||||||
S!!KdC@e`8'&dD!)#%J!#!KJ#'3d#'!!$53!#"$m%DIkMrU)#'JVqS`!B,Q0[FQ9
|
|
||||||
MFQ9X+LSU+J!!!!!!!*!!!'jeE'`"rU)!!!B#'J!$rU%#'`)F#[kK!!3+DfpME!d
|
|
||||||
#'`!"E3!!"%-%4[kJ#[kJ!!3+B@aTB3B#(!!$rTm#(3)H#[kI!!3+D@jcD!d#(3!
|
|
||||||
#0!!!"%N%8IkH!Km+rTi!"!TMCQpX$3)I!!&[!!!%6343rTd,rTd!0$!!''p`C@j
|
|
||||||
cFfaTEQ0XG@4PCQpXC'9bF'&dD!!BEh"PEP066%PZBfaeC'9'EfaNCA*3BA4S"J)
|
|
||||||
H!!2qR!)JrTX+rT`!"!TdEb!J$3)J!!*Z!!!%9!4M!L%#)Jd#)3!#0!!!"&`%Brk
|
|
||||||
D!L-+rTS!"!TQD@aP$3)M!!&Y!!!%A`4L!L3-!L3!$!!'D@4PB5jS!!)!!!d#)J!
|
|
||||||
#0!!!"&3%A2kC!L8+rTN!"!TMCQpX$3)P!!&[!!!%@!4ErTJ,rTJ!&$!!#(4PEA"
|
|
||||||
`BA4S!!KdC@e`8'&dD!EqQ`!!!J)C!!)#*J)R$3)Q!!*X!!)%DJ4UrTIqPJ(qP`!
|
|
||||||
!!Ik@!!!#!LF!!J)S!LN0!LJ!!R)!!!4U"(8#+J)V$3)U!!*L!!!%DJ4a!L`#,3d
|
|
||||||
#,!!"E`!!"'S%EIk9#rk9!#3`!""MFRP`G'pQEfaNCA*`BA4S!""MFRP`G'p'Efa
|
|
||||||
NCA*3BA4S$3)Y!!&Y!!!%E34`!Li-!Li!$!!'1QaSBA0S!!)!!!d#+`!"E`!!!!!
|
|
||||||
!!2k8#rk8!"3`!!KdC@e`F'&dD!!)G'9YF&"KG'J#!LN!!J)[!M!0!Lm!!dN!!J4
|
|
||||||
f"+$qNrk5!M%+rT-!'#jMEh*PBh*PE#SU+LS!!!!!!!#3!!"ZG@aX!Ik5!!!'!M%
|
|
||||||
!!rk4!M)#-`VqN3!%#QY[Bf`0!M)!!@d!!!4k"(hqN!!+rT!!!!3+B@aTB3B#-`!
|
|
||||||
$rSm#0!)e#[k2!!3+D@jcD!d#0!!#0!!!")!%L2k1!MB+rSi!"!TMCQpX$3)f!!&
|
|
||||||
[!!!%K!5(rSd,rSd!0$!!''p`C@jcFfaTEQ0XG@4PCQpXC'9bF'&dD!!BEh"PEP0
|
|
||||||
66%PZBfaeC'9'EfaNCA*3BA4S"J)e!!2qM!)hrSX+rS`!"!TdEb!J$3)h!!*Z!!!
|
|
||||||
%L`5D!MJ#13d#1!!#0!!!"*-%Q[k+!MS+rSS!"!TQD@aP$3)k!!&Y!!!%PJ5C!MX
|
|
||||||
-!MX!$3!(E'KKFfJZD!!#!!!0!MN!!M3!!!5,"*2qL3)m#[k*!!3+BfC[E!d#2!!
|
|
||||||
"E`!!")m%N[k)#rk)!"3`!!KdC@e`F'&dD!!)G'9YF&"KG'J'rSX!!!)#-!!#!Md
|
|
||||||
#2Jd#23!#E!!#"+%%SIk(rSB"rSF!!!(qKJ!!!J)q!!)#2`*!$3)r!!*b!!!%S35
|
|
||||||
X!N%#3Jd#33!#BJ!!"+%%U!*$!N30!N-!!@m!!!5K"+6qK3[qK3!N-!!3Bh*jF(4
|
|
||||||
[CQpXC'9bF'&dD!!3Bh*jF(4[4QpXC'9b8'&dD!d#4!!"E3!!"+3%T`*&$!*&!!S
|
|
||||||
!"$TYC$)!!J!!$3*#!!&[!!!!!!!!rS3,rS3!&$!!#(4PEA"`BA4S!!KdC@e`8'&
|
|
||||||
dD!)#3!!#!NB#4`d#4J!$53!#"+d%erk$rS)#5!VqJ`!B,Q0[FQ9MFQ9X+LSU+J!
|
|
||||||
!!!!!!*!!!'jeE'`"rS)!!!B#5!!$rS%#53*+#[k"!!3+DfpME!d#53!"E3!!",%
|
|
||||||
%Y2k!#[k!!!3+B@aTB3B#5J!$rRm#5`*-#[jr!!3+D@jcD!d#5`!#0!!!",F%[rj
|
|
||||||
q!Nd+rRi!"!TMCQpX$3*0!!&[!!!%Z`5qrRd,rRd!0$!!''p`C@jcFfaTEQ0XG@4
|
|
||||||
PCQpXC'9bF'&dD!!BEh"PEP066%PZBfaeC'9'EfaNCA*3BA4S"J*-!!2qI!*1rRX
|
|
||||||
+rR`!"!TdEb!J$3*1!!*Z!!!%`J64!Nm#8!d#6`!#0!!!"-S%dIjk!P%+rRS!"!T
|
|
||||||
QD@aP$3*4!!&Y!!!%c363!P)-!P)!#`!&E@3b,QJ!!J!!$3*3!!)d!!!%`J6+rRN
|
|
||||||
#8`VqH3!%#Q0QEf`0!P-!!@m!!!6'"-RqH![qH!!8-!!)G'9YF("KG'J!#(4PEA"
|
|
||||||
3BA4S"[jl!!!#!NF!!J*8!P80!P3!!Q`!!J6B"0MqGrjf!Ijh!!!"rRB!!!)#93!
|
|
||||||
#!PB#9`d#9J!#FJ!!"0J%i`*B!PN0!PJ!!Q)!!!6B"0m#@J*E$3*D!!&[!!!%f!6
|
|
||||||
ErR8,rR8!*$!!%'0bHA"dEfC[E'4PFR"KG'J!%'0bHA"dEdC[E'4PFP"KG'J0!PX
|
|
||||||
!!@d!!!6E"0i#A!`#A!!+!!3kE@3e!!)!!!d#@3!"E`!!!!!!!2jd#rjd!"3`!!K
|
|
||||||
dC@e`F'&dD!!)G'9YF&"KG'J#!PF!!J*G!Pi0!Pd!!dN!!J6N"3lqFrjb!Pm+rR-
|
|
||||||
!'#jMEh*PBh*PE#SU+LS!!!!!!!#3!!"ZG@aX!Ijb!!!'!Pm!!rja!Q!#B3VqF3!
|
|
||||||
%#QY[Bf`0!Q!!!@d!!!6S"1[qF!VqF!!%#Q&XD@%'!Q%!!rj[!Q)#B`VqE`!%#QP
|
|
||||||
ZFfJ0!Q)!!M3!!!6Z"2EqEJ*N#[jZ!!3+BfC[E!d#C!!"E`!!"2)%pIjY#rjY!$3
|
|
||||||
`!"K[F'9ZFh0XD@jME(9NC@C[E'4PFR"KG'J!''p`C@j68da*EQ0XG@4P4QpXC'9
|
|
||||||
b8'&dD!B#B`!$rQ`#CIjV#[jX!!3+G'mJ)!d#C3!#EJ!!"2N&#!*Q!QF0!QB!!M3
|
|
||||||
!!!8""3MqDJ*S#[jU!!3+CQPXC3d#D!!"E3!!"33&"`*T$!*T!!X!"@eN05jS!!)
|
|
||||||
!!!d#C`!#0!!!"2N&!IjT!QS+rQN!"!TMCQpX$3*U!!&[!!!%r38!rQJ,rQJ!&$!
|
|
||||||
!#(4PEA"`BA4S!!KdC@e`8'&dD!EqD`!!!J*H!!)#D`*X$3*V!!*X!!)&$`82rQI
|
|
||||||
qCJ(qC`!!!IjQ!!!#!Q`!!J*Y!Qi0!Qd!!R)!!!82"4S#E`*`$3*[!!*L!!!&$`8
|
|
||||||
@!R%#FJd#F3!"E`!!"3m&%[jP#rjP!#3`!""MFRP`G'pQEfaNCA*`BA4S!""MFRP
|
|
||||||
`G'p'EfaNCA*3BA4S$3*b!!&Y!!!&%J89!R--!R-!#`!&1QeNBc)!!J!!$3*`!!&
|
|
||||||
[!!!!!!!!rQ3,rQ3!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!)#EJ!#!R3#G3d#G!!
|
|
||||||
$53!#"4X&4IjMrQ)#GJVqB`!B,Q0[FQ9MFQ9X+LSU+J!!!!!!!*!!!'jeE'`"rQ)
|
|
||||||
!!!B#GJ!$rQ%#G`*i#[jK!!3+DfpME!d#G`!"E3!!"4m&)[jJ#[jJ!!3+B@aTB3B
|
|
||||||
#H!!$rPm#H3*k#[jI!!3+D@jcD!d#H3!#0!!!"58&,IjH!RX+rPi!"!TMCQpX$3*
|
|
||||||
l!!&[!!!&+38XrPd,rPd!0$!!''p`C@jcFfaTEQ0XG@4PCQpXC'9bF'&dD!!BEh"
|
|
||||||
PEP066%PZBfaeC'9'EfaNCA*3BA4S"J*k!!2qA!*mrPX+rP`!"!TdEb!J$3*m!!*
|
|
||||||
Z!!!&-!8r!Rd#IJd#I3!#0!!!"6J&2rjD!Rm+rPS!"!TQD@aP$3*r!!&Y!!!&1`8
|
|
||||||
q!S!-!S!!$!!'E@4M-LjS!!)!!!d#IJ!#0!!!"6!&12jC!S%+rPN!"!TMCQpX$3+
|
|
||||||
"!!&[!!!&0!8hrPJ,rPJ!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!Eq@`!!!J*e!!)
|
|
||||||
#JJ+$$3+#!!*X!!)&4J9'rPIq9J(q9`!!!Ij@!!!#!S-!!J+%!S80!S3!!R)!!!9
|
|
||||||
'"9%#KJ+($3+'!!*L!!!&4J90!SJ#L3d#L!!"E`!!"8B&5Ij9#rj9!#3`!""MFRP
|
|
||||||
`G'pQEfaNCA*`BA4S!""MFRP`G'p'EfaNCA*3BA4S$3+*!!&Y!!!&539-!SS-!SS
|
|
||||||
!$J!)1QpLDQ9MG(-!!J!!$3+(!!&[!!!!!!!!rP3,rP3!&$!!#(4PEA"`BA4S!!K
|
|
||||||
dC@e`8'&dD!)#K3!#!SX#M!d#L`!$53!#"9)&I2j6rP)#M3Vq8`!B,Q0[FQ9MFQ9
|
|
||||||
X+LSU+J!!!!!!!*!!!'jeE'`"rP)!!!B#M3!$rP%#MJ+2#[j4!!3+DfpME!d#MJ!
|
|
||||||
"E3!!"9B&@Ij3#[j3!!3+B@aTB3B#M`!$rNm#N!!#N3Vq6`!%#QPZFfJ0!T!!!!)
|
|
||||||
d!!!&A!9NrNi#NJVq6J!%#Q0QEf`0!T)!!@m!!!9J"@2q63[q63!d-!!BEh"PER0
|
|
||||||
cE'PZBfaeC'9QEfaNCA*`BA4S!"K[F'9Z8e0-5@jME(9NC8C[E'4PFP"KG'J'!T%
|
|
||||||
!!rj-!T2q5`Vq6!!%#R4[)#!0!T-!!Qi!!!9R"AB#P!+9$3+8!!)d!!!&E`9frNS
|
|
||||||
#PJVq5J!%#QCTE'80!TB!!@d!!!9b"A8#P``#P`!2!!P[BQTPBh4c,QJ!!J!!$3+
|
|
||||||
9!!)d!!!&C`9[rNN#Q!Vq53!%#Q0QEf`0!TJ!!@m!!!9V"@lq5![q5!!8-!!)G'9
|
|
||||||
YF("KG'J!#(4PEA"3BA4S"[j,!!!#!S`!!J+C!TS0!TN!!Q`!!J9p"Ahq4rj'!Ij
|
|
||||||
(!!!"rNB!!!)#QJ!#!TX#R!d#Q`!#FJ!!"Ad&L!+G!Ti0!Td!!Q)!!!9p"B3#R`+
|
|
||||||
J$3+I!!&[!!!&I3@!rN8,rN8!*$!!%'0bHA"dEfC[E'4PFR"KG'J!%'0bHA"dEdC
|
|
||||||
[E'4PFP"KG'J0!U!!!@d!!!@!"B-#S3`#S3!+!!3kF'9Y!!)!!!d#RJ!"E`!!!!!
|
|
||||||
!!2j%#rj%!"3`!!KdC@e`F'&dD!!)G'9YF&"KG'J#!T`!!J+L!U-0!U)!!dN!!J@
|
|
||||||
*"E2q3rj#!U3+rN-!'#jMEh*PBh*PE#SU+LS!!!!!!!#3!!"ZG@aX!Ij#!!!'!U3
|
|
||||||
!!rj"!U8#TJVq33!%#QY[Bf`0!U8!!@d!!!@0"C!!rN!+rN!!"!TKE'PK"J+Q!!2
|
|
||||||
q2`+R!UJ+rMm!"!TTER0S$3+R!!)d!!!&N`@ErMi#U3Vq2J!%#Q0QEf`0!UN!!@m
|
|
||||||
!!!@A"CVq23[q23!d-!!BEh"PER0cE'PZBfaeC'9QEfaNCA*`BA4S!"K[F'9Z8e0
|
|
||||||
-5@jME(9NC8C[E'4PFP"KG'J'!UJ!!rim!UVq1`Vq2!!%#R4[)#!0!US!!Qi!!!@
|
|
||||||
H"Dd#U`+X$3+V!!)d!!!&TJ@YrMS#V3Vq1J!%#QCTE'80!Ud!!@d!!!@T"D`#VJ`
|
|
||||||
#VJ!,!!9`C@dZD!!#!!!0!U`!!M3!!!@H"DEq13+[#[ij!!3+BfC[E!d#V`!"E`!
|
|
||||||
!"D)&TIii#rii!"3`!!KdC@e`F'&dD!!)G'9YF&"KG'J'rMX!!!)#S`!#!V!#X3d
|
|
||||||
#X!!$53!#"E3&h[ihrMB#XJVq0`!B,Q0[FQ9MFQ9X+LSU+J!!!!!!!*!!!'jeE'`
|
|
||||||
"rMB!!!B#XJ!$rM8#X`+d#[ie!!3+DfpME!d#X`!"E3!!"EJ&Zrid#[id!!3+B@a
|
|
||||||
TB3B#Y!!$rM-#Y3+f#[ic!!3+D@jcD!d#Y3!#0!!!"Ei&a[ib!VF+rM)!"!TMCQp
|
|
||||||
X$3+h!!&[!!!&`JA&rM%,rM%!0$!!''p`C@jcFfaTEQ0XG@4PCQpXC'9bF'&dD!!
|
|
||||||
BEh"PEP066%PZBfaeC'9'EfaNCA*3BA4S"J+f!!2q-!+irLm+rM!!"!TdEb!J$3+
|
|
||||||
i!!*Z!!!&b3AB!VN#ZJd#Z3!#0!!!"G%&f2iZ!VX+rLi!"!TQD@aP$3+l!!&Y!!!
|
|
||||||
&e!AA!V`-!V`!$!!'F'9Y-LjS!!)!!!d#ZJ!#0!!!"FN&dIiY!Vd+rLd!"!TMCQp
|
|
||||||
X$3+p!!&[!!!&c3A3rL`,rL`!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!Eq,`!!!J+
|
|
||||||
a!!)#[J+r$3+q!!*X!!)&h`AIrL[q+J(q+`!!!IiU!!!#!Vm!!J,!!X%0!X!!!R)
|
|
||||||
!!!AI"HS#`J,$$3,#!!*L!!!&h`AQ!X3#a3d#a!!"E`!!"Gm&i[iT#riT!#3`!""
|
|
||||||
MFRP`G'pQEfaNCA*`BA4S!""MFRP`G'p'EfaNCA*3BA4S$3,&!!&Y!!!&iJAP!XB
|
|
||||||
-!XB!$3!(1R"VBh-a-J!#!!!0!X-!!@m!!!!!!!$q+![q+!!8-!!)G'9YF("KG'J
|
|
||||||
!#(4PEA"3BA4S!J,"!!)#a`,)$3,(!!0*!!)&k`B9rLIq*J,*#[iR!"JZBfpbC@0
|
|
||||||
bC@`U+LSU!!!!!!!!N!!!ER9XE!(q*J!!"J,*!!2q*3,+!XX+rL8!"!TVEf0X$3,
|
|
||||||
+!!&Y!!!&l`AbrL3+rL3!"!TKE'PK"J,,!!2q)`,-!Xd+rL-!"!TTER0S$3,-!!)
|
|
||||||
d!!!&p3AprL)#cJVq)J!%#Q0QEf`0!Xi!!@m!!!Aj"Icq)3[q)3!d-!!BEh"PER0
|
|
||||||
cE'PZBfaeC'9QEfaNCA*`BA4S!"K[F'9Z8e0-5@jME(9NC8C[E'4PFP"KG'J'!Xd
|
|
||||||
!!riJ!Xrq(`Vq)!!%#R4[)#!0!Xm!!Qi!!!B!"Jm#d!,4$3,3!!)d!!!'#!B2rKi
|
|
||||||
#dJVq(J!%#QCTE'80!Y)!!@d!!!B,"Ji#d``#d`!1!!K`Df0c-6)ZD!!#!!!0!Y%
|
|
||||||
!!M3!!!B!"JMq(3,8#[iG!!3+BfC[E!d#e!!"E`!!"J3'"riF#riF!"3`!!KdC@e
|
|
||||||
`F'&dD!!)G'9YF&"KG'J'rKm!!!)#b!!#!Y8#eJd#e3!#E!!#"KB'&[iErKS"rKX
|
|
||||||
!!!(q'J!!!J,@!!)#e`,B$3,A!!*b!!!'&JBK!YN#fJd#f3!#BJ!!"KB'(3,E!Y`
|
|
||||||
0!YX!!@m!!!B@"KRq'3[q'3!N-!!3Bh*jF(4[CQpXC'9bF'&dD!!3Bh*jF(4[4Qp
|
|
||||||
XC'9b8'&dD!d#h!!"E3!!"KN'(!,G$!,G!!`!"MT`Df0c0`!#!!!0!YS!!@m!!!!
|
|
||||||
!!!$q'![q'!!8-!!)G'9YF("KG'J!#(4PEA"3BA4S!J,B!!)#hJ,I$3,H!!0*!!)
|
|
||||||
')JC-rKIq&J,J#[iA!"JZBfpbC@0bC@`U+LSU!!!!!!!!N!!!ER9XE!(q&J!!"J,
|
|
||||||
J!!2q&3,K!Z)+rK8!"!TVEf0X$3,K!!&Y!!!'*JBTrK3+rK3!"!TKE'PK"J,L!!2
|
|
||||||
q%`,M!Z3+rK-!"!TTER0S$3,M!!)d!!!',!BdrK)#j3Vq%J!%#Q0QEf`0!Z8!!@m
|
|
||||||
!!!B`"M2q%3[q%3!d-!!BEh"PER0cE'PZBfaeC'9QEfaNCA*`BA4S!"K[F'9Z8e0
|
|
||||||
-5@jME(9NC8C[E'4PFP"KG'J'!Z3!!ri3!ZEq$`Vq%!!%#R4[)#!0!ZB!!Qi!!!B
|
|
||||||
h"NB#j`,S$3,R!!)d!!!'2`C'rJi#k3Vq$J!%#QCTE'80!ZN!!@d!!!C#"N8#kJ`
|
|
||||||
#kJ!0!!G`Df0c0bjS!!)!!!d#k!!#0!!!"MF'2ri0!ZX+rJd!"!TMCQpX$3,V!!&
|
|
||||||
[!!!'1`BqrJ`,rJ`!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!Eq$`!!!J,I!!)#l!,
|
|
||||||
Y$3,X!!*X!!)'63C0rJ[q#J(q#`!!!Ii+!!!#!Zd!!J,Z!Zm0!Zi!!R)!!!C0"PJ
|
|
||||||
#m!,a$3,`!!*L!!!'63C8![)#m`d#mJ!"E`!!"Nd'82i*#ri*!#3`!""MFRP`G'p
|
|
||||||
QEfaNCA*`BA4S!""MFRP`G'p'EfaNCA*3BA4S$3,c!!&Y!!!'8!C6![3-![3!#`!
|
|
||||||
&1R*KEQ3!!J!!$3,a!!&[!!!!!!!!rJJ,rJJ!&$!!#(4PEA"`BA4S!!KdC@e`8'&
|
|
||||||
dD!)#l`!#![8#pJd#p3!$53!#"PN'Jri(rJB#p`Vq"`!B,Q0[FQ9MFQ9X+LSU+J!
|
|
||||||
!!!!!!*!!!'jeE'`"rJB!!!B#p`!$rJ8#q!,j#[i&!!3+DfpME!d#q!!"E3!!"Pd
|
|
||||||
'B2i%#[i%!!3+B@aTB3B#q3!$rJ-#qJ,l#[i$!!3+D@jcD!d#qJ!#0!!!"Q-'Dri
|
|
||||||
#![`+rJ)!"!TMCQpX$3,m!!&[!!!'C`CUrJ%,rJ%!0$!!''p`C@jcFfaTEQ0XG@4
|
|
||||||
PCQpXC'9bF'&dD!!BEh"PEP066%PZBfaeC'9'EfaNCA*3BA4S"J,l!!2q!!,prIm
|
|
||||||
+rJ!!"!TdEb!J$3,p!!*Z!!!'EJCp![i#r`d#rJ!#0!!!"RB'IIhq!`!+rIi!"!T
|
|
||||||
QD@aP$3-!!!&Y!!!'H3Cm!`%-!`%!$!!'FQ&ZC#jS!!)!!!d#r`!#0!!!"Qi'G[h
|
|
||||||
p!`)+rId!"!TMCQpX$3-#!!&[!!!'FJCerI`,rI`!&$!!#(4PEA"`BA4S!!KdC@e
|
|
||||||
`8'&dD!Epr`!!!J,f!!)$!`-%$3-$!!*X!!)'K!D%rI[pqJ(pq`!!!Ihk!!!#!`3
|
|
||||||
!!J-&!`B0!`8!!R)!!!D%"Sm$"`-)$3-(!!*L!!!'K!D,!`N$#Jd$#3!"E`!!"S3
|
|
||||||
'Krhj#rhj!#3`!""MFRP`G'pQEfaNCA*`BA4S!""MFRP`G'p'EfaNCA*3BA4S$3-
|
|
||||||
+!!&Y!!!'K`D+!`X-!`X!#J!%1R*M-J!#!!!0!`J!!@m!!!!!!!$pq![pq!!8-!!
|
|
||||||
)G'9YF("KG'J!#(4PEA"3BA4S!J-'!!)$$!-0$3--!!0*!!)'N!!'Z[hhrIB$$JV
|
|
||||||
pp`!B,Q0[FQ9MFQ9X+LSU+J!!!!!!!*!!!'jeE'`"rIB!!!B$$J!$rI8$$`-3#[h
|
|
||||||
e!!3+DfpME!d$$`!"E3!!"T3'Prhd#[hd!!3+B@aTB3B$%!!$rI-$%3-5#[hc!!3
|
|
||||||
+D@jcD!d$%3!#0!!!"TS'S[hb!a-+rI)!"!TMCQpX$3-6!!&[!!!'RJDKrI%,rI%
|
|
||||||
!0$!!''p`C@jcFfaTEQ0XG@4PCQpXC'9bF'&dD!!BEh"PEP066%PZBfaeC'9'Efa
|
|
||||||
NCA*3BA4S"J-5!!2pm!-8rHm+rI!!"!TdEb!J$3-8!!*Z!!!'T3Dd!a8$&Jd$&3!
|
|
||||||
#0!!!"Ud'Y2hZ!aF+rHi!"!TQD@aP$3-A!!&Y!!!'X!Dc!aJ-!aJ!#`!&FQ-b,QJ
|
|
||||||
!!J!!$3-@!!)d!!!'T3DYrHd$'3Vpl3!%#Q0QEf`0!aN!!@m!!!DT"Ucpl![pl!!
|
|
||||||
8-!!)G'9YF("KG'J!#(4PEA"3BA4S"[h[!!!#!`d!!J-D!aX0!aS!!Q`!!JDl"V[
|
|
||||||
pkrhU!IhV!!!"rHS!!!)$'`!#!a`$(3d$(!!#FJ!!"VX'aJ-H!am0!ai!!Q)!!!D
|
|
||||||
l"X)$)!-K$3-J!!&[!!!'Z`DqrHN,rHN!*$!!%'0bHA"dEfC[E'4PFR"KG'J!%'0
|
|
||||||
bHA"dEdC[E'4PFP"KG'J0!b%!!@d!!!Dq"X%$)J`$)J!+!!3kFQ-d!!)!!!d$(`!
|
|
||||||
"E`!!!!!!!2hS#rhS!"3`!!KdC@e`F'&dD!!)G'9YF&"KG'J#!ad!!J-M!b30!b-
|
|
||||||
!!dN!!JE("[(pjrhQ!b8+rHF!'#jMEh*PBh*PE#SU+LS!!!!!!!#3!!"ZG@aX!Ih
|
|
||||||
Q!!!'!b8!!rhP!bB$*`Vpj3!%#QY[Bf`0!bB!!@d!!!E,"Xlpj!Vpj!!%#Q&XD@%
|
|
||||||
'!bF!!rhM!bJ$+3Vpi`!%#QPZFfJ0!bJ!!M3!!!E4"YRpiJ-U#[hL!!3+BfC[E!d
|
|
||||||
$+J!"E`!!"Y8'f2hK#rhK!$3`!"K[F'9ZFh0XD@jME(9NC@C[E'4PFR"KG'J!''p
|
|
||||||
`C@j68da*EQ0XG@4P4QpXC'9b8'&dD!B$+3!$rH!$+rhI#[hJ!!3+G'mJ)!d$+`!
|
|
||||||
#EJ!!"Y`'k`-X!bd0!b`!!M3!!!EN"Z[phJ-Z#[hH!!3+CQPXC3d$,J!"E3!!"ZF
|
|
||||||
'kJ-[$!-[!!X!"A*M0#jS!!)!!!d$,3!#0!!!"Y`'j2hG!c!+rGd!"!TMCQpX$3-
|
|
||||||
`!!&[!!!'i!EMrG`,rG`!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!Eph`!!!J-N!!)
|
|
||||||
$-3-b$3-a!!*X!!)'mJEbrG[pfJ(pf`!!!IhD!!!#!c)!!J-c!c30!c-!!R)!!!E
|
|
||||||
b"[d$03-f$3-e!!*L!!!'mJEj!cF$1!d$0`!"E`!!"[)'pIhC#rhC!#3`!""MFRP
|
|
||||||
`G'pQEfaNCA*`BA4S!""MFRP`G'p'EfaNCA*3BA4S$3-i!!&Y!!!'p3Ei!cN-!cN
|
|
||||||
!#J!%1R*M03!#!!!0!cB!!@m!!!!!!!$pf![pf!!8-!!)G'9YF("KG'J!#(4PEA"
|
|
||||||
3BA4S!J-d!!)$1J-l$3-k!!0*!!)'rJFSrGIpeJ-m#[hA!"JZBfpbC@0bC@`U+LS
|
|
||||||
U!!!!!!!!N!!!ER9XE!(peJ!!"J-m!!2pe3-p!ci+rG8!"!TVEf0X$3-p!!&Y!!!
|
|
||||||
(!JF&rG3+rG3!"!TKE'PK"J-q!!2pd`-r!d!+rG-!"!TTER0S$3-r!!)d!!!(#!F
|
|
||||||
3rG)$33VpdJ!%#Q0QEf`0!d%!!@m!!!F-"`rpd3[pd3!d-!!BEh"PER0cE'PZBfa
|
|
||||||
eC'9QEfaNCA*`BA4S!"K[F'9Z8e0-5@jME(9NC8C[E'4PFP"KG'J'!d!!!rh3!d,
|
|
||||||
pc`Vpd!!%#R4[)#!0!d)!!Qi!!!F6"b)$3`0%$30$!!)d!!!('`FLrFi$43VpcJ!
|
|
||||||
%#QCTE'80!d8!!@d!!!FH"b%$4J`$4J!,!!9bBc8ZD!!#!!!0!d3!!M3!!!F6"a[
|
|
||||||
pc30(#[h0!!3+BfC[E!d$4`!"E`!!"aF('[h-#rh-!"3`!!KdC@e`F'&dD!!)G'9
|
|
||||||
YF&"KG'J'rFm!!!)$1`!#!dJ$53d$5!!#E!!#"bN(+Ih,rFS"rFX!!!(pbJ!!!J0
|
|
||||||
*!!)$5J0,$30+!!*b!!!(+3Fd!d`$63d$6!!#BJ!!"bN(-!01!dm0!di!!@m!!!F
|
|
||||||
T"bcpb3[pb3!N-!!3Bh*jF(4[CQpXC'9bF'&dD!!3Bh*jF(4[4QpXC'9b8'&dD!d
|
|
||||||
$6`!"E3!!"b`(,`03$!03!!d!"cTbDA"PE@3!!J!!$300!!&[!!!!!!!!rFJ,rFJ
|
|
||||||
!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!)$5`!#!e%$8Jd$83!$53!#"c8(Arh(rFB
|
|
||||||
$8`Vpa`!B,Q0[FQ9MFQ9X+LSU+J!!!!!!!*!!!'jeE'`"rFB!!!B$8`!$rF8$9!0
|
|
||||||
9#[h&!!3+DfpME!d$9!!"E3!!"cN(22h%#[h%!!3+B@aTB3B$93!$rF-$9J0A#[h
|
|
||||||
$!!3+D@jcD!d$9J!#0!!!"cm(4rh#!eJ+rF)!"!TMCQpX$30B!!&[!!!(3`G'rF%
|
|
||||||
,rF%!0$!!''p`C@jcFfaTEQ0XG@4PCQpXC'9bF'&dD!!BEh"PEP066%PZBfaeC'9
|
|
||||||
'EfaNCA*3BA4S"J0A!!2p`!0CrEm+rF!!"!TdEb!J$30C!!*Z!!!(5JGC!eS$@`d
|
|
||||||
$@J!#0!!!"e)(@Ifq!e`+rEi!"!TQD@aP$30F!!&Y!!!(93GB!ed-!ed!$J!)FQP
|
|
||||||
`C@eN,QJ!!J!!$30E!!)d!!!(5JG5rEd$AJVp[3!%#Q0QEf`0!ei!!@m!!!G1"e(
|
|
||||||
p[![p[!!8-!!)G'9YF("KG'J!#(4PEA"3BA4S"[fr!!!#!e)!!J0I!f!0!em!!Q`
|
|
||||||
!!JGJ"f$pZrfk!Ifl!!!"rES!!!)$B!!#!f%$BJd$B3!#FJ!!"f!(D`0M!f30!f-
|
|
||||||
!!Q)!!!GJ"fF$C30Q$30P!!&[!!!(B!GMrEN,rEN!*$!!%'0bHA"dEfC[E'4PFR"
|
|
||||||
KG'J!%'0bHA"dEdC[E'4PFP"KG'J0!fB!!@d!!!GM"fB$C``$C`!+!!3kFR0K!!)
|
|
||||||
!!!d$C!!"E`!!!!!!!2fi#rfi!"3`!!KdC@e`F'&dD!!)G'9YF&"KG'J#!f)!!J0
|
|
||||||
S!fN0!fJ!!dN!!JGX"jEpYrff!fS+rEF!'#jMEh*PBh*PE#SU+LS!!!!!!!#3!!"
|
|
||||||
ZG@aX!Iff!!!'!fS!!rfe!fX$E!VpY3!%#QY[Bf`0!fX!!@d!!!G`"h2pY!VpY!!
|
|
||||||
%#Q&XD@%'!f`!!rfc!fd$EJVpX`!%#QPZFfJ0!fd!!M3!!!Gf"hlpXJ0[#[fb!!3
|
|
||||||
+BfC[E!d$E`!"E`!!"hS(IIfa#rfa!$3`!"K[F'9ZFh0XD@jME(9NC@C[E'4PFR"
|
|
||||||
KG'J!''p`C@j68da*EQ0XG@4P4QpXC'9b8'&dD!B$EJ!$rE!$F2f[#[f`!!3+G'm
|
|
||||||
J)!d$F!!#EJ!!"i%(N!!$F30b$30a!!)d!!!(L3H3!2fZ!h-+rDi!"!TQD@aP$30
|
|
||||||
c!!&Y!!!(M!H2!h3-!h3!#`!&FR0K,QJ!!J!!$30b!!)d!!!(J3H*rDd$G3VpV3!
|
|
||||||
%#Q0QEf`0!h8!!@m!!!H&"iMpV![pV!!8-!!)G'9YF("KG'J!#(4PEA"3BA4S"[f
|
|
||||||
[!!!#!fN!!J0f!hF0!hB!!Q`!!JHA"jIpUrfU!IfV!!!"rDS!!!)$G`!#!hJ$H3d
|
|
||||||
$H!!#FJ!!"jF(SJ0k!hX0!hS!!Q)!!!HA"ji$I!0p$30m!!&[!!!(P`HDrDN,rDN
|
|
||||||
!*$!!%'0bHA"dEfC[E'4PFR"KG'J!%'0bHA"dEdC[E'4PFP"KG'J0!hd!!@d!!!H
|
|
||||||
D"jd$IJ`$IJ!-!!BkFh4KBfX!!J!!$30l!!&[!!!!!!!!rDJ,rDJ!&$!!#(4PEA"
|
|
||||||
`BA4S!!KdC@e`8'&dD!)$H3!#!hm$J!d$I`!$53!#"k-(cIfRrDB$J3VpT`!B,Q0
|
|
||||||
[FQ9MFQ9X+LSU+J!!!!!!!*!!!'jeE'`"rDB!!!B$J3!$rD8$JJ1$#[fP!!3+Dfp
|
|
||||||
ME!d$JJ!"E3!!"kF(U[fN#[fN!!3+B@aTB3B$J`!$rD-$K!1&#[fM!!3+D@jcD!d
|
|
||||||
$K!!#0!!!"kd(YIfL!iB+rD)!"!TMCQpX$31'!!&[!!!(X3HdrD%,rD%!0$!!''p
|
|
||||||
`C@jcFfaTEQ0XG@4PCQpXC'9bF'&dD!!BEh"PEP066%PZBfaeC'9'EfaNCA*3BA4
|
|
||||||
S"J1&!!2pS!1(rCm+rD!!"!TdEb!J$31(!!*Z!!!(Z!I(!iJ$L3d$L!!#0!!!"m!
|
|
||||||
(arfH!iS+rCi!"!TQD@aP$31+!!&Y!!!(``I'!iX-!iX!$3!(Fh4KBfXZD!!#!!!
|
|
||||||
0!iN!!M3!!!Hi"m$pR31-#[fG!!3+BfC[E!d$M!!"E`!!"l`([rfF#rfF!"3`!!K
|
|
||||||
dC@e`F'&dD!!)G'9YF&"KG'J'rCm!!!)$J!!#!id$MJd$M3!$53!#"mi(q2fErCS
|
|
||||||
$M`VpQ`!B,Q0[FQ9MFQ9X+LSU+J!!!!!!!*!!!'jeE'`"rCS!!!B$M`!$rCN$N!!
|
|
||||||
$N3VpQ3!%#QY[Bf`0!j!!!!&Y!!!(dJI9rCJ+rCJ!"!TKE'PK"J14!!2pP`15!j-
|
|
||||||
+rCF!"!TTER0S$315!!)d!!!(f!IJrCB$P!VpPJ!%#Q0QEf`0!j3!!@m!!!IF"pr
|
|
||||||
pP3[pP3!d-!!BEh"PER0cE'PZBfaeC'9QEfaNCA*`BA4S!"K[F'9Z8e0-5@jME(9
|
|
||||||
NC8C[E'4PFP"KG'J'!j-!!rf8!jApN`VpP!!%#R4[)#!0!j8!!Qi!!!IM"r)$PJ1
|
|
||||||
A$31@!!)d!!!(k`IbrC)$Q!VpNJ!%#QCTE'80!jJ!!@d!!!IZ"r%$Q3`$Q3!4!!Y
|
|
||||||
cB@CPFh4KBfXZD!!#!!!0!jF!!M3!!!IM"q[pN31D#[f4!!3+BfC[E!d$QJ!"E`!
|
|
||||||
!"qF(k[f3!![pN!!!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!EpN`!!!J11!!)$Q`1
|
|
||||||
F$31E!!*X!!)(q3IjrBrpMJ(pM`!!!If1!!!#!j`!!J1G!ji0!jd!!R)!!!Ij#!3
|
|
||||||
$R`1J$31I!!*L!!!(q3J!!k%$SJd$S3!"E`!!"rN(r2f0#rf0!#3`!""MFRP`G'p
|
|
||||||
QEfaNCA*`BA4S!""MFRP`G'p'EfaNCA*3BA4S$31L!!&Y!!!(r!Ir!k--!k-!#J!
|
|
||||||
%1R0SB3!#!!!0!k!!!@m!!!!!!!$pM![pM!!8-!!)G'9YF("KG'J!#(4PEA"3BA4
|
|
||||||
S!J1H!!)$T!1P$31N!!0*!!))"3J[rB[pLJ1Q#[f,!"JZBfpbC@0bC@`U+LSU!!!
|
|
||||||
!!!!!N!!!ER9XE!(pLJ!!"J1Q!!2pL31R!kJ+rBN!"!TVEf0X$31R!!&Y!!!)#3J
|
|
||||||
-rBJ+rBJ!"!TKE'PK"J1S!!2pK`1T!kS+rBF!"!TTER0S$31T!!)d!!!)$`JArBB
|
|
||||||
$U`VpKJ!%#Q0QEf`0!kX!!@m!!!J6#"EpK3[pK3!d-!!BEh"PER0cE'PZBfaeC'9
|
|
||||||
QEfaNCA*`BA4S!"K[F'9Z8e0-5@jME(9NC8C[E'4PFP"KG'J'!kS!!rf%!kcpJ`V
|
|
||||||
pK!!%#R4[)#!0!k`!!Qi!!!JD##N$V31Z$31Y!!)d!!!))JJTrB)$V`VpJJ!%#QC
|
|
||||||
TE'80!km!!@d!!!JP##J$X!`$X!!,!!9cD'%ZD!!#!!!0!ki!!M3!!!JD##,pJ31
|
|
||||||
a#[f"!!3+BfC[E!d$X3!"E`!!#"i))If!#rf!!"3`!!KdC@e`F'&dD!!)G'9YF&"
|
|
||||||
KG'J'rB-!!!)$T3!#!l)$X`d$XJ!#E!!##$!)-2errAi"rAm!!!(pIJ!!!J1c!!)
|
|
||||||
$Y!1e$31d!!*b!!!)-!Jl!lB$Y`d$YJ!#BJ!!#$!)0`1i!lN0!lJ!!@m!!!J`#$2
|
|
||||||
pI3[pI3!N-!!3Bh*jF(4[CQpXC'9bF'&dD!!3Bh*jF(4[4QpXC'9b8'&dD!d$Z3!
|
|
||||||
"E3!!#$-)0J1k$!1k!!d!"cTdH(4IC')!!J!!$31h!!&[!!!!!!!!rA`,rA`!&$!
|
|
||||||
!#(4PEA"`BA4S!!KdC@e`8'&dD!)$Y3!#!lX$[!d$Z`!$53!##$`)C[elrAS$[3V
|
|
||||||
pH`!B,Q0[FQ9MFQ9X+LSU+J!!!!!!!*!!!'jeE'`"rAS!!!B$[3!$rAN$[J1r#[e
|
|
||||||
j!!3+DfpME!d$[J!"E3!!#%!)3rei#[ei!!3+B@aTB3B$[`!$rAF$`!2"#[eh!!3
|
|
||||||
+D@jcD!d$`!!#0!!!#%B)6[ef!m)+rAB!"!TMCQpX$32#!!&[!!!)5JK0rA8,rA8
|
|
||||||
!0$!!''p`C@jcFfaTEQ0XG@4PCQpXC'9bF'&dD!!BEh"PEP066%PZBfaeC'9'Efa
|
|
||||||
NCA*3BA4S"J2"!!2pG!2$rA-+rA3!"!TdEb!J$32$!!*Z!!!)83KJ!m3$a3d$a!!
|
|
||||||
#0!!!#&N)B2eb!mB+rA)!"!TQD@aP$32'!!&Y!!!)A!KI!mF-!mF!$J!)G(KdAf4
|
|
||||||
L,QJ!!J!!$32&!!)d!!!)83KCrA%$b!VpF3!%#Q0QEf`0!mJ!!@m!!!K9#&MpF![
|
|
||||||
pF!!8-!!)G'9YF("KG'J!#(4PEA"3BA4S"[ec!!!#!l`!!J2*!mS0!mN!!Q`!!JK
|
|
||||||
R#'IpEreZ!Ie[!!!"r@i!!!)$bJ!#!mX$c!d$b`!#FJ!!#'F)FJ20!mi0!md!!Q)
|
|
||||||
!!!KR#'i$c`23$322!!&[!!!)C`KUr@d,r@d!*$!!%'0bHA"dEfC[E'4PFR"KG'J
|
|
||||||
!%'0bHA"dEdC[E'4PFP"KG'J0!p!!!@d!!!KU#'d$d3`$d3!,!!8kH$8`13!#!!!
|
|
||||||
0!mi!!@m!!!!!!!$pE![pE!!8-!!)G'9YF("KG'J!#(4PEA"3BA4S!J2-!!)$dJ2
|
|
||||||
6$325!!0*!!))F`LGr@[pDJ28#[eV!"JZBfpbC@0bC@`U+LSU!!!!!!!!N!!!ER9
|
|
||||||
XE!(pDJ!!"J28!!2pD329!pB+r@N!"!TVEf0X$329!!&Y!!!)G`Kkr@J+r@J!"!T
|
|
||||||
KE'PK"J2@!!2pC`2A!pJ+r@F!"!TTER0S$32A!!)d!!!)I3L&r@B$f3VpCJ!%#Q0
|
|
||||||
QEf`0!pN!!@m!!!L"#)6pC3[pC3!d-!!BEh"PER0cE'PZBfaeC'9QEfaNCA*`BA4
|
|
||||||
S!"K[F'9Z8e0-5@jME(9NC8C[E'4PFP"KG'J'!pJ!!reN!pVpB`VpC!!%#R4[)#!
|
|
||||||
0!pS!!Qi!!!L)#*F$f`2F$32E!!)d!!!)N!!)PreL!pd+r@)!"!TQD@aP$32G!!&
|
|
||||||
Y!!!)N`L@!pi-!pi!$!!'H$8`15jS!!)!!!d$h!!#0!!!#)J)N!$pB32I#[eK!!3
|
|
||||||
+BfC[E!d$h`!"E`!!#)`)MreJ#reJ!"3`!!KdC@e`F'&dD!!)G'9YF&"KG'J'r@-
|
|
||||||
!!!)$d`!#!q!$i3d$i!!$53!##*i)b2eIr9i$iJVpA`!B,Q0[FQ9MFQ9X+LSU+J!
|
|
||||||
!!!!!!*!!!'jeE'`"r9i!!!B$iJ!$r9d$i`2N#[eG!!3+DfpME!d$i`!"E3!!#+)
|
|
||||||
)TIeF#[eF!!3+B@aTB3B$j!!$r9X$j32Q#[eE!!3+D@jcD!d$j3!#0!!!#+J)X2e
|
|
||||||
D!qF+r9S!"!TMCQpX$32R!!&[!!!)V!L[r9N,r9N!0$!!''p`C@jcFfaTEQ0XG@4
|
|
||||||
PCQpXC'9bF'&dD!!BEh"PEP066%PZBfaeC'9'EfaNCA*3BA4S"J2Q!!2p@!2Sr9F
|
|
||||||
+r9J!"!TdEb!J$32S!!*Z!!!)X`M#!qN$kJd$k3!#0!!!#,X)`[e@!qX+r9B!"!T
|
|
||||||
QD@aP$32V!!&Y!!!)[JM"!q`-!q`!%!!+H$8`19pfCRNZD!!#!!!0!qS!!M3!!!L
|
|
||||||
c#,[p932Y#[e9!!3+BfC[E!d$l3!"E`!!#,F)Z[e8#re8!"3`!!KdC@e`F'&dD!!
|
|
||||||
)G'9YF&"KG'J'r9F!!!)$i3!#!qi$l`d$lJ!#E!!##-N)bIe6r9)"r9-!!!(p8J!
|
|
||||||
!!J2[!!)$m!2a$32`!!*b!!!)b3M8!r)$m`d$mJ!#BJ!!#-N)d!2d!r80!r3!!@m
|
|
||||||
!!!M*#-cp83[p83!N-!!3Bh*jF(4[CQpXC'9bF'&dD!!3Bh*jF(4[4QpXC'9b8'&
|
|
||||||
dD!d$p3!"E3!!#-`)c`2f$!2f!!d!"cTi06!jGM-!!J!!$32c!!&[!!!!!!!!r9!
|
|
||||||
,r9!!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!)$m3!#!rF$q!d$p`!$53!##08)rre
|
|
||||||
2r8i$q3Vp6`!B,Q0[FQ9MFQ9X+LSU+J!!!!!!!*!!!'jeE'`"r8i!!!B$q3!$r8d
|
|
||||||
$qJ2l#[e0!!3+DfpME!d$qJ!"E3!!#0N)h2e-#[e-!!3+B@aTB3B$q`!$r8X$r!2
|
|
||||||
p#[e,!!3+D@jcD!d$r!!#0!!!#0m)jre+!ri+r8S!"!TMCQpX$32q!!&[!!!)i`M
|
|
||||||
Qr8N,r8N!0$!!''p`C@jcFfaTEQ0XG@4PCQpXC'9bF'&dD!!BEh"PEP066%PZBfa
|
|
||||||
eC'9'EfaNCA*3BA4S"J2p!!2p5!2rr8F+r8J!"!TdEb!J$32r!!*Z!!!)kJMj"!!
|
|
||||||
%!3d%!!!#0!!!#2))qIe'"!)+r8B!"!TQD@aP$33#!!&Y!!!)p3Mi"!--"!-!$J!
|
|
||||||
)H$8`1ABc,QJ!!J!!$33"!!)d!!!)kJMbr88%"!Vp43!%#Q0QEf`0"!3!!@m!!!M
|
|
||||||
Z#2(p4![p4!!8-!!)G'9YF("KG'J!#(4PEA"3BA4S"[e(!!!#!rJ!!J3&"!B0"!8
|
|
||||||
!!Q`!!JN!#3$p3re#!Ie$!!!"r8)!!!)%"J!#"!F%#!d%"`!$53!##3!*+[e"r8!
|
|
||||||
%#3Vp33!B,Q0[FQ9MFQ9X+LSU+J!!!!!!!*!!!'jeE'`"r8!!!!B%#3!$r6m%#J3
|
|
||||||
,#[dr!!3+DfpME!d%#J!"E3!!#33*"rdq#[dq!!3+B@aTB3B%#`!$r6d%$!30#[d
|
|
||||||
p!!3+D@jcD!d%$!!#0!!!#3S*%[dm"!i+r6`!"!TMCQpX$331!!&[!!!*$JN4r6X
|
|
||||||
,r6X!0$!!''p`C@jcFfaTEQ0XG@4PCQpXC'9bF'&dD!!BEh"PEP066%PZBfaeC'9
|
|
||||||
'EfaNCA*3BA4S"J30!!2p1J32r6N+r6S!"!TdEb!J$332!!*Z!!!*&3NN""!%%3d
|
|
||||||
%%!!#0!!!#4d**2di"")+r6J!"!TQD@aP$335!!&Y!!!*)!NM""--""-!#`!&Fh0
|
|
||||||
X,QJ!!J!!$334!!)d!!!*&3NGr6F%&!Vp0`!%#Q0QEf`0""3!!@m!!!NC#4cp0J[
|
|
||||||
p0J!H-!!0Fh0XCQpXC'9bF'&dD!!0Fh0X4QpXC'9b8'&dD!Ep13!!!J3)!!)%&33
|
|
||||||
@$339!!0*!!)*+`P9r6Ap0!3A#[de!"JZBfpbC@0bC@`U+LSU!!!!!!!!N!!!ER9
|
|
||||||
XE!(p0!!!"J3A!!2p-`3B""N+r6-!"!TVEf0X$33B!!&Y!!!*,`Nbr6)+r6)!"!T
|
|
||||||
KE'PK"J3C!!2p-33D""X+r6%!"!TTER0S$33D!!)d!!!*03Npr6!%(!Vp-!!%#Q0
|
|
||||||
QEf`0""`!!@m!!!Nj#6cp,`[p,`!d-!!BEh"PER0cE'PZBfaeC'9QEfaNCA*`BA4
|
|
||||||
S!"K[F'9Z8e0-5@jME(9NC8C[E'4PFP"KG'J'""X!!rdZ""hp,3Vp,J!%#R4[)#!
|
|
||||||
0""d!!Qi!!!P!#8m%(J3I$33H!!)d!!!*5!P2r5`%)!Vp,!!%#QCTE'80"#!!!@d
|
|
||||||
!!!P,#8i%)3`%)3!-!!CcFf`b,QJ!!J!!$33I!!)d!!!*3!P)r5X%)JVp+`!%#Q0
|
|
||||||
QEf`0"#)!!@m!!!P%#8Ip+J[p+J!H-!!0Fh0XCQpXC'9bF'&dD!!0Fh0X4QpXC'9
|
|
||||||
b8'&dD!Ep,3!!!J3@!!)%)`3N$33M!!0*!!)*9JQ!r5Rp+!3P#[dT!"JZBfpbC@0
|
|
||||||
bC@`U+LSU!!!!!!!!N!!!ER9XE!(p+!!!"J3P!!2p*`3Q"#F+r5F!"!TVEf0X$33
|
|
||||||
Q!!&Y!!!*@JPGr5B+r5B!"!TKE'PK"J3R!!2p*33S"#N+r58!"!TTER0S$33S!!)
|
|
||||||
d!!!*B!PSr53%+JVp*!!%#Q0QEf`0"#S!!@m!!!PN#@Ip)`[p)`!d-!!BEh"PER0
|
|
||||||
cE'PZBfaeC'9QEfaNCA*`BA4S!"K[F'9Z8e0-5@jME(9NC8C[E'4PFP"KG'J'"#N
|
|
||||||
!!rdL"#[p)3Vp)J!%#R4[)#!0"#X!!Qi!!!PV#AS%,!3Y$33X!!)d!!!*F`Pkr5!
|
|
||||||
%,JVp)!!%#QCTE'80"#i!!@d!!!Pf#AN%,``%,`!0!!GcFf`b-bjS!!)!!!d%,3!
|
|
||||||
#0!!!#@X*FrdI"$!+r4m!"!TMCQpX$33`!!&[!!!*E`Pbr4i,r4i!(M!!$A0cE'C
|
|
||||||
[E'4PFR"KG'J!$A0cE%C[E'4PFP"KG'J'r5%!!!)%*!!#"$%%-Jd%-3!$53!##B%
|
|
||||||
*UrdGr4`%-`Vp(3!B,Q0[FQ9MFQ9X+LSU+J!!!!!!!*!!!'jeE'`"r4`!!!B%-`!
|
|
||||||
$r4X%0!3e#[dE!!3+DfpME!d%0!!"E3!!#B8*L2dD#[dD!!3+B@aTB3B%03!$r4N
|
|
||||||
%0J3h#[dC!!3+D@jcD!d%0J!#0!!!#BX*NrdB"$J+r4J!"!TMCQpX$33i!!&[!!!
|
|
||||||
*M`Q5r4F,r4F!0$!!''p`C@jcFfaTEQ0XG@4PCQpXC'9bF'&dD!!BEh"PEP066%P
|
|
||||||
ZBfaeC'9'EfaNCA*3BA4S"J3h!!2p&J3jr48+r4B!"!TdEb!J$33j!!*Z!!!*PJQ
|
|
||||||
P"$S%1`d%1J!#0!!!#Ci*TId8"$`+r43!"!TQD@aP$33m!!&Y!!!*S3QN"$d-"$d
|
|
||||||
!$!!'Fh0X-bjS!!)!!!d%1`!#0!!!#CB*R[d6"$i+r4-!"!TMCQpX$33q!!&[!!!
|
|
||||||
*QJQGr4),r4)!(M!!$A0cE'C[E'4PFR"KG'J!$A0cE%C[E'4PFP"KG'J'r48!!!)
|
|
||||||
%-J!#"$m%3!d%2`!$53!##D`*e[d4r4!%33Vp%3!B,Q0[FQ9MFQ9X+LSU+J!!!!!
|
|
||||||
!!*!!!'jeE'`"r4!!!!B%33!$r3m%3J4$#[d2!!3+DfpME!d%3J!"E3!!#E!*Xrd
|
|
||||||
1#[d1!!3+B@aTB3B%3`!$r3d%4!4&#[d0!!3+D@jcD!d%4!!#0!!!#EB*[[d-"%B
|
|
||||||
+r3`!"!TMCQpX$34'!!&[!!!*ZJQpr3X,r3X!0$!!''p`C@jcFfaTEQ0XG@4PCQp
|
|
||||||
XC'9bF'&dD!!BEh"PEP066%PZBfaeC'9'EfaNCA*3BA4S"J4&!!2p#J4(r3N+r3S
|
|
||||||
!"!TdEb!J$34(!!*Z!!!*`3R3"%J%53d%5!!#0!!!#FN*d2d)"%S+r3J!"!TQD@a
|
|
||||||
P$34+!!&Y!!!*c!R2"%X-"%X!$!!'G'ac-5jS!!)!!!d%53!#0!!!#F%*bId("%`
|
|
||||||
+r3F!"!TMCQpX$34-!!&[!!!*a3R)r3B,r3B!(M!!$A0cE'C[E'4PFR"KG'J!$A0
|
|
||||||
cE%C[E'4PFP"KG'J'r3N!!!)%3!!#"%d%6Jd%63!#E!!##GF*erd&r33"r38!!!(
|
|
||||||
p"!!!!J41!!)%6`43$342!!0*!!)*e`S"r32p!J44#[d$!"JZBfpbC@0bC@`U+LS
|
|
||||||
U!!!!!!!!N!!!ER9XE!(p!J!!"J44!!2p!345"&-+r3%!"!TVEf0X$345!!&Y!!!
|
|
||||||
*f`RHr3!+r3!!"!TKE'PK"J46!!2mr`48"&8+r2m!"!TTER0S$348!!)d!!!*i3R
|
|
||||||
Tr2i%9JVmrJ!%#Q0QEf`0"&B!!@m!!!RP#HMmr3[mr3!d-!!BEh"PER0cE'PZBfa
|
|
||||||
eC'9QEfaNCA*`BA4S!"K[F'9Z8e0-5@jME(9NC8C[E'4PFP"KG'J'"&8!!rcm"&I
|
|
||||||
mq`Vmr!!%#R4[)#!0"&F!!Qi!!!RX#IX%@!4C$34B!!)d!!!*p!Rlr2S%@JVmqJ!
|
|
||||||
%#QCTE'80"&S!!@d!!!Rh#IS%@``%@`!1!!KMFRP`G'mZD!!#!!!0"&N!!M3!!!R
|
|
||||||
X#I6mq34F#[cj!!3+BfC[E!d%A!!"E`!!#I!*mrci#rci!#3`!""MFRP`G'pQEfa
|
|
||||||
NCA*`BA4S!""MFRP`G'p'EfaNCA*3BA4S"[cl!!!#"&!!!J4G"&i0"&d!!Q`!!JS
|
|
||||||
##J,mprcf!Ich!!!"r2B!!!)%AJ!#"&m%B!d%A`!$53!##J)+,2cer23%B3Vmp3!
|
|
||||||
B,Q0[FQ9MFQ9X+LSU+J!!!!!!!*!!!'jeE'`"r23!!!B%B3!$r2-%BJ4M#[cc!!3
|
|
||||||
+DfpME!d%BJ!"E3!!#JB+#Icb#[cb!!3+B@aTB3B%B`!$r2%%C!4P#[ca!!3+D@j
|
|
||||||
cD!d%C!!#0!!!#J`+&2c`"'B+r2!!"!TMCQpX$34Q!!&[!!!+%!S6r1m,r1m!0$!
|
|
||||||
!''p`C@jcFfaTEQ0XG@4PCQpXC'9bF'&dD!!BEh"PEP066%PZBfaeC'9'EfaNCA*
|
|
||||||
3BA4S"J4P!!2mlJ4Rr1d+r1i!"!TdEb!J$34R!!*Z!!!+&`SQ"'J%D3d%D!!#0!!
|
|
||||||
!#Km+*[cX"'S+r1`!"!TQD@aP$34U!!&Y!!!+)JSP"'X-"'X!%!!+Eh"PER0cE(B
|
|
||||||
ZD!!#!!!0"'N!!M3!!!SA#Krmk`4X#[cV!!3+BfC[E!d%E!!"E`!!#KX+([cU#rc
|
|
||||||
U!#3`!""MFRP`G'pQEfaNCA*`BA4S!""MFRP`G'p'EfaNCA*3BA4S"[cY!!!#"'!
|
|
||||||
!!J4Y"'i0"'d!!dN!!JSY#PImkIcS"'m+r1N!'#jMEh*PBh*PE#SU+LS!!!!!!!#
|
|
||||||
3!!"ZG@aX!IcS!!!'"'m!!rcR"(!%F3Vmj`!%#QY[Bf`0"(!!!@d!!!Sa#M6mjJV
|
|
||||||
mjJ!%#Q&XD@%'"(%!!rcP"()%F`Vmj3!%#QPZFfJ0"()!!M3!!!Sh#Mrmj!4d#[c
|
|
||||||
N!!3+BfC[E!d%G!!"E`!!#MX+2[cM#rcM!$3`!"K[F'9ZFh0XD@jME(9NC@C[E'4
|
|
||||||
PFR"KG'J!''p`C@j68da*EQ0XG@4P4QpXC'9b8'&dD!B%F`!$r1)%GIcK#[cL!!3
|
|
||||||
+G'mJ)!d%G3!#EJ!!#N)+834f"(F0"(B!!M3!!!T+#P(mi!4i#[cJ!!3+CQPXC3d
|
|
||||||
%H!!"E3!!#Nd+8!4j$!4j!!i!#(4YC'PQCLjS!!)!!!d%G`!#0!!!#N)+5[cI"(S
|
|
||||||
+r0m!"!TMCQpX$34k!!&[!!!+4JT*r0i,r0i!*$!!%'0bHA"dEfC[E'4PFR"KG'J
|
|
||||||
!%'0bHA"dEdC[E'4PFP"KG'J'r1%!!!)%EJ!#"(X%I!d%H`!#E!!##PJ+@2cGr0`
|
|
||||||
"r0d!!!(mh!!!!J4m!!)%I34q$34p!!*X!!)+@!TBr0[mfJ(mf`!!!IcD!!!#"(i
|
|
||||||
!!J4r")!0"(m!!dN!!JTB#S,mfIcB")%+r0N!'#jMEh*PBh*PE#SU+LS!!!!!!!#
|
|
||||||
3!!"ZG@aX!IcB!!!'")%!!rcA"))%J`Vme`!%#QY[Bf`0"))!!@d!!!TF#PrmeJV
|
|
||||||
meJ!%#Q&XD@%'")-!!rc9")3%K3Vme3!%#QPZFfJ0")3!!M3!!!TL#QVme!5'#[c
|
|
||||||
8!!3+BfC[E!d%KJ!"E`!!#QB+DIc6#rc6!$3`!"K[F'9ZFh0XD@jME(9NC@C[E'4
|
|
||||||
PFR"KG'J!''p`C@j68da*EQ0XG@4P4QpXC'9b8'&dD!B%K3!$r0)%Krc4#[c5!!3
|
|
||||||
+G'mJ)!d%K`!#EJ!!#Qd+I!5)")N0")J!!M3!!!Te#Rcmd!5+#[c3!!3+CQPXC3d
|
|
||||||
%LJ!"E3!!#RJ+H`5,$!5,!!`!"Q9IEh-ZD!!#!!!0")N!!M3!!!TY#RAmc`5-#[c
|
|
||||||
2!!3+BfC[E!d%M!!"E`!!#R%+G2c1#rc1!#B`!"&[F'9ZFh0XCQpXC'9bF'&dD!!
|
|
||||||
4Eh"PER0cE%C[E'4PFP"KG'J'r0%!!!)%J!!#")d%MJd%M3!$53!##S-+VIc0r-`
|
|
||||||
%M`Vmc3!B,Q0[FQ9MFQ9X+LSU+J!!!!!!!*!!!'jeE'`"r-`!!!B%M`!$r-X%N!!
|
|
||||||
%N3Vmb`!%#QY[Bf`0"*!!!!&Y!!!+K`U+r-S+r-S!"!TKE'PK"J54!!2mb355"*-
|
|
||||||
+r-N!"!TTER0S$355!!)d!!!+M3U9r-J%P!Vmb!!%#Q0QEf`0"*3!!@m!!!U4#T6
|
|
||||||
ma`[ma`!d-!!BEh"PER0cE'PZBfaeC'9QEfaNCA*`BA4S!"K[F'9Z8e0-5@jME(9
|
|
||||||
NC8C[E'4PFP"KG'J'"*-!!rc'"*Ama3VmaJ!%#R4[)#!0"*8!!Qi!!!UB#UF%PJ5
|
|
||||||
A$35@!!)d!!!+S!URr-3%Q!Vma!!%#QCTE'80"*J!!@d!!!UM#UB%Q3`%Q3!0!!G
|
|
||||||
PAfpc-LjS!!)!!!d%P`!#0!!!#TJ+S2c$"*S+r--!"!TMCQpX$35D!!&[!!!+R!U
|
|
||||||
Ir-),r-)!*M!!%@p`C@jcFfaQEfaNCA*`BA4S!"&[F'9ZFh0X4QpXC'9b8'&dD!E
|
|
||||||
ma3!!!J51!!)%Qrc"$35E!!*X!!)+VJUZr-$m[`(m`!!!!Ibr!!!#r-%!!!d!#3!
|
|
||||||
"E3!!!!!!!3!I!Irq!!!#!!B!!J5F"*d0"*`!!Q`!!J!!!!$m[[bp!Ibq!!!"r,d
|
|
||||||
!!!)%R3!#"*i%R`d%RJ!#E!!##V%+b!5Jr,`0"+!!!dN!!JUa#XMmZ`5K"+)+r,X
|
|
||||||
!'#jcHA0[C'a[Cf&cDh)!!!!!!!!!!&4&@&30"+%!!@d!!!Ua#V3%S``%S`!'!!!
|
|
||||||
!!J!!"J5L!!2mZJ5N"+8+r,S!"!TLG'jc$35N!!&+!!!+Y`Um"+B#"+B!!J5Rr,N
|
|
||||||
0"+F!!@d!!!Uh#VS%U!`%U!!+!!4%EfjP!!)!!!,mZ3!!"J5P!!2mZ!5Tr,F+r,J
|
|
||||||
!"!TRDACe$35T!!&Y!!!+[`V#r,B$r,B!"3EmY`!!!Ibm!!!#"*m!!J5Ur,80"+S
|
|
||||||
!!Q`!!J!!!!$mY2bc!Ibd!!!"r,-!!!,mY3!!$J!#!!!2%!!$!",mXJ5V"+`%V35
|
|
||||||
Z"+m%X!5a",)%X`5d",8%YJ5hr,(mX2b[r+i"r,)!!"!%U`!3r+hmV2bVr+VmUIb
|
|
||||||
Sr+ImT[bPr+6mSrbLr+(mS2bIr*i+r+d!'#jKCACdEf&`F'jeE'`!!)!!!!#3!!!
|
|
||||||
U+LSU#rbX!")`!!GdD'9`BA4S!!GdD'93BA4S#rbV!"``!!adD'9[E'4NC@aTEA-
|
|
||||||
!$(4SC8pXC%4PE'PYF`[mUJ!J-!!1G'KPF(*[DQ9MG("KG'J!$R4SC9"bEfTPBh4
|
|
||||||
3BA4S#rbT!"B`!!PdD'9YCA"KG'J!#A4SC8eP8'&dD![mU!!Q-!!4D@jME(9NC@C
|
|
||||||
[E'4PFR"KG'J!%@PZBfaeC'9'EfaNCA*3BA4S#rbR!$3`!"K[F'9ZFh0XD@jME(9
|
|
||||||
NC@C[E'4PFR"KG'J!''p`C@j68da*EQ0XG@4P4QpXC'9b8'&dD![mTJ!N-!!3Bh*
|
|
||||||
jF(4[CQpXC'9bF'&dD!!3Bh*jF(4[4QpXC'9b8'&dD![mT3!H-!!0Fh0XCQpXC'9
|
|
||||||
bF'&dD!!0Fh0X4QpXC'9b8'&dD![mT!!Q-!!4Eh"PER0cE'C[E'4PFR"KG'J!%@p
|
|
||||||
`C@jcFfa'EfaNCA*3BA4S#rbM!#i`!"9dD'9ZCAGQEfaNCA*bC@CPFQ9ZBf8!&A4
|
|
||||||
SC8jPGdC[E'4PFP*PCQ9bC@jMC3[mSJ!8-!!)G'9YF("KG'J!#(4PEA"3BA4S!Ib
|
|
||||||
K!!!"r+!!!!(mR`!!!IbH!!!1"+`!"a$mR35ir*cmQ`5j",VmQJVmR3!B,Q&PGR4
|
|
||||||
[BA"`ER9XE!!!J!!!!*!!!#SU+LS0",J!!@X!!!!!#XJ%Z`)%Z`!#!!8%[!)%[!!
|
|
||||||
#"*lmQ3,mQ3!!!IbF!!!#r*X!!"!%Z3!!%!5k!)B!(rbBr*ImP[b9r*6mNrb5!#c
|
|
||||||
mNIb3!2b2r)lmMIb-!%rmL`"D!&[mLJ"Nr)N!EIb)r)ImKJ#2r)AmK2b$r),mJIb
|
|
||||||
!r(rmI[apr(cmH`#Tr(VmHIair(F![Iaf!-ImG3$8!1)!l!$j!3-"%!%D!5F"-3%
|
|
||||||
q!8J"93&I!@`"GJ'$!Bd"QJ'N!E%"Z`()!G)"h`(T!IB#!!)0!KF#*!)Z!MX#43*
|
|
||||||
5!P`#D3*c!S!#LJ+A!U%#VJ+m!XB#d`,G!ZS#p!-"!`X$'!-L!bm$130'!e!$A30
|
|
||||||
R!h3$IJ1,!jN$S`1`!lS$a`24!pi$l!2f"!-%%`3K"#m%234,"&X%D`4j")X%Q35
|
|
||||||
Mr(3%U2acr(,mF3VmQ!!%#Q0[BQS+r*F!'#jPBA*cCQCNFQ&XDA-!!!!!!!!J!'&
|
|
||||||
QC()+r*B!"!TMG(Kd#rb9!")`!!GdD'9`BA4S!!GdD'93BA4S#[b8!!3+BA0MFJV
|
|
||||||
mN`!%#R4iC'`,r*)!($!!$(4SC@pXC'4PE'PYF`!-G'KP6faN4'9XD@ec#[b4!!3
|
|
||||||
+BfPdE32mN!$rr3[mM`!J-!!1G'KPF(*[DQ9MG("KG'J!$R4SC9"bEfTPBh43BA4
|
|
||||||
S!rb1rri+r)d!"!T849K8#rb-!"B`!!PdD'9YCA"KG'J!#A4SC8eP8'&dD![mL`!
|
|
||||||
Q-!!4D@jME(9NC@C[E'4PFR"KG'J!%@PZBfaeC'9'EfaNCA*3BA4S#rb+!$3`!"K
|
|
||||||
[F'9ZFh0XD@jME(9NC@C[E'4PFR"KG'J!''p`C@j68da*EQ0XG@4P4QpXC'9b8'&
|
|
||||||
dD![mL3!N-!!3Bh*jF(4[CQpXC'9bF'&dD!!3Bh*jF(4[4QpXC'9b8'&dD![mL!!
|
|
||||||
H-!!0Fh0XCQpXC'9bF'&dD!!0Fh0X4QpXC'9b8'&dD![mK`!Q-!!4Eh"PER0cE'C
|
|
||||||
[E'4PFR"KG'J!%@p`C@jcFfa'EfaNCA*3BA4S#[b'!!3+BfC[E!VmK3!B,QeTFf0
|
|
||||||
cE'0d+LSU+J!!!!!!!*!!!#SU+LS+r)3!"!TcC@aP#[b$!"JZBfpbC@4PE'mU+LS
|
|
||||||
U!!!!!!!!N!!!+LSU+J(mJJ!!![b"!!!+r)!!"!TVEf0X#[ar!!3+D@jcD!2mIJ!
|
|
||||||
%#[ap!"JZBfpbC@0bC@`U+LSU!!!!!!!!N!!!ER9XE!VmI!!%#R*cE(3,r(X!,M!
|
|
||||||
!&A4SC@jPGfC[E'4PFR*PCQ9bC@jMC3!9G'KP6Q9h4QpXC'9b8Q9QCA*PEQ0P#[a
|
|
||||||
k!!3+F'jKE3VmH3!%#Q&XD@%+r(J!"!TdEb!J#[ah!!3+CQPXC32mGJ!'#rae!"3
|
|
||||||
`!!KdC@e`F'&dD!!)G'9YF&"KG'J+r(3!"!TLG'jc#[ac!!3+CfPfG32mFJ!&#[a
|
|
||||||
a!"JZFhPcEf4XEfGKFfYb!!!!!!!!!!"849K8%IbD#XRJ%JUYi1%TDJ`!!LrM*N9
|
|
||||||
4e%r&jLa&edrSaHBX4Nr%@qPF@eTVA&VU-NAE6m4Ek9aE@QYF@Z`bl5C&hNr,lbA
|
|
||||||
Y*N9J!""2bf%!%59K!")Pl5C&B!!66mYK!"3Pl5C&B!!96mYK!"BPl5C&B!!A6m[
|
|
||||||
Y*N9J!"K2amAQ,%C2&!!L+Q%!'9m!%#pK!"PK!"S[DJ`!'dmUB3!F,'S-!"eA!!K
|
|
||||||
B!"i!(fK2+Q%!)'%!'@%!)5TK!"PI!"![B3!L$!!M6em!*%9J!#92A`!PDJ`!'dp
|
|
||||||
K!#BUB3!F,'%!*ba'6bTK!#"K!#KK!#%UB3!CA`!6,f%!+5TK!"R1,f%!+Q%!+bp
|
|
||||||
K!#`-!#02A`!9B3!Y*89J!#j2+Q%!)'%!+'%!)5TK!"PI!"-[B3!T+Q%!'9m!,Lp
|
|
||||||
K!#TK!#m[B3!X$!!M6bTK!#"K!#KK!#%UB3!CA`!6,f%!+5TK!"PI!#i[B3!UB3!
|
|
||||||
`,f%!,!`!)dpI!"9K!$%P4@!!,NmUB3!JB3!SB3!K+Q%!'9m!%bpK!#NUB3!CA`!
|
|
||||||
Z,f%!+Q%!-LpK!#`-!#02A`!9B3!c*89J!#j2+Q%!)'%!+'%!)5TK!"PI!"-[B3!
|
|
||||||
T+Q%!'9m!,LpK!#TK!$3[B3!X$!!M6em!&@%!059&B!!Z6bTK!#"K!#KK!#%UB3!
|
|
||||||
CA`!6,f%!+5TK!"PI!#i[B3!UB3!f,f%!,!`!)dpI!"9K!$FP4@!!,NmUB3!JB3!
|
|
||||||
SB3!K+Q%!'9m!%bpK!#NUB3!CA`!Z,f%!+Q%!1#pK!#`-!#02A`!9B3!j*89J!#j
|
|
||||||
2+Q%!)'%!+'%!)5TK!"PI!"-[B3!T+Q%!'9m!,LpK!#TK!$S[B3!X$!!M6em!&@%
|
|
||||||
!1b9&B!!Z6bTK!#"K!#KK!#%UB3!CA`!6,f%!+5TK!"PI!#i[B3!UB3!m,f%!,!`
|
|
||||||
!)dpI!"9K!$dP4@!!,NmUB3!JB3!SB3!K+Q%!'9m!%bpK!#NUB3!CA`!Z,f%!+Q%
|
|
||||||
!2LpK!#`-!#02A`!9B3!r*89J!#j2+Q%!)'%!+'%!)5TK!"PI!"-[B3!T+Q%!'9m
|
|
||||||
!,LpK!#TK!%![B3!X$!!M6em!&@%!359&B!!Z6bTK!#"K!#KK!#%UB3!CA`!6,f%
|
|
||||||
!+5TK!"PI!#i[B3!UB3"#,f%!,!`!)dpI!"9K!%-P4@!!,NmUB3!JB3!SB3!K+Q%
|
|
||||||
!'9m!%bpK!#NUB3!CA`!Z,f%!+Q%!4#pK!#`-!#02A`!9B3"&*89J!#j2+Q%!)'%
|
|
||||||
!+'%!)5TK!"PI!"-[B3!T+Q%!'9m!,LpK!#TK!%B[B3!X$!!M6em!&@%!4b9&B!!
|
|
||||||
Z6bTK!#"K!#KK!#%UB3!CA`!6,f%!+5TK!"PI!#i[B3!UB3"),f%!,!`!)dpI!"9
|
|
||||||
K!%NP4@!!,NmUB3!JB3!SB3!K+Q%!'9m!%bpK!#NUB3!CA`!Z,f%!+Q%!5LpK!#`
|
|
||||||
-!#02A`!9B3",*89J!#j2+Q%!)'%!+'%!)5TK!"PI!"-[B3!T+Q%!'9m!,LpK!#T
|
|
||||||
K!%`[B3!X$!!M6em!&@%!659&B!!Z6bTK!#"K!#KK!#%UB3!CA`!6,f%!+5TK!"P
|
|
||||||
I!#i[B3!UB3"1,f%!,!`!)dpI!"9K!%mP4@!!,NmUB3!JB3!SB3!K+Q%!'9m!%bp
|
|
||||||
K!#NUB3!CA`!Z,f%!+Q%!8#pK!#`-!#02A`!9B3"4*89J!#j2+Q%!)'%!+'%!)5T
|
|
||||||
K!"PI!"-[B3!T+Q%!'9m!,LpK!#TK!&)[B3!X$!!M6em!&@%!8b9&B!!Z6bTK!#"
|
|
||||||
K!#KK!#%UB3!CA`!6,f%!+5TK!"PI!#i[B3!UB3"8,f%!,!`!)dpI!"9K!&8P4@!
|
|
||||||
!,NmUB3!JB3!SB3!K+Q%!'9m!%bpK!#NUB3!CA`!Z,f%!+Q%!9LpK!#`-!#02A`!
|
|
||||||
9B3"A*89J!#j2+Q%!)'%!+'%!)5TK!"PI!"-[B3!T+Q%!'9m!,LpK!#TK!&J[B3!
|
|
||||||
X$!!M6bTK!#"K!#KK!#%UB3!CA`!6,f%!+5TK!"PI!#i[B3!UB3"C,f%!,!`!)dp
|
|
||||||
I!"9K!&SP4@!!,NmUB3!JB3!SB3!K+Q%!'9m!%bpK!#NUB3!CA`!Z,f%!+Q%!@bp
|
|
||||||
K!#`-!#02A`!9B3"F*89J!#j2+Q%!)'%!+'%!)5TK!"PI!"-[B3!T+Q%!'9m!,Lp
|
|
||||||
K!#TK!&d[B3!X$!!M6em!&@%!AL9&B!!Z6bTK!#"K!#KK!#%UB3!CA`!6,f%!+5T
|
|
||||||
K!"PI!#i[B3!UB3"I,f%!,!`!)dpI!"9K!'!P4@!!,NmUB3!JB3!SB3!K+Q%!'9m
|
|
||||||
!%bpK!#NUB3!CA`!Z,f%!+Q%!B5pK!#`-!#02A`!9B3"L*89J!#j2+Q%!)'%!+'%
|
|
||||||
!)5TK!"PI!"-[B3!T+Q%!'9m!,LpK!#TK!'-[B3!X$!!M6em!&@%!C#9&B!!Z6bT
|
|
||||||
K!#"K!#KK!#%UB3!CA`!6,f%!+5TK!"PI!#i[B3!UB3"P,f%!,!`!)dpI!"9K!'B
|
|
||||||
P4@!!,NmUB3!JB3!SB3!K+Q%!'9m!%bpK!#NUB3!CA`!Z,f%!+Q%!CbpK!#`-!#0
|
|
||||||
2A`!9B3"S*89J!#j2+Q%!)'%!+'%!)5TK!"PI!"-[B3!T+Q%!'9m!,LpK!#TK!'N
|
|
||||||
[B3!X$!!M6em!&@%!DL9&B!!Z6bTK!#"K!#KK!#%UB3!CA`!6,f%!+5TK!"PI!#i
|
|
||||||
[B3!UB3"V,f%!,!`!)dmUB3!JB3!SB3!K+Q%!'9m!%bpK!#NUB3!CA`!Z,f%!+Q%
|
|
||||||
!E#pK!#`-!#02A`!9B3"Y*89J!#j2+Q%!)'%!+'%!)5TK!"PI!"-[B3!T+Q%!'9m
|
|
||||||
!,LpK!#TK!'i[B3!X$!!M6em!&@%!Eb9&B!!Z6bTK!#"K!#KK!#%UB3!CA`!6,f%
|
|
||||||
!+5TK!"PI!#i[B3!UB3"`,f%!,!`!)dpI!"9K!(%P4@!!,NmUB3!JB3!SB3!K+Q%
|
|
||||||
!'9m!%bpK!#NUB3!CA`!Z,f%!+Q%!FLpK!#`-!#02+Q%!)'%!+'%!)5TK!"PI!"-
|
|
||||||
[B3!T+Q%!'9m!,LpK!#TK!(-[B3!X$!!M6em!&@%!G#9&B!!Z6bTK!#"K!#KK!#%
|
|
||||||
UB3!CA`!6,f%!+5TK!"PI!#i[B3!UB3"e,f%!,!`!)dmUB3!JB3!SB3!K+Q%!'9m
|
|
||||||
!%bpK!#NUB3!CA`!A,f%!+Q%!GLpK!#`-!#02+Q%!)'%!+'%!)5TK!"PI!"-[B3!
|
|
||||||
T+Q%!'9m!&bpK!#TK!(F[B3!X$!!M6bTK!#"K!#KK!#%UB3!CA`!6,f%!+5TK!"P
|
|
||||||
I!"F[B3!UB3"i,f%!,!`!)dmUB3!JB3!SB3!K+Q%!'9m!%bpK!#NUB3!CA`!A,f%
|
|
||||||
!+Q%!H5pK!#`-!#02+Q%!)'%!+'%!)5TK!"PI!"-[B3!T+Q%!'9m!&bpK!#TK!(S
|
|
||||||
[B3!X$!!M6bTK!#"K!#KK!#%UB3!CA`!6,f%!+5TK!"PI!"8[B3!UB3"l,f%!,!`
|
|
||||||
!)dmUB3!JB3!SB3!K+Q%!'9m!%bpK!#NUB3!CA`!9,f%!+Q%!I#pK!#`-!#02+Q%
|
|
||||||
!)'%!+'%!)5TK!"PI!"-[B3!T+Q%!'9m!&5pK!#TK!(d[B3!X$!!M6bTK!#"K!#K
|
|
||||||
K!#%UB3!CA`!6,f%!+5TK!"PI!"J[B3!UB3"q,f%!,!`!)dmUB3!JB3!SB3!K+Q%
|
|
||||||
!'9m!%bpK!#NUB3!CA`!B,f%!+Q%!IbpK!#`-!#028&92B3#!B3#"B3##DhCK!)0
|
|
||||||
K!)4K!#)-!)82$!5Y!&%!5deKBfPZG'pcD#")4$T%CA0VG'p`)%C[E'4PFMT*EQ0
|
|
||||||
[E@PZCcT[F'9ZFh0X,90139!Y-6Nj16%b-6%k6@&M6e-kE@YXD@jVFbjKF`!#!!!
|
|
||||||
1"+i!!J6mF!5p!ra`!!%1",d!!3!%[J`%[J!'!!!!!J!!$J5[!!)%r'm%[`2mE`!
|
|
||||||
%$J5r!!3!"-!%`36#"---"-!!%J!-6@&MD@jdEh0S)%K%!!)!!!`%`3!8!!j%CA0
|
|
||||||
VG'p`)%C[E'4PFJ!#!!!-"-)!$J!)5@jMEfeTEQF!!J!!$!6$!"X!&@p`C@jcFf`
|
|
||||||
Y8dj"8#da16Nj-6)a-3!#!!!-",!!4J"!6@&MD@jdEh0S)%K%1N4PFfYdEh!J4Qp
|
|
||||||
XC'9b1NPZBfpYD@jR1Qp`C@jcFf`Y8dj"8#da16Nj-6)a-6T0B@028`!#!!!-",%
|
|
||||||
!5!"#6@&MD@jdEh0S)%K%1N4PFfYdEh!J4QpXC'9b1NPZBfpYD@jR1Qp`C@jcFf`
|
|
||||||
Y8dj"8#da16Nj-6)a-6TTEQ0XG@4P!!)!!!`%XJ"3!%T0B@0TER4[FfJJ5%3k4'9
|
|
||||||
cDh4[F#"'EfaNCA)k5@jMEfeTEQFkEh"PER0cE#e66N&3,6%j16Na-M%a1QPZBfa
|
|
||||||
eC'8kEh"PER0cE!!#!!!-",-!4`""6@&MD@jdEh0S)%K%1N4PFfYdEh!J4QpXC'9
|
|
||||||
b1NPZBfpYD@jR1Qp`C@jcFf`Y8dj"8#da16Nj-6)a-6TMFRP`G'm!!J!!$!5d!%3
|
|
||||||
!2NeKBfPZG'pcD#")4$T%CA0VG'p`)%C[E'4PFMT*EQ0[E@PZCcT[F'9ZFh0X,90
|
|
||||||
139!Y-6Nj16%b-6%kFh0X!!)!!!`%Y3"!!$T0B@0TER4[FfJJ5%3k4'9cDh4[F#"
|
|
||||||
'EfaNCA)k5@jMEfeTEQFkEh"PER0cE#e66N&3,6%j16Na-M%a!!)!!!i%YJ!"&!6
|
|
||||||
%$J6%!!-B"-AmEJ6'$J6&!!-B"-ImE36)$J6(!!-B"-RmE!6+$J6*!!-B!"rmD`6
|
|
||||||
,#[aV!!3+BfC[E!`%b`!1!!K*EQ0[E@PZC`!#!!!+r'`!"!TMCQpX$!6+!"X!&@p
|
|
||||||
`C@jcFf`Y8dj"8#da16Nj-6)a-3!#!!!+r'd!"!TMCQpX$!6)!!d!"fPZBfaeC'8
|
|
||||||
!!J!!#[aZ!!3+BfC[E!`%aJ!9!!peER4TG'aPC#"QEfaNCA)!!J!!$!5h!%i!5%e
|
|
||||||
KBfPZG'pcD#")4$T%CA0VG'p`)%C[E'4PFMT*EQ0[E@PZCcT[F'9ZFh0X,90139!
|
|
||||||
Y-6Nj16%b-6%kBh*jF(4[1RJe-$Pf-`!#!!!"r,%!!!(mX!!!!Ib[!!!"r+i!!'&
|
|
||||||
cBh)!!3!-qYlHV3!!!3!!!*G#!!#@3J!!!AB!!$-8-0J!!!!F!AB!$h0MFhS!!!#
|
|
||||||
#6Np853!!!)jcBh"d!!!!QP4&@&3!!3#QFh4jE!!!!,j$6d4&!!%!bN*14%`!!!$
|
|
||||||
LBA"XG!!!!1j'8N9'!!!!qNP$6L-!!!%'D@0X0!!!!4*TBh-M!!!"(QPMFc3!!!%
|
|
||||||
UD'CNFJ!!!6C659T&!!!"3PG3Eh-!!!&1!!$rr`!!!!!!!!!!!)$rre!!!"i!!!!
|
|
||||||
!!)$rr`!!"cJ#DH#m"'Mrr`!!!*S!!!!!%iRrr`!!"Pi!!!!!"'Mrr`!!!53!!!!
|
|
||||||
!!!$rrb!!!9)!!!!!!!(rra3!!@i#DG`%!)$rr`!!!Pi#DH"X!!$rr`!!!Ri!!!!
|
|
||||||
!!)$rr`!!!S-#DH"d!*Err`!!!Si!!!!!!*Err`!!!j)!!!!!!*Err`!!"CB#DH%
|
|
||||||
i!*Err`!!"GS#DH%dkF$rr`!!"[`!!!!!rrrrr`!!"a)!!!!!!)$rr`!!"b!!!!!
|
|
||||||
!*4S:
|
|
||||||
@@ -1,116 +0,0 @@
|
|||||||
/* MacOS/opensslconf.h */
|
|
||||||
|
|
||||||
#if !(defined(VMS) || defined(__VMS)) /* VMS uses logical names instead */
|
|
||||||
#if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR)
|
|
||||||
#define OPENSSLDIR "/usr/local/ssl"
|
|
||||||
#endif
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#if defined(HEADER_IDEA_H) && !defined(IDEA_INT)
|
|
||||||
#define IDEA_INT unsigned int
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#if defined(HEADER_MD2_H) && !defined(MD2_INT)
|
|
||||||
#define MD2_INT unsigned int
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#if defined(HEADER_RC2_H) && !defined(RC2_INT)
|
|
||||||
/* I need to put in a mod for the alpha - eay */
|
|
||||||
#define RC2_INT unsigned int
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#if defined(HEADER_RC4_H)
|
|
||||||
#if !defined(RC4_INT)
|
|
||||||
/* using int types make the structure larger but make the code faster
|
|
||||||
* on most boxes I have tested - up to %20 faster. */
|
|
||||||
/*
|
|
||||||
* I don't know what does "most" mean, but declaring "int" is a must on:
|
|
||||||
* - Intel P6 because partial register stalls are very expensive;
|
|
||||||
* - elder Alpha because it lacks byte load/store instructions;
|
|
||||||
*/
|
|
||||||
#define RC4_INT unsigned char
|
|
||||||
#endif
|
|
||||||
#if !defined(RC4_CHUNK)
|
|
||||||
/*
|
|
||||||
* This enables code handling data aligned at natural CPU word
|
|
||||||
* boundary. See crypto/rc4/rc4_enc.c for further details.
|
|
||||||
*/
|
|
||||||
#define RC4_CHUNK unsigned long
|
|
||||||
#endif
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#if defined(HEADER_DES_H) && !defined(DES_LONG)
|
|
||||||
/* If this is set to 'unsigned int' on a DEC Alpha, this gives about a
|
|
||||||
* %20 speed up (longs are 8 bytes, int's are 4). */
|
|
||||||
#ifndef DES_LONG
|
|
||||||
#define DES_LONG unsigned long
|
|
||||||
#endif
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#if defined(HEADER_BN_H) && !defined(CONFIG_HEADER_BN_H)
|
|
||||||
#define CONFIG_HEADER_BN_H
|
|
||||||
#if __option(longlong)
|
|
||||||
# define BN_LLONG
|
|
||||||
#else
|
|
||||||
# undef BN_LLONG
|
|
||||||
#endif
|
|
||||||
|
|
||||||
/* Should we define BN_DIV2W here? */
|
|
||||||
|
|
||||||
/* Only one for the following should be defined */
|
|
||||||
/* The prime number generation stuff may not work when
|
|
||||||
* EIGHT_BIT but I don't care since I've only used this mode
|
|
||||||
* for debuging the bignum libraries */
|
|
||||||
#undef SIXTY_FOUR_BIT_LONG
|
|
||||||
#undef SIXTY_FOUR_BIT
|
|
||||||
#define THIRTY_TWO_BIT
|
|
||||||
#undef SIXTEEN_BIT
|
|
||||||
#undef EIGHT_BIT
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#if defined(HEADER_RC4_LOCL_H) && !defined(CONFIG_HEADER_RC4_LOCL_H)
|
|
||||||
#define CONFIG_HEADER_RC4_LOCL_H
|
|
||||||
/* if this is defined data[i] is used instead of *data, this is a %20
|
|
||||||
* speedup on x86 */
|
|
||||||
#undef RC4_INDEX
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#if defined(HEADER_BF_LOCL_H) && !defined(CONFIG_HEADER_BF_LOCL_H)
|
|
||||||
#define CONFIG_HEADER_BF_LOCL_H
|
|
||||||
#define BF_PTR
|
|
||||||
#endif /* HEADER_BF_LOCL_H */
|
|
||||||
|
|
||||||
#if defined(HEADER_DES_LOCL_H) && !defined(CONFIG_HEADER_DES_LOCL_H)
|
|
||||||
#define CONFIG_HEADER_DES_LOCL_H
|
|
||||||
/* the following is tweaked from a config script, that is why it is a
|
|
||||||
* protected undef/define */
|
|
||||||
#ifndef DES_PTR
|
|
||||||
#define DES_PTR
|
|
||||||
#endif
|
|
||||||
|
|
||||||
/* This helps C compiler generate the correct code for multiple functional
|
|
||||||
* units. It reduces register dependancies at the expense of 2 more
|
|
||||||
* registers */
|
|
||||||
#ifndef DES_RISC1
|
|
||||||
#define DES_RISC1
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#ifndef DES_RISC2
|
|
||||||
#undef DES_RISC2
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#if defined(DES_RISC1) && defined(DES_RISC2)
|
|
||||||
YOU SHOULD NOT HAVE BOTH DES_RISC1 AND DES_RISC2 DEFINED!!!!!
|
|
||||||
#endif
|
|
||||||
|
|
||||||
/* Unroll the inner loop, this sometimes helps, sometimes hinders.
|
|
||||||
* Very mucy CPU dependant */
|
|
||||||
#ifndef DES_UNROLL
|
|
||||||
#define DES_UNROLL
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#endif /* HEADER_DES_LOCL_H */
|
|
||||||
|
|
||||||
#ifndef __POWERPC__
|
|
||||||
#define MD32_XARRAY
|
|
||||||
#endif
|
|
||||||
638
Makefile.fips
Normal file
638
Makefile.fips
Normal file
@@ -0,0 +1,638 @@
|
|||||||
|
##
|
||||||
|
## Makefile for OpenSSL: fipscanister.o only
|
||||||
|
##
|
||||||
|
|
||||||
|
VERSION=fips-2.0-test
|
||||||
|
MAJOR=
|
||||||
|
MINOR=
|
||||||
|
SHLIB_VERSION_NUMBER=
|
||||||
|
SHLIB_VERSION_HISTORY=
|
||||||
|
SHLIB_MAJOR=
|
||||||
|
SHLIB_MINOR=
|
||||||
|
SHLIB_EXT=
|
||||||
|
PLATFORM=dist
|
||||||
|
OPTIONS=
|
||||||
|
CONFIGURE_ARGS=
|
||||||
|
SHLIB_TARGET=
|
||||||
|
|
||||||
|
# HERE indicates where this Makefile lives. This can be used to indicate
|
||||||
|
# where sub-Makefiles are expected to be. Currently has very limited usage,
|
||||||
|
# and should probably not be bothered with at all.
|
||||||
|
HERE=.
|
||||||
|
|
||||||
|
# INSTALL_PREFIX is for package builders so that they can configure
|
||||||
|
# for, say, /usr/ and yet have everything installed to /tmp/somedir/usr/.
|
||||||
|
# Normally it is left empty.
|
||||||
|
INSTALL_PREFIX=
|
||||||
|
INSTALLTOP=/usr/local/ssl
|
||||||
|
|
||||||
|
# Do not edit this manually. Use Configure --openssldir=DIR do change this!
|
||||||
|
OPENSSLDIR=/usr/local/ssl
|
||||||
|
|
||||||
|
# NO_IDEA - Define to build without the IDEA algorithm
|
||||||
|
# NO_RC4 - Define to build without the RC4 algorithm
|
||||||
|
# NO_RC2 - Define to build without the RC2 algorithm
|
||||||
|
# THREADS - Define when building with threads, you will probably also need any
|
||||||
|
# system defines as well, i.e. _REENTERANT for Solaris 2.[34]
|
||||||
|
# TERMIO - Define the termio terminal subsystem, needed if sgtty is missing.
|
||||||
|
# TERMIOS - Define the termios terminal subsystem, Silicon Graphics.
|
||||||
|
# LONGCRYPT - Define to use HPUX 10.x's long password modification to crypt(3).
|
||||||
|
# DEVRANDOM - Give this the value of the 'random device' if your OS supports
|
||||||
|
# one. 32 bytes will be read from this when the random
|
||||||
|
# number generator is initalised.
|
||||||
|
# SSL_FORBID_ENULL - define if you want the server to be not able to use the
|
||||||
|
# NULL encryption ciphers.
|
||||||
|
#
|
||||||
|
# LOCK_DEBUG - turns on lots of lock debug output :-)
|
||||||
|
# REF_CHECK - turn on some xyz_free() assertions.
|
||||||
|
# REF_PRINT - prints some stuff on structure free.
|
||||||
|
# CRYPTO_MDEBUG - turns on my 'memory leak' detecting stuff
|
||||||
|
# MFUNC - Make all Malloc/Free/Realloc calls call
|
||||||
|
# CRYPTO_malloc/CRYPTO_free/CRYPTO_realloc which can be setup to
|
||||||
|
# call application defined callbacks via CRYPTO_set_mem_functions()
|
||||||
|
# MD5_ASM needs to be defined to use the x86 assembler for MD5
|
||||||
|
# SHA1_ASM needs to be defined to use the x86 assembler for SHA1
|
||||||
|
# RMD160_ASM needs to be defined to use the x86 assembler for RIPEMD160
|
||||||
|
# Do not define B_ENDIAN or L_ENDIAN if 'unsigned long' == 8. It must
|
||||||
|
# equal 4.
|
||||||
|
# PKCS1_CHECK - pkcs1 tests.
|
||||||
|
|
||||||
|
CC= cc
|
||||||
|
CFLAG= -O
|
||||||
|
DEPFLAG=
|
||||||
|
PEX_LIBS=
|
||||||
|
EX_LIBS=
|
||||||
|
EXE_EXT=
|
||||||
|
ARFLAGS=
|
||||||
|
AR=ar $(ARFLAGS) r
|
||||||
|
RANLIB= ranlib
|
||||||
|
NM= nm
|
||||||
|
PERL= perl
|
||||||
|
TAR= tar
|
||||||
|
TARFLAGS= --no-recursion
|
||||||
|
MAKEDEPPROG=makedepend
|
||||||
|
LIBDIR=lib
|
||||||
|
|
||||||
|
# We let the C compiler driver to take care of .s files. This is done in
|
||||||
|
# order to be excused from maintaining a separate set of architecture
|
||||||
|
# dependent assembler flags. E.g. if you throw -mcpu=ultrasparc at SPARC
|
||||||
|
# gcc, then the driver will automatically translate it to -xarch=v8plus
|
||||||
|
# and pass it down to assembler.
|
||||||
|
#AS=$(CC) -c
|
||||||
|
ASFLAG=$(CFLAG)
|
||||||
|
|
||||||
|
# For x86 assembler: Set PROCESSOR to 386 if you want to support
|
||||||
|
# the 80386.
|
||||||
|
PROCESSOR=
|
||||||
|
|
||||||
|
# CPUID module collects small commonly used assembler snippets
|
||||||
|
CPUID_OBJ=
|
||||||
|
BN_ASM= bn_asm.o
|
||||||
|
DES_ENC= des_enc.o fcrypt_b.o
|
||||||
|
AES_ENC= aes_core.o aes_cbc.o
|
||||||
|
BF_ENC= bf_enc.o
|
||||||
|
CAST_ENC= c_enc.o
|
||||||
|
RC4_ENC= rc4_enc.o
|
||||||
|
RC5_ENC= rc5_enc.o
|
||||||
|
MD5_ASM_OBJ=
|
||||||
|
SHA1_ASM_OBJ=
|
||||||
|
RMD160_ASM_OBJ=
|
||||||
|
WP_ASM_OBJ=
|
||||||
|
CMLL_ENC=
|
||||||
|
MODES_ASM_OBJ=
|
||||||
|
PERLASM_SCHEME=
|
||||||
|
|
||||||
|
# KRB5 stuff
|
||||||
|
KRB5_INCLUDES=
|
||||||
|
LIBKRB5=
|
||||||
|
|
||||||
|
# Zlib stuff
|
||||||
|
ZLIB_INCLUDE=
|
||||||
|
LIBZLIB=
|
||||||
|
|
||||||
|
# This is the location of fipscanister.o and friends.
|
||||||
|
# The FIPS module build will place it $(INSTALLTOP)/lib
|
||||||
|
# but since $(INSTALLTOP) can only take the default value
|
||||||
|
# when the module is built it will be in /usr/local/ssl/lib
|
||||||
|
# $(INSTALLTOP) for this build may be different so hard
|
||||||
|
# code the path.
|
||||||
|
|
||||||
|
FIPSLIBDIR=/usr/local/ssl/$(LIBDIR)/
|
||||||
|
|
||||||
|
# This is set to "y" if fipscanister.o is compiled internally as
|
||||||
|
# opposed to coming from an external validated location.
|
||||||
|
|
||||||
|
FIPSCANISTERINTERNAL=n
|
||||||
|
|
||||||
|
# This is set if we only build fipscanister.o
|
||||||
|
|
||||||
|
FIPSCANISTERONLY=y
|
||||||
|
|
||||||
|
# The location of the library which contains fipscanister.o
|
||||||
|
# normally it will be libcrypto unless fipsdso is set in which
|
||||||
|
# case it will be libfips. If not compiling in FIPS mode at all
|
||||||
|
# this is empty making it a useful test for a FIPS compile.
|
||||||
|
|
||||||
|
FIPSCANLIB=
|
||||||
|
|
||||||
|
# Shared library base address. Currently only used on Windows.
|
||||||
|
#
|
||||||
|
|
||||||
|
BASEADDR=
|
||||||
|
|
||||||
|
DIRS= crypto fips test
|
||||||
|
ENGDIRS= ccgost
|
||||||
|
SHLIBDIRS= crypto
|
||||||
|
|
||||||
|
# dirs in crypto to build
|
||||||
|
SDIRS= \
|
||||||
|
sha hmac des aes modes \
|
||||||
|
bn ec rsa dsa ecdsa dh \
|
||||||
|
buffer evp ecdh cmac
|
||||||
|
# keep in mind that the above list is adjusted by ./Configure
|
||||||
|
# according to no-xxx arguments...
|
||||||
|
|
||||||
|
LINKDIRS= \
|
||||||
|
objects sha hmac des aes modes \
|
||||||
|
bn ec rsa dsa ecdh cmac ecdsa dh engine \
|
||||||
|
buffer bio stack lhash rand err \
|
||||||
|
evp asn1 ui
|
||||||
|
|
||||||
|
# tests to perform. "alltests" is a special word indicating that all tests
|
||||||
|
# should be performed.
|
||||||
|
TESTS = alltests
|
||||||
|
|
||||||
|
MAKEFILE= Makefile
|
||||||
|
|
||||||
|
MANDIR=$(OPENSSLDIR)/man
|
||||||
|
MAN1=1
|
||||||
|
MAN3=3
|
||||||
|
MANSUFFIX=
|
||||||
|
HTMLSUFFIX=html
|
||||||
|
HTMLDIR=$(OPENSSLDIR)/html
|
||||||
|
SHELL=/bin/sh
|
||||||
|
|
||||||
|
TOP= .
|
||||||
|
ONEDIRS=out tmp
|
||||||
|
EDIRS= times doc bugs util include certs ms shlib mt demos perl sf dep VMS
|
||||||
|
WDIRS= windows
|
||||||
|
LIBS=
|
||||||
|
SHARED_CRYPTO=libcrypto$(SHLIB_EXT)
|
||||||
|
SHARED_SSL=libssl$(SHLIB_EXT)
|
||||||
|
SHARED_LIBS=
|
||||||
|
SHARED_LIBS_LINK_EXTS=
|
||||||
|
SHARED_LDFLAGS=
|
||||||
|
|
||||||
|
GENERAL= Makefile
|
||||||
|
BASENAME= openssl
|
||||||
|
NAME= $(BASENAME)-$(VERSION)
|
||||||
|
TARFILE= openssl-fips-2.0.tar
|
||||||
|
WTARFILE= $(NAME)-win.tar
|
||||||
|
EXHEADER= e_os2.h
|
||||||
|
HEADER= e_os.h
|
||||||
|
|
||||||
|
all: Makefile build_all openssl.pc libssl.pc libcrypto.pc
|
||||||
|
|
||||||
|
# as we stick to -e, CLEARENV ensures that local variables in lower
|
||||||
|
# Makefiles remain local and variable. $${VAR+VAR} is tribute to Korn
|
||||||
|
# shell, which [annoyingly enough] terminates unset with error if VAR
|
||||||
|
# is not present:-( TOP= && unset TOP is tribute to HP-UX /bin/sh,
|
||||||
|
# which terminates unset with error if no variable was present:-(
|
||||||
|
CLEARENV= TOP= && unset TOP $${LIB+LIB} $${LIBS+LIBS} \
|
||||||
|
$${INCLUDE+INCLUDE} $${INCLUDES+INCLUDES} \
|
||||||
|
$${DIR+DIR} $${DIRS+DIRS} $${SRC+SRC} \
|
||||||
|
$${LIBSRC+LIBSRC} $${LIBOBJ+LIBOBJ} $${ALL+ALL} \
|
||||||
|
$${EXHEADER+EXHEADER} $${HEADER+HEADER} \
|
||||||
|
$${GENERAL+GENERAL} $${CFLAGS+CFLAGS} \
|
||||||
|
$${ASFLAGS+ASFLAGS} $${AFLAGS+AFLAGS} \
|
||||||
|
$${LDCMD+LDCMD} $${LDFLAGS+LDFLAGS} \
|
||||||
|
$${SHAREDCMD+SHAREDCMD} $${SHAREDFLAGS+SHAREDFLAGS} \
|
||||||
|
$${SHARED_LIB+SHARED_LIB} $${LIBEXTRAS+LIBEXTRAS}
|
||||||
|
|
||||||
|
BUILDENV= PLATFORM='$(PLATFORM)' PROCESSOR='$(PROCESSOR)' \
|
||||||
|
CC='$(CC)' CFLAG='$(CFLAG)' \
|
||||||
|
ASFLAG='$(CFLAG) -c' \
|
||||||
|
AR='$(AR)' NM='$(NM)' RANLIB='$(RANLIB)' \
|
||||||
|
CROSS_COMPILE='$(CROSS_COMPILE)' \
|
||||||
|
PERL='$(PERL)' ENGDIRS='$(ENGDIRS)' \
|
||||||
|
SDIRS='$(SDIRS)' LIBRPATH='$(INSTALLTOP)/$(LIBDIR)' \
|
||||||
|
INSTALL_PREFIX='$(INSTALL_PREFIX)' \
|
||||||
|
INSTALLTOP='$(INSTALLTOP)' OPENSSLDIR='$(OPENSSLDIR)' \
|
||||||
|
LIBDIR='$(LIBDIR)' \
|
||||||
|
MAKEDEPEND='$$$${TOP}/util/domd $$$${TOP} -MD $(MAKEDEPPROG)' \
|
||||||
|
DEPFLAG='-DOPENSSL_NO_DEPRECATED $(DEPFLAG)' \
|
||||||
|
MAKEDEPPROG='$(MAKEDEPPROG)' \
|
||||||
|
SHARED_LDFLAGS='$(SHARED_LDFLAGS)' \
|
||||||
|
KRB5_INCLUDES='$(KRB5_INCLUDES)' LIBKRB5='$(LIBKRB5)' \
|
||||||
|
ZLIB_INCLUDE='$(ZLIB_INCLUDE)' LIBZLIB='$(LIBZLIB)' \
|
||||||
|
EXE_EXT='$(EXE_EXT)' SHARED_LIBS='$(SHARED_LIBS)' \
|
||||||
|
SHLIB_EXT='$(SHLIB_EXT)' SHLIB_TARGET='$(SHLIB_TARGET)' \
|
||||||
|
PEX_LIBS='$(PEX_LIBS)' EX_LIBS='$(EX_LIBS)' \
|
||||||
|
CPUID_OBJ='$(CPUID_OBJ)' \
|
||||||
|
BN_ASM='$(BN_ASM)' DES_ENC='$(DES_ENC)' \
|
||||||
|
AES_ENC='$(AES_ENC)' CMLL_ENC='$(CMLL_ENC)' \
|
||||||
|
BF_ENC='$(BF_ENC)' CAST_ENC='$(CAST_ENC)' \
|
||||||
|
RC4_ENC='$(RC4_ENC)' RC5_ENC='$(RC5_ENC)' \
|
||||||
|
SHA1_ASM_OBJ='$(SHA1_ASM_OBJ)' \
|
||||||
|
MD5_ASM_OBJ='$(MD5_ASM_OBJ)' \
|
||||||
|
RMD160_ASM_OBJ='$(RMD160_ASM_OBJ)' \
|
||||||
|
WP_ASM_OBJ='$(WP_ASM_OBJ)' \
|
||||||
|
MODES_ASM_OBJ='$(MODES_ASM_OBJ)' \
|
||||||
|
PERLASM_SCHEME='$(PERLASM_SCHEME)' \
|
||||||
|
FIPSLIBDIR='${FIPSLIBDIR}' \
|
||||||
|
FIPSCANLIB="$${FIPSCANLIB:-$(FIPSCANLIB)}" \
|
||||||
|
FIPSCANISTERINTERNAL='${FIPSCANISTERINTERNAL}' \
|
||||||
|
FIPSCANISTERONLY='${FIPSCANISTERONLY}' \
|
||||||
|
FIPS_EX_OBJ='${FIPS_EX_OBJ}' \
|
||||||
|
THIS=$${THIS:-$@} MAKEFILE=Makefile MAKEOVERRIDES=
|
||||||
|
# MAKEOVERRIDES= effectively "equalizes" GNU-ish and SysV-ish make flavors,
|
||||||
|
# which in turn eliminates ambiguities in variable treatment with -e.
|
||||||
|
|
||||||
|
# BUILD_CMD is a generic macro to build a given target in a given
|
||||||
|
# subdirectory. The target must be given through the shell variable
|
||||||
|
# `target' and the subdirectory to build in must be given through `dir'.
|
||||||
|
# This macro shouldn't be used directly, use RECURSIVE_BUILD_CMD or
|
||||||
|
# BUILD_ONE_CMD instead.
|
||||||
|
#
|
||||||
|
# BUILD_ONE_CMD is a macro to build a given target in a given
|
||||||
|
# subdirectory if that subdirectory is part of $(DIRS). It requires
|
||||||
|
# exactly the same shell variables as BUILD_CMD.
|
||||||
|
#
|
||||||
|
# RECURSIVE_BUILD_CMD is a macro to build a given target in all
|
||||||
|
# subdirectories defined in $(DIRS). It requires that the target
|
||||||
|
# is given through the shell variable `target'.
|
||||||
|
BUILD_CMD= if [ -d "$$dir" ]; then \
|
||||||
|
( cd $$dir && echo "making $$target in $$dir..." && \
|
||||||
|
$(CLEARENV) && $(MAKE) -e $(BUILDENV) TOP=.. DIR=$$dir $$target \
|
||||||
|
) || exit 1; \
|
||||||
|
fi
|
||||||
|
RECURSIVE_BUILD_CMD=for dir in $(DIRS); do $(BUILD_CMD); done
|
||||||
|
BUILD_ONE_CMD=\
|
||||||
|
if expr " $(DIRS) " : ".* $$dir " >/dev/null 2>&1; then \
|
||||||
|
$(BUILD_CMD); \
|
||||||
|
fi
|
||||||
|
|
||||||
|
reflect:
|
||||||
|
@[ -n "$(THIS)" ] && $(CLEARENV) && $(MAKE) $(THIS) -e $(BUILDENV)
|
||||||
|
|
||||||
|
FIPS_EX_OBJ= ../crypto/aes/aes_cfb.o \
|
||||||
|
../crypto/aes/aes_ecb.o \
|
||||||
|
../crypto/aes/aes_ofb.o \
|
||||||
|
../crypto/bn/bn_add.o \
|
||||||
|
../crypto/bn/bn_blind.o \
|
||||||
|
../crypto/bn/bn_ctx.o \
|
||||||
|
../crypto/bn/bn_div.o \
|
||||||
|
../crypto/bn/bn_exp2.o \
|
||||||
|
../crypto/bn/bn_exp.o \
|
||||||
|
../crypto/bn/bn_gcd.o \
|
||||||
|
../crypto/bn/bn_gf2m.o \
|
||||||
|
../crypto/bn/bn_lib.o \
|
||||||
|
../crypto/bn/bn_mod.o \
|
||||||
|
../crypto/bn/bn_mont.o \
|
||||||
|
../crypto/bn/bn_mul.o \
|
||||||
|
../crypto/bn/bn_nist.o \
|
||||||
|
../crypto/bn/bn_prime.o \
|
||||||
|
../crypto/bn/bn_rand.o \
|
||||||
|
../crypto/bn/bn_recp.o \
|
||||||
|
../crypto/bn/bn_shift.o \
|
||||||
|
../crypto/bn/bn_sqr.o \
|
||||||
|
../crypto/bn/bn_word.o \
|
||||||
|
../crypto/bn/bn_x931p.o \
|
||||||
|
../crypto/buffer/buf_str.o \
|
||||||
|
../crypto/cmac/cmac.o \
|
||||||
|
../crypto/cryptlib.o \
|
||||||
|
../crypto/des/cfb64ede.o \
|
||||||
|
../crypto/des/cfb64enc.o \
|
||||||
|
../crypto/des/cfb_enc.o \
|
||||||
|
../crypto/des/ecb3_enc.o \
|
||||||
|
../crypto/des/ofb64ede.o \
|
||||||
|
../crypto/des/fcrypt.o \
|
||||||
|
../crypto/des/set_key.o \
|
||||||
|
../crypto/dh/dh_check.o \
|
||||||
|
../crypto/dh/dh_gen.o \
|
||||||
|
../crypto/dh/dh_key.o \
|
||||||
|
../crypto/dsa/dsa_gen.o \
|
||||||
|
../crypto/dsa/dsa_key.o \
|
||||||
|
../crypto/dsa/dsa_ossl.o \
|
||||||
|
../crypto/ec/ec_curve.o \
|
||||||
|
../crypto/ec/ec_cvt.o \
|
||||||
|
../crypto/ec/ec_key.o \
|
||||||
|
../crypto/ec/ec_lib.o \
|
||||||
|
../crypto/ec/ecp_mont.o \
|
||||||
|
../crypto/ec/ec_mult.o \
|
||||||
|
../crypto/ec/ecp_nist.o \
|
||||||
|
../crypto/ec/ecp_smpl.o \
|
||||||
|
../crypto/ec/ec2_mult.o \
|
||||||
|
../crypto/ec/ec2_smpl.o \
|
||||||
|
../crypto/ecdh/ech_key.o \
|
||||||
|
../crypto/ecdh/ech_ossl.o \
|
||||||
|
../crypto/ecdsa/ecs_ossl.o \
|
||||||
|
../crypto/evp/e_aes.o \
|
||||||
|
../crypto/evp/e_des3.o \
|
||||||
|
../crypto/evp/e_null.o \
|
||||||
|
../crypto/evp/m_sha1.o \
|
||||||
|
../crypto/evp/m_dss1.o \
|
||||||
|
../crypto/evp/m_dss.o \
|
||||||
|
../crypto/evp/m_ecdsa.o \
|
||||||
|
../crypto/hmac/hmac.o \
|
||||||
|
../crypto/modes/cbc128.o \
|
||||||
|
../crypto/modes/ccm128.o \
|
||||||
|
../crypto/modes/cfb128.o \
|
||||||
|
../crypto/modes/ctr128.o \
|
||||||
|
../crypto/modes/gcm128.o \
|
||||||
|
../crypto/modes/ofb128.o \
|
||||||
|
../crypto/modes/xts128.o \
|
||||||
|
../crypto/rsa/rsa_eay.o \
|
||||||
|
../crypto/rsa/rsa_gen.o \
|
||||||
|
../crypto/rsa/rsa_crpt.o \
|
||||||
|
../crypto/rsa/rsa_none.o \
|
||||||
|
../crypto/rsa/rsa_oaep.o \
|
||||||
|
../crypto/rsa/rsa_pk1.o \
|
||||||
|
../crypto/rsa/rsa_pss.o \
|
||||||
|
../crypto/rsa/rsa_ssl.o \
|
||||||
|
../crypto/rsa/rsa_x931.o \
|
||||||
|
../crypto/rsa/rsa_x931g.o \
|
||||||
|
../crypto/sha/sha1dgst.o \
|
||||||
|
../crypto/sha/sha256.o \
|
||||||
|
../crypto/sha/sha512.o \
|
||||||
|
../crypto/thr_id.o \
|
||||||
|
../crypto/uid.o
|
||||||
|
|
||||||
|
sub_all: build_all
|
||||||
|
build_all: build_libs
|
||||||
|
|
||||||
|
build_libs: build_crypto build_fips
|
||||||
|
|
||||||
|
build_fips:
|
||||||
|
@dir=fips; target=all; [ -z "$(FIPSCANLIB)" ] || $(BUILD_ONE_CMD)
|
||||||
|
|
||||||
|
build_crypto:
|
||||||
|
if [ -n "$(FIPSCANLIB)" ]; then \
|
||||||
|
EXCL_OBJ='$(AES_ENC) $(BN_ASM) $(DES_ENC) $(CPUID_OBJ) $(SHA1_ASM_OBJ) $(MODES_ASM_OBJ) $(FIPS_EX_OBJ)' ; export EXCL_OBJ ; \
|
||||||
|
ARX='$(PERL) $${TOP}/util/arx.pl $(AR)' ; \
|
||||||
|
else \
|
||||||
|
ARX='${AR}' ; \
|
||||||
|
fi ; export ARX ; \
|
||||||
|
if [ $(FIPSCANISTERINTERNAL) = "y" ]; then \
|
||||||
|
AS='$(PERL) $${TOP}/util/fipsas.pl $${TOP} $${<} $(CC)' ; \
|
||||||
|
else \
|
||||||
|
AS='$(CC) -c' ; \
|
||||||
|
fi ; export AS ; \
|
||||||
|
dir=crypto; target=fips; $(BUILD_ONE_CMD)
|
||||||
|
build_ssl:
|
||||||
|
@dir=ssl; target=all; $(BUILD_ONE_CMD)
|
||||||
|
build_engines:
|
||||||
|
@dir=engines; target=all; $(BUILD_ONE_CMD)
|
||||||
|
build_apps:
|
||||||
|
@dir=apps; target=all; $(BUILD_ONE_CMD)
|
||||||
|
build_tests:
|
||||||
|
@dir=test; target=fipsexe; $(BUILD_ONE_CMD)
|
||||||
|
build_algvs:
|
||||||
|
@dir=test; target=fipsalgvs; $(BUILD_ONE_CMD)
|
||||||
|
build_tools:
|
||||||
|
@dir=tools; target=all; $(BUILD_ONE_CMD)
|
||||||
|
|
||||||
|
all_testapps: build_libs build_testapps
|
||||||
|
build_testapps:
|
||||||
|
@dir=crypto; target=testapps; $(BUILD_ONE_CMD)
|
||||||
|
|
||||||
|
libcrypto$(SHLIB_EXT): libcrypto.a build_fips
|
||||||
|
@if [ "$(SHLIB_TARGET)" != "" ]; then \
|
||||||
|
if [ "$(FIPSCANLIB)" = "libcrypto" ]; then \
|
||||||
|
FIPSLD_CC="$(CC)"; CC=fips/fipsld; \
|
||||||
|
export CC FIPSLD_CC; \
|
||||||
|
fi; \
|
||||||
|
$(MAKE) SHLIBDIRS=crypto build-shared; \
|
||||||
|
else \
|
||||||
|
echo "There's no support for shared libraries on this platform" >&2; \
|
||||||
|
exit 1; \
|
||||||
|
fi
|
||||||
|
|
||||||
|
libssl$(SHLIB_EXT): libcrypto$(SHLIB_EXT) libssl.a
|
||||||
|
@if [ "$(SHLIB_TARGET)" != "" ]; then \
|
||||||
|
$(MAKE) SHLIBDIRS=ssl SHLIBDEPS='-lcrypto' build-shared; \
|
||||||
|
else \
|
||||||
|
echo "There's no support for shared libraries on this platform" >&2; \
|
||||||
|
exit 1; \
|
||||||
|
fi
|
||||||
|
|
||||||
|
clean-shared:
|
||||||
|
@set -e; for i in $(SHLIBDIRS); do \
|
||||||
|
if [ -n "$(SHARED_LIBS_LINK_EXTS)" ]; then \
|
||||||
|
tmp="$(SHARED_LIBS_LINK_EXTS)"; \
|
||||||
|
for j in $${tmp:-x}; do \
|
||||||
|
( set -x; rm -f lib$$i$$j ); \
|
||||||
|
done; \
|
||||||
|
fi; \
|
||||||
|
( set -x; rm -f lib$$i$(SHLIB_EXT) ); \
|
||||||
|
if [ "$(PLATFORM)" = "Cygwin" ]; then \
|
||||||
|
( set -x; rm -f cyg$$i$(SHLIB_EXT) lib$$i$(SHLIB_EXT).a ); \
|
||||||
|
fi; \
|
||||||
|
done
|
||||||
|
|
||||||
|
link-shared:
|
||||||
|
@ set -e; for i in $(SHLIBDIRS); do \
|
||||||
|
$(MAKE) -f $(HERE)/Makefile.shared -e $(BUILDENV) \
|
||||||
|
LIBNAME=$$i LIBVERSION=$(SHLIB_MAJOR).$(SHLIB_MINOR) \
|
||||||
|
LIBCOMPATVERSIONS=";$(SHLIB_VERSION_HISTORY)" \
|
||||||
|
symlink.$(SHLIB_TARGET); \
|
||||||
|
libs="$$libs -l$$i"; \
|
||||||
|
done
|
||||||
|
|
||||||
|
build-shared: do_$(SHLIB_TARGET) link-shared
|
||||||
|
|
||||||
|
do_$(SHLIB_TARGET):
|
||||||
|
@ set -e; libs='-L. $(SHLIBDEPS)'; for i in $(SHLIBDIRS); do \
|
||||||
|
if [ "$$i" = "ssl" -a -n "$(LIBKRB5)" ]; then \
|
||||||
|
libs="$(LIBKRB5) $$libs"; \
|
||||||
|
fi; \
|
||||||
|
$(CLEARENV) && $(MAKE) -f Makefile.shared -e $(BUILDENV) \
|
||||||
|
LIBNAME=$$i LIBVERSION=$(SHLIB_MAJOR).$(SHLIB_MINOR) \
|
||||||
|
LIBCOMPATVERSIONS=";$(SHLIB_VERSION_HISTORY)" \
|
||||||
|
LIBDEPS="$$libs $(EX_LIBS)" \
|
||||||
|
link_a.$(SHLIB_TARGET); \
|
||||||
|
libs="-l$$i $$libs"; \
|
||||||
|
done
|
||||||
|
|
||||||
|
libcrypto.pc: Makefile
|
||||||
|
@ ( echo 'prefix=$(INSTALLTOP)'; \
|
||||||
|
echo 'exec_prefix=$${prefix}'; \
|
||||||
|
echo 'libdir=$${exec_prefix}/$(LIBDIR)'; \
|
||||||
|
echo 'includedir=$${prefix}/include'; \
|
||||||
|
echo ''; \
|
||||||
|
echo 'Name: OpenSSL-libcrypto'; \
|
||||||
|
echo 'Description: OpenSSL cryptography library'; \
|
||||||
|
echo 'Version: '$(VERSION); \
|
||||||
|
echo 'Requires: '; \
|
||||||
|
echo 'Libs: -L$${libdir} -lcrypto $(EX_LIBS)'; \
|
||||||
|
echo 'Cflags: -I$${includedir} $(KRB5_INCLUDES)' ) > libcrypto.pc
|
||||||
|
|
||||||
|
libssl.pc: Makefile
|
||||||
|
@ ( echo 'prefix=$(INSTALLTOP)'; \
|
||||||
|
echo 'exec_prefix=$${prefix}'; \
|
||||||
|
echo 'libdir=$${exec_prefix}/$(LIBDIR)'; \
|
||||||
|
echo 'includedir=$${prefix}/include'; \
|
||||||
|
echo ''; \
|
||||||
|
echo 'Name: OpenSSL'; \
|
||||||
|
echo 'Description: Secure Sockets Layer and cryptography libraries'; \
|
||||||
|
echo 'Version: '$(VERSION); \
|
||||||
|
echo 'Requires: '; \
|
||||||
|
echo 'Libs: -L$${libdir} -lssl -lcrypto $(EX_LIBS)'; \
|
||||||
|
echo 'Cflags: -I$${includedir} $(KRB5_INCLUDES)' ) > libssl.pc
|
||||||
|
|
||||||
|
openssl.pc: Makefile
|
||||||
|
@ ( echo 'prefix=$(INSTALLTOP)'; \
|
||||||
|
echo 'exec_prefix=$${prefix}'; \
|
||||||
|
echo 'libdir=$${exec_prefix}/$(LIBDIR)'; \
|
||||||
|
echo 'includedir=$${prefix}/include'; \
|
||||||
|
echo ''; \
|
||||||
|
echo 'Name: OpenSSL'; \
|
||||||
|
echo 'Description: Secure Sockets Layer and cryptography libraries and tools'; \
|
||||||
|
echo 'Version: '$(VERSION); \
|
||||||
|
echo 'Requires: '; \
|
||||||
|
echo 'Libs: -L$${libdir} -lssl -lcrypto $(EX_LIBS)'; \
|
||||||
|
echo 'Cflags: -I$${includedir} $(KRB5_INCLUDES)' ) > openssl.pc
|
||||||
|
|
||||||
|
Makefile: Makefile.fips Configure config
|
||||||
|
@echo "Makefile is older than Makefile.org, Configure or config."
|
||||||
|
@echo "Reconfigure the source tree (via './config' or 'perl Configure'), please."
|
||||||
|
@false
|
||||||
|
|
||||||
|
libclean:
|
||||||
|
rm -f *.map *.so *.so.* *.dll engines/*.so engines/*.dll *.a engines/*.a */lib */*/lib
|
||||||
|
|
||||||
|
clean: libclean
|
||||||
|
rm -f shlib/*.o *.o core a.out fluff testlog make.log cctest cctest.c
|
||||||
|
@set -e; target=clean; $(RECURSIVE_BUILD_CMD)
|
||||||
|
rm -f $(LIBS)
|
||||||
|
rm -f openssl.pc libssl.pc libcrypto.pc
|
||||||
|
rm -f speed.* .pure
|
||||||
|
rm -f $(TARFILE)
|
||||||
|
@set -e; for i in $(ONEDIRS) ;\
|
||||||
|
do \
|
||||||
|
rm -fr $$i/*; \
|
||||||
|
done
|
||||||
|
|
||||||
|
makefile.one: files
|
||||||
|
$(PERL) util/mk1mf.pl >makefile.one; \
|
||||||
|
sh util/do_ms.sh
|
||||||
|
|
||||||
|
files:
|
||||||
|
$(PERL) $(TOP)/util/files.pl Makefile > $(TOP)/MINFO
|
||||||
|
@set -e; target=files; $(RECURSIVE_BUILD_CMD)
|
||||||
|
|
||||||
|
links:
|
||||||
|
@$(PERL) $(TOP)/util/mkdir-p.pl include/openssl
|
||||||
|
@$(PERL) $(TOP)/util/mklink.pl include/openssl $(EXHEADER)
|
||||||
|
@set -e; dir=fips target=links; $(BUILD_ONE_CMD)
|
||||||
|
@(cd crypto ; TEST='' SDIRS='$(LINKDIRS)' $(MAKE) -e links)
|
||||||
|
|
||||||
|
gentests:
|
||||||
|
@(cd test && echo "generating dummy tests (if needed)..." && \
|
||||||
|
$(CLEARENV) && $(MAKE) -e $(BUILDENV) TESTS='$(TESTS)' OPENSSL_DEBUG_MEMORY=on generate );
|
||||||
|
|
||||||
|
dclean:
|
||||||
|
rm -rf *.bak include/openssl certs/.0
|
||||||
|
@set -e; target=dclean; $(RECURSIVE_BUILD_CMD)
|
||||||
|
|
||||||
|
test: tests
|
||||||
|
|
||||||
|
tests:
|
||||||
|
@echo "Not implemented in FIPS build" ; false
|
||||||
|
|
||||||
|
report:
|
||||||
|
@$(PERL) util/selftest.pl
|
||||||
|
|
||||||
|
depend:
|
||||||
|
@echo make depend not supported ; false
|
||||||
|
|
||||||
|
lint:
|
||||||
|
@set -e; target=lint; $(RECURSIVE_BUILD_CMD)
|
||||||
|
|
||||||
|
tags:
|
||||||
|
rm -f TAGS
|
||||||
|
find . -name '[^.]*.[ch]' | xargs etags -a
|
||||||
|
|
||||||
|
errors:
|
||||||
|
$(PERL) util/mkerr.pl -recurse -write
|
||||||
|
(cd engines; $(MAKE) PERL=$(PERL) errors)
|
||||||
|
$(PERL) util/ck_errf.pl -strict */*.c */*/*.c
|
||||||
|
|
||||||
|
stacks:
|
||||||
|
$(PERL) util/mkstack.pl -write
|
||||||
|
|
||||||
|
util/libeay.num::
|
||||||
|
$(PERL) util/mkdef.pl crypto update
|
||||||
|
|
||||||
|
util/ssleay.num::
|
||||||
|
$(PERL) util/mkdef.pl ssl update
|
||||||
|
|
||||||
|
crypto/objects/obj_dat.h: crypto/objects/obj_dat.pl crypto/objects/obj_mac.h
|
||||||
|
$(PERL) crypto/objects/obj_dat.pl crypto/objects/obj_mac.h crypto/objects/obj_dat.h
|
||||||
|
crypto/objects/obj_mac.h: crypto/objects/objects.pl crypto/objects/objects.txt crypto/objects/obj_mac.num
|
||||||
|
$(PERL) crypto/objects/objects.pl crypto/objects/objects.txt crypto/objects/obj_mac.num crypto/objects/obj_mac.h
|
||||||
|
crypto/objects/obj_xref.h: crypto/objects/objxref.pl crypto/objects/obj_xref.txt crypto/objects/obj_mac.num
|
||||||
|
$(PERL) crypto/objects/objxref.pl crypto/objects/obj_mac.num crypto/objects/obj_xref.txt >crypto/objects/obj_xref.h
|
||||||
|
|
||||||
|
apps/openssl-vms.cnf: apps/openssl.cnf
|
||||||
|
$(PERL) VMS/VMSify-conf.pl < apps/openssl.cnf > apps/openssl-vms.cnf
|
||||||
|
|
||||||
|
crypto/bn/bn_prime.h: crypto/bn/bn_prime.pl
|
||||||
|
$(PERL) crypto/bn/bn_prime.pl >crypto/bn/bn_prime.h
|
||||||
|
|
||||||
|
|
||||||
|
TABLE: Configure
|
||||||
|
(echo 'Output of `Configure TABLE'"':"; \
|
||||||
|
$(PERL) Configure TABLE) > TABLE
|
||||||
|
|
||||||
|
update: errors stacks util/libeay.num util/ssleay.num crypto/objects/obj_dat.h crypto/objects/obj_xref.h apps/openssl-vms.cnf crypto/bn/bn_prime.h TABLE depend
|
||||||
|
|
||||||
|
# Build distribution tar-file. As the list of files returned by "find" is
|
||||||
|
# pretty long, on several platforms a "too many arguments" error or similar
|
||||||
|
# would occur. Therefore the list of files is temporarily stored into a file
|
||||||
|
# and read directly, requiring GNU-Tar. Call "make TAR=gtar dist" if the normal
|
||||||
|
# tar does not support the --files-from option.
|
||||||
|
tar:
|
||||||
|
find . -type d -print | xargs chmod 755
|
||||||
|
find . -type f -print | xargs chmod a+r
|
||||||
|
find . -type f -perm -0100 -print | xargs chmod a+x
|
||||||
|
find * \! -path CVS/\* \! -path \*/CVS/\* \! -name CVS \! -name .cvsignore \! -name STATUS \! -name TABLE | $(BUILDENV) LINKDIRS='$(LINKDIRS)' $(PERL) util/fipsdist.pl | sort > ../$(TARFILE).list; \
|
||||||
|
$(TAR) $(TARFLAGS) --files-from ../$(TARFILE).list -cvf - | \
|
||||||
|
tardy --user_number=0 --user_name=openssl \
|
||||||
|
--group_number=0 --group_name=openssl \
|
||||||
|
--prefix=openssl-$(VERSION) - |\
|
||||||
|
gzip --best >../$(TARFILE).gz; \
|
||||||
|
rm -f ../$(TARFILE).list; \
|
||||||
|
ls -l ../$(TARFILE).gz
|
||||||
|
|
||||||
|
tar-snap:
|
||||||
|
@$(TAR) $(TARFLAGS) -cvf - \
|
||||||
|
`find * \! -path CVS/\* \! -path \*/CVS/\* \! -name CVS \! -name .cvsignore \! -name STATUS \! -name TABLE \! -name '*.o' \! -name '*.a' \! -name '*.so' \! -name '*.so.*' \! -name 'openssl' \! -name '*test' \! -name '.#*' \! -name '*~' | sort` |\
|
||||||
|
tardy --user_number=0 --user_name=openssl \
|
||||||
|
--group_number=0 --group_name=openssl \
|
||||||
|
--prefix=openssl-$(VERSION) - > ../$(TARFILE);\
|
||||||
|
ls -l ../$(TARFILE)
|
||||||
|
|
||||||
|
dist:
|
||||||
|
$(PERL) Configure dist fipscanisteronly
|
||||||
|
@$(MAKE) dist_pem_h
|
||||||
|
@$(MAKE) SDIRS='$(SDIRS)' clean
|
||||||
|
@$(MAKE) -f Makefile.fips TAR='$(TAR)' TARFLAGS='$(TARFLAGS)' tar
|
||||||
|
|
||||||
|
dist_pem_h:
|
||||||
|
(cd crypto/pem; $(MAKE) -e $(BUILDENV) pem.h; $(MAKE) clean)
|
||||||
|
|
||||||
|
install: all install_sw
|
||||||
|
|
||||||
|
install_sw:
|
||||||
|
@$(PERL) $(TOP)/util/mkdir-p.pl $(INSTALL_PREFIX)$(INSTALLTOP)/bin \
|
||||||
|
$(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR) \
|
||||||
|
$(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl
|
||||||
|
@set -e; headerlist="$(EXHEADER)"; for i in $$headerlist;\
|
||||||
|
do \
|
||||||
|
(cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl/$$i; \
|
||||||
|
chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl/$$i ); \
|
||||||
|
done;
|
||||||
|
@set -e; target=install; $(RECURSIVE_BUILD_CMD)
|
||||||
|
|
||||||
|
# DO NOT DELETE THIS LINE -- make depend depends on it.
|
||||||
350
Makefile.org
350
Makefile.org
@@ -66,17 +66,19 @@ EXE_EXT=
|
|||||||
ARFLAGS=
|
ARFLAGS=
|
||||||
AR=ar $(ARFLAGS) r
|
AR=ar $(ARFLAGS) r
|
||||||
RANLIB= ranlib
|
RANLIB= ranlib
|
||||||
|
NM= nm
|
||||||
PERL= perl
|
PERL= perl
|
||||||
TAR= tar
|
TAR= tar
|
||||||
TARFLAGS= --no-recursion
|
TARFLAGS= --no-recursion
|
||||||
MAKEDEPPROG=makedepend
|
MAKEDEPPROG=makedepend
|
||||||
|
LIBDIR=lib
|
||||||
|
|
||||||
# We let the C compiler driver to take care of .s files. This is done in
|
# We let the C compiler driver to take care of .s files. This is done in
|
||||||
# order to be excused from maintaining a separate set of architecture
|
# order to be excused from maintaining a separate set of architecture
|
||||||
# dependent assembler flags. E.g. if you throw -mcpu=ultrasparc at SPARC
|
# dependent assembler flags. E.g. if you throw -mcpu=ultrasparc at SPARC
|
||||||
# gcc, then the driver will automatically translate it to -xarch=v8plus
|
# gcc, then the driver will automatically translate it to -xarch=v8plus
|
||||||
# and pass it down to assembler.
|
# and pass it down to assembler.
|
||||||
AS=$(CC) -c
|
#AS=$(CC) -c
|
||||||
ASFLAG=$(CFLAG)
|
ASFLAG=$(CFLAG)
|
||||||
|
|
||||||
# For x86 assembler: Set PROCESSOR to 386 if you want to support
|
# For x86 assembler: Set PROCESSOR to 386 if you want to support
|
||||||
@@ -87,7 +89,7 @@ PROCESSOR=
|
|||||||
CPUID_OBJ=
|
CPUID_OBJ=
|
||||||
BN_ASM= bn_asm.o
|
BN_ASM= bn_asm.o
|
||||||
DES_ENC= des_enc.o fcrypt_b.o
|
DES_ENC= des_enc.o fcrypt_b.o
|
||||||
AES_ASM_OBJ=aes_core.o aes_cbc.o
|
AES_ENC= aes_core.o aes_cbc.o
|
||||||
BF_ENC= bf_enc.o
|
BF_ENC= bf_enc.o
|
||||||
CAST_ENC= c_enc.o
|
CAST_ENC= c_enc.o
|
||||||
RC4_ENC= rc4_enc.o
|
RC4_ENC= rc4_enc.o
|
||||||
@@ -95,6 +97,11 @@ RC5_ENC= rc5_enc.o
|
|||||||
MD5_ASM_OBJ=
|
MD5_ASM_OBJ=
|
||||||
SHA1_ASM_OBJ=
|
SHA1_ASM_OBJ=
|
||||||
RMD160_ASM_OBJ=
|
RMD160_ASM_OBJ=
|
||||||
|
WP_ASM_OBJ=
|
||||||
|
CMLL_ENC=
|
||||||
|
MODES_ASM_OBJ=
|
||||||
|
ENGINES_ASM_OBJ=
|
||||||
|
PERLASM_SCHEME=
|
||||||
|
|
||||||
# KRB5 stuff
|
# KRB5 stuff
|
||||||
KRB5_INCLUDES=
|
KRB5_INCLUDES=
|
||||||
@@ -104,18 +111,45 @@ LIBKRB5=
|
|||||||
ZLIB_INCLUDE=
|
ZLIB_INCLUDE=
|
||||||
LIBZLIB=
|
LIBZLIB=
|
||||||
|
|
||||||
DIRS= crypto ssl engines apps test tools
|
# This is the location of fipscanister.o and friends.
|
||||||
|
# The FIPS module build will place it $(INSTALLTOP)/lib
|
||||||
|
# but since $(INSTALLTOP) can only take the default value
|
||||||
|
# when the module is built it will be in /usr/local/ssl/lib
|
||||||
|
# $(INSTALLTOP) for this build may be different so hard
|
||||||
|
# code the path.
|
||||||
|
|
||||||
|
FIPSLIBDIR=/usr/local/ssl/$(LIBDIR)/
|
||||||
|
|
||||||
|
# This is set to "y" if fipscanister.o is compiled internally as
|
||||||
|
# opposed to coming from an external validated location.
|
||||||
|
|
||||||
|
FIPSCANISTERINTERNAL=n
|
||||||
|
|
||||||
|
# The location of the library which contains fipscanister.o
|
||||||
|
# normally it will be libcrypto unless fipsdso is set in which
|
||||||
|
# case it will be libfips. If not compiling in FIPS mode at all
|
||||||
|
# this is empty making it a useful test for a FIPS compile.
|
||||||
|
|
||||||
|
FIPSCANLIB=
|
||||||
|
|
||||||
|
# Shared library base address. Currently only used on Windows.
|
||||||
|
#
|
||||||
|
|
||||||
|
BASEADDR=
|
||||||
|
|
||||||
|
DIRS= crypto fips ssl engines apps test tools
|
||||||
|
ENGDIRS= ccgost
|
||||||
SHLIBDIRS= crypto ssl
|
SHLIBDIRS= crypto ssl
|
||||||
|
|
||||||
# dirs in crypto to build
|
# dirs in crypto to build
|
||||||
SDIRS= \
|
SDIRS= \
|
||||||
objects \
|
objects \
|
||||||
md2 md4 md5 sha mdc2 hmac ripemd \
|
md2 md4 md5 sha mdc2 hmac ripemd whrlpool \
|
||||||
des aes rc2 rc4 rc5 idea bf cast camellia seed \
|
des aes rc2 rc4 rc5 idea bf cast camellia seed modes \
|
||||||
bn ec rsa dsa ecdsa dh ecdh dso engine \
|
bn ec rsa dsa ecdsa dh ecdh dso engine \
|
||||||
buffer bio stack lhash rand err \
|
buffer bio stack lhash rand err \
|
||||||
evp asn1 pem x509 x509v3 conf txt_db pkcs7 pkcs12 comp ocsp ui krb5 \
|
evp asn1 pem x509 x509v3 conf txt_db pkcs7 pkcs12 comp ocsp ui krb5 \
|
||||||
store cms pqueue
|
cms pqueue ts jpake srp store cmac
|
||||||
# keep in mind that the above list is adjusted by ./Configure
|
# keep in mind that the above list is adjusted by ./Configure
|
||||||
# according to no-xxx arguments...
|
# according to no-xxx arguments...
|
||||||
|
|
||||||
@@ -129,6 +163,8 @@ MANDIR=$(OPENSSLDIR)/man
|
|||||||
MAN1=1
|
MAN1=1
|
||||||
MAN3=3
|
MAN3=3
|
||||||
MANSUFFIX=
|
MANSUFFIX=
|
||||||
|
HTMLSUFFIX=html
|
||||||
|
HTMLDIR=$(OPENSSLDIR)/html
|
||||||
SHELL=/bin/sh
|
SHELL=/bin/sh
|
||||||
|
|
||||||
TOP= .
|
TOP= .
|
||||||
@@ -168,29 +204,41 @@ CLEARENV= TOP= && unset TOP $${LIB+LIB} $${LIBS+LIBS} \
|
|||||||
$${SHAREDCMD+SHAREDCMD} $${SHAREDFLAGS+SHAREDFLAGS} \
|
$${SHAREDCMD+SHAREDCMD} $${SHAREDFLAGS+SHAREDFLAGS} \
|
||||||
$${SHARED_LIB+SHARED_LIB} $${LIBEXTRAS+LIBEXTRAS}
|
$${SHARED_LIB+SHARED_LIB} $${LIBEXTRAS+LIBEXTRAS}
|
||||||
|
|
||||||
BUILDENV= PLATFORM='${PLATFORM}' PROCESSOR='${PROCESSOR}' \
|
BUILDENV= PLATFORM='$(PLATFORM)' PROCESSOR='$(PROCESSOR)' \
|
||||||
CC='${CC}' CFLAG='${CFLAG}' \
|
CC='$(CC)' CFLAG='$(CFLAG)' \
|
||||||
AS='${CC}' ASFLAG='${CFLAG} -c' \
|
ASFLAG='$(CFLAG) -c' \
|
||||||
AR='${AR}' PERL='${PERL}' RANLIB='${RANLIB}' \
|
AR='$(AR)' NM='$(NM)' RANLIB='$(RANLIB)' \
|
||||||
SDIRS='${SDIRS}' LIBRPATH='${INSTALLTOP}/lib' \
|
CROSS_COMPILE='$(CROSS_COMPILE)' \
|
||||||
INSTALL_PREFIX='${INSTALL_PREFIX}' \
|
PERL='$(PERL)' ENGDIRS='$(ENGDIRS)' \
|
||||||
INSTALLTOP='${INSTALLTOP}' OPENSSLDIR='${OPENSSLDIR}' \
|
SDIRS='$(SDIRS)' LIBRPATH='$(INSTALLTOP)/$(LIBDIR)' \
|
||||||
MAKEDEPEND='$$$${TOP}/util/domd $$$${TOP} -MD ${MAKEDEPPROG}' \
|
INSTALL_PREFIX='$(INSTALL_PREFIX)' \
|
||||||
DEPFLAG='-DOPENSSL_NO_DEPRECATED ${DEPFLAG}' \
|
INSTALLTOP='$(INSTALLTOP)' OPENSSLDIR='$(OPENSSLDIR)' \
|
||||||
MAKEDEPPROG='${MAKEDEPPROG}' \
|
LIBDIR='$(LIBDIR)' \
|
||||||
SHARED_LDFLAGS='${SHARED_LDFLAGS}' \
|
MAKEDEPEND='$$$${TOP}/util/domd $$$${TOP} -MD $(MAKEDEPPROG)' \
|
||||||
KRB5_INCLUDES='${KRB5_INCLUDES}' LIBKRB5='${LIBKRB5}' \
|
DEPFLAG='-DOPENSSL_NO_DEPRECATED $(DEPFLAG)' \
|
||||||
EXE_EXT='${EXE_EXT}' SHARED_LIBS='${SHARED_LIBS}' \
|
MAKEDEPPROG='$(MAKEDEPPROG)' \
|
||||||
SHLIB_EXT='${SHLIB_EXT}' SHLIB_TARGET='${SHLIB_TARGET}' \
|
SHARED_LDFLAGS='$(SHARED_LDFLAGS)' \
|
||||||
PEX_LIBS='${PEX_LIBS}' EX_LIBS='${EX_LIBS}' \
|
KRB5_INCLUDES='$(KRB5_INCLUDES)' LIBKRB5='$(LIBKRB5)' \
|
||||||
CPUID_OBJ='${CPUID_OBJ}' \
|
ZLIB_INCLUDE='$(ZLIB_INCLUDE)' LIBZLIB='$(LIBZLIB)' \
|
||||||
BN_ASM='${BN_ASM}' DES_ENC='${DES_ENC}' \
|
EXE_EXT='$(EXE_EXT)' SHARED_LIBS='$(SHARED_LIBS)' \
|
||||||
AES_ASM_OBJ='${AES_ASM_OBJ}' \
|
SHLIB_EXT='$(SHLIB_EXT)' SHLIB_TARGET='$(SHLIB_TARGET)' \
|
||||||
BF_ENC='${BF_ENC}' CAST_ENC='${CAST_ENC}' \
|
PEX_LIBS='$(PEX_LIBS)' EX_LIBS='$(EX_LIBS)' \
|
||||||
RC4_ENC='${RC4_ENC}' RC5_ENC='${RC5_ENC}' \
|
CPUID_OBJ='$(CPUID_OBJ)' \
|
||||||
SHA1_ASM_OBJ='${SHA1_ASM_OBJ}' \
|
BN_ASM='$(BN_ASM)' DES_ENC='$(DES_ENC)' \
|
||||||
MD5_ASM_OBJ='${MD5_ASM_OBJ}' \
|
AES_ENC='$(AES_ENC)' CMLL_ENC='$(CMLL_ENC)' \
|
||||||
RMD160_ASM_OBJ='${RMD160_ASM_OBJ}' \
|
BF_ENC='$(BF_ENC)' CAST_ENC='$(CAST_ENC)' \
|
||||||
|
RC4_ENC='$(RC4_ENC)' RC5_ENC='$(RC5_ENC)' \
|
||||||
|
SHA1_ASM_OBJ='$(SHA1_ASM_OBJ)' \
|
||||||
|
MD5_ASM_OBJ='$(MD5_ASM_OBJ)' \
|
||||||
|
RMD160_ASM_OBJ='$(RMD160_ASM_OBJ)' \
|
||||||
|
WP_ASM_OBJ='$(WP_ASM_OBJ)' \
|
||||||
|
MODES_ASM_OBJ='$(MODES_ASM_OBJ)' \
|
||||||
|
ENGINES_ASM_OBJ='$(ENGINES_ASM_OBJ)' \
|
||||||
|
PERLASM_SCHEME='$(PERLASM_SCHEME)' \
|
||||||
|
FIPSLIBDIR='${FIPSLIBDIR}' \
|
||||||
|
FIPSCANLIB="$${FIPSCANLIB:-$(FIPSCANLIB)}" \
|
||||||
|
FIPSCANISTERINTERNAL='${FIPSCANISTERINTERNAL}' \
|
||||||
|
FIPS_EX_OBJ='${FIPS_EX_OBJ}' \
|
||||||
THIS=$${THIS:-$@} MAKEFILE=Makefile MAKEOVERRIDES=
|
THIS=$${THIS:-$@} MAKEFILE=Makefile MAKEOVERRIDES=
|
||||||
# MAKEOVERRIDES= effectively "equalizes" GNU-ish and SysV-ish make flavors,
|
# MAKEOVERRIDES= effectively "equalizes" GNU-ish and SysV-ish make flavors,
|
||||||
# which in turn eliminates ambiguities in variable treatment with -e.
|
# which in turn eliminates ambiguities in variable treatment with -e.
|
||||||
@@ -215,24 +263,121 @@ BUILD_CMD= if [ -d "$$dir" ]; then \
|
|||||||
fi
|
fi
|
||||||
RECURSIVE_BUILD_CMD=for dir in $(DIRS); do $(BUILD_CMD); done
|
RECURSIVE_BUILD_CMD=for dir in $(DIRS); do $(BUILD_CMD); done
|
||||||
BUILD_ONE_CMD=\
|
BUILD_ONE_CMD=\
|
||||||
if echo " $(DIRS) " | grep " $$dir " >/dev/null 2>/dev/null; then \
|
if expr " $(DIRS) " : ".* $$dir " >/dev/null 2>&1; then \
|
||||||
$(BUILD_CMD); \
|
$(BUILD_CMD); \
|
||||||
fi
|
fi
|
||||||
|
|
||||||
reflect:
|
reflect:
|
||||||
@[ -n "$(THIS)" ] && $(CLEARENV) && $(MAKE) $(THIS) -e $(BUILDENV)
|
@[ -n "$(THIS)" ] && $(CLEARENV) && $(MAKE) $(THIS) -e $(BUILDENV)
|
||||||
|
|
||||||
|
FIPS_EX_OBJ= ../crypto/aes/aes_cfb.o \
|
||||||
|
../crypto/aes/aes_ecb.o \
|
||||||
|
../crypto/aes/aes_ofb.o \
|
||||||
|
../crypto/bn/bn_add.o \
|
||||||
|
../crypto/bn/bn_blind.o \
|
||||||
|
../crypto/bn/bn_ctx.o \
|
||||||
|
../crypto/bn/bn_div.o \
|
||||||
|
../crypto/bn/bn_exp2.o \
|
||||||
|
../crypto/bn/bn_exp.o \
|
||||||
|
../crypto/bn/bn_gcd.o \
|
||||||
|
../crypto/bn/bn_gf2m.o \
|
||||||
|
../crypto/bn/bn_lib.o \
|
||||||
|
../crypto/bn/bn_mod.o \
|
||||||
|
../crypto/bn/bn_mont.o \
|
||||||
|
../crypto/bn/bn_mul.o \
|
||||||
|
../crypto/bn/bn_nist.o \
|
||||||
|
../crypto/bn/bn_prime.o \
|
||||||
|
../crypto/bn/bn_rand.o \
|
||||||
|
../crypto/bn/bn_recp.o \
|
||||||
|
../crypto/bn/bn_shift.o \
|
||||||
|
../crypto/bn/bn_sqr.o \
|
||||||
|
../crypto/bn/bn_word.o \
|
||||||
|
../crypto/bn/bn_x931p.o \
|
||||||
|
../crypto/buffer/buf_str.o \
|
||||||
|
../crypto/cmac/cmac.o \
|
||||||
|
../crypto/cryptlib.o \
|
||||||
|
../crypto/des/cfb64ede.o \
|
||||||
|
../crypto/des/cfb64enc.o \
|
||||||
|
../crypto/des/cfb_enc.o \
|
||||||
|
../crypto/des/ecb3_enc.o \
|
||||||
|
../crypto/des/ofb64ede.o \
|
||||||
|
../crypto/des/fcrypt.o \
|
||||||
|
../crypto/des/set_key.o \
|
||||||
|
../crypto/dh/dh_check.o \
|
||||||
|
../crypto/dh/dh_gen.o \
|
||||||
|
../crypto/dh/dh_key.o \
|
||||||
|
../crypto/dsa/dsa_gen.o \
|
||||||
|
../crypto/dsa/dsa_key.o \
|
||||||
|
../crypto/dsa/dsa_ossl.o \
|
||||||
|
../crypto/ec/ec_curve.o \
|
||||||
|
../crypto/ec/ec_cvt.o \
|
||||||
|
../crypto/ec/ec_key.o \
|
||||||
|
../crypto/ec/ec_lib.o \
|
||||||
|
../crypto/ec/ecp_mont.o \
|
||||||
|
../crypto/ec/ec_mult.o \
|
||||||
|
../crypto/ec/ecp_nist.o \
|
||||||
|
../crypto/ec/ecp_smpl.o \
|
||||||
|
../crypto/ec/ec2_mult.o \
|
||||||
|
../crypto/ec/ec2_smpl.o \
|
||||||
|
../crypto/ecdh/ech_key.o \
|
||||||
|
../crypto/ecdh/ech_ossl.o \
|
||||||
|
../crypto/ecdsa/ecs_ossl.o \
|
||||||
|
../crypto/evp/e_aes.o \
|
||||||
|
../crypto/evp/e_des3.o \
|
||||||
|
../crypto/evp/e_null.o \
|
||||||
|
../crypto/evp/m_sha1.o \
|
||||||
|
../crypto/evp/m_dss1.o \
|
||||||
|
../crypto/evp/m_dss.o \
|
||||||
|
../crypto/evp/m_ecdsa.o \
|
||||||
|
../crypto/hmac/hmac.o \
|
||||||
|
../crypto/modes/cbc128.o \
|
||||||
|
../crypto/modes/ccm128.o \
|
||||||
|
../crypto/modes/cfb128.o \
|
||||||
|
../crypto/modes/ctr128.o \
|
||||||
|
../crypto/modes/gcm128.o \
|
||||||
|
../crypto/modes/ofb128.o \
|
||||||
|
../crypto/modes/xts128.o \
|
||||||
|
../crypto/rsa/rsa_eay.o \
|
||||||
|
../crypto/rsa/rsa_gen.o \
|
||||||
|
../crypto/rsa/rsa_crpt.o \
|
||||||
|
../crypto/rsa/rsa_none.o \
|
||||||
|
../crypto/rsa/rsa_oaep.o \
|
||||||
|
../crypto/rsa/rsa_pk1.o \
|
||||||
|
../crypto/rsa/rsa_pss.o \
|
||||||
|
../crypto/rsa/rsa_ssl.o \
|
||||||
|
../crypto/rsa/rsa_x931.o \
|
||||||
|
../crypto/rsa/rsa_x931g.o \
|
||||||
|
../crypto/sha/sha1dgst.o \
|
||||||
|
../crypto/sha/sha256.o \
|
||||||
|
../crypto/sha/sha512.o \
|
||||||
|
../crypto/thr_id.o \
|
||||||
|
../crypto/uid.o
|
||||||
|
|
||||||
sub_all: build_all
|
sub_all: build_all
|
||||||
build_all: build_libs build_apps build_tests build_tools
|
build_all: build_libs build_apps build_tests build_tools
|
||||||
|
|
||||||
build_libs: build_crypto build_ssl build_engines
|
build_libs: build_crypto build_fips build_ssl build_engines
|
||||||
|
|
||||||
|
build_fips:
|
||||||
|
@dir=fips; target=all; [ -z "$(FIPSCANLIB)" ] || $(BUILD_ONE_CMD)
|
||||||
|
|
||||||
build_crypto:
|
build_crypto:
|
||||||
@dir=crypto; target=all; $(BUILD_ONE_CMD)
|
if [ -n "$(FIPSCANLIB)" ]; then \
|
||||||
|
EXCL_OBJ='$(AES_ENC) $(BN_ASM) $(DES_ENC) $(CPUID_OBJ) $(SHA1_ASM_OBJ) $(MODES_ASM_OBJ) $(FIPS_EX_OBJ)' ; export EXCL_OBJ ; \
|
||||||
|
ARX='$(PERL) $${TOP}/util/arx.pl $(AR)' ; \
|
||||||
|
else \
|
||||||
|
ARX='${AR}' ; \
|
||||||
|
fi ; export ARX ; \
|
||||||
|
if [ $(FIPSCANISTERINTERNAL) = "y" ]; then \
|
||||||
|
AS='$(PERL) $${TOP}/util/fipsas.pl $${TOP} $${<} $(CC) -c' ; \
|
||||||
|
else \
|
||||||
|
AS='$(CC) -c' ; \
|
||||||
|
fi ; export AS ; \
|
||||||
|
dir=crypto; target=all; $(BUILD_ONE_CMD)
|
||||||
build_ssl:
|
build_ssl:
|
||||||
@dir=ssl; target=all; $(BUILD_ONE_CMD)
|
@dir=ssl; target=all; $(BUILD_ONE_CMD)
|
||||||
build_engines:
|
build_engines:
|
||||||
@dir=engines; target=all; $(BUILD_ONE_CMD)
|
@dir=engines; target=all; AS='$(CC) -c'; export AS; $(BUILD_ONE_CMD)
|
||||||
build_apps:
|
build_apps:
|
||||||
@dir=apps; target=all; $(BUILD_ONE_CMD)
|
@dir=apps; target=all; $(BUILD_ONE_CMD)
|
||||||
build_tests:
|
build_tests:
|
||||||
@@ -244,9 +389,13 @@ all_testapps: build_libs build_testapps
|
|||||||
build_testapps:
|
build_testapps:
|
||||||
@dir=crypto; target=testapps; $(BUILD_ONE_CMD)
|
@dir=crypto; target=testapps; $(BUILD_ONE_CMD)
|
||||||
|
|
||||||
libcrypto$(SHLIB_EXT): libcrypto.a
|
libcrypto$(SHLIB_EXT): libcrypto.a build_fips
|
||||||
@if [ "$(SHLIB_TARGET)" != "" ]; then \
|
@if [ "$(SHLIB_TARGET)" != "" ]; then \
|
||||||
$(MAKE) SHLIBDIRS=crypto build-shared; \
|
if [ "$(FIPSCANLIB)" = "libcrypto" ]; then \
|
||||||
|
FIPSLD_CC="$(CC)"; CC=fips/fipsld; \
|
||||||
|
export CC FIPSLD_CC; \
|
||||||
|
fi; \
|
||||||
|
$(MAKE) -e SHLIBDIRS=crypto build-shared; \
|
||||||
else \
|
else \
|
||||||
echo "There's no support for shared libraries on this platform" >&2; \
|
echo "There's no support for shared libraries on this platform" >&2; \
|
||||||
exit 1; \
|
exit 1; \
|
||||||
@@ -275,10 +424,10 @@ clean-shared:
|
|||||||
done
|
done
|
||||||
|
|
||||||
link-shared:
|
link-shared:
|
||||||
@ set -e; for i in ${SHLIBDIRS}; do \
|
@ set -e; for i in $(SHLIBDIRS); do \
|
||||||
$(MAKE) -f $(HERE)/Makefile.shared -e $(BUILDENV) \
|
$(MAKE) -f $(HERE)/Makefile.shared -e $(BUILDENV) \
|
||||||
LIBNAME=$$i LIBVERSION=${SHLIB_MAJOR}.${SHLIB_MINOR} \
|
LIBNAME=$$i LIBVERSION=$(SHLIB_MAJOR).$(SHLIB_MINOR) \
|
||||||
LIBCOMPATVERSIONS=";${SHLIB_VERSION_HISTORY}" \
|
LIBCOMPATVERSIONS=";$(SHLIB_VERSION_HISTORY)" \
|
||||||
symlink.$(SHLIB_TARGET); \
|
symlink.$(SHLIB_TARGET); \
|
||||||
libs="$$libs -l$$i"; \
|
libs="$$libs -l$$i"; \
|
||||||
done
|
done
|
||||||
@@ -286,13 +435,13 @@ link-shared:
|
|||||||
build-shared: do_$(SHLIB_TARGET) link-shared
|
build-shared: do_$(SHLIB_TARGET) link-shared
|
||||||
|
|
||||||
do_$(SHLIB_TARGET):
|
do_$(SHLIB_TARGET):
|
||||||
@ set -e; libs='-L. ${SHLIBDEPS}'; for i in ${SHLIBDIRS}; do \
|
@ set -e; libs='-L. $(SHLIBDEPS)'; for i in $(SHLIBDIRS); do \
|
||||||
if [ "${SHLIBDIRS}" = "ssl" -a -n "$(LIBKRB5)" ]; then \
|
if [ "$$i" = "ssl" -a -n "$(LIBKRB5)" ]; then \
|
||||||
libs="$(LIBKRB5) $$libs"; \
|
libs="$(LIBKRB5) $$libs"; \
|
||||||
fi; \
|
fi; \
|
||||||
$(CLEARENV) && $(MAKE) -f Makefile.shared -e $(BUILDENV) \
|
$(CLEARENV) && $(MAKE) -f Makefile.shared -e $(BUILDENV) \
|
||||||
LIBNAME=$$i LIBVERSION=${SHLIB_MAJOR}.${SHLIB_MINOR} \
|
LIBNAME=$$i LIBVERSION=$(SHLIB_MAJOR).$(SHLIB_MINOR) \
|
||||||
LIBCOMPATVERSIONS=";${SHLIB_VERSION_HISTORY}" \
|
LIBCOMPATVERSIONS=";$(SHLIB_VERSION_HISTORY)" \
|
||||||
LIBDEPS="$$libs $(EX_LIBS)" \
|
LIBDEPS="$$libs $(EX_LIBS)" \
|
||||||
link_a.$(SHLIB_TARGET); \
|
link_a.$(SHLIB_TARGET); \
|
||||||
libs="-l$$i $$libs"; \
|
libs="-l$$i $$libs"; \
|
||||||
@@ -301,7 +450,7 @@ do_$(SHLIB_TARGET):
|
|||||||
libcrypto.pc: Makefile
|
libcrypto.pc: Makefile
|
||||||
@ ( echo 'prefix=$(INSTALLTOP)'; \
|
@ ( echo 'prefix=$(INSTALLTOP)'; \
|
||||||
echo 'exec_prefix=$${prefix}'; \
|
echo 'exec_prefix=$${prefix}'; \
|
||||||
echo 'libdir=$${exec_prefix}/lib'; \
|
echo 'libdir=$${exec_prefix}/$(LIBDIR)'; \
|
||||||
echo 'includedir=$${prefix}/include'; \
|
echo 'includedir=$${prefix}/include'; \
|
||||||
echo ''; \
|
echo ''; \
|
||||||
echo 'Name: OpenSSL-libcrypto'; \
|
echo 'Name: OpenSSL-libcrypto'; \
|
||||||
@@ -314,7 +463,7 @@ libcrypto.pc: Makefile
|
|||||||
libssl.pc: Makefile
|
libssl.pc: Makefile
|
||||||
@ ( echo 'prefix=$(INSTALLTOP)'; \
|
@ ( echo 'prefix=$(INSTALLTOP)'; \
|
||||||
echo 'exec_prefix=$${prefix}'; \
|
echo 'exec_prefix=$${prefix}'; \
|
||||||
echo 'libdir=$${exec_prefix}/lib'; \
|
echo 'libdir=$${exec_prefix}/$(LIBDIR)'; \
|
||||||
echo 'includedir=$${prefix}/include'; \
|
echo 'includedir=$${prefix}/include'; \
|
||||||
echo ''; \
|
echo ''; \
|
||||||
echo 'Name: OpenSSL'; \
|
echo 'Name: OpenSSL'; \
|
||||||
@@ -327,7 +476,7 @@ libssl.pc: Makefile
|
|||||||
openssl.pc: Makefile
|
openssl.pc: Makefile
|
||||||
@ ( echo 'prefix=$(INSTALLTOP)'; \
|
@ ( echo 'prefix=$(INSTALLTOP)'; \
|
||||||
echo 'exec_prefix=$${prefix}'; \
|
echo 'exec_prefix=$${prefix}'; \
|
||||||
echo 'libdir=$${exec_prefix}/lib'; \
|
echo 'libdir=$${exec_prefix}/$(LIBDIR)'; \
|
||||||
echo 'includedir=$${prefix}/include'; \
|
echo 'includedir=$${prefix}/include'; \
|
||||||
echo ''; \
|
echo ''; \
|
||||||
echo 'Name: OpenSSL'; \
|
echo 'Name: OpenSSL'; \
|
||||||
@@ -369,29 +518,35 @@ links:
|
|||||||
@$(PERL) $(TOP)/util/mkdir-p.pl include/openssl
|
@$(PERL) $(TOP)/util/mkdir-p.pl include/openssl
|
||||||
@$(PERL) $(TOP)/util/mklink.pl include/openssl $(EXHEADER)
|
@$(PERL) $(TOP)/util/mklink.pl include/openssl $(EXHEADER)
|
||||||
@set -e; target=links; $(RECURSIVE_BUILD_CMD)
|
@set -e; target=links; $(RECURSIVE_BUILD_CMD)
|
||||||
|
@if [ -z "$(FIPSCANLIB)" ]; then \
|
||||||
|
set -e; target=links; dir=fips ; $(BUILD_CMD) ; \
|
||||||
|
fi
|
||||||
|
|
||||||
gentests:
|
gentests:
|
||||||
@(cd test && echo "generating dummy tests (if needed)..." && \
|
@(cd test && echo "generating dummy tests (if needed)..." && \
|
||||||
$(CLEARENV) && $(MAKE) -e $(BUILDENV) TESTS='${TESTS}' OPENSSL_DEBUG_MEMORY=on generate );
|
$(CLEARENV) && $(MAKE) -e $(BUILDENV) TESTS='$(TESTS)' OPENSSL_DEBUG_MEMORY=on generate );
|
||||||
|
|
||||||
dclean:
|
dclean:
|
||||||
rm -f *.bak
|
rm -rf *.bak include/openssl certs/.0
|
||||||
@set -e; target=dclean; $(RECURSIVE_BUILD_CMD)
|
@set -e; target=dclean; $(RECURSIVE_BUILD_CMD)
|
||||||
|
|
||||||
rehash: rehash.time
|
rehash: rehash.time
|
||||||
rehash.time: certs
|
rehash.time: certs apps
|
||||||
@(OPENSSL="`pwd`/util/opensslwrap.sh"; \
|
@if [ -z "$(CROSS_COMPILE)" ]; then \
|
||||||
|
(OPENSSL="`pwd`/util/opensslwrap.sh"; \
|
||||||
|
[ -x "apps/openssl.exe" ] && OPENSSL="apps/openssl.exe" || :; \
|
||||||
OPENSSL_DEBUG_MEMORY=on; \
|
OPENSSL_DEBUG_MEMORY=on; \
|
||||||
export OPENSSL OPENSSL_DEBUG_MEMORY; \
|
export OPENSSL OPENSSL_DEBUG_MEMORY; \
|
||||||
$(PERL) tools/c_rehash certs)
|
$(PERL) tools/c_rehash certs) && \
|
||||||
touch rehash.time
|
touch rehash.time; \
|
||||||
|
else :; fi
|
||||||
|
|
||||||
test: tests
|
test: tests
|
||||||
|
|
||||||
tests: rehash
|
tests: rehash
|
||||||
@(cd test && echo "testing..." && \
|
@(cd test && echo "testing..." && \
|
||||||
$(CLEARENV) && $(MAKE) -e $(BUILDENV) TOP=.. TESTS='${TESTS}' OPENSSL_DEBUG_MEMORY=on tests );
|
$(CLEARENV) && $(MAKE) -e $(BUILDENV) TOP=.. TESTS='$(TESTS)' OPENSSL_DEBUG_MEMORY=on OPENSSL_CONF=../apps/openssl.cnf tests );
|
||||||
util/opensslwrap.sh version -a
|
OPENSSL_CONF=apps/openssl.cnf util/opensslwrap.sh version -a
|
||||||
|
|
||||||
report:
|
report:
|
||||||
@$(PERL) util/selftest.pl
|
@$(PERL) util/selftest.pl
|
||||||
@@ -409,7 +564,7 @@ tags:
|
|||||||
errors:
|
errors:
|
||||||
$(PERL) util/mkerr.pl -recurse -write
|
$(PERL) util/mkerr.pl -recurse -write
|
||||||
(cd engines; $(MAKE) PERL=$(PERL) errors)
|
(cd engines; $(MAKE) PERL=$(PERL) errors)
|
||||||
$(PERL) util/ck_errf.pl */*.c */*/*.c
|
$(PERL) util/ck_errf.pl -strict */*.c */*/*.c
|
||||||
|
|
||||||
stacks:
|
stacks:
|
||||||
$(PERL) util/mkstack.pl -write
|
$(PERL) util/mkstack.pl -write
|
||||||
@@ -424,6 +579,8 @@ crypto/objects/obj_dat.h: crypto/objects/obj_dat.pl crypto/objects/obj_mac.h
|
|||||||
$(PERL) crypto/objects/obj_dat.pl crypto/objects/obj_mac.h crypto/objects/obj_dat.h
|
$(PERL) crypto/objects/obj_dat.pl crypto/objects/obj_mac.h crypto/objects/obj_dat.h
|
||||||
crypto/objects/obj_mac.h: crypto/objects/objects.pl crypto/objects/objects.txt crypto/objects/obj_mac.num
|
crypto/objects/obj_mac.h: crypto/objects/objects.pl crypto/objects/objects.txt crypto/objects/obj_mac.num
|
||||||
$(PERL) crypto/objects/objects.pl crypto/objects/objects.txt crypto/objects/obj_mac.num crypto/objects/obj_mac.h
|
$(PERL) crypto/objects/objects.pl crypto/objects/objects.txt crypto/objects/obj_mac.num crypto/objects/obj_mac.h
|
||||||
|
crypto/objects/obj_xref.h: crypto/objects/objxref.pl crypto/objects/obj_xref.txt crypto/objects/obj_mac.num
|
||||||
|
$(PERL) crypto/objects/objxref.pl crypto/objects/obj_mac.num crypto/objects/obj_xref.txt >crypto/objects/obj_xref.h
|
||||||
|
|
||||||
apps/openssl-vms.cnf: apps/openssl.cnf
|
apps/openssl-vms.cnf: apps/openssl.cnf
|
||||||
$(PERL) VMS/VMSify-conf.pl < apps/openssl.cnf > apps/openssl-vms.cnf
|
$(PERL) VMS/VMSify-conf.pl < apps/openssl.cnf > apps/openssl-vms.cnf
|
||||||
@@ -436,7 +593,7 @@ TABLE: Configure
|
|||||||
(echo 'Output of `Configure TABLE'"':"; \
|
(echo 'Output of `Configure TABLE'"':"; \
|
||||||
$(PERL) Configure TABLE) > TABLE
|
$(PERL) Configure TABLE) > TABLE
|
||||||
|
|
||||||
update: errors stacks util/libeay.num util/ssleay.num crypto/objects/obj_dat.h apps/openssl-vms.cnf crypto/bn/bn_prime.h TABLE depend
|
update: errors stacks util/libeay.num util/ssleay.num crypto/objects/obj_dat.h crypto/objects/obj_xref.h apps/openssl-vms.cnf crypto/bn/bn_prime.h TABLE depend
|
||||||
|
|
||||||
# Build distribution tar-file. As the list of files returned by "find" is
|
# Build distribution tar-file. As the list of files returned by "find" is
|
||||||
# pretty long, on several platforms a "too many arguments" error or similar
|
# pretty long, on several platforms a "too many arguments" error or similar
|
||||||
@@ -467,8 +624,8 @@ tar-snap:
|
|||||||
dist:
|
dist:
|
||||||
$(PERL) Configure dist
|
$(PERL) Configure dist
|
||||||
@$(MAKE) dist_pem_h
|
@$(MAKE) dist_pem_h
|
||||||
@$(MAKE) SDIRS='${SDIRS}' clean
|
@$(MAKE) SDIRS='$(SDIRS)' clean
|
||||||
@$(MAKE) TAR='${TAR}' TARFLAGS='${TARFLAGS}' tar
|
@$(MAKE) TAR='$(TAR)' TARFLAGS='$(TARFLAGS)' tar
|
||||||
|
|
||||||
dist_pem_h:
|
dist_pem_h:
|
||||||
(cd crypto/pem; $(MAKE) -e $(BUILDENV) pem.h; $(MAKE) clean)
|
(cd crypto/pem; $(MAKE) -e $(BUILDENV) pem.h; $(MAKE) clean)
|
||||||
@@ -477,9 +634,9 @@ install: all install_docs install_sw
|
|||||||
|
|
||||||
install_sw:
|
install_sw:
|
||||||
@$(PERL) $(TOP)/util/mkdir-p.pl $(INSTALL_PREFIX)$(INSTALLTOP)/bin \
|
@$(PERL) $(TOP)/util/mkdir-p.pl $(INSTALL_PREFIX)$(INSTALLTOP)/bin \
|
||||||
$(INSTALL_PREFIX)$(INSTALLTOP)/lib \
|
$(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR) \
|
||||||
$(INSTALL_PREFIX)$(INSTALLTOP)/lib/engines \
|
$(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/engines \
|
||||||
$(INSTALL_PREFIX)$(INSTALLTOP)/lib/pkgconfig \
|
$(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/pkgconfig \
|
||||||
$(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl \
|
$(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl \
|
||||||
$(INSTALL_PREFIX)$(OPENSSLDIR)/misc \
|
$(INSTALL_PREFIX)$(OPENSSLDIR)/misc \
|
||||||
$(INSTALL_PREFIX)$(OPENSSLDIR)/certs \
|
$(INSTALL_PREFIX)$(OPENSSLDIR)/certs \
|
||||||
@@ -490,14 +647,14 @@ install_sw:
|
|||||||
chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl/$$i ); \
|
chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl/$$i ); \
|
||||||
done;
|
done;
|
||||||
@set -e; target=install; $(RECURSIVE_BUILD_CMD)
|
@set -e; target=install; $(RECURSIVE_BUILD_CMD)
|
||||||
@set -e; for i in $(LIBS) ;\
|
@set -e; liblist="$(LIBS)"; for i in $$liblist ;\
|
||||||
do \
|
do \
|
||||||
if [ -f "$$i" ]; then \
|
if [ -f "$$i" ]; then \
|
||||||
( echo installing $$i; \
|
( echo installing $$i; \
|
||||||
cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i.new; \
|
cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i.new; \
|
||||||
$(RANLIB) $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i.new; \
|
$(RANLIB) $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i.new; \
|
||||||
chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i.new; \
|
chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i.new; \
|
||||||
mv -f $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i.new $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i ); \
|
mv -f $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i.new $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i ); \
|
||||||
fi; \
|
fi; \
|
||||||
done;
|
done;
|
||||||
@set -e; if [ -n "$(SHARED_LIBS)" ]; then \
|
@set -e; if [ -n "$(SHARED_LIBS)" ]; then \
|
||||||
@@ -507,22 +664,32 @@ install_sw:
|
|||||||
if [ -f "$$i" -o -f "$$i.a" ]; then \
|
if [ -f "$$i" -o -f "$$i.a" ]; then \
|
||||||
( echo installing $$i; \
|
( echo installing $$i; \
|
||||||
if [ "$(PLATFORM)" != "Cygwin" ]; then \
|
if [ "$(PLATFORM)" != "Cygwin" ]; then \
|
||||||
cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i.new; \
|
cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i.new; \
|
||||||
chmod 555 $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i.new; \
|
chmod 555 $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i.new; \
|
||||||
mv -f $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i.new $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i; \
|
mv -f $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i.new $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i; \
|
||||||
else \
|
else \
|
||||||
c=`echo $$i | sed 's/^lib\(.*\)\.dll\.a/cyg\1-$(SHLIB_VERSION_NUMBER).dll/'`; \
|
c=`echo $$i | sed 's/^lib\(.*\)\.dll\.a/cyg\1-$(SHLIB_VERSION_NUMBER).dll/'`; \
|
||||||
cp $$c $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$c.new; \
|
cp $$c $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$c.new; \
|
||||||
chmod 755 $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$c.new; \
|
chmod 755 $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$c.new; \
|
||||||
mv -f $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$c.new $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$c; \
|
mv -f $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$c.new $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$c; \
|
||||||
cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i.new; \
|
cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i.new; \
|
||||||
chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i.new; \
|
chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i.new; \
|
||||||
mv -f $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i.new $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i; \
|
mv -f $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i.new $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i; \
|
||||||
fi ); \
|
fi ); \
|
||||||
|
if expr $(PLATFORM) : 'mingw' > /dev/null; then \
|
||||||
|
( case $$i in \
|
||||||
|
*crypto*) i=libeay32.dll;; \
|
||||||
|
*ssl*) i=ssleay32.dll;; \
|
||||||
|
esac; \
|
||||||
|
echo installing $$i; \
|
||||||
|
cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$i.new; \
|
||||||
|
chmod 755 $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$i.new; \
|
||||||
|
mv -f $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$i.new $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$i ); \
|
||||||
|
fi; \
|
||||||
fi; \
|
fi; \
|
||||||
done; \
|
done; \
|
||||||
( here="`pwd`"; \
|
( here="`pwd`"; \
|
||||||
cd $(INSTALL_PREFIX)$(INSTALLTOP)/lib; \
|
cd $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR); \
|
||||||
$(MAKE) -f $$here/Makefile HERE="$$here" link-shared ); \
|
$(MAKE) -f $$here/Makefile HERE="$$here" link-shared ); \
|
||||||
if [ "$(INSTALLTOP)" != "/usr" ]; then \
|
if [ "$(INSTALLTOP)" != "/usr" ]; then \
|
||||||
echo 'OpenSSL shared libraries have been installed in:'; \
|
echo 'OpenSSL shared libraries have been installed in:'; \
|
||||||
@@ -531,12 +698,33 @@ install_sw:
|
|||||||
sed -e '1,/^$$/d' doc/openssl-shared.txt; \
|
sed -e '1,/^$$/d' doc/openssl-shared.txt; \
|
||||||
fi; \
|
fi; \
|
||||||
fi
|
fi
|
||||||
cp libcrypto.pc $(INSTALL_PREFIX)$(INSTALLTOP)/lib/pkgconfig
|
cp libcrypto.pc $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/pkgconfig
|
||||||
chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/lib/pkgconfig/libcrypto.pc
|
chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/pkgconfig/libcrypto.pc
|
||||||
cp libssl.pc $(INSTALL_PREFIX)$(INSTALLTOP)/lib/pkgconfig
|
cp libssl.pc $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/pkgconfig
|
||||||
chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/lib/pkgconfig/libssl.pc
|
chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/pkgconfig/libssl.pc
|
||||||
cp openssl.pc $(INSTALL_PREFIX)$(INSTALLTOP)/lib/pkgconfig
|
cp openssl.pc $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/pkgconfig
|
||||||
chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/lib/pkgconfig/openssl.pc
|
chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/pkgconfig/openssl.pc
|
||||||
|
|
||||||
|
install_html_docs:
|
||||||
|
here="`pwd`"; \
|
||||||
|
for subdir in apps crypto ssl; do \
|
||||||
|
mkdir -p $(INSTALL_PREFIX)$(HTMLDIR)/$$subdir; \
|
||||||
|
for i in doc/$$subdir/*.pod; do \
|
||||||
|
fn=`basename $$i .pod`; \
|
||||||
|
echo "installing html/$$fn.$(HTMLSUFFIX)"; \
|
||||||
|
cat $$i \
|
||||||
|
| sed -r 's/L<([^)]*)(\([0-9]\))?\|([^)]*)(\([0-9]\))?>/L<\1|\3>/g' \
|
||||||
|
| pod2html --podroot=doc --htmlroot=.. --podpath=apps:crypto:ssl \
|
||||||
|
| sed -r 's/<!DOCTYPE.*//g' \
|
||||||
|
> $(INSTALL_PREFIX)$(HTMLDIR)/$$subdir/$$fn.$(HTMLSUFFIX); \
|
||||||
|
$(PERL) util/extract-names.pl < $$i | \
|
||||||
|
grep -v $$filecase "^$$fn\$$" | \
|
||||||
|
(cd $(INSTALL_PREFIX)$(HTMLDIR)/$$subdir; \
|
||||||
|
while read n; do \
|
||||||
|
PLATFORM=$(PLATFORM) $$here/util/point.sh $$fn.$(HTMLSUFFIX) "$$n".$(HTMLSUFFIX); \
|
||||||
|
done); \
|
||||||
|
done; \
|
||||||
|
done
|
||||||
|
|
||||||
install_docs:
|
install_docs:
|
||||||
@$(PERL) $(TOP)/util/mkdir-p.pl \
|
@$(PERL) $(TOP)/util/mkdir-p.pl \
|
||||||
@@ -544,7 +732,7 @@ install_docs:
|
|||||||
$(INSTALL_PREFIX)$(MANDIR)/man3 \
|
$(INSTALL_PREFIX)$(MANDIR)/man3 \
|
||||||
$(INSTALL_PREFIX)$(MANDIR)/man5 \
|
$(INSTALL_PREFIX)$(MANDIR)/man5 \
|
||||||
$(INSTALL_PREFIX)$(MANDIR)/man7
|
$(INSTALL_PREFIX)$(MANDIR)/man7
|
||||||
@pod2man="`cd util; ./pod2mantest $(PERL)`"; \
|
@pod2man="`cd ./util; ./pod2mantest $(PERL)`"; \
|
||||||
here="`pwd`"; \
|
here="`pwd`"; \
|
||||||
filecase=; \
|
filecase=; \
|
||||||
if [ "$(PLATFORM)" = "DJGPP" -o "$(PLATFORM)" = "Cygwin" -o "$(PLATFORM)" = "mingw" ]; then \
|
if [ "$(PLATFORM)" = "DJGPP" -o "$(PLATFORM)" = "Cygwin" -o "$(PLATFORM)" = "mingw" ]; then \
|
||||||
@@ -564,7 +752,7 @@ install_docs:
|
|||||||
(grep -v "[ ]"; true) | \
|
(grep -v "[ ]"; true) | \
|
||||||
(cd $(INSTALL_PREFIX)$(MANDIR)/man$$sec/; \
|
(cd $(INSTALL_PREFIX)$(MANDIR)/man$$sec/; \
|
||||||
while read n; do \
|
while read n; do \
|
||||||
$$here/util/point.sh $$fn.$${sec}$(MANSUFFIX) "$$n".$${sec}$(MANSUFFIX); \
|
PLATFORM=$(PLATFORM) $$here/util/point.sh $$fn.$${sec}$(MANSUFFIX) "$$n".$${sec}$(MANSUFFIX); \
|
||||||
done); \
|
done); \
|
||||||
done; \
|
done; \
|
||||||
set -e; for i in doc/crypto/*.pod doc/ssl/*.pod; do \
|
set -e; for i in doc/crypto/*.pod doc/ssl/*.pod; do \
|
||||||
@@ -581,7 +769,7 @@ install_docs:
|
|||||||
(grep -v "[ ]"; true) | \
|
(grep -v "[ ]"; true) | \
|
||||||
(cd $(INSTALL_PREFIX)$(MANDIR)/man$$sec/; \
|
(cd $(INSTALL_PREFIX)$(MANDIR)/man$$sec/; \
|
||||||
while read n; do \
|
while read n; do \
|
||||||
$$here/util/point.sh $$fn.$${sec}$(MANSUFFIX) "$$n".$${sec}$(MANSUFFIX); \
|
PLATFORM=$(PLATFORM) $$here/util/point.sh $$fn.$${sec}$(MANSUFFIX) "$$n".$${sec}$(MANSUFFIX); \
|
||||||
done); \
|
done); \
|
||||||
done
|
done
|
||||||
|
|
||||||
|
|||||||
148
Makefile.shared
148
Makefile.shared
@@ -14,6 +14,8 @@ CFLAGS=$(CFLAG)
|
|||||||
LDFLAGS=
|
LDFLAGS=
|
||||||
SHARED_LDFLAGS=
|
SHARED_LDFLAGS=
|
||||||
|
|
||||||
|
NM=nm
|
||||||
|
|
||||||
# LIBNAME contains just the name of the library, without prefix ("lib"
|
# LIBNAME contains just the name of the library, without prefix ("lib"
|
||||||
# on Unix, "cyg" for certain forms under Cygwin...) or suffix (.a, .so,
|
# on Unix, "cyg" for certain forms under Cygwin...) or suffix (.a, .so,
|
||||||
# .dll, ...). This one MUST have a value when using this makefile to
|
# .dll, ...). This one MUST have a value when using this makefile to
|
||||||
@@ -91,7 +93,7 @@ LINK_APP= \
|
|||||||
( $(SET_X); \
|
( $(SET_X); \
|
||||||
LIBDEPS="$${LIBDEPS:-$(LIBDEPS)}"; \
|
LIBDEPS="$${LIBDEPS:-$(LIBDEPS)}"; \
|
||||||
LDCMD="$${LDCMD:-$(CC)}"; LDFLAGS="$${LDFLAGS:-$(CFLAGS)}"; \
|
LDCMD="$${LDCMD:-$(CC)}"; LDFLAGS="$${LDFLAGS:-$(CFLAGS)}"; \
|
||||||
LIBPATH=`for x in $$LIBDEPS; do if echo $$x | grep '^ *-L' > /dev/null 2>&1; then echo $$x | sed -e 's/^ *-L//'; fi; done | uniq`; \
|
LIBPATH=`for x in $$LIBDEPS; do echo $$x; done | sed -e 's/^ *-L//;t' -e d | uniq`; \
|
||||||
LIBPATH=`echo $$LIBPATH | sed -e 's/ /:/g'`; \
|
LIBPATH=`echo $$LIBPATH | sed -e 's/ /:/g'`; \
|
||||||
LD_LIBRARY_PATH=$$LIBPATH:$$LD_LIBRARY_PATH \
|
LD_LIBRARY_PATH=$$LIBPATH:$$LD_LIBRARY_PATH \
|
||||||
$${LDCMD} $${LDFLAGS} -o $${APPNAME:=$(APPNAME)} $(OBJECTS) $${LIBDEPS} )
|
$${LDCMD} $${LDFLAGS} -o $${APPNAME:=$(APPNAME)} $(OBJECTS) $${LIBDEPS} )
|
||||||
@@ -101,15 +103,13 @@ LINK_SO= \
|
|||||||
LIBDEPS="$${LIBDEPS:-$(LIBDEPS)}"; \
|
LIBDEPS="$${LIBDEPS:-$(LIBDEPS)}"; \
|
||||||
SHAREDCMD="$${SHAREDCMD:-$(CC)}"; \
|
SHAREDCMD="$${SHAREDCMD:-$(CC)}"; \
|
||||||
SHAREDFLAGS="$${SHAREDFLAGS:-$(CFLAGS) $(SHARED_LDFLAGS)}"; \
|
SHAREDFLAGS="$${SHAREDFLAGS:-$(CFLAGS) $(SHARED_LDFLAGS)}"; \
|
||||||
nm -Pg $$SHOBJECTS | grep ' [BDT] ' | cut -f1 -d' ' > lib$(LIBNAME).exp; \
|
LIBPATH=`for x in $$LIBDEPS; do echo $$x; done | sed -e 's/^ *-L//;t' -e d | uniq`; \
|
||||||
LIBPATH=`for x in $$LIBDEPS; do if echo $$x | grep '^ *-L' > /dev/null 2>&1; then echo $$x | sed -e 's/^ *-L//'; fi; done | uniq`; \
|
|
||||||
LIBPATH=`echo $$LIBPATH | sed -e 's/ /:/g'`; \
|
LIBPATH=`echo $$LIBPATH | sed -e 's/ /:/g'`; \
|
||||||
LD_LIBRARY_PATH=$$LIBPATH:$$LD_LIBRARY_PATH \
|
LD_LIBRARY_PATH=$$LIBPATH:$$LD_LIBRARY_PATH \
|
||||||
$${SHAREDCMD} $${SHAREDFLAGS} \
|
$${SHAREDCMD} $${SHAREDFLAGS} \
|
||||||
-o $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX \
|
-o $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX \
|
||||||
$$ALLSYMSFLAGS $$SHOBJECTS $$NOALLSYMSFLAGS $$LIBDEPS \
|
$$ALLSYMSFLAGS $$SHOBJECTS $$NOALLSYMSFLAGS $$LIBDEPS \
|
||||||
) && $(SYMLINK_SO); \
|
) && $(SYMLINK_SO)
|
||||||
( $(SET_X); rm -f lib$(LIBNAME).exp )
|
|
||||||
|
|
||||||
SYMLINK_SO= \
|
SYMLINK_SO= \
|
||||||
if [ -n "$$INHIBIT_SYMLINKS" ]; then :; else \
|
if [ -n "$$INHIBIT_SYMLINKS" ]; then :; else \
|
||||||
@@ -135,7 +135,7 @@ LINK_SO_A_VIA_O= \
|
|||||||
ALL=$$ALLSYMSFLAGS; ALLSYMSFLAGS=; NOALLSYMSFLAGS=; \
|
ALL=$$ALLSYMSFLAGS; ALLSYMSFLAGS=; NOALLSYMSFLAGS=; \
|
||||||
( $(SET_X); \
|
( $(SET_X); \
|
||||||
ld $(LDFLAGS) -r -o lib$(LIBNAME).o $$ALL lib$(LIBNAME).a $(LIBEXTRAS) ); \
|
ld $(LDFLAGS) -r -o lib$(LIBNAME).o $$ALL lib$(LIBNAME).a $(LIBEXTRAS) ); \
|
||||||
$(LINK_SO) && rm -f $(LIBNAME).o
|
$(LINK_SO) && rm -f lib$(LIBNAME).o
|
||||||
|
|
||||||
LINK_SO_A_UNPACKED= \
|
LINK_SO_A_UNPACKED= \
|
||||||
UNPACKDIR=link_tmp.$$$$; rm -rf $$UNPACKDIR; mkdir $$UNPACKDIR; \
|
UNPACKDIR=link_tmp.$$$$; rm -rf $$UNPACKDIR; mkdir $$UNPACKDIR; \
|
||||||
@@ -144,7 +144,7 @@ LINK_SO_A_UNPACKED= \
|
|||||||
SHOBJECTS=$$UNPACKDIR/*.o; \
|
SHOBJECTS=$$UNPACKDIR/*.o; \
|
||||||
$(LINK_SO) && rm -rf $$UNPACKDIR
|
$(LINK_SO) && rm -rf $$UNPACKDIR
|
||||||
|
|
||||||
DETECT_GNU_LD=(${CC} -Wl,-V /dev/null 2>&1 | grep '^GNU ld' )>/dev/null
|
DETECT_GNU_LD=($(CC) -Wl,-V /dev/null 2>&1 | grep '^GNU ld' )>/dev/null
|
||||||
|
|
||||||
DO_GNU_SO=$(CALC_VERSIONS); \
|
DO_GNU_SO=$(CALC_VERSIONS); \
|
||||||
SHLIB=lib$(LIBNAME).so; \
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
@@ -170,8 +170,19 @@ link_a.gnu:
|
|||||||
link_app.gnu:
|
link_app.gnu:
|
||||||
@ $(DO_GNU_APP); $(LINK_APP)
|
@ $(DO_GNU_APP); $(LINK_APP)
|
||||||
|
|
||||||
|
DO_BEOS_SO= SHLIB=lib$(LIBNAME).so; \
|
||||||
|
SHLIB_SUFFIX=; \
|
||||||
|
ALLSYMSFLAGS='-Wl,--whole-archive'; \
|
||||||
|
NOALLSYMSFLAGS='-Wl,--no-whole-archive'; \
|
||||||
|
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared -Wl,-Bsymbolic -Wl,-soname=$$SHLIB$$SHLIB_SUFFIX"
|
||||||
|
|
||||||
|
link_o.beos:
|
||||||
|
@ $(DO_BEOS_SO); $(LINK_SO_O)
|
||||||
|
link_a.beos:
|
||||||
|
@ $(DO_BEOS_SO); $(LINK_SO_A)
|
||||||
|
|
||||||
link_o.bsd:
|
link_o.bsd:
|
||||||
@if ${DETECT_GNU_LD}; then $(DO_GNU_SO); else \
|
@if $(DETECT_GNU_LD); then $(DO_GNU_SO); else \
|
||||||
$(CALC_VERSIONS); \
|
$(CALC_VERSIONS); \
|
||||||
SHLIB=lib$(LIBNAME).so; \
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
SHLIB_SUFFIX=; \
|
SHLIB_SUFFIX=; \
|
||||||
@@ -181,7 +192,7 @@ link_o.bsd:
|
|||||||
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared -nostdlib"; \
|
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared -nostdlib"; \
|
||||||
fi; $(LINK_SO_O)
|
fi; $(LINK_SO_O)
|
||||||
link_a.bsd:
|
link_a.bsd:
|
||||||
@if ${DETECT_GNU_LD}; then $(DO_GNU_SO); else \
|
@if $(DETECT_GNU_LD); then $(DO_GNU_SO); else \
|
||||||
$(CALC_VERSIONS); \
|
$(CALC_VERSIONS); \
|
||||||
SHLIB=lib$(LIBNAME).so; \
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
SHLIB_SUFFIX=; \
|
SHLIB_SUFFIX=; \
|
||||||
@@ -191,22 +202,34 @@ link_a.bsd:
|
|||||||
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared -nostdlib"; \
|
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared -nostdlib"; \
|
||||||
fi; $(LINK_SO_A)
|
fi; $(LINK_SO_A)
|
||||||
link_app.bsd:
|
link_app.bsd:
|
||||||
@if ${DETECT_GNU_LD}; then $(DO_GNU_APP); else \
|
@if $(DETECT_GNU_LD); then $(DO_GNU_APP); else \
|
||||||
LDFLAGS="$(CFLAGS) -Wl,-rpath,$(LIBPATH)"; \
|
LDFLAGS="$(CFLAGS) -Wl,-rpath,$(LIBPATH)"; \
|
||||||
fi; $(LINK_APP)
|
fi; $(LINK_APP)
|
||||||
|
|
||||||
# For Darwin AKA Mac OS/X (dyld)
|
# For Darwin AKA Mac OS/X (dyld)
|
||||||
# link_o.darwin produces .so, because we let it use dso_dlfcn module,
|
# Originally link_o.darwin produced .so, because it was hard-coded
|
||||||
# which has .so extension hard-coded. One can argue that one should
|
# in dso_dlfcn module. At later point dso_dlfcn switched to .dylib
|
||||||
# develop special dso module for MacOS X. At least manual encourages
|
# extension in order to allow for run-time linking with vendor-
|
||||||
# to use native NSModule(3) API and refers to dlfcn as termporary hack.
|
# supplied shared libraries such as libz, so that link_o.darwin had
|
||||||
|
# to be harmonized with it. This caused minor controversy, because
|
||||||
|
# it was believed that dlopen can't be used to dynamically load
|
||||||
|
# .dylib-s, only so called bundle modules (ones linked with -bundle
|
||||||
|
# flag). The belief seems to be originating from pre-10.4 release,
|
||||||
|
# where dlfcn functionality was emulated by dlcompat add-on. In
|
||||||
|
# 10.4 dlopen was rewritten as native part of dyld and is documented
|
||||||
|
# to be capable of loading both dynamic libraries and bundles. In
|
||||||
|
# order to provide compatibility with pre-10.4 dlopen, modules are
|
||||||
|
# linked with -bundle flag, which makes .dylib extension misleading.
|
||||||
|
# It works, because dlopen is [and always was] extension-agnostic.
|
||||||
|
# Alternative to this heuristic approach is to develop specific
|
||||||
|
# MacOS X dso module relying on whichever "native" dyld interface.
|
||||||
link_o.darwin:
|
link_o.darwin:
|
||||||
@ $(CALC_VERSIONS); \
|
@ $(CALC_VERSIONS); \
|
||||||
SHLIB=lib$(LIBNAME); \
|
SHLIB=lib$(LIBNAME); \
|
||||||
SHLIB_SUFFIX=.so; \
|
SHLIB_SUFFIX=.dylib; \
|
||||||
ALLSYMSFLAGS='-all_load'; \
|
ALLSYMSFLAGS='-all_load'; \
|
||||||
NOALLSYMSFLAGS=''; \
|
NOALLSYMSFLAGS=''; \
|
||||||
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS)"; \
|
SHAREDFLAGS="$(CFLAGS) `echo $(SHARED_LDFLAGS) | sed s/dynamiclib/bundle/`"; \
|
||||||
if [ -n "$(LIBVERSION)" ]; then \
|
if [ -n "$(LIBVERSION)" ]; then \
|
||||||
SHAREDFLAGS="$$SHAREDFLAGS -current_version $(LIBVERSION)"; \
|
SHAREDFLAGS="$$SHAREDFLAGS -current_version $(LIBVERSION)"; \
|
||||||
fi; \
|
fi; \
|
||||||
@@ -227,7 +250,7 @@ link_a.darwin:
|
|||||||
if [ -n "$$SHLIB_SOVER_NODOT" ]; then \
|
if [ -n "$$SHLIB_SOVER_NODOT" ]; then \
|
||||||
SHAREDFLAGS="$$SHAREDFLAGS -compatibility_version $$SHLIB_SOVER_NODOT"; \
|
SHAREDFLAGS="$$SHAREDFLAGS -compatibility_version $$SHLIB_SOVER_NODOT"; \
|
||||||
fi; \
|
fi; \
|
||||||
SHAREDFLAGS="$$SHAREDFLAGS -install_name ${INSTALLTOP}/lib/$$SHLIB${SHLIB_EXT}"; \
|
SHAREDFLAGS="$$SHAREDFLAGS -install_name $(INSTALLTOP)/$(LIBDIR)/$$SHLIB$(SHLIB_EXT)"; \
|
||||||
$(LINK_SO_A)
|
$(LINK_SO_A)
|
||||||
link_app.darwin: # is there run-path on darwin?
|
link_app.darwin: # is there run-path on darwin?
|
||||||
$(LINK_APP)
|
$(LINK_APP)
|
||||||
@@ -237,40 +260,59 @@ link_o.cygwin:
|
|||||||
INHIBIT_SYMLINKS=yes; \
|
INHIBIT_SYMLINKS=yes; \
|
||||||
SHLIB=cyg$(LIBNAME); \
|
SHLIB=cyg$(LIBNAME); \
|
||||||
base=-Wl,--enable-auto-image-base; \
|
base=-Wl,--enable-auto-image-base; \
|
||||||
|
deffile=; \
|
||||||
if expr $(PLATFORM) : 'mingw' > /dev/null; then \
|
if expr $(PLATFORM) : 'mingw' > /dev/null; then \
|
||||||
SHLIB=$(LIBNAME)eay32; base=; \
|
SHLIB=$(LIBNAME)eay32; base=; \
|
||||||
|
if test -f $(LIBNAME)eay32.def; then \
|
||||||
|
deffile=$(LIBNAME)eay32.def; \
|
||||||
|
fi; \
|
||||||
fi; \
|
fi; \
|
||||||
SHLIB_SUFFIX=.dll; \
|
SHLIB_SUFFIX=.dll; \
|
||||||
LIBVERSION="$(LIBVERSION)"; \
|
LIBVERSION="$(LIBVERSION)"; \
|
||||||
SHLIB_SOVER=${LIBVERSION:+"-$(LIBVERSION)"}; \
|
SHLIB_SOVER=${LIBVERSION:+"-$(LIBVERSION)"}; \
|
||||||
ALLSYMSFLAGS='-Wl,--whole-archive'; \
|
ALLSYMSFLAGS='-Wl,--whole-archive'; \
|
||||||
NOALLSYMSFLAGS='-Wl,--no-whole-archive'; \
|
NOALLSYMSFLAGS='-Wl,--no-whole-archive'; \
|
||||||
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared $$base -Wl,-Bsymbolic -Wl,--out-implib,lib$(LIBNAME).dll.a"; \
|
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared $$base $$deffile -Wl,-s,-Bsymbolic"; \
|
||||||
$(LINK_SO_O)
|
$(LINK_SO_O)
|
||||||
|
#for mingw target if def-file is in use dll-name should match library-name
|
||||||
link_a.cygwin:
|
link_a.cygwin:
|
||||||
@ $(CALC_VERSIONS); \
|
@ $(CALC_VERSIONS); \
|
||||||
INHIBIT_SYMLINKS=yes; \
|
INHIBIT_SYMLINKS=yes; \
|
||||||
SHLIB=cyg$(LIBNAME); \
|
SHLIB=cyg$(LIBNAME); SHLIB_SOVER=-$(LIBVERSION); SHLIB_SUFFIX=.dll; \
|
||||||
|
dll_name=$$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX; extras=; \
|
||||||
base=-Wl,--enable-auto-image-base; \
|
base=-Wl,--enable-auto-image-base; \
|
||||||
if expr $(PLATFORM) : 'mingw' > /dev/null; then \
|
if expr $(PLATFORM) : 'mingw' > /dev/null; then \
|
||||||
SHLIB=$(LIBNAME)eay32; \
|
case $(LIBNAME) in \
|
||||||
|
crypto) SHLIB=libeay;; \
|
||||||
|
ssl) SHLIB=ssleay;; \
|
||||||
|
esac; \
|
||||||
|
SHLIB_SOVER=32; \
|
||||||
|
extras="$(LIBNAME).def"; \
|
||||||
|
$(PERL) util/mkdef.pl 32 $$SHLIB > $$extras; \
|
||||||
base=; [ $(LIBNAME) = "crypto" ] && base=-Wl,--image-base,0x63000000; \
|
base=; [ $(LIBNAME) = "crypto" ] && base=-Wl,--image-base,0x63000000; \
|
||||||
fi; \
|
fi; \
|
||||||
SHLIB_SUFFIX=.dll; \
|
dll_name=$$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX; \
|
||||||
SHLIB_SOVER=-$(LIBVERSION); \
|
$(PERL) util/mkrc.pl $$dll_name | \
|
||||||
|
$(CROSS_COMPILE)windres -o rc.o; \
|
||||||
|
extras="$$extras rc.o"; \
|
||||||
ALLSYMSFLAGS='-Wl,--whole-archive'; \
|
ALLSYMSFLAGS='-Wl,--whole-archive'; \
|
||||||
NOALLSYMSFLAGS='-Wl,--no-whole-archive'; \
|
NOALLSYMSFLAGS='-Wl,--no-whole-archive'; \
|
||||||
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared $$base -Wl,-Bsymbolic -Wl,--out-implib,lib$(LIBNAME).dll.a"; \
|
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared $$base -Wl,-s,-Bsymbolic -Wl,--out-implib,lib$(LIBNAME).dll.a $$extras"; \
|
||||||
[ -f apps/$$SHLIB$$SHLIB_SUFFIX ] && rm apps/$$SHLIB$$SHLIB_SUFFIX; \
|
[ -f apps/$$dll_name ] && rm apps/$$dll_name; \
|
||||||
[ -f test/$$SHLIB$$SHLIB_SUFFIX ] && rm test/$$SHLIB$$SHLIB_SUFFIX; \
|
[ -f test/$$dll_name ] && rm test/$$dll_name; \
|
||||||
$(LINK_SO_A) || exit 1; \
|
$(LINK_SO_A) || exit 1; \
|
||||||
cp -p $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX apps/; \
|
rm $$extras; \
|
||||||
cp -p $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX test/
|
cp -p $$dll_name apps/; \
|
||||||
|
cp -p $$dll_name test/
|
||||||
link_app.cygwin:
|
link_app.cygwin:
|
||||||
|
@if expr "$(CFLAGS)" : '.*OPENSSL_USE_APPLINK' > /dev/null; then \
|
||||||
|
LIBDEPS="$(TOP)/crypto/applink.o $${LIBDEPS:-$(LIBDEPS)}"; \
|
||||||
|
export LIBDEPS; \
|
||||||
|
fi; \
|
||||||
$(LINK_APP)
|
$(LINK_APP)
|
||||||
|
|
||||||
link_o.alpha-osf1:
|
link_o.alpha-osf1:
|
||||||
@ if ${DETECT_GNU_LD}; then \
|
@ if $(DETECT_GNU_LD); then \
|
||||||
$(DO_GNU_SO); \
|
$(DO_GNU_SO); \
|
||||||
else \
|
else \
|
||||||
SHLIB=lib$(LIBNAME).so; \
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
@@ -291,7 +333,7 @@ link_o.alpha-osf1:
|
|||||||
fi; \
|
fi; \
|
||||||
$(LINK_SO_O)
|
$(LINK_SO_O)
|
||||||
link_a.alpha-osf1:
|
link_a.alpha-osf1:
|
||||||
@ if ${DETECT_GNU_LD}; then \
|
@ if $(DETECT_GNU_LD); then \
|
||||||
$(DO_GNU_SO); \
|
$(DO_GNU_SO); \
|
||||||
else \
|
else \
|
||||||
SHLIB=lib$(LIBNAME).so; \
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
@@ -312,7 +354,7 @@ link_a.alpha-osf1:
|
|||||||
fi; \
|
fi; \
|
||||||
$(LINK_SO_A)
|
$(LINK_SO_A)
|
||||||
link_app.alpha-osf1:
|
link_app.alpha-osf1:
|
||||||
@if ${DETECT_GNU_LD}; then \
|
@if $(DETECT_GNU_LD); then \
|
||||||
$(DO_GNU_APP); \
|
$(DO_GNU_APP); \
|
||||||
else \
|
else \
|
||||||
LDFLAGS="$(CFLAGS) -rpath $(LIBRPATH)"; \
|
LDFLAGS="$(CFLAGS) -rpath $(LIBRPATH)"; \
|
||||||
@@ -320,7 +362,7 @@ link_app.alpha-osf1:
|
|||||||
$(LINK_APP)
|
$(LINK_APP)
|
||||||
|
|
||||||
link_o.solaris:
|
link_o.solaris:
|
||||||
@ if ${DETECT_GNU_LD}; then \
|
@ if $(DETECT_GNU_LD); then \
|
||||||
$(DO_GNU_SO); \
|
$(DO_GNU_SO); \
|
||||||
else \
|
else \
|
||||||
$(CALC_VERSIONS); \
|
$(CALC_VERSIONS); \
|
||||||
@@ -334,12 +376,12 @@ link_o.solaris:
|
|||||||
fi; \
|
fi; \
|
||||||
$(LINK_SO_O)
|
$(LINK_SO_O)
|
||||||
link_a.solaris:
|
link_a.solaris:
|
||||||
@ if ${DETECT_GNU_LD}; then \
|
@ if $(DETECT_GNU_LD); then \
|
||||||
$(DO_GNU_SO); \
|
$(DO_GNU_SO); \
|
||||||
else \
|
else \
|
||||||
$(CALC_VERSIONS); \
|
$(CALC_VERSIONS); \
|
||||||
MINUSZ='-z '; \
|
MINUSZ='-z '; \
|
||||||
(${CC} -v 2>&1 | grep gcc) > /dev/null && MINUSZ='-Wl,-z,'; \
|
($(CC) -v 2>&1 | grep gcc) > /dev/null && MINUSZ='-Wl,-z,'; \
|
||||||
SHLIB=lib$(LIBNAME).so; \
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
SHLIB_SUFFIX=;\
|
SHLIB_SUFFIX=;\
|
||||||
ALLSYMSFLAGS="$${MINUSZ}allextract"; \
|
ALLSYMSFLAGS="$${MINUSZ}allextract"; \
|
||||||
@@ -348,7 +390,7 @@ link_a.solaris:
|
|||||||
fi; \
|
fi; \
|
||||||
$(LINK_SO_A)
|
$(LINK_SO_A)
|
||||||
link_app.solaris:
|
link_app.solaris:
|
||||||
@ if ${DETECT_GNU_LD}; then \
|
@ if $(DETECT_GNU_LD); then \
|
||||||
$(DO_GNU_APP); \
|
$(DO_GNU_APP); \
|
||||||
else \
|
else \
|
||||||
LDFLAGS="$(CFLAGS) -R $(LIBRPATH)"; \
|
LDFLAGS="$(CFLAGS) -R $(LIBRPATH)"; \
|
||||||
@@ -357,7 +399,7 @@ link_app.solaris:
|
|||||||
|
|
||||||
# OpenServer 5 native compilers used
|
# OpenServer 5 native compilers used
|
||||||
link_o.svr3:
|
link_o.svr3:
|
||||||
@ if ${DETECT_GNU_LD}; then \
|
@ if $(DETECT_GNU_LD); then \
|
||||||
$(DO_GNU_SO); \
|
$(DO_GNU_SO); \
|
||||||
else \
|
else \
|
||||||
$(CALC_VERSIONS); \
|
$(CALC_VERSIONS); \
|
||||||
@@ -369,7 +411,7 @@ link_o.svr3:
|
|||||||
fi; \
|
fi; \
|
||||||
$(LINK_SO_O)
|
$(LINK_SO_O)
|
||||||
link_a.svr3:
|
link_a.svr3:
|
||||||
@ if ${DETECT_GNU_LD}; then \
|
@ if $(DETECT_GNU_LD); then \
|
||||||
$(DO_GNU_SO); \
|
$(DO_GNU_SO); \
|
||||||
else \
|
else \
|
||||||
$(CALC_VERSIONS); \
|
$(CALC_VERSIONS); \
|
||||||
@@ -381,12 +423,12 @@ link_a.svr3:
|
|||||||
fi; \
|
fi; \
|
||||||
$(LINK_SO_A_UNPACKED)
|
$(LINK_SO_A_UNPACKED)
|
||||||
link_app.svr3:
|
link_app.svr3:
|
||||||
@${DETECT_GNU_LD} && $(DO_GNU_APP); \
|
@$(DETECT_GNU_LD) && $(DO_GNU_APP); \
|
||||||
$(LINK_APP)
|
$(LINK_APP)
|
||||||
|
|
||||||
# UnixWare 7 and OpenUNIX 8 native compilers used
|
# UnixWare 7 and OpenUNIX 8 native compilers used
|
||||||
link_o.svr5:
|
link_o.svr5:
|
||||||
@ if ${DETECT_GNU_LD}; then \
|
@ if $(DETECT_GNU_LD); then \
|
||||||
$(DO_GNU_SO); \
|
$(DO_GNU_SO); \
|
||||||
else \
|
else \
|
||||||
$(CALC_VERSIONS); \
|
$(CALC_VERSIONS); \
|
||||||
@@ -400,12 +442,12 @@ link_o.svr5:
|
|||||||
fi; \
|
fi; \
|
||||||
$(LINK_SO_O)
|
$(LINK_SO_O)
|
||||||
link_a.svr5:
|
link_a.svr5:
|
||||||
@ if ${DETECT_GNU_LD}; then \
|
@ if $(DETECT_GNU_LD); then \
|
||||||
$(DO_GNU_SO); \
|
$(DO_GNU_SO); \
|
||||||
else \
|
else \
|
||||||
$(CALC_VERSIONS); \
|
$(CALC_VERSIONS); \
|
||||||
SHARE_FLAG='-G'; \
|
SHARE_FLAG='-G'; \
|
||||||
(${CC} -v 2>&1 | grep gcc) > /dev/null && SHARE_FLAG='-shared'; \
|
($(CC) -v 2>&1 | grep gcc) > /dev/null && SHARE_FLAG='-shared'; \
|
||||||
SHLIB=lib$(LIBNAME).so; \
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
SHLIB_SUFFIX=; \
|
SHLIB_SUFFIX=; \
|
||||||
ALLSYMSFLAGS=''; \
|
ALLSYMSFLAGS=''; \
|
||||||
@@ -414,11 +456,11 @@ link_a.svr5:
|
|||||||
fi; \
|
fi; \
|
||||||
$(LINK_SO_A_UNPACKED)
|
$(LINK_SO_A_UNPACKED)
|
||||||
link_app.svr5:
|
link_app.svr5:
|
||||||
@${DETECT_GNU_LD} && $(DO_GNU_APP); \
|
@$(DETECT_GNU_LD) && $(DO_GNU_APP); \
|
||||||
$(LINK_APP)
|
$(LINK_APP)
|
||||||
|
|
||||||
link_o.irix:
|
link_o.irix:
|
||||||
@ if ${DETECT_GNU_LD}; then \
|
@ if $(DETECT_GNU_LD); then \
|
||||||
$(DO_GNU_SO); \
|
$(DO_GNU_SO); \
|
||||||
else \
|
else \
|
||||||
$(CALC_VERSIONS); \
|
$(CALC_VERSIONS); \
|
||||||
@@ -432,7 +474,7 @@ link_o.irix:
|
|||||||
fi; \
|
fi; \
|
||||||
$(LINK_SO_O)
|
$(LINK_SO_O)
|
||||||
link_a.irix:
|
link_a.irix:
|
||||||
@ if ${DETECT_GNU_LD}; then \
|
@ if $(DETECT_GNU_LD); then \
|
||||||
$(DO_GNU_SO); \
|
$(DO_GNU_SO); \
|
||||||
else \
|
else \
|
||||||
$(CALC_VERSIONS); \
|
$(CALC_VERSIONS); \
|
||||||
@@ -458,7 +500,7 @@ link_app.irix:
|
|||||||
# ELFs by the way].
|
# ELFs by the way].
|
||||||
#
|
#
|
||||||
link_o.hpux:
|
link_o.hpux:
|
||||||
@if ${DETECT_GNU_LD}; then $(DO_GNU_SO); else \
|
@if $(DETECT_GNU_LD); then $(DO_GNU_SO); else \
|
||||||
$(CALC_VERSIONS); \
|
$(CALC_VERSIONS); \
|
||||||
SHLIB=lib$(LIBNAME).sl; \
|
SHLIB=lib$(LIBNAME).sl; \
|
||||||
expr "$(CFLAGS)" : '.*DSO_DLFCN' > /dev/null && SHLIB=lib$(LIBNAME).so; \
|
expr "$(CFLAGS)" : '.*DSO_DLFCN' > /dev/null && SHLIB=lib$(LIBNAME).so; \
|
||||||
@@ -471,7 +513,7 @@ link_o.hpux:
|
|||||||
rm -f $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX || :; \
|
rm -f $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX || :; \
|
||||||
$(LINK_SO_O) && chmod a=rx $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX
|
$(LINK_SO_O) && chmod a=rx $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX
|
||||||
link_a.hpux:
|
link_a.hpux:
|
||||||
@if ${DETECT_GNU_LD}; then $(DO_GNU_SO); else \
|
@if $(DETECT_GNU_LD); then $(DO_GNU_SO); else \
|
||||||
$(CALC_VERSIONS); \
|
$(CALC_VERSIONS); \
|
||||||
SHLIB=lib$(LIBNAME).sl; \
|
SHLIB=lib$(LIBNAME).sl; \
|
||||||
expr $(PLATFORM) : '.*ia64' > /dev/null && SHLIB=lib$(LIBNAME).so; \
|
expr $(PLATFORM) : '.*ia64' > /dev/null && SHLIB=lib$(LIBNAME).so; \
|
||||||
@@ -484,30 +526,30 @@ link_a.hpux:
|
|||||||
rm -f $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX || :; \
|
rm -f $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX || :; \
|
||||||
$(LINK_SO_A) && chmod a=rx $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX
|
$(LINK_SO_A) && chmod a=rx $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX
|
||||||
link_app.hpux:
|
link_app.hpux:
|
||||||
@if ${DETECT_GNU_LD}; then $(DO_GNU_APP); else \
|
@if $(DETECT_GNU_LD); then $(DO_GNU_APP); else \
|
||||||
LDFLAGS="$(CFLAGS) -Wl,+s,+cdp,../:,+cdp,./:,+b,$(LIBRPATH)"; \
|
LDFLAGS="$(CFLAGS) -Wl,+s,+cdp,../:,+cdp,./:,+b,$(LIBRPATH)"; \
|
||||||
fi; \
|
fi; \
|
||||||
$(LINK_APP)
|
$(LINK_APP)
|
||||||
|
|
||||||
link_o.aix:
|
link_o.aix:
|
||||||
@ $(CALC_VERSIONS); \
|
@ $(CALC_VERSIONS); \
|
||||||
OBJECT_MODE=`expr x$(SHARED_LDFLAGS) : 'x\-[a-z]*\(64\)'` || :; \
|
OBJECT_MODE=`expr "x$(SHARED_LDFLAGS)" : 'x\-[a-z]*\(64\)'` || :; \
|
||||||
OBJECT_MODE=$${OBJECT_MODE:-32}; export OBJECT_MODE; \
|
OBJECT_MODE=$${OBJECT_MODE:-32}; export OBJECT_MODE; \
|
||||||
SHLIB=lib$(LIBNAME).so; \
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
SHLIB_SUFFIX=; \
|
SHLIB_SUFFIX=; \
|
||||||
ALLSYMSFLAGS=''; \
|
ALLSYMSFLAGS=''; \
|
||||||
NOALLSYMSFLAGS=''; \
|
NOALLSYMSFLAGS=''; \
|
||||||
SHAREDFLAGS='$(CFLAGS) $(SHARED_LDFLAGS) -Wl,-G,-bexpall,-bnolibpath,-bM:SRE'; \
|
SHAREDFLAGS='$(CFLAGS) $(SHARED_LDFLAGS) -Wl,-bexpall,-bnolibpath,-bM:SRE'; \
|
||||||
$(LINK_SO_O);
|
$(LINK_SO_O);
|
||||||
link_a.aix:
|
link_a.aix:
|
||||||
@ $(CALC_VERSIONS); \
|
@ $(CALC_VERSIONS); \
|
||||||
OBJECT_MODE=`expr x$(SHARED_LDFLAGS) : 'x\-[a-z]*\(64\)'` || : ; \
|
OBJECT_MODE=`expr "x$(SHARED_LDFLAGS)" : 'x\-[a-z]*\(64\)'` || : ; \
|
||||||
OBJECT_MODE=$${OBJECT_MODE:-32}; export OBJECT_MODE; \
|
OBJECT_MODE=$${OBJECT_MODE:-32}; export OBJECT_MODE; \
|
||||||
SHLIB=lib$(LIBNAME).so; \
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
SHLIB_SUFFIX=; \
|
SHLIB_SUFFIX=; \
|
||||||
ALLSYMSFLAGS='-bnogc'; \
|
ALLSYMSFLAGS='-bnogc'; \
|
||||||
NOALLSYMSFLAGS=''; \
|
NOALLSYMSFLAGS=''; \
|
||||||
SHAREDFLAGS='$(CFLAGS) $(SHARED_LDFLAGS) -Wl,-G,-bexpall,-bnolibpath,-bM:SRE'; \
|
SHAREDFLAGS='$(CFLAGS) $(SHARED_LDFLAGS) -Wl,-bexpall,-bnolibpath,-bM:SRE'; \
|
||||||
$(LINK_SO_A_VIA_O)
|
$(LINK_SO_A_VIA_O)
|
||||||
link_app.aix:
|
link_app.aix:
|
||||||
LDFLAGS="$(CFLAGS) -Wl,-brtl,-blibpath:$(LIBRPATH):$${LIBPATH:-/usr/lib:/lib}"; \
|
LDFLAGS="$(CFLAGS) -Wl,-brtl,-blibpath:$(LIBRPATH):$${LIBPATH:-/usr/lib:/lib}"; \
|
||||||
@@ -549,7 +591,7 @@ symlink.hpux:
|
|||||||
expr $(PLATFORM) : '.*ia64' > /dev/null && SHLIB=lib$(LIBNAME).so; \
|
expr $(PLATFORM) : '.*ia64' > /dev/null && SHLIB=lib$(LIBNAME).so; \
|
||||||
$(SYMLINK_SO)
|
$(SYMLINK_SO)
|
||||||
# The following lines means those specific architectures do no symlinks
|
# The following lines means those specific architectures do no symlinks
|
||||||
symlink.cygwin symlink.alpha-osf1 symlink.tru64 symlink.tru64-rpath:
|
symlink.cygwin symlink.alpha-osf1 symlink.tru64 symlink.tru64-rpath symlink.beos:
|
||||||
|
|
||||||
# Compatibility targets
|
# Compatibility targets
|
||||||
link_o.bsd-gcc-shared link_o.linux-shared link_o.gnu-shared: link_o.gnu
|
link_o.bsd-gcc-shared link_o.linux-shared link_o.gnu-shared: link_o.gnu
|
||||||
@@ -607,3 +649,7 @@ link_o.reliantunix-shared: link_o.reliantunix
|
|||||||
link_a.reliantunix-shared: link_a.reliantunix
|
link_a.reliantunix-shared: link_a.reliantunix
|
||||||
link_app.reliantunix-shared: link_app.reliantunix
|
link_app.reliantunix-shared: link_app.reliantunix
|
||||||
symlink.reliantunix-shared: symlink.reliantunix
|
symlink.reliantunix-shared: symlink.reliantunix
|
||||||
|
link_o.beos-shared: link_o.beos
|
||||||
|
link_a.beos-shared: link_a.beos
|
||||||
|
link_app.beos-shared: link_app.gnu
|
||||||
|
symlink.beos-shared: symlink.beos
|
||||||
|
|||||||
111
NEWS
111
NEWS
@@ -5,8 +5,114 @@
|
|||||||
This file gives a brief overview of the major changes between each OpenSSL
|
This file gives a brief overview of the major changes between each OpenSSL
|
||||||
release. For more details please read the CHANGES file.
|
release. For more details please read the CHANGES file.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 1.0.0c and OpenSSL 1.0.0d:
|
||||||
|
|
||||||
|
o Fix for security issue CVE-2011-0014
|
||||||
|
|
||||||
|
Major changes between OpenSSL 1.0.0b and OpenSSL 1.0.0c:
|
||||||
|
|
||||||
|
o Fix for security issue CVE-2010-4180
|
||||||
|
o Fix for CVE-2010-4252
|
||||||
|
o Fix mishandling of absent EC point format extension.
|
||||||
|
o Fix various platform compilation issues.
|
||||||
|
o Corrected fix for security issue CVE-2010-3864.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 1.0.0a and OpenSSL 1.0.0b:
|
||||||
|
|
||||||
|
o Fix for security issue CVE-2010-3864.
|
||||||
|
o Fix for CVE-2010-2939
|
||||||
|
o Fix WIN32 build system for GOST ENGINE.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 1.0.0 and OpenSSL 1.0.0a:
|
||||||
|
|
||||||
|
o Fix for security issue CVE-2010-1633.
|
||||||
|
o GOST MAC and CFB fixes.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8n and OpenSSL 1.0.0:
|
||||||
|
|
||||||
|
o RFC3280 path validation: sufficient to process PKITS tests.
|
||||||
|
o Integrated support for PVK files and keyblobs.
|
||||||
|
o Change default private key format to PKCS#8.
|
||||||
|
o CMS support: able to process all examples in RFC4134
|
||||||
|
o Streaming ASN1 encode support for PKCS#7 and CMS.
|
||||||
|
o Multiple signer and signer add support for PKCS#7 and CMS.
|
||||||
|
o ASN1 printing support.
|
||||||
|
o Whirlpool hash algorithm added.
|
||||||
|
o RFC3161 time stamp support.
|
||||||
|
o New generalised public key API supporting ENGINE based algorithms.
|
||||||
|
o New generalised public key API utilities.
|
||||||
|
o New ENGINE supporting GOST algorithms.
|
||||||
|
o SSL/TLS GOST ciphersuite support.
|
||||||
|
o PKCS#7 and CMS GOST support.
|
||||||
|
o RFC4279 PSK ciphersuite support.
|
||||||
|
o Supported points format extension for ECC ciphersuites.
|
||||||
|
o ecdsa-with-SHA224/256/384/512 signature types.
|
||||||
|
o dsa-with-SHA224 and dsa-with-SHA256 signature types.
|
||||||
|
o Opaque PRF Input TLS extension support.
|
||||||
|
o Updated time routines to avoid OS limitations.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8q and OpenSSL 0.9.8r:
|
||||||
|
|
||||||
|
o Fix for security issue CVE-2011-0014
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8p and OpenSSL 0.9.8q:
|
||||||
|
|
||||||
|
o Fix for security issue CVE-2010-4180
|
||||||
|
o Fix for CVE-2010-4252
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8o and OpenSSL 0.9.8p:
|
||||||
|
|
||||||
|
o Fix for security issue CVE-2010-3864.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8n and OpenSSL 0.9.8o:
|
||||||
|
|
||||||
|
o Fix for security issue CVE-2010-0742.
|
||||||
|
o Various DTLS fixes.
|
||||||
|
o Recognise SHA2 certificates if only SSL algorithms added.
|
||||||
|
o Fix for no-rc4 compilation.
|
||||||
|
o Chil ENGINE unload workaround.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8m and OpenSSL 0.9.8n:
|
||||||
|
|
||||||
|
o CFB cipher definition fixes.
|
||||||
|
o Fix security issues CVE-2010-0740 and CVE-2010-0433.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8l and OpenSSL 0.9.8m:
|
||||||
|
|
||||||
|
o Cipher definition fixes.
|
||||||
|
o Workaround for slow RAND_poll() on some WIN32 versions.
|
||||||
|
o Remove MD2 from algorithm tables.
|
||||||
|
o SPKAC handling fixes.
|
||||||
|
o Support for RFC5746 TLS renegotiation extension.
|
||||||
|
o Compression memory leak fixed.
|
||||||
|
o Compression session resumption fixed.
|
||||||
|
o Ticket and SNI coexistence fixes.
|
||||||
|
o Many fixes to DTLS handling.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8k and OpenSSL 0.9.8l:
|
||||||
|
|
||||||
|
o Temporary work around for CVE-2009-3555: disable renegotiation.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8j and OpenSSL 0.9.8k:
|
||||||
|
|
||||||
|
o Fix various build issues.
|
||||||
|
o Fix security issues (CVE-2009-0590, CVE-2009-0591, CVE-2009-0789)
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8i and OpenSSL 0.9.8j:
|
||||||
|
|
||||||
|
o Fix security issue (CVE-2008-5077)
|
||||||
|
o Merge FIPS 140-2 branch code.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8g and OpenSSL 0.9.8h:
|
||||||
|
|
||||||
|
o CryptoAPI ENGINE support.
|
||||||
|
o Various precautionary measures.
|
||||||
|
o Fix for bugs affecting certificate request creation.
|
||||||
|
o Support for local machine keyset attribute in PKCS#12 files.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.8f and OpenSSL 0.9.8g:
|
Major changes between OpenSSL 0.9.8f and OpenSSL 0.9.8g:
|
||||||
|
|
||||||
|
o Backport of CMS functionality to 0.9.8.
|
||||||
o Fixes for bugs introduced with 0.9.8f.
|
o Fixes for bugs introduced with 0.9.8f.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.8e and OpenSSL 0.9.8f:
|
Major changes between OpenSSL 0.9.8e and OpenSSL 0.9.8f:
|
||||||
@@ -125,6 +231,11 @@
|
|||||||
o Added initial support for Win64.
|
o Added initial support for Win64.
|
||||||
o Added alternate pkg-config files.
|
o Added alternate pkg-config files.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.7l and OpenSSL 0.9.7m:
|
||||||
|
|
||||||
|
o FIPS 1.1.1 module linking.
|
||||||
|
o Various ciphersuite selection fixes.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.7k and OpenSSL 0.9.7l:
|
Major changes between OpenSSL 0.9.7k and OpenSSL 0.9.7l:
|
||||||
|
|
||||||
o Introduce limits to prevent malicious key DoS (CVE-2006-2940)
|
o Introduce limits to prevent malicious key DoS (CVE-2006-2940)
|
||||||
|
|||||||
@@ -159,6 +159,8 @@ cd ..\..\..
|
|||||||
echo SHA1
|
echo SHA1
|
||||||
cd crypto\sha\asm
|
cd crypto\sha\asm
|
||||||
perl sha1-586.pl %ASM_MODE% > s1-nw.asm
|
perl sha1-586.pl %ASM_MODE% > s1-nw.asm
|
||||||
|
perl sha256-586.pl %ASM_MODE% > sha256-nw.asm
|
||||||
|
perl sha512-586.pl %ASM_MODE% > sha512-nw.asm
|
||||||
cd ..\..\..
|
cd ..\..\..
|
||||||
|
|
||||||
echo RIPEMD160
|
echo RIPEMD160
|
||||||
@@ -171,6 +173,11 @@ cd crypto\rc5\asm
|
|||||||
perl rc5-586.pl %ASM_MODE% > r5-nw.asm
|
perl rc5-586.pl %ASM_MODE% > r5-nw.asm
|
||||||
cd ..\..\..
|
cd ..\..\..
|
||||||
|
|
||||||
|
echo WHIRLPOOL
|
||||||
|
cd crypto\whrlpool\asm
|
||||||
|
perl wp-mmx.pl %ASM_MODE% > wp-nw.asm
|
||||||
|
cd ..\..\..
|
||||||
|
|
||||||
echo CPUID
|
echo CPUID
|
||||||
cd crypto
|
cd crypto
|
||||||
perl x86cpuid.pl %ASM_MODE% > x86cpuid-nw.asm
|
perl x86cpuid.pl %ASM_MODE% > x86cpuid-nw.asm
|
||||||
|
|||||||
4
PROBLEMS
4
PROBLEMS
@@ -36,7 +36,9 @@ may differ on your machine.
|
|||||||
|
|
||||||
|
|
||||||
As long as Apple doesn't fix the problem with ld, this problem building
|
As long as Apple doesn't fix the problem with ld, this problem building
|
||||||
OpenSSL will remain as is.
|
OpenSSL will remain as is. Well, the problem was addressed in 0.9.8f by
|
||||||
|
passing -Wl,-search_paths_first, but it's unknown if the flag was
|
||||||
|
supported from the initial MacOS X release.
|
||||||
|
|
||||||
|
|
||||||
* Parallell make leads to errors
|
* Parallell make leads to errors
|
||||||
|
|||||||
27
README
27
README
@@ -1,7 +1,7 @@
|
|||||||
|
|
||||||
OpenSSL 0.9.8h
|
OpenSSL 1.1.0-dev
|
||||||
|
|
||||||
Copyright (c) 1998-2008 The OpenSSL Project
|
Copyright (c) 1998-2011 The OpenSSL Project
|
||||||
Copyright (c) 1995-1998 Eric A. Young, Tim J. Hudson
|
Copyright (c) 1995-1998 Eric A. Young, Tim J. Hudson
|
||||||
All rights reserved.
|
All rights reserved.
|
||||||
|
|
||||||
@@ -112,8 +112,6 @@
|
|||||||
should be contacted if that algorithm is to be used; their web page is
|
should be contacted if that algorithm is to be used; their web page is
|
||||||
http://www.ascom.ch/.
|
http://www.ascom.ch/.
|
||||||
|
|
||||||
The MDC2 algorithm is patented by IBM.
|
|
||||||
|
|
||||||
NTT and Mitsubishi have patents and pending patents on the Camellia
|
NTT and Mitsubishi have patents and pending patents on the Camellia
|
||||||
algorithm, but allow use at no charge without requiring an explicit
|
algorithm, but allow use at no charge without requiring an explicit
|
||||||
licensing agreement: http://info.isl.ntt.co.jp/crypt/eng/info/chiteki.html
|
licensing agreement: http://info.isl.ntt.co.jp/crypt/eng/info/chiteki.html
|
||||||
@@ -139,6 +137,9 @@
|
|||||||
SUPPORT
|
SUPPORT
|
||||||
-------
|
-------
|
||||||
|
|
||||||
|
See the OpenSSL website www.openssl.org for details of how to obtain
|
||||||
|
commercial technical support.
|
||||||
|
|
||||||
If you have any problems with OpenSSL then please take the following steps
|
If you have any problems with OpenSSL then please take the following steps
|
||||||
first:
|
first:
|
||||||
|
|
||||||
@@ -165,6 +166,10 @@
|
|||||||
|
|
||||||
openssl-bugs@openssl.org
|
openssl-bugs@openssl.org
|
||||||
|
|
||||||
|
Note that the request tracker should NOT be used for general assistance
|
||||||
|
or support queries. Just because something doesn't work the way you expect
|
||||||
|
does not mean it is necessarily a bug in OpenSSL.
|
||||||
|
|
||||||
Note that mail to openssl-bugs@openssl.org is recorded in the publicly
|
Note that mail to openssl-bugs@openssl.org is recorded in the publicly
|
||||||
readable request tracker database and is forwarded to a public
|
readable request tracker database and is forwarded to a public
|
||||||
mailing list. Confidential mail may be sent to openssl-security@openssl.org
|
mailing list. Confidential mail may be sent to openssl-security@openssl.org
|
||||||
@@ -175,10 +180,22 @@
|
|||||||
|
|
||||||
Development is coordinated on the openssl-dev mailing list (see
|
Development is coordinated on the openssl-dev mailing list (see
|
||||||
http://www.openssl.org for information on subscribing). If you
|
http://www.openssl.org for information on subscribing). If you
|
||||||
would like to submit a patch, send it to openssl-dev@openssl.org with
|
would like to submit a patch, send it to openssl-bugs@openssl.org with
|
||||||
the string "[PATCH]" in the subject. Please be sure to include a
|
the string "[PATCH]" in the subject. Please be sure to include a
|
||||||
textual explanation of what your patch does.
|
textual explanation of what your patch does.
|
||||||
|
|
||||||
|
If you are unsure as to whether a feature will be useful for the general
|
||||||
|
OpenSSL community please discuss it on the openssl-dev mailing list first.
|
||||||
|
Someone may be already working on the same thing or there may be a good
|
||||||
|
reason as to why that feature isn't implemented.
|
||||||
|
|
||||||
|
Patches should be as up to date as possible, preferably relative to the
|
||||||
|
current CVS or the last snapshot. They should follow the coding style of
|
||||||
|
OpenSSL and compile without warnings. Some of the core team developer targets
|
||||||
|
can be used for testing purposes, (debug-steve64, debug-geoff etc). OpenSSL
|
||||||
|
compiles on many varied platforms: try to ensure you only use portable
|
||||||
|
features.
|
||||||
|
|
||||||
Note: For legal reasons, contributions from the US can be accepted only
|
Note: For legal reasons, contributions from the US can be accepted only
|
||||||
if a TSU notification and a copy of the patch are sent to crypt@bis.doc.gov
|
if a TSU notification and a copy of the patch are sent to crypt@bis.doc.gov
|
||||||
(formerly BXA) with a copy to the ENC Encryption Request Coordinator;
|
(formerly BXA) with a copy to the ENC Encryption Request Coordinator;
|
||||||
|
|||||||
61
README.ECC
Normal file
61
README.ECC
Normal file
@@ -0,0 +1,61 @@
|
|||||||
|
NOTE: The OpenSSL Software Foundation has executed a sublicense agreement
|
||||||
|
entitled "Elliptic Curve Cryptography Patent License Agreement" with the
|
||||||
|
National Security Agency/ Central Security Service Commercial Solutions
|
||||||
|
Center (NCSC) dated 2010-11-04. That agreement permits implementation and
|
||||||
|
distribution of software containing features covered by any or all of the
|
||||||
|
following patents:
|
||||||
|
|
||||||
|
1.) U.S. Pat. No. 5,761,305 entitled "Key Agreement and Transport Protocol
|
||||||
|
with Implicit Signatures" issued on June 2, 1998;
|
||||||
|
2.) Can. Pat. Appl. Ser. No. 2176972 entitled "Key Agreement and Transport
|
||||||
|
Protocol with Implicit Signature and Reduced Bandwidth" filed on May
|
||||||
|
16, 1996;
|
||||||
|
3.) U.S. Pat. No. 5,889,865 entitled "Key Agreement and Transport Protocol
|
||||||
|
with Implicit Signatures" issued on March 30, 1999;
|
||||||
|
4.) U.S. Pat. No. 5,896,455 entitled "Key Agreement and Transport Protocol
|
||||||
|
with Implicit Signatures" issued on April 20, 1999;
|
||||||
|
5.) U.S. Pat. No. 5,933,504 entitled "Strengthened Public Key Protocol"
|
||||||
|
issued on August 3, 1999;
|
||||||
|
6.) Can. Pat. Appl. Ser. No. 2176866 entitled "Strengthened Public Key
|
||||||
|
Protocol" filed on May 17, 1996;
|
||||||
|
7.) E.P. Pat. Appl. Ser. No. 96201322.3 entitled "Strengthened Public Key
|
||||||
|
Protocol" filed on May 17, 1996;
|
||||||
|
8.) U.S. Pat. No. 5,999,626 entitled "Digital Signatures on a Smartcard"
|
||||||
|
issued on December 7, 1999;
|
||||||
|
9.) Can. Pat. Appl. Ser. No. 2202566 entitled "Digital Signatures on a
|
||||||
|
Smartcard" filed on April 14, 1997;
|
||||||
|
10.) E.P. Pat. Appl. No. 97106114.8 entitled "Digital Signatures on a
|
||||||
|
Smartcard" filed on April 15, 1997;
|
||||||
|
11.) U.S Pat. No. 6,122,736 entitled "Key Agreement and Transport Protocol
|
||||||
|
with Implicit Signatures" issued on September 19, 2000;
|
||||||
|
12.) Can. Pat. Appl. Ser. No. 2174261 entitled "Key Agreement and Transport
|
||||||
|
Protocol with Implicit Signatures" filed on April 16, 1996;
|
||||||
|
13.) E.P. Pat. Appl. Ser. No. 96105920.1 entitled "Key Agreement and
|
||||||
|
Transport Protocol with Implicit Signatures" filed on April 16, 1996;
|
||||||
|
14.) U.S. Pat. No. 6,141,420 entitled "Elliptic Curve Encryption Systems"
|
||||||
|
issued on October 31, 2000;
|
||||||
|
15.) Can. Pat. Appl. Ser. No. 2155038 entitled "Elliptic Curve Encryption
|
||||||
|
Systems" filed on July 31, 1995;
|
||||||
|
16.) E.P. Pat. Appl. Ser. No. 95926348.4 entitled "Elliptic Curve Encryption
|
||||||
|
Systems" filed on July 31, 1995;
|
||||||
|
17.) U.S. Pat. No. 6,336,188 entitled "Authenticated Key Agreement" issued
|
||||||
|
on January 1, 2002;
|
||||||
|
18.) U.S. Pat. No. 6,487,661 entitled "Key Agreement and Transport Protocol"
|
||||||
|
issued on November 26, 2002;
|
||||||
|
19.) Can. Pat. Appl. Ser. No. 2174260 entitled "Key Agreement and Transport
|
||||||
|
Protocol" filed on April 16, 1996;
|
||||||
|
20.) E.P. Pat. Appl. Ser. No. 96105921.9 entitled "Key Agreement and
|
||||||
|
Transport Protocol" filed on April 21, 1996;
|
||||||
|
21.) U.S. Pat. No. 6,563,928 entitled "Strengthened Public Key Protocol"
|
||||||
|
issued on May 13, 2003;
|
||||||
|
22.) U.S. Pat. No. 6,618,483 entitled "Elliptic Curve Encryption Systems"
|
||||||
|
issued September 9, 2003;
|
||||||
|
23.) U.S. Pat. Appl. Ser. No. 09/434,247 entitled "Digital Signatures on a
|
||||||
|
Smartcard" filed on November 5, 1999;
|
||||||
|
24.) U.S. Pat. Appl. Ser. No. 09/558,256 entitled "Key Agreement and
|
||||||
|
Transport Protocol with Implicit Signatures" filed on April 25, 2000;
|
||||||
|
25.) U.S. Pat. Appl. Ser. No. 09/942,492 entitled "Digital Signatures on a
|
||||||
|
Smartcard" filed on August 29, 2001 and published on July 18, 2002; and,
|
||||||
|
26.) U.S. Pat. Appl. Ser. No. 10/185,735 entitled "Strengthened Public Key
|
||||||
|
Protocol" filed on July 1, 2000.
|
||||||
|
|
||||||
130
README.FIPS
Normal file
130
README.FIPS
Normal file
@@ -0,0 +1,130 @@
|
|||||||
|
Preliminary status and build information for FIPS module v2.0
|
||||||
|
|
||||||
|
NB: if you are cross compiling you now need to use the latest "incore" script
|
||||||
|
this can be found at util/incore in the tarballs.
|
||||||
|
|
||||||
|
If you have any object files from a previous build do:
|
||||||
|
|
||||||
|
make clean
|
||||||
|
|
||||||
|
To build the module do:
|
||||||
|
|
||||||
|
./config fipscanisteronly
|
||||||
|
make
|
||||||
|
|
||||||
|
Build should complete without errors.
|
||||||
|
|
||||||
|
Build test utilities:
|
||||||
|
|
||||||
|
make build_tests
|
||||||
|
|
||||||
|
Run test suite:
|
||||||
|
|
||||||
|
test/fips_test_suite
|
||||||
|
|
||||||
|
again should complete without errors.
|
||||||
|
|
||||||
|
Run test vectors:
|
||||||
|
|
||||||
|
1. Download an appropriate set of testvectors from www.openssl.org/docs/fips
|
||||||
|
only the fips-2.0 testvector files are usable for complete tests.
|
||||||
|
|
||||||
|
2. Extract the files to a suitable directory.
|
||||||
|
|
||||||
|
3. Run the test vector perl script, for example:
|
||||||
|
|
||||||
|
cd fips
|
||||||
|
perl fipsalgtest.pl --dir=/wherever/stuff/was/extracted
|
||||||
|
|
||||||
|
4. It should say "passed all tests" at the end. Report full details of any
|
||||||
|
failures.
|
||||||
|
|
||||||
|
If you wish to use the older 1.2.x testvectors (for example those from 2007)
|
||||||
|
you need the command line switch --disable-v2 to fipsalgtest.pl
|
||||||
|
|
||||||
|
Examine the external symbols in fips/fipscanister.o they should all begin
|
||||||
|
with FIPS or fips. One way to check with GNU nm is:
|
||||||
|
|
||||||
|
nm -g --defined-only fips/fipscanister.o | grep -v -i fips
|
||||||
|
|
||||||
|
If you get *any* output at all from this test (i.e. symbols not starting with
|
||||||
|
fips or FIPS) please report it.
|
||||||
|
|
||||||
|
Restricted tarball tests.
|
||||||
|
|
||||||
|
The validated module will have its own tarball containing sufficient code to
|
||||||
|
build fipscanister.o and the associated algorithm tests. You can create a
|
||||||
|
similar tarball yourself for testing purposes using the commands below.
|
||||||
|
|
||||||
|
Standard restricted tarball:
|
||||||
|
|
||||||
|
make -f Makefile.fips dist
|
||||||
|
|
||||||
|
Prime field field only ECC tarball:
|
||||||
|
|
||||||
|
make NOEC2M=1 -f Makefile.fips dist
|
||||||
|
|
||||||
|
Once you've created the tarball extract into a fresh directory and do:
|
||||||
|
|
||||||
|
./config
|
||||||
|
make
|
||||||
|
|
||||||
|
You can then run the algorithm tests as above. This build automatically uses
|
||||||
|
fipscanisterbuild and no-ec2m as appropriate.
|
||||||
|
|
||||||
|
FIPS capable OpenSSL test: WARNING PRELIMINARY INSTRUCTIONS, SUBJECT TO CHANGE.
|
||||||
|
|
||||||
|
At least initially the test module and FIPS capable OpenSSL may change and
|
||||||
|
by out of sync. You are advised to check for any changes and pull the latest
|
||||||
|
source from CVS if you have problems. See anon CVS and rsync instructions at:
|
||||||
|
|
||||||
|
http://www.openssl.org/source/repos.html
|
||||||
|
|
||||||
|
Make or download a restricted tarball from ftp://ftp.openssl.org/snapshot/
|
||||||
|
|
||||||
|
If required set the environment variable FIPSDIR to an appropriate location
|
||||||
|
to install the test module. If cross compiling set other environment
|
||||||
|
variables too.
|
||||||
|
|
||||||
|
In this restricted tarball on a Linux or U*ix like system run:
|
||||||
|
|
||||||
|
./config
|
||||||
|
make
|
||||||
|
make install
|
||||||
|
|
||||||
|
On Windows from a VC++ environment do:
|
||||||
|
|
||||||
|
ms\do_fips
|
||||||
|
|
||||||
|
This will build and install the test module and some associated files.
|
||||||
|
|
||||||
|
Now download the latest version of the OpenSSL 1.0.1 branch from either a
|
||||||
|
snapshot or preferably CVS. For Linux do:
|
||||||
|
|
||||||
|
./config fips [other args]
|
||||||
|
make
|
||||||
|
|
||||||
|
For Windows:
|
||||||
|
|
||||||
|
perl Configure VC-WIN32 fips [other args]
|
||||||
|
ms\do_nasm
|
||||||
|
nmake -f ms\ntdll.mak
|
||||||
|
|
||||||
|
(or ms\nt.mak for a static build).
|
||||||
|
|
||||||
|
Where [other args] can be any other arguments you use for an OpenSSL build
|
||||||
|
such as "shared" or "zlib".
|
||||||
|
|
||||||
|
This will build the fips capable OpenSSL and link it to the test module. You
|
||||||
|
can now try linking and testing applications against the FIPS capable OpenSSL.
|
||||||
|
|
||||||
|
Please report any problems to either the openssl-dev mailing list or directly
|
||||||
|
to me steve@openssl.org . Check the mailing lists regularly to avoid duplicate
|
||||||
|
reports.
|
||||||
|
|
||||||
|
Known issues:
|
||||||
|
|
||||||
|
Code needs extensively reviewing to ensure it builds correctly on
|
||||||
|
supported platforms and is compliant with FIPS 140-2.
|
||||||
|
The "FIPS capable OpenSSL" is still largely untested, it builds and runs
|
||||||
|
some simple tests OK on some systems but needs far more "real world" testing.
|
||||||
20
STATUS
20
STATUS
@@ -1,10 +1,26 @@
|
|||||||
|
|
||||||
OpenSSL STATUS Last modified at
|
OpenSSL STATUS Last modified at
|
||||||
______________ $Date: 2008/05/28 07:37:13 $
|
______________ $Date: 2011/02/08 17:48:56 $
|
||||||
|
|
||||||
DEVELOPMENT STATE
|
DEVELOPMENT STATE
|
||||||
|
|
||||||
o OpenSSL 0.9.9: Under development...
|
o OpenSSL 1.1.0: Under development...
|
||||||
|
o OpenSSL 1.0.1: Under development...
|
||||||
|
o OpenSSL 1.0.0d: Released on February 8nd, 2011
|
||||||
|
o OpenSSL 1.0.0c: Released on December 2nd, 2010
|
||||||
|
o OpenSSL 1.0.0b: Released on November 16th, 2010
|
||||||
|
o OpenSSL 1.0.0a: Released on June 1st, 2010
|
||||||
|
o OpenSSL 1.0.0: Released on March 29th, 2010
|
||||||
|
o OpenSSL 0.9.8r: Released on February 8nd, 2011
|
||||||
|
o OpenSSL 0.9.8q: Released on December 2nd, 2010
|
||||||
|
o OpenSSL 0.9.8p: Released on November 16th, 2010
|
||||||
|
o OpenSSL 0.9.8o: Released on June 1st, 2010
|
||||||
|
o OpenSSL 0.9.8n: Released on March 24th, 2010
|
||||||
|
o OpenSSL 0.9.8m: Released on February 25th, 2010
|
||||||
|
o OpenSSL 0.9.8l: Released on November 5th, 2009
|
||||||
|
o OpenSSL 0.9.8k: Released on March 25th, 2009
|
||||||
|
o OpenSSL 0.9.8j: Released on January 7th, 2009
|
||||||
|
o OpenSSL 0.9.8i: Released on September 15th, 2008
|
||||||
o OpenSSL 0.9.8h: Released on May 28th, 2008
|
o OpenSSL 0.9.8h: Released on May 28th, 2008
|
||||||
o OpenSSL 0.9.8g: Released on October 19th, 2007
|
o OpenSSL 0.9.8g: Released on October 19th, 2007
|
||||||
o OpenSSL 0.9.8f: Released on October 11th, 2007
|
o OpenSSL 0.9.8f: Released on October 11th, 2007
|
||||||
|
|||||||
67
VMS/install-vms.com
Executable file
67
VMS/install-vms.com
Executable file
@@ -0,0 +1,67 @@
|
|||||||
|
$! install-vms.com -- Installs the files in a given directory tree
|
||||||
|
$!
|
||||||
|
$! Author: Richard Levitte <richard@levitte.org>
|
||||||
|
$! Time of creation: 23-MAY-1998 19:22
|
||||||
|
$!
|
||||||
|
$! P1 root of the directory tree
|
||||||
|
$!
|
||||||
|
$!
|
||||||
|
$! Announce/identify.
|
||||||
|
$!
|
||||||
|
$ proc = f$environment( "procedure")
|
||||||
|
$ write sys$output "@@@ "+ -
|
||||||
|
f$parse( proc, , , "name")+ f$parse( proc, , , "type")
|
||||||
|
$!
|
||||||
|
$ on error then goto tidy
|
||||||
|
$ on control_c then goto tidy
|
||||||
|
$!
|
||||||
|
$ if p1 .eqs. ""
|
||||||
|
$ then
|
||||||
|
$ write sys$output "First argument missing."
|
||||||
|
$ write sys$output -
|
||||||
|
"Should be the directory where you want things installed."
|
||||||
|
$ exit
|
||||||
|
$ endif
|
||||||
|
$
|
||||||
|
$ if (f$getsyi( "cpu") .lt. 128)
|
||||||
|
$ then
|
||||||
|
$ arch = "VAX"
|
||||||
|
$ else
|
||||||
|
$ arch = f$edit( f$getsyi( "arch_name"), "upcase")
|
||||||
|
$ if (arch .eqs. "") then arch = "UNK"
|
||||||
|
$ endif
|
||||||
|
$
|
||||||
|
$ root = f$parse( P1, "[]A.;0", , , "SYNTAX_ONLY, NO_CONCEAL")- "A.;0"
|
||||||
|
$ root_dev = f$parse( root, , , "device", "syntax_only")
|
||||||
|
$ root_dir = f$parse( root, , , "directory", "syntax_only") - -
|
||||||
|
"[000000." - "][" - "[" - "]"
|
||||||
|
$ root = root_dev + "[" + root_dir
|
||||||
|
$
|
||||||
|
$ define /nolog wrk_sslroot 'root'.] /translation_attributes = concealed
|
||||||
|
$ define /nolog wrk_sslinclude wrk_sslroot:[include]
|
||||||
|
$
|
||||||
|
$ if f$parse( "wrk_sslroot:[000000]") .eqs. "" then -
|
||||||
|
create /directory /log wrk_sslroot:[000000]
|
||||||
|
$ if f$parse( "wrk_sslinclude:") .eqs. "" then -
|
||||||
|
create /directory /log wrk_sslinclude:
|
||||||
|
$ if f$parse( "wrk_sslroot:[vms]") .eqs. "" then -
|
||||||
|
create /directory /log wrk_sslroot:[vms]
|
||||||
|
$!
|
||||||
|
$ copy /log /protection = world:re openssl_startup.com wrk_sslroot:[vms]
|
||||||
|
$ copy /log /protection = world:re openssl_undo.com wrk_sslroot:[vms]
|
||||||
|
$ copy /log /protection = world:re openssl_utils.com wrk_sslroot:[vms]
|
||||||
|
$!
|
||||||
|
$ tidy:
|
||||||
|
$!
|
||||||
|
$ call deass wrk_sslroot
|
||||||
|
$ call deass wrk_sslinclude
|
||||||
|
$!
|
||||||
|
$ exit
|
||||||
|
$!
|
||||||
|
$ deass: subroutine
|
||||||
|
$ if (f$trnlnm( p1, "LNM$PROCESS") .nes. "")
|
||||||
|
$ then
|
||||||
|
$ deassign /process 'p1'
|
||||||
|
$ endif
|
||||||
|
$ endsubroutine
|
||||||
|
$!
|
||||||
@@ -1,72 +0,0 @@
|
|||||||
$! INSTALL.COM -- Installs the files in a given directory tree
|
|
||||||
$!
|
|
||||||
$! Author: Richard Levitte <richard@levitte.org>
|
|
||||||
$! Time of creation: 23-MAY-1998 19:22
|
|
||||||
$!
|
|
||||||
$! P1 root of the directory tree
|
|
||||||
$!
|
|
||||||
$ IF P1 .EQS. ""
|
|
||||||
$ THEN
|
|
||||||
$ WRITE SYS$OUTPUT "First argument missing."
|
|
||||||
$ WRITE SYS$OUTPUT "Should be the directory where you want things installed."
|
|
||||||
$ EXIT
|
|
||||||
$ ENDIF
|
|
||||||
$
|
|
||||||
$ ROOT = F$PARSE(P1,"[]A.;0",,,"SYNTAX_ONLY,NO_CONCEAL") - "A.;0"
|
|
||||||
$ ROOT_DEV = F$PARSE(ROOT,,,"DEVICE","SYNTAX_ONLY")
|
|
||||||
$ ROOT_DIR = F$PARSE(ROOT,,,"DIRECTORY","SYNTAX_ONLY") -
|
|
||||||
- "[000000." - "][" - "[" - "]"
|
|
||||||
$ ROOT = ROOT_DEV + "[" + ROOT_DIR
|
|
||||||
$
|
|
||||||
$ DEFINE/NOLOG WRK_SSLROOT 'ROOT'.] /TRANS=CONC
|
|
||||||
$ DEFINE/NOLOG WRK_SSLVLIB WRK_SSLROOT:[VAX_LIB]
|
|
||||||
$ DEFINE/NOLOG WRK_SSLALIB WRK_SSLROOT:[ALPHA_LIB]
|
|
||||||
$ DEFINE/NOLOG WRK_SSLINCLUDE WRK_SSLROOT:[INCLUDE]
|
|
||||||
$ DEFINE/NOLOG WRK_SSLVEXE WRK_SSLROOT:[VAX_EXE]
|
|
||||||
$ DEFINE/NOLOG WRK_SSLAEXE WRK_SSLROOT:[ALPHA_EXE]
|
|
||||||
$ DEFINE/NOLOG WRK_SSLCERTS WRK_SSLROOT:[CERTS]
|
|
||||||
$ DEFINE/NOLOG WRK_SSLPRIVATE WRK_SSLROOT:[PRIVATE]
|
|
||||||
$
|
|
||||||
$ IF F$PARSE("WRK_SSLROOT:[000000]") .EQS. "" THEN -
|
|
||||||
CREATE/DIR/LOG WRK_SSLROOT:[000000]
|
|
||||||
$ IF F$PARSE("WRK_SSLINCLUDE:") .EQS. "" THEN -
|
|
||||||
CREATE/DIR/LOG WRK_SSLINCLUDE:
|
|
||||||
$ IF F$PARSE("WRK_SSLROOT:[VMS]") .EQS. "" THEN -
|
|
||||||
CREATE/DIR/LOG WRK_SSLROOT:[VMS]
|
|
||||||
$
|
|
||||||
$ IF F$SEARCH("WRK_SSLINCLUDE:vms_idhacks.h") .NES. "" THEN -
|
|
||||||
DELETE WRK_SSLINCLUDE:vms_idhacks.h;*
|
|
||||||
$
|
|
||||||
$ OPEN/WRITE SF WRK_SSLROOT:[VMS]OPENSSL_STARTUP.COM
|
|
||||||
$ WRITE SYS$OUTPUT "%OPEN-I-CREATED, ",F$SEARCH("WRK_SSLROOT:[VMS]OPENSSL_STARTUP.COM")," created."
|
|
||||||
$ WRITE SF "$! Startup file for Openssl 0.9.2-RL 15-Mar-1999"
|
|
||||||
$ WRITE SF "$!"
|
|
||||||
$ WRITE SF "$! Do not edit this file, as it will be regenerated during next installation."
|
|
||||||
$ WRITE SF "$! Instead, add or change SSLROOT:[VMS]OPENSSL_SYSTARTUP.COM"
|
|
||||||
$ WRITE SF "$!"
|
|
||||||
$ WRITE SF "$! P1 a qualifier to DEFINE. For example ""/SYSTEM"" to get the logical names"
|
|
||||||
$ WRITE SF "$! defined in the system logical name table."
|
|
||||||
$ WRITE SF "$!"
|
|
||||||
$ WRITE SF "$ ARCH = ""VAX"""
|
|
||||||
$ WRITE SF "$ IF F$GETSYI(""CPU"") .GE. 128 THEN ARCH = ""ALPHA"""
|
|
||||||
$ WRITE SF "$ DEFINE/NOLOG'P1 SSLROOT ",ROOT,".] /TRANS=CONC"
|
|
||||||
$ WRITE SF "$ DEFINE/NOLOG'P1 SSLLIB SSLROOT:['ARCH'_LIB]"
|
|
||||||
$ WRITE SF "$ DEFINE/NOLOG'P1 SSLINCLUDE SSLROOT:[INCLUDE]"
|
|
||||||
$ WRITE SF "$ DEFINE/NOLOG'P1 SSLEXE SSLROOT:['ARCH'_EXE]"
|
|
||||||
$ WRITE SF "$ DEFINE/NOLOG'P1 SSLCERTS SSLROOT:[CERTS]"
|
|
||||||
$ WRITE SF "$ DEFINE/NOLOG'P1 SSLPRIVATE SSLROOT:[PRIVATE]"
|
|
||||||
$ WRITE SF "$"
|
|
||||||
$ WRITE SF "$! This is program can include <openssl/{foo}.h>"
|
|
||||||
$ WRITE SF "$ DEFINE/NOLOG'P1 OPENSSL SSLINCLUDE:"
|
|
||||||
$ WRITE SF "$"
|
|
||||||
$ WRITE SF "$ IF F$SEARCH(""SSLROOT:[VMS]OPENSSL_SYSTARTUP.COM"") .NES."""" THEN -"
|
|
||||||
$ WRITE SF " @SSLROOT:[VMS]OPENSSL_SYSTARTUP.COM"
|
|
||||||
$ WRITE SF "$"
|
|
||||||
$ WRITE SF "$ EXIT"
|
|
||||||
$ CLOSE SF
|
|
||||||
$ SET FILE/PROT=WORLD:RE WRK_SSLROOT:[VMS]OPENSSL_STARTUP.COM
|
|
||||||
$
|
|
||||||
$ COPY OPENSSL_UTILS.COM WRK_SSLROOT:[VMS]/LOG
|
|
||||||
$ SET FILE/PROT=WORLD:RE WRK_SSLROOT:[VMS]OPENSSL_UTILS.COM
|
|
||||||
$
|
|
||||||
$ EXIT
|
|
||||||
250
VMS/mkshared.com
250
VMS/mkshared.com
@@ -1,77 +1,164 @@
|
|||||||
$! MKSHARED.COM -- script to created shareable images on VMS
|
$! MKSHARED.COM -- Create shareable images.
|
||||||
$!
|
$!
|
||||||
$! No command line parameters. This should be run at the start of the source
|
$! P1: "64" for 64-bit pointers.
|
||||||
$! tree (the same directory where one finds INSTALL.VMS).
|
|
||||||
$!
|
$!
|
||||||
$! Input: [.UTIL]LIBEAY.NUM,[.AXP.EXE.CRYPTO]LIBCRYPTO.OLB
|
$! P2: Zlib object library path (optional).
|
||||||
$! [.UTIL]SSLEAY.NUM,[.AXP.EXE.SSL]LIBSSL.OLB
|
$!
|
||||||
$! Output: [.AXP.EXE.CRYPTO]LIBCRYPTO.OPT,.MAP,.EXE
|
$! Input: [.UTIL]LIBEAY.NUM,[.xxx.EXE.CRYPTO]SSL_LIBCRYPTO[32].OLB
|
||||||
$! [.AXP.EXE.SSL]LIBSSL.OPT,.MAP,.EXE
|
$! [.UTIL]SSLEAY.NUM,[.xxx.EXE.SSL]SSL_LIBSSL[32].OLB
|
||||||
|
$! Output: [.xxx.EXE.CRYPTO]SSL_LIBCRYPTO_SHR[32].OPT,.MAP,.EXE
|
||||||
|
$! [.xxx.EXE.SSL]SSL_LIBSSL_SRH[32].OPT,.MAP,.EXE
|
||||||
$!
|
$!
|
||||||
$! So far, tests have only been made on VMS for Alpha. VAX will come in time.
|
$! So far, tests have only been made on VMS for Alpha. VAX will come in time.
|
||||||
$! ===========================================================================
|
$! ===========================================================================
|
||||||
$
|
$!
|
||||||
|
$! Announce/identify.
|
||||||
|
$!
|
||||||
|
$ proc = f$environment( "procedure")
|
||||||
|
$ write sys$output "@@@ "+ -
|
||||||
|
f$parse( proc, , , "name")+ f$parse( proc, , , "type")
|
||||||
|
$!
|
||||||
|
$! Save the original default device:[directory].
|
||||||
|
$!
|
||||||
|
$ def_orig = f$environment( "default")
|
||||||
|
$ on error then goto tidy
|
||||||
|
$ on control_c then goto tidy
|
||||||
|
$!
|
||||||
|
$! SET DEFAULT to the main kit directory.
|
||||||
|
$!
|
||||||
|
$ proc = f$environment("procedure")
|
||||||
|
$ proc = f$parse( "A.;", proc)- "A.;"
|
||||||
|
$ set default 'proc'
|
||||||
|
$ set default [-]
|
||||||
|
$!
|
||||||
$! ----- Prepare info for processing: version number and file info
|
$! ----- Prepare info for processing: version number and file info
|
||||||
$ gosub read_version_info
|
$ gosub read_version_info
|
||||||
$ if libver .eqs. ""
|
$ if libver .eqs. ""
|
||||||
$ then
|
$ then
|
||||||
$ write sys$error "ERROR: Couldn't find any library version info..."
|
$ write sys$error "ERROR: Couldn't find any library version info..."
|
||||||
$ exit
|
$ go to tidy:
|
||||||
$ endif
|
$ endif
|
||||||
$
|
$
|
||||||
$ if f$getsyi("CPU") .ge. 128
|
$ if (f$getsyi("cpu") .lt. 128)
|
||||||
$ then
|
$ then
|
||||||
$ libid = "Crypto"
|
$ arch_vax = 1
|
||||||
$ libnum = "[.UTIL]LIBEAY.NUM"
|
$ arch = "VAX"
|
||||||
$ libdir = "[.AXP.EXE.CRYPTO]"
|
|
||||||
$ libolb = "''libdir'LIBCRYPTO.OLB"
|
|
||||||
$ libopt = "''libdir'LIBCRYPTO.OPT"
|
|
||||||
$ libmap = "''libdir'LIBCRYPTO.MAP"
|
|
||||||
$ libgoal= "''libdir'LIBCRYPTO.EXE"
|
|
||||||
$ libref = ""
|
|
||||||
$ gosub create_axp_shr
|
|
||||||
$ libid = "SSL"
|
|
||||||
$ libnum = "[.UTIL]SSLEAY.NUM"
|
|
||||||
$ libdir = "[.AXP.EXE.SSL]"
|
|
||||||
$ libolb = "''libdir'LIBSSL.OLB"
|
|
||||||
$ libopt = "''libdir'LIBSSL.OPT"
|
|
||||||
$ libmap = "''libdir'LIBSSL.MAP"
|
|
||||||
$ libgoal= "''libdir'LIBSSL.EXE"
|
|
||||||
$ libref = "[.AXP.EXE.CRYPTO]LIBCRYPTO.EXE"
|
|
||||||
$ gosub create_axp_shr
|
|
||||||
$ else
|
$ else
|
||||||
|
$ arch_vax = 0
|
||||||
|
$ arch = f$edit( f$getsyi( "ARCH_NAME"), "UPCASE")
|
||||||
|
$ if (arch .eqs. "") then arch = "UNK"
|
||||||
|
$ endif
|
||||||
|
$!
|
||||||
|
$ archd = arch
|
||||||
|
$ lib32 = "32"
|
||||||
|
$ shr = "SHR32"
|
||||||
|
$!
|
||||||
|
$ if (p1 .nes. "")
|
||||||
|
$ then
|
||||||
|
$ if (p1 .eqs. "64")
|
||||||
|
$ then
|
||||||
|
$ archd = arch+ "_64"
|
||||||
|
$ lib32 = ""
|
||||||
|
$ shr = "SHR"
|
||||||
|
$ else
|
||||||
|
$ if (p1 .nes. "32")
|
||||||
|
$ then
|
||||||
|
$ write sys$output "Second argument invalid."
|
||||||
|
$ write sys$output "It should be "32", "64", or nothing."
|
||||||
|
$ exit
|
||||||
|
$ endif
|
||||||
|
$ endif
|
||||||
|
$ endif
|
||||||
|
$!
|
||||||
|
$ ZLIB = p2
|
||||||
|
$ zlib_lib = ""
|
||||||
|
$ if (ZLIB .nes. "")
|
||||||
|
$ then
|
||||||
|
$ file2 = f$parse( ZLIB, "libz.olb", , , "syntax_only")
|
||||||
|
$ if (f$search( file2) .eqs. "")
|
||||||
|
$ then
|
||||||
|
$ write sys$output ""
|
||||||
|
$ write sys$output "The Option ", ZLIB, " Is Invalid."
|
||||||
|
$ write sys$output " Can't find library: ''file2'"
|
||||||
|
$ write sys$output ""
|
||||||
|
$ goto tidy
|
||||||
|
$ endif
|
||||||
|
$ zlib_lib = ", ''file2' /library"
|
||||||
|
$ endif
|
||||||
|
$!
|
||||||
|
$ if (arch_vax)
|
||||||
|
$ then
|
||||||
$ libtit = "CRYPTO_TRANSFER_VECTOR"
|
$ libtit = "CRYPTO_TRANSFER_VECTOR"
|
||||||
$ libid = "Crypto"
|
$ libid = "Crypto"
|
||||||
$ libnum = "[.UTIL]LIBEAY.NUM"
|
$ libnum = "[.UTIL]LIBEAY.NUM"
|
||||||
$ libdir = "[.VAX.EXE.CRYPTO]"
|
$ libdir = "[.''ARCHD'.EXE.CRYPTO]"
|
||||||
$ libmar = "''libdir'LIBCRYPTO.MAR"
|
$ libmar = "''libdir'SSL_LIBCRYPTO_''shr'.MAR"
|
||||||
$ libolb = "''libdir'LIBCRYPTO.OLB"
|
$ libolb = "''libdir'SSL_LIBCRYPTO''lib32'.OLB"
|
||||||
$ libopt = "''libdir'LIBCRYPTO.OPT"
|
$ libopt = "''libdir'SSL_LIBCRYPTO_''shr'.OPT"
|
||||||
$ libobj = "''libdir'LIBCRYPTO.OBJ"
|
$ libobj = "''libdir'SSL_LIBCRYPTO_''shr'.OBJ"
|
||||||
$ libmap = "''libdir'LIBCRYPTO.MAP"
|
$ libmap = "''libdir'SSL_LIBCRYPTO_''shr'.MAP"
|
||||||
$ libgoal= "''libdir'LIBCRYPTO.EXE"
|
$ libgoal= "''libdir'SSL_LIBCRYPTO_''shr'.EXE"
|
||||||
$ libref = ""
|
$ libref = ""
|
||||||
$ libvec = "LIBCRYPTO"
|
$ libvec = "LIBCRYPTO"
|
||||||
$ gosub create_vax_shr
|
$ if f$search( libolb) .nes. "" then gosub create_vax_shr
|
||||||
$ libtit = "SSL_TRANSFER_VECTOR"
|
$ libtit = "SSL_TRANSFER_VECTOR"
|
||||||
$ libid = "SSL"
|
$ libid = "SSL"
|
||||||
$ libnum = "[.UTIL]SSLEAY.NUM"
|
$ libnum = "[.UTIL]SSLEAY.NUM"
|
||||||
$ libdir = "[.VAX.EXE.SSL]"
|
$ libdir = "[.''ARCHD'.EXE.SSL]"
|
||||||
$ libmar = "''libdir'LIBSSL.MAR"
|
$ libmar = "''libdir'SSL_LIBSSL_''shr'.MAR"
|
||||||
$ libolb = "''libdir'LIBSSL.OLB"
|
$ libolb = "''libdir'SSL_LIBSSL''lib32'.OLB"
|
||||||
$ libopt = "''libdir'LIBSSL.OPT"
|
$ libopt = "''libdir'SSL_LIBSSL_''shr'.OPT"
|
||||||
$ libobj = "''libdir'LIBSSL.OBJ"
|
$ libobj = "''libdir'SSL_LIBSSL_''shr'.OBJ"
|
||||||
$ libmap = "''libdir'LIBSSL.MAP"
|
$ libmap = "''libdir'SSL_LIBSSL_''shr'.MAP"
|
||||||
$ libgoal= "''libdir'LIBSSL.EXE"
|
$ libgoal= "''libdir'SSL_LIBSSL_''shr'.EXE"
|
||||||
$ libref = "[.VAX.EXE.CRYPTO]LIBCRYPTO.EXE"
|
$ libref = "[.''ARCHD'.EXE.CRYPTO]SSL_LIBCRYPTO_''shr'.EXE"
|
||||||
$ libvec = "LIBSSL"
|
$ libvec = "LIBSSL"
|
||||||
$ gosub create_vax_shr
|
$ if f$search( libolb) .nes. "" then gosub create_vax_shr
|
||||||
|
$ else
|
||||||
|
$ libid = "Crypto"
|
||||||
|
$ libnum = "[.UTIL]LIBEAY.NUM"
|
||||||
|
$ libdir = "[.''ARCHD'.EXE.CRYPTO]"
|
||||||
|
$ libolb = "''libdir'SSL_LIBCRYPTO''lib32'.OLB"
|
||||||
|
$ libopt = "''libdir'SSL_LIBCRYPTO_''shr'.OPT"
|
||||||
|
$ libmap = "''libdir'SSL_LIBCRYPTO_''shr'.MAP"
|
||||||
|
$ libgoal= "''libdir'SSL_LIBCRYPTO_''shr'.EXE"
|
||||||
|
$ libref = ""
|
||||||
|
$ if f$search( libolb) .nes. "" then gosub create_nonvax_shr
|
||||||
|
$ libid = "SSL"
|
||||||
|
$ libnum = "[.UTIL]SSLEAY.NUM"
|
||||||
|
$ libdir = "[.''ARCHD'.EXE.SSL]"
|
||||||
|
$ libolb = "''libdir'SSL_LIBSSL''lib32'.OLB"
|
||||||
|
$ libopt = "''libdir'SSL_LIBSSL_''shr'.OPT"
|
||||||
|
$ libmap = "''libdir'SSL_LIBSSL_''shr'.MAP"
|
||||||
|
$ libgoal= "''libdir'SSL_LIBSSL_''shr'.EXE"
|
||||||
|
$ libref = "[.''ARCHD'.EXE.CRYPTO]SSL_LIBCRYPTO_''shr'.EXE"
|
||||||
|
$ if f$search( libolb) .nes. "" then gosub create_nonvax_shr
|
||||||
$ endif
|
$ endif
|
||||||
|
$!
|
||||||
|
$ tidy:
|
||||||
|
$!
|
||||||
|
$! Close any open files.
|
||||||
|
$!
|
||||||
|
$ if (f$trnlnm( "libnum", "LNM$PROCESS", 0, "SUPERVISOR") .nes. "") then -
|
||||||
|
close libnum
|
||||||
|
$!
|
||||||
|
$ if (f$trnlnm( "mar", "LNM$PROCESS", 0, "SUPERVISOR") .nes. "") then -
|
||||||
|
close mar
|
||||||
|
$!
|
||||||
|
$ if (f$trnlnm( "opt", "LNM$PROCESS", 0, "SUPERVISOR") .nes. "") then -
|
||||||
|
close opt
|
||||||
|
$!
|
||||||
|
$ if (f$trnlnm( "vf", "LNM$PROCESS", 0, "SUPERVISOR") .nes. "") then -
|
||||||
|
close vf
|
||||||
|
$!
|
||||||
|
$! Restore the original default device:[directory].
|
||||||
|
$!
|
||||||
|
$ set default 'def_orig'
|
||||||
$ exit
|
$ exit
|
||||||
$
|
$
|
||||||
$! ----- Soubroutines to actually build the shareable libraries
|
$! ----- Subroutines to build the shareable libraries
|
||||||
$! The way things work, there's a main shareable library creator for each
|
$! For each supported architecture, there's a main shareable library
|
||||||
$! supported architecture, which is called from the main code above.
|
$! creator, which is called from the main code above.
|
||||||
$! The creator will define a number of variables to tell the next levels of
|
$! The creator will define a number of variables to tell the next levels of
|
||||||
$! subroutines what routines to use to write to the option files, call the
|
$! subroutines what routines to use to write to the option files, call the
|
||||||
$! main processor, read_func_num, and when that is done, it will write version
|
$! main processor, read_func_num, and when that is done, it will write version
|
||||||
@@ -97,28 +184,29 @@ $! read_func_num depends on the following variables from the creator:
|
|||||||
$! libwriter The name of the writer routine to call for each .num file line
|
$! libwriter The name of the writer routine to call for each .num file line
|
||||||
$! -----
|
$! -----
|
||||||
$
|
$
|
||||||
$! ----- Subroutines for AXP
|
$! ----- Subroutines for non-VAX
|
||||||
$! -----
|
$! -----
|
||||||
$! The creator routine
|
$! The creator routine
|
||||||
$ create_axp_shr:
|
$ create_nonvax_shr:
|
||||||
$ open/write opt 'libopt'
|
$ open /write opt 'libopt'
|
||||||
$ write opt "identification=""",libid," ",libverstr,""""
|
$ write opt "identification=""",libid," ",libverstr,""""
|
||||||
$ write opt libolb,"/lib"
|
$ write opt libolb, " /library"
|
||||||
$ if libref .nes. "" then write opt libref,"/SHARE"
|
$ if libref .nes. "" then write opt libref,"/SHARE"
|
||||||
$ write opt "SYMBOL_VECTOR=(-"
|
$ write opt "SYMBOL_VECTOR=(-"
|
||||||
$ libfirstentry := true
|
$ libfirstentry := true
|
||||||
$ libwrch := opt
|
$ libwrch := opt
|
||||||
$ libwriter := write_axp_transfer_entry
|
$ libwriter := write_nonvax_transfer_entry
|
||||||
$ textcount = 0
|
$ textcount = 0
|
||||||
$ gosub read_func_num
|
$ gosub read_func_num
|
||||||
$ write opt ")"
|
$ write opt ")"
|
||||||
$ write opt "GSMATCH=",libvmatch,",",libver
|
$ write opt "GSMATCH=",libvmatch,",",libver
|
||||||
$ close opt
|
$ close opt
|
||||||
$ link/map='libmap'/full/share='libgoal' 'libopt'/option
|
$ link /map = 'libmap' /full /share = 'libgoal' 'libopt' /options -
|
||||||
|
'zlib_lib'
|
||||||
$ return
|
$ return
|
||||||
$
|
$
|
||||||
$! The record writer routine
|
$! The record writer routine
|
||||||
$ write_axp_transfer_entry:
|
$ write_nonvax_transfer_entry:
|
||||||
$ if libentry .eqs. ".dummy" then return
|
$ if libentry .eqs. ".dummy" then return
|
||||||
$ if info_kind .eqs. "VARIABLE"
|
$ if info_kind .eqs. "VARIABLE"
|
||||||
$ then
|
$ then
|
||||||
@@ -144,11 +232,11 @@ $ libfirstentry := false
|
|||||||
$ textcount = textcount + textcount_this
|
$ textcount = textcount + textcount_this
|
||||||
$ return
|
$ return
|
||||||
$
|
$
|
||||||
$! ----- Subroutines for AXP
|
$! ----- Subroutines for VAX
|
||||||
$! -----
|
$! -----
|
||||||
$! The creator routine
|
$! The creator routine
|
||||||
$ create_vax_shr:
|
$ create_vax_shr:
|
||||||
$ open/write mar 'libmar'
|
$ open /write mar 'libmar'
|
||||||
$ type sys$input:/out=mar:
|
$ type sys$input:/out=mar:
|
||||||
;
|
;
|
||||||
; Transfer vector for VAX shareable image
|
; Transfer vector for VAX shareable image
|
||||||
@@ -183,10 +271,10 @@ $! libwriter := write_vax_vtransfer_entry
|
|||||||
$! gosub read_func_num
|
$! gosub read_func_num
|
||||||
$ write mar " .END"
|
$ write mar " .END"
|
||||||
$ close mar
|
$ close mar
|
||||||
$ open/write opt 'libopt'
|
$ open /write opt 'libopt'
|
||||||
$ write opt "identification=""",libid," ",libverstr,""""
|
$ write opt "identification=""",libid," ",libverstr,""""
|
||||||
$ write opt libobj
|
$ write opt libobj
|
||||||
$ write opt libolb,"/lib"
|
$ write opt libolb, " /library"
|
||||||
$ if libref .nes. "" then write opt libref,"/SHARE"
|
$ if libref .nes. "" then write opt libref,"/SHARE"
|
||||||
$ type sys$input:/out=opt:
|
$ type sys$input:/out=opt:
|
||||||
!
|
!
|
||||||
@@ -205,7 +293,8 @@ $ libwriter := write_vax_psect_attr
|
|||||||
$ gosub read_func_num
|
$ gosub read_func_num
|
||||||
$ close opt
|
$ close opt
|
||||||
$ macro/obj='libobj' 'libmar'
|
$ macro/obj='libobj' 'libmar'
|
||||||
$ link/map='libmap'/full/share='libgoal' 'libopt'/option
|
$ link /map = 'libmap' /full /share = 'libgoal' 'libopt' /options -
|
||||||
|
'zlib_lib'
|
||||||
$ return
|
$ return
|
||||||
$
|
$
|
||||||
$! The record writer routine for VAX functions
|
$! The record writer routine for VAX functions
|
||||||
@@ -227,9 +316,9 @@ $ return
|
|||||||
$
|
$
|
||||||
$! ----- Common subroutines
|
$! ----- Common subroutines
|
||||||
$! -----
|
$! -----
|
||||||
$! The .num file reader. This one has great responsability.
|
$! The .num file reader. This one has great responsibility.
|
||||||
$ read_func_num:
|
$ read_func_num:
|
||||||
$ open libnum 'libnum'
|
$ open /read libnum 'libnum'
|
||||||
$ goto read_nums
|
$ goto read_nums
|
||||||
$
|
$
|
||||||
$ read_nums:
|
$ read_nums:
|
||||||
@@ -237,35 +326,46 @@ $ libentrynum=0
|
|||||||
$ liblastentry:=false
|
$ liblastentry:=false
|
||||||
$ entrycount=0
|
$ entrycount=0
|
||||||
$ loop:
|
$ loop:
|
||||||
$ read/end=loop_end/err=loop_end libnum line
|
$ read /end=loop_end /err=loop_end libnum line
|
||||||
$ entrynum=f$int(f$element(1," ",f$edit(line,"COMPRESS,TRIM")))
|
$ lin = f$edit( line, "COMPRESS,TRIM")
|
||||||
$ entryinfo=f$element(2," ",f$edit(line,"COMPRESS,TRIM"))
|
$! Skip a "#" comment line.
|
||||||
$ curentry=f$element(0," ",f$edit(line,"COMPRESS,TRIM"))
|
$ if (f$extract( 0, 1, lin) .eqs. "#") then goto loop
|
||||||
$ info_exist=f$element(0,":",entryinfo)
|
$ entrynum = f$int(f$element( 1, " ", lin))
|
||||||
$ info_platforms=","+f$element(1,":",entryinfo)+","
|
$ entryinfo = f$element( 2, " ", lin)
|
||||||
$ info_kind=f$element(2,":",entryinfo)
|
$ curentry = f$element( 0, " ", lin)
|
||||||
$ info_algorithms=","+f$element(3,":",entryinfo)+","
|
$ info_exist = f$element( 0, ":", entryinfo)
|
||||||
|
$ info_platforms = ","+ f$element(1, ":", entryinfo)+ ","
|
||||||
|
$ info_kind = f$element( 2, ":", entryinfo)
|
||||||
|
$ info_algorithms = ","+ f$element( 3, ":", entryinfo)+ ","
|
||||||
$ if info_exist .eqs. "NOEXIST" then goto loop
|
$ if info_exist .eqs. "NOEXIST" then goto loop
|
||||||
$ truesum = 0
|
$ truesum = 0
|
||||||
$ falsesum = 0
|
$ falsesum = 0
|
||||||
$ negatives = 1
|
$ negatives = 1
|
||||||
$ plat_i = 0
|
$ plat_i = 0
|
||||||
$ loop1:
|
$ loop1:
|
||||||
$ plat_entry = f$element(plat_i,",",info_platforms)
|
$ plat_entry = f$element( plat_i, ",", info_platforms)
|
||||||
$ plat_i = plat_i + 1
|
$ plat_i = plat_i + 1
|
||||||
$ if plat_entry .eqs. "" then goto loop1
|
$ if plat_entry .eqs. "" then goto loop1
|
||||||
$ if plat_entry .nes. ","
|
$ if plat_entry .nes. ","
|
||||||
$ then
|
$ then
|
||||||
$ if f$extract(0,1,plat_entry) .nes. "!" then negatives = 0
|
$ if f$extract(0,1,plat_entry) .nes. "!" then negatives = 0
|
||||||
$ if f$getsyi("CPU") .lt. 128
|
$ if (arch_vax)
|
||||||
$ then
|
$ then
|
||||||
$ if plat_entry .eqs. "EXPORT_VAR_AS_FUNCTION" then -
|
$ if plat_entry .eqs. "EXPORT_VAR_AS_FUNCTION" then -
|
||||||
$ truesum = truesum + 1
|
$ truesum = truesum + 1
|
||||||
$ if plat_entry .eqs. "!EXPORT_VAR_AS_FUNCTION" then -
|
$ if plat_entry .eqs. "!EXPORT_VAR_AS_FUNCTION" then -
|
||||||
$ falsesum = falsesum + 1
|
$ falsesum = falsesum + 1
|
||||||
$ endif
|
$ endif
|
||||||
$ if plat_entry .eqs. "VMS" then truesum = truesum + 1
|
$!
|
||||||
$ if plat_entry .eqs. "!VMS" then falsesum = falsesum + 1
|
$ if ((plat_entry .eqs. "VMS") .or. -
|
||||||
|
((plat_entry .eqs. "ZLIB") .and. (ZLIB .nes. "")) .or. -
|
||||||
|
(arch_vax .and. (plat_entry .eqs. "VMSVAX"))) then -
|
||||||
|
truesum = truesum + 1
|
||||||
|
$!
|
||||||
|
$ if ((plat_entry .eqs. "!VMS") .or. -
|
||||||
|
(arch_vax .and. (plat_entry .eqs. "!VMSVAX"))) then -
|
||||||
|
falsesum = falsesum + 1
|
||||||
|
$!
|
||||||
$ goto loop1
|
$ goto loop1
|
||||||
$ endif
|
$ endif
|
||||||
$ endloop1:
|
$ endloop1:
|
||||||
@@ -328,7 +428,7 @@ $
|
|||||||
$! The version number reader
|
$! The version number reader
|
||||||
$ read_version_info:
|
$ read_version_info:
|
||||||
$ libver = ""
|
$ libver = ""
|
||||||
$ open/read vf [.CRYPTO]OPENSSLV.H
|
$ open /read vf [.CRYPTO]OPENSSLV.H
|
||||||
$ loop_rvi:
|
$ loop_rvi:
|
||||||
$ read/err=endloop_rvi/end=endloop_rvi vf rvi_line
|
$ read/err=endloop_rvi/end=endloop_rvi vf rvi_line
|
||||||
$ if rvi_line - "SHLIB_VERSION_NUMBER """ .eqs. rvi_line then -
|
$ if rvi_line - "SHLIB_VERSION_NUMBER """ .eqs. rvi_line then -
|
||||||
|
|||||||
108
VMS/openssl_startup.com
Executable file
108
VMS/openssl_startup.com
Executable file
@@ -0,0 +1,108 @@
|
|||||||
|
$!
|
||||||
|
$! Startup file for OpenSSL 1.x.
|
||||||
|
$!
|
||||||
|
$! 2011-03-05 SMS.
|
||||||
|
$!
|
||||||
|
$! This procedure must reside in the OpenSSL installation directory.
|
||||||
|
$! It will fail if it is copied to a different location.
|
||||||
|
$!
|
||||||
|
$! P1 qualifier(s) for DEFINE. For example, "/SYSTEM" to get the
|
||||||
|
$! logical names defined in the system logical name table.
|
||||||
|
$!
|
||||||
|
$! P2 "64", to use executables which were built with 64-bit pointers.
|
||||||
|
$!
|
||||||
|
$! Good (default) and bad status values.
|
||||||
|
$!
|
||||||
|
$ status = %x00010001 ! RMS$_NORMAL, normal successful completion.
|
||||||
|
$ rms_e_fnf = %x00018292 ! RMS$_FNF, file not found.
|
||||||
|
$!
|
||||||
|
$! Prepare for problems.
|
||||||
|
$!
|
||||||
|
$ orig_dev_dir = f$environment( "DEFAULT")
|
||||||
|
$ on control_y then goto clean_up
|
||||||
|
$ on error then goto clean_up
|
||||||
|
$!
|
||||||
|
$! Determine hardware architecture.
|
||||||
|
$!
|
||||||
|
$ if (f$getsyi( "cpu") .lt. 128)
|
||||||
|
$ then
|
||||||
|
$ arch_name = "VAX"
|
||||||
|
$ else
|
||||||
|
$ arch_name = f$edit( f$getsyi( "arch_name"), "upcase")
|
||||||
|
$ if (arch_name .eqs. "") then arch_name = "UNK"
|
||||||
|
$ endif
|
||||||
|
$!
|
||||||
|
$ if (p2 .eqs. "64")
|
||||||
|
$ then
|
||||||
|
$ arch_name_exe = arch_name+ "_64"
|
||||||
|
$ else
|
||||||
|
$ arch_name_exe = arch_name
|
||||||
|
$ endif
|
||||||
|
$!
|
||||||
|
$! Derive the OpenSSL installation device:[directory] from the location
|
||||||
|
$! of this command procedure.
|
||||||
|
$!
|
||||||
|
$ proc = f$environment( "procedure")
|
||||||
|
$ proc_dev_dir = f$parse( "A.;", proc, , , "no_conceal") - "A.;"
|
||||||
|
$ proc_dev = f$parse( proc_dev_dir, , , "device", "syntax_only")
|
||||||
|
$ proc_dir = f$parse( proc_dev_dir, , , "directory", "syntax_only") - -
|
||||||
|
".][000000"- "[000000."- "]["- "["- "]"
|
||||||
|
$ proc_dev_dir = proc_dev+ "["+ proc_dir+ "]"
|
||||||
|
$ set default 'proc_dev_dir'
|
||||||
|
$ set default [-]
|
||||||
|
$ ossl_dev_dir = f$environment( "default")
|
||||||
|
$!
|
||||||
|
$! Check existence of expected directories (to see if this procedure has
|
||||||
|
$! been moved away from its proper place).
|
||||||
|
$!
|
||||||
|
$ if ((f$search( "certs.dir;1") .eqs. "") .or. -
|
||||||
|
(f$search( "include.dir;1") .eqs. "") .or. -
|
||||||
|
(f$search( "private.dir;1") .eqs. "") .or. -
|
||||||
|
(f$search( "vms.dir;1") .eqs. ""))
|
||||||
|
$ then
|
||||||
|
$ write sys$output -
|
||||||
|
" Can't find expected common OpenSSL directories in:"
|
||||||
|
$ write sys$output " ''ossl_dev_dir'"
|
||||||
|
$ status = rms_e_fnf
|
||||||
|
$ goto clean_up
|
||||||
|
$ endif
|
||||||
|
$!
|
||||||
|
$ if ((f$search( "''arch_name_exe'_exe.dir;1") .eqs. "") .or. -
|
||||||
|
(f$search( "''arch_name'_lib.dir;1") .eqs. ""))
|
||||||
|
$ then
|
||||||
|
$ write sys$output -
|
||||||
|
" Can't find expected architecture-specific OpenSSL directories in:"
|
||||||
|
$ write sys$output " ''ossl_dev_dir'"
|
||||||
|
$ status = rms_e_fnf
|
||||||
|
$ goto clean_up
|
||||||
|
$ endif
|
||||||
|
$!
|
||||||
|
$! All seems well (enough). Define the OpenSSL logical names.
|
||||||
|
$!
|
||||||
|
$ ossl_root = ossl_dev_dir- "]"+ ".]"
|
||||||
|
$ define /translation_attributes = concealed /nolog'p1 SSLROOT 'ossl_root'
|
||||||
|
$ define /nolog 'p1' SSLCERTS sslroot:[certs]
|
||||||
|
$ define /nolog 'p1' SSLINCLUDE sslroot:[include]
|
||||||
|
$ define /nolog 'p1' SSLPRIVATE sslroot:[private]
|
||||||
|
$ define /nolog 'p1' SSLEXE sslroot:['arch_name_exe'_exe]
|
||||||
|
$ define /nolog 'p1' SSLLIB sslroot:['arch_name'_lib]
|
||||||
|
$!
|
||||||
|
$! Defining OPENSSL lets a C program use "#include <openssl/{foo}.h>":
|
||||||
|
$ define /nolog 'p1' OPENSSL SSLINCLUDE:
|
||||||
|
$!
|
||||||
|
$! Run a site-specific procedure, if it exists.
|
||||||
|
$!
|
||||||
|
$ if f$search( "sslroot:[vms]openssl_systartup.com") .nes."" then -
|
||||||
|
@ sslroot:[vms]openssl_systartup.com
|
||||||
|
$!
|
||||||
|
$! Restore the original default dev:[dir] (if known).
|
||||||
|
$!
|
||||||
|
$ clean_up:
|
||||||
|
$!
|
||||||
|
$ if (f$type( orig_dev_dir) .nes. "")
|
||||||
|
$ then
|
||||||
|
$ set default 'orig_dev_dir'
|
||||||
|
$ endif
|
||||||
|
$!
|
||||||
|
$ EXIT 'status'
|
||||||
|
$!
|
||||||
20
VMS/openssl_undo.com
Executable file
20
VMS/openssl_undo.com
Executable file
@@ -0,0 +1,20 @@
|
|||||||
|
$!
|
||||||
|
$! Deassign OpenSSL logical names.
|
||||||
|
$!
|
||||||
|
$ call deass "OPENSSL" "''p1'"
|
||||||
|
$ call deass "SSLCERTS" "''p1'"
|
||||||
|
$ call deass "SSLEXE" "''p1'"
|
||||||
|
$ call deass "SSLINCLUDE" "''p1'"
|
||||||
|
$ call deass "SSLLIB" "''p1'"
|
||||||
|
$ call deass "SSLPRIVATE" "''p1'"
|
||||||
|
$ call deass "SSLROOT" "''p1'"
|
||||||
|
$!
|
||||||
|
$ exit
|
||||||
|
$!
|
||||||
|
$deass: subroutine
|
||||||
|
$ if (f$trnlnm( p1) .nes. "")
|
||||||
|
$ then
|
||||||
|
$ deassign 'p2' 'p1'
|
||||||
|
$ endif
|
||||||
|
$ endsubroutine
|
||||||
|
$!
|
||||||
@@ -8,10 +8,17 @@ $!
|
|||||||
$!
|
$!
|
||||||
$! Slightly modified by Richard Levitte <richard@levitte.org>
|
$! Slightly modified by Richard Levitte <richard@levitte.org>
|
||||||
$!
|
$!
|
||||||
|
$!
|
||||||
|
$! Always define OPENSSL. Others are optional (non-null P1).
|
||||||
|
$!
|
||||||
$ OPENSSL :== $SSLEXE:OPENSSL
|
$ OPENSSL :== $SSLEXE:OPENSSL
|
||||||
|
$
|
||||||
|
$ IF (P1 .NES. "")
|
||||||
|
$ THEN
|
||||||
$ VERIFY :== $SSLEXE:OPENSSL VERIFY
|
$ VERIFY :== $SSLEXE:OPENSSL VERIFY
|
||||||
$ ASN1PARSE:== $SSLEXE:OPENSSL ASN1PARS
|
$ ASN1PARSE:== $SSLEXE:OPENSSL ASN1PARS
|
||||||
$ REQ :== $SSLEXE:OPENSSL REQ
|
$! REQ could conflict with REQUEST.
|
||||||
|
$ OREQ :== $SSLEXE:OPENSSL REQ
|
||||||
$ DGST :== $SSLEXE:OPENSSL DGST
|
$ DGST :== $SSLEXE:OPENSSL DGST
|
||||||
$ DH :== $SSLEXE:OPENSSL DH
|
$ DH :== $SSLEXE:OPENSSL DH
|
||||||
$ ENC :== $SSLEXE:OPENSSL ENC
|
$ ENC :== $SSLEXE:OPENSSL ENC
|
||||||
@@ -36,3 +43,4 @@ $ SESS_ID :== $SSLEXE:OPENSSL SESS_ID
|
|||||||
$ CIPHERS :== $SSLEXE:OPENSSL CIPHERS
|
$ CIPHERS :== $SSLEXE:OPENSSL CIPHERS
|
||||||
$ NSEQ :== $SSLEXE:OPENSSL NSEQ
|
$ NSEQ :== $SSLEXE:OPENSSL NSEQ
|
||||||
$ PKCS12 :== $SSLEXE:OPENSSL PKCS12
|
$ PKCS12 :== $SSLEXE:OPENSSL PKCS12
|
||||||
|
$ ENDIF
|
||||||
|
|||||||
@@ -5,3 +5,4 @@ der_chop.bak
|
|||||||
CA.pl
|
CA.pl
|
||||||
*.flc
|
*.flc
|
||||||
semantic.cache
|
semantic.cache
|
||||||
|
*.dll
|
||||||
|
|||||||
94
apps/CA.com
94
apps/CA.com
@@ -37,14 +37,25 @@ $ VERIFY = openssl + " verify"
|
|||||||
$ X509 = openssl + " x509"
|
$ X509 = openssl + " x509"
|
||||||
$ PKCS12 = openssl + " pkcs12"
|
$ PKCS12 = openssl + " pkcs12"
|
||||||
$ echo = "write sys$Output"
|
$ echo = "write sys$Output"
|
||||||
|
$ RET = 1
|
||||||
$!
|
$!
|
||||||
$ s = F$PARSE(F$ENVIRONMENT("DEFAULT"),"[]") - "].;"
|
$! 2010-12-20 SMS.
|
||||||
$ CATOP := 's'.demoCA
|
$! Use a concealed logical name to reduce command line lengths, to
|
||||||
$ CAKEY := ]cakey.pem
|
$! avoid DCL errors on VAX:
|
||||||
$ CACERT := ]cacert.pem
|
$! %DCL-W-TKNOVF, command element is too long - shorten
|
||||||
|
$! (Path segments like "openssl-1_0_1-stable-SNAP-20101217" accumulate
|
||||||
|
$! quickly.)
|
||||||
|
$!
|
||||||
|
$ CATOP = F$PARSE( F$ENVIRONMENT( "DEFAULT"), "[]")- "].;"+ ".demoCA.]"
|
||||||
|
$ define /translation_attributes = concealed CATOP 'CATOP'
|
||||||
|
$!
|
||||||
|
$ on error then goto clean_up
|
||||||
|
$ on control_y then goto clean_up
|
||||||
|
$!
|
||||||
|
$ CAKEY = "CATOP:[private]cakey.pem"
|
||||||
|
$ CACERT = "CATOP:[000000]cacert.pem"
|
||||||
$
|
$
|
||||||
$ __INPUT := SYS$COMMAND
|
$ __INPUT := SYS$COMMAND
|
||||||
$ RET = 1
|
|
||||||
$!
|
$!
|
||||||
$ i = 1
|
$ i = 1
|
||||||
$opt_loop:
|
$opt_loop:
|
||||||
@@ -55,7 +66,7 @@ $
|
|||||||
$ IF (prog_opt .EQS. "?" .OR. prog_opt .EQS. "-h" .OR. prog_opt .EQS. "-help")
|
$ IF (prog_opt .EQS. "?" .OR. prog_opt .EQS. "-h" .OR. prog_opt .EQS. "-help")
|
||||||
$ THEN
|
$ THEN
|
||||||
$ echo "usage: CA -newcert|-newreq|-newca|-sign|-verify"
|
$ echo "usage: CA -newcert|-newreq|-newca|-sign|-verify"
|
||||||
$ exit
|
$ goto clean_up
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$!
|
$!
|
||||||
$ IF (prog_opt .EQS. "-input")
|
$ IF (prog_opt .EQS. "-input")
|
||||||
@@ -69,7 +80,7 @@ $!
|
|||||||
$ IF (prog_opt .EQS. "-newcert")
|
$ IF (prog_opt .EQS. "-newcert")
|
||||||
$ THEN
|
$ THEN
|
||||||
$ ! Create a certificate.
|
$ ! Create a certificate.
|
||||||
$ DEFINE/USER SYS$INPUT '__INPUT'
|
$ DEFINE /USER_MODE SYS$INPUT '__INPUT'
|
||||||
$ REQ -new -x509 -keyout newreq.pem -out newreq.pem 'DAYS'
|
$ REQ -new -x509 -keyout newreq.pem -out newreq.pem 'DAYS'
|
||||||
$ RET=$STATUS
|
$ RET=$STATUS
|
||||||
$ echo "Certificate (and private key) is in newreq.pem"
|
$ echo "Certificate (and private key) is in newreq.pem"
|
||||||
@@ -79,7 +90,7 @@ $!
|
|||||||
$ IF (prog_opt .EQS. "-newreq")
|
$ IF (prog_opt .EQS. "-newreq")
|
||||||
$ THEN
|
$ THEN
|
||||||
$ ! Create a certificate request
|
$ ! Create a certificate request
|
||||||
$ DEFINE/USER SYS$INPUT '__INPUT'
|
$ DEFINE /USER_MODE SYS$INPUT '__INPUT'
|
||||||
$ REQ -new -keyout newreq.pem -out newreq.pem 'DAYS'
|
$ REQ -new -keyout newreq.pem -out newreq.pem 'DAYS'
|
||||||
$ RET=$STATUS
|
$ RET=$STATUS
|
||||||
$ echo "Request (and private key) is in newreq.pem"
|
$ echo "Request (and private key) is in newreq.pem"
|
||||||
@@ -90,40 +101,39 @@ $ IF (prog_opt .EQS. "-newca")
|
|||||||
$ THEN
|
$ THEN
|
||||||
$ ! If explicitly asked for or it doesn't exist then setup the directory
|
$ ! If explicitly asked for or it doesn't exist then setup the directory
|
||||||
$ ! structure that Eric likes to manage things.
|
$ ! structure that Eric likes to manage things.
|
||||||
$ IF F$SEARCH(CATOP+"]serial.") .EQS. ""
|
$ IF F$SEARCH( "CATOP:[000000]serial.") .EQS. ""
|
||||||
$ THEN
|
$ THEN
|
||||||
$ CREATE /DIR /PROTECTION=OWNER:RWED 'CATOP']
|
$ CREATE /DIRECTORY /PROTECTION=OWNER:RWED CATOP:[000000]
|
||||||
$ CREATE /DIR /PROTECTION=OWNER:RWED 'CATOP'.certs]
|
$ CREATE /DIRECTORY /PROTECTION=OWNER:RWED CATOP:[certs]
|
||||||
$ CREATE /DIR /PROTECTION=OWNER:RWED 'CATOP'.crl]
|
$ CREATE /DIRECTORY /PROTECTION=OWNER:RWED CATOP:[crl]
|
||||||
$ CREATE /DIR /PROTECTION=OWNER:RWED 'CATOP'.newcerts]
|
$ CREATE /DIRECTORY /PROTECTION=OWNER:RWED CATOP:[newcerts]
|
||||||
$ CREATE /DIR /PROTECTION=OWNER:RWED 'CATOP'.private]
|
$ CREATE /DIRECTORY /PROTECTION=OWNER:RWED CATOP:[private]
|
||||||
$
|
$
|
||||||
$ OPEN /WRITE ser_file 'CATOP']serial.
|
$ OPEN /WRITE ser_file CATOP:[000000]serial.
|
||||||
$ WRITE ser_file "01"
|
$ WRITE ser_file "01"
|
||||||
$ CLOSE ser_file
|
$ CLOSE ser_file
|
||||||
$ APPEND/NEW NL: 'CATOP']index.txt
|
$ APPEND /NEW_VERSION NL: CATOP:[000000]index.txt
|
||||||
$
|
$
|
||||||
$ ! The following is to make sure access() doesn't get confused. It
|
$ ! The following is to make sure access() doesn't get confused. It
|
||||||
$ ! really needs one file in the directory to give correct answers...
|
$ ! really needs one file in the directory to give correct answers...
|
||||||
$ COPY NLA0: 'CATOP'.certs].;
|
$ COPY NLA0: CATOP:[certs].;
|
||||||
$ COPY NLA0: 'CATOP'.crl].;
|
$ COPY NLA0: CATOP:[crl].;
|
||||||
$ COPY NLA0: 'CATOP'.newcerts].;
|
$ COPY NLA0: CATOP:[newcerts].;
|
||||||
$ COPY NLA0: 'CATOP'.private].;
|
$ COPY NLA0: CATOP:[private].;
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$!
|
$!
|
||||||
$ IF F$SEARCH(CATOP+".private"+CAKEY) .EQS. ""
|
$ IF F$SEARCH( CAKEY) .EQS. ""
|
||||||
$ THEN
|
$ THEN
|
||||||
$ READ '__INPUT' FILE -
|
$ READ '__INPUT' FILE -
|
||||||
/PROMT="CA certificate filename (or enter to create)"
|
/PROMPT="CA certificate filename (or enter to create): "
|
||||||
$ IF F$SEARCH(FILE) .NES. ""
|
$ IF (FILE .NES. "") .AND. (F$SEARCH(FILE) .NES. "")
|
||||||
$ THEN
|
$ THEN
|
||||||
$ COPY 'FILE' 'CATOP'.private'CAKEY'
|
$ COPY 'FILE' 'CAKEY'
|
||||||
$ RET=$STATUS
|
$ RET=$STATUS
|
||||||
$ ELSE
|
$ ELSE
|
||||||
$ echo "Making CA certificate ..."
|
$ echo "Making CA certificate ..."
|
||||||
$ DEFINE/USER SYS$INPUT '__INPUT'
|
$ DEFINE /USER_MODE SYS$INPUT '__INPUT'
|
||||||
$ REQ -new -x509 -keyout 'CATOP'.private'CAKEY' -
|
$ REQ -new -x509 -keyout 'CAKEY' -out 'CACERT' 'DAYS'
|
||||||
-out 'CATOP''CACERT' 'DAYS'
|
|
||||||
$ RET=$STATUS
|
$ RET=$STATUS
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
@@ -135,16 +145,16 @@ $ THEN
|
|||||||
$ i = i + 1
|
$ i = i + 1
|
||||||
$ cname = P'i'
|
$ cname = P'i'
|
||||||
$ IF cname .EQS. "" THEN cname = "My certificate"
|
$ IF cname .EQS. "" THEN cname = "My certificate"
|
||||||
$ PKCS12 -in newcert.pem -inkey newreq.pem -certfile 'CATOP''CACERT -
|
$ PKCS12 -in newcert.pem -inkey newreq.pem -certfile 'CACERT' -
|
||||||
-out newcert.p12 -export -name "''cname'"
|
-out newcert.p12 -export -name "''cname'"
|
||||||
$ RET=$STATUS
|
$ RET=$STATUS
|
||||||
$ exit RET
|
$ goto clean_up
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$!
|
$!
|
||||||
$ IF (prog_opt .EQS. "-xsign")
|
$ IF (prog_opt .EQS. "-xsign")
|
||||||
$ THEN
|
$ THEN
|
||||||
$!
|
$!
|
||||||
$ DEFINE/USER SYS$INPUT '__INPUT'
|
$ DEFINE /USER_MODE SYS$INPUT '__INPUT'
|
||||||
$ CA -policy policy_anything -infiles newreq.pem
|
$ CA -policy policy_anything -infiles newreq.pem
|
||||||
$ RET=$STATUS
|
$ RET=$STATUS
|
||||||
$ GOTO opt_loop_continue
|
$ GOTO opt_loop_continue
|
||||||
@@ -153,7 +163,7 @@ $!
|
|||||||
$ IF ((prog_opt .EQS. "-sign") .OR. (prog_opt .EQS. "-signreq"))
|
$ IF ((prog_opt .EQS. "-sign") .OR. (prog_opt .EQS. "-signreq"))
|
||||||
$ THEN
|
$ THEN
|
||||||
$!
|
$!
|
||||||
$ DEFINE/USER SYS$INPUT '__INPUT'
|
$ DEFINE /USER_MODE SYS$INPUT '__INPUT'
|
||||||
$ CA -policy policy_anything -out newcert.pem -infiles newreq.pem
|
$ CA -policy policy_anything -out newcert.pem -infiles newreq.pem
|
||||||
$ RET=$STATUS
|
$ RET=$STATUS
|
||||||
$ type newcert.pem
|
$ type newcert.pem
|
||||||
@@ -165,9 +175,9 @@ $ IF (prog_opt .EQS. "-signcert")
|
|||||||
$ THEN
|
$ THEN
|
||||||
$!
|
$!
|
||||||
$ echo "Cert passphrase will be requested twice - bug?"
|
$ echo "Cert passphrase will be requested twice - bug?"
|
||||||
$ DEFINE/USER SYS$INPUT '__INPUT'
|
$ DEFINE /USER_MODE SYS$INPUT '__INPUT'
|
||||||
$ X509 -x509toreq -in newreq.pem -signkey newreq.pem -out tmp.pem
|
$ X509 -x509toreq -in newreq.pem -signkey newreq.pem -out tmp.pem
|
||||||
$ DEFINE/USER SYS$INPUT '__INPUT'
|
$ DEFINE /USER_MODE SYS$INPUT '__INPUT'
|
||||||
$ CA -policy policy_anything -out newcert.pem -infiles tmp.pem
|
$ CA -policy policy_anything -out newcert.pem -infiles tmp.pem
|
||||||
y
|
y
|
||||||
y
|
y
|
||||||
@@ -182,17 +192,17 @@ $!
|
|||||||
$ i = i + 1
|
$ i = i + 1
|
||||||
$ IF (p'i' .EQS. "")
|
$ IF (p'i' .EQS. "")
|
||||||
$ THEN
|
$ THEN
|
||||||
$ DEFINE/USER SYS$INPUT '__INPUT'
|
$ DEFINE /USER_MODE SYS$INPUT '__INPUT'
|
||||||
$ VERIFY "-CAfile" 'CATOP''CACERT' newcert.pem
|
$ VERIFY "-CAfile" 'CACERT' newcert.pem
|
||||||
$ ELSE
|
$ ELSE
|
||||||
$ j = i
|
$ j = i
|
||||||
$ verify_opt_loop:
|
$ verify_opt_loop:
|
||||||
$ IF j .GT. 8 THEN GOTO verify_opt_loop_end
|
$ IF j .GT. 8 THEN GOTO verify_opt_loop_end
|
||||||
$ IF p'j' .NES. ""
|
$ IF p'j' .NES. ""
|
||||||
$ THEN
|
$ THEN
|
||||||
$ DEFINE/USER SYS$INPUT '__INPUT'
|
$ DEFINE /USER_MODE SYS$INPUT '__INPUT'
|
||||||
$ __tmp = p'j'
|
$ __tmp = p'j'
|
||||||
$ VERIFY "-CAfile" 'CATOP''CACERT' '__tmp'
|
$ VERIFY "-CAfile" 'CACERT' '__tmp'
|
||||||
$ tmp=$STATUS
|
$ tmp=$STATUS
|
||||||
$ IF tmp .NE. 0 THEN RET=tmp
|
$ IF tmp .NE. 0 THEN RET=tmp
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
@@ -208,8 +218,8 @@ $ IF (prog_opt .NES. "")
|
|||||||
$ THEN
|
$ THEN
|
||||||
$!
|
$!
|
||||||
$ echo "Unknown argument ''prog_opt'"
|
$ echo "Unknown argument ''prog_opt'"
|
||||||
$
|
$ RET = 3
|
||||||
$ EXIT 3
|
$ goto clean_up
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$
|
$
|
||||||
$opt_loop_continue:
|
$opt_loop_continue:
|
||||||
@@ -217,4 +227,10 @@ $ i = i + 1
|
|||||||
$ GOTO opt_loop
|
$ GOTO opt_loop
|
||||||
$
|
$
|
||||||
$opt_loop_end:
|
$opt_loop_end:
|
||||||
|
$!
|
||||||
|
$clean_up:
|
||||||
|
$!
|
||||||
|
$ if f$trnlnm( "CATOP", "LNM$PROCESS") .nes. "" then -
|
||||||
|
deassign /process CATOP
|
||||||
|
$!
|
||||||
$ EXIT 'RET'
|
$ EXIT 'RET'
|
||||||
|
|||||||
93
apps/CA.sh
93
apps/CA.sh
@@ -29,26 +29,56 @@
|
|||||||
|
|
||||||
# default openssl.cnf file has setup as per the following
|
# default openssl.cnf file has setup as per the following
|
||||||
# demoCA ... where everything is stored
|
# demoCA ... where everything is stored
|
||||||
|
cp_pem() {
|
||||||
|
infile=$1
|
||||||
|
outfile=$2
|
||||||
|
bound=$3
|
||||||
|
flag=0
|
||||||
|
exec <$infile;
|
||||||
|
while read line; do
|
||||||
|
if [ $flag -eq 1 ]; then
|
||||||
|
echo $line|grep "^-----END.*$bound" 2>/dev/null 1>/dev/null
|
||||||
|
if [ $? -eq 0 ] ; then
|
||||||
|
echo $line >>$outfile
|
||||||
|
break
|
||||||
|
else
|
||||||
|
echo $line >>$outfile
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
|
||||||
|
echo $line|grep "^-----BEGIN.*$bound" 2>/dev/null 1>/dev/null
|
||||||
|
if [ $? -eq 0 ]; then
|
||||||
|
echo $line >$outfile
|
||||||
|
flag=1
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
}
|
||||||
|
|
||||||
|
usage() {
|
||||||
|
echo "usage: $0 -newcert|-newreq|-newreq-nodes|-newca|-sign|-verify" >&2
|
||||||
|
}
|
||||||
|
|
||||||
if [ -z "$OPENSSL" ]; then OPENSSL=openssl; fi
|
if [ -z "$OPENSSL" ]; then OPENSSL=openssl; fi
|
||||||
|
|
||||||
DAYS="-days 365" # 1 year
|
if [ -z "$DAYS" ] ; then DAYS="-days 365" ; fi # 1 year
|
||||||
CADAYS="-days 1095" # 3 years
|
CADAYS="-days 1095" # 3 years
|
||||||
REQ="$OPENSSL req $SSLEAY_CONFIG"
|
REQ="$OPENSSL req $SSLEAY_CONFIG"
|
||||||
CA="$OPENSSL ca $SSLEAY_CONFIG"
|
CA="$OPENSSL ca $SSLEAY_CONFIG"
|
||||||
VERIFY="$OPENSSL verify"
|
VERIFY="$OPENSSL verify"
|
||||||
X509="$OPENSSL x509"
|
X509="$OPENSSL x509"
|
||||||
|
PKCS12="openssl pkcs12"
|
||||||
|
|
||||||
CATOP=./demoCA
|
if [ -z "$CATOP" ] ; then CATOP=./demoCA ; fi
|
||||||
CAKEY=./cakey.pem
|
CAKEY=./cakey.pem
|
||||||
CAREQ=./careq.pem
|
CAREQ=./careq.pem
|
||||||
CACERT=./cacert.pem
|
CACERT=./cacert.pem
|
||||||
|
|
||||||
for i
|
RET=0
|
||||||
do
|
|
||||||
case $i in
|
while [ "$1" != "" ] ; do
|
||||||
|
case $1 in
|
||||||
-\?|-h|-help)
|
-\?|-h|-help)
|
||||||
echo "usage: CA -newcert|-newreq|-newca|-sign|-verify" >&2
|
usage
|
||||||
exit 0
|
exit 0
|
||||||
;;
|
;;
|
||||||
-newcert)
|
-newcert)
|
||||||
@@ -63,18 +93,23 @@ case $i in
|
|||||||
RET=$?
|
RET=$?
|
||||||
echo "Request is in newreq.pem, private key is in newkey.pem"
|
echo "Request is in newreq.pem, private key is in newkey.pem"
|
||||||
;;
|
;;
|
||||||
|
-newreq-nodes)
|
||||||
|
# create a certificate request
|
||||||
|
$REQ -new -nodes -keyout newreq.pem -out newreq.pem $DAYS
|
||||||
|
RET=$?
|
||||||
|
echo "Request (and private key) is in newreq.pem"
|
||||||
|
;;
|
||||||
-newca)
|
-newca)
|
||||||
# if explicitly asked for or it doesn't exist then setup the directory
|
# if explicitly asked for or it doesn't exist then setup the directory
|
||||||
# structure that Eric likes to manage things
|
# structure that Eric likes to manage things
|
||||||
NEW="1"
|
NEW="1"
|
||||||
if [ "$NEW" -o ! -f ${CATOP}/serial ]; then
|
if [ "$NEW" -o ! -f ${CATOP}/serial ]; then
|
||||||
# create the directory hierarchy
|
# create the directory hierarchy
|
||||||
mkdir ${CATOP}
|
mkdir -p ${CATOP}
|
||||||
mkdir ${CATOP}/certs
|
mkdir -p ${CATOP}/certs
|
||||||
mkdir ${CATOP}/crl
|
mkdir -p ${CATOP}/crl
|
||||||
mkdir ${CATOP}/newcerts
|
mkdir -p ${CATOP}/newcerts
|
||||||
mkdir ${CATOP}/private
|
mkdir -p ${CATOP}/private
|
||||||
echo "00" > ${CATOP}/serial
|
|
||||||
touch ${CATOP}/index.txt
|
touch ${CATOP}/index.txt
|
||||||
fi
|
fi
|
||||||
if [ ! -f ${CATOP}/private/$CAKEY ]; then
|
if [ ! -f ${CATOP}/private/$CAKEY ]; then
|
||||||
@@ -83,14 +118,20 @@ case $i in
|
|||||||
|
|
||||||
# ask user for existing CA certificate
|
# ask user for existing CA certificate
|
||||||
if [ "$FILE" ]; then
|
if [ "$FILE" ]; then
|
||||||
cp $FILE ${CATOP}/private/$CAKEY
|
cp_pem $FILE ${CATOP}/private/$CAKEY PRIVATE
|
||||||
|
cp_pem $FILE ${CATOP}/$CACERT CERTIFICATE
|
||||||
RET=$?
|
RET=$?
|
||||||
|
if [ ! -f "${CATOP}/serial" ]; then
|
||||||
|
$X509 -in ${CATOP}/$CACERT -noout -next_serial \
|
||||||
|
-out ${CATOP}/serial
|
||||||
|
fi
|
||||||
else
|
else
|
||||||
echo "Making CA certificate ..."
|
echo "Making CA certificate ..."
|
||||||
$REQ -new -keyout ${CATOP}/private/$CAKEY \
|
$REQ -new -keyout ${CATOP}/private/$CAKEY \
|
||||||
-out ${CATOP}/$CAREQ
|
-out ${CATOP}/$CAREQ
|
||||||
$CA -out ${CATOP}/$CACERT $CADAYS -batch \
|
$CA -create_serial -out ${CATOP}/$CACERT $CADAYS -batch \
|
||||||
-keyfile ${CATOP}/private/$CAKEY -selfsign \
|
-keyfile ${CATOP}/private/$CAKEY -selfsign \
|
||||||
|
-extensions v3_ca \
|
||||||
-infiles ${CATOP}/$CAREQ
|
-infiles ${CATOP}/$CAREQ
|
||||||
RET=$?
|
RET=$?
|
||||||
fi
|
fi
|
||||||
@@ -100,16 +141,33 @@ case $i in
|
|||||||
$CA -policy policy_anything -infiles newreq.pem
|
$CA -policy policy_anything -infiles newreq.pem
|
||||||
RET=$?
|
RET=$?
|
||||||
;;
|
;;
|
||||||
|
-pkcs12)
|
||||||
|
if [ -z "$2" ] ; then
|
||||||
|
CNAME="My Certificate"
|
||||||
|
else
|
||||||
|
CNAME="$2"
|
||||||
|
fi
|
||||||
|
$PKCS12 -in newcert.pem -inkey newreq.pem -certfile ${CATOP}/$CACERT \
|
||||||
|
-out newcert.p12 -export -name "$CNAME"
|
||||||
|
RET=$?
|
||||||
|
exit $RET
|
||||||
|
;;
|
||||||
-sign|-signreq)
|
-sign|-signreq)
|
||||||
$CA -policy policy_anything -out newcert.pem -infiles newreq.pem
|
$CA -policy policy_anything -out newcert.pem -infiles newreq.pem
|
||||||
RET=$?
|
RET=$?
|
||||||
cat newcert.pem
|
cat newcert.pem
|
||||||
echo "Signed certificate is in newcert.pem"
|
echo "Signed certificate is in newcert.pem"
|
||||||
;;
|
;;
|
||||||
|
-signCA)
|
||||||
|
$CA -policy policy_anything -out newcert.pem -extensions v3_ca -infiles newreq.pem
|
||||||
|
RET=$?
|
||||||
|
echo "Signed CA certificate is in newcert.pem"
|
||||||
|
;;
|
||||||
-signcert)
|
-signcert)
|
||||||
echo "Cert passphrase will be requested twice - bug?"
|
echo "Cert passphrase will be requested twice - bug?"
|
||||||
$X509 -x509toreq -in newreq.pem -signkey newreq.pem -out tmp.pem
|
$X509 -x509toreq -in newreq.pem -signkey newreq.pem -out tmp.pem
|
||||||
$CA -policy policy_anything -out newcert.pem -infiles tmp.pem
|
$CA -policy policy_anything -out newcert.pem -infiles tmp.pem
|
||||||
|
RET=$?
|
||||||
cat newcert.pem
|
cat newcert.pem
|
||||||
echo "Signed certificate is in newcert.pem"
|
echo "Signed certificate is in newcert.pem"
|
||||||
;;
|
;;
|
||||||
@@ -127,13 +185,14 @@ case $i in
|
|||||||
fi
|
fi
|
||||||
done
|
done
|
||||||
fi
|
fi
|
||||||
exit 0
|
exit $RET
|
||||||
;;
|
;;
|
||||||
*)
|
*)
|
||||||
echo "Unknown arg $i";
|
echo "Unknown arg $i" >&2
|
||||||
|
usage
|
||||||
exit 1
|
exit 1
|
||||||
;;
|
;;
|
||||||
esac
|
esac
|
||||||
|
shift
|
||||||
done
|
done
|
||||||
exit $RET
|
exit $RET
|
||||||
|
|
||||||
|
|||||||
528
apps/Makefile
528
apps/Makefile
@@ -31,15 +31,15 @@ LIBSSL=-L.. -lssl
|
|||||||
|
|
||||||
PROGRAM= openssl
|
PROGRAM= openssl
|
||||||
|
|
||||||
SCRIPTS=CA.sh CA.pl
|
SCRIPTS=CA.sh CA.pl tsget
|
||||||
|
|
||||||
EXE= $(PROGRAM)$(EXE_EXT)
|
EXE= $(PROGRAM)$(EXE_EXT)
|
||||||
|
|
||||||
E_EXE= verify asn1pars req dgst dh dhparam enc passwd gendh errstr \
|
E_EXE= verify asn1pars req dgst dh dhparam enc passwd gendh errstr \
|
||||||
ca crl rsa rsautl dsa dsaparam ec ecparam \
|
ca crl rsa rsautl dsa dsaparam ec ecparam \
|
||||||
x509 genrsa gendsa s_server s_client speed \
|
x509 genrsa gendsa genpkey s_server s_client speed \
|
||||||
s_time version pkcs7 cms crl2pkcs7 sess_id ciphers nseq pkcs12 \
|
s_time version pkcs7 cms crl2pkcs7 sess_id ciphers nseq pkcs12 \
|
||||||
pkcs8 spkac smime rand engine ocsp prime
|
pkcs8 pkey pkeyparam pkeyutl spkac smime rand engine ocsp prime ts srp
|
||||||
|
|
||||||
PROGS= $(PROGRAM).c
|
PROGS= $(PROGRAM).c
|
||||||
|
|
||||||
@@ -53,18 +53,18 @@ RAND_SRC=app_rand.c
|
|||||||
E_OBJ= verify.o asn1pars.o req.o dgst.o dh.o dhparam.o enc.o passwd.o gendh.o errstr.o \
|
E_OBJ= verify.o asn1pars.o req.o dgst.o dh.o dhparam.o enc.o passwd.o gendh.o errstr.o \
|
||||||
ca.o pkcs7.o crl2p7.o crl.o \
|
ca.o pkcs7.o crl2p7.o crl.o \
|
||||||
rsa.o rsautl.o dsa.o dsaparam.o ec.o ecparam.o \
|
rsa.o rsautl.o dsa.o dsaparam.o ec.o ecparam.o \
|
||||||
x509.o genrsa.o gendsa.o s_server.o s_client.o speed.o \
|
x509.o genrsa.o gendsa.o genpkey.o s_server.o s_client.o speed.o \
|
||||||
s_time.o $(A_OBJ) $(S_OBJ) $(RAND_OBJ) version.o sess_id.o \
|
s_time.o $(A_OBJ) $(S_OBJ) $(RAND_OBJ) version.o sess_id.o \
|
||||||
ciphers.o nseq.o pkcs12.o pkcs8.o spkac.o smime.o rand.o engine.o \
|
ciphers.o nseq.o pkcs12.o pkcs8.o pkey.o pkeyparam.o pkeyutl.o \
|
||||||
ocsp.o prime.o cms.o
|
spkac.o smime.o cms.o rand.o engine.o ocsp.o prime.o ts.o srp.o
|
||||||
|
|
||||||
E_SRC= verify.c asn1pars.c req.c dgst.c dh.c enc.c passwd.c gendh.c errstr.c ca.c \
|
E_SRC= verify.c asn1pars.c req.c dgst.c dh.c enc.c passwd.c gendh.c errstr.c ca.c \
|
||||||
pkcs7.c crl2p7.c crl.c \
|
pkcs7.c crl2p7.c crl.c \
|
||||||
rsa.c rsautl.c dsa.c dsaparam.c ec.c ecparam.c \
|
rsa.c rsautl.c dsa.c dsaparam.c ec.c ecparam.c \
|
||||||
x509.c genrsa.c gendsa.c s_server.c s_client.c speed.c \
|
x509.c genrsa.c gendsa.c genpkey.c s_server.c s_client.c speed.c \
|
||||||
s_time.c $(A_SRC) $(S_SRC) $(RAND_SRC) version.c sess_id.c \
|
s_time.c $(A_SRC) $(S_SRC) $(RAND_SRC) version.c sess_id.c \
|
||||||
ciphers.c nseq.c pkcs12.c pkcs8.c spkac.c smime.c rand.c engine.c \
|
ciphers.c nseq.c pkcs12.c pkcs8.c pkey.c pkeyparam.c pkeyutl.c \
|
||||||
ocsp.c prime.c cms.c
|
spkac.c smime.c cms.c rand.c engine.c ocsp.c prime.c ts.c srp.c
|
||||||
|
|
||||||
SRC=$(E_SRC)
|
SRC=$(E_SRC)
|
||||||
|
|
||||||
@@ -137,9 +137,10 @@ depend:
|
|||||||
dclean:
|
dclean:
|
||||||
$(PERL) -pe 'if (/^# DO NOT DELETE THIS LINE/) {print; exit(0);}' $(MAKEFILE) >Makefile.new
|
$(PERL) -pe 'if (/^# DO NOT DELETE THIS LINE/) {print; exit(0);}' $(MAKEFILE) >Makefile.new
|
||||||
mv -f Makefile.new $(MAKEFILE)
|
mv -f Makefile.new $(MAKEFILE)
|
||||||
|
rm -f CA.pl
|
||||||
|
|
||||||
clean:
|
clean:
|
||||||
rm -f *.o *.obj lib tags core .pure .nfs* *.old *.bak fluff $(EXE)
|
rm -f *.o *.obj *.dll lib tags core .pure .nfs* *.old *.bak fluff $(EXE)
|
||||||
rm -f req
|
rm -f req
|
||||||
|
|
||||||
$(DLIBSSL):
|
$(DLIBSSL):
|
||||||
@@ -158,9 +159,7 @@ $(EXE): progs.h $(E_OBJ) $(PROGRAM).o $(DLIBCRYPTO) $(DLIBSSL)
|
|||||||
APPNAME=$(EXE) OBJECTS="$(PROGRAM).o $(E_OBJ)" \
|
APPNAME=$(EXE) OBJECTS="$(PROGRAM).o $(E_OBJ)" \
|
||||||
LIBDEPS="$(PEX_LIBS) $$LIBRARIES $(EX_LIBS)" \
|
LIBDEPS="$(PEX_LIBS) $$LIBRARIES $(EX_LIBS)" \
|
||||||
link_app.$${shlib_target}
|
link_app.$${shlib_target}
|
||||||
-(cd ..; \
|
@(cd ..; $(MAKE) rehash)
|
||||||
OPENSSL="`pwd`/util/opensslwrap.sh"; export OPENSSL; \
|
|
||||||
$(PERL) tools/c_rehash certs)
|
|
||||||
|
|
||||||
progs.h: progs.pl
|
progs.h: progs.pl
|
||||||
$(PERL) progs.pl $(E_EXE) >progs.h
|
$(PERL) progs.pl $(E_EXE) >progs.h
|
||||||
@@ -233,35 +232,37 @@ ca.o: ../include/openssl/symhacks.h ../include/openssl/txt_db.h
|
|||||||
ca.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
|
ca.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
|
||||||
ca.o: ../include/openssl/x509v3.h apps.h ca.c
|
ca.o: ../include/openssl/x509v3.h apps.h ca.c
|
||||||
ciphers.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
ciphers.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
||||||
ciphers.o: ../include/openssl/bn.h ../include/openssl/buffer.h
|
ciphers.o: ../include/openssl/buffer.h ../include/openssl/comp.h
|
||||||
ciphers.o: ../include/openssl/comp.h ../include/openssl/conf.h
|
ciphers.o: ../include/openssl/conf.h ../include/openssl/crypto.h
|
||||||
ciphers.o: ../include/openssl/crypto.h ../include/openssl/dtls1.h
|
ciphers.o: ../include/openssl/dtls1.h ../include/openssl/e_os2.h
|
||||||
ciphers.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
|
ciphers.o: ../include/openssl/ec.h ../include/openssl/ecdh.h
|
||||||
ciphers.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
|
ciphers.o: ../include/openssl/ecdsa.h ../include/openssl/engine.h
|
||||||
ciphers.o: ../include/openssl/engine.h ../include/openssl/err.h
|
ciphers.o: ../include/openssl/err.h ../include/openssl/evp.h
|
||||||
ciphers.o: ../include/openssl/evp.h ../include/openssl/kssl.h
|
ciphers.o: ../include/openssl/hmac.h ../include/openssl/kssl.h
|
||||||
ciphers.o: ../include/openssl/lhash.h ../include/openssl/obj_mac.h
|
ciphers.o: ../include/openssl/lhash.h ../include/openssl/obj_mac.h
|
||||||
ciphers.o: ../include/openssl/objects.h ../include/openssl/ocsp.h
|
ciphers.o: ../include/openssl/objects.h ../include/openssl/ocsp.h
|
||||||
ciphers.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
|
ciphers.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
|
||||||
ciphers.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
|
ciphers.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
|
||||||
ciphers.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
|
ciphers.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
|
||||||
ciphers.o: ../include/openssl/pq_compat.h ../include/openssl/pqueue.h
|
ciphers.o: ../include/openssl/pqueue.h ../include/openssl/safestack.h
|
||||||
ciphers.o: ../include/openssl/safestack.h ../include/openssl/sha.h
|
ciphers.o: ../include/openssl/sha.h ../include/openssl/ssl.h
|
||||||
ciphers.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
|
ciphers.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
|
||||||
ciphers.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
|
ciphers.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
|
||||||
ciphers.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
|
ciphers.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
|
||||||
ciphers.o: ../include/openssl/tls1.h ../include/openssl/txt_db.h
|
ciphers.o: ../include/openssl/txt_db.h ../include/openssl/x509.h
|
||||||
ciphers.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
|
ciphers.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h
|
||||||
ciphers.o: ../include/openssl/x509v3.h apps.h ciphers.c
|
ciphers.o: ciphers.c
|
||||||
cms.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
cms.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
||||||
cms.o: ../include/openssl/buffer.h ../include/openssl/conf.h
|
cms.o: ../include/openssl/buffer.h ../include/openssl/cms.h
|
||||||
cms.o: ../include/openssl/crypto.h ../include/openssl/e_os2.h
|
cms.o: ../include/openssl/conf.h ../include/openssl/crypto.h
|
||||||
cms.o: ../include/openssl/ec.h ../include/openssl/ecdh.h
|
cms.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
|
||||||
cms.o: ../include/openssl/ecdsa.h ../include/openssl/engine.h
|
cms.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
|
||||||
|
cms.o: ../include/openssl/engine.h ../include/openssl/err.h
|
||||||
cms.o: ../include/openssl/evp.h ../include/openssl/lhash.h
|
cms.o: ../include/openssl/evp.h ../include/openssl/lhash.h
|
||||||
cms.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
|
cms.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
|
||||||
cms.o: ../include/openssl/ocsp.h ../include/openssl/opensslconf.h
|
cms.o: ../include/openssl/ocsp.h ../include/openssl/opensslconf.h
|
||||||
cms.o: ../include/openssl/opensslv.h ../include/openssl/ossl_typ.h
|
cms.o: ../include/openssl/opensslv.h ../include/openssl/ossl_typ.h
|
||||||
|
cms.o: ../include/openssl/pem.h ../include/openssl/pem2.h
|
||||||
cms.o: ../include/openssl/pkcs7.h ../include/openssl/safestack.h
|
cms.o: ../include/openssl/pkcs7.h ../include/openssl/safestack.h
|
||||||
cms.o: ../include/openssl/sha.h ../include/openssl/stack.h
|
cms.o: ../include/openssl/sha.h ../include/openssl/stack.h
|
||||||
cms.o: ../include/openssl/symhacks.h ../include/openssl/txt_db.h
|
cms.o: ../include/openssl/symhacks.h ../include/openssl/txt_db.h
|
||||||
@@ -361,10 +362,10 @@ dsaparam.o: ../include/openssl/pem.h ../include/openssl/pem2.h
|
|||||||
dsaparam.o: ../include/openssl/pkcs7.h ../include/openssl/rand.h
|
dsaparam.o: ../include/openssl/pkcs7.h ../include/openssl/rand.h
|
||||||
dsaparam.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
|
dsaparam.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
|
||||||
dsaparam.o: ../include/openssl/sha.h ../include/openssl/stack.h
|
dsaparam.o: ../include/openssl/sha.h ../include/openssl/stack.h
|
||||||
dsaparam.o: ../include/openssl/store.h ../include/openssl/symhacks.h
|
dsaparam.o: ../include/openssl/symhacks.h ../include/openssl/txt_db.h
|
||||||
dsaparam.o: ../include/openssl/txt_db.h ../include/openssl/ui.h
|
dsaparam.o: ../include/openssl/ui.h ../include/openssl/x509.h
|
||||||
dsaparam.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
|
dsaparam.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h
|
||||||
dsaparam.o: ../include/openssl/x509v3.h apps.h dsaparam.c
|
dsaparam.o: dsaparam.c
|
||||||
ec.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
ec.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
||||||
ec.o: ../include/openssl/buffer.h ../include/openssl/conf.h
|
ec.o: ../include/openssl/buffer.h ../include/openssl/conf.h
|
||||||
ec.o: ../include/openssl/crypto.h ../include/openssl/e_os2.h
|
ec.o: ../include/openssl/crypto.h ../include/openssl/e_os2.h
|
||||||
@@ -397,63 +398,63 @@ ecparam.o: ../include/openssl/symhacks.h ../include/openssl/txt_db.h
|
|||||||
ecparam.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
|
ecparam.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
|
||||||
ecparam.o: ../include/openssl/x509v3.h apps.h ecparam.c
|
ecparam.o: ../include/openssl/x509v3.h apps.h ecparam.c
|
||||||
enc.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
enc.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
||||||
enc.o: ../include/openssl/buffer.h ../include/openssl/conf.h
|
enc.o: ../include/openssl/buffer.h ../include/openssl/comp.h
|
||||||
enc.o: ../include/openssl/crypto.h ../include/openssl/e_os2.h
|
enc.o: ../include/openssl/conf.h ../include/openssl/crypto.h
|
||||||
enc.o: ../include/openssl/ec.h ../include/openssl/ecdh.h
|
enc.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
|
||||||
enc.o: ../include/openssl/ecdsa.h ../include/openssl/engine.h
|
enc.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
|
||||||
enc.o: ../include/openssl/err.h ../include/openssl/evp.h
|
enc.o: ../include/openssl/engine.h ../include/openssl/err.h
|
||||||
enc.o: ../include/openssl/lhash.h ../include/openssl/obj_mac.h
|
enc.o: ../include/openssl/evp.h ../include/openssl/lhash.h
|
||||||
enc.o: ../include/openssl/objects.h ../include/openssl/ocsp.h
|
enc.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
|
||||||
enc.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
|
enc.o: ../include/openssl/ocsp.h ../include/openssl/opensslconf.h
|
||||||
enc.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
|
enc.o: ../include/openssl/opensslv.h ../include/openssl/ossl_typ.h
|
||||||
enc.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
|
enc.o: ../include/openssl/pem.h ../include/openssl/pem2.h
|
||||||
enc.o: ../include/openssl/rand.h ../include/openssl/safestack.h
|
enc.o: ../include/openssl/pkcs7.h ../include/openssl/rand.h
|
||||||
enc.o: ../include/openssl/sha.h ../include/openssl/stack.h
|
enc.o: ../include/openssl/safestack.h ../include/openssl/sha.h
|
||||||
enc.o: ../include/openssl/symhacks.h ../include/openssl/txt_db.h
|
enc.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
|
||||||
enc.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
|
enc.o: ../include/openssl/txt_db.h ../include/openssl/x509.h
|
||||||
enc.o: ../include/openssl/x509v3.h apps.h enc.c
|
enc.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h enc.c
|
||||||
engine.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
engine.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
||||||
engine.o: ../include/openssl/bn.h ../include/openssl/buffer.h
|
engine.o: ../include/openssl/buffer.h ../include/openssl/comp.h
|
||||||
engine.o: ../include/openssl/comp.h ../include/openssl/conf.h
|
engine.o: ../include/openssl/conf.h ../include/openssl/crypto.h
|
||||||
engine.o: ../include/openssl/crypto.h ../include/openssl/dtls1.h
|
engine.o: ../include/openssl/dtls1.h ../include/openssl/e_os2.h
|
||||||
engine.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
|
engine.o: ../include/openssl/ec.h ../include/openssl/ecdh.h
|
||||||
engine.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
|
engine.o: ../include/openssl/ecdsa.h ../include/openssl/engine.h
|
||||||
engine.o: ../include/openssl/engine.h ../include/openssl/err.h
|
engine.o: ../include/openssl/err.h ../include/openssl/evp.h
|
||||||
engine.o: ../include/openssl/evp.h ../include/openssl/kssl.h
|
engine.o: ../include/openssl/hmac.h ../include/openssl/kssl.h
|
||||||
engine.o: ../include/openssl/lhash.h ../include/openssl/obj_mac.h
|
engine.o: ../include/openssl/lhash.h ../include/openssl/obj_mac.h
|
||||||
engine.o: ../include/openssl/objects.h ../include/openssl/ocsp.h
|
engine.o: ../include/openssl/objects.h ../include/openssl/ocsp.h
|
||||||
engine.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
|
engine.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
|
||||||
engine.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
|
engine.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
|
||||||
engine.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
|
engine.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
|
||||||
engine.o: ../include/openssl/pq_compat.h ../include/openssl/pqueue.h
|
engine.o: ../include/openssl/pqueue.h ../include/openssl/safestack.h
|
||||||
engine.o: ../include/openssl/safestack.h ../include/openssl/sha.h
|
engine.o: ../include/openssl/sha.h ../include/openssl/ssl.h
|
||||||
engine.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
|
engine.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
|
||||||
engine.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
|
engine.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
|
||||||
engine.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
|
engine.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
|
||||||
engine.o: ../include/openssl/tls1.h ../include/openssl/txt_db.h
|
engine.o: ../include/openssl/txt_db.h ../include/openssl/x509.h
|
||||||
engine.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
|
engine.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h
|
||||||
engine.o: ../include/openssl/x509v3.h apps.h engine.c
|
engine.o: engine.c
|
||||||
errstr.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
errstr.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
||||||
errstr.o: ../include/openssl/bn.h ../include/openssl/buffer.h
|
errstr.o: ../include/openssl/buffer.h ../include/openssl/comp.h
|
||||||
errstr.o: ../include/openssl/comp.h ../include/openssl/conf.h
|
errstr.o: ../include/openssl/conf.h ../include/openssl/crypto.h
|
||||||
errstr.o: ../include/openssl/crypto.h ../include/openssl/dtls1.h
|
errstr.o: ../include/openssl/dtls1.h ../include/openssl/e_os2.h
|
||||||
errstr.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
|
errstr.o: ../include/openssl/ec.h ../include/openssl/ecdh.h
|
||||||
errstr.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
|
errstr.o: ../include/openssl/ecdsa.h ../include/openssl/engine.h
|
||||||
errstr.o: ../include/openssl/engine.h ../include/openssl/err.h
|
errstr.o: ../include/openssl/err.h ../include/openssl/evp.h
|
||||||
errstr.o: ../include/openssl/evp.h ../include/openssl/kssl.h
|
errstr.o: ../include/openssl/hmac.h ../include/openssl/kssl.h
|
||||||
errstr.o: ../include/openssl/lhash.h ../include/openssl/obj_mac.h
|
errstr.o: ../include/openssl/lhash.h ../include/openssl/obj_mac.h
|
||||||
errstr.o: ../include/openssl/objects.h ../include/openssl/ocsp.h
|
errstr.o: ../include/openssl/objects.h ../include/openssl/ocsp.h
|
||||||
errstr.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
|
errstr.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
|
||||||
errstr.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
|
errstr.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
|
||||||
errstr.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
|
errstr.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
|
||||||
errstr.o: ../include/openssl/pq_compat.h ../include/openssl/pqueue.h
|
errstr.o: ../include/openssl/pqueue.h ../include/openssl/safestack.h
|
||||||
errstr.o: ../include/openssl/safestack.h ../include/openssl/sha.h
|
errstr.o: ../include/openssl/sha.h ../include/openssl/ssl.h
|
||||||
errstr.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
|
errstr.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
|
||||||
errstr.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
|
errstr.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
|
||||||
errstr.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
|
errstr.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
|
||||||
errstr.o: ../include/openssl/tls1.h ../include/openssl/txt_db.h
|
errstr.o: ../include/openssl/txt_db.h ../include/openssl/x509.h
|
||||||
errstr.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
|
errstr.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h
|
||||||
errstr.o: ../include/openssl/x509v3.h apps.h errstr.c
|
errstr.o: errstr.c
|
||||||
gendh.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
gendh.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
||||||
gendh.o: ../include/openssl/bn.h ../include/openssl/buffer.h
|
gendh.o: ../include/openssl/bn.h ../include/openssl/buffer.h
|
||||||
gendh.o: ../include/openssl/conf.h ../include/openssl/crypto.h
|
gendh.o: ../include/openssl/conf.h ../include/openssl/crypto.h
|
||||||
@@ -469,10 +470,10 @@ gendh.o: ../include/openssl/pem.h ../include/openssl/pem2.h
|
|||||||
gendh.o: ../include/openssl/pkcs7.h ../include/openssl/rand.h
|
gendh.o: ../include/openssl/pkcs7.h ../include/openssl/rand.h
|
||||||
gendh.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
|
gendh.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
|
||||||
gendh.o: ../include/openssl/sha.h ../include/openssl/stack.h
|
gendh.o: ../include/openssl/sha.h ../include/openssl/stack.h
|
||||||
gendh.o: ../include/openssl/store.h ../include/openssl/symhacks.h
|
gendh.o: ../include/openssl/symhacks.h ../include/openssl/txt_db.h
|
||||||
gendh.o: ../include/openssl/txt_db.h ../include/openssl/ui.h
|
gendh.o: ../include/openssl/ui.h ../include/openssl/x509.h
|
||||||
gendh.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
|
gendh.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h
|
||||||
gendh.o: ../include/openssl/x509v3.h apps.h gendh.c
|
gendh.o: gendh.c
|
||||||
gendsa.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
gendsa.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
||||||
gendsa.o: ../include/openssl/bn.h ../include/openssl/buffer.h
|
gendsa.o: ../include/openssl/bn.h ../include/openssl/buffer.h
|
||||||
gendsa.o: ../include/openssl/conf.h ../include/openssl/crypto.h
|
gendsa.o: ../include/openssl/conf.h ../include/openssl/crypto.h
|
||||||
@@ -490,6 +491,22 @@ gendsa.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
|
|||||||
gendsa.o: ../include/openssl/txt_db.h ../include/openssl/x509.h
|
gendsa.o: ../include/openssl/txt_db.h ../include/openssl/x509.h
|
||||||
gendsa.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h
|
gendsa.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h
|
||||||
gendsa.o: gendsa.c
|
gendsa.o: gendsa.c
|
||||||
|
genpkey.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
||||||
|
genpkey.o: ../include/openssl/buffer.h ../include/openssl/conf.h
|
||||||
|
genpkey.o: ../include/openssl/crypto.h ../include/openssl/e_os2.h
|
||||||
|
genpkey.o: ../include/openssl/ec.h ../include/openssl/ecdh.h
|
||||||
|
genpkey.o: ../include/openssl/ecdsa.h ../include/openssl/engine.h
|
||||||
|
genpkey.o: ../include/openssl/err.h ../include/openssl/evp.h
|
||||||
|
genpkey.o: ../include/openssl/lhash.h ../include/openssl/obj_mac.h
|
||||||
|
genpkey.o: ../include/openssl/objects.h ../include/openssl/ocsp.h
|
||||||
|
genpkey.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
|
||||||
|
genpkey.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
|
||||||
|
genpkey.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
|
||||||
|
genpkey.o: ../include/openssl/safestack.h ../include/openssl/sha.h
|
||||||
|
genpkey.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
|
||||||
|
genpkey.o: ../include/openssl/txt_db.h ../include/openssl/x509.h
|
||||||
|
genpkey.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h
|
||||||
|
genpkey.o: genpkey.c
|
||||||
genrsa.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
genrsa.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
||||||
genrsa.o: ../include/openssl/bn.h ../include/openssl/buffer.h
|
genrsa.o: ../include/openssl/bn.h ../include/openssl/buffer.h
|
||||||
genrsa.o: ../include/openssl/conf.h ../include/openssl/crypto.h
|
genrsa.o: ../include/openssl/conf.h ../include/openssl/crypto.h
|
||||||
@@ -505,10 +522,10 @@ genrsa.o: ../include/openssl/pem.h ../include/openssl/pem2.h
|
|||||||
genrsa.o: ../include/openssl/pkcs7.h ../include/openssl/rand.h
|
genrsa.o: ../include/openssl/pkcs7.h ../include/openssl/rand.h
|
||||||
genrsa.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
|
genrsa.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
|
||||||
genrsa.o: ../include/openssl/sha.h ../include/openssl/stack.h
|
genrsa.o: ../include/openssl/sha.h ../include/openssl/stack.h
|
||||||
genrsa.o: ../include/openssl/store.h ../include/openssl/symhacks.h
|
genrsa.o: ../include/openssl/symhacks.h ../include/openssl/txt_db.h
|
||||||
genrsa.o: ../include/openssl/txt_db.h ../include/openssl/ui.h
|
genrsa.o: ../include/openssl/ui.h ../include/openssl/x509.h
|
||||||
genrsa.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
|
genrsa.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h
|
||||||
genrsa.o: ../include/openssl/x509v3.h apps.h genrsa.c
|
genrsa.o: genrsa.c
|
||||||
nseq.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
nseq.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
||||||
nseq.o: ../include/openssl/buffer.h ../include/openssl/conf.h
|
nseq.o: ../include/openssl/buffer.h ../include/openssl/conf.h
|
||||||
nseq.o: ../include/openssl/crypto.h ../include/openssl/e_os2.h
|
nseq.o: ../include/openssl/crypto.h ../include/openssl/e_os2.h
|
||||||
@@ -531,13 +548,13 @@ ocsp.o: ../include/openssl/crypto.h ../include/openssl/dtls1.h
|
|||||||
ocsp.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
|
ocsp.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
|
||||||
ocsp.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
|
ocsp.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
|
||||||
ocsp.o: ../include/openssl/engine.h ../include/openssl/err.h
|
ocsp.o: ../include/openssl/engine.h ../include/openssl/err.h
|
||||||
ocsp.o: ../include/openssl/evp.h ../include/openssl/kssl.h
|
ocsp.o: ../include/openssl/evp.h ../include/openssl/hmac.h
|
||||||
ocsp.o: ../include/openssl/lhash.h ../include/openssl/obj_mac.h
|
ocsp.o: ../include/openssl/kssl.h ../include/openssl/lhash.h
|
||||||
ocsp.o: ../include/openssl/objects.h ../include/openssl/ocsp.h
|
ocsp.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
|
||||||
ocsp.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
|
ocsp.o: ../include/openssl/ocsp.h ../include/openssl/opensslconf.h
|
||||||
ocsp.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
|
ocsp.o: ../include/openssl/opensslv.h ../include/openssl/ossl_typ.h
|
||||||
ocsp.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
|
ocsp.o: ../include/openssl/pem.h ../include/openssl/pem2.h
|
||||||
ocsp.o: ../include/openssl/pq_compat.h ../include/openssl/pqueue.h
|
ocsp.o: ../include/openssl/pkcs7.h ../include/openssl/pqueue.h
|
||||||
ocsp.o: ../include/openssl/safestack.h ../include/openssl/sha.h
|
ocsp.o: ../include/openssl/safestack.h ../include/openssl/sha.h
|
||||||
ocsp.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
|
ocsp.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
|
||||||
ocsp.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
|
ocsp.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
|
||||||
@@ -546,26 +563,26 @@ ocsp.o: ../include/openssl/tls1.h ../include/openssl/txt_db.h
|
|||||||
ocsp.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
|
ocsp.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
|
||||||
ocsp.o: ../include/openssl/x509v3.h apps.h ocsp.c
|
ocsp.o: ../include/openssl/x509v3.h apps.h ocsp.c
|
||||||
openssl.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
openssl.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
||||||
openssl.o: ../include/openssl/bn.h ../include/openssl/buffer.h
|
openssl.o: ../include/openssl/buffer.h ../include/openssl/comp.h
|
||||||
openssl.o: ../include/openssl/comp.h ../include/openssl/conf.h
|
openssl.o: ../include/openssl/conf.h ../include/openssl/crypto.h
|
||||||
openssl.o: ../include/openssl/crypto.h ../include/openssl/dtls1.h
|
openssl.o: ../include/openssl/dtls1.h ../include/openssl/e_os2.h
|
||||||
openssl.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
|
openssl.o: ../include/openssl/ec.h ../include/openssl/ecdh.h
|
||||||
openssl.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
|
openssl.o: ../include/openssl/ecdsa.h ../include/openssl/engine.h
|
||||||
openssl.o: ../include/openssl/engine.h ../include/openssl/err.h
|
openssl.o: ../include/openssl/err.h ../include/openssl/evp.h
|
||||||
openssl.o: ../include/openssl/evp.h ../include/openssl/kssl.h
|
openssl.o: ../include/openssl/hmac.h ../include/openssl/kssl.h
|
||||||
openssl.o: ../include/openssl/lhash.h ../include/openssl/obj_mac.h
|
openssl.o: ../include/openssl/lhash.h ../include/openssl/obj_mac.h
|
||||||
openssl.o: ../include/openssl/objects.h ../include/openssl/ocsp.h
|
openssl.o: ../include/openssl/objects.h ../include/openssl/ocsp.h
|
||||||
openssl.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
|
openssl.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
|
||||||
openssl.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
|
openssl.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
|
||||||
openssl.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
|
openssl.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
|
||||||
openssl.o: ../include/openssl/pq_compat.h ../include/openssl/pqueue.h
|
openssl.o: ../include/openssl/pqueue.h ../include/openssl/safestack.h
|
||||||
openssl.o: ../include/openssl/safestack.h ../include/openssl/sha.h
|
openssl.o: ../include/openssl/sha.h ../include/openssl/ssl.h
|
||||||
openssl.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
|
openssl.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
|
||||||
openssl.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
|
openssl.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
|
||||||
openssl.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
|
openssl.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
|
||||||
openssl.o: ../include/openssl/tls1.h ../include/openssl/txt_db.h
|
openssl.o: ../include/openssl/txt_db.h ../include/openssl/x509.h
|
||||||
openssl.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
|
openssl.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h
|
||||||
openssl.o: ../include/openssl/x509v3.h apps.h openssl.c progs.h s_apps.h
|
openssl.o: openssl.c progs.h s_apps.h
|
||||||
passwd.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
passwd.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
||||||
passwd.o: ../include/openssl/buffer.h ../include/openssl/conf.h
|
passwd.o: ../include/openssl/buffer.h ../include/openssl/conf.h
|
||||||
passwd.o: ../include/openssl/crypto.h ../include/openssl/des.h
|
passwd.o: ../include/openssl/crypto.h ../include/openssl/des.h
|
||||||
@@ -632,6 +649,53 @@ pkcs8.o: ../include/openssl/sha.h ../include/openssl/stack.h
|
|||||||
pkcs8.o: ../include/openssl/symhacks.h ../include/openssl/txt_db.h
|
pkcs8.o: ../include/openssl/symhacks.h ../include/openssl/txt_db.h
|
||||||
pkcs8.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
|
pkcs8.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
|
||||||
pkcs8.o: ../include/openssl/x509v3.h apps.h pkcs8.c
|
pkcs8.o: ../include/openssl/x509v3.h apps.h pkcs8.c
|
||||||
|
pkey.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
||||||
|
pkey.o: ../include/openssl/buffer.h ../include/openssl/conf.h
|
||||||
|
pkey.o: ../include/openssl/crypto.h ../include/openssl/e_os2.h
|
||||||
|
pkey.o: ../include/openssl/ec.h ../include/openssl/ecdh.h
|
||||||
|
pkey.o: ../include/openssl/ecdsa.h ../include/openssl/engine.h
|
||||||
|
pkey.o: ../include/openssl/err.h ../include/openssl/evp.h
|
||||||
|
pkey.o: ../include/openssl/lhash.h ../include/openssl/obj_mac.h
|
||||||
|
pkey.o: ../include/openssl/objects.h ../include/openssl/ocsp.h
|
||||||
|
pkey.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
|
||||||
|
pkey.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
|
||||||
|
pkey.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
|
||||||
|
pkey.o: ../include/openssl/safestack.h ../include/openssl/sha.h
|
||||||
|
pkey.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
|
||||||
|
pkey.o: ../include/openssl/txt_db.h ../include/openssl/x509.h
|
||||||
|
pkey.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h pkey.c
|
||||||
|
pkeyparam.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
||||||
|
pkeyparam.o: ../include/openssl/buffer.h ../include/openssl/conf.h
|
||||||
|
pkeyparam.o: ../include/openssl/crypto.h ../include/openssl/e_os2.h
|
||||||
|
pkeyparam.o: ../include/openssl/ec.h ../include/openssl/ecdh.h
|
||||||
|
pkeyparam.o: ../include/openssl/ecdsa.h ../include/openssl/engine.h
|
||||||
|
pkeyparam.o: ../include/openssl/err.h ../include/openssl/evp.h
|
||||||
|
pkeyparam.o: ../include/openssl/lhash.h ../include/openssl/obj_mac.h
|
||||||
|
pkeyparam.o: ../include/openssl/objects.h ../include/openssl/ocsp.h
|
||||||
|
pkeyparam.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
|
||||||
|
pkeyparam.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
|
||||||
|
pkeyparam.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
|
||||||
|
pkeyparam.o: ../include/openssl/safestack.h ../include/openssl/sha.h
|
||||||
|
pkeyparam.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
|
||||||
|
pkeyparam.o: ../include/openssl/txt_db.h ../include/openssl/x509.h
|
||||||
|
pkeyparam.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h
|
||||||
|
pkeyparam.o: pkeyparam.c
|
||||||
|
pkeyutl.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
||||||
|
pkeyutl.o: ../include/openssl/buffer.h ../include/openssl/conf.h
|
||||||
|
pkeyutl.o: ../include/openssl/crypto.h ../include/openssl/e_os2.h
|
||||||
|
pkeyutl.o: ../include/openssl/ec.h ../include/openssl/ecdh.h
|
||||||
|
pkeyutl.o: ../include/openssl/ecdsa.h ../include/openssl/engine.h
|
||||||
|
pkeyutl.o: ../include/openssl/err.h ../include/openssl/evp.h
|
||||||
|
pkeyutl.o: ../include/openssl/lhash.h ../include/openssl/obj_mac.h
|
||||||
|
pkeyutl.o: ../include/openssl/objects.h ../include/openssl/ocsp.h
|
||||||
|
pkeyutl.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
|
||||||
|
pkeyutl.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
|
||||||
|
pkeyutl.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
|
||||||
|
pkeyutl.o: ../include/openssl/safestack.h ../include/openssl/sha.h
|
||||||
|
pkeyutl.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
|
||||||
|
pkeyutl.o: ../include/openssl/txt_db.h ../include/openssl/x509.h
|
||||||
|
pkeyutl.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h
|
||||||
|
pkeyutl.o: pkeyutl.c
|
||||||
prime.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
prime.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
||||||
prime.o: ../include/openssl/bn.h ../include/openssl/buffer.h
|
prime.o: ../include/openssl/bn.h ../include/openssl/buffer.h
|
||||||
prime.o: ../include/openssl/conf.h ../include/openssl/crypto.h
|
prime.o: ../include/openssl/conf.h ../include/openssl/crypto.h
|
||||||
@@ -677,10 +741,9 @@ req.o: ../include/openssl/pem.h ../include/openssl/pem2.h
|
|||||||
req.o: ../include/openssl/pkcs7.h ../include/openssl/rand.h
|
req.o: ../include/openssl/pkcs7.h ../include/openssl/rand.h
|
||||||
req.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
|
req.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
|
||||||
req.o: ../include/openssl/sha.h ../include/openssl/stack.h
|
req.o: ../include/openssl/sha.h ../include/openssl/stack.h
|
||||||
req.o: ../include/openssl/store.h ../include/openssl/symhacks.h
|
req.o: ../include/openssl/symhacks.h ../include/openssl/txt_db.h
|
||||||
req.o: ../include/openssl/txt_db.h ../include/openssl/ui.h
|
req.o: ../include/openssl/ui.h ../include/openssl/x509.h
|
||||||
req.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
|
req.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h req.c
|
||||||
req.o: ../include/openssl/x509v3.h apps.h req.c
|
|
||||||
rsa.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
rsa.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
||||||
rsa.o: ../include/openssl/bn.h ../include/openssl/buffer.h
|
rsa.o: ../include/openssl/bn.h ../include/openssl/buffer.h
|
||||||
rsa.o: ../include/openssl/conf.h ../include/openssl/crypto.h
|
rsa.o: ../include/openssl/conf.h ../include/openssl/crypto.h
|
||||||
@@ -714,19 +777,19 @@ rsautl.o: ../include/openssl/symhacks.h ../include/openssl/txt_db.h
|
|||||||
rsautl.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
|
rsautl.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
|
||||||
rsautl.o: ../include/openssl/x509v3.h apps.h rsautl.c
|
rsautl.o: ../include/openssl/x509v3.h apps.h rsautl.c
|
||||||
s_cb.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
s_cb.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
||||||
s_cb.o: ../include/openssl/bn.h ../include/openssl/buffer.h
|
s_cb.o: ../include/openssl/buffer.h ../include/openssl/comp.h
|
||||||
s_cb.o: ../include/openssl/comp.h ../include/openssl/conf.h
|
s_cb.o: ../include/openssl/conf.h ../include/openssl/crypto.h
|
||||||
s_cb.o: ../include/openssl/crypto.h ../include/openssl/dtls1.h
|
s_cb.o: ../include/openssl/dtls1.h ../include/openssl/e_os2.h
|
||||||
s_cb.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
|
s_cb.o: ../include/openssl/ec.h ../include/openssl/ecdh.h
|
||||||
s_cb.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
|
s_cb.o: ../include/openssl/ecdsa.h ../include/openssl/engine.h
|
||||||
s_cb.o: ../include/openssl/engine.h ../include/openssl/err.h
|
s_cb.o: ../include/openssl/err.h ../include/openssl/evp.h
|
||||||
s_cb.o: ../include/openssl/evp.h ../include/openssl/kssl.h
|
s_cb.o: ../include/openssl/hmac.h ../include/openssl/kssl.h
|
||||||
s_cb.o: ../include/openssl/lhash.h ../include/openssl/obj_mac.h
|
s_cb.o: ../include/openssl/lhash.h ../include/openssl/obj_mac.h
|
||||||
s_cb.o: ../include/openssl/objects.h ../include/openssl/ocsp.h
|
s_cb.o: ../include/openssl/objects.h ../include/openssl/ocsp.h
|
||||||
s_cb.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
|
s_cb.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
|
||||||
s_cb.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
|
s_cb.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
|
||||||
s_cb.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
|
s_cb.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
|
||||||
s_cb.o: ../include/openssl/pq_compat.h ../include/openssl/pqueue.h
|
s_cb.o: ../include/openssl/pqueue.h ../include/openssl/rand.h
|
||||||
s_cb.o: ../include/openssl/safestack.h ../include/openssl/sha.h
|
s_cb.o: ../include/openssl/safestack.h ../include/openssl/sha.h
|
||||||
s_cb.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
|
s_cb.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
|
||||||
s_cb.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
|
s_cb.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
|
||||||
@@ -741,21 +804,21 @@ s_client.o: ../include/openssl/crypto.h ../include/openssl/dtls1.h
|
|||||||
s_client.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
|
s_client.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
|
||||||
s_client.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
|
s_client.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
|
||||||
s_client.o: ../include/openssl/engine.h ../include/openssl/err.h
|
s_client.o: ../include/openssl/engine.h ../include/openssl/err.h
|
||||||
s_client.o: ../include/openssl/evp.h ../include/openssl/kssl.h
|
s_client.o: ../include/openssl/evp.h ../include/openssl/hmac.h
|
||||||
s_client.o: ../include/openssl/lhash.h ../include/openssl/obj_mac.h
|
s_client.o: ../include/openssl/kssl.h ../include/openssl/lhash.h
|
||||||
s_client.o: ../include/openssl/objects.h ../include/openssl/ocsp.h
|
s_client.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
|
||||||
s_client.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
|
s_client.o: ../include/openssl/ocsp.h ../include/openssl/opensslconf.h
|
||||||
s_client.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
|
s_client.o: ../include/openssl/opensslv.h ../include/openssl/ossl_typ.h
|
||||||
s_client.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
|
s_client.o: ../include/openssl/pem.h ../include/openssl/pem2.h
|
||||||
s_client.o: ../include/openssl/pq_compat.h ../include/openssl/pqueue.h
|
s_client.o: ../include/openssl/pkcs7.h ../include/openssl/pqueue.h
|
||||||
s_client.o: ../include/openssl/rand.h ../include/openssl/safestack.h
|
s_client.o: ../include/openssl/rand.h ../include/openssl/safestack.h
|
||||||
s_client.o: ../include/openssl/sha.h ../include/openssl/ssl.h
|
s_client.o: ../include/openssl/sha.h ../include/openssl/srp.h
|
||||||
s_client.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
|
s_client.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
|
||||||
s_client.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
|
s_client.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
|
||||||
s_client.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
|
s_client.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
|
||||||
s_client.o: ../include/openssl/txt_db.h ../include/openssl/x509.h
|
s_client.o: ../include/openssl/tls1.h ../include/openssl/txt_db.h
|
||||||
s_client.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h
|
s_client.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
|
||||||
s_client.o: s_apps.h s_client.c timeouts.h
|
s_client.o: ../include/openssl/x509v3.h apps.h s_apps.h s_client.c timeouts.h
|
||||||
s_server.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
s_server.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
||||||
s_server.o: ../include/openssl/bn.h ../include/openssl/buffer.h
|
s_server.o: ../include/openssl/bn.h ../include/openssl/buffer.h
|
||||||
s_server.o: ../include/openssl/comp.h ../include/openssl/conf.h
|
s_server.o: ../include/openssl/comp.h ../include/openssl/conf.h
|
||||||
@@ -764,85 +827,84 @@ s_server.o: ../include/openssl/dsa.h ../include/openssl/dtls1.h
|
|||||||
s_server.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
|
s_server.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
|
||||||
s_server.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
|
s_server.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
|
||||||
s_server.o: ../include/openssl/engine.h ../include/openssl/err.h
|
s_server.o: ../include/openssl/engine.h ../include/openssl/err.h
|
||||||
s_server.o: ../include/openssl/evp.h ../include/openssl/kssl.h
|
s_server.o: ../include/openssl/evp.h ../include/openssl/hmac.h
|
||||||
s_server.o: ../include/openssl/lhash.h ../include/openssl/obj_mac.h
|
s_server.o: ../include/openssl/kssl.h ../include/openssl/lhash.h
|
||||||
s_server.o: ../include/openssl/objects.h ../include/openssl/ocsp.h
|
s_server.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
|
||||||
s_server.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
|
s_server.o: ../include/openssl/ocsp.h ../include/openssl/opensslconf.h
|
||||||
s_server.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
|
s_server.o: ../include/openssl/opensslv.h ../include/openssl/ossl_typ.h
|
||||||
s_server.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
|
s_server.o: ../include/openssl/pem.h ../include/openssl/pem2.h
|
||||||
s_server.o: ../include/openssl/pq_compat.h ../include/openssl/pqueue.h
|
s_server.o: ../include/openssl/pkcs7.h ../include/openssl/pqueue.h
|
||||||
s_server.o: ../include/openssl/rand.h ../include/openssl/rsa.h
|
s_server.o: ../include/openssl/rand.h ../include/openssl/rsa.h
|
||||||
s_server.o: ../include/openssl/safestack.h ../include/openssl/sha.h
|
s_server.o: ../include/openssl/safestack.h ../include/openssl/sha.h
|
||||||
s_server.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
|
s_server.o: ../include/openssl/srp.h ../include/openssl/ssl.h
|
||||||
s_server.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
|
s_server.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
|
||||||
s_server.o: ../include/openssl/stack.h ../include/openssl/store.h
|
s_server.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
|
||||||
s_server.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
|
s_server.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
|
||||||
s_server.o: ../include/openssl/txt_db.h ../include/openssl/ui.h
|
s_server.o: ../include/openssl/txt_db.h ../include/openssl/ui.h
|
||||||
s_server.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
|
s_server.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
|
||||||
s_server.o: ../include/openssl/x509v3.h apps.h s_apps.h s_server.c timeouts.h
|
s_server.o: ../include/openssl/x509v3.h apps.h s_apps.h s_server.c timeouts.h
|
||||||
s_socket.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
s_socket.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
||||||
s_socket.o: ../include/openssl/bn.h ../include/openssl/buffer.h
|
s_socket.o: ../include/openssl/buffer.h ../include/openssl/comp.h
|
||||||
s_socket.o: ../include/openssl/comp.h ../include/openssl/conf.h
|
s_socket.o: ../include/openssl/conf.h ../include/openssl/crypto.h
|
||||||
s_socket.o: ../include/openssl/crypto.h ../include/openssl/dtls1.h
|
s_socket.o: ../include/openssl/dtls1.h ../include/openssl/e_os2.h
|
||||||
s_socket.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
|
s_socket.o: ../include/openssl/ec.h ../include/openssl/ecdh.h
|
||||||
s_socket.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
|
s_socket.o: ../include/openssl/ecdsa.h ../include/openssl/engine.h
|
||||||
s_socket.o: ../include/openssl/engine.h ../include/openssl/evp.h
|
s_socket.o: ../include/openssl/evp.h ../include/openssl/hmac.h
|
||||||
s_socket.o: ../include/openssl/kssl.h ../include/openssl/lhash.h
|
s_socket.o: ../include/openssl/kssl.h ../include/openssl/lhash.h
|
||||||
s_socket.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
|
s_socket.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
|
||||||
s_socket.o: ../include/openssl/ocsp.h ../include/openssl/opensslconf.h
|
s_socket.o: ../include/openssl/ocsp.h ../include/openssl/opensslconf.h
|
||||||
s_socket.o: ../include/openssl/opensslv.h ../include/openssl/ossl_typ.h
|
s_socket.o: ../include/openssl/opensslv.h ../include/openssl/ossl_typ.h
|
||||||
s_socket.o: ../include/openssl/pem.h ../include/openssl/pem2.h
|
s_socket.o: ../include/openssl/pem.h ../include/openssl/pem2.h
|
||||||
s_socket.o: ../include/openssl/pkcs7.h ../include/openssl/pq_compat.h
|
s_socket.o: ../include/openssl/pkcs7.h ../include/openssl/pqueue.h
|
||||||
s_socket.o: ../include/openssl/pqueue.h ../include/openssl/safestack.h
|
s_socket.o: ../include/openssl/safestack.h ../include/openssl/sha.h
|
||||||
s_socket.o: ../include/openssl/sha.h ../include/openssl/ssl.h
|
s_socket.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
|
||||||
s_socket.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
|
s_socket.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
|
||||||
s_socket.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
|
s_socket.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
|
||||||
s_socket.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
|
s_socket.o: ../include/openssl/tls1.h ../include/openssl/txt_db.h
|
||||||
s_socket.o: ../include/openssl/txt_db.h ../include/openssl/x509.h
|
s_socket.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
|
||||||
s_socket.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h
|
s_socket.o: ../include/openssl/x509v3.h apps.h s_apps.h s_socket.c
|
||||||
s_socket.o: s_apps.h s_socket.c
|
|
||||||
s_time.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
s_time.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
||||||
s_time.o: ../include/openssl/bn.h ../include/openssl/buffer.h
|
s_time.o: ../include/openssl/buffer.h ../include/openssl/comp.h
|
||||||
s_time.o: ../include/openssl/comp.h ../include/openssl/conf.h
|
s_time.o: ../include/openssl/conf.h ../include/openssl/crypto.h
|
||||||
s_time.o: ../include/openssl/crypto.h ../include/openssl/dtls1.h
|
s_time.o: ../include/openssl/dtls1.h ../include/openssl/e_os2.h
|
||||||
s_time.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
|
s_time.o: ../include/openssl/ec.h ../include/openssl/ecdh.h
|
||||||
s_time.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
|
s_time.o: ../include/openssl/ecdsa.h ../include/openssl/engine.h
|
||||||
s_time.o: ../include/openssl/engine.h ../include/openssl/err.h
|
s_time.o: ../include/openssl/err.h ../include/openssl/evp.h
|
||||||
s_time.o: ../include/openssl/evp.h ../include/openssl/kssl.h
|
s_time.o: ../include/openssl/hmac.h ../include/openssl/kssl.h
|
||||||
s_time.o: ../include/openssl/lhash.h ../include/openssl/obj_mac.h
|
s_time.o: ../include/openssl/lhash.h ../include/openssl/obj_mac.h
|
||||||
s_time.o: ../include/openssl/objects.h ../include/openssl/ocsp.h
|
s_time.o: ../include/openssl/objects.h ../include/openssl/ocsp.h
|
||||||
s_time.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
|
s_time.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
|
||||||
s_time.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
|
s_time.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
|
||||||
s_time.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
|
s_time.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
|
||||||
s_time.o: ../include/openssl/pq_compat.h ../include/openssl/pqueue.h
|
s_time.o: ../include/openssl/pqueue.h ../include/openssl/safestack.h
|
||||||
s_time.o: ../include/openssl/safestack.h ../include/openssl/sha.h
|
s_time.o: ../include/openssl/sha.h ../include/openssl/ssl.h
|
||||||
s_time.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
|
s_time.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
|
||||||
s_time.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
|
s_time.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
|
||||||
s_time.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
|
s_time.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
|
||||||
s_time.o: ../include/openssl/tls1.h ../include/openssl/txt_db.h
|
s_time.o: ../include/openssl/txt_db.h ../include/openssl/x509.h
|
||||||
s_time.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
|
s_time.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h
|
||||||
s_time.o: ../include/openssl/x509v3.h apps.h s_apps.h s_time.c
|
s_time.o: s_apps.h s_time.c
|
||||||
sess_id.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
sess_id.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
||||||
sess_id.o: ../include/openssl/bn.h ../include/openssl/buffer.h
|
sess_id.o: ../include/openssl/buffer.h ../include/openssl/comp.h
|
||||||
sess_id.o: ../include/openssl/comp.h ../include/openssl/conf.h
|
sess_id.o: ../include/openssl/conf.h ../include/openssl/crypto.h
|
||||||
sess_id.o: ../include/openssl/crypto.h ../include/openssl/dtls1.h
|
sess_id.o: ../include/openssl/dtls1.h ../include/openssl/e_os2.h
|
||||||
sess_id.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
|
sess_id.o: ../include/openssl/ec.h ../include/openssl/ecdh.h
|
||||||
sess_id.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
|
sess_id.o: ../include/openssl/ecdsa.h ../include/openssl/engine.h
|
||||||
sess_id.o: ../include/openssl/engine.h ../include/openssl/err.h
|
sess_id.o: ../include/openssl/err.h ../include/openssl/evp.h
|
||||||
sess_id.o: ../include/openssl/evp.h ../include/openssl/kssl.h
|
sess_id.o: ../include/openssl/hmac.h ../include/openssl/kssl.h
|
||||||
sess_id.o: ../include/openssl/lhash.h ../include/openssl/obj_mac.h
|
sess_id.o: ../include/openssl/lhash.h ../include/openssl/obj_mac.h
|
||||||
sess_id.o: ../include/openssl/objects.h ../include/openssl/ocsp.h
|
sess_id.o: ../include/openssl/objects.h ../include/openssl/ocsp.h
|
||||||
sess_id.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
|
sess_id.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
|
||||||
sess_id.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
|
sess_id.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
|
||||||
sess_id.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
|
sess_id.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
|
||||||
sess_id.o: ../include/openssl/pq_compat.h ../include/openssl/pqueue.h
|
sess_id.o: ../include/openssl/pqueue.h ../include/openssl/safestack.h
|
||||||
sess_id.o: ../include/openssl/safestack.h ../include/openssl/sha.h
|
sess_id.o: ../include/openssl/sha.h ../include/openssl/ssl.h
|
||||||
sess_id.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
|
sess_id.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
|
||||||
sess_id.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
|
sess_id.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
|
||||||
sess_id.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
|
sess_id.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
|
||||||
sess_id.o: ../include/openssl/tls1.h ../include/openssl/txt_db.h
|
sess_id.o: ../include/openssl/txt_db.h ../include/openssl/x509.h
|
||||||
sess_id.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
|
sess_id.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h
|
||||||
sess_id.o: ../include/openssl/x509v3.h apps.h sess_id.c
|
sess_id.o: sess_id.c
|
||||||
smime.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
smime.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
||||||
smime.o: ../include/openssl/buffer.h ../include/openssl/conf.h
|
smime.o: ../include/openssl/buffer.h ../include/openssl/conf.h
|
||||||
smime.o: ../include/openssl/crypto.h ../include/openssl/e_os2.h
|
smime.o: ../include/openssl/crypto.h ../include/openssl/e_os2.h
|
||||||
@@ -862,25 +924,27 @@ smime.o: smime.c
|
|||||||
speed.o: ../e_os.h ../include/openssl/aes.h ../include/openssl/asn1.h
|
speed.o: ../e_os.h ../include/openssl/aes.h ../include/openssl/asn1.h
|
||||||
speed.o: ../include/openssl/bio.h ../include/openssl/blowfish.h
|
speed.o: ../include/openssl/bio.h ../include/openssl/blowfish.h
|
||||||
speed.o: ../include/openssl/bn.h ../include/openssl/buffer.h
|
speed.o: ../include/openssl/bn.h ../include/openssl/buffer.h
|
||||||
speed.o: ../include/openssl/cast.h ../include/openssl/conf.h
|
speed.o: ../include/openssl/camellia.h ../include/openssl/cast.h
|
||||||
speed.o: ../include/openssl/crypto.h ../include/openssl/des.h
|
speed.o: ../include/openssl/conf.h ../include/openssl/crypto.h
|
||||||
speed.o: ../include/openssl/des_old.h ../include/openssl/dsa.h
|
speed.o: ../include/openssl/des.h ../include/openssl/des_old.h
|
||||||
speed.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
|
speed.o: ../include/openssl/dsa.h ../include/openssl/e_os2.h
|
||||||
speed.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
|
speed.o: ../include/openssl/ec.h ../include/openssl/ecdh.h
|
||||||
speed.o: ../include/openssl/engine.h ../include/openssl/err.h
|
speed.o: ../include/openssl/ecdsa.h ../include/openssl/engine.h
|
||||||
speed.o: ../include/openssl/evp.h ../include/openssl/hmac.h
|
speed.o: ../include/openssl/err.h ../include/openssl/evp.h
|
||||||
speed.o: ../include/openssl/idea.h ../include/openssl/lhash.h
|
speed.o: ../include/openssl/hmac.h ../include/openssl/idea.h
|
||||||
speed.o: ../include/openssl/md2.h ../include/openssl/md4.h
|
speed.o: ../include/openssl/lhash.h ../include/openssl/md4.h
|
||||||
speed.o: ../include/openssl/md5.h ../include/openssl/obj_mac.h
|
speed.o: ../include/openssl/md5.h ../include/openssl/mdc2.h
|
||||||
|
speed.o: ../include/openssl/modes.h ../include/openssl/obj_mac.h
|
||||||
speed.o: ../include/openssl/objects.h ../include/openssl/ocsp.h
|
speed.o: ../include/openssl/objects.h ../include/openssl/ocsp.h
|
||||||
speed.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
|
speed.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
|
||||||
speed.o: ../include/openssl/ossl_typ.h ../include/openssl/pkcs7.h
|
speed.o: ../include/openssl/ossl_typ.h ../include/openssl/pkcs7.h
|
||||||
speed.o: ../include/openssl/rand.h ../include/openssl/rc2.h
|
speed.o: ../include/openssl/rand.h ../include/openssl/rc2.h
|
||||||
speed.o: ../include/openssl/rc4.h ../include/openssl/ripemd.h
|
speed.o: ../include/openssl/rc4.h ../include/openssl/ripemd.h
|
||||||
speed.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
|
speed.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
|
||||||
speed.o: ../include/openssl/sha.h ../include/openssl/stack.h
|
speed.o: ../include/openssl/seed.h ../include/openssl/sha.h
|
||||||
speed.o: ../include/openssl/symhacks.h ../include/openssl/txt_db.h
|
speed.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
|
||||||
speed.o: ../include/openssl/ui.h ../include/openssl/ui_compat.h
|
speed.o: ../include/openssl/txt_db.h ../include/openssl/ui.h
|
||||||
|
speed.o: ../include/openssl/ui_compat.h ../include/openssl/whrlpool.h
|
||||||
speed.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
|
speed.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
|
||||||
speed.o: ../include/openssl/x509v3.h apps.h speed.c testdsa.h testrsa.h
|
speed.o: ../include/openssl/x509v3.h apps.h speed.c testdsa.h testrsa.h
|
||||||
spkac.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
spkac.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
||||||
@@ -899,6 +963,39 @@ spkac.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
|
|||||||
spkac.o: ../include/openssl/txt_db.h ../include/openssl/x509.h
|
spkac.o: ../include/openssl/txt_db.h ../include/openssl/x509.h
|
||||||
spkac.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h
|
spkac.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h
|
||||||
spkac.o: spkac.c
|
spkac.o: spkac.c
|
||||||
|
srp.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
||||||
|
srp.o: ../include/openssl/bn.h ../include/openssl/buffer.h
|
||||||
|
srp.o: ../include/openssl/conf.h ../include/openssl/crypto.h
|
||||||
|
srp.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
|
||||||
|
srp.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
|
||||||
|
srp.o: ../include/openssl/engine.h ../include/openssl/err.h
|
||||||
|
srp.o: ../include/openssl/evp.h ../include/openssl/lhash.h
|
||||||
|
srp.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
|
||||||
|
srp.o: ../include/openssl/ocsp.h ../include/openssl/opensslconf.h
|
||||||
|
srp.o: ../include/openssl/opensslv.h ../include/openssl/ossl_typ.h
|
||||||
|
srp.o: ../include/openssl/pkcs7.h ../include/openssl/safestack.h
|
||||||
|
srp.o: ../include/openssl/sha.h ../include/openssl/srp.h
|
||||||
|
srp.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
|
||||||
|
srp.o: ../include/openssl/txt_db.h ../include/openssl/x509.h
|
||||||
|
srp.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h srp.c
|
||||||
|
ts.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
||||||
|
ts.o: ../include/openssl/bn.h ../include/openssl/buffer.h
|
||||||
|
ts.o: ../include/openssl/conf.h ../include/openssl/crypto.h
|
||||||
|
ts.o: ../include/openssl/dh.h ../include/openssl/dsa.h
|
||||||
|
ts.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
|
||||||
|
ts.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
|
||||||
|
ts.o: ../include/openssl/engine.h ../include/openssl/err.h
|
||||||
|
ts.o: ../include/openssl/evp.h ../include/openssl/lhash.h
|
||||||
|
ts.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
|
||||||
|
ts.o: ../include/openssl/ocsp.h ../include/openssl/opensslconf.h
|
||||||
|
ts.o: ../include/openssl/opensslv.h ../include/openssl/ossl_typ.h
|
||||||
|
ts.o: ../include/openssl/pem.h ../include/openssl/pem2.h
|
||||||
|
ts.o: ../include/openssl/pkcs7.h ../include/openssl/rand.h
|
||||||
|
ts.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
|
||||||
|
ts.o: ../include/openssl/sha.h ../include/openssl/stack.h
|
||||||
|
ts.o: ../include/openssl/symhacks.h ../include/openssl/ts.h
|
||||||
|
ts.o: ../include/openssl/txt_db.h ../include/openssl/x509.h
|
||||||
|
ts.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h ts.c
|
||||||
verify.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
verify.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
||||||
verify.o: ../include/openssl/buffer.h ../include/openssl/conf.h
|
verify.o: ../include/openssl/buffer.h ../include/openssl/conf.h
|
||||||
verify.o: ../include/openssl/crypto.h ../include/openssl/e_os2.h
|
verify.o: ../include/openssl/crypto.h ../include/openssl/e_os2.h
|
||||||
@@ -923,17 +1020,16 @@ version.o: ../include/openssl/des_old.h ../include/openssl/e_os2.h
|
|||||||
version.o: ../include/openssl/ec.h ../include/openssl/ecdh.h
|
version.o: ../include/openssl/ec.h ../include/openssl/ecdh.h
|
||||||
version.o: ../include/openssl/ecdsa.h ../include/openssl/engine.h
|
version.o: ../include/openssl/ecdsa.h ../include/openssl/engine.h
|
||||||
version.o: ../include/openssl/evp.h ../include/openssl/idea.h
|
version.o: ../include/openssl/evp.h ../include/openssl/idea.h
|
||||||
version.o: ../include/openssl/lhash.h ../include/openssl/md2.h
|
version.o: ../include/openssl/lhash.h ../include/openssl/obj_mac.h
|
||||||
version.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
|
version.o: ../include/openssl/objects.h ../include/openssl/ocsp.h
|
||||||
version.o: ../include/openssl/ocsp.h ../include/openssl/opensslconf.h
|
version.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
|
||||||
version.o: ../include/openssl/opensslv.h ../include/openssl/ossl_typ.h
|
version.o: ../include/openssl/ossl_typ.h ../include/openssl/pkcs7.h
|
||||||
version.o: ../include/openssl/pkcs7.h ../include/openssl/rc4.h
|
version.o: ../include/openssl/rc4.h ../include/openssl/safestack.h
|
||||||
version.o: ../include/openssl/safestack.h ../include/openssl/sha.h
|
version.o: ../include/openssl/sha.h ../include/openssl/stack.h
|
||||||
version.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
|
version.o: ../include/openssl/symhacks.h ../include/openssl/txt_db.h
|
||||||
version.o: ../include/openssl/txt_db.h ../include/openssl/ui.h
|
version.o: ../include/openssl/ui.h ../include/openssl/ui_compat.h
|
||||||
version.o: ../include/openssl/ui_compat.h ../include/openssl/x509.h
|
version.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
|
||||||
version.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h
|
version.o: ../include/openssl/x509v3.h apps.h version.c
|
||||||
version.o: version.c
|
|
||||||
x509.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
x509.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
|
||||||
x509.o: ../include/openssl/bn.h ../include/openssl/buffer.h
|
x509.o: ../include/openssl/bn.h ../include/openssl/buffer.h
|
||||||
x509.o: ../include/openssl/conf.h ../include/openssl/crypto.h
|
x509.o: ../include/openssl/conf.h ../include/openssl/crypto.h
|
||||||
|
|||||||
1131
apps/apps.c
1131
apps/apps.c
File diff suppressed because it is too large
Load Diff
100
apps/apps.h
100
apps/apps.h
@@ -137,11 +137,6 @@ long app_RAND_load_files(char *file); /* `file' is a list of files to read,
|
|||||||
* (see e_os.h). The string is
|
* (see e_os.h). The string is
|
||||||
* destroyed! */
|
* destroyed! */
|
||||||
|
|
||||||
#ifdef OPENSSL_SYS_WIN32
|
|
||||||
#define rename(from,to) WIN32_rename((from),(to))
|
|
||||||
int WIN32_rename(const char *oldname,const char *newname);
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#ifndef MONOLITH
|
#ifndef MONOLITH
|
||||||
|
|
||||||
#define MAIN(a,v) main(a,v)
|
#define MAIN(a,v) main(a,v)
|
||||||
@@ -173,61 +168,37 @@ extern BIO *bio_err;
|
|||||||
#define do_pipe_sig()
|
#define do_pipe_sig()
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
#ifdef OPENSSL_NO_COMP
|
||||||
|
#define zlib_cleanup()
|
||||||
|
#else
|
||||||
|
#define zlib_cleanup() COMP_zlib_cleanup()
|
||||||
|
#endif
|
||||||
|
|
||||||
#if defined(MONOLITH) && !defined(OPENSSL_C)
|
#if defined(MONOLITH) && !defined(OPENSSL_C)
|
||||||
# define apps_startup() \
|
# define apps_startup() \
|
||||||
do_pipe_sig()
|
do_pipe_sig()
|
||||||
# define apps_shutdown()
|
# define apps_shutdown()
|
||||||
#else
|
#else
|
||||||
# ifndef OPENSSL_NO_ENGINE
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
# if defined(OPENSSL_SYS_MSDOS) || defined(OPENSSL_SYS_WIN16) || \
|
|
||||||
defined(OPENSSL_SYS_WIN32)
|
|
||||||
# ifdef _O_BINARY
|
|
||||||
# define apps_startup() \
|
# define apps_startup() \
|
||||||
do { _fmode=_O_BINARY; do_pipe_sig(); CRYPTO_malloc_init(); \
|
do { do_pipe_sig(); CRYPTO_malloc_init(); \
|
||||||
ERR_load_crypto_strings(); OpenSSL_add_all_algorithms(); \
|
ERR_load_crypto_strings(); OpenSSL_add_all_algorithms(); \
|
||||||
ENGINE_load_builtin_engines(); setup_ui_method(); } while(0)
|
ENGINE_load_builtin_engines(); setup_ui_method(); } while(0)
|
||||||
# else
|
|
||||||
# define apps_startup() \
|
|
||||||
do { _fmode=O_BINARY; do_pipe_sig(); CRYPTO_malloc_init(); \
|
|
||||||
ERR_load_crypto_strings(); OpenSSL_add_all_algorithms(); \
|
|
||||||
ENGINE_load_builtin_engines(); setup_ui_method(); } while(0)
|
|
||||||
# endif
|
|
||||||
# else
|
|
||||||
# define apps_startup() \
|
|
||||||
do { do_pipe_sig(); OpenSSL_add_all_algorithms(); \
|
|
||||||
ERR_load_crypto_strings(); ENGINE_load_builtin_engines(); \
|
|
||||||
setup_ui_method(); } while(0)
|
|
||||||
# endif
|
|
||||||
# define apps_shutdown() \
|
# define apps_shutdown() \
|
||||||
do { CONF_modules_unload(1); destroy_ui_method(); \
|
do { CONF_modules_unload(1); destroy_ui_method(); \
|
||||||
EVP_cleanup(); ENGINE_cleanup(); \
|
OBJ_cleanup(); EVP_cleanup(); ENGINE_cleanup(); \
|
||||||
CRYPTO_cleanup_all_ex_data(); ERR_remove_state(0); \
|
CRYPTO_cleanup_all_ex_data(); ERR_remove_thread_state(NULL); \
|
||||||
ERR_free_strings(); } while(0)
|
ERR_free_strings(); zlib_cleanup();} while(0)
|
||||||
# else
|
# else
|
||||||
# if defined(OPENSSL_SYS_MSDOS) || defined(OPENSSL_SYS_WIN16) || \
|
|
||||||
defined(OPENSSL_SYS_WIN32)
|
|
||||||
# ifdef _O_BINARY
|
|
||||||
# define apps_startup() \
|
# define apps_startup() \
|
||||||
do { _fmode=_O_BINARY; do_pipe_sig(); CRYPTO_malloc_init(); \
|
do { do_pipe_sig(); CRYPTO_malloc_init(); \
|
||||||
ERR_load_crypto_strings(); OpenSSL_add_all_algorithms(); \
|
ERR_load_crypto_strings(); OpenSSL_add_all_algorithms(); \
|
||||||
setup_ui_method(); } while(0)
|
setup_ui_method(); } while(0)
|
||||||
# else
|
|
||||||
# define apps_startup() \
|
|
||||||
do { _fmode=O_BINARY; do_pipe_sig(); CRYPTO_malloc_init(); \
|
|
||||||
ERR_load_crypto_strings(); OpenSSL_add_all_algorithms(); \
|
|
||||||
setup_ui_method(); } while(0)
|
|
||||||
# endif
|
|
||||||
# else
|
|
||||||
# define apps_startup() \
|
|
||||||
do { do_pipe_sig(); OpenSSL_add_all_algorithms(); \
|
|
||||||
ERR_load_crypto_strings(); \
|
|
||||||
setup_ui_method(); } while(0)
|
|
||||||
# endif
|
|
||||||
# define apps_shutdown() \
|
# define apps_shutdown() \
|
||||||
do { CONF_modules_unload(1); destroy_ui_method(); \
|
do { CONF_modules_unload(1); destroy_ui_method(); \
|
||||||
EVP_cleanup(); \
|
OBJ_cleanup(); EVP_cleanup(); \
|
||||||
CRYPTO_cleanup_all_ex_data(); ERR_remove_state(0); \
|
CRYPTO_cleanup_all_ex_data(); ERR_remove_thread_state(NULL); \
|
||||||
ERR_free_strings(); } while(0)
|
ERR_free_strings(); zlib_cleanup(); } while(0)
|
||||||
# endif
|
# endif
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
@@ -237,6 +208,7 @@ extern BIO *bio_err;
|
|||||||
# define openssl_fdset(a,b) FD_SET(a, b)
|
# define openssl_fdset(a,b) FD_SET(a, b)
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
|
||||||
typedef struct args_st
|
typedef struct args_st
|
||||||
{
|
{
|
||||||
char **data;
|
char **data;
|
||||||
@@ -279,6 +251,8 @@ EVP_PKEY *load_pubkey(BIO *err, const char *file, int format, int maybe_stdin,
|
|||||||
const char *pass, ENGINE *e, const char *key_descrip);
|
const char *pass, ENGINE *e, const char *key_descrip);
|
||||||
STACK_OF(X509) *load_certs(BIO *err, const char *file, int format,
|
STACK_OF(X509) *load_certs(BIO *err, const char *file, int format,
|
||||||
const char *pass, ENGINE *e, const char *cert_descrip);
|
const char *pass, ENGINE *e, const char *cert_descrip);
|
||||||
|
STACK_OF(X509_CRL) *load_crls(BIO *err, const char *file, int format,
|
||||||
|
const char *pass, ENGINE *e, const char *cert_descrip);
|
||||||
X509_STORE *setup_verify(BIO *bp, char *CAfile, char *CApath);
|
X509_STORE *setup_verify(BIO *bp, char *CAfile, char *CApath);
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
ENGINE *setup_engine(BIO *err, const char *engine, int debug);
|
ENGINE *setup_engine(BIO *err, const char *engine, int debug);
|
||||||
@@ -287,6 +261,7 @@ ENGINE *setup_engine(BIO *err, const char *engine, int debug);
|
|||||||
#ifndef OPENSSL_NO_OCSP
|
#ifndef OPENSSL_NO_OCSP
|
||||||
OCSP_RESPONSE *process_responder(BIO *err, OCSP_REQUEST *req,
|
OCSP_RESPONSE *process_responder(BIO *err, OCSP_REQUEST *req,
|
||||||
char *host, char *path, char *port, int use_ssl,
|
char *host, char *path, char *port, int use_ssl,
|
||||||
|
STACK_OF(CONF_VALUE) *headers,
|
||||||
int req_timeout);
|
int req_timeout);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
@@ -328,13 +303,33 @@ int index_index(CA_DB *db);
|
|||||||
int save_index(const char *dbfile, const char *suffix, CA_DB *db);
|
int save_index(const char *dbfile, const char *suffix, CA_DB *db);
|
||||||
int rotate_index(const char *dbfile, const char *new_suffix, const char *old_suffix);
|
int rotate_index(const char *dbfile, const char *new_suffix, const char *old_suffix);
|
||||||
void free_index(CA_DB *db);
|
void free_index(CA_DB *db);
|
||||||
int index_name_cmp(const char **a, const char **b);
|
#define index_name_cmp_noconst(a, b) \
|
||||||
|
index_name_cmp((const OPENSSL_CSTRING *)CHECKED_PTR_OF(OPENSSL_STRING, a), \
|
||||||
|
(const OPENSSL_CSTRING *)CHECKED_PTR_OF(OPENSSL_STRING, b))
|
||||||
|
int index_name_cmp(const OPENSSL_CSTRING *a, const OPENSSL_CSTRING *b);
|
||||||
int parse_yesno(const char *str, int def);
|
int parse_yesno(const char *str, int def);
|
||||||
|
|
||||||
X509_NAME *parse_name(char *str, long chtype, int multirdn);
|
X509_NAME *parse_name(char *str, long chtype, int multirdn);
|
||||||
int args_verify(char ***pargs, int *pargc,
|
int args_verify(char ***pargs, int *pargc,
|
||||||
int *badarg, BIO *err, X509_VERIFY_PARAM **pm);
|
int *badarg, BIO *err, X509_VERIFY_PARAM **pm);
|
||||||
void policies_print(BIO *out, X509_STORE_CTX *ctx);
|
void policies_print(BIO *out, X509_STORE_CTX *ctx);
|
||||||
|
int bio_to_mem(unsigned char **out, int maxlen, BIO *in);
|
||||||
|
int pkey_ctrl_string(EVP_PKEY_CTX *ctx, char *value);
|
||||||
|
int init_gen_str(BIO *err, EVP_PKEY_CTX **pctx,
|
||||||
|
const char *algname, ENGINE *e, int do_param);
|
||||||
|
int do_X509_sign(BIO *err, X509 *x, EVP_PKEY *pkey, const EVP_MD *md,
|
||||||
|
STACK_OF(OPENSSL_STRING) *sigopts);
|
||||||
|
int do_X509_REQ_sign(BIO *err, X509_REQ *x, EVP_PKEY *pkey, const EVP_MD *md,
|
||||||
|
STACK_OF(OPENSSL_STRING) *sigopts);
|
||||||
|
int do_X509_CRL_sign(BIO *err, X509_CRL *x, EVP_PKEY *pkey, const EVP_MD *md,
|
||||||
|
STACK_OF(OPENSSL_STRING) *sigopts);
|
||||||
|
#ifndef OPENSSL_NO_PSK
|
||||||
|
extern char *psk_key;
|
||||||
|
#endif
|
||||||
|
#ifndef OPENSSL_NO_JPAKE
|
||||||
|
void jpake_client_auth(BIO *out, BIO *conn, const char *secret);
|
||||||
|
void jpake_server_auth(BIO *out, BIO *conn, const char *secret);
|
||||||
|
#endif
|
||||||
|
|
||||||
#define FORMAT_UNDEF 0
|
#define FORMAT_UNDEF 0
|
||||||
#define FORMAT_ASN1 1
|
#define FORMAT_ASN1 1
|
||||||
@@ -346,6 +341,10 @@ void policies_print(BIO *out, X509_STORE_CTX *ctx);
|
|||||||
#define FORMAT_ENGINE 7
|
#define FORMAT_ENGINE 7
|
||||||
#define FORMAT_IISSGC 8 /* XXX this stupid macro helps us to avoid
|
#define FORMAT_IISSGC 8 /* XXX this stupid macro helps us to avoid
|
||||||
* adding yet another param to load_*key() */
|
* adding yet another param to load_*key() */
|
||||||
|
#define FORMAT_PEMRSA 9 /* PEM RSAPubicKey format */
|
||||||
|
#define FORMAT_ASN1RSA 10 /* DER RSAPubicKey format */
|
||||||
|
#define FORMAT_MSBLOB 11 /* MS Key blob format */
|
||||||
|
#define FORMAT_PVK 12 /* MS PVK file format */
|
||||||
|
|
||||||
#define EXT_COPY_NONE 0
|
#define EXT_COPY_NONE 0
|
||||||
#define EXT_COPY_ADD 1
|
#define EXT_COPY_ADD 1
|
||||||
@@ -357,4 +356,17 @@ void policies_print(BIO *out, X509_STORE_CTX *ctx);
|
|||||||
|
|
||||||
#define SERIAL_RAND_BITS 64
|
#define SERIAL_RAND_BITS 64
|
||||||
|
|
||||||
|
int app_isdir(const char *);
|
||||||
|
int raw_read_stdin(void *,int);
|
||||||
|
int raw_write_stdout(const void *,int);
|
||||||
|
|
||||||
|
#define TM_START 0
|
||||||
|
#define TM_STOP 1
|
||||||
|
double app_tminterval (int stop,int usertime);
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#define OPENSSL_NO_SSL_INTERN
|
||||||
|
|
||||||
|
#ifndef OPENSSL_NO_NEXTPROTONEG
|
||||||
|
unsigned char *next_protos_parse(unsigned short *outlen, const char *in);
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
@@ -56,7 +56,7 @@
|
|||||||
* [including the GNU Public Licence.]
|
* [including the GNU Public Licence.]
|
||||||
*/
|
*/
|
||||||
|
|
||||||
/* A nice addition from Dr Stephen Henson <shenson@bigfoot.com> to
|
/* A nice addition from Dr Stephen Henson <steve@openssl.org> to
|
||||||
* add the -strparse option which parses nested binary structures
|
* add the -strparse option which parses nested binary structures
|
||||||
*/
|
*/
|
||||||
|
|
||||||
@@ -96,7 +96,7 @@ int MAIN(int argc, char **argv)
|
|||||||
unsigned char *tmpbuf;
|
unsigned char *tmpbuf;
|
||||||
const unsigned char *ctmpbuf;
|
const unsigned char *ctmpbuf;
|
||||||
BUF_MEM *buf=NULL;
|
BUF_MEM *buf=NULL;
|
||||||
STACK *osk=NULL;
|
STACK_OF(OPENSSL_STRING) *osk=NULL;
|
||||||
ASN1_TYPE *at=NULL;
|
ASN1_TYPE *at=NULL;
|
||||||
|
|
||||||
informat=FORMAT_PEM;
|
informat=FORMAT_PEM;
|
||||||
@@ -113,7 +113,7 @@ int MAIN(int argc, char **argv)
|
|||||||
prog=argv[0];
|
prog=argv[0];
|
||||||
argc--;
|
argc--;
|
||||||
argv++;
|
argv++;
|
||||||
if ((osk=sk_new_null()) == NULL)
|
if ((osk=sk_OPENSSL_STRING_new_null()) == NULL)
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,"Memory allocation failure\n");
|
BIO_printf(bio_err,"Memory allocation failure\n");
|
||||||
goto end;
|
goto end;
|
||||||
@@ -169,7 +169,7 @@ int MAIN(int argc, char **argv)
|
|||||||
else if (strcmp(*argv,"-strparse") == 0)
|
else if (strcmp(*argv,"-strparse") == 0)
|
||||||
{
|
{
|
||||||
if (--argc < 1) goto bad;
|
if (--argc < 1) goto bad;
|
||||||
sk_push(osk,*(++argv));
|
sk_OPENSSL_STRING_push(osk,*(++argv));
|
||||||
}
|
}
|
||||||
else if (strcmp(*argv,"-genstr") == 0)
|
else if (strcmp(*argv,"-genstr") == 0)
|
||||||
{
|
{
|
||||||
@@ -302,18 +302,18 @@ bad:
|
|||||||
|
|
||||||
/* If any structs to parse go through in sequence */
|
/* If any structs to parse go through in sequence */
|
||||||
|
|
||||||
if (sk_num(osk))
|
if (sk_OPENSSL_STRING_num(osk))
|
||||||
{
|
{
|
||||||
tmpbuf=(unsigned char *)str;
|
tmpbuf=(unsigned char *)str;
|
||||||
tmplen=num;
|
tmplen=num;
|
||||||
for (i=0; i<sk_num(osk); i++)
|
for (i=0; i<sk_OPENSSL_STRING_num(osk); i++)
|
||||||
{
|
{
|
||||||
ASN1_TYPE *atmp;
|
ASN1_TYPE *atmp;
|
||||||
int typ;
|
int typ;
|
||||||
j=atoi(sk_value(osk,i));
|
j=atoi(sk_OPENSSL_STRING_value(osk,i));
|
||||||
if (j == 0)
|
if (j == 0)
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,"'%s' is an invalid number\n",sk_value(osk,i));
|
BIO_printf(bio_err,"'%s' is an invalid number\n",sk_OPENSSL_STRING_value(osk,i));
|
||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
tmpbuf+=j;
|
tmpbuf+=j;
|
||||||
@@ -378,7 +378,7 @@ end:
|
|||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
if (buf != NULL) BUF_MEM_free(buf);
|
if (buf != NULL) BUF_MEM_free(buf);
|
||||||
if (at != NULL) ASN1_TYPE_free(at);
|
if (at != NULL) ASN1_TYPE_free(at);
|
||||||
if (osk != NULL) sk_free(osk);
|
if (osk != NULL) sk_OPENSSL_STRING_free(osk);
|
||||||
OBJ_cleanup();
|
OBJ_cleanup();
|
||||||
apps_shutdown();
|
apps_shutdown();
|
||||||
OPENSSL_EXIT(ret);
|
OPENSSL_EXIT(ret);
|
||||||
@@ -408,6 +408,7 @@ static int do_generate(BIO *bio, char *genstr, char *genconf, BUF_MEM *buf)
|
|||||||
|
|
||||||
atyp = ASN1_generate_nconf(genstr, cnf);
|
atyp = ASN1_generate_nconf(genstr, cnf);
|
||||||
NCONF_free(cnf);
|
NCONF_free(cnf);
|
||||||
|
cnf = NULL;
|
||||||
|
|
||||||
if (!atyp)
|
if (!atyp)
|
||||||
return -1;
|
return -1;
|
||||||
|
|||||||
262
apps/ca.c
262
apps/ca.c
@@ -63,7 +63,6 @@
|
|||||||
#include <string.h>
|
#include <string.h>
|
||||||
#include <ctype.h>
|
#include <ctype.h>
|
||||||
#include <sys/types.h>
|
#include <sys/types.h>
|
||||||
#include <sys/stat.h>
|
|
||||||
#include <openssl/conf.h>
|
#include <openssl/conf.h>
|
||||||
#include <openssl/bio.h>
|
#include <openssl/bio.h>
|
||||||
#include <openssl/err.h>
|
#include <openssl/err.h>
|
||||||
@@ -198,27 +197,30 @@ extern int EF_ALIGNMENT;
|
|||||||
|
|
||||||
static void lookup_fail(const char *name, const char *tag);
|
static void lookup_fail(const char *name, const char *tag);
|
||||||
static int certify(X509 **xret, char *infile,EVP_PKEY *pkey,X509 *x509,
|
static int certify(X509 **xret, char *infile,EVP_PKEY *pkey,X509 *x509,
|
||||||
const EVP_MD *dgst,STACK_OF(CONF_VALUE) *policy,CA_DB *db,
|
const EVP_MD *dgst,STACK_OF(OPENSSL_STRING) *sigopts,
|
||||||
|
STACK_OF(CONF_VALUE) *policy,CA_DB *db,
|
||||||
BIGNUM *serial, char *subj,unsigned long chtype, int multirdn, int email_dn, char *startdate,
|
BIGNUM *serial, char *subj,unsigned long chtype, int multirdn, int email_dn, char *startdate,
|
||||||
char *enddate, long days, int batch, char *ext_sect, CONF *conf,
|
char *enddate, long days, int batch, char *ext_sect, CONF *conf,
|
||||||
int verbose, unsigned long certopt, unsigned long nameopt,
|
int verbose, unsigned long certopt, unsigned long nameopt,
|
||||||
int default_op, int ext_copy, int selfsign);
|
int default_op, int ext_copy, int selfsign);
|
||||||
static int certify_cert(X509 **xret, char *infile,EVP_PKEY *pkey,X509 *x509,
|
static int certify_cert(X509 **xret, char *infile,EVP_PKEY *pkey,X509 *x509,
|
||||||
const EVP_MD *dgst,STACK_OF(CONF_VALUE) *policy,
|
const EVP_MD *dgst,STACK_OF(OPENSSL_STRING) *sigopts,
|
||||||
|
STACK_OF(CONF_VALUE) *policy,
|
||||||
CA_DB *db, BIGNUM *serial, char *subj,unsigned long chtype, int multirdn, int email_dn,
|
CA_DB *db, BIGNUM *serial, char *subj,unsigned long chtype, int multirdn, int email_dn,
|
||||||
char *startdate, char *enddate, long days, int batch,
|
char *startdate, char *enddate, long days, int batch,
|
||||||
char *ext_sect, CONF *conf,int verbose, unsigned long certopt,
|
char *ext_sect, CONF *conf,int verbose, unsigned long certopt,
|
||||||
unsigned long nameopt, int default_op, int ext_copy,
|
unsigned long nameopt, int default_op, int ext_copy,
|
||||||
ENGINE *e);
|
ENGINE *e);
|
||||||
static int certify_spkac(X509 **xret, char *infile,EVP_PKEY *pkey,X509 *x509,
|
static int certify_spkac(X509 **xret, char *infile,EVP_PKEY *pkey,X509 *x509,
|
||||||
const EVP_MD *dgst,STACK_OF(CONF_VALUE) *policy,
|
const EVP_MD *dgst,STACK_OF(OPENSSL_STRING) *sigopts,
|
||||||
|
STACK_OF(CONF_VALUE) *policy,
|
||||||
CA_DB *db, BIGNUM *serial,char *subj,unsigned long chtype, int multirdn, int email_dn,
|
CA_DB *db, BIGNUM *serial,char *subj,unsigned long chtype, int multirdn, int email_dn,
|
||||||
char *startdate, char *enddate, long days, char *ext_sect,
|
char *startdate, char *enddate, long days, char *ext_sect,
|
||||||
CONF *conf, int verbose, unsigned long certopt,
|
CONF *conf, int verbose, unsigned long certopt,
|
||||||
unsigned long nameopt, int default_op, int ext_copy);
|
unsigned long nameopt, int default_op, int ext_copy);
|
||||||
static int fix_data(int nid, int *type);
|
|
||||||
static void write_new_certificate(BIO *bp, X509 *x, int output_der, int notext);
|
static void write_new_certificate(BIO *bp, X509 *x, int output_der, int notext);
|
||||||
static int do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509, const EVP_MD *dgst,
|
static int do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509, const EVP_MD *dgst,
|
||||||
|
STACK_OF(OPENSSL_STRING) *sigopts,
|
||||||
STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial,char *subj,unsigned long chtype, int multirdn,
|
STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial,char *subj,unsigned long chtype, int multirdn,
|
||||||
int email_dn, char *startdate, char *enddate, long days, int batch,
|
int email_dn, char *startdate, char *enddate, long days, int batch,
|
||||||
int verbose, X509_REQ *req, char *ext_sect, CONF *conf,
|
int verbose, X509_REQ *req, char *ext_sect, CONF *conf,
|
||||||
@@ -227,7 +229,7 @@ static int do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509, const EVP_MD *dgst,
|
|||||||
static int do_revoke(X509 *x509, CA_DB *db, int ext, char *extval);
|
static int do_revoke(X509 *x509, CA_DB *db, int ext, char *extval);
|
||||||
static int get_certificate_status(const char *ser_status, CA_DB *db);
|
static int get_certificate_status(const char *ser_status, CA_DB *db);
|
||||||
static int do_updatedb(CA_DB *db);
|
static int do_updatedb(CA_DB *db);
|
||||||
static int check_time_format(char *str);
|
static int check_time_format(const char *str);
|
||||||
char *make_revocation_str(int rev_type, char *rev_arg);
|
char *make_revocation_str(int rev_type, char *rev_arg);
|
||||||
int make_revoked(X509_REVOKED *rev, const char *str);
|
int make_revoked(X509_REVOKED *rev, const char *str);
|
||||||
int old_entry_print(BIO *bp, ASN1_OBJECT *obj, ASN1_STRING *str);
|
int old_entry_print(BIO *bp, ASN1_OBJECT *obj, ASN1_STRING *str);
|
||||||
@@ -259,6 +261,7 @@ int MAIN(int argc, char **argv)
|
|||||||
int doupdatedb=0;
|
int doupdatedb=0;
|
||||||
long crldays=0;
|
long crldays=0;
|
||||||
long crlhours=0;
|
long crlhours=0;
|
||||||
|
long crlsec=0;
|
||||||
long errorline= -1;
|
long errorline= -1;
|
||||||
char *configfile=NULL;
|
char *configfile=NULL;
|
||||||
char *md=NULL;
|
char *md=NULL;
|
||||||
@@ -306,11 +309,13 @@ int MAIN(int argc, char **argv)
|
|||||||
ASN1_TIME *tmptm;
|
ASN1_TIME *tmptm;
|
||||||
ASN1_INTEGER *tmpser;
|
ASN1_INTEGER *tmpser;
|
||||||
char *f;
|
char *f;
|
||||||
const char *p, **pp;
|
const char *p;
|
||||||
|
char * const *pp;
|
||||||
int i,j;
|
int i,j;
|
||||||
const EVP_MD *dgst=NULL;
|
const EVP_MD *dgst=NULL;
|
||||||
STACK_OF(CONF_VALUE) *attribs=NULL;
|
STACK_OF(CONF_VALUE) *attribs=NULL;
|
||||||
STACK_OF(X509) *cert_sk=NULL;
|
STACK_OF(X509) *cert_sk=NULL;
|
||||||
|
STACK_OF(OPENSSL_STRING) *sigopts = NULL;
|
||||||
#undef BSIZE
|
#undef BSIZE
|
||||||
#define BSIZE 256
|
#define BSIZE 256
|
||||||
MS_STATIC char buf[3][BSIZE];
|
MS_STATIC char buf[3][BSIZE];
|
||||||
@@ -435,6 +440,15 @@ EF_ALIGNMENT=0;
|
|||||||
if (--argc < 1) goto bad;
|
if (--argc < 1) goto bad;
|
||||||
outdir= *(++argv);
|
outdir= *(++argv);
|
||||||
}
|
}
|
||||||
|
else if (strcmp(*argv,"-sigopt") == 0)
|
||||||
|
{
|
||||||
|
if (--argc < 1)
|
||||||
|
goto bad;
|
||||||
|
if (!sigopts)
|
||||||
|
sigopts = sk_OPENSSL_STRING_new_null();
|
||||||
|
if (!sigopts || !sk_OPENSSL_STRING_push(sigopts, *(++argv)))
|
||||||
|
goto bad;
|
||||||
|
}
|
||||||
else if (strcmp(*argv,"-notext") == 0)
|
else if (strcmp(*argv,"-notext") == 0)
|
||||||
notext=1;
|
notext=1;
|
||||||
else if (strcmp(*argv,"-batch") == 0)
|
else if (strcmp(*argv,"-batch") == 0)
|
||||||
@@ -457,6 +471,11 @@ EF_ALIGNMENT=0;
|
|||||||
if (--argc < 1) goto bad;
|
if (--argc < 1) goto bad;
|
||||||
crlhours= atol(*(++argv));
|
crlhours= atol(*(++argv));
|
||||||
}
|
}
|
||||||
|
else if (strcmp(*argv,"-crlsec") == 0)
|
||||||
|
{
|
||||||
|
if (--argc < 1) goto bad;
|
||||||
|
crlsec = atol(*(++argv));
|
||||||
|
}
|
||||||
else if (strcmp(*argv,"-infiles") == 0)
|
else if (strcmp(*argv,"-infiles") == 0)
|
||||||
{
|
{
|
||||||
argc--;
|
argc--;
|
||||||
@@ -550,8 +569,10 @@ bad:
|
|||||||
|
|
||||||
if (badops)
|
if (badops)
|
||||||
{
|
{
|
||||||
for (pp=ca_usage; (*pp != NULL); pp++)
|
const char **pp2;
|
||||||
BIO_printf(bio_err,"%s",*pp);
|
|
||||||
|
for (pp2=ca_usage; (*pp2 != NULL); pp2++)
|
||||||
|
BIO_printf(bio_err,"%s",*pp2);
|
||||||
goto err;
|
goto err;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -826,7 +847,6 @@ bad:
|
|||||||
/* lookup where to write new certificates */
|
/* lookup where to write new certificates */
|
||||||
if ((outdir == NULL) && (req))
|
if ((outdir == NULL) && (req))
|
||||||
{
|
{
|
||||||
struct stat sb;
|
|
||||||
|
|
||||||
if ((outdir=NCONF_get_string(conf,section,ENV_NEW_CERTS_DIR))
|
if ((outdir=NCONF_get_string(conf,section,ENV_NEW_CERTS_DIR))
|
||||||
== NULL)
|
== NULL)
|
||||||
@@ -845,27 +865,23 @@ bad:
|
|||||||
that to access(). However, time's too short to do that just
|
that to access(). However, time's too short to do that just
|
||||||
now.
|
now.
|
||||||
*/
|
*/
|
||||||
|
#ifndef _WIN32
|
||||||
if (access(outdir,R_OK|W_OK|X_OK) != 0)
|
if (access(outdir,R_OK|W_OK|X_OK) != 0)
|
||||||
|
#else
|
||||||
|
if (_access(outdir,R_OK|W_OK|X_OK) != 0)
|
||||||
|
#endif
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,"I am unable to access the %s directory\n",outdir);
|
BIO_printf(bio_err,"I am unable to access the %s directory\n",outdir);
|
||||||
perror(outdir);
|
perror(outdir);
|
||||||
goto err;
|
goto err;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (stat(outdir,&sb) != 0)
|
if (app_isdir(outdir)<=0)
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"unable to stat(%s)\n",outdir);
|
|
||||||
perror(outdir);
|
|
||||||
goto err;
|
|
||||||
}
|
|
||||||
#ifdef S_IFDIR
|
|
||||||
if (!(sb.st_mode & S_IFDIR))
|
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,"%s need to be a directory\n",outdir);
|
BIO_printf(bio_err,"%s need to be a directory\n",outdir);
|
||||||
perror(outdir);
|
perror(outdir);
|
||||||
goto err;
|
goto err;
|
||||||
}
|
}
|
||||||
#endif
|
|
||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -880,9 +896,9 @@ bad:
|
|||||||
if (db == NULL) goto err;
|
if (db == NULL) goto err;
|
||||||
|
|
||||||
/* Lets check some fields */
|
/* Lets check some fields */
|
||||||
for (i=0; i<sk_num(db->db->data); i++)
|
for (i=0; i<sk_OPENSSL_PSTRING_num(db->db->data); i++)
|
||||||
{
|
{
|
||||||
pp=(const char **)sk_value(db->db->data,i);
|
pp=sk_OPENSSL_PSTRING_value(db->db->data,i);
|
||||||
if ((pp[DB_type][0] != DB_TYPE_REV) &&
|
if ((pp[DB_type][0] != DB_TYPE_REV) &&
|
||||||
(pp[DB_rev_date][0] != '\0'))
|
(pp[DB_rev_date][0] != '\0'))
|
||||||
{
|
{
|
||||||
@@ -935,7 +951,7 @@ bad:
|
|||||||
#endif
|
#endif
|
||||||
TXT_DB_write(out,db->db);
|
TXT_DB_write(out,db->db);
|
||||||
BIO_printf(bio_err,"%d entries loaded from the database\n",
|
BIO_printf(bio_err,"%d entries loaded from the database\n",
|
||||||
db->db->data->num);
|
sk_OPENSSL_PSTRING_num(db->db->data));
|
||||||
BIO_printf(bio_err,"generating index\n");
|
BIO_printf(bio_err,"generating index\n");
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -1026,6 +1042,17 @@ bad:
|
|||||||
goto err;
|
goto err;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (!strcmp(md, "default"))
|
||||||
|
{
|
||||||
|
int def_nid;
|
||||||
|
if (EVP_PKEY_get_default_digest_nid(pkey, &def_nid) <= 0)
|
||||||
|
{
|
||||||
|
BIO_puts(bio_err,"no default digest\n");
|
||||||
|
goto err;
|
||||||
|
}
|
||||||
|
md = (char *)OBJ_nid2sn(def_nid);
|
||||||
|
}
|
||||||
|
|
||||||
if ((dgst=EVP_get_digestbyname(md)) == NULL)
|
if ((dgst=EVP_get_digestbyname(md)) == NULL)
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,"%s is an unsupported message digest type\n",md);
|
BIO_printf(bio_err,"%s is an unsupported message digest type\n",md);
|
||||||
@@ -1095,9 +1122,9 @@ bad:
|
|||||||
if (startdate == NULL)
|
if (startdate == NULL)
|
||||||
ERR_clear_error();
|
ERR_clear_error();
|
||||||
}
|
}
|
||||||
if (startdate && !ASN1_UTCTIME_set_string(NULL,startdate))
|
if (startdate && !ASN1_TIME_set_string(NULL, startdate))
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,"start date is invalid, it should be YYMMDDHHMMSSZ\n");
|
BIO_printf(bio_err,"start date is invalid, it should be YYMMDDHHMMSSZ or YYYYMMDDHHMMSSZ\n");
|
||||||
goto err;
|
goto err;
|
||||||
}
|
}
|
||||||
if (startdate == NULL) startdate="today";
|
if (startdate == NULL) startdate="today";
|
||||||
@@ -1109,9 +1136,9 @@ bad:
|
|||||||
if (enddate == NULL)
|
if (enddate == NULL)
|
||||||
ERR_clear_error();
|
ERR_clear_error();
|
||||||
}
|
}
|
||||||
if (enddate && !ASN1_UTCTIME_set_string(NULL,enddate))
|
if (enddate && !ASN1_TIME_set_string(NULL, enddate))
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,"end date is invalid, it should be YYMMDDHHMMSSZ\n");
|
BIO_printf(bio_err,"end date is invalid, it should be YYMMDDHHMMSSZ or YYYYMMDDHHMMSSZ\n");
|
||||||
goto err;
|
goto err;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -1157,8 +1184,9 @@ bad:
|
|||||||
if (spkac_file != NULL)
|
if (spkac_file != NULL)
|
||||||
{
|
{
|
||||||
total++;
|
total++;
|
||||||
j=certify_spkac(&x,spkac_file,pkey,x509,dgst,attribs,db,
|
j=certify_spkac(&x,spkac_file,pkey,x509,dgst,sigopts,
|
||||||
serial,subj,chtype,multirdn,email_dn,startdate,enddate,days,extensions,
|
attribs,db, serial,subj,chtype,multirdn,
|
||||||
|
email_dn,startdate,enddate,days,extensions,
|
||||||
conf,verbose,certopt,nameopt,default_op,ext_copy);
|
conf,verbose,certopt,nameopt,default_op,ext_copy);
|
||||||
if (j < 0) goto err;
|
if (j < 0) goto err;
|
||||||
if (j > 0)
|
if (j > 0)
|
||||||
@@ -1181,7 +1209,8 @@ bad:
|
|||||||
if (ss_cert_file != NULL)
|
if (ss_cert_file != NULL)
|
||||||
{
|
{
|
||||||
total++;
|
total++;
|
||||||
j=certify_cert(&x,ss_cert_file,pkey,x509,dgst,attribs,
|
j=certify_cert(&x,ss_cert_file,pkey,x509,dgst,sigopts,
|
||||||
|
attribs,
|
||||||
db,serial,subj,chtype,multirdn,email_dn,startdate,enddate,days,batch,
|
db,serial,subj,chtype,multirdn,email_dn,startdate,enddate,days,batch,
|
||||||
extensions,conf,verbose, certopt, nameopt,
|
extensions,conf,verbose, certopt, nameopt,
|
||||||
default_op, ext_copy, e);
|
default_op, ext_copy, e);
|
||||||
@@ -1201,7 +1230,7 @@ bad:
|
|||||||
if (infile != NULL)
|
if (infile != NULL)
|
||||||
{
|
{
|
||||||
total++;
|
total++;
|
||||||
j=certify(&x,infile,pkey,x509p,dgst,attribs,db,
|
j=certify(&x,infile,pkey,x509p,dgst,sigopts, attribs,db,
|
||||||
serial,subj,chtype,multirdn,email_dn,startdate,enddate,days,batch,
|
serial,subj,chtype,multirdn,email_dn,startdate,enddate,days,batch,
|
||||||
extensions,conf,verbose, certopt, nameopt,
|
extensions,conf,verbose, certopt, nameopt,
|
||||||
default_op, ext_copy, selfsign);
|
default_op, ext_copy, selfsign);
|
||||||
@@ -1221,7 +1250,7 @@ bad:
|
|||||||
for (i=0; i<argc; i++)
|
for (i=0; i<argc; i++)
|
||||||
{
|
{
|
||||||
total++;
|
total++;
|
||||||
j=certify(&x,argv[i],pkey,x509p,dgst,attribs,db,
|
j=certify(&x,argv[i],pkey,x509p,dgst,sigopts,attribs,db,
|
||||||
serial,subj,chtype,multirdn,email_dn,startdate,enddate,days,batch,
|
serial,subj,chtype,multirdn,email_dn,startdate,enddate,days,batch,
|
||||||
extensions,conf,verbose, certopt, nameopt,
|
extensions,conf,verbose, certopt, nameopt,
|
||||||
default_op, ext_copy, selfsign);
|
default_op, ext_copy, selfsign);
|
||||||
@@ -1249,7 +1278,12 @@ bad:
|
|||||||
BIO_printf(bio_err,"\n%d out of %d certificate requests certified, commit? [y/n]",total_done,total);
|
BIO_printf(bio_err,"\n%d out of %d certificate requests certified, commit? [y/n]",total_done,total);
|
||||||
(void)BIO_flush(bio_err);
|
(void)BIO_flush(bio_err);
|
||||||
buf[0][0]='\0';
|
buf[0][0]='\0';
|
||||||
fgets(buf[0],10,stdin);
|
if (!fgets(buf[0],10,stdin))
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err,"CERTIFICATION CANCELED: I/O error\n");
|
||||||
|
ret=0;
|
||||||
|
goto err;
|
||||||
|
}
|
||||||
if ((buf[0][0] != 'y') && (buf[0][0] != 'Y'))
|
if ((buf[0][0] != 'y') && (buf[0][0] != 'Y'))
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,"CERTIFICATION CANCELED\n");
|
BIO_printf(bio_err,"CERTIFICATION CANCELED\n");
|
||||||
@@ -1366,7 +1400,7 @@ bad:
|
|||||||
goto err;
|
goto err;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (!crldays && !crlhours)
|
if (!crldays && !crlhours && !crlsec)
|
||||||
{
|
{
|
||||||
if (!NCONF_get_number(conf,section,
|
if (!NCONF_get_number(conf,section,
|
||||||
ENV_DEFAULT_CRL_DAYS, &crldays))
|
ENV_DEFAULT_CRL_DAYS, &crldays))
|
||||||
@@ -1374,8 +1408,9 @@ bad:
|
|||||||
if (!NCONF_get_number(conf,section,
|
if (!NCONF_get_number(conf,section,
|
||||||
ENV_DEFAULT_CRL_HOURS, &crlhours))
|
ENV_DEFAULT_CRL_HOURS, &crlhours))
|
||||||
crlhours = 0;
|
crlhours = 0;
|
||||||
|
ERR_clear_error();
|
||||||
}
|
}
|
||||||
if ((crldays == 0) && (crlhours == 0))
|
if ((crldays == 0) && (crlhours == 0) && (crlsec == 0))
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,"cannot lookup how long until the next CRL is issued\n");
|
BIO_printf(bio_err,"cannot lookup how long until the next CRL is issued\n");
|
||||||
goto err;
|
goto err;
|
||||||
@@ -1389,14 +1424,19 @@ bad:
|
|||||||
if (!tmptm) goto err;
|
if (!tmptm) goto err;
|
||||||
X509_gmtime_adj(tmptm,0);
|
X509_gmtime_adj(tmptm,0);
|
||||||
X509_CRL_set_lastUpdate(crl, tmptm);
|
X509_CRL_set_lastUpdate(crl, tmptm);
|
||||||
X509_gmtime_adj(tmptm,(crldays*24+crlhours)*60*60);
|
if (!X509_time_adj_ex(tmptm, crldays, crlhours*60*60 + crlsec,
|
||||||
|
NULL))
|
||||||
|
{
|
||||||
|
BIO_puts(bio_err, "error setting CRL nextUpdate\n");
|
||||||
|
goto err;
|
||||||
|
}
|
||||||
X509_CRL_set_nextUpdate(crl, tmptm);
|
X509_CRL_set_nextUpdate(crl, tmptm);
|
||||||
|
|
||||||
ASN1_TIME_free(tmptm);
|
ASN1_TIME_free(tmptm);
|
||||||
|
|
||||||
for (i=0; i<sk_num(db->db->data); i++)
|
for (i=0; i<sk_OPENSSL_PSTRING_num(db->db->data); i++)
|
||||||
{
|
{
|
||||||
pp=(const char **)sk_value(db->db->data,i);
|
pp=sk_OPENSSL_PSTRING_value(db->db->data,i);
|
||||||
if (pp[DB_type][0] == DB_TYPE_REV)
|
if (pp[DB_type][0] == DB_TYPE_REV)
|
||||||
{
|
{
|
||||||
if ((r=X509_REVOKED_new()) == NULL) goto err;
|
if ((r=X509_REVOKED_new()) == NULL) goto err;
|
||||||
@@ -1422,15 +1462,6 @@ bad:
|
|||||||
|
|
||||||
/* we now have a CRL */
|
/* we now have a CRL */
|
||||||
if (verbose) BIO_printf(bio_err,"signing CRL\n");
|
if (verbose) BIO_printf(bio_err,"signing CRL\n");
|
||||||
#ifndef OPENSSL_NO_DSA
|
|
||||||
if (pkey->type == EVP_PKEY_DSA)
|
|
||||||
dgst=EVP_dss1();
|
|
||||||
else
|
|
||||||
#endif
|
|
||||||
#ifndef OPENSSL_NO_ECDSA
|
|
||||||
if (pkey->type == EVP_PKEY_EC)
|
|
||||||
dgst=EVP_ecdsa();
|
|
||||||
#endif
|
|
||||||
|
|
||||||
/* Add any extensions asked for */
|
/* Add any extensions asked for */
|
||||||
|
|
||||||
@@ -1463,7 +1494,13 @@ bad:
|
|||||||
if (crlnumberfile != NULL) /* we have a CRL number that need updating */
|
if (crlnumberfile != NULL) /* we have a CRL number that need updating */
|
||||||
if (!save_serial(crlnumberfile,"new",crlnumber,NULL)) goto err;
|
if (!save_serial(crlnumberfile,"new",crlnumber,NULL)) goto err;
|
||||||
|
|
||||||
if (!X509_CRL_sign(crl,pkey,dgst)) goto err;
|
if (crlnumber)
|
||||||
|
{
|
||||||
|
BN_free(crlnumber);
|
||||||
|
crlnumber = NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!do_X509_CRL_sign(bio_err,crl,pkey,dgst,sigopts)) goto err;
|
||||||
|
|
||||||
PEM_write_bio_X509_CRL(Sout,crl);
|
PEM_write_bio_X509_CRL(Sout,crl);
|
||||||
|
|
||||||
@@ -1515,7 +1552,10 @@ err:
|
|||||||
if (free_key && key)
|
if (free_key && key)
|
||||||
OPENSSL_free(key);
|
OPENSSL_free(key);
|
||||||
BN_free(serial);
|
BN_free(serial);
|
||||||
|
BN_free(crlnumber);
|
||||||
free_index(db);
|
free_index(db);
|
||||||
|
if (sigopts)
|
||||||
|
sk_OPENSSL_STRING_free(sigopts);
|
||||||
EVP_PKEY_free(pkey);
|
EVP_PKEY_free(pkey);
|
||||||
if (x509) X509_free(x509);
|
if (x509) X509_free(x509);
|
||||||
X509_CRL_free(crl);
|
X509_CRL_free(crl);
|
||||||
@@ -1532,8 +1572,10 @@ static void lookup_fail(const char *name, const char *tag)
|
|||||||
}
|
}
|
||||||
|
|
||||||
static int certify(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
|
static int certify(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
|
||||||
const EVP_MD *dgst, STACK_OF(CONF_VALUE) *policy, CA_DB *db,
|
const EVP_MD *dgst, STACK_OF(OPENSSL_STRING) *sigopts,
|
||||||
BIGNUM *serial, char *subj,unsigned long chtype, int multirdn, int email_dn, char *startdate, char *enddate,
|
STACK_OF(CONF_VALUE) *policy, CA_DB *db,
|
||||||
|
BIGNUM *serial, char *subj,unsigned long chtype, int multirdn,
|
||||||
|
int email_dn, char *startdate, char *enddate,
|
||||||
long days, int batch, char *ext_sect, CONF *lconf, int verbose,
|
long days, int batch, char *ext_sect, CONF *lconf, int verbose,
|
||||||
unsigned long certopt, unsigned long nameopt, int default_op,
|
unsigned long certopt, unsigned long nameopt, int default_op,
|
||||||
int ext_copy, int selfsign)
|
int ext_copy, int selfsign)
|
||||||
@@ -1589,7 +1631,8 @@ static int certify(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
|
|||||||
else
|
else
|
||||||
BIO_printf(bio_err,"Signature ok\n");
|
BIO_printf(bio_err,"Signature ok\n");
|
||||||
|
|
||||||
ok=do_body(xret,pkey,x509,dgst,policy,db,serial,subj,chtype,multirdn, email_dn,
|
ok=do_body(xret,pkey,x509,dgst,sigopts, policy,db,serial,subj,chtype,
|
||||||
|
multirdn, email_dn,
|
||||||
startdate,enddate,days,batch,verbose,req,ext_sect,lconf,
|
startdate,enddate,days,batch,verbose,req,ext_sect,lconf,
|
||||||
certopt, nameopt, default_op, ext_copy, selfsign);
|
certopt, nameopt, default_op, ext_copy, selfsign);
|
||||||
|
|
||||||
@@ -1600,7 +1643,8 @@ err:
|
|||||||
}
|
}
|
||||||
|
|
||||||
static int certify_cert(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
|
static int certify_cert(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
|
||||||
const EVP_MD *dgst, STACK_OF(CONF_VALUE) *policy, CA_DB *db,
|
const EVP_MD *dgst, STACK_OF(OPENSSL_STRING) *sigopts,
|
||||||
|
STACK_OF(CONF_VALUE) *policy, CA_DB *db,
|
||||||
BIGNUM *serial, char *subj, unsigned long chtype, int multirdn, int email_dn, char *startdate, char *enddate,
|
BIGNUM *serial, char *subj, unsigned long chtype, int multirdn, int email_dn, char *startdate, char *enddate,
|
||||||
long days, int batch, char *ext_sect, CONF *lconf, int verbose,
|
long days, int batch, char *ext_sect, CONF *lconf, int verbose,
|
||||||
unsigned long certopt, unsigned long nameopt, int default_op,
|
unsigned long certopt, unsigned long nameopt, int default_op,
|
||||||
@@ -1643,7 +1687,7 @@ static int certify_cert(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
|
|||||||
if ((rreq=X509_to_X509_REQ(req,NULL,EVP_md5())) == NULL)
|
if ((rreq=X509_to_X509_REQ(req,NULL,EVP_md5())) == NULL)
|
||||||
goto err;
|
goto err;
|
||||||
|
|
||||||
ok=do_body(xret,pkey,x509,dgst,policy,db,serial,subj,chtype,multirdn,email_dn,startdate,enddate,
|
ok=do_body(xret,pkey,x509,dgst,sigopts,policy,db,serial,subj,chtype,multirdn,email_dn,startdate,enddate,
|
||||||
days,batch,verbose,rreq,ext_sect,lconf, certopt, nameopt, default_op,
|
days,batch,verbose,rreq,ext_sect,lconf, certopt, nameopt, default_op,
|
||||||
ext_copy, 0);
|
ext_copy, 0);
|
||||||
|
|
||||||
@@ -1654,7 +1698,8 @@ err:
|
|||||||
}
|
}
|
||||||
|
|
||||||
static int do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509, const EVP_MD *dgst,
|
static int do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509, const EVP_MD *dgst,
|
||||||
STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, char *subj,
|
STACK_OF(OPENSSL_STRING) *sigopts, STACK_OF(CONF_VALUE) *policy,
|
||||||
|
CA_DB *db, BIGNUM *serial, char *subj,
|
||||||
unsigned long chtype, int multirdn,
|
unsigned long chtype, int multirdn,
|
||||||
int email_dn, char *startdate, char *enddate, long days, int batch,
|
int email_dn, char *startdate, char *enddate, long days, int batch,
|
||||||
int verbose, X509_REQ *req, char *ext_sect, CONF *lconf,
|
int verbose, X509_REQ *req, char *ext_sect, CONF *lconf,
|
||||||
@@ -1673,7 +1718,9 @@ static int do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509, const EVP_MD *dgst,
|
|||||||
int ok= -1,i,j,last,nid;
|
int ok= -1,i,j,last,nid;
|
||||||
const char *p;
|
const char *p;
|
||||||
CONF_VALUE *cv;
|
CONF_VALUE *cv;
|
||||||
char *row[DB_NUMBER],**rrow=NULL,**irow=NULL;
|
OPENSSL_STRING row[DB_NUMBER];
|
||||||
|
OPENSSL_STRING *irow=NULL;
|
||||||
|
OPENSSL_STRING *rrow=NULL;
|
||||||
char buf[25];
|
char buf[25];
|
||||||
|
|
||||||
tmptm=ASN1_UTCTIME_new();
|
tmptm=ASN1_UTCTIME_new();
|
||||||
@@ -1915,7 +1962,9 @@ again2:
|
|||||||
|
|
||||||
if (db->attributes.unique_subject)
|
if (db->attributes.unique_subject)
|
||||||
{
|
{
|
||||||
rrow=TXT_DB_get_by_index(db->db,DB_name,row);
|
OPENSSL_STRING *crow=row;
|
||||||
|
|
||||||
|
rrow=TXT_DB_get_by_index(db->db,DB_name,crow);
|
||||||
if (rrow != NULL)
|
if (rrow != NULL)
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,
|
BIO_printf(bio_err,
|
||||||
@@ -1991,11 +2040,11 @@ again2:
|
|||||||
|
|
||||||
if (strcmp(startdate,"today") == 0)
|
if (strcmp(startdate,"today") == 0)
|
||||||
X509_gmtime_adj(X509_get_notBefore(ret),0);
|
X509_gmtime_adj(X509_get_notBefore(ret),0);
|
||||||
else ASN1_UTCTIME_set_string(X509_get_notBefore(ret),startdate);
|
else ASN1_TIME_set_string(X509_get_notBefore(ret),startdate);
|
||||||
|
|
||||||
if (enddate == NULL)
|
if (enddate == NULL)
|
||||||
X509_gmtime_adj(X509_get_notAfter(ret),(long)60*60*24*days);
|
X509_time_adj_ex(X509_get_notAfter(ret),days, 0, NULL);
|
||||||
else ASN1_UTCTIME_set_string(X509_get_notAfter(ret),enddate);
|
else ASN1_TIME_set_string(X509_get_notAfter(ret),enddate);
|
||||||
|
|
||||||
if (!X509_set_subject_name(ret,subject)) goto err;
|
if (!X509_set_subject_name(ret,subject)) goto err;
|
||||||
|
|
||||||
@@ -2091,7 +2140,7 @@ again2:
|
|||||||
}
|
}
|
||||||
|
|
||||||
BIO_printf(bio_err,"Certificate is to be certified until ");
|
BIO_printf(bio_err,"Certificate is to be certified until ");
|
||||||
ASN1_UTCTIME_print(bio_err,X509_get_notAfter(ret));
|
ASN1_TIME_print(bio_err,X509_get_notAfter(ret));
|
||||||
if (days) BIO_printf(bio_err," (%ld days)",days);
|
if (days) BIO_printf(bio_err," (%ld days)",days);
|
||||||
BIO_printf(bio_err, "\n");
|
BIO_printf(bio_err, "\n");
|
||||||
|
|
||||||
@@ -2101,7 +2150,12 @@ again2:
|
|||||||
BIO_printf(bio_err,"Sign the certificate? [y/n]:");
|
BIO_printf(bio_err,"Sign the certificate? [y/n]:");
|
||||||
(void)BIO_flush(bio_err);
|
(void)BIO_flush(bio_err);
|
||||||
buf[0]='\0';
|
buf[0]='\0';
|
||||||
fgets(buf,sizeof(buf)-1,stdin);
|
if (!fgets(buf,sizeof(buf)-1,stdin))
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err,"CERTIFICATE WILL NOT BE CERTIFIED: I/O error\n");
|
||||||
|
ok=0;
|
||||||
|
goto err;
|
||||||
|
}
|
||||||
if (!((buf[0] == 'y') || (buf[0] == 'Y')))
|
if (!((buf[0] == 'y') || (buf[0] == 'Y')))
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,"CERTIFICATE WILL NOT BE CERTIFIED\n");
|
BIO_printf(bio_err,"CERTIFICATE WILL NOT BE CERTIFIED\n");
|
||||||
@@ -2110,27 +2164,13 @@ again2:
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_DSA
|
|
||||||
if (pkey->type == EVP_PKEY_DSA) dgst=EVP_dss1();
|
|
||||||
pktmp=X509_get_pubkey(ret);
|
pktmp=X509_get_pubkey(ret);
|
||||||
if (EVP_PKEY_missing_parameters(pktmp) &&
|
if (EVP_PKEY_missing_parameters(pktmp) &&
|
||||||
!EVP_PKEY_missing_parameters(pkey))
|
!EVP_PKEY_missing_parameters(pkey))
|
||||||
EVP_PKEY_copy_parameters(pktmp,pkey);
|
EVP_PKEY_copy_parameters(pktmp,pkey);
|
||||||
EVP_PKEY_free(pktmp);
|
EVP_PKEY_free(pktmp);
|
||||||
#endif
|
|
||||||
#ifndef OPENSSL_NO_ECDSA
|
|
||||||
if (pkey->type == EVP_PKEY_EC)
|
|
||||||
dgst = EVP_ecdsa();
|
|
||||||
pktmp = X509_get_pubkey(ret);
|
|
||||||
if (EVP_PKEY_missing_parameters(pktmp) &&
|
|
||||||
!EVP_PKEY_missing_parameters(pkey))
|
|
||||||
EVP_PKEY_copy_parameters(pktmp, pkey);
|
|
||||||
EVP_PKEY_free(pktmp);
|
|
||||||
#endif
|
|
||||||
|
|
||||||
|
if (!do_X509_sign(bio_err, ret,pkey,dgst, sigopts))
|
||||||
if (!X509_sign(ret,pkey,dgst))
|
|
||||||
goto err;
|
goto err;
|
||||||
|
|
||||||
/* We now just add it to the database */
|
/* We now just add it to the database */
|
||||||
@@ -2224,13 +2264,14 @@ static void write_new_certificate(BIO *bp, X509 *x, int output_der, int notext)
|
|||||||
}
|
}
|
||||||
|
|
||||||
static int certify_spkac(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
|
static int certify_spkac(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
|
||||||
const EVP_MD *dgst, STACK_OF(CONF_VALUE) *policy, CA_DB *db,
|
const EVP_MD *dgst, STACK_OF(OPENSSL_STRING) *sigopts,
|
||||||
|
STACK_OF(CONF_VALUE) *policy, CA_DB *db,
|
||||||
BIGNUM *serial, char *subj,unsigned long chtype, int multirdn, int email_dn, char *startdate, char *enddate,
|
BIGNUM *serial, char *subj,unsigned long chtype, int multirdn, int email_dn, char *startdate, char *enddate,
|
||||||
long days, char *ext_sect, CONF *lconf, int verbose, unsigned long certopt,
|
long days, char *ext_sect, CONF *lconf, int verbose, unsigned long certopt,
|
||||||
unsigned long nameopt, int default_op, int ext_copy)
|
unsigned long nameopt, int default_op, int ext_copy)
|
||||||
{
|
{
|
||||||
STACK_OF(CONF_VALUE) *sk=NULL;
|
STACK_OF(CONF_VALUE) *sk=NULL;
|
||||||
LHASH *parms=NULL;
|
LHASH_OF(CONF_VALUE) *parms=NULL;
|
||||||
X509_REQ *req=NULL;
|
X509_REQ *req=NULL;
|
||||||
CONF_VALUE *cv=NULL;
|
CONF_VALUE *cv=NULL;
|
||||||
NETSCAPE_SPKI *spki = NULL;
|
NETSCAPE_SPKI *spki = NULL;
|
||||||
@@ -2317,26 +2358,10 @@ static int certify_spkac(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
|
|||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
if (!X509_NAME_add_entry_by_NID(n, nid, chtype,
|
||||||
if ((nid == NID_pkcs9_emailAddress) && (email_dn == 0))
|
(unsigned char *)buf, -1, -1, 0))
|
||||||
continue;
|
|
||||||
*/
|
|
||||||
|
|
||||||
j=ASN1_PRINTABLE_type((unsigned char *)buf,-1);
|
|
||||||
if (fix_data(nid, &j) == 0)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,
|
|
||||||
"invalid characters in string %s\n",buf);
|
|
||||||
goto err;
|
goto err;
|
||||||
}
|
}
|
||||||
|
|
||||||
if ((ne=X509_NAME_ENTRY_create_by_NID(&ne,nid,j,
|
|
||||||
(unsigned char *)buf,
|
|
||||||
strlen(buf))) == NULL)
|
|
||||||
goto err;
|
|
||||||
|
|
||||||
if (!X509_NAME_add_entry(n,ne,-1, 0)) goto err;
|
|
||||||
}
|
|
||||||
if (spki == NULL)
|
if (spki == NULL)
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,"Netscape SPKAC structure not found in %s\n",
|
BIO_printf(bio_err,"Netscape SPKAC structure not found in %s\n",
|
||||||
@@ -2366,9 +2391,9 @@ static int certify_spkac(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
|
|||||||
|
|
||||||
X509_REQ_set_pubkey(req,pktmp);
|
X509_REQ_set_pubkey(req,pktmp);
|
||||||
EVP_PKEY_free(pktmp);
|
EVP_PKEY_free(pktmp);
|
||||||
ok=do_body(xret,pkey,x509,dgst,policy,db,serial,subj,chtype,multirdn,email_dn,startdate,enddate,
|
ok=do_body(xret,pkey,x509,dgst,sigopts,policy,db,serial,subj,chtype,
|
||||||
days,1,verbose,req,ext_sect,lconf, certopt, nameopt, default_op,
|
multirdn,email_dn,startdate,enddate, days,1,verbose,req,
|
||||||
ext_copy, 0);
|
ext_sect,lconf, certopt, nameopt, default_op, ext_copy, 0);
|
||||||
err:
|
err:
|
||||||
if (req != NULL) X509_REQ_free(req);
|
if (req != NULL) X509_REQ_free(req);
|
||||||
if (parms != NULL) CONF_free(parms);
|
if (parms != NULL) CONF_free(parms);
|
||||||
@@ -2378,29 +2403,9 @@ err:
|
|||||||
return(ok);
|
return(ok);
|
||||||
}
|
}
|
||||||
|
|
||||||
static int fix_data(int nid, int *type)
|
static int check_time_format(const char *str)
|
||||||
{
|
{
|
||||||
if (nid == NID_pkcs9_emailAddress)
|
return ASN1_TIME_set_string(NULL, str);
|
||||||
*type=V_ASN1_IA5STRING;
|
|
||||||
if ((nid == NID_commonName) && (*type == V_ASN1_IA5STRING))
|
|
||||||
*type=V_ASN1_T61STRING;
|
|
||||||
if ((nid == NID_pkcs9_challengePassword) && (*type == V_ASN1_IA5STRING))
|
|
||||||
*type=V_ASN1_T61STRING;
|
|
||||||
if ((nid == NID_pkcs9_unstructuredName) && (*type == V_ASN1_T61STRING))
|
|
||||||
return(0);
|
|
||||||
if (nid == NID_pkcs9_unstructuredName)
|
|
||||||
*type=V_ASN1_IA5STRING;
|
|
||||||
return(1);
|
|
||||||
}
|
|
||||||
|
|
||||||
static int check_time_format(char *str)
|
|
||||||
{
|
|
||||||
ASN1_UTCTIME tm;
|
|
||||||
|
|
||||||
tm.data=(unsigned char *)str;
|
|
||||||
tm.length=strlen(str);
|
|
||||||
tm.type=V_ASN1_UTCTIME;
|
|
||||||
return(ASN1_UTCTIME_check(&tm));
|
|
||||||
}
|
}
|
||||||
|
|
||||||
static int do_revoke(X509 *x509, CA_DB *db, int type, char *value)
|
static int do_revoke(X509 *x509, CA_DB *db, int type, char *value)
|
||||||
@@ -2415,6 +2420,8 @@ static int do_revoke(X509 *x509, CA_DB *db, int type, char *value)
|
|||||||
row[i]=NULL;
|
row[i]=NULL;
|
||||||
row[DB_name]=X509_NAME_oneline(X509_get_subject_name(x509),NULL,0);
|
row[DB_name]=X509_NAME_oneline(X509_get_subject_name(x509),NULL,0);
|
||||||
bn = ASN1_INTEGER_to_BN(X509_get_serialNumber(x509),NULL);
|
bn = ASN1_INTEGER_to_BN(X509_get_serialNumber(x509),NULL);
|
||||||
|
if (!bn)
|
||||||
|
goto err;
|
||||||
if (BN_is_zero(bn))
|
if (BN_is_zero(bn))
|
||||||
row[DB_serial]=BUF_strdup("00");
|
row[DB_serial]=BUF_strdup("00");
|
||||||
else
|
else
|
||||||
@@ -2484,7 +2491,7 @@ static int do_revoke(X509 *x509, CA_DB *db, int type, char *value)
|
|||||||
goto err;
|
goto err;
|
||||||
|
|
||||||
}
|
}
|
||||||
else if (index_name_cmp((const char **)row,(const char **)rrow))
|
else if (index_name_cmp_noconst(row, rrow))
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,"ERROR:name does not match %s\n",
|
BIO_printf(bio_err,"ERROR:name does not match %s\n",
|
||||||
row[DB_name]);
|
row[DB_name]);
|
||||||
@@ -2633,9 +2640,9 @@ static int do_updatedb (CA_DB *db)
|
|||||||
else
|
else
|
||||||
a_y2k = 0;
|
a_y2k = 0;
|
||||||
|
|
||||||
for (i = 0; i < sk_num(db->db->data); i++)
|
for (i = 0; i < sk_OPENSSL_PSTRING_num(db->db->data); i++)
|
||||||
{
|
{
|
||||||
rrow = (char **) sk_value(db->db->data, i);
|
rrow = sk_OPENSSL_PSTRING_value(db->db->data, i);
|
||||||
|
|
||||||
if (rrow[DB_type][0] == 'V')
|
if (rrow[DB_type][0] == 'V')
|
||||||
{
|
{
|
||||||
@@ -2882,22 +2889,13 @@ int old_entry_print(BIO *bp, ASN1_OBJECT *obj, ASN1_STRING *str)
|
|||||||
p=(char *)str->data;
|
p=(char *)str->data;
|
||||||
for (j=str->length; j>0; j--)
|
for (j=str->length; j>0; j--)
|
||||||
{
|
{
|
||||||
#ifdef CHARSET_EBCDIC
|
|
||||||
if ((*p >= 0x20) && (*p <= 0x7e))
|
|
||||||
BIO_printf(bp,"%c",os_toebcdic[*p]);
|
|
||||||
#else
|
|
||||||
if ((*p >= ' ') && (*p <= '~'))
|
if ((*p >= ' ') && (*p <= '~'))
|
||||||
BIO_printf(bp,"%c",*p);
|
BIO_printf(bp,"%c",*p);
|
||||||
#endif
|
|
||||||
else if (*p & 0x80)
|
else if (*p & 0x80)
|
||||||
BIO_printf(bp,"\\0x%02X",*p);
|
BIO_printf(bp,"\\0x%02X",*p);
|
||||||
else if ((unsigned char)*p == 0xf7)
|
else if ((unsigned char)*p == 0xf7)
|
||||||
BIO_printf(bp,"^?");
|
BIO_printf(bp,"^?");
|
||||||
#ifdef CHARSET_EBCDIC
|
|
||||||
else BIO_printf(bp,"^%c",os_toebcdic[*p+0x40]);
|
|
||||||
#else
|
|
||||||
else BIO_printf(bp,"^%c",*p+'@');
|
else BIO_printf(bp,"^%c",*p+'@');
|
||||||
#endif
|
|
||||||
p++;
|
p++;
|
||||||
}
|
}
|
||||||
BIO_printf(bp,"'\n");
|
BIO_printf(bp,"'\n");
|
||||||
|
|||||||
@@ -71,7 +71,8 @@
|
|||||||
|
|
||||||
static const char *ciphers_usage[]={
|
static const char *ciphers_usage[]={
|
||||||
"usage: ciphers args\n",
|
"usage: ciphers args\n",
|
||||||
" -v - verbose mode, a textual listing of the ciphers in SSLeay\n",
|
" -v - verbose mode, a textual listing of the SSL/TLS ciphers in OpenSSL\n",
|
||||||
|
" -V - even more verbose\n",
|
||||||
" -ssl2 - SSL2 mode\n",
|
" -ssl2 - SSL2 mode\n",
|
||||||
" -ssl3 - SSL3 mode\n",
|
" -ssl3 - SSL3 mode\n",
|
||||||
" -tls1 - TLS1 mode\n",
|
" -tls1 - TLS1 mode\n",
|
||||||
@@ -83,14 +84,14 @@ int MAIN(int, char **);
|
|||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
int ret=1,i;
|
int ret=1,i;
|
||||||
int verbose=0;
|
int verbose=0,Verbose=0;
|
||||||
const char **pp;
|
const char **pp;
|
||||||
const char *p;
|
const char *p;
|
||||||
int badops=0;
|
int badops=0;
|
||||||
SSL_CTX *ctx=NULL;
|
SSL_CTX *ctx=NULL;
|
||||||
SSL *ssl=NULL;
|
SSL *ssl=NULL;
|
||||||
char *ciphers=NULL;
|
char *ciphers=NULL;
|
||||||
SSL_METHOD *meth=NULL;
|
const SSL_METHOD *meth=NULL;
|
||||||
STACK_OF(SSL_CIPHER) *sk;
|
STACK_OF(SSL_CIPHER) *sk;
|
||||||
char buf[512];
|
char buf[512];
|
||||||
BIO *STDout=NULL;
|
BIO *STDout=NULL;
|
||||||
@@ -114,6 +115,8 @@ int MAIN(int argc, char **argv)
|
|||||||
STDout = BIO_push(tmpbio, STDout);
|
STDout = BIO_push(tmpbio, STDout);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
if (!load_config(bio_err, NULL))
|
||||||
|
goto end;
|
||||||
|
|
||||||
argc--;
|
argc--;
|
||||||
argv++;
|
argv++;
|
||||||
@@ -121,6 +124,8 @@ int MAIN(int argc, char **argv)
|
|||||||
{
|
{
|
||||||
if (strcmp(*argv,"-v") == 0)
|
if (strcmp(*argv,"-v") == 0)
|
||||||
verbose=1;
|
verbose=1;
|
||||||
|
else if (strcmp(*argv,"-V") == 0)
|
||||||
|
verbose=Verbose=1;
|
||||||
#ifndef OPENSSL_NO_SSL2
|
#ifndef OPENSSL_NO_SSL2
|
||||||
else if (strcmp(*argv,"-ssl2") == 0)
|
else if (strcmp(*argv,"-ssl2") == 0)
|
||||||
meth=SSLv2_client_method();
|
meth=SSLv2_client_method();
|
||||||
@@ -179,15 +184,33 @@ int MAIN(int argc, char **argv)
|
|||||||
}
|
}
|
||||||
BIO_printf(STDout,"\n");
|
BIO_printf(STDout,"\n");
|
||||||
}
|
}
|
||||||
else
|
else /* verbose */
|
||||||
{
|
{
|
||||||
sk=SSL_get_ciphers(ssl);
|
sk=SSL_get_ciphers(ssl);
|
||||||
|
|
||||||
for (i=0; i<sk_SSL_CIPHER_num(sk); i++)
|
for (i=0; i<sk_SSL_CIPHER_num(sk); i++)
|
||||||
{
|
{
|
||||||
BIO_puts(STDout,SSL_CIPHER_description(
|
SSL_CIPHER *c;
|
||||||
sk_SSL_CIPHER_value(sk,i),
|
|
||||||
buf,sizeof buf));
|
c = sk_SSL_CIPHER_value(sk,i);
|
||||||
|
|
||||||
|
if (Verbose)
|
||||||
|
{
|
||||||
|
unsigned long id = SSL_CIPHER_get_id(c);
|
||||||
|
int id0 = (int)(id >> 24);
|
||||||
|
int id1 = (int)((id >> 16) & 0xffL);
|
||||||
|
int id2 = (int)((id >> 8) & 0xffL);
|
||||||
|
int id3 = (int)(id & 0xffL);
|
||||||
|
|
||||||
|
if ((id & 0xff000000L) == 0x02000000L)
|
||||||
|
BIO_printf(STDout, " 0x%02X,0x%02X,0x%02X - ", id1, id2, id3); /* SSL2 cipher */
|
||||||
|
else if ((id & 0xff000000L) == 0x03000000L)
|
||||||
|
BIO_printf(STDout, " 0x%02X,0x%02X - ", id2, id3); /* SSL3 cipher */
|
||||||
|
else
|
||||||
|
BIO_printf(STDout, "0x%02X,0x%02X,0x%02X,0x%02X - ", id0, id1, id2, id3); /* whatever */
|
||||||
|
}
|
||||||
|
|
||||||
|
BIO_puts(STDout,SSL_CIPHER_description(c,buf,sizeof buf));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
150
apps/cms.c
150
apps/cms.c
@@ -71,8 +71,9 @@
|
|||||||
static int save_certs(char *signerfile, STACK_OF(X509) *signers);
|
static int save_certs(char *signerfile, STACK_OF(X509) *signers);
|
||||||
static int cms_cb(int ok, X509_STORE_CTX *ctx);
|
static int cms_cb(int ok, X509_STORE_CTX *ctx);
|
||||||
static void receipt_request_print(BIO *out, CMS_ContentInfo *cms);
|
static void receipt_request_print(BIO *out, CMS_ContentInfo *cms);
|
||||||
static CMS_ReceiptRequest *make_receipt_request(STACK *rr_to, int rr_allorfirst,
|
static CMS_ReceiptRequest *make_receipt_request(STACK_OF(OPENSSL_STRING) *rr_to,
|
||||||
STACK *rr_from);
|
int rr_allorfirst,
|
||||||
|
STACK_OF(OPENSSL_STRING) *rr_from);
|
||||||
|
|
||||||
#define SMIME_OP 0x10
|
#define SMIME_OP 0x10
|
||||||
#define SMIME_IP 0x20
|
#define SMIME_IP 0x20
|
||||||
@@ -94,6 +95,8 @@ static CMS_ReceiptRequest *make_receipt_request(STACK *rr_to, int rr_allorfirst,
|
|||||||
#define SMIME_SIGN_RECEIPT (15 | SMIME_IP | SMIME_OP)
|
#define SMIME_SIGN_RECEIPT (15 | SMIME_IP | SMIME_OP)
|
||||||
#define SMIME_VERIFY_RECEIPT (16 | SMIME_IP)
|
#define SMIME_VERIFY_RECEIPT (16 | SMIME_IP)
|
||||||
|
|
||||||
|
int verify_err = 0;
|
||||||
|
|
||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
@@ -105,7 +108,7 @@ int MAIN(int argc, char **argv)
|
|||||||
const char *inmode = "r", *outmode = "w";
|
const char *inmode = "r", *outmode = "w";
|
||||||
char *infile = NULL, *outfile = NULL, *rctfile = NULL;
|
char *infile = NULL, *outfile = NULL, *rctfile = NULL;
|
||||||
char *signerfile = NULL, *recipfile = NULL;
|
char *signerfile = NULL, *recipfile = NULL;
|
||||||
STACK *sksigners = NULL, *skkeys = NULL;
|
STACK_OF(OPENSSL_STRING) *sksigners = NULL, *skkeys = NULL;
|
||||||
char *certfile = NULL, *keyfile = NULL, *contfile=NULL;
|
char *certfile = NULL, *keyfile = NULL, *contfile=NULL;
|
||||||
char *certsoutfile = NULL;
|
char *certsoutfile = NULL;
|
||||||
const EVP_CIPHER *cipher = NULL;
|
const EVP_CIPHER *cipher = NULL;
|
||||||
@@ -116,9 +119,10 @@ int MAIN(int argc, char **argv)
|
|||||||
STACK_OF(X509) *encerts = NULL, *other = NULL;
|
STACK_OF(X509) *encerts = NULL, *other = NULL;
|
||||||
BIO *in = NULL, *out = NULL, *indata = NULL, *rctin = NULL;
|
BIO *in = NULL, *out = NULL, *indata = NULL, *rctin = NULL;
|
||||||
int badarg = 0;
|
int badarg = 0;
|
||||||
int flags = CMS_DETACHED;
|
int flags = CMS_DETACHED, noout = 0, print = 0;
|
||||||
|
int verify_retcode = 0;
|
||||||
int rr_print = 0, rr_allorfirst = -1;
|
int rr_print = 0, rr_allorfirst = -1;
|
||||||
STACK *rr_to = NULL, *rr_from = NULL;
|
STACK_OF(OPENSSL_STRING) *rr_to = NULL, *rr_from = NULL;
|
||||||
CMS_ReceiptRequest *rr = NULL;
|
CMS_ReceiptRequest *rr = NULL;
|
||||||
char *to = NULL, *from = NULL, *subject = NULL;
|
char *to = NULL, *from = NULL, *subject = NULL;
|
||||||
char *CAfile = NULL, *CApath = NULL;
|
char *CAfile = NULL, *CApath = NULL;
|
||||||
@@ -132,6 +136,7 @@ int MAIN(int argc, char **argv)
|
|||||||
char *engine=NULL;
|
char *engine=NULL;
|
||||||
#endif
|
#endif
|
||||||
unsigned char *secret_key = NULL, *secret_keyid = NULL;
|
unsigned char *secret_key = NULL, *secret_keyid = NULL;
|
||||||
|
unsigned char *pwri_pass = NULL, *pwri_tmp = NULL;
|
||||||
size_t secret_keylen = 0, secret_keyidlen = 0;
|
size_t secret_keylen = 0, secret_keyidlen = 0;
|
||||||
|
|
||||||
ASN1_OBJECT *econtent_type = NULL;
|
ASN1_OBJECT *econtent_type = NULL;
|
||||||
@@ -166,6 +171,8 @@ int MAIN(int argc, char **argv)
|
|||||||
operation = SMIME_RESIGN;
|
operation = SMIME_RESIGN;
|
||||||
else if (!strcmp (*args, "-verify"))
|
else if (!strcmp (*args, "-verify"))
|
||||||
operation = SMIME_VERIFY;
|
operation = SMIME_VERIFY;
|
||||||
|
else if (!strcmp (*args, "-verify_retcode"))
|
||||||
|
verify_retcode = 1;
|
||||||
else if (!strcmp(*args,"-verify_receipt"))
|
else if (!strcmp(*args,"-verify_receipt"))
|
||||||
{
|
{
|
||||||
operation = SMIME_VERIFY_RECEIPT;
|
operation = SMIME_VERIFY_RECEIPT;
|
||||||
@@ -252,21 +259,17 @@ int MAIN(int argc, char **argv)
|
|||||||
else if (!strcmp (*args, "-no_attr_verify"))
|
else if (!strcmp (*args, "-no_attr_verify"))
|
||||||
flags |= CMS_NO_ATTR_VERIFY;
|
flags |= CMS_NO_ATTR_VERIFY;
|
||||||
else if (!strcmp (*args, "-stream"))
|
else if (!strcmp (*args, "-stream"))
|
||||||
{
|
flags |= CMS_STREAM;
|
||||||
args++;
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
else if (!strcmp (*args, "-indef"))
|
else if (!strcmp (*args, "-indef"))
|
||||||
{
|
flags |= CMS_STREAM;
|
||||||
args++;
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
else if (!strcmp (*args, "-noindef"))
|
else if (!strcmp (*args, "-noindef"))
|
||||||
flags &= ~CMS_STREAM;
|
flags &= ~CMS_STREAM;
|
||||||
else if (!strcmp (*args, "-nooldmime"))
|
else if (!strcmp (*args, "-nooldmime"))
|
||||||
flags |= CMS_NOOLDMIMETYPE;
|
flags |= CMS_NOOLDMIMETYPE;
|
||||||
else if (!strcmp (*args, "-crlfeol"))
|
else if (!strcmp (*args, "-crlfeol"))
|
||||||
flags |= CMS_CRLFEOL;
|
flags |= CMS_CRLFEOL;
|
||||||
|
else if (!strcmp (*args, "-noout"))
|
||||||
|
noout = 1;
|
||||||
else if (!strcmp (*args, "-receipt_request_print"))
|
else if (!strcmp (*args, "-receipt_request_print"))
|
||||||
rr_print = 1;
|
rr_print = 1;
|
||||||
else if (!strcmp (*args, "-receipt_request_all"))
|
else if (!strcmp (*args, "-receipt_request_all"))
|
||||||
@@ -279,8 +282,8 @@ int MAIN(int argc, char **argv)
|
|||||||
goto argerr;
|
goto argerr;
|
||||||
args++;
|
args++;
|
||||||
if (!rr_from)
|
if (!rr_from)
|
||||||
rr_from = sk_new_null();
|
rr_from = sk_OPENSSL_STRING_new_null();
|
||||||
sk_push(rr_from, *args);
|
sk_OPENSSL_STRING_push(rr_from, *args);
|
||||||
}
|
}
|
||||||
else if (!strcmp(*args,"-receipt_request_to"))
|
else if (!strcmp(*args,"-receipt_request_to"))
|
||||||
{
|
{
|
||||||
@@ -288,8 +291,13 @@ int MAIN(int argc, char **argv)
|
|||||||
goto argerr;
|
goto argerr;
|
||||||
args++;
|
args++;
|
||||||
if (!rr_to)
|
if (!rr_to)
|
||||||
rr_to = sk_new_null();
|
rr_to = sk_OPENSSL_STRING_new_null();
|
||||||
sk_push(rr_to, *args);
|
sk_OPENSSL_STRING_push(rr_to, *args);
|
||||||
|
}
|
||||||
|
else if (!strcmp (*args, "-print"))
|
||||||
|
{
|
||||||
|
noout = 1;
|
||||||
|
print = 1;
|
||||||
}
|
}
|
||||||
else if (!strcmp(*args,"-secretkey"))
|
else if (!strcmp(*args,"-secretkey"))
|
||||||
{
|
{
|
||||||
@@ -319,6 +327,13 @@ int MAIN(int argc, char **argv)
|
|||||||
}
|
}
|
||||||
secret_keyidlen = (size_t)ltmp;
|
secret_keyidlen = (size_t)ltmp;
|
||||||
}
|
}
|
||||||
|
else if (!strcmp(*args,"-pwri_password"))
|
||||||
|
{
|
||||||
|
if (!args[1])
|
||||||
|
goto argerr;
|
||||||
|
args++;
|
||||||
|
pwri_pass = (unsigned char *)*args;
|
||||||
|
}
|
||||||
else if (!strcmp(*args,"-econtent_type"))
|
else if (!strcmp(*args,"-econtent_type"))
|
||||||
{
|
{
|
||||||
if (!args[1])
|
if (!args[1])
|
||||||
@@ -380,13 +395,13 @@ int MAIN(int argc, char **argv)
|
|||||||
if (signerfile)
|
if (signerfile)
|
||||||
{
|
{
|
||||||
if (!sksigners)
|
if (!sksigners)
|
||||||
sksigners = sk_new_null();
|
sksigners = sk_OPENSSL_STRING_new_null();
|
||||||
sk_push(sksigners, signerfile);
|
sk_OPENSSL_STRING_push(sksigners, signerfile);
|
||||||
if (!keyfile)
|
if (!keyfile)
|
||||||
keyfile = signerfile;
|
keyfile = signerfile;
|
||||||
if (!skkeys)
|
if (!skkeys)
|
||||||
skkeys = sk_new_null();
|
skkeys = sk_OPENSSL_STRING_new_null();
|
||||||
sk_push(skkeys, keyfile);
|
sk_OPENSSL_STRING_push(skkeys, keyfile);
|
||||||
keyfile = NULL;
|
keyfile = NULL;
|
||||||
}
|
}
|
||||||
signerfile = *++args;
|
signerfile = *++args;
|
||||||
@@ -428,12 +443,12 @@ int MAIN(int argc, char **argv)
|
|||||||
goto argerr;
|
goto argerr;
|
||||||
}
|
}
|
||||||
if (!sksigners)
|
if (!sksigners)
|
||||||
sksigners = sk_new_null();
|
sksigners = sk_OPENSSL_STRING_new_null();
|
||||||
sk_push(sksigners, signerfile);
|
sk_OPENSSL_STRING_push(sksigners, signerfile);
|
||||||
signerfile = NULL;
|
signerfile = NULL;
|
||||||
if (!skkeys)
|
if (!skkeys)
|
||||||
skkeys = sk_new_null();
|
skkeys = sk_OPENSSL_STRING_new_null();
|
||||||
sk_push(skkeys, keyfile);
|
sk_OPENSSL_STRING_push(skkeys, keyfile);
|
||||||
}
|
}
|
||||||
keyfile = *++args;
|
keyfile = *++args;
|
||||||
}
|
}
|
||||||
@@ -532,13 +547,13 @@ int MAIN(int argc, char **argv)
|
|||||||
if (signerfile)
|
if (signerfile)
|
||||||
{
|
{
|
||||||
if (!sksigners)
|
if (!sksigners)
|
||||||
sksigners = sk_new_null();
|
sksigners = sk_OPENSSL_STRING_new_null();
|
||||||
sk_push(sksigners, signerfile);
|
sk_OPENSSL_STRING_push(sksigners, signerfile);
|
||||||
if (!skkeys)
|
if (!skkeys)
|
||||||
skkeys = sk_new_null();
|
skkeys = sk_OPENSSL_STRING_new_null();
|
||||||
if (!keyfile)
|
if (!keyfile)
|
||||||
keyfile = signerfile;
|
keyfile = signerfile;
|
||||||
sk_push(skkeys, keyfile);
|
sk_OPENSSL_STRING_push(skkeys, keyfile);
|
||||||
}
|
}
|
||||||
if (!sksigners)
|
if (!sksigners)
|
||||||
{
|
{
|
||||||
@@ -552,7 +567,7 @@ int MAIN(int argc, char **argv)
|
|||||||
|
|
||||||
else if (operation == SMIME_DECRYPT)
|
else if (operation == SMIME_DECRYPT)
|
||||||
{
|
{
|
||||||
if (!recipfile && !keyfile && !secret_key)
|
if (!recipfile && !keyfile && !secret_key && !pwri_pass)
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err, "No recipient certificate or key specified\n");
|
BIO_printf(bio_err, "No recipient certificate or key specified\n");
|
||||||
badarg = 1;
|
badarg = 1;
|
||||||
@@ -560,7 +575,7 @@ int MAIN(int argc, char **argv)
|
|||||||
}
|
}
|
||||||
else if (operation == SMIME_ENCRYPT)
|
else if (operation == SMIME_ENCRYPT)
|
||||||
{
|
{
|
||||||
if (!*args && !secret_key)
|
if (!*args && !secret_key && !pwri_pass)
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err, "No recipient(s) certificate(s) specified\n");
|
BIO_printf(bio_err, "No recipient(s) certificate(s) specified\n");
|
||||||
badarg = 1;
|
badarg = 1;
|
||||||
@@ -611,7 +626,7 @@ int MAIN(int argc, char **argv)
|
|||||||
BIO_printf (bio_err, "-certsout file certificate output file\n");
|
BIO_printf (bio_err, "-certsout file certificate output file\n");
|
||||||
BIO_printf (bio_err, "-signer file signer certificate file\n");
|
BIO_printf (bio_err, "-signer file signer certificate file\n");
|
||||||
BIO_printf (bio_err, "-recip file recipient certificate file for decryption\n");
|
BIO_printf (bio_err, "-recip file recipient certificate file for decryption\n");
|
||||||
BIO_printf (bio_err, "-skeyid use subject key identifier\n");
|
BIO_printf (bio_err, "-keyid use subject key identifier\n");
|
||||||
BIO_printf (bio_err, "-in file input file\n");
|
BIO_printf (bio_err, "-in file input file\n");
|
||||||
BIO_printf (bio_err, "-inform arg input format SMIME (default), PEM or DER\n");
|
BIO_printf (bio_err, "-inform arg input format SMIME (default), PEM or DER\n");
|
||||||
BIO_printf (bio_err, "-inkey file input private key (if not signer or recipient)\n");
|
BIO_printf (bio_err, "-inkey file input private key (if not signer or recipient)\n");
|
||||||
@@ -697,7 +712,7 @@ int MAIN(int argc, char **argv)
|
|||||||
|
|
||||||
if (secret_key && !secret_keyid)
|
if (secret_key && !secret_keyid)
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err, "No sectre key id\n");
|
BIO_printf(bio_err, "No secret key id\n");
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -873,7 +888,7 @@ int MAIN(int argc, char **argv)
|
|||||||
{
|
{
|
||||||
if (!(store = setup_verify(bio_err, CAfile, CApath)))
|
if (!(store = setup_verify(bio_err, CAfile, CApath)))
|
||||||
goto end;
|
goto end;
|
||||||
X509_STORE_set_verify_cb_func(store, cms_cb);
|
X509_STORE_set_verify_cb(store, cms_cb);
|
||||||
if (vpm)
|
if (vpm)
|
||||||
X509_STORE_set1_param(store, vpm);
|
X509_STORE_set1_param(store, vpm);
|
||||||
}
|
}
|
||||||
@@ -910,6 +925,17 @@ int MAIN(int argc, char **argv)
|
|||||||
secret_key = NULL;
|
secret_key = NULL;
|
||||||
secret_keyid = NULL;
|
secret_keyid = NULL;
|
||||||
}
|
}
|
||||||
|
if (pwri_pass)
|
||||||
|
{
|
||||||
|
pwri_tmp = (unsigned char *)BUF_strdup((char *)pwri_pass);
|
||||||
|
if (!pwri_tmp)
|
||||||
|
goto end;
|
||||||
|
if (!CMS_add0_recipient_password(cms,
|
||||||
|
-1, NID_undef, NID_undef,
|
||||||
|
pwri_tmp, -1, NULL))
|
||||||
|
goto end;
|
||||||
|
pwri_tmp = NULL;
|
||||||
|
}
|
||||||
if (!(flags & CMS_STREAM))
|
if (!(flags & CMS_STREAM))
|
||||||
{
|
{
|
||||||
if (!CMS_final(cms, in, NULL, flags))
|
if (!CMS_final(cms, in, NULL, flags))
|
||||||
@@ -973,11 +999,11 @@ int MAIN(int argc, char **argv)
|
|||||||
}
|
}
|
||||||
else
|
else
|
||||||
flags |= CMS_REUSE_DIGEST;
|
flags |= CMS_REUSE_DIGEST;
|
||||||
for (i = 0; i < sk_num(sksigners); i++)
|
for (i = 0; i < sk_OPENSSL_STRING_num(sksigners); i++)
|
||||||
{
|
{
|
||||||
CMS_SignerInfo *si;
|
CMS_SignerInfo *si;
|
||||||
signerfile = sk_value(sksigners, i);
|
signerfile = sk_OPENSSL_STRING_value(sksigners, i);
|
||||||
keyfile = sk_value(skkeys, i);
|
keyfile = sk_OPENSSL_STRING_value(skkeys, i);
|
||||||
signer = load_cert(bio_err, signerfile,FORMAT_PEM, NULL,
|
signer = load_cert(bio_err, signerfile,FORMAT_PEM, NULL,
|
||||||
e, "signer certificate");
|
e, "signer certificate");
|
||||||
if (!signer)
|
if (!signer)
|
||||||
@@ -1036,6 +1062,16 @@ int MAIN(int argc, char **argv)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (pwri_pass)
|
||||||
|
{
|
||||||
|
if (!CMS_decrypt_set1_password(cms, pwri_pass, -1))
|
||||||
|
{
|
||||||
|
BIO_puts(bio_err,
|
||||||
|
"Error decrypting CMS using password\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
if (!CMS_decrypt(cms, NULL, NULL, indata, out, flags))
|
if (!CMS_decrypt(cms, NULL, NULL, indata, out, flags))
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err, "Error decrypting CMS structure\n");
|
BIO_printf(bio_err, "Error decrypting CMS structure\n");
|
||||||
@@ -1075,6 +1111,8 @@ int MAIN(int argc, char **argv)
|
|||||||
else
|
else
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err, "Verification failure\n");
|
BIO_printf(bio_err, "Verification failure\n");
|
||||||
|
if (verify_retcode)
|
||||||
|
ret = verify_err + 32;
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
if (signerfile)
|
if (signerfile)
|
||||||
@@ -1107,7 +1145,12 @@ int MAIN(int argc, char **argv)
|
|||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
if (outformat == FORMAT_SMIME)
|
if (noout)
|
||||||
|
{
|
||||||
|
if (print)
|
||||||
|
CMS_ContentInfo_print_ctx(out, cms, 0, NULL);
|
||||||
|
}
|
||||||
|
else if (outformat == FORMAT_SMIME)
|
||||||
{
|
{
|
||||||
if (to)
|
if (to)
|
||||||
BIO_printf(out, "To: %s\n", to);
|
BIO_printf(out, "To: %s\n", to);
|
||||||
@@ -1121,9 +1164,9 @@ int MAIN(int argc, char **argv)
|
|||||||
ret = SMIME_write_CMS(out, cms, in, flags);
|
ret = SMIME_write_CMS(out, cms, in, flags);
|
||||||
}
|
}
|
||||||
else if (outformat == FORMAT_PEM)
|
else if (outformat == FORMAT_PEM)
|
||||||
ret = PEM_write_bio_CMS(out, cms);
|
ret = PEM_write_bio_CMS_stream(out, cms, in, flags);
|
||||||
else if (outformat == FORMAT_ASN1)
|
else if (outformat == FORMAT_ASN1)
|
||||||
ret = i2d_CMS_bio(out,cms);
|
ret = i2d_CMS_bio_stream(out,cms, in, flags);
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err, "Bad output format for CMS file\n");
|
BIO_printf(bio_err, "Bad output format for CMS file\n");
|
||||||
@@ -1146,21 +1189,23 @@ end:
|
|||||||
if (vpm)
|
if (vpm)
|
||||||
X509_VERIFY_PARAM_free(vpm);
|
X509_VERIFY_PARAM_free(vpm);
|
||||||
if (sksigners)
|
if (sksigners)
|
||||||
sk_free(sksigners);
|
sk_OPENSSL_STRING_free(sksigners);
|
||||||
if (skkeys)
|
if (skkeys)
|
||||||
sk_free(skkeys);
|
sk_OPENSSL_STRING_free(skkeys);
|
||||||
if (secret_key)
|
if (secret_key)
|
||||||
OPENSSL_free(secret_key);
|
OPENSSL_free(secret_key);
|
||||||
if (secret_keyid)
|
if (secret_keyid)
|
||||||
OPENSSL_free(secret_keyid);
|
OPENSSL_free(secret_keyid);
|
||||||
|
if (pwri_tmp)
|
||||||
|
OPENSSL_free(pwri_tmp);
|
||||||
if (econtent_type)
|
if (econtent_type)
|
||||||
ASN1_OBJECT_free(econtent_type);
|
ASN1_OBJECT_free(econtent_type);
|
||||||
if (rr)
|
if (rr)
|
||||||
CMS_ReceiptRequest_free(rr);
|
CMS_ReceiptRequest_free(rr);
|
||||||
if (rr_to)
|
if (rr_to)
|
||||||
sk_free(rr_to);
|
sk_OPENSSL_STRING_free(rr_to);
|
||||||
if (rr_from)
|
if (rr_from)
|
||||||
sk_free(rr_from);
|
sk_OPENSSL_STRING_free(rr_from);
|
||||||
X509_STORE_free(store);
|
X509_STORE_free(store);
|
||||||
X509_free(cert);
|
X509_free(cert);
|
||||||
X509_free(recip);
|
X509_free(recip);
|
||||||
@@ -1199,6 +1244,8 @@ static int cms_cb(int ok, X509_STORE_CTX *ctx)
|
|||||||
|
|
||||||
error = X509_STORE_CTX_get_error(ctx);
|
error = X509_STORE_CTX_get_error(ctx);
|
||||||
|
|
||||||
|
verify_err = error;
|
||||||
|
|
||||||
if ((error != X509_V_ERR_NO_EXPLICIT_POLICY)
|
if ((error != X509_V_ERR_NO_EXPLICIT_POLICY)
|
||||||
&& ((error != X509_V_OK) || (ok != 2)))
|
&& ((error != X509_V_OK) || (ok != 2)))
|
||||||
return ok;
|
return ok;
|
||||||
@@ -1280,7 +1327,7 @@ static void receipt_request_print(BIO *out, CMS_ContentInfo *cms)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
static STACK_OF(GENERAL_NAMES) *make_names_stack(STACK *ns)
|
static STACK_OF(GENERAL_NAMES) *make_names_stack(STACK_OF(OPENSSL_STRING) *ns)
|
||||||
{
|
{
|
||||||
int i;
|
int i;
|
||||||
STACK_OF(GENERAL_NAMES) *ret;
|
STACK_OF(GENERAL_NAMES) *ret;
|
||||||
@@ -1289,12 +1336,10 @@ static STACK_OF(GENERAL_NAMES) *make_names_stack(STACK *ns)
|
|||||||
ret = sk_GENERAL_NAMES_new_null();
|
ret = sk_GENERAL_NAMES_new_null();
|
||||||
if (!ret)
|
if (!ret)
|
||||||
goto err;
|
goto err;
|
||||||
for (i = 0; i < sk_num(ns); i++)
|
for (i = 0; i < sk_OPENSSL_STRING_num(ns); i++)
|
||||||
{
|
{
|
||||||
CONF_VALUE cnf;
|
char *str = sk_OPENSSL_STRING_value(ns, i);
|
||||||
cnf.name = "email";
|
gen = a2i_GENERAL_NAME(NULL, NULL, NULL, GEN_EMAIL, str, 0);
|
||||||
cnf.value = sk_value(ns, i);
|
|
||||||
gen = v2i_GENERAL_NAME(NULL, NULL, &cnf);
|
|
||||||
if (!gen)
|
if (!gen)
|
||||||
goto err;
|
goto err;
|
||||||
gens = GENERAL_NAMES_new();
|
gens = GENERAL_NAMES_new();
|
||||||
@@ -1321,8 +1366,9 @@ static STACK_OF(GENERAL_NAMES) *make_names_stack(STACK *ns)
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
static CMS_ReceiptRequest *make_receipt_request(STACK *rr_to, int rr_allorfirst,
|
static CMS_ReceiptRequest *make_receipt_request(STACK_OF(OPENSSL_STRING) *rr_to,
|
||||||
STACK *rr_from)
|
int rr_allorfirst,
|
||||||
|
STACK_OF(OPENSSL_STRING) *rr_from)
|
||||||
{
|
{
|
||||||
STACK_OF(GENERAL_NAMES) *rct_to, *rct_from;
|
STACK_OF(GENERAL_NAMES) *rct_to, *rct_from;
|
||||||
CMS_ReceiptRequest *rr;
|
CMS_ReceiptRequest *rr;
|
||||||
|
|||||||
21
apps/crl.c
21
apps/crl.c
@@ -85,6 +85,7 @@ static const char *crl_usage[]={
|
|||||||
" -issuer - print issuer DN\n",
|
" -issuer - print issuer DN\n",
|
||||||
" -lastupdate - lastUpdate field\n",
|
" -lastupdate - lastUpdate field\n",
|
||||||
" -nextupdate - nextUpdate field\n",
|
" -nextupdate - nextUpdate field\n",
|
||||||
|
" -crlnumber - print CRL number\n",
|
||||||
" -noout - no CRL output\n",
|
" -noout - no CRL output\n",
|
||||||
" -CAfile name - verify CRL using certificates in file \"name\"\n",
|
" -CAfile name - verify CRL using certificates in file \"name\"\n",
|
||||||
" -CApath dir - verify CRL using certificates in \"dir\"\n",
|
" -CApath dir - verify CRL using certificates in \"dir\"\n",
|
||||||
@@ -107,7 +108,7 @@ int MAIN(int argc, char **argv)
|
|||||||
int informat,outformat;
|
int informat,outformat;
|
||||||
char *infile=NULL,*outfile=NULL;
|
char *infile=NULL,*outfile=NULL;
|
||||||
int hash=0,issuer=0,lastupdate=0,nextupdate=0,noout=0,text=0;
|
int hash=0,issuer=0,lastupdate=0,nextupdate=0,noout=0,text=0;
|
||||||
int fingerprint = 0;
|
int fingerprint = 0, crlnumber = 0;
|
||||||
const char **pp;
|
const char **pp;
|
||||||
X509_STORE *store = NULL;
|
X509_STORE *store = NULL;
|
||||||
X509_STORE_CTX ctx;
|
X509_STORE_CTX ctx;
|
||||||
@@ -206,6 +207,8 @@ int MAIN(int argc, char **argv)
|
|||||||
noout= ++num;
|
noout= ++num;
|
||||||
else if (strcmp(*argv,"-fingerprint") == 0)
|
else if (strcmp(*argv,"-fingerprint") == 0)
|
||||||
fingerprint= ++num;
|
fingerprint= ++num;
|
||||||
|
else if (strcmp(*argv,"-crlnumber") == 0)
|
||||||
|
crlnumber= ++num;
|
||||||
else if ((md_alg=EVP_get_digestbyname(*argv + 1)))
|
else if ((md_alg=EVP_get_digestbyname(*argv + 1)))
|
||||||
{
|
{
|
||||||
/* ok */
|
/* ok */
|
||||||
@@ -281,7 +284,21 @@ bad:
|
|||||||
{
|
{
|
||||||
print_name(bio_out, "issuer=", X509_CRL_get_issuer(x), nmflag);
|
print_name(bio_out, "issuer=", X509_CRL_get_issuer(x), nmflag);
|
||||||
}
|
}
|
||||||
|
if (crlnumber == i)
|
||||||
|
{
|
||||||
|
ASN1_INTEGER *crlnum;
|
||||||
|
crlnum = X509_CRL_get_ext_d2i(x, NID_crl_number,
|
||||||
|
NULL, NULL);
|
||||||
|
BIO_printf(bio_out,"crlNumber=");
|
||||||
|
if (crlnum)
|
||||||
|
{
|
||||||
|
i2a_ASN1_INTEGER(bio_out, crlnum);
|
||||||
|
ASN1_INTEGER_free(crlnum);
|
||||||
|
}
|
||||||
|
else
|
||||||
|
BIO_puts(bio_out, "<NONE>");
|
||||||
|
BIO_printf(bio_out,"\n");
|
||||||
|
}
|
||||||
if (hash == i)
|
if (hash == i)
|
||||||
{
|
{
|
||||||
BIO_printf(bio_out,"%08lx\n",
|
BIO_printf(bio_out,"%08lx\n",
|
||||||
|
|||||||
@@ -63,7 +63,6 @@
|
|||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
#include <string.h>
|
#include <string.h>
|
||||||
#include <sys/types.h>
|
#include <sys/types.h>
|
||||||
#include <sys/stat.h>
|
|
||||||
#include "apps.h"
|
#include "apps.h"
|
||||||
#include <openssl/err.h>
|
#include <openssl/err.h>
|
||||||
#include <openssl/evp.h>
|
#include <openssl/evp.h>
|
||||||
@@ -93,7 +92,7 @@ int MAIN(int argc, char **argv)
|
|||||||
PKCS7 *p7 = NULL;
|
PKCS7 *p7 = NULL;
|
||||||
PKCS7_SIGNED *p7s = NULL;
|
PKCS7_SIGNED *p7s = NULL;
|
||||||
X509_CRL *crl=NULL;
|
X509_CRL *crl=NULL;
|
||||||
STACK *certflst=NULL;
|
STACK_OF(OPENSSL_STRING) *certflst=NULL;
|
||||||
STACK_OF(X509_CRL) *crl_stack=NULL;
|
STACK_OF(X509_CRL) *crl_stack=NULL;
|
||||||
STACK_OF(X509) *cert_stack=NULL;
|
STACK_OF(X509) *cert_stack=NULL;
|
||||||
int ret=1,nocrl=0;
|
int ret=1,nocrl=0;
|
||||||
@@ -141,8 +140,8 @@ int MAIN(int argc, char **argv)
|
|||||||
else if (strcmp(*argv,"-certfile") == 0)
|
else if (strcmp(*argv,"-certfile") == 0)
|
||||||
{
|
{
|
||||||
if (--argc < 1) goto bad;
|
if (--argc < 1) goto bad;
|
||||||
if(!certflst) certflst = sk_new_null();
|
if(!certflst) certflst = sk_OPENSSL_STRING_new_null();
|
||||||
sk_push(certflst,*(++argv));
|
sk_OPENSSL_STRING_push(certflst,*(++argv));
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
@@ -227,8 +226,8 @@ bad:
|
|||||||
if ((cert_stack=sk_X509_new_null()) == NULL) goto end;
|
if ((cert_stack=sk_X509_new_null()) == NULL) goto end;
|
||||||
p7s->cert=cert_stack;
|
p7s->cert=cert_stack;
|
||||||
|
|
||||||
if(certflst) for(i = 0; i < sk_num(certflst); i++) {
|
if(certflst) for(i = 0; i < sk_OPENSSL_STRING_num(certflst); i++) {
|
||||||
certfile = sk_value(certflst, i);
|
certfile = sk_OPENSSL_STRING_value(certflst, i);
|
||||||
if (add_certs_from_file(cert_stack,certfile) < 0)
|
if (add_certs_from_file(cert_stack,certfile) < 0)
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err, "error loading certificates\n");
|
BIO_printf(bio_err, "error loading certificates\n");
|
||||||
@@ -237,7 +236,7 @@ bad:
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
sk_free(certflst);
|
sk_OPENSSL_STRING_free(certflst);
|
||||||
|
|
||||||
if (outfile == NULL)
|
if (outfile == NULL)
|
||||||
{
|
{
|
||||||
@@ -295,19 +294,12 @@ end:
|
|||||||
*/
|
*/
|
||||||
static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile)
|
static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile)
|
||||||
{
|
{
|
||||||
struct stat st;
|
|
||||||
BIO *in=NULL;
|
BIO *in=NULL;
|
||||||
int count=0;
|
int count=0;
|
||||||
int ret= -1;
|
int ret= -1;
|
||||||
STACK_OF(X509_INFO) *sk=NULL;
|
STACK_OF(X509_INFO) *sk=NULL;
|
||||||
X509_INFO *xi;
|
X509_INFO *xi;
|
||||||
|
|
||||||
if ((stat(certfile,&st) != 0))
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"unable to load the file, %s\n",certfile);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
in=BIO_new(BIO_s_file());
|
in=BIO_new(BIO_s_file());
|
||||||
if ((in == NULL) || (BIO_read_filename(in,certfile) <= 0))
|
if ((in == NULL) || (BIO_read_filename(in,certfile) <= 0))
|
||||||
{
|
{
|
||||||
|
|||||||
6
apps/demoSRP/srp_verifier.txt
Normal file
6
apps/demoSRP/srp_verifier.txt
Normal file
@@ -0,0 +1,6 @@
|
|||||||
|
# This is a file that will be filled by the openssl srp routine.
|
||||||
|
# You can initialize the file with additional groups, these are
|
||||||
|
# records starting with a I followed by the g and N values and the id.
|
||||||
|
# The exact values ... you have to dig this out from the source of srp.c
|
||||||
|
# or srp_vfy.c
|
||||||
|
# The last value of an I is used as the default group for new users.
|
||||||
1
apps/demoSRP/srp_verifier.txt.attr
Normal file
1
apps/demoSRP/srp_verifier.txt.attr
Normal file
@@ -0,0 +1 @@
|
|||||||
|
unique_subject = yes
|
||||||
323
apps/dgst.c
323
apps/dgst.c
@@ -75,21 +75,41 @@
|
|||||||
#define PROG dgst_main
|
#define PROG dgst_main
|
||||||
|
|
||||||
int do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
|
int do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
|
||||||
EVP_PKEY *key, unsigned char *sigin, int siglen, const char *title,
|
EVP_PKEY *key, unsigned char *sigin, int siglen,
|
||||||
const char *file,BIO *bmd,const char *hmac_key);
|
const char *sig_name, const char *md_name,
|
||||||
|
const char *file,BIO *bmd);
|
||||||
|
|
||||||
|
static void list_md_fn(const EVP_MD *m,
|
||||||
|
const char *from, const char *to, void *arg)
|
||||||
|
{
|
||||||
|
const char *mname;
|
||||||
|
/* Skip aliases */
|
||||||
|
if (!m)
|
||||||
|
return;
|
||||||
|
mname = OBJ_nid2ln(EVP_MD_type(m));
|
||||||
|
/* Skip shortnames */
|
||||||
|
if (strcmp(from, mname))
|
||||||
|
return;
|
||||||
|
/* Skip clones */
|
||||||
|
if (EVP_MD_flags(m) & EVP_MD_FLAG_PKEY_DIGEST)
|
||||||
|
return;
|
||||||
|
if (strchr(mname, ' '))
|
||||||
|
mname= EVP_MD_name(m);
|
||||||
|
BIO_printf(arg, "-%-14s to use the %s message digest algorithm\n",
|
||||||
|
mname, mname);
|
||||||
|
}
|
||||||
|
|
||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
ENGINE *e = NULL;
|
ENGINE *e = NULL, *impl = NULL;
|
||||||
unsigned char *buf=NULL;
|
unsigned char *buf=NULL;
|
||||||
int i,err=0;
|
int i,err=1;
|
||||||
const EVP_MD *md=NULL,*m;
|
const EVP_MD *md=NULL,*m;
|
||||||
BIO *in=NULL,*inp;
|
BIO *in=NULL,*inp;
|
||||||
BIO *bmd=NULL;
|
BIO *bmd=NULL;
|
||||||
BIO *out = NULL;
|
BIO *out = NULL;
|
||||||
const char *name;
|
|
||||||
#define PROG_NAME_SIZE 39
|
#define PROG_NAME_SIZE 39
|
||||||
char pname[PROG_NAME_SIZE+1];
|
char pname[PROG_NAME_SIZE+1];
|
||||||
int separator=0;
|
int separator=0;
|
||||||
@@ -104,8 +124,11 @@ int MAIN(int argc, char **argv)
|
|||||||
char *passargin = NULL, *passin = NULL;
|
char *passargin = NULL, *passin = NULL;
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
char *engine=NULL;
|
char *engine=NULL;
|
||||||
|
int engine_impl = 0;
|
||||||
#endif
|
#endif
|
||||||
char *hmac_key=NULL;
|
char *hmac_key=NULL;
|
||||||
|
char *mac_name=NULL;
|
||||||
|
STACK_OF(OPENSSL_STRING) *sigopts = NULL, *macopts = NULL;
|
||||||
|
|
||||||
apps_startup();
|
apps_startup();
|
||||||
|
|
||||||
@@ -133,6 +156,8 @@ int MAIN(int argc, char **argv)
|
|||||||
if ((*argv)[0] != '-') break;
|
if ((*argv)[0] != '-') break;
|
||||||
if (strcmp(*argv,"-c") == 0)
|
if (strcmp(*argv,"-c") == 0)
|
||||||
separator=1;
|
separator=1;
|
||||||
|
else if (strcmp(*argv,"-r") == 0)
|
||||||
|
separator=2;
|
||||||
else if (strcmp(*argv,"-rand") == 0)
|
else if (strcmp(*argv,"-rand") == 0)
|
||||||
{
|
{
|
||||||
if (--argc < 1) break;
|
if (--argc < 1) break;
|
||||||
@@ -182,7 +207,10 @@ int MAIN(int argc, char **argv)
|
|||||||
{
|
{
|
||||||
if (--argc < 1) break;
|
if (--argc < 1) break;
|
||||||
engine= *(++argv);
|
engine= *(++argv);
|
||||||
|
e = setup_engine(bio_err, engine, 0);
|
||||||
}
|
}
|
||||||
|
else if (strcmp(*argv,"-engine_impl") == 0)
|
||||||
|
engine_impl = 1;
|
||||||
#endif
|
#endif
|
||||||
else if (strcmp(*argv,"-hex") == 0)
|
else if (strcmp(*argv,"-hex") == 0)
|
||||||
out_bin = 0;
|
out_bin = 0;
|
||||||
@@ -198,6 +226,30 @@ int MAIN(int argc, char **argv)
|
|||||||
break;
|
break;
|
||||||
hmac_key=*++argv;
|
hmac_key=*++argv;
|
||||||
}
|
}
|
||||||
|
else if (!strcmp(*argv,"-mac"))
|
||||||
|
{
|
||||||
|
if (--argc < 1)
|
||||||
|
break;
|
||||||
|
mac_name=*++argv;
|
||||||
|
}
|
||||||
|
else if (strcmp(*argv,"-sigopt") == 0)
|
||||||
|
{
|
||||||
|
if (--argc < 1)
|
||||||
|
break;
|
||||||
|
if (!sigopts)
|
||||||
|
sigopts = sk_OPENSSL_STRING_new_null();
|
||||||
|
if (!sigopts || !sk_OPENSSL_STRING_push(sigopts, *(++argv)))
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
else if (strcmp(*argv,"-macopt") == 0)
|
||||||
|
{
|
||||||
|
if (--argc < 1)
|
||||||
|
break;
|
||||||
|
if (!macopts)
|
||||||
|
macopts = sk_OPENSSL_STRING_new_null();
|
||||||
|
if (!macopts || !sk_OPENSSL_STRING_push(macopts, *(++argv)))
|
||||||
|
break;
|
||||||
|
}
|
||||||
else if ((m=EVP_get_digestbyname(&((*argv)[1]))) != NULL)
|
else if ((m=EVP_get_digestbyname(&((*argv)[1]))) != NULL)
|
||||||
md=m;
|
md=m;
|
||||||
else
|
else
|
||||||
@@ -206,12 +258,9 @@ int MAIN(int argc, char **argv)
|
|||||||
argv++;
|
argv++;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (md == NULL)
|
|
||||||
md=EVP_md5();
|
|
||||||
|
|
||||||
if(do_verify && !sigfile) {
|
if(do_verify && !sigfile) {
|
||||||
BIO_printf(bio_err, "No signature to verify: use the -signature option\n");
|
BIO_printf(bio_err, "No signature to verify: use the -signature option\n");
|
||||||
err = 1;
|
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -220,6 +269,7 @@ int MAIN(int argc, char **argv)
|
|||||||
BIO_printf(bio_err,"unknown option '%s'\n",*argv);
|
BIO_printf(bio_err,"unknown option '%s'\n",*argv);
|
||||||
BIO_printf(bio_err,"options are\n");
|
BIO_printf(bio_err,"options are\n");
|
||||||
BIO_printf(bio_err,"-c to output the digest with separating colons\n");
|
BIO_printf(bio_err,"-c to output the digest with separating colons\n");
|
||||||
|
BIO_printf(bio_err,"-r to output the digest in coreutils format\n");
|
||||||
BIO_printf(bio_err,"-d to output debug info\n");
|
BIO_printf(bio_err,"-d to output debug info\n");
|
||||||
BIO_printf(bio_err,"-hex output as hex dump\n");
|
BIO_printf(bio_err,"-hex output as hex dump\n");
|
||||||
BIO_printf(bio_err,"-binary output in binary form\n");
|
BIO_printf(bio_err,"-binary output in binary form\n");
|
||||||
@@ -227,47 +277,23 @@ int MAIN(int argc, char **argv)
|
|||||||
BIO_printf(bio_err,"-verify file verify a signature using public key in file\n");
|
BIO_printf(bio_err,"-verify file verify a signature using public key in file\n");
|
||||||
BIO_printf(bio_err,"-prverify file verify a signature using private key in file\n");
|
BIO_printf(bio_err,"-prverify file verify a signature using private key in file\n");
|
||||||
BIO_printf(bio_err,"-keyform arg key file format (PEM or ENGINE)\n");
|
BIO_printf(bio_err,"-keyform arg key file format (PEM or ENGINE)\n");
|
||||||
|
BIO_printf(bio_err,"-out filename output to filename rather than stdout\n");
|
||||||
BIO_printf(bio_err,"-signature file signature to verify\n");
|
BIO_printf(bio_err,"-signature file signature to verify\n");
|
||||||
BIO_printf(bio_err,"-binary output in binary form\n");
|
BIO_printf(bio_err,"-sigopt nm:v signature parameter\n");
|
||||||
BIO_printf(bio_err,"-hmac key create hashed MAC with key\n");
|
BIO_printf(bio_err,"-hmac key create hashed MAC with key\n");
|
||||||
|
BIO_printf(bio_err,"-mac algorithm create MAC (not neccessarily HMAC)\n");
|
||||||
|
BIO_printf(bio_err,"-macopt nm:v MAC algorithm parameters or key\n");
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
BIO_printf(bio_err,"-engine e use engine e, possibly a hardware device.\n");
|
BIO_printf(bio_err,"-engine e use engine e, possibly a hardware device.\n");
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm (default)\n",
|
EVP_MD_do_all_sorted(list_md_fn, bio_err);
|
||||||
LN_md5,LN_md5);
|
|
||||||
BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm\n",
|
|
||||||
LN_md4,LN_md4);
|
|
||||||
BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm\n",
|
|
||||||
LN_md2,LN_md2);
|
|
||||||
#ifndef OPENSSL_NO_SHA
|
|
||||||
BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm\n",
|
|
||||||
LN_sha1,LN_sha1);
|
|
||||||
BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm\n",
|
|
||||||
LN_sha,LN_sha);
|
|
||||||
#ifndef OPENSSL_NO_SHA256
|
|
||||||
BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm\n",
|
|
||||||
LN_sha224,LN_sha224);
|
|
||||||
BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm\n",
|
|
||||||
LN_sha256,LN_sha256);
|
|
||||||
#endif
|
|
||||||
#ifndef OPENSSL_NO_SHA512
|
|
||||||
BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm\n",
|
|
||||||
LN_sha384,LN_sha384);
|
|
||||||
BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm\n",
|
|
||||||
LN_sha512,LN_sha512);
|
|
||||||
#endif
|
|
||||||
#endif
|
|
||||||
BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm\n",
|
|
||||||
LN_mdc2,LN_mdc2);
|
|
||||||
BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm\n",
|
|
||||||
LN_ripemd160,LN_ripemd160);
|
|
||||||
err=1;
|
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
e = setup_engine(bio_err, engine, 0);
|
if (engine_impl)
|
||||||
|
impl = e;
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
in=BIO_new(BIO_s_file());
|
in=BIO_new(BIO_s_file());
|
||||||
@@ -292,8 +318,10 @@ int MAIN(int argc, char **argv)
|
|||||||
}
|
}
|
||||||
|
|
||||||
if(out_bin == -1) {
|
if(out_bin == -1) {
|
||||||
if(keyfile) out_bin = 1;
|
if(keyfile)
|
||||||
else out_bin = 0;
|
out_bin = 1;
|
||||||
|
else
|
||||||
|
out_bin = 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
if(randfile)
|
if(randfile)
|
||||||
@@ -319,6 +347,11 @@ int MAIN(int argc, char **argv)
|
|||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
|
if ((!!mac_name + !!keyfile + !!hmac_key) > 1)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "MAC and Signing key cannot both be specified\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
if(keyfile)
|
if(keyfile)
|
||||||
{
|
{
|
||||||
@@ -336,6 +369,108 @@ int MAIN(int argc, char **argv)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (mac_name)
|
||||||
|
{
|
||||||
|
EVP_PKEY_CTX *mac_ctx = NULL;
|
||||||
|
int r = 0;
|
||||||
|
if (!init_gen_str(bio_err, &mac_ctx, mac_name, impl, 0))
|
||||||
|
goto mac_end;
|
||||||
|
if (macopts)
|
||||||
|
{
|
||||||
|
char *macopt;
|
||||||
|
for (i = 0; i < sk_OPENSSL_STRING_num(macopts); i++)
|
||||||
|
{
|
||||||
|
macopt = sk_OPENSSL_STRING_value(macopts, i);
|
||||||
|
if (pkey_ctrl_string(mac_ctx, macopt) <= 0)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"MAC parameter error \"%s\"\n",
|
||||||
|
macopt);
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto mac_end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (EVP_PKEY_keygen(mac_ctx, &sigkey) <= 0)
|
||||||
|
{
|
||||||
|
BIO_puts(bio_err, "Error generating key\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto mac_end;
|
||||||
|
}
|
||||||
|
r = 1;
|
||||||
|
mac_end:
|
||||||
|
if (mac_ctx)
|
||||||
|
EVP_PKEY_CTX_free(mac_ctx);
|
||||||
|
if (r == 0)
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (hmac_key)
|
||||||
|
{
|
||||||
|
sigkey = EVP_PKEY_new_mac_key(EVP_PKEY_HMAC, impl,
|
||||||
|
(unsigned char *)hmac_key, -1);
|
||||||
|
if (!sigkey)
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (sigkey)
|
||||||
|
{
|
||||||
|
EVP_MD_CTX *mctx = NULL;
|
||||||
|
EVP_PKEY_CTX *pctx = NULL;
|
||||||
|
int r;
|
||||||
|
if (!BIO_get_md_ctx(bmd, &mctx))
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Error getting context\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
if (do_verify)
|
||||||
|
r = EVP_DigestVerifyInit(mctx, &pctx, md, impl, sigkey);
|
||||||
|
else
|
||||||
|
r = EVP_DigestSignInit(mctx, &pctx, md, impl, sigkey);
|
||||||
|
if (!r)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Error setting context\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
if (sigopts)
|
||||||
|
{
|
||||||
|
char *sigopt;
|
||||||
|
for (i = 0; i < sk_OPENSSL_STRING_num(sigopts); i++)
|
||||||
|
{
|
||||||
|
sigopt = sk_OPENSSL_STRING_value(sigopts, i);
|
||||||
|
if (pkey_ctrl_string(pctx, sigopt) <= 0)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"parameter error \"%s\"\n",
|
||||||
|
sigopt);
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
/* we use md as a filter, reading from 'in' */
|
||||||
|
else
|
||||||
|
{
|
||||||
|
EVP_MD_CTX *mctx = NULL;
|
||||||
|
if (!BIO_get_md_ctx(bmd, &mctx))
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Error getting context\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
if (md == NULL)
|
||||||
|
md = EVP_md5();
|
||||||
|
if (!EVP_DigestInit_ex(mctx, md, impl))
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Error setting digest %s\n", pname);
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
if(sigfile && sigkey) {
|
if(sigfile && sigkey) {
|
||||||
BIO *sigbio;
|
BIO *sigbio;
|
||||||
sigbio = BIO_new_file(sigfile, "rb");
|
sigbio = BIO_new_file(sigfile, "rb");
|
||||||
@@ -356,54 +491,51 @@ int MAIN(int argc, char **argv)
|
|||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
/* we use md as a filter, reading from 'in' */
|
|
||||||
if (!BIO_set_md(bmd,md))
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err, "Error setting digest %s\n", pname);
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
inp=BIO_push(bmd,in);
|
inp=BIO_push(bmd,in);
|
||||||
|
|
||||||
|
if (md == NULL)
|
||||||
|
{
|
||||||
|
EVP_MD_CTX *tctx;
|
||||||
|
BIO_get_md_ctx(bmd, &tctx);
|
||||||
|
md = EVP_MD_CTX_md(tctx);
|
||||||
|
}
|
||||||
|
|
||||||
if (argc == 0)
|
if (argc == 0)
|
||||||
{
|
{
|
||||||
BIO_set_fp(in,stdin,BIO_NOCLOSE);
|
BIO_set_fp(in,stdin,BIO_NOCLOSE);
|
||||||
err=do_fp(out, buf,inp,separator, out_bin, sigkey, sigbuf,
|
err=do_fp(out, buf,inp,separator, out_bin, sigkey, sigbuf,
|
||||||
siglen,"","(stdin)",bmd,hmac_key);
|
siglen,NULL,NULL,"stdin",bmd);
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
name=OBJ_nid2sn(md->type);
|
const char *md_name = NULL, *sig_name = NULL;
|
||||||
|
if(!out_bin)
|
||||||
|
{
|
||||||
|
if (sigkey)
|
||||||
|
{
|
||||||
|
const EVP_PKEY_ASN1_METHOD *ameth;
|
||||||
|
ameth = EVP_PKEY_get0_asn1(sigkey);
|
||||||
|
if (ameth)
|
||||||
|
EVP_PKEY_asn1_get0_info(NULL, NULL,
|
||||||
|
NULL, NULL, &sig_name, ameth);
|
||||||
|
}
|
||||||
|
md_name = EVP_MD_name(md);
|
||||||
|
}
|
||||||
|
err = 0;
|
||||||
for (i=0; i<argc; i++)
|
for (i=0; i<argc; i++)
|
||||||
{
|
{
|
||||||
char *tmp,*tofree=NULL;
|
|
||||||
int r;
|
int r;
|
||||||
|
|
||||||
if (BIO_read_filename(in,argv[i]) <= 0)
|
if (BIO_read_filename(in,argv[i]) <= 0)
|
||||||
{
|
{
|
||||||
perror(argv[i]);
|
perror(argv[i]);
|
||||||
err++;
|
err++;
|
||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
if(!out_bin)
|
|
||||||
{
|
|
||||||
size_t len = strlen(name)+strlen(argv[i])+(hmac_key ? 5 : 0)+5;
|
|
||||||
tmp=tofree=OPENSSL_malloc(len);
|
|
||||||
BIO_snprintf(tmp,len,"%s%s(%s)= ",
|
|
||||||
hmac_key ? "HMAC-" : "",name,argv[i]);
|
|
||||||
}
|
|
||||||
else
|
else
|
||||||
tmp="";
|
|
||||||
r=do_fp(out,buf,inp,separator,out_bin,sigkey,sigbuf,
|
r=do_fp(out,buf,inp,separator,out_bin,sigkey,sigbuf,
|
||||||
siglen,tmp,argv[i],bmd,hmac_key);
|
siglen,sig_name,md_name, argv[i],bmd);
|
||||||
if(r)
|
if(r)
|
||||||
err=r;
|
err=r;
|
||||||
if(tofree)
|
|
||||||
OPENSSL_free(tofree);
|
|
||||||
(void)BIO_reset(bmd);
|
(void)BIO_reset(bmd);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -418,6 +550,10 @@ end:
|
|||||||
OPENSSL_free(passin);
|
OPENSSL_free(passin);
|
||||||
BIO_free_all(out);
|
BIO_free_all(out);
|
||||||
EVP_PKEY_free(sigkey);
|
EVP_PKEY_free(sigkey);
|
||||||
|
if (sigopts)
|
||||||
|
sk_OPENSSL_STRING_free(sigopts);
|
||||||
|
if (macopts)
|
||||||
|
sk_OPENSSL_STRING_free(macopts);
|
||||||
if(sigbuf) OPENSSL_free(sigbuf);
|
if(sigbuf) OPENSSL_free(sigbuf);
|
||||||
if (bmd != NULL) BIO_free(bmd);
|
if (bmd != NULL) BIO_free(bmd);
|
||||||
apps_shutdown();
|
apps_shutdown();
|
||||||
@@ -425,24 +561,13 @@ end:
|
|||||||
}
|
}
|
||||||
|
|
||||||
int do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
|
int do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
|
||||||
EVP_PKEY *key, unsigned char *sigin, int siglen, const char *title,
|
EVP_PKEY *key, unsigned char *sigin, int siglen,
|
||||||
const char *file,BIO *bmd,const char *hmac_key)
|
const char *sig_name, const char *md_name,
|
||||||
|
const char *file,BIO *bmd)
|
||||||
{
|
{
|
||||||
unsigned int len;
|
size_t len;
|
||||||
int i;
|
int i;
|
||||||
EVP_MD_CTX *md_ctx;
|
|
||||||
HMAC_CTX hmac_ctx;
|
|
||||||
|
|
||||||
if (hmac_key)
|
|
||||||
{
|
|
||||||
EVP_MD *md;
|
|
||||||
|
|
||||||
BIO_get_md(bmd,&md);
|
|
||||||
HMAC_CTX_init(&hmac_ctx);
|
|
||||||
HMAC_Init_ex(&hmac_ctx,hmac_key,strlen(hmac_key),md, NULL);
|
|
||||||
BIO_get_md_ctx(bmd,&md_ctx);
|
|
||||||
BIO_set_md_ctx(bmd,&hmac_ctx.md_ctx);
|
|
||||||
}
|
|
||||||
for (;;)
|
for (;;)
|
||||||
{
|
{
|
||||||
i=BIO_read(bp,(char *)buf,BUFSIZE);
|
i=BIO_read(bp,(char *)buf,BUFSIZE);
|
||||||
@@ -458,7 +583,7 @@ int do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
|
|||||||
{
|
{
|
||||||
EVP_MD_CTX *ctx;
|
EVP_MD_CTX *ctx;
|
||||||
BIO_get_md_ctx(bp, &ctx);
|
BIO_get_md_ctx(bp, &ctx);
|
||||||
i = EVP_VerifyFinal(ctx, sigin, (unsigned int)siglen, key);
|
i = EVP_DigestVerifyFinal(ctx, sigin, (unsigned int)siglen);
|
||||||
if(i > 0)
|
if(i > 0)
|
||||||
BIO_printf(out, "Verified OK\n");
|
BIO_printf(out, "Verified OK\n");
|
||||||
else if(i == 0)
|
else if(i == 0)
|
||||||
@@ -478,25 +603,39 @@ int do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
|
|||||||
{
|
{
|
||||||
EVP_MD_CTX *ctx;
|
EVP_MD_CTX *ctx;
|
||||||
BIO_get_md_ctx(bp, &ctx);
|
BIO_get_md_ctx(bp, &ctx);
|
||||||
if(!EVP_SignFinal(ctx, buf, (unsigned int *)&len, key))
|
len = BUFSIZE;
|
||||||
|
if(!EVP_DigestSignFinal(ctx, buf, &len))
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err, "Error Signing Data\n");
|
BIO_printf(bio_err, "Error Signing Data\n");
|
||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
else if(hmac_key)
|
|
||||||
{
|
|
||||||
HMAC_Final(&hmac_ctx,buf,&len);
|
|
||||||
HMAC_CTX_cleanup(&hmac_ctx);
|
|
||||||
}
|
|
||||||
else
|
else
|
||||||
|
{
|
||||||
len=BIO_gets(bp,(char *)buf,BUFSIZE);
|
len=BIO_gets(bp,(char *)buf,BUFSIZE);
|
||||||
|
if ((int)len <0)
|
||||||
|
{
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
if(binout) BIO_write(out, buf, len);
|
if(binout) BIO_write(out, buf, len);
|
||||||
|
else if (sep == 2)
|
||||||
|
{
|
||||||
|
for (i=0; i<(int)len; i++)
|
||||||
|
BIO_printf(out, "%02x",buf[i]);
|
||||||
|
BIO_printf(out, " *%s\n", file);
|
||||||
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
BIO_write(out,title,strlen(title));
|
if (sig_name)
|
||||||
|
BIO_printf(out, "%s-%s(%s)= ", sig_name, md_name, file);
|
||||||
|
else if (md_name)
|
||||||
|
BIO_printf(out, "%s(%s)= ", md_name, file);
|
||||||
|
else
|
||||||
|
BIO_printf(out, "(%s)= ", file);
|
||||||
for (i=0; i<(int)len; i++)
|
for (i=0; i<(int)len; i++)
|
||||||
{
|
{
|
||||||
if (sep && (i != 0))
|
if (sep && (i != 0))
|
||||||
@@ -505,10 +644,6 @@ int do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
|
|||||||
}
|
}
|
||||||
BIO_printf(out, "\n");
|
BIO_printf(out, "\n");
|
||||||
}
|
}
|
||||||
if (hmac_key)
|
|
||||||
{
|
|
||||||
BIO_set_md_ctx(bmd,md_ctx);
|
|
||||||
}
|
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
11
apps/dh.c
11
apps/dh.c
@@ -88,9 +88,6 @@ int MAIN(int, char **);
|
|||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
|
||||||
ENGINE *e = NULL;
|
|
||||||
#endif
|
|
||||||
DH *dh=NULL;
|
DH *dh=NULL;
|
||||||
int i,badops=0,text=0;
|
int i,badops=0,text=0;
|
||||||
BIO *in=NULL,*out=NULL;
|
BIO *in=NULL,*out=NULL;
|
||||||
@@ -189,7 +186,7 @@ bad:
|
|||||||
ERR_load_crypto_strings();
|
ERR_load_crypto_strings();
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
e = setup_engine(bio_err, engine, 0);
|
setup_engine(bio_err, engine, 0);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
in=BIO_new(BIO_s_file());
|
in=BIO_new(BIO_s_file());
|
||||||
@@ -349,4 +346,10 @@ end:
|
|||||||
apps_shutdown();
|
apps_shutdown();
|
||||||
OPENSSL_EXIT(ret);
|
OPENSSL_EXIT(ret);
|
||||||
}
|
}
|
||||||
|
#else /* !OPENSSL_NO_DH */
|
||||||
|
|
||||||
|
# if PEDANTIC
|
||||||
|
static void *dummy=&dummy;
|
||||||
|
# endif
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
@@ -149,9 +149,6 @@ int MAIN(int, char **);
|
|||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
|
||||||
ENGINE *e = NULL;
|
|
||||||
#endif
|
|
||||||
DH *dh=NULL;
|
DH *dh=NULL;
|
||||||
int i,badops=0,text=0;
|
int i,badops=0,text=0;
|
||||||
#ifndef OPENSSL_NO_DSA
|
#ifndef OPENSSL_NO_DSA
|
||||||
@@ -270,7 +267,7 @@ bad:
|
|||||||
ERR_load_crypto_strings();
|
ERR_load_crypto_strings();
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
e = setup_engine(bio_err, engine, 0);
|
setup_engine(bio_err, engine, 0);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
if (g && !num)
|
if (g && !num)
|
||||||
@@ -554,4 +551,10 @@ static int MS_CALLBACK dh_cb(int p, int n, BN_GENCB *cb)
|
|||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#else /* !OPENSSL_NO_DH */
|
||||||
|
|
||||||
|
# if PEDANTIC
|
||||||
|
static void *dummy=&dummy;
|
||||||
|
# endif
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
55
apps/dsa.c
55
apps/dsa.c
@@ -96,9 +96,7 @@ int MAIN(int, char **);
|
|||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
|
||||||
ENGINE *e = NULL;
|
ENGINE *e = NULL;
|
||||||
#endif
|
|
||||||
int ret=1;
|
int ret=1;
|
||||||
DSA *dsa=NULL;
|
DSA *dsa=NULL;
|
||||||
int i,badops=0;
|
int i,badops=0;
|
||||||
@@ -114,6 +112,8 @@ int MAIN(int argc, char **argv)
|
|||||||
char *passin = NULL, *passout = NULL;
|
char *passin = NULL, *passout = NULL;
|
||||||
int modulus=0;
|
int modulus=0;
|
||||||
|
|
||||||
|
int pvk_encr = 2;
|
||||||
|
|
||||||
apps_startup();
|
apps_startup();
|
||||||
|
|
||||||
if (bio_err == NULL)
|
if (bio_err == NULL)
|
||||||
@@ -173,6 +173,12 @@ int MAIN(int argc, char **argv)
|
|||||||
engine= *(++argv);
|
engine= *(++argv);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
else if (strcmp(*argv,"-pvk-strong") == 0)
|
||||||
|
pvk_encr=2;
|
||||||
|
else if (strcmp(*argv,"-pvk-weak") == 0)
|
||||||
|
pvk_encr=1;
|
||||||
|
else if (strcmp(*argv,"-pvk-none") == 0)
|
||||||
|
pvk_encr=0;
|
||||||
else if (strcmp(*argv,"-noout") == 0)
|
else if (strcmp(*argv,"-noout") == 0)
|
||||||
noout=1;
|
noout=1;
|
||||||
else if (strcmp(*argv,"-text") == 0)
|
else if (strcmp(*argv,"-text") == 0)
|
||||||
@@ -260,16 +266,22 @@ bad:
|
|||||||
}
|
}
|
||||||
|
|
||||||
BIO_printf(bio_err,"read DSA key\n");
|
BIO_printf(bio_err,"read DSA key\n");
|
||||||
if (informat == FORMAT_ASN1) {
|
|
||||||
if(pubin) dsa=d2i_DSA_PUBKEY_bio(in,NULL);
|
|
||||||
else dsa=d2i_DSAPrivateKey_bio(in,NULL);
|
|
||||||
} else if (informat == FORMAT_PEM) {
|
|
||||||
if(pubin) dsa=PEM_read_bio_DSA_PUBKEY(in,NULL, NULL, NULL);
|
|
||||||
else dsa=PEM_read_bio_DSAPrivateKey(in,NULL,NULL,passin);
|
|
||||||
} else
|
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,"bad input format specified for key\n");
|
EVP_PKEY *pkey;
|
||||||
goto end;
|
|
||||||
|
if (pubin)
|
||||||
|
pkey = load_pubkey(bio_err, infile, informat, 1,
|
||||||
|
passin, e, "Public Key");
|
||||||
|
else
|
||||||
|
pkey = load_key(bio_err, infile, informat, 1,
|
||||||
|
passin, e, "Private Key");
|
||||||
|
|
||||||
|
if (pkey)
|
||||||
|
{
|
||||||
|
dsa = EVP_PKEY_get1_DSA(pkey);
|
||||||
|
EVP_PKEY_free(pkey);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
if (dsa == NULL)
|
if (dsa == NULL)
|
||||||
{
|
{
|
||||||
@@ -322,11 +334,24 @@ bad:
|
|||||||
i=PEM_write_bio_DSA_PUBKEY(out,dsa);
|
i=PEM_write_bio_DSA_PUBKEY(out,dsa);
|
||||||
else i=PEM_write_bio_DSAPrivateKey(out,dsa,enc,
|
else i=PEM_write_bio_DSAPrivateKey(out,dsa,enc,
|
||||||
NULL,0,NULL, passout);
|
NULL,0,NULL, passout);
|
||||||
|
#if !defined(OPENSSL_NO_RSA) && !defined(OPENSSL_NO_RC4)
|
||||||
|
} else if (outformat == FORMAT_MSBLOB || outformat == FORMAT_PVK) {
|
||||||
|
EVP_PKEY *pk;
|
||||||
|
pk = EVP_PKEY_new();
|
||||||
|
EVP_PKEY_set1_DSA(pk, dsa);
|
||||||
|
if (outformat == FORMAT_PVK)
|
||||||
|
i = i2b_PVK_bio(out, pk, pvk_encr, 0, passout);
|
||||||
|
else if (pubin || pubout)
|
||||||
|
i = i2b_PublicKey_bio(out, pk);
|
||||||
|
else
|
||||||
|
i = i2b_PrivateKey_bio(out, pk);
|
||||||
|
EVP_PKEY_free(pk);
|
||||||
|
#endif
|
||||||
} else {
|
} else {
|
||||||
BIO_printf(bio_err,"bad output format specified for outfile\n");
|
BIO_printf(bio_err,"bad output format specified for outfile\n");
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
if (!i)
|
if (i <= 0)
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,"unable to write private key\n");
|
BIO_printf(bio_err,"unable to write private key\n");
|
||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
@@ -342,4 +367,10 @@ end:
|
|||||||
apps_shutdown();
|
apps_shutdown();
|
||||||
OPENSSL_EXIT(ret);
|
OPENSSL_EXIT(ret);
|
||||||
}
|
}
|
||||||
|
#else /* !OPENSSL_NO_DSA */
|
||||||
|
|
||||||
|
# if PEDANTIC
|
||||||
|
static void *dummy=&dummy;
|
||||||
|
# endif
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
@@ -111,9 +111,6 @@ int MAIN(int, char **);
|
|||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
|
||||||
ENGINE *e = NULL;
|
|
||||||
#endif
|
|
||||||
DSA *dsa=NULL;
|
DSA *dsa=NULL;
|
||||||
int i,badops=0,text=0;
|
int i,badops=0,text=0;
|
||||||
BIO *in=NULL,*out=NULL;
|
BIO *in=NULL,*out=NULL;
|
||||||
@@ -121,6 +118,7 @@ int MAIN(int argc, char **argv)
|
|||||||
char *infile,*outfile,*prog,*inrand=NULL;
|
char *infile,*outfile,*prog,*inrand=NULL;
|
||||||
int numbits= -1,num,genkey=0;
|
int numbits= -1,num,genkey=0;
|
||||||
int need_rand=0;
|
int need_rand=0;
|
||||||
|
int non_fips_allow = 0;
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
char *engine=NULL;
|
char *engine=NULL;
|
||||||
#endif
|
#endif
|
||||||
@@ -198,6 +196,8 @@ int MAIN(int argc, char **argv)
|
|||||||
}
|
}
|
||||||
else if (strcmp(*argv,"-noout") == 0)
|
else if (strcmp(*argv,"-noout") == 0)
|
||||||
noout=1;
|
noout=1;
|
||||||
|
else if (strcmp(*argv,"-non-fips-allow") == 0)
|
||||||
|
non_fips_allow = 1;
|
||||||
else if (sscanf(*argv,"%d",&num) == 1)
|
else if (sscanf(*argv,"%d",&num) == 1)
|
||||||
{
|
{
|
||||||
/* generate a key */
|
/* generate a key */
|
||||||
@@ -278,7 +278,7 @@ bad:
|
|||||||
}
|
}
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
e = setup_engine(bio_err, engine, 0);
|
setup_engine(bio_err, engine, 0);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
if (need_rand)
|
if (need_rand)
|
||||||
@@ -300,6 +300,8 @@ bad:
|
|||||||
BIO_printf(bio_err,"Error allocating DSA object\n");
|
BIO_printf(bio_err,"Error allocating DSA object\n");
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
|
if (non_fips_allow)
|
||||||
|
dsa->flags |= DSA_FLAG_NON_FIPS_ALLOW;
|
||||||
BIO_printf(bio_err,"Generating DSA parameters, %d bit long prime\n",num);
|
BIO_printf(bio_err,"Generating DSA parameters, %d bit long prime\n",num);
|
||||||
BIO_printf(bio_err,"This could take some time\n");
|
BIO_printf(bio_err,"This could take some time\n");
|
||||||
#ifdef GENCB_TEST
|
#ifdef GENCB_TEST
|
||||||
@@ -329,6 +331,7 @@ bad:
|
|||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
BIO_printf(bio_err,"Error, DSA key generation failed\n");
|
BIO_printf(bio_err,"Error, DSA key generation failed\n");
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
@@ -357,12 +360,10 @@ bad:
|
|||||||
if (C)
|
if (C)
|
||||||
{
|
{
|
||||||
unsigned char *data;
|
unsigned char *data;
|
||||||
int l,len,bits_p,bits_q,bits_g;
|
int l,len,bits_p;
|
||||||
|
|
||||||
len=BN_num_bytes(dsa->p);
|
len=BN_num_bytes(dsa->p);
|
||||||
bits_p=BN_num_bits(dsa->p);
|
bits_p=BN_num_bits(dsa->p);
|
||||||
bits_q=BN_num_bits(dsa->q);
|
|
||||||
bits_g=BN_num_bits(dsa->g);
|
|
||||||
data=(unsigned char *)OPENSSL_malloc(len+20);
|
data=(unsigned char *)OPENSSL_malloc(len+20);
|
||||||
if (data == NULL)
|
if (data == NULL)
|
||||||
{
|
{
|
||||||
@@ -434,13 +435,21 @@ bad:
|
|||||||
|
|
||||||
assert(need_rand);
|
assert(need_rand);
|
||||||
if ((dsakey=DSAparams_dup(dsa)) == NULL) goto end;
|
if ((dsakey=DSAparams_dup(dsa)) == NULL) goto end;
|
||||||
if (!DSA_generate_key(dsakey)) goto end;
|
if (non_fips_allow)
|
||||||
|
dsakey->flags |= DSA_FLAG_NON_FIPS_ALLOW;
|
||||||
|
if (!DSA_generate_key(dsakey))
|
||||||
|
{
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
DSA_free(dsakey);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
if (outformat == FORMAT_ASN1)
|
if (outformat == FORMAT_ASN1)
|
||||||
i=i2d_DSAPrivateKey_bio(out,dsakey);
|
i=i2d_DSAPrivateKey_bio(out,dsakey);
|
||||||
else if (outformat == FORMAT_PEM)
|
else if (outformat == FORMAT_PEM)
|
||||||
i=PEM_write_bio_DSAPrivateKey(out,dsakey,NULL,NULL,0,NULL,NULL);
|
i=PEM_write_bio_DSAPrivateKey(out,dsakey,NULL,NULL,0,NULL,NULL);
|
||||||
else {
|
else {
|
||||||
BIO_printf(bio_err,"bad output format specified for outfile\n");
|
BIO_printf(bio_err,"bad output format specified for outfile\n");
|
||||||
|
DSA_free(dsakey);
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
DSA_free(dsakey);
|
DSA_free(dsakey);
|
||||||
@@ -475,4 +484,10 @@ static int MS_CALLBACK dsa_cb(int p, int n, BN_GENCB *cb)
|
|||||||
#endif
|
#endif
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
#else /* !OPENSSL_NO_DSA */
|
||||||
|
|
||||||
|
# if PEDANTIC
|
||||||
|
static void *dummy=&dummy;
|
||||||
|
# endif
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
11
apps/ec.c
11
apps/ec.c
@@ -85,9 +85,6 @@ int MAIN(int, char **);
|
|||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
|
||||||
ENGINE *e = NULL;
|
|
||||||
#endif
|
|
||||||
int ret = 1;
|
int ret = 1;
|
||||||
EC_KEY *eckey = NULL;
|
EC_KEY *eckey = NULL;
|
||||||
const EC_GROUP *group;
|
const EC_GROUP *group;
|
||||||
@@ -254,7 +251,7 @@ bad:
|
|||||||
ERR_load_crypto_strings();
|
ERR_load_crypto_strings();
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
e = setup_engine(bio_err, engine, 0);
|
setup_engine(bio_err, engine, 0);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
if(!app_passwd(bio_err, passargin, passargout, &passin, &passout))
|
if(!app_passwd(bio_err, passargin, passargout, &passin, &passout))
|
||||||
@@ -400,4 +397,10 @@ end:
|
|||||||
apps_shutdown();
|
apps_shutdown();
|
||||||
OPENSSL_EXIT(ret);
|
OPENSSL_EXIT(ret);
|
||||||
}
|
}
|
||||||
|
#else /* !OPENSSL_NO_EC */
|
||||||
|
|
||||||
|
# if PEDANTIC
|
||||||
|
static void *dummy=&dummy;
|
||||||
|
# endif
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
@@ -129,9 +129,6 @@ int MAIN(int argc, char **argv)
|
|||||||
char *infile = NULL, *outfile = NULL, *prog;
|
char *infile = NULL, *outfile = NULL, *prog;
|
||||||
BIO *in = NULL, *out = NULL;
|
BIO *in = NULL, *out = NULL;
|
||||||
int informat, outformat, noout = 0, C = 0, ret = 1;
|
int informat, outformat, noout = 0, C = 0, ret = 1;
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
|
||||||
ENGINE *e = NULL;
|
|
||||||
#endif
|
|
||||||
char *engine = NULL;
|
char *engine = NULL;
|
||||||
|
|
||||||
BIGNUM *ec_p = NULL, *ec_a = NULL, *ec_b = NULL,
|
BIGNUM *ec_p = NULL, *ec_a = NULL, *ec_b = NULL,
|
||||||
@@ -340,7 +337,7 @@ bad:
|
|||||||
}
|
}
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
e = setup_engine(bio_err, engine, 0);
|
setup_engine(bio_err, engine, 0);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
if (list_curves)
|
if (list_curves)
|
||||||
@@ -725,4 +722,10 @@ static int ecparam_print_var(BIO *out, BIGNUM *in, const char *var,
|
|||||||
BIO_printf(out, "\n\t};\n\n");
|
BIO_printf(out, "\n\t};\n\n");
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
#else /* !OPENSSL_NO_EC */
|
||||||
|
|
||||||
|
# if PEDANTIC
|
||||||
|
static void *dummy=&dummy;
|
||||||
|
# endif
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
55
apps/enc.c
55
apps/enc.c
@@ -67,6 +67,7 @@
|
|||||||
#include <openssl/x509.h>
|
#include <openssl/x509.h>
|
||||||
#include <openssl/rand.h>
|
#include <openssl/rand.h>
|
||||||
#include <openssl/pem.h>
|
#include <openssl/pem.h>
|
||||||
|
#include <openssl/comp.h>
|
||||||
#include <ctype.h>
|
#include <ctype.h>
|
||||||
|
|
||||||
int set_hex(char *in,unsigned char *out,int size);
|
int set_hex(char *in,unsigned char *out,int size);
|
||||||
@@ -100,9 +101,6 @@ int MAIN(int, char **);
|
|||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
|
||||||
ENGINE *e = NULL;
|
|
||||||
#endif
|
|
||||||
static const char magic[]="Salted__";
|
static const char magic[]="Salted__";
|
||||||
char mbuf[sizeof magic-1];
|
char mbuf[sizeof magic-1];
|
||||||
char *strbuf=NULL;
|
char *strbuf=NULL;
|
||||||
@@ -116,6 +114,10 @@ int MAIN(int argc, char **argv)
|
|||||||
char *hkey=NULL,*hiv=NULL,*hsalt = NULL;
|
char *hkey=NULL,*hiv=NULL,*hsalt = NULL;
|
||||||
char *md=NULL;
|
char *md=NULL;
|
||||||
int enc=1,printkey=0,i,base64=0;
|
int enc=1,printkey=0,i,base64=0;
|
||||||
|
#ifdef ZLIB
|
||||||
|
int do_zlib=0;
|
||||||
|
BIO *bzl = NULL;
|
||||||
|
#endif
|
||||||
int debug=0,olb64=0,nosalt=0;
|
int debug=0,olb64=0,nosalt=0;
|
||||||
const EVP_CIPHER *cipher=NULL,*c;
|
const EVP_CIPHER *cipher=NULL,*c;
|
||||||
EVP_CIPHER_CTX *ctx = NULL;
|
EVP_CIPHER_CTX *ctx = NULL;
|
||||||
@@ -141,9 +143,18 @@ int MAIN(int argc, char **argv)
|
|||||||
program_name(argv[0],pname,sizeof pname);
|
program_name(argv[0],pname,sizeof pname);
|
||||||
if (strcmp(pname,"base64") == 0)
|
if (strcmp(pname,"base64") == 0)
|
||||||
base64=1;
|
base64=1;
|
||||||
|
#ifdef ZLIB
|
||||||
|
if (strcmp(pname,"zlib") == 0)
|
||||||
|
do_zlib=1;
|
||||||
|
#endif
|
||||||
|
|
||||||
cipher=EVP_get_cipherbyname(pname);
|
cipher=EVP_get_cipherbyname(pname);
|
||||||
|
#ifdef ZLIB
|
||||||
|
if (!do_zlib && !base64 && (cipher == NULL)
|
||||||
|
&& (strcmp(pname,"enc") != 0))
|
||||||
|
#else
|
||||||
if (!base64 && (cipher == NULL) && (strcmp(pname,"enc") != 0))
|
if (!base64 && (cipher == NULL) && (strcmp(pname,"enc") != 0))
|
||||||
|
#endif
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,"%s is an unknown cipher\n",pname);
|
BIO_printf(bio_err,"%s is an unknown cipher\n",pname);
|
||||||
goto bad;
|
goto bad;
|
||||||
@@ -199,6 +210,10 @@ int MAIN(int argc, char **argv)
|
|||||||
base64=1;
|
base64=1;
|
||||||
else if (strcmp(*argv,"-base64") == 0)
|
else if (strcmp(*argv,"-base64") == 0)
|
||||||
base64=1;
|
base64=1;
|
||||||
|
#ifdef ZLIB
|
||||||
|
else if (strcmp(*argv,"-z") == 0)
|
||||||
|
do_zlib=1;
|
||||||
|
#endif
|
||||||
else if (strcmp(*argv,"-bufsize") == 0)
|
else if (strcmp(*argv,"-bufsize") == 0)
|
||||||
{
|
{
|
||||||
if (--argc < 1) goto bad;
|
if (--argc < 1) goto bad;
|
||||||
@@ -225,7 +240,12 @@ int MAIN(int argc, char **argv)
|
|||||||
goto bad;
|
goto bad;
|
||||||
}
|
}
|
||||||
buf[0]='\0';
|
buf[0]='\0';
|
||||||
fgets(buf,sizeof buf,infile);
|
if (!fgets(buf,sizeof buf,infile))
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err,"unable to read key from '%s'\n",
|
||||||
|
file);
|
||||||
|
goto bad;
|
||||||
|
}
|
||||||
fclose(infile);
|
fclose(infile);
|
||||||
i=strlen(buf);
|
i=strlen(buf);
|
||||||
if ((i > 0) &&
|
if ((i > 0) &&
|
||||||
@@ -283,9 +303,11 @@ bad:
|
|||||||
BIO_printf(bio_err,"%-14s passphrase is the first line of the file argument\n","-kfile");
|
BIO_printf(bio_err,"%-14s passphrase is the first line of the file argument\n","-kfile");
|
||||||
BIO_printf(bio_err,"%-14s the next argument is the md to use to create a key\n","-md");
|
BIO_printf(bio_err,"%-14s the next argument is the md to use to create a key\n","-md");
|
||||||
BIO_printf(bio_err,"%-14s from a passphrase. One of md2, md5, sha or sha1\n","");
|
BIO_printf(bio_err,"%-14s from a passphrase. One of md2, md5, sha or sha1\n","");
|
||||||
|
BIO_printf(bio_err,"%-14s salt in hex is the next argument\n","-S");
|
||||||
BIO_printf(bio_err,"%-14s key/iv in hex is the next argument\n","-K/-iv");
|
BIO_printf(bio_err,"%-14s key/iv in hex is the next argument\n","-K/-iv");
|
||||||
BIO_printf(bio_err,"%-14s print the iv/key (then exit if -P)\n","-[pP]");
|
BIO_printf(bio_err,"%-14s print the iv/key (then exit if -P)\n","-[pP]");
|
||||||
BIO_printf(bio_err,"%-14s buffer size\n","-bufsize <n>");
|
BIO_printf(bio_err,"%-14s buffer size\n","-bufsize <n>");
|
||||||
|
BIO_printf(bio_err,"%-14s disable standard block padding\n","-nopad");
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
BIO_printf(bio_err,"%-14s use engine e, possibly a hardware device.\n","-engine e");
|
BIO_printf(bio_err,"%-14s use engine e, possibly a hardware device.\n","-engine e");
|
||||||
#endif
|
#endif
|
||||||
@@ -303,7 +325,7 @@ bad:
|
|||||||
}
|
}
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
e = setup_engine(bio_err, engine, 0);
|
setup_engine(bio_err, engine, 0);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
if (md && (dgst=EVP_get_digestbyname(md)) == NULL)
|
if (md && (dgst=EVP_get_digestbyname(md)) == NULL)
|
||||||
@@ -371,8 +393,10 @@ bad:
|
|||||||
|
|
||||||
if (inf == NULL)
|
if (inf == NULL)
|
||||||
{
|
{
|
||||||
|
#ifndef OPENSSL_NO_SETVBUF_IONBF
|
||||||
if (bufsize != NULL)
|
if (bufsize != NULL)
|
||||||
setvbuf(stdin, (char *)NULL, _IONBF, 0);
|
setvbuf(stdin, (char *)NULL, _IONBF, 0);
|
||||||
|
#endif /* ndef OPENSSL_NO_SETVBUF_IONBF */
|
||||||
BIO_set_fp(in,stdin,BIO_NOCLOSE);
|
BIO_set_fp(in,stdin,BIO_NOCLOSE);
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
@@ -425,8 +449,10 @@ bad:
|
|||||||
if (outf == NULL)
|
if (outf == NULL)
|
||||||
{
|
{
|
||||||
BIO_set_fp(out,stdout,BIO_NOCLOSE);
|
BIO_set_fp(out,stdout,BIO_NOCLOSE);
|
||||||
|
#ifndef OPENSSL_NO_SETVBUF_IONBF
|
||||||
if (bufsize != NULL)
|
if (bufsize != NULL)
|
||||||
setvbuf(stdout, (char *)NULL, _IONBF, 0);
|
setvbuf(stdout, (char *)NULL, _IONBF, 0);
|
||||||
|
#endif /* ndef OPENSSL_NO_SETVBUF_IONBF */
|
||||||
#ifdef OPENSSL_SYS_VMS
|
#ifdef OPENSSL_SYS_VMS
|
||||||
{
|
{
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
@@ -446,6 +472,19 @@ bad:
|
|||||||
rbio=in;
|
rbio=in;
|
||||||
wbio=out;
|
wbio=out;
|
||||||
|
|
||||||
|
#ifdef ZLIB
|
||||||
|
|
||||||
|
if (do_zlib)
|
||||||
|
{
|
||||||
|
if ((bzl=BIO_new(BIO_f_zlib())) == NULL)
|
||||||
|
goto end;
|
||||||
|
if (enc)
|
||||||
|
wbio=BIO_push(bzl,wbio);
|
||||||
|
else
|
||||||
|
rbio=BIO_push(bzl,rbio);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
if (base64)
|
if (base64)
|
||||||
{
|
{
|
||||||
if ((b64=BIO_new(BIO_f_base64())) == NULL)
|
if ((b64=BIO_new(BIO_f_base64())) == NULL)
|
||||||
@@ -527,7 +566,8 @@ bad:
|
|||||||
BIO_printf(bio_err,"invalid hex iv value\n");
|
BIO_printf(bio_err,"invalid hex iv value\n");
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
if ((hiv == NULL) && (str == NULL))
|
if ((hiv == NULL) && (str == NULL)
|
||||||
|
&& EVP_CIPHER_iv_length(cipher) != 0)
|
||||||
{
|
{
|
||||||
/* No IV was explicitly set and no IV was generated
|
/* No IV was explicitly set and no IV was generated
|
||||||
* during EVP_BytesToKey. Hence the IV is undefined,
|
* during EVP_BytesToKey. Hence the IV is undefined,
|
||||||
@@ -639,6 +679,9 @@ end:
|
|||||||
if (out != NULL) BIO_free_all(out);
|
if (out != NULL) BIO_free_all(out);
|
||||||
if (benc != NULL) BIO_free(benc);
|
if (benc != NULL) BIO_free(benc);
|
||||||
if (b64 != NULL) BIO_free(b64);
|
if (b64 != NULL) BIO_free(b64);
|
||||||
|
#ifdef ZLIB
|
||||||
|
if (bzl != NULL) BIO_free(bzl);
|
||||||
|
#endif
|
||||||
if(pass) OPENSSL_free(pass);
|
if(pass) OPENSSL_free(pass);
|
||||||
apps_shutdown();
|
apps_shutdown();
|
||||||
OPENSSL_EXIT(ret);
|
OPENSSL_EXIT(ret);
|
||||||
|
|||||||
@@ -56,7 +56,6 @@
|
|||||||
*
|
*
|
||||||
*/
|
*/
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
|
||||||
|
|
||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
#include <stdlib.h>
|
#include <stdlib.h>
|
||||||
@@ -66,6 +65,7 @@
|
|||||||
#endif
|
#endif
|
||||||
#include "apps.h"
|
#include "apps.h"
|
||||||
#include <openssl/err.h>
|
#include <openssl/err.h>
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
#include <openssl/engine.h>
|
#include <openssl/engine.h>
|
||||||
#include <openssl/ssl.h>
|
#include <openssl/ssl.h>
|
||||||
|
|
||||||
@@ -92,7 +92,7 @@ static const char *engine_usage[]={
|
|||||||
NULL
|
NULL
|
||||||
};
|
};
|
||||||
|
|
||||||
static void identity(void *ptr)
|
static void identity(char *ptr)
|
||||||
{
|
{
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
@@ -148,11 +148,6 @@ static int util_flags(BIO *bio_out, unsigned int flags, const char *indent)
|
|||||||
|
|
||||||
if(flags & ENGINE_CMD_FLAG_NUMERIC)
|
if(flags & ENGINE_CMD_FLAG_NUMERIC)
|
||||||
{
|
{
|
||||||
if(started)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_out, "|");
|
|
||||||
err = 1;
|
|
||||||
}
|
|
||||||
BIO_printf(bio_out, "NUMERIC");
|
BIO_printf(bio_out, "NUMERIC");
|
||||||
started = 1;
|
started = 1;
|
||||||
}
|
}
|
||||||
@@ -205,7 +200,7 @@ static int util_verbose(ENGINE *e, int verbose, BIO *bio_out, const char *indent
|
|||||||
char *desc = NULL;
|
char *desc = NULL;
|
||||||
int flags;
|
int flags;
|
||||||
int xpos = 0;
|
int xpos = 0;
|
||||||
STACK *cmds = NULL;
|
STACK_OF(OPENSSL_STRING) *cmds = NULL;
|
||||||
if(!ENGINE_ctrl(e, ENGINE_CTRL_HAS_CTRL_FUNCTION, 0, NULL, NULL) ||
|
if(!ENGINE_ctrl(e, ENGINE_CTRL_HAS_CTRL_FUNCTION, 0, NULL, NULL) ||
|
||||||
((num = ENGINE_ctrl(e, ENGINE_CTRL_GET_FIRST_CMD_TYPE,
|
((num = ENGINE_ctrl(e, ENGINE_CTRL_GET_FIRST_CMD_TYPE,
|
||||||
0, NULL, NULL)) <= 0))
|
0, NULL, NULL)) <= 0))
|
||||||
@@ -216,7 +211,7 @@ static int util_verbose(ENGINE *e, int verbose, BIO *bio_out, const char *indent
|
|||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
cmds = sk_new_null();
|
cmds = sk_OPENSSL_STRING_new_null();
|
||||||
|
|
||||||
if(!cmds)
|
if(!cmds)
|
||||||
goto err;
|
goto err;
|
||||||
@@ -252,7 +247,7 @@ static int util_verbose(ENGINE *e, int verbose, BIO *bio_out, const char *indent
|
|||||||
/* Now decide on the output */
|
/* Now decide on the output */
|
||||||
if(xpos == 0)
|
if(xpos == 0)
|
||||||
/* Do an indent */
|
/* Do an indent */
|
||||||
xpos = BIO_printf(bio_out, indent);
|
xpos = BIO_puts(bio_out, indent);
|
||||||
else
|
else
|
||||||
/* Otherwise prepend a ", " */
|
/* Otherwise prepend a ", " */
|
||||||
xpos += BIO_printf(bio_out, ", ");
|
xpos += BIO_printf(bio_out, ", ");
|
||||||
@@ -263,7 +258,7 @@ static int util_verbose(ENGINE *e, int verbose, BIO *bio_out, const char *indent
|
|||||||
(xpos + (int)strlen(name) > line_wrap))
|
(xpos + (int)strlen(name) > line_wrap))
|
||||||
{
|
{
|
||||||
BIO_printf(bio_out, "\n");
|
BIO_printf(bio_out, "\n");
|
||||||
xpos = BIO_printf(bio_out, indent);
|
xpos = BIO_puts(bio_out, indent);
|
||||||
}
|
}
|
||||||
xpos += BIO_printf(bio_out, "%s", name);
|
xpos += BIO_printf(bio_out, "%s", name);
|
||||||
}
|
}
|
||||||
@@ -289,15 +284,17 @@ static int util_verbose(ENGINE *e, int verbose, BIO *bio_out, const char *indent
|
|||||||
BIO_printf(bio_out, "\n");
|
BIO_printf(bio_out, "\n");
|
||||||
ret = 1;
|
ret = 1;
|
||||||
err:
|
err:
|
||||||
if(cmds) sk_pop_free(cmds, identity);
|
if(cmds) sk_OPENSSL_STRING_pop_free(cmds, identity);
|
||||||
if(name) OPENSSL_free(name);
|
if(name) OPENSSL_free(name);
|
||||||
if(desc) OPENSSL_free(desc);
|
if(desc) OPENSSL_free(desc);
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
static void util_do_cmds(ENGINE *e, STACK *cmds, BIO *bio_out, const char *indent)
|
static void util_do_cmds(ENGINE *e, STACK_OF(OPENSSL_STRING) *cmds,
|
||||||
|
BIO *bio_out, const char *indent)
|
||||||
{
|
{
|
||||||
int loop, res, num = sk_num(cmds);
|
int loop, res, num = sk_OPENSSL_STRING_num(cmds);
|
||||||
|
|
||||||
if(num < 0)
|
if(num < 0)
|
||||||
{
|
{
|
||||||
BIO_printf(bio_out, "[Error]: internal stack error\n");
|
BIO_printf(bio_out, "[Error]: internal stack error\n");
|
||||||
@@ -307,7 +304,7 @@ static void util_do_cmds(ENGINE *e, STACK *cmds, BIO *bio_out, const char *inden
|
|||||||
{
|
{
|
||||||
char buf[256];
|
char buf[256];
|
||||||
const char *cmd, *arg;
|
const char *cmd, *arg;
|
||||||
cmd = sk_value(cmds, loop);
|
cmd = sk_OPENSSL_STRING_value(cmds, loop);
|
||||||
res = 1; /* assume success */
|
res = 1; /* assume success */
|
||||||
/* Check if this command has no ":arg" */
|
/* Check if this command has no ":arg" */
|
||||||
if((arg = strstr(cmd, ":")) == NULL)
|
if((arg = strstr(cmd, ":")) == NULL)
|
||||||
@@ -347,9 +344,9 @@ int MAIN(int argc, char **argv)
|
|||||||
const char **pp;
|
const char **pp;
|
||||||
int verbose=0, list_cap=0, test_avail=0, test_avail_noise = 0;
|
int verbose=0, list_cap=0, test_avail=0, test_avail_noise = 0;
|
||||||
ENGINE *e;
|
ENGINE *e;
|
||||||
STACK *engines = sk_new_null();
|
STACK_OF(OPENSSL_STRING) *engines = sk_OPENSSL_STRING_new_null();
|
||||||
STACK *pre_cmds = sk_new_null();
|
STACK_OF(OPENSSL_STRING) *pre_cmds = sk_OPENSSL_STRING_new_null();
|
||||||
STACK *post_cmds = sk_new_null();
|
STACK_OF(OPENSSL_STRING) *post_cmds = sk_OPENSSL_STRING_new_null();
|
||||||
int badops=1;
|
int badops=1;
|
||||||
BIO *bio_out=NULL;
|
BIO *bio_out=NULL;
|
||||||
const char *indent = " ";
|
const char *indent = " ";
|
||||||
@@ -396,20 +393,20 @@ int MAIN(int argc, char **argv)
|
|||||||
argc--; argv++;
|
argc--; argv++;
|
||||||
if (argc == 0)
|
if (argc == 0)
|
||||||
goto skip_arg_loop;
|
goto skip_arg_loop;
|
||||||
sk_push(pre_cmds,*argv);
|
sk_OPENSSL_STRING_push(pre_cmds,*argv);
|
||||||
}
|
}
|
||||||
else if (strcmp(*argv,"-post") == 0)
|
else if (strcmp(*argv,"-post") == 0)
|
||||||
{
|
{
|
||||||
argc--; argv++;
|
argc--; argv++;
|
||||||
if (argc == 0)
|
if (argc == 0)
|
||||||
goto skip_arg_loop;
|
goto skip_arg_loop;
|
||||||
sk_push(post_cmds,*argv);
|
sk_OPENSSL_STRING_push(post_cmds,*argv);
|
||||||
}
|
}
|
||||||
else if ((strncmp(*argv,"-h",2) == 0) ||
|
else if ((strncmp(*argv,"-h",2) == 0) ||
|
||||||
(strcmp(*argv,"-?") == 0))
|
(strcmp(*argv,"-?") == 0))
|
||||||
goto skip_arg_loop;
|
goto skip_arg_loop;
|
||||||
else
|
else
|
||||||
sk_push(engines,*argv);
|
sk_OPENSSL_STRING_push(engines,*argv);
|
||||||
argc--;
|
argc--;
|
||||||
argv++;
|
argv++;
|
||||||
}
|
}
|
||||||
@@ -424,17 +421,17 @@ skip_arg_loop:
|
|||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (sk_num(engines) == 0)
|
if (sk_OPENSSL_STRING_num(engines) == 0)
|
||||||
{
|
{
|
||||||
for(e = ENGINE_get_first(); e != NULL; e = ENGINE_get_next(e))
|
for(e = ENGINE_get_first(); e != NULL; e = ENGINE_get_next(e))
|
||||||
{
|
{
|
||||||
sk_push(engines,(char *)ENGINE_get_id(e));
|
sk_OPENSSL_STRING_push(engines,(char *)ENGINE_get_id(e));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
for (i=0; i<sk_num(engines); i++)
|
for (i=0; i<sk_OPENSSL_STRING_num(engines); i++)
|
||||||
{
|
{
|
||||||
const char *id = sk_value(engines,i);
|
const char *id = sk_OPENSSL_STRING_value(engines,i);
|
||||||
if ((e = ENGINE_by_id(id)) != NULL)
|
if ((e = ENGINE_by_id(id)) != NULL)
|
||||||
{
|
{
|
||||||
const char *name = ENGINE_get_name(e);
|
const char *name = ENGINE_get_name(e);
|
||||||
@@ -454,6 +451,7 @@ skip_arg_loop:
|
|||||||
const int *nids;
|
const int *nids;
|
||||||
ENGINE_CIPHERS_PTR fn_c;
|
ENGINE_CIPHERS_PTR fn_c;
|
||||||
ENGINE_DIGESTS_PTR fn_d;
|
ENGINE_DIGESTS_PTR fn_d;
|
||||||
|
ENGINE_PKEY_METHS_PTR fn_pk;
|
||||||
|
|
||||||
if (ENGINE_get_RSA(e) != NULL
|
if (ENGINE_get_RSA(e) != NULL
|
||||||
&& !append_buf(&cap_buf, "RSA",
|
&& !append_buf(&cap_buf, "RSA",
|
||||||
@@ -492,6 +490,15 @@ skip_ciphers:
|
|||||||
goto end;
|
goto end;
|
||||||
|
|
||||||
skip_digests:
|
skip_digests:
|
||||||
|
fn_pk = ENGINE_get_pkey_meths(e);
|
||||||
|
if(!fn_pk) goto skip_pmeths;
|
||||||
|
n = fn_pk(e, NULL, &nids, 0);
|
||||||
|
for(k=0 ; k < n ; ++k)
|
||||||
|
if(!append_buf(&cap_buf,
|
||||||
|
OBJ_nid2sn(nids[k]),
|
||||||
|
&cap_size, 256))
|
||||||
|
goto end;
|
||||||
|
skip_pmeths:
|
||||||
if (cap_buf && (*cap_buf != '\0'))
|
if (cap_buf && (*cap_buf != '\0'))
|
||||||
BIO_printf(bio_out, " [%s]\n", cap_buf);
|
BIO_printf(bio_out, " [%s]\n", cap_buf);
|
||||||
|
|
||||||
@@ -526,9 +533,9 @@ skip_digests:
|
|||||||
end:
|
end:
|
||||||
|
|
||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
sk_pop_free(engines, identity);
|
sk_OPENSSL_STRING_pop_free(engines, identity);
|
||||||
sk_pop_free(pre_cmds, identity);
|
sk_OPENSSL_STRING_pop_free(pre_cmds, identity);
|
||||||
sk_pop_free(post_cmds, identity);
|
sk_OPENSSL_STRING_pop_free(post_cmds, identity);
|
||||||
if (bio_out != NULL) BIO_free_all(bio_out);
|
if (bio_out != NULL) BIO_free_all(bio_out);
|
||||||
apps_shutdown();
|
apps_shutdown();
|
||||||
OPENSSL_EXIT(ret);
|
OPENSSL_EXIT(ret);
|
||||||
|
|||||||
@@ -97,9 +97,11 @@ int MAIN(int argc, char **argv)
|
|||||||
out = BIO_push(tmpbio, out);
|
out = BIO_push(tmpbio, out);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
lh_node_stats_bio((LHASH *)ERR_get_string_table(),out);
|
lh_ERR_STRING_DATA_node_stats_bio(
|
||||||
lh_stats_bio((LHASH *)ERR_get_string_table(),out);
|
ERR_get_string_table(), out);
|
||||||
lh_node_usage_stats_bio((LHASH *)
|
lh_ERR_STRING_DATA_stats_bio(ERR_get_string_table(),
|
||||||
|
out);
|
||||||
|
lh_ERR_STRING_DATA_node_usage_stats_bio(
|
||||||
ERR_get_string_table(),out);
|
ERR_get_string_table(),out);
|
||||||
}
|
}
|
||||||
if (out != NULL) BIO_free_all(out);
|
if (out != NULL) BIO_free_all(out);
|
||||||
|
|||||||
11
apps/gendh.c
11
apps/gendh.c
@@ -89,9 +89,6 @@ int MAIN(int, char **);
|
|||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
BN_GENCB cb;
|
BN_GENCB cb;
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
|
||||||
ENGINE *e = NULL;
|
|
||||||
#endif
|
|
||||||
DH *dh=NULL;
|
DH *dh=NULL;
|
||||||
int ret=1,num=DEFBITS;
|
int ret=1,num=DEFBITS;
|
||||||
int g=2;
|
int g=2;
|
||||||
@@ -163,7 +160,7 @@ bad:
|
|||||||
}
|
}
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
e = setup_engine(bio_err, engine, 0);
|
setup_engine(bio_err, engine, 0);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
out=BIO_new(BIO_s_file());
|
out=BIO_new(BIO_s_file());
|
||||||
@@ -235,4 +232,10 @@ static int MS_CALLBACK dh_cb(int p, int n, BN_GENCB *cb)
|
|||||||
#endif
|
#endif
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
#else /* !OPENSSL_NO_DH */
|
||||||
|
|
||||||
|
# if PEDANTIC
|
||||||
|
static void *dummy=&dummy;
|
||||||
|
# endif
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
@@ -78,9 +78,6 @@ int MAIN(int, char **);
|
|||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
|
||||||
ENGINE *e = NULL;
|
|
||||||
#endif
|
|
||||||
DSA *dsa=NULL;
|
DSA *dsa=NULL;
|
||||||
int ret=1;
|
int ret=1;
|
||||||
char *outfile=NULL;
|
char *outfile=NULL;
|
||||||
@@ -206,7 +203,7 @@ bad:
|
|||||||
}
|
}
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
e = setup_engine(bio_err, engine, 0);
|
setup_engine(bio_err, engine, 0);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
if(!app_passwd(bio_err, NULL, passargout, NULL, &passout)) {
|
if(!app_passwd(bio_err, NULL, passargout, NULL, &passout)) {
|
||||||
@@ -279,4 +276,10 @@ end:
|
|||||||
apps_shutdown();
|
apps_shutdown();
|
||||||
OPENSSL_EXIT(ret);
|
OPENSSL_EXIT(ret);
|
||||||
}
|
}
|
||||||
|
#else /* !OPENSSL_NO_DSA */
|
||||||
|
|
||||||
|
# if PEDANTIC
|
||||||
|
static void *dummy=&dummy;
|
||||||
|
# endif
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
440
apps/genpkey.c
Normal file
440
apps/genpkey.c
Normal file
@@ -0,0 +1,440 @@
|
|||||||
|
/* apps/genpkey.c */
|
||||||
|
/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
|
||||||
|
* project 2006
|
||||||
|
*/
|
||||||
|
/* ====================================================================
|
||||||
|
* Copyright (c) 2006 The OpenSSL Project. All rights reserved.
|
||||||
|
*
|
||||||
|
* Redistribution and use in source and binary forms, with or without
|
||||||
|
* modification, are permitted provided that the following conditions
|
||||||
|
* are met:
|
||||||
|
*
|
||||||
|
* 1. Redistributions of source code must retain the above copyright
|
||||||
|
* notice, this list of conditions and the following disclaimer.
|
||||||
|
*
|
||||||
|
* 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
* notice, this list of conditions and the following disclaimer in
|
||||||
|
* the documentation and/or other materials provided with the
|
||||||
|
* distribution.
|
||||||
|
*
|
||||||
|
* 3. All advertising materials mentioning features or use of this
|
||||||
|
* software must display the following acknowledgment:
|
||||||
|
* "This product includes software developed by the OpenSSL Project
|
||||||
|
* for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
|
||||||
|
*
|
||||||
|
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
|
||||||
|
* endorse or promote products derived from this software without
|
||||||
|
* prior written permission. For written permission, please contact
|
||||||
|
* licensing@OpenSSL.org.
|
||||||
|
*
|
||||||
|
* 5. Products derived from this software may not be called "OpenSSL"
|
||||||
|
* nor may "OpenSSL" appear in their names without prior written
|
||||||
|
* permission of the OpenSSL Project.
|
||||||
|
*
|
||||||
|
* 6. Redistributions of any form whatsoever must retain the following
|
||||||
|
* acknowledgment:
|
||||||
|
* "This product includes software developed by the OpenSSL Project
|
||||||
|
* for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
|
||||||
|
*
|
||||||
|
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
|
||||||
|
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||||
|
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
|
||||||
|
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||||||
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
||||||
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
||||||
|
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||||
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
||||||
|
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
||||||
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
||||||
|
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
|
* ====================================================================
|
||||||
|
*
|
||||||
|
* This product includes cryptographic software written by Eric Young
|
||||||
|
* (eay@cryptsoft.com). This product includes software written by Tim
|
||||||
|
* Hudson (tjh@cryptsoft.com).
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <string.h>
|
||||||
|
#include "apps.h"
|
||||||
|
#include <openssl/pem.h>
|
||||||
|
#include <openssl/err.h>
|
||||||
|
#include <openssl/evp.h>
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
#include <openssl/engine.h>
|
||||||
|
#endif
|
||||||
|
|
||||||
|
static int init_keygen_file(BIO *err, EVP_PKEY_CTX **pctx,
|
||||||
|
const char *file, ENGINE *e);
|
||||||
|
static int genpkey_cb(EVP_PKEY_CTX *ctx);
|
||||||
|
|
||||||
|
#define PROG genpkey_main
|
||||||
|
|
||||||
|
int MAIN(int, char **);
|
||||||
|
|
||||||
|
int MAIN(int argc, char **argv)
|
||||||
|
{
|
||||||
|
ENGINE *e = NULL;
|
||||||
|
char **args, *outfile = NULL;
|
||||||
|
char *passarg = NULL;
|
||||||
|
BIO *in = NULL, *out = NULL;
|
||||||
|
const EVP_CIPHER *cipher = NULL;
|
||||||
|
int outformat;
|
||||||
|
int text = 0;
|
||||||
|
EVP_PKEY *pkey=NULL;
|
||||||
|
EVP_PKEY_CTX *ctx = NULL;
|
||||||
|
char *pass = NULL;
|
||||||
|
int badarg = 0;
|
||||||
|
int ret = 1, rv;
|
||||||
|
|
||||||
|
int do_param = 0;
|
||||||
|
|
||||||
|
if (bio_err == NULL)
|
||||||
|
bio_err = BIO_new_fp (stderr, BIO_NOCLOSE);
|
||||||
|
|
||||||
|
if (!load_config(bio_err, NULL))
|
||||||
|
goto end;
|
||||||
|
|
||||||
|
outformat=FORMAT_PEM;
|
||||||
|
|
||||||
|
ERR_load_crypto_strings();
|
||||||
|
OpenSSL_add_all_algorithms();
|
||||||
|
args = argv + 1;
|
||||||
|
while (!badarg && *args && *args[0] == '-')
|
||||||
|
{
|
||||||
|
if (!strcmp(*args,"-outform"))
|
||||||
|
{
|
||||||
|
if (args[1])
|
||||||
|
{
|
||||||
|
args++;
|
||||||
|
outformat=str2fmt(*args);
|
||||||
|
}
|
||||||
|
else badarg = 1;
|
||||||
|
}
|
||||||
|
else if (!strcmp(*args,"-pass"))
|
||||||
|
{
|
||||||
|
if (!args[1]) goto bad;
|
||||||
|
passarg= *(++args);
|
||||||
|
}
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
else if (strcmp(*args,"-engine") == 0)
|
||||||
|
{
|
||||||
|
if (!args[1])
|
||||||
|
goto bad;
|
||||||
|
e = setup_engine(bio_err, *(++args), 0);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
else if (!strcmp (*args, "-paramfile"))
|
||||||
|
{
|
||||||
|
if (!args[1])
|
||||||
|
goto bad;
|
||||||
|
args++;
|
||||||
|
if (do_param == 1)
|
||||||
|
goto bad;
|
||||||
|
if (!init_keygen_file(bio_err, &ctx, *args, e))
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
else if (!strcmp (*args, "-out"))
|
||||||
|
{
|
||||||
|
if (args[1])
|
||||||
|
{
|
||||||
|
args++;
|
||||||
|
outfile = *args;
|
||||||
|
}
|
||||||
|
else badarg = 1;
|
||||||
|
}
|
||||||
|
else if (strcmp(*args,"-algorithm") == 0)
|
||||||
|
{
|
||||||
|
if (!args[1])
|
||||||
|
goto bad;
|
||||||
|
if (!init_gen_str(bio_err, &ctx, *(++args),e, do_param))
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
else if (strcmp(*args,"-pkeyopt") == 0)
|
||||||
|
{
|
||||||
|
if (!args[1])
|
||||||
|
goto bad;
|
||||||
|
if (!ctx)
|
||||||
|
{
|
||||||
|
BIO_puts(bio_err, "No keytype specified\n");
|
||||||
|
goto bad;
|
||||||
|
}
|
||||||
|
else if (pkey_ctrl_string(ctx, *(++args)) <= 0)
|
||||||
|
{
|
||||||
|
BIO_puts(bio_err, "parameter setting error\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
else if (strcmp(*args,"-genparam") == 0)
|
||||||
|
{
|
||||||
|
if (ctx)
|
||||||
|
goto bad;
|
||||||
|
do_param = 1;
|
||||||
|
}
|
||||||
|
else if (strcmp(*args,"-text") == 0)
|
||||||
|
text=1;
|
||||||
|
else
|
||||||
|
{
|
||||||
|
cipher = EVP_get_cipherbyname(*args + 1);
|
||||||
|
if (!cipher)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Unknown cipher %s\n",
|
||||||
|
*args + 1);
|
||||||
|
badarg = 1;
|
||||||
|
}
|
||||||
|
if (do_param == 1)
|
||||||
|
badarg = 1;
|
||||||
|
}
|
||||||
|
args++;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!ctx)
|
||||||
|
badarg = 1;
|
||||||
|
|
||||||
|
if (badarg)
|
||||||
|
{
|
||||||
|
bad:
|
||||||
|
BIO_printf(bio_err, "Usage: genpkey [options]\n");
|
||||||
|
BIO_printf(bio_err, "where options may be\n");
|
||||||
|
BIO_printf(bio_err, "-out file output file\n");
|
||||||
|
BIO_printf(bio_err, "-outform X output format (DER or PEM)\n");
|
||||||
|
BIO_printf(bio_err, "-pass arg output file pass phrase source\n");
|
||||||
|
BIO_printf(bio_err, "-<cipher> use cipher <cipher> to encrypt the key\n");
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
BIO_printf(bio_err, "-engine e use engine e, possibly a hardware device.\n");
|
||||||
|
#endif
|
||||||
|
BIO_printf(bio_err, "-paramfile file parameters file\n");
|
||||||
|
BIO_printf(bio_err, "-algorithm alg the public key algorithm\n");
|
||||||
|
BIO_printf(bio_err, "-pkeyopt opt:value set the public key algorithm option <opt>\n"
|
||||||
|
" to value <value>\n");
|
||||||
|
BIO_printf(bio_err, "-genparam generate parameters, not key\n");
|
||||||
|
BIO_printf(bio_err, "-text print the in text\n");
|
||||||
|
BIO_printf(bio_err, "NB: options order may be important! See the manual page.\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!app_passwd(bio_err, passarg, NULL, &pass, NULL))
|
||||||
|
{
|
||||||
|
BIO_puts(bio_err, "Error getting password\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (outfile)
|
||||||
|
{
|
||||||
|
if (!(out = BIO_new_file (outfile, "wb")))
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"Can't open output file %s\n", outfile);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
out = BIO_new_fp (stdout, BIO_NOCLOSE);
|
||||||
|
#ifdef OPENSSL_SYS_VMS
|
||||||
|
{
|
||||||
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
|
out = BIO_push(tmpbio, out);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
}
|
||||||
|
|
||||||
|
EVP_PKEY_CTX_set_cb(ctx, genpkey_cb);
|
||||||
|
EVP_PKEY_CTX_set_app_data(ctx, bio_err);
|
||||||
|
|
||||||
|
if (do_param)
|
||||||
|
{
|
||||||
|
if (EVP_PKEY_paramgen(ctx, &pkey) <= 0)
|
||||||
|
{
|
||||||
|
BIO_puts(bio_err, "Error generating parameters\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
if (EVP_PKEY_keygen(ctx, &pkey) <= 0)
|
||||||
|
{
|
||||||
|
BIO_puts(bio_err, "Error generating key\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (do_param)
|
||||||
|
rv = PEM_write_bio_Parameters(out, pkey);
|
||||||
|
else if (outformat == FORMAT_PEM)
|
||||||
|
rv = PEM_write_bio_PrivateKey(out, pkey, cipher, NULL, 0,
|
||||||
|
NULL, pass);
|
||||||
|
else if (outformat == FORMAT_ASN1)
|
||||||
|
rv = i2d_PrivateKey_bio(out, pkey);
|
||||||
|
else
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Bad format specified for key\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (rv <= 0)
|
||||||
|
{
|
||||||
|
BIO_puts(bio_err, "Error writing key\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (text)
|
||||||
|
{
|
||||||
|
if (do_param)
|
||||||
|
rv = EVP_PKEY_print_params(out, pkey, 0, NULL);
|
||||||
|
else
|
||||||
|
rv = EVP_PKEY_print_private(out, pkey, 0, NULL);
|
||||||
|
|
||||||
|
if (rv <= 0)
|
||||||
|
{
|
||||||
|
BIO_puts(bio_err, "Error printing key\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
ret = 0;
|
||||||
|
|
||||||
|
end:
|
||||||
|
if (pkey)
|
||||||
|
EVP_PKEY_free(pkey);
|
||||||
|
if (ctx)
|
||||||
|
EVP_PKEY_CTX_free(ctx);
|
||||||
|
if (out)
|
||||||
|
BIO_free_all(out);
|
||||||
|
BIO_free(in);
|
||||||
|
if (pass)
|
||||||
|
OPENSSL_free(pass);
|
||||||
|
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int init_keygen_file(BIO *err, EVP_PKEY_CTX **pctx,
|
||||||
|
const char *file, ENGINE *e)
|
||||||
|
{
|
||||||
|
BIO *pbio;
|
||||||
|
EVP_PKEY *pkey = NULL;
|
||||||
|
EVP_PKEY_CTX *ctx = NULL;
|
||||||
|
if (*pctx)
|
||||||
|
{
|
||||||
|
BIO_puts(err, "Parameters already set!\n");
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
pbio = BIO_new_file(file, "r");
|
||||||
|
if (!pbio)
|
||||||
|
{
|
||||||
|
BIO_printf(err, "Can't open parameter file %s\n", file);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
pkey = PEM_read_bio_Parameters(pbio, NULL);
|
||||||
|
BIO_free(pbio);
|
||||||
|
|
||||||
|
if (!pkey)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Error reading parameter file %s\n", file);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
ctx = EVP_PKEY_CTX_new(pkey, e);
|
||||||
|
if (!ctx)
|
||||||
|
goto err;
|
||||||
|
if (EVP_PKEY_keygen_init(ctx) <= 0)
|
||||||
|
goto err;
|
||||||
|
EVP_PKEY_free(pkey);
|
||||||
|
*pctx = ctx;
|
||||||
|
return 1;
|
||||||
|
|
||||||
|
err:
|
||||||
|
BIO_puts(err, "Error initializing context\n");
|
||||||
|
ERR_print_errors(err);
|
||||||
|
if (ctx)
|
||||||
|
EVP_PKEY_CTX_free(ctx);
|
||||||
|
if (pkey)
|
||||||
|
EVP_PKEY_free(pkey);
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
int init_gen_str(BIO *err, EVP_PKEY_CTX **pctx,
|
||||||
|
const char *algname, ENGINE *e, int do_param)
|
||||||
|
{
|
||||||
|
EVP_PKEY_CTX *ctx = NULL;
|
||||||
|
const EVP_PKEY_ASN1_METHOD *ameth;
|
||||||
|
ENGINE *tmpeng = NULL;
|
||||||
|
int pkey_id;
|
||||||
|
|
||||||
|
if (*pctx)
|
||||||
|
{
|
||||||
|
BIO_puts(err, "Algorithm already set!\n");
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
ameth = EVP_PKEY_asn1_find_str(&tmpeng, algname, -1);
|
||||||
|
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
if (!ameth && e)
|
||||||
|
ameth = ENGINE_get_pkey_asn1_meth_str(e, algname, -1);
|
||||||
|
#endif
|
||||||
|
|
||||||
|
if (!ameth)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Algorithm %s not found\n", algname);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
ERR_clear_error();
|
||||||
|
|
||||||
|
EVP_PKEY_asn1_get0_info(&pkey_id, NULL, NULL, NULL, NULL, ameth);
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
if (tmpeng)
|
||||||
|
ENGINE_finish(tmpeng);
|
||||||
|
#endif
|
||||||
|
ctx = EVP_PKEY_CTX_new_id(pkey_id, e);
|
||||||
|
|
||||||
|
if (!ctx)
|
||||||
|
goto err;
|
||||||
|
if (do_param)
|
||||||
|
{
|
||||||
|
if (EVP_PKEY_paramgen_init(ctx) <= 0)
|
||||||
|
goto err;
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
if (EVP_PKEY_keygen_init(ctx) <= 0)
|
||||||
|
goto err;
|
||||||
|
}
|
||||||
|
|
||||||
|
*pctx = ctx;
|
||||||
|
return 1;
|
||||||
|
|
||||||
|
err:
|
||||||
|
BIO_printf(err, "Error initializing %s context\n", algname);
|
||||||
|
ERR_print_errors(err);
|
||||||
|
if (ctx)
|
||||||
|
EVP_PKEY_CTX_free(ctx);
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
static int genpkey_cb(EVP_PKEY_CTX *ctx)
|
||||||
|
{
|
||||||
|
char c='*';
|
||||||
|
BIO *b = EVP_PKEY_CTX_get_app_data(ctx);
|
||||||
|
int p;
|
||||||
|
p = EVP_PKEY_CTX_get_keygen_info(ctx, 0);
|
||||||
|
if (p == 0) c='.';
|
||||||
|
if (p == 1) c='+';
|
||||||
|
if (p == 2) c='*';
|
||||||
|
if (p == 3) c='\n';
|
||||||
|
BIO_write(b,&c,1);
|
||||||
|
(void)BIO_flush(b);
|
||||||
|
#ifdef LINT
|
||||||
|
p=n;
|
||||||
|
#endif
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
@@ -93,6 +93,7 @@ int MAIN(int argc, char **argv)
|
|||||||
ENGINE *e = NULL;
|
ENGINE *e = NULL;
|
||||||
#endif
|
#endif
|
||||||
int ret=1;
|
int ret=1;
|
||||||
|
int non_fips_allow = 0;
|
||||||
int i,num=DEFBITS;
|
int i,num=DEFBITS;
|
||||||
long l;
|
long l;
|
||||||
const EVP_CIPHER *enc=NULL;
|
const EVP_CIPHER *enc=NULL;
|
||||||
@@ -105,9 +106,9 @@ int MAIN(int argc, char **argv)
|
|||||||
char *inrand=NULL;
|
char *inrand=NULL;
|
||||||
BIO *out=NULL;
|
BIO *out=NULL;
|
||||||
BIGNUM *bn = BN_new();
|
BIGNUM *bn = BN_new();
|
||||||
RSA *rsa = RSA_new();
|
RSA *rsa = NULL;
|
||||||
|
|
||||||
if(!bn || !rsa) goto err;
|
if(!bn) goto err;
|
||||||
|
|
||||||
apps_startup();
|
apps_startup();
|
||||||
BN_GENCB_set(&cb, genrsa_cb, bio_err);
|
BN_GENCB_set(&cb, genrsa_cb, bio_err);
|
||||||
@@ -185,6 +186,8 @@ int MAIN(int argc, char **argv)
|
|||||||
if (--argc < 1) goto bad;
|
if (--argc < 1) goto bad;
|
||||||
passargout= *(++argv);
|
passargout= *(++argv);
|
||||||
}
|
}
|
||||||
|
else if (strcmp(*argv,"-non-fips-allow") == 0)
|
||||||
|
non_fips_allow = 1;
|
||||||
else
|
else
|
||||||
break;
|
break;
|
||||||
argv++;
|
argv++;
|
||||||
@@ -265,6 +268,16 @@ bad:
|
|||||||
|
|
||||||
BIO_printf(bio_err,"Generating RSA private key, %d bit long modulus\n",
|
BIO_printf(bio_err,"Generating RSA private key, %d bit long modulus\n",
|
||||||
num);
|
num);
|
||||||
|
#ifdef OPENSSL_NO_ENGINE
|
||||||
|
rsa = RSA_new();
|
||||||
|
#else
|
||||||
|
rsa = RSA_new_method(e);
|
||||||
|
#endif
|
||||||
|
if (!rsa)
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
if (non_fips_allow)
|
||||||
|
rsa->flags |= RSA_FLAG_NON_FIPS_ALLOW;
|
||||||
|
|
||||||
if(!BN_set_word(bn, f4) || !RSA_generate_key_ex(rsa, num, bn, &cb))
|
if(!BN_set_word(bn, f4) || !RSA_generate_key_ex(rsa, num, bn, &cb))
|
||||||
goto err;
|
goto err;
|
||||||
|
|||||||
107
apps/install-apps.com
Executable file
107
apps/install-apps.com
Executable file
@@ -0,0 +1,107 @@
|
|||||||
|
$! INSTALL.COM -- Installs the files in a given directory tree
|
||||||
|
$!
|
||||||
|
$! Author: Richard Levitte <richard@levitte.org>
|
||||||
|
$! Time of creation: 22-MAY-1998 10:13
|
||||||
|
$!
|
||||||
|
$! P1 root of the directory tree
|
||||||
|
$! P2 "64" for 64-bit pointers.
|
||||||
|
$!
|
||||||
|
$!
|
||||||
|
$! Announce/identify.
|
||||||
|
$!
|
||||||
|
$ proc = f$environment( "procedure")
|
||||||
|
$ write sys$output "@@@ "+ -
|
||||||
|
f$parse( proc, , , "name")+ f$parse( proc, , , "type")
|
||||||
|
$!
|
||||||
|
$ on error then goto tidy
|
||||||
|
$ on control_c then goto tidy
|
||||||
|
$!
|
||||||
|
$ if (p1 .eqs. "")
|
||||||
|
$ then
|
||||||
|
$ write sys$output "First argument missing."
|
||||||
|
$ write sys$output -
|
||||||
|
"It should be the directory where you want things installed."
|
||||||
|
$ exit
|
||||||
|
$ endif
|
||||||
|
$!
|
||||||
|
$ if (f$getsyi("cpu") .lt. 128)
|
||||||
|
$ then
|
||||||
|
$ arch = "VAX"
|
||||||
|
$ else
|
||||||
|
$ arch = f$edit( f$getsyi( "arch_name"), "upcase")
|
||||||
|
$ if (arch .eqs. "") then arch = "UNK"
|
||||||
|
$ endif
|
||||||
|
$!
|
||||||
|
$ archd = arch
|
||||||
|
$!
|
||||||
|
$ if (p2 .nes. "")
|
||||||
|
$ then
|
||||||
|
$ if (p2 .eqs. "64")
|
||||||
|
$ then
|
||||||
|
$ archd = arch+ "_64"
|
||||||
|
$ else
|
||||||
|
$ if (p2 .nes. "32")
|
||||||
|
$ then
|
||||||
|
$ write sys$output "Second argument invalid."
|
||||||
|
$ write sys$output "It should be "32", "64", or nothing."
|
||||||
|
$ exit
|
||||||
|
$ endif
|
||||||
|
$ endif
|
||||||
|
$ endif
|
||||||
|
$!
|
||||||
|
$ root = f$parse( p1, "[]A.;0", , , "syntax_only, no_conceal") - "A.;0"
|
||||||
|
$ root_dev = f$parse(root,,,"device","syntax_only")
|
||||||
|
$ root_dir = f$parse(root,,,"directory","syntax_only") - -
|
||||||
|
"[000000." - "][" - "[" - "]"
|
||||||
|
$ root = root_dev + "[" + root_dir
|
||||||
|
$!
|
||||||
|
$ define /nolog wrk_sslroot 'root'.] /trans=conc
|
||||||
|
$ define /nolog wrk_sslxexe wrk_sslroot:['archd'_exe]
|
||||||
|
$!
|
||||||
|
$ if f$parse("wrk_sslroot:[000000]") .eqs. "" then -
|
||||||
|
create /directory /log wrk_sslroot:[000000]
|
||||||
|
$ if f$parse("wrk_sslxexe:") .eqs. "" then -
|
||||||
|
create /directory /log wrk_sslxexe:
|
||||||
|
$!
|
||||||
|
$ exe := openssl
|
||||||
|
$!
|
||||||
|
$ exe_dir := [-.'archd'.exe.apps]
|
||||||
|
$!
|
||||||
|
$! Executables.
|
||||||
|
$!
|
||||||
|
$ i = 0
|
||||||
|
$ loop_exe:
|
||||||
|
$ e = f$edit(f$element( i, ",", exe), "trim")
|
||||||
|
$ i = i + 1
|
||||||
|
$ if e .eqs. "," then goto loop_exe_end
|
||||||
|
$ set noon
|
||||||
|
$ file = exe_dir+ e+ ".exe"
|
||||||
|
$ if f$search( file) .nes. ""
|
||||||
|
$ then
|
||||||
|
$ copy /protection = w:re 'file' wrk_sslxexe: /log
|
||||||
|
$ endif
|
||||||
|
$ set on
|
||||||
|
$ goto loop_exe
|
||||||
|
$ loop_exe_end:
|
||||||
|
$!
|
||||||
|
$! Miscellaneous.
|
||||||
|
$!
|
||||||
|
$ set noon
|
||||||
|
$ copy /protection = w:re ca.com wrk_sslxexe:ca.com /log
|
||||||
|
$ copy /protection = w:re openssl-vms.cnf wrk_sslroot:[000000]openssl.cnf /log
|
||||||
|
$ set on
|
||||||
|
$!
|
||||||
|
$ tidy:
|
||||||
|
$!
|
||||||
|
$ call deass wrk_sslroot
|
||||||
|
$ call deass wrk_sslxexe
|
||||||
|
$!
|
||||||
|
$ exit
|
||||||
|
$!
|
||||||
|
$ deass: subroutine
|
||||||
|
$ if (f$trnlnm( p1, "LNM$PROCESS") .nes. "")
|
||||||
|
$ then
|
||||||
|
$ deassign /process 'p1'
|
||||||
|
$ endif
|
||||||
|
$ endsubroutine
|
||||||
|
$!
|
||||||
@@ -1,69 +0,0 @@
|
|||||||
$! INSTALL.COM -- Installs the files in a given directory tree
|
|
||||||
$!
|
|
||||||
$! Author: Richard Levitte <richard@levitte.org>
|
|
||||||
$! Time of creation: 22-MAY-1998 10:13
|
|
||||||
$!
|
|
||||||
$! P1 root of the directory tree
|
|
||||||
$!
|
|
||||||
$ IF P1 .EQS. ""
|
|
||||||
$ THEN
|
|
||||||
$ WRITE SYS$OUTPUT "First argument missing."
|
|
||||||
$ WRITE SYS$OUTPUT "Should be the directory where you want things installed."
|
|
||||||
$ EXIT
|
|
||||||
$ ENDIF
|
|
||||||
$
|
|
||||||
$ ROOT = F$PARSE(P1,"[]A.;0",,,"SYNTAX_ONLY,NO_CONCEAL") - "A.;0"
|
|
||||||
$ ROOT_DEV = F$PARSE(ROOT,,,"DEVICE","SYNTAX_ONLY")
|
|
||||||
$ ROOT_DIR = F$PARSE(ROOT,,,"DIRECTORY","SYNTAX_ONLY") -
|
|
||||||
- "[000000." - "][" - "[" - "]"
|
|
||||||
$ ROOT = ROOT_DEV + "[" + ROOT_DIR
|
|
||||||
$
|
|
||||||
$ DEFINE/NOLOG WRK_SSLROOT 'ROOT'.] /TRANS=CONC
|
|
||||||
$ DEFINE/NOLOG WRK_SSLVEXE WRK_SSLROOT:[VAX_EXE]
|
|
||||||
$ DEFINE/NOLOG WRK_SSLAEXE WRK_SSLROOT:[ALPHA_EXE]
|
|
||||||
$ DEFINE/NOLOG WRK_SSLLIB WRK_SSLROOT:[LIB]
|
|
||||||
$
|
|
||||||
$ IF F$PARSE("WRK_SSLROOT:[000000]") .EQS. "" THEN -
|
|
||||||
CREATE/DIR/LOG WRK_SSLROOT:[000000]
|
|
||||||
$ IF F$PARSE("WRK_SSLVEXE:") .EQS. "" THEN -
|
|
||||||
CREATE/DIR/LOG WRK_SSLVEXE:
|
|
||||||
$ IF F$PARSE("WRK_SSLAEXE:") .EQS. "" THEN -
|
|
||||||
CREATE/DIR/LOG WRK_SSLAEXE:
|
|
||||||
$ IF F$PARSE("WRK_SSLLIB:") .EQS. "" THEN -
|
|
||||||
CREATE/DIR/LOG WRK_SSLLIB:
|
|
||||||
$
|
|
||||||
$ EXE := openssl
|
|
||||||
$
|
|
||||||
$ VEXE_DIR := [-.VAX.EXE.APPS]
|
|
||||||
$ AEXE_DIR := [-.AXP.EXE.APPS]
|
|
||||||
$
|
|
||||||
$ I = 0
|
|
||||||
$ LOOP_EXE:
|
|
||||||
$ E = F$EDIT(F$ELEMENT(I, ",", EXE),"TRIM")
|
|
||||||
$ I = I + 1
|
|
||||||
$ IF E .EQS. "," THEN GOTO LOOP_EXE_END
|
|
||||||
$ SET NOON
|
|
||||||
$ IF F$SEARCH(VEXE_DIR+E+".EXE") .NES. ""
|
|
||||||
$ THEN
|
|
||||||
$ COPY 'VEXE_DIR''E'.EXE WRK_SSLVEXE:'E'.EXE/log
|
|
||||||
$ SET FILE/PROT=W:RE WRK_SSLVEXE:'E'.EXE
|
|
||||||
$ ENDIF
|
|
||||||
$ IF F$SEARCH(AEXE_DIR+E+".EXE") .NES. ""
|
|
||||||
$ THEN
|
|
||||||
$ COPY 'AEXE_DIR''E'.EXE WRK_SSLAEXE:'E'.EXE/log
|
|
||||||
$ SET FILE/PROT=W:RE WRK_SSLAEXE:'E'.EXE
|
|
||||||
$ ENDIF
|
|
||||||
$ SET ON
|
|
||||||
$ GOTO LOOP_EXE
|
|
||||||
$ LOOP_EXE_END:
|
|
||||||
$
|
|
||||||
$ SET NOON
|
|
||||||
$ COPY CA.COM WRK_SSLAEXE:CA.COM/LOG
|
|
||||||
$ SET FILE/PROT=W:RE WRK_SSLAEXE:CA.COM
|
|
||||||
$ COPY CA.COM WRK_SSLVEXE:CA.COM/LOG
|
|
||||||
$ SET FILE/PROT=W:RE WRK_SSLVEXE:CA.COM
|
|
||||||
$ COPY OPENSSL-VMS.CNF WRK_SSLROOT:[000000]OPENSSL.CNF/LOG
|
|
||||||
$ SET FILE/PROT=W:R WRK_SSLROOT:[000000]OPENSSL.CNF
|
|
||||||
$ SET ON
|
|
||||||
$
|
|
||||||
$ EXIT
|
|
||||||
@@ -6,11 +6,12 @@ $! A-Com Computing, Inc.
|
|||||||
$! byer@mail.all-net.net
|
$! byer@mail.all-net.net
|
||||||
$!
|
$!
|
||||||
$! Changes by Richard Levitte <richard@levitte.org>
|
$! Changes by Richard Levitte <richard@levitte.org>
|
||||||
|
$! Zoltan Arpadffy <zoli@polarhome.com>
|
||||||
$!
|
$!
|
||||||
$! This command files compiles and creates all the various different
|
$! This command files compiles and creates all the various different
|
||||||
$! "application" programs for the different types of encryption for OpenSSL.
|
$! "application" programs for the different types of encryption for OpenSSL.
|
||||||
$! The EXE's are placed in the directory [.xxx.EXE.APPS] where "xxx" denotes
|
$! The EXE's are placed in the directory [.xxx.EXE.APPS] where "xxx" denotes
|
||||||
$! either AXP or VAX depending on your machine architecture.
|
$! ALPHA, IA64 or VAX, depending on your machine architecture.
|
||||||
$!
|
$!
|
||||||
$! It was written so it would try to determine what "C" compiler to
|
$! It was written so it would try to determine what "C" compiler to
|
||||||
$! use or you can specify which "C" compiler to use.
|
$! use or you can specify which "C" compiler to use.
|
||||||
@@ -24,7 +25,7 @@ $! VAXC For VAX C.
|
|||||||
$! DECC For DEC C.
|
$! DECC For DEC C.
|
||||||
$! GNUC For GNU C.
|
$! GNUC For GNU C.
|
||||||
$!
|
$!
|
||||||
$! If you don't speficy a compiler, it will try to determine which
|
$! If you don't specify a compiler, it will try to determine which
|
||||||
$! "C" compiler to use.
|
$! "C" compiler to use.
|
||||||
$!
|
$!
|
||||||
$! P3, if defined, sets a TCP/IP library to use, through one of the following
|
$! P3, if defined, sets a TCP/IP library to use, through one of the following
|
||||||
@@ -38,64 +39,105 @@ $! P4, if defined, sets a compiler thread NOT needed on OpenVMS 7.1 (and up)
|
|||||||
$!
|
$!
|
||||||
$! P5, if defined, sets a choice of programs to compile.
|
$! P5, if defined, sets a choice of programs to compile.
|
||||||
$!
|
$!
|
||||||
|
$! P6, if defined, specifies the C pointer size. Ignored on VAX.
|
||||||
|
$! ("64=ARGV" gives more efficient code with HP C V7.3 or newer.)
|
||||||
|
$! Supported values are:
|
||||||
|
$!
|
||||||
|
$! "" Compile with default (/NOPOINTER_SIZE)
|
||||||
|
$! 32 Compile with /POINTER_SIZE=32 (SHORT)
|
||||||
|
$! 64 Compile with /POINTER_SIZE=64[=ARGV] (LONG[=ARGV])
|
||||||
|
$! (Automatically select ARGV if compiler supports it.)
|
||||||
|
$! 64= Compile with /POINTER_SIZE=64 (LONG).
|
||||||
|
$! 64=ARGV Compile with /POINTER_SIZE=64=ARGV (LONG=ARGV).
|
||||||
|
$!
|
||||||
|
$! P7, if defined, specifies a directory where ZLIB files (zlib.h,
|
||||||
|
$! libz.olb) may be found. Optionally, a non-default object library
|
||||||
|
$! name may be included ("dev:[dir]libz_64.olb", for example).
|
||||||
|
$!
|
||||||
|
$!
|
||||||
|
$! Announce/identify.
|
||||||
|
$!
|
||||||
|
$ proc = f$environment( "procedure")
|
||||||
|
$ write sys$output "@@@ "+ -
|
||||||
|
f$parse( proc, , , "name")+ f$parse( proc, , , "type")
|
||||||
|
$!
|
||||||
|
$ on control_c then goto exit
|
||||||
$!
|
$!
|
||||||
$! Define A TCP/IP Library That We Will Need To Link To.
|
$! Define A TCP/IP Library That We Will Need To Link To.
|
||||||
$! (That Is, If We Need To Link To One.)
|
$! (That Is, If We Need To Link To One.)
|
||||||
$!
|
$!
|
||||||
$ TCPIP_LIB = ""
|
$ TCPIP_LIB = ""
|
||||||
|
$ ZLIB_LIB = ""
|
||||||
$!
|
$!
|
||||||
$! Check What Architecture We Are Using.
|
$! Check What Architecture We Are Using.
|
||||||
$!
|
$!
|
||||||
$ IF (F$GETSYI("CPU").GE.128)
|
$ IF (F$GETSYI("CPU").LT.128)
|
||||||
$ THEN
|
$ THEN
|
||||||
$!
|
$!
|
||||||
$! The Architecture Is AXP.
|
$! The Architecture Is VAX.
|
||||||
$!
|
$!
|
||||||
$ ARCH := AXP
|
$ ARCH = "VAX"
|
||||||
$!
|
$!
|
||||||
$! Else...
|
$! Else...
|
||||||
$!
|
$!
|
||||||
$ ELSE
|
$ ELSE
|
||||||
$!
|
$!
|
||||||
$! The Architecture Is VAX.
|
$! The Architecture Is Alpha, IA64 or whatever comes in the future.
|
||||||
$!
|
$!
|
||||||
$ ARCH := VAX
|
$ ARCH = F$EDIT( F$GETSYI( "ARCH_NAME"), "UPCASE")
|
||||||
|
$ IF (ARCH .EQS. "") THEN ARCH = "UNK"
|
||||||
$!
|
$!
|
||||||
$! End The Architecture Check.
|
$! End The Architecture Check.
|
||||||
$!
|
$!
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$!
|
$!
|
||||||
|
$ ARCHD = ARCH
|
||||||
|
$ LIB32 = "32"
|
||||||
|
$ OPT_FILE = ""
|
||||||
|
$ POINTER_SIZE = ""
|
||||||
|
$!
|
||||||
$! Define what programs should be compiled
|
$! Define what programs should be compiled
|
||||||
$!
|
$!
|
||||||
$ PROGRAMS := OPENSSL
|
$ PROGRAMS := OPENSSL
|
||||||
$!$ PROGRAMS := VERIFY,ASN1PARS,REQ,DGST,DH,ENC,PASSWD,GENDH,ERRSTR,CA,CRL,-
|
|
||||||
$! RSA,DSA,DSAPARAM,-
|
|
||||||
$! X509,GENRSA,GENDSA,S_SERVER,S_CLIENT,SPEED,-
|
|
||||||
$! S_TIME,VERSION,PKCS7,CRL2P7,SESS_ID,CIPHERS,NSEQ,
|
|
||||||
$!
|
$!
|
||||||
$! Check To Make Sure We Have Valid Command Line Parameters.
|
$! Check To Make Sure We Have Valid Command Line Parameters.
|
||||||
$!
|
$!
|
||||||
$ GOSUB CHECK_OPTIONS
|
$ GOSUB CHECK_OPTIONS
|
||||||
$!
|
$!
|
||||||
|
$! Define The CRYPTO Library.
|
||||||
|
$!
|
||||||
|
$ CRYPTO_LIB := SYS$DISK:[-.'ARCHD'.EXE.CRYPTO]SSL_LIBCRYPTO'LIB32'.OLB
|
||||||
|
$!
|
||||||
|
$! Define The SSL Library.
|
||||||
|
$!
|
||||||
|
$ SSL_LIB := SYS$DISK:[-.'ARCHD'.EXE.SSL]SSL_LIBSSL'LIB32'.OLB
|
||||||
|
$!
|
||||||
|
$! Define The OBJ and EXE Directories.
|
||||||
|
$!
|
||||||
|
$ OBJ_DIR := SYS$DISK:[-.'ARCHD'.OBJ.APPS]
|
||||||
|
$ EXE_DIR := SYS$DISK:[-.'ARCHD'.EXE.APPS]
|
||||||
|
$!
|
||||||
|
$! Specify the destination directory in any /MAP option.
|
||||||
|
$!
|
||||||
|
$ if (LINKMAP .eqs. "MAP")
|
||||||
|
$ then
|
||||||
|
$ LINKMAP = LINKMAP+ "=''EXE_DIR'"
|
||||||
|
$ endif
|
||||||
|
$!
|
||||||
|
$! Add the location prefix to the linker options file name.
|
||||||
|
$!
|
||||||
|
$ if (OPT_FILE .nes. "")
|
||||||
|
$ then
|
||||||
|
$ OPT_FILE = EXE_DIR+ OPT_FILE
|
||||||
|
$ endif
|
||||||
|
$!
|
||||||
$! Initialise logical names and such
|
$! Initialise logical names and such
|
||||||
$!
|
$!
|
||||||
$ GOSUB INITIALISE
|
$ GOSUB INITIALISE
|
||||||
$!
|
$!
|
||||||
$! Tell The User What Kind of Machine We Run On.
|
$! Tell The User What Kind of Machine We Run On.
|
||||||
$!
|
$!
|
||||||
$ WRITE SYS$OUTPUT "Compiling On A ",ARCH," Machine."
|
$ WRITE SYS$OUTPUT "Host system architecture: ''ARCHD'"
|
||||||
$!
|
|
||||||
$! Define The CRYPTO Library.
|
|
||||||
$!
|
|
||||||
$ CRYPTO_LIB := SYS$DISK:[-.'ARCH'.EXE.CRYPTO]LIBCRYPTO.OLB
|
|
||||||
$!
|
|
||||||
$! Define The SSL Library.
|
|
||||||
$!
|
|
||||||
$ SSL_LIB := SYS$DISK:[-.'ARCH'.EXE.SSL]LIBSSL.OLB
|
|
||||||
$!
|
|
||||||
$! Define The OBJ Directory.
|
|
||||||
$!
|
|
||||||
$ OBJ_DIR := SYS$DISK:[-.'ARCH'.OBJ.APPS]
|
|
||||||
$!
|
$!
|
||||||
$! Check To See If The OBJ Directory Exists.
|
$! Check To See If The OBJ Directory Exists.
|
||||||
$!
|
$!
|
||||||
@@ -110,10 +152,6 @@ $! End The OBJ Directory Check.
|
|||||||
$!
|
$!
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$!
|
$!
|
||||||
$! Define The EXE Directory.
|
|
||||||
$!
|
|
||||||
$ EXE_DIR := SYS$DISK:[-.'ARCH'.EXE.APPS]
|
|
||||||
$!
|
|
||||||
$! Check To See If The EXE Directory Exists.
|
$! Check To See If The EXE Directory Exists.
|
||||||
$!
|
$!
|
||||||
$ IF (F$PARSE(EXE_DIR).EQS."")
|
$ IF (F$PARSE(EXE_DIR).EQS."")
|
||||||
@@ -136,64 +174,104 @@ $!
|
|||||||
$ GOSUB CHECK_OPT_FILE
|
$ GOSUB CHECK_OPT_FILE
|
||||||
$!
|
$!
|
||||||
$! Define The Application Files.
|
$! Define The Application Files.
|
||||||
|
$! NOTE: Some might think this list ugly. However, it's made this way to
|
||||||
|
$! reflect the E_OBJ variable in Makefile as closely as possible, thereby
|
||||||
|
$! making it fairly easy to verify that the lists are the same.
|
||||||
|
$!
|
||||||
|
$ LIB_OPENSSL = "VERIFY,ASN1PARS,REQ,DGST,DH,DHPARAM,ENC,PASSWD,GENDH,ERRSTR,"+-
|
||||||
|
"CA,PKCS7,CRL2P7,CRL,"+-
|
||||||
|
"RSA,RSAUTL,DSA,DSAPARAM,EC,ECPARAM,"+-
|
||||||
|
"X509,GENRSA,GENDSA,GENPKEY,S_SERVER,S_CLIENT,SPEED,"+-
|
||||||
|
"S_TIME,APPS,S_CB,S_SOCKET,APP_RAND,VERSION,SESS_ID,"+-
|
||||||
|
"CIPHERS,NSEQ,PKCS12,PKCS8,PKEY,PKEYPARAM,PKEYUTL,"+ -
|
||||||
|
"SPKAC,SMIME,CMS,RAND,ENGINE,OCSP,PRIME,TS,SRP"
|
||||||
|
$!
|
||||||
|
$ LIB_OPENSSL = LIB_OPENSSL+ ",VMS_DECC_INIT"
|
||||||
$!
|
$!
|
||||||
$ LIB_FILES = "VERIFY;ASN1PARS;REQ;DGST;DH;DHPARAM;ENC;PASSWD;GENDH;ERRSTR;"+-
|
|
||||||
"CA;PKCS7;CRL2P7;CRL;"+-
|
|
||||||
"RSA;RSAUTL;DSA;DSAPARAM;EC;ECPARAM;"+-
|
|
||||||
"X509;GENRSA;GENDSA;S_SERVER;S_CLIENT;SPEED;"+-
|
|
||||||
"S_TIME;APPS;S_CB;S_SOCKET;APP_RAND;VERSION;SESS_ID;"+-
|
|
||||||
"CIPHERS;NSEQ;PKCS12;PKCS8;SPKAC;SMIME;CMS;RAND;ENGINE;OCSP;PRIME"
|
|
||||||
$ TCPIP_PROGRAMS = ",,"
|
$ TCPIP_PROGRAMS = ",,"
|
||||||
$ IF COMPILER .EQS. "VAXC" THEN -
|
$ IF COMPILER .EQS. "VAXC" THEN -
|
||||||
TCPIP_PROGRAMS = ",OPENSSL,"
|
TCPIP_PROGRAMS = ",OPENSSL,"
|
||||||
$!
|
$!
|
||||||
$! Setup exceptional compilations
|
$! Setup exceptional compilations
|
||||||
$!
|
$!
|
||||||
$ COMPILEWITH_CC2 = ",S_SERVER,S_CLIENT,"
|
$ COMPILEWITH_CC2 = ",S_SOCKET,S_SERVER,S_CLIENT,"
|
||||||
$!
|
$!
|
||||||
$ PHASE := LIB
|
$ PHASE := LIB
|
||||||
$!
|
$!
|
||||||
$ RESTART:
|
$ RESTART:
|
||||||
$!
|
$!
|
||||||
$! Define A File Counter And Set It To "0".
|
$! Define An App Counter And Set It To "0".
|
||||||
$!
|
$!
|
||||||
$ FILE_COUNTER = 0
|
$ APP_COUNTER = 0
|
||||||
$!
|
$!
|
||||||
$! Top Of The File Loop.
|
$! Top Of The App Loop.
|
||||||
$!
|
$!
|
||||||
$ NEXT_FILE:
|
$ NEXT_APP:
|
||||||
$!
|
$!
|
||||||
$! O.K, Extract The File Name From The File List.
|
$! Make The Application File Name
|
||||||
$!
|
$!
|
||||||
$ FILE_NAME0 = F$EDIT(F$ELEMENT(FILE_COUNTER,";",'PHASE'_FILES),"TRIM")
|
$ CURRENT_APP = F$EDIT(F$ELEMENT(APP_COUNTER,",",PROGRAMS),"TRIM")
|
||||||
$ FILE_NAME = F$EDIT(F$ELEMENT(0,",",FILE_NAME0),"TRIM")
|
$!
|
||||||
$ EXTRA_OBJ = FILE_NAME0 - FILE_NAME
|
$! Create The Executable File Name.
|
||||||
|
$!
|
||||||
|
$ EXE_FILE = EXE_DIR + CURRENT_APP + ".EXE"
|
||||||
$!
|
$!
|
||||||
$! Check To See If We Are At The End Of The File List.
|
$! Check To See If We Are At The End Of The File List.
|
||||||
$!
|
$!
|
||||||
$ IF (FILE_NAME0.EQS.";")
|
$ IF (CURRENT_APP.EQS.",")
|
||||||
$ THEN
|
$ THEN
|
||||||
$ IF (PHASE.EQS."LIB")
|
$ IF (PHASE.EQS."LIB")
|
||||||
$ THEN
|
$ THEN
|
||||||
$ PHASE := APP
|
$ PHASE := APP
|
||||||
$ GOTO RESTART
|
$ GOTO RESTART
|
||||||
$ ELSE
|
$ ELSE
|
||||||
$ GOTO FILE_DONE
|
$ GOTO APP_DONE
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$!
|
$!
|
||||||
$! Increment The Counter.
|
$! Increment The Counter.
|
||||||
$!
|
$!
|
||||||
$ FILE_COUNTER = FILE_COUNTER + 1
|
$ APP_COUNTER = APP_COUNTER + 1
|
||||||
$!
|
$!
|
||||||
$! Check to see if this program should actually be compiled
|
$! Decide if we're building the object files or not.
|
||||||
$!
|
$!
|
||||||
$ IF PHASE .EQS. "APP" .AND. -
|
$ IF (PHASE.EQS."LIB")
|
||||||
","+PROGRAMS+"," - (","+F$EDIT(FILE_NAME,"UPCASE")+",") .EQS. ","+PROGRAMS+","
|
|
||||||
$ THEN
|
$ THEN
|
||||||
$ GOTO NEXT_FILE
|
$!
|
||||||
|
$! Define A Library File Counter And Set It To "-1".
|
||||||
|
$! -1 Means The Application File Name Is To Be Used.
|
||||||
|
$!
|
||||||
|
$ LIB_COUNTER = -1
|
||||||
|
$!
|
||||||
|
$! Create a .OPT file for the object files
|
||||||
|
$!
|
||||||
|
$ OPEN /WRITE OBJECTS 'EXE_DIR''CURRENT_APP'.OPT
|
||||||
|
$!
|
||||||
|
$! Top Of The File Loop.
|
||||||
|
$!
|
||||||
|
$ NEXT_LIB:
|
||||||
|
$!
|
||||||
|
$! O.K, Extract The File Name From The File List.
|
||||||
|
$!
|
||||||
|
$ IF LIB_COUNTER .GE. 0
|
||||||
|
$ THEN
|
||||||
|
$ FILE_NAME = F$EDIT(F$ELEMENT(LIB_COUNTER,",",LIB_'CURRENT_APP'),"TRIM")
|
||||||
|
$ ELSE
|
||||||
|
$ FILE_NAME = CURRENT_APP
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$!
|
$!
|
||||||
|
$! Check To See If We Are At The End Of The File List.
|
||||||
|
$!
|
||||||
|
$ IF (FILE_NAME.EQS.",")
|
||||||
|
$ THEN
|
||||||
|
$ CLOSE OBJECTS
|
||||||
|
$ GOTO NEXT_APP
|
||||||
|
$ ENDIF
|
||||||
|
$!
|
||||||
|
$! Increment The Counter.
|
||||||
|
$!
|
||||||
|
$ LIB_COUNTER = LIB_COUNTER + 1
|
||||||
|
$!
|
||||||
$! Create The Source File Name.
|
$! Create The Source File Name.
|
||||||
$!
|
$!
|
||||||
$ SOURCE_FILE = "SYS$DISK:[]" + FILE_NAME + ".C"
|
$ SOURCE_FILE = "SYS$DISK:[]" + FILE_NAME + ".C"
|
||||||
@@ -201,11 +279,7 @@ $!
|
|||||||
$! Create The Object File Name.
|
$! Create The Object File Name.
|
||||||
$!
|
$!
|
||||||
$ OBJECT_FILE = OBJ_DIR + FILE_NAME + ".OBJ"
|
$ OBJECT_FILE = OBJ_DIR + FILE_NAME + ".OBJ"
|
||||||
$!
|
$ ON WARNING THEN GOTO NEXT_LIB
|
||||||
$! Create The Executable File Name.
|
|
||||||
$!
|
|
||||||
$ EXE_FILE = EXE_DIR + FILE_NAME + ".EXE"
|
|
||||||
$ ON WARNING THEN GOTO NEXT_FILE
|
|
||||||
$!
|
$!
|
||||||
$! Check To See If The File We Want To Compile Actually Exists.
|
$! Check To See If The File We Want To Compile Actually Exists.
|
||||||
$!
|
$!
|
||||||
@@ -237,64 +311,47 @@ $ ENDIF
|
|||||||
$!
|
$!
|
||||||
$! Compile The File.
|
$! Compile The File.
|
||||||
$!
|
$!
|
||||||
$ ON ERROR THEN GOTO NEXT_FILE
|
$ ON ERROR THEN GOTO NEXT_LIB
|
||||||
$ IF COMPILEWITH_CC2 - FILE_NAME .NES. COMPILEWITH_CC2
|
$ IF COMPILEWITH_CC2 - FILE_NAME .NES. COMPILEWITH_CC2
|
||||||
$ THEN
|
$ THEN
|
||||||
$ CC2/OBJECT='OBJECT_FILE' 'SOURCE_FILE'
|
$ CC2/OBJECT='OBJECT_FILE' 'SOURCE_FILE'
|
||||||
$ ELSE
|
$ ELSE
|
||||||
$ CC/OBJECT='OBJECT_FILE' 'SOURCE_FILE'
|
$ CC/OBJECT='OBJECT_FILE' 'SOURCE_FILE'
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
|
$ WRITE OBJECTS OBJECT_FILE
|
||||||
$!
|
$!
|
||||||
$ ON WARNING THEN GOTO NEXT_FILE
|
$ GOTO NEXT_LIB
|
||||||
$!
|
|
||||||
$ IF (PHASE.EQS."LIB")
|
|
||||||
$ THEN
|
|
||||||
$ GOTO NEXT_FILE
|
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$!
|
$!
|
||||||
$! Check if this program works well without a TCPIP library
|
$! Check if this program works well without a TCPIP library
|
||||||
$!
|
$!
|
||||||
$ IF TCPIP_LIB .EQS. "" .AND. TCPIP_PROGRAMS - FILE_NAME .NES. TCPIP_PROGRAMS
|
$ IF TCPIP_LIB .EQS. "" .AND. TCPIP_PROGRAMS - CURRENT_APP .NES. TCPIP_PROGRAMS
|
||||||
$ THEN
|
$ THEN
|
||||||
$ WRITE SYS$OUTPUT FILE_NAME," needs a TCP/IP library. Can't link. Skipping..."
|
$ WRITE SYS$OUTPUT CURRENT_APP," needs a TCP/IP library. Can't link. Skipping..."
|
||||||
$ GOTO NEXT_FILE
|
$ GOTO NEXT_APP
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$!
|
$!
|
||||||
$! Link The Program.
|
$! Link The Program.
|
||||||
$! Check To See If We Are To Link With A Specific TCP/IP Library.
|
|
||||||
$!
|
$!
|
||||||
$ IF (TCPIP_LIB.NES."")
|
$ ON WARNING THEN GOTO NEXT_APP
|
||||||
$ THEN
|
|
||||||
$!
|
$!
|
||||||
$! Don't Link With The RSAREF Routines And TCP/IP Library.
|
$! Don't Link With The RSAREF Routines And TCP/IP Library.
|
||||||
$!
|
$!
|
||||||
$ LINK/'DEBUGGER'/'TRACEBACK' /EXE='EXE_FILE' -
|
$ LINK /'DEBUGGER' /'LINKMAP' /'TRACEBACK' /EXE='EXE_FILE' -
|
||||||
'OBJECT_FILE''EXTRA_OBJ', -
|
'EXE_DIR''CURRENT_APP'.OPT /OPTIONS, -
|
||||||
'SSL_LIB'/LIBRARY,'CRYPTO_LIB'/LIBRARY, -
|
'SSL_LIB' /LIBRARY, -
|
||||||
'TCPIP_LIB','OPT_FILE'/OPTION
|
'CRYPTO_LIB' /LIBRARY -
|
||||||
$!
|
'TCPIP_LIB' -
|
||||||
$! Else...
|
'ZLIB_LIB' -
|
||||||
$!
|
,'OPT_FILE' /OPTIONS
|
||||||
$ ELSE
|
|
||||||
$!
|
|
||||||
$! Don't Link With The RSAREF Routines And Link With A TCP/IP Library.
|
|
||||||
$!
|
|
||||||
$ LINK/'DEBUGGER'/'TRACEBACK' /EXE='EXE_FILE' -
|
|
||||||
'OBJECT_FILE''EXTRA_OBJ', -
|
|
||||||
'SSL_LIB'/LIBRARY,'CRYPTO_LIB'/LIBRARY, -
|
|
||||||
'OPT_FILE'/OPTION
|
|
||||||
$!
|
|
||||||
$! End The TCP/IP Library Check.
|
|
||||||
$!
|
|
||||||
$ ENDIF
|
|
||||||
$!
|
$!
|
||||||
$! Go Back And Do It Again.
|
$! Go Back And Do It Again.
|
||||||
$!
|
$!
|
||||||
$ GOTO NEXT_FILE
|
$ GOTO NEXT_APP
|
||||||
$!
|
$!
|
||||||
$! All Done With This File.
|
$! All Done With This File.
|
||||||
$!
|
$!
|
||||||
$ FILE_DONE:
|
$ APP_DONE:
|
||||||
$ EXIT:
|
$ EXIT:
|
||||||
$!
|
$!
|
||||||
$! All Done, Time To Clean Up And Exit.
|
$! All Done, Time To Clean Up And Exit.
|
||||||
@@ -321,7 +378,7 @@ $!
|
|||||||
$ CREATE 'OPT_FILE'
|
$ CREATE 'OPT_FILE'
|
||||||
$DECK
|
$DECK
|
||||||
!
|
!
|
||||||
! Default System Options File To Link Agianst
|
! Default System Options File To Link Against
|
||||||
! The Sharable VAX C Runtime Library.
|
! The Sharable VAX C Runtime Library.
|
||||||
!
|
!
|
||||||
SYS$SHARE:VAXCRTL.EXE/SHARE
|
SYS$SHARE:VAXCRTL.EXE/SHARE
|
||||||
@@ -350,7 +407,7 @@ $!
|
|||||||
$ CREATE 'OPT_FILE'
|
$ CREATE 'OPT_FILE'
|
||||||
$DECK
|
$DECK
|
||||||
!
|
!
|
||||||
! Default System Options File To Link Agianst
|
! Default System Options File To Link Against
|
||||||
! The Sharable C Runtime Library.
|
! The Sharable C Runtime Library.
|
||||||
!
|
!
|
||||||
GNU_CC:[000000]GCCLIB/LIBRARY
|
GNU_CC:[000000]GCCLIB/LIBRARY
|
||||||
@@ -385,7 +442,7 @@ $!
|
|||||||
$ CREATE 'OPT_FILE'
|
$ CREATE 'OPT_FILE'
|
||||||
$DECK
|
$DECK
|
||||||
!
|
!
|
||||||
! Default System Options File To Link Agianst
|
! Default System Options File To Link Against
|
||||||
! The Sharable DEC C Runtime Library.
|
! The Sharable DEC C Runtime Library.
|
||||||
!
|
!
|
||||||
SYS$SHARE:DECC$SHR.EXE/SHARE
|
SYS$SHARE:DECC$SHR.EXE/SHARE
|
||||||
@@ -395,19 +452,19 @@ $! Else...
|
|||||||
$!
|
$!
|
||||||
$ ELSE
|
$ ELSE
|
||||||
$!
|
$!
|
||||||
$! Create The AXP Linker Option File.
|
$! Create The non-VAX Linker Option File.
|
||||||
$!
|
$!
|
||||||
$ CREATE 'OPT_FILE'
|
$ CREATE 'OPT_FILE'
|
||||||
$DECK
|
$DECK
|
||||||
!
|
!
|
||||||
! Default System Options File For AXP To Link Agianst
|
! Default System Options File For non-VAX To Link Against
|
||||||
! The Sharable C Runtime Library.
|
! The Sharable C Runtime Library.
|
||||||
!
|
!
|
||||||
SYS$SHARE:CMA$OPEN_LIB_SHR/SHARE
|
SYS$SHARE:CMA$OPEN_LIB_SHR/SHARE
|
||||||
SYS$SHARE:CMA$OPEN_RTL/SHARE
|
SYS$SHARE:CMA$OPEN_RTL/SHARE
|
||||||
$EOD
|
$EOD
|
||||||
$!
|
$!
|
||||||
$! End The VAX/AXP DEC C Option File Check.
|
$! End The DEC C Option File Check.
|
||||||
$!
|
$!
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$!
|
$!
|
||||||
@@ -487,6 +544,7 @@ $!
|
|||||||
$! P1 Is NODEBUG, So Compile Without Debugger Information.
|
$! P1 Is NODEBUG, So Compile Without Debugger Information.
|
||||||
$!
|
$!
|
||||||
$ DEBUGGER = "NODEBUG"
|
$ DEBUGGER = "NODEBUG"
|
||||||
|
$ LINKMAP = "NOMAP"
|
||||||
$ TRACEBACK = "NOTRACEBACK"
|
$ TRACEBACK = "NOTRACEBACK"
|
||||||
$ GCC_OPTIMIZE = "OPTIMIZE"
|
$ GCC_OPTIMIZE = "OPTIMIZE"
|
||||||
$ CC_OPTIMIZE = "OPTIMIZE"
|
$ CC_OPTIMIZE = "OPTIMIZE"
|
||||||
@@ -505,6 +563,7 @@ $!
|
|||||||
$! Compile With Debugger Information.
|
$! Compile With Debugger Information.
|
||||||
$!
|
$!
|
||||||
$ DEBUGGER = "DEBUG"
|
$ DEBUGGER = "DEBUG"
|
||||||
|
$ LINKMAP = "MAP"
|
||||||
$ TRACEBACK = "TRACEBACK"
|
$ TRACEBACK = "TRACEBACK"
|
||||||
$ GCC_OPTIMIZE = "NOOPTIMIZE"
|
$ GCC_OPTIMIZE = "NOOPTIMIZE"
|
||||||
$ CC_OPTIMIZE = "NOOPTIMIZE"
|
$ CC_OPTIMIZE = "NOOPTIMIZE"
|
||||||
@@ -512,7 +571,7 @@ $ WRITE SYS$OUTPUT "Debugger Information Will Be Produced During Compile."
|
|||||||
$ WRITE SYS$OUTPUT "Compiling Without Compiler Optimization."
|
$ WRITE SYS$OUTPUT "Compiling Without Compiler Optimization."
|
||||||
$ ELSE
|
$ ELSE
|
||||||
$!
|
$!
|
||||||
$! Tell The User Entered An Invalid Option..
|
$! Tell The User Entered An Invalid Option.
|
||||||
$!
|
$!
|
||||||
$ WRITE SYS$OUTPUT ""
|
$ WRITE SYS$OUTPUT ""
|
||||||
$ WRITE SYS$OUTPUT "The Option ",P1," Is Invalid. The Valid Options Are:"
|
$ WRITE SYS$OUTPUT "The Option ",P1," Is Invalid. The Valid Options Are:"
|
||||||
@@ -525,7 +584,7 @@ $! Time To EXIT.
|
|||||||
$!
|
$!
|
||||||
$ EXIT
|
$ EXIT
|
||||||
$!
|
$!
|
||||||
$! End The Valid Arguement Check.
|
$! End The Valid Argument Check.
|
||||||
$!
|
$!
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$!
|
$!
|
||||||
@@ -533,6 +592,87 @@ $! End The P1 Check.
|
|||||||
$!
|
$!
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$!
|
$!
|
||||||
|
$! Check P6 (POINTER_SIZE).
|
||||||
|
$!
|
||||||
|
$ IF (P6 .NES. "") .AND. (ARCH .NES. "VAX")
|
||||||
|
$ THEN
|
||||||
|
$!
|
||||||
|
$ IF (P6 .EQS. "32")
|
||||||
|
$ THEN
|
||||||
|
$ POINTER_SIZE = " /POINTER_SIZE=32"
|
||||||
|
$ ELSE
|
||||||
|
$ POINTER_SIZE = F$EDIT( P6, "COLLAPSE, UPCASE")
|
||||||
|
$ IF ((POINTER_SIZE .EQS. "64") .OR. -
|
||||||
|
(POINTER_SIZE .EQS. "64=") .OR. -
|
||||||
|
(POINTER_SIZE .EQS. "64=ARGV"))
|
||||||
|
$ THEN
|
||||||
|
$ ARCHD = ARCH+ "_64"
|
||||||
|
$ LIB32 = ""
|
||||||
|
$ IF (F$EXTRACT( 2, 1, POINTER_SIZE) .EQS. "=")
|
||||||
|
$ THEN
|
||||||
|
$! Explicit user choice: "64" or "64=ARGV".
|
||||||
|
$ IF (POINTER_SIZE .EQS. "64=") THEN POINTER_SIZE = "64"
|
||||||
|
$ ELSE
|
||||||
|
$ SET NOON
|
||||||
|
$ DEFINE /USER_MODE SYS$OUTPUT NL:
|
||||||
|
$ DEFINE /USER_MODE SYS$ERROR NL:
|
||||||
|
$ CC /NOLIST /NOOBJECT /POINTER_SIZE=64=ARGV NL:
|
||||||
|
$ IF ($STATUS .AND. %X0FFF0000) .EQ. %X00030000
|
||||||
|
$ THEN
|
||||||
|
$ ! If we got here, it means DCL complained like this:
|
||||||
|
$ ! %DCL-W-NOVALU, value not allowed - remove value specification
|
||||||
|
$ ! \64=\
|
||||||
|
$ !
|
||||||
|
$ ! If the compiler was run, logicals defined in /USER would
|
||||||
|
$ ! have been deassigned automatically. However, when DCL
|
||||||
|
$ ! complains, they aren't, so we do it here (it might be
|
||||||
|
$ ! unnecessary, but just in case there will be another error
|
||||||
|
$ ! message further on that we don't want to miss)
|
||||||
|
$ DEASSIGN /USER_MODE SYS$ERROR
|
||||||
|
$ DEASSIGN /USER_MODE SYS$OUTPUT
|
||||||
|
$ ELSE
|
||||||
|
$ POINTER_SIZE = POINTER_SIZE + "=ARGV"
|
||||||
|
$ ENDIF
|
||||||
|
$ SET ON
|
||||||
|
$ ENDIF
|
||||||
|
$ POINTER_SIZE = " /POINTER_SIZE=''POINTER_SIZE'"
|
||||||
|
$!
|
||||||
|
$ ELSE
|
||||||
|
$!
|
||||||
|
$! Tell The User Entered An Invalid Option.
|
||||||
|
$!
|
||||||
|
$ WRITE SYS$OUTPUT ""
|
||||||
|
$ WRITE SYS$OUTPUT "The Option ", P6, -
|
||||||
|
" Is Invalid. The Valid Options Are:"
|
||||||
|
$ WRITE SYS$OUTPUT ""
|
||||||
|
$ WRITE SYS$OUTPUT -
|
||||||
|
" """" : Compile with default (short) pointers."
|
||||||
|
$ WRITE SYS$OUTPUT -
|
||||||
|
" 32 : Compile with 32-bit (short) pointers."
|
||||||
|
$ WRITE SYS$OUTPUT -
|
||||||
|
" 64 : Compile with 64-bit (long) pointers (auto ARGV)."
|
||||||
|
$ WRITE SYS$OUTPUT -
|
||||||
|
" 64= : Compile with 64-bit (long) pointers (no ARGV)."
|
||||||
|
$ WRITE SYS$OUTPUT -
|
||||||
|
" 64=ARGV : Compile with 64-bit (long) pointers (ARGV)."
|
||||||
|
$ WRITE SYS$OUTPUT ""
|
||||||
|
$!
|
||||||
|
$! Time To EXIT.
|
||||||
|
$!
|
||||||
|
$ EXIT
|
||||||
|
$!
|
||||||
|
$ ENDIF
|
||||||
|
$!
|
||||||
|
$ ENDIF
|
||||||
|
$!
|
||||||
|
$! End The P6 (POINTER_SIZE) Check.
|
||||||
|
$!
|
||||||
|
$ ENDIF
|
||||||
|
$!
|
||||||
|
$! Set basic C compiler /INCLUDE directories.
|
||||||
|
$!
|
||||||
|
$ CC_INCLUDES = "SYS$DISK:[-],SYS$DISK:[-.CRYPTO]"
|
||||||
|
$!
|
||||||
$! Check To See If P2 Is Blank.
|
$! Check To See If P2 Is Blank.
|
||||||
$!
|
$!
|
||||||
$ IF (P2.EQS."")
|
$ IF (P2.EQS."")
|
||||||
@@ -556,7 +696,7 @@ $ ELSE
|
|||||||
$!
|
$!
|
||||||
$! Check To See If We Have VAXC Or DECC.
|
$! Check To See If We Have VAXC Or DECC.
|
||||||
$!
|
$!
|
||||||
$ IF (ARCH.EQS."AXP").OR.(F$TRNLNM("DECC$CC_DEFAULT").NES."")
|
$ IF (ARCH.NES."VAX").OR.(F$TRNLNM("DECC$CC_DEFAULT").NES."")
|
||||||
$ THEN
|
$ THEN
|
||||||
$!
|
$!
|
||||||
$! Looks Like DECC, Set To Use DECC.
|
$! Looks Like DECC, Set To Use DECC.
|
||||||
@@ -633,11 +773,64 @@ $ CCDEFS = "MONOLITH"
|
|||||||
$ IF F$TYPE(USER_CCDEFS) .NES. "" THEN CCDEFS = CCDEFS + "," + USER_CCDEFS
|
$ IF F$TYPE(USER_CCDEFS) .NES. "" THEN CCDEFS = CCDEFS + "," + USER_CCDEFS
|
||||||
$ CCEXTRAFLAGS = ""
|
$ CCEXTRAFLAGS = ""
|
||||||
$ IF F$TYPE(USER_CCFLAGS) .NES. "" THEN CCEXTRAFLAGS = USER_CCFLAGS
|
$ IF F$TYPE(USER_CCFLAGS) .NES. "" THEN CCEXTRAFLAGS = USER_CCFLAGS
|
||||||
$ CCDISABLEWARNINGS = "LONGLONGTYPE,LONGLONGSUFX,FOUNDCR"
|
$ CCDISABLEWARNINGS = "" !!! "LONGLONGTYPE,LONGLONGSUFX,FOUNDCR"
|
||||||
$ IF F$TYPE(USER_CCDISABLEWARNINGS) .NES. "" THEN -
|
$ IF F$TYPE(USER_CCDISABLEWARNINGS) .NES. "" THEN -
|
||||||
CCDISABLEWARNINGS = CCDISABLEWARNINGS + "," + USER_CCDISABLEWARNINGS
|
CCDISABLEWARNINGS = CCDISABLEWARNINGS + "," + USER_CCDISABLEWARNINGS
|
||||||
$!
|
$!
|
||||||
$! Check To See If The User Entered A Valid Paramter.
|
$! Check To See If We Have A ZLIB Option.
|
||||||
|
$!
|
||||||
|
$ ZLIB = P7
|
||||||
|
$ IF (ZLIB .NES. "")
|
||||||
|
$ THEN
|
||||||
|
$!
|
||||||
|
$! Check for expected ZLIB files.
|
||||||
|
$!
|
||||||
|
$ err = 0
|
||||||
|
$ file1 = f$parse( "zlib.h", ZLIB, , , "SYNTAX_ONLY")
|
||||||
|
$ if (f$search( file1) .eqs. "")
|
||||||
|
$ then
|
||||||
|
$ WRITE SYS$OUTPUT ""
|
||||||
|
$ WRITE SYS$OUTPUT "The Option ", ZLIB, " Is Invalid."
|
||||||
|
$ WRITE SYS$OUTPUT " Can't find header: ''file1'"
|
||||||
|
$ err = 1
|
||||||
|
$ endif
|
||||||
|
$ file1 = f$parse( "A.;", ZLIB)- "A.;"
|
||||||
|
$!
|
||||||
|
$ file2 = f$parse( ZLIB, "libz.olb", , , "SYNTAX_ONLY")
|
||||||
|
$ if (f$search( file2) .eqs. "")
|
||||||
|
$ then
|
||||||
|
$ if (err .eq. 0)
|
||||||
|
$ then
|
||||||
|
$ WRITE SYS$OUTPUT ""
|
||||||
|
$ WRITE SYS$OUTPUT "The Option ", ZLIB, " Is Invalid."
|
||||||
|
$ endif
|
||||||
|
$ WRITE SYS$OUTPUT " Can't find library: ''file2'"
|
||||||
|
$ WRITE SYS$OUTPUT ""
|
||||||
|
$ err = err+ 2
|
||||||
|
$ endif
|
||||||
|
$ if (err .eq. 1)
|
||||||
|
$ then
|
||||||
|
$ WRITE SYS$OUTPUT ""
|
||||||
|
$ endif
|
||||||
|
$!
|
||||||
|
$ if (err .ne. 0)
|
||||||
|
$ then
|
||||||
|
$ EXIT
|
||||||
|
$ endif
|
||||||
|
$!
|
||||||
|
$ CCDEFS = """ZLIB=1"", "+ CCDEFS
|
||||||
|
$ CC_INCLUDES = CC_INCLUDES+ ", "+ file1
|
||||||
|
$ ZLIB_LIB = ", ''file2' /library"
|
||||||
|
$!
|
||||||
|
$! Print info
|
||||||
|
$!
|
||||||
|
$ WRITE SYS$OUTPUT "ZLIB library spec: ", file2
|
||||||
|
$!
|
||||||
|
$! End The ZLIB Check.
|
||||||
|
$!
|
||||||
|
$ ENDIF
|
||||||
|
$!
|
||||||
|
$! Check To See If The User Entered A Valid Parameter.
|
||||||
$!
|
$!
|
||||||
$ IF (P2.EQS."VAXC").OR.(P2.EQS."DECC").OR.(P2.EQS."GNUC")
|
$ IF (P2.EQS."VAXC").OR.(P2.EQS."DECC").OR.(P2.EQS."GNUC")
|
||||||
$ THEN
|
$ THEN
|
||||||
@@ -660,13 +853,13 @@ $!
|
|||||||
$ CC = "CC"
|
$ CC = "CC"
|
||||||
$ IF ARCH.EQS."VAX" .AND. F$TRNLNM("DECC$CC_DEFAULT").NES."/DECC" -
|
$ IF ARCH.EQS."VAX" .AND. F$TRNLNM("DECC$CC_DEFAULT").NES."/DECC" -
|
||||||
THEN CC = "CC/DECC"
|
THEN CC = "CC/DECC"
|
||||||
$ CC = CC + "/''CC_OPTIMIZE'/''DEBUGGER'/STANDARD=ANSI89" + -
|
$ CC = CC + " /''CC_OPTIMIZE' /''DEBUGGER' /STANDARD=RELAXED"+ -
|
||||||
"/NOLIST/PREFIX=ALL" + -
|
"''POINTER_SIZE' /NOLIST /PREFIX=ALL" + -
|
||||||
"/INCLUDE=(SYS$DISK:[-],SYS$DISK:[-.CRYPTO])" + CCEXTRAFLAGS
|
" /INCLUDE=(''CC_INCLUDES') " + CCEXTRAFLAGS
|
||||||
$!
|
$!
|
||||||
$! Define The Linker Options File Name.
|
$! Define The Linker Options File Name.
|
||||||
$!
|
$!
|
||||||
$ OPT_FILE = "SYS$DISK:[]VAX_DECC_OPTIONS.OPT"
|
$ OPT_FILE = "VAX_DECC_OPTIONS.OPT"
|
||||||
$!
|
$!
|
||||||
$! End DECC Check.
|
$! End DECC Check.
|
||||||
$!
|
$!
|
||||||
@@ -687,14 +880,14 @@ $!
|
|||||||
$! Compile Using VAXC.
|
$! Compile Using VAXC.
|
||||||
$!
|
$!
|
||||||
$ CC = "CC"
|
$ CC = "CC"
|
||||||
$ IF ARCH.EQS."AXP"
|
$ IF ARCH.NES."VAX"
|
||||||
$ THEN
|
$ THEN
|
||||||
$ WRITE SYS$OUTPUT "There is no VAX C on Alpha!"
|
$ WRITE SYS$OUTPUT "There is no VAX C on ''ARCH'!"
|
||||||
$ EXIT
|
$ EXIT
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$ IF F$TRNLNM("DECC$CC_DEFAULT").EQS."/DECC" THEN CC = "CC/VAXC"
|
$ IF F$TRNLNM("DECC$CC_DEFAULT").EQS."/DECC" THEN CC = "CC/VAXC"
|
||||||
$ CC = CC + "/''CC_OPTIMIZE'/''DEBUGGER'/NOLIST" + -
|
$ CC = CC + "/''CC_OPTIMIZE'/''DEBUGGER'/NOLIST" + -
|
||||||
"/INCLUDE=(SYS$DISK:[-],SYS$DISK:[-.CRYPTO])" + CCEXTRAFLAGS
|
"/INCLUDE=(''CC_INCLUDES')" + CCEXTRAFLAGS
|
||||||
$ CCDEFS = CCDEFS + ",""VAXC"""
|
$ CCDEFS = CCDEFS + ",""VAXC"""
|
||||||
$!
|
$!
|
||||||
$! Define <sys> As SYS$COMMON:[SYSLIB]
|
$! Define <sys> As SYS$COMMON:[SYSLIB]
|
||||||
@@ -703,7 +896,7 @@ $ DEFINE/NOLOG SYS SYS$COMMON:[SYSLIB]
|
|||||||
$!
|
$!
|
||||||
$! Define The Linker Options File Name.
|
$! Define The Linker Options File Name.
|
||||||
$!
|
$!
|
||||||
$ OPT_FILE = "SYS$DISK:[]VAX_VAXC_OPTIONS.OPT"
|
$ OPT_FILE = "VAX_VAXC_OPTIONS.OPT"
|
||||||
$!
|
$!
|
||||||
$! End VAXC Check
|
$! End VAXC Check
|
||||||
$!
|
$!
|
||||||
@@ -726,11 +919,11 @@ $! Use GNU C...
|
|||||||
$!
|
$!
|
||||||
$ IF F$TYPE(GCC) .EQS. "" THEN GCC := GCC
|
$ IF F$TYPE(GCC) .EQS. "" THEN GCC := GCC
|
||||||
$ CC = GCC+"/NOCASE_HACK/''GCC_OPTIMIZE'/''DEBUGGER'/NOLIST" + -
|
$ CC = GCC+"/NOCASE_HACK/''GCC_OPTIMIZE'/''DEBUGGER'/NOLIST" + -
|
||||||
"/INCLUDE=(SYS$DISK:[-],SYS$DISK:[-.CRYPTO])" + CCEXTRAFLAGS
|
"/INCLUDE=(''CC_INCLUDES')" + CCEXTRAFLAGS
|
||||||
$!
|
$!
|
||||||
$! Define The Linker Options File Name.
|
$! Define The Linker Options File Name.
|
||||||
$!
|
$!
|
||||||
$ OPT_FILE = "SYS$DISK:[]VAX_GNUC_OPTIONS.OPT"
|
$ OPT_FILE = "VAX_GNUC_OPTIONS.OPT"
|
||||||
$!
|
$!
|
||||||
$! End The GNU C Check.
|
$! End The GNU C Check.
|
||||||
$!
|
$!
|
||||||
@@ -740,7 +933,7 @@ $! Set up default defines
|
|||||||
$!
|
$!
|
||||||
$ CCDEFS = """FLAT_INC=1""," + CCDEFS
|
$ CCDEFS = """FLAT_INC=1""," + CCDEFS
|
||||||
$!
|
$!
|
||||||
$! Else The User Entered An Invalid Arguement.
|
$! Else The User Entered An Invalid Argument.
|
||||||
$!
|
$!
|
||||||
$ ELSE
|
$ ELSE
|
||||||
$!
|
$!
|
||||||
@@ -772,7 +965,7 @@ $ THEN
|
|||||||
$!
|
$!
|
||||||
$! Set the library to use SOCKETSHR
|
$! Set the library to use SOCKETSHR
|
||||||
$!
|
$!
|
||||||
$ TCPIP_LIB = "SYS$DISK:[-.VMS]SOCKETSHR_SHR.OPT/OPT"
|
$ TCPIP_LIB = ",SYS$DISK:[-.VMS]SOCKETSHR_SHR.OPT /OPTIONS"
|
||||||
$!
|
$!
|
||||||
$! Done with SOCKETSHR
|
$! Done with SOCKETSHR
|
||||||
$!
|
$!
|
||||||
@@ -798,13 +991,13 @@ $ THEN
|
|||||||
$!
|
$!
|
||||||
$! Set the library to use UCX.
|
$! Set the library to use UCX.
|
||||||
$!
|
$!
|
||||||
$ TCPIP_LIB = "SYS$DISK:[-.VMS]UCX_SHR_DECC.OPT/OPT"
|
$ TCPIP_LIB = ",SYS$DISK:[-.VMS]UCX_SHR_DECC.OPT /OPTIONS"
|
||||||
$ IF F$TRNLNM("UCX$IPC_SHR") .NES. ""
|
$ IF F$TRNLNM("UCX$IPC_SHR") .NES. ""
|
||||||
$ THEN
|
$ THEN
|
||||||
$ TCPIP_LIB = "SYS$DISK:[-.VMS]UCX_SHR_DECC_LOG.OPT/OPT"
|
$ TCPIP_LIB = ",SYS$DISK:[-.VMS]UCX_SHR_DECC_LOG.OPT /OPTIONS"
|
||||||
$ ELSE
|
$ ELSE
|
||||||
$ IF COMPILER .NES. "DECC" .AND. ARCH .EQS. "VAX" THEN -
|
$ IF COMPILER .NES. "DECC" .AND. ARCH .EQS. "VAX" THEN -
|
||||||
TCPIP_LIB = "SYS$DISK:[-.VMS]UCX_SHR_VAXC.OPT/OPT"
|
TCPIP_LIB = ",SYS$DISK:[-.VMS]UCX_SHR_VAXC.OPT /OPTIONS"
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$!
|
$!
|
||||||
$! Done with UCX
|
$! Done with UCX
|
||||||
@@ -818,7 +1011,7 @@ $ THEN
|
|||||||
$!
|
$!
|
||||||
$! Set the library to use TCPIP.
|
$! Set the library to use TCPIP.
|
||||||
$!
|
$!
|
||||||
$ TCPIP_LIB = "SYS$DISK:[-.VMS]TCPIP_SHR_DECC.OPT/OPT"
|
$ TCPIP_LIB = ",SYS$DISK:[-.VMS]TCPIP_SHR_DECC.OPT /OPTIONS"
|
||||||
$!
|
$!
|
||||||
$! Done with TCPIP
|
$! Done with TCPIP
|
||||||
$!
|
$!
|
||||||
@@ -843,9 +1036,9 @@ $ CCDEFS = CCDEFS + ",TCPIP_TYPE_''P3'"
|
|||||||
$!
|
$!
|
||||||
$! Print info
|
$! Print info
|
||||||
$!
|
$!
|
||||||
$ WRITE SYS$OUTPUT "TCP/IP library spec: ", TCPIP_LIB
|
$ WRITE SYS$OUTPUT "TCP/IP library spec: ", TCPIP_LIB- ","
|
||||||
$!
|
$!
|
||||||
$! Else The User Entered An Invalid Arguement.
|
$! Else The User Entered An Invalid Argument.
|
||||||
$!
|
$!
|
||||||
$ ELSE
|
$ ELSE
|
||||||
$!
|
$!
|
||||||
@@ -873,13 +1066,13 @@ $ IF COMPILER .EQS. "DECC"
|
|||||||
$ THEN
|
$ THEN
|
||||||
$ IF CCDISABLEWARNINGS .NES. ""
|
$ IF CCDISABLEWARNINGS .NES. ""
|
||||||
$ THEN
|
$ THEN
|
||||||
$ CCDISABLEWARNINGS = "/WARNING=(DISABLE=(" + CCDISABLEWARNINGS + "))"
|
$ CCDISABLEWARNINGS = " /WARNING=(DISABLE=(" + CCDISABLEWARNINGS + "))"
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$ ELSE
|
$ ELSE
|
||||||
$ CCDISABLEWARNINGS = ""
|
$ CCDISABLEWARNINGS = ""
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$ CC2 = CC + "/DEFINE=(" + CCDEFS + ",_POSIX_C_SOURCE)" + CCDISABLEWARNINGS
|
$ CC2 = CC + " /DEFINE=(" + CCDEFS + ",_POSIX_C_SOURCE)" + CCDISABLEWARNINGS
|
||||||
$ CC = CC + "/DEFINE=(" + CCDEFS + ")" + CCDISABLEWARNINGS
|
$ CC = CC + " /DEFINE=(" + CCDEFS + ")" + CCDISABLEWARNINGS
|
||||||
$!
|
$!
|
||||||
$! Show user the result
|
$! Show user the result
|
||||||
$!
|
$!
|
||||||
@@ -945,7 +1138,7 @@ $ __INCLUDE = __TOP + "INCLUDE.OPENSSL]"
|
|||||||
$!
|
$!
|
||||||
$! Set up the logical name OPENSSL to point at the include directory
|
$! Set up the logical name OPENSSL to point at the include directory
|
||||||
$!
|
$!
|
||||||
$ DEFINE OPENSSL/NOLOG '__INCLUDE'
|
$ DEFINE OPENSSL /NOLOG '__INCLUDE'
|
||||||
$!
|
$!
|
||||||
$! Done
|
$! Done
|
||||||
$!
|
$!
|
||||||
@@ -953,15 +1146,24 @@ $ RETURN
|
|||||||
$!
|
$!
|
||||||
$ CLEANUP:
|
$ CLEANUP:
|
||||||
$!
|
$!
|
||||||
$! Restore the logical name OPENSSL if it had a value
|
$! Restore the saved logical name OPENSSL, if it had a value.
|
||||||
$!
|
$!
|
||||||
|
$ if (f$type( __SAVE_OPENSSL) .nes. "")
|
||||||
|
$ then
|
||||||
$ IF __SAVE_OPENSSL .EQS. ""
|
$ IF __SAVE_OPENSSL .EQS. ""
|
||||||
$ THEN
|
$ THEN
|
||||||
$ DEASSIGN OPENSSL
|
$ DEASSIGN OPENSSL
|
||||||
$ ELSE
|
$ ELSE
|
||||||
$ DEFINE/NOLOG OPENSSL '__SAVE_OPENSSL'
|
$ DEFINE /NOLOG OPENSSL '__SAVE_OPENSSL'
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
|
$ endif
|
||||||
|
$!
|
||||||
|
$! Close any open files.
|
||||||
|
$!
|
||||||
|
$ if (f$trnlnm( "objects", "LNM$PROCESS", 0, "SUPERVISOR") .nes. "") then -
|
||||||
|
close objects
|
||||||
$!
|
$!
|
||||||
$! Done
|
$! Done
|
||||||
$!
|
$!
|
||||||
$ RETURN
|
$ RETURN
|
||||||
|
$!
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
/* nseq.c */
|
/* nseq.c */
|
||||||
/* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
|
/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
|
||||||
* project 1999.
|
* project 1999.
|
||||||
*/
|
*/
|
||||||
/* ====================================================================
|
/* ====================================================================
|
||||||
|
|||||||
145
apps/ocsp.c
145
apps/ocsp.c
@@ -1,5 +1,5 @@
|
|||||||
/* ocsp.c */
|
/* ocsp.c */
|
||||||
/* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
|
/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
|
||||||
* project 2000.
|
* project 2000.
|
||||||
*/
|
*/
|
||||||
/* ====================================================================
|
/* ====================================================================
|
||||||
@@ -56,25 +56,53 @@
|
|||||||
*
|
*
|
||||||
*/
|
*/
|
||||||
#ifndef OPENSSL_NO_OCSP
|
#ifndef OPENSSL_NO_OCSP
|
||||||
|
|
||||||
|
#ifdef OPENSSL_SYS_VMS
|
||||||
|
#define _XOPEN_SOURCE_EXTENDED /* So fd_set and friends get properly defined
|
||||||
|
on OpenVMS */
|
||||||
|
#endif
|
||||||
|
|
||||||
#define USE_SOCKETS
|
#define USE_SOCKETS
|
||||||
|
|
||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
#include <stdlib.h>
|
#include <stdlib.h>
|
||||||
#include <string.h>
|
#include <string.h>
|
||||||
|
#include <time.h>
|
||||||
#include "apps.h" /* needs to be included before the openssl headers! */
|
#include "apps.h" /* needs to be included before the openssl headers! */
|
||||||
#include <openssl/e_os2.h>
|
#include <openssl/e_os2.h>
|
||||||
#include <openssl/ssl.h>
|
#include <openssl/crypto.h>
|
||||||
#include <openssl/err.h>
|
#include <openssl/err.h>
|
||||||
|
#include <openssl/ssl.h>
|
||||||
|
#include <openssl/evp.h>
|
||||||
|
#include <openssl/bn.h>
|
||||||
|
#include <openssl/x509v3.h>
|
||||||
|
|
||||||
|
#if defined(NETWARE_CLIB)
|
||||||
|
# ifdef NETWARE_BSDSOCK
|
||||||
|
# include <sys/socket.h>
|
||||||
|
# include <sys/bsdskt.h>
|
||||||
|
# else
|
||||||
|
# include <novsock2.h>
|
||||||
|
# endif
|
||||||
|
#elif defined(NETWARE_LIBC)
|
||||||
|
# ifdef NETWARE_BSDSOCK
|
||||||
|
# include <sys/select.h>
|
||||||
|
# else
|
||||||
|
# include <novsock2.h>
|
||||||
|
# endif
|
||||||
|
#endif
|
||||||
|
|
||||||
/* Maximum leeway in validity period: default 5 minutes */
|
/* Maximum leeway in validity period: default 5 minutes */
|
||||||
#define MAX_VALIDITY_PERIOD (5 * 60)
|
#define MAX_VALIDITY_PERIOD (5 * 60)
|
||||||
|
|
||||||
static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, X509 *issuer,
|
static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, const EVP_MD *cert_id_md, X509 *issuer,
|
||||||
STACK_OF(OCSP_CERTID) *ids);
|
STACK_OF(OCSP_CERTID) *ids);
|
||||||
static int add_ocsp_serial(OCSP_REQUEST **req, char *serial, X509 *issuer,
|
static int add_ocsp_serial(OCSP_REQUEST **req, char *serial, const EVP_MD * cert_id_md, X509 *issuer,
|
||||||
STACK_OF(OCSP_CERTID) *ids);
|
STACK_OF(OCSP_CERTID) *ids);
|
||||||
static int print_ocsp_summary(BIO *out, OCSP_BASICRESP *bs, OCSP_REQUEST *req,
|
static int print_ocsp_summary(BIO *out, OCSP_BASICRESP *bs, OCSP_REQUEST *req,
|
||||||
STACK *names, STACK_OF(OCSP_CERTID) *ids,
|
STACK_OF(OPENSSL_STRING) *names,
|
||||||
long nsec, long maxage);
|
STACK_OF(OCSP_CERTID) *ids, long nsec,
|
||||||
|
long maxage);
|
||||||
|
|
||||||
static int make_ocsp_response(OCSP_RESPONSE **resp, OCSP_REQUEST *req, CA_DB *db,
|
static int make_ocsp_response(OCSP_RESPONSE **resp, OCSP_REQUEST *req, CA_DB *db,
|
||||||
X509 *ca, X509 *rcert, EVP_PKEY *rkey,
|
X509 *ca, X509 *rcert, EVP_PKEY *rkey,
|
||||||
@@ -86,6 +114,7 @@ static BIO *init_responder(char *port);
|
|||||||
static int do_responder(OCSP_REQUEST **preq, BIO **pcbio, BIO *acbio, char *port);
|
static int do_responder(OCSP_REQUEST **preq, BIO **pcbio, BIO *acbio, char *port);
|
||||||
static int send_ocsp_response(BIO *cbio, OCSP_RESPONSE *resp);
|
static int send_ocsp_response(BIO *cbio, OCSP_RESPONSE *resp);
|
||||||
static OCSP_RESPONSE *query_responder(BIO *err, BIO *cbio, char *path,
|
static OCSP_RESPONSE *query_responder(BIO *err, BIO *cbio, char *path,
|
||||||
|
STACK_OF(CONF_VALUE) *headers,
|
||||||
OCSP_REQUEST *req, int req_timeout);
|
OCSP_REQUEST *req, int req_timeout);
|
||||||
|
|
||||||
#undef PROG
|
#undef PROG
|
||||||
@@ -104,6 +133,7 @@ int MAIN(int argc, char **argv)
|
|||||||
char *rsignfile = NULL, *rkeyfile = NULL;
|
char *rsignfile = NULL, *rkeyfile = NULL;
|
||||||
char *outfile = NULL;
|
char *outfile = NULL;
|
||||||
int add_nonce = 1, noverify = 0, use_ssl = -1;
|
int add_nonce = 1, noverify = 0, use_ssl = -1;
|
||||||
|
STACK_OF(CONF_VALUE) *headers = NULL;
|
||||||
OCSP_REQUEST *req = NULL;
|
OCSP_REQUEST *req = NULL;
|
||||||
OCSP_RESPONSE *resp = NULL;
|
OCSP_RESPONSE *resp = NULL;
|
||||||
OCSP_BASICRESP *bs = NULL;
|
OCSP_BASICRESP *bs = NULL;
|
||||||
@@ -126,7 +156,7 @@ int MAIN(int argc, char **argv)
|
|||||||
int badarg = 0;
|
int badarg = 0;
|
||||||
int i;
|
int i;
|
||||||
int ignore_err = 0;
|
int ignore_err = 0;
|
||||||
STACK *reqnames = NULL;
|
STACK_OF(OPENSSL_STRING) *reqnames = NULL;
|
||||||
STACK_OF(OCSP_CERTID) *ids = NULL;
|
STACK_OF(OCSP_CERTID) *ids = NULL;
|
||||||
|
|
||||||
X509 *rca_cert = NULL;
|
X509 *rca_cert = NULL;
|
||||||
@@ -134,6 +164,7 @@ int MAIN(int argc, char **argv)
|
|||||||
char *rca_filename = NULL;
|
char *rca_filename = NULL;
|
||||||
CA_DB *rdb = NULL;
|
CA_DB *rdb = NULL;
|
||||||
int nmin = 0, ndays = -1;
|
int nmin = 0, ndays = -1;
|
||||||
|
const EVP_MD *cert_id_md = NULL;
|
||||||
|
|
||||||
if (bio_err == NULL) bio_err = BIO_new_fp(stderr, BIO_NOCLOSE);
|
if (bio_err == NULL) bio_err = BIO_new_fp(stderr, BIO_NOCLOSE);
|
||||||
|
|
||||||
@@ -142,7 +173,7 @@ int MAIN(int argc, char **argv)
|
|||||||
SSL_load_error_strings();
|
SSL_load_error_strings();
|
||||||
OpenSSL_add_ssl_algorithms();
|
OpenSSL_add_ssl_algorithms();
|
||||||
args = argv + 1;
|
args = argv + 1;
|
||||||
reqnames = sk_new_null();
|
reqnames = sk_OPENSSL_STRING_new_null();
|
||||||
ids = sk_OCSP_CERTID_new_null();
|
ids = sk_OCSP_CERTID_new_null();
|
||||||
while (!badarg && *args && *args[0] == '-')
|
while (!badarg && *args && *args[0] == '-')
|
||||||
{
|
{
|
||||||
@@ -202,6 +233,16 @@ int MAIN(int argc, char **argv)
|
|||||||
}
|
}
|
||||||
else badarg = 1;
|
else badarg = 1;
|
||||||
}
|
}
|
||||||
|
else if (!strcmp(*args, "-header"))
|
||||||
|
{
|
||||||
|
if (args[1] && args[2])
|
||||||
|
{
|
||||||
|
if (!X509V3_add_value(args[1], args[2], &headers))
|
||||||
|
goto end;
|
||||||
|
args += 2;
|
||||||
|
}
|
||||||
|
else badarg = 1;
|
||||||
|
}
|
||||||
else if (!strcmp(*args, "-ignore_err"))
|
else if (!strcmp(*args, "-ignore_err"))
|
||||||
ignore_err = 1;
|
ignore_err = 1;
|
||||||
else if (!strcmp(*args, "-noverify"))
|
else if (!strcmp(*args, "-noverify"))
|
||||||
@@ -401,9 +442,10 @@ int MAIN(int argc, char **argv)
|
|||||||
cert = load_cert(bio_err, *args, FORMAT_PEM,
|
cert = load_cert(bio_err, *args, FORMAT_PEM,
|
||||||
NULL, e, "certificate");
|
NULL, e, "certificate");
|
||||||
if(!cert) goto end;
|
if(!cert) goto end;
|
||||||
if(!add_ocsp_cert(&req, cert, issuer, ids))
|
if (!cert_id_md) cert_id_md = EVP_sha1();
|
||||||
|
if(!add_ocsp_cert(&req, cert, cert_id_md, issuer, ids))
|
||||||
goto end;
|
goto end;
|
||||||
if(!sk_push(reqnames, *args))
|
if(!sk_OPENSSL_STRING_push(reqnames, *args))
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
else badarg = 1;
|
else badarg = 1;
|
||||||
@@ -413,9 +455,10 @@ int MAIN(int argc, char **argv)
|
|||||||
if (args[1])
|
if (args[1])
|
||||||
{
|
{
|
||||||
args++;
|
args++;
|
||||||
if(!add_ocsp_serial(&req, *args, issuer, ids))
|
if (!cert_id_md) cert_id_md = EVP_sha1();
|
||||||
|
if(!add_ocsp_serial(&req, *args, cert_id_md, issuer, ids))
|
||||||
goto end;
|
goto end;
|
||||||
if(!sk_push(reqnames, *args))
|
if(!sk_OPENSSL_STRING_push(reqnames, *args))
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
else badarg = 1;
|
else badarg = 1;
|
||||||
@@ -515,7 +558,10 @@ int MAIN(int argc, char **argv)
|
|||||||
}
|
}
|
||||||
else badarg = 1;
|
else badarg = 1;
|
||||||
}
|
}
|
||||||
else badarg = 1;
|
else if ((cert_id_md = EVP_get_digestbyname((*args)+1))==NULL)
|
||||||
|
{
|
||||||
|
badarg = 1;
|
||||||
|
}
|
||||||
args++;
|
args++;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -571,6 +617,7 @@ int MAIN(int argc, char **argv)
|
|||||||
BIO_printf (bio_err, "-ndays n number of days before next update\n");
|
BIO_printf (bio_err, "-ndays n number of days before next update\n");
|
||||||
BIO_printf (bio_err, "-resp_key_id identify reponse by signing certificate key ID\n");
|
BIO_printf (bio_err, "-resp_key_id identify reponse by signing certificate key ID\n");
|
||||||
BIO_printf (bio_err, "-nrequest n number of requests to accept (default unlimited)\n");
|
BIO_printf (bio_err, "-nrequest n number of requests to accept (default unlimited)\n");
|
||||||
|
BIO_printf (bio_err, "-<dgst alg> use specified digest in the request");
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -677,7 +724,8 @@ int MAIN(int argc, char **argv)
|
|||||||
"signer private key");
|
"signer private key");
|
||||||
if (!key)
|
if (!key)
|
||||||
goto end;
|
goto end;
|
||||||
if (!OCSP_request_sign(req, signer, key, EVP_sha1(), sign_other, sign_flags))
|
|
||||||
|
if (!OCSP_request_sign(req, signer, key, NULL, sign_other, sign_flags))
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err, "Error signing OCSP request\n");
|
BIO_printf(bio_err, "Error signing OCSP request\n");
|
||||||
goto end;
|
goto end;
|
||||||
@@ -721,7 +769,7 @@ int MAIN(int argc, char **argv)
|
|||||||
{
|
{
|
||||||
#ifndef OPENSSL_NO_SOCK
|
#ifndef OPENSSL_NO_SOCK
|
||||||
resp = process_responder(bio_err, req, host, path,
|
resp = process_responder(bio_err, req, host, path,
|
||||||
port, use_ssl, req_timeout);
|
port, use_ssl, headers, req_timeout);
|
||||||
if (!resp)
|
if (!resp)
|
||||||
goto end;
|
goto end;
|
||||||
#else
|
#else
|
||||||
@@ -866,10 +914,11 @@ end:
|
|||||||
OCSP_REQUEST_free(req);
|
OCSP_REQUEST_free(req);
|
||||||
OCSP_RESPONSE_free(resp);
|
OCSP_RESPONSE_free(resp);
|
||||||
OCSP_BASICRESP_free(bs);
|
OCSP_BASICRESP_free(bs);
|
||||||
sk_free(reqnames);
|
sk_OPENSSL_STRING_free(reqnames);
|
||||||
sk_OCSP_CERTID_free(ids);
|
sk_OCSP_CERTID_free(ids);
|
||||||
sk_X509_pop_free(sign_other, X509_free);
|
sk_X509_pop_free(sign_other, X509_free);
|
||||||
sk_X509_pop_free(verify_other, X509_free);
|
sk_X509_pop_free(verify_other, X509_free);
|
||||||
|
sk_CONF_VALUE_pop_free(headers, X509V3_conf_free);
|
||||||
|
|
||||||
if (use_ssl != -1)
|
if (use_ssl != -1)
|
||||||
{
|
{
|
||||||
@@ -881,7 +930,7 @@ end:
|
|||||||
OPENSSL_EXIT(ret);
|
OPENSSL_EXIT(ret);
|
||||||
}
|
}
|
||||||
|
|
||||||
static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, X509 *issuer,
|
static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, const EVP_MD *cert_id_md,X509 *issuer,
|
||||||
STACK_OF(OCSP_CERTID) *ids)
|
STACK_OF(OCSP_CERTID) *ids)
|
||||||
{
|
{
|
||||||
OCSP_CERTID *id;
|
OCSP_CERTID *id;
|
||||||
@@ -892,7 +941,7 @@ static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, X509 *issuer,
|
|||||||
}
|
}
|
||||||
if(!*req) *req = OCSP_REQUEST_new();
|
if(!*req) *req = OCSP_REQUEST_new();
|
||||||
if(!*req) goto err;
|
if(!*req) goto err;
|
||||||
id = OCSP_cert_to_id(NULL, cert, issuer);
|
id = OCSP_cert_to_id(cert_id_md, cert, issuer);
|
||||||
if(!id || !sk_OCSP_CERTID_push(ids, id)) goto err;
|
if(!id || !sk_OCSP_CERTID_push(ids, id)) goto err;
|
||||||
if(!OCSP_request_add0_id(*req, id)) goto err;
|
if(!OCSP_request_add0_id(*req, id)) goto err;
|
||||||
return 1;
|
return 1;
|
||||||
@@ -902,7 +951,7 @@ static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, X509 *issuer,
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
static int add_ocsp_serial(OCSP_REQUEST **req, char *serial, X509 *issuer,
|
static int add_ocsp_serial(OCSP_REQUEST **req, char *serial,const EVP_MD *cert_id_md, X509 *issuer,
|
||||||
STACK_OF(OCSP_CERTID) *ids)
|
STACK_OF(OCSP_CERTID) *ids)
|
||||||
{
|
{
|
||||||
OCSP_CERTID *id;
|
OCSP_CERTID *id;
|
||||||
@@ -924,7 +973,7 @@ static int add_ocsp_serial(OCSP_REQUEST **req, char *serial, X509 *issuer,
|
|||||||
BIO_printf(bio_err, "Error converting serial number %s\n", serial);
|
BIO_printf(bio_err, "Error converting serial number %s\n", serial);
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
id = OCSP_cert_id_new(EVP_sha1(), iname, ikey, sno);
|
id = OCSP_cert_id_new(cert_id_md, iname, ikey, sno);
|
||||||
ASN1_INTEGER_free(sno);
|
ASN1_INTEGER_free(sno);
|
||||||
if(!id || !sk_OCSP_CERTID_push(ids, id)) goto err;
|
if(!id || !sk_OCSP_CERTID_push(ids, id)) goto err;
|
||||||
if(!OCSP_request_add0_id(*req, id)) goto err;
|
if(!OCSP_request_add0_id(*req, id)) goto err;
|
||||||
@@ -936,8 +985,9 @@ static int add_ocsp_serial(OCSP_REQUEST **req, char *serial, X509 *issuer,
|
|||||||
}
|
}
|
||||||
|
|
||||||
static int print_ocsp_summary(BIO *out, OCSP_BASICRESP *bs, OCSP_REQUEST *req,
|
static int print_ocsp_summary(BIO *out, OCSP_BASICRESP *bs, OCSP_REQUEST *req,
|
||||||
STACK *names, STACK_OF(OCSP_CERTID) *ids,
|
STACK_OF(OPENSSL_STRING) *names,
|
||||||
long nsec, long maxage)
|
STACK_OF(OCSP_CERTID) *ids, long nsec,
|
||||||
|
long maxage)
|
||||||
{
|
{
|
||||||
OCSP_CERTID *id;
|
OCSP_CERTID *id;
|
||||||
char *name;
|
char *name;
|
||||||
@@ -947,13 +997,13 @@ static int print_ocsp_summary(BIO *out, OCSP_BASICRESP *bs, OCSP_REQUEST *req,
|
|||||||
|
|
||||||
ASN1_GENERALIZEDTIME *rev, *thisupd, *nextupd;
|
ASN1_GENERALIZEDTIME *rev, *thisupd, *nextupd;
|
||||||
|
|
||||||
if (!bs || !req || !sk_num(names) || !sk_OCSP_CERTID_num(ids))
|
if (!bs || !req || !sk_OPENSSL_STRING_num(names) || !sk_OCSP_CERTID_num(ids))
|
||||||
return 1;
|
return 1;
|
||||||
|
|
||||||
for (i = 0; i < sk_OCSP_CERTID_num(ids); i++)
|
for (i = 0; i < sk_OCSP_CERTID_num(ids); i++)
|
||||||
{
|
{
|
||||||
id = sk_OCSP_CERTID_value(ids, i);
|
id = sk_OCSP_CERTID_value(ids, i);
|
||||||
name = sk_value(names, i);
|
name = sk_OPENSSL_STRING_value(names, i);
|
||||||
BIO_printf(out, "%s: ", name);
|
BIO_printf(out, "%s: ", name);
|
||||||
|
|
||||||
if(!OCSP_resp_find_status(bs, id, &status, &reason,
|
if(!OCSP_resp_find_status(bs, id, &status, &reason,
|
||||||
@@ -1010,7 +1060,6 @@ static int make_ocsp_response(OCSP_RESPONSE **resp, OCSP_REQUEST *req, CA_DB *db
|
|||||||
OCSP_BASICRESP *bs = NULL;
|
OCSP_BASICRESP *bs = NULL;
|
||||||
int i, id_count, ret = 1;
|
int i, id_count, ret = 1;
|
||||||
|
|
||||||
|
|
||||||
id_count = OCSP_request_onereq_count(req);
|
id_count = OCSP_request_onereq_count(req);
|
||||||
|
|
||||||
if (id_count <= 0)
|
if (id_count <= 0)
|
||||||
@@ -1019,7 +1068,6 @@ static int make_ocsp_response(OCSP_RESPONSE **resp, OCSP_REQUEST *req, CA_DB *db
|
|||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
ca_id = OCSP_cert_to_id(EVP_sha1(), NULL, ca);
|
|
||||||
|
|
||||||
bs = OCSP_BASICRESP_new();
|
bs = OCSP_BASICRESP_new();
|
||||||
thisupd = X509_gmtime_adj(NULL, 0);
|
thisupd = X509_gmtime_adj(NULL, 0);
|
||||||
@@ -1032,8 +1080,23 @@ static int make_ocsp_response(OCSP_RESPONSE **resp, OCSP_REQUEST *req, CA_DB *db
|
|||||||
OCSP_ONEREQ *one;
|
OCSP_ONEREQ *one;
|
||||||
ASN1_INTEGER *serial;
|
ASN1_INTEGER *serial;
|
||||||
char **inf;
|
char **inf;
|
||||||
|
ASN1_OBJECT *cert_id_md_oid;
|
||||||
|
const EVP_MD *cert_id_md;
|
||||||
one = OCSP_request_onereq_get0(req, i);
|
one = OCSP_request_onereq_get0(req, i);
|
||||||
cid = OCSP_onereq_get0_id(one);
|
cid = OCSP_onereq_get0_id(one);
|
||||||
|
|
||||||
|
OCSP_id_get0_info(NULL,&cert_id_md_oid, NULL,NULL, cid);
|
||||||
|
|
||||||
|
cert_id_md = EVP_get_digestbyobj(cert_id_md_oid);
|
||||||
|
if (! cert_id_md)
|
||||||
|
{
|
||||||
|
*resp = OCSP_response_create(OCSP_RESPONSE_STATUS_INTERNALERROR,
|
||||||
|
NULL);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
if (ca_id) OCSP_CERTID_free(ca_id);
|
||||||
|
ca_id = OCSP_cert_to_id(cert_id_md, NULL, ca);
|
||||||
|
|
||||||
/* Is this request about our CA? */
|
/* Is this request about our CA? */
|
||||||
if (OCSP_id_issuer_cmp(ca_id, cid))
|
if (OCSP_id_issuer_cmp(ca_id, cid))
|
||||||
{
|
{
|
||||||
@@ -1079,7 +1142,7 @@ static int make_ocsp_response(OCSP_RESPONSE **resp, OCSP_REQUEST *req, CA_DB *db
|
|||||||
|
|
||||||
OCSP_copy_nonce(bs, req);
|
OCSP_copy_nonce(bs, req);
|
||||||
|
|
||||||
OCSP_basic_sign(bs, rcert, rkey, EVP_sha1(), rother, flags);
|
OCSP_basic_sign(bs, rcert, rkey, NULL, rother, flags);
|
||||||
|
|
||||||
*resp = OCSP_response_create(OCSP_RESPONSE_STATUS_SUCCESSFUL, bs);
|
*resp = OCSP_response_create(OCSP_RESPONSE_STATUS_SUCCESSFUL, bs);
|
||||||
|
|
||||||
@@ -1211,10 +1274,12 @@ static int send_ocsp_response(BIO *cbio, OCSP_RESPONSE *resp)
|
|||||||
}
|
}
|
||||||
|
|
||||||
static OCSP_RESPONSE *query_responder(BIO *err, BIO *cbio, char *path,
|
static OCSP_RESPONSE *query_responder(BIO *err, BIO *cbio, char *path,
|
||||||
|
STACK_OF(CONF_VALUE) *headers,
|
||||||
OCSP_REQUEST *req, int req_timeout)
|
OCSP_REQUEST *req, int req_timeout)
|
||||||
{
|
{
|
||||||
int fd;
|
int fd;
|
||||||
int rv;
|
int rv;
|
||||||
|
int i;
|
||||||
OCSP_REQ_CTX *ctx = NULL;
|
OCSP_REQ_CTX *ctx = NULL;
|
||||||
OCSP_RESPONSE *rsp = NULL;
|
OCSP_RESPONSE *rsp = NULL;
|
||||||
fd_set confds;
|
fd_set confds;
|
||||||
@@ -1231,16 +1296,13 @@ static OCSP_RESPONSE *query_responder(BIO *err, BIO *cbio, char *path,
|
|||||||
return NULL;
|
return NULL;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (req_timeout == -1)
|
|
||||||
return OCSP_sendreq_bio(cbio, path, req);
|
|
||||||
|
|
||||||
if (BIO_get_fd(cbio, &fd) <= 0)
|
if (BIO_get_fd(cbio, &fd) <= 0)
|
||||||
{
|
{
|
||||||
BIO_puts(err, "Can't get connection fd\n");
|
BIO_puts(err, "Can't get connection fd\n");
|
||||||
goto err;
|
goto err;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (rv <= 0)
|
if (req_timeout != -1 && rv <= 0)
|
||||||
{
|
{
|
||||||
FD_ZERO(&confds);
|
FD_ZERO(&confds);
|
||||||
openssl_fdset(fd, &confds);
|
openssl_fdset(fd, &confds);
|
||||||
@@ -1255,15 +1317,27 @@ static OCSP_RESPONSE *query_responder(BIO *err, BIO *cbio, char *path,
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
ctx = OCSP_sendreq_new(cbio, path, req, -1);
|
ctx = OCSP_sendreq_new(cbio, path, NULL, -1);
|
||||||
if (!ctx)
|
if (!ctx)
|
||||||
return NULL;
|
return NULL;
|
||||||
|
|
||||||
|
for (i = 0; i < sk_CONF_VALUE_num(headers); i++)
|
||||||
|
{
|
||||||
|
CONF_VALUE *hdr = sk_CONF_VALUE_value(headers, i);
|
||||||
|
if (!OCSP_REQ_CTX_add1_header(ctx, hdr->name, hdr->value))
|
||||||
|
goto err;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!OCSP_REQ_CTX_set1_req(ctx, req))
|
||||||
|
goto err;
|
||||||
|
|
||||||
for (;;)
|
for (;;)
|
||||||
{
|
{
|
||||||
rv = OCSP_sendreq_nbio(&rsp, ctx);
|
rv = OCSP_sendreq_nbio(&rsp, ctx);
|
||||||
if (rv != -1)
|
if (rv != -1)
|
||||||
break;
|
break;
|
||||||
|
if (req_timeout == -1)
|
||||||
|
continue;
|
||||||
FD_ZERO(&confds);
|
FD_ZERO(&confds);
|
||||||
openssl_fdset(fd, &confds);
|
openssl_fdset(fd, &confds);
|
||||||
tv.tv_usec = 0;
|
tv.tv_usec = 0;
|
||||||
@@ -1298,6 +1372,7 @@ static OCSP_RESPONSE *query_responder(BIO *err, BIO *cbio, char *path,
|
|||||||
|
|
||||||
OCSP_RESPONSE *process_responder(BIO *err, OCSP_REQUEST *req,
|
OCSP_RESPONSE *process_responder(BIO *err, OCSP_REQUEST *req,
|
||||||
char *host, char *path, char *port, int use_ssl,
|
char *host, char *path, char *port, int use_ssl,
|
||||||
|
STACK_OF(CONF_VALUE) *headers,
|
||||||
int req_timeout)
|
int req_timeout)
|
||||||
{
|
{
|
||||||
BIO *cbio = NULL;
|
BIO *cbio = NULL;
|
||||||
@@ -1332,14 +1407,14 @@ OCSP_RESPONSE *process_responder(BIO *err, OCSP_REQUEST *req,
|
|||||||
sbio = BIO_new_ssl(ctx, 1);
|
sbio = BIO_new_ssl(ctx, 1);
|
||||||
cbio = BIO_push(sbio, cbio);
|
cbio = BIO_push(sbio, cbio);
|
||||||
}
|
}
|
||||||
resp = query_responder(err, cbio, path, req, req_timeout);
|
resp = query_responder(err, cbio, path, headers, req, req_timeout);
|
||||||
if (!resp)
|
if (!resp)
|
||||||
BIO_printf(bio_err, "Error querying OCSP responsder\n");
|
BIO_printf(bio_err, "Error querying OCSP responsder\n");
|
||||||
end:
|
end:
|
||||||
if (ctx)
|
|
||||||
SSL_CTX_free(ctx);
|
|
||||||
if (cbio)
|
if (cbio)
|
||||||
BIO_free_all(cbio);
|
BIO_free_all(cbio);
|
||||||
|
if (ctx)
|
||||||
|
SSL_CTX_free(ctx);
|
||||||
return resp;
|
return resp;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -21,12 +21,17 @@ oid_section = new_oids
|
|||||||
|
|
||||||
[ new_oids ]
|
[ new_oids ]
|
||||||
|
|
||||||
# We can add new OIDs in here for use by 'ca' and 'req'.
|
# We can add new OIDs in here for use by 'ca', 'req' and 'ts'.
|
||||||
# Add a simple OID like this:
|
# Add a simple OID like this:
|
||||||
# testoid1=1.2.3.4
|
# testoid1=1.2.3.4
|
||||||
# Or use config file substitution like this:
|
# Or use config file substitution like this:
|
||||||
# testoid2=${testoid1}.5.6
|
# testoid2=${testoid1}.5.6
|
||||||
|
|
||||||
|
# Policies used by the TSA examples.
|
||||||
|
tsa_policy1 = 1.2.3.4.1
|
||||||
|
tsa_policy2 = 1.2.3.4.5.6
|
||||||
|
tsa_policy3 = 1.2.3.4.5.7
|
||||||
|
|
||||||
####################################################################
|
####################################################################
|
||||||
[ ca ]
|
[ ca ]
|
||||||
default_ca = CA_default # The default ca section
|
default_ca = CA_default # The default ca section
|
||||||
@@ -67,7 +72,7 @@ cert_opt = ca_default # Certificate field options
|
|||||||
|
|
||||||
default_days = 365 # how long to certify for
|
default_days = 365 # how long to certify for
|
||||||
default_crl_days= 30 # how long before next CRL
|
default_crl_days= 30 # how long before next CRL
|
||||||
default_md = sha1 # which md to use.
|
default_md = default # use public key default MD
|
||||||
preserve = no # keep passed DN ordering
|
preserve = no # keep passed DN ordering
|
||||||
|
|
||||||
# A few difference way of specifying how similar the request should look
|
# A few difference way of specifying how similar the request should look
|
||||||
@@ -110,13 +115,12 @@ x509_extensions = v3_ca # The extentions to add to the self signed cert
|
|||||||
|
|
||||||
# This sets a mask for permitted string types. There are several options.
|
# This sets a mask for permitted string types. There are several options.
|
||||||
# default: PrintableString, T61String, BMPString.
|
# default: PrintableString, T61String, BMPString.
|
||||||
# pkix : PrintableString, BMPString.
|
# pkix : PrintableString, BMPString (PKIX recommendation before 2004)
|
||||||
# utf8only: only UTF8Strings.
|
# utf8only: only UTF8Strings (PKIX recommendation after 2004).
|
||||||
# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
|
# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
|
||||||
# MASK:XXXX a literal mask value.
|
# MASK:XXXX a literal mask value.
|
||||||
# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings
|
# WARNING: ancient versions of Netscape crash on BMPStrings or UTF8Strings.
|
||||||
# so use this option with caution!
|
string_mask = utf8only
|
||||||
string_mask = nombstr
|
|
||||||
|
|
||||||
# req_extensions = v3_req # The extensions to add to a certificate request
|
# req_extensions = v3_req # The extensions to add to a certificate request
|
||||||
|
|
||||||
@@ -207,6 +211,9 @@ authorityKeyIdentifier=keyid,issuer
|
|||||||
#nsCaPolicyUrl
|
#nsCaPolicyUrl
|
||||||
#nsSslServerName
|
#nsSslServerName
|
||||||
|
|
||||||
|
# This is required for TSA certificates.
|
||||||
|
# extendedKeyUsage = critical,timeStamping
|
||||||
|
|
||||||
[ v3_req ]
|
[ v3_req ]
|
||||||
|
|
||||||
# Extensions to add to a certificate request
|
# Extensions to add to a certificate request
|
||||||
@@ -224,7 +231,7 @@ keyUsage = nonRepudiation, digitalSignature, keyEncipherment
|
|||||||
|
|
||||||
subjectKeyIdentifier=hash
|
subjectKeyIdentifier=hash
|
||||||
|
|
||||||
authorityKeyIdentifier=keyid:always,issuer:always
|
authorityKeyIdentifier=keyid:always,issuer
|
||||||
|
|
||||||
# This is what PKIX recommends but some broken software chokes on critical
|
# This is what PKIX recommends but some broken software chokes on critical
|
||||||
# extensions.
|
# extensions.
|
||||||
@@ -257,7 +264,7 @@ basicConstraints = CA:true
|
|||||||
# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
|
# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
|
||||||
|
|
||||||
# issuerAltName=issuer:copy
|
# issuerAltName=issuer:copy
|
||||||
authorityKeyIdentifier=keyid:always,issuer:always
|
authorityKeyIdentifier=keyid:always
|
||||||
|
|
||||||
[ proxy_cert_ext ]
|
[ proxy_cert_ext ]
|
||||||
# These extensions should be added when creating a proxy certificate
|
# These extensions should be added when creating a proxy certificate
|
||||||
@@ -290,7 +297,7 @@ nsComment = "OpenSSL Generated Certificate"
|
|||||||
|
|
||||||
# PKIX recommendations harmless if included in all certificates.
|
# PKIX recommendations harmless if included in all certificates.
|
||||||
subjectKeyIdentifier=hash
|
subjectKeyIdentifier=hash
|
||||||
authorityKeyIdentifier=keyid,issuer:always
|
authorityKeyIdentifier=keyid,issuer
|
||||||
|
|
||||||
# This stuff is for subjectAltName and issuerAltname.
|
# This stuff is for subjectAltName and issuerAltname.
|
||||||
# Import the email address.
|
# Import the email address.
|
||||||
@@ -311,3 +318,33 @@ authorityKeyIdentifier=keyid,issuer:always
|
|||||||
|
|
||||||
# This really needs to be in place for it to be a proxy certificate.
|
# This really needs to be in place for it to be a proxy certificate.
|
||||||
proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
|
proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
|
||||||
|
|
||||||
|
####################################################################
|
||||||
|
[ tsa ]
|
||||||
|
|
||||||
|
default_tsa = tsa_config1 # the default TSA section
|
||||||
|
|
||||||
|
[ tsa_config1 ]
|
||||||
|
|
||||||
|
# These are used by the TSA reply generation only.
|
||||||
|
dir = sys\$disk:[.demoCA # TSA root directory
|
||||||
|
serial = $dir]tsaserial. # The current serial number (mandatory)
|
||||||
|
crypto_device = builtin # OpenSSL engine to use for signing
|
||||||
|
signer_cert = $dir/tsacert.pem # The TSA signing certificate
|
||||||
|
# (optional)
|
||||||
|
certs = $dir.cacert.pem] # Certificate chain to include in reply
|
||||||
|
# (optional)
|
||||||
|
signer_key = $dir/private/tsakey.pem # The TSA private key (optional)
|
||||||
|
|
||||||
|
default_policy = tsa_policy1 # Policy if request did not specify it
|
||||||
|
# (optional)
|
||||||
|
other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional)
|
||||||
|
digests = md5, sha1 # Acceptable message digests (mandatory)
|
||||||
|
accuracy = secs:1, millisecs:500, microsecs:100 # (optional)
|
||||||
|
clock_precision_digits = 0 # number of digits after dot. (optional)
|
||||||
|
ordering = yes # Is ordering defined for timestamps?
|
||||||
|
# (optional, default: no)
|
||||||
|
tsa_name = yes # Must the TSA name be included in the reply?
|
||||||
|
# (optional, default: no)
|
||||||
|
ess_cert_id_chain = no # Must the ESS cert id chain be included?
|
||||||
|
# (optional, default: no)
|
||||||
|
|||||||
268
apps/openssl.c
268
apps/openssl.c
@@ -129,18 +129,20 @@
|
|||||||
#include "progs.h"
|
#include "progs.h"
|
||||||
#include "s_apps.h"
|
#include "s_apps.h"
|
||||||
#include <openssl/err.h>
|
#include <openssl/err.h>
|
||||||
|
#ifdef OPENSSL_FIPS
|
||||||
|
#include <openssl/fips.h>
|
||||||
|
#endif
|
||||||
|
|
||||||
/* The LHASH callbacks ("hash" & "cmp") have been replaced by functions with the
|
/* The LHASH callbacks ("hash" & "cmp") have been replaced by functions with the
|
||||||
* base prototypes (we cast each variable inside the function to the required
|
* base prototypes (we cast each variable inside the function to the required
|
||||||
* type of "FUNCTION*"). This removes the necessity for macro-generated wrapper
|
* type of "FUNCTION*"). This removes the necessity for macro-generated wrapper
|
||||||
* functions. */
|
* functions. */
|
||||||
|
|
||||||
/* static unsigned long MS_CALLBACK hash(FUNCTION *a); */
|
static LHASH_OF(FUNCTION) *prog_init(void );
|
||||||
static unsigned long MS_CALLBACK hash(const void *a_void);
|
static int do_cmd(LHASH_OF(FUNCTION) *prog,int argc,char *argv[]);
|
||||||
/* static int MS_CALLBACK cmp(FUNCTION *a,FUNCTION *b); */
|
static void list_pkey(BIO *out);
|
||||||
static int MS_CALLBACK cmp(const void *a_void,const void *b_void);
|
static void list_cipher(BIO *out);
|
||||||
static LHASH *prog_init(void );
|
static void list_md(BIO *out);
|
||||||
static int do_cmd(LHASH *prog,int argc,char *argv[]);
|
|
||||||
char *default_config_file=NULL;
|
char *default_config_file=NULL;
|
||||||
|
|
||||||
/* Make sure there is only one when MONOLITH is defined */
|
/* Make sure there is only one when MONOLITH is defined */
|
||||||
@@ -213,8 +215,13 @@ static void lock_dbg_cb(int mode, int type, const char *file, int line)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#if defined( OPENSSL_SYS_VMS) && (__INITIAL_POINTER_SIZE == 64)
|
||||||
|
# define ARGV _Argv
|
||||||
|
#else
|
||||||
|
# define ARGV Argv
|
||||||
|
#endif
|
||||||
|
|
||||||
int main(int Argc, char *Argv[])
|
int main(int Argc, char *ARGV[])
|
||||||
{
|
{
|
||||||
ARGS arg;
|
ARGS arg;
|
||||||
#define PROG_NAME_SIZE 39
|
#define PROG_NAME_SIZE 39
|
||||||
@@ -226,9 +233,57 @@ int main(int Argc, char *Argv[])
|
|||||||
int n,i,ret=0;
|
int n,i,ret=0;
|
||||||
int argc;
|
int argc;
|
||||||
char **argv,*p;
|
char **argv,*p;
|
||||||
LHASH *prog=NULL;
|
LHASH_OF(FUNCTION) *prog=NULL;
|
||||||
long errline;
|
long errline;
|
||||||
|
|
||||||
|
#if defined( OPENSSL_SYS_VMS) && (__INITIAL_POINTER_SIZE == 64)
|
||||||
|
/* 2011-03-22 SMS.
|
||||||
|
* If we have 32-bit pointers everywhere, then we're safe, and
|
||||||
|
* we bypass this mess, as on non-VMS systems. (See ARGV,
|
||||||
|
* above.)
|
||||||
|
* Problem 1: Compaq/HP C before V7.3 always used 32-bit
|
||||||
|
* pointers for argv[].
|
||||||
|
* Fix 1: For a 32-bit argv[], when we're using 64-bit pointers
|
||||||
|
* everywhere else, we always allocate and use a 64-bit
|
||||||
|
* duplicate of argv[].
|
||||||
|
* Problem 2: Compaq/HP C V7.3 (Alpha, IA64) before ECO1 failed
|
||||||
|
* to NULL-terminate a 64-bit argv[]. (As this was written, the
|
||||||
|
* compiler ECO was available only on IA64.)
|
||||||
|
* Fix 2: Unless advised not to (VMS_TRUST_ARGV), we test a
|
||||||
|
* 64-bit argv[argc] for NULL, and, if necessary, use a
|
||||||
|
* (properly) NULL-terminated (64-bit) duplicate of argv[].
|
||||||
|
* The same code is used in either case to duplicate argv[].
|
||||||
|
* Some of these decisions could be handled in preprocessing,
|
||||||
|
* but the code tends to get even uglier, and the penalty for
|
||||||
|
* deciding at compile- or run-time is tiny.
|
||||||
|
*/
|
||||||
|
char **Argv = NULL;
|
||||||
|
int free_Argv = 0;
|
||||||
|
|
||||||
|
if ((sizeof( _Argv) < 8) /* 32-bit argv[]. */
|
||||||
|
# if !defined( VMS_TRUST_ARGV)
|
||||||
|
|| (_Argv[ Argc] != NULL) /* Untrusted argv[argc] not NULL. */
|
||||||
|
# endif
|
||||||
|
)
|
||||||
|
{
|
||||||
|
int i;
|
||||||
|
Argv = OPENSSL_malloc( (Argc+ 1)* sizeof( char *));
|
||||||
|
if (Argv == NULL)
|
||||||
|
{ ret = -1; goto end; }
|
||||||
|
for(i = 0; i < Argc; i++)
|
||||||
|
Argv[i] = _Argv[i];
|
||||||
|
Argv[ Argc] = NULL; /* Certain NULL termination. */
|
||||||
|
free_Argv = 1;
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
/* Use the known-good 32-bit argv[] (which needs the
|
||||||
|
* type cast to satisfy the compiler), or the trusted or
|
||||||
|
* tested-good 64-bit argv[] as-is. */
|
||||||
|
Argv = (char **)_Argv;
|
||||||
|
}
|
||||||
|
#endif /* defined( OPENSSL_SYS_VMS) && (__INITIAL_POINTER_SIZE == 64) */
|
||||||
|
|
||||||
arg.data=NULL;
|
arg.data=NULL;
|
||||||
arg.count=0;
|
arg.count=0;
|
||||||
|
|
||||||
@@ -258,6 +313,19 @@ int main(int Argc, char *Argv[])
|
|||||||
CRYPTO_set_locking_callback(lock_dbg_cb);
|
CRYPTO_set_locking_callback(lock_dbg_cb);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if(getenv("OPENSSL_FIPS")) {
|
||||||
|
#ifdef OPENSSL_FIPS
|
||||||
|
if (!FIPS_mode_set(1)) {
|
||||||
|
ERR_load_crypto_strings();
|
||||||
|
ERR_print_errors(BIO_new_fp(stderr,BIO_NOCLOSE));
|
||||||
|
EXIT(1);
|
||||||
|
}
|
||||||
|
#else
|
||||||
|
fprintf(stderr, "FIPS mode not supported.\n");
|
||||||
|
EXIT(1);
|
||||||
|
#endif
|
||||||
|
}
|
||||||
|
|
||||||
apps_startup();
|
apps_startup();
|
||||||
|
|
||||||
/* Lets load up our environment a little */
|
/* Lets load up our environment a little */
|
||||||
@@ -273,9 +341,21 @@ int main(int Argc, char *Argv[])
|
|||||||
i=NCONF_load(config,p,&errline);
|
i=NCONF_load(config,p,&errline);
|
||||||
if (i == 0)
|
if (i == 0)
|
||||||
{
|
{
|
||||||
|
if (ERR_GET_REASON(ERR_peek_last_error())
|
||||||
|
== CONF_R_NO_SUCH_FILE)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"WARNING: can't open config file: %s\n",p);
|
||||||
|
ERR_clear_error();
|
||||||
NCONF_free(config);
|
NCONF_free(config);
|
||||||
config = NULL;
|
config = NULL;
|
||||||
ERR_clear_error();
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
NCONF_free(config);
|
||||||
|
exit(1);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
prog=prog_init();
|
prog=prog_init();
|
||||||
@@ -284,7 +364,7 @@ int main(int Argc, char *Argv[])
|
|||||||
program_name(Argv[0],pname,sizeof pname);
|
program_name(Argv[0],pname,sizeof pname);
|
||||||
|
|
||||||
f.name=pname;
|
f.name=pname;
|
||||||
fp=(FUNCTION *)lh_retrieve(prog,&f);
|
fp=lh_FUNCTION_retrieve(prog,&f);
|
||||||
if (fp != NULL)
|
if (fp != NULL)
|
||||||
{
|
{
|
||||||
Argv[0]=pname;
|
Argv[0]=pname;
|
||||||
@@ -319,7 +399,8 @@ int main(int Argc, char *Argv[])
|
|||||||
else prompt="OpenSSL> ";
|
else prompt="OpenSSL> ";
|
||||||
fputs(prompt,stdout);
|
fputs(prompt,stdout);
|
||||||
fflush(stdout);
|
fflush(stdout);
|
||||||
fgets(p,n,stdin);
|
if (!fgets(p,n,stdin))
|
||||||
|
goto end;
|
||||||
if (p[0] == '\0') goto end;
|
if (p[0] == '\0') goto end;
|
||||||
i=strlen(p);
|
i=strlen(p);
|
||||||
if (i <= 1) break;
|
if (i <= 1) break;
|
||||||
@@ -350,7 +431,7 @@ end:
|
|||||||
NCONF_free(config);
|
NCONF_free(config);
|
||||||
config=NULL;
|
config=NULL;
|
||||||
}
|
}
|
||||||
if (prog != NULL) lh_free(prog);
|
if (prog != NULL) lh_FUNCTION_free(prog);
|
||||||
if (arg.data != NULL) OPENSSL_free(arg.data);
|
if (arg.data != NULL) OPENSSL_free(arg.data);
|
||||||
|
|
||||||
apps_shutdown();
|
apps_shutdown();
|
||||||
@@ -361,14 +442,25 @@ end:
|
|||||||
BIO_free(bio_err);
|
BIO_free(bio_err);
|
||||||
bio_err=NULL;
|
bio_err=NULL;
|
||||||
}
|
}
|
||||||
|
#if defined( OPENSSL_SYS_VMS) && (__INITIAL_POINTER_SIZE == 64)
|
||||||
|
/* Free any duplicate Argv[] storage. */
|
||||||
|
if (free_Argv)
|
||||||
|
{
|
||||||
|
OPENSSL_free(Argv);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
OPENSSL_EXIT(ret);
|
OPENSSL_EXIT(ret);
|
||||||
}
|
}
|
||||||
|
|
||||||
#define LIST_STANDARD_COMMANDS "list-standard-commands"
|
#define LIST_STANDARD_COMMANDS "list-standard-commands"
|
||||||
#define LIST_MESSAGE_DIGEST_COMMANDS "list-message-digest-commands"
|
#define LIST_MESSAGE_DIGEST_COMMANDS "list-message-digest-commands"
|
||||||
|
#define LIST_MESSAGE_DIGEST_ALGORITHMS "list-message-digest-algorithms"
|
||||||
#define LIST_CIPHER_COMMANDS "list-cipher-commands"
|
#define LIST_CIPHER_COMMANDS "list-cipher-commands"
|
||||||
|
#define LIST_CIPHER_ALGORITHMS "list-cipher-algorithms"
|
||||||
|
#define LIST_PUBLIC_KEY_ALGORITHMS "list-public-key-algorithms"
|
||||||
|
|
||||||
static int do_cmd(LHASH *prog, int argc, char *argv[])
|
|
||||||
|
static int do_cmd(LHASH_OF(FUNCTION) *prog, int argc, char *argv[])
|
||||||
{
|
{
|
||||||
FUNCTION f,*fp;
|
FUNCTION f,*fp;
|
||||||
int i,ret=1,tp,nl;
|
int i,ret=1,tp,nl;
|
||||||
@@ -376,7 +468,22 @@ static int do_cmd(LHASH *prog, int argc, char *argv[])
|
|||||||
if ((argc <= 0) || (argv[0] == NULL))
|
if ((argc <= 0) || (argv[0] == NULL))
|
||||||
{ ret=0; goto end; }
|
{ ret=0; goto end; }
|
||||||
f.name=argv[0];
|
f.name=argv[0];
|
||||||
fp=(FUNCTION *)lh_retrieve(prog,&f);
|
fp=lh_FUNCTION_retrieve(prog,&f);
|
||||||
|
if (fp == NULL)
|
||||||
|
{
|
||||||
|
if (EVP_get_digestbyname(argv[0]))
|
||||||
|
{
|
||||||
|
f.type = FUNC_TYPE_MD;
|
||||||
|
f.func = dgst_main;
|
||||||
|
fp = &f;
|
||||||
|
}
|
||||||
|
else if (EVP_get_cipherbyname(argv[0]))
|
||||||
|
{
|
||||||
|
f.type = FUNC_TYPE_CIPHER;
|
||||||
|
f.func = enc_main;
|
||||||
|
fp = &f;
|
||||||
|
}
|
||||||
|
}
|
||||||
if (fp != NULL)
|
if (fp != NULL)
|
||||||
{
|
{
|
||||||
ret=fp->func(argc,argv);
|
ret=fp->func(argc,argv);
|
||||||
@@ -391,7 +498,7 @@ static int do_cmd(LHASH *prog, int argc, char *argv[])
|
|||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
f.name=argv[0]+3;
|
f.name=argv[0]+3;
|
||||||
ret = (lh_retrieve(prog,&f) != NULL);
|
ret = (lh_FUNCTION_retrieve(prog,&f) != NULL);
|
||||||
if (!ret)
|
if (!ret)
|
||||||
BIO_printf(bio_stdout, "%s\n", argv[0]);
|
BIO_printf(bio_stdout, "%s\n", argv[0]);
|
||||||
else
|
else
|
||||||
@@ -409,7 +516,10 @@ static int do_cmd(LHASH *prog, int argc, char *argv[])
|
|||||||
}
|
}
|
||||||
else if ((strcmp(argv[0],LIST_STANDARD_COMMANDS) == 0) ||
|
else if ((strcmp(argv[0],LIST_STANDARD_COMMANDS) == 0) ||
|
||||||
(strcmp(argv[0],LIST_MESSAGE_DIGEST_COMMANDS) == 0) ||
|
(strcmp(argv[0],LIST_MESSAGE_DIGEST_COMMANDS) == 0) ||
|
||||||
(strcmp(argv[0],LIST_CIPHER_COMMANDS) == 0))
|
(strcmp(argv[0],LIST_MESSAGE_DIGEST_ALGORITHMS) == 0) ||
|
||||||
|
(strcmp(argv[0],LIST_CIPHER_COMMANDS) == 0) ||
|
||||||
|
(strcmp(argv[0],LIST_CIPHER_ALGORITHMS) == 0) ||
|
||||||
|
(strcmp(argv[0],LIST_PUBLIC_KEY_ALGORITHMS) == 0))
|
||||||
{
|
{
|
||||||
int list_type;
|
int list_type;
|
||||||
BIO *bio_stdout;
|
BIO *bio_stdout;
|
||||||
@@ -418,6 +528,12 @@ static int do_cmd(LHASH *prog, int argc, char *argv[])
|
|||||||
list_type = FUNC_TYPE_GENERAL;
|
list_type = FUNC_TYPE_GENERAL;
|
||||||
else if (strcmp(argv[0],LIST_MESSAGE_DIGEST_COMMANDS) == 0)
|
else if (strcmp(argv[0],LIST_MESSAGE_DIGEST_COMMANDS) == 0)
|
||||||
list_type = FUNC_TYPE_MD;
|
list_type = FUNC_TYPE_MD;
|
||||||
|
else if (strcmp(argv[0],LIST_MESSAGE_DIGEST_ALGORITHMS) == 0)
|
||||||
|
list_type = FUNC_TYPE_MD_ALG;
|
||||||
|
else if (strcmp(argv[0],LIST_PUBLIC_KEY_ALGORITHMS) == 0)
|
||||||
|
list_type = FUNC_TYPE_PKEY;
|
||||||
|
else if (strcmp(argv[0],LIST_CIPHER_ALGORITHMS) == 0)
|
||||||
|
list_type = FUNC_TYPE_CIPHER_ALG;
|
||||||
else /* strcmp(argv[0],LIST_CIPHER_COMMANDS) == 0 */
|
else /* strcmp(argv[0],LIST_CIPHER_COMMANDS) == 0 */
|
||||||
list_type = FUNC_TYPE_CIPHER;
|
list_type = FUNC_TYPE_CIPHER;
|
||||||
bio_stdout = BIO_new_fp(stdout,BIO_NOCLOSE);
|
bio_stdout = BIO_new_fp(stdout,BIO_NOCLOSE);
|
||||||
@@ -428,9 +544,22 @@ static int do_cmd(LHASH *prog, int argc, char *argv[])
|
|||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
if (!load_config(bio_err, NULL))
|
||||||
|
goto end;
|
||||||
|
|
||||||
|
if (list_type == FUNC_TYPE_PKEY)
|
||||||
|
list_pkey(bio_stdout);
|
||||||
|
if (list_type == FUNC_TYPE_MD_ALG)
|
||||||
|
list_md(bio_stdout);
|
||||||
|
if (list_type == FUNC_TYPE_CIPHER_ALG)
|
||||||
|
list_cipher(bio_stdout);
|
||||||
|
else
|
||||||
|
{
|
||||||
for (fp=functions; fp->name != NULL; fp++)
|
for (fp=functions; fp->name != NULL; fp++)
|
||||||
if (fp->type == list_type)
|
if (fp->type == list_type)
|
||||||
BIO_printf(bio_stdout, "%s\n", fp->name);
|
BIO_printf(bio_stdout, "%s\n",
|
||||||
|
fp->name);
|
||||||
|
}
|
||||||
BIO_free_all(bio_stdout);
|
BIO_free_all(bio_stdout);
|
||||||
ret=0;
|
ret=0;
|
||||||
goto end;
|
goto end;
|
||||||
@@ -493,9 +622,94 @@ static int SortFnByName(const void *_f1,const void *_f2)
|
|||||||
return strcmp(f1->name,f2->name);
|
return strcmp(f1->name,f2->name);
|
||||||
}
|
}
|
||||||
|
|
||||||
static LHASH *prog_init(void)
|
static void list_pkey(BIO *out)
|
||||||
{
|
{
|
||||||
LHASH *ret;
|
int i;
|
||||||
|
for (i = 0; i < EVP_PKEY_asn1_get_count(); i++)
|
||||||
|
{
|
||||||
|
const EVP_PKEY_ASN1_METHOD *ameth;
|
||||||
|
int pkey_id, pkey_base_id, pkey_flags;
|
||||||
|
const char *pinfo, *pem_str;
|
||||||
|
ameth = EVP_PKEY_asn1_get0(i);
|
||||||
|
EVP_PKEY_asn1_get0_info(&pkey_id, &pkey_base_id, &pkey_flags,
|
||||||
|
&pinfo, &pem_str, ameth);
|
||||||
|
if (pkey_flags & ASN1_PKEY_ALIAS)
|
||||||
|
{
|
||||||
|
BIO_printf(out, "Name: %s\n",
|
||||||
|
OBJ_nid2ln(pkey_id));
|
||||||
|
BIO_printf(out, "\tType: Alias to %s\n",
|
||||||
|
OBJ_nid2ln(pkey_base_id));
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
BIO_printf(out, "Name: %s\n", pinfo);
|
||||||
|
BIO_printf(out, "\tType: %s Algorithm\n",
|
||||||
|
pkey_flags & ASN1_PKEY_DYNAMIC ?
|
||||||
|
"External" : "Builtin");
|
||||||
|
BIO_printf(out, "\tOID: %s\n", OBJ_nid2ln(pkey_id));
|
||||||
|
if (pem_str == NULL)
|
||||||
|
pem_str = "(none)";
|
||||||
|
BIO_printf(out, "\tPEM string: %s\n", pem_str);
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
static void list_cipher_fn(const EVP_CIPHER *c,
|
||||||
|
const char *from, const char *to, void *arg)
|
||||||
|
{
|
||||||
|
if (c)
|
||||||
|
BIO_printf(arg, "%s\n", EVP_CIPHER_name(c));
|
||||||
|
else
|
||||||
|
{
|
||||||
|
if (!from)
|
||||||
|
from = "<undefined>";
|
||||||
|
if (!to)
|
||||||
|
to = "<undefined>";
|
||||||
|
BIO_printf(arg, "%s => %s\n", from, to);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
static void list_cipher(BIO *out)
|
||||||
|
{
|
||||||
|
EVP_CIPHER_do_all_sorted(list_cipher_fn, out);
|
||||||
|
}
|
||||||
|
|
||||||
|
static void list_md_fn(const EVP_MD *m,
|
||||||
|
const char *from, const char *to, void *arg)
|
||||||
|
{
|
||||||
|
if (m)
|
||||||
|
BIO_printf(arg, "%s\n", EVP_MD_name(m));
|
||||||
|
else
|
||||||
|
{
|
||||||
|
if (!from)
|
||||||
|
from = "<undefined>";
|
||||||
|
if (!to)
|
||||||
|
to = "<undefined>";
|
||||||
|
BIO_printf(arg, "%s => %s\n", from, to);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
static void list_md(BIO *out)
|
||||||
|
{
|
||||||
|
EVP_MD_do_all_sorted(list_md_fn, out);
|
||||||
|
}
|
||||||
|
|
||||||
|
static int MS_CALLBACK function_cmp(const FUNCTION *a, const FUNCTION *b)
|
||||||
|
{
|
||||||
|
return strncmp(a->name,b->name,8);
|
||||||
|
}
|
||||||
|
static IMPLEMENT_LHASH_COMP_FN(function, FUNCTION)
|
||||||
|
|
||||||
|
static unsigned long MS_CALLBACK function_hash(const FUNCTION *a)
|
||||||
|
{
|
||||||
|
return lh_strhash(a->name);
|
||||||
|
}
|
||||||
|
static IMPLEMENT_LHASH_HASH_FN(function, FUNCTION)
|
||||||
|
|
||||||
|
static LHASH_OF(FUNCTION) *prog_init(void)
|
||||||
|
{
|
||||||
|
LHASH_OF(FUNCTION) *ret;
|
||||||
FUNCTION *f;
|
FUNCTION *f;
|
||||||
size_t i;
|
size_t i;
|
||||||
|
|
||||||
@@ -504,23 +718,11 @@ static LHASH *prog_init(void)
|
|||||||
;
|
;
|
||||||
qsort(functions,i,sizeof *functions,SortFnByName);
|
qsort(functions,i,sizeof *functions,SortFnByName);
|
||||||
|
|
||||||
if ((ret=lh_new(hash, cmp)) == NULL)
|
if ((ret=lh_FUNCTION_new()) == NULL)
|
||||||
return(NULL);
|
return(NULL);
|
||||||
|
|
||||||
for (f=functions; f->name != NULL; f++)
|
for (f=functions; f->name != NULL; f++)
|
||||||
lh_insert(ret,f);
|
(void)lh_FUNCTION_insert(ret,f);
|
||||||
return(ret);
|
return(ret);
|
||||||
}
|
}
|
||||||
|
|
||||||
/* static int MS_CALLBACK cmp(FUNCTION *a, FUNCTION *b) */
|
|
||||||
static int MS_CALLBACK cmp(const void *a_void, const void *b_void)
|
|
||||||
{
|
|
||||||
return(strncmp(((const FUNCTION *)a_void)->name,
|
|
||||||
((const FUNCTION *)b_void)->name,8));
|
|
||||||
}
|
|
||||||
|
|
||||||
/* static unsigned long MS_CALLBACK hash(FUNCTION *a) */
|
|
||||||
static unsigned long MS_CALLBACK hash(const void *a_void)
|
|
||||||
{
|
|
||||||
return(lh_strhash(((const FUNCTION *)a_void)->name));
|
|
||||||
}
|
|
||||||
|
|||||||
@@ -21,12 +21,17 @@ oid_section = new_oids
|
|||||||
|
|
||||||
[ new_oids ]
|
[ new_oids ]
|
||||||
|
|
||||||
# We can add new OIDs in here for use by 'ca' and 'req'.
|
# We can add new OIDs in here for use by 'ca', 'req' and 'ts'.
|
||||||
# Add a simple OID like this:
|
# Add a simple OID like this:
|
||||||
# testoid1=1.2.3.4
|
# testoid1=1.2.3.4
|
||||||
# Or use config file substitution like this:
|
# Or use config file substitution like this:
|
||||||
# testoid2=${testoid1}.5.6
|
# testoid2=${testoid1}.5.6
|
||||||
|
|
||||||
|
# Policies used by the TSA examples.
|
||||||
|
tsa_policy1 = 1.2.3.4.1
|
||||||
|
tsa_policy2 = 1.2.3.4.5.6
|
||||||
|
tsa_policy3 = 1.2.3.4.5.7
|
||||||
|
|
||||||
####################################################################
|
####################################################################
|
||||||
[ ca ]
|
[ ca ]
|
||||||
default_ca = CA_default # The default ca section
|
default_ca = CA_default # The default ca section
|
||||||
@@ -67,7 +72,7 @@ cert_opt = ca_default # Certificate field options
|
|||||||
|
|
||||||
default_days = 365 # how long to certify for
|
default_days = 365 # how long to certify for
|
||||||
default_crl_days= 30 # how long before next CRL
|
default_crl_days= 30 # how long before next CRL
|
||||||
default_md = sha1 # which md to use.
|
default_md = default # use public key default MD
|
||||||
preserve = no # keep passed DN ordering
|
preserve = no # keep passed DN ordering
|
||||||
|
|
||||||
# A few difference way of specifying how similar the request should look
|
# A few difference way of specifying how similar the request should look
|
||||||
@@ -110,13 +115,12 @@ x509_extensions = v3_ca # The extentions to add to the self signed cert
|
|||||||
|
|
||||||
# This sets a mask for permitted string types. There are several options.
|
# This sets a mask for permitted string types. There are several options.
|
||||||
# default: PrintableString, T61String, BMPString.
|
# default: PrintableString, T61String, BMPString.
|
||||||
# pkix : PrintableString, BMPString.
|
# pkix : PrintableString, BMPString (PKIX recommendation before 2004)
|
||||||
# utf8only: only UTF8Strings.
|
# utf8only: only UTF8Strings (PKIX recommendation after 2004).
|
||||||
# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
|
# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
|
||||||
# MASK:XXXX a literal mask value.
|
# MASK:XXXX a literal mask value.
|
||||||
# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings
|
# WARNING: ancient versions of Netscape crash on BMPStrings or UTF8Strings.
|
||||||
# so use this option with caution!
|
string_mask = utf8only
|
||||||
string_mask = nombstr
|
|
||||||
|
|
||||||
# req_extensions = v3_req # The extensions to add to a certificate request
|
# req_extensions = v3_req # The extensions to add to a certificate request
|
||||||
|
|
||||||
@@ -207,6 +211,9 @@ authorityKeyIdentifier=keyid,issuer
|
|||||||
#nsCaPolicyUrl
|
#nsCaPolicyUrl
|
||||||
#nsSslServerName
|
#nsSslServerName
|
||||||
|
|
||||||
|
# This is required for TSA certificates.
|
||||||
|
# extendedKeyUsage = critical,timeStamping
|
||||||
|
|
||||||
[ v3_req ]
|
[ v3_req ]
|
||||||
|
|
||||||
# Extensions to add to a certificate request
|
# Extensions to add to a certificate request
|
||||||
@@ -224,7 +231,7 @@ keyUsage = nonRepudiation, digitalSignature, keyEncipherment
|
|||||||
|
|
||||||
subjectKeyIdentifier=hash
|
subjectKeyIdentifier=hash
|
||||||
|
|
||||||
authorityKeyIdentifier=keyid:always,issuer:always
|
authorityKeyIdentifier=keyid:always,issuer
|
||||||
|
|
||||||
# This is what PKIX recommends but some broken software chokes on critical
|
# This is what PKIX recommends but some broken software chokes on critical
|
||||||
# extensions.
|
# extensions.
|
||||||
@@ -257,7 +264,7 @@ basicConstraints = CA:true
|
|||||||
# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
|
# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
|
||||||
|
|
||||||
# issuerAltName=issuer:copy
|
# issuerAltName=issuer:copy
|
||||||
authorityKeyIdentifier=keyid:always,issuer:always
|
authorityKeyIdentifier=keyid:always
|
||||||
|
|
||||||
[ proxy_cert_ext ]
|
[ proxy_cert_ext ]
|
||||||
# These extensions should be added when creating a proxy certificate
|
# These extensions should be added when creating a proxy certificate
|
||||||
@@ -290,7 +297,7 @@ nsComment = "OpenSSL Generated Certificate"
|
|||||||
|
|
||||||
# PKIX recommendations harmless if included in all certificates.
|
# PKIX recommendations harmless if included in all certificates.
|
||||||
subjectKeyIdentifier=hash
|
subjectKeyIdentifier=hash
|
||||||
authorityKeyIdentifier=keyid,issuer:always
|
authorityKeyIdentifier=keyid,issuer
|
||||||
|
|
||||||
# This stuff is for subjectAltName and issuerAltname.
|
# This stuff is for subjectAltName and issuerAltname.
|
||||||
# Import the email address.
|
# Import the email address.
|
||||||
@@ -311,3 +318,33 @@ authorityKeyIdentifier=keyid,issuer:always
|
|||||||
|
|
||||||
# This really needs to be in place for it to be a proxy certificate.
|
# This really needs to be in place for it to be a proxy certificate.
|
||||||
proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
|
proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
|
||||||
|
|
||||||
|
####################################################################
|
||||||
|
[ tsa ]
|
||||||
|
|
||||||
|
default_tsa = tsa_config1 # the default TSA section
|
||||||
|
|
||||||
|
[ tsa_config1 ]
|
||||||
|
|
||||||
|
# These are used by the TSA reply generation only.
|
||||||
|
dir = ./demoCA # TSA root directory
|
||||||
|
serial = $dir/tsaserial # The current serial number (mandatory)
|
||||||
|
crypto_device = builtin # OpenSSL engine to use for signing
|
||||||
|
signer_cert = $dir/tsacert.pem # The TSA signing certificate
|
||||||
|
# (optional)
|
||||||
|
certs = $dir/cacert.pem # Certificate chain to include in reply
|
||||||
|
# (optional)
|
||||||
|
signer_key = $dir/private/tsakey.pem # The TSA private key (optional)
|
||||||
|
|
||||||
|
default_policy = tsa_policy1 # Policy if request did not specify it
|
||||||
|
# (optional)
|
||||||
|
other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional)
|
||||||
|
digests = md5, sha1 # Acceptable message digests (mandatory)
|
||||||
|
accuracy = secs:1, millisecs:500, microsecs:100 # (optional)
|
||||||
|
clock_precision_digits = 0 # number of digits after dot. (optional)
|
||||||
|
ordering = yes # Is ordering defined for timestamps?
|
||||||
|
# (optional, default: no)
|
||||||
|
tsa_name = yes # Must the TSA name be included in the reply?
|
||||||
|
# (optional, default: no)
|
||||||
|
ess_cert_id_chain = no # Must the ESS cert id chain be included?
|
||||||
|
# (optional, default: no)
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
/* pkcs12.c */
|
/* pkcs12.c */
|
||||||
/* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
|
/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
|
||||||
* project.
|
* project.
|
||||||
*/
|
*/
|
||||||
/* ====================================================================
|
/* ====================================================================
|
||||||
@@ -88,6 +88,7 @@ int print_attribs(BIO *out, STACK_OF(X509_ATTRIBUTE) *attrlst,const char *name);
|
|||||||
void hex_prin(BIO *out, unsigned char *buf, int len);
|
void hex_prin(BIO *out, unsigned char *buf, int len);
|
||||||
int alg_print(BIO *x, X509_ALGOR *alg);
|
int alg_print(BIO *x, X509_ALGOR *alg);
|
||||||
int cert_load(BIO *in, STACK_OF(X509) *sk);
|
int cert_load(BIO *in, STACK_OF(X509) *sk);
|
||||||
|
static int set_pbe(BIO *err, int *ppbe, const char *str);
|
||||||
|
|
||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
@@ -100,6 +101,7 @@ int MAIN(int argc, char **argv)
|
|||||||
char **args;
|
char **args;
|
||||||
char *name = NULL;
|
char *name = NULL;
|
||||||
char *csp_name = NULL;
|
char *csp_name = NULL;
|
||||||
|
int add_lmk = 0;
|
||||||
PKCS12 *p12 = NULL;
|
PKCS12 *p12 = NULL;
|
||||||
char pass[50], macpass[50];
|
char pass[50], macpass[50];
|
||||||
int export_cert = 0;
|
int export_cert = 0;
|
||||||
@@ -115,11 +117,12 @@ int MAIN(int argc, char **argv)
|
|||||||
int ret = 1;
|
int ret = 1;
|
||||||
int macver = 1;
|
int macver = 1;
|
||||||
int noprompt = 0;
|
int noprompt = 0;
|
||||||
STACK *canames = NULL;
|
STACK_OF(OPENSSL_STRING) *canames = NULL;
|
||||||
char *cpass = NULL, *mpass = NULL;
|
char *cpass = NULL, *mpass = NULL;
|
||||||
char *passargin = NULL, *passargout = NULL, *passarg = NULL;
|
char *passargin = NULL, *passargout = NULL, *passarg = NULL;
|
||||||
char *passin = NULL, *passout = NULL;
|
char *passin = NULL, *passout = NULL;
|
||||||
char *inrand = NULL;
|
char *inrand = NULL;
|
||||||
|
char *macalg = NULL;
|
||||||
char *CApath = NULL, *CAfile = NULL;
|
char *CApath = NULL, *CAfile = NULL;
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
char *engine=NULL;
|
char *engine=NULL;
|
||||||
@@ -177,33 +180,18 @@ int MAIN(int argc, char **argv)
|
|||||||
maciter = 1;
|
maciter = 1;
|
||||||
else if (!strcmp (*args, "-nomac"))
|
else if (!strcmp (*args, "-nomac"))
|
||||||
maciter = -1;
|
maciter = -1;
|
||||||
|
else if (!strcmp (*args, "-macalg"))
|
||||||
|
if (args[1]) {
|
||||||
|
args++;
|
||||||
|
macalg = *args;
|
||||||
|
} else badarg = 1;
|
||||||
else if (!strcmp (*args, "-nodes")) enc=NULL;
|
else if (!strcmp (*args, "-nodes")) enc=NULL;
|
||||||
else if (!strcmp (*args, "-certpbe")) {
|
else if (!strcmp (*args, "-certpbe")) {
|
||||||
if (args[1]) {
|
if (!set_pbe(bio_err, &cert_pbe, *++args))
|
||||||
args++;
|
|
||||||
if (!strcmp(*args, "NONE"))
|
|
||||||
cert_pbe = -1;
|
|
||||||
else
|
|
||||||
cert_pbe=OBJ_txt2nid(*args);
|
|
||||||
if(cert_pbe == NID_undef) {
|
|
||||||
BIO_printf(bio_err,
|
|
||||||
"Unknown PBE algorithm %s\n", *args);
|
|
||||||
badarg = 1;
|
badarg = 1;
|
||||||
}
|
|
||||||
} else badarg = 1;
|
|
||||||
} else if (!strcmp (*args, "-keypbe")) {
|
} else if (!strcmp (*args, "-keypbe")) {
|
||||||
if (args[1]) {
|
if (!set_pbe(bio_err, &key_pbe, *++args))
|
||||||
args++;
|
|
||||||
if (!strcmp(*args, "NONE"))
|
|
||||||
key_pbe = -1;
|
|
||||||
else
|
|
||||||
key_pbe=OBJ_txt2nid(*args);
|
|
||||||
if(key_pbe == NID_undef) {
|
|
||||||
BIO_printf(bio_err,
|
|
||||||
"Unknown PBE algorithm %s\n", *args);
|
|
||||||
badarg = 1;
|
badarg = 1;
|
||||||
}
|
|
||||||
} else badarg = 1;
|
|
||||||
} else if (!strcmp (*args, "-rand")) {
|
} else if (!strcmp (*args, "-rand")) {
|
||||||
if (args[1]) {
|
if (args[1]) {
|
||||||
args++;
|
args++;
|
||||||
@@ -224,7 +212,9 @@ int MAIN(int argc, char **argv)
|
|||||||
args++;
|
args++;
|
||||||
name = *args;
|
name = *args;
|
||||||
} else badarg = 1;
|
} else badarg = 1;
|
||||||
} else if (!strcmp (*args, "-CSP")) {
|
} else if (!strcmp (*args, "-LMK"))
|
||||||
|
add_lmk = 1;
|
||||||
|
else if (!strcmp (*args, "-CSP")) {
|
||||||
if (args[1]) {
|
if (args[1]) {
|
||||||
args++;
|
args++;
|
||||||
csp_name = *args;
|
csp_name = *args;
|
||||||
@@ -232,8 +222,8 @@ int MAIN(int argc, char **argv)
|
|||||||
} else if (!strcmp (*args, "-caname")) {
|
} else if (!strcmp (*args, "-caname")) {
|
||||||
if (args[1]) {
|
if (args[1]) {
|
||||||
args++;
|
args++;
|
||||||
if (!canames) canames = sk_new_null();
|
if (!canames) canames = sk_OPENSSL_STRING_new_null();
|
||||||
sk_push(canames, *args);
|
sk_OPENSSL_STRING_push(canames, *args);
|
||||||
} else badarg = 1;
|
} else badarg = 1;
|
||||||
} else if (!strcmp (*args, "-in")) {
|
} else if (!strcmp (*args, "-in")) {
|
||||||
if (args[1]) {
|
if (args[1]) {
|
||||||
@@ -322,11 +312,14 @@ int MAIN(int argc, char **argv)
|
|||||||
#endif
|
#endif
|
||||||
BIO_printf (bio_err, "-nodes don't encrypt private keys\n");
|
BIO_printf (bio_err, "-nodes don't encrypt private keys\n");
|
||||||
BIO_printf (bio_err, "-noiter don't use encryption iteration\n");
|
BIO_printf (bio_err, "-noiter don't use encryption iteration\n");
|
||||||
|
BIO_printf (bio_err, "-nomaciter don't use MAC iteration\n");
|
||||||
BIO_printf (bio_err, "-maciter use MAC iteration\n");
|
BIO_printf (bio_err, "-maciter use MAC iteration\n");
|
||||||
|
BIO_printf (bio_err, "-nomac don't generate MAC\n");
|
||||||
BIO_printf (bio_err, "-twopass separate MAC, encryption passwords\n");
|
BIO_printf (bio_err, "-twopass separate MAC, encryption passwords\n");
|
||||||
BIO_printf (bio_err, "-descert encrypt PKCS#12 certificates with triple DES (default RC2-40)\n");
|
BIO_printf (bio_err, "-descert encrypt PKCS#12 certificates with triple DES (default RC2-40)\n");
|
||||||
BIO_printf (bio_err, "-certpbe alg specify certificate PBE algorithm (default RC2-40)\n");
|
BIO_printf (bio_err, "-certpbe alg specify certificate PBE algorithm (default RC2-40)\n");
|
||||||
BIO_printf (bio_err, "-keypbe alg specify private key PBE algorithm (default 3DES)\n");
|
BIO_printf (bio_err, "-keypbe alg specify private key PBE algorithm (default 3DES)\n");
|
||||||
|
BIO_printf (bio_err, "-macalg alg digest algorithm used in MAC (default SHA1)\n");
|
||||||
BIO_printf (bio_err, "-keyex set MS key exchange type\n");
|
BIO_printf (bio_err, "-keyex set MS key exchange type\n");
|
||||||
BIO_printf (bio_err, "-keysig set MS key signature type\n");
|
BIO_printf (bio_err, "-keysig set MS key signature type\n");
|
||||||
BIO_printf (bio_err, "-password p set import/export password source\n");
|
BIO_printf (bio_err, "-password p set import/export password source\n");
|
||||||
@@ -338,6 +331,8 @@ int MAIN(int argc, char **argv)
|
|||||||
BIO_printf(bio_err, "-rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
|
BIO_printf(bio_err, "-rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
|
||||||
BIO_printf(bio_err, " load the file (or the files in the directory) into\n");
|
BIO_printf(bio_err, " load the file (or the files in the directory) into\n");
|
||||||
BIO_printf(bio_err, " the random number generator\n");
|
BIO_printf(bio_err, " the random number generator\n");
|
||||||
|
BIO_printf(bio_err, "-CSP name Microsoft CSP name\n");
|
||||||
|
BIO_printf(bio_err, "-LMK Add local machine keyset attribute to private key\n");
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -427,6 +422,7 @@ int MAIN(int argc, char **argv)
|
|||||||
EVP_PKEY *key = NULL;
|
EVP_PKEY *key = NULL;
|
||||||
X509 *ucert = NULL, *x = NULL;
|
X509 *ucert = NULL, *x = NULL;
|
||||||
STACK_OF(X509) *certs=NULL;
|
STACK_OF(X509) *certs=NULL;
|
||||||
|
const EVP_MD *macmd = NULL;
|
||||||
unsigned char *catmp = NULL;
|
unsigned char *catmp = NULL;
|
||||||
int i;
|
int i;
|
||||||
|
|
||||||
@@ -553,9 +549,9 @@ int MAIN(int argc, char **argv)
|
|||||||
|
|
||||||
/* Add any CA names */
|
/* Add any CA names */
|
||||||
|
|
||||||
for (i = 0; i < sk_num(canames); i++)
|
for (i = 0; i < sk_OPENSSL_STRING_num(canames); i++)
|
||||||
{
|
{
|
||||||
catmp = (unsigned char *)sk_value(canames, i);
|
catmp = (unsigned char *)sk_OPENSSL_STRING_value(canames, i);
|
||||||
X509_alias_set1(sk_X509_value(certs, i), catmp, -1);
|
X509_alias_set1(sk_X509_value(certs, i), catmp, -1);
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -563,6 +559,8 @@ int MAIN(int argc, char **argv)
|
|||||||
EVP_PKEY_add1_attr_by_NID(key, NID_ms_csp_name,
|
EVP_PKEY_add1_attr_by_NID(key, NID_ms_csp_name,
|
||||||
MBSTRING_ASC, (unsigned char *)csp_name, -1);
|
MBSTRING_ASC, (unsigned char *)csp_name, -1);
|
||||||
|
|
||||||
|
if (add_lmk && key)
|
||||||
|
EVP_PKEY_add1_attr_by_NID(key, NID_LocalKeySet, 0, NULL, -1);
|
||||||
|
|
||||||
#ifdef CRYPTO_MDEBUG
|
#ifdef CRYPTO_MDEBUG
|
||||||
CRYPTO_pop_info();
|
CRYPTO_pop_info();
|
||||||
@@ -591,8 +589,18 @@ int MAIN(int argc, char **argv)
|
|||||||
goto export_end;
|
goto export_end;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (macalg)
|
||||||
|
{
|
||||||
|
macmd = EVP_get_digestbyname(macalg);
|
||||||
|
if (!macmd)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Unknown digest algorithm %s\n",
|
||||||
|
macalg);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
if (maciter != -1)
|
if (maciter != -1)
|
||||||
PKCS12_set_mac(p12, mpass, -1, NULL, 0, maciter, NULL);
|
PKCS12_set_mac(p12, mpass, -1, NULL, 0, maciter, macmd);
|
||||||
|
|
||||||
#ifdef CRYPTO_MDEBUG
|
#ifdef CRYPTO_MDEBUG
|
||||||
CRYPTO_pop_info();
|
CRYPTO_pop_info();
|
||||||
@@ -639,7 +647,7 @@ int MAIN(int argc, char **argv)
|
|||||||
|
|
||||||
if (!twopass) BUF_strlcpy(macpass, pass, sizeof macpass);
|
if (!twopass) BUF_strlcpy(macpass, pass, sizeof macpass);
|
||||||
|
|
||||||
if (options & INFO) BIO_printf (bio_err, "MAC Iteration %ld\n", p12->mac->iter ? ASN1_INTEGER_get (p12->mac->iter) : 1);
|
if ((options & INFO) && p12->mac) BIO_printf (bio_err, "MAC Iteration %ld\n", p12->mac->iter ? ASN1_INTEGER_get (p12->mac->iter) : 1);
|
||||||
if(macver) {
|
if(macver) {
|
||||||
#ifdef CRYPTO_MDEBUG
|
#ifdef CRYPTO_MDEBUG
|
||||||
CRYPTO_push_info("verify MAC");
|
CRYPTO_push_info("verify MAC");
|
||||||
@@ -679,7 +687,7 @@ int MAIN(int argc, char **argv)
|
|||||||
#endif
|
#endif
|
||||||
BIO_free(in);
|
BIO_free(in);
|
||||||
BIO_free_all(out);
|
BIO_free_all(out);
|
||||||
if (canames) sk_free(canames);
|
if (canames) sk_OPENSSL_STRING_free(canames);
|
||||||
if(passin) OPENSSL_free(passin);
|
if(passin) OPENSSL_free(passin);
|
||||||
if(passout) OPENSSL_free(passout);
|
if(passout) OPENSSL_free(passout);
|
||||||
apps_shutdown();
|
apps_shutdown();
|
||||||
@@ -915,7 +923,7 @@ int print_attribs (BIO *out, STACK_OF(X509_ATTRIBUTE) *attrlst,const char *name)
|
|||||||
av = sk_ASN1_TYPE_value(attr->value.set, 0);
|
av = sk_ASN1_TYPE_value(attr->value.set, 0);
|
||||||
switch(av->type) {
|
switch(av->type) {
|
||||||
case V_ASN1_BMPSTRING:
|
case V_ASN1_BMPSTRING:
|
||||||
value = uni2asc(av->value.bmpstring->data,
|
value = OPENSSL_uni2asc(av->value.bmpstring->data,
|
||||||
av->value.bmpstring->length);
|
av->value.bmpstring->length);
|
||||||
BIO_printf(out, "%s\n", value);
|
BIO_printf(out, "%s\n", value);
|
||||||
OPENSSL_free(value);
|
OPENSSL_free(value);
|
||||||
@@ -948,4 +956,22 @@ void hex_prin(BIO *out, unsigned char *buf, int len)
|
|||||||
for (i = 0; i < len; i++) BIO_printf (out, "%02X ", buf[i]);
|
for (i = 0; i < len; i++) BIO_printf (out, "%02X ", buf[i]);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static int set_pbe(BIO *err, int *ppbe, const char *str)
|
||||||
|
{
|
||||||
|
if (!str)
|
||||||
|
return 0;
|
||||||
|
if (!strcmp(str, "NONE"))
|
||||||
|
{
|
||||||
|
*ppbe = -1;
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
*ppbe=OBJ_txt2nid(str);
|
||||||
|
if (*ppbe == NID_undef)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Unknown PBE algorithm %s\n", str);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
12
apps/pkcs7.c
12
apps/pkcs7.c
@@ -82,15 +82,12 @@ int MAIN(int, char **);
|
|||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
|
||||||
ENGINE *e = NULL;
|
|
||||||
#endif
|
|
||||||
PKCS7 *p7=NULL;
|
PKCS7 *p7=NULL;
|
||||||
int i,badops=0;
|
int i,badops=0;
|
||||||
BIO *in=NULL,*out=NULL;
|
BIO *in=NULL,*out=NULL;
|
||||||
int informat,outformat;
|
int informat,outformat;
|
||||||
char *infile,*outfile,*prog;
|
char *infile,*outfile,*prog;
|
||||||
int print_certs=0,text=0,noout=0;
|
int print_certs=0,text=0,noout=0,p7_print=0;
|
||||||
int ret=1;
|
int ret=1;
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
char *engine=NULL;
|
char *engine=NULL;
|
||||||
@@ -139,6 +136,8 @@ int MAIN(int argc, char **argv)
|
|||||||
noout=1;
|
noout=1;
|
||||||
else if (strcmp(*argv,"-text") == 0)
|
else if (strcmp(*argv,"-text") == 0)
|
||||||
text=1;
|
text=1;
|
||||||
|
else if (strcmp(*argv,"-print") == 0)
|
||||||
|
p7_print=1;
|
||||||
else if (strcmp(*argv,"-print_certs") == 0)
|
else if (strcmp(*argv,"-print_certs") == 0)
|
||||||
print_certs=1;
|
print_certs=1;
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
@@ -180,7 +179,7 @@ bad:
|
|||||||
ERR_load_crypto_strings();
|
ERR_load_crypto_strings();
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
e = setup_engine(bio_err, engine, 0);
|
setup_engine(bio_err, engine, 0);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
in=BIO_new(BIO_s_file());
|
in=BIO_new(BIO_s_file());
|
||||||
@@ -238,6 +237,9 @@ bad:
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (p7_print)
|
||||||
|
PKCS7_print_ctx(out, p7, 0, NULL);
|
||||||
|
|
||||||
if (print_certs)
|
if (print_certs)
|
||||||
{
|
{
|
||||||
STACK_OF(X509) *certs=NULL;
|
STACK_OF(X509) *certs=NULL;
|
||||||
|
|||||||
81
apps/pkcs8.c
81
apps/pkcs8.c
@@ -1,5 +1,5 @@
|
|||||||
/* pkcs8.c */
|
/* pkcs8.c */
|
||||||
/* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
|
/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
|
||||||
* project 1999-2004.
|
* project 1999-2004.
|
||||||
*/
|
*/
|
||||||
/* ====================================================================
|
/* ====================================================================
|
||||||
@@ -80,11 +80,12 @@ int MAIN(int argc, char **argv)
|
|||||||
int informat, outformat;
|
int informat, outformat;
|
||||||
int p8_broken = PKCS8_OK;
|
int p8_broken = PKCS8_OK;
|
||||||
int nocrypt = 0;
|
int nocrypt = 0;
|
||||||
X509_SIG *p8;
|
X509_SIG *p8 = NULL;
|
||||||
PKCS8_PRIV_KEY_INFO *p8inf;
|
PKCS8_PRIV_KEY_INFO *p8inf = NULL;
|
||||||
EVP_PKEY *pkey=NULL;
|
EVP_PKEY *pkey=NULL;
|
||||||
char pass[50], *passin = NULL, *passout = NULL, *p8pass = NULL;
|
char pass[50], *passin = NULL, *passout = NULL, *p8pass = NULL;
|
||||||
int badarg = 0;
|
int badarg = 0;
|
||||||
|
int ret = 1;
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
char *engine=NULL;
|
char *engine=NULL;
|
||||||
#endif
|
#endif
|
||||||
@@ -225,7 +226,7 @@ int MAIN(int argc, char **argv)
|
|||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
BIO_printf(bio_err," -engine e use engine e, possibly a hardware device.\n");
|
BIO_printf(bio_err," -engine e use engine e, possibly a hardware device.\n");
|
||||||
#endif
|
#endif
|
||||||
return 1;
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
@@ -235,7 +236,7 @@ int MAIN(int argc, char **argv)
|
|||||||
if (!app_passwd(bio_err, passargin, passargout, &passin, &passout))
|
if (!app_passwd(bio_err, passargin, passargout, &passin, &passout))
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err, "Error getting passwords\n");
|
BIO_printf(bio_err, "Error getting passwords\n");
|
||||||
return 1;
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
if ((pbe_nid == -1) && !cipher)
|
if ((pbe_nid == -1) && !cipher)
|
||||||
@@ -247,7 +248,7 @@ int MAIN(int argc, char **argv)
|
|||||||
{
|
{
|
||||||
BIO_printf(bio_err,
|
BIO_printf(bio_err,
|
||||||
"Can't open input file %s\n", infile);
|
"Can't open input file %s\n", infile);
|
||||||
return (1);
|
goto end;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
@@ -259,7 +260,7 @@ int MAIN(int argc, char **argv)
|
|||||||
{
|
{
|
||||||
BIO_printf(bio_err,
|
BIO_printf(bio_err,
|
||||||
"Can't open output file %s\n", outfile);
|
"Can't open output file %s\n", outfile);
|
||||||
return (1);
|
goto end;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
@@ -274,21 +275,15 @@ int MAIN(int argc, char **argv)
|
|||||||
}
|
}
|
||||||
if (topk8)
|
if (topk8)
|
||||||
{
|
{
|
||||||
BIO_free(in); /* Not needed in this section */
|
|
||||||
pkey = load_key(bio_err, infile, informat, 1,
|
pkey = load_key(bio_err, infile, informat, 1,
|
||||||
passin, e, "key");
|
passin, e, "key");
|
||||||
if (!pkey)
|
if (!pkey)
|
||||||
{
|
goto end;
|
||||||
BIO_free_all(out);
|
|
||||||
return 1;
|
|
||||||
}
|
|
||||||
if (!(p8inf = EVP_PKEY2PKCS8_broken(pkey, p8_broken)))
|
if (!(p8inf = EVP_PKEY2PKCS8_broken(pkey, p8_broken)))
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err, "Error converting key\n");
|
BIO_printf(bio_err, "Error converting key\n");
|
||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
EVP_PKEY_free(pkey);
|
goto end;
|
||||||
BIO_free_all(out);
|
|
||||||
return 1;
|
|
||||||
}
|
}
|
||||||
if (nocrypt)
|
if (nocrypt)
|
||||||
{
|
{
|
||||||
@@ -299,10 +294,7 @@ int MAIN(int argc, char **argv)
|
|||||||
else
|
else
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err, "Bad format specified for key\n");
|
BIO_printf(bio_err, "Bad format specified for key\n");
|
||||||
PKCS8_PRIV_KEY_INFO_free(p8inf);
|
goto end;
|
||||||
EVP_PKEY_free(pkey);
|
|
||||||
BIO_free_all(out);
|
|
||||||
return (1);
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
@@ -313,12 +305,7 @@ int MAIN(int argc, char **argv)
|
|||||||
{
|
{
|
||||||
p8pass = pass;
|
p8pass = pass;
|
||||||
if (EVP_read_pw_string(pass, sizeof pass, "Enter Encryption Password:", 1))
|
if (EVP_read_pw_string(pass, sizeof pass, "Enter Encryption Password:", 1))
|
||||||
{
|
goto end;
|
||||||
PKCS8_PRIV_KEY_INFO_free(p8inf);
|
|
||||||
EVP_PKEY_free(pkey);
|
|
||||||
BIO_free_all(out);
|
|
||||||
return (1);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
app_RAND_load_file(NULL, bio_err, 0);
|
app_RAND_load_file(NULL, bio_err, 0);
|
||||||
if (!(p8 = PKCS8_encrypt(pbe_nid, cipher,
|
if (!(p8 = PKCS8_encrypt(pbe_nid, cipher,
|
||||||
@@ -327,10 +314,7 @@ int MAIN(int argc, char **argv)
|
|||||||
{
|
{
|
||||||
BIO_printf(bio_err, "Error encrypting key\n");
|
BIO_printf(bio_err, "Error encrypting key\n");
|
||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
PKCS8_PRIV_KEY_INFO_free(p8inf);
|
goto end;
|
||||||
EVP_PKEY_free(pkey);
|
|
||||||
BIO_free_all(out);
|
|
||||||
return (1);
|
|
||||||
}
|
}
|
||||||
app_RAND_write_file(NULL, bio_err);
|
app_RAND_write_file(NULL, bio_err);
|
||||||
if (outformat == FORMAT_PEM)
|
if (outformat == FORMAT_PEM)
|
||||||
@@ -340,22 +324,12 @@ int MAIN(int argc, char **argv)
|
|||||||
else
|
else
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err, "Bad format specified for key\n");
|
BIO_printf(bio_err, "Bad format specified for key\n");
|
||||||
PKCS8_PRIV_KEY_INFO_free(p8inf);
|
goto end;
|
||||||
EVP_PKEY_free(pkey);
|
|
||||||
BIO_free_all(out);
|
|
||||||
return (1);
|
|
||||||
}
|
}
|
||||||
X509_SIG_free(p8);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
PKCS8_PRIV_KEY_INFO_free (p8inf);
|
ret = 0;
|
||||||
EVP_PKEY_free(pkey);
|
goto end;
|
||||||
BIO_free_all(out);
|
|
||||||
if (passin)
|
|
||||||
OPENSSL_free(passin);
|
|
||||||
if (passout)
|
|
||||||
OPENSSL_free(passout);
|
|
||||||
return (0);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
if (nocrypt)
|
if (nocrypt)
|
||||||
@@ -367,7 +341,7 @@ int MAIN(int argc, char **argv)
|
|||||||
else
|
else
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err, "Bad format specified for key\n");
|
BIO_printf(bio_err, "Bad format specified for key\n");
|
||||||
return (1);
|
goto end;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
@@ -379,14 +353,14 @@ int MAIN(int argc, char **argv)
|
|||||||
else
|
else
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err, "Bad format specified for key\n");
|
BIO_printf(bio_err, "Bad format specified for key\n");
|
||||||
return (1);
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (!p8)
|
if (!p8)
|
||||||
{
|
{
|
||||||
BIO_printf (bio_err, "Error reading key\n");
|
BIO_printf (bio_err, "Error reading key\n");
|
||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
return (1);
|
goto end;
|
||||||
}
|
}
|
||||||
if (passin)
|
if (passin)
|
||||||
p8pass = passin;
|
p8pass = passin;
|
||||||
@@ -396,21 +370,20 @@ int MAIN(int argc, char **argv)
|
|||||||
EVP_read_pw_string(pass, sizeof pass, "Enter Password:", 0);
|
EVP_read_pw_string(pass, sizeof pass, "Enter Password:", 0);
|
||||||
}
|
}
|
||||||
p8inf = PKCS8_decrypt(p8, p8pass, strlen(p8pass));
|
p8inf = PKCS8_decrypt(p8, p8pass, strlen(p8pass));
|
||||||
X509_SIG_free(p8);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
if (!p8inf)
|
if (!p8inf)
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err, "Error decrypting key\n");
|
BIO_printf(bio_err, "Error decrypting key\n");
|
||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
return (1);
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (!(pkey = EVP_PKCS82PKEY(p8inf)))
|
if (!(pkey = EVP_PKCS82PKEY(p8inf)))
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err, "Error converting key\n");
|
BIO_printf(bio_err, "Error converting key\n");
|
||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
return (1);
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (p8inf->broken)
|
if (p8inf->broken)
|
||||||
@@ -430,13 +403,16 @@ int MAIN(int argc, char **argv)
|
|||||||
BIO_printf(bio_err, "DSA public key include in PrivateKey\n");
|
BIO_printf(bio_err, "DSA public key include in PrivateKey\n");
|
||||||
break;
|
break;
|
||||||
|
|
||||||
|
case PKCS8_NEG_PRIVKEY:
|
||||||
|
BIO_printf(bio_err, "DSA private key value is negative\n");
|
||||||
|
break;
|
||||||
|
|
||||||
default:
|
default:
|
||||||
BIO_printf(bio_err, "Unknown broken type\n");
|
BIO_printf(bio_err, "Unknown broken type\n");
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
PKCS8_PRIV_KEY_INFO_free(p8inf);
|
|
||||||
if (outformat == FORMAT_PEM)
|
if (outformat == FORMAT_PEM)
|
||||||
PEM_write_bio_PrivateKey(out, pkey, NULL, NULL, 0, NULL, passout);
|
PEM_write_bio_PrivateKey(out, pkey, NULL, NULL, 0, NULL, passout);
|
||||||
else if (outformat == FORMAT_ASN1)
|
else if (outformat == FORMAT_ASN1)
|
||||||
@@ -444,10 +420,13 @@ int MAIN(int argc, char **argv)
|
|||||||
else
|
else
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err, "Bad format specified for key\n");
|
BIO_printf(bio_err, "Bad format specified for key\n");
|
||||||
return (1);
|
goto end;
|
||||||
}
|
}
|
||||||
|
ret = 0;
|
||||||
|
|
||||||
end:
|
end:
|
||||||
|
X509_SIG_free(p8);
|
||||||
|
PKCS8_PRIV_KEY_INFO_free(p8inf);
|
||||||
EVP_PKEY_free(pkey);
|
EVP_PKEY_free(pkey);
|
||||||
BIO_free_all(out);
|
BIO_free_all(out);
|
||||||
BIO_free(in);
|
BIO_free(in);
|
||||||
@@ -456,5 +435,5 @@ int MAIN(int argc, char **argv)
|
|||||||
if (passout)
|
if (passout)
|
||||||
OPENSSL_free(passout);
|
OPENSSL_free(passout);
|
||||||
|
|
||||||
return (0);
|
return ret;
|
||||||
}
|
}
|
||||||
|
|||||||
284
apps/pkey.c
Normal file
284
apps/pkey.c
Normal file
@@ -0,0 +1,284 @@
|
|||||||
|
/* apps/pkey.c */
|
||||||
|
/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
|
||||||
|
* project 2006
|
||||||
|
*/
|
||||||
|
/* ====================================================================
|
||||||
|
* Copyright (c) 2006 The OpenSSL Project. All rights reserved.
|
||||||
|
*
|
||||||
|
* Redistribution and use in source and binary forms, with or without
|
||||||
|
* modification, are permitted provided that the following conditions
|
||||||
|
* are met:
|
||||||
|
*
|
||||||
|
* 1. Redistributions of source code must retain the above copyright
|
||||||
|
* notice, this list of conditions and the following disclaimer.
|
||||||
|
*
|
||||||
|
* 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
* notice, this list of conditions and the following disclaimer in
|
||||||
|
* the documentation and/or other materials provided with the
|
||||||
|
* distribution.
|
||||||
|
*
|
||||||
|
* 3. All advertising materials mentioning features or use of this
|
||||||
|
* software must display the following acknowledgment:
|
||||||
|
* "This product includes software developed by the OpenSSL Project
|
||||||
|
* for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
|
||||||
|
*
|
||||||
|
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
|
||||||
|
* endorse or promote products derived from this software without
|
||||||
|
* prior written permission. For written permission, please contact
|
||||||
|
* licensing@OpenSSL.org.
|
||||||
|
*
|
||||||
|
* 5. Products derived from this software may not be called "OpenSSL"
|
||||||
|
* nor may "OpenSSL" appear in their names without prior written
|
||||||
|
* permission of the OpenSSL Project.
|
||||||
|
*
|
||||||
|
* 6. Redistributions of any form whatsoever must retain the following
|
||||||
|
* acknowledgment:
|
||||||
|
* "This product includes software developed by the OpenSSL Project
|
||||||
|
* for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
|
||||||
|
*
|
||||||
|
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
|
||||||
|
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||||
|
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
|
||||||
|
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||||||
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
||||||
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
||||||
|
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||||
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
||||||
|
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
||||||
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
||||||
|
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
|
* ====================================================================
|
||||||
|
*
|
||||||
|
* This product includes cryptographic software written by Eric Young
|
||||||
|
* (eay@cryptsoft.com). This product includes software written by Tim
|
||||||
|
* Hudson (tjh@cryptsoft.com).
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <string.h>
|
||||||
|
#include "apps.h"
|
||||||
|
#include <openssl/pem.h>
|
||||||
|
#include <openssl/err.h>
|
||||||
|
#include <openssl/evp.h>
|
||||||
|
|
||||||
|
#define PROG pkey_main
|
||||||
|
|
||||||
|
int MAIN(int, char **);
|
||||||
|
|
||||||
|
int MAIN(int argc, char **argv)
|
||||||
|
{
|
||||||
|
ENGINE *e = NULL;
|
||||||
|
char **args, *infile = NULL, *outfile = NULL;
|
||||||
|
char *passargin = NULL, *passargout = NULL;
|
||||||
|
BIO *in = NULL, *out = NULL;
|
||||||
|
const EVP_CIPHER *cipher = NULL;
|
||||||
|
int informat, outformat;
|
||||||
|
int pubin = 0, pubout = 0, pubtext = 0, text = 0, noout = 0;
|
||||||
|
EVP_PKEY *pkey=NULL;
|
||||||
|
char *passin = NULL, *passout = NULL;
|
||||||
|
int badarg = 0;
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
char *engine=NULL;
|
||||||
|
#endif
|
||||||
|
int ret = 1;
|
||||||
|
|
||||||
|
if (bio_err == NULL)
|
||||||
|
bio_err = BIO_new_fp (stderr, BIO_NOCLOSE);
|
||||||
|
|
||||||
|
if (!load_config(bio_err, NULL))
|
||||||
|
goto end;
|
||||||
|
|
||||||
|
informat=FORMAT_PEM;
|
||||||
|
outformat=FORMAT_PEM;
|
||||||
|
|
||||||
|
ERR_load_crypto_strings();
|
||||||
|
OpenSSL_add_all_algorithms();
|
||||||
|
args = argv + 1;
|
||||||
|
while (!badarg && *args && *args[0] == '-')
|
||||||
|
{
|
||||||
|
if (!strcmp(*args,"-inform"))
|
||||||
|
{
|
||||||
|
if (args[1])
|
||||||
|
{
|
||||||
|
args++;
|
||||||
|
informat=str2fmt(*args);
|
||||||
|
}
|
||||||
|
else badarg = 1;
|
||||||
|
}
|
||||||
|
else if (!strcmp(*args,"-outform"))
|
||||||
|
{
|
||||||
|
if (args[1])
|
||||||
|
{
|
||||||
|
args++;
|
||||||
|
outformat=str2fmt(*args);
|
||||||
|
}
|
||||||
|
else badarg = 1;
|
||||||
|
}
|
||||||
|
else if (!strcmp(*args,"-passin"))
|
||||||
|
{
|
||||||
|
if (!args[1]) goto bad;
|
||||||
|
passargin= *(++args);
|
||||||
|
}
|
||||||
|
else if (!strcmp(*args,"-passout"))
|
||||||
|
{
|
||||||
|
if (!args[1]) goto bad;
|
||||||
|
passargout= *(++args);
|
||||||
|
}
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
else if (strcmp(*args,"-engine") == 0)
|
||||||
|
{
|
||||||
|
if (!args[1]) goto bad;
|
||||||
|
engine= *(++args);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
else if (!strcmp (*args, "-in"))
|
||||||
|
{
|
||||||
|
if (args[1])
|
||||||
|
{
|
||||||
|
args++;
|
||||||
|
infile = *args;
|
||||||
|
}
|
||||||
|
else badarg = 1;
|
||||||
|
}
|
||||||
|
else if (!strcmp (*args, "-out"))
|
||||||
|
{
|
||||||
|
if (args[1])
|
||||||
|
{
|
||||||
|
args++;
|
||||||
|
outfile = *args;
|
||||||
|
}
|
||||||
|
else badarg = 1;
|
||||||
|
}
|
||||||
|
else if (strcmp(*args,"-pubin") == 0)
|
||||||
|
{
|
||||||
|
pubin=1;
|
||||||
|
pubout=1;
|
||||||
|
pubtext=1;
|
||||||
|
}
|
||||||
|
else if (strcmp(*args,"-pubout") == 0)
|
||||||
|
pubout=1;
|
||||||
|
else if (strcmp(*args,"-text_pub") == 0)
|
||||||
|
{
|
||||||
|
pubtext=1;
|
||||||
|
text=1;
|
||||||
|
}
|
||||||
|
else if (strcmp(*args,"-text") == 0)
|
||||||
|
text=1;
|
||||||
|
else if (strcmp(*args,"-noout") == 0)
|
||||||
|
noout=1;
|
||||||
|
else
|
||||||
|
{
|
||||||
|
cipher = EVP_get_cipherbyname(*args + 1);
|
||||||
|
if (!cipher)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Unknown cipher %s\n",
|
||||||
|
*args + 1);
|
||||||
|
badarg = 1;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
args++;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (badarg)
|
||||||
|
{
|
||||||
|
bad:
|
||||||
|
BIO_printf(bio_err, "Usage pkey [options]\n");
|
||||||
|
BIO_printf(bio_err, "where options are\n");
|
||||||
|
BIO_printf(bio_err, "-in file input file\n");
|
||||||
|
BIO_printf(bio_err, "-inform X input format (DER or PEM)\n");
|
||||||
|
BIO_printf(bio_err, "-passin arg input file pass phrase source\n");
|
||||||
|
BIO_printf(bio_err, "-outform X output format (DER or PEM)\n");
|
||||||
|
BIO_printf(bio_err, "-out file output file\n");
|
||||||
|
BIO_printf(bio_err, "-passout arg output file pass phrase source\n");
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
BIO_printf(bio_err, "-engine e use engine e, possibly a hardware device.\n");
|
||||||
|
#endif
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
e = setup_engine(bio_err, engine, 0);
|
||||||
|
#endif
|
||||||
|
|
||||||
|
if (!app_passwd(bio_err, passargin, passargout, &passin, &passout))
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Error getting passwords\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (outfile)
|
||||||
|
{
|
||||||
|
if (!(out = BIO_new_file (outfile, "wb")))
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"Can't open output file %s\n", outfile);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
out = BIO_new_fp (stdout, BIO_NOCLOSE);
|
||||||
|
#ifdef OPENSSL_SYS_VMS
|
||||||
|
{
|
||||||
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
|
out = BIO_push(tmpbio, out);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
}
|
||||||
|
|
||||||
|
if (pubin)
|
||||||
|
pkey = load_pubkey(bio_err, infile, informat, 1,
|
||||||
|
passin, e, "Public Key");
|
||||||
|
else
|
||||||
|
pkey = load_key(bio_err, infile, informat, 1,
|
||||||
|
passin, e, "key");
|
||||||
|
if (!pkey)
|
||||||
|
goto end;
|
||||||
|
|
||||||
|
if (!noout)
|
||||||
|
{
|
||||||
|
if (outformat == FORMAT_PEM)
|
||||||
|
{
|
||||||
|
if (pubout)
|
||||||
|
PEM_write_bio_PUBKEY(out,pkey);
|
||||||
|
else
|
||||||
|
PEM_write_bio_PrivateKey(out, pkey, cipher,
|
||||||
|
NULL, 0, NULL, passout);
|
||||||
|
}
|
||||||
|
else if (outformat == FORMAT_ASN1)
|
||||||
|
{
|
||||||
|
if (pubout)
|
||||||
|
i2d_PUBKEY_bio(out, pkey);
|
||||||
|
else
|
||||||
|
i2d_PrivateKey_bio(out, pkey);
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Bad format specified for key\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
if (text)
|
||||||
|
{
|
||||||
|
if (pubtext)
|
||||||
|
EVP_PKEY_print_public(out, pkey, 0, NULL);
|
||||||
|
else
|
||||||
|
EVP_PKEY_print_private(out, pkey, 0, NULL);
|
||||||
|
}
|
||||||
|
|
||||||
|
ret = 0;
|
||||||
|
|
||||||
|
end:
|
||||||
|
EVP_PKEY_free(pkey);
|
||||||
|
BIO_free_all(out);
|
||||||
|
BIO_free(in);
|
||||||
|
if (passin)
|
||||||
|
OPENSSL_free(passin);
|
||||||
|
if (passout)
|
||||||
|
OPENSSL_free(passout);
|
||||||
|
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
200
apps/pkeyparam.c
Normal file
200
apps/pkeyparam.c
Normal file
@@ -0,0 +1,200 @@
|
|||||||
|
/* apps/pkeyparam.c */
|
||||||
|
/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
|
||||||
|
* project 2006
|
||||||
|
*/
|
||||||
|
/* ====================================================================
|
||||||
|
* Copyright (c) 2006 The OpenSSL Project. All rights reserved.
|
||||||
|
*
|
||||||
|
* Redistribution and use in source and binary forms, with or without
|
||||||
|
* modification, are permitted provided that the following conditions
|
||||||
|
* are met:
|
||||||
|
*
|
||||||
|
* 1. Redistributions of source code must retain the above copyright
|
||||||
|
* notice, this list of conditions and the following disclaimer.
|
||||||
|
*
|
||||||
|
* 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
* notice, this list of conditions and the following disclaimer in
|
||||||
|
* the documentation and/or other materials provided with the
|
||||||
|
* distribution.
|
||||||
|
*
|
||||||
|
* 3. All advertising materials mentioning features or use of this
|
||||||
|
* software must display the following acknowledgment:
|
||||||
|
* "This product includes software developed by the OpenSSL Project
|
||||||
|
* for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
|
||||||
|
*
|
||||||
|
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
|
||||||
|
* endorse or promote products derived from this software without
|
||||||
|
* prior written permission. For written permission, please contact
|
||||||
|
* licensing@OpenSSL.org.
|
||||||
|
*
|
||||||
|
* 5. Products derived from this software may not be called "OpenSSL"
|
||||||
|
* nor may "OpenSSL" appear in their names without prior written
|
||||||
|
* permission of the OpenSSL Project.
|
||||||
|
*
|
||||||
|
* 6. Redistributions of any form whatsoever must retain the following
|
||||||
|
* acknowledgment:
|
||||||
|
* "This product includes software developed by the OpenSSL Project
|
||||||
|
* for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
|
||||||
|
*
|
||||||
|
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
|
||||||
|
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||||
|
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
|
||||||
|
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||||||
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
||||||
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
||||||
|
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||||
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
||||||
|
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
||||||
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
||||||
|
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
|
* ====================================================================
|
||||||
|
*
|
||||||
|
* This product includes cryptographic software written by Eric Young
|
||||||
|
* (eay@cryptsoft.com). This product includes software written by Tim
|
||||||
|
* Hudson (tjh@cryptsoft.com).
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <string.h>
|
||||||
|
#include "apps.h"
|
||||||
|
#include <openssl/pem.h>
|
||||||
|
#include <openssl/err.h>
|
||||||
|
#include <openssl/evp.h>
|
||||||
|
|
||||||
|
#define PROG pkeyparam_main
|
||||||
|
|
||||||
|
int MAIN(int, char **);
|
||||||
|
|
||||||
|
int MAIN(int argc, char **argv)
|
||||||
|
{
|
||||||
|
char **args, *infile = NULL, *outfile = NULL;
|
||||||
|
BIO *in = NULL, *out = NULL;
|
||||||
|
int text = 0, noout = 0;
|
||||||
|
EVP_PKEY *pkey=NULL;
|
||||||
|
int badarg = 0;
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
char *engine=NULL;
|
||||||
|
#endif
|
||||||
|
int ret = 1;
|
||||||
|
|
||||||
|
if (bio_err == NULL)
|
||||||
|
bio_err = BIO_new_fp (stderr, BIO_NOCLOSE);
|
||||||
|
|
||||||
|
if (!load_config(bio_err, NULL))
|
||||||
|
goto end;
|
||||||
|
|
||||||
|
ERR_load_crypto_strings();
|
||||||
|
OpenSSL_add_all_algorithms();
|
||||||
|
args = argv + 1;
|
||||||
|
while (!badarg && *args && *args[0] == '-')
|
||||||
|
{
|
||||||
|
if (!strcmp (*args, "-in"))
|
||||||
|
{
|
||||||
|
if (args[1])
|
||||||
|
{
|
||||||
|
args++;
|
||||||
|
infile = *args;
|
||||||
|
}
|
||||||
|
else badarg = 1;
|
||||||
|
}
|
||||||
|
else if (!strcmp (*args, "-out"))
|
||||||
|
{
|
||||||
|
if (args[1])
|
||||||
|
{
|
||||||
|
args++;
|
||||||
|
outfile = *args;
|
||||||
|
}
|
||||||
|
else badarg = 1;
|
||||||
|
}
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
else if (strcmp(*args,"-engine") == 0)
|
||||||
|
{
|
||||||
|
if (!args[1]) goto bad;
|
||||||
|
engine= *(++args);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
|
else if (strcmp(*args,"-text") == 0)
|
||||||
|
text=1;
|
||||||
|
else if (strcmp(*args,"-noout") == 0)
|
||||||
|
noout=1;
|
||||||
|
args++;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (badarg)
|
||||||
|
{
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
bad:
|
||||||
|
#endif
|
||||||
|
BIO_printf(bio_err, "Usage pkeyparam [options]\n");
|
||||||
|
BIO_printf(bio_err, "where options are\n");
|
||||||
|
BIO_printf(bio_err, "-in file input file\n");
|
||||||
|
BIO_printf(bio_err, "-out file output file\n");
|
||||||
|
BIO_printf(bio_err, "-text print parameters as text\n");
|
||||||
|
BIO_printf(bio_err, "-noout don't output encoded parameters\n");
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
BIO_printf(bio_err, "-engine e use engine e, possibly a hardware device.\n");
|
||||||
|
#endif
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
setup_engine(bio_err, engine, 0);
|
||||||
|
#endif
|
||||||
|
|
||||||
|
if (infile)
|
||||||
|
{
|
||||||
|
if (!(in = BIO_new_file (infile, "r")))
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"Can't open input file %s\n", infile);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
else
|
||||||
|
in = BIO_new_fp (stdin, BIO_NOCLOSE);
|
||||||
|
|
||||||
|
if (outfile)
|
||||||
|
{
|
||||||
|
if (!(out = BIO_new_file (outfile, "w")))
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"Can't open output file %s\n", outfile);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
out = BIO_new_fp (stdout, BIO_NOCLOSE);
|
||||||
|
#ifdef OPENSSL_SYS_VMS
|
||||||
|
{
|
||||||
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
|
out = BIO_push(tmpbio, out);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
}
|
||||||
|
|
||||||
|
pkey = PEM_read_bio_Parameters(in, NULL);
|
||||||
|
if (!pkey)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Error reading parameters\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!noout)
|
||||||
|
PEM_write_bio_Parameters(out,pkey);
|
||||||
|
|
||||||
|
if (text)
|
||||||
|
EVP_PKEY_print_params(out, pkey, 0, NULL);
|
||||||
|
|
||||||
|
ret = 0;
|
||||||
|
|
||||||
|
end:
|
||||||
|
EVP_PKEY_free(pkey);
|
||||||
|
BIO_free_all(out);
|
||||||
|
BIO_free(in);
|
||||||
|
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
570
apps/pkeyutl.c
Normal file
570
apps/pkeyutl.c
Normal file
@@ -0,0 +1,570 @@
|
|||||||
|
/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
|
||||||
|
* project 2006.
|
||||||
|
*/
|
||||||
|
/* ====================================================================
|
||||||
|
* Copyright (c) 2006 The OpenSSL Project. All rights reserved.
|
||||||
|
*
|
||||||
|
* Redistribution and use in source and binary forms, with or without
|
||||||
|
* modification, are permitted provided that the following conditions
|
||||||
|
* are met:
|
||||||
|
*
|
||||||
|
* 1. Redistributions of source code must retain the above copyright
|
||||||
|
* notice, this list of conditions and the following disclaimer.
|
||||||
|
*
|
||||||
|
* 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
* notice, this list of conditions and the following disclaimer in
|
||||||
|
* the documentation and/or other materials provided with the
|
||||||
|
* distribution.
|
||||||
|
*
|
||||||
|
* 3. All advertising materials mentioning features or use of this
|
||||||
|
* software must display the following acknowledgment:
|
||||||
|
* "This product includes software developed by the OpenSSL Project
|
||||||
|
* for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
|
||||||
|
*
|
||||||
|
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
|
||||||
|
* endorse or promote products derived from this software without
|
||||||
|
* prior written permission. For written permission, please contact
|
||||||
|
* licensing@OpenSSL.org.
|
||||||
|
*
|
||||||
|
* 5. Products derived from this software may not be called "OpenSSL"
|
||||||
|
* nor may "OpenSSL" appear in their names without prior written
|
||||||
|
* permission of the OpenSSL Project.
|
||||||
|
*
|
||||||
|
* 6. Redistributions of any form whatsoever must retain the following
|
||||||
|
* acknowledgment:
|
||||||
|
* "This product includes software developed by the OpenSSL Project
|
||||||
|
* for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
|
||||||
|
*
|
||||||
|
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
|
||||||
|
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||||
|
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
|
||||||
|
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||||||
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
||||||
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
||||||
|
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||||
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
||||||
|
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
||||||
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
||||||
|
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
|
* ====================================================================
|
||||||
|
*
|
||||||
|
* This product includes cryptographic software written by Eric Young
|
||||||
|
* (eay@cryptsoft.com). This product includes software written by Tim
|
||||||
|
* Hudson (tjh@cryptsoft.com).
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
|
||||||
|
|
||||||
|
#include "apps.h"
|
||||||
|
#include <string.h>
|
||||||
|
#include <openssl/err.h>
|
||||||
|
#include <openssl/pem.h>
|
||||||
|
#include <openssl/evp.h>
|
||||||
|
|
||||||
|
#define KEY_PRIVKEY 1
|
||||||
|
#define KEY_PUBKEY 2
|
||||||
|
#define KEY_CERT 3
|
||||||
|
|
||||||
|
static void usage(void);
|
||||||
|
|
||||||
|
#undef PROG
|
||||||
|
|
||||||
|
#define PROG pkeyutl_main
|
||||||
|
|
||||||
|
static EVP_PKEY_CTX *init_ctx(int *pkeysize,
|
||||||
|
char *keyfile, int keyform, int key_type,
|
||||||
|
char *passargin, int pkey_op, ENGINE *e);
|
||||||
|
|
||||||
|
static int setup_peer(BIO *err, EVP_PKEY_CTX *ctx, int peerform,
|
||||||
|
const char *file);
|
||||||
|
|
||||||
|
static int do_keyop(EVP_PKEY_CTX *ctx, int pkey_op,
|
||||||
|
unsigned char *out, size_t *poutlen,
|
||||||
|
unsigned char *in, size_t inlen);
|
||||||
|
|
||||||
|
int MAIN(int argc, char **);
|
||||||
|
|
||||||
|
int MAIN(int argc, char **argv)
|
||||||
|
{
|
||||||
|
BIO *in = NULL, *out = NULL;
|
||||||
|
char *infile = NULL, *outfile = NULL, *sigfile = NULL;
|
||||||
|
ENGINE *e = NULL;
|
||||||
|
int pkey_op = EVP_PKEY_OP_SIGN, key_type = KEY_PRIVKEY;
|
||||||
|
int keyform = FORMAT_PEM, peerform = FORMAT_PEM;
|
||||||
|
char badarg = 0, rev = 0;
|
||||||
|
char hexdump = 0, asn1parse = 0;
|
||||||
|
EVP_PKEY_CTX *ctx = NULL;
|
||||||
|
char *passargin = NULL;
|
||||||
|
int keysize = -1;
|
||||||
|
|
||||||
|
unsigned char *buf_in = NULL, *buf_out = NULL, *sig = NULL;
|
||||||
|
size_t buf_outlen;
|
||||||
|
int buf_inlen = 0, siglen = -1;
|
||||||
|
|
||||||
|
int ret = 1, rv = -1;
|
||||||
|
|
||||||
|
argc--;
|
||||||
|
argv++;
|
||||||
|
|
||||||
|
if(!bio_err) bio_err = BIO_new_fp(stderr, BIO_NOCLOSE);
|
||||||
|
|
||||||
|
if (!load_config(bio_err, NULL))
|
||||||
|
goto end;
|
||||||
|
ERR_load_crypto_strings();
|
||||||
|
OpenSSL_add_all_algorithms();
|
||||||
|
|
||||||
|
while(argc >= 1)
|
||||||
|
{
|
||||||
|
if (!strcmp(*argv,"-in"))
|
||||||
|
{
|
||||||
|
if (--argc < 1) badarg = 1;
|
||||||
|
else infile= *(++argv);
|
||||||
|
}
|
||||||
|
else if (!strcmp(*argv,"-out"))
|
||||||
|
{
|
||||||
|
if (--argc < 1) badarg = 1;
|
||||||
|
else outfile= *(++argv);
|
||||||
|
}
|
||||||
|
else if (!strcmp(*argv,"-sigfile"))
|
||||||
|
{
|
||||||
|
if (--argc < 1) badarg = 1;
|
||||||
|
else sigfile= *(++argv);
|
||||||
|
}
|
||||||
|
else if(!strcmp(*argv, "-inkey"))
|
||||||
|
{
|
||||||
|
if (--argc < 1)
|
||||||
|
badarg = 1;
|
||||||
|
else
|
||||||
|
{
|
||||||
|
ctx = init_ctx(&keysize,
|
||||||
|
*(++argv), keyform, key_type,
|
||||||
|
passargin, pkey_op, e);
|
||||||
|
if (!ctx)
|
||||||
|
{
|
||||||
|
BIO_puts(bio_err,
|
||||||
|
"Error initializing context\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
badarg = 1;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
else if (!strcmp(*argv,"-peerkey"))
|
||||||
|
{
|
||||||
|
if (--argc < 1)
|
||||||
|
badarg = 1;
|
||||||
|
else if (!setup_peer(bio_err, ctx, peerform, *(++argv)))
|
||||||
|
badarg = 1;
|
||||||
|
}
|
||||||
|
else if (!strcmp(*argv,"-passin"))
|
||||||
|
{
|
||||||
|
if (--argc < 1) badarg = 1;
|
||||||
|
else passargin= *(++argv);
|
||||||
|
}
|
||||||
|
else if (strcmp(*argv,"-peerform") == 0)
|
||||||
|
{
|
||||||
|
if (--argc < 1) badarg = 1;
|
||||||
|
else peerform=str2fmt(*(++argv));
|
||||||
|
}
|
||||||
|
else if (strcmp(*argv,"-keyform") == 0)
|
||||||
|
{
|
||||||
|
if (--argc < 1) badarg = 1;
|
||||||
|
else keyform=str2fmt(*(++argv));
|
||||||
|
}
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
else if(!strcmp(*argv, "-engine"))
|
||||||
|
{
|
||||||
|
if (--argc < 1)
|
||||||
|
badarg = 1;
|
||||||
|
else
|
||||||
|
e = setup_engine(bio_err, *(++argv), 0);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
else if(!strcmp(*argv, "-pubin"))
|
||||||
|
key_type = KEY_PUBKEY;
|
||||||
|
else if(!strcmp(*argv, "-certin"))
|
||||||
|
key_type = KEY_CERT;
|
||||||
|
else if(!strcmp(*argv, "-asn1parse"))
|
||||||
|
asn1parse = 1;
|
||||||
|
else if(!strcmp(*argv, "-hexdump"))
|
||||||
|
hexdump = 1;
|
||||||
|
else if(!strcmp(*argv, "-sign"))
|
||||||
|
pkey_op = EVP_PKEY_OP_SIGN;
|
||||||
|
else if(!strcmp(*argv, "-verify"))
|
||||||
|
pkey_op = EVP_PKEY_OP_VERIFY;
|
||||||
|
else if(!strcmp(*argv, "-verifyrecover"))
|
||||||
|
pkey_op = EVP_PKEY_OP_VERIFYRECOVER;
|
||||||
|
else if(!strcmp(*argv, "-rev"))
|
||||||
|
rev = 1;
|
||||||
|
else if(!strcmp(*argv, "-encrypt"))
|
||||||
|
pkey_op = EVP_PKEY_OP_ENCRYPT;
|
||||||
|
else if(!strcmp(*argv, "-decrypt"))
|
||||||
|
pkey_op = EVP_PKEY_OP_DECRYPT;
|
||||||
|
else if(!strcmp(*argv, "-derive"))
|
||||||
|
pkey_op = EVP_PKEY_OP_DERIVE;
|
||||||
|
else if (strcmp(*argv,"-pkeyopt") == 0)
|
||||||
|
{
|
||||||
|
if (--argc < 1)
|
||||||
|
badarg = 1;
|
||||||
|
else if (!ctx)
|
||||||
|
{
|
||||||
|
BIO_puts(bio_err,
|
||||||
|
"-pkeyopt command before -inkey\n");
|
||||||
|
badarg = 1;
|
||||||
|
}
|
||||||
|
else if (pkey_ctrl_string(ctx, *(++argv)) <= 0)
|
||||||
|
{
|
||||||
|
BIO_puts(bio_err, "parameter setting error\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
else badarg = 1;
|
||||||
|
if(badarg)
|
||||||
|
{
|
||||||
|
usage();
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
argc--;
|
||||||
|
argv++;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!ctx)
|
||||||
|
{
|
||||||
|
usage();
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (sigfile && (pkey_op != EVP_PKEY_OP_VERIFY))
|
||||||
|
{
|
||||||
|
BIO_puts(bio_err, "Signature file specified for non verify\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!sigfile && (pkey_op == EVP_PKEY_OP_VERIFY))
|
||||||
|
{
|
||||||
|
BIO_puts(bio_err, "No signature file specified for verify\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* FIXME: seed PRNG only if needed */
|
||||||
|
app_RAND_load_file(NULL, bio_err, 0);
|
||||||
|
|
||||||
|
if (pkey_op != EVP_PKEY_OP_DERIVE)
|
||||||
|
{
|
||||||
|
if(infile)
|
||||||
|
{
|
||||||
|
if(!(in = BIO_new_file(infile, "rb")))
|
||||||
|
{
|
||||||
|
BIO_puts(bio_err,
|
||||||
|
"Error Opening Input File\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
else
|
||||||
|
in = BIO_new_fp(stdin, BIO_NOCLOSE);
|
||||||
|
}
|
||||||
|
|
||||||
|
if(outfile)
|
||||||
|
{
|
||||||
|
if(!(out = BIO_new_file(outfile, "wb")))
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Error Creating Output File\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
out = BIO_new_fp(stdout, BIO_NOCLOSE);
|
||||||
|
#ifdef OPENSSL_SYS_VMS
|
||||||
|
{
|
||||||
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
|
out = BIO_push(tmpbio, out);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
}
|
||||||
|
|
||||||
|
if (sigfile)
|
||||||
|
{
|
||||||
|
BIO *sigbio = BIO_new_file(sigfile, "rb");
|
||||||
|
if (!sigbio)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Can't open signature file %s\n",
|
||||||
|
sigfile);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
siglen = bio_to_mem(&sig, keysize * 10, sigbio);
|
||||||
|
BIO_free(sigbio);
|
||||||
|
if (siglen <= 0)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Error reading signature data\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (in)
|
||||||
|
{
|
||||||
|
/* Read the input data */
|
||||||
|
buf_inlen = bio_to_mem(&buf_in, keysize * 10, in);
|
||||||
|
if(buf_inlen <= 0)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Error reading input Data\n");
|
||||||
|
exit(1);
|
||||||
|
}
|
||||||
|
if(rev)
|
||||||
|
{
|
||||||
|
size_t i;
|
||||||
|
unsigned char ctmp;
|
||||||
|
size_t l = (size_t)buf_inlen;
|
||||||
|
for(i = 0; i < l/2; i++)
|
||||||
|
{
|
||||||
|
ctmp = buf_in[i];
|
||||||
|
buf_in[i] = buf_in[l - 1 - i];
|
||||||
|
buf_in[l - 1 - i] = ctmp;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if(pkey_op == EVP_PKEY_OP_VERIFY)
|
||||||
|
{
|
||||||
|
rv = EVP_PKEY_verify(ctx, sig, (size_t)siglen,
|
||||||
|
buf_in, (size_t)buf_inlen);
|
||||||
|
if (rv == 0)
|
||||||
|
BIO_puts(out, "Signature Verification Failure\n");
|
||||||
|
else if (rv == 1)
|
||||||
|
BIO_puts(out, "Signature Verified Successfully\n");
|
||||||
|
if (rv >= 0)
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
rv = do_keyop(ctx, pkey_op, NULL, (size_t *)&buf_outlen,
|
||||||
|
buf_in, (size_t)buf_inlen);
|
||||||
|
if (rv > 0)
|
||||||
|
{
|
||||||
|
buf_out = OPENSSL_malloc(buf_outlen);
|
||||||
|
if (!buf_out)
|
||||||
|
rv = -1;
|
||||||
|
else
|
||||||
|
rv = do_keyop(ctx, pkey_op,
|
||||||
|
buf_out, (size_t *)&buf_outlen,
|
||||||
|
buf_in, (size_t)buf_inlen);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if(rv <= 0)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Public Key operation error\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
ret = 0;
|
||||||
|
if(asn1parse)
|
||||||
|
{
|
||||||
|
if(!ASN1_parse_dump(out, buf_out, buf_outlen, 1, -1))
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
}
|
||||||
|
else if(hexdump)
|
||||||
|
BIO_dump(out, (char *)buf_out, buf_outlen);
|
||||||
|
else
|
||||||
|
BIO_write(out, buf_out, buf_outlen);
|
||||||
|
|
||||||
|
end:
|
||||||
|
if (ctx)
|
||||||
|
EVP_PKEY_CTX_free(ctx);
|
||||||
|
BIO_free(in);
|
||||||
|
BIO_free_all(out);
|
||||||
|
if (buf_in)
|
||||||
|
OPENSSL_free(buf_in);
|
||||||
|
if (buf_out)
|
||||||
|
OPENSSL_free(buf_out);
|
||||||
|
if (sig)
|
||||||
|
OPENSSL_free(sig);
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
|
static void usage()
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Usage: pkeyutl [options]\n");
|
||||||
|
BIO_printf(bio_err, "-in file input file\n");
|
||||||
|
BIO_printf(bio_err, "-out file output file\n");
|
||||||
|
BIO_printf(bio_err, "-sigfile file signature file (verify operation only)\n");
|
||||||
|
BIO_printf(bio_err, "-inkey file input key\n");
|
||||||
|
BIO_printf(bio_err, "-keyform arg private key format - default PEM\n");
|
||||||
|
BIO_printf(bio_err, "-pubin input is a public key\n");
|
||||||
|
BIO_printf(bio_err, "-certin input is a certificate carrying a public key\n");
|
||||||
|
BIO_printf(bio_err, "-pkeyopt X:Y public key options\n");
|
||||||
|
BIO_printf(bio_err, "-sign sign with private key\n");
|
||||||
|
BIO_printf(bio_err, "-verify verify with public key\n");
|
||||||
|
BIO_printf(bio_err, "-verifyrecover verify with public key, recover original data\n");
|
||||||
|
BIO_printf(bio_err, "-encrypt encrypt with public key\n");
|
||||||
|
BIO_printf(bio_err, "-decrypt decrypt with private key\n");
|
||||||
|
BIO_printf(bio_err, "-derive derive shared secret\n");
|
||||||
|
BIO_printf(bio_err, "-hexdump hex dump output\n");
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
BIO_printf(bio_err, "-engine e use engine e, possibly a hardware device.\n");
|
||||||
|
#endif
|
||||||
|
BIO_printf(bio_err, "-passin arg pass phrase source\n");
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
static EVP_PKEY_CTX *init_ctx(int *pkeysize,
|
||||||
|
char *keyfile, int keyform, int key_type,
|
||||||
|
char *passargin, int pkey_op, ENGINE *e)
|
||||||
|
{
|
||||||
|
EVP_PKEY *pkey = NULL;
|
||||||
|
EVP_PKEY_CTX *ctx = NULL;
|
||||||
|
char *passin = NULL;
|
||||||
|
int rv = -1;
|
||||||
|
X509 *x;
|
||||||
|
if(((pkey_op == EVP_PKEY_OP_SIGN) || (pkey_op == EVP_PKEY_OP_DECRYPT)
|
||||||
|
|| (pkey_op == EVP_PKEY_OP_DERIVE))
|
||||||
|
&& (key_type != KEY_PRIVKEY))
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "A private key is needed for this operation\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
if(!app_passwd(bio_err, passargin, NULL, &passin, NULL))
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Error getting password\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
switch(key_type)
|
||||||
|
{
|
||||||
|
case KEY_PRIVKEY:
|
||||||
|
pkey = load_key(bio_err, keyfile, keyform, 0,
|
||||||
|
passin, e, "Private Key");
|
||||||
|
break;
|
||||||
|
|
||||||
|
case KEY_PUBKEY:
|
||||||
|
pkey = load_pubkey(bio_err, keyfile, keyform, 0,
|
||||||
|
NULL, e, "Public Key");
|
||||||
|
break;
|
||||||
|
|
||||||
|
case KEY_CERT:
|
||||||
|
x = load_cert(bio_err, keyfile, keyform,
|
||||||
|
NULL, e, "Certificate");
|
||||||
|
if(x)
|
||||||
|
{
|
||||||
|
pkey = X509_get_pubkey(x);
|
||||||
|
X509_free(x);
|
||||||
|
}
|
||||||
|
break;
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
*pkeysize = EVP_PKEY_size(pkey);
|
||||||
|
|
||||||
|
if (!pkey)
|
||||||
|
goto end;
|
||||||
|
|
||||||
|
ctx = EVP_PKEY_CTX_new(pkey, e);
|
||||||
|
|
||||||
|
EVP_PKEY_free(pkey);
|
||||||
|
|
||||||
|
if (!ctx)
|
||||||
|
goto end;
|
||||||
|
|
||||||
|
switch(pkey_op)
|
||||||
|
{
|
||||||
|
case EVP_PKEY_OP_SIGN:
|
||||||
|
rv = EVP_PKEY_sign_init(ctx);
|
||||||
|
break;
|
||||||
|
|
||||||
|
case EVP_PKEY_OP_VERIFY:
|
||||||
|
rv = EVP_PKEY_verify_init(ctx);
|
||||||
|
break;
|
||||||
|
|
||||||
|
case EVP_PKEY_OP_VERIFYRECOVER:
|
||||||
|
rv = EVP_PKEY_verify_recover_init(ctx);
|
||||||
|
break;
|
||||||
|
|
||||||
|
case EVP_PKEY_OP_ENCRYPT:
|
||||||
|
rv = EVP_PKEY_encrypt_init(ctx);
|
||||||
|
break;
|
||||||
|
|
||||||
|
case EVP_PKEY_OP_DECRYPT:
|
||||||
|
rv = EVP_PKEY_decrypt_init(ctx);
|
||||||
|
break;
|
||||||
|
|
||||||
|
case EVP_PKEY_OP_DERIVE:
|
||||||
|
rv = EVP_PKEY_derive_init(ctx);
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (rv <= 0)
|
||||||
|
{
|
||||||
|
EVP_PKEY_CTX_free(ctx);
|
||||||
|
ctx = NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
end:
|
||||||
|
|
||||||
|
if (passin)
|
||||||
|
OPENSSL_free(passin);
|
||||||
|
|
||||||
|
return ctx;
|
||||||
|
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
static int setup_peer(BIO *err, EVP_PKEY_CTX *ctx, int peerform,
|
||||||
|
const char *file)
|
||||||
|
{
|
||||||
|
EVP_PKEY *peer = NULL;
|
||||||
|
int ret;
|
||||||
|
if (!ctx)
|
||||||
|
{
|
||||||
|
BIO_puts(err, "-peerkey command before -inkey\n");
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
peer = load_pubkey(bio_err, file, peerform, 0, NULL, NULL, "Peer Key");
|
||||||
|
|
||||||
|
if (!peer)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Error reading peer key %s\n", file);
|
||||||
|
ERR_print_errors(err);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
ret = EVP_PKEY_derive_set_peer(ctx, peer);
|
||||||
|
|
||||||
|
EVP_PKEY_free(peer);
|
||||||
|
if (ret <= 0)
|
||||||
|
ERR_print_errors(err);
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int do_keyop(EVP_PKEY_CTX *ctx, int pkey_op,
|
||||||
|
unsigned char *out, size_t *poutlen,
|
||||||
|
unsigned char *in, size_t inlen)
|
||||||
|
{
|
||||||
|
int rv = 0;
|
||||||
|
switch(pkey_op)
|
||||||
|
{
|
||||||
|
case EVP_PKEY_OP_VERIFYRECOVER:
|
||||||
|
rv = EVP_PKEY_verify_recover(ctx, out, poutlen, in, inlen);
|
||||||
|
break;
|
||||||
|
|
||||||
|
case EVP_PKEY_OP_SIGN:
|
||||||
|
rv = EVP_PKEY_sign(ctx, out, poutlen, in, inlen);
|
||||||
|
break;
|
||||||
|
|
||||||
|
case EVP_PKEY_OP_ENCRYPT:
|
||||||
|
rv = EVP_PKEY_encrypt(ctx, out, poutlen, in, inlen);
|
||||||
|
break;
|
||||||
|
|
||||||
|
case EVP_PKEY_OP_DECRYPT:
|
||||||
|
rv = EVP_PKEY_decrypt(ctx, out, poutlen, in, inlen);
|
||||||
|
break;
|
||||||
|
|
||||||
|
case EVP_PKEY_OP_DERIVE:
|
||||||
|
rv = EVP_PKEY_derive(ctx, out, poutlen);
|
||||||
|
break;
|
||||||
|
|
||||||
|
}
|
||||||
|
return rv;
|
||||||
|
}
|
||||||
32
apps/prime.c
32
apps/prime.c
@@ -62,6 +62,9 @@ int MAIN(int argc, char **argv)
|
|||||||
{
|
{
|
||||||
int hex=0;
|
int hex=0;
|
||||||
int checks=20;
|
int checks=20;
|
||||||
|
int generate=0;
|
||||||
|
int bits=0;
|
||||||
|
int safe=0;
|
||||||
BIGNUM *bn=NULL;
|
BIGNUM *bn=NULL;
|
||||||
BIO *bio_out;
|
BIO *bio_out;
|
||||||
|
|
||||||
@@ -77,6 +80,15 @@ int MAIN(int argc, char **argv)
|
|||||||
{
|
{
|
||||||
if(!strcmp(*argv,"-hex"))
|
if(!strcmp(*argv,"-hex"))
|
||||||
hex=1;
|
hex=1;
|
||||||
|
else if(!strcmp(*argv,"-generate"))
|
||||||
|
generate=1;
|
||||||
|
else if(!strcmp(*argv,"-bits"))
|
||||||
|
if(--argc < 1)
|
||||||
|
goto bad;
|
||||||
|
else
|
||||||
|
bits=atoi(*++argv);
|
||||||
|
else if(!strcmp(*argv,"-safe"))
|
||||||
|
safe=1;
|
||||||
else if(!strcmp(*argv,"-checks"))
|
else if(!strcmp(*argv,"-checks"))
|
||||||
if(--argc < 1)
|
if(--argc < 1)
|
||||||
goto bad;
|
goto bad;
|
||||||
@@ -91,7 +103,7 @@ int MAIN(int argc, char **argv)
|
|||||||
++argv;
|
++argv;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (argv[0] == NULL)
|
if (argv[0] == NULL && !generate)
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,"No prime specified\n");
|
BIO_printf(bio_err,"No prime specified\n");
|
||||||
goto bad;
|
goto bad;
|
||||||
@@ -108,6 +120,23 @@ int MAIN(int argc, char **argv)
|
|||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if(generate)
|
||||||
|
{
|
||||||
|
char *s;
|
||||||
|
|
||||||
|
if(!bits)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err,"Specifiy the number of bits.\n");
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
bn=BN_new();
|
||||||
|
BN_generate_prime_ex(bn,bits,safe,NULL,NULL,NULL);
|
||||||
|
s=hex ? BN_bn2hex(bn) : BN_bn2dec(bn);
|
||||||
|
BIO_printf(bio_out,"%s\n",s);
|
||||||
|
OPENSSL_free(s);
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
if(hex)
|
if(hex)
|
||||||
BN_hex2bn(&bn,argv[0]);
|
BN_hex2bn(&bn,argv[0]);
|
||||||
else
|
else
|
||||||
@@ -116,6 +145,7 @@ int MAIN(int argc, char **argv)
|
|||||||
BN_print(bio_out,bn);
|
BN_print(bio_out,bn);
|
||||||
BIO_printf(bio_out," is %sprime\n",
|
BIO_printf(bio_out," is %sprime\n",
|
||||||
BN_is_prime_ex(bn,checks,NULL,NULL) ? "" : "not ");
|
BN_is_prime_ex(bn,checks,NULL,NULL) ? "" : "not ");
|
||||||
|
}
|
||||||
|
|
||||||
BN_free(bn);
|
BN_free(bn);
|
||||||
BIO_free_all(bio_out);
|
BIO_free_all(bio_out);
|
||||||
|
|||||||
@@ -1,18 +1,16 @@
|
|||||||
-----BEGIN RSA PRIVATE KEY-----
|
-----BEGIN PRIVATE KEY-----
|
||||||
Proc-Type: 4,ENCRYPTED
|
MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBAMo7DFNMqywUA1O/
|
||||||
DEK-Info: DES-EDE3-CBC,BA26229A1653B7FF
|
qvWqCOm6rGrUAcR+dKsSXw6y2qiKO7APDDyotc0b4Mxwqjga98npex2RBIwUoCGJ
|
||||||
|
iEmMXo/a8RbXVUZ+ZwcAX7PC+XeXVC5qoajaBBkd2MvYmib/2PqnNrgvhHsUL5dO
|
||||||
6nhWG8PKhTPO/s3ZvjUa6226NlKdvPDZFsNXOOoSUs9ejxpb/aj5huhs6qRYzsz9
|
xhC7cRqxLM/g45k3Yyw+nGa+WkTdAgMBAAECgYBMBT5w4dVG0I8foGFnz+9hzWab
|
||||||
Year47uaAZYhGD0vAagnNiBnYmjWEpN9G/wQxG7pgZThK1ZxDi63qn8aQ8UjuGHo
|
Ee9IKjE5TcKmB93ilXQyjrWO5+zPmbc7ou6aAKk9IaPCTY1kCyzW7pho7Xdt+RFq
|
||||||
F6RpnnBQIAnWTWqr/Qsybtc5EoNkrj/Cpx0OfbSr6gZsFBCxwX1R1hT3/mhJ45f3
|
TgVXGZZfqtixO7f2/5oqZAkd00eOn9ZrhBpVMu4yXbbDvhDyFe4/oy0HGDjRUhxa
|
||||||
XMofY32Vdfx9/vtw1O7HmlHXQnXaqnbd9/nn1EpvFJG9+UjPoW7gV4jCOLuR4deE
|
Lf6ZlBuTherxm4eFkQJBAPBQwRs9UtqaMAQlagA9pV5UsQjV1WT4IxDURMPfXgCd
|
||||||
jS8hm+cpkwXmFtk3VGjT9tQXPpMv3JpYfBqgGQoMAJ5Toq0DWcHi6Wg08PsD8lgy
|
ETNkB6pP0SmxQm5xhv9N2HY1UtoWpug9s0OU5IJB15sCQQDXbfbjiujNbuOxCFNw
|
||||||
vmTioPsRg+JGkJkJ8GnusgLpQdlQJbjzd7wGE6ElUFLfOxLo8bLlRHoriHNdWYhh
|
68JZaCFVdNovyOWORkpenQLNEjVkmTCS9OayK09ADEYtsdpUGKeF+2EYBNkFr5px
|
||||||
JjY0LyeTkovcmWxVjImc6ZyBz5Ly4t0BYf1gq3OkjsV91Q1taBxnhiavfizqMCAf
|
CajnAkBMYI4PNz1HBuwt1SpMa0tMoMQnV7bbwVV7usskKbC5pzHZUHhzM6z5gEHp
|
||||||
PPB3sLQnlXG77TOXkNxpqbZfEYrVZW2Nsqqdn8s07Uj4IMONZyq2odYKWFPMJBiM
|
0iEisT4Ty7zKXZqsgzefSgoaMAzzAkEAoCIaUhtwXzwdPfvNYnOs3J6doJMimECB
|
||||||
POYwXjMAOcmFMTHYsVlhcUJuV6LOuipw/FEbTtPH/MYMxLe4zx65dYo1rb4iLKLS
|
+lbfcyLM8TimvadtRt+KGEg/OYGmLNM2UiqdY+duzdbUpvhYGcwvYwJAQvaoi9z2
|
||||||
gMtB0o/Wl4Xno3ZXh1ucicYnV2J7NpVcjVq+3SFiCRu2SrSkZHZ23EPS13Ec6fcz
|
CkiwSs/PFrLaNlfLJmXRsUBzmiWYoh6+IQJJorEXz7ewI72ee9RBO4s746cgUFwH
|
||||||
8X/YGA2vTJ8MAOozAzQUwHQYvLk7bIoQVekqDq4p0AZQbhdspHpArCk0Ifqqzg/v
|
Ri+qO+HhZFUBqQ==
|
||||||
Uyky/zZiQYanzDenTSRVI/8wac3olxpU8QvbySxYqmbkgq6bTpXJfYFQfnAttEsC
|
-----END PRIVATE KEY-----
|
||||||
dA4S5UFgyOPZluxCAM4yaJF3Ft6neutNwftuJQMbgCUi9vYg2tGdSw==
|
|
||||||
-----END RSA PRIVATE KEY-----
|
|
||||||
|
|||||||
23
apps/progs.h
23
apps/progs.h
@@ -22,6 +22,7 @@ extern int ecparam_main(int argc,char *argv[]);
|
|||||||
extern int x509_main(int argc,char *argv[]);
|
extern int x509_main(int argc,char *argv[]);
|
||||||
extern int genrsa_main(int argc,char *argv[]);
|
extern int genrsa_main(int argc,char *argv[]);
|
||||||
extern int gendsa_main(int argc,char *argv[]);
|
extern int gendsa_main(int argc,char *argv[]);
|
||||||
|
extern int genpkey_main(int argc,char *argv[]);
|
||||||
extern int s_server_main(int argc,char *argv[]);
|
extern int s_server_main(int argc,char *argv[]);
|
||||||
extern int s_client_main(int argc,char *argv[]);
|
extern int s_client_main(int argc,char *argv[]);
|
||||||
extern int speed_main(int argc,char *argv[]);
|
extern int speed_main(int argc,char *argv[]);
|
||||||
@@ -35,22 +36,31 @@ extern int ciphers_main(int argc,char *argv[]);
|
|||||||
extern int nseq_main(int argc,char *argv[]);
|
extern int nseq_main(int argc,char *argv[]);
|
||||||
extern int pkcs12_main(int argc,char *argv[]);
|
extern int pkcs12_main(int argc,char *argv[]);
|
||||||
extern int pkcs8_main(int argc,char *argv[]);
|
extern int pkcs8_main(int argc,char *argv[]);
|
||||||
|
extern int pkey_main(int argc,char *argv[]);
|
||||||
|
extern int pkeyparam_main(int argc,char *argv[]);
|
||||||
|
extern int pkeyutl_main(int argc,char *argv[]);
|
||||||
extern int spkac_main(int argc,char *argv[]);
|
extern int spkac_main(int argc,char *argv[]);
|
||||||
extern int smime_main(int argc,char *argv[]);
|
extern int smime_main(int argc,char *argv[]);
|
||||||
extern int rand_main(int argc,char *argv[]);
|
extern int rand_main(int argc,char *argv[]);
|
||||||
extern int engine_main(int argc,char *argv[]);
|
extern int engine_main(int argc,char *argv[]);
|
||||||
extern int ocsp_main(int argc,char *argv[]);
|
extern int ocsp_main(int argc,char *argv[]);
|
||||||
|
extern int srp_main(int argc,char *argv[]);
|
||||||
extern int prime_main(int argc,char *argv[]);
|
extern int prime_main(int argc,char *argv[]);
|
||||||
|
extern int ts_main(int argc,char *argv[]);
|
||||||
|
|
||||||
#define FUNC_TYPE_GENERAL 1
|
#define FUNC_TYPE_GENERAL 1
|
||||||
#define FUNC_TYPE_MD 2
|
#define FUNC_TYPE_MD 2
|
||||||
#define FUNC_TYPE_CIPHER 3
|
#define FUNC_TYPE_CIPHER 3
|
||||||
|
#define FUNC_TYPE_PKEY 4
|
||||||
|
#define FUNC_TYPE_MD_ALG 5
|
||||||
|
#define FUNC_TYPE_CIPHER_ALG 6
|
||||||
|
|
||||||
typedef struct {
|
typedef struct {
|
||||||
int type;
|
int type;
|
||||||
const char *name;
|
const char *name;
|
||||||
int (*func)(int argc,char *argv[]);
|
int (*func)(int argc,char *argv[]);
|
||||||
} FUNCTION;
|
} FUNCTION;
|
||||||
|
DECLARE_LHASH_OF(FUNCTION);
|
||||||
|
|
||||||
FUNCTION functions[] = {
|
FUNCTION functions[] = {
|
||||||
{FUNC_TYPE_GENERAL,"verify",verify_main},
|
{FUNC_TYPE_GENERAL,"verify",verify_main},
|
||||||
@@ -96,6 +106,7 @@ FUNCTION functions[] = {
|
|||||||
#ifndef OPENSSL_NO_DSA
|
#ifndef OPENSSL_NO_DSA
|
||||||
{FUNC_TYPE_GENERAL,"gendsa",gendsa_main},
|
{FUNC_TYPE_GENERAL,"gendsa",gendsa_main},
|
||||||
#endif
|
#endif
|
||||||
|
{FUNC_TYPE_GENERAL,"genpkey",genpkey_main},
|
||||||
#if !defined(OPENSSL_NO_SOCK) && !(defined(OPENSSL_NO_SSL2) && defined(OPENSSL_NO_SSL3))
|
#if !defined(OPENSSL_NO_SOCK) && !(defined(OPENSSL_NO_SSL2) && defined(OPENSSL_NO_SSL3))
|
||||||
{FUNC_TYPE_GENERAL,"s_server",s_server_main},
|
{FUNC_TYPE_GENERAL,"s_server",s_server_main},
|
||||||
#endif
|
#endif
|
||||||
@@ -123,14 +134,23 @@ FUNCTION functions[] = {
|
|||||||
{FUNC_TYPE_GENERAL,"pkcs12",pkcs12_main},
|
{FUNC_TYPE_GENERAL,"pkcs12",pkcs12_main},
|
||||||
#endif
|
#endif
|
||||||
{FUNC_TYPE_GENERAL,"pkcs8",pkcs8_main},
|
{FUNC_TYPE_GENERAL,"pkcs8",pkcs8_main},
|
||||||
|
{FUNC_TYPE_GENERAL,"pkey",pkey_main},
|
||||||
|
{FUNC_TYPE_GENERAL,"pkeyparam",pkeyparam_main},
|
||||||
|
{FUNC_TYPE_GENERAL,"pkeyutl",pkeyutl_main},
|
||||||
{FUNC_TYPE_GENERAL,"spkac",spkac_main},
|
{FUNC_TYPE_GENERAL,"spkac",spkac_main},
|
||||||
{FUNC_TYPE_GENERAL,"smime",smime_main},
|
{FUNC_TYPE_GENERAL,"smime",smime_main},
|
||||||
{FUNC_TYPE_GENERAL,"rand",rand_main},
|
{FUNC_TYPE_GENERAL,"rand",rand_main},
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
{FUNC_TYPE_GENERAL,"engine",engine_main},
|
{FUNC_TYPE_GENERAL,"engine",engine_main},
|
||||||
#endif
|
#endif
|
||||||
|
#ifndef OPENSSL_NO_OCSP
|
||||||
{FUNC_TYPE_GENERAL,"ocsp",ocsp_main},
|
{FUNC_TYPE_GENERAL,"ocsp",ocsp_main},
|
||||||
|
#endif
|
||||||
|
#ifndef OPENSSL_NO_SRP
|
||||||
|
{FUNC_TYPE_GENERAL,"srp",srp_main},
|
||||||
|
#endif
|
||||||
{FUNC_TYPE_GENERAL,"prime",prime_main},
|
{FUNC_TYPE_GENERAL,"prime",prime_main},
|
||||||
|
{FUNC_TYPE_GENERAL,"ts",ts_main},
|
||||||
#ifndef OPENSSL_NO_MD2
|
#ifndef OPENSSL_NO_MD2
|
||||||
{FUNC_TYPE_MD,"md2",dgst_main},
|
{FUNC_TYPE_MD,"md2",dgst_main},
|
||||||
#endif
|
#endif
|
||||||
@@ -189,6 +209,9 @@ FUNCTION functions[] = {
|
|||||||
{FUNC_TYPE_CIPHER,"camellia-256-ecb",enc_main},
|
{FUNC_TYPE_CIPHER,"camellia-256-ecb",enc_main},
|
||||||
#endif
|
#endif
|
||||||
{FUNC_TYPE_CIPHER,"base64",enc_main},
|
{FUNC_TYPE_CIPHER,"base64",enc_main},
|
||||||
|
#ifdef ZLIB
|
||||||
|
{FUNC_TYPE_CIPHER,"zlib",enc_main},
|
||||||
|
#endif
|
||||||
#ifndef OPENSSL_NO_DES
|
#ifndef OPENSSL_NO_DES
|
||||||
{FUNC_TYPE_CIPHER,"des",enc_main},
|
{FUNC_TYPE_CIPHER,"des",enc_main},
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
@@ -13,12 +13,16 @@ print <<'EOF';
|
|||||||
#define FUNC_TYPE_GENERAL 1
|
#define FUNC_TYPE_GENERAL 1
|
||||||
#define FUNC_TYPE_MD 2
|
#define FUNC_TYPE_MD 2
|
||||||
#define FUNC_TYPE_CIPHER 3
|
#define FUNC_TYPE_CIPHER 3
|
||||||
|
#define FUNC_TYPE_PKEY 4
|
||||||
|
#define FUNC_TYPE_MD_ALG 5
|
||||||
|
#define FUNC_TYPE_CIPHER_ALG 6
|
||||||
|
|
||||||
typedef struct {
|
typedef struct {
|
||||||
int type;
|
int type;
|
||||||
const char *name;
|
const char *name;
|
||||||
int (*func)(int argc,char *argv[]);
|
int (*func)(int argc,char *argv[]);
|
||||||
} FUNCTION;
|
} FUNCTION;
|
||||||
|
DECLARE_LHASH_OF(FUNCTION);
|
||||||
|
|
||||||
FUNCTION functions[] = {
|
FUNCTION functions[] = {
|
||||||
EOF
|
EOF
|
||||||
@@ -45,6 +49,8 @@ foreach (@ARGV)
|
|||||||
{ print "#if !defined(OPENSSL_NO_DES) && !defined(OPENSSL_NO_SHA1)\n${str}#endif\n"; }
|
{ print "#if !defined(OPENSSL_NO_DES) && !defined(OPENSSL_NO_SHA1)\n${str}#endif\n"; }
|
||||||
elsif ( ($_ =~ /^cms$/))
|
elsif ( ($_ =~ /^cms$/))
|
||||||
{ print "#ifndef OPENSSL_NO_CMS\n${str}#endif\n"; }
|
{ print "#ifndef OPENSSL_NO_CMS\n${str}#endif\n"; }
|
||||||
|
elsif ( ($_ =~ /^ocsp$/))
|
||||||
|
{ print "#ifndef OPENSSL_NO_OCSP\n${str}#endif\n"; }
|
||||||
else
|
else
|
||||||
{ print $str; }
|
{ print $str; }
|
||||||
}
|
}
|
||||||
@@ -62,7 +68,7 @@ foreach (
|
|||||||
"camellia-128-cbc", "camellia-128-ecb",
|
"camellia-128-cbc", "camellia-128-ecb",
|
||||||
"camellia-192-cbc", "camellia-192-ecb",
|
"camellia-192-cbc", "camellia-192-ecb",
|
||||||
"camellia-256-cbc", "camellia-256-ecb",
|
"camellia-256-cbc", "camellia-256-ecb",
|
||||||
"base64",
|
"base64", "zlib",
|
||||||
"des", "des3", "desx", "idea", "seed", "rc4", "rc4-40",
|
"des", "des3", "desx", "idea", "seed", "rc4", "rc4-40",
|
||||||
"rc2", "bf", "cast", "rc5",
|
"rc2", "bf", "cast", "rc5",
|
||||||
"des-ecb", "des-ede", "des-ede3",
|
"des-ecb", "des-ede", "des-ede3",
|
||||||
@@ -89,6 +95,7 @@ foreach (
|
|||||||
elsif ($_ =~ /bf/) { $t="#ifndef OPENSSL_NO_BF\n${t}#endif\n"; }
|
elsif ($_ =~ /bf/) { $t="#ifndef OPENSSL_NO_BF\n${t}#endif\n"; }
|
||||||
elsif ($_ =~ /cast/) { $t="#ifndef OPENSSL_NO_CAST\n${t}#endif\n"; }
|
elsif ($_ =~ /cast/) { $t="#ifndef OPENSSL_NO_CAST\n${t}#endif\n"; }
|
||||||
elsif ($_ =~ /rc5/) { $t="#ifndef OPENSSL_NO_RC5\n${t}#endif\n"; }
|
elsif ($_ =~ /rc5/) { $t="#ifndef OPENSSL_NO_RC5\n${t}#endif\n"; }
|
||||||
|
elsif ($_ =~ /zlib/) { $t="#ifdef ZLIB\n${t}#endif\n"; }
|
||||||
print $t;
|
print $t;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
30
apps/rand.c
30
apps/rand.c
@@ -68,7 +68,8 @@
|
|||||||
|
|
||||||
/* -out file - write to file
|
/* -out file - write to file
|
||||||
* -rand file:file - PRNG seed files
|
* -rand file:file - PRNG seed files
|
||||||
* -base64 - encode output
|
* -base64 - base64 encode output
|
||||||
|
* -hex - hex encode output
|
||||||
* num - write 'num' bytes
|
* num - write 'num' bytes
|
||||||
*/
|
*/
|
||||||
|
|
||||||
@@ -76,14 +77,12 @@ int MAIN(int, char **);
|
|||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
|
||||||
ENGINE *e = NULL;
|
|
||||||
#endif
|
|
||||||
int i, r, ret = 1;
|
int i, r, ret = 1;
|
||||||
int badopt;
|
int badopt;
|
||||||
char *outfile = NULL;
|
char *outfile = NULL;
|
||||||
char *inrand = NULL;
|
char *inrand = NULL;
|
||||||
int base64 = 0;
|
int base64 = 0;
|
||||||
|
int hex = 0;
|
||||||
BIO *out = NULL;
|
BIO *out = NULL;
|
||||||
int num = -1;
|
int num = -1;
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
@@ -133,6 +132,13 @@ int MAIN(int argc, char **argv)
|
|||||||
else
|
else
|
||||||
badopt = 1;
|
badopt = 1;
|
||||||
}
|
}
|
||||||
|
else if (strcmp(argv[i], "-hex") == 0)
|
||||||
|
{
|
||||||
|
if (!hex)
|
||||||
|
hex = 1;
|
||||||
|
else
|
||||||
|
badopt = 1;
|
||||||
|
}
|
||||||
else if (isdigit((unsigned char)argv[i][0]))
|
else if (isdigit((unsigned char)argv[i][0]))
|
||||||
{
|
{
|
||||||
if (num < 0)
|
if (num < 0)
|
||||||
@@ -148,6 +154,9 @@ int MAIN(int argc, char **argv)
|
|||||||
badopt = 1;
|
badopt = 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (hex && base64)
|
||||||
|
badopt = 1;
|
||||||
|
|
||||||
if (num < 0)
|
if (num < 0)
|
||||||
badopt = 1;
|
badopt = 1;
|
||||||
|
|
||||||
@@ -160,12 +169,13 @@ int MAIN(int argc, char **argv)
|
|||||||
BIO_printf(bio_err, "-engine e - use engine e, possibly a hardware device.\n");
|
BIO_printf(bio_err, "-engine e - use engine e, possibly a hardware device.\n");
|
||||||
#endif
|
#endif
|
||||||
BIO_printf(bio_err, "-rand file%cfile%c... - seed PRNG from files\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
|
BIO_printf(bio_err, "-rand file%cfile%c... - seed PRNG from files\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
|
||||||
BIO_printf(bio_err, "-base64 - encode output\n");
|
BIO_printf(bio_err, "-base64 - base64 encode output\n");
|
||||||
|
BIO_printf(bio_err, "-hex - hex encode output\n");
|
||||||
goto err;
|
goto err;
|
||||||
}
|
}
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
e = setup_engine(bio_err, engine, 0);
|
setup_engine(bio_err, engine, 0);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
app_RAND_load_file(NULL, bio_err, (inrand != NULL));
|
app_RAND_load_file(NULL, bio_err, (inrand != NULL));
|
||||||
@@ -210,9 +220,17 @@ int MAIN(int argc, char **argv)
|
|||||||
r = RAND_bytes(buf, chunk);
|
r = RAND_bytes(buf, chunk);
|
||||||
if (r <= 0)
|
if (r <= 0)
|
||||||
goto err;
|
goto err;
|
||||||
|
if (!hex)
|
||||||
BIO_write(out, buf, chunk);
|
BIO_write(out, buf, chunk);
|
||||||
|
else
|
||||||
|
{
|
||||||
|
for (i = 0; i < chunk; i++)
|
||||||
|
BIO_printf(out, "%02x", buf[i]);
|
||||||
|
}
|
||||||
num -= chunk;
|
num -= chunk;
|
||||||
}
|
}
|
||||||
|
if (hex)
|
||||||
|
BIO_puts(out, "\n");
|
||||||
(void)BIO_flush(out);
|
(void)BIO_flush(out);
|
||||||
|
|
||||||
app_RAND_write_file(NULL, bio_err);
|
app_RAND_write_file(NULL, bio_err);
|
||||||
|
|||||||
583
apps/req.c
583
apps/req.c
@@ -141,39 +141,33 @@ static int add_attribute_object(X509_REQ *req, char *text, const char *def,
|
|||||||
int n_max, unsigned long chtype);
|
int n_max, unsigned long chtype);
|
||||||
static int add_DN_object(X509_NAME *n, char *text, const char *def, char *value,
|
static int add_DN_object(X509_NAME *n, char *text, const char *def, char *value,
|
||||||
int nid,int n_min,int n_max, unsigned long chtype, int mval);
|
int nid,int n_min,int n_max, unsigned long chtype, int mval);
|
||||||
#ifndef OPENSSL_NO_RSA
|
static int genpkey_cb(EVP_PKEY_CTX *ctx);
|
||||||
static int MS_CALLBACK req_cb(int p, int n, BN_GENCB *cb);
|
|
||||||
#endif
|
|
||||||
static int req_check_len(int len,int n_min,int n_max);
|
static int req_check_len(int len,int n_min,int n_max);
|
||||||
static int check_end(const char *str, const char *end);
|
static int check_end(const char *str, const char *end);
|
||||||
|
static EVP_PKEY_CTX *set_keygen_ctx(BIO *err, const char *gstr, int *pkey_type,
|
||||||
|
long *pkeylen, char **palgnam,
|
||||||
|
ENGINE *keygen_engine);
|
||||||
#ifndef MONOLITH
|
#ifndef MONOLITH
|
||||||
static char *default_config_file=NULL;
|
static char *default_config_file=NULL;
|
||||||
#endif
|
#endif
|
||||||
static CONF *req_conf=NULL;
|
static CONF *req_conf=NULL;
|
||||||
static int batch=0;
|
static int batch=0;
|
||||||
|
|
||||||
#define TYPE_RSA 1
|
|
||||||
#define TYPE_DSA 2
|
|
||||||
#define TYPE_DH 3
|
|
||||||
#define TYPE_EC 4
|
|
||||||
|
|
||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
ENGINE *e = NULL;
|
ENGINE *e = NULL, *gen_eng = NULL;
|
||||||
#ifndef OPENSSL_NO_DSA
|
|
||||||
DSA *dsa_params=NULL;
|
|
||||||
#endif
|
|
||||||
#ifndef OPENSSL_NO_ECDSA
|
|
||||||
EC_KEY *ec_params = NULL;
|
|
||||||
#endif
|
|
||||||
unsigned long nmflag = 0, reqflag = 0;
|
unsigned long nmflag = 0, reqflag = 0;
|
||||||
int ex=1,x509=0,days=30;
|
int ex=1,x509=0,days=30;
|
||||||
X509 *x509ss=NULL;
|
X509 *x509ss=NULL;
|
||||||
X509_REQ *req=NULL;
|
X509_REQ *req=NULL;
|
||||||
|
EVP_PKEY_CTX *genctx = NULL;
|
||||||
|
const char *keyalg = NULL;
|
||||||
|
char *keyalgstr = NULL;
|
||||||
|
STACK_OF(OPENSSL_STRING) *pkeyopts = NULL, *sigopts = NULL;
|
||||||
EVP_PKEY *pkey=NULL;
|
EVP_PKEY *pkey=NULL;
|
||||||
int i=0,badops=0,newreq=0,verbose=0,pkey_type=TYPE_RSA;
|
int i=0,badops=0,newreq=0,verbose=0,pkey_type=-1;
|
||||||
long newkey = -1;
|
long newkey = -1;
|
||||||
BIO *in=NULL,*out=NULL;
|
BIO *in=NULL,*out=NULL;
|
||||||
int informat,outformat,verify=0,noout=0,text=0,keyform=FORMAT_PEM;
|
int informat,outformat,verify=0,noout=0,text=0,keyform=FORMAT_PEM;
|
||||||
@@ -193,7 +187,7 @@ int MAIN(int argc, char **argv)
|
|||||||
char *p;
|
char *p;
|
||||||
char *subj = NULL;
|
char *subj = NULL;
|
||||||
int multirdn = 0;
|
int multirdn = 0;
|
||||||
const EVP_MD *md_alg=NULL,*digest=EVP_sha1();
|
const EVP_MD *md_alg=NULL,*digest=NULL;
|
||||||
unsigned long chtype = MBSTRING_ASC;
|
unsigned long chtype = MBSTRING_ASC;
|
||||||
#ifndef MONOLITH
|
#ifndef MONOLITH
|
||||||
char *to_free;
|
char *to_free;
|
||||||
@@ -236,6 +230,16 @@ int MAIN(int argc, char **argv)
|
|||||||
if (--argc < 1) goto bad;
|
if (--argc < 1) goto bad;
|
||||||
engine= *(++argv);
|
engine= *(++argv);
|
||||||
}
|
}
|
||||||
|
else if (strcmp(*argv,"-keygen_engine") == 0)
|
||||||
|
{
|
||||||
|
if (--argc < 1) goto bad;
|
||||||
|
gen_eng = ENGINE_by_id(*(++argv));
|
||||||
|
if (gen_eng == NULL)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Can't find keygen engine %s\n", *argv);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
#endif
|
#endif
|
||||||
else if (strcmp(*argv,"-key") == 0)
|
else if (strcmp(*argv,"-key") == 0)
|
||||||
{
|
{
|
||||||
@@ -292,125 +296,28 @@ int MAIN(int argc, char **argv)
|
|||||||
}
|
}
|
||||||
else if (strcmp(*argv,"-newkey") == 0)
|
else if (strcmp(*argv,"-newkey") == 0)
|
||||||
{
|
{
|
||||||
int is_numeric;
|
if (--argc < 1)
|
||||||
|
goto bad;
|
||||||
if (--argc < 1) goto bad;
|
keyalg = *(++argv);
|
||||||
p= *(++argv);
|
newreq=1;
|
||||||
is_numeric = p[0] >= '0' && p[0] <= '9';
|
|
||||||
if (strncmp("rsa:",p,4) == 0 || is_numeric)
|
|
||||||
{
|
|
||||||
pkey_type=TYPE_RSA;
|
|
||||||
if(!is_numeric)
|
|
||||||
p+=4;
|
|
||||||
newkey= atoi(p);
|
|
||||||
}
|
}
|
||||||
else
|
else if (strcmp(*argv,"-pkeyopt") == 0)
|
||||||
#ifndef OPENSSL_NO_DSA
|
|
||||||
if (strncmp("dsa:",p,4) == 0)
|
|
||||||
{
|
|
||||||
X509 *xtmp=NULL;
|
|
||||||
EVP_PKEY *dtmp;
|
|
||||||
|
|
||||||
pkey_type=TYPE_DSA;
|
|
||||||
p+=4;
|
|
||||||
if ((in=BIO_new_file(p,"r")) == NULL)
|
|
||||||
{
|
|
||||||
perror(p);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
if ((dsa_params=PEM_read_bio_DSAparams(in,NULL,NULL,NULL)) == NULL)
|
|
||||||
{
|
|
||||||
ERR_clear_error();
|
|
||||||
(void)BIO_reset(in);
|
|
||||||
if ((xtmp=PEM_read_bio_X509(in,NULL,NULL,NULL)) == NULL)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"unable to load DSA parameters from file\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
if ((dtmp=X509_get_pubkey(xtmp)) == NULL) goto end;
|
|
||||||
if (dtmp->type == EVP_PKEY_DSA)
|
|
||||||
dsa_params=DSAparams_dup(dtmp->pkey.dsa);
|
|
||||||
EVP_PKEY_free(dtmp);
|
|
||||||
X509_free(xtmp);
|
|
||||||
if (dsa_params == NULL)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"Certificate does not contain DSA parameters\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
BIO_free(in);
|
|
||||||
in=NULL;
|
|
||||||
newkey=BN_num_bits(dsa_params->p);
|
|
||||||
}
|
|
||||||
else
|
|
||||||
#endif
|
|
||||||
#ifndef OPENSSL_NO_ECDSA
|
|
||||||
if (strncmp("ec:",p,3) == 0)
|
|
||||||
{
|
|
||||||
X509 *xtmp=NULL;
|
|
||||||
EVP_PKEY *dtmp;
|
|
||||||
EC_GROUP *group;
|
|
||||||
|
|
||||||
pkey_type=TYPE_EC;
|
|
||||||
p+=3;
|
|
||||||
if ((in=BIO_new_file(p,"r")) == NULL)
|
|
||||||
{
|
|
||||||
perror(p);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
if ((ec_params = EC_KEY_new()) == NULL)
|
|
||||||
goto end;
|
|
||||||
group = PEM_read_bio_ECPKParameters(in, NULL, NULL, NULL);
|
|
||||||
if (group == NULL)
|
|
||||||
{
|
|
||||||
EC_KEY_free(ec_params);
|
|
||||||
ERR_clear_error();
|
|
||||||
(void)BIO_reset(in);
|
|
||||||
if ((xtmp=PEM_read_bio_X509(in,NULL,NULL,NULL)) == NULL)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"unable to load EC parameters from file\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
if ((dtmp=X509_get_pubkey(xtmp))==NULL)
|
|
||||||
goto end;
|
|
||||||
if (dtmp->type == EVP_PKEY_EC)
|
|
||||||
ec_params = EC_KEY_dup(dtmp->pkey.ec);
|
|
||||||
EVP_PKEY_free(dtmp);
|
|
||||||
X509_free(xtmp);
|
|
||||||
if (ec_params == NULL)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"Certificate does not contain EC parameters\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
if (EC_KEY_set_group(ec_params, group) == 0)
|
|
||||||
goto end;
|
|
||||||
EC_GROUP_free(group);
|
|
||||||
}
|
|
||||||
|
|
||||||
BIO_free(in);
|
|
||||||
in=NULL;
|
|
||||||
newkey = EC_GROUP_get_degree(EC_KEY_get0_group(ec_params));
|
|
||||||
}
|
|
||||||
else
|
|
||||||
#endif
|
|
||||||
#ifndef OPENSSL_NO_DH
|
|
||||||
if (strncmp("dh:",p,4) == 0)
|
|
||||||
{
|
|
||||||
pkey_type=TYPE_DH;
|
|
||||||
p+=3;
|
|
||||||
}
|
|
||||||
else
|
|
||||||
#endif
|
|
||||||
{
|
{
|
||||||
|
if (--argc < 1)
|
||||||
|
goto bad;
|
||||||
|
if (!pkeyopts)
|
||||||
|
pkeyopts = sk_OPENSSL_STRING_new_null();
|
||||||
|
if (!pkeyopts || !sk_OPENSSL_STRING_push(pkeyopts, *(++argv)))
|
||||||
goto bad;
|
goto bad;
|
||||||
}
|
}
|
||||||
|
else if (strcmp(*argv,"-sigopt") == 0)
|
||||||
newreq=1;
|
{
|
||||||
|
if (--argc < 1)
|
||||||
|
goto bad;
|
||||||
|
if (!sigopts)
|
||||||
|
sigopts = sk_OPENSSL_STRING_new_null();
|
||||||
|
if (!sigopts || !sk_OPENSSL_STRING_push(sigopts, *(++argv)))
|
||||||
|
goto bad;
|
||||||
}
|
}
|
||||||
else if (strcmp(*argv,"-batch") == 0)
|
else if (strcmp(*argv,"-batch") == 0)
|
||||||
batch=1;
|
batch=1;
|
||||||
@@ -467,11 +374,6 @@ int MAIN(int argc, char **argv)
|
|||||||
serial = s2i_ASN1_INTEGER(NULL, *(++argv));
|
serial = s2i_ASN1_INTEGER(NULL, *(++argv));
|
||||||
if (!serial) goto bad;
|
if (!serial) goto bad;
|
||||||
}
|
}
|
||||||
else if ((md_alg=EVP_get_digestbyname(&((*argv)[1]))) != NULL)
|
|
||||||
{
|
|
||||||
/* ok */
|
|
||||||
digest=md_alg;
|
|
||||||
}
|
|
||||||
else if (strcmp(*argv,"-extensions") == 0)
|
else if (strcmp(*argv,"-extensions") == 0)
|
||||||
{
|
{
|
||||||
if (--argc < 1) goto bad;
|
if (--argc < 1) goto bad;
|
||||||
@@ -482,6 +384,11 @@ int MAIN(int argc, char **argv)
|
|||||||
if (--argc < 1) goto bad;
|
if (--argc < 1) goto bad;
|
||||||
req_exts = *(++argv);
|
req_exts = *(++argv);
|
||||||
}
|
}
|
||||||
|
else if ((md_alg=EVP_get_digestbyname(&((*argv)[1]))) != NULL)
|
||||||
|
{
|
||||||
|
/* ok */
|
||||||
|
digest=md_alg;
|
||||||
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,"unknown option %s\n",*argv);
|
BIO_printf(bio_err,"unknown option %s\n",*argv);
|
||||||
@@ -730,9 +637,6 @@ bad:
|
|||||||
|
|
||||||
if (newreq && (pkey == NULL))
|
if (newreq && (pkey == NULL))
|
||||||
{
|
{
|
||||||
#ifndef OPENSSL_NO_RSA
|
|
||||||
BN_GENCB cb;
|
|
||||||
#endif
|
|
||||||
char *randfile = NCONF_get_string(req_conf,SECTION,"RANDFILE");
|
char *randfile = NCONF_get_string(req_conf,SECTION,"RANDFILE");
|
||||||
if (randfile == NULL)
|
if (randfile == NULL)
|
||||||
ERR_clear_error();
|
ERR_clear_error();
|
||||||
@@ -740,64 +644,69 @@ bad:
|
|||||||
if (inrand)
|
if (inrand)
|
||||||
app_RAND_load_files(inrand);
|
app_RAND_load_files(inrand);
|
||||||
|
|
||||||
|
if (keyalg)
|
||||||
|
{
|
||||||
|
genctx = set_keygen_ctx(bio_err, keyalg, &pkey_type, &newkey,
|
||||||
|
&keyalgstr, gen_eng);
|
||||||
|
if (!genctx)
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
if (newkey <= 0)
|
if (newkey <= 0)
|
||||||
{
|
{
|
||||||
if (!NCONF_get_number(req_conf,SECTION,BITS, &newkey))
|
if (!NCONF_get_number(req_conf,SECTION,BITS, &newkey))
|
||||||
newkey=DEFAULT_KEY_LENGTH;
|
newkey=DEFAULT_KEY_LENGTH;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (newkey < MIN_KEY_LENGTH && (pkey_type == TYPE_RSA || pkey_type == TYPE_DSA))
|
if (newkey < MIN_KEY_LENGTH && (pkey_type == EVP_PKEY_RSA || pkey_type == EVP_PKEY_DSA))
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,"private key length is too short,\n");
|
BIO_printf(bio_err,"private key length is too short,\n");
|
||||||
BIO_printf(bio_err,"it needs to be at least %d bits, not %ld\n",MIN_KEY_LENGTH,newkey);
|
BIO_printf(bio_err,"it needs to be at least %d bits, not %ld\n",MIN_KEY_LENGTH,newkey);
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (!genctx)
|
||||||
|
{
|
||||||
|
genctx = set_keygen_ctx(bio_err, NULL, &pkey_type, &newkey,
|
||||||
|
&keyalgstr, gen_eng);
|
||||||
|
if (!genctx)
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (pkeyopts)
|
||||||
|
{
|
||||||
|
char *genopt;
|
||||||
|
for (i = 0; i < sk_OPENSSL_STRING_num(pkeyopts); i++)
|
||||||
|
{
|
||||||
|
genopt = sk_OPENSSL_STRING_value(pkeyopts, i);
|
||||||
|
if (pkey_ctrl_string(genctx, genopt) <= 0)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"parameter error \"%s\"\n",
|
||||||
|
genopt);
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
BIO_printf(bio_err,"Generating a %ld bit %s private key\n",
|
BIO_printf(bio_err,"Generating a %ld bit %s private key\n",
|
||||||
newkey,(pkey_type == TYPE_RSA)?"RSA":
|
newkey, keyalgstr);
|
||||||
(pkey_type == TYPE_DSA)?"DSA":"EC");
|
|
||||||
|
|
||||||
if ((pkey=EVP_PKEY_new()) == NULL) goto end;
|
EVP_PKEY_CTX_set_cb(genctx, genpkey_cb);
|
||||||
|
EVP_PKEY_CTX_set_app_data(genctx, bio_err);
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_RSA
|
if (EVP_PKEY_keygen(genctx, &pkey) <= 0)
|
||||||
BN_GENCB_set(&cb, req_cb, bio_err);
|
|
||||||
if (pkey_type == TYPE_RSA)
|
|
||||||
{
|
{
|
||||||
RSA *rsa = RSA_new();
|
BIO_puts(bio_err, "Error Generating Key\n");
|
||||||
BIGNUM *bn = BN_new();
|
|
||||||
if(!bn || !rsa || !BN_set_word(bn, 0x10001) ||
|
|
||||||
!RSA_generate_key_ex(rsa, newkey, bn, &cb) ||
|
|
||||||
!EVP_PKEY_assign_RSA(pkey, rsa))
|
|
||||||
{
|
|
||||||
if(bn) BN_free(bn);
|
|
||||||
if(rsa) RSA_free(rsa);
|
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
BN_free(bn);
|
|
||||||
}
|
EVP_PKEY_CTX_free(genctx);
|
||||||
else
|
genctx = NULL;
|
||||||
#endif
|
|
||||||
#ifndef OPENSSL_NO_DSA
|
|
||||||
if (pkey_type == TYPE_DSA)
|
|
||||||
{
|
|
||||||
if (!DSA_generate_key(dsa_params)) goto end;
|
|
||||||
if (!EVP_PKEY_assign_DSA(pkey,dsa_params)) goto end;
|
|
||||||
dsa_params=NULL;
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
#ifndef OPENSSL_NO_ECDSA
|
|
||||||
if (pkey_type == TYPE_EC)
|
|
||||||
{
|
|
||||||
if (!EC_KEY_generate_key(ec_params)) goto end;
|
|
||||||
if (!EVP_PKEY_assign_EC_KEY(pkey, ec_params))
|
|
||||||
goto end;
|
|
||||||
ec_params = NULL;
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
|
|
||||||
app_RAND_write_file(randfile, bio_err);
|
app_RAND_write_file(randfile, bio_err);
|
||||||
|
|
||||||
if (pkey == NULL) goto end;
|
|
||||||
|
|
||||||
if (keyout == NULL)
|
if (keyout == NULL)
|
||||||
{
|
{
|
||||||
keyout=NCONF_get_string(req_conf,SECTION,KEYFILE);
|
keyout=NCONF_get_string(req_conf,SECTION,KEYFILE);
|
||||||
@@ -895,14 +804,7 @@ loop:
|
|||||||
BIO_printf(bio_err,"you need to specify a private key\n");
|
BIO_printf(bio_err,"you need to specify a private key\n");
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
#ifndef OPENSSL_NO_DSA
|
|
||||||
if (pkey->type == EVP_PKEY_DSA)
|
|
||||||
digest=EVP_dss1();
|
|
||||||
#endif
|
|
||||||
#ifndef OPENSSL_NO_ECDSA
|
|
||||||
if (pkey->type == EVP_PKEY_EC)
|
|
||||||
digest=EVP_ecdsa();
|
|
||||||
#endif
|
|
||||||
if (req == NULL)
|
if (req == NULL)
|
||||||
{
|
{
|
||||||
req=X509_REQ_new();
|
req=X509_REQ_new();
|
||||||
@@ -945,7 +847,7 @@ loop:
|
|||||||
|
|
||||||
if (!X509_set_issuer_name(x509ss, X509_REQ_get_subject_name(req))) goto end;
|
if (!X509_set_issuer_name(x509ss, X509_REQ_get_subject_name(req))) goto end;
|
||||||
if (!X509_gmtime_adj(X509_get_notBefore(x509ss),0)) goto end;
|
if (!X509_gmtime_adj(X509_get_notBefore(x509ss),0)) goto end;
|
||||||
if (!X509_gmtime_adj(X509_get_notAfter(x509ss), (long)60*60*24*days)) goto end;
|
if (!X509_time_adj_ex(X509_get_notAfter(x509ss), days, 0, NULL)) goto end;
|
||||||
if (!X509_set_subject_name(x509ss, X509_REQ_get_subject_name(req))) goto end;
|
if (!X509_set_subject_name(x509ss, X509_REQ_get_subject_name(req))) goto end;
|
||||||
tmppkey = X509_REQ_get_pubkey(req);
|
tmppkey = X509_REQ_get_pubkey(req);
|
||||||
if (!tmppkey || !X509_set_pubkey(x509ss,tmppkey)) goto end;
|
if (!tmppkey || !X509_set_pubkey(x509ss,tmppkey)) goto end;
|
||||||
@@ -966,9 +868,13 @@ loop:
|
|||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (!(i=X509_sign(x509ss,pkey,digest)))
|
i=do_X509_sign(bio_err, x509ss, pkey, digest, sigopts);
|
||||||
|
if (!i)
|
||||||
|
{
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
X509V3_CTX ext_ctx;
|
X509V3_CTX ext_ctx;
|
||||||
@@ -987,10 +893,14 @@ loop:
|
|||||||
req_exts);
|
req_exts);
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
if (!(i=X509_REQ_sign(req,pkey,digest)))
|
i=do_X509_REQ_sign(bio_err, req, pkey, digest, sigopts);
|
||||||
|
if (!i)
|
||||||
|
{
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
|
||||||
if (subj && x509)
|
if (subj && x509)
|
||||||
{
|
{
|
||||||
@@ -1125,7 +1035,7 @@ loop:
|
|||||||
}
|
}
|
||||||
fprintf(stdout,"Modulus=");
|
fprintf(stdout,"Modulus=");
|
||||||
#ifndef OPENSSL_NO_RSA
|
#ifndef OPENSSL_NO_RSA
|
||||||
if (tpubkey->type == EVP_PKEY_RSA)
|
if (EVP_PKEY_base_id(tpubkey) == EVP_PKEY_RSA)
|
||||||
BN_print(out,tpubkey->pkey.rsa->n);
|
BN_print(out,tpubkey->pkey.rsa->n);
|
||||||
else
|
else
|
||||||
#endif
|
#endif
|
||||||
@@ -1181,18 +1091,24 @@ end:
|
|||||||
BIO_free(in);
|
BIO_free(in);
|
||||||
BIO_free_all(out);
|
BIO_free_all(out);
|
||||||
EVP_PKEY_free(pkey);
|
EVP_PKEY_free(pkey);
|
||||||
|
if (genctx)
|
||||||
|
EVP_PKEY_CTX_free(genctx);
|
||||||
|
if (pkeyopts)
|
||||||
|
sk_OPENSSL_STRING_free(pkeyopts);
|
||||||
|
if (sigopts)
|
||||||
|
sk_OPENSSL_STRING_free(sigopts);
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
if (gen_eng)
|
||||||
|
ENGINE_free(gen_eng);
|
||||||
|
#endif
|
||||||
|
if (keyalgstr)
|
||||||
|
OPENSSL_free(keyalgstr);
|
||||||
X509_REQ_free(req);
|
X509_REQ_free(req);
|
||||||
X509_free(x509ss);
|
X509_free(x509ss);
|
||||||
ASN1_INTEGER_free(serial);
|
ASN1_INTEGER_free(serial);
|
||||||
if(passargin && passin) OPENSSL_free(passin);
|
if(passargin && passin) OPENSSL_free(passin);
|
||||||
if(passargout && passout) OPENSSL_free(passout);
|
if(passargout && passout) OPENSSL_free(passout);
|
||||||
OBJ_cleanup();
|
OBJ_cleanup();
|
||||||
#ifndef OPENSSL_NO_DSA
|
|
||||||
if (dsa_params != NULL) DSA_free(dsa_params);
|
|
||||||
#endif
|
|
||||||
#ifndef OPENSSL_NO_ECDSA
|
|
||||||
if (ec_params != NULL) EC_KEY_free(ec_params);
|
|
||||||
#endif
|
|
||||||
apps_shutdown();
|
apps_shutdown();
|
||||||
OPENSSL_EXIT(ex);
|
OPENSSL_EXIT(ex);
|
||||||
}
|
}
|
||||||
@@ -1433,11 +1349,17 @@ start2: for (;;)
|
|||||||
|
|
||||||
BIO_snprintf(buf,sizeof buf,"%s_min",type);
|
BIO_snprintf(buf,sizeof buf,"%s_min",type);
|
||||||
if (!NCONF_get_number(req_conf,attr_sect,buf, &n_min))
|
if (!NCONF_get_number(req_conf,attr_sect,buf, &n_min))
|
||||||
|
{
|
||||||
|
ERR_clear_error();
|
||||||
n_min = -1;
|
n_min = -1;
|
||||||
|
}
|
||||||
|
|
||||||
BIO_snprintf(buf,sizeof buf,"%s_max",type);
|
BIO_snprintf(buf,sizeof buf,"%s_max",type);
|
||||||
if (!NCONF_get_number(req_conf,attr_sect,buf, &n_max))
|
if (!NCONF_get_number(req_conf,attr_sect,buf, &n_max))
|
||||||
|
{
|
||||||
|
ERR_clear_error();
|
||||||
n_max = -1;
|
n_max = -1;
|
||||||
|
}
|
||||||
|
|
||||||
if (!add_attribute_object(req,
|
if (!add_attribute_object(req,
|
||||||
v->value,def,value,nid,n_min,n_max, chtype))
|
v->value,def,value,nid,n_min,n_max, chtype))
|
||||||
@@ -1538,7 +1460,8 @@ start:
|
|||||||
buf[0]='\0';
|
buf[0]='\0';
|
||||||
if (!batch)
|
if (!batch)
|
||||||
{
|
{
|
||||||
fgets(buf,sizeof buf,stdin);
|
if (!fgets(buf,sizeof buf,stdin))
|
||||||
|
return 0;
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
@@ -1596,7 +1519,8 @@ start:
|
|||||||
buf[0]='\0';
|
buf[0]='\0';
|
||||||
if (!batch)
|
if (!batch)
|
||||||
{
|
{
|
||||||
fgets(buf,sizeof buf,stdin);
|
if (!fgets(buf,sizeof buf,stdin))
|
||||||
|
return 0;
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
@@ -1639,24 +1563,6 @@ err:
|
|||||||
return(0);
|
return(0);
|
||||||
}
|
}
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_RSA
|
|
||||||
static int MS_CALLBACK req_cb(int p, int n, BN_GENCB *cb)
|
|
||||||
{
|
|
||||||
char c='*';
|
|
||||||
|
|
||||||
if (p == 0) c='.';
|
|
||||||
if (p == 1) c='+';
|
|
||||||
if (p == 2) c='*';
|
|
||||||
if (p == 3) c='\n';
|
|
||||||
BIO_write(cb->arg,&c,1);
|
|
||||||
(void)BIO_flush(cb->arg);
|
|
||||||
#ifdef LINT
|
|
||||||
p=n;
|
|
||||||
#endif
|
|
||||||
return 1;
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
|
|
||||||
static int req_check_len(int len, int n_min, int n_max)
|
static int req_check_len(int len, int n_min, int n_max)
|
||||||
{
|
{
|
||||||
if ((n_min > 0) && (len < n_min))
|
if ((n_min > 0) && (len < n_min))
|
||||||
@@ -1683,3 +1589,248 @@ static int check_end(const char *str, const char *end)
|
|||||||
tmp = str + slen - elen;
|
tmp = str + slen - elen;
|
||||||
return strcmp(tmp, end);
|
return strcmp(tmp, end);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static EVP_PKEY_CTX *set_keygen_ctx(BIO *err, const char *gstr, int *pkey_type,
|
||||||
|
long *pkeylen, char **palgnam,
|
||||||
|
ENGINE *keygen_engine)
|
||||||
|
{
|
||||||
|
EVP_PKEY_CTX *gctx = NULL;
|
||||||
|
EVP_PKEY *param = NULL;
|
||||||
|
long keylen = -1;
|
||||||
|
BIO *pbio = NULL;
|
||||||
|
const char *paramfile = NULL;
|
||||||
|
|
||||||
|
if (gstr == NULL)
|
||||||
|
{
|
||||||
|
*pkey_type = EVP_PKEY_RSA;
|
||||||
|
keylen = *pkeylen;
|
||||||
|
}
|
||||||
|
else if (gstr[0] >= '0' && gstr[0] <= '9')
|
||||||
|
{
|
||||||
|
*pkey_type = EVP_PKEY_RSA;
|
||||||
|
keylen = atol(gstr);
|
||||||
|
*pkeylen = keylen;
|
||||||
|
}
|
||||||
|
else if (!strncmp(gstr, "param:", 6))
|
||||||
|
paramfile = gstr + 6;
|
||||||
|
else
|
||||||
|
{
|
||||||
|
const char *p = strchr(gstr, ':');
|
||||||
|
int len;
|
||||||
|
ENGINE *tmpeng;
|
||||||
|
const EVP_PKEY_ASN1_METHOD *ameth;
|
||||||
|
|
||||||
|
if (p)
|
||||||
|
len = p - gstr;
|
||||||
|
else
|
||||||
|
len = strlen(gstr);
|
||||||
|
/* The lookup of a the string will cover all engines so
|
||||||
|
* keep a note of the implementation.
|
||||||
|
*/
|
||||||
|
|
||||||
|
ameth = EVP_PKEY_asn1_find_str(&tmpeng, gstr, len);
|
||||||
|
|
||||||
|
if (!ameth)
|
||||||
|
{
|
||||||
|
BIO_printf(err, "Unknown algorithm %.*s\n", len, gstr);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
EVP_PKEY_asn1_get0_info(NULL, pkey_type, NULL, NULL, NULL,
|
||||||
|
ameth);
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
if (tmpeng)
|
||||||
|
ENGINE_finish(tmpeng);
|
||||||
|
#endif
|
||||||
|
if (*pkey_type == EVP_PKEY_RSA)
|
||||||
|
{
|
||||||
|
if (p)
|
||||||
|
{
|
||||||
|
keylen = atol(p + 1);
|
||||||
|
*pkeylen = keylen;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
else if (p)
|
||||||
|
paramfile = p + 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (paramfile)
|
||||||
|
{
|
||||||
|
pbio = BIO_new_file(paramfile, "r");
|
||||||
|
if (!pbio)
|
||||||
|
{
|
||||||
|
BIO_printf(err, "Can't open parameter file %s\n",
|
||||||
|
paramfile);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
param = PEM_read_bio_Parameters(pbio, NULL);
|
||||||
|
|
||||||
|
if (!param)
|
||||||
|
{
|
||||||
|
X509 *x;
|
||||||
|
(void)BIO_reset(pbio);
|
||||||
|
x = PEM_read_bio_X509(pbio, NULL, NULL, NULL);
|
||||||
|
if (x)
|
||||||
|
{
|
||||||
|
param = X509_get_pubkey(x);
|
||||||
|
X509_free(x);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
BIO_free(pbio);
|
||||||
|
|
||||||
|
if (!param)
|
||||||
|
{
|
||||||
|
BIO_printf(err, "Error reading parameter file %s\n",
|
||||||
|
paramfile);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
if (*pkey_type == -1)
|
||||||
|
*pkey_type = EVP_PKEY_id(param);
|
||||||
|
else if (*pkey_type != EVP_PKEY_base_id(param))
|
||||||
|
{
|
||||||
|
BIO_printf(err, "Key Type does not match parameters\n");
|
||||||
|
EVP_PKEY_free(param);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (palgnam)
|
||||||
|
{
|
||||||
|
const EVP_PKEY_ASN1_METHOD *ameth;
|
||||||
|
ENGINE *tmpeng;
|
||||||
|
const char *anam;
|
||||||
|
ameth = EVP_PKEY_asn1_find(&tmpeng, *pkey_type);
|
||||||
|
if (!ameth)
|
||||||
|
{
|
||||||
|
BIO_puts(err, "Internal error: can't find key algorithm\n");
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
EVP_PKEY_asn1_get0_info(NULL, NULL, NULL, NULL, &anam, ameth);
|
||||||
|
*palgnam = BUF_strdup(anam);
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
if (tmpeng)
|
||||||
|
ENGINE_finish(tmpeng);
|
||||||
|
#endif
|
||||||
|
}
|
||||||
|
|
||||||
|
if (param)
|
||||||
|
{
|
||||||
|
gctx = EVP_PKEY_CTX_new(param, keygen_engine);
|
||||||
|
*pkeylen = EVP_PKEY_bits(param);
|
||||||
|
EVP_PKEY_free(param);
|
||||||
|
}
|
||||||
|
else
|
||||||
|
gctx = EVP_PKEY_CTX_new_id(*pkey_type, keygen_engine);
|
||||||
|
|
||||||
|
if (!gctx)
|
||||||
|
{
|
||||||
|
BIO_puts(err, "Error allocating keygen context\n");
|
||||||
|
ERR_print_errors(err);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (EVP_PKEY_keygen_init(gctx) <= 0)
|
||||||
|
{
|
||||||
|
BIO_puts(err, "Error initializing keygen context\n");
|
||||||
|
ERR_print_errors(err);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
#ifndef OPENSSL_NO_RSA
|
||||||
|
if ((*pkey_type == EVP_PKEY_RSA) && (keylen != -1))
|
||||||
|
{
|
||||||
|
if (EVP_PKEY_CTX_set_rsa_keygen_bits(gctx, keylen) <= 0)
|
||||||
|
{
|
||||||
|
BIO_puts(err, "Error setting RSA keysize\n");
|
||||||
|
ERR_print_errors(err);
|
||||||
|
EVP_PKEY_CTX_free(gctx);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
|
return gctx;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int genpkey_cb(EVP_PKEY_CTX *ctx)
|
||||||
|
{
|
||||||
|
char c='*';
|
||||||
|
BIO *b = EVP_PKEY_CTX_get_app_data(ctx);
|
||||||
|
int p;
|
||||||
|
p = EVP_PKEY_CTX_get_keygen_info(ctx, 0);
|
||||||
|
if (p == 0) c='.';
|
||||||
|
if (p == 1) c='+';
|
||||||
|
if (p == 2) c='*';
|
||||||
|
if (p == 3) c='\n';
|
||||||
|
BIO_write(b,&c,1);
|
||||||
|
(void)BIO_flush(b);
|
||||||
|
#ifdef LINT
|
||||||
|
p=n;
|
||||||
|
#endif
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int do_sign_init(BIO *err, EVP_MD_CTX *ctx, EVP_PKEY *pkey,
|
||||||
|
const EVP_MD *md, STACK_OF(OPENSSL_STRING) *sigopts)
|
||||||
|
{
|
||||||
|
EVP_PKEY_CTX *pkctx = NULL;
|
||||||
|
int i;
|
||||||
|
EVP_MD_CTX_init(ctx);
|
||||||
|
if (!EVP_DigestSignInit(ctx, &pkctx, md, NULL, pkey))
|
||||||
|
return 0;
|
||||||
|
for (i = 0; i < sk_OPENSSL_STRING_num(sigopts); i++)
|
||||||
|
{
|
||||||
|
char *sigopt = sk_OPENSSL_STRING_value(sigopts, i);
|
||||||
|
if (pkey_ctrl_string(pkctx, sigopt) <= 0)
|
||||||
|
{
|
||||||
|
BIO_printf(err, "parameter error \"%s\"\n", sigopt);
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
int do_X509_sign(BIO *err, X509 *x, EVP_PKEY *pkey, const EVP_MD *md,
|
||||||
|
STACK_OF(OPENSSL_STRING) *sigopts)
|
||||||
|
{
|
||||||
|
int rv;
|
||||||
|
EVP_MD_CTX mctx;
|
||||||
|
EVP_MD_CTX_init(&mctx);
|
||||||
|
rv = do_sign_init(err, &mctx, pkey, md, sigopts);
|
||||||
|
if (rv > 0)
|
||||||
|
rv = X509_sign_ctx(x, &mctx);
|
||||||
|
EVP_MD_CTX_cleanup(&mctx);
|
||||||
|
return rv > 0 ? 1 : 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
int do_X509_REQ_sign(BIO *err, X509_REQ *x, EVP_PKEY *pkey, const EVP_MD *md,
|
||||||
|
STACK_OF(OPENSSL_STRING) *sigopts)
|
||||||
|
{
|
||||||
|
int rv;
|
||||||
|
EVP_MD_CTX mctx;
|
||||||
|
EVP_MD_CTX_init(&mctx);
|
||||||
|
rv = do_sign_init(err, &mctx, pkey, md, sigopts);
|
||||||
|
if (rv > 0)
|
||||||
|
rv = X509_REQ_sign_ctx(x, &mctx);
|
||||||
|
EVP_MD_CTX_cleanup(&mctx);
|
||||||
|
return rv > 0 ? 1 : 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
int do_X509_CRL_sign(BIO *err, X509_CRL *x, EVP_PKEY *pkey, const EVP_MD *md,
|
||||||
|
STACK_OF(OPENSSL_STRING) *sigopts)
|
||||||
|
{
|
||||||
|
int rv;
|
||||||
|
EVP_MD_CTX mctx;
|
||||||
|
EVP_MD_CTX_init(&mctx);
|
||||||
|
rv = do_sign_init(err, &mctx, pkey, md, sigopts);
|
||||||
|
if (rv > 0)
|
||||||
|
rv = X509_CRL_sign_ctx(x, &mctx);
|
||||||
|
EVP_MD_CTX_cleanup(&mctx);
|
||||||
|
return rv > 0 ? 1 : 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|||||||
61
apps/rsa.c
61
apps/rsa.c
@@ -115,6 +115,8 @@ int MAIN(int argc, char **argv)
|
|||||||
#endif
|
#endif
|
||||||
int modulus=0;
|
int modulus=0;
|
||||||
|
|
||||||
|
int pvk_encr = 2;
|
||||||
|
|
||||||
apps_startup();
|
apps_startup();
|
||||||
|
|
||||||
if (bio_err == NULL)
|
if (bio_err == NULL)
|
||||||
@@ -177,6 +179,16 @@ int MAIN(int argc, char **argv)
|
|||||||
pubin=1;
|
pubin=1;
|
||||||
else if (strcmp(*argv,"-pubout") == 0)
|
else if (strcmp(*argv,"-pubout") == 0)
|
||||||
pubout=1;
|
pubout=1;
|
||||||
|
else if (strcmp(*argv,"-RSAPublicKey_in") == 0)
|
||||||
|
pubin = 2;
|
||||||
|
else if (strcmp(*argv,"-RSAPublicKey_out") == 0)
|
||||||
|
pubout = 2;
|
||||||
|
else if (strcmp(*argv,"-pvk-strong") == 0)
|
||||||
|
pvk_encr=2;
|
||||||
|
else if (strcmp(*argv,"-pvk-weak") == 0)
|
||||||
|
pvk_encr=1;
|
||||||
|
else if (strcmp(*argv,"-pvk-none") == 0)
|
||||||
|
pvk_encr=0;
|
||||||
else if (strcmp(*argv,"-noout") == 0)
|
else if (strcmp(*argv,"-noout") == 0)
|
||||||
noout=1;
|
noout=1;
|
||||||
else if (strcmp(*argv,"-text") == 0)
|
else if (strcmp(*argv,"-text") == 0)
|
||||||
@@ -257,10 +269,23 @@ bad:
|
|||||||
EVP_PKEY *pkey;
|
EVP_PKEY *pkey;
|
||||||
|
|
||||||
if (pubin)
|
if (pubin)
|
||||||
pkey = load_pubkey(bio_err, infile,
|
{
|
||||||
(informat == FORMAT_NETSCAPE && sgckey ?
|
int tmpformat=-1;
|
||||||
FORMAT_IISSGC : informat), 1,
|
if (pubin == 2)
|
||||||
|
{
|
||||||
|
if (informat == FORMAT_PEM)
|
||||||
|
tmpformat = FORMAT_PEMRSA;
|
||||||
|
else if (informat == FORMAT_ASN1)
|
||||||
|
tmpformat = FORMAT_ASN1RSA;
|
||||||
|
}
|
||||||
|
else if (informat == FORMAT_NETSCAPE && sgckey)
|
||||||
|
tmpformat = FORMAT_IISSGC;
|
||||||
|
else
|
||||||
|
tmpformat = informat;
|
||||||
|
|
||||||
|
pkey = load_pubkey(bio_err, infile, tmpformat, 1,
|
||||||
passin, e, "Public Key");
|
passin, e, "Public Key");
|
||||||
|
}
|
||||||
else
|
else
|
||||||
pkey = load_key(bio_err, infile,
|
pkey = load_key(bio_err, infile,
|
||||||
(informat == FORMAT_NETSCAPE && sgckey ?
|
(informat == FORMAT_NETSCAPE && sgckey ?
|
||||||
@@ -268,7 +293,7 @@ bad:
|
|||||||
passin, e, "Private Key");
|
passin, e, "Private Key");
|
||||||
|
|
||||||
if (pkey != NULL)
|
if (pkey != NULL)
|
||||||
rsa = pkey == NULL ? NULL : EVP_PKEY_get1_RSA(pkey);
|
rsa = EVP_PKEY_get1_RSA(pkey);
|
||||||
EVP_PKEY_free(pkey);
|
EVP_PKEY_free(pkey);
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -346,7 +371,13 @@ bad:
|
|||||||
}
|
}
|
||||||
BIO_printf(bio_err,"writing RSA key\n");
|
BIO_printf(bio_err,"writing RSA key\n");
|
||||||
if (outformat == FORMAT_ASN1) {
|
if (outformat == FORMAT_ASN1) {
|
||||||
if(pubout || pubin) i=i2d_RSA_PUBKEY_bio(out,rsa);
|
if(pubout || pubin)
|
||||||
|
{
|
||||||
|
if (pubout == 2)
|
||||||
|
i=i2d_RSAPublicKey_bio(out,rsa);
|
||||||
|
else
|
||||||
|
i=i2d_RSA_PUBKEY_bio(out,rsa);
|
||||||
|
}
|
||||||
else i=i2d_RSAPrivateKey_bio(out,rsa);
|
else i=i2d_RSAPrivateKey_bio(out,rsa);
|
||||||
}
|
}
|
||||||
#ifndef OPENSSL_NO_RC4
|
#ifndef OPENSSL_NO_RC4
|
||||||
@@ -370,14 +401,32 @@ bad:
|
|||||||
#endif
|
#endif
|
||||||
else if (outformat == FORMAT_PEM) {
|
else if (outformat == FORMAT_PEM) {
|
||||||
if(pubout || pubin)
|
if(pubout || pubin)
|
||||||
|
{
|
||||||
|
if (pubout == 2)
|
||||||
|
i=PEM_write_bio_RSAPublicKey(out,rsa);
|
||||||
|
else
|
||||||
i=PEM_write_bio_RSA_PUBKEY(out,rsa);
|
i=PEM_write_bio_RSA_PUBKEY(out,rsa);
|
||||||
|
}
|
||||||
else i=PEM_write_bio_RSAPrivateKey(out,rsa,
|
else i=PEM_write_bio_RSAPrivateKey(out,rsa,
|
||||||
enc,NULL,0,NULL,passout);
|
enc,NULL,0,NULL,passout);
|
||||||
|
#if !defined(OPENSSL_NO_DSA) && !defined(OPENSSL_NO_RC4)
|
||||||
|
} else if (outformat == FORMAT_MSBLOB || outformat == FORMAT_PVK) {
|
||||||
|
EVP_PKEY *pk;
|
||||||
|
pk = EVP_PKEY_new();
|
||||||
|
EVP_PKEY_set1_RSA(pk, rsa);
|
||||||
|
if (outformat == FORMAT_PVK)
|
||||||
|
i = i2b_PVK_bio(out, pk, pvk_encr, 0, passout);
|
||||||
|
else if (pubin || pubout)
|
||||||
|
i = i2b_PublicKey_bio(out, pk);
|
||||||
|
else
|
||||||
|
i = i2b_PrivateKey_bio(out, pk);
|
||||||
|
EVP_PKEY_free(pk);
|
||||||
|
#endif
|
||||||
} else {
|
} else {
|
||||||
BIO_printf(bio_err,"bad output format specified for outfile\n");
|
BIO_printf(bio_err,"bad output format specified for outfile\n");
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
if (!i)
|
if (i <= 0)
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,"unable to write key\n");
|
BIO_printf(bio_err,"unable to write key\n");
|
||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
/* rsautl.c */
|
/* rsautl.c */
|
||||||
/* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
|
/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
|
||||||
* project 2000.
|
* project 2000.
|
||||||
*/
|
*/
|
||||||
/* ====================================================================
|
/* ====================================================================
|
||||||
@@ -342,4 +342,10 @@ static void usage()
|
|||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#else /* !OPENSSL_NO_RSA */
|
||||||
|
|
||||||
|
# if PEDANTIC
|
||||||
|
static void *dummy=&dummy;
|
||||||
|
# endif
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
@@ -117,7 +117,7 @@
|
|||||||
#include <conio.h>
|
#include <conio.h>
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#ifdef OPENSSL_SYS_MSDOS
|
#if defined(OPENSSL_SYS_MSDOS) && !defined(_WIN32)
|
||||||
#define _kbhit kbhit
|
#define _kbhit kbhit
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
@@ -171,3 +171,6 @@ void MS_CALLBACK tlsext_cb(SSL *s, int client_server, int type,
|
|||||||
unsigned char *data, int len,
|
unsigned char *data, int len,
|
||||||
void *arg);
|
void *arg);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
int MS_CALLBACK generate_cookie_callback(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len);
|
||||||
|
int MS_CALLBACK verify_cookie_callback(SSL *ssl, unsigned char *cookie, unsigned int cookie_len);
|
||||||
|
|||||||
261
apps/s_cb.c
261
apps/s_cb.c
@@ -56,7 +56,7 @@
|
|||||||
* [including the GNU Public Licence.]
|
* [including the GNU Public Licence.]
|
||||||
*/
|
*/
|
||||||
/* ====================================================================
|
/* ====================================================================
|
||||||
* Copyright (c) 1998-2001 The OpenSSL Project. All rights reserved.
|
* Copyright (c) 1998-2006 The OpenSSL Project. All rights reserved.
|
||||||
*
|
*
|
||||||
* Redistribution and use in source and binary forms, with or without
|
* Redistribution and use in source and binary forms, with or without
|
||||||
* modification, are permitted provided that the following conditions
|
* modification, are permitted provided that the following conditions
|
||||||
@@ -117,16 +117,21 @@
|
|||||||
#undef NON_MAIN
|
#undef NON_MAIN
|
||||||
#undef USE_SOCKETS
|
#undef USE_SOCKETS
|
||||||
#include <openssl/err.h>
|
#include <openssl/err.h>
|
||||||
|
#include <openssl/rand.h>
|
||||||
#include <openssl/x509.h>
|
#include <openssl/x509.h>
|
||||||
#include <openssl/ssl.h>
|
#include <openssl/ssl.h>
|
||||||
#include "s_apps.h"
|
#include "s_apps.h"
|
||||||
|
|
||||||
|
#define COOKIE_SECRET_LENGTH 16
|
||||||
|
|
||||||
int verify_depth=0;
|
int verify_depth=0;
|
||||||
int verify_error=X509_V_OK;
|
int verify_error=X509_V_OK;
|
||||||
|
int verify_return_error=0;
|
||||||
|
unsigned char cookie_secret[COOKIE_SECRET_LENGTH];
|
||||||
|
int cookie_initialized=0;
|
||||||
|
|
||||||
int MS_CALLBACK verify_callback(int ok, X509_STORE_CTX *ctx)
|
int MS_CALLBACK verify_callback(int ok, X509_STORE_CTX *ctx)
|
||||||
{
|
{
|
||||||
char buf[256];
|
|
||||||
X509 *err_cert;
|
X509 *err_cert;
|
||||||
int err,depth;
|
int err,depth;
|
||||||
|
|
||||||
@@ -134,14 +139,22 @@ int MS_CALLBACK verify_callback(int ok, X509_STORE_CTX *ctx)
|
|||||||
err= X509_STORE_CTX_get_error(ctx);
|
err= X509_STORE_CTX_get_error(ctx);
|
||||||
depth= X509_STORE_CTX_get_error_depth(ctx);
|
depth= X509_STORE_CTX_get_error_depth(ctx);
|
||||||
|
|
||||||
X509_NAME_oneline(X509_get_subject_name(err_cert),buf,sizeof buf);
|
BIO_printf(bio_err,"depth=%d ",depth);
|
||||||
BIO_printf(bio_err,"depth=%d %s\n",depth,buf);
|
if (err_cert)
|
||||||
|
{
|
||||||
|
X509_NAME_print_ex(bio_err, X509_get_subject_name(err_cert),
|
||||||
|
0, XN_FLAG_ONELINE);
|
||||||
|
BIO_puts(bio_err, "\n");
|
||||||
|
}
|
||||||
|
else
|
||||||
|
BIO_puts(bio_err, "<no cert>\n");
|
||||||
if (!ok)
|
if (!ok)
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,"verify error:num=%d:%s\n",err,
|
BIO_printf(bio_err,"verify error:num=%d:%s\n",err,
|
||||||
X509_verify_cert_error_string(err));
|
X509_verify_cert_error_string(err));
|
||||||
if (verify_depth >= depth)
|
if (verify_depth >= depth)
|
||||||
{
|
{
|
||||||
|
if (!verify_return_error)
|
||||||
ok=1;
|
ok=1;
|
||||||
verify_error=X509_V_OK;
|
verify_error=X509_V_OK;
|
||||||
}
|
}
|
||||||
@@ -151,25 +164,33 @@ int MS_CALLBACK verify_callback(int ok, X509_STORE_CTX *ctx)
|
|||||||
verify_error=X509_V_ERR_CERT_CHAIN_TOO_LONG;
|
verify_error=X509_V_ERR_CERT_CHAIN_TOO_LONG;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
switch (ctx->error)
|
switch (err)
|
||||||
{
|
{
|
||||||
case X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT:
|
case X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT:
|
||||||
X509_NAME_oneline(X509_get_issuer_name(ctx->current_cert),buf,sizeof buf);
|
BIO_puts(bio_err,"issuer= ");
|
||||||
BIO_printf(bio_err,"issuer= %s\n",buf);
|
X509_NAME_print_ex(bio_err, X509_get_issuer_name(err_cert),
|
||||||
|
0, XN_FLAG_ONELINE);
|
||||||
|
BIO_puts(bio_err, "\n");
|
||||||
break;
|
break;
|
||||||
case X509_V_ERR_CERT_NOT_YET_VALID:
|
case X509_V_ERR_CERT_NOT_YET_VALID:
|
||||||
case X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD:
|
case X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD:
|
||||||
BIO_printf(bio_err,"notBefore=");
|
BIO_printf(bio_err,"notBefore=");
|
||||||
ASN1_TIME_print(bio_err,X509_get_notBefore(ctx->current_cert));
|
ASN1_TIME_print(bio_err,X509_get_notBefore(err_cert));
|
||||||
BIO_printf(bio_err,"\n");
|
BIO_printf(bio_err,"\n");
|
||||||
break;
|
break;
|
||||||
case X509_V_ERR_CERT_HAS_EXPIRED:
|
case X509_V_ERR_CERT_HAS_EXPIRED:
|
||||||
case X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD:
|
case X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD:
|
||||||
BIO_printf(bio_err,"notAfter=");
|
BIO_printf(bio_err,"notAfter=");
|
||||||
ASN1_TIME_print(bio_err,X509_get_notAfter(ctx->current_cert));
|
ASN1_TIME_print(bio_err,X509_get_notAfter(err_cert));
|
||||||
BIO_printf(bio_err,"\n");
|
BIO_printf(bio_err,"\n");
|
||||||
break;
|
break;
|
||||||
|
case X509_V_ERR_NO_EXPLICIT_POLICY:
|
||||||
|
policies_print(bio_err, ctx);
|
||||||
|
break;
|
||||||
}
|
}
|
||||||
|
if (err == X509_V_OK && ok == 2)
|
||||||
|
policies_print(bio_err, ctx);
|
||||||
|
|
||||||
BIO_printf(bio_err,"verify return:%d\n",ok);
|
BIO_printf(bio_err,"verify return:%d\n",ok);
|
||||||
return(ok);
|
return(ok);
|
||||||
}
|
}
|
||||||
@@ -267,15 +288,15 @@ long MS_CALLBACK bio_dump_callback(BIO *bio, int cmd, const char *argp,
|
|||||||
|
|
||||||
if (cmd == (BIO_CB_READ|BIO_CB_RETURN))
|
if (cmd == (BIO_CB_READ|BIO_CB_RETURN))
|
||||||
{
|
{
|
||||||
BIO_printf(out,"read from %p [%p] (%d bytes => %ld (0x%lX))\n",
|
BIO_printf(out,"read from %p [%p] (%lu bytes => %ld (0x%lX))\n",
|
||||||
(void *)bio,argp,argi,ret,ret);
|
(void *)bio,argp,(unsigned long)argi,ret,ret);
|
||||||
BIO_dump(out,argp,(int)ret);
|
BIO_dump(out,argp,(int)ret);
|
||||||
return(ret);
|
return(ret);
|
||||||
}
|
}
|
||||||
else if (cmd == (BIO_CB_WRITE|BIO_CB_RETURN))
|
else if (cmd == (BIO_CB_WRITE|BIO_CB_RETURN))
|
||||||
{
|
{
|
||||||
BIO_printf(out,"write to %p [%p] (%d bytes => %ld (0x%lX))\n",
|
BIO_printf(out,"write to %p [%p] (%lu bytes => %ld (0x%lX))\n",
|
||||||
(void *)bio,argp,argi,ret,ret);
|
(void *)bio,argp,(unsigned long)argi,ret,ret);
|
||||||
BIO_dump(out,argp,(int)ret);
|
BIO_dump(out,argp,(int)ret);
|
||||||
}
|
}
|
||||||
return(ret);
|
return(ret);
|
||||||
@@ -336,6 +357,15 @@ void MS_CALLBACK msg_cb(int write_p, int version, int content_type, const void *
|
|||||||
case TLS1_VERSION:
|
case TLS1_VERSION:
|
||||||
str_version = "TLS 1.0 ";
|
str_version = "TLS 1.0 ";
|
||||||
break;
|
break;
|
||||||
|
case TLS1_1_VERSION:
|
||||||
|
str_version = "TLS 1.1 ";
|
||||||
|
break;
|
||||||
|
case DTLS1_VERSION:
|
||||||
|
str_version = "DTLS 1.0 ";
|
||||||
|
break;
|
||||||
|
case DTLS1_BAD_VER:
|
||||||
|
str_version = "DTLS 1.0 (bad) ";
|
||||||
|
break;
|
||||||
default:
|
default:
|
||||||
str_version = "???";
|
str_version = "???";
|
||||||
}
|
}
|
||||||
@@ -401,7 +431,10 @@ void MS_CALLBACK msg_cb(int write_p, int version, int content_type, const void *
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if (version == SSL3_VERSION || version == TLS1_VERSION)
|
if (version == SSL3_VERSION ||
|
||||||
|
version == TLS1_VERSION ||
|
||||||
|
version == DTLS1_VERSION ||
|
||||||
|
version == DTLS1_BAD_VER)
|
||||||
{
|
{
|
||||||
switch (content_type)
|
switch (content_type)
|
||||||
{
|
{
|
||||||
@@ -504,6 +537,21 @@ void MS_CALLBACK msg_cb(int write_p, int version, int content_type, const void *
|
|||||||
case 100:
|
case 100:
|
||||||
str_details2 = " no_renegotiation";
|
str_details2 = " no_renegotiation";
|
||||||
break;
|
break;
|
||||||
|
case 110:
|
||||||
|
str_details2 = " unsupported_extension";
|
||||||
|
break;
|
||||||
|
case 111:
|
||||||
|
str_details2 = " certificate_unobtainable";
|
||||||
|
break;
|
||||||
|
case 112:
|
||||||
|
str_details2 = " unrecognized_name";
|
||||||
|
break;
|
||||||
|
case 113:
|
||||||
|
str_details2 = " bad_certificate_status_response";
|
||||||
|
break;
|
||||||
|
case 114:
|
||||||
|
str_details2 = " bad_certificate_hash_value";
|
||||||
|
break;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -525,6 +573,9 @@ void MS_CALLBACK msg_cb(int write_p, int version, int content_type, const void *
|
|||||||
case 2:
|
case 2:
|
||||||
str_details1 = ", ServerHello";
|
str_details1 = ", ServerHello";
|
||||||
break;
|
break;
|
||||||
|
case 3:
|
||||||
|
str_details1 = ", HelloVerifyRequest";
|
||||||
|
break;
|
||||||
case 11:
|
case 11:
|
||||||
str_details1 = ", Certificate";
|
str_details1 = ", Certificate";
|
||||||
break;
|
break;
|
||||||
@@ -621,6 +672,19 @@ void MS_CALLBACK tlsext_cb(SSL *s, int client_server, int type,
|
|||||||
extname = "server ticket";
|
extname = "server ticket";
|
||||||
break;
|
break;
|
||||||
|
|
||||||
|
case TLSEXT_TYPE_renegotiate:
|
||||||
|
extname = "renegotiate";
|
||||||
|
break;
|
||||||
|
|
||||||
|
case TLSEXT_TYPE_signature_algorithms:
|
||||||
|
extname = "signature algorithms";
|
||||||
|
break;
|
||||||
|
|
||||||
|
#ifdef TLSEXT_TYPE_opaque_prf_input
|
||||||
|
case TLSEXT_TYPE_opaque_prf_input:
|
||||||
|
extname = "opaque PRF input";
|
||||||
|
break;
|
||||||
|
#endif
|
||||||
|
|
||||||
default:
|
default:
|
||||||
extname = "unknown";
|
extname = "unknown";
|
||||||
@@ -634,3 +698,172 @@ void MS_CALLBACK tlsext_cb(SSL *s, int client_server, int type,
|
|||||||
BIO_dump(bio, (char *)data, len);
|
BIO_dump(bio, (char *)data, len);
|
||||||
(void)BIO_flush(bio);
|
(void)BIO_flush(bio);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
int MS_CALLBACK generate_cookie_callback(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len)
|
||||||
|
{
|
||||||
|
unsigned char *buffer, result[EVP_MAX_MD_SIZE];
|
||||||
|
unsigned int length, resultlength;
|
||||||
|
union {
|
||||||
|
struct sockaddr sa;
|
||||||
|
struct sockaddr_in s4;
|
||||||
|
#if OPENSSL_USE_IPV6
|
||||||
|
struct sockaddr_in6 s6;
|
||||||
|
#endif
|
||||||
|
} peer;
|
||||||
|
|
||||||
|
/* Initialize a random secret */
|
||||||
|
if (!cookie_initialized)
|
||||||
|
{
|
||||||
|
if (!RAND_bytes(cookie_secret, COOKIE_SECRET_LENGTH))
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err,"error setting random cookie secret\n");
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
cookie_initialized = 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Read peer information */
|
||||||
|
(void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer);
|
||||||
|
|
||||||
|
/* Create buffer with peer's address and port */
|
||||||
|
length = 0;
|
||||||
|
switch (peer.sa.sa_family)
|
||||||
|
{
|
||||||
|
case AF_INET:
|
||||||
|
length += sizeof(struct in_addr);
|
||||||
|
length += sizeof(peer.s4.sin_port);
|
||||||
|
break;
|
||||||
|
#if OPENSSL_USE_IPV6
|
||||||
|
case AF_INET6:
|
||||||
|
length += sizeof(struct in6_addr);
|
||||||
|
length += sizeof(peer.s6.sin6_port);
|
||||||
|
break;
|
||||||
|
#endif
|
||||||
|
default:
|
||||||
|
OPENSSL_assert(0);
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
buffer = OPENSSL_malloc(length);
|
||||||
|
|
||||||
|
if (buffer == NULL)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err,"out of memory\n");
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
switch (peer.sa.sa_family)
|
||||||
|
{
|
||||||
|
case AF_INET:
|
||||||
|
memcpy(buffer,
|
||||||
|
&peer.s4.sin_port,
|
||||||
|
sizeof(peer.s4.sin_port));
|
||||||
|
memcpy(buffer + sizeof(peer.s4.sin_port),
|
||||||
|
&peer.s4.sin_addr,
|
||||||
|
sizeof(struct in_addr));
|
||||||
|
break;
|
||||||
|
#if OPENSSL_USE_IPV6
|
||||||
|
case AF_INET6:
|
||||||
|
memcpy(buffer,
|
||||||
|
&peer.s6.sin6_port,
|
||||||
|
sizeof(peer.s6.sin6_port));
|
||||||
|
memcpy(buffer + sizeof(peer.s6.sin6_port),
|
||||||
|
&peer.s6.sin6_addr,
|
||||||
|
sizeof(struct in6_addr));
|
||||||
|
break;
|
||||||
|
#endif
|
||||||
|
default:
|
||||||
|
OPENSSL_assert(0);
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Calculate HMAC of buffer using the secret */
|
||||||
|
HMAC(EVP_sha1(), cookie_secret, COOKIE_SECRET_LENGTH,
|
||||||
|
buffer, length, result, &resultlength);
|
||||||
|
OPENSSL_free(buffer);
|
||||||
|
|
||||||
|
memcpy(cookie, result, resultlength);
|
||||||
|
*cookie_len = resultlength;
|
||||||
|
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
int MS_CALLBACK verify_cookie_callback(SSL *ssl, unsigned char *cookie, unsigned int cookie_len)
|
||||||
|
{
|
||||||
|
unsigned char *buffer, result[EVP_MAX_MD_SIZE];
|
||||||
|
unsigned int length, resultlength;
|
||||||
|
union {
|
||||||
|
struct sockaddr sa;
|
||||||
|
struct sockaddr_in s4;
|
||||||
|
#if OPENSSL_USE_IPV6
|
||||||
|
struct sockaddr_in6 s6;
|
||||||
|
#endif
|
||||||
|
} peer;
|
||||||
|
|
||||||
|
/* If secret isn't initialized yet, the cookie can't be valid */
|
||||||
|
if (!cookie_initialized)
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
/* Read peer information */
|
||||||
|
(void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer);
|
||||||
|
|
||||||
|
/* Create buffer with peer's address and port */
|
||||||
|
length = 0;
|
||||||
|
switch (peer.sa.sa_family)
|
||||||
|
{
|
||||||
|
case AF_INET:
|
||||||
|
length += sizeof(struct in_addr);
|
||||||
|
length += sizeof(peer.s4.sin_port);
|
||||||
|
break;
|
||||||
|
#if OPENSSL_USE_IPV6
|
||||||
|
case AF_INET6:
|
||||||
|
length += sizeof(struct in6_addr);
|
||||||
|
length += sizeof(peer.s6.sin6_port);
|
||||||
|
break;
|
||||||
|
#endif
|
||||||
|
default:
|
||||||
|
OPENSSL_assert(0);
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
buffer = OPENSSL_malloc(length);
|
||||||
|
|
||||||
|
if (buffer == NULL)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err,"out of memory\n");
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
switch (peer.sa.sa_family)
|
||||||
|
{
|
||||||
|
case AF_INET:
|
||||||
|
memcpy(buffer,
|
||||||
|
&peer.s4.sin_port,
|
||||||
|
sizeof(peer.s4.sin_port));
|
||||||
|
memcpy(buffer + sizeof(peer.s4.sin_port),
|
||||||
|
&peer.s4.sin_addr,
|
||||||
|
sizeof(struct in_addr));
|
||||||
|
break;
|
||||||
|
#if OPENSSL_USE_IPV6
|
||||||
|
case AF_INET6:
|
||||||
|
memcpy(buffer,
|
||||||
|
&peer.s6.sin6_port,
|
||||||
|
sizeof(peer.s6.sin6_port));
|
||||||
|
memcpy(buffer + sizeof(peer.s6.sin6_port),
|
||||||
|
&peer.s6.sin6_addr,
|
||||||
|
sizeof(struct in6_addr));
|
||||||
|
break;
|
||||||
|
#endif
|
||||||
|
default:
|
||||||
|
OPENSSL_assert(0);
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Calculate HMAC of buffer using the secret */
|
||||||
|
HMAC(EVP_sha1(), cookie_secret, COOKIE_SECRET_LENGTH,
|
||||||
|
buffer, length, result, &resultlength);
|
||||||
|
OPENSSL_free(buffer);
|
||||||
|
|
||||||
|
if (cookie_len == resultlength && memcmp(result, cookie, resultlength) == 0)
|
||||||
|
return 1;
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|||||||
725
apps/s_client.c
725
apps/s_client.c
File diff suppressed because it is too large
Load Diff
747
apps/s_server.c
747
apps/s_server.c
File diff suppressed because it is too large
Load Diff
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user