Compare commits
	
		
			1372 Commits
		
	
	
		
			OpenSSL_1_
			...
			OpenSSL_1_
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
| 
						 | 
					e498b83fed | ||
| 
						 | 
					2e4d15fd04 | ||
| 
						 | 
					3b0e0d1231 | ||
| 
						 | 
					f7b36402d6 | ||
| 
						 | 
					0f6c965823 | ||
| 
						 | 
					4651718410 | ||
| 
						 | 
					fbfad23f0c | ||
| 
						 | 
					68085a73af | ||
| 
						 | 
					bc974f8b36 | ||
| 
						 | 
					72d7ed66e2 | ||
| 
						 | 
					2655f5644d | ||
| 
						 | 
					3af30a7b8b | ||
| 
						 | 
					e060570e62 | ||
| 
						 | 
					1ac02e4b89 | ||
| 
						 | 
					7116341e18 | ||
| 
						 | 
					92fe1dbc0e | ||
| 
						 | 
					d9bd6d1f3d | ||
| 
						 | 
					c44bad6b38 | ||
| 
						 | 
					2e989d80ce | ||
| 
						 | 
					2cef4e6c29 | ||
| 
						 | 
					064198a817 | ||
| 
						 | 
					4017726f72 | ||
| 
						 | 
					1d7c823ab5 | ||
| 
						 | 
					3cf9f81b09 | ||
| 
						 | 
					5a098aeb9d | ||
| 
						 | 
					c197906261 | ||
| 
						 | 
					87309e2fc1 | ||
| 
						 | 
					9fb77b8e0d | ||
| 
						 | 
					3bb069d808 | ||
| 
						 | 
					7962ea7aa6 | ||
| 
						 | 
					cbb5afdc34 | ||
| 
						 | 
					f9189b79bf | ||
| 
						 | 
					d68e7df7ab | ||
| 
						 | 
					1c246f6bef | ||
| 
						 | 
					802e6cfc05 | ||
| 
						 | 
					b2aec696f2 | ||
| 
						 | 
					18d3333cfd | ||
| 
						 | 
					196767e08b | ||
| 
						 | 
					2e7341ec5a | ||
| 
						 | 
					3aac5918b1 | ||
| 
						 | 
					ed4260b4a0 | ||
| 
						 | 
					4cf7ba6cce | ||
| 
						 | 
					0ddec4259d | ||
| 
						 | 
					1566497495 | ||
| 
						 | 
					712548231e | ||
| 
						 | 
					ac84cb4cfe | ||
| 
						 | 
					3e9a08ecb1 | ||
| 
						 | 
					3a9a032163 | ||
| 
						 | 
					b83ceba7d5 | ||
| 
						 | 
					d9738d5f07 | ||
| 
						 | 
					583f0bc402 | ||
| 
						 | 
					e8e878bec7 | ||
| 
						 | 
					6099e629f5 | ||
| 
						 | 
					3570086760 | ||
| 
						 | 
					acb341eb6e | ||
| 
						 | 
					8fb2c9922a | ||
| 
						 | 
					a97c208c5a | ||
| 
						 | 
					cc6e9f9abb | ||
| 
						 | 
					56cd740449 | ||
| 
						 | 
					8437225d34 | ||
| 
						 | 
					b4a57c4c41 | ||
| 
						 | 
					faa8038edd | ||
| 
						 | 
					e02863b5ac | ||
| 
						 | 
					04685bc949 | ||
| 
						 | 
					98a0f9660d | ||
| 
						 | 
					45fe66b8ba | ||
| 
						 | 
					8d7aab986b | ||
| 
						 | 
					e078642dde | ||
| 
						 | 
					ffd14272c4 | ||
| 
						 | 
					f16f3ac559 | ||
| 
						 | 
					4fb433d221 | ||
| 
						 | 
					293c1e2235 | ||
| 
						 | 
					d5e16a711e | ||
| 
						 | 
					178c562a46 | ||
| 
						 | 
					61052e891e | ||
| 
						 | 
					cb951e336b | ||
| 
						 | 
					37580f43b5 | ||
| 
						 | 
					ef28c6d676 | ||
| 
						 | 
					2175744952 | ||
| 
						 | 
					2357cd2e20 | ||
| 
						 | 
					5951cc004b | ||
| 
						 | 
					a8565530e2 | ||
| 
						 | 
					9e9ee7e37f | ||
| 
						 | 
					500d67f15a | ||
| 
						 | 
					40fb8587ed | ||
| 
						 | 
					c14a808c51 | ||
| 
						 | 
					cdf42d7b43 | ||
| 
						 | 
					7858d304bc | ||
| 
						 | 
					f14a6bf515 | ||
| 
						 | 
					5dad57536f | ||
| 
						 | 
					a5fad4d6bc | ||
| 
						 | 
					d6c2e3e621 | ||
| 
						 | 
					8c46748bcb | ||
| 
						 | 
					86edf13b1c | ||
| 
						 | 
					fcd9b1073a | ||
| 
						 | 
					036df29387 | ||
| 
						 | 
					60b7d3bbb5 | ||
| 
						 | 
					7e9d42ce97 | ||
| 
						 | 
					b3147fcbe6 | ||
| 
						 | 
					feefb73ad9 | ||
| 
						 | 
					8932b82f7d | ||
| 
						 | 
					a4a759acec | ||
| 
						 | 
					6e5a554533 | ||
| 
						 | 
					2164a17a7d | ||
| 
						 | 
					dc1e493808 | ||
| 
						 | 
					1fe8304db0 | ||
| 
						 | 
					bfd19df6d0 | ||
| 
						 | 
					7f9edfd23a | ||
| 
						 | 
					9673056c25 | ||
| 
						 | 
					f50730d361 | ||
| 
						 | 
					9beb948c0d | ||
| 
						 | 
					ce5ddefc43 | ||
| 
						 | 
					458f23f610 | ||
| 
						 | 
					c983a77887 | ||
| 
						 | 
					7516eaf492 | ||
| 
						 | 
					c6a84ff351 | ||
| 
						 | 
					b8b9bcb458 | ||
| 
						 | 
					be617fbaf8 | ||
| 
						 | 
					321ba85899 | ||
| 
						 | 
					fcabfc66ae | ||
| 
						 | 
					9844573039 | ||
| 
						 | 
					6579603874 | ||
| 
						 | 
					d68aade28a | ||
| 
						 | 
					3242e5938b | ||
| 
						 | 
					35384e8e5b | ||
| 
						 | 
					4c21e004a3 | ||
| 
						 | 
					59ee70e386 | ||
| 
						 | 
					43e569921e | ||
| 
						 | 
					8aaeec9f9a | ||
| 
						 | 
					8454d3f924 | ||
| 
						 | 
					5004c22c25 | ||
| 
						 | 
					e96872f4c0 | ||
| 
						 | 
					14e9a78d47 | ||
| 
						 | 
					2aca9b272e | ||
| 
						 | 
					26d7cb400e | ||
| 
						 | 
					2db95e094d | ||
| 
						 | 
					5fc8bb6ab7 | ||
| 
						 | 
					244d0955ad | ||
| 
						 | 
					061e68c554 | ||
| 
						 | 
					3f1d582f70 | ||
| 
						 | 
					8a2e5bf6b7 | ||
| 
						 | 
					6c3d948723 | ||
| 
						 | 
					51c5ab5d3a | ||
| 
						 | 
					ff60f33811 | ||
| 
						 | 
					2cfa5edb26 | ||
| 
						 | 
					291a3e9629 | ||
| 
						 | 
					2184a14b62 | ||
| 
						 | 
					2e84084fbc | ||
| 
						 | 
					26f9cfbdca | ||
| 
						 | 
					7fc5f4f117 | ||
| 
						 | 
					249a3e362f | ||
| 
						 | 
					15d717f574 | ||
| 
						 | 
					b8712b2b9a | ||
| 
						 | 
					1eaccbef57 | ||
| 
						 | 
					e2f69f5ce7 | ||
| 
						 | 
					821bee4333 | ||
| 
						 | 
					8b6205c484 | ||
| 
						 | 
					e5cf62b04d | ||
| 
						 | 
					b1edca2a4c | ||
| 
						 | 
					e7768ebbd2 | ||
| 
						 | 
					329a76c085 | ||
| 
						 | 
					bbb76be9b5 | ||
| 
						 | 
					b726b8a60c | ||
| 
						 | 
					e298409c34 | ||
| 
						 | 
					25012d5e79 | ||
| 
						 | 
					09b7de77b3 | ||
| 
						 | 
					9bdedec0cf | ||
| 
						 | 
					f63fa8b10a | ||
| 
						 | 
					d47aebbb47 | ||
| 
						 | 
					08931f1cd6 | ||
| 
						 | 
					6ce9687b5a | ||
| 
						 | 
					20e610580e | ||
| 
						 | 
					4fa17211bb | ||
| 
						 | 
					d8d40fc676 | ||
| 
						 | 
					3c7fcdfdd4 | ||
| 
						 | 
					e356ac5c06 | ||
| 
						 | 
					872e681c00 | ||
| 
						 | 
					38b71ba8ff | ||
| 
						 | 
					f8cf36c298 | ||
| 
						 | 
					26a59d9b46 | ||
| 
						 | 
					7fd4ce6a99 | ||
| 
						 | 
					d9d09a8d0f | ||
| 
						 | 
					2b0532f398 | ||
| 
						 | 
					7d07c75c5b | ||
| 
						 | 
					f34297db80 | ||
| 
						 | 
					e2e5326e5b | ||
| 
						 | 
					592c6e1191 | ||
| 
						 | 
					8202802fad | ||
| 
						 | 
					f79bb32926 | ||
| 
						 | 
					7a3809fd97 | ||
| 
						 | 
					f13a149088 | ||
| 
						 | 
					fc586d2955 | ||
| 
						 | 
					17d45dec4d | ||
| 
						 | 
					6bfe55380a | ||
| 
						 | 
					4e05aedbca | ||
| 
						 | 
					bf3e200eb4 | ||
| 
						 | 
					55614f89f0 | ||
| 
						 | 
					b1620443f3 | ||
| 
						 | 
					4ed98b6e25 | ||
| 
						 | 
					3a33923515 | ||
| 
						 | 
					f2df488a1c | ||
| 
						 | 
					8d507aee7c | ||
| 
						 | 
					133145686e | ||
| 
						 | 
					0f04b004ac | ||
| 
						 | 
					81e3a6055c | ||
| 
						 | 
					bea9a17726 | ||
| 
						 | 
					b537ea9ce4 | ||
| 
						 | 
					13ce52be1b | ||
| 
						 | 
					11853c50ec | ||
| 
						 | 
					a60aa7e008 | ||
| 
						 | 
					a49256a349 | ||
| 
						 | 
					e517dfd3d1 | ||
| 
						 | 
					74687f5979 | ||
| 
						 | 
					8dc6617ad5 | ||
| 
						 | 
					c2119214c2 | ||
| 
						 | 
					22387f00b6 | ||
| 
						 | 
					4d16915381 | ||
| 
						 | 
					e7169a5835 | ||
| 
						 | 
					abc2dfbcc3 | ||
| 
						 | 
					23ea9f6f03 | ||
| 
						 | 
					3e5df37861 | ||
| 
						 | 
					4e5f9f8a9a | ||
| 
						 | 
					9446ecfb3a | ||
| 
						 | 
					48ecdec7a0 | ||
| 
						 | 
					8f5f782253 | ||
| 
						 | 
					228a77a4ad | ||
| 
						 | 
					03b17a5789 | ||
| 
						 | 
					391f3b5708 | ||
| 
						 | 
					fe9b9a880f | ||
| 
						 | 
					9f96ea4c2b | ||
| 
						 | 
					41a765182f | ||
| 
						 | 
					bcdd904c6c | ||
| 
						 | 
					a90b1e32d2 | ||
| 
						 | 
					0ed8e95c4b | ||
| 
						 | 
					6b5b85f4f6 | ||
| 
						 | 
					03ebf85f77 | ||
| 
						 | 
					30fbe92c78 | ||
| 
						 | 
					1241e77f15 | ||
| 
						 | 
					1433cac53c | ||
| 
						 | 
					204fb36a0e | ||
| 
						 | 
					2b45603445 | ||
| 
						 | 
					d70c0be4c1 | ||
| 
						 | 
					9b649d9a73 | ||
| 
						 | 
					abbd58559e | ||
| 
						 | 
					d15d17bb64 | ||
| 
						 | 
					966fe81f9b | ||
| 
						 | 
					83764a989d | ||
| 
						 | 
					86788e1ee6 | ||
| 
						 | 
					03b04ddac1 | ||
| 
						 | 
					88ae012c80 | ||
| 
						 | 
					fc4f4cdb8b | ||
| 
						 | 
					4e0fbdc4ec | ||
| 
						 | 
					0c37aed3f3 | ||
| 
						 | 
					099ccdb808 | ||
| 
						 | 
					9871417fb7 | ||
| 
						 | 
					fc7804ec39 | ||
| 
						 | 
					e7b9d9be48 | ||
| 
						 | 
					2172d4f63c | ||
| 
						 | 
					c34091d47e | ||
| 
						 | 
					a9f4ebd753 | ||
| 
						 | 
					604c9948a8 | ||
| 
						 | 
					281720c2a3 | ||
| 
						 | 
					2a9023f7b4 | ||
| 
						 | 
					36e8c39899 | ||
| 
						 | 
					e3f009c595 | ||
| 
						 | 
					fbe3baa773 | ||
| 
						 | 
					690998f904 | ||
| 
						 | 
					3221da845f | ||
| 
						 | 
					9aeb410419 | ||
| 
						 | 
					bf4519cde5 | ||
| 
						 | 
					e967b94356 | ||
| 
						 | 
					2316286c0e | ||
| 
						 | 
					67bde7d465 | ||
| 
						 | 
					cd63f94d4d | ||
| 
						 | 
					2054eb771e | ||
| 
						 | 
					ea0ceb11a0 | ||
| 
						 | 
					00579b98c4 | ||
| 
						 | 
					ee5a8d3e31 | ||
| 
						 | 
					72370164c3 | ||
| 
						 | 
					704422ce1e | ||
| 
						 | 
					8e8d7e1b26 | ||
| 
						 | 
					3ed6327571 | ||
| 
						 | 
					efd4f1dfd3 | ||
| 
						 | 
					00032b0ba1 | ||
| 
						 | 
					a07f514fc0 | ||
| 
						 | 
					b197c770a6 | ||
| 
						 | 
					b7c9762598 | ||
| 
						 | 
					a414bc8c3e | ||
| 
						 | 
					98a3c3c514 | ||
| 
						 | 
					157fd05aad | ||
| 
						 | 
					9f510ceb5d | ||
| 
						 | 
					675b1c2fce | ||
| 
						 | 
					c923132e9d | ||
| 
						 | 
					1864e3bed3 | ||
| 
						 | 
					af7bcd7daa | ||
| 
						 | 
					3fa2fff86f | ||
| 
						 | 
					b372a64e10 | ||
| 
						 | 
					e432336433 | ||
| 
						 | 
					f3b0e0215c | ||
| 
						 | 
					a6cc0e0a0d | ||
| 
						 | 
					b2cb6dc1ef | ||
| 
						 | 
					f87f88a69f | ||
| 
						 | 
					6d87cd2f03 | ||
| 
						 | 
					2db3ea2929 | ||
| 
						 | 
					c28b055a0c | ||
| 
						 | 
					02e8d46119 | ||
| 
						 | 
					105a3db56e | ||
| 
						 | 
					295befec25 | ||
| 
						 | 
					cb34cb1f23 | ||
| 
						 | 
					86f393ceb7 | ||
| 
						 | 
					d6d324374e | ||
| 
						 | 
					14999bcc59 | ||
| 
						 | 
					046e288edf | ||
| 
						 | 
					d8b11e75cb | ||
| 
						 | 
					0df7959d43 | ||
| 
						 | 
					5894eb1f33 | ||
| 
						 | 
					6daba1dc6a | ||
| 
						 | 
					69b8f2895b | ||
| 
						 | 
					0ace876730 | ||
| 
						 | 
					e9daf8a9ce | ||
| 
						 | 
					cf0156622a | ||
| 
						 | 
					86cac6d3b2 | ||
| 
						 | 
					f46ea1d8e2 | ||
| 
						 | 
					0980992d44 | ||
| 
						 | 
					38a503fb8a | ||
| 
						 | 
					fef58ce79e | ||
| 
						 | 
					da0d5e78bc | ||
| 
						 | 
					ad212c1ed1 | ||
| 
						 | 
					e1bce59fd3 | ||
| 
						 | 
					9beb75d3c4 | ||
| 
						 | 
					042ef467ee | ||
| 
						 | 
					01736e6c41 | ||
| 
						 | 
					29411a0c7a | ||
| 
						 | 
					b66f59adfa | ||
| 
						 | 
					9ab788aa23 | ||
| 
						 | 
					87887a7a65 | ||
| 
						 | 
					5a0d057e49 | ||
| 
						 | 
					aa59369b4c | ||
| 
						 | 
					18c7f2fce8 | ||
| 
						 | 
					6a8d6f039a | ||
| 
						 | 
					5ff9c21f72 | ||
| 
						 | 
					5c52c04650 | ||
| 
						 | 
					6c86bf7a1e | ||
| 
						 | 
					0d4d2e02eb | ||
| 
						 | 
					151399a944 | ||
| 
						 | 
					049615e35d | ||
| 
						 | 
					6b72417a00 | ||
| 
						 | 
					aabbe99fcb | ||
| 
						 | 
					8011cd56e3 | ||
| 
						 | 
					d3152655d5 | ||
| 
						 | 
					006cd7083f | ||
| 
						 | 
					bc8923b1ec | ||
| 
						 | 
					1632ef7448 | ||
| 
						 | 
					f1f4fbde2a | ||
| 
						 | 
					1854c48005 | ||
| 
						 | 
					ebda73f867 | ||
| 
						 | 
					bcc311668e | ||
| 
						 | 
					1dd26414df | ||
| 
						 | 
					056389eb1c | ||
| 
						 | 
					a07856a08d | ||
| 
						 | 
					19ce768c6b | ||
| 
						 | 
					aaed77c55e | ||
| 
						 | 
					49270d0431 | ||
| 
						 | 
					673c42b238 | ||
| 
						 | 
					5541b18ba8 | ||
| 
						 | 
					28e117f49f | ||
| 
						 | 
					46bfc05480 | ||
| 
						 | 
					427a37ca3f | ||
| 
						 | 
					39ae3b338f | ||
| 
						 | 
					48f5b3efce | ||
| 
						 | 
					f8dc000699 | ||
| 
						 | 
					bf8d6f9ab8 | ||
| 
						 | 
					17e844a450 | ||
| 
						 | 
					8ca7d12430 | ||
| 
						 | 
					67b9c82ea2 | ||
| 
						 | 
					a6f5b991eb | ||
| 
						 | 
					756587dcb9 | ||
| 
						 | 
					0a084f7b3a | ||
| 
						 | 
					da0a95b23a | ||
| 
						 | 
					599fe418a1 | ||
| 
						 | 
					4519e7b839 | ||
| 
						 | 
					4659b53e7d | ||
| 
						 | 
					dc22495d35 | ||
| 
						 | 
					ab0d964259 | ||
| 
						 | 
					dac3654e2d | ||
| 
						 | 
					989d87cb1a | ||
| 
						 | 
					d6934a02b5 | ||
| 
						 | 
					f9986e9abf | ||
| 
						 | 
					1f5e321ec1 | ||
| 
						 | 
					b6adb6ef58 | ||
| 
						 | 
					bfdaf45141 | ||
| 
						 | 
					69526a354d | ||
| 
						 | 
					778f2b648c | ||
| 
						 | 
					2223317bef | ||
| 
						 | 
					b107586c0c | ||
| 
						 | 
					d544755389 | ||
| 
						 | 
					88398e9ba3 | ||
| 
						 | 
					15c1ac03c8 | ||
| 
						 | 
					c3c6fc7855 | ||
| 
						 | 
					4d8cca8a7e | ||
| 
						 | 
					d61be85581 | ||
| 
						 | 
					9e456a8537 | ||
| 
						 | 
					f179e2b899 | ||
| 
						 | 
					6a60b41431 | ||
| 
						 | 
					c6a47f988c | ||
| 
						 | 
					d0666f289a | ||
| 
						 | 
					d8afda60a9 | ||
| 
						 | 
					804ab36df6 | ||
| 
						 | 
					a41d5174e2 | ||
| 
						 | 
					9c5d953a07 | ||
| 
						 | 
					7b7b18c57e | ||
| 
						 | 
					8eb094b946 | ||
| 
						 | 
					7fa18a63cb | ||
| 
						 | 
					90600a5e3b | ||
| 
						 | 
					23f5908ac7 | ||
| 
						 | 
					e622237d12 | ||
| 
						 | 
					f0816174d2 | ||
| 
						 | 
					057444f844 | ||
| 
						 | 
					725c5f1ad3 | ||
| 
						 | 
					9c8dc84ac1 | ||
| 
						 | 
					e3899ababb | ||
| 
						 | 
					3fc880ac5d | ||
| 
						 | 
					602b2790ca | ||
| 
						 | 
					b05a3ad765 | ||
| 
						 | 
					3d8f4f23af | ||
| 
						 | 
					a74bee5fc7 | ||
| 
						 | 
					55c9e24875 | ||
| 
						 | 
					ebe221948d | ||
| 
						 | 
					b2d951e423 | ||
| 
						 | 
					c5993d10a8 | ||
| 
						 | 
					5be1ae28ef | ||
| 
						 | 
					96db9023b8 | ||
| 
						 | 
					0d7717fc9c | ||
| 
						 | 
					aba7600029 | ||
| 
						 | 
					00acdfbf98 | ||
| 
						 | 
					51624dbdae | ||
| 
						 | 
					9e29df0027 | ||
| 
						 | 
					f54167d1dc | ||
| 
						 | 
					6042582b62 | ||
| 
						 | 
					50522642a0 | ||
| 
						 | 
					bfc3424d1f | ||
| 
						 | 
					1c65936882 | ||
| 
						 | 
					40acdb192e | ||
| 
						 | 
					4b7a4ba29c | ||
| 
						 | 
					e0660c6257 | ||
| 
						 | 
					b4ada742d1 | ||
| 
						 | 
					a93d952cd4 | ||
| 
						 | 
					5b56fec6f5 | ||
| 
						 | 
					32171e4e07 | ||
| 
						 | 
					48e6edabed | ||
| 
						 | 
					069607124d | ||
| 
						 | 
					caf55bfacf | ||
| 
						 | 
					ce3631015e | ||
| 
						 | 
					3ae1b53496 | ||
| 
						 | 
					79bb00534d | ||
| 
						 | 
					c4b16ddc8f | ||
| 
						 | 
					deb3b08ff2 | ||
| 
						 | 
					b45b3efd5d | ||
| 
						 | 
					e420060ac9 | ||
| 
						 | 
					d8ec8a4a65 | ||
| 
						 | 
					040ed7b4d0 | ||
| 
						 | 
					c76e5b08a1 | ||
| 
						 | 
					0071215832 | ||
| 
						 | 
					4a55631e4d | ||
| 
						 | 
					19a68574a9 | ||
| 
						 | 
					f21e6b6ecb | ||
| 
						 | 
					e1549a01c7 | ||
| 
						 | 
					765be74d24 | ||
| 
						 | 
					9614d2c676 | ||
| 
						 | 
					ad03c71ea1 | ||
| 
						 | 
					4eedf86a16 | ||
| 
						 | 
					eb85ee9a88 | ||
| 
						 | 
					fa2026dc88 | ||
| 
						 | 
					fe08007399 | ||
| 
						 | 
					e3ebdcff12 | ||
| 
						 | 
					cb10cf1224 | ||
| 
						 | 
					c0dd71c97c | ||
| 
						 | 
					51478be956 | ||
| 
						 | 
					a7304e4b98 | ||
| 
						 | 
					0d8776344c | ||
| 
						 | 
					197e0ea817 | ||
| 
						 | 
					c776a3f398 | ||
| 
						 | 
					25c9fa6026 | ||
| 
						 | 
					d2dc33d57c | ||
| 
						 | 
					f3dcc8411e | ||
| 
						 | 
					1c2c5e402a | ||
| 
						 | 
					34628967f1 | ||
| 
						 | 
					a6c62f0c25 | ||
| 
						 | 
					ca989269a2 | ||
| 
						 | 
					2ec4181ba9 | ||
| 
						 | 
					0294b2be5f | ||
| 
						 | 
					f1068a1ab7 | ||
| 
						 | 
					cadde467a8 | ||
| 
						 | 
					c2bdcba347 | ||
| 
						 | 
					60df657b3a | ||
| 
						 | 
					17a2d0801f | ||
| 
						 | 
					accb3007ac | ||
| 
						 | 
					b13dff6141 | ||
| 
						 | 
					4ade6a8ca4 | ||
| 
						 | 
					00fadef414 | ||
| 
						 | 
					7ed244a0b3 | ||
| 
						 | 
					e94a23876c | ||
| 
						 | 
					041f681943 | ||
| 
						 | 
					afec9f57da | ||
| 
						 | 
					0ec1a77891 | ||
| 
						 | 
					62c2b6d944 | ||
| 
						 | 
					5b98979712 | ||
| 
						 | 
					9abbf5cce7 | ||
| 
						 | 
					ddfe486e4c | ||
| 
						 | 
					834d30bc63 | ||
| 
						 | 
					e26faa9e0c | ||
| 
						 | 
					025f7dbdd1 | ||
| 
						 | 
					44f4934bde | ||
| 
						 | 
					453ca706cc | ||
| 
						 | 
					5e1ff664f9 | ||
| 
						 | 
					833a896681 | ||
| 
						 | 
					34e43b909f | ||
| 
						 | 
					62036c6fc3 | ||
| 
						 | 
					68dd8512b7 | ||
| 
						 | 
					bbf9f3c654 | ||
| 
						 | 
					2583270191 | ||
| 
						 | 
					3da721dac9 | ||
| 
						 | 
					eb22b7ec75 | ||
| 
						 | 
					b93916149d | ||
| 
						 | 
					82f42a1d2e | ||
| 
						 | 
					a4870de5aa | ||
| 
						 | 
					39aabe59c8 | ||
| 
						 | 
					f4c93b46ed | ||
| 
						 | 
					4af793036f | ||
| 
						 | 
					13bca90ac5 | ||
| 
						 | 
					c9a6ddafc5 | ||
| 
						 | 
					f4a51970d2 | ||
| 
						 | 
					937f125efc | ||
| 
						 | 
					4b61f6d2a6 | ||
| 
						 | 
					d5bff72615 | ||
| 
						 | 
					3b4be0018b | ||
| 
						 | 
					125c2ed8a3 | ||
| 
						 | 
					09da95542a | ||
| 
						 | 
					cc53b38574 | ||
| 
						 | 
					0aeeae0c9c | ||
| 
						 | 
					00c991f028 | ||
| 
						 | 
					55856a7b74 | ||
| 
						 | 
					83a3af9f4e | ||
| 
						 | 
					76bf0cf27c | ||
| 
						 | 
					7cf0529b52 | ||
| 
						 | 
					6c03af135b | ||
| 
						 | 
					5cd1aa4f15 | ||
| 
						 | 
					04b80f4003 | ||
| 
						 | 
					591c55a981 | ||
| 
						 | 
					cd2693862b | ||
| 
						 | 
					25370e93c6 | ||
| 
						 | 
					cdb6c48445 | ||
| 
						 | 
					04b727b4dd | ||
| 
						 | 
					cbd93a0636 | ||
| 
						 | 
					b9e84f007f | ||
| 
						 | 
					29a546720b | ||
| 
						 | 
					0e9dd387ea | ||
| 
						 | 
					79dabcc137 | ||
| 
						 | 
					944bc29f90 | ||
| 
						 | 
					03e1b3a153 | ||
| 
						 | 
					9c95ff968a | ||
| 
						 | 
					96b680f210 | ||
| 
						 | 
					9ab3ce1246 | ||
| 
						 | 
					3972dbe462 | ||
| 
						 | 
					85615e33e5 | ||
| 
						 | 
					f4cfc3444a | ||
| 
						 | 
					24f599af21 | ||
| 
						 | 
					bca0d7fdb5 | ||
| 
						 | 
					bc4ae2cb0b | ||
| 
						 | 
					ef4b9f001a | ||
| 
						 | 
					08f8933fa3 | ||
| 
						 | 
					41958376b5 | ||
| 
						 | 
					9fe4603b82 | ||
| 
						 | 
					147dbb2fe3 | ||
| 
						 | 
					cbf9b4aed3 | ||
| 
						 | 
					625a55324f | ||
| 
						 | 
					3151e328e0 | ||
| 
						 | 
					46ebd9e3bb | ||
| 
						 | 
					f66db68e1f | ||
| 
						 | 
					0c4b72e9c0 | ||
| 
						 | 
					f88dbb8385 | ||
| 
						 | 
					1113fc31ba | ||
| 
						 | 
					0898147090 | ||
| 
						 | 
					4d8da30fc1 | ||
| 
						 | 
					579f3a631e | ||
| 
						 | 
					47061af106 | ||
| 
						 | 
					13e225300f | ||
| 
						 | 
					26bc56d014 | ||
| 
						 | 
					496681cd51 | ||
| 
						 | 
					746c6f3a53 | ||
| 
						 | 
					8545f73b89 | ||
| 
						 | 
					32cc2479b4 | ||
| 
						 | 
					f306b87d76 | ||
| 
						 | 
					41cf07f0ec | ||
| 
						 | 
					62f4033381 | ||
| 
						 | 
					f9f6a8f96c | ||
| 
						 | 
					df0d93564e | ||
| 
						 | 
					0d589ac150 | ||
| 
						 | 
					35d732fc2e | ||
| 
						 | 
					896ddb9851 | ||
| 
						 | 
					e630b3c218 | ||
| 
						 | 
					f1ca56a69f | ||
| 
						 | 
					529d27ea47 | ||
| 
						 | 
					b2226c6c83 | ||
| 
						 | 
					024de2174b | ||
| 
						 | 
					125093b59f | ||
| 
						 | 
					f3e99ea072 | ||
| 
						 | 
					8bfd4c659f | ||
| 
						 | 
					ec07246a08 | ||
| 
						 | 
					04e45b52ee | ||
| 
						 | 
					d5371324d9 | ||
| 
						 | 
					36260233e7 | ||
| 
						 | 
					cab13fc847 | ||
| 
						 | 
					34ab3c8c71 | ||
| 
						 | 
					25c93fd240 | ||
| 
						 | 
					428c1064c3 | ||
| 
						 | 
					81ce0e14e7 | ||
| 
						 | 
					b908e88ec1 | ||
| 
						 | 
					62e4506a7d | ||
| 
						 | 
					014265eb02 | ||
| 
						 | 
					9f27de170d | ||
| 
						 | 
					6cb19b7681 | ||
| 
						 | 
					e130841bcc | ||
| 
						 | 
					2ee798880a | ||
| 
						 | 
					ffcf4c6164 | ||
| 
						 | 
					b286a96811 | ||
| 
						 | 
					2a2df2e9f2 | ||
| 
						 | 
					15481c5e42 | ||
| 
						 | 
					366b60b9da | ||
| 
						 | 
					4782444a35 | ||
| 
						 | 
					8a17e161d1 | ||
| 
						 | 
					72f27cd2df | ||
| 
						 | 
					3b3674ae58 | ||
| 
						 | 
					9d75e765bc | ||
| 
						 | 
					bf07bd4d61 | ||
| 
						 | 
					296cc7f4b8 | ||
| 
						 | 
					3d92984689 | ||
| 
						 | 
					51447d5db5 | ||
| 
						 | 
					1dcf520fe2 | ||
| 
						 | 
					fca84dabe6 | ||
| 
						 | 
					3ea1e13569 | ||
| 
						 | 
					dd6639bd3a | ||
| 
						 | 
					bee0550397 | ||
| 
						 | 
					fc57c58c81 | ||
| 
						 | 
					5bb6d96558 | ||
| 
						 | 
					28e1bd35bd | ||
| 
						 | 
					dd83cc298d | ||
| 
						 | 
					ea00598596 | ||
| 
						 | 
					a650314f72 | ||
| 
						 | 
					54fdc39a08 | ||
| 
						 | 
					7dc98a62b2 | ||
| 
						 | 
					f20ba1c9bb | ||
| 
						 | 
					7c3562947a | ||
| 
						 | 
					eb3a3911fc | ||
| 
						 | 
					540f7c75ef | ||
| 
						 | 
					d6342aab08 | ||
| 
						 | 
					e7b85bc402 | ||
| 
						 | 
					07eaaab2f6 | ||
| 
						 | 
					96f7fafa24 | ||
| 
						 | 
					487a0df700 | ||
| 
						 | 
					09ef5f6258 | ||
| 
						 | 
					bcc0e4ca7c | ||
| 
						 | 
					caac8fefdc | ||
| 
						 | 
					353e845120 | ||
| 
						 | 
					d1451f18d9 | ||
| 
						 | 
					c3a5b7b82a | ||
| 
						 | 
					70d91d60bc | ||
| 
						 | 
					bc78883017 | ||
| 
						 | 
					f929f201fb | ||
| 
						 | 
					554cf97f03 | ||
| 
						 | 
					48ccbeefda | ||
| 
						 | 
					7a217076d9 | ||
| 
						 | 
					0720bf7df1 | ||
| 
						 | 
					9d6727781d | ||
| 
						 | 
					12c1621523 | ||
| 
						 | 
					f9b48d60f2 | ||
| 
						 | 
					5c29127666 | ||
| 
						 | 
					78d767f5ec | ||
| 
						 | 
					c8b979e929 | ||
| 
						 | 
					2beaa91ca7 | ||
| 
						 | 
					efa288ceac | ||
| 
						 | 
					ad3bbd4a16 | ||
| 
						 | 
					73913443a5 | ||
| 
						 | 
					e133ff7190 | ||
| 
						 | 
					25da47c3c8 | ||
| 
						 | 
					4dc40f5eec | ||
| 
						 | 
					a1a37575f0 | ||
| 
						 | 
					c64c0e03d3 | ||
| 
						 | 
					e1e882a368 | ||
| 
						 | 
					36b0719793 | ||
| 
						 | 
					7655044dd3 | ||
| 
						 | 
					58fdd30664 | ||
| 
						 | 
					7175dbaeba | ||
| 
						 | 
					af454b5bb0 | ||
| 
						 | 
					5b2bbf37fa | ||
| 
						 | 
					6321ac9e15 | ||
| 
						 | 
					eeca72f71e | ||
| 
						 | 
					6e164e5c3d | ||
| 
						 | 
					1b452133ae | ||
| 
						 | 
					d9c34505e5 | ||
| 
						 | 
					f9885acc8c | ||
| 
						 | 
					fa9df48401 | ||
| 
						 | 
					d414a5a0f0 | ||
| 
						 | 
					9eb4460e68 | ||
| 
						 | 
					6984d16671 | ||
| 
						 | 
					5b9d0995a1 | ||
| 
						 | 
					7ad8e1fc4e | ||
| 
						 | 
					c9b31189a9 | ||
| 
						 | 
					c76b7a1a82 | ||
| 
						 | 
					c940e07014 | ||
| 
						 | 
					88be4ebfbc | ||
| 
						 | 
					effa47b80a | ||
| 
						 | 
					067400b16e | ||
| 
						 | 
					748628ced0 | ||
| 
						 | 
					6791060eae | ||
| 
						 | 
					502dfeb8de | ||
| 
						 | 
					5bbed29518 | ||
| 
						 | 
					2f2d33f470 | ||
| 
						 | 
					be60a3feaa | ||
| 
						 | 
					e504a829a0 | ||
| 
						 | 
					0d829f6681 | ||
| 
						 | 
					d9540579c5 | ||
| 
						 | 
					ecf963b80d | ||
| 
						 | 
					7fc6d35be0 | ||
| 
						 | 
					e7d2a37158 | ||
| 
						 | 
					531c6fc8f3 | ||
| 
						 | 
					e011d0a3c4 | ||
| 
						 | 
					8d5505d099 | ||
| 
						 | 
					d36e0ee460 | ||
| 
						 | 
					143619ccf6 | ||
| 
						 | 
					9f339d75b5 | ||
| 
						 | 
					28583660fb | ||
| 
						 | 
					dedfe959dd | ||
| 
						 | 
					4d936ace08 | ||
| 
						 | 
					89bd25eb26 | ||
| 
						 | 
					4a1cf50187 | ||
| 
						 | 
					32e12316e5 | ||
| 
						 | 
					ad7b24f145 | ||
| 
						 | 
					c2770c0e0e | ||
| 
						 | 
					371056f2b9 | ||
| 
						 | 
					2d613908e8 | ||
| 
						 | 
					18fb1fae08 | ||
| 
						 | 
					39ef161c72 | ||
| 
						 | 
					a7612c5066 | ||
| 
						 | 
					6cbae10b5e | ||
| 
						 | 
					ebe81134c0 | ||
| 
						 | 
					a1d573e282 | ||
| 
						 | 
					e959e24b47 | ||
| 
						 | 
					3f98d7c0b5 | ||
| 
						 | 
					d2f950c984 | ||
| 
						 | 
					63e8f16737 | ||
| 
						 | 
					9bf5fd894f | ||
| 
						 | 
					6296729fae | ||
| 
						 | 
					67d216801b | ||
| 
						 | 
					0a5575f3f6 | ||
| 
						 | 
					418044cbab | ||
| 
						 | 
					8c67b13407 | ||
| 
						 | 
					2a477ccf0b | ||
| 
						 | 
					c34137bef9 | ||
| 
						 | 
					914d91c5b3 | ||
| 
						 | 
					e733dea3ce | ||
| 
						 | 
					78c5d2a9bb | ||
| 
						 | 
					3bf4e14cc3 | ||
| 
						 | 
					d68d160cb7 | ||
| 
						 | 
					202cb42fbb | ||
| 
						 | 
					49f6cb968f | ||
| 
						 | 
					07e120b7da | ||
| 
						 | 
					f3dcae15ac | ||
| 
						 | 
					25ec498dc7 | ||
| 
						 | 
					9cc42cb091 | ||
| 
						 | 
					bcf9cf89e7 | ||
| 
						 | 
					f0729fc3e0 | ||
| 
						 | 
					8186c00ef3 | ||
| 
						 | 
					c0b31ccb87 | ||
| 
						 | 
					267c950c5f | ||
| 
						 | 
					ce1605b508 | ||
| 
						 | 
					66fdb1c0d4 | ||
| 
						 | 
					25bfdca16a | ||
| 
						 | 
					9c284f9651 | ||
| 
						 | 
					6d78c381f6 | ||
| 
						 | 
					784e2080df | ||
| 
						 | 
					70505bc334 | ||
| 
						 | 
					8e8b247341 | ||
| 
						 | 
					a8595879ec | ||
| 
						 | 
					33a688e806 | ||
| 
						 | 
					5c2bfad9b4 | ||
| 
						 | 
					250f979237 | ||
| 
						 | 
					b527b6e8ff | ||
| 
						 | 
					a54ce007e6 | ||
| 
						 | 
					4ed1f3490e | ||
| 
						 | 
					0a082e9b37 | ||
| 
						 | 
					236a99a409 | ||
| 
						 | 
					04b4363ec8 | ||
| 
						 | 
					37ebc20093 | ||
| 
						 | 
					cef781cc87 | ||
| 
						 | 
					08e4c7a967 | ||
| 
						 | 
					697e4edcad | ||
| 
						 | 
					b26297ca51 | ||
| 
						 | 
					6ca7dba0cf | ||
| 
						 | 
					f1fa05b407 | ||
| 
						 | 
					02e22c35fe | ||
| 
						 | 
					b935714237 | ||
| 
						 | 
					a8314df902 | ||
| 
						 | 
					0cd7a0325f | ||
| 
						 | 
					16b7c81d55 | ||
| 
						 | 
					424ba8b588 | ||
| 
						 | 
					bf493e8d62 | ||
| 
						 | 
					c714e43c8d | ||
| 
						 | 
					cdf9d6f6ed | ||
| 
						 | 
					cc4b48c27c | ||
| 
						 | 
					cac9c92cc0 | ||
| 
						 | 
					d40abf1689 | ||
| 
						 | 
					69e9c69e70 | ||
| 
						 | 
					c489ea7d01 | ||
| 
						 | 
					26c6857a59 | ||
| 
						 | 
					508bd3d1aa | ||
| 
						 | 
					8705846710 | ||
| 
						 | 
					c944a9696e | ||
| 
						 | 
					943cc09d8a | ||
| 
						 | 
					fc6800d19f | ||
| 
						 | 
					d06f047b04 | ||
| 
						 | 
					ddc899bada | ||
| 
						 | 
					bd479e25c7 | ||
| 
						 | 
					eaf5bd168e | ||
| 
						 | 
					d7ecc206ba | ||
| 
						 | 
					11ea212e8c | ||
| 
						 | 
					cb29d8c11f | ||
| 
						 | 
					adcea5a043 | ||
| 
						 | 
					f02f7c2c4a | ||
| 
						 | 
					a1e44cc14f | ||
| 
						 | 
					d2d09bf68c | ||
| 
						 | 
					e2dfb655f7 | ||
| 
						 | 
					463e76b63c | ||
| 
						 | 
					2dc4b0dbe8 | ||
| 
						 | 
					7b23c126e6 | ||
| 
						 | 
					25e3d2225a | ||
| 
						 | 
					c8e0b5d7b6 | ||
| 
						 | 
					4fb7e2b445 | ||
| 
						 | 
					9138e3c061 | ||
| 
						 | 
					9b2a29660b | ||
| 
						 | 
					b7b4a9fa57 | ||
| 
						 | 
					1fb07a7de8 | ||
| 
						 | 
					b9cbcaad58 | ||
| 
						 | 
					c6706a6f6c | ||
| 
						 | 
					958e6a75a1 | ||
| 
						 | 
					397977726c | ||
| 
						 | 
					285d9189c7 | ||
| 
						 | 
					767d3e0054 | ||
| 
						 | 
					409d2a1b71 | ||
| 
						 | 
					e0b9678d7f | ||
| 
						 | 
					166dea6ac8 | ||
| 
						 | 
					52bef4d677 | ||
| 
						 | 
					801e5ef840 | ||
| 
						 | 
					0044739ae5 | ||
| 
						 | 
					4e44bd3650 | ||
| 
						 | 
					0cffb0cd3e | ||
| 
						 | 
					aaa3850ccd | ||
| 
						 | 
					a17b5d5a4f | ||
| 
						 | 
					2f97765bc3 | ||
| 
						 | 
					3205ca8deb | ||
| 
						 | 
					1cb4d65b87 | ||
| 
						 | 
					7b2dd292bc | ||
| 
						 | 
					ab585551c0 | ||
| 
						 | 
					6cf0d7b999 | ||
| 
						 | 
					9d972207f0 | ||
| 
						 | 
					d9834ff24b | ||
| 
						 | 
					d9c3ba05e7 | ||
| 
						 | 
					03467ce6bd | ||
| 
						 | 
					6e750fcb1e | ||
| 
						 | 
					bd6941cfaa | ||
| 
						 | 
					578519edd0 | ||
| 
						 | 
					5c05f69450 | ||
| 
						 | 
					f529dca488 | ||
| 
						 | 
					296aca9dcf | ||
| 
						 | 
					b170703128 | ||
| 
						 | 
					b300fb7734 | ||
| 
						 | 
					f89af47438 | ||
| 
						 | 
					7bb4f8ff12 | ||
| 
						 | 
					7dd6407a4c | ||
| 
						 | 
					53de315b78 | ||
| 
						 | 
					e065e6cda2 | ||
| 
						 | 
					60553cc209 | ||
| 
						 | 
					2d4c9ab518 | ||
| 
						 | 
					50771f7ce3 | ||
| 
						 | 
					242f8d644c | ||
| 
						 | 
					f5575cd167 | ||
| 
						 | 
					dd0ddc3e78 | ||
| 
						 | 
					62308f3f4a | ||
| 
						 | 
					cecafcce94 | ||
| 
						 | 
					ca0efb7594 | ||
| 
						 | 
					1d05ff2779 | ||
| 
						 | 
					941811ccb9 | ||
| 
						 | 
					700384be8e | ||
| 
						 | 
					b8a22c40e0 | ||
| 
						 | 
					3918de9ad1 | ||
| 
						 | 
					96fe35e7d4 | ||
| 
						 | 
					e87afb1518 | ||
| 
						 | 
					7b467c6b81 | ||
| 
						 | 
					eb8ebafe87 | ||
| 
						 | 
					e559febaf1 | ||
| 
						 | 
					6bcc6d38c7 | ||
| 
						 | 
					8173960305 | ||
| 
						 | 
					f2e590942e | ||
| 
						 | 
					6a4b87eb9d | ||
| 
						 | 
					edcba19c23 | ||
| 
						 | 
					b140ae9137 | ||
| 
						 | 
					8ee0591f28 | ||
| 
						 | 
					97d0c596a1 | ||
| 
						 | 
					7454cba4fa | ||
| 
						 | 
					5713411893 | ||
| 
						 | 
					a0cf79e841 | ||
| 
						 | 
					825e1a7c56 | ||
| 
						 | 
					9f2b453338 | ||
| 
						 | 
					a0dce9be76 | ||
| 
						 | 
					cf2b938529 | ||
| 
						 | 
					62f685a9cd | ||
| 
						 | 
					2c7d978c2d | ||
| 
						 | 
					8cd897a42c | ||
| 
						 | 
					1dc44d3130 | ||
| 
						 | 
					2a6e3ef37e | ||
| 
						 | 
					115d528c23 | ||
| 
						 | 
					a310428527 | ||
| 
						 | 
					7e0fd45ce3 | ||
| 
						 | 
					b138ea54ee | ||
| 
						 | 
					d7125d8d85 | ||
| 
						 | 
					9c115a4acc | ||
| 
						 | 
					43716567f5 | ||
| 
						 | 
					0a8f00af34 | ||
| 
						 | 
					b1d7429186 | ||
| 
						 | 
					060a38a2c0 | ||
| 
						 | 
					58402976b4 | ||
| 
						 | 
					cd7b854bbb | ||
| 
						 | 
					aecc0756e8 | ||
| 
						 | 
					e6ccc6ed70 | ||
| 
						 | 
					e959a01fac | ||
| 
						 | 
					17674bfdf7 | ||
| 
						 | 
					d807d4c21f | ||
| 
						 | 
					b4690d2eab | ||
| 
						 | 
					886657a641 | ||
| 
						 | 
					db896db5a7 | ||
| 
						 | 
					2357ae17e7 | ||
| 
						 | 
					9f1c5491d2 | ||
| 
						 | 
					70b52222f5 | ||
| 
						 | 
					88cb59727c | ||
| 
						 | 
					781bfdc314 | ||
| 
						 | 
					b66723b23e | ||
| 
						 | 
					cf96d71c22 | ||
| 
						 | 
					1a111921da | ||
| 
						 | 
					5d9bb428bb | ||
| 
						 | 
					9833757b5d | ||
| 
						 | 
					4195343c0d | ||
| 
						 | 
					042bee4e5c | ||
| 
						 | 
					4afba1f3d9 | ||
| 
						 | 
					5999d45a5d | ||
| 
						 | 
					f69e5d6a19 | ||
| 
						 | 
					3517637702 | ||
| 
						 | 
					e2809bfb42 | ||
| 
						 | 
					68b33cc5c7 | ||
| 
						 | 
					4c02cf8ecc | ||
| 
						 | 
					271daaf768 | ||
| 
						 | 
					efbb7ee432 | ||
| 
						 | 
					6471ec71aa | ||
| 
						 | 
					cb45708061 | ||
| 
						 | 
					02597f2885 | ||
| 
						 | 
					8c6a514edf | ||
| 
						 | 
					7f3fdab793 | ||
| 
						 | 
					5372f5f989 | ||
| 
						 | 
					6d24c09a69 | ||
| 
						 | 
					a8d72c79db | ||
| 
						 | 
					1f713e0106 | ||
| 
						 | 
					03f84c8260 | ||
| 
						 | 
					6d5eb464c9 | ||
| 
						 | 
					67f8de9ab8 | ||
| 
						 | 
					2d95ceedc5 | ||
| 
						 | 
					6526d765fc | ||
| 
						 | 
					3d520f7c2d | ||
| 
						 | 
					9c37519b55 | ||
| 
						 | 
					7e9cfcd0dc | ||
| 
						 | 
					a99ce1f5b1 | ||
| 
						 | 
					42660b3cf1 | ||
| 
						 | 
					f30258c439 | ||
| 
						 | 
					93ff4c69f7 | ||
| 
						 | 
					79571bb1ca | ||
| 
						 | 
					f72c1a58cb | ||
| 
						 | 
					2461396f69 | ||
| 
						 | 
					81a071df2f | ||
| 
						 | 
					6841abe842 | ||
| 
						 | 
					cb70355d87 | ||
| 
						 | 
					b17442bb04 | ||
| 
						 | 
					4874e235fb | ||
| 
						 | 
					06afa6eb94 | ||
| 
						 | 
					58e4205d6c | ||
| 
						 | 
					733394d6dd | ||
| 
						 | 
					2de9558dea | ||
| 
						 | 
					6bd173fced | ||
| 
						 | 
					6b00cd746a | ||
| 
						 | 
					9309ea6617 | ||
| 
						 | 
					05c9e3aea5 | ||
| 
						 | 
					88bac3e664 | ||
| 
						 | 
					5473b6bc2f | ||
| 
						 | 
					38e408076e | ||
| 
						 | 
					dc100d87b5 | ||
| 
						 | 
					6f6b31dadc | ||
| 
						 | 
					b08b158b44 | ||
| 
						 | 
					177f27d71e | ||
| 
						 | 
					928bd9a149 | ||
| 
						 | 
					e53113b8ac | ||
| 
						 | 
					1fe83b4afe | ||
| 
						 | 
					e8f31f80d1 | ||
| 
						 | 
					56f5ab43c2 | ||
| 
						 | 
					370385571c | ||
| 
						 | 
					e34a303ce1 | ||
| 
						 | 
					36f120cd20 | ||
| 
						 | 
					0ae7c43fa5 | ||
| 
						 | 
					c0d2943952 | ||
| 
						 | 
					7d453a3b49 | ||
| 
						 | 
					cd447875e6 | ||
| 
						 | 
					692a94293c | ||
| 
						 | 
					efebb10829 | ||
| 
						 | 
					3c3f025923 | ||
| 
						 | 
					5ff6e2dfbb | ||
| 
						 | 
					61ac68f9f6 | ||
| 
						 | 
					7f1022a8b1 | ||
| 
						 | 
					edf6b025b1 | ||
| 
						 | 
					d799df36b3 | ||
| 
						 | 
					9e96812934 | ||
| 
						 | 
					91e97cbe4c | ||
| 
						 | 
					63ee3b32fe | ||
| 
						 | 
					4ff1a2da10 | ||
| 
						 | 
					4c3c975066 | ||
| 
						 | 
					ec5d74f868 | ||
| 
						 | 
					be0853358c | ||
| 
						 | 
					fea15b553d | ||
| 
						 | 
					88ef78745e | ||
| 
						 | 
					be79342515 | ||
| 
						 | 
					064a6176ac | ||
| 
						 | 
					84e7485bfb | ||
| 
						 | 
					f56f72f219 | ||
| 
						 | 
					2bfb23f102 | ||
| 
						 | 
					cf199fec52 | ||
| 
						 | 
					165c20c2c4 | ||
| 
						 | 
					625c6ba4c7 | ||
| 
						 | 
					a32bede701 | ||
| 
						 | 
					8ff5c8874f | ||
| 
						 | 
					c5d38fc262 | ||
| 
						 | 
					6b71970520 | ||
| 
						 | 
					0209e111f6 | ||
| 
						 | 
					dc01af7723 | ||
| 
						 | 
					5435d0412f | ||
| 
						 | 
					922ac25f64 | ||
| 
						 | 
					aed53d6c5a | ||
| 
						 | 
					61cdb9f36a | ||
| 
						 | 
					1acd042c85 | ||
| 
						 | 
					572712d82a | ||
| 
						 | 
					d1697a7556 | ||
| 
						 | 
					c8c6e9ecd9 | ||
| 
						 | 
					90f3e4cf05 | ||
| 
						 | 
					7bd8bf58bb | ||
| 
						 | 
					1190d3f442 | ||
| 
						 | 
					0e4f5cfbab | ||
| 
						 | 
					f1c8db9f8c | ||
| 
						 | 
					2c9abbd554 | ||
| 
						 | 
					2305ae5d8c | ||
| 
						 | 
					dec54bd0ba | ||
| 
						 | 
					aade369737 | ||
| 
						 | 
					2a5e042c70 | ||
| 
						 | 
					1dc4c8c727 | ||
| 
						 | 
					7ca035db88 | ||
| 
						 | 
					a460c42f94 | ||
| 
						 | 
					d16743e728 | ||
| 
						 | 
					4a29fa8caf | ||
| 
						 | 
					250bb54dba | ||
| 
						 | 
					847d05d0b4 | ||
| 
						 | 
					8315aa03fc | ||
| 
						 | 
					b7a4c480d6 | ||
| 
						 | 
					9a35faaa29 | ||
| 
						 | 
					fbe2e28911 | ||
| 
						 | 
					84968e25f3 | ||
| 
						 | 
					10fd0b7b55 | ||
| 
						 | 
					4a46dc6e5c | ||
| 
						 | 
					0ec55604c0 | ||
| 
						 | 
					500007c9ed | ||
| 
						 | 
					f75abba013 | ||
| 
						 | 
					dea113b428 | ||
| 
						 | 
					6abc406a69 | ||
| 
						 | 
					dcbe723bc5 | ||
| 
						 | 
					33c98a28ac | ||
| 
						 | 
					b2ddddfb20 | ||
| 
						 | 
					c24367ebb9 | ||
| 
						 | 
					7397b35379 | ||
| 
						 | 
					baee44c3de | ||
| 
						 | 
					1f2e4ecc30 | ||
| 
						 | 
					955e28006d | ||
| 
						 | 
					bf0736eb1f | ||
| 
						 | 
					3a5b97b7f1 | ||
| 
						 | 
					45bf825066 | ||
| 
						 | 
					4a18d5c89b | ||
| 
						 | 
					174b26c497 | ||
| 
						 | 
					5cacc82f61 | ||
| 
						 | 
					29a90816ff | ||
| 
						 | 
					4bea454021 | ||
| 
						 | 
					8bfd0ae4c4 | ||
| 
						 | 
					378943ce67 | ||
| 
						 | 
					c65d409afd | ||
| 
						 | 
					ed1bbe2cad | ||
| 
						 | 
					b0b3d09063 | ||
| 
						 | 
					0ede2af7a0 | ||
| 
						 | 
					e8d23f7811 | ||
| 
						 | 
					907cd7217e | ||
| 
						 | 
					7c402e5af3 | ||
| 
						 | 
					b8d78a5520 | ||
| 
						 | 
					dfa5862960 | ||
| 
						 | 
					4276908f51 | ||
| 
						 | 
					be23b71e87 | ||
| 
						 | 
					f851acbfff | ||
| 
						 | 
					78ef9b0205 | ||
| 
						 | 
					ed9b0e5cba | ||
| 
						 | 
					752c1a0ce9 | ||
| 
						 | 
					cc30415d0c | ||
| 
						 | 
					03e16611a3 | ||
| 
						 | 
					8e2f3c1c83 | ||
| 
						 | 
					b6d63b2516 | ||
| 
						 | 
					e6b88d02bd | ||
| 
						 | 
					125060ca63 | ||
| 
						 | 
					b4baca9261 | ||
| 
						 | 
					6342b6e332 | ||
| 
						 | 
					a6dc77822b | ||
| 
						 | 
					59bc67052b | ||
| 
						 | 
					c090562828 | ||
| 
						 | 
					69e2ec63c5 | ||
| 
						 | 
					f610a516a0 | ||
| 
						 | 
					2e51a4caa3 | ||
| 
						 | 
					c6fa97a6d6 | ||
| 
						 | 
					24d7159abd | ||
| 
						 | 
					7978dc989d | ||
| 
						 | 
					d99e6b5014 | ||
| 
						 | 
					2cf40fc2b8 | ||
| 
						 | 
					260d08b814 | ||
| 
						 | 
					53dd05d8f6 | ||
| 
						 | 
					fbe7055370 | ||
| 
						 | 
					a5b386205f | ||
| 
						 | 
					916bcab28e | ||
| 
						 | 
					c7373c3dee | ||
| 
						 | 
					9f2c8eb2a1 | ||
| 
						 | 
					65300dcfb0 | ||
| 
						 | 
					9ddc574f9a | ||
| 
						 | 
					2dd9e67874 | ||
| 
						 | 
					f93b03a5e6 | ||
| 
						 | 
					55a47cd30f | ||
| 
						 | 
					5792219d1d | ||
| 
						 | 
					293c58c1e7 | ||
| 
						 | 
					9f375a752e | ||
| 
						 | 
					04dc5a9ca6 | ||
| 
						 | 
					ae6cb5483e | ||
| 
						 | 
					a168ec1d27 | ||
| 
						 | 
					2a35144327 | ||
| 
						 | 
					7207eca1ee | ||
| 
						 | 
					9c34782478 | ||
| 
						 | 
					20e6d22709 | ||
| 
						 | 
					24dd0c61ef | ||
| 
						 | 
					565c15363c | ||
| 
						 | 
					ed67f7b7a7 | ||
| 
						 | 
					6ea8d138d3 | ||
| 
						 | 
					4159ac43aa | ||
| 
						 | 
					419b09b053 | ||
| 
						 | 
					88530f6b76 | ||
| 
						 | 
					a8cb8177f6 | ||
| 
						 | 
					277f8a34f4 | ||
| 
						 | 
					4dde470865 | ||
| 
						 | 
					ab08405984 | ||
| 
						 | 
					b81fde02aa | ||
| 
						 | 
					57dd2ea808 | ||
| 
						 | 
					7043fa702f | ||
| 
						 | 
					f98d2e5cc1 | ||
| 
						 | 
					1a5538251f | ||
| 
						 | 
					f4ddbb5ad1 | ||
| 
						 | 
					74bf705ea8 | ||
| 
						 | 
					676cd3a283 | ||
| 
						 | 
					c6ead3cdd3 | ||
| 
						 | 
					2d53648ce7 | ||
| 
						 | 
					64ca6ac26b | ||
| 
						 | 
					4fe4c00eca | ||
| 
						 | 
					376838a606 | ||
| 
						 | 
					d768a816aa | ||
| 
						 | 
					766e0cb7d1 | ||
| 
						 | 
					6a6b0c8b51 | ||
| 
						 | 
					e24b01cc6f | ||
| 
						 | 
					7f9ef5621a | ||
| 
						 | 
					d7fc9ffc51 | ||
| 
						 | 
					39348038df | ||
| 
						 | 
					9472baae0d | ||
| 
						 | 
					ae17b9ecd5 | ||
| 
						 | 
					74096890ba | ||
| 
						 | 
					889c2282a5 | ||
| 
						 | 
					dca30c44f5 | ||
| 
						 | 
					f2c358c6ce | ||
| 
						 | 
					2ab42de1ec | ||
| 
						 | 
					ac2024ccbf | ||
| 
						 | 
					93164a7d64 | ||
| 
						 | 
					ecff2e5ce1 | ||
| 
						 | 
					c9d630dab6 | ||
| 
						 | 
					d135906dbc | ||
| 
						 | 
					9f427a52cb | ||
| 
						 | 
					5a39d3a838 | ||
| 
						 | 
					013f3d999f | ||
| 
						 | 
					64d30d7adc | ||
| 
						 | 
					7062cb56a9 | ||
| 
						 | 
					9d57828d66 | ||
| 
						 | 
					9ed8dee71b | ||
| 
						 | 
					4692b3345d | ||
| 
						 | 
					e59fb00735 | ||
| 
						 | 
					9275853084 | ||
| 
						 | 
					0c81aa29f9 | ||
| 
						 | 
					01d2e27a2b | ||
| 
						 | 
					dd7aadf7b2 | ||
| 
						 | 
					b2fdf501c5 | ||
| 
						 | 
					345e515735 | ||
| 
						 | 
					945982b0b2 | ||
| 
						 | 
					18ad9cbd10 | ||
| 
						 | 
					f433a75569 | ||
| 
						 | 
					b05389c825 | ||
| 
						 | 
					68875fdf32 | ||
| 
						 | 
					3393e0c02c | ||
| 
						 | 
					a149b2466e | ||
| 
						 | 
					13e230d505 | ||
| 
						 | 
					80b3d7a3c9 | ||
| 
						 | 
					4bd48de60c | ||
| 
						 | 
					2eab92f8e3 | ||
| 
						 | 
					2bbd82cf24 | ||
| 
						 | 
					1bfd3d7f58 | ||
| 
						 | 
					cd77b3e88b | ||
| 
						 | 
					8c93c4dd42 | ||
| 
						 | 
					45d63a5408 | ||
| 
						 | 
					decef971f4 | ||
| 
						 | 
					a288aaefc4 | ||
| 
						 | 
					eed56c77b4 | ||
| 
						 | 
					346601bc32 | ||
| 
						 | 
					5080fbbef0 | ||
| 
						 | 
					b5b724348d | ||
| 
						 | 
					c3ee90d8ca | ||
| 
						 | 
					e1435034ae | ||
| 
						 | 
					bf35c5dc7f | ||
| 
						 | 
					c42d223ac2 | ||
| 
						 | 
					d5654d2b20 | ||
| 
						 | 
					a7508fec1a | ||
| 
						 | 
					c31945e682 | ||
| 
						 | 
					d3203b931e | ||
| 
						 | 
					947f4e90c3 | ||
| 
						 | 
					d184c7b271 | ||
| 
						 | 
					913488c066 | ||
| 
						 | 
					7fa27d9ac6 | ||
| 
						 | 
					c341b9cce5 | ||
| 
						 | 
					bbbf0d45ba | ||
| 
						 | 
					114c402d9e | ||
| 
						 | 
					d51519eba4 | ||
| 
						 | 
					e650f9988b | ||
| 
						 | 
					8ed8454115 | ||
| 
						 | 
					6e101bebb1 | ||
| 
						 | 
					4577b38d22 | ||
| 
						 | 
					a8515e2d28 | ||
| 
						 | 
					964e91052e | ||
| 
						 | 
					4e55e69bff | ||
| 
						 | 
					e501dbb658 | ||
| 
						 | 
					20e505e4b7 | ||
| 
						 | 
					291a26e6e3 | ||
| 
						 | 
					0383911887 | ||
| 
						 | 
					a5c5eb77b5 | ||
| 
						 | 
					90d02be7c5 | ||
| 
						 | 
					04221983ac | ||
| 
						 | 
					dfda027ae8 | ||
| 
						 | 
					21b5a79121 | ||
| 
						 | 
					411a388c62 | ||
| 
						 | 
					61c10d42f6 | ||
| 
						 | 
					68ecfb69a5 | ||
| 
						 | 
					e62fee8eb3 | ||
| 
						 | 
					5566d49103 | ||
| 
						 | 
					48337a4a35 | ||
| 
						 | 
					2c5c4fca14 | ||
| 
						 | 
					4fab95ed20 | ||
| 
						 | 
					6c36ca4628 | ||
| 
						 | 
					9c61c57896 | ||
| 
						 | 
					a618011ca1 | ||
| 
						 | 
					95eef4df79 | ||
| 
						 | 
					ec1e714ac1 | ||
| 
						 | 
					736d658080 | ||
| 
						 | 
					aa2920584e | ||
| 
						 | 
					9d13bfc258 | ||
| 
						 | 
					e43633011c | ||
| 
						 | 
					97027f7fb3 | ||
| 
						 | 
					bf5adc9be4 | ||
| 
						 | 
					7665b436f0 | ||
| 
						 | 
					ffca7b85c2 | ||
| 
						 | 
					eef2fa00d9 | ||
| 
						 | 
					c55551ad7c | ||
| 
						 | 
					c91b521111 | ||
| 
						 | 
					deb35e3e2c | ||
| 
						 | 
					5e2d3c9ec1 | ||
| 
						 | 
					dda454434b | ||
| 
						 | 
					b97d371ce0 | ||
| 
						 | 
					a25c98ac73 | ||
| 
						 | 
					fd47013111 | ||
| 
						 | 
					b3aa469c21 | ||
| 
						 | 
					981c0de27a | ||
| 
						 | 
					1bfe9acbbf | ||
| 
						 | 
					2d1e9ce753 | ||
| 
						 | 
					19043426b9 | ||
| 
						 | 
					6e21ce592e | ||
| 
						 | 
					975c6efbe4 | ||
| 
						 | 
					972491aece | ||
| 
						 | 
					1a8ecda3ee | ||
| 
						 | 
					d36c7b618d | ||
| 
						 | 
					251431ff4f | ||
| 
						 | 
					1a3052793e | ||
| 
						 | 
					84fbc56fd0 | ||
| 
						 | 
					4444ff7632 | ||
| 
						 | 
					7770da4b41 | ||
| 
						 | 
					7202a4d42b | ||
| 
						 | 
					3fa29765fd | ||
| 
						 | 
					b9e468c163 | ||
| 
						 | 
					0172ad2902 | ||
| 
						 | 
					d9aa352ff0 | ||
| 
						 | 
					945ba0300d | ||
| 
						 | 
					9e15cc606e | ||
| 
						 | 
					e011160f3c | ||
| 
						 | 
					9447da5065 | ||
| 
						 | 
					387ed39f6d | ||
| 
						 | 
					e50e5f9336 | ||
| 
						 | 
					6f0d9950f3 | ||
| 
						 | 
					4705ff7d6d | ||
| 
						 | 
					36778eb231 | ||
| 
						 | 
					c6dd154b3e | ||
| 
						 | 
					74b5feea7b | ||
| 
						 | 
					35cae95032 | ||
| 
						 | 
					11a36aa96f | ||
| 
						 | 
					9b0e97ae10 | ||
| 
						 | 
					02ba02604c | ||
| 
						 | 
					42ecf418f5 | ||
| 
						 | 
					48ce525d16 | ||
| 
						 | 
					3081e2ca73 | ||
| 
						 | 
					48ae85b6ff | ||
| 
						 | 
					82281ce47d | ||
| 
						 | 
					4ecd2bafbb | ||
| 
						 | 
					308b9ad8f0 | ||
| 
						 | 
					73b408c242 | ||
| 
						 | 
					51c9eb321a | ||
| 
						 | 
					1657fca2f4 | ||
| 
						 | 
					0d25aad90d | ||
| 
						 | 
					b8c1cb1c2c | ||
| 
						 | 
					6e1d44fd56 | ||
| 
						 | 
					528ff4b451 | ||
| 
						 | 
					f6c29ba3dc | ||
| 
						 | 
					160f9b5bf6 | ||
| 
						 | 
					53e7985c8d | ||
| 
						 | 
					9102342795 | ||
| 
						 | 
					c4488936b2 | ||
| 
						 | 
					4e2b990734 | ||
| 
						 | 
					6ca1418587 | ||
| 
						 | 
					30dd06812e | ||
| 
						 | 
					b29b89ef21 | ||
| 
						 | 
					81ae27d56a | ||
| 
						 | 
					f90bf72280 | ||
| 
						 | 
					abcf7aa591 | ||
| 
						 | 
					40b6d49387 | ||
| 
						 | 
					497b4f92d2 | ||
| 
						 | 
					28566b4966 | ||
| 
						 | 
					b4b15f68c0 | ||
| 
						 | 
					1eb1cf452b | ||
| 
						 | 
					c549810def | ||
| 
						 | 
					0d0ed9187a | ||
| 
						 | 
					2840dcd2a6 | ||
| 
						 | 
					a9c5de8654 | ||
| 
						 | 
					837685c522 | 
							
								
								
									
										109
									
								
								.gitignore
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										109
									
								
								.gitignore
									
									
									
									
										vendored
									
									
										Normal file
									
								
							@@ -0,0 +1,109 @@
 | 
			
		||||
# Object files
 | 
			
		||||
*.o
 | 
			
		||||
*.obj
 | 
			
		||||
 | 
			
		||||
# editor artefacts
 | 
			
		||||
*.swp
 | 
			
		||||
.#*
 | 
			
		||||
#*#
 | 
			
		||||
*~
 | 
			
		||||
 | 
			
		||||
# Top level excludes
 | 
			
		||||
/Makefile.bak
 | 
			
		||||
/Makefile
 | 
			
		||||
/*.a
 | 
			
		||||
/include
 | 
			
		||||
/*.pc
 | 
			
		||||
/rehash.time
 | 
			
		||||
 | 
			
		||||
# Most *.c files under test/ are symlinks
 | 
			
		||||
/test/*.c
 | 
			
		||||
# Apart from these
 | 
			
		||||
!/test/asn1test.c
 | 
			
		||||
!/test/methtest.c
 | 
			
		||||
!/test/dummytest.c
 | 
			
		||||
!/test/igetest.c
 | 
			
		||||
!/test/r160test.c
 | 
			
		||||
!/test/fips_algvs.c
 | 
			
		||||
 | 
			
		||||
/test/*.ss
 | 
			
		||||
/test/*.srl
 | 
			
		||||
/test/.rnd
 | 
			
		||||
/test/test*.pem
 | 
			
		||||
/test/newkey.pem
 | 
			
		||||
 | 
			
		||||
# Certificate symbolic links
 | 
			
		||||
*.0
 | 
			
		||||
 | 
			
		||||
# Links under apps
 | 
			
		||||
/apps/CA.pl
 | 
			
		||||
/apps/md4.c
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
# Auto generated headers
 | 
			
		||||
/crypto/buildinf.h
 | 
			
		||||
/crypto/opensslconf.h
 | 
			
		||||
 | 
			
		||||
# Auto generated assembly language source files
 | 
			
		||||
*.s
 | 
			
		||||
!/crypto/bn/asm/pa-risc2.s
 | 
			
		||||
!/crypto/bn/asm/pa-risc2W.s
 | 
			
		||||
crypto/aes/asm/a_win32.asm
 | 
			
		||||
crypto/bf/asm/b_win32.asm
 | 
			
		||||
crypto/bn/asm/bn_win32.asm
 | 
			
		||||
crypto/bn/asm/co_win32.asm
 | 
			
		||||
crypto/bn/asm/mt_win32.asm
 | 
			
		||||
crypto/cast/asm/c_win32.asm
 | 
			
		||||
crypto/cpu_win32.asm
 | 
			
		||||
crypto/des/asm/d_win32.asm
 | 
			
		||||
crypto/des/asm/y_win32.asm
 | 
			
		||||
crypto/md5/asm/m5_win32.asm
 | 
			
		||||
crypto/rc4/asm/r4_win32.asm
 | 
			
		||||
crypto/rc5/asm/r5_win32.asm
 | 
			
		||||
crypto/ripemd/asm/rm_win32.asm
 | 
			
		||||
crypto/sha/asm/s1_win32.asm
 | 
			
		||||
crypto/sha/asm/sha512-sse2.asm
 | 
			
		||||
 | 
			
		||||
# Executables
 | 
			
		||||
/apps/openssl
 | 
			
		||||
/test/sha256t
 | 
			
		||||
/test/sha512t
 | 
			
		||||
/test/*test
 | 
			
		||||
/test/fips_aesavs
 | 
			
		||||
/test/fips_desmovs
 | 
			
		||||
/test/fips_dhvs
 | 
			
		||||
/test/fips_drbgvs
 | 
			
		||||
/test/fips_dssvs
 | 
			
		||||
/test/fips_ecdhvs
 | 
			
		||||
/test/fips_ecdsavs
 | 
			
		||||
/test/fips_rngvs
 | 
			
		||||
/test/fips_test_suite
 | 
			
		||||
*.so*
 | 
			
		||||
*.dylib*
 | 
			
		||||
*.dll*
 | 
			
		||||
# Exceptions
 | 
			
		||||
!/test/bctest
 | 
			
		||||
!/crypto/des/times/486-50.sol
 | 
			
		||||
 | 
			
		||||
# Misc auto generated files
 | 
			
		||||
/tools/c_rehash
 | 
			
		||||
/test/evptests.txt
 | 
			
		||||
lib
 | 
			
		||||
Makefile.save
 | 
			
		||||
*.bak
 | 
			
		||||
tags
 | 
			
		||||
TAGS
 | 
			
		||||
 | 
			
		||||
# Windows
 | 
			
		||||
/tmp32dll
 | 
			
		||||
/tmp32dll.dbg
 | 
			
		||||
/out32dll
 | 
			
		||||
/out32dll.dbg
 | 
			
		||||
/inc32
 | 
			
		||||
/MINFO
 | 
			
		||||
ms/bcb.mak
 | 
			
		||||
ms/libeay32.def
 | 
			
		||||
ms/nt.mak
 | 
			
		||||
ms/ntdll.mak
 | 
			
		||||
ms/ssleay32.def
 | 
			
		||||
ms/version32.rc
 | 
			
		||||
@@ -10,13 +10,18 @@ OpenSSL project.
 | 
			
		||||
We would like to identify and thank the following such sponsors for their past
 | 
			
		||||
or current significant support of the OpenSSL project:
 | 
			
		||||
 | 
			
		||||
Major support:
 | 
			
		||||
 | 
			
		||||
	Qualys		http://www.qualys.com/
 | 
			
		||||
 | 
			
		||||
Very significant support:
 | 
			
		||||
 | 
			
		||||
	OpenGear: www.opengear.com
 | 
			
		||||
	OpenGear:	http://www.opengear.com/
 | 
			
		||||
 | 
			
		||||
Significant support:
 | 
			
		||||
 | 
			
		||||
	PSW Group: www.psw.net
 | 
			
		||||
	PSW Group:	http://www.psw.net/
 | 
			
		||||
	Acano Ltd.	http://acano.com/
 | 
			
		||||
 | 
			
		||||
Please note that we ask permission to identify sponsors and that some sponsors
 | 
			
		||||
we consider eligible for inclusion here have requested to remain anonymous.
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										269
									
								
								Configure
									
									
									
									
									
								
							
							
						
						
									
										269
									
								
								Configure
									
									
									
									
									
								
							@@ -10,7 +10,7 @@ use strict;
 | 
			
		||||
 | 
			
		||||
# see INSTALL for instructions.
 | 
			
		||||
 | 
			
		||||
my $usage="Usage: Configure [no-<cipher> ...] [enable-<cipher> ...] [experimental-<cipher> ...] [-Dxxx] [-lxxx] [-Lxxx] [-fxxx] [-Kxxx] [no-hw-xxx|no-hw] [[no-]threads] [[no-]shared] [[no-]zlib|zlib-dynamic] [no-asm] [no-dso] [no-krb5] [386] [--prefix=DIR] [--openssldir=OPENSSLDIR] [--with-xxx[=vvv]] [--test-sanity] os/compiler[:flags]\n";
 | 
			
		||||
my $usage="Usage: Configure [no-<cipher> ...] [enable-<cipher> ...] [experimental-<cipher> ...] [-Dxxx] [-lxxx] [-Lxxx] [-fxxx] [-Kxxx] [no-hw-xxx|no-hw] [[no-]threads] [[no-]shared] [[no-]zlib|zlib-dynamic] [no-asm] [no-dso] [no-krb5] [sctp] [386] [--prefix=DIR] [--openssldir=OPENSSLDIR] [--with-xxx[=vvv]] [--test-sanity] os/compiler[:flags]\n";
 | 
			
		||||
 | 
			
		||||
# Options:
 | 
			
		||||
#
 | 
			
		||||
@@ -56,6 +56,7 @@ my $usage="Usage: Configure [no-<cipher> ...] [enable-<cipher> ...] [experimenta
 | 
			
		||||
# [no-]zlib     [don't] compile support for zlib compression.
 | 
			
		||||
# zlib-dynamic	Like "zlib", but the zlib library is expected to be a shared
 | 
			
		||||
#		library and will be loaded in run-time by the OpenSSL library.
 | 
			
		||||
# sctp          include SCTP support
 | 
			
		||||
# 386           generate 80386 code
 | 
			
		||||
# no-sse2	disables IA-32 SSE2 code, above option implies no-sse2
 | 
			
		||||
# no-<cipher>   build without specified algorithm (rsa, idea, rc5, ...)
 | 
			
		||||
@@ -123,21 +124,24 @@ my $tlib="-lnsl -lsocket";
 | 
			
		||||
my $bits1="THIRTY_TWO_BIT ";
 | 
			
		||||
my $bits2="SIXTY_FOUR_BIT ";
 | 
			
		||||
 | 
			
		||||
my $x86_asm="x86cpuid.o:bn-586.o co-586.o x86-mont.o:des-586.o crypt586.o:aes-586.o:bf-586.o:md5-586.o:sha1-586.o sha256-586.o sha512-586.o:cast-586.o:rc4-586.o:rmd-586.o:rc5-586.o:wp_block.o wp-mmx.o:cmll-x86.o";
 | 
			
		||||
my $x86_asm="x86cpuid.o:bn-586.o co-586.o x86-mont.o x86-gf2m.o:des-586.o crypt586.o:aes-586.o vpaes-x86.o aesni-x86.o:bf-586.o:md5-586.o:sha1-586.o sha256-586.o sha512-586.o:cast-586.o:rc4-586.o:rmd-586.o:rc5-586.o:wp_block.o wp-mmx.o:cmll-x86.o:ghash-x86.o:";
 | 
			
		||||
 | 
			
		||||
my $x86_elf_asm="$x86_asm:elf";
 | 
			
		||||
 | 
			
		||||
my $x86_64_asm="x86_64cpuid.o:x86_64-gcc.o x86_64-mont.o::aes-x86_64.o::md5-x86_64.o:sha1-x86_64.o sha256-x86_64.o sha512-x86_64.o::rc4-x86_64.o:::wp-x86_64.o:cmll-x86_64.o cmll_misc.o";
 | 
			
		||||
my $ia64_asm="ia64cpuid.o:bn-ia64.o::aes_core.o aes_cbc.o aes-ia64.o::md5-ia64.o:sha1-ia64.o sha256-ia64.o sha512-ia64.o::rc4-ia64.o rc4_skey.o:::::void";
 | 
			
		||||
my $sparcv9_asm="sparcv9cap.o sparccpuid.o:bn-sparcv9.o sparcv9-mont.o sparcv9a-mont.o:des_enc-sparc.o fcrypt_b.o:aes_core.o aes_cbc.o aes-sparcv9.o:::sha1-sparcv9.o sha256-sparcv9.o sha512-sparcv9.o:::::::void";
 | 
			
		||||
my $sparcv8_asm=":sparcv8.o:des_enc-sparc.o fcrypt_b.o:::::::::::void";
 | 
			
		||||
my $alpha_asm="alphacpuid.o:bn_asm.o alpha-mont.o::::::::::::void";
 | 
			
		||||
my $mips3_asm=":bn-mips3.o::::::::::::void";
 | 
			
		||||
my $s390x_asm="s390xcap.o s390xcpuid.o:bn-s390x.o s390x-mont.o::aes-s390x.o:::sha1-s390x.o sha256-s390x.o sha512-s390x.o::rc4-s390x.o:::::void";
 | 
			
		||||
my $armv4_asm=":bn_asm.o armv4-mont.o::aes_cbc.o aes-armv4.o:::sha1-armv4-large.o sha256-armv4.o sha512-armv4.o:::::::void";
 | 
			
		||||
my $ppc32_asm="ppccpuid.o:bn-ppc.o::aes_core.o aes_cbc.o aes-ppc.o:::sha1-ppc.o sha256-ppc.o::::::";
 | 
			
		||||
my $ppc64_asm="ppccpuid.o:bn-ppc.o ppc-mont.o::aes_core.o aes_cbc.o aes-ppc.o:::sha1-ppc.o sha256-ppc.o sha512-ppc.o::::::";
 | 
			
		||||
my $no_asm=":::::::::::::void";
 | 
			
		||||
my $x86_64_asm="x86_64cpuid.o:x86_64-gcc.o x86_64-mont.o x86_64-mont5.o x86_64-gf2m.o modexp512-x86_64.o::aes-x86_64.o vpaes-x86_64.o bsaes-x86_64.o aesni-x86_64.o aesni-sha1-x86_64.o::md5-x86_64.o:sha1-x86_64.o sha256-x86_64.o sha512-x86_64.o::rc4-x86_64.o rc4-md5-x86_64.o:::wp-x86_64.o:cmll-x86_64.o cmll_misc.o:ghash-x86_64.o:";
 | 
			
		||||
my $ia64_asm="ia64cpuid.o:bn-ia64.o ia64-mont.o::aes_core.o aes_cbc.o aes-ia64.o::md5-ia64.o:sha1-ia64.o sha256-ia64.o sha512-ia64.o::rc4-ia64.o rc4_skey.o:::::ghash-ia64.o::void";
 | 
			
		||||
my $sparcv9_asm="sparcv9cap.o sparccpuid.o:bn-sparcv9.o sparcv9-mont.o sparcv9a-mont.o:des_enc-sparc.o fcrypt_b.o:aes_core.o aes_cbc.o aes-sparcv9.o:::sha1-sparcv9.o sha256-sparcv9.o sha512-sparcv9.o:::::::ghash-sparcv9.o::void";
 | 
			
		||||
my $sparcv8_asm=":sparcv8.o:des_enc-sparc.o fcrypt_b.o:::::::::::::void";
 | 
			
		||||
my $alpha_asm="alphacpuid.o:bn_asm.o alpha-mont.o:::::sha1-alpha.o:::::::ghash-alpha.o::void";
 | 
			
		||||
my $mips32_asm=":bn-mips.o::aes_cbc.o aes-mips.o:::sha1-mips.o sha256-mips.o::::::::";
 | 
			
		||||
my $mips64_asm=":bn-mips.o mips-mont.o::aes_cbc.o aes-mips.o:::sha1-mips.o sha256-mips.o sha512-mips.o::::::::";
 | 
			
		||||
my $s390x_asm="s390xcap.o s390xcpuid.o:bn-s390x.o s390x-mont.o s390x-gf2m.o::aes-s390x.o aes-ctr.o aes-xts.o:::sha1-s390x.o sha256-s390x.o sha512-s390x.o::rc4-s390x.o:::::ghash-s390x.o:";
 | 
			
		||||
my $armv4_asm="armcap.o armv4cpuid.o:bn_asm.o armv4-mont.o armv4-gf2m.o::aes_cbc.o aes-armv4.o:::sha1-armv4-large.o sha256-armv4.o sha512-armv4.o:::::::ghash-armv4.o::void";
 | 
			
		||||
my $parisc11_asm="pariscid.o:bn_asm.o parisc-mont.o::aes_core.o aes_cbc.o aes-parisc.o:::sha1-parisc.o sha256-parisc.o sha512-parisc.o::rc4-parisc.o:::::ghash-parisc.o::32";
 | 
			
		||||
my $parisc20_asm="pariscid.o:pa-risc2W.o parisc-mont.o::aes_core.o aes_cbc.o aes-parisc.o:::sha1-parisc.o sha256-parisc.o sha512-parisc.o::rc4-parisc.o:::::ghash-parisc.o::64";
 | 
			
		||||
my $ppc32_asm="ppccpuid.o ppccap.o:bn-ppc.o ppc-mont.o ppc64-mont.o::aes_core.o aes_cbc.o aes-ppc.o:::sha1-ppc.o sha256-ppc.o::::::::";
 | 
			
		||||
my $ppc64_asm="ppccpuid.o ppccap.o:bn-ppc.o ppc-mont.o ppc64-mont.o::aes_core.o aes_cbc.o aes-ppc.o:::sha1-ppc.o sha256-ppc.o sha512-ppc.o::::::::";
 | 
			
		||||
my $no_asm=":::::::::::::::void";
 | 
			
		||||
 | 
			
		||||
# As for $BSDthreads. Idea is to maintain "collective" set of flags,
 | 
			
		||||
# which would cover all BSD flavors. -pthread applies to them all, 
 | 
			
		||||
@@ -148,7 +152,7 @@ my $no_asm=":::::::::::::void";
 | 
			
		||||
# seems to be sufficient?
 | 
			
		||||
my $BSDthreads="-pthread -D_THREAD_SAFE -D_REENTRANT";
 | 
			
		||||
 | 
			
		||||
#config-string	$cc : $cflags : $unistd : $thread_cflag : $sys_id : $lflags : $bn_ops : $cpuid_obj : $bn_obj : $des_obj : $aes_obj : $bf_obj : $md5_obj : $sha1_obj : $cast_obj : $rc4_obj : $rmd160_obj : $rc5_obj : $wp_obj : $cmll_obj : $dso_scheme : $shared_target : $shared_cflag : $shared_ldflag : $shared_extension : $ranlib : $arflags : $multilib
 | 
			
		||||
#config-string	$cc : $cflags : $unistd : $thread_cflag : $sys_id : $lflags : $bn_ops : $cpuid_obj : $bn_obj : $des_obj : $aes_obj : $bf_obj : $md5_obj : $sha1_obj : $cast_obj : $rc4_obj : $rmd160_obj : $rc5_obj : $wp_obj : $cmll_obj : $modes_obj : $engines_obj : $dso_scheme : $shared_target : $shared_cflag : $shared_ldflag : $shared_extension : $ranlib : $arflags : $multilib
 | 
			
		||||
 | 
			
		||||
my %table=(
 | 
			
		||||
# File 'TABLE' (created by 'make TABLE') contains the data from this list,
 | 
			
		||||
@@ -163,32 +167,36 @@ my %table=(
 | 
			
		||||
# Our development configs
 | 
			
		||||
"purify",	"purify gcc:-g -DPURIFY -Wall::(unknown)::-lsocket -lnsl::::",
 | 
			
		||||
"debug",	"gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG -DOPENSSL_NO_ASM -ggdb -g2 -Wformat -Wshadow -Wmissing-prototypes -Wmissing-declarations -Werror::(unknown)::-lefence::::",
 | 
			
		||||
"debug-ben",	"gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG -DPEDANTIC -DDEBUG_SAFESTACK -DDEBUG_UNUSED -O2 -pedantic -Wall -Wshadow -Werror -pipe::(unknown):::::bn86-elf.o co86-elf.o",
 | 
			
		||||
"debug-ben",	"gcc:$gcc_devteam_warn -DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG -DDEBUG_SAFESTACK -O2 -pipe::(unknown):::::",
 | 
			
		||||
"debug-ben-openbsd","gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG -DPEDANTIC -DDEBUG_SAFESTACK -DOPENSSL_OPENBSD_DEV_CRYPTO -DOPENSSL_NO_ASM -O2 -pedantic -Wall -Wshadow -Werror -pipe::(unknown)::::",
 | 
			
		||||
"debug-ben-openbsd-debug","gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG -DPEDANTIC -DDEBUG_SAFESTACK -DOPENSSL_OPENBSD_DEV_CRYPTO -DOPENSSL_NO_ASM -g3 -O2 -pedantic -Wall -Wshadow -Werror -pipe::(unknown)::::",
 | 
			
		||||
"debug-ben-debug",	"gcc44:$gcc_devteam_warn -DBN_DEBUG -DCONF_DEBUG -DDEBUG_SAFESTACK -DDEBUG_UNUSED -g3 -O2 -pipe::(unknown)::::::",
 | 
			
		||||
"debug-ben-debug-64",	"gcc:$gcc_devteam_warn -Wno-error=overlength-strings -DBN_DEBUG -DCONF_DEBUG -DDEBUG_SAFESTACK -DDEBUG_UNUSED -g3 -O3 -pipe::${BSDthreads}:::SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_UNROLL:${x86_64_asm}:elf:dlfcn:bsd-gcc-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-ben-macos",	"cc:$gcc_devteam_warn -arch i386 -DBN_DEBUG -DCONF_DEBUG -DDEBUG_SAFESTACK -DDEBUG_UNUSED -DOPENSSL_THREADS -D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -O3 -DL_ENDIAN -g3 -pipe::(unknown)::-Wl,-search_paths_first::::",
 | 
			
		||||
"debug-ben-macos-gcc46",	"gcc-mp-4.6:$gcc_devteam_warn -Wconversion -DBN_DEBUG -DCONF_DEBUG -DDEBUG_SAFESTACK -DDEBUG_UNUSED -DOPENSSL_THREADS -D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -O3 -DL_ENDIAN -g3 -pipe::(unknown)::::::",
 | 
			
		||||
"debug-ben-darwin64","cc:$gcc_devteam_warn -Wno-language-extension-token -Wno-extended-offsetof -arch x86_64 -O3 -DL_ENDIAN -Wall::-D_REENTRANT:MACOSX:-Wl,-search_paths_first%:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL:".eval{my $asm=$x86_64_asm;$asm=~s/rc4\-[^:]+//;$asm}.":macosx:dlfcn:darwin-shared:-fPIC -fno-common:-arch x86_64 -dynamiclib:.\$(SHLIB_MAJOR).\$(SHLIB_MINOR).dylib",
 | 
			
		||||
"debug-ben-no-opt",	"gcc: -Wall -Wmissing-prototypes -Wstrict-prototypes -Wmissing-declarations -DDEBUG_SAFESTACK -DCRYPTO_MDEBUG -Werror -DL_ENDIAN -DTERMIOS -Wall -g3::(unknown)::::::",
 | 
			
		||||
"debug-ben-strict",	"gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG -DCONST_STRICT -O2 -Wall -Wshadow -Werror -Wpointer-arith -Wcast-qual -Wwrite-strings -pipe::(unknown)::::::",
 | 
			
		||||
"debug-rse","cc:-DTERMIOS -DL_ENDIAN -pipe -O -g -ggdb3 -Wall::(unknown):::BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}",
 | 
			
		||||
"debug-bodo",	"gcc:-DL_ENDIAN -DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DBIO_PAIR_DEBUG -DPEDANTIC -g -march=i486 -pedantic -Wshadow -Wall -Wcast-align -Wstrict-prototypes -Wmissing-prototypes -Wno-long-long -Wundef -Wconversion::-D_REENTRANT:::BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}",
 | 
			
		||||
"debug-bodo",	"gcc:$gcc_devteam_warn -Wno-error=overlength-strings -DBN_DEBUG -DBN_DEBUG_RAND -DCONF_DEBUG -DBIO_PAIR_DEBUG -m64 -DL_ENDIAN -DTERMIO -g -DMD32_REG_T=int::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_UNROLL:${x86_64_asm}:elf:dlfcn:linux-shared:-fPIC:-m64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::64",
 | 
			
		||||
"debug-ulf", "gcc:-DTERMIOS -DL_ENDIAN -march=i486 -Wall -DBN_DEBUG -DBN_DEBUG_RAND -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG -DOPENSSL_NO_ASM -g -Wformat -Wshadow -Wmissing-prototypes -Wmissing-declarations:::CYGWIN32:::${no_asm}:win32:cygwin-shared:::.dll",
 | 
			
		||||
"debug-steve64", "gcc:$gcc_devteam_warn -m64 -DL_ENDIAN -DTERMIO -DCONF_DEBUG -DDEBUG_SAFESTACK -g -DMD32_REG_T=int::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_UNROLL:${x86_64_asm}:elf:dlfcn:linux-shared:-fPIC:-m64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-steve64", "gcc:$gcc_devteam_warn -m64 -DL_ENDIAN -DTERMIO -DCONF_DEBUG -DDEBUG_SAFESTACK -Wno-overlength-strings -g::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_UNROLL:${x86_64_asm}:elf:dlfcn:linux-shared:-fPIC:-m64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-steve32", "gcc:$gcc_devteam_warn -m32 -DL_ENDIAN -DCONF_DEBUG -DDEBUG_SAFESTACK -g -pipe::-D_REENTRANT::-rdynamic -ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn:linux-shared:-fPIC:-m32:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-steve-opt", "gcc:$gcc_devteam_warn -m64 -O3 -DL_ENDIAN -DTERMIO -DCONF_DEBUG -DDEBUG_SAFESTACK -g -DMD32_REG_T=int::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_UNROLL:${x86_64_asm}:elf:dlfcn:linux-shared:-fPIC:-m64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-levitte-linux-elf","gcc:-DLEVITTE_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_DEBUG -DBN_DEBUG_RAND -DCRYPTO_MDEBUG -DENGINE_CONF_DEBUG -DL_ENDIAN -DTERMIO -D_POSIX_SOURCE -DPEDANTIC -ggdb -g3 -mcpu=i486 -pedantic -ansi -Wall -Wshadow -Wcast-align -Wstrict-prototypes -Wmissing-prototypes -Wno-long-long -Wundef -Wconversion -pipe::-D_REENTRANT::-ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-levitte-linux-noasm","gcc:-DLEVITTE_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_DEBUG -DBN_DEBUG_RAND -DCRYPTO_MDEBUG -DENGINE_CONF_DEBUG -DOPENSSL_NO_ASM -DL_ENDIAN -DTERMIO -D_POSIX_SOURCE -DPEDANTIC -ggdb -g3 -mcpu=i486 -pedantic -ansi -Wall -Wshadow -Wcast-align -Wstrict-prototypes -Wmissing-prototypes -Wno-long-long -Wundef -Wconversion -pipe::-D_REENTRANT::-ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${no_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-levitte-linux-elf-extreme","gcc:-DLEVITTE_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_DEBUG -DBN_DEBUG_RAND -DCRYPTO_MDEBUG -DENGINE_CONF_DEBUG -DL_ENDIAN -DTERMIO -D_POSIX_SOURCE -DPEDANTIC -ggdb -g3 -mcpu=i486 -pedantic -ansi -Wall -W -Wundef -Wshadow -Wcast-align -Wstrict-prototypes -Wmissing-prototypes -Wno-long-long -Wundef -Wconversion -pipe::-D_REENTRANT::-ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-levitte-linux-noasm-extreme","gcc:-DLEVITTE_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_DEBUG -DBN_DEBUG_RAND -DCRYPTO_MDEBUG -DENGINE_CONF_DEBUG -DOPENSSL_NO_ASM -DL_ENDIAN -DTERMIO -D_POSIX_SOURCE -DPEDANTIC -ggdb -g3 -mcpu=i486 -pedantic -ansi -Wall -W -Wundef -Wshadow -Wcast-align -Wstrict-prototypes -Wmissing-prototypes -Wno-long-long -Wundef -Wconversion -pipe::-D_REENTRANT::-ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${no_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-geoff32","gcc:-DBN_DEBUG -DBN_DEBUG_RAND -DBN_STRICT -DPURIFY -DOPENSSL_NO_DEPRECATED -DOPENSSL_NO_ASM -DOPENSSL_NO_INLINE_ASM -DL_ENDIAN -DTERMIO -DPEDANTIC -DMD32_REG_T=int -O1 -ggdb2 -Wall -Werror -Wundef -pedantic -Wshadow -Wpointer-arith -Wbad-function-cast -Wcast-align -Wsign-compare -Wmissing-prototypes -Wmissing-declarations -Wno-long-long::-D_REENTRANT::-ldl:BN_LLONG:${no_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-geoff64","gcc:-DBN_DEBUG -DBN_DEBUG_RAND -DBN_STRICT -DPURIFY -DOPENSSL_NO_DEPRECATED -DOPENSSL_NO_ASM -DOPENSSL_NO_INLINE_ASM -DL_ENDIAN -DTERMIO -DPEDANTIC -DMD32_REG_T=int -O1 -ggdb2 -Wall -Werror -Wundef -pedantic -Wshadow -Wpointer-arith -Wbad-function-cast -Wcast-align -Wsign-compare -Wmissing-prototypes -Wmissing-declarations -Wno-long-long::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL BF_PTR:${no_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-steve-opt", "gcc:$gcc_devteam_warn -m64 -O3 -DL_ENDIAN -DTERMIO -DCONF_DEBUG -DDEBUG_SAFESTACK -g::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_UNROLL:${x86_64_asm}:elf:dlfcn:linux-shared:-fPIC:-m64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-levitte-linux-elf","gcc:-DLEVITTE_DEBUG -DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DCRYPTO_MDEBUG -DL_ENDIAN -ggdb -g3 -Wall::-D_REENTRANT::-ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-levitte-linux-noasm","gcc:-DLEVITTE_DEBUG -DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DCRYPTO_MDEBUG -DOPENSSL_NO_ASM -DL_ENDIAN -ggdb -g3 -Wall::-D_REENTRANT::-ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${no_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-levitte-linux-elf-extreme","gcc:-DLEVITTE_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_DEBUG -DBN_DEBUG_RAND -DCRYPTO_MDEBUG -DENGINE_CONF_DEBUG -DL_ENDIAN -DTERMIO -DPEDANTIC -ggdb -g3 -pedantic -ansi -Wall -W -Wundef -Wshadow -Wcast-align -Wstrict-prototypes -Wmissing-prototypes -Wno-long-long -Wundef -Wconversion -pipe::-D_REENTRANT::-ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-levitte-linux-noasm-extreme","gcc:-DLEVITTE_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_DEBUG -DBN_DEBUG_RAND -DCRYPTO_MDEBUG -DENGINE_CONF_DEBUG -DOPENSSL_NO_ASM -DL_ENDIAN -DTERMIO -DPEDANTIC -ggdb -g3 -pedantic -ansi -Wall -W -Wundef -Wshadow -Wcast-align -Wstrict-prototypes -Wmissing-prototypes -Wno-long-long -Wundef -Wconversion -pipe::-D_REENTRANT::-ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${no_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-geoff32","gcc:-DBN_DEBUG -DBN_DEBUG_RAND -DBN_STRICT -DPURIFY -DOPENSSL_NO_DEPRECATED -DOPENSSL_NO_ASM -DOPENSSL_NO_INLINE_ASM -DL_ENDIAN -DTERMIO -DPEDANTIC -O1 -ggdb2 -Wall -Werror -Wundef -pedantic -Wshadow -Wpointer-arith -Wbad-function-cast -Wcast-align -Wsign-compare -Wmissing-prototypes -Wmissing-declarations -Wno-long-long::-D_REENTRANT::-ldl:BN_LLONG:${no_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-geoff64","gcc:-DBN_DEBUG -DBN_DEBUG_RAND -DBN_STRICT -DPURIFY -DOPENSSL_NO_DEPRECATED -DOPENSSL_NO_ASM -DOPENSSL_NO_INLINE_ASM -DL_ENDIAN -DTERMIO -DPEDANTIC -O1 -ggdb2 -Wall -Werror -Wundef -pedantic -Wshadow -Wpointer-arith -Wbad-function-cast -Wcast-align -Wsign-compare -Wmissing-prototypes -Wmissing-declarations -Wno-long-long::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL BF_PTR:${no_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-linux-pentium","gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG -DL_ENDIAN -DTERMIO -g -mcpu=pentium -Wall::-D_REENTRANT::-ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn",
 | 
			
		||||
"debug-linux-ppro","gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG -DL_ENDIAN -DTERMIO -g -mcpu=pentiumpro -Wall::-D_REENTRANT::-ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn",
 | 
			
		||||
"debug-linux-elf","gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG -DL_ENDIAN -DTERMIO -g -march=i486 -Wall::-D_REENTRANT::-lefence -ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-linux-elf-noefence","gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG -DL_ENDIAN -DTERMIO -g -march=i486 -Wall::-D_REENTRANT::-ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-linux-ia32-aes", "gcc:-DAES_EXPERIMENTAL -DL_ENDIAN -DTERMIO -O3 -fomit-frame-pointer -Wall::-D_REENTRANT::-ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:x86cpuid.o:bn-586.o co-586.o x86-mont.o:des-586.o crypt586.o:aes_x86core.o aes_cbc.o:bf-586.o:md5-586.o:sha1-586.o sha256-586.o sha512-586.o:cast-586.o:rc4-586.o:rmd-586.o:rc5-586.o:wp_block.o wp-mmx.o::elf:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-linux-ia32-aes", "gcc:-DAES_EXPERIMENTAL -DL_ENDIAN -DTERMIO -O3 -fomit-frame-pointer -Wall::-D_REENTRANT::-ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:x86cpuid.o:bn-586.o co-586.o x86-mont.o:des-586.o crypt586.o:aes_x86core.o aes_cbc.o aesni-x86.o:bf-586.o:md5-586.o:sha1-586.o sha256-586.o sha512-586.o:cast-586.o:rc4-586.o:rmd-586.o:rc5-586.o:wp_block.o wp-mmx.o::ghash-x86.o::elf:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-linux-generic32","gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DCRYPTO_MDEBUG -DTERMIO -g -Wall::-D_REENTRANT::-ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL BF_PTR:${no_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-linux-generic64","gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DCRYPTO_MDEBUG -DTERMIO -g -Wall::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL BF_PTR:${no_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-linux-x86_64",	"gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DCRYPTO_MDEBUG -m64 -DL_ENDIAN -DTERMIO -g -Wall -DMD32_REG_T=int::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_UNROLL:${x86_64_asm}:elf:dlfcn:linux-shared:-fPIC:-m64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::64",
 | 
			
		||||
"debug-linux-x86_64","gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DCRYPTO_MDEBUG -m64 -DL_ENDIAN -DTERMIO -g -Wall::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_UNROLL:${x86_64_asm}:elf:dlfcn:linux-shared:-fPIC:-m64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::64",
 | 
			
		||||
"dist",		"cc:-O::(unknown)::::::",
 | 
			
		||||
 | 
			
		||||
# Basic configs that should work on any (32 and less bit) box
 | 
			
		||||
@@ -214,7 +222,7 @@ my %table=(
 | 
			
		||||
# actually recommend to consider using gcc shared build even with vendor
 | 
			
		||||
# compiler:-)
 | 
			
		||||
#						<appro@fy.chalmers.se>
 | 
			
		||||
"solaris64-x86_64-gcc","gcc:-m64 -O3 -Wall -DL_ENDIAN -DMD32_REG_T=int::-D_REENTRANT::-lsocket -lnsl -ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_UNROLL:${x86_64_asm}:elf:dlfcn:solaris-shared:-fPIC:-m64 -shared -static-libgcc:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::/64",
 | 
			
		||||
"solaris64-x86_64-gcc","gcc:-m64 -O3 -Wall -DL_ENDIAN::-D_REENTRANT::-lsocket -lnsl -ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_UNROLL:${x86_64_asm}:elf:dlfcn:solaris-shared:-fPIC:-m64 -shared -static-libgcc:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::/64",
 | 
			
		||||
 
 | 
			
		||||
#### Solaris x86 with Sun C setups
 | 
			
		||||
"solaris-x86-cc","cc:-fast -O -Xa::-D_REENTRANT::-lsocket -lnsl -ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_PTR DES_UNROLL BF_PTR:${no_asm}:dlfcn:solaris-shared:-KPIC:-G -dy -z text:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
@@ -237,7 +245,7 @@ my %table=(
 | 
			
		||||
"solaris-sparcv7-cc","cc:-xO5 -xstrconst -xdepend -Xa -DB_ENDIAN -DBN_DIV2W::-D_REENTRANT::-lsocket -lnsl -ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_PTR DES_RISC1 DES_UNROLL BF_PTR:${no_asm}:dlfcn:solaris-shared:-KPIC:-G -dy -z text:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"solaris-sparcv8-cc","cc:-xarch=v8 -xO5 -xstrconst -xdepend -Xa -DB_ENDIAN -DBN_DIV2W::-D_REENTRANT::-lsocket -lnsl -ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_PTR DES_RISC1 DES_UNROLL BF_PTR:${sparcv8_asm}:dlfcn:solaris-shared:-KPIC:-G -dy -z text:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"solaris-sparcv9-cc","cc:-xtarget=ultra -xarch=v8plus -xO5 -xstrconst -xdepend -Xa -DB_ENDIAN -DBN_DIV2W::-D_REENTRANT:ULTRASPARC:-lsocket -lnsl -ldl:BN_LLONG RC4_CHAR RC4_CHUNK_LL DES_PTR DES_RISC1 DES_UNROLL BF_PTR:${sparcv9_asm}:dlfcn:solaris-shared:-KPIC:-G -dy -z text:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"solaris64-sparcv9-cc","cc:-xtarget=ultra -xarch=v9 -xO5 -xstrconst -xdepend -Xa -DB_ENDIAN::-D_REENTRANT:ULTRASPARC:-lsocket -lnsl -ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_INT DES_PTR DES_RISC1 DES_UNROLL BF_PTR:${sparcv9_asm}:dlfcn:solaris-shared:-KPIC:-xarch=v9 -G -dy -z text:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):/usr/ccs/bin/ar rs::/64",
 | 
			
		||||
"solaris64-sparcv9-cc","cc:-xtarget=ultra -xarch=v9 -xO5 -xstrconst -xdepend -Xa -DB_ENDIAN::-D_REENTRANT:ULTRASPARC:-lsocket -lnsl -ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_INT DES_PTR DES_RISC1 DES_UNROLL BF_PTR:${sparcv9_asm}:dlfcn:solaris-shared:-KPIC:-xarch=v9 -G -dy -z text:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::/64",
 | 
			
		||||
####
 | 
			
		||||
"debug-solaris-sparcv8-cc","cc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG_ALL -xarch=v8 -g -O -xstrconst -Xa -DB_ENDIAN -DBN_DIV2W::-D_REENTRANT::-lsocket -lnsl -ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_PTR DES_RISC1 DES_UNROLL BF_PTR:${sparcv8_asm}:dlfcn:solaris-shared:-KPIC:-G -dy -z text:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-solaris-sparcv9-cc","cc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG_ALL -xtarget=ultra -xarch=v8plus -g -O -xstrconst -Xa -DB_ENDIAN -DBN_DIV2W::-D_REENTRANT:ULTRASPARC:-lsocket -lnsl -ldl:BN_LLONG RC4_CHAR RC4_CHUNK_LL DES_PTR DES_RISC1 DES_UNROLL BF_PTR:${sparcv9_asm}:dlfcn:solaris-shared:-KPIC:-G -dy -z text:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)", 
 | 
			
		||||
@@ -248,16 +256,16 @@ my %table=(
 | 
			
		||||
 | 
			
		||||
#### IRIX 5.x configs
 | 
			
		||||
# -mips2 flag is added by ./config when appropriate.
 | 
			
		||||
"irix-gcc","gcc:-O3 -DTERMIOS -DB_ENDIAN::(unknown):::BN_LLONG MD2_CHAR RC4_INDEX RC4_CHAR RC4_CHUNK DES_UNROLL DES_RISC2 DES_PTR BF_PTR:${no_asm}:dlfcn:irix-shared:::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"irix-cc", "cc:-O2 -use_readonly_const -DTERMIOS -DB_ENDIAN::(unknown):::BN_LLONG RC4_CHAR RC4_CHUNK DES_PTR DES_RISC2 DES_UNROLL BF_PTR:${no_asm}:dlfcn:irix-shared:::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"irix-gcc","gcc:-O3 -DTERMIOS -DB_ENDIAN::(unknown):::BN_LLONG MD2_CHAR RC4_INDEX RC4_CHAR RC4_CHUNK DES_UNROLL DES_RISC2 DES_PTR BF_PTR:${mips32_asm}:o32:dlfcn:irix-shared:::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"irix-cc", "cc:-O2 -use_readonly_const -DTERMIOS -DB_ENDIAN::(unknown):::BN_LLONG RC4_CHAR RC4_CHUNK DES_PTR DES_RISC2 DES_UNROLL BF_PTR:${mips32_asm}:o32:dlfcn:irix-shared:::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
#### IRIX 6.x configs
 | 
			
		||||
# Only N32 and N64 ABIs are supported. If you need O32 ABI build, invoke
 | 
			
		||||
# './Configure irix-cc -o32' manually.
 | 
			
		||||
"irix-mips3-gcc","gcc:-mabi=n32 -O3 -DTERMIOS -DB_ENDIAN -DBN_DIV3W::-D_SGI_MP_SOURCE:::MD2_CHAR RC4_INDEX RC4_CHAR RC4_CHUNK_LL DES_UNROLL DES_RISC2 DES_PTR BF_PTR SIXTY_FOUR_BIT:${mips3_asm}:dlfcn:irix-shared::-mabi=n32:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::32",
 | 
			
		||||
"irix-mips3-cc", "cc:-n32 -mips3 -O2 -use_readonly_const -G0 -rdata_shared -DTERMIOS -DB_ENDIAN -DBN_DIV3W::-D_SGI_MP_SOURCE:::DES_PTR RC4_CHAR RC4_CHUNK_LL DES_RISC2 DES_UNROLL BF_PTR SIXTY_FOUR_BIT:${mips3_asm}:dlfcn:irix-shared::-n32:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::32",
 | 
			
		||||
"irix-mips3-gcc","gcc:-mabi=n32 -O3 -DTERMIOS -DB_ENDIAN -DBN_DIV3W::-D_SGI_MP_SOURCE:::MD2_CHAR RC4_INDEX RC4_CHAR RC4_CHUNK_LL DES_UNROLL DES_RISC2 DES_PTR BF_PTR SIXTY_FOUR_BIT:${mips64_asm}:n32:dlfcn:irix-shared::-mabi=n32:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::32",
 | 
			
		||||
"irix-mips3-cc", "cc:-n32 -mips3 -O2 -use_readonly_const -G0 -rdata_shared -DTERMIOS -DB_ENDIAN -DBN_DIV3W::-D_SGI_MP_SOURCE:::DES_PTR RC4_CHAR RC4_CHUNK_LL DES_RISC2 DES_UNROLL BF_PTR SIXTY_FOUR_BIT:${mips64_asm}:n32:dlfcn:irix-shared::-n32:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::32",
 | 
			
		||||
# N64 ABI builds.
 | 
			
		||||
"irix64-mips4-gcc","gcc:-mabi=64 -mips4 -O3 -DTERMIOS -DB_ENDIAN -DBN_DIV3W::-D_SGI_MP_SOURCE:::RC4_CHAR RC4_CHUNK DES_RISC2 DES_UNROLL SIXTY_FOUR_BIT_LONG:${mips3_asm}:dlfcn:irix-shared::-mabi=64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::64",
 | 
			
		||||
"irix64-mips4-cc", "cc:-64 -mips4 -O2 -use_readonly_const -G0 -rdata_shared -DTERMIOS -DB_ENDIAN -DBN_DIV3W::-D_SGI_MP_SOURCE:::RC4_CHAR RC4_CHUNK DES_RISC2 DES_UNROLL SIXTY_FOUR_BIT_LONG:${mips3_asm}:dlfcn:irix-shared::-64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::64",
 | 
			
		||||
"irix64-mips4-gcc","gcc:-mabi=64 -mips4 -O3 -DTERMIOS -DB_ENDIAN -DBN_DIV3W::-D_SGI_MP_SOURCE:::RC4_CHAR RC4_CHUNK DES_RISC2 DES_UNROLL SIXTY_FOUR_BIT_LONG:${mips64_asm}:64:dlfcn:irix-shared::-mabi=64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::64",
 | 
			
		||||
"irix64-mips4-cc", "cc:-64 -mips4 -O2 -use_readonly_const -G0 -rdata_shared -DTERMIOS -DB_ENDIAN -DBN_DIV3W::-D_SGI_MP_SOURCE:::RC4_CHAR RC4_CHUNK DES_RISC2 DES_UNROLL SIXTY_FOUR_BIT_LONG:${mips64_asm}:64:dlfcn:irix-shared::-64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::64",
 | 
			
		||||
 | 
			
		||||
#### Unified HP-UX ANSI C configs.
 | 
			
		||||
# Special notes:
 | 
			
		||||
@@ -290,17 +298,18 @@ my %table=(
 | 
			
		||||
# Since there is mention of this in shlib/hpux10-cc.sh
 | 
			
		||||
"hpux-parisc-cc-o4","cc:-Ae +O4 +ESlit -z -DB_ENDIAN -DBN_DIV2W -DMD32_XARRAY::-D_REENTRANT::-ldld:BN_LLONG DES_PTR DES_UNROLL DES_RISC1:${no_asm}:dl:hpux-shared:+Z:-b:.sl.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"hpux-parisc-gcc","gcc:-O3 -DB_ENDIAN -DBN_DIV2W::-D_REENTRANT::-Wl,+s -ldld:BN_LLONG DES_PTR DES_UNROLL DES_RISC1:${no_asm}:dl:hpux-shared:-fPIC:-shared:.sl.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"hpux-parisc2-gcc","gcc:-march=2.0 -O3 -DB_ENDIAN -D_REENTRANT::::-Wl,+s -ldld:SIXTY_FOUR_BIT RC4_CHAR RC4_CHUNK DES_PTR DES_UNROLL DES_RISC1::pa-risc2.o::::::::::::void:dl:hpux-shared:-fPIC:-shared:.sl.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"hpux64-parisc2-gcc","gcc:-O3 -DB_ENDIAN -D_REENTRANT::::-ldl:SIXTY_FOUR_BIT_LONG MD2_CHAR RC4_INDEX RC4_CHAR DES_UNROLL DES_RISC1 DES_INT::pa-risc2W.o::::::::::::void:dlfcn:hpux-shared:-fpic:-shared:.sl.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::/pa20_64",
 | 
			
		||||
"hpux-parisc1_1-gcc","gcc:-O3 -DB_ENDIAN -DBN_DIV2W::-D_REENTRANT::-Wl,+s -ldld:BN_LLONG DES_PTR DES_UNROLL DES_RISC1:${parisc11_asm}:dl:hpux-shared:-fPIC:-shared:.sl.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::/pa1.1",
 | 
			
		||||
"hpux-parisc2-gcc","gcc:-march=2.0 -O3 -DB_ENDIAN -D_REENTRANT::::-Wl,+s -ldld:SIXTY_FOUR_BIT RC4_CHAR RC4_CHUNK DES_PTR DES_UNROLL DES_RISC1:".eval{my $asm=$parisc20_asm;$asm=~s/2W\./2\./;$asm=~s/:64/:32/;$asm}.":dl:hpux-shared:-fPIC:-shared:.sl.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::/pa20_32",
 | 
			
		||||
"hpux64-parisc2-gcc","gcc:-O3 -DB_ENDIAN -D_REENTRANT::::-ldl:SIXTY_FOUR_BIT_LONG MD2_CHAR RC4_INDEX RC4_CHAR DES_UNROLL DES_RISC1 DES_INT::pa-risc2W.o::::::::::::::void:dlfcn:hpux-shared:-fpic:-shared:.sl.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::/pa20_64",
 | 
			
		||||
 | 
			
		||||
# More attempts at unified 10.X and 11.X targets for HP C compiler.
 | 
			
		||||
#
 | 
			
		||||
# Chris Ruemmler <ruemmler@cup.hp.com>
 | 
			
		||||
# Kevin Steves <ks@hp.se>
 | 
			
		||||
"hpux-parisc-cc","cc:+O3 +Optrs_strongly_typed -Ae +ESlit -DB_ENDIAN -DBN_DIV2W -DMD32_XARRAY::-D_REENTRANT::-Wl,+s -ldld:MD2_CHAR RC4_INDEX RC4_CHAR DES_UNROLL DES_RISC1 DES_INT:${no_asm}:dl:hpux-shared:+Z:-b:.sl.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"hpux-parisc1_0-cc","cc:+DAportable +O3 +Optrs_strongly_typed -Ae +ESlit -DB_ENDIAN -DMD32_XARRAY::-D_REENTRANT::-Wl,+s -ldld:MD2_CHAR RC4_INDEX RC4_CHAR DES_UNROLL DES_RISC1 DES_INT:${no_asm}:dl:hpux-shared:+Z:-b:.sl.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"hpux-parisc2-cc","cc:+DA2.0 +DS2.0 +O3 +Optrs_strongly_typed -Ae +ESlit -DB_ENDIAN -DMD32_XARRAY -D_REENTRANT::::-Wl,+s -ldld:SIXTY_FOUR_BIT MD2_CHAR RC4_INDEX RC4_CHAR DES_UNROLL DES_RISC1 DES_INT::pa-risc2.o::::::::::::void:dl:hpux-shared:+Z:-b:.sl.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"hpux64-parisc2-cc","cc:+DD64 +O3 +Optrs_strongly_typed -Ae +ESlit -DB_ENDIAN -DMD32_XARRAY -D_REENTRANT::::-ldl:SIXTY_FOUR_BIT_LONG MD2_CHAR RC4_INDEX RC4_CHAR DES_UNROLL DES_RISC1 DES_INT::pa-risc2W.o::::::::::::void:dlfcn:hpux-shared:+Z:+DD64 -b:.sl.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::/pa20_64",
 | 
			
		||||
"hpux-parisc1_1-cc","cc:+DA1.1 +O3 +Optrs_strongly_typed -Ae +ESlit -DB_ENDIAN -DMD32_XARRAY::-D_REENTRANT::-Wl,+s -ldld:MD2_CHAR RC4_INDEX RC4_CHAR DES_UNROLL DES_RISC1 DES_INT:${parisc11_asm}:dl:hpux-shared:+Z:-b:.sl.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::/pa1.1",
 | 
			
		||||
"hpux-parisc2-cc","cc:+DA2.0 +DS2.0 +O3 +Optrs_strongly_typed -Ae +ESlit -DB_ENDIAN -DMD32_XARRAY -D_REENTRANT::::-Wl,+s -ldld:SIXTY_FOUR_BIT MD2_CHAR RC4_INDEX RC4_CHAR DES_UNROLL DES_RISC1 DES_INT:".eval{my $asm=$parisc20_asm;$asm=~s/2W\./2\./;$asm=~s/:64/:32/;$asm}.":dl:hpux-shared:+Z:-b:.sl.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::/pa20_32",
 | 
			
		||||
"hpux64-parisc2-cc","cc:+DD64 +O3 +Optrs_strongly_typed -Ae +ESlit -DB_ENDIAN -DMD32_XARRAY -D_REENTRANT::::-ldl:SIXTY_FOUR_BIT_LONG MD2_CHAR RC4_INDEX RC4_CHAR DES_UNROLL DES_RISC1 DES_INT:${parisc20_asm}:dlfcn:hpux-shared:+Z:+DD64 -b:.sl.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::/pa20_64",
 | 
			
		||||
 | 
			
		||||
# HP/UX IA-64 targets
 | 
			
		||||
"hpux-ia64-cc","cc:-Ae +DD32 +O2 +Olit=all -z -DB_ENDIAN -D_REENTRANT::::-ldl:SIXTY_FOUR_BIT MD2_CHAR RC4_INDEX DES_UNROLL DES_RISC1 DES_INT:${ia64_asm}:dlfcn:hpux-shared:+Z:+DD32 -b:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::/hpux32",
 | 
			
		||||
@@ -351,8 +360,22 @@ my %table=(
 | 
			
		||||
"linux-ia64",	"gcc:-DL_ENDIAN -DTERMIO -O3 -Wall::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_UNROLL DES_INT:${ia64_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"linux-ia64-ecc","ecc:-DL_ENDIAN -DTERMIO -O2 -Wall -no_cpprt::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT:${ia64_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"linux-ia64-icc","icc:-DL_ENDIAN -DTERMIO -O2 -Wall -no_cpprt::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_RISC1 DES_INT:${ia64_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"linux-x86_64",	"gcc:-m64 -DL_ENDIAN -DTERMIO -O3 -Wall -DMD32_REG_T=int::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_UNROLL:${x86_64_asm}:elf:dlfcn:linux-shared:-fPIC:-m64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::64",
 | 
			
		||||
"linux-s390x",	"gcc:-m64 -DB_ENDIAN -DTERMIO -O3 -Wall::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL:${s390x_asm}:dlfcn:linux-shared:-fPIC:-m64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::64",
 | 
			
		||||
"linux-x86_64",	"gcc:-m64 -DL_ENDIAN -DTERMIO -O3 -Wall::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_UNROLL:${x86_64_asm}:elf:dlfcn:linux-shared:-fPIC:-m64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::64",
 | 
			
		||||
"linux64-s390x",	"gcc:-m64 -DB_ENDIAN -DTERMIO -O3 -Wall::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL:${s390x_asm}:64:dlfcn:linux-shared:-fPIC:-m64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::64",
 | 
			
		||||
#### So called "highgprs" target for z/Architecture CPUs
 | 
			
		||||
# "Highgprs" is kernel feature first implemented in Linux 2.6.32, see
 | 
			
		||||
# /proc/cpuinfo. The idea is to preserve most significant bits of
 | 
			
		||||
# general purpose registers not only upon 32-bit process context
 | 
			
		||||
# switch, but even on asynchronous signal delivery to such process.
 | 
			
		||||
# This makes it possible to deploy 64-bit instructions even in legacy
 | 
			
		||||
# application context and achieve better [or should we say adequate]
 | 
			
		||||
# performance. The build is binary compatible with linux-generic32,
 | 
			
		||||
# and the idea is to be able to install the resulting libcrypto.so
 | 
			
		||||
# alongside generic one, e.g. as /lib/highgprs/libcrypto.so.x.y, for
 | 
			
		||||
# ldconfig and run-time linker to autodiscover. Unfortunately it
 | 
			
		||||
# doesn't work just yet, because of couple of bugs in glibc
 | 
			
		||||
# sysdeps/s390/dl-procinfo.c affecting ldconfig and ld.so.1...
 | 
			
		||||
"linux32-s390x",	"gcc:-m31 -Wa,-mzarch -DB_ENDIAN -DTERMIO -O3 -Wall::-D_REENTRANT::-ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL:".eval{my $asm=$s390x_asm;$asm=~s/bn\-s390x\.o/bn_asm.o/;$asm}.":31:dlfcn:linux-shared:-fPIC:-m31:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::/highgprs",
 | 
			
		||||
#### SPARC Linux setups
 | 
			
		||||
# Ray Miller <ray.miller@computing-services.oxford.ac.uk> has patiently
 | 
			
		||||
# assisted with debugging of following two configs.
 | 
			
		||||
@@ -380,6 +403,11 @@ my %table=(
 | 
			
		||||
"linux-alpha-ccc","ccc:-fast -readonly_strings -DL_ENDIAN -DTERMIO::-D_REENTRANT:::SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_PTR DES_RISC1 DES_UNROLL:${alpha_asm}",
 | 
			
		||||
"linux-alpha+bwx-ccc","ccc:-fast -readonly_strings -DL_ENDIAN -DTERMIO::-D_REENTRANT:::SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_INT DES_PTR DES_RISC1 DES_UNROLL:${alpha_asm}",
 | 
			
		||||
 | 
			
		||||
# Android: linux-* but without -DTERMIO and pointers to headers and libs.
 | 
			
		||||
"android","gcc:-mandroid -I\$(ANDROID_DEV)/include -B\$(ANDROID_DEV)/lib -O3 -fomit-frame-pointer -Wall::-D_REENTRANT::-ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL BF_PTR:${no_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"android-x86","gcc:-mandroid -I\$(ANDROID_DEV)/include -B\$(ANDROID_DEV)/lib -O3 -fomit-frame-pointer -Wall::-D_REENTRANT::-ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:".eval{my $asm=${x86_elf_asm};$asm=~s/:elf/:android/;$asm}.":dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"android-armv7","gcc:-march=armv7-a -mandroid -I\$(ANDROID_DEV)/include -B\$(ANDROID_DEV)/lib -O3 -fomit-frame-pointer -Wall::-D_REENTRANT::-ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL BF_PTR:${armv4_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
 | 
			
		||||
#### *BSD [do see comment about ${BSDthreads} above!]
 | 
			
		||||
"BSD-generic32","gcc:-DTERMIOS -O3 -fomit-frame-pointer -Wall::${BSDthreads}:::BN_LLONG RC2_CHAR RC4_INDEX DES_INT DES_UNROLL:${no_asm}:dlfcn:bsd-gcc-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"BSD-x86",	"gcc:-DL_ENDIAN -DTERMIOS -O3 -fomit-frame-pointer -Wall::${BSDthreads}:::BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_asm}:a.out:dlfcn:bsd-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
@@ -393,7 +421,7 @@ my %table=(
 | 
			
		||||
# triggered by RIPEMD160 code.
 | 
			
		||||
"BSD-sparc64",	"gcc:-DB_ENDIAN -DTERMIOS -O3 -DMD32_REG_T=int -Wall::${BSDthreads}:::BN_LLONG RC2_CHAR RC4_CHUNK DES_INT DES_PTR DES_RISC2 BF_PTR:${sparcv9_asm}:dlfcn:bsd-gcc-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"BSD-ia64",	"gcc:-DL_ENDIAN -DTERMIOS -O3 -Wall::${BSDthreads}:::SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_UNROLL DES_INT:${ia64_asm}:dlfcn:bsd-gcc-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"BSD-x86_64",	"gcc:-DL_ENDIAN -DTERMIOS -O3 -DMD32_REG_T=int -Wall::${BSDthreads}:::SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_UNROLL:${x86_64_asm}:elf:dlfcn:bsd-gcc-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"BSD-x86_64",	"gcc:-DL_ENDIAN -DTERMIOS -O3 -Wall::${BSDthreads}:::SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_UNROLL:${x86_64_asm}:elf:dlfcn:bsd-gcc-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
 | 
			
		||||
"bsdi-elf-gcc",     "gcc:-DPERL5 -DL_ENDIAN -fomit-frame-pointer -O3 -march=i486 -Wall::(unknown)::-ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn:bsd-gcc-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
 | 
			
		||||
@@ -438,8 +466,8 @@ my %table=(
 | 
			
		||||
"aix64-gcc","gcc:-maix64 -O -DB_ENDIAN::-pthread:AIX::SIXTY_FOUR_BIT_LONG RC4_CHAR:${ppc64_asm}:aix64:dlfcn:aix-shared::-maix64 -shared -Wl,-G:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)::-X64",
 | 
			
		||||
# Below targets assume AIX 5. Idea is to effectively disregard $OBJECT_MODE
 | 
			
		||||
# at build time. $OBJECT_MODE is respected at ./config stage!
 | 
			
		||||
"aix-cc",   "cc:-q32 -O -DB_ENDIAN -qmaxmem=16384 -qro -qroconst::-qthreaded:AIX::BN_LLONG RC4_CHAR:${ppc32_asm}:aix32:dlfcn:aix-shared::-q32 -G:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)::-X 32",
 | 
			
		||||
"aix64-cc", "cc:-q64 -O -DB_ENDIAN -qmaxmem=16384 -qro -qroconst::-qthreaded:AIX::SIXTY_FOUR_BIT_LONG RC4_CHAR:${ppc64_asm}:aix64:dlfcn:aix-shared::-q64 -G:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)::-X 64",
 | 
			
		||||
"aix-cc",   "cc:-q32 -O -DB_ENDIAN -qmaxmem=16384 -qro -qroconst::-qthreaded -D_THREAD_SAFE:AIX::BN_LLONG RC4_CHAR:${ppc32_asm}:aix32:dlfcn:aix-shared::-q32 -G:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)::-X 32",
 | 
			
		||||
"aix64-cc", "cc:-q64 -O -DB_ENDIAN -qmaxmem=16384 -qro -qroconst::-qthreaded -D_THREAD_SAFE:AIX::SIXTY_FOUR_BIT_LONG RC4_CHAR:${ppc64_asm}:aix64:dlfcn:aix-shared::-q64 -G:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)::-X 64",
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Cray T90 and similar (SDSC)
 | 
			
		||||
@@ -490,15 +518,15 @@ my %table=(
 | 
			
		||||
# Visual C targets
 | 
			
		||||
#
 | 
			
		||||
# Win64 targets, WIN64I denotes IA-64 and WIN64A - AMD64
 | 
			
		||||
"VC-WIN64I","cl:-W3 -Gs0 -Gy -nologo -DOPENSSL_SYSNAME_WIN32 -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -DUNICODE -D_UNICODE -D_CRT_SECURE_NO_DEPRECATE:::WIN64I::SIXTY_FOUR_BIT RC4_CHUNK_LL DES_INT EXPORT_VAR_AS_FN:ia64cpuid.o:ia64.o::aes_core.o aes_cbc.o aes-ia64.o::md5-ia64.o:sha1-ia64.o sha256-ia64.o sha512-ia64.o:::::::ias:win32",
 | 
			
		||||
"VC-WIN64A","cl:-W3 -Gs0 -Gy -nologo -DOPENSSL_SYSNAME_WIN32 -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -DUNICODE -D_UNICODE -D_CRT_SECURE_NO_DEPRECATE:::WIN64A::SIXTY_FOUR_BIT RC4_CHUNK_LL DES_INT EXPORT_VAR_AS_FN:x86_64cpuid.o:bn_asm.o x86_64-mont.o::aes-x86_64.o::md5-x86_64.o:sha1-x86_64.o sha256-x86_64.o sha512-x86_64.o::rc4-x86_64.o:::wp-x86_64.o:cmll-x86_64.o cmll_misc.o:auto:win32",
 | 
			
		||||
"debug-VC-WIN64I","cl:-W3 -Gs0 -Gy -Zi -nologo -DOPENSSL_SYSNAME_WIN32 -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -DUNICODE -D_UNICODE -D_CRT_SECURE_NO_DEPRECATE:::WIN64I::SIXTY_FOUR_BIT RC4_CHUNK_LL DES_INT EXPORT_VAR_AS_FN:ia64cpuid.o:ia64.o::aes_core.o aes_cbc.o aes-ia64.o::md5-ia64.o:sha1-ia64.o sha256-ia64.o sha512-ia64.o:::::::ias:win32",
 | 
			
		||||
"debug-VC-WIN64A","cl:-W3 -Gs0 -Gy -Zi -nologo -DOPENSSL_SYSNAME_WIN32 -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -DUNICODE -D_UNICODE -D_CRT_SECURE_NO_DEPRECATE:::WIN64A::SIXTY_FOUR_BIT RC4_CHUNK_LL DES_INT EXPORT_VAR_AS_FN:x86_64cpuid.o:bn_asm.o x86_64-mont.o::aes-x86_64.o::md5-x86_64.o:sha1-x86_64.o sha256-x86_64.o sha512-x86_64.o::rc4-x86_64.o:::wp-x86_64.o:cmll-x86_64.o cmll_misc.o:auto:win32",
 | 
			
		||||
"VC-WIN64I","cl:-W3 -Gs0 -Gy -nologo -DOPENSSL_SYSNAME_WIN32 -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -DUNICODE -D_UNICODE -D_CRT_SECURE_NO_DEPRECATE:::WIN64I::SIXTY_FOUR_BIT RC4_CHUNK_LL DES_INT EXPORT_VAR_AS_FN:ia64cpuid.o:ia64.o ia64-mont.o::aes_core.o aes_cbc.o aes-ia64.o::md5-ia64.o:sha1-ia64.o sha256-ia64.o sha512-ia64.o:::::::ghash-ia64.o::ias:win32",
 | 
			
		||||
"VC-WIN64A","cl:-W3 -Gs0 -Gy -nologo -DOPENSSL_SYSNAME_WIN32 -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -DUNICODE -D_UNICODE -D_CRT_SECURE_NO_DEPRECATE:::WIN64A::SIXTY_FOUR_BIT RC4_CHUNK_LL DES_INT EXPORT_VAR_AS_FN:".eval{my $asm=$x86_64_asm;$asm=~s/x86_64-gcc\.o/bn_asm.o/;$asm}.":auto:win32",
 | 
			
		||||
"debug-VC-WIN64I","cl:-W3 -Gs0 -Gy -Zi -nologo -DOPENSSL_SYSNAME_WIN32 -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -DUNICODE -D_UNICODE -D_CRT_SECURE_NO_DEPRECATE:::WIN64I::SIXTY_FOUR_BIT RC4_CHUNK_LL DES_INT EXPORT_VAR_AS_FN:ia64cpuid.o:ia64.o::aes_core.o aes_cbc.o aes-ia64.o::md5-ia64.o:sha1-ia64.o sha256-ia64.o sha512-ia64.o:::::::ghash-ia64.o::ias:win32",
 | 
			
		||||
"debug-VC-WIN64A","cl:-W3 -Gs0 -Gy -Zi -nologo -DOPENSSL_SYSNAME_WIN32 -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -DUNICODE -D_UNICODE -D_CRT_SECURE_NO_DEPRECATE:::WIN64A::SIXTY_FOUR_BIT RC4_CHUNK_LL DES_INT EXPORT_VAR_AS_FN:".eval{my $asm=$x86_64_asm;$asm=~s/x86_64-gcc\.o/bn_asm.o/;$asm}.":auto:win32",
 | 
			
		||||
# x86 Win32 target defaults to ANSI API, if you want UNICODE, complement
 | 
			
		||||
# 'perl Configure VC-WIN32' with '-DUNICODE -D_UNICODE'
 | 
			
		||||
"VC-WIN32","cl:-W3 -WX -Gs0 -GF -Gy -nologo -DOPENSSL_SYSNAME_WIN32 -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -D_CRT_SECURE_NO_DEPRECATE:::WIN32::BN_LLONG RC4_INDEX EXPORT_VAR_AS_FN ${x86_gcc_opts}:${x86_asm}:win32n:win32",
 | 
			
		||||
"VC-WIN32","cl:-W3 -Gs0 -GF -Gy -nologo -DOPENSSL_SYSNAME_WIN32 -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -D_CRT_SECURE_NO_DEPRECATE:::WIN32::BN_LLONG RC4_INDEX EXPORT_VAR_AS_FN ${x86_gcc_opts}:${x86_asm}:win32n:win32",
 | 
			
		||||
# Unified CE target
 | 
			
		||||
"debug-VC-WIN32","cl:-W3 -WX -Gs0 -GF -Gy -Zi -nologo -DOPENSSL_SYSNAME_WIN32 -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -D_CRT_SECURE_NO_DEPRECATE:::WIN32::BN_LLONG RC4_INDEX EXPORT_VAR_AS_FN ${x86_gcc_opts}:${x86_asm}:win32n:win32",
 | 
			
		||||
"debug-VC-WIN32","cl:-W3 -Gs0 -GF -Gy -Zi -nologo -DOPENSSL_SYSNAME_WIN32 -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -D_CRT_SECURE_NO_DEPRECATE:::WIN32::BN_LLONG RC4_INDEX EXPORT_VAR_AS_FN ${x86_gcc_opts}:${x86_asm}:win32n:win32",
 | 
			
		||||
"VC-CE","cl::::WINCE::BN_LLONG RC4_INDEX EXPORT_VAR_AS_FN ${x86_gcc_opts}:${no_asm}:win32",
 | 
			
		||||
 | 
			
		||||
# Borland C++ 4.5
 | 
			
		||||
@@ -551,10 +579,12 @@ my %table=(
 | 
			
		||||
"rhapsody-ppc-cc","cc:-O3 -DB_ENDIAN::(unknown):MACOSX_RHAPSODY::BN_LLONG RC4_CHAR RC4_CHUNK DES_UNROLL BF_PTR:${no_asm}::",
 | 
			
		||||
"darwin-ppc-cc","cc:-arch ppc -O3 -DB_ENDIAN -Wa,-force_cpusubtype_ALL::-D_REENTRANT:MACOSX:-Wl,-search_paths_first%:BN_LLONG RC4_CHAR RC4_CHUNK DES_UNROLL BF_PTR:${ppc32_asm}:osx32:dlfcn:darwin-shared:-fPIC -fno-common:-arch ppc -dynamiclib:.\$(SHLIB_MAJOR).\$(SHLIB_MINOR).dylib",
 | 
			
		||||
"darwin64-ppc-cc","cc:-arch ppc64 -O3 -DB_ENDIAN::-D_REENTRANT:MACOSX:-Wl,-search_paths_first%:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_UNROLL BF_PTR:${ppc64_asm}:osx64:dlfcn:darwin-shared:-fPIC -fno-common:-arch ppc64 -dynamiclib:.\$(SHLIB_MAJOR).\$(SHLIB_MINOR).dylib",
 | 
			
		||||
"darwin-i386-cc","cc:-arch i386 -O3 -fomit-frame-pointer -DL_ENDIAN::-D_REENTRANT:MACOSX:-Wl,-search_paths_first%:BN_LLONG RC4_INT RC4_CHUNK DES_UNROLL BF_PTR:${x86_asm}:macosx:dlfcn:darwin-shared:-fPIC -fno-common:-arch i386 -dynamiclib:.\$(SHLIB_MAJOR).\$(SHLIB_MINOR).dylib",
 | 
			
		||||
"darwin-i386-cc","cc:-arch i386 -O3 -fomit-frame-pointer -DL_ENDIAN::-D_REENTRANT:MACOSX:-Wl,-search_paths_first%:BN_LLONG RC4_INT RC4_CHUNK DES_UNROLL BF_PTR:".eval{my $asm=$x86_asm;$asm=~s/cast\-586\.o//;$asm}.":macosx:dlfcn:darwin-shared:-fPIC -fno-common:-arch i386 -dynamiclib:.\$(SHLIB_MAJOR).\$(SHLIB_MINOR).dylib",
 | 
			
		||||
"debug-darwin-i386-cc","cc:-arch i386 -g3 -DL_ENDIAN::-D_REENTRANT:MACOSX:-Wl,-search_paths_first%:BN_LLONG RC4_INT RC4_CHUNK DES_UNROLL BF_PTR:${x86_asm}:macosx:dlfcn:darwin-shared:-fPIC -fno-common:-arch i386 -dynamiclib:.\$(SHLIB_MAJOR).\$(SHLIB_MINOR).dylib",
 | 
			
		||||
"darwin64-x86_64-cc","cc:-arch x86_64 -O3 -DL_ENDIAN -DMD32_REG_T=int -Wall::-D_REENTRANT:MACOSX:-Wl,-search_paths_first%:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL:".eval{my $asm=$x86_64_asm;$asm=~s/rc4\-[^:]+//;$asm}.":macosx:dlfcn:darwin-shared:-fPIC -fno-common:-arch x86_64 -dynamiclib:.\$(SHLIB_MAJOR).\$(SHLIB_MINOR).dylib",
 | 
			
		||||
"darwin64-x86_64-cc","cc:-arch x86_64 -O3 -DL_ENDIAN -Wall::-D_REENTRANT:MACOSX:-Wl,-search_paths_first%:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL:".eval{my $asm=$x86_64_asm;$asm=~s/rc4\-[^:]+//;$asm}.":macosx:dlfcn:darwin-shared:-fPIC -fno-common:-arch x86_64 -dynamiclib:.\$(SHLIB_MAJOR).\$(SHLIB_MINOR).dylib",
 | 
			
		||||
"debug-darwin-ppc-cc","cc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DCRYPTO_MDEBUG -DB_ENDIAN -g -Wall -O::-D_REENTRANT:MACOSX::BN_LLONG RC4_CHAR RC4_CHUNK DES_UNROLL BF_PTR:${ppc32_asm}:osx32:dlfcn:darwin-shared:-fPIC:-dynamiclib:.\$(SHLIB_MAJOR).\$(SHLIB_MINOR).dylib",
 | 
			
		||||
# iPhoneOS/iOS
 | 
			
		||||
"iphoneos-cross","llvm-gcc:-O3 -isysroot \$(CROSS_TOP)/SDKs/\$(CROSS_SDK) -fomit-frame-pointer -fno-common::-D_REENTRANT:iOS:-Wl,-search_paths_first%:BN_LLONG RC4_CHAR RC4_CHUNK DES_UNROLL BF_PTR:${no_asm}:dlfcn:darwin-shared:-fPIC -fno-common:-dynamiclib:.\$(SHLIB_MAJOR).\$(SHLIB_MINOR).dylib",
 | 
			
		||||
 | 
			
		||||
##### A/UX
 | 
			
		||||
"aux3-gcc","gcc:-O2 -DTERMIO::(unknown):AUX:-lbsd:RC4_CHAR RC4_CHUNK DES_UNROLL BF_PTR:::",
 | 
			
		||||
@@ -569,18 +599,21 @@ my %table=(
 | 
			
		||||
"OS2-EMX", "gcc::::::::",
 | 
			
		||||
 | 
			
		||||
##### VxWorks for various targets
 | 
			
		||||
"vxworks-ppc60x","ccppc:-D_REENTRANT -mrtp -mhard-float -mstrict-align -fno-implicit-fp -DPPC32_fp60x -O2 -fstrength-reduce -fno-builtin -fno-strict-aliasing -Wall -DCPU=PPC32 -DTOOL_FAMILY=gnu -DTOOL=gnu -I\$(WIND_BASE)/target/usr/h -I\$(WIND_BASE)/target/usr/h/wrn/coreip:::VXWORKS:-Wl,--defsym,__wrs_rtp_base=0xe0000000 -L \$(WIND_BASE)/target/usr/lib/ppc/PPC32/common:::::",
 | 
			
		||||
"vxworks-ppcgen","ccppc:-D_REENTRANT -mrtp -msoft-float -mstrict-align -O1 -fno-builtin -fno-strict-aliasing -Wall -DCPU=PPC32 -DTOOL_FAMILY=gnu -DTOOL=gnu -I\$(WIND_BASE)/target/usr/h -I\$(WIND_BASE)/target/usr/h/wrn/coreip:::VXWORKS:-Wl,--defsym,__wrs_rtp_base=0xe0000000 -L \$(WIND_BASE)/target/usr/lib/ppc/PPC32/sfcommon:::::",
 | 
			
		||||
"vxworks-ppc405","ccppc:-g -msoft-float -mlongcall -DCPU=PPC405 -I\$(WIND_BASE)/target/h:::VXWORKS:-r:::::",
 | 
			
		||||
"vxworks-ppc750","ccppc:-ansi -nostdinc -DPPC750 -D_REENTRANT -fvolatile -fno-builtin -fno-for-scope -fsigned-char -Wall -msoft-float -mlongcall -DCPU=PPC604 -I\$(WIND_BASE)/target/h \$(DEBUG_FLAG):::VXWORKS:-r:::::",
 | 
			
		||||
"vxworks-ppc750-debug","ccppc:-ansi -nostdinc -DPPC750 -D_REENTRANT -fvolatile -fno-builtin -fno-for-scope -fsigned-char -Wall -msoft-float -mlongcall -DCPU=PPC604 -I\$(WIND_BASE)/target/h -DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG -DPEDANTIC -DDEBUG_SAFESTACK -DDEBUG -g:::VXWORKS:-r:::::",
 | 
			
		||||
"vxworks-ppc860","ccppc:-nostdinc -msoft-float -DCPU=PPC860 -DNO_STRINGS_H -I\$(WIND_BASE)/target/h:::VXWORKS:-r:::::",
 | 
			
		||||
"vxworks-mipsle","ccmips:-B\$(WIND_BASE)/host/\$(WIND_HOST_TYPE)/lib/gcc-lib/ -DL_ENDIAN -EL -Wl,-EL -mips2 -mno-branch-likely -G 0 -fno-builtin -msoft-float -DCPU=MIPS32 -DMIPSEL -DNO_STRINGS_H -I\$(WIND_BASE)/target/h:::VXWORKS:-r::${no_asm}::::::ranlibmips:",
 | 
			
		||||
"vxworks-simlinux","ccpentium:-B\$(WIND_BASE)/host/\$(WIND_HOST_TYPE)/lib/gcc-lib/ -D_VSB_CONFIG_FILE=\"\$(WIND_BASE)/target/lib/h/config/vsbConfig.h\" -DL_ENDIAN -DCPU=SIMLINUX -DTOOL_FAMILY=gnu -DTOOL=gnu -fno-builtin -fno-defer-pop -DNO_STRINGS_H -I\$(WIND_BASE)/target/h -I\$(WIND_BASE)/target/h/wrn/coreip -DOPENSSL_NO_HW_PADLOCK:::VXWORKS:-r::${no_asm}::::::ranlibpentium:",
 | 
			
		||||
"vxworks-mips","ccmips:-mrtp -mips2 -O -G 0 -B\$(WIND_BASE)/host/\$(WIND_HOST_TYPE)/lib/gcc-lib/ -D_VSB_CONFIG_FILE=\"\$(WIND_BASE)/target/lib/h/config/vsbConfig.h\" -DCPU=MIPS32 -msoft-float -mno-branch-likely -DTOOL_FAMILY=gnu -DTOOL=gnu -fno-builtin -fno-defer-pop -DNO_STRINGS_H -I\$(WIND_BASE)/target/usr/h -I\$(WIND_BASE)/target/h/wrn/coreip::-D_REENTRANT:VXWORKS:-Wl,--defsym,__wrs_rtp_base=0xe0000000 -L \$(WIND_BASE)/target/usr/lib/mips/MIPSI32/sfcommon::${mips32_asm}:o32::::::ranlibmips:",
 | 
			
		||||
 | 
			
		||||
##### Compaq Non-Stop Kernel (Tandem)
 | 
			
		||||
"tandem-c89","c89:-Ww -D__TANDEM -D_XOPEN_SOURCE -D_XOPEN_SOURCE_EXTENDED=1 -D_TANDEM_SOURCE -DB_ENDIAN::(unknown):::THIRTY_TWO_BIT:::",
 | 
			
		||||
 | 
			
		||||
# uClinux
 | 
			
		||||
"uClinux-dist","$ENV{'CC'}:\$(CFLAGS)::-D_REENTRANT::\$(LDFLAGS) \$(LDLIBS):BN_LLONG:::::::::::::::$ENV{'LIBSSL_dlfcn'}:linux-shared:-fPIC:-shared:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):$ENV{'RANLIB'}::",
 | 
			
		||||
"uClinux-dist64","$ENV{'CC'}:\$(CFLAGS)::-D_REENTRANT::\$(LDFLAGS) \$(LDLIBS):SIXTY_FOUR_BIT_LONG:::::::::::::::$ENV{'LIBSSL_dlfcn'}:linux-shared:-fPIC:-shared:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):$ENV{'RANLIB'}::",
 | 
			
		||||
"uClinux-dist","$ENV{'CC'}:\$(CFLAGS)::-D_REENTRANT::\$(LDFLAGS) \$(LDLIBS):BN_LLONG:${no_asm}:$ENV{'LIBSSL_dlfcn'}:linux-shared:-fPIC:-shared:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):$ENV{'RANLIB'}::",
 | 
			
		||||
"uClinux-dist64","$ENV{'CC'}:\$(CFLAGS)::-D_REENTRANT::\$(LDFLAGS) \$(LDLIBS):SIXTY_FOUR_BIT_LONG:${no_asm}:$ENV{'LIBSSL_dlfcn'}:linux-shared:-fPIC:-shared:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):$ENV{'RANLIB'}::",
 | 
			
		||||
 | 
			
		||||
);
 | 
			
		||||
 | 
			
		||||
@@ -612,6 +645,8 @@ my $idx_rmd160_obj = $idx++;
 | 
			
		||||
my $idx_rc5_obj = $idx++;
 | 
			
		||||
my $idx_wp_obj = $idx++;
 | 
			
		||||
my $idx_cmll_obj = $idx++;
 | 
			
		||||
my $idx_modes_obj = $idx++;
 | 
			
		||||
my $idx_engines_obj = $idx++;
 | 
			
		||||
my $idx_perlasm_scheme = $idx++;
 | 
			
		||||
my $idx_dso_scheme = $idx++;
 | 
			
		||||
my $idx_shared_target = $idx++;
 | 
			
		||||
@@ -628,6 +663,9 @@ my $openssldir="";
 | 
			
		||||
my $exe_ext="";
 | 
			
		||||
my $install_prefix= "$ENV{'INSTALL_PREFIX'}";
 | 
			
		||||
my $cross_compile_prefix="";
 | 
			
		||||
my $fipsdir="/usr/local/ssl/fips-2.0";
 | 
			
		||||
my $fipslibdir="";
 | 
			
		||||
my $baseaddr="0xFB00000";
 | 
			
		||||
my $no_threads=0;
 | 
			
		||||
my $threads=0;
 | 
			
		||||
my $no_shared=0; # but "no-shared" is default
 | 
			
		||||
@@ -662,26 +700,35 @@ my $cmll_enc="camellia.o cmll_misc.o cmll_cbc.o";
 | 
			
		||||
my $processor="";
 | 
			
		||||
my $default_ranlib;
 | 
			
		||||
my $perl;
 | 
			
		||||
my $fips=0;
 | 
			
		||||
 | 
			
		||||
if (exists $ENV{FIPSDIR})
 | 
			
		||||
	{
 | 
			
		||||
	$fipsdir = $ENV{FIPSDIR};
 | 
			
		||||
	$fipsdir =~ s/\/$//;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
# All of the following is disabled by default (RC5 was enabled before 0.9.8):
 | 
			
		||||
 | 
			
		||||
my %disabled = ( # "what"         => "comment" [or special keyword "experimental"]
 | 
			
		||||
		 "ec_nistp_64_gcc_128" => "default",
 | 
			
		||||
		 "gmp"		  => "default",
 | 
			
		||||
                 "jpake"          => "experimental",
 | 
			
		||||
                 "md2"            => "default",
 | 
			
		||||
                 "rc5"            => "default",
 | 
			
		||||
		 "jpake"          => "experimental",
 | 
			
		||||
		 "md2"            => "default",
 | 
			
		||||
		 "rc5"            => "default",
 | 
			
		||||
		 "rfc3779"	  => "default",
 | 
			
		||||
                 "shared"         => "default",
 | 
			
		||||
		 "sctp"       => "default",
 | 
			
		||||
		 "shared"         => "default",
 | 
			
		||||
		 "store"	  => "experimental",
 | 
			
		||||
                 "zlib"           => "default",
 | 
			
		||||
                 "zlib-dynamic"   => "default"
 | 
			
		||||
               );
 | 
			
		||||
		 "unit-test"	  => "default",
 | 
			
		||||
		 "zlib"           => "default",
 | 
			
		||||
		 "zlib-dynamic"   => "default"
 | 
			
		||||
	       );
 | 
			
		||||
my @experimental = ();
 | 
			
		||||
 | 
			
		||||
# This is what $depflags will look like with the above defaults
 | 
			
		||||
# (we need this to see if we should advise the user to run "make depend"):
 | 
			
		||||
my $default_depflags = " -DOPENSSL_NO_GMP -DOPENSSL_NO_JPAKE -DOPENSSL_NO_MD2 -DOPENSSL_NO_RC5 -DOPENSSL_NO_RFC3779 -DOPENSSL_NO_STORE";
 | 
			
		||||
my $default_depflags = " -DOPENSSL_NO_EC_NISTP_64_GCC_128 -DOPENSSL_NO_GMP -DOPENSSL_NO_JPAKE -DOPENSSL_NO_MD2 -DOPENSSL_NO_RC5 -DOPENSSL_NO_RFC3779 -DOPENSSL_NO_SCTP -DOPENSSL_NO_STORE -DOPENSSL_NO_UNIT_TEST";
 | 
			
		||||
 | 
			
		||||
# Explicit "no-..." options will be collected in %disabled along with the defaults.
 | 
			
		||||
# To remove something from %disabled, use "enable-foo" (unless it's experimental).
 | 
			
		||||
@@ -739,6 +786,7 @@ PROCESS_ARGS:
 | 
			
		||||
 | 
			
		||||
		# rewrite some options in "enable-..." form
 | 
			
		||||
		s /^-?-?shared$/enable-shared/;
 | 
			
		||||
		s /^sctp$/enable-sctp/;
 | 
			
		||||
		s /^threads$/enable-threads/;
 | 
			
		||||
		s /^zlib$/enable-zlib/;
 | 
			
		||||
		s /^zlib-dynamic$/enable-zlib-dynamic/;
 | 
			
		||||
@@ -756,6 +804,11 @@ PROCESS_ARGS:
 | 
			
		||||
					{
 | 
			
		||||
					$disabled{"tls1"} = "option(tls)"
 | 
			
		||||
					}
 | 
			
		||||
				elsif ($1 eq "ssl3-method")
 | 
			
		||||
					{
 | 
			
		||||
					$disabled{"ssl3-method"} = "option(ssl)";
 | 
			
		||||
					$disabled{"ssl3"} = "option(ssl)";
 | 
			
		||||
					}
 | 
			
		||||
				else
 | 
			
		||||
					{
 | 
			
		||||
					$disabled{$1} = "option";
 | 
			
		||||
@@ -808,6 +861,10 @@ PROCESS_ARGS:
 | 
			
		||||
			}
 | 
			
		||||
		elsif (/^386$/)
 | 
			
		||||
			{ $processor=386; }
 | 
			
		||||
		elsif (/^fips$/)
 | 
			
		||||
			{
 | 
			
		||||
			$fips=1;
 | 
			
		||||
			}
 | 
			
		||||
		elsif (/^rsaref$/)
 | 
			
		||||
			{
 | 
			
		||||
			# No RSAref support any more since it's not needed.
 | 
			
		||||
@@ -822,6 +879,7 @@ PROCESS_ARGS:
 | 
			
		||||
				}
 | 
			
		||||
			elsif (/^-[^-]/ or /^\+/)
 | 
			
		||||
				{
 | 
			
		||||
				$_ =~ s/%([0-9a-f]{1,2})/chr(hex($1))/gei;
 | 
			
		||||
				$flags.=$_." ";
 | 
			
		||||
				}
 | 
			
		||||
			elsif (/^--prefix=(.*)$/)
 | 
			
		||||
@@ -852,6 +910,18 @@ PROCESS_ARGS:
 | 
			
		||||
				{
 | 
			
		||||
				$withargs{"zlib-include"}="-I$1";
 | 
			
		||||
				}
 | 
			
		||||
			elsif (/^--with-fipsdir=(.*)$/)
 | 
			
		||||
				{
 | 
			
		||||
				$fipsdir="$1";
 | 
			
		||||
				}
 | 
			
		||||
			elsif (/^--with-fipslibdir=(.*)$/)
 | 
			
		||||
				{
 | 
			
		||||
				$fipslibdir="$1";
 | 
			
		||||
				}
 | 
			
		||||
			elsif (/^--with-baseaddr=(.*)$/)
 | 
			
		||||
				{
 | 
			
		||||
				$baseaddr="$1";
 | 
			
		||||
				}
 | 
			
		||||
			elsif (/^--cross-compile-prefix=(.*)$/)
 | 
			
		||||
				{
 | 
			
		||||
				$cross_compile_prefix=$1;
 | 
			
		||||
@@ -926,6 +996,17 @@ if (defined($disabled{"md5"}) || defined($disabled{"rsa"}))
 | 
			
		||||
	$disabled{"ssl2"} = "forced";
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
if ($fips && $fipslibdir eq "")
 | 
			
		||||
	{
 | 
			
		||||
	$fipslibdir = $fipsdir . "/lib/";
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
# RSAX ENGINE sets default non-FIPS RSA method.
 | 
			
		||||
if ($fips)
 | 
			
		||||
	{
 | 
			
		||||
	$disabled{"rsax"} = "forced";
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
# SSL 3.0 and TLS requires MD5 and SHA and either RSA or DSA+DH
 | 
			
		||||
if (defined($disabled{"md5"}) || defined($disabled{"sha"})
 | 
			
		||||
    || (defined($disabled{"rsa"})
 | 
			
		||||
@@ -946,6 +1027,13 @@ if (defined($disabled{"ec"}) || defined($disabled{"dsa"})
 | 
			
		||||
	$disabled{"gost"} = "forced";
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
# SRP and HEARTBEATS require TLSEXT
 | 
			
		||||
if (defined($disabled{"tlsext"}))
 | 
			
		||||
	{
 | 
			
		||||
	$disabled{"srp"} = "forced";
 | 
			
		||||
	$disabled{"heartbeats"} = "forced";
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
if ($target eq "TABLE") {
 | 
			
		||||
	foreach $target (sort keys %table) {
 | 
			
		||||
		print_table_entry($target);
 | 
			
		||||
@@ -995,7 +1083,7 @@ foreach (sort (keys %disabled))
 | 
			
		||||
	else
 | 
			
		||||
		{
 | 
			
		||||
		my ($ALGO, $algo);
 | 
			
		||||
		($ALGO = $algo = $_) =~ tr/[a-z]/[A-Z]/;
 | 
			
		||||
		($ALGO = $algo = $_) =~ tr/[\-a-z]/[_A-Z]/;
 | 
			
		||||
 | 
			
		||||
		if (/^asm$/ || /^err$/ || /^hw$/ || /^hw-/)
 | 
			
		||||
			{
 | 
			
		||||
@@ -1015,6 +1103,8 @@ foreach (sort (keys %disabled))
 | 
			
		||||
			else
 | 
			
		||||
				{
 | 
			
		||||
				push @skip, $algo;
 | 
			
		||||
				# fix-up crypto/directory name(s)
 | 
			
		||||
				@skip[$#skip]="whrlpool" if $algo eq "whirlpool";
 | 
			
		||||
				print " (skip dir)";
 | 
			
		||||
 | 
			
		||||
				$depflags .= " -DOPENSSL_NO_$ALGO";
 | 
			
		||||
@@ -1085,6 +1175,8 @@ my $rmd160_obj = $fields[$idx_rmd160_obj];
 | 
			
		||||
my $rc5_obj = $fields[$idx_rc5_obj];
 | 
			
		||||
my $wp_obj = $fields[$idx_wp_obj];
 | 
			
		||||
my $cmll_obj = $fields[$idx_cmll_obj];
 | 
			
		||||
my $modes_obj = $fields[$idx_modes_obj];
 | 
			
		||||
my $engines_obj = $fields[$idx_engines_obj];
 | 
			
		||||
my $perlasm_scheme = $fields[$idx_perlasm_scheme];
 | 
			
		||||
my $dso_scheme = $fields[$idx_dso_scheme];
 | 
			
		||||
my $shared_target = $fields[$idx_shared_target];
 | 
			
		||||
@@ -1245,7 +1337,7 @@ if ($no_asm)
 | 
			
		||||
	{
 | 
			
		||||
	$cpuid_obj=$bn_obj=
 | 
			
		||||
	$des_obj=$aes_obj=$bf_obj=$cast_obj=$rc4_obj=$rc5_obj=$cmll_obj=
 | 
			
		||||
	$sha1_obj=$md5_obj=$rmd160_obj=$wp_obj="";
 | 
			
		||||
	$modes_obj=$sha1_obj=$md5_obj=$rmd160_obj=$wp_obj=$engines_obj="";
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
if (!$no_shared)
 | 
			
		||||
@@ -1309,7 +1401,7 @@ if (!$IsMK1MF)
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
$cpuid_obj.=" uplink.o uplink-cof.o" if ($cflags =~ /\-DOPENSSL_USE_APPLINK/);
 | 
			
		||||
$cpuid_obj.=" uplink.o uplink-x86.o" if ($cflags =~ /\-DOPENSSL_USE_APPLINK/);
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Platform fix-ups
 | 
			
		||||
@@ -1377,6 +1469,14 @@ $cflags.=" -DOPENSSL_BN_ASM_PART_WORDS" if ($bn_obj =~ /bn-586/);
 | 
			
		||||
$cflags.=" -DOPENSSL_IA32_SSE2" if (!$no_sse2 && $bn_obj =~ /86/);
 | 
			
		||||
 | 
			
		||||
$cflags.=" -DOPENSSL_BN_ASM_MONT" if ($bn_obj =~ /-mont/);
 | 
			
		||||
$cflags.=" -DOPENSSL_BN_ASM_MONT5" if ($bn_obj =~ /-mont5/);
 | 
			
		||||
$cflags.=" -DOPENSSL_BN_ASM_GF2m" if ($bn_obj =~ /-gf2m/);
 | 
			
		||||
 | 
			
		||||
if ($fips)
 | 
			
		||||
	{
 | 
			
		||||
	$openssl_other_defines.="#define OPENSSL_FIPS\n";
 | 
			
		||||
	$cflags .= " -I\$(FIPSDIR)/include";
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
$cpuid_obj="mem_clr.o"	unless ($cpuid_obj =~ /\.o$/);
 | 
			
		||||
$des_obj=$des_enc	unless ($des_obj =~ /\.o$/);
 | 
			
		||||
@@ -1410,12 +1510,20 @@ if ($rmd160_obj =~ /\.o$/)
 | 
			
		||||
if ($aes_obj =~ /\.o$/)
 | 
			
		||||
	{
 | 
			
		||||
	$cflags.=" -DAES_ASM";
 | 
			
		||||
	# aes-ctr.o is not a real file, only indication that assembler
 | 
			
		||||
	# module implements AES_ctr32_encrypt...
 | 
			
		||||
	$cflags.=" -DAES_CTR_ASM" if ($aes_obj =~ s/\s*aes\-ctr\.o//);
 | 
			
		||||
	# aes-xts.o indicates presense of AES_xts_[en|de]crypt...
 | 
			
		||||
	$cflags.=" -DAES_XTS_ASM" if ($aes_obj =~ s/\s*aes\-xts\.o//);
 | 
			
		||||
	$aes_obj =~ s/\s*(vpaes|aesni)\-x86\.o//g if ($no_sse2);
 | 
			
		||||
	$cflags.=" -DVPAES_ASM" if ($aes_obj =~ m/vpaes/);
 | 
			
		||||
	$cflags.=" -DBSAES_ASM" if ($aes_obj =~ m/bsaes/);
 | 
			
		||||
	}
 | 
			
		||||
else	{
 | 
			
		||||
	$aes_obj=$aes_enc;
 | 
			
		||||
	}
 | 
			
		||||
$wp_obj="" if ($wp_obj =~ /mmx/ && $processor eq "386");
 | 
			
		||||
if ($wp_obj =~ /\.o$/)
 | 
			
		||||
if ($wp_obj =~ /\.o$/ && !$disabled{"whirlpool"})
 | 
			
		||||
	{
 | 
			
		||||
	$cflags.=" -DWHIRLPOOL_ASM";
 | 
			
		||||
	}
 | 
			
		||||
@@ -1423,6 +1531,10 @@ else	{
 | 
			
		||||
	$wp_obj="wp_block.o";
 | 
			
		||||
	}
 | 
			
		||||
$cmll_obj=$cmll_enc	unless ($cmll_obj =~ /.o$/);
 | 
			
		||||
if ($modes_obj =~ /ghash/)
 | 
			
		||||
	{
 | 
			
		||||
	$cflags.=" -DGHASH_ASM";
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
# "Stringify" the C flags string.  This permits it to be made part of a string
 | 
			
		||||
# and works as well on command lines.
 | 
			
		||||
@@ -1537,6 +1649,8 @@ while (<IN>)
 | 
			
		||||
	s/^RMD160_ASM_OBJ=.*$/RMD160_ASM_OBJ= $rmd160_obj/;
 | 
			
		||||
	s/^WP_ASM_OBJ=.*$/WP_ASM_OBJ= $wp_obj/;
 | 
			
		||||
	s/^CMLL_ENC=.*$/CMLL_ENC= $cmll_obj/;
 | 
			
		||||
	s/^MODES_ASM_OBJ.=*$/MODES_ASM_OBJ= $modes_obj/;
 | 
			
		||||
	s/^ENGINES_ASM_OBJ.=*$/ENGINES_ASM_OBJ= $engines_obj/;
 | 
			
		||||
	s/^PERLASM_SCHEME=.*$/PERLASM_SCHEME= $perlasm_scheme/;
 | 
			
		||||
	s/^PROCESSOR=.*/PROCESSOR= $processor/;
 | 
			
		||||
	s/^ARFLAGS=.*/ARFLAGS= $arflags/;
 | 
			
		||||
@@ -1545,6 +1659,12 @@ while (<IN>)
 | 
			
		||||
	s/^LIBKRB5=.*/LIBKRB5=$withargs{"krb5-lib"}/;
 | 
			
		||||
	s/^LIBZLIB=.*/LIBZLIB=$withargs{"zlib-lib"}/;
 | 
			
		||||
	s/^ZLIB_INCLUDE=.*/ZLIB_INCLUDE=$withargs{"zlib-include"}/;
 | 
			
		||||
 | 
			
		||||
	s/^FIPSDIR=.*/FIPSDIR=$fipsdir/;
 | 
			
		||||
	s/^FIPSLIBDIR=.*/FIPSLIBDIR=$fipslibdir/;
 | 
			
		||||
	s/^FIPSCANLIB=.*/FIPSCANLIB=libcrypto/ if $fips;
 | 
			
		||||
	s/^BASEADDR=.*/BASEADDR=$baseaddr/;
 | 
			
		||||
 | 
			
		||||
	s/^SHLIB_TARGET=.*/SHLIB_TARGET=$shared_target/;
 | 
			
		||||
	s/^SHLIB_MARK=.*/SHLIB_MARK=$shared_mark/;
 | 
			
		||||
	s/^SHARED_LIBS=.*/SHARED_LIBS=\$(SHARED_CRYPTO) \$(SHARED_SSL)/ if (!$no_shared);
 | 
			
		||||
@@ -1588,7 +1708,9 @@ print "RC5_ENC       =$rc5_obj\n";
 | 
			
		||||
print "MD5_OBJ_ASM   =$md5_obj\n";
 | 
			
		||||
print "SHA1_OBJ_ASM  =$sha1_obj\n";
 | 
			
		||||
print "RMD160_OBJ_ASM=$rmd160_obj\n";
 | 
			
		||||
print "CMLL_ENC=     =$cmll_obj\n";
 | 
			
		||||
print "CMLL_ENC      =$cmll_obj\n";
 | 
			
		||||
print "MODES_OBJ     =$modes_obj\n";
 | 
			
		||||
print "ENGINES_OBJ   =$engines_obj\n";
 | 
			
		||||
print "PROCESSOR     =$processor\n";
 | 
			
		||||
print "RANLIB        =$ranlib\n";
 | 
			
		||||
print "ARFLAGS       =$arflags\n";
 | 
			
		||||
@@ -1650,6 +1772,9 @@ open(OUT,'>crypto/opensslconf.h.new') || die "unable to create crypto/opensslcon
 | 
			
		||||
print OUT "/* opensslconf.h */\n";
 | 
			
		||||
print OUT "/* WARNING: Generated automatically from opensslconf.h.in by Configure. */\n\n";
 | 
			
		||||
 | 
			
		||||
print OUT "#ifdef  __cplusplus\n";
 | 
			
		||||
print OUT "extern \"C\" {\n";
 | 
			
		||||
print OUT "#endif\n";
 | 
			
		||||
print OUT "/* OpenSSL was configured with the following options: */\n";
 | 
			
		||||
my $openssl_algorithm_defines_trans = $openssl_algorithm_defines;
 | 
			
		||||
$openssl_experimental_defines =~ s/^\s*#\s*define\s+OPENSSL_NO_(.*)/#ifndef OPENSSL_EXPERIMENTAL_$1\n# ifndef OPENSSL_NO_$1\n#  define OPENSSL_NO_$1\n# endif\n#endif/mg;
 | 
			
		||||
@@ -1754,6 +1879,9 @@ while (<IN>)
 | 
			
		||||
		{ print OUT $_; }
 | 
			
		||||
	}
 | 
			
		||||
close(IN);
 | 
			
		||||
print OUT "#ifdef  __cplusplus\n";
 | 
			
		||||
print OUT "}\n";
 | 
			
		||||
print OUT "#endif\n";
 | 
			
		||||
close(OUT);
 | 
			
		||||
rename("crypto/opensslconf.h","crypto/opensslconf.h.bak") || die "unable to rename crypto/opensslconf.h\n" if -e "crypto/opensslconf.h";
 | 
			
		||||
rename("crypto/opensslconf.h.new","crypto/opensslconf.h") || die "unable to rename crypto/opensslconf.h.new\n";
 | 
			
		||||
@@ -1981,7 +2109,8 @@ sub print_table_entry
 | 
			
		||||
	(my $cc,my $cflags,my $unistd,my $thread_cflag,my $sys_id,my $lflags,
 | 
			
		||||
	my $bn_ops,my $cpuid_obj,my $bn_obj,my $des_obj,my $aes_obj, my $bf_obj,
 | 
			
		||||
	my $md5_obj,my $sha1_obj,my $cast_obj,my $rc4_obj,my $rmd160_obj,
 | 
			
		||||
	my $rc5_obj,my $wp_obj,my $cmll_obj,my $perlasm_scheme,my $dso_scheme,my $shared_target,my $shared_cflag,
 | 
			
		||||
	my $rc5_obj,my $wp_obj,my $cmll_obj,my $modes_obj, my $engines_obj,
 | 
			
		||||
	my $perlasm_scheme,my $dso_scheme,my $shared_target,my $shared_cflag,
 | 
			
		||||
	my $shared_ldflag,my $shared_extension,my $ranlib,my $arflags,my $multilib)=
 | 
			
		||||
	split(/\s*:\s*/,$table{$target} . ":" x 30 , -1);
 | 
			
		||||
			
 | 
			
		||||
@@ -2008,6 +2137,8 @@ sub print_table_entry
 | 
			
		||||
\$rc5_obj      = $rc5_obj
 | 
			
		||||
\$wp_obj       = $wp_obj
 | 
			
		||||
\$cmll_obj     = $cmll_obj
 | 
			
		||||
\$modes_obj    = $modes_obj
 | 
			
		||||
\$engines_obj  = $engines_obj
 | 
			
		||||
\$perlasm_scheme = $perlasm_scheme
 | 
			
		||||
\$dso_scheme   = $dso_scheme
 | 
			
		||||
\$shared_target= $shared_target
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										32
									
								
								FAQ
									
									
									
									
									
								
							
							
						
						
									
										32
									
								
								FAQ
									
									
									
									
									
								
							@@ -10,6 +10,7 @@ OpenSSL  -  Frequently Asked Questions
 | 
			
		||||
* Why aren't tools like 'autoconf' and 'libtool' used?
 | 
			
		||||
* What is an 'engine' version?
 | 
			
		||||
* How do I check the authenticity of the OpenSSL distribution?
 | 
			
		||||
* How does the versioning scheme work?
 | 
			
		||||
 | 
			
		||||
[LEGAL] Legal questions
 | 
			
		||||
 | 
			
		||||
@@ -82,11 +83,11 @@ OpenSSL  -  Frequently Asked Questions
 | 
			
		||||
* Which is the current version of OpenSSL?
 | 
			
		||||
 | 
			
		||||
The current version is available from <URL: http://www.openssl.org>.
 | 
			
		||||
OpenSSL 1.0.0f was released on Jan 4th, 2012.
 | 
			
		||||
OpenSSL 1.0.1e was released on Feb 11th, 2013.
 | 
			
		||||
 | 
			
		||||
In addition to the current stable release, you can also access daily
 | 
			
		||||
snapshots of the OpenSSL development version at <URL:
 | 
			
		||||
ftp://ftp.openssl.org/snapshot/>, or get it by anonymous CVS access.
 | 
			
		||||
ftp://ftp.openssl.org/snapshot/>, or get it by anonymous Git access.
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
* Where is the documentation?
 | 
			
		||||
@@ -108,12 +109,9 @@ In addition, you can read the most current versions at
 | 
			
		||||
<URL: http://www.openssl.org/docs/>. Note that the online documents refer
 | 
			
		||||
to the very latest development versions of OpenSSL and may include features
 | 
			
		||||
not present in released versions. If in doubt refer to the documentation
 | 
			
		||||
that came with the version of OpenSSL you are using.
 | 
			
		||||
 | 
			
		||||
For information on parts of libcrypto that are not yet documented, you
 | 
			
		||||
might want to read Ariel Glenn's documentation on SSLeay 0.9, OpenSSL's
 | 
			
		||||
predecessor, at <URL: http://www.columbia.edu/~ariel/ssleay/>.  Much
 | 
			
		||||
of this still applies to OpenSSL.
 | 
			
		||||
that came with the version of OpenSSL you are using. The pod format
 | 
			
		||||
documentation is included in each OpenSSL distribution under the docs
 | 
			
		||||
directory.
 | 
			
		||||
 | 
			
		||||
There is some documentation about certificate extensions and PKCS#12
 | 
			
		||||
in doc/openssl.txt
 | 
			
		||||
@@ -173,6 +171,19 @@ just do:
 | 
			
		||||
 | 
			
		||||
   pgp TARBALL.asc
 | 
			
		||||
 | 
			
		||||
* How does the versioning scheme work?
 | 
			
		||||
 | 
			
		||||
After the release of OpenSSL 1.0.0 the versioning scheme changed. Letter 
 | 
			
		||||
releases (e.g. 1.0.1a) can only contain bug and security fixes and no
 | 
			
		||||
new features. Minor releases change the last number (e.g. 1.0.2) and 
 | 
			
		||||
can contain new features that retain binary compatibility. Changes to
 | 
			
		||||
the middle number are considered major releases and neither source nor
 | 
			
		||||
binary compatibility is guaranteed.
 | 
			
		||||
 | 
			
		||||
Therefore the answer to the common question "when will feature X be
 | 
			
		||||
backported to OpenSSL 1.0.0/0.9.8?" is "never" but it could appear
 | 
			
		||||
in the next minor release.
 | 
			
		||||
 | 
			
		||||
[LEGAL] =======================================================================
 | 
			
		||||
 | 
			
		||||
* Do I need patent licenses to use OpenSSL?
 | 
			
		||||
@@ -284,7 +295,7 @@ current directory in this case, but this has changed with 0.9.6a.)
 | 
			
		||||
Check out the CA.pl(1) manual page. This provides a simple wrapper round
 | 
			
		||||
the 'req', 'verify', 'ca' and 'pkcs12' utilities. For finer control check
 | 
			
		||||
out the manual pages for the individual utilities and the certificate
 | 
			
		||||
extensions documentation (currently in doc/openssl.txt).
 | 
			
		||||
extensions documentation (in ca(1), req(1), x509v3_config(5) )
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
* Why can't I create certificate requests?
 | 
			
		||||
@@ -752,6 +763,9 @@ openssl-security@openssl.org if you don't get a prompt reply at least
 | 
			
		||||
acknowledging receipt then resend or mail it directly to one of the
 | 
			
		||||
more active team members (e.g. Steve).
 | 
			
		||||
 | 
			
		||||
Note that bugs only present in the openssl utility are not in general
 | 
			
		||||
considered to be security issues. 
 | 
			
		||||
 | 
			
		||||
[PROG] ========================================================================
 | 
			
		||||
 | 
			
		||||
* Is OpenSSL thread-safe?
 | 
			
		||||
 
 | 
			
		||||
@@ -29,7 +29,7 @@
 | 
			
		||||
  is required if you intend to utilize assembler modules. Note that NASM
 | 
			
		||||
  is now the only supported assembler.
 | 
			
		||||
 | 
			
		||||
 If you are compiling from a tarball or a CVS snapshot then the Win32 files
 | 
			
		||||
 If you are compiling from a tarball or a Git snapshot then the Win32 files
 | 
			
		||||
 may well be not up to date. This may mean that some "tweaking" is required to
 | 
			
		||||
 get it all to work. See the trouble shooting section later on for if (when?)
 | 
			
		||||
 it goes wrong.
 | 
			
		||||
@@ -257,7 +257,7 @@
 | 
			
		||||
 | 
			
		||||
 then ms\do_XXX should not give a warning any more. However the numbers that
 | 
			
		||||
 get assigned by this technique may not match those that eventually get
 | 
			
		||||
 assigned in the CVS tree: so anything linked against this version of the
 | 
			
		||||
 assigned in the Git tree: so anything linked against this version of the
 | 
			
		||||
 library may need to be recompiled.
 | 
			
		||||
 | 
			
		||||
 If you get errors about unresolved symbols there are several possible
 | 
			
		||||
 
 | 
			
		||||
@@ -23,7 +23,7 @@
 | 
			
		||||
#if !defined(RC4_INT)
 | 
			
		||||
/* using int types make the structure larger but make the code faster
 | 
			
		||||
 * on most boxes I have tested - up to %20 faster. */
 | 
			
		||||
/*
 | 
			
		||||
/*-
 | 
			
		||||
 * I don't know what does "most" mean, but declaring "int" is a must on:
 | 
			
		||||
 * - Intel P6 because partial register stalls are very expensive;
 | 
			
		||||
 * - elder Alpha because it lacks byte load/store instructions;
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										70
									
								
								Makefile.org
									
									
									
									
									
								
							
							
						
						
									
										70
									
								
								Makefile.org
									
									
									
									
									
								
							@@ -69,7 +69,7 @@ RANLIB= ranlib
 | 
			
		||||
NM= nm
 | 
			
		||||
PERL= perl
 | 
			
		||||
TAR= tar
 | 
			
		||||
TARFLAGS= --no-recursion
 | 
			
		||||
TARFLAGS= --no-recursion --record-size=10240
 | 
			
		||||
MAKEDEPPROG=makedepend
 | 
			
		||||
LIBDIR=lib
 | 
			
		||||
 | 
			
		||||
@@ -99,6 +99,8 @@ SHA1_ASM_OBJ=
 | 
			
		||||
RMD160_ASM_OBJ= 
 | 
			
		||||
WP_ASM_OBJ=
 | 
			
		||||
CMLL_ENC=
 | 
			
		||||
MODES_ASM_OBJ=
 | 
			
		||||
ENGINES_ASM_OBJ=
 | 
			
		||||
PERLASM_SCHEME=
 | 
			
		||||
 | 
			
		||||
# KRB5 stuff
 | 
			
		||||
@@ -109,6 +111,30 @@ LIBKRB5=
 | 
			
		||||
ZLIB_INCLUDE=
 | 
			
		||||
LIBZLIB=
 | 
			
		||||
 | 
			
		||||
# TOP level FIPS install directory.
 | 
			
		||||
FIPSDIR=
 | 
			
		||||
 | 
			
		||||
# This is the location of fipscanister.o and friends.
 | 
			
		||||
# The FIPS module build will place it $(INSTALLTOP)/lib
 | 
			
		||||
# but since $(INSTALLTOP) can only take the default value
 | 
			
		||||
# when the module is built it will be in /usr/local/ssl/lib
 | 
			
		||||
# $(INSTALLTOP) for this build may be different so hard
 | 
			
		||||
# code the path.
 | 
			
		||||
 | 
			
		||||
FIPSLIBDIR=
 | 
			
		||||
 | 
			
		||||
# The location of the library which contains fipscanister.o
 | 
			
		||||
# normally it will be libcrypto unless fipsdso is set in which
 | 
			
		||||
# case it will be libfips. If not compiling in FIPS mode at all
 | 
			
		||||
# this is empty making it a useful test for a FIPS compile.
 | 
			
		||||
 | 
			
		||||
FIPSCANLIB=
 | 
			
		||||
 | 
			
		||||
# Shared library base address. Currently only used on Windows.
 | 
			
		||||
#
 | 
			
		||||
 | 
			
		||||
BASEADDR=
 | 
			
		||||
 | 
			
		||||
DIRS=   crypto ssl engines apps test tools
 | 
			
		||||
ENGDIRS= ccgost
 | 
			
		||||
SHLIBDIRS= crypto ssl
 | 
			
		||||
@@ -121,7 +147,7 @@ SDIRS=  \
 | 
			
		||||
	bn ec rsa dsa ecdsa dh ecdh dso engine \
 | 
			
		||||
	buffer bio stack lhash rand err \
 | 
			
		||||
	evp asn1 pem x509 x509v3 conf txt_db pkcs7 pkcs12 comp ocsp ui krb5 \
 | 
			
		||||
	cms pqueue ts jpake store
 | 
			
		||||
	cms pqueue ts jpake srp store cmac
 | 
			
		||||
# keep in mind that the above list is adjusted by ./Configure
 | 
			
		||||
# according to no-xxx arguments...
 | 
			
		||||
 | 
			
		||||
@@ -172,7 +198,7 @@ CLEARENV=	TOP= && unset TOP $${LIB+LIB} $${LIBS+LIBS}	\
 | 
			
		||||
		$${EXHEADER+EXHEADER} $${HEADER+HEADER}		\
 | 
			
		||||
		$${GENERAL+GENERAL} $${CFLAGS+CFLAGS}		\
 | 
			
		||||
		$${ASFLAGS+ASFLAGS} $${AFLAGS+AFLAGS}		\
 | 
			
		||||
		$${LDCMD+LDCMD} $${LDFLAGS+LDFLAGS}		\
 | 
			
		||||
		$${LDCMD+LDCMD} $${LDFLAGS+LDFLAGS} $${SCRIPTS+SCRIPTS}	\
 | 
			
		||||
		$${SHAREDCMD+SHAREDCMD} $${SHAREDFLAGS+SHAREDFLAGS}	\
 | 
			
		||||
		$${SHARED_LIB+SHARED_LIB} $${LIBEXTRAS+LIBEXTRAS}
 | 
			
		||||
 | 
			
		||||
@@ -204,7 +230,12 @@ BUILDENV=	PLATFORM='$(PLATFORM)' PROCESSOR='$(PROCESSOR)' \
 | 
			
		||||
		MD5_ASM_OBJ='$(MD5_ASM_OBJ)'			\
 | 
			
		||||
		RMD160_ASM_OBJ='$(RMD160_ASM_OBJ)'		\
 | 
			
		||||
		WP_ASM_OBJ='$(WP_ASM_OBJ)'			\
 | 
			
		||||
		MODES_ASM_OBJ='$(MODES_ASM_OBJ)'		\
 | 
			
		||||
		ENGINES_ASM_OBJ='$(ENGINES_ASM_OBJ)'		\
 | 
			
		||||
		PERLASM_SCHEME='$(PERLASM_SCHEME)'		\
 | 
			
		||||
		FIPSLIBDIR='${FIPSLIBDIR}'			\
 | 
			
		||||
		FIPSDIR='${FIPSDIR}'				\
 | 
			
		||||
		FIPSCANLIB="$${FIPSCANLIB:-$(FIPSCANLIB)}"	\
 | 
			
		||||
		THIS=$${THIS:-$@} MAKEFILE=Makefile MAKEOVERRIDES=
 | 
			
		||||
# MAKEOVERRIDES= effectively "equalizes" GNU-ish and SysV-ish make flavors,
 | 
			
		||||
# which in turn eliminates ambiguities in variable treatment with -e.
 | 
			
		||||
@@ -258,9 +289,21 @@ all_testapps: build_libs build_testapps
 | 
			
		||||
build_testapps:
 | 
			
		||||
	@dir=crypto; target=testapps; $(BUILD_ONE_CMD)
 | 
			
		||||
 | 
			
		||||
libcrypto$(SHLIB_EXT): libcrypto.a
 | 
			
		||||
fips_premain_dso$(EXE_EXT): libcrypto.a
 | 
			
		||||
	[ -z "$(FIPSCANLIB)" ] || $(CC) $(CFLAG) -Iinclude \
 | 
			
		||||
		-DFINGERPRINT_PREMAIN_DSO_LOAD -o $@  \
 | 
			
		||||
		$(FIPSLIBDIR)fips_premain.c $(FIPSLIBDIR)fipscanister.o \
 | 
			
		||||
		libcrypto.a $(EX_LIBS)
 | 
			
		||||
 | 
			
		||||
libcrypto$(SHLIB_EXT): libcrypto.a fips_premain_dso$(EXE_EXT)
 | 
			
		||||
	@if [ "$(SHLIB_TARGET)" != "" ]; then \
 | 
			
		||||
		$(MAKE) SHLIBDIRS=crypto build-shared; \
 | 
			
		||||
		if [ "$(FIPSCANLIB)" = "libcrypto" ]; then \
 | 
			
		||||
			FIPSLD_LIBCRYPTO=libcrypto.a ; \
 | 
			
		||||
			FIPSLD_CC="$(CC)"; CC=$(FIPSDIR)/bin/fipsld; \
 | 
			
		||||
			export CC FIPSLD_CC FIPSLD_LIBCRYPTO; \
 | 
			
		||||
		fi; \
 | 
			
		||||
		$(MAKE) -e SHLIBDIRS=crypto  CC="$${CC:-$(CC)}" build-shared && \
 | 
			
		||||
		(touch -c fips_premain_dso$(EXE_EXT) || :); \
 | 
			
		||||
	else \
 | 
			
		||||
		echo "There's no support for shared libraries on this platform" >&2; \
 | 
			
		||||
		exit 1; \
 | 
			
		||||
@@ -322,7 +365,8 @@ libcrypto.pc: Makefile
 | 
			
		||||
	    echo 'Description: OpenSSL cryptography library'; \
 | 
			
		||||
	    echo 'Version: '$(VERSION); \
 | 
			
		||||
	    echo 'Requires: '; \
 | 
			
		||||
	    echo 'Libs: -L$${libdir} -lcrypto $(EX_LIBS)'; \
 | 
			
		||||
	    echo 'Libs: -L$${libdir} -lcrypto'; \
 | 
			
		||||
	    echo 'Libs.private: $(EX_LIBS)'; \
 | 
			
		||||
	    echo 'Cflags: -I$${includedir} $(KRB5_INCLUDES)' ) > libcrypto.pc
 | 
			
		||||
 | 
			
		||||
libssl.pc: Makefile
 | 
			
		||||
@@ -335,7 +379,8 @@ libssl.pc: Makefile
 | 
			
		||||
	    echo 'Description: Secure Sockets Layer and cryptography libraries'; \
 | 
			
		||||
	    echo 'Version: '$(VERSION); \
 | 
			
		||||
	    echo 'Requires: '; \
 | 
			
		||||
	    echo 'Libs: -L$${libdir} -lssl -lcrypto $(EX_LIBS)'; \
 | 
			
		||||
	    echo 'Libs: -L$${libdir} -lssl -lcrypto'; \
 | 
			
		||||
	    echo 'Libs.private: $(EX_LIBS)'; \
 | 
			
		||||
	    echo 'Cflags: -I$${includedir} $(KRB5_INCLUDES)' ) > libssl.pc
 | 
			
		||||
 | 
			
		||||
openssl.pc: Makefile
 | 
			
		||||
@@ -348,7 +393,8 @@ openssl.pc: Makefile
 | 
			
		||||
	    echo 'Description: Secure Sockets Layer and cryptography libraries and tools'; \
 | 
			
		||||
	    echo 'Version: '$(VERSION); \
 | 
			
		||||
	    echo 'Requires: '; \
 | 
			
		||||
	    echo 'Libs: -L$${libdir} -lssl -lcrypto $(EX_LIBS)'; \
 | 
			
		||||
	    echo 'Libs: -L$${libdir} -lssl -lcrypto'; \
 | 
			
		||||
	    echo 'Libs.private: $(EX_LIBS)'; \
 | 
			
		||||
	    echo 'Cflags: -I$${includedir} $(KRB5_INCLUDES)' ) > openssl.pc
 | 
			
		||||
 | 
			
		||||
Makefile: Makefile.org Configure config
 | 
			
		||||
@@ -357,7 +403,7 @@ Makefile: Makefile.org Configure config
 | 
			
		||||
	@false
 | 
			
		||||
 | 
			
		||||
libclean:
 | 
			
		||||
	rm -f *.map *.so *.so.* *.dll engines/*.so engines/*.dll *.a engines/*.a */lib */*/lib
 | 
			
		||||
	rm -f *.map *.so *.so.* *.dylib *.dll engines/*.so engines/*.dll engines/*.dylib *.a engines/*.a */lib */*/lib
 | 
			
		||||
 | 
			
		||||
clean:	libclean
 | 
			
		||||
	rm -f shlib/*.o *.o core a.out fluff rehash.time testlog make.log cctest cctest.c
 | 
			
		||||
@@ -399,7 +445,7 @@ rehash.time: certs apps
 | 
			
		||||
		[ -x "apps/openssl.exe" ] && OPENSSL="apps/openssl.exe" || :; \
 | 
			
		||||
		OPENSSL_DEBUG_MEMORY=on; \
 | 
			
		||||
		export OPENSSL OPENSSL_DEBUG_MEMORY; \
 | 
			
		||||
		$(PERL) tools/c_rehash certs) && \
 | 
			
		||||
		$(PERL) tools/c_rehash certs/demo) && \
 | 
			
		||||
		touch rehash.time; \
 | 
			
		||||
	else :; fi
 | 
			
		||||
 | 
			
		||||
@@ -424,9 +470,9 @@ tags:
 | 
			
		||||
	find . -name '[^.]*.[ch]' | xargs etags -a
 | 
			
		||||
 | 
			
		||||
errors:
 | 
			
		||||
	$(PERL) util/ck_errf.pl -strict */*.c */*/*.c
 | 
			
		||||
	$(PERL) util/mkerr.pl -recurse -write
 | 
			
		||||
	(cd engines; $(MAKE) PERL=$(PERL) errors)
 | 
			
		||||
	$(PERL) util/ck_errf.pl */*.c */*/*.c
 | 
			
		||||
 | 
			
		||||
stacks:
 | 
			
		||||
	$(PERL) util/mkstack.pl -write
 | 
			
		||||
@@ -509,7 +555,7 @@ install_sw:
 | 
			
		||||
	chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl/$$i ); \
 | 
			
		||||
	done;
 | 
			
		||||
	@set -e; target=install; $(RECURSIVE_BUILD_CMD)
 | 
			
		||||
	@set -e; for i in $(LIBS) ;\
 | 
			
		||||
	@set -e; liblist="$(LIBS)"; for i in $$liblist ;\
 | 
			
		||||
	do \
 | 
			
		||||
		if [ -f "$$i" ]; then \
 | 
			
		||||
		(       echo installing $$i; \
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										274
									
								
								NEWS
									
									
									
									
									
								
							
							
						
						
									
										274
									
								
								NEWS
									
									
									
									
									
								
							@@ -5,7 +5,132 @@
 | 
			
		||||
  This file gives a brief overview of the major changes between each OpenSSL
 | 
			
		||||
  release. For more details please read the CHANGES file.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.0e and OpenSSL 1.0.0f:
 | 
			
		||||
  Major changes between OpenSSL 1.0.1l and OpenSSL 1.0.1m [under development]
 | 
			
		||||
 | 
			
		||||
      o
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.1k and OpenSSL 1.0.1l [15 Jan 2015]
 | 
			
		||||
 | 
			
		||||
      o Build fixes for the Windows and OpenVMS platforms
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.1j and OpenSSL 1.0.1k [8 Jan 2015]
 | 
			
		||||
 | 
			
		||||
      o Fix for CVE-2014-3571
 | 
			
		||||
      o Fix for CVE-2015-0206
 | 
			
		||||
      o Fix for CVE-2014-3569
 | 
			
		||||
      o Fix for CVE-2014-3572
 | 
			
		||||
      o Fix for CVE-2015-0204
 | 
			
		||||
      o Fix for CVE-2015-0205
 | 
			
		||||
      o Fix for CVE-2014-8275
 | 
			
		||||
      o Fix for CVE-2014-3570
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.1i and OpenSSL 1.0.1j [15 Oct 2014]
 | 
			
		||||
 | 
			
		||||
      o Fix for CVE-2014-3513
 | 
			
		||||
      o Fix for CVE-2014-3567
 | 
			
		||||
      o Mitigation for CVE-2014-3566 (SSL protocol vulnerability)
 | 
			
		||||
      o Fix for CVE-2014-3568
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.1h and OpenSSL 1.0.1i [6 Aug 2014]
 | 
			
		||||
 | 
			
		||||
      o Fix for CVE-2014-3512
 | 
			
		||||
      o Fix for CVE-2014-3511
 | 
			
		||||
      o Fix for CVE-2014-3510
 | 
			
		||||
      o Fix for CVE-2014-3507
 | 
			
		||||
      o Fix for CVE-2014-3506
 | 
			
		||||
      o Fix for CVE-2014-3505
 | 
			
		||||
      o Fix for CVE-2014-3509
 | 
			
		||||
      o Fix for CVE-2014-5139
 | 
			
		||||
      o Fix for CVE-2014-3508
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.1g and OpenSSL 1.0.1h [5 Jun 2014]
 | 
			
		||||
 | 
			
		||||
      o Fix for CVE-2014-0224
 | 
			
		||||
      o Fix for CVE-2014-0221
 | 
			
		||||
      o Fix for CVE-2014-0198
 | 
			
		||||
      o Fix for CVE-2014-0195
 | 
			
		||||
      o Fix for CVE-2014-3470
 | 
			
		||||
      o Fix for CVE-2010-5298
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.1f and OpenSSL 1.0.1g [7 Apr 2014]
 | 
			
		||||
 | 
			
		||||
      o Fix for CVE-2014-0160
 | 
			
		||||
      o Add TLS padding extension workaround for broken servers.
 | 
			
		||||
      o Fix for CVE-2014-0076
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.1e and OpenSSL 1.0.1f [6 Jan 2014]
 | 
			
		||||
 | 
			
		||||
      o Don't include gmt_unix_time in TLS server and client random values
 | 
			
		||||
      o Fix for TLS record tampering bug CVE-2013-4353
 | 
			
		||||
      o Fix for TLS version checking bug CVE-2013-6449
 | 
			
		||||
      o Fix for DTLS retransmission bug CVE-2013-6450
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.1d and OpenSSL 1.0.1e [11 Feb 2013]:
 | 
			
		||||
 | 
			
		||||
      o Corrected fix for CVE-2013-0169
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.1c and OpenSSL 1.0.1d [4 Feb 2013]:
 | 
			
		||||
 | 
			
		||||
      o Fix renegotiation in TLS 1.1, 1.2 by using the correct TLS version.
 | 
			
		||||
      o Include the fips configuration module.
 | 
			
		||||
      o Fix OCSP bad key DoS attack CVE-2013-0166
 | 
			
		||||
      o Fix for SSL/TLS/DTLS CBC plaintext recovery attack CVE-2013-0169
 | 
			
		||||
      o Fix for TLS AESNI record handling flaw CVE-2012-2686
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.1b and OpenSSL 1.0.1c [10 May 2012]:
 | 
			
		||||
 | 
			
		||||
      o Fix TLS/DTLS record length checking bug CVE-2012-2333
 | 
			
		||||
      o Don't attempt to use non-FIPS composite ciphers in FIPS mode.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.1a and OpenSSL 1.0.1b [26 Apr 2012]:
 | 
			
		||||
 | 
			
		||||
      o Fix compilation error on non-x86 platforms.
 | 
			
		||||
      o Make FIPS capable OpenSSL ciphers work in non-FIPS mode.
 | 
			
		||||
      o Fix SSL_OP_NO_TLSv1_1 clash with SSL_OP_ALL in OpenSSL 1.0.0
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.1 and OpenSSL 1.0.1a [19 Apr 2012]:
 | 
			
		||||
 | 
			
		||||
      o Fix for ASN1 overflow bug CVE-2012-2110
 | 
			
		||||
      o Workarounds for some servers that hang on long client hellos.
 | 
			
		||||
      o Fix SEGV in AES code.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.0h and OpenSSL 1.0.1 [14 Mar 2012]:
 | 
			
		||||
 | 
			
		||||
      o TLS/DTLS heartbeat support.
 | 
			
		||||
      o SCTP support.
 | 
			
		||||
      o RFC 5705 TLS key material exporter.
 | 
			
		||||
      o RFC 5764 DTLS-SRTP negotiation.
 | 
			
		||||
      o Next Protocol Negotiation.
 | 
			
		||||
      o PSS signatures in certificates, requests and CRLs.
 | 
			
		||||
      o Support for password based recipient info for CMS.
 | 
			
		||||
      o Support TLS v1.2 and TLS v1.1.
 | 
			
		||||
      o Preliminary FIPS capability for unvalidated 2.0 FIPS module.
 | 
			
		||||
      o SRP support.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.0j and OpenSSL 1.0.0k [5 Feb 2013]:
 | 
			
		||||
 | 
			
		||||
      o Fix for SSL/TLS/DTLS CBC plaintext recovery attack CVE-2013-0169
 | 
			
		||||
      o Fix OCSP bad key DoS attack CVE-2013-0166
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.0i and OpenSSL 1.0.0j [10 May 2012]:
 | 
			
		||||
 | 
			
		||||
      o Fix DTLS record length checking bug CVE-2012-2333
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.0h and OpenSSL 1.0.0i [19 Apr 2012]:
 | 
			
		||||
 | 
			
		||||
      o Fix for ASN1 overflow bug CVE-2012-2110
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.0g and OpenSSL 1.0.0h [12 Mar 2012]:
 | 
			
		||||
 | 
			
		||||
      o Fix for CMS/PKCS#7 MMA CVE-2012-0884
 | 
			
		||||
      o Corrected fix for CVE-2011-4619
 | 
			
		||||
      o Various DTLS fixes.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.0f and OpenSSL 1.0.0g [18 Jan 2012]:
 | 
			
		||||
 | 
			
		||||
      o Fix for DTLS DoS issue CVE-2012-0050
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.0e and OpenSSL 1.0.0f [4 Jan 2012]:
 | 
			
		||||
 | 
			
		||||
      o Fix for DTLS plaintext recovery attack CVE-2011-4108
 | 
			
		||||
      o Clear block padding bytes of SSL 3.0 records CVE-2011-4576
 | 
			
		||||
@@ -13,7 +138,7 @@
 | 
			
		||||
      o Check parameters are not NULL in GOST ENGINE CVE-2012-0027
 | 
			
		||||
      o Check for malformed RFC3779 data CVE-2011-4577
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.0d and OpenSSL 1.0.0e:
 | 
			
		||||
  Major changes between OpenSSL 1.0.0d and OpenSSL 1.0.0e [6 Sep 2011]:
 | 
			
		||||
 | 
			
		||||
      o Fix for CRL vulnerability issue CVE-2011-3207
 | 
			
		||||
      o Fix for ECDH crashes CVE-2011-3210
 | 
			
		||||
@@ -21,11 +146,11 @@
 | 
			
		||||
      o Support ECDH ciphersuites for certificates using SHA2 algorithms.
 | 
			
		||||
      o Various DTLS fixes.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.0c and OpenSSL 1.0.0d:
 | 
			
		||||
  Major changes between OpenSSL 1.0.0c and OpenSSL 1.0.0d [8 Feb 2011]:
 | 
			
		||||
 | 
			
		||||
      o Fix for security issue CVE-2011-0014
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.0b and OpenSSL 1.0.0c:
 | 
			
		||||
  Major changes between OpenSSL 1.0.0b and OpenSSL 1.0.0c [2 Dec 2010]:
 | 
			
		||||
 | 
			
		||||
      o Fix for security issue CVE-2010-4180
 | 
			
		||||
      o Fix for CVE-2010-4252
 | 
			
		||||
@@ -33,18 +158,18 @@
 | 
			
		||||
      o Fix various platform compilation issues.
 | 
			
		||||
      o Corrected fix for security issue CVE-2010-3864.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.0a and OpenSSL 1.0.0b:
 | 
			
		||||
  Major changes between OpenSSL 1.0.0a and OpenSSL 1.0.0b [16 Nov 2010]:
 | 
			
		||||
 | 
			
		||||
      o Fix for security issue CVE-2010-3864.
 | 
			
		||||
      o Fix for CVE-2010-2939
 | 
			
		||||
      o Fix WIN32 build system for GOST ENGINE.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.0 and OpenSSL 1.0.0a:
 | 
			
		||||
  Major changes between OpenSSL 1.0.0 and OpenSSL 1.0.0a [1 Jun 2010]:
 | 
			
		||||
 | 
			
		||||
      o Fix for security issue CVE-2010-1633.
 | 
			
		||||
      o GOST MAC and CFB fixes.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.8n and OpenSSL 1.0.0:
 | 
			
		||||
  Major changes between OpenSSL 0.9.8n and OpenSSL 1.0.0 [29 Mar 2010]:
 | 
			
		||||
 | 
			
		||||
      o RFC3280 path validation: sufficient to process PKITS tests.
 | 
			
		||||
      o Integrated support for PVK files and keyblobs.
 | 
			
		||||
@@ -67,20 +192,55 @@
 | 
			
		||||
      o Opaque PRF Input TLS extension support.
 | 
			
		||||
      o Updated time routines to avoid OS limitations.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.8q and OpenSSL 0.9.8r:
 | 
			
		||||
  Major changes between OpenSSL 0.9.8x and OpenSSL 0.9.8y [5 Feb 2013]:
 | 
			
		||||
 | 
			
		||||
      o Fix for SSL/TLS/DTLS CBC plaintext recovery attack CVE-2013-0169
 | 
			
		||||
      o Fix OCSP bad key DoS attack CVE-2013-0166
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.8w and OpenSSL 0.9.8x [10 May 2012]:
 | 
			
		||||
 | 
			
		||||
      o Fix DTLS record length checking bug CVE-2012-2333
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.8v and OpenSSL 0.9.8w [23 Apr 2012]:
 | 
			
		||||
 | 
			
		||||
      o Fix for CVE-2012-2131 (corrected fix for 0.9.8 and CVE-2012-2110)
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.8u and OpenSSL 0.9.8v [19 Apr 2012]:
 | 
			
		||||
 | 
			
		||||
      o Fix for ASN1 overflow bug CVE-2012-2110
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.8t and OpenSSL 0.9.8u [12 Mar 2012]:
 | 
			
		||||
 | 
			
		||||
      o Fix for CMS/PKCS#7 MMA CVE-2012-0884
 | 
			
		||||
      o Corrected fix for CVE-2011-4619
 | 
			
		||||
      o Various DTLS fixes.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.8s and OpenSSL 0.9.8t [18 Jan 2012]:
 | 
			
		||||
 | 
			
		||||
      o Fix for DTLS DoS issue CVE-2012-0050
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.8r and OpenSSL 0.9.8s [4 Jan 2012]:
 | 
			
		||||
 | 
			
		||||
      o Fix for DTLS plaintext recovery attack CVE-2011-4108
 | 
			
		||||
      o Fix policy check double free error CVE-2011-4109
 | 
			
		||||
      o Clear block padding bytes of SSL 3.0 records CVE-2011-4576
 | 
			
		||||
      o Only allow one SGC handshake restart for SSL/TLS CVE-2011-4619
 | 
			
		||||
      o Check for malformed RFC3779 data CVE-2011-4577
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.8q and OpenSSL 0.9.8r [8 Feb 2011]:
 | 
			
		||||
 | 
			
		||||
      o Fix for security issue CVE-2011-0014
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.8p and OpenSSL 0.9.8q:
 | 
			
		||||
  Major changes between OpenSSL 0.9.8p and OpenSSL 0.9.8q [2 Dec 2010]:
 | 
			
		||||
 | 
			
		||||
      o Fix for security issue CVE-2010-4180
 | 
			
		||||
      o Fix for CVE-2010-4252
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.8o and OpenSSL 0.9.8p:
 | 
			
		||||
  Major changes between OpenSSL 0.9.8o and OpenSSL 0.9.8p [16 Nov 2010]:
 | 
			
		||||
 | 
			
		||||
      o Fix for security issue CVE-2010-3864.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.8n and OpenSSL 0.9.8o:
 | 
			
		||||
  Major changes between OpenSSL 0.9.8n and OpenSSL 0.9.8o [1 Jun 2010]:
 | 
			
		||||
 | 
			
		||||
      o Fix for security issue CVE-2010-0742.
 | 
			
		||||
      o Various DTLS fixes.
 | 
			
		||||
@@ -88,12 +248,12 @@
 | 
			
		||||
      o Fix for no-rc4 compilation.
 | 
			
		||||
      o Chil ENGINE unload workaround.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.8m and OpenSSL 0.9.8n:
 | 
			
		||||
  Major changes between OpenSSL 0.9.8m and OpenSSL 0.9.8n [24 Mar 2010]:
 | 
			
		||||
 | 
			
		||||
      o CFB cipher definition fixes.
 | 
			
		||||
      o Fix security issues CVE-2010-0740 and CVE-2010-0433.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.8l and OpenSSL 0.9.8m:
 | 
			
		||||
  Major changes between OpenSSL 0.9.8l and OpenSSL 0.9.8m [25 Feb 2010]:
 | 
			
		||||
 | 
			
		||||
      o Cipher definition fixes.
 | 
			
		||||
      o Workaround for slow RAND_poll() on some WIN32 versions.
 | 
			
		||||
@@ -105,33 +265,33 @@
 | 
			
		||||
      o Ticket and SNI coexistence fixes.
 | 
			
		||||
      o Many fixes to DTLS handling. 
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.8k and OpenSSL 0.9.8l:
 | 
			
		||||
  Major changes between OpenSSL 0.9.8k and OpenSSL 0.9.8l [5 Nov 2009]:
 | 
			
		||||
 | 
			
		||||
      o Temporary work around for CVE-2009-3555: disable renegotiation.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.8j and OpenSSL 0.9.8k:
 | 
			
		||||
  Major changes between OpenSSL 0.9.8j and OpenSSL 0.9.8k [25 Mar 2009]:
 | 
			
		||||
 | 
			
		||||
      o Fix various build issues.
 | 
			
		||||
      o Fix security issues (CVE-2009-0590, CVE-2009-0591, CVE-2009-0789)
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.8i and OpenSSL 0.9.8j:
 | 
			
		||||
  Major changes between OpenSSL 0.9.8i and OpenSSL 0.9.8j [7 Jan 2009]:
 | 
			
		||||
 | 
			
		||||
      o Fix security issue (CVE-2008-5077)
 | 
			
		||||
      o Merge FIPS 140-2 branch code.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.8g and OpenSSL 0.9.8h:
 | 
			
		||||
  Major changes between OpenSSL 0.9.8g and OpenSSL 0.9.8h [28 May 2008]:
 | 
			
		||||
 | 
			
		||||
      o CryptoAPI ENGINE support.
 | 
			
		||||
      o Various precautionary measures.
 | 
			
		||||
      o Fix for bugs affecting certificate request creation.
 | 
			
		||||
      o Support for local machine keyset attribute in PKCS#12 files.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.8f and OpenSSL 0.9.8g:
 | 
			
		||||
  Major changes between OpenSSL 0.9.8f and OpenSSL 0.9.8g [19 Oct 2007]:
 | 
			
		||||
 | 
			
		||||
      o Backport of CMS functionality to 0.9.8.
 | 
			
		||||
      o Fixes for bugs introduced with 0.9.8f.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.8e and OpenSSL 0.9.8f:
 | 
			
		||||
  Major changes between OpenSSL 0.9.8e and OpenSSL 0.9.8f [11 Oct 2007]:
 | 
			
		||||
 | 
			
		||||
      o Add gcc 4.2 support.
 | 
			
		||||
      o Add support for AES and SSE2 assembly lanugauge optimization
 | 
			
		||||
@@ -142,23 +302,23 @@
 | 
			
		||||
      o RFC4507bis support.
 | 
			
		||||
      o TLS Extensions support.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.8d and OpenSSL 0.9.8e:
 | 
			
		||||
  Major changes between OpenSSL 0.9.8d and OpenSSL 0.9.8e [23 Feb 2007]:
 | 
			
		||||
 | 
			
		||||
      o Various ciphersuite selection fixes.
 | 
			
		||||
      o RFC3779 support.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.8c and OpenSSL 0.9.8d:
 | 
			
		||||
  Major changes between OpenSSL 0.9.8c and OpenSSL 0.9.8d [28 Sep 2006]:
 | 
			
		||||
 | 
			
		||||
      o Introduce limits to prevent malicious key DoS  (CVE-2006-2940)
 | 
			
		||||
      o Fix security issues (CVE-2006-2937, CVE-2006-3737, CVE-2006-4343)
 | 
			
		||||
      o Changes to ciphersuite selection algorithm
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.8b and OpenSSL 0.9.8c:
 | 
			
		||||
  Major changes between OpenSSL 0.9.8b and OpenSSL 0.9.8c [5 Sep 2006]:
 | 
			
		||||
 | 
			
		||||
      o Fix Daniel Bleichenbacher forged signature attack, CVE-2006-4339
 | 
			
		||||
      o New cipher Camellia
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.8a and OpenSSL 0.9.8b:
 | 
			
		||||
  Major changes between OpenSSL 0.9.8a and OpenSSL 0.9.8b [4 May 2006]:
 | 
			
		||||
 | 
			
		||||
      o Cipher string fixes.
 | 
			
		||||
      o Fixes for VC++ 2005.
 | 
			
		||||
@@ -168,12 +328,12 @@
 | 
			
		||||
      o Built in dynamic engine compilation support on Win32.
 | 
			
		||||
      o Fixes auto dynamic engine loading in Win32.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.8 and OpenSSL 0.9.8a:
 | 
			
		||||
  Major changes between OpenSSL 0.9.8 and OpenSSL 0.9.8a [11 Oct 2005]:
 | 
			
		||||
 | 
			
		||||
      o Fix potential SSL 2.0 rollback, CVE-2005-2969
 | 
			
		||||
      o Extended Windows CE support
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.7g and OpenSSL 0.9.8:
 | 
			
		||||
  Major changes between OpenSSL 0.9.7g and OpenSSL 0.9.8 [5 Jul 2005]:
 | 
			
		||||
 | 
			
		||||
      o Major work on the BIGNUM library for higher efficiency and to
 | 
			
		||||
        make operations more streamlined and less contradictory.  This
 | 
			
		||||
@@ -247,36 +407,36 @@
 | 
			
		||||
      o Added initial support for Win64.
 | 
			
		||||
      o Added alternate pkg-config files.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.7l and OpenSSL 0.9.7m:
 | 
			
		||||
  Major changes between OpenSSL 0.9.7l and OpenSSL 0.9.7m [23 Feb 2007]:
 | 
			
		||||
 | 
			
		||||
      o FIPS 1.1.1 module linking.
 | 
			
		||||
      o Various ciphersuite selection fixes.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.7k and OpenSSL 0.9.7l:
 | 
			
		||||
  Major changes between OpenSSL 0.9.7k and OpenSSL 0.9.7l [28 Sep 2006]:
 | 
			
		||||
 | 
			
		||||
      o Introduce limits to prevent malicious key DoS  (CVE-2006-2940)
 | 
			
		||||
      o Fix security issues (CVE-2006-2937, CVE-2006-3737, CVE-2006-4343)
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.7j and OpenSSL 0.9.7k:
 | 
			
		||||
  Major changes between OpenSSL 0.9.7j and OpenSSL 0.9.7k [5 Sep 2006]:
 | 
			
		||||
 | 
			
		||||
      o Fix Daniel Bleichenbacher forged signature attack, CVE-2006-4339
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.7i and OpenSSL 0.9.7j:
 | 
			
		||||
  Major changes between OpenSSL 0.9.7i and OpenSSL 0.9.7j [4 May 2006]:
 | 
			
		||||
 | 
			
		||||
      o Visual C++ 2005 fixes.
 | 
			
		||||
      o Update Windows build system for FIPS.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.7h and OpenSSL 0.9.7i:
 | 
			
		||||
  Major changes between OpenSSL 0.9.7h and OpenSSL 0.9.7i [14 Oct 2005]:
 | 
			
		||||
 | 
			
		||||
      o Give EVP_MAX_MD_SIZE it's old value, except for a FIPS build.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.7g and OpenSSL 0.9.7h:
 | 
			
		||||
  Major changes between OpenSSL 0.9.7g and OpenSSL 0.9.7h [11 Oct 2005]:
 | 
			
		||||
 | 
			
		||||
      o Fix SSL 2.0 Rollback, CVE-2005-2969
 | 
			
		||||
      o Allow use of fixed-length exponent on DSA signing
 | 
			
		||||
      o Default fixed-window RSA, DSA, DH private-key operations
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.7f and OpenSSL 0.9.7g:
 | 
			
		||||
  Major changes between OpenSSL 0.9.7f and OpenSSL 0.9.7g [11 Apr 2005]:
 | 
			
		||||
 | 
			
		||||
      o More compilation issues fixed.
 | 
			
		||||
      o Adaptation to more modern Kerberos API.
 | 
			
		||||
@@ -285,7 +445,7 @@
 | 
			
		||||
      o More constification.
 | 
			
		||||
      o Added processing of proxy certificates (RFC 3820).
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.7e and OpenSSL 0.9.7f:
 | 
			
		||||
  Major changes between OpenSSL 0.9.7e and OpenSSL 0.9.7f [22 Mar 2005]:
 | 
			
		||||
 | 
			
		||||
      o Several compilation issues fixed.
 | 
			
		||||
      o Many memory allocation failure checks added.
 | 
			
		||||
@@ -293,12 +453,12 @@
 | 
			
		||||
      o Mandatory basic checks on certificates.
 | 
			
		||||
      o Performance improvements.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.7d and OpenSSL 0.9.7e:
 | 
			
		||||
  Major changes between OpenSSL 0.9.7d and OpenSSL 0.9.7e [25 Oct 2004]:
 | 
			
		||||
 | 
			
		||||
      o Fix race condition in CRL checking code.
 | 
			
		||||
      o Fixes to PKCS#7 (S/MIME) code.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.7c and OpenSSL 0.9.7d:
 | 
			
		||||
  Major changes between OpenSSL 0.9.7c and OpenSSL 0.9.7d [17 Mar 2004]:
 | 
			
		||||
 | 
			
		||||
      o Security: Fix Kerberos ciphersuite SSL/TLS handshaking bug
 | 
			
		||||
      o Security: Fix null-pointer assignment in do_change_cipher_spec()
 | 
			
		||||
@@ -306,14 +466,14 @@
 | 
			
		||||
      o Multiple X509 verification fixes
 | 
			
		||||
      o Speed up HMAC and other operations
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.7b and OpenSSL 0.9.7c:
 | 
			
		||||
  Major changes between OpenSSL 0.9.7b and OpenSSL 0.9.7c [30 Sep 2003]:
 | 
			
		||||
 | 
			
		||||
      o Security: fix various ASN1 parsing bugs.
 | 
			
		||||
      o New -ignore_err option to OCSP utility.
 | 
			
		||||
      o Various interop and bug fixes in S/MIME code.
 | 
			
		||||
      o SSL/TLS protocol fix for unrequested client certificates.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.7a and OpenSSL 0.9.7b:
 | 
			
		||||
  Major changes between OpenSSL 0.9.7a and OpenSSL 0.9.7b [10 Apr 2003]:
 | 
			
		||||
 | 
			
		||||
      o Security: counter the Klima-Pokorny-Rosa extension of
 | 
			
		||||
        Bleichbacher's attack 
 | 
			
		||||
@@ -324,7 +484,7 @@
 | 
			
		||||
      o ASN.1: treat domainComponent correctly.
 | 
			
		||||
      o Documentation: fixes and additions.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.7 and OpenSSL 0.9.7a:
 | 
			
		||||
  Major changes between OpenSSL 0.9.7 and OpenSSL 0.9.7a [19 Feb 2003]:
 | 
			
		||||
 | 
			
		||||
      o Security: Important security related bugfixes.
 | 
			
		||||
      o Enhanced compatibility with MIT Kerberos.
 | 
			
		||||
@@ -335,7 +495,7 @@
 | 
			
		||||
      o SSL/TLS: now handles manual certificate chain building.
 | 
			
		||||
      o SSL/TLS: certain session ID malfunctions corrected.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.6 and OpenSSL 0.9.7:
 | 
			
		||||
  Major changes between OpenSSL 0.9.6 and OpenSSL 0.9.7 [30 Dec 2002]:
 | 
			
		||||
 | 
			
		||||
      o New library section OCSP.
 | 
			
		||||
      o Complete rewrite of ASN1 code.
 | 
			
		||||
@@ -381,23 +541,23 @@
 | 
			
		||||
      o SSL/TLS: add callback to retrieve SSL/TLS messages.
 | 
			
		||||
      o SSL/TLS: support AES cipher suites (RFC3268).
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.6j and OpenSSL 0.9.6k:
 | 
			
		||||
  Major changes between OpenSSL 0.9.6j and OpenSSL 0.9.6k [30 Sep 2003]:
 | 
			
		||||
 | 
			
		||||
      o Security: fix various ASN1 parsing bugs.
 | 
			
		||||
      o SSL/TLS protocol fix for unrequested client certificates.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.6i and OpenSSL 0.9.6j:
 | 
			
		||||
  Major changes between OpenSSL 0.9.6i and OpenSSL 0.9.6j [10 Apr 2003]:
 | 
			
		||||
 | 
			
		||||
      o Security: counter the Klima-Pokorny-Rosa extension of
 | 
			
		||||
        Bleichbacher's attack 
 | 
			
		||||
      o Security: make RSA blinding default.
 | 
			
		||||
      o Build: shared library support fixes.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.6h and OpenSSL 0.9.6i:
 | 
			
		||||
  Major changes between OpenSSL 0.9.6h and OpenSSL 0.9.6i [19 Feb 2003]:
 | 
			
		||||
 | 
			
		||||
      o Important security related bugfixes.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.6g and OpenSSL 0.9.6h:
 | 
			
		||||
  Major changes between OpenSSL 0.9.6g and OpenSSL 0.9.6h [5 Dec 2002]:
 | 
			
		||||
 | 
			
		||||
      o New configuration targets for Tandem OSS and A/UX.
 | 
			
		||||
      o New OIDs for Microsoft attributes.
 | 
			
		||||
@@ -411,25 +571,25 @@
 | 
			
		||||
      o Fixes for smaller building problems.
 | 
			
		||||
      o Updates of manuals, FAQ and other instructive documents.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.6f and OpenSSL 0.9.6g:
 | 
			
		||||
  Major changes between OpenSSL 0.9.6f and OpenSSL 0.9.6g [9 Aug 2002]:
 | 
			
		||||
 | 
			
		||||
      o Important building fixes on Unix.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.6e and OpenSSL 0.9.6f:
 | 
			
		||||
  Major changes between OpenSSL 0.9.6e and OpenSSL 0.9.6f [8 Aug 2002]:
 | 
			
		||||
 | 
			
		||||
      o Various important bugfixes.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.6d and OpenSSL 0.9.6e:
 | 
			
		||||
  Major changes between OpenSSL 0.9.6d and OpenSSL 0.9.6e [30 Jul 2002]:
 | 
			
		||||
 | 
			
		||||
      o Important security related bugfixes.
 | 
			
		||||
      o Various SSL/TLS library bugfixes.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.6c and OpenSSL 0.9.6d:
 | 
			
		||||
  Major changes between OpenSSL 0.9.6c and OpenSSL 0.9.6d [9 May 2002]:
 | 
			
		||||
 | 
			
		||||
      o Various SSL/TLS library bugfixes.
 | 
			
		||||
      o Fix DH parameter generation for 'non-standard' generators.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.6b and OpenSSL 0.9.6c:
 | 
			
		||||
  Major changes between OpenSSL 0.9.6b and OpenSSL 0.9.6c [21 Dec 2001]:
 | 
			
		||||
 | 
			
		||||
      o Various SSL/TLS library bugfixes.
 | 
			
		||||
      o BIGNUM library fixes.
 | 
			
		||||
@@ -442,7 +602,7 @@
 | 
			
		||||
        Broadcom and Cryptographic Appliance's keyserver
 | 
			
		||||
        [in 0.9.6c-engine release].
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.6a and OpenSSL 0.9.6b:
 | 
			
		||||
  Major changes between OpenSSL 0.9.6a and OpenSSL 0.9.6b [9 Jul 2001]:
 | 
			
		||||
 | 
			
		||||
      o Security fix: PRNG improvements.
 | 
			
		||||
      o Security fix: RSA OAEP check.
 | 
			
		||||
@@ -459,7 +619,7 @@
 | 
			
		||||
      o Increase default size for BIO buffering filter.
 | 
			
		||||
      o Compatibility fixes in some scripts.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.6 and OpenSSL 0.9.6a:
 | 
			
		||||
  Major changes between OpenSSL 0.9.6 and OpenSSL 0.9.6a [5 Apr 2001]:
 | 
			
		||||
 | 
			
		||||
      o Security fix: change behavior of OpenSSL to avoid using
 | 
			
		||||
        environment variables when running as root.
 | 
			
		||||
@@ -484,7 +644,7 @@
 | 
			
		||||
      o New function BN_rand_range().
 | 
			
		||||
      o Add "-rand" option to openssl s_client and s_server.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.5a and OpenSSL 0.9.6:
 | 
			
		||||
  Major changes between OpenSSL 0.9.5a and OpenSSL 0.9.6 [10 Oct 2000]:
 | 
			
		||||
 | 
			
		||||
      o Some documentation for BIO and SSL libraries.
 | 
			
		||||
      o Enhanced chain verification using key identifiers.
 | 
			
		||||
@@ -499,7 +659,7 @@
 | 
			
		||||
    [1] The support for external crypto devices is currently a separate
 | 
			
		||||
        distribution.  See the file README.ENGINE.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.5 and OpenSSL 0.9.5a:
 | 
			
		||||
  Major changes between OpenSSL 0.9.5 and OpenSSL 0.9.5a [1 Apr 2000]:
 | 
			
		||||
 | 
			
		||||
      o Bug fixes for Win32, SuSE Linux, NeXTSTEP and FreeBSD 2.2.8 
 | 
			
		||||
      o Shared library support for HPUX and Solaris-gcc
 | 
			
		||||
@@ -508,7 +668,7 @@
 | 
			
		||||
      o New 'rand' application
 | 
			
		||||
      o New way to check for existence of algorithms from scripts
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.4 and OpenSSL 0.9.5:
 | 
			
		||||
  Major changes between OpenSSL 0.9.4 and OpenSSL 0.9.5 [25 May 2000]:
 | 
			
		||||
 | 
			
		||||
      o S/MIME support in new 'smime' command
 | 
			
		||||
      o Documentation for the OpenSSL command line application
 | 
			
		||||
@@ -544,7 +704,7 @@
 | 
			
		||||
      o Enhanced support for Alpha Linux
 | 
			
		||||
      o Experimental MacOS support
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.3 and OpenSSL 0.9.4:
 | 
			
		||||
  Major changes between OpenSSL 0.9.3 and OpenSSL 0.9.4 [9 Aug 1999]:
 | 
			
		||||
 | 
			
		||||
      o Transparent support for PKCS#8 format private keys: these are used
 | 
			
		||||
        by several software packages and are more secure than the standard
 | 
			
		||||
@@ -555,7 +715,7 @@
 | 
			
		||||
      o New pipe-like BIO that allows using the SSL library when actual I/O
 | 
			
		||||
        must be handled by the application (BIO pair)
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.2b and OpenSSL 0.9.3:
 | 
			
		||||
  Major changes between OpenSSL 0.9.2b and OpenSSL 0.9.3 [24 May 1999]:
 | 
			
		||||
      o Lots of enhancements and cleanups to the Configuration mechanism
 | 
			
		||||
      o RSA OEAP related fixes
 | 
			
		||||
      o Added `openssl ca -revoke' option for revoking a certificate
 | 
			
		||||
@@ -569,7 +729,7 @@
 | 
			
		||||
      o Sparc assembler bignum implementation, optimized hash functions
 | 
			
		||||
      o Option to disable selected ciphers
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.1c and OpenSSL 0.9.2b:
 | 
			
		||||
  Major changes between OpenSSL 0.9.1c and OpenSSL 0.9.2b [22 Mar 1999]:
 | 
			
		||||
      o Fixed a security hole related to session resumption
 | 
			
		||||
      o Fixed RSA encryption routines for the p < q case
 | 
			
		||||
      o "ALL" in cipher lists now means "everything except NULL ciphers"
 | 
			
		||||
@@ -591,7 +751,7 @@
 | 
			
		||||
      o Lots of memory leak fixes.
 | 
			
		||||
      o Lots of bug fixes.
 | 
			
		||||
 | 
			
		||||
  Major changes between SSLeay 0.9.0b and OpenSSL 0.9.1c:
 | 
			
		||||
  Major changes between SSLeay 0.9.0b and OpenSSL 0.9.1c [23 Dec 1998]:
 | 
			
		||||
      o Integration of the popular NO_RSA/NO_DSA patches
 | 
			
		||||
      o Initial support for compression inside the SSL record layer
 | 
			
		||||
      o Added BIO proxy and filtering functionality
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										14
									
								
								PROBLEMS
									
									
									
									
									
								
							
							
						
						
									
										14
									
								
								PROBLEMS
									
									
									
									
									
								
							@@ -197,3 +197,17 @@ reconfigure with additional no-sse2 [or 386] option passed to ./config.
 | 
			
		||||
We don't have framework to associate -ldl with no-dso, therefore the only
 | 
			
		||||
way is to edit Makefile right after ./config no-dso and remove -ldl from
 | 
			
		||||
EX_LIBS line.
 | 
			
		||||
 | 
			
		||||
* hpux-parisc2-cc no-asm build fails with SEGV in ECDSA/DH.
 | 
			
		||||
 | 
			
		||||
Compiler bug, presumably at particular patch level. Remaining
 | 
			
		||||
hpux*-parisc*-cc configurations can be affected too. Drop optimization
 | 
			
		||||
level to +O2 when compiling bn_nist.o.
 | 
			
		||||
 | 
			
		||||
* solaris64-sparcv9-cc link failure
 | 
			
		||||
 | 
			
		||||
Solaris 8 ar can fail to maintain symbol table in .a, which results in
 | 
			
		||||
link failures. Apply 109147-09 or later or modify Makefile generated
 | 
			
		||||
by ./Configure solaris64-sparcv9-cc and replace RANLIB assignment with
 | 
			
		||||
 | 
			
		||||
	RANLIB= /usr/ccs/bin/ar rs
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										4
									
								
								README
									
									
									
									
									
								
							
							
						
						
									
										4
									
								
								README
									
									
									
									
									
								
							@@ -1,5 +1,5 @@
 | 
			
		||||
 | 
			
		||||
 OpenSSL 1.0.0f 4 Jan 2012
 | 
			
		||||
 OpenSSL 1.0.1m-dev
 | 
			
		||||
 | 
			
		||||
 Copyright (c) 1998-2011 The OpenSSL Project
 | 
			
		||||
 Copyright (c) 1995-1998 Eric A. Young, Tim J. Hudson
 | 
			
		||||
@@ -190,7 +190,7 @@
 | 
			
		||||
 reason as to why that feature isn't implemented.
 | 
			
		||||
 | 
			
		||||
 Patches should be as up to date as possible, preferably relative to the
 | 
			
		||||
 current CVS or the last snapshot. They should follow the coding style of
 | 
			
		||||
 current Git or the last snapshot. They should follow the coding style of
 | 
			
		||||
 OpenSSL and compile without warnings. Some of the core team developer targets
 | 
			
		||||
 can be used for testing purposes, (debug-steve64, debug-geoff etc). OpenSSL
 | 
			
		||||
 compiles on many varied platforms: try to ensure you only use portable
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										150
									
								
								STATUS
									
									
									
									
									
								
							
							
						
						
									
										150
									
								
								STATUS
									
									
									
									
									
								
							@@ -1,150 +0,0 @@
 | 
			
		||||
 | 
			
		||||
  OpenSSL STATUS                           Last modified at
 | 
			
		||||
  ______________                           $Date: 2012/01/04 17:01:30 $
 | 
			
		||||
 | 
			
		||||
  DEVELOPMENT STATE
 | 
			
		||||
 | 
			
		||||
    o  OpenSSL 1.1.0:  Under development...
 | 
			
		||||
    o  OpenSSL 1.0.1:  Under development...
 | 
			
		||||
    o  OpenSSL 1.0.0f: Released on January    4th, 2012
 | 
			
		||||
    o  OpenSSL 1.0.0e: Released on September  6th, 2011
 | 
			
		||||
    o  OpenSSL 1.0.0d: Released on February   8nd, 2011
 | 
			
		||||
    o  OpenSSL 1.0.0c: Released on December   2nd, 2010
 | 
			
		||||
    o  OpenSSL 1.0.0b: Released on November  16th, 2010
 | 
			
		||||
    o  OpenSSL 1.0.0a: Released on June      1st,  2010
 | 
			
		||||
    o  OpenSSL 1.0.0:  Released on March     29th, 2010
 | 
			
		||||
    o  OpenSSL 0.9.8r: Released on February   8nd, 2011
 | 
			
		||||
    o  OpenSSL 0.9.8q: Released on December   2nd, 2010
 | 
			
		||||
    o  OpenSSL 0.9.8p: Released on November  16th, 2010
 | 
			
		||||
    o  OpenSSL 0.9.8o: Released on June       1st, 2010
 | 
			
		||||
    o  OpenSSL 0.9.8n: Released on March     24th, 2010
 | 
			
		||||
    o  OpenSSL 0.9.8m: Released on February  25th, 2010
 | 
			
		||||
    o  OpenSSL 0.9.8l: Released on November   5th, 2009
 | 
			
		||||
    o  OpenSSL 0.9.8k: Released on March     25th, 2009
 | 
			
		||||
    o  OpenSSL 0.9.8j: Released on January    7th, 2009
 | 
			
		||||
    o  OpenSSL 0.9.8i: Released on September 15th, 2008
 | 
			
		||||
    o  OpenSSL 0.9.8h: Released on May       28th, 2008
 | 
			
		||||
    o  OpenSSL 0.9.8g: Released on October   19th, 2007
 | 
			
		||||
    o  OpenSSL 0.9.8f: Released on October   11th, 2007
 | 
			
		||||
    o  OpenSSL 0.9.8e: Released on February  23rd, 2007
 | 
			
		||||
    o  OpenSSL 0.9.8d: Released on September 28th, 2006
 | 
			
		||||
    o  OpenSSL 0.9.8c: Released on September  5th, 2006
 | 
			
		||||
    o  OpenSSL 0.9.8b: Released on May        4th, 2006
 | 
			
		||||
    o  OpenSSL 0.9.8a: Released on October   11th, 2005
 | 
			
		||||
    o  OpenSSL 0.9.8:  Released on July       5th, 2005
 | 
			
		||||
    o  OpenSSL 0.9.7m: Released on February  23rd, 2007
 | 
			
		||||
    o  OpenSSL 0.9.7l: Released on September 28th, 2006
 | 
			
		||||
    o  OpenSSL 0.9.7k: Released on September  5th, 2006
 | 
			
		||||
    o  OpenSSL 0.9.7j: Released on May        4th, 2006
 | 
			
		||||
    o  OpenSSL 0.9.7i: Released on October   14th, 2005
 | 
			
		||||
    o  OpenSSL 0.9.7h: Released on October   11th, 2005
 | 
			
		||||
    o  OpenSSL 0.9.7g: Released on April     11th, 2005
 | 
			
		||||
    o  OpenSSL 0.9.7f: Released on March     22nd, 2005
 | 
			
		||||
    o  OpenSSL 0.9.7e: Released on October   25th, 2004
 | 
			
		||||
    o  OpenSSL 0.9.7d: Released on March     17th, 2004
 | 
			
		||||
    o  OpenSSL 0.9.7c: Released on September 30th, 2003
 | 
			
		||||
    o  OpenSSL 0.9.7b: Released on April     10th, 2003
 | 
			
		||||
    o  OpenSSL 0.9.7a: Released on February  19th, 2003
 | 
			
		||||
    o  OpenSSL 0.9.7:  Released on December  31st, 2002
 | 
			
		||||
    o  OpenSSL 0.9.6m: Released on March     17th, 2004
 | 
			
		||||
    o  OpenSSL 0.9.6l: Released on November   4th, 2003
 | 
			
		||||
    o  OpenSSL 0.9.6k: Released on September 30th, 2003
 | 
			
		||||
    o  OpenSSL 0.9.6j: Released on April     10th, 2003
 | 
			
		||||
    o  OpenSSL 0.9.6i: Released on February  19th, 2003
 | 
			
		||||
    o  OpenSSL 0.9.6h: Released on December   5th, 2002
 | 
			
		||||
    o  OpenSSL 0.9.6g: Released on August     9th, 2002
 | 
			
		||||
    o  OpenSSL 0.9.6f: Released on August     8th, 2002
 | 
			
		||||
    o  OpenSSL 0.9.6e: Released on July      30th, 2002
 | 
			
		||||
    o  OpenSSL 0.9.6d: Released on May        9th, 2002
 | 
			
		||||
    o  OpenSSL 0.9.6c: Released on December  21st, 2001
 | 
			
		||||
    o  OpenSSL 0.9.6b: Released on July       9th, 2001
 | 
			
		||||
    o  OpenSSL 0.9.6a: Released on April      5th, 2001
 | 
			
		||||
    o  OpenSSL 0.9.6:  Released on September 24th, 2000
 | 
			
		||||
    o  OpenSSL 0.9.5a: Released on April      1st, 2000
 | 
			
		||||
    o  OpenSSL 0.9.5:  Released on February  28th, 2000
 | 
			
		||||
    o  OpenSSL 0.9.4:  Released on August    09th, 1999
 | 
			
		||||
    o  OpenSSL 0.9.3a: Released on May       29th, 1999
 | 
			
		||||
    o  OpenSSL 0.9.3:  Released on May       25th, 1999
 | 
			
		||||
    o  OpenSSL 0.9.2b: Released on March     22th, 1999
 | 
			
		||||
    o  OpenSSL 0.9.1c: Released on December  23th, 1998
 | 
			
		||||
 | 
			
		||||
  [See also http://www.openssl.org/support/rt.html]
 | 
			
		||||
 | 
			
		||||
  RELEASE SHOWSTOPPERS
 | 
			
		||||
 | 
			
		||||
    o The Makefiles fail with some SysV makes.
 | 
			
		||||
    o 
 | 
			
		||||
 | 
			
		||||
  AVAILABLE PATCHES
 | 
			
		||||
 | 
			
		||||
    o 
 | 
			
		||||
 | 
			
		||||
  IN PROGRESS
 | 
			
		||||
 | 
			
		||||
    o Steve is currently working on (in no particular order):
 | 
			
		||||
        ASN1 code redesign, butchery, replacement.
 | 
			
		||||
        OCSP
 | 
			
		||||
        EVP cipher enhancement.
 | 
			
		||||
        Enhanced certificate chain verification.
 | 
			
		||||
	Private key, certificate and CRL API and implementation.
 | 
			
		||||
	Developing and bugfixing PKCS#7 (S/MIME code).
 | 
			
		||||
        Various X509 issues: character sets, certificate request extensions.
 | 
			
		||||
    o Richard is currently working on:
 | 
			
		||||
	Constification
 | 
			
		||||
	Attribute Certificate support
 | 
			
		||||
	Certificate Pair support
 | 
			
		||||
	Storage Engines (primarly an LDAP storage engine)
 | 
			
		||||
	Certificate chain validation with full RFC 3280 compatibility
 | 
			
		||||
 | 
			
		||||
  NEEDS PATCH
 | 
			
		||||
 | 
			
		||||
    o  0.9.8-dev: COMPLEMENTOFALL and COMPLEMENTOFDEFAULT do not
 | 
			
		||||
       handle ECCdraft cipher suites correctly.
 | 
			
		||||
 | 
			
		||||
    o  apps/ca.c: "Sign the certificate?" - "n" creates empty certificate file
 | 
			
		||||
 | 
			
		||||
    o  "OpenSSL STATUS" is never up-to-date.
 | 
			
		||||
 | 
			
		||||
  OPEN ISSUES
 | 
			
		||||
 | 
			
		||||
    o  The Makefile hierarchy and build mechanism is still not a round thing:
 | 
			
		||||
 | 
			
		||||
       1. The config vs. Configure scripts
 | 
			
		||||
          It's the same nasty situation as for Apache with APACI vs.
 | 
			
		||||
          src/Configure. It confuses.
 | 
			
		||||
          Suggestion: Merge Configure and config into a single configure
 | 
			
		||||
                      script with a Autoconf style interface ;-) and remove
 | 
			
		||||
                      Configure and config. Or even let us use GNU Autoconf
 | 
			
		||||
                      itself. Then we can avoid a lot of those platform checks
 | 
			
		||||
                      which are currently in Configure.
 | 
			
		||||
 | 
			
		||||
    o  Support for Shared Libraries has to be added at least
 | 
			
		||||
       for the major Unix platforms. The details we can rip from the stuff
 | 
			
		||||
       Ralf has done for the Apache src/Configure script. Ben wants the
 | 
			
		||||
       solution to be really simple.
 | 
			
		||||
 | 
			
		||||
       Status: Ralf will look how we can easily incorporate the
 | 
			
		||||
               compiler PIC and linker DSO flags from Apache
 | 
			
		||||
               into the OpenSSL Configure script.
 | 
			
		||||
 | 
			
		||||
               Ulf: +1 for using GNU autoconf and libtool (but not automake,
 | 
			
		||||
                    which apparently is not flexible enough to generate
 | 
			
		||||
                    libcrypto)
 | 
			
		||||
 | 
			
		||||
  WISHES
 | 
			
		||||
 | 
			
		||||
    o  Add variants of DH_generate_parameters() and BN_generate_prime() [etc?]
 | 
			
		||||
       where the callback function can request that the function be aborted.
 | 
			
		||||
       [Gregory Stark <ghstark@pobox.com>, <rayyang2000@yahoo.com>]
 | 
			
		||||
 | 
			
		||||
    o  SRP in TLS.
 | 
			
		||||
       [wished by:
 | 
			
		||||
        Dj <derek@yo.net>, Tom Wu <tom@arcot.com>,
 | 
			
		||||
        Tom Holroyd <tomh@po.crl.go.jp>]
 | 
			
		||||
 | 
			
		||||
       See http://search.ietf.org/internet-drafts/draft-ietf-tls-srp-00.txt
 | 
			
		||||
       as well as http://www-cs-students.stanford.edu/~tjw/srp/.
 | 
			
		||||
 | 
			
		||||
       Tom Holroyd tells us there is a SRP patch for OpenSSH at
 | 
			
		||||
       http://members.tripod.com/professor_tom/archives/, that could
 | 
			
		||||
       be useful.
 | 
			
		||||
							
								
								
									
										167
									
								
								apps/Makefile
									
									
									
									
									
								
							
							
						
						
									
										167
									
								
								apps/Makefile
									
									
									
									
									
								
							@@ -39,7 +39,7 @@ E_EXE=	verify asn1pars req dgst dh dhparam enc passwd gendh errstr \
 | 
			
		||||
	ca crl rsa rsautl dsa dsaparam ec ecparam \
 | 
			
		||||
	x509 genrsa gendsa genpkey s_server s_client speed \
 | 
			
		||||
	s_time version pkcs7 cms crl2pkcs7 sess_id ciphers nseq pkcs12 \
 | 
			
		||||
	pkcs8 pkey pkeyparam pkeyutl spkac smime rand engine ocsp prime ts
 | 
			
		||||
	pkcs8 pkey pkeyparam pkeyutl spkac smime rand engine ocsp prime ts srp
 | 
			
		||||
 | 
			
		||||
PROGS= $(PROGRAM).c
 | 
			
		||||
 | 
			
		||||
@@ -56,7 +56,7 @@ E_OBJ=	verify.o asn1pars.o req.o dgst.o dh.o dhparam.o enc.o passwd.o gendh.o er
 | 
			
		||||
	x509.o genrsa.o gendsa.o genpkey.o s_server.o s_client.o speed.o \
 | 
			
		||||
	s_time.o $(A_OBJ) $(S_OBJ) $(RAND_OBJ) version.o sess_id.o \
 | 
			
		||||
	ciphers.o nseq.o pkcs12.o pkcs8.o pkey.o pkeyparam.o pkeyutl.o \
 | 
			
		||||
	spkac.o smime.o cms.o rand.o engine.o ocsp.o prime.o ts.o
 | 
			
		||||
	spkac.o smime.o cms.o rand.o engine.o ocsp.o prime.o ts.o srp.o
 | 
			
		||||
 | 
			
		||||
E_SRC=	verify.c asn1pars.c req.c dgst.c dh.c enc.c passwd.c gendh.c errstr.c ca.c \
 | 
			
		||||
	pkcs7.c crl2p7.c crl.c \
 | 
			
		||||
@@ -64,7 +64,7 @@ E_SRC=	verify.c asn1pars.c req.c dgst.c dh.c enc.c passwd.c gendh.c errstr.c ca.
 | 
			
		||||
	x509.c genrsa.c gendsa.c genpkey.c s_server.c s_client.c speed.c \
 | 
			
		||||
	s_time.c $(A_SRC) $(S_SRC) $(RAND_SRC) version.c sess_id.c \
 | 
			
		||||
	ciphers.c nseq.c pkcs12.c pkcs8.c pkey.c pkeyparam.c pkeyutl.c \
 | 
			
		||||
	spkac.c smime.c cms.c rand.c engine.c ocsp.c prime.c ts.c
 | 
			
		||||
	spkac.c smime.c cms.c rand.c engine.c ocsp.c prime.c ts.c srp.c
 | 
			
		||||
 | 
			
		||||
SRC=$(E_SRC)
 | 
			
		||||
 | 
			
		||||
@@ -153,6 +153,8 @@ $(EXE): progs.h $(E_OBJ) $(PROGRAM).o $(DLIBCRYPTO) $(DLIBSSL)
 | 
			
		||||
	$(RM) $(EXE)
 | 
			
		||||
	shlib_target=; if [ -n "$(SHARED_LIBS)" ]; then \
 | 
			
		||||
		shlib_target="$(SHLIB_TARGET)"; \
 | 
			
		||||
	elif [ -n "$(FIPSCANLIB)" ]; then \
 | 
			
		||||
	  FIPSLD_CC="$(CC)"; CC=$(FIPSDIR)/bin/fipsld; export CC FIPSLD_CC; \
 | 
			
		||||
	fi; \
 | 
			
		||||
	LIBRARIES="$(LIBSSL) $(LIBKRB5) $(LIBCRYPTO)" ; \
 | 
			
		||||
	$(MAKE) -f $(TOP)/Makefile.shared -e \
 | 
			
		||||
@@ -245,13 +247,13 @@ ciphers.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
 | 
			
		||||
ciphers.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
 | 
			
		||||
ciphers.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
 | 
			
		||||
ciphers.o: ../include/openssl/pqueue.h ../include/openssl/safestack.h
 | 
			
		||||
ciphers.o: ../include/openssl/sha.h ../include/openssl/ssl.h
 | 
			
		||||
ciphers.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
 | 
			
		||||
ciphers.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
 | 
			
		||||
ciphers.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
 | 
			
		||||
ciphers.o: ../include/openssl/txt_db.h ../include/openssl/x509.h
 | 
			
		||||
ciphers.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h
 | 
			
		||||
ciphers.o: ciphers.c
 | 
			
		||||
ciphers.o: ../include/openssl/sha.h ../include/openssl/srtp.h
 | 
			
		||||
ciphers.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
 | 
			
		||||
ciphers.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
 | 
			
		||||
ciphers.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
 | 
			
		||||
ciphers.o: ../include/openssl/tls1.h ../include/openssl/txt_db.h
 | 
			
		||||
ciphers.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
 | 
			
		||||
ciphers.o: ../include/openssl/x509v3.h apps.h ciphers.c
 | 
			
		||||
cms.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
cms.o: ../include/openssl/buffer.h ../include/openssl/cms.h
 | 
			
		||||
cms.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
@@ -427,13 +429,13 @@ engine.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
 | 
			
		||||
engine.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
 | 
			
		||||
engine.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
 | 
			
		||||
engine.o: ../include/openssl/pqueue.h ../include/openssl/safestack.h
 | 
			
		||||
engine.o: ../include/openssl/sha.h ../include/openssl/ssl.h
 | 
			
		||||
engine.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
 | 
			
		||||
engine.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
 | 
			
		||||
engine.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
 | 
			
		||||
engine.o: ../include/openssl/txt_db.h ../include/openssl/x509.h
 | 
			
		||||
engine.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h
 | 
			
		||||
engine.o: engine.c
 | 
			
		||||
engine.o: ../include/openssl/sha.h ../include/openssl/srtp.h
 | 
			
		||||
engine.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
 | 
			
		||||
engine.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
 | 
			
		||||
engine.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
 | 
			
		||||
engine.o: ../include/openssl/tls1.h ../include/openssl/txt_db.h
 | 
			
		||||
engine.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
 | 
			
		||||
engine.o: ../include/openssl/x509v3.h apps.h engine.c
 | 
			
		||||
errstr.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
errstr.o: ../include/openssl/buffer.h ../include/openssl/comp.h
 | 
			
		||||
errstr.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
@@ -448,13 +450,13 @@ errstr.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
 | 
			
		||||
errstr.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
 | 
			
		||||
errstr.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
 | 
			
		||||
errstr.o: ../include/openssl/pqueue.h ../include/openssl/safestack.h
 | 
			
		||||
errstr.o: ../include/openssl/sha.h ../include/openssl/ssl.h
 | 
			
		||||
errstr.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
 | 
			
		||||
errstr.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
 | 
			
		||||
errstr.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
 | 
			
		||||
errstr.o: ../include/openssl/txt_db.h ../include/openssl/x509.h
 | 
			
		||||
errstr.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h
 | 
			
		||||
errstr.o: errstr.c
 | 
			
		||||
errstr.o: ../include/openssl/sha.h ../include/openssl/srtp.h
 | 
			
		||||
errstr.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
 | 
			
		||||
errstr.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
 | 
			
		||||
errstr.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
 | 
			
		||||
errstr.o: ../include/openssl/tls1.h ../include/openssl/txt_db.h
 | 
			
		||||
errstr.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
 | 
			
		||||
errstr.o: ../include/openssl/x509v3.h apps.h errstr.c
 | 
			
		||||
gendh.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
gendh.o: ../include/openssl/bn.h ../include/openssl/buffer.h
 | 
			
		||||
gendh.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
@@ -556,12 +558,12 @@ ocsp.o: ../include/openssl/opensslv.h ../include/openssl/ossl_typ.h
 | 
			
		||||
ocsp.o: ../include/openssl/pem.h ../include/openssl/pem2.h
 | 
			
		||||
ocsp.o: ../include/openssl/pkcs7.h ../include/openssl/pqueue.h
 | 
			
		||||
ocsp.o: ../include/openssl/safestack.h ../include/openssl/sha.h
 | 
			
		||||
ocsp.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
 | 
			
		||||
ocsp.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
 | 
			
		||||
ocsp.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
 | 
			
		||||
ocsp.o: ../include/openssl/tls1.h ../include/openssl/txt_db.h
 | 
			
		||||
ocsp.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
 | 
			
		||||
ocsp.o: ../include/openssl/x509v3.h apps.h ocsp.c
 | 
			
		||||
ocsp.o: ../include/openssl/srtp.h ../include/openssl/ssl.h
 | 
			
		||||
ocsp.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
 | 
			
		||||
ocsp.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
 | 
			
		||||
ocsp.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
 | 
			
		||||
ocsp.o: ../include/openssl/txt_db.h ../include/openssl/x509.h
 | 
			
		||||
ocsp.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h ocsp.c
 | 
			
		||||
openssl.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
openssl.o: ../include/openssl/buffer.h ../include/openssl/comp.h
 | 
			
		||||
openssl.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
@@ -575,8 +577,9 @@ openssl.o: ../include/openssl/objects.h ../include/openssl/ocsp.h
 | 
			
		||||
openssl.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
 | 
			
		||||
openssl.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
 | 
			
		||||
openssl.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
 | 
			
		||||
openssl.o: ../include/openssl/pqueue.h ../include/openssl/safestack.h
 | 
			
		||||
openssl.o: ../include/openssl/sha.h ../include/openssl/ssl.h
 | 
			
		||||
openssl.o: ../include/openssl/pqueue.h ../include/openssl/rand.h
 | 
			
		||||
openssl.o: ../include/openssl/safestack.h ../include/openssl/sha.h
 | 
			
		||||
openssl.o: ../include/openssl/srtp.h ../include/openssl/ssl.h
 | 
			
		||||
openssl.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
 | 
			
		||||
openssl.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
 | 
			
		||||
openssl.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
 | 
			
		||||
@@ -791,12 +794,13 @@ s_cb.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
 | 
			
		||||
s_cb.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
 | 
			
		||||
s_cb.o: ../include/openssl/pqueue.h ../include/openssl/rand.h
 | 
			
		||||
s_cb.o: ../include/openssl/safestack.h ../include/openssl/sha.h
 | 
			
		||||
s_cb.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
 | 
			
		||||
s_cb.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
 | 
			
		||||
s_cb.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
 | 
			
		||||
s_cb.o: ../include/openssl/tls1.h ../include/openssl/txt_db.h
 | 
			
		||||
s_cb.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
 | 
			
		||||
s_cb.o: ../include/openssl/x509v3.h apps.h s_apps.h s_cb.c
 | 
			
		||||
s_cb.o: ../include/openssl/srtp.h ../include/openssl/ssl.h
 | 
			
		||||
s_cb.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
 | 
			
		||||
s_cb.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
 | 
			
		||||
s_cb.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
 | 
			
		||||
s_cb.o: ../include/openssl/txt_db.h ../include/openssl/x509.h
 | 
			
		||||
s_cb.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h
 | 
			
		||||
s_cb.o: s_apps.h s_cb.c
 | 
			
		||||
s_client.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
s_client.o: ../include/openssl/bn.h ../include/openssl/buffer.h
 | 
			
		||||
s_client.o: ../include/openssl/comp.h ../include/openssl/conf.h
 | 
			
		||||
@@ -812,7 +816,8 @@ s_client.o: ../include/openssl/opensslv.h ../include/openssl/ossl_typ.h
 | 
			
		||||
s_client.o: ../include/openssl/pem.h ../include/openssl/pem2.h
 | 
			
		||||
s_client.o: ../include/openssl/pkcs7.h ../include/openssl/pqueue.h
 | 
			
		||||
s_client.o: ../include/openssl/rand.h ../include/openssl/safestack.h
 | 
			
		||||
s_client.o: ../include/openssl/sha.h ../include/openssl/ssl.h
 | 
			
		||||
s_client.o: ../include/openssl/sha.h ../include/openssl/srp.h
 | 
			
		||||
s_client.o: ../include/openssl/srtp.h ../include/openssl/ssl.h
 | 
			
		||||
s_client.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
 | 
			
		||||
s_client.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
 | 
			
		||||
s_client.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
 | 
			
		||||
@@ -836,6 +841,7 @@ s_server.o: ../include/openssl/pem.h ../include/openssl/pem2.h
 | 
			
		||||
s_server.o: ../include/openssl/pkcs7.h ../include/openssl/pqueue.h
 | 
			
		||||
s_server.o: ../include/openssl/rand.h ../include/openssl/rsa.h
 | 
			
		||||
s_server.o: ../include/openssl/safestack.h ../include/openssl/sha.h
 | 
			
		||||
s_server.o: ../include/openssl/srp.h ../include/openssl/srtp.h
 | 
			
		||||
s_server.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
 | 
			
		||||
s_server.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
 | 
			
		||||
s_server.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
 | 
			
		||||
@@ -857,13 +863,13 @@ s_socket.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
 | 
			
		||||
s_socket.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
 | 
			
		||||
s_socket.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
 | 
			
		||||
s_socket.o: ../include/openssl/pqueue.h ../include/openssl/safestack.h
 | 
			
		||||
s_socket.o: ../include/openssl/sha.h ../include/openssl/ssl.h
 | 
			
		||||
s_socket.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
 | 
			
		||||
s_socket.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
 | 
			
		||||
s_socket.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
 | 
			
		||||
s_socket.o: ../include/openssl/txt_db.h ../include/openssl/x509.h
 | 
			
		||||
s_socket.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h
 | 
			
		||||
s_socket.o: s_apps.h s_socket.c
 | 
			
		||||
s_socket.o: ../include/openssl/sha.h ../include/openssl/srtp.h
 | 
			
		||||
s_socket.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
 | 
			
		||||
s_socket.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
 | 
			
		||||
s_socket.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
 | 
			
		||||
s_socket.o: ../include/openssl/tls1.h ../include/openssl/txt_db.h
 | 
			
		||||
s_socket.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
 | 
			
		||||
s_socket.o: ../include/openssl/x509v3.h apps.h s_apps.h s_socket.c
 | 
			
		||||
s_time.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
s_time.o: ../include/openssl/buffer.h ../include/openssl/comp.h
 | 
			
		||||
s_time.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
@@ -878,13 +884,13 @@ s_time.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
 | 
			
		||||
s_time.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
 | 
			
		||||
s_time.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
 | 
			
		||||
s_time.o: ../include/openssl/pqueue.h ../include/openssl/safestack.h
 | 
			
		||||
s_time.o: ../include/openssl/sha.h ../include/openssl/ssl.h
 | 
			
		||||
s_time.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
 | 
			
		||||
s_time.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
 | 
			
		||||
s_time.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
 | 
			
		||||
s_time.o: ../include/openssl/txt_db.h ../include/openssl/x509.h
 | 
			
		||||
s_time.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h
 | 
			
		||||
s_time.o: s_apps.h s_time.c
 | 
			
		||||
s_time.o: ../include/openssl/sha.h ../include/openssl/srtp.h
 | 
			
		||||
s_time.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
 | 
			
		||||
s_time.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
 | 
			
		||||
s_time.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
 | 
			
		||||
s_time.o: ../include/openssl/tls1.h ../include/openssl/txt_db.h
 | 
			
		||||
s_time.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
 | 
			
		||||
s_time.o: ../include/openssl/x509v3.h apps.h s_apps.h s_time.c
 | 
			
		||||
sess_id.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
sess_id.o: ../include/openssl/buffer.h ../include/openssl/comp.h
 | 
			
		||||
sess_id.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
@@ -899,13 +905,13 @@ sess_id.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
 | 
			
		||||
sess_id.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
 | 
			
		||||
sess_id.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
 | 
			
		||||
sess_id.o: ../include/openssl/pqueue.h ../include/openssl/safestack.h
 | 
			
		||||
sess_id.o: ../include/openssl/sha.h ../include/openssl/ssl.h
 | 
			
		||||
sess_id.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
 | 
			
		||||
sess_id.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
 | 
			
		||||
sess_id.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
 | 
			
		||||
sess_id.o: ../include/openssl/txt_db.h ../include/openssl/x509.h
 | 
			
		||||
sess_id.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h
 | 
			
		||||
sess_id.o: sess_id.c
 | 
			
		||||
sess_id.o: ../include/openssl/sha.h ../include/openssl/srtp.h
 | 
			
		||||
sess_id.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
 | 
			
		||||
sess_id.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
 | 
			
		||||
sess_id.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
 | 
			
		||||
sess_id.o: ../include/openssl/tls1.h ../include/openssl/txt_db.h
 | 
			
		||||
sess_id.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
 | 
			
		||||
sess_id.o: ../include/openssl/x509v3.h apps.h sess_id.c
 | 
			
		||||
smime.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
smime.o: ../include/openssl/buffer.h ../include/openssl/conf.h
 | 
			
		||||
smime.o: ../include/openssl/crypto.h ../include/openssl/e_os2.h
 | 
			
		||||
@@ -935,19 +941,19 @@ speed.o: ../include/openssl/err.h ../include/openssl/evp.h
 | 
			
		||||
speed.o: ../include/openssl/hmac.h ../include/openssl/idea.h
 | 
			
		||||
speed.o: ../include/openssl/lhash.h ../include/openssl/md4.h
 | 
			
		||||
speed.o: ../include/openssl/md5.h ../include/openssl/mdc2.h
 | 
			
		||||
speed.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
 | 
			
		||||
speed.o: ../include/openssl/ocsp.h ../include/openssl/opensslconf.h
 | 
			
		||||
speed.o: ../include/openssl/opensslv.h ../include/openssl/ossl_typ.h
 | 
			
		||||
speed.o: ../include/openssl/pkcs7.h ../include/openssl/rand.h
 | 
			
		||||
speed.o: ../include/openssl/rc2.h ../include/openssl/rc4.h
 | 
			
		||||
speed.o: ../include/openssl/ripemd.h ../include/openssl/rsa.h
 | 
			
		||||
speed.o: ../include/openssl/safestack.h ../include/openssl/seed.h
 | 
			
		||||
speed.o: ../include/openssl/sha.h ../include/openssl/stack.h
 | 
			
		||||
speed.o: ../include/openssl/symhacks.h ../include/openssl/txt_db.h
 | 
			
		||||
speed.o: ../include/openssl/ui.h ../include/openssl/ui_compat.h
 | 
			
		||||
speed.o: ../include/openssl/whrlpool.h ../include/openssl/x509.h
 | 
			
		||||
speed.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h
 | 
			
		||||
speed.o: speed.c testdsa.h testrsa.h
 | 
			
		||||
speed.o: ../include/openssl/modes.h ../include/openssl/obj_mac.h
 | 
			
		||||
speed.o: ../include/openssl/objects.h ../include/openssl/ocsp.h
 | 
			
		||||
speed.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
 | 
			
		||||
speed.o: ../include/openssl/ossl_typ.h ../include/openssl/pkcs7.h
 | 
			
		||||
speed.o: ../include/openssl/rand.h ../include/openssl/rc2.h
 | 
			
		||||
speed.o: ../include/openssl/rc4.h ../include/openssl/ripemd.h
 | 
			
		||||
speed.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
 | 
			
		||||
speed.o: ../include/openssl/seed.h ../include/openssl/sha.h
 | 
			
		||||
speed.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
 | 
			
		||||
speed.o: ../include/openssl/txt_db.h ../include/openssl/ui.h
 | 
			
		||||
speed.o: ../include/openssl/ui_compat.h ../include/openssl/whrlpool.h
 | 
			
		||||
speed.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
 | 
			
		||||
speed.o: ../include/openssl/x509v3.h apps.h speed.c testdsa.h testrsa.h
 | 
			
		||||
spkac.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
spkac.o: ../include/openssl/buffer.h ../include/openssl/conf.h
 | 
			
		||||
spkac.o: ../include/openssl/crypto.h ../include/openssl/e_os2.h
 | 
			
		||||
@@ -964,6 +970,21 @@ spkac.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
 | 
			
		||||
spkac.o: ../include/openssl/txt_db.h ../include/openssl/x509.h
 | 
			
		||||
spkac.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h
 | 
			
		||||
spkac.o: spkac.c
 | 
			
		||||
srp.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
srp.o: ../include/openssl/bn.h ../include/openssl/buffer.h
 | 
			
		||||
srp.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
srp.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
 | 
			
		||||
srp.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
 | 
			
		||||
srp.o: ../include/openssl/engine.h ../include/openssl/err.h
 | 
			
		||||
srp.o: ../include/openssl/evp.h ../include/openssl/lhash.h
 | 
			
		||||
srp.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
 | 
			
		||||
srp.o: ../include/openssl/ocsp.h ../include/openssl/opensslconf.h
 | 
			
		||||
srp.o: ../include/openssl/opensslv.h ../include/openssl/ossl_typ.h
 | 
			
		||||
srp.o: ../include/openssl/pkcs7.h ../include/openssl/safestack.h
 | 
			
		||||
srp.o: ../include/openssl/sha.h ../include/openssl/srp.h
 | 
			
		||||
srp.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
 | 
			
		||||
srp.o: ../include/openssl/txt_db.h ../include/openssl/x509.h
 | 
			
		||||
srp.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h srp.c
 | 
			
		||||
ts.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
ts.o: ../include/openssl/bn.h ../include/openssl/buffer.h
 | 
			
		||||
ts.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										103
									
								
								apps/apps.c
									
									
									
									
									
								
							
							
						
						
									
										103
									
								
								apps/apps.c
									
									
									
									
									
								
							@@ -109,11 +109,13 @@
 | 
			
		||||
 *
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
#ifndef _POSIX_C_SOURCE
 | 
			
		||||
#define _POSIX_C_SOURCE 2	/* On VMS, you need to define this to get
 | 
			
		||||
				   the declaration of fileno().  The value
 | 
			
		||||
				   2 is to make sure no function defined
 | 
			
		||||
				   in POSIX-2 is left undefined. */
 | 
			
		||||
#if !defined(_POSIX_C_SOURCE) && defined(OPENSSL_SYS_VMS)
 | 
			
		||||
/* On VMS, you need to define this to get
 | 
			
		||||
 * the declaration of fileno().  The value
 | 
			
		||||
 * 2 is to make sure no function defined
 | 
			
		||||
 * in POSIX-2 is left undefined.
 | 
			
		||||
 */
 | 
			
		||||
#define _POSIX_C_SOURCE 2
 | 
			
		||||
#endif
 | 
			
		||||
#include <stdio.h>
 | 
			
		||||
#include <stdlib.h>
 | 
			
		||||
@@ -390,6 +392,8 @@ int chopup_args(ARGS *arg, char *buf, int *argc, char **argv[])
 | 
			
		||||
		{
 | 
			
		||||
		arg->count=20;
 | 
			
		||||
		arg->data=(char **)OPENSSL_malloc(sizeof(char *)*arg->count);
 | 
			
		||||
		if (arg->data == NULL)
 | 
			
		||||
			return 0;
 | 
			
		||||
		}
 | 
			
		||||
	for (i=0; i<arg->count; i++)
 | 
			
		||||
		arg->data[i]=NULL;
 | 
			
		||||
@@ -586,12 +590,12 @@ int password_callback(char *buf, int bufsiz, int verify,
 | 
			
		||||
 | 
			
		||||
		if (ok >= 0)
 | 
			
		||||
			ok = UI_add_input_string(ui,prompt,ui_flags,buf,
 | 
			
		||||
				PW_MIN_LENGTH,BUFSIZ-1);
 | 
			
		||||
				PW_MIN_LENGTH,bufsiz-1);
 | 
			
		||||
		if (ok >= 0 && verify)
 | 
			
		||||
			{
 | 
			
		||||
			buff = (char *)OPENSSL_malloc(bufsiz);
 | 
			
		||||
			ok = UI_add_verify_string(ui,prompt,ui_flags,buff,
 | 
			
		||||
				PW_MIN_LENGTH,BUFSIZ-1, buf);
 | 
			
		||||
				PW_MIN_LENGTH,bufsiz-1, buf);
 | 
			
		||||
			}
 | 
			
		||||
		if (ok >= 0)
 | 
			
		||||
			do
 | 
			
		||||
@@ -1215,7 +1219,8 @@ STACK_OF(X509) *load_certs(BIO *err, const char *file, int format,
 | 
			
		||||
	const char *pass, ENGINE *e, const char *desc)
 | 
			
		||||
	{
 | 
			
		||||
	STACK_OF(X509) *certs;
 | 
			
		||||
	load_certs_crls(err, file, format, pass, e, desc, &certs, NULL);
 | 
			
		||||
	if (!load_certs_crls(err, file, format, pass, e, desc, &certs, NULL))
 | 
			
		||||
		return NULL;
 | 
			
		||||
	return certs;
 | 
			
		||||
	}	
 | 
			
		||||
 | 
			
		||||
@@ -1223,7 +1228,8 @@ STACK_OF(X509_CRL) *load_crls(BIO *err, const char *file, int format,
 | 
			
		||||
	const char *pass, ENGINE *e, const char *desc)
 | 
			
		||||
	{
 | 
			
		||||
	STACK_OF(X509_CRL) *crls;
 | 
			
		||||
	load_certs_crls(err, file, format, pass, e, desc, NULL, &crls);
 | 
			
		||||
	if (!load_certs_crls(err, file, format, pass, e, desc, NULL, &crls))
 | 
			
		||||
		return NULL;
 | 
			
		||||
	return crls;
 | 
			
		||||
	}	
 | 
			
		||||
 | 
			
		||||
@@ -1540,6 +1546,8 @@ char *make_config_name()
 | 
			
		||||
 | 
			
		||||
	len=strlen(t)+strlen(OPENSSL_CONF)+2;
 | 
			
		||||
	p=OPENSSL_malloc(len);
 | 
			
		||||
	if (p == NULL)
 | 
			
		||||
		return NULL;
 | 
			
		||||
	BUF_strlcpy(p,t,len);
 | 
			
		||||
#ifndef OPENSSL_SYS_VMS
 | 
			
		||||
	BUF_strlcat(p,"/",len);
 | 
			
		||||
@@ -2130,7 +2138,7 @@ X509_NAME *parse_name(char *subject, long chtype, int multirdn)
 | 
			
		||||
	X509_NAME *n = NULL;
 | 
			
		||||
	int nid;
 | 
			
		||||
 | 
			
		||||
	if (!buf || !ne_types || !ne_values)
 | 
			
		||||
	if (!buf || !ne_types || !ne_values || !mval)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf(bio_err, "malloc error\n");
 | 
			
		||||
		goto error;
 | 
			
		||||
@@ -2234,6 +2242,7 @@ X509_NAME *parse_name(char *subject, long chtype, int multirdn)
 | 
			
		||||
	OPENSSL_free(ne_values);
 | 
			
		||||
	OPENSSL_free(ne_types);
 | 
			
		||||
	OPENSSL_free(buf);
 | 
			
		||||
	OPENSSL_free(mval);
 | 
			
		||||
	return n;
 | 
			
		||||
 | 
			
		||||
error:
 | 
			
		||||
@@ -2242,6 +2251,8 @@ error:
 | 
			
		||||
		OPENSSL_free(ne_values);
 | 
			
		||||
	if (ne_types)
 | 
			
		||||
		OPENSSL_free(ne_types);
 | 
			
		||||
	if (mval)
 | 
			
		||||
		OPENSSL_free(mval);
 | 
			
		||||
	if (buf)
 | 
			
		||||
		OPENSSL_free(buf);
 | 
			
		||||
	return NULL;
 | 
			
		||||
@@ -2256,6 +2267,7 @@ int args_verify(char ***pargs, int *pargc,
 | 
			
		||||
	int purpose = 0, depth = -1;
 | 
			
		||||
	char **oldargs = *pargs;
 | 
			
		||||
	char *arg = **pargs, *argn = (*pargs)[1];
 | 
			
		||||
	time_t at_time = 0;
 | 
			
		||||
	if (!strcmp(arg, "-policy"))
 | 
			
		||||
		{
 | 
			
		||||
		if (!argn)
 | 
			
		||||
@@ -2308,6 +2320,27 @@ int args_verify(char ***pargs, int *pargc,
 | 
			
		||||
			}
 | 
			
		||||
		(*pargs)++;
 | 
			
		||||
		}
 | 
			
		||||
	else if (strcmp(arg,"-attime") == 0)
 | 
			
		||||
		{
 | 
			
		||||
		if (!argn)
 | 
			
		||||
			*badarg = 1;
 | 
			
		||||
		else
 | 
			
		||||
			{
 | 
			
		||||
			long timestamp;
 | 
			
		||||
			/* interpret the -attime argument as seconds since
 | 
			
		||||
			 * Epoch */
 | 
			
		||||
			if (sscanf(argn, "%li", ×tamp) != 1)
 | 
			
		||||
				{
 | 
			
		||||
				BIO_printf(bio_err,
 | 
			
		||||
						"Error parsing timestamp %s\n",
 | 
			
		||||
					   	argn);
 | 
			
		||||
				*badarg = 1;
 | 
			
		||||
				}
 | 
			
		||||
			/* on some platforms time_t may be a float */
 | 
			
		||||
			at_time = (time_t) timestamp;
 | 
			
		||||
			}
 | 
			
		||||
		(*pargs)++;
 | 
			
		||||
		}
 | 
			
		||||
	else if (!strcmp(arg, "-ignore_critical"))
 | 
			
		||||
		flags |= X509_V_FLAG_IGNORE_CRITICAL;
 | 
			
		||||
	else if (!strcmp(arg, "-issuer_checks"))
 | 
			
		||||
@@ -2362,6 +2395,9 @@ int args_verify(char ***pargs, int *pargc,
 | 
			
		||||
	if (depth >= 0)
 | 
			
		||||
		X509_VERIFY_PARAM_set_depth(*pm, depth);
 | 
			
		||||
 | 
			
		||||
	if (at_time) 
 | 
			
		||||
		X509_VERIFY_PARAM_set_time(*pm, at_time);
 | 
			
		||||
 | 
			
		||||
	end:
 | 
			
		||||
 | 
			
		||||
	(*pargs)++;
 | 
			
		||||
@@ -2693,6 +2729,51 @@ void jpake_server_auth(BIO *out, BIO *conn, const char *secret)
 | 
			
		||||
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#if !defined(OPENSSL_NO_TLSEXT) && !defined(OPENSSL_NO_NEXTPROTONEG)
 | 
			
		||||
/*-
 | 
			
		||||
 * next_protos_parse parses a comma separated list of strings into a string
 | 
			
		||||
 * in a format suitable for passing to SSL_CTX_set_next_protos_advertised.
 | 
			
		||||
 *   outlen: (output) set to the length of the resulting buffer on success.
 | 
			
		||||
 *   err: (maybe NULL) on failure, an error message line is written to this BIO.
 | 
			
		||||
 *   in: a NUL termianted string like "abc,def,ghi"
 | 
			
		||||
 *
 | 
			
		||||
 *   returns: a malloced buffer or NULL on failure.
 | 
			
		||||
 */
 | 
			
		||||
unsigned char *next_protos_parse(unsigned short *outlen, const char *in)
 | 
			
		||||
	{
 | 
			
		||||
	size_t len;
 | 
			
		||||
	unsigned char *out;
 | 
			
		||||
	size_t i, start = 0;
 | 
			
		||||
 | 
			
		||||
	len = strlen(in);
 | 
			
		||||
	if (len >= 65535)
 | 
			
		||||
		return NULL;
 | 
			
		||||
 | 
			
		||||
	out = OPENSSL_malloc(strlen(in) + 1);
 | 
			
		||||
	if (!out)
 | 
			
		||||
		return NULL;
 | 
			
		||||
 | 
			
		||||
	for (i = 0; i <= len; ++i)
 | 
			
		||||
		{
 | 
			
		||||
		if (i == len || in[i] == ',')
 | 
			
		||||
			{
 | 
			
		||||
			if (i - start > 255)
 | 
			
		||||
				{
 | 
			
		||||
				OPENSSL_free(out);
 | 
			
		||||
				return NULL;
 | 
			
		||||
				}
 | 
			
		||||
			out[start] = i - start;
 | 
			
		||||
			start = i + 1;
 | 
			
		||||
			}
 | 
			
		||||
		else
 | 
			
		||||
			out[i+1] = in[i];
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	*outlen = len + 1;
 | 
			
		||||
	return out;
 | 
			
		||||
	}
 | 
			
		||||
#endif  /* !OPENSSL_NO_TLSEXT && !OPENSSL_NO_NEXTPROTONEG */
 | 
			
		||||
 | 
			
		||||
/*
 | 
			
		||||
 * Platform-specific sections
 | 
			
		||||
 */
 | 
			
		||||
@@ -2767,7 +2848,7 @@ double app_tminterval(int stop,int usertime)
 | 
			
		||||
 | 
			
		||||
	if (proc==NULL)
 | 
			
		||||
		{
 | 
			
		||||
		if (GetVersion() < 0x80000000)
 | 
			
		||||
		if (check_winnt())
 | 
			
		||||
			proc = OpenProcess(PROCESS_QUERY_INFORMATION,FALSE,
 | 
			
		||||
						GetCurrentProcessId());
 | 
			
		||||
		if (proc==NULL) proc = (HANDLE)-1;
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										15
									
								
								apps/apps.h
									
									
									
									
									
								
							
							
						
						
									
										15
									
								
								apps/apps.h
									
									
									
									
									
								
							@@ -188,6 +188,7 @@ extern BIO *bio_err;
 | 
			
		||||
			do { CONF_modules_unload(1); destroy_ui_method(); \
 | 
			
		||||
			OBJ_cleanup(); EVP_cleanup(); ENGINE_cleanup(); \
 | 
			
		||||
			CRYPTO_cleanup_all_ex_data(); ERR_remove_thread_state(NULL); \
 | 
			
		||||
			RAND_cleanup(); \
 | 
			
		||||
			ERR_free_strings(); zlib_cleanup();} while(0)
 | 
			
		||||
#  else
 | 
			
		||||
#    define apps_startup() \
 | 
			
		||||
@@ -198,6 +199,7 @@ extern BIO *bio_err;
 | 
			
		||||
			do { CONF_modules_unload(1); destroy_ui_method(); \
 | 
			
		||||
			OBJ_cleanup(); EVP_cleanup(); \
 | 
			
		||||
			CRYPTO_cleanup_all_ex_data(); ERR_remove_thread_state(NULL); \
 | 
			
		||||
			RAND_cleanup(); \
 | 
			
		||||
			ERR_free_strings(); zlib_cleanup(); } while(0)
 | 
			
		||||
#  endif
 | 
			
		||||
#endif
 | 
			
		||||
@@ -317,6 +319,12 @@ int bio_to_mem(unsigned char **out, int maxlen, BIO *in);
 | 
			
		||||
int pkey_ctrl_string(EVP_PKEY_CTX *ctx, char *value);
 | 
			
		||||
int init_gen_str(BIO *err, EVP_PKEY_CTX **pctx,
 | 
			
		||||
			const char *algname, ENGINE *e, int do_param);
 | 
			
		||||
int do_X509_sign(BIO *err, X509 *x, EVP_PKEY *pkey, const EVP_MD *md,
 | 
			
		||||
			STACK_OF(OPENSSL_STRING) *sigopts);
 | 
			
		||||
int do_X509_REQ_sign(BIO *err, X509_REQ *x, EVP_PKEY *pkey, const EVP_MD *md,
 | 
			
		||||
			STACK_OF(OPENSSL_STRING) *sigopts);
 | 
			
		||||
int do_X509_CRL_sign(BIO *err, X509_CRL *x, EVP_PKEY *pkey, const EVP_MD *md,
 | 
			
		||||
			STACK_OF(OPENSSL_STRING) *sigopts);
 | 
			
		||||
#ifndef OPENSSL_NO_PSK
 | 
			
		||||
extern char *psk_key;
 | 
			
		||||
#endif
 | 
			
		||||
@@ -325,6 +333,10 @@ void jpake_client_auth(BIO *out, BIO *conn, const char *secret);
 | 
			
		||||
void jpake_server_auth(BIO *out, BIO *conn, const char *secret);
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#if !defined(OPENSSL_NO_TLSEXT) && !defined(OPENSSL_NO_NEXTPROTONEG)
 | 
			
		||||
unsigned char *next_protos_parse(unsigned short *outlen, const char *in);
 | 
			
		||||
#endif  /* !OPENSSL_NO_TLSEXT && !OPENSSL_NO_NEXTPROTONEG */
 | 
			
		||||
 | 
			
		||||
#define FORMAT_UNDEF    0
 | 
			
		||||
#define FORMAT_ASN1     1
 | 
			
		||||
#define FORMAT_TEXT     2
 | 
			
		||||
@@ -357,4 +369,7 @@ int raw_write_stdout(const void *,int);
 | 
			
		||||
#define TM_START	0
 | 
			
		||||
#define TM_STOP		1
 | 
			
		||||
double app_tminterval (int stop,int usertime);
 | 
			
		||||
 | 
			
		||||
#define OPENSSL_NO_SSL_INTERN
 | 
			
		||||
 | 
			
		||||
#endif
 | 
			
		||||
 
 | 
			
		||||
@@ -69,7 +69,8 @@
 | 
			
		||||
#include <openssl/x509.h>
 | 
			
		||||
#include <openssl/pem.h>
 | 
			
		||||
 | 
			
		||||
/* -inform arg	- input format - default PEM (DER or PEM)
 | 
			
		||||
/*-
 | 
			
		||||
 * -inform arg	- input format - default PEM (DER or PEM)
 | 
			
		||||
 * -in arg	- input file - default stdin
 | 
			
		||||
 * -i		- indent the details by depth
 | 
			
		||||
 * -offset	- where in the file to start
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										82
									
								
								apps/ca.c
									
									
									
									
									
								
							
							
						
						
									
										82
									
								
								apps/ca.c
									
									
									
									
									
								
							@@ -197,26 +197,30 @@ extern int EF_ALIGNMENT;
 | 
			
		||||
 | 
			
		||||
static void lookup_fail(const char *name, const char *tag);
 | 
			
		||||
static int certify(X509 **xret, char *infile,EVP_PKEY *pkey,X509 *x509,
 | 
			
		||||
		   const EVP_MD *dgst,STACK_OF(CONF_VALUE) *policy,CA_DB *db,
 | 
			
		||||
		   const EVP_MD *dgst,STACK_OF(OPENSSL_STRING) *sigopts,
 | 
			
		||||
		   STACK_OF(CONF_VALUE) *policy,CA_DB *db,
 | 
			
		||||
		   BIGNUM *serial, char *subj,unsigned long chtype, int multirdn, int email_dn, char *startdate,
 | 
			
		||||
		   char *enddate, long days, int batch, char *ext_sect, CONF *conf,
 | 
			
		||||
		   int verbose, unsigned long certopt, unsigned long nameopt,
 | 
			
		||||
		   int default_op, int ext_copy, int selfsign);
 | 
			
		||||
static int certify_cert(X509 **xret, char *infile,EVP_PKEY *pkey,X509 *x509,
 | 
			
		||||
			const EVP_MD *dgst,STACK_OF(CONF_VALUE) *policy,
 | 
			
		||||
			const EVP_MD *dgst,STACK_OF(OPENSSL_STRING) *sigopts,
 | 
			
		||||
			STACK_OF(CONF_VALUE) *policy,
 | 
			
		||||
			CA_DB *db, BIGNUM *serial, char *subj,unsigned long chtype, int multirdn, int email_dn,
 | 
			
		||||
			char *startdate, char *enddate, long days, int batch,
 | 
			
		||||
			char *ext_sect, CONF *conf,int verbose, unsigned long certopt,
 | 
			
		||||
			unsigned long nameopt, int default_op, int ext_copy,
 | 
			
		||||
			ENGINE *e);
 | 
			
		||||
static int certify_spkac(X509 **xret, char *infile,EVP_PKEY *pkey,X509 *x509,
 | 
			
		||||
			 const EVP_MD *dgst,STACK_OF(CONF_VALUE) *policy,
 | 
			
		||||
			 const EVP_MD *dgst,STACK_OF(OPENSSL_STRING) *sigopts,
 | 
			
		||||
			 STACK_OF(CONF_VALUE) *policy,
 | 
			
		||||
			 CA_DB *db, BIGNUM *serial,char *subj,unsigned long chtype, int multirdn, int email_dn,
 | 
			
		||||
			 char *startdate, char *enddate, long days, char *ext_sect,
 | 
			
		||||
			 CONF *conf, int verbose, unsigned long certopt, 
 | 
			
		||||
			 unsigned long nameopt, int default_op, int ext_copy);
 | 
			
		||||
static void write_new_certificate(BIO *bp, X509 *x, int output_der, int notext);
 | 
			
		||||
static int do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509, const EVP_MD *dgst,
 | 
			
		||||
	STACK_OF(OPENSSL_STRING) *sigopts,
 | 
			
		||||
	STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial,char *subj,unsigned long chtype, int multirdn,
 | 
			
		||||
	int email_dn, char *startdate, char *enddate, long days, int batch,
 | 
			
		||||
       	int verbose, X509_REQ *req, char *ext_sect, CONF *conf,
 | 
			
		||||
@@ -311,6 +315,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	const EVP_MD *dgst=NULL;
 | 
			
		||||
	STACK_OF(CONF_VALUE) *attribs=NULL;
 | 
			
		||||
	STACK_OF(X509) *cert_sk=NULL;
 | 
			
		||||
	STACK_OF(OPENSSL_STRING) *sigopts = NULL;
 | 
			
		||||
#undef BSIZE
 | 
			
		||||
#define BSIZE 256
 | 
			
		||||
	MS_STATIC char buf[3][BSIZE];
 | 
			
		||||
@@ -435,6 +440,15 @@ EF_ALIGNMENT=0;
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			outdir= *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
		else if (strcmp(*argv,"-sigopt") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1)
 | 
			
		||||
				goto bad;
 | 
			
		||||
			if (!sigopts)
 | 
			
		||||
				sigopts = sk_OPENSSL_STRING_new_null();
 | 
			
		||||
			if (!sigopts || !sk_OPENSSL_STRING_push(sigopts, *(++argv)))
 | 
			
		||||
				goto bad;
 | 
			
		||||
			}
 | 
			
		||||
		else if (strcmp(*argv,"-notext") == 0)
 | 
			
		||||
			notext=1;
 | 
			
		||||
		else if (strcmp(*argv,"-batch") == 0)
 | 
			
		||||
@@ -635,7 +649,7 @@ bad:
 | 
			
		||||
			oid_bio=BIO_new_file(p,"r");
 | 
			
		||||
			if (oid_bio == NULL) 
 | 
			
		||||
				{
 | 
			
		||||
				/*
 | 
			
		||||
				/*-
 | 
			
		||||
				BIO_printf(bio_err,"problems opening %s for extra oid's\n",p);
 | 
			
		||||
				ERR_print_errors(bio_err);
 | 
			
		||||
				*/
 | 
			
		||||
@@ -689,7 +703,7 @@ bad:
 | 
			
		||||
		ERR_clear_error();
 | 
			
		||||
#ifdef RL_DEBUG
 | 
			
		||||
	if (!p)
 | 
			
		||||
		BIO_printf(bio_err, "DEBUG: unique_subject undefined\n", p);
 | 
			
		||||
		BIO_printf(bio_err, "DEBUG: unique_subject undefined\n");
 | 
			
		||||
#endif
 | 
			
		||||
#ifdef RL_DEBUG
 | 
			
		||||
	BIO_printf(bio_err, "DEBUG: configured unique_subject is %d\n",
 | 
			
		||||
@@ -1170,8 +1184,9 @@ bad:
 | 
			
		||||
		if (spkac_file != NULL)
 | 
			
		||||
			{
 | 
			
		||||
			total++;
 | 
			
		||||
			j=certify_spkac(&x,spkac_file,pkey,x509,dgst,attribs,db,
 | 
			
		||||
				serial,subj,chtype,multirdn,email_dn,startdate,enddate,days,extensions,
 | 
			
		||||
			j=certify_spkac(&x,spkac_file,pkey,x509,dgst,sigopts,
 | 
			
		||||
				attribs,db, serial,subj,chtype,multirdn,
 | 
			
		||||
				email_dn,startdate,enddate,days,extensions,
 | 
			
		||||
				conf,verbose,certopt,nameopt,default_op,ext_copy);
 | 
			
		||||
			if (j < 0) goto err;
 | 
			
		||||
			if (j > 0)
 | 
			
		||||
@@ -1194,7 +1209,8 @@ bad:
 | 
			
		||||
		if (ss_cert_file != NULL)
 | 
			
		||||
			{
 | 
			
		||||
			total++;
 | 
			
		||||
			j=certify_cert(&x,ss_cert_file,pkey,x509,dgst,attribs,
 | 
			
		||||
			j=certify_cert(&x,ss_cert_file,pkey,x509,dgst,sigopts,
 | 
			
		||||
				attribs,
 | 
			
		||||
				db,serial,subj,chtype,multirdn,email_dn,startdate,enddate,days,batch,
 | 
			
		||||
				extensions,conf,verbose, certopt, nameopt,
 | 
			
		||||
				default_op, ext_copy, e);
 | 
			
		||||
@@ -1214,7 +1230,7 @@ bad:
 | 
			
		||||
		if (infile != NULL)
 | 
			
		||||
			{
 | 
			
		||||
			total++;
 | 
			
		||||
			j=certify(&x,infile,pkey,x509p,dgst,attribs,db,
 | 
			
		||||
			j=certify(&x,infile,pkey,x509p,dgst,sigopts, attribs,db,
 | 
			
		||||
				serial,subj,chtype,multirdn,email_dn,startdate,enddate,days,batch,
 | 
			
		||||
				extensions,conf,verbose, certopt, nameopt,
 | 
			
		||||
				default_op, ext_copy, selfsign);
 | 
			
		||||
@@ -1234,7 +1250,7 @@ bad:
 | 
			
		||||
		for (i=0; i<argc; i++)
 | 
			
		||||
			{
 | 
			
		||||
			total++;
 | 
			
		||||
			j=certify(&x,argv[i],pkey,x509p,dgst,attribs,db,
 | 
			
		||||
			j=certify(&x,argv[i],pkey,x509p,dgst,sigopts,attribs,db,
 | 
			
		||||
				serial,subj,chtype,multirdn,email_dn,startdate,enddate,days,batch,
 | 
			
		||||
				extensions,conf,verbose, certopt, nameopt,
 | 
			
		||||
				default_op, ext_copy, selfsign);
 | 
			
		||||
@@ -1392,6 +1408,7 @@ bad:
 | 
			
		||||
			if (!NCONF_get_number(conf,section,
 | 
			
		||||
				ENV_DEFAULT_CRL_HOURS, &crlhours))
 | 
			
		||||
				crlhours = 0;
 | 
			
		||||
			ERR_clear_error();
 | 
			
		||||
			}
 | 
			
		||||
		if ((crldays == 0) && (crlhours == 0) && (crlsec == 0))
 | 
			
		||||
			{
 | 
			
		||||
@@ -1474,7 +1491,8 @@ bad:
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
		
 | 
			
		||||
		if (crlnumberfile != NULL)	/* we have a CRL number that need updating */
 | 
			
		||||
		/* we have a CRL number that need updating */
 | 
			
		||||
		if (crlnumberfile != NULL)
 | 
			
		||||
			if (!save_serial(crlnumberfile,"new",crlnumber,NULL)) goto err;
 | 
			
		||||
 | 
			
		||||
		if (crlnumber)
 | 
			
		||||
@@ -1483,7 +1501,7 @@ bad:
 | 
			
		||||
			crlnumber = NULL;
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
		if (!X509_CRL_sign(crl,pkey,dgst)) goto err;
 | 
			
		||||
		if (!do_X509_CRL_sign(bio_err,crl,pkey,dgst,sigopts)) goto err;
 | 
			
		||||
 | 
			
		||||
		PEM_write_bio_X509_CRL(Sout,crl);
 | 
			
		||||
 | 
			
		||||
@@ -1537,6 +1555,8 @@ err:
 | 
			
		||||
	BN_free(serial);
 | 
			
		||||
	BN_free(crlnumber);
 | 
			
		||||
	free_index(db);
 | 
			
		||||
	if (sigopts)
 | 
			
		||||
		sk_OPENSSL_STRING_free(sigopts);
 | 
			
		||||
	EVP_PKEY_free(pkey);
 | 
			
		||||
	if (x509) X509_free(x509);
 | 
			
		||||
	X509_CRL_free(crl);
 | 
			
		||||
@@ -1553,8 +1573,10 @@ static void lookup_fail(const char *name, const char *tag)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
static int certify(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
 | 
			
		||||
	     const EVP_MD *dgst, STACK_OF(CONF_VALUE) *policy, CA_DB *db,
 | 
			
		||||
	     BIGNUM *serial, char *subj,unsigned long chtype, int multirdn, int email_dn, char *startdate, char *enddate,
 | 
			
		||||
	     const EVP_MD *dgst, STACK_OF(OPENSSL_STRING) *sigopts,
 | 
			
		||||
	     STACK_OF(CONF_VALUE) *policy, CA_DB *db,
 | 
			
		||||
	     BIGNUM *serial, char *subj,unsigned long chtype, int multirdn,
 | 
			
		||||
	     int email_dn, char *startdate, char *enddate,
 | 
			
		||||
	     long days, int batch, char *ext_sect, CONF *lconf, int verbose,
 | 
			
		||||
	     unsigned long certopt, unsigned long nameopt, int default_op,
 | 
			
		||||
	     int ext_copy, int selfsign)
 | 
			
		||||
@@ -1599,18 +1621,21 @@ static int certify(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
 | 
			
		||||
		{
 | 
			
		||||
		ok=0;
 | 
			
		||||
		BIO_printf(bio_err,"Signature verification problems....\n");
 | 
			
		||||
		ERR_print_errors(bio_err);
 | 
			
		||||
		goto err;
 | 
			
		||||
		}
 | 
			
		||||
	if (i == 0)
 | 
			
		||||
		{
 | 
			
		||||
		ok=0;
 | 
			
		||||
		BIO_printf(bio_err,"Signature did not match the certificate request\n");
 | 
			
		||||
		ERR_print_errors(bio_err);
 | 
			
		||||
		goto err;
 | 
			
		||||
		}
 | 
			
		||||
	else
 | 
			
		||||
		BIO_printf(bio_err,"Signature ok\n");
 | 
			
		||||
 | 
			
		||||
	ok=do_body(xret,pkey,x509,dgst,policy,db,serial,subj,chtype,multirdn, email_dn,
 | 
			
		||||
	ok=do_body(xret,pkey,x509,dgst,sigopts, policy,db,serial,subj,chtype,
 | 
			
		||||
		multirdn, email_dn,
 | 
			
		||||
		startdate,enddate,days,batch,verbose,req,ext_sect,lconf,
 | 
			
		||||
		certopt, nameopt, default_op, ext_copy, selfsign);
 | 
			
		||||
 | 
			
		||||
@@ -1621,7 +1646,8 @@ err:
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
static int certify_cert(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
 | 
			
		||||
	     const EVP_MD *dgst, STACK_OF(CONF_VALUE) *policy, CA_DB *db,
 | 
			
		||||
	     const EVP_MD *dgst, STACK_OF(OPENSSL_STRING) *sigopts,
 | 
			
		||||
	     STACK_OF(CONF_VALUE) *policy, CA_DB *db,
 | 
			
		||||
	     BIGNUM *serial, char *subj, unsigned long chtype, int multirdn, int email_dn, char *startdate, char *enddate,
 | 
			
		||||
	     long days, int batch, char *ext_sect, CONF *lconf, int verbose,
 | 
			
		||||
	     unsigned long certopt, unsigned long nameopt, int default_op,
 | 
			
		||||
@@ -1664,7 +1690,7 @@ static int certify_cert(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
 | 
			
		||||
	if ((rreq=X509_to_X509_REQ(req,NULL,EVP_md5())) == NULL)
 | 
			
		||||
		goto err;
 | 
			
		||||
 | 
			
		||||
	ok=do_body(xret,pkey,x509,dgst,policy,db,serial,subj,chtype,multirdn,email_dn,startdate,enddate,
 | 
			
		||||
	ok=do_body(xret,pkey,x509,dgst,sigopts,policy,db,serial,subj,chtype,multirdn,email_dn,startdate,enddate,
 | 
			
		||||
		days,batch,verbose,rreq,ext_sect,lconf, certopt, nameopt, default_op,
 | 
			
		||||
		ext_copy, 0);
 | 
			
		||||
 | 
			
		||||
@@ -1675,7 +1701,8 @@ err:
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
static int do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509, const EVP_MD *dgst,
 | 
			
		||||
	     STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, char *subj,
 | 
			
		||||
	     STACK_OF(OPENSSL_STRING) *sigopts, STACK_OF(CONF_VALUE) *policy,
 | 
			
		||||
             CA_DB *db, BIGNUM *serial, char *subj,
 | 
			
		||||
	     unsigned long chtype, int multirdn,
 | 
			
		||||
	     int email_dn, char *startdate, char *enddate, long days, int batch,
 | 
			
		||||
	     int verbose, X509_REQ *req, char *ext_sect, CONF *lconf,
 | 
			
		||||
@@ -2146,7 +2173,7 @@ again2:
 | 
			
		||||
		EVP_PKEY_copy_parameters(pktmp,pkey);
 | 
			
		||||
	EVP_PKEY_free(pktmp);
 | 
			
		||||
 | 
			
		||||
	if (!X509_sign(ret,pkey,dgst))
 | 
			
		||||
	if (!do_X509_sign(bio_err, ret,pkey,dgst, sigopts))
 | 
			
		||||
		goto err;
 | 
			
		||||
 | 
			
		||||
	/* We now just add it to the database */
 | 
			
		||||
@@ -2240,7 +2267,8 @@ static void write_new_certificate(BIO *bp, X509 *x, int output_der, int notext)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
static int certify_spkac(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
 | 
			
		||||
	     const EVP_MD *dgst, STACK_OF(CONF_VALUE) *policy, CA_DB *db,
 | 
			
		||||
	     const EVP_MD *dgst, STACK_OF(OPENSSL_STRING) *sigopts,
 | 
			
		||||
	     STACK_OF(CONF_VALUE) *policy, CA_DB *db,
 | 
			
		||||
	     BIGNUM *serial, char *subj,unsigned long chtype, int multirdn, int email_dn, char *startdate, char *enddate,
 | 
			
		||||
	     long days, char *ext_sect, CONF *lconf, int verbose, unsigned long certopt,
 | 
			
		||||
	     unsigned long nameopt, int default_op, int ext_copy)
 | 
			
		||||
@@ -2366,9 +2394,9 @@ static int certify_spkac(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
 | 
			
		||||
 | 
			
		||||
	X509_REQ_set_pubkey(req,pktmp);
 | 
			
		||||
	EVP_PKEY_free(pktmp);
 | 
			
		||||
	ok=do_body(xret,pkey,x509,dgst,policy,db,serial,subj,chtype,multirdn,email_dn,startdate,enddate,
 | 
			
		||||
		   days,1,verbose,req,ext_sect,lconf, certopt, nameopt, default_op,
 | 
			
		||||
			ext_copy, 0);
 | 
			
		||||
	ok=do_body(xret,pkey,x509,dgst,sigopts,policy,db,serial,subj,chtype,
 | 
			
		||||
		   multirdn,email_dn,startdate,enddate, days,1,verbose,req,
 | 
			
		||||
		   ext_sect,lconf, certopt, nameopt, default_op, ext_copy, 0);
 | 
			
		||||
err:
 | 
			
		||||
	if (req != NULL) X509_REQ_free(req);
 | 
			
		||||
	if (parms != NULL) CONF_free(parms);
 | 
			
		||||
@@ -2536,7 +2564,7 @@ static int get_certificate_status(const char *serial, CA_DB *db)
 | 
			
		||||
			
 | 
			
		||||
	/* Make it Upper Case */
 | 
			
		||||
	for (i=0; row[DB_serial][i] != '\0'; i++)
 | 
			
		||||
		row[DB_serial][i] = toupper(row[DB_serial][i]);
 | 
			
		||||
		row[DB_serial][i] = toupper((unsigned char)row[DB_serial][i]);
 | 
			
		||||
	
 | 
			
		||||
 | 
			
		||||
	ok=1;
 | 
			
		||||
@@ -2752,6 +2780,9 @@ char *make_revocation_str(int rev_type, char *rev_arg)
 | 
			
		||||
 | 
			
		||||
	revtm = X509_gmtime_adj(NULL, 0);
 | 
			
		||||
 | 
			
		||||
	if (!revtm)
 | 
			
		||||
		return NULL;
 | 
			
		||||
 | 
			
		||||
	i = revtm->length + 1;
 | 
			
		||||
 | 
			
		||||
	if (reason) i += strlen(reason) + 1;
 | 
			
		||||
@@ -2776,7 +2807,8 @@ char *make_revocation_str(int rev_type, char *rev_arg)
 | 
			
		||||
	return str;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
/* Convert revocation field to X509_REVOKED entry 
 | 
			
		||||
/*-
 | 
			
		||||
 * Convert revocation field to X509_REVOKED entry 
 | 
			
		||||
 * return code:
 | 
			
		||||
 * 0 error
 | 
			
		||||
 * 1 OK
 | 
			
		||||
 
 | 
			
		||||
@@ -96,13 +96,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	char buf[512];
 | 
			
		||||
	BIO *STDout=NULL;
 | 
			
		||||
 | 
			
		||||
#if !defined(OPENSSL_NO_SSL2) && !defined(OPENSSL_NO_SSL3)
 | 
			
		||||
	meth=SSLv23_server_method();
 | 
			
		||||
#elif !defined(OPENSSL_NO_SSL3)
 | 
			
		||||
	meth=SSLv3_server_method();
 | 
			
		||||
#elif !defined(OPENSSL_NO_SSL2)
 | 
			
		||||
	meth=SSLv2_server_method();
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	apps_startup();
 | 
			
		||||
 | 
			
		||||
@@ -196,18 +190,27 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			
 | 
			
		||||
			if (Verbose)
 | 
			
		||||
				{
 | 
			
		||||
				unsigned long id = c->id;
 | 
			
		||||
				unsigned long id = SSL_CIPHER_get_id(c);
 | 
			
		||||
				int id0 = (int)(id >> 24);
 | 
			
		||||
				int id1 = (int)((id >> 16) & 0xffL);
 | 
			
		||||
				int id2 = (int)((id >> 8) & 0xffL);
 | 
			
		||||
				int id3 = (int)(id & 0xffL);
 | 
			
		||||
				
 | 
			
		||||
				if ((id & 0xff000000L) == 0x02000000L)
 | 
			
		||||
					BIO_printf(STDout, "     0x%02X,0x%02X,0x%02X - ", id1, id2, id3); /* SSL2 cipher */
 | 
			
		||||
					{
 | 
			
		||||
					/* SSL2 cipher */
 | 
			
		||||
					BIO_printf(STDout, "     0x%02X,0x%02X,0x%02X - ", id1, id2, id3);
 | 
			
		||||
					}
 | 
			
		||||
				else if ((id & 0xff000000L) == 0x03000000L)
 | 
			
		||||
					BIO_printf(STDout, "          0x%02X,0x%02X - ", id2, id3); /* SSL3 cipher */
 | 
			
		||||
					{
 | 
			
		||||
					/* SSL3 cipher */
 | 
			
		||||
					BIO_printf(STDout, "          0x%02X,0x%02X - ", id2, id3);
 | 
			
		||||
					}
 | 
			
		||||
				else
 | 
			
		||||
					BIO_printf(STDout, "0x%02X,0x%02X,0x%02X,0x%02X - ", id0, id1, id2, id3); /* whatever */
 | 
			
		||||
					{
 | 
			
		||||
					/* whatever */
 | 
			
		||||
					BIO_printf(STDout, "0x%02X,0x%02X,0x%02X,0x%02X - ", id0, id1, id2, id3);
 | 
			
		||||
					}
 | 
			
		||||
				}
 | 
			
		||||
 | 
			
		||||
			BIO_puts(STDout,SSL_CIPHER_description(c,buf,sizeof buf));
 | 
			
		||||
 
 | 
			
		||||
@@ -1,24 +1,52 @@
 | 
			
		||||
issuer= /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test CA (1024 bit)
 | 
			
		||||
subject=/C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Client test cert (512 bit)
 | 
			
		||||
subject= C = UK, O = OpenSSL Group, OU = FOR TESTING PURPOSES ONLY, CN = Test Client Cert
 | 
			
		||||
issuer= C = UK, O = OpenSSL Group, OU = FOR TESTING PURPOSES ONLY, CN = OpenSSL Test Intermediate CA
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIIB6TCCAVICAQIwDQYJKoZIhvcNAQEEBQAwWzELMAkGA1UEBhMCQVUxEzARBgNV
 | 
			
		||||
BAgTClF1ZWVuc2xhbmQxGjAYBgNVBAoTEUNyeXB0U29mdCBQdHkgTHRkMRswGQYD
 | 
			
		||||
VQQDExJUZXN0IENBICgxMDI0IGJpdCkwHhcNOTcwNjA5MTM1NzU2WhcNOTgwNjA5
 | 
			
		||||
MTM1NzU2WjBjMQswCQYDVQQGEwJBVTETMBEGA1UECBMKUXVlZW5zbGFuZDEaMBgG
 | 
			
		||||
A1UEChMRQ3J5cHRTb2Z0IFB0eSBMdGQxIzAhBgNVBAMTGkNsaWVudCB0ZXN0IGNl
 | 
			
		||||
cnQgKDUxMiBiaXQpMFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBALtv55QyzG6i2Plw
 | 
			
		||||
Z1pah7++Gv8L5j6Hnyr/uTZE1NLG0ABDDexmq/R4KedLjFEIYjocDui+IXs62NNt
 | 
			
		||||
XrT8odkCAwEAATANBgkqhkiG9w0BAQQFAAOBgQBwtMmI7oGUG8nKmftQssATViH5
 | 
			
		||||
NRRtoEw07DxJp/LfatHdrhqQB73eGdL5WILZJXk46Xz2e9WMSUjVCSYhdKxtflU3
 | 
			
		||||
UR2Ajv1Oo0sTNdfz0wDqJNirLNtzyhhsaq8qMTrLwXrCP31VxBiigFSQSUFnZyTE
 | 
			
		||||
9TKwhS4GlwbtCfxSKQ==
 | 
			
		||||
MIID5zCCAs+gAwIBAgIJALnu1NlVpZ6yMA0GCSqGSIb3DQEBBQUAMHAxCzAJBgNV
 | 
			
		||||
BAYTAlVLMRYwFAYDVQQKDA1PcGVuU1NMIEdyb3VwMSIwIAYDVQQLDBlGT1IgVEVT
 | 
			
		||||
VElORyBQVVJQT1NFUyBPTkxZMSUwIwYDVQQDDBxPcGVuU1NMIFRlc3QgSW50ZXJt
 | 
			
		||||
ZWRpYXRlIENBMB4XDTExMTIwODE0MDE0OFoXDTIxMTAxNjE0MDE0OFowZDELMAkG
 | 
			
		||||
A1UEBhMCVUsxFjAUBgNVBAoMDU9wZW5TU0wgR3JvdXAxIjAgBgNVBAsMGUZPUiBU
 | 
			
		||||
RVNUSU5HIFBVUlBPU0VTIE9OTFkxGTAXBgNVBAMMEFRlc3QgQ2xpZW50IENlcnQw
 | 
			
		||||
ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC0ranbHRLcLVqN+0BzcZpY
 | 
			
		||||
+yOLqxzDWT1LD9eW1stC4NzXX9/DCtSIVyN7YIHdGLrIPr64IDdXXaMRzgZ2rOKs
 | 
			
		||||
lmHCAiFpO/ja99gGCJRxH0xwQatqAULfJVHeUhs7OEGOZc2nWifjqKvGfNTilP7D
 | 
			
		||||
nwi69ipQFq9oS19FmhwVHk2wg7KZGHI1qDyG04UrfCZMRitvS9+UVhPpIPjuiBi2
 | 
			
		||||
x3/FZIpL5gXJvvFK6xHY63oq2asyzBATntBgnP4qJFWWcvRx24wF1PnZabxuVoL2
 | 
			
		||||
bPnQ/KvONDrw3IdqkKhYNTul7jEcu3OlcZIMw+7DiaKJLAzKb/bBF5gm/pwW6As9
 | 
			
		||||
AgMBAAGjgY8wgYwwDAYDVR0TAQH/BAIwADAOBgNVHQ8BAf8EBAMCBeAwLAYJYIZI
 | 
			
		||||
AYb4QgENBB8WHU9wZW5TU0wgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQW
 | 
			
		||||
BBSZHKyLoTh7Mb409Zn/mK1ceSDAjDAfBgNVHSMEGDAWgBQ2w2yI55X+sL3szj49
 | 
			
		||||
hqshgYfa2jANBgkqhkiG9w0BAQUFAAOCAQEAD0mL7PtPYgCEuDyOQSbLpeND5hVS
 | 
			
		||||
curxQdGnrJ6Acrhodb7E9ccATokeb0PLx6HBLQUicxhTZIQ9FbO43YkQcOU6C3BB
 | 
			
		||||
IlwskqmtN6+VmrQzNolHCDzvxNZs9lYL2VbGPGqVRyjZeHpoAlf9cQr8PgDb4d4b
 | 
			
		||||
vUx2KAhHQvV2nkmYvKyXcgnRuHggumF87mkxidriGAEFwH4qfOqetUg64WyxP7P2
 | 
			
		||||
QLipm04SyQa7ONtIApfVXgHcE42Py4/f4arzCzMjKe3VyhGkS7nsT55X/fWgTaRm
 | 
			
		||||
CQPkO+H94P958WTvQDt77bQ+D3IvYaVvfil8n6HJMOJfFT0LJuSUbpSXJg==
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
-----BEGIN RSA PRIVATE KEY-----
 | 
			
		||||
MIIBOwIBAAJBALtv55QyzG6i2PlwZ1pah7++Gv8L5j6Hnyr/uTZE1NLG0ABDDexm
 | 
			
		||||
q/R4KedLjFEIYjocDui+IXs62NNtXrT8odkCAwEAAQJAbwXq0vJ/+uyEvsNgxLko
 | 
			
		||||
/V86mGXQ/KrSkeKlL0r4ENxjcyeMAGoKu6J9yMY7+X9+Zm4nxShNfTsf/+Freoe1
 | 
			
		||||
HQIhAPOSm5Q1YI+KIsII2GeVJx1U69+wnd71OasIPakS1L1XAiEAxQAW+J3/JWE0
 | 
			
		||||
ftEYakbhUOKL8tD1OaFZS71/5GdG7E8CIQCefUMmySSvwd6kC0VlATSWbW+d+jp/
 | 
			
		||||
nWmM1KvqnAo5uQIhALqEADu5U1Wvt8UN8UDGBRPQulHWNycuNV45d3nnskWPAiAw
 | 
			
		||||
ueTyr6WsZ5+SD8g/Hy3xuvF3nPmJRH+rwvVihlcFOg==
 | 
			
		||||
MIIEpQIBAAKCAQEAtK2p2x0S3C1ajftAc3GaWPsji6scw1k9Sw/XltbLQuDc11/f
 | 
			
		||||
wwrUiFcje2CB3Ri6yD6+uCA3V12jEc4GdqzirJZhwgIhaTv42vfYBgiUcR9McEGr
 | 
			
		||||
agFC3yVR3lIbOzhBjmXNp1on46irxnzU4pT+w58IuvYqUBavaEtfRZocFR5NsIOy
 | 
			
		||||
mRhyNag8htOFK3wmTEYrb0vflFYT6SD47ogYtsd/xWSKS+YFyb7xSusR2Ot6Ktmr
 | 
			
		||||
MswQE57QYJz+KiRVlnL0cduMBdT52Wm8blaC9mz50PyrzjQ68NyHapCoWDU7pe4x
 | 
			
		||||
HLtzpXGSDMPuw4miiSwMym/2wReYJv6cFugLPQIDAQABAoIBAAZOyc9MhIwLSU4L
 | 
			
		||||
p4RgQvM4UVVe8/Id+3XTZ8NsXExJbWxXfIhiqGjaIfL8u4vsgRjcl+v1s/jo2/iT
 | 
			
		||||
KMab4o4D8gXD7UavQVDjtjb/ta79WL3SjRl2Uc9YjjMkyq6WmDNQeo2NKDdafCTB
 | 
			
		||||
1uzSJtLNipB8Z53ELPuHJhxX9QMHrMnuha49riQgXZ7buP9iQrHJFhImBjSzbxJx
 | 
			
		||||
L+TI6rkyLSf9Wi0Pd3L27Ob3QWNfNRYNSeTE+08eSRChkur5W0RuXAcuAICdQlCl
 | 
			
		||||
LBvWO/LmmvbzCqiDcgy/TliSb6CGGwgiNG7LJZmlkYNj8laGwalNlYZs3UrVv6NO
 | 
			
		||||
Br2loAECgYEA2kvCvPGj0Dg/6g7WhXDvAkEbcaL1tSeCxBbNH+6HS2UWMWvyTtCn
 | 
			
		||||
/bbD519QIdkvayy1QjEf32GV/UjUVmlULMLBcDy0DGjtL3+XpIhLKWDNxN1v1/ai
 | 
			
		||||
1oz23ZJCOgnk6K4qtFtlRS1XtynjA+rBetvYvLP9SKeFrnpzCgaA2r0CgYEA0+KX
 | 
			
		||||
1ACXDTNH5ySX3kMjSS9xdINf+OOw4CvPHFwbtc9aqk2HePlEsBTz5I/W3rKwXva3
 | 
			
		||||
NqZ/bRqVVeZB/hHKFywgdUQk2Uc5z/S7Lw70/w1HubNTXGU06Ngb6zOFAo/o/TwZ
 | 
			
		||||
zTP1BMIKSOB6PAZPS3l+aLO4FRIRotfFhgRHOoECgYEAmiZbqt8cJaJDB/5YYDzC
 | 
			
		||||
mp3tSk6gIb936Q6M5VqkMYp9pIKsxhk0N8aDCnTU+kIK6SzWBpr3/d9Ecmqmfyq7
 | 
			
		||||
5SvWO3KyVf0WWK9KH0abhOm2BKm2HBQvI0DB5u8sUx2/hsvOnjPYDISbZ11t0MtK
 | 
			
		||||
u35Zy89yMYcSsIYJjG/ROCUCgYEAgI2P9G5PNxEP5OtMwOsW84Y3Xat/hPAQFlI+
 | 
			
		||||
HES+AzbFGWJkeT8zL2nm95tVkFP1sggZ7Kxjz3w7cpx7GX0NkbWSE9O+T51pNASV
 | 
			
		||||
tN1sQ3p5M+/a+cnlqgfEGJVvc7iAcXQPa3LEi5h2yPR49QYXAgG6cifn3dDSpmwn
 | 
			
		||||
SUI7PQECgYEApGCIIpSRPLAEHTGmP87RBL1smurhwmy2s/pghkvUkWehtxg0sGHh
 | 
			
		||||
kuaqDWcskogv+QC0sVdytiLSz8G0DwcEcsHK1Fkyb8A+ayiw6jWJDo2m9+IF4Fww
 | 
			
		||||
1Te6jFPYDESnbhq7+TLGgHGhtwcu5cnb4vSuYXGXKupZGzoLOBbv1Zw=
 | 
			
		||||
-----END RSA PRIVATE KEY-----
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										41
									
								
								apps/cms.c
									
									
									
									
									
								
							
							
						
						
									
										41
									
								
								apps/cms.c
									
									
									
									
									
								
							@@ -136,6 +136,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	char *engine=NULL;
 | 
			
		||||
#endif
 | 
			
		||||
	unsigned char *secret_key = NULL, *secret_keyid = NULL;
 | 
			
		||||
	unsigned char *pwri_pass = NULL, *pwri_tmp = NULL;
 | 
			
		||||
	size_t secret_keylen = 0, secret_keyidlen = 0;
 | 
			
		||||
 | 
			
		||||
	ASN1_OBJECT *econtent_type = NULL;
 | 
			
		||||
@@ -232,6 +233,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		else if (!strcmp(*args,"-camellia256"))
 | 
			
		||||
				cipher = EVP_camellia_256_cbc();
 | 
			
		||||
#endif
 | 
			
		||||
		else if (!strcmp (*args, "-debug_decrypt")) 
 | 
			
		||||
				flags |= CMS_DEBUG_DECRYPT;
 | 
			
		||||
		else if (!strcmp (*args, "-text")) 
 | 
			
		||||
				flags |= CMS_TEXT;
 | 
			
		||||
		else if (!strcmp (*args, "-nointern")) 
 | 
			
		||||
@@ -326,6 +329,13 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
				}
 | 
			
		||||
			secret_keyidlen = (size_t)ltmp;
 | 
			
		||||
			}
 | 
			
		||||
		else if (!strcmp(*args,"-pwri_password"))
 | 
			
		||||
			{
 | 
			
		||||
			if (!args[1])
 | 
			
		||||
				goto argerr;
 | 
			
		||||
			args++;
 | 
			
		||||
			pwri_pass = (unsigned char *)*args;
 | 
			
		||||
			}
 | 
			
		||||
		else if (!strcmp(*args,"-econtent_type"))
 | 
			
		||||
			{
 | 
			
		||||
			if (!args[1])
 | 
			
		||||
@@ -559,7 +569,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
 | 
			
		||||
	else if (operation == SMIME_DECRYPT)
 | 
			
		||||
		{
 | 
			
		||||
		if (!recipfile && !keyfile && !secret_key)
 | 
			
		||||
		if (!recipfile && !keyfile && !secret_key && !pwri_pass)
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(bio_err, "No recipient certificate or key specified\n");
 | 
			
		||||
			badarg = 1;
 | 
			
		||||
@@ -567,7 +577,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		}
 | 
			
		||||
	else if (operation == SMIME_ENCRYPT)
 | 
			
		||||
		{
 | 
			
		||||
		if (!*args && !secret_key)
 | 
			
		||||
		if (!*args && !secret_key && !pwri_pass)
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(bio_err, "No recipient(s) certificate(s) specified\n");
 | 
			
		||||
			badarg = 1;
 | 
			
		||||
@@ -618,7 +628,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		BIO_printf (bio_err, "-certsout file certificate output file\n");
 | 
			
		||||
		BIO_printf (bio_err, "-signer file   signer certificate file\n");
 | 
			
		||||
		BIO_printf (bio_err, "-recip  file   recipient certificate file for decryption\n");
 | 
			
		||||
		BIO_printf (bio_err, "-keyid        use subject key identifier\n");
 | 
			
		||||
		BIO_printf (bio_err, "-keyid         use subject key identifier\n");
 | 
			
		||||
		BIO_printf (bio_err, "-in file       input file\n");
 | 
			
		||||
		BIO_printf (bio_err, "-inform arg    input format SMIME (default), PEM or DER\n");
 | 
			
		||||
		BIO_printf (bio_err, "-inkey file    input private key (if not signer or recipient)\n");
 | 
			
		||||
@@ -917,6 +927,17 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			secret_key = NULL;
 | 
			
		||||
			secret_keyid = NULL;
 | 
			
		||||
			}
 | 
			
		||||
		if (pwri_pass)
 | 
			
		||||
			{
 | 
			
		||||
			pwri_tmp = (unsigned char *)BUF_strdup((char *)pwri_pass);
 | 
			
		||||
			if (!pwri_tmp)
 | 
			
		||||
				goto end;
 | 
			
		||||
			if (!CMS_add0_recipient_password(cms,
 | 
			
		||||
						-1, NID_undef, NID_undef,
 | 
			
		||||
						 pwri_tmp, -1, NULL))
 | 
			
		||||
				goto end;
 | 
			
		||||
			pwri_tmp = NULL;
 | 
			
		||||
			}
 | 
			
		||||
		if (!(flags & CMS_STREAM))
 | 
			
		||||
			{
 | 
			
		||||
			if (!CMS_final(cms, in, NULL, flags))
 | 
			
		||||
@@ -1020,6 +1041,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	ret = 4;
 | 
			
		||||
	if (operation == SMIME_DECRYPT)
 | 
			
		||||
		{
 | 
			
		||||
		if (flags & CMS_DEBUG_DECRYPT)
 | 
			
		||||
			CMS_decrypt(cms, NULL, NULL, NULL, NULL, flags);
 | 
			
		||||
 | 
			
		||||
		if (secret_key)
 | 
			
		||||
			{
 | 
			
		||||
@@ -1043,6 +1066,16 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
		if (pwri_pass)
 | 
			
		||||
			{
 | 
			
		||||
			if (!CMS_decrypt_set1_password(cms, pwri_pass, -1))
 | 
			
		||||
				{
 | 
			
		||||
				BIO_puts(bio_err,
 | 
			
		||||
					"Error decrypting CMS using password\n");
 | 
			
		||||
				goto end;
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
		if (!CMS_decrypt(cms, NULL, NULL, indata, out, flags))
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(bio_err, "Error decrypting CMS structure\n");
 | 
			
		||||
@@ -1167,6 +1200,8 @@ end:
 | 
			
		||||
		OPENSSL_free(secret_key);
 | 
			
		||||
	if (secret_keyid)
 | 
			
		||||
		OPENSSL_free(secret_keyid);
 | 
			
		||||
	if (pwri_tmp)
 | 
			
		||||
		OPENSSL_free(pwri_tmp);
 | 
			
		||||
	if (econtent_type)
 | 
			
		||||
		ASN1_OBJECT_free(econtent_type);
 | 
			
		||||
	if (rr)
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										18
									
								
								apps/crl.c
									
									
									
									
									
								
							
							
						
						
									
										18
									
								
								apps/crl.c
									
									
									
									
									
								
							@@ -81,6 +81,9 @@ static const char *crl_usage[]={
 | 
			
		||||
" -in arg         - input file - default stdin\n",
 | 
			
		||||
" -out arg        - output file - default stdout\n",
 | 
			
		||||
" -hash           - print hash value\n",
 | 
			
		||||
#ifndef OPENSSL_NO_MD5
 | 
			
		||||
" -hash_old       - print old-style (MD5) hash value\n",
 | 
			
		||||
#endif
 | 
			
		||||
" -fingerprint    - print the crl fingerprint\n",
 | 
			
		||||
" -issuer         - print issuer DN\n",
 | 
			
		||||
" -lastupdate     - lastUpdate field\n",
 | 
			
		||||
@@ -108,6 +111,9 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	int informat,outformat;
 | 
			
		||||
	char *infile=NULL,*outfile=NULL;
 | 
			
		||||
	int hash=0,issuer=0,lastupdate=0,nextupdate=0,noout=0,text=0;
 | 
			
		||||
#ifndef OPENSSL_NO_MD5
 | 
			
		||||
       int hash_old=0;
 | 
			
		||||
#endif
 | 
			
		||||
	int fingerprint = 0, crlnumber = 0;
 | 
			
		||||
	const char **pp;
 | 
			
		||||
	X509_STORE *store = NULL;
 | 
			
		||||
@@ -192,6 +198,10 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			text = 1;
 | 
			
		||||
		else if (strcmp(*argv,"-hash") == 0)
 | 
			
		||||
			hash= ++num;
 | 
			
		||||
#ifndef OPENSSL_NO_MD5
 | 
			
		||||
		else if (strcmp(*argv,"-hash_old") == 0)
 | 
			
		||||
			hash_old= ++num;
 | 
			
		||||
#endif
 | 
			
		||||
		else if (strcmp(*argv,"-nameopt") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
@@ -304,6 +314,14 @@ bad:
 | 
			
		||||
				BIO_printf(bio_out,"%08lx\n",
 | 
			
		||||
					X509_NAME_hash(X509_CRL_get_issuer(x)));
 | 
			
		||||
				}
 | 
			
		||||
#ifndef OPENSSL_NO_MD5
 | 
			
		||||
			if (hash_old == i)
 | 
			
		||||
				{
 | 
			
		||||
				BIO_printf(bio_out,"%08lx\n",
 | 
			
		||||
					X509_NAME_hash_old(
 | 
			
		||||
						X509_CRL_get_issuer(x)));
 | 
			
		||||
				}
 | 
			
		||||
#endif
 | 
			
		||||
			if (lastupdate == i)
 | 
			
		||||
				{
 | 
			
		||||
				BIO_printf(bio_out,"lastUpdate=");
 | 
			
		||||
 
 | 
			
		||||
@@ -75,7 +75,8 @@ static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile);
 | 
			
		||||
#undef PROG
 | 
			
		||||
#define PROG	crl2pkcs7_main
 | 
			
		||||
 | 
			
		||||
/* -inform arg	- input format - default PEM (DER or PEM)
 | 
			
		||||
/*-
 | 
			
		||||
 * -inform arg	- input format - default PEM (DER or PEM)
 | 
			
		||||
 * -outform arg - output format - default PEM
 | 
			
		||||
 * -in arg	- input file - default stdin
 | 
			
		||||
 * -out arg	- output file - default stdout
 | 
			
		||||
@@ -141,7 +142,13 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			if(!certflst) certflst = sk_OPENSSL_STRING_new_null();
 | 
			
		||||
			sk_OPENSSL_STRING_push(certflst,*(++argv));
 | 
			
		||||
			if (!certflst)
 | 
			
		||||
				goto end;
 | 
			
		||||
			if (!sk_OPENSSL_STRING_push(certflst,*(++argv)))
 | 
			
		||||
				{
 | 
			
		||||
				sk_OPENSSL_STRING_free(certflst);
 | 
			
		||||
				goto end;
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
		else
 | 
			
		||||
			{
 | 
			
		||||
@@ -282,7 +289,7 @@ end:
 | 
			
		||||
	OPENSSL_EXIT(ret);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
/*
 | 
			
		||||
/*-
 | 
			
		||||
 *----------------------------------------------------------------------
 | 
			
		||||
 * int add_certs_from_file
 | 
			
		||||
 *
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										6
									
								
								apps/demoSRP/srp_verifier.txt
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										6
									
								
								apps/demoSRP/srp_verifier.txt
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,6 @@
 | 
			
		||||
# This is a file that will be filled by the openssl srp routine.
 | 
			
		||||
# You can initialize the file with additional groups, these are
 | 
			
		||||
# records starting with a I followed by the g and N values and the id.
 | 
			
		||||
# The exact values ... you have to dig this out from the source of srp.c
 | 
			
		||||
# or srp_vfy.c
 | 
			
		||||
# The last value of an I is used as the default group for new users.  
 | 
			
		||||
							
								
								
									
										1
									
								
								apps/demoSRP/srp_verifier.txt.attr
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										1
									
								
								apps/demoSRP/srp_verifier.txt.attr
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1 @@
 | 
			
		||||
unique_subject = yes
 | 
			
		||||
							
								
								
									
										18
									
								
								apps/dgst.c
									
									
									
									
									
								
							
							
						
						
									
										18
									
								
								apps/dgst.c
									
									
									
									
									
								
							@@ -127,6 +127,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
#endif
 | 
			
		||||
	char *hmac_key=NULL;
 | 
			
		||||
	char *mac_name=NULL;
 | 
			
		||||
	int non_fips_allow = 0;
 | 
			
		||||
	STACK_OF(OPENSSL_STRING) *sigopts = NULL, *macopts = NULL;
 | 
			
		||||
 | 
			
		||||
	apps_startup();
 | 
			
		||||
@@ -215,6 +216,10 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			out_bin = 1;
 | 
			
		||||
		else if (strcmp(*argv,"-d") == 0)
 | 
			
		||||
			debug=1;
 | 
			
		||||
		else if (!strcmp(*argv,"-fips-fingerprint"))
 | 
			
		||||
			hmac_key = "etaonrishdlcupfm";
 | 
			
		||||
		else if (strcmp(*argv,"-non-fips-allow") == 0)
 | 
			
		||||
			non_fips_allow=1;
 | 
			
		||||
		else if (!strcmp(*argv,"-hmac"))
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1)
 | 
			
		||||
@@ -268,6 +273,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		BIO_printf(bio_err,"-d              to output debug info\n");
 | 
			
		||||
		BIO_printf(bio_err,"-hex            output as hex dump\n");
 | 
			
		||||
		BIO_printf(bio_err,"-binary         output in binary form\n");
 | 
			
		||||
		BIO_printf(bio_err,"-hmac arg       set the HMAC key to arg\n");
 | 
			
		||||
		BIO_printf(bio_err,"-non-fips-allow allow use of non FIPS digest\n");
 | 
			
		||||
		BIO_printf(bio_err,"-sign   file    sign digest using private key in file\n");
 | 
			
		||||
		BIO_printf(bio_err,"-verify file    verify a signature using public key in file\n");
 | 
			
		||||
		BIO_printf(bio_err,"-prverify file  verify a signature using private key in file\n");
 | 
			
		||||
@@ -395,6 +402,13 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			goto end;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	if (non_fips_allow)
 | 
			
		||||
		{
 | 
			
		||||
		EVP_MD_CTX *md_ctx;
 | 
			
		||||
		BIO_get_md_ctx(bmd,&md_ctx);
 | 
			
		||||
		EVP_MD_CTX_set_flags(md_ctx, EVP_MD_CTX_FLAG_NON_FIPS_ALLOW);
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	if (hmac_key)
 | 
			
		||||
		{
 | 
			
		||||
		sigkey = EVP_PKEY_new_mac_key(EVP_PKEY_HMAC, e,
 | 
			
		||||
@@ -415,9 +429,9 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			goto end;
 | 
			
		||||
			}
 | 
			
		||||
		if (do_verify)
 | 
			
		||||
			r = EVP_DigestVerifyInit(mctx, &pctx, md, e, sigkey);
 | 
			
		||||
			r = EVP_DigestVerifyInit(mctx, &pctx, md, NULL, sigkey);
 | 
			
		||||
		else
 | 
			
		||||
			r = EVP_DigestSignInit(mctx, &pctx, md, e, sigkey);
 | 
			
		||||
			r = EVP_DigestSignInit(mctx, &pctx, md, NULL, sigkey);
 | 
			
		||||
		if (!r)
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(bio_err, "Error setting context\n");
 | 
			
		||||
 
 | 
			
		||||
@@ -74,7 +74,8 @@
 | 
			
		||||
#undef PROG
 | 
			
		||||
#define PROG	dh_main
 | 
			
		||||
 | 
			
		||||
/* -inform arg	- input format - default PEM (DER or PEM)
 | 
			
		||||
/*-
 | 
			
		||||
 * -inform arg	- input format - default PEM (DER or PEM)
 | 
			
		||||
 * -outform arg - output format - default PEM
 | 
			
		||||
 * -in arg	- input file - default stdin
 | 
			
		||||
 * -out arg	- output file - default stdout
 | 
			
		||||
 
 | 
			
		||||
@@ -132,7 +132,8 @@
 | 
			
		||||
 | 
			
		||||
#define DEFBITS	512
 | 
			
		||||
 | 
			
		||||
/* -inform arg	- input format - default PEM (DER or PEM)
 | 
			
		||||
/*-
 | 
			
		||||
 * -inform arg	- input format - default PEM (DER or PEM)
 | 
			
		||||
 * -outform arg - output format - default PEM
 | 
			
		||||
 * -in arg	- input file - default stdin
 | 
			
		||||
 * -out arg	- output file - default stdout
 | 
			
		||||
@@ -332,7 +333,6 @@ bad:
 | 
			
		||||
			BIO_printf(bio_err,"This is going to take a long time\n");
 | 
			
		||||
			if(!dh || !DH_generate_parameters_ex(dh, num, g, &cb))
 | 
			
		||||
				{
 | 
			
		||||
				if(dh) DH_free(dh);
 | 
			
		||||
				ERR_print_errors(bio_err);
 | 
			
		||||
				goto end;
 | 
			
		||||
				}
 | 
			
		||||
 
 | 
			
		||||
@@ -74,7 +74,8 @@
 | 
			
		||||
#undef PROG
 | 
			
		||||
#define PROG	dsa_main
 | 
			
		||||
 | 
			
		||||
/* -inform arg	- input format - default PEM (one of DER, NET or PEM)
 | 
			
		||||
/*-
 | 
			
		||||
 * -inform arg	- input format - default PEM (one of DER, NET or PEM)
 | 
			
		||||
 * -outform arg - output format - default PEM
 | 
			
		||||
 * -in arg	- input file - default stdin
 | 
			
		||||
 * -out arg	- output file - default stdout
 | 
			
		||||
 
 | 
			
		||||
@@ -80,7 +80,8 @@
 | 
			
		||||
#undef PROG
 | 
			
		||||
#define PROG	dsaparam_main
 | 
			
		||||
 | 
			
		||||
/* -inform arg	- input format - default PEM (DER or PEM)
 | 
			
		||||
/*-
 | 
			
		||||
 * -inform arg	- input format - default PEM (DER or PEM)
 | 
			
		||||
 * -outform arg - output format - default PEM
 | 
			
		||||
 * -in arg	- input file - default stdin
 | 
			
		||||
 * -out arg	- output file - default stdout
 | 
			
		||||
@@ -326,6 +327,7 @@ bad:
 | 
			
		||||
				goto end;
 | 
			
		||||
				}
 | 
			
		||||
#endif
 | 
			
		||||
			ERR_print_errors(bio_err);
 | 
			
		||||
			BIO_printf(bio_err,"Error, DSA key generation failed\n");
 | 
			
		||||
			goto end;
 | 
			
		||||
			}
 | 
			
		||||
@@ -429,13 +431,19 @@ bad:
 | 
			
		||||
 | 
			
		||||
		assert(need_rand);
 | 
			
		||||
		if ((dsakey=DSAparams_dup(dsa)) == NULL) goto end;
 | 
			
		||||
		if (!DSA_generate_key(dsakey)) goto end;
 | 
			
		||||
		if (!DSA_generate_key(dsakey))
 | 
			
		||||
			{
 | 
			
		||||
			ERR_print_errors(bio_err);
 | 
			
		||||
			DSA_free(dsakey);
 | 
			
		||||
			goto end;
 | 
			
		||||
			}
 | 
			
		||||
		if 	(outformat == FORMAT_ASN1)
 | 
			
		||||
			i=i2d_DSAPrivateKey_bio(out,dsakey);
 | 
			
		||||
		else if (outformat == FORMAT_PEM)
 | 
			
		||||
			i=PEM_write_bio_DSAPrivateKey(out,dsakey,NULL,NULL,0,NULL,NULL);
 | 
			
		||||
		else	{
 | 
			
		||||
			BIO_printf(bio_err,"bad output format specified for outfile\n");
 | 
			
		||||
			DSA_free(dsakey);
 | 
			
		||||
			goto end;
 | 
			
		||||
			}
 | 
			
		||||
		DSA_free(dsakey);
 | 
			
		||||
 
 | 
			
		||||
@@ -70,7 +70,8 @@
 | 
			
		||||
#undef PROG
 | 
			
		||||
#define PROG	ec_main
 | 
			
		||||
 | 
			
		||||
/* -inform arg    - input format - default PEM (one of DER, NET or PEM)
 | 
			
		||||
/*-
 | 
			
		||||
 * -inform arg    - input format - default PEM (one of DER, NET or PEM)
 | 
			
		||||
 * -outform arg   - output format - default PEM
 | 
			
		||||
 * -in arg        - input file - default stdin
 | 
			
		||||
 * -out arg       - output file - default stdout
 | 
			
		||||
 
 | 
			
		||||
@@ -87,7 +87,8 @@
 | 
			
		||||
#undef PROG
 | 
			
		||||
#define PROG	ecparam_main
 | 
			
		||||
 | 
			
		||||
/* -inform arg      - input format - default PEM (DER or PEM)
 | 
			
		||||
/*-
 | 
			
		||||
 * -inform arg      - input format - default PEM (DER or PEM)
 | 
			
		||||
 * -outform arg     - output format - default PEM
 | 
			
		||||
 * -in  arg         - input file  - default stdin
 | 
			
		||||
 * -out arg         - output file - default stdout
 | 
			
		||||
@@ -105,7 +106,7 @@
 | 
			
		||||
 *                    in the asn1 der encoding
 | 
			
		||||
 *                    possible values: named_curve (default)
 | 
			
		||||
 *                                     explicit
 | 
			
		||||
 * -no_seed         - if 'explicit' parameters are choosen do not use the seed
 | 
			
		||||
 * -no_seed         - if 'explicit' parameters are chosen do not use the seed
 | 
			
		||||
 * -genkey          - generate ec key
 | 
			
		||||
 * -rand file       - files to use for random number input
 | 
			
		||||
 * -engine e        - use engine e, possibly a hardware device
 | 
			
		||||
@@ -286,7 +287,7 @@ bad:
 | 
			
		||||
		BIO_printf(bio_err, "                                   "
 | 
			
		||||
				" explicit\n");
 | 
			
		||||
		BIO_printf(bio_err, " -no_seed          if 'explicit'"
 | 
			
		||||
				" parameters are choosen do not"
 | 
			
		||||
				" parameters are chosen do not"
 | 
			
		||||
				" use the seed\n");
 | 
			
		||||
		BIO_printf(bio_err, " -genkey           generate ec"
 | 
			
		||||
				" key\n");
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										22
									
								
								apps/enc.c
									
									
									
									
									
								
							
							
						
						
									
										22
									
								
								apps/enc.c
									
									
									
									
									
								
							@@ -67,7 +67,9 @@
 | 
			
		||||
#include <openssl/x509.h>
 | 
			
		||||
#include <openssl/rand.h>
 | 
			
		||||
#include <openssl/pem.h>
 | 
			
		||||
#ifndef OPENSSL_NO_COMP
 | 
			
		||||
#include <openssl/comp.h>
 | 
			
		||||
#endif
 | 
			
		||||
#include <ctype.h>
 | 
			
		||||
 | 
			
		||||
int set_hex(char *in,unsigned char *out,int size);
 | 
			
		||||
@@ -129,6 +131,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	char *engine = NULL;
 | 
			
		||||
#endif
 | 
			
		||||
	const EVP_MD *dgst=NULL;
 | 
			
		||||
	int non_fips_allow = 0;
 | 
			
		||||
 | 
			
		||||
	apps_startup();
 | 
			
		||||
 | 
			
		||||
@@ -281,6 +284,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			md= *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
		else if (strcmp(*argv,"-non-fips-allow") == 0)
 | 
			
		||||
			non_fips_allow = 1;
 | 
			
		||||
		else if	((argv[0][0] == '-') &&
 | 
			
		||||
			((c=EVP_get_cipherbyname(&(argv[0][1]))) != NULL))
 | 
			
		||||
			{
 | 
			
		||||
@@ -328,6 +333,18 @@ bad:
 | 
			
		||||
        setup_engine(bio_err, engine, 0);
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	if (cipher && EVP_CIPHER_flags(cipher) & EVP_CIPH_FLAG_AEAD_CIPHER)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf(bio_err, "AEAD ciphers not supported by the enc utility\n");
 | 
			
		||||
		goto end;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	if (cipher && (EVP_CIPHER_mode(cipher) == EVP_CIPH_XTS_MODE))
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf(bio_err, "Ciphers in XTS mode are not supported by the enc utility\n");
 | 
			
		||||
		goto end;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	if (md && (dgst=EVP_get_digestbyname(md)) == NULL)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf(bio_err,"%s is an unsupported message digest type\n",md);
 | 
			
		||||
@@ -589,6 +606,11 @@ bad:
 | 
			
		||||
		 */
 | 
			
		||||
 | 
			
		||||
		BIO_get_cipher_ctx(benc, &ctx);
 | 
			
		||||
 | 
			
		||||
		if (non_fips_allow)
 | 
			
		||||
			EVP_CIPHER_CTX_set_flags(ctx,
 | 
			
		||||
				EVP_CIPH_FLAG_NON_FIPS_ALLOW);
 | 
			
		||||
 | 
			
		||||
		if (!EVP_CipherInit_ex(ctx, cipher, NULL, NULL, NULL, enc))
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(bio_err, "Error setting cipher %s\n",
 | 
			
		||||
 
 | 
			
		||||
@@ -121,7 +121,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			}
 | 
			
		||||
		else if (strcmp(*argv,"-2") == 0)
 | 
			
		||||
			g=2;
 | 
			
		||||
	/*	else if (strcmp(*argv,"-3") == 0)
 | 
			
		||||
	/*-	else if (strcmp(*argv,"-3") == 0)
 | 
			
		||||
			g=3; */
 | 
			
		||||
		else if (strcmp(*argv,"-5") == 0)
 | 
			
		||||
			g=5;
 | 
			
		||||
 
 | 
			
		||||
@@ -78,7 +78,7 @@
 | 
			
		||||
#include <openssl/pem.h>
 | 
			
		||||
#include <openssl/rand.h>
 | 
			
		||||
 | 
			
		||||
#define DEFBITS	512
 | 
			
		||||
#define DEFBITS	1024
 | 
			
		||||
#undef PROG
 | 
			
		||||
#define PROG genrsa_main
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -184,7 +184,7 @@ $ LIB_OPENSSL = "VERIFY,ASN1PARS,REQ,DGST,DH,DHPARAM,ENC,PASSWD,GENDH,ERRSTR,"+-
 | 
			
		||||
	      	"X509,GENRSA,GENDSA,GENPKEY,S_SERVER,S_CLIENT,SPEED,"+-
 | 
			
		||||
	      	"S_TIME,APPS,S_CB,S_SOCKET,APP_RAND,VERSION,SESS_ID,"+-
 | 
			
		||||
	      	"CIPHERS,NSEQ,PKCS12,PKCS8,PKEY,PKEYPARAM,PKEYUTL,"+ -
 | 
			
		||||
	      	"SPKAC,SMIME,CMS,RAND,ENGINE,OCSP,PRIME,TS"
 | 
			
		||||
	      	"SPKAC,SMIME,CMS,RAND,ENGINE,OCSP,PRIME,TS,SRP"
 | 
			
		||||
$!
 | 
			
		||||
$ LIB_OPENSSL = LIB_OPENSSL+ ",VMS_DECC_INIT"
 | 
			
		||||
$!
 | 
			
		||||
@@ -773,9 +773,12 @@ $ CCDEFS = "MONOLITH"
 | 
			
		||||
$ IF F$TYPE(USER_CCDEFS) .NES. "" THEN CCDEFS = CCDEFS + "," + USER_CCDEFS
 | 
			
		||||
$ CCEXTRAFLAGS = ""
 | 
			
		||||
$ IF F$TYPE(USER_CCFLAGS) .NES. "" THEN CCEXTRAFLAGS = USER_CCFLAGS
 | 
			
		||||
$ CCDISABLEWARNINGS = "" !!! "LONGLONGTYPE,LONGLONGSUFX,FOUNDCR"
 | 
			
		||||
$ IF F$TYPE(USER_CCDISABLEWARNINGS) .NES. "" THEN -
 | 
			
		||||
	CCDISABLEWARNINGS = CCDISABLEWARNINGS + "," + USER_CCDISABLEWARNINGS
 | 
			
		||||
$ CCDISABLEWARNINGS = "" !!! "MAYLOSEDATA3" !!! "LONGLONGTYPE,LONGLONGSUFX,FOUNDCR"
 | 
			
		||||
$ IF F$TYPE(USER_CCDISABLEWARNINGS) .NES. ""
 | 
			
		||||
$ THEN
 | 
			
		||||
$     IF CCDISABLEWARNINGS .NES. "" THEN CCDISABLEWARNINGS = CCDISABLEWARNINGS + ","
 | 
			
		||||
$     CCDISABLEWARNINGS = CCDISABLEWARNINGS + USER_CCDISABLEWARNINGS
 | 
			
		||||
$ ENDIF
 | 
			
		||||
$!
 | 
			
		||||
$! Check To See If We Have A ZLIB Option.
 | 
			
		||||
$!
 | 
			
		||||
@@ -1064,6 +1067,18 @@ $! Finish up the definition of CC.
 | 
			
		||||
$!
 | 
			
		||||
$ IF COMPILER .EQS. "DECC"
 | 
			
		||||
$ THEN
 | 
			
		||||
$!  Not all compiler versions support MAYLOSEDATA3.
 | 
			
		||||
$   OPT_TEST = "MAYLOSEDATA3"
 | 
			
		||||
$   DEFINE /USER_MODE SYS$ERROR NL:
 | 
			
		||||
$   DEFINE /USER_MODE SYS$OUTPUT NL:
 | 
			
		||||
$   'CC' /NOCROSS_REFERENCE /NOLIST /NOOBJECT -
 | 
			
		||||
      /WARNINGS = DISABLE = ('OPT_TEST', EMPTYFILE) NL:
 | 
			
		||||
$   IF ($SEVERITY)
 | 
			
		||||
$   THEN
 | 
			
		||||
$     IF CCDISABLEWARNINGS .NES. "" THEN -
 | 
			
		||||
        CCDISABLEWARNINGS = CCDISABLEWARNINGS+ ","
 | 
			
		||||
$     CCDISABLEWARNINGS = CCDISABLEWARNINGS+ OPT_TEST
 | 
			
		||||
$   ENDIF
 | 
			
		||||
$   IF CCDISABLEWARNINGS .NES. ""
 | 
			
		||||
$   THEN
 | 
			
		||||
$     CCDISABLEWARNINGS = " /WARNING=(DISABLE=(" + CCDISABLEWARNINGS + "))"
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										122
									
								
								apps/ocsp.c
									
									
									
									
									
								
							
							
						
						
									
										122
									
								
								apps/ocsp.c
									
									
									
									
									
								
							@@ -127,6 +127,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	ENGINE *e = NULL;
 | 
			
		||||
	char **args;
 | 
			
		||||
	char *host = NULL, *port = NULL, *path = "/";
 | 
			
		||||
	char *thost = NULL, *tport = NULL, *tpath = NULL;
 | 
			
		||||
	char *reqin = NULL, *respin = NULL;
 | 
			
		||||
	char *reqout = NULL, *respout = NULL;
 | 
			
		||||
	char *signfile = NULL, *keyfile = NULL;
 | 
			
		||||
@@ -204,6 +205,12 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			}
 | 
			
		||||
		else if (!strcmp(*args, "-url"))
 | 
			
		||||
			{
 | 
			
		||||
			if (thost)
 | 
			
		||||
				OPENSSL_free(thost);
 | 
			
		||||
			if (tport)
 | 
			
		||||
				OPENSSL_free(tport);
 | 
			
		||||
			if (tpath)
 | 
			
		||||
				OPENSSL_free(tpath);
 | 
			
		||||
			if (args[1])
 | 
			
		||||
				{
 | 
			
		||||
				args++;
 | 
			
		||||
@@ -212,6 +219,9 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
					BIO_printf(bio_err, "Error parsing URL\n");
 | 
			
		||||
					badarg = 1;
 | 
			
		||||
					}
 | 
			
		||||
				thost = host;
 | 
			
		||||
				tport = port;
 | 
			
		||||
				tpath = path;
 | 
			
		||||
				}
 | 
			
		||||
			else badarg = 1;
 | 
			
		||||
			}
 | 
			
		||||
@@ -573,51 +583,52 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		BIO_printf (bio_err, "OCSP utility\n");
 | 
			
		||||
		BIO_printf (bio_err, "Usage ocsp [options]\n");
 | 
			
		||||
		BIO_printf (bio_err, "where options are\n");
 | 
			
		||||
		BIO_printf (bio_err, "-out file          output filename\n");
 | 
			
		||||
		BIO_printf (bio_err, "-issuer file       issuer certificate\n");
 | 
			
		||||
		BIO_printf (bio_err, "-cert file         certificate to check\n");
 | 
			
		||||
		BIO_printf (bio_err, "-serial n          serial number to check\n");
 | 
			
		||||
		BIO_printf (bio_err, "-signer file       certificate to sign OCSP request with\n");
 | 
			
		||||
		BIO_printf (bio_err, "-signkey file      private key to sign OCSP request with\n");
 | 
			
		||||
		BIO_printf (bio_err, "-sign_other file   additional certificates to include in signed request\n");
 | 
			
		||||
		BIO_printf (bio_err, "-no_certs          don't include any certificates in signed request\n");
 | 
			
		||||
		BIO_printf (bio_err, "-req_text          print text form of request\n");
 | 
			
		||||
		BIO_printf (bio_err, "-resp_text         print text form of response\n");
 | 
			
		||||
		BIO_printf (bio_err, "-text              print text form of request and response\n");
 | 
			
		||||
		BIO_printf (bio_err, "-reqout file       write DER encoded OCSP request to \"file\"\n");
 | 
			
		||||
		BIO_printf (bio_err, "-respout file      write DER encoded OCSP reponse to \"file\"\n");
 | 
			
		||||
		BIO_printf (bio_err, "-reqin file        read DER encoded OCSP request from \"file\"\n");
 | 
			
		||||
		BIO_printf (bio_err, "-respin file       read DER encoded OCSP reponse from \"file\"\n");
 | 
			
		||||
		BIO_printf (bio_err, "-nonce             add OCSP nonce to request\n");
 | 
			
		||||
		BIO_printf (bio_err, "-no_nonce          don't add OCSP nonce to request\n");
 | 
			
		||||
		BIO_printf (bio_err, "-url URL           OCSP responder URL\n");
 | 
			
		||||
		BIO_printf (bio_err, "-host host:n       send OCSP request to host on port n\n");
 | 
			
		||||
		BIO_printf (bio_err, "-path              path to use in OCSP request\n");
 | 
			
		||||
		BIO_printf (bio_err, "-CApath dir        trusted certificates directory\n");
 | 
			
		||||
		BIO_printf (bio_err, "-CAfile file       trusted certificates file\n");
 | 
			
		||||
		BIO_printf (bio_err, "-VAfile file       validator certificates file\n");
 | 
			
		||||
		BIO_printf (bio_err, "-validity_period n maximum validity discrepancy in seconds\n");
 | 
			
		||||
		BIO_printf (bio_err, "-status_age n      maximum status age in seconds\n");
 | 
			
		||||
		BIO_printf (bio_err, "-noverify          don't verify response at all\n");
 | 
			
		||||
		BIO_printf (bio_err, "-verify_other file additional certificates to search for signer\n");
 | 
			
		||||
		BIO_printf (bio_err, "-trust_other       don't verify additional certificates\n");
 | 
			
		||||
		BIO_printf (bio_err, "-no_intern         don't search certificates contained in response for signer\n");
 | 
			
		||||
		BIO_printf (bio_err, "-out file            output filename\n");
 | 
			
		||||
		BIO_printf (bio_err, "-issuer file         issuer certificate\n");
 | 
			
		||||
		BIO_printf (bio_err, "-cert file           certificate to check\n");
 | 
			
		||||
		BIO_printf (bio_err, "-serial n            serial number to check\n");
 | 
			
		||||
		BIO_printf (bio_err, "-signer file         certificate to sign OCSP request with\n");
 | 
			
		||||
		BIO_printf (bio_err, "-signkey file        private key to sign OCSP request with\n");
 | 
			
		||||
		BIO_printf (bio_err, "-sign_other file     additional certificates to include in signed request\n");
 | 
			
		||||
		BIO_printf (bio_err, "-no_certs            don't include any certificates in signed request\n");
 | 
			
		||||
		BIO_printf (bio_err, "-req_text            print text form of request\n");
 | 
			
		||||
		BIO_printf (bio_err, "-resp_text           print text form of response\n");
 | 
			
		||||
		BIO_printf (bio_err, "-text                print text form of request and response\n");
 | 
			
		||||
		BIO_printf (bio_err, "-reqout file         write DER encoded OCSP request to \"file\"\n");
 | 
			
		||||
		BIO_printf (bio_err, "-respout file        write DER encoded OCSP reponse to \"file\"\n");
 | 
			
		||||
		BIO_printf (bio_err, "-reqin file          read DER encoded OCSP request from \"file\"\n");
 | 
			
		||||
		BIO_printf (bio_err, "-respin file         read DER encoded OCSP reponse from \"file\"\n");
 | 
			
		||||
		BIO_printf (bio_err, "-nonce               add OCSP nonce to request\n");
 | 
			
		||||
		BIO_printf (bio_err, "-no_nonce            don't add OCSP nonce to request\n");
 | 
			
		||||
		BIO_printf (bio_err, "-url URL             OCSP responder URL\n");
 | 
			
		||||
		BIO_printf (bio_err, "-host host:n         send OCSP request to host on port n\n");
 | 
			
		||||
		BIO_printf (bio_err, "-path                path to use in OCSP request\n");
 | 
			
		||||
		BIO_printf (bio_err, "-CApath dir          trusted certificates directory\n");
 | 
			
		||||
		BIO_printf (bio_err, "-CAfile file         trusted certificates file\n");
 | 
			
		||||
		BIO_printf (bio_err, "-VAfile file         validator certificates file\n");
 | 
			
		||||
		BIO_printf (bio_err, "-validity_period n   maximum validity discrepancy in seconds\n");
 | 
			
		||||
		BIO_printf (bio_err, "-status_age n        maximum status age in seconds\n");
 | 
			
		||||
		BIO_printf (bio_err, "-noverify            don't verify response at all\n");
 | 
			
		||||
		BIO_printf (bio_err, "-verify_other file   additional certificates to search for signer\n");
 | 
			
		||||
		BIO_printf (bio_err, "-trust_other         don't verify additional certificates\n");
 | 
			
		||||
		BIO_printf (bio_err, "-no_intern           don't search certificates contained in response for signer\n");
 | 
			
		||||
		BIO_printf (bio_err, "-no_signature_verify don't check signature on response\n");
 | 
			
		||||
		BIO_printf (bio_err, "-no_cert_verify    don't check signing certificate\n");
 | 
			
		||||
		BIO_printf (bio_err, "-no_chain          don't chain verify response\n");
 | 
			
		||||
		BIO_printf (bio_err, "-no_cert_checks    don't do additional checks on signing certificate\n");
 | 
			
		||||
		BIO_printf (bio_err, "-port num		 port to run responder on\n");
 | 
			
		||||
		BIO_printf (bio_err, "-index file	 certificate status index file\n");
 | 
			
		||||
		BIO_printf (bio_err, "-CA file		 CA certificate\n");
 | 
			
		||||
		BIO_printf (bio_err, "-rsigner file	 responder certificate to sign responses with\n");
 | 
			
		||||
		BIO_printf (bio_err, "-rkey file	 responder key to sign responses with\n");
 | 
			
		||||
		BIO_printf (bio_err, "-rother file	 other certificates to include in response\n");
 | 
			
		||||
		BIO_printf (bio_err, "-resp_no_certs     don't include any certificates in response\n");
 | 
			
		||||
		BIO_printf (bio_err, "-nmin n	 	 number of minutes before next update\n");
 | 
			
		||||
		BIO_printf (bio_err, "-ndays n	 	 number of days before next update\n");
 | 
			
		||||
		BIO_printf (bio_err, "-resp_key_id       identify reponse by signing certificate key ID\n");
 | 
			
		||||
		BIO_printf (bio_err, "-nrequest n        number of requests to accept (default unlimited)\n");
 | 
			
		||||
		BIO_printf (bio_err, "-<dgst alg>     use specified digest in the request");
 | 
			
		||||
		BIO_printf (bio_err, "-no_cert_verify      don't check signing certificate\n");
 | 
			
		||||
		BIO_printf (bio_err, "-no_chain            don't chain verify response\n");
 | 
			
		||||
		BIO_printf (bio_err, "-no_cert_checks      don't do additional checks on signing certificate\n");
 | 
			
		||||
		BIO_printf (bio_err, "-port num            port to run responder on\n");
 | 
			
		||||
		BIO_printf (bio_err, "-index file          certificate status index file\n");
 | 
			
		||||
		BIO_printf (bio_err, "-CA file             CA certificate\n");
 | 
			
		||||
		BIO_printf (bio_err, "-rsigner file        responder certificate to sign responses with\n");
 | 
			
		||||
		BIO_printf (bio_err, "-rkey file           responder key to sign responses with\n");
 | 
			
		||||
		BIO_printf (bio_err, "-rother file         other certificates to include in response\n");
 | 
			
		||||
		BIO_printf (bio_err, "-resp_no_certs       don't include any certificates in response\n");
 | 
			
		||||
		BIO_printf (bio_err, "-nmin n              number of minutes before next update\n");
 | 
			
		||||
		BIO_printf (bio_err, "-ndays n             number of days before next update\n");
 | 
			
		||||
		BIO_printf (bio_err, "-resp_key_id         identify reponse by signing certificate key ID\n");
 | 
			
		||||
		BIO_printf (bio_err, "-nrequest n          number of requests to accept (default unlimited)\n");
 | 
			
		||||
		BIO_printf (bio_err, "-<dgst alg>          use specified digest in the request\n");
 | 
			
		||||
		BIO_printf (bio_err, "-timeout n           timeout connection to OCSP responder after n seconds\n");
 | 
			
		||||
		goto end;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
@@ -920,12 +931,12 @@ end:
 | 
			
		||||
	sk_X509_pop_free(verify_other, X509_free);
 | 
			
		||||
	sk_CONF_VALUE_pop_free(headers, X509V3_conf_free);
 | 
			
		||||
 | 
			
		||||
	if (use_ssl != -1)
 | 
			
		||||
		{
 | 
			
		||||
		OPENSSL_free(host);
 | 
			
		||||
		OPENSSL_free(port);
 | 
			
		||||
		OPENSSL_free(path);
 | 
			
		||||
		}
 | 
			
		||||
	if (thost)
 | 
			
		||||
		OPENSSL_free(thost);
 | 
			
		||||
	if (tport)
 | 
			
		||||
		OPENSSL_free(tport);
 | 
			
		||||
	if (tpath)
 | 
			
		||||
		OPENSSL_free(tpath);
 | 
			
		||||
 | 
			
		||||
	OPENSSL_EXIT(ret);
 | 
			
		||||
}
 | 
			
		||||
@@ -1388,16 +1399,7 @@ OCSP_RESPONSE *process_responder(BIO *err, OCSP_REQUEST *req,
 | 
			
		||||
	if (use_ssl == 1)
 | 
			
		||||
		{
 | 
			
		||||
		BIO *sbio;
 | 
			
		||||
#if !defined(OPENSSL_NO_SSL2) && !defined(OPENSSL_NO_SSL3)
 | 
			
		||||
		ctx = SSL_CTX_new(SSLv23_client_method());
 | 
			
		||||
#elif !defined(OPENSSL_NO_SSL3)
 | 
			
		||||
		ctx = SSL_CTX_new(SSLv3_client_method());
 | 
			
		||||
#elif !defined(OPENSSL_NO_SSL2)
 | 
			
		||||
		ctx = SSL_CTX_new(SSLv2_client_method());
 | 
			
		||||
#else
 | 
			
		||||
		BIO_printf(err, "SSL is disabled\n");
 | 
			
		||||
			goto end;
 | 
			
		||||
#endif
 | 
			
		||||
		if (ctx == NULL)
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(err, "Error creating SSL context.\n");
 | 
			
		||||
@@ -1409,7 +1411,7 @@ OCSP_RESPONSE *process_responder(BIO *err, OCSP_REQUEST *req,
 | 
			
		||||
		}
 | 
			
		||||
	resp = query_responder(err, cbio, path, headers, req, req_timeout);
 | 
			
		||||
	if (!resp)
 | 
			
		||||
		BIO_printf(bio_err, "Error querying OCSP responsder\n");
 | 
			
		||||
		BIO_printf(bio_err, "Error querying OCSP responder\n");
 | 
			
		||||
	end:
 | 
			
		||||
	if (cbio)
 | 
			
		||||
		BIO_free_all(cbio);
 | 
			
		||||
 
 | 
			
		||||
@@ -117,6 +117,7 @@
 | 
			
		||||
#include "apps.h"
 | 
			
		||||
#include <openssl/bio.h>
 | 
			
		||||
#include <openssl/crypto.h>
 | 
			
		||||
#include <openssl/rand.h>
 | 
			
		||||
#include <openssl/lhash.h>
 | 
			
		||||
#include <openssl/conf.h>
 | 
			
		||||
#include <openssl/x509.h>
 | 
			
		||||
@@ -129,6 +130,9 @@
 | 
			
		||||
#include "progs.h"
 | 
			
		||||
#include "s_apps.h"
 | 
			
		||||
#include <openssl/err.h>
 | 
			
		||||
#ifdef OPENSSL_FIPS
 | 
			
		||||
#include <openssl/fips.h>
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
/* The LHASH callbacks ("hash" & "cmp") have been replaced by functions with the
 | 
			
		||||
 * base prototypes (we cast each variable inside the function to the required
 | 
			
		||||
@@ -234,7 +238,8 @@ int main(int Argc, char *ARGV[])
 | 
			
		||||
	long errline;
 | 
			
		||||
 | 
			
		||||
#if defined( OPENSSL_SYS_VMS) && (__INITIAL_POINTER_SIZE == 64)
 | 
			
		||||
	/* 2011-03-22 SMS.
 | 
			
		||||
	/*- 
 | 
			
		||||
	 * 2011-03-22 SMS.
 | 
			
		||||
	 * If we have 32-bit pointers everywhere, then we're safe, and
 | 
			
		||||
	 * we bypass this mess, as on non-VMS systems.  (See ARGV,
 | 
			
		||||
	 * above.)
 | 
			
		||||
@@ -310,6 +315,19 @@ int main(int Argc, char *ARGV[])
 | 
			
		||||
		CRYPTO_set_locking_callback(lock_dbg_cb);
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	if(getenv("OPENSSL_FIPS")) {
 | 
			
		||||
#ifdef OPENSSL_FIPS
 | 
			
		||||
		if (!FIPS_mode_set(1)) {
 | 
			
		||||
			ERR_load_crypto_strings();
 | 
			
		||||
			ERR_print_errors(BIO_new_fp(stderr,BIO_NOCLOSE));
 | 
			
		||||
			EXIT(1);
 | 
			
		||||
		}
 | 
			
		||||
#else
 | 
			
		||||
		fprintf(stderr, "FIPS mode not supported.\n");
 | 
			
		||||
		EXIT(1);
 | 
			
		||||
#endif
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	apps_startup();
 | 
			
		||||
 | 
			
		||||
	/* Lets load up our environment a little */
 | 
			
		||||
@@ -418,9 +436,7 @@ end:
 | 
			
		||||
	if (prog != NULL) lh_FUNCTION_free(prog);
 | 
			
		||||
	if (arg.data != NULL) OPENSSL_free(arg.data);
 | 
			
		||||
 | 
			
		||||
	apps_shutdown();
 | 
			
		||||
 | 
			
		||||
	CRYPTO_mem_leaks(bio_err);
 | 
			
		||||
	if (bio_err != NULL)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_free(bio_err);
 | 
			
		||||
@@ -433,6 +449,9 @@ end:
 | 
			
		||||
		OPENSSL_free(Argv);
 | 
			
		||||
		}
 | 
			
		||||
#endif
 | 
			
		||||
	apps_shutdown();
 | 
			
		||||
	CRYPTO_mem_leaks(bio_err);
 | 
			
		||||
 | 
			
		||||
	OPENSSL_EXIT(ret);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -43,7 +43,8 @@ static int do_passwd(int passed_salt, char **salt_p, char **salt_malloc_p,
 | 
			
		||||
	char *passwd, BIO *out, int quiet, int table, int reverse,
 | 
			
		||||
	size_t pw_maxlen, int usecrypt, int use1, int useapr1);
 | 
			
		||||
 | 
			
		||||
/* -crypt        - standard Unix password algorithm (default)
 | 
			
		||||
/*-
 | 
			
		||||
 * -crypt        - standard Unix password algorithm (default)
 | 
			
		||||
 * -1            - MD5-based password algorithm
 | 
			
		||||
 * -apr1         - MD5-based password algorithm, Apache variant
 | 
			
		||||
 * -salt string  - salt
 | 
			
		||||
@@ -309,7 +310,8 @@ err:
 | 
			
		||||
 */
 | 
			
		||||
static char *md5crypt(const char *passwd, const char *magic, const char *salt)
 | 
			
		||||
	{
 | 
			
		||||
	static char out_buf[6 + 9 + 24 + 2]; /* "$apr1$..salt..$.......md5hash..........\0" */
 | 
			
		||||
	/* "$apr1$..salt..$.......md5hash..........\0" */
 | 
			
		||||
	static char out_buf[6 + 9 + 24 + 2];
 | 
			
		||||
	unsigned char buf[MD5_DIGEST_LENGTH];
 | 
			
		||||
	char *salt_out;
 | 
			
		||||
	int n;
 | 
			
		||||
 
 | 
			
		||||
@@ -112,7 +112,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    int maciter = PKCS12_DEFAULT_ITER;
 | 
			
		||||
    int twopass = 0;
 | 
			
		||||
    int keytype = 0;
 | 
			
		||||
    int cert_pbe = NID_pbe_WithSHA1And40BitRC2_CBC;
 | 
			
		||||
    int cert_pbe;
 | 
			
		||||
    int key_pbe = NID_pbe_WithSHA1And3_Key_TripleDES_CBC;
 | 
			
		||||
    int ret = 1;
 | 
			
		||||
    int macver = 1;
 | 
			
		||||
@@ -130,6 +130,13 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
 | 
			
		||||
    apps_startup();
 | 
			
		||||
 | 
			
		||||
#ifdef OPENSSL_FIPS
 | 
			
		||||
    if (FIPS_mode())
 | 
			
		||||
	cert_pbe = NID_pbe_WithSHA1And3_Key_TripleDES_CBC;
 | 
			
		||||
    else
 | 
			
		||||
#endif
 | 
			
		||||
    cert_pbe = NID_pbe_WithSHA1And40BitRC2_CBC;
 | 
			
		||||
 | 
			
		||||
    enc = EVP_des_ede3_cbc();
 | 
			
		||||
    if (bio_err == NULL ) bio_err = BIO_new_fp (stderr, BIO_NOCLOSE);
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -71,7 +71,8 @@
 | 
			
		||||
#undef PROG
 | 
			
		||||
#define PROG	pkcs7_main
 | 
			
		||||
 | 
			
		||||
/* -inform arg	- input format - default PEM (DER or PEM)
 | 
			
		||||
/*-
 | 
			
		||||
 * -inform arg	- input format - default PEM (DER or PEM)
 | 
			
		||||
 * -outform arg - output format - default PEM
 | 
			
		||||
 * -in arg	- input file - default stdin
 | 
			
		||||
 * -out arg	- output file - default stdout
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										12
									
								
								apps/progs.h
									
									
									
									
									
								
							
							
						
						
									
										12
									
								
								apps/progs.h
									
									
									
									
									
								
							@@ -46,6 +46,7 @@ extern int engine_main(int argc,char *argv[]);
 | 
			
		||||
extern int ocsp_main(int argc,char *argv[]);
 | 
			
		||||
extern int prime_main(int argc,char *argv[]);
 | 
			
		||||
extern int ts_main(int argc,char *argv[]);
 | 
			
		||||
extern int srp_main(int argc,char *argv[]);
 | 
			
		||||
 | 
			
		||||
#define FUNC_TYPE_GENERAL	1
 | 
			
		||||
#define FUNC_TYPE_MD		2
 | 
			
		||||
@@ -106,16 +107,16 @@ FUNCTION functions[] = {
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"gendsa",gendsa_main},
 | 
			
		||||
#endif
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"genpkey",genpkey_main},
 | 
			
		||||
#if !defined(OPENSSL_NO_SOCK) && !(defined(OPENSSL_NO_SSL2) && defined(OPENSSL_NO_SSL3))
 | 
			
		||||
#if !defined(OPENSSL_NO_SOCK)
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"s_server",s_server_main},
 | 
			
		||||
#endif
 | 
			
		||||
#if !defined(OPENSSL_NO_SOCK) && !(defined(OPENSSL_NO_SSL2) && defined(OPENSSL_NO_SSL3))
 | 
			
		||||
#if !defined(OPENSSL_NO_SOCK)
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"s_client",s_client_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_SPEED
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"speed",speed_main},
 | 
			
		||||
#endif
 | 
			
		||||
#if !defined(OPENSSL_NO_SOCK) && !(defined(OPENSSL_NO_SSL2) && defined(OPENSSL_NO_SSL3))
 | 
			
		||||
#if !defined(OPENSSL_NO_SOCK)
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"s_time",s_time_main},
 | 
			
		||||
#endif
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"version",version_main},
 | 
			
		||||
@@ -125,7 +126,7 @@ FUNCTION functions[] = {
 | 
			
		||||
#endif
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"crl2pkcs7",crl2pkcs7_main},
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"sess_id",sess_id_main},
 | 
			
		||||
#if !defined(OPENSSL_NO_SOCK) && !(defined(OPENSSL_NO_SSL2) && defined(OPENSSL_NO_SSL3))
 | 
			
		||||
#if !defined(OPENSSL_NO_SOCK)
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"ciphers",ciphers_main},
 | 
			
		||||
#endif
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"nseq",nseq_main},
 | 
			
		||||
@@ -147,6 +148,9 @@ FUNCTION functions[] = {
 | 
			
		||||
#endif
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"prime",prime_main},
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"ts",ts_main},
 | 
			
		||||
#ifndef OPENSSL_NO_SRP
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"srp",srp_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_MD2
 | 
			
		||||
	{FUNC_TYPE_MD,"md2",dgst_main},
 | 
			
		||||
#endif
 | 
			
		||||
 
 | 
			
		||||
@@ -32,7 +32,7 @@ foreach (@ARGV)
 | 
			
		||||
	push(@files,$_);
 | 
			
		||||
	$str="\t{FUNC_TYPE_GENERAL,\"$_\",${_}_main},\n";
 | 
			
		||||
	if (($_ =~ /^s_/) || ($_ =~ /^ciphers$/))
 | 
			
		||||
		{ print "#if !defined(OPENSSL_NO_SOCK) && !(defined(OPENSSL_NO_SSL2) && defined(OPENSSL_NO_SSL3))\n${str}#endif\n"; } 
 | 
			
		||||
		{ print "#if !defined(OPENSSL_NO_SOCK)\n${str}#endif\n"; } 
 | 
			
		||||
	elsif ( ($_ =~ /^speed$/))
 | 
			
		||||
		{ print "#ifndef OPENSSL_NO_SPEED\n${str}#endif\n"; }
 | 
			
		||||
	elsif ( ($_ =~ /^engine$/))
 | 
			
		||||
@@ -51,6 +51,8 @@ foreach (@ARGV)
 | 
			
		||||
		{ print "#ifndef OPENSSL_NO_CMS\n${str}#endif\n"; }
 | 
			
		||||
	elsif ( ($_ =~ /^ocsp$/))
 | 
			
		||||
		{ print "#ifndef OPENSSL_NO_OCSP\n${str}#endif\n"; }
 | 
			
		||||
	elsif ( ($_ =~ /^srp$/))
 | 
			
		||||
		{ print "#ifndef OPENSSL_NO_SRP\n${str}#endif\n"; }
 | 
			
		||||
	else
 | 
			
		||||
		{ print $str; }
 | 
			
		||||
	}
 | 
			
		||||
 
 | 
			
		||||
@@ -66,7 +66,8 @@
 | 
			
		||||
#undef PROG
 | 
			
		||||
#define PROG rand_main
 | 
			
		||||
 | 
			
		||||
/* -out file         - write to file
 | 
			
		||||
/*-
 | 
			
		||||
 * -out file         - write to file
 | 
			
		||||
 * -rand file:file   - PRNG seed files
 | 
			
		||||
 * -base64           - base64 encode output
 | 
			
		||||
 * -hex              - hex encode output
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										119
									
								
								apps/req.c
									
									
									
									
									
								
							
							
						
						
									
										119
									
								
								apps/req.c
									
									
									
									
									
								
							@@ -105,7 +105,8 @@
 | 
			
		||||
#undef PROG
 | 
			
		||||
#define PROG	req_main
 | 
			
		||||
 | 
			
		||||
/* -inform arg	- input format - default PEM (DER or PEM)
 | 
			
		||||
/*-
 | 
			
		||||
 * -inform arg	- input format - default PEM (DER or PEM)
 | 
			
		||||
 * -outform arg - output format - default PEM
 | 
			
		||||
 * -in arg	- input file - default stdin
 | 
			
		||||
 * -out arg	- output file - default stdout
 | 
			
		||||
@@ -165,7 +166,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	EVP_PKEY_CTX *genctx = NULL;
 | 
			
		||||
	const char *keyalg = NULL;
 | 
			
		||||
	char *keyalgstr = NULL;
 | 
			
		||||
	STACK_OF(OPENSSL_STRING) *pkeyopts = NULL;
 | 
			
		||||
	STACK_OF(OPENSSL_STRING) *pkeyopts = NULL, *sigopts = NULL;
 | 
			
		||||
	EVP_PKEY *pkey=NULL;
 | 
			
		||||
	int i=0,badops=0,newreq=0,verbose=0,pkey_type=-1;
 | 
			
		||||
	long newkey = -1;
 | 
			
		||||
@@ -310,6 +311,15 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			if (!pkeyopts || !sk_OPENSSL_STRING_push(pkeyopts, *(++argv)))
 | 
			
		||||
				goto bad;
 | 
			
		||||
			}
 | 
			
		||||
		else if (strcmp(*argv,"-sigopt") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1)
 | 
			
		||||
				goto bad;
 | 
			
		||||
			if (!sigopts)
 | 
			
		||||
				sigopts = sk_OPENSSL_STRING_new_null();
 | 
			
		||||
			if (!sigopts || !sk_OPENSSL_STRING_push(sigopts, *(++argv)))
 | 
			
		||||
				goto bad;
 | 
			
		||||
			}
 | 
			
		||||
		else if (strcmp(*argv,"-batch") == 0)
 | 
			
		||||
			batch=1;
 | 
			
		||||
		else if (strcmp(*argv,"-newhdr") == 0)
 | 
			
		||||
@@ -502,7 +512,7 @@ bad:
 | 
			
		||||
			oid_bio=BIO_new_file(p,"r");
 | 
			
		||||
			if (oid_bio == NULL) 
 | 
			
		||||
				{
 | 
			
		||||
				/*
 | 
			
		||||
				/*-
 | 
			
		||||
				BIO_printf(bio_err,"problems opening %s for extra oid's\n",p);
 | 
			
		||||
				ERR_print_errors(bio_err);
 | 
			
		||||
				*/
 | 
			
		||||
@@ -635,6 +645,11 @@ bad:
 | 
			
		||||
		if (inrand)
 | 
			
		||||
			app_RAND_load_files(inrand);
 | 
			
		||||
 | 
			
		||||
		if (!NCONF_get_number(req_conf,SECTION,BITS, &newkey))
 | 
			
		||||
			{
 | 
			
		||||
			newkey=DEFAULT_KEY_LENGTH;
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
		if (keyalg)
 | 
			
		||||
			{
 | 
			
		||||
			genctx = set_keygen_ctx(bio_err, keyalg, &pkey_type, &newkey,
 | 
			
		||||
@@ -643,12 +658,6 @@ bad:
 | 
			
		||||
				goto end;
 | 
			
		||||
			}
 | 
			
		||||
	
 | 
			
		||||
		if (newkey <= 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (!NCONF_get_number(req_conf,SECTION,BITS, &newkey))
 | 
			
		||||
				newkey=DEFAULT_KEY_LENGTH;
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
		if (newkey < MIN_KEY_LENGTH && (pkey_type == EVP_PKEY_RSA || pkey_type == EVP_PKEY_DSA))
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(bio_err,"private key length is too short,\n");
 | 
			
		||||
@@ -858,8 +867,9 @@ loop:
 | 
			
		||||
					extensions);
 | 
			
		||||
				goto end;
 | 
			
		||||
				}
 | 
			
		||||
			
 | 
			
		||||
			if (!(i=X509_sign(x509ss,pkey,digest)))
 | 
			
		||||
 | 
			
		||||
			i=do_X509_sign(bio_err, x509ss, pkey, digest, sigopts);
 | 
			
		||||
			if (!i)
 | 
			
		||||
				{
 | 
			
		||||
				ERR_print_errors(bio_err);
 | 
			
		||||
				goto end;
 | 
			
		||||
@@ -883,7 +893,8 @@ loop:
 | 
			
		||||
					req_exts);
 | 
			
		||||
				goto end;
 | 
			
		||||
				}
 | 
			
		||||
			if (!(i=X509_REQ_sign(req,pkey,digest)))
 | 
			
		||||
			i=do_X509_REQ_sign(bio_err, req, pkey, digest, sigopts);
 | 
			
		||||
			if (!i)
 | 
			
		||||
				{
 | 
			
		||||
				ERR_print_errors(bio_err);
 | 
			
		||||
				goto end;
 | 
			
		||||
@@ -1084,6 +1095,8 @@ end:
 | 
			
		||||
		EVP_PKEY_CTX_free(genctx);
 | 
			
		||||
	if (pkeyopts)
 | 
			
		||||
		sk_OPENSSL_STRING_free(pkeyopts);
 | 
			
		||||
	if (sigopts)
 | 
			
		||||
		sk_OPENSSL_STRING_free(sigopts);
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
	if (gen_eng)
 | 
			
		||||
		ENGINE_free(gen_eng);
 | 
			
		||||
@@ -1477,7 +1490,13 @@ start:
 | 
			
		||||
#ifdef CHARSET_EBCDIC
 | 
			
		||||
	ebcdic2ascii(buf, buf, i);
 | 
			
		||||
#endif
 | 
			
		||||
	if(!req_check_len(i, n_min, n_max)) goto start;
 | 
			
		||||
	if(!req_check_len(i, n_min, n_max))
 | 
			
		||||
		{
 | 
			
		||||
		if (batch || value)
 | 
			
		||||
			return 0;
 | 
			
		||||
		goto start;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	if (!X509_NAME_add_entry_by_NID(n,nid, chtype,
 | 
			
		||||
				(unsigned char *) buf, -1,-1,mval)) goto err;
 | 
			
		||||
	ret=1;
 | 
			
		||||
@@ -1536,7 +1555,12 @@ start:
 | 
			
		||||
#ifdef CHARSET_EBCDIC
 | 
			
		||||
	ebcdic2ascii(buf, buf, i);
 | 
			
		||||
#endif
 | 
			
		||||
	if(!req_check_len(i, n_min, n_max)) goto start;
 | 
			
		||||
	if(!req_check_len(i, n_min, n_max))
 | 
			
		||||
		{
 | 
			
		||||
		if (batch || value)
 | 
			
		||||
			return 0;
 | 
			
		||||
		goto start;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	if(!X509_REQ_add1_attr_by_NID(req, nid, chtype,
 | 
			
		||||
					(unsigned char *)buf, -1)) {
 | 
			
		||||
@@ -1636,6 +1660,8 @@ static EVP_PKEY_CTX *set_keygen_ctx(BIO *err, const char *gstr, int *pkey_type,
 | 
			
		||||
				keylen = atol(p + 1);
 | 
			
		||||
				*pkeylen = keylen;
 | 
			
		||||
				}
 | 
			
		||||
			else
 | 
			
		||||
				keylen = *pkeylen;
 | 
			
		||||
			}
 | 
			
		||||
		else if (p)
 | 
			
		||||
			paramfile = p + 1;
 | 
			
		||||
@@ -1756,3 +1782,68 @@ static int genpkey_cb(EVP_PKEY_CTX *ctx)
 | 
			
		||||
#endif
 | 
			
		||||
	return 1;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
static int do_sign_init(BIO *err, EVP_MD_CTX *ctx, EVP_PKEY *pkey,
 | 
			
		||||
			const EVP_MD *md, STACK_OF(OPENSSL_STRING) *sigopts)
 | 
			
		||||
	{
 | 
			
		||||
	EVP_PKEY_CTX *pkctx = NULL;
 | 
			
		||||
	int i;
 | 
			
		||||
	EVP_MD_CTX_init(ctx);
 | 
			
		||||
	if (!EVP_DigestSignInit(ctx, &pkctx, md, NULL, pkey))
 | 
			
		||||
		return 0;
 | 
			
		||||
	for (i = 0; i < sk_OPENSSL_STRING_num(sigopts); i++)
 | 
			
		||||
		{
 | 
			
		||||
		char *sigopt = sk_OPENSSL_STRING_value(sigopts, i);
 | 
			
		||||
		if (pkey_ctrl_string(pkctx, sigopt) <= 0)
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(err, "parameter error \"%s\"\n", sigopt);
 | 
			
		||||
			ERR_print_errors(bio_err);
 | 
			
		||||
			return 0;
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
	return 1;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
int do_X509_sign(BIO *err, X509 *x, EVP_PKEY *pkey, const EVP_MD *md,
 | 
			
		||||
			STACK_OF(OPENSSL_STRING) *sigopts)
 | 
			
		||||
	{
 | 
			
		||||
	int rv;
 | 
			
		||||
	EVP_MD_CTX mctx;
 | 
			
		||||
	EVP_MD_CTX_init(&mctx);
 | 
			
		||||
	rv = do_sign_init(err, &mctx, pkey, md, sigopts);
 | 
			
		||||
	if (rv > 0)
 | 
			
		||||
		rv = X509_sign_ctx(x, &mctx);
 | 
			
		||||
	EVP_MD_CTX_cleanup(&mctx);
 | 
			
		||||
	return rv > 0 ? 1 : 0;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
int do_X509_REQ_sign(BIO *err, X509_REQ *x, EVP_PKEY *pkey, const EVP_MD *md,
 | 
			
		||||
			STACK_OF(OPENSSL_STRING) *sigopts)
 | 
			
		||||
	{
 | 
			
		||||
	int rv;
 | 
			
		||||
	EVP_MD_CTX mctx;
 | 
			
		||||
	EVP_MD_CTX_init(&mctx);
 | 
			
		||||
	rv = do_sign_init(err, &mctx, pkey, md, sigopts);
 | 
			
		||||
	if (rv > 0)
 | 
			
		||||
		rv = X509_REQ_sign_ctx(x, &mctx);
 | 
			
		||||
	EVP_MD_CTX_cleanup(&mctx);
 | 
			
		||||
	return rv > 0 ? 1 : 0;
 | 
			
		||||
	}
 | 
			
		||||
		
 | 
			
		||||
	
 | 
			
		||||
 | 
			
		||||
int do_X509_CRL_sign(BIO *err, X509_CRL *x, EVP_PKEY *pkey, const EVP_MD *md,
 | 
			
		||||
			STACK_OF(OPENSSL_STRING) *sigopts)
 | 
			
		||||
	{
 | 
			
		||||
	int rv;
 | 
			
		||||
	EVP_MD_CTX mctx;
 | 
			
		||||
	EVP_MD_CTX_init(&mctx);
 | 
			
		||||
	rv = do_sign_init(err, &mctx, pkey, md, sigopts);
 | 
			
		||||
	if (rv > 0)
 | 
			
		||||
		rv = X509_CRL_sign_ctx(x, &mctx);
 | 
			
		||||
	EVP_MD_CTX_cleanup(&mctx);
 | 
			
		||||
	return rv > 0 ? 1 : 0;
 | 
			
		||||
	}
 | 
			
		||||
		
 | 
			
		||||
	
 | 
			
		||||
 
 | 
			
		||||
@@ -74,7 +74,8 @@
 | 
			
		||||
#undef PROG
 | 
			
		||||
#define PROG	rsa_main
 | 
			
		||||
 | 
			
		||||
/* -inform arg	- input format - default PEM (one of DER, NET or PEM)
 | 
			
		||||
/*-
 | 
			
		||||
 * -inform arg	- input format - default PEM (one of DER, NET or PEM)
 | 
			
		||||
 * -outform arg - output format - default PEM
 | 
			
		||||
 * -in arg	- input file - default stdin
 | 
			
		||||
 * -out arg	- output file - default stdout
 | 
			
		||||
 
 | 
			
		||||
@@ -108,7 +108,8 @@
 | 
			
		||||
 * Hudson (tjh@cryptsoft.com).
 | 
			
		||||
 *
 | 
			
		||||
 */
 | 
			
		||||
#if !defined(OPENSSL_SYS_NETWARE)  /* conflicts with winsock2 stuff on netware */
 | 
			
		||||
/* conflicts with winsock2 stuff on netware */
 | 
			
		||||
#if !defined(OPENSSL_SYS_NETWARE)
 | 
			
		||||
#include <sys/types.h>
 | 
			
		||||
#endif
 | 
			
		||||
#include <openssl/opensslconf.h>
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										88
									
								
								apps/s_cb.c
									
									
									
									
									
								
							
							
						
						
									
										88
									
								
								apps/s_cb.c
									
									
									
									
									
								
							@@ -199,7 +199,7 @@ int set_cert_stuff(SSL_CTX *ctx, char *cert_file, char *key_file)
 | 
			
		||||
	{
 | 
			
		||||
	if (cert_file != NULL)
 | 
			
		||||
		{
 | 
			
		||||
		/*
 | 
			
		||||
		/*-
 | 
			
		||||
		SSL *ssl;
 | 
			
		||||
		X509 *x509;
 | 
			
		||||
		*/
 | 
			
		||||
@@ -220,7 +220,7 @@ int set_cert_stuff(SSL_CTX *ctx, char *cert_file, char *key_file)
 | 
			
		||||
			return(0);
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
		/*
 | 
			
		||||
		/*-
 | 
			
		||||
		In theory this is no longer needed 
 | 
			
		||||
		ssl=SSL_new(ctx);
 | 
			
		||||
		x509=SSL_get_certificate(ssl);
 | 
			
		||||
@@ -237,8 +237,8 @@ int set_cert_stuff(SSL_CTX *ctx, char *cert_file, char *key_file)
 | 
			
		||||
 | 
			
		||||
		/* If we are using DSA, we can copy the parameters from
 | 
			
		||||
		 * the private key */
 | 
			
		||||
		
 | 
			
		||||
		
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
		/* Now we know that a key and cert have been set against
 | 
			
		||||
		 * the SSL context */
 | 
			
		||||
		if (!SSL_CTX_check_private_key(ctx))
 | 
			
		||||
@@ -357,6 +357,12 @@ void MS_CALLBACK msg_cb(int write_p, int version, int content_type, const void *
 | 
			
		||||
	case TLS1_VERSION:
 | 
			
		||||
		str_version = "TLS 1.0 ";
 | 
			
		||||
		break;
 | 
			
		||||
	case TLS1_1_VERSION:
 | 
			
		||||
		str_version = "TLS 1.1 ";
 | 
			
		||||
		break;
 | 
			
		||||
	case TLS1_2_VERSION:
 | 
			
		||||
		str_version = "TLS 1.2 ";
 | 
			
		||||
		break;
 | 
			
		||||
	case DTLS1_VERSION:
 | 
			
		||||
		str_version = "DTLS 1.0 ";
 | 
			
		||||
		break;
 | 
			
		||||
@@ -430,6 +436,8 @@ void MS_CALLBACK msg_cb(int write_p, int version, int content_type, const void *
 | 
			
		||||
 | 
			
		||||
	if (version == SSL3_VERSION ||
 | 
			
		||||
	    version == TLS1_VERSION ||
 | 
			
		||||
	    version == TLS1_1_VERSION ||
 | 
			
		||||
	    version == TLS1_2_VERSION ||
 | 
			
		||||
	    version == DTLS1_VERSION ||
 | 
			
		||||
	    version == DTLS1_BAD_VER)
 | 
			
		||||
		{
 | 
			
		||||
@@ -549,6 +557,9 @@ void MS_CALLBACK msg_cb(int write_p, int version, int content_type, const void *
 | 
			
		||||
				case 114:
 | 
			
		||||
					str_details2 = " bad_certificate_hash_value";
 | 
			
		||||
					break;
 | 
			
		||||
				case 115:
 | 
			
		||||
					str_details2 = " unknown_psk_identity";
 | 
			
		||||
					break;
 | 
			
		||||
					}
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
@@ -597,6 +608,26 @@ void MS_CALLBACK msg_cb(int write_p, int version, int content_type, const void *
 | 
			
		||||
					}
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_HEARTBEATS
 | 
			
		||||
		if (content_type == 24) /* Heartbeat */
 | 
			
		||||
			{
 | 
			
		||||
			str_details1 = ", Heartbeat";
 | 
			
		||||
			
 | 
			
		||||
			if (len > 0)
 | 
			
		||||
				{
 | 
			
		||||
				switch (((const unsigned char*)buf)[0])
 | 
			
		||||
					{
 | 
			
		||||
				case 1:
 | 
			
		||||
					str_details1 = ", HeartbeatRequest";
 | 
			
		||||
					break;
 | 
			
		||||
				case 2:
 | 
			
		||||
					str_details1 = ", HeartbeatResponse";
 | 
			
		||||
					break;
 | 
			
		||||
					}
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
#endif
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	BIO_printf(bio, "%s %s%s [length %04lx]%s%s\n", str_write_p, str_version, str_content_type, (unsigned long)len, str_details1, str_details2);
 | 
			
		||||
@@ -657,6 +688,22 @@ void MS_CALLBACK tlsext_cb(SSL *s, int client_server, int type,
 | 
			
		||||
		extname = "status request";
 | 
			
		||||
		break;
 | 
			
		||||
 | 
			
		||||
		case TLSEXT_TYPE_user_mapping:
 | 
			
		||||
		extname = "user mapping";
 | 
			
		||||
		break;
 | 
			
		||||
 | 
			
		||||
		case TLSEXT_TYPE_client_authz:
 | 
			
		||||
		extname = "client authz";
 | 
			
		||||
		break;
 | 
			
		||||
 | 
			
		||||
		case TLSEXT_TYPE_server_authz:
 | 
			
		||||
		extname = "server authz";
 | 
			
		||||
		break;
 | 
			
		||||
 | 
			
		||||
		case TLSEXT_TYPE_cert_type:
 | 
			
		||||
		extname = "cert type";
 | 
			
		||||
		break;
 | 
			
		||||
 | 
			
		||||
		case TLSEXT_TYPE_elliptic_curves:
 | 
			
		||||
		extname = "elliptic curves";
 | 
			
		||||
		break;
 | 
			
		||||
@@ -665,12 +712,28 @@ void MS_CALLBACK tlsext_cb(SSL *s, int client_server, int type,
 | 
			
		||||
		extname = "EC point formats";
 | 
			
		||||
		break;
 | 
			
		||||
 | 
			
		||||
		case TLSEXT_TYPE_session_ticket:
 | 
			
		||||
		extname = "server ticket";
 | 
			
		||||
		case TLSEXT_TYPE_srp:
 | 
			
		||||
		extname = "SRP";
 | 
			
		||||
		break;
 | 
			
		||||
 | 
			
		||||
		case TLSEXT_TYPE_renegotiate:
 | 
			
		||||
		extname = "renegotiate";
 | 
			
		||||
		case TLSEXT_TYPE_signature_algorithms:
 | 
			
		||||
		extname = "signature algorithms";
 | 
			
		||||
		break;
 | 
			
		||||
 | 
			
		||||
		case TLSEXT_TYPE_use_srtp:
 | 
			
		||||
		extname = "use SRTP";
 | 
			
		||||
		break;
 | 
			
		||||
 | 
			
		||||
		case TLSEXT_TYPE_heartbeat:
 | 
			
		||||
		extname = "heartbeat";
 | 
			
		||||
		break;
 | 
			
		||||
 | 
			
		||||
		case TLSEXT_TYPE_session_ticket:
 | 
			
		||||
		extname = "session ticket";
 | 
			
		||||
		break;
 | 
			
		||||
 | 
			
		||||
		case TLSEXT_TYPE_renegotiate: 
 | 
			
		||||
		extname = "renegotiation info";
 | 
			
		||||
		break;
 | 
			
		||||
 | 
			
		||||
#ifdef TLSEXT_TYPE_opaque_prf_input
 | 
			
		||||
@@ -678,6 +741,15 @@ void MS_CALLBACK tlsext_cb(SSL *s, int client_server, int type,
 | 
			
		||||
		extname = "opaque PRF input";
 | 
			
		||||
		break;
 | 
			
		||||
#endif
 | 
			
		||||
#ifdef TLSEXT_TYPE_next_proto_neg
 | 
			
		||||
		case TLSEXT_TYPE_next_proto_neg:
 | 
			
		||||
		extname = "next protocol";
 | 
			
		||||
		break;
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
		case TLSEXT_TYPE_padding:
 | 
			
		||||
		extname = "TLS padding";
 | 
			
		||||
		break;
 | 
			
		||||
 | 
			
		||||
		default:
 | 
			
		||||
		extname = "unknown";
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										456
									
								
								apps/s_client.c
									
									
									
									
									
								
							
							
						
						
									
										456
									
								
								apps/s_client.c
									
									
									
									
									
								
							@@ -163,6 +163,9 @@ typedef unsigned int u_int;
 | 
			
		||||
#include <openssl/rand.h>
 | 
			
		||||
#include <openssl/ocsp.h>
 | 
			
		||||
#include <openssl/bn.h>
 | 
			
		||||
#ifndef OPENSSL_NO_SRP
 | 
			
		||||
#include <openssl/srp.h>
 | 
			
		||||
#endif
 | 
			
		||||
#include "s_apps.h"
 | 
			
		||||
#include "timeouts.h"
 | 
			
		||||
 | 
			
		||||
@@ -182,7 +185,8 @@ typedef unsigned int u_int;
 | 
			
		||||
/*#define SSL_HOST_NAME	"193.118.187.102" */
 | 
			
		||||
#define SSL_HOST_NAME	"localhost"
 | 
			
		||||
 | 
			
		||||
/*#define TEST_CERT "client.pem" */ /* no default cert. */
 | 
			
		||||
/* no default cert. */
 | 
			
		||||
/*#define TEST_CERT "client.pem" */
 | 
			
		||||
 | 
			
		||||
#undef BUFSIZZ
 | 
			
		||||
#define BUFSIZZ 1024*8
 | 
			
		||||
@@ -203,6 +207,9 @@ static int c_status_req=0;
 | 
			
		||||
static int c_msg=0;
 | 
			
		||||
static int c_showcerts=0;
 | 
			
		||||
 | 
			
		||||
static char *keymatexportlabel=NULL;
 | 
			
		||||
static int keymatexportlen=20;
 | 
			
		||||
 | 
			
		||||
static void sc_usage(void);
 | 
			
		||||
static void print_stuff(BIO *berr,SSL *con,int full);
 | 
			
		||||
#ifndef OPENSSL_NO_TLSEXT
 | 
			
		||||
@@ -284,6 +291,7 @@ static void sc_usage(void)
 | 
			
		||||
	BIO_printf(bio_err," -connect host:port - who to connect to (default is %s:%s)\n",SSL_HOST_NAME,PORT_STR);
 | 
			
		||||
 | 
			
		||||
	BIO_printf(bio_err," -verify arg   - turn on peer certificate verification\n");
 | 
			
		||||
	BIO_printf(bio_err," -verify_return_error - return verification errors\n");
 | 
			
		||||
	BIO_printf(bio_err," -cert arg     - certificate file to use, PEM format assumed\n");
 | 
			
		||||
	BIO_printf(bio_err," -certform arg - certificate format (PEM or DER) PEM default\n");
 | 
			
		||||
	BIO_printf(bio_err," -key arg      - Private key file to use, in cert file if\n");
 | 
			
		||||
@@ -294,6 +302,7 @@ static void sc_usage(void)
 | 
			
		||||
	BIO_printf(bio_err," -CAfile arg   - PEM format file of CA's\n");
 | 
			
		||||
	BIO_printf(bio_err," -reconnect    - Drop and re-make the connection with the same Session-ID\n");
 | 
			
		||||
	BIO_printf(bio_err," -pause        - sleep(1) after each read(2) and write(2) system call\n");
 | 
			
		||||
	BIO_printf(bio_err," -prexit       - print session information even on connection failure\n");
 | 
			
		||||
	BIO_printf(bio_err," -showcerts    - show all certificates in the chain\n");
 | 
			
		||||
	BIO_printf(bio_err," -debug        - extra output\n");
 | 
			
		||||
#ifdef WATT32
 | 
			
		||||
@@ -315,13 +324,25 @@ static void sc_usage(void)
 | 
			
		||||
# ifndef OPENSSL_NO_JPAKE
 | 
			
		||||
	BIO_printf(bio_err," -jpake arg    - JPAKE secret to use\n");
 | 
			
		||||
# endif
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_SRP
 | 
			
		||||
	BIO_printf(bio_err," -srpuser user     - SRP authentification for 'user'\n");
 | 
			
		||||
	BIO_printf(bio_err," -srppass arg      - password for 'user'\n");
 | 
			
		||||
	BIO_printf(bio_err," -srp_lateuser     - SRP username into second ClientHello message\n");
 | 
			
		||||
	BIO_printf(bio_err," -srp_moregroups   - Tolerate other than the known g N values.\n");
 | 
			
		||||
	BIO_printf(bio_err," -srp_strength int - minimal length in bits for N (default %d).\n",SRP_MINIMAL_N);
 | 
			
		||||
#endif
 | 
			
		||||
	BIO_printf(bio_err," -ssl2         - just use SSLv2\n");
 | 
			
		||||
#ifndef OPENSSL_NO_SSL3_METHOD
 | 
			
		||||
	BIO_printf(bio_err," -ssl3         - just use SSLv3\n");
 | 
			
		||||
#endif
 | 
			
		||||
	BIO_printf(bio_err," -tls1_2       - just use TLSv1.2\n");
 | 
			
		||||
	BIO_printf(bio_err," -tls1_1       - just use TLSv1.1\n");
 | 
			
		||||
	BIO_printf(bio_err," -tls1         - just use TLSv1\n");
 | 
			
		||||
	BIO_printf(bio_err," -dtls1        - just use DTLSv1\n");    
 | 
			
		||||
	BIO_printf(bio_err," -fallback_scsv - send TLS_FALLBACK_SCSV\n");
 | 
			
		||||
	BIO_printf(bio_err," -mtu          - set the link layer MTU\n");
 | 
			
		||||
	BIO_printf(bio_err," -no_tls1/-no_ssl3/-no_ssl2 - turn off that protocol\n");
 | 
			
		||||
	BIO_printf(bio_err," -no_tls1_2/-no_tls1_1/-no_tls1/-no_ssl3/-no_ssl2 - turn off that protocol\n");
 | 
			
		||||
	BIO_printf(bio_err," -bugs         - Switch on all SSL implementation bug workarounds\n");
 | 
			
		||||
	BIO_printf(bio_err," -serverpref   - Use server's cipher preferences (only SSLv2)\n");
 | 
			
		||||
	BIO_printf(bio_err," -cipher       - preferred cipher to use, use the 'openssl ciphers'\n");
 | 
			
		||||
@@ -342,8 +363,16 @@ static void sc_usage(void)
 | 
			
		||||
	BIO_printf(bio_err," -tlsextdebug      - hex dump of all TLS extensions received\n");
 | 
			
		||||
	BIO_printf(bio_err," -status           - request certificate status from server\n");
 | 
			
		||||
	BIO_printf(bio_err," -no_ticket        - disable use of RFC4507bis session tickets\n");
 | 
			
		||||
# ifndef OPENSSL_NO_NEXTPROTONEG
 | 
			
		||||
	BIO_printf(bio_err," -nextprotoneg arg - enable NPN extension, considering named protocols supported (comma-separated list)\n");
 | 
			
		||||
# endif
 | 
			
		||||
#endif
 | 
			
		||||
	BIO_printf(bio_err," -legacy_renegotiation - enable use of legacy renegotiation (dangerous)\n");
 | 
			
		||||
#ifndef OPENSSL_NO_SRTP
 | 
			
		||||
	BIO_printf(bio_err," -use_srtp profiles - Offer SRTP key management with a colon-separated profile list\n");
 | 
			
		||||
#endif
 | 
			
		||||
 	BIO_printf(bio_err," -keymatexport label   - Export keying material using label\n");
 | 
			
		||||
 	BIO_printf(bio_err," -keymatexportlen len  - Export len bytes of keying material (default 20)\n");
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_TLSEXT
 | 
			
		||||
@@ -366,6 +395,159 @@ static int MS_CALLBACK ssl_servername_cb(SSL *s, int *ad, void *arg)
 | 
			
		||||
	
 | 
			
		||||
	return SSL_TLSEXT_ERR_OK;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_SRP
 | 
			
		||||
 | 
			
		||||
/* This is a context that we pass to all callbacks */
 | 
			
		||||
typedef struct srp_arg_st
 | 
			
		||||
	{
 | 
			
		||||
	char *srppassin;
 | 
			
		||||
	char *srplogin;
 | 
			
		||||
	int msg;   /* copy from c_msg */
 | 
			
		||||
	int debug; /* copy from c_debug */
 | 
			
		||||
	int amp;   /* allow more groups */
 | 
			
		||||
	int strength /* minimal size for N */ ;
 | 
			
		||||
	} SRP_ARG;
 | 
			
		||||
 | 
			
		||||
#define SRP_NUMBER_ITERATIONS_FOR_PRIME 64
 | 
			
		||||
 | 
			
		||||
static int srp_Verify_N_and_g(BIGNUM *N, BIGNUM *g)
 | 
			
		||||
	{
 | 
			
		||||
	BN_CTX *bn_ctx = BN_CTX_new();
 | 
			
		||||
	BIGNUM *p = BN_new();
 | 
			
		||||
	BIGNUM *r = BN_new();
 | 
			
		||||
	int ret =
 | 
			
		||||
		g != NULL && N != NULL && bn_ctx != NULL && BN_is_odd(N) &&
 | 
			
		||||
		BN_is_prime_ex(N, SRP_NUMBER_ITERATIONS_FOR_PRIME, bn_ctx, NULL) &&
 | 
			
		||||
		p != NULL && BN_rshift1(p, N) &&
 | 
			
		||||
 | 
			
		||||
		/* p = (N-1)/2 */
 | 
			
		||||
		BN_is_prime_ex(p, SRP_NUMBER_ITERATIONS_FOR_PRIME, bn_ctx, NULL) &&
 | 
			
		||||
		r != NULL &&
 | 
			
		||||
 | 
			
		||||
		/* verify g^((N-1)/2) == -1 (mod N) */
 | 
			
		||||
		BN_mod_exp(r, g, p, N, bn_ctx) &&
 | 
			
		||||
		BN_add_word(r, 1) &&
 | 
			
		||||
		BN_cmp(r, N) == 0;
 | 
			
		||||
 | 
			
		||||
	if(r)
 | 
			
		||||
		BN_free(r);
 | 
			
		||||
	if(p)
 | 
			
		||||
		BN_free(p);
 | 
			
		||||
	if(bn_ctx)
 | 
			
		||||
		BN_CTX_free(bn_ctx);
 | 
			
		||||
	return ret;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
/*-
 | 
			
		||||
 * This callback is used here for two purposes:
 | 
			
		||||
 * - extended debugging
 | 
			
		||||
 * - making some primality tests for unknown groups
 | 
			
		||||
 * The callback is only called for a non default group.
 | 
			
		||||
 *
 | 
			
		||||
 * An application does not need the call back at all if
 | 
			
		||||
 * only the stanard groups are used.  In real life situations, 
 | 
			
		||||
 * client and server already share well known groups, 
 | 
			
		||||
 * thus there is no need to verify them. 
 | 
			
		||||
 * Furthermore, in case that a server actually proposes a group that
 | 
			
		||||
 * is not one of those defined in RFC 5054, it is more appropriate 
 | 
			
		||||
 * to add the group to a static list and then compare since 
 | 
			
		||||
 * primality tests are rather cpu consuming.
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
static int MS_CALLBACK ssl_srp_verify_param_cb(SSL *s, void *arg)
 | 
			
		||||
	{
 | 
			
		||||
	SRP_ARG *srp_arg = (SRP_ARG *)arg;
 | 
			
		||||
	BIGNUM *N = NULL, *g = NULL;
 | 
			
		||||
	if (!(N = SSL_get_srp_N(s)) || !(g = SSL_get_srp_g(s)))
 | 
			
		||||
		return 0;
 | 
			
		||||
	if (srp_arg->debug || srp_arg->msg || srp_arg->amp == 1)
 | 
			
		||||
		{
 | 
			
		||||
    		BIO_printf(bio_err, "SRP parameters:\n"); 
 | 
			
		||||
		BIO_printf(bio_err,"\tN="); BN_print(bio_err,N);
 | 
			
		||||
		BIO_printf(bio_err,"\n\tg="); BN_print(bio_err,g);
 | 
			
		||||
		BIO_printf(bio_err,"\n");
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	if (SRP_check_known_gN_param(g,N))
 | 
			
		||||
		return 1;
 | 
			
		||||
 | 
			
		||||
	if (srp_arg->amp == 1)
 | 
			
		||||
		{
 | 
			
		||||
		if (srp_arg->debug)
 | 
			
		||||
			BIO_printf(bio_err, "SRP param N and g are not known params, going to check deeper.\n");
 | 
			
		||||
 | 
			
		||||
/* The srp_moregroups is a real debugging feature.
 | 
			
		||||
   Implementors should rather add the value to the known ones.
 | 
			
		||||
   The minimal size has already been tested.
 | 
			
		||||
*/
 | 
			
		||||
		if (BN_num_bits(g) <= BN_BITS && srp_Verify_N_and_g(N,g))
 | 
			
		||||
			return 1;
 | 
			
		||||
		}	
 | 
			
		||||
	BIO_printf(bio_err, "SRP param N and g rejected.\n");
 | 
			
		||||
	return 0;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
#define PWD_STRLEN 1024
 | 
			
		||||
 | 
			
		||||
static char * MS_CALLBACK ssl_give_srp_client_pwd_cb(SSL *s, void *arg)
 | 
			
		||||
	{
 | 
			
		||||
	SRP_ARG *srp_arg = (SRP_ARG *)arg;
 | 
			
		||||
	char *pass = (char *)OPENSSL_malloc(PWD_STRLEN+1);
 | 
			
		||||
	PW_CB_DATA cb_tmp;
 | 
			
		||||
	int l;
 | 
			
		||||
 | 
			
		||||
	cb_tmp.password = (char *)srp_arg->srppassin;
 | 
			
		||||
	cb_tmp.prompt_info = "SRP user";
 | 
			
		||||
	if ((l = password_callback(pass, PWD_STRLEN, 0, &cb_tmp))<0)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf (bio_err, "Can't read Password\n");
 | 
			
		||||
		OPENSSL_free(pass);
 | 
			
		||||
		return NULL;
 | 
			
		||||
		}
 | 
			
		||||
	*(pass+l)= '\0';
 | 
			
		||||
 | 
			
		||||
	return pass;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_SRTP
 | 
			
		||||
	char *srtp_profiles = NULL;
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
# ifndef OPENSSL_NO_NEXTPROTONEG
 | 
			
		||||
/* This the context that we pass to next_proto_cb */
 | 
			
		||||
typedef struct tlsextnextprotoctx_st {
 | 
			
		||||
	unsigned char *data;
 | 
			
		||||
	unsigned short len;
 | 
			
		||||
	int status;
 | 
			
		||||
} tlsextnextprotoctx;
 | 
			
		||||
 | 
			
		||||
static tlsextnextprotoctx next_proto;
 | 
			
		||||
 | 
			
		||||
static int next_proto_cb(SSL *s, unsigned char **out, unsigned char *outlen, const unsigned char *in, unsigned int inlen, void *arg)
 | 
			
		||||
	{
 | 
			
		||||
	tlsextnextprotoctx *ctx = arg;
 | 
			
		||||
 | 
			
		||||
	if (!c_quiet)
 | 
			
		||||
		{
 | 
			
		||||
		/* We can assume that |in| is syntactically valid. */
 | 
			
		||||
		unsigned i;
 | 
			
		||||
		BIO_printf(bio_c_out, "Protocols advertised by server: ");
 | 
			
		||||
		for (i = 0; i < inlen; )
 | 
			
		||||
			{
 | 
			
		||||
			if (i)
 | 
			
		||||
				BIO_write(bio_c_out, ", ", 2);
 | 
			
		||||
			BIO_write(bio_c_out, &in[i + 1], in[i]);
 | 
			
		||||
			i += in[i] + 1;
 | 
			
		||||
			}
 | 
			
		||||
		BIO_write(bio_c_out, "\n", 1);
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	ctx->status = SSL_select_next_proto(out, outlen, in, inlen, ctx->data, ctx->len);
 | 
			
		||||
	return SSL_TLSEXT_ERR_OK;
 | 
			
		||||
	}
 | 
			
		||||
# endif  /* ndef OPENSSL_NO_NEXTPROTONEG */
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
enum
 | 
			
		||||
@@ -384,6 +566,9 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	{
 | 
			
		||||
	unsigned int off=0, clr=0;
 | 
			
		||||
	SSL *con=NULL;
 | 
			
		||||
#ifndef OPENSSL_NO_KRB5
 | 
			
		||||
	KSSL_CTX *kctx;
 | 
			
		||||
#endif
 | 
			
		||||
	int s,k,width,state=0;
 | 
			
		||||
	char *cbuf=NULL,*sbuf=NULL,*mbuf=NULL;
 | 
			
		||||
	int cbuf_len,cbuf_off;
 | 
			
		||||
@@ -429,25 +614,28 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	char *servername = NULL; 
 | 
			
		||||
        tlsextctx tlsextcbp = 
 | 
			
		||||
        {NULL,0};
 | 
			
		||||
# ifndef OPENSSL_NO_NEXTPROTONEG
 | 
			
		||||
	const char *next_proto_neg_in = NULL;
 | 
			
		||||
# endif
 | 
			
		||||
#endif
 | 
			
		||||
	char *sess_in = NULL;
 | 
			
		||||
	char *sess_out = NULL;
 | 
			
		||||
	struct sockaddr peer;
 | 
			
		||||
	int peerlen = sizeof(peer);
 | 
			
		||||
	int fallback_scsv = 0;
 | 
			
		||||
	int enable_timeouts = 0 ;
 | 
			
		||||
	long socket_mtu = 0;
 | 
			
		||||
#ifndef OPENSSL_NO_JPAKE
 | 
			
		||||
	char *jpake_secret = NULL;
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#if !defined(OPENSSL_NO_SSL2) && !defined(OPENSSL_NO_SSL3)
 | 
			
		||||
	meth=SSLv23_client_method();
 | 
			
		||||
#elif !defined(OPENSSL_NO_SSL3)
 | 
			
		||||
	meth=SSLv3_client_method();
 | 
			
		||||
#elif !defined(OPENSSL_NO_SSL2)
 | 
			
		||||
	meth=SSLv2_client_method();
 | 
			
		||||
#ifndef OPENSSL_NO_SRP
 | 
			
		||||
	char * srppass = NULL;
 | 
			
		||||
	int srp_lateuser = 0;
 | 
			
		||||
	SRP_ARG srp_arg = {NULL,NULL,0,0,0,1024};
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	meth=SSLv23_client_method();
 | 
			
		||||
 | 
			
		||||
	apps_startup();
 | 
			
		||||
	c_Pause=0;
 | 
			
		||||
	c_quiet=0;
 | 
			
		||||
@@ -581,22 +769,57 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			psk_key=*(++argv);
 | 
			
		||||
			for (j = 0; j < strlen(psk_key); j++)
 | 
			
		||||
                                {
 | 
			
		||||
                                if (isxdigit((int)psk_key[j]))
 | 
			
		||||
                                if (isxdigit((unsigned char)psk_key[j]))
 | 
			
		||||
                                        continue;
 | 
			
		||||
                                BIO_printf(bio_err,"Not a hex number '%s'\n",*argv);
 | 
			
		||||
                                goto bad;
 | 
			
		||||
                                }
 | 
			
		||||
			}
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_SRP
 | 
			
		||||
		else if (strcmp(*argv,"-srpuser") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			srp_arg.srplogin= *(++argv);
 | 
			
		||||
			meth=TLSv1_client_method();
 | 
			
		||||
			}
 | 
			
		||||
		else if (strcmp(*argv,"-srppass") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			srppass= *(++argv);
 | 
			
		||||
			meth=TLSv1_client_method();
 | 
			
		||||
			}
 | 
			
		||||
		else if (strcmp(*argv,"-srp_strength") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			srp_arg.strength=atoi(*(++argv));
 | 
			
		||||
			BIO_printf(bio_err,"SRP minimal length for N is %d\n",srp_arg.strength);
 | 
			
		||||
			meth=TLSv1_client_method();
 | 
			
		||||
			}
 | 
			
		||||
		else if (strcmp(*argv,"-srp_lateuser") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			srp_lateuser= 1;
 | 
			
		||||
			meth=TLSv1_client_method();
 | 
			
		||||
			}
 | 
			
		||||
		else if	(strcmp(*argv,"-srp_moregroups") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			srp_arg.amp=1;
 | 
			
		||||
			meth=TLSv1_client_method();
 | 
			
		||||
			}
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_SSL2
 | 
			
		||||
		else if	(strcmp(*argv,"-ssl2") == 0)
 | 
			
		||||
			meth=SSLv2_client_method();
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_SSL3
 | 
			
		||||
#ifndef OPENSSL_NO_SSL3_METHOD
 | 
			
		||||
		else if	(strcmp(*argv,"-ssl3") == 0)
 | 
			
		||||
			meth=SSLv3_client_method();
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_TLS1
 | 
			
		||||
		else if	(strcmp(*argv,"-tls1_2") == 0)
 | 
			
		||||
			meth=TLSv1_2_client_method();
 | 
			
		||||
		else if	(strcmp(*argv,"-tls1_1") == 0)
 | 
			
		||||
			meth=TLSv1_1_client_method();
 | 
			
		||||
		else if	(strcmp(*argv,"-tls1") == 0)
 | 
			
		||||
			meth=TLSv1_client_method();
 | 
			
		||||
#endif
 | 
			
		||||
@@ -606,6 +829,10 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			meth=DTLSv1_client_method();
 | 
			
		||||
			socket_type=SOCK_DGRAM;
 | 
			
		||||
			}
 | 
			
		||||
		else if (strcmp(*argv,"-fallback_scsv") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			fallback_scsv = 1;
 | 
			
		||||
			}
 | 
			
		||||
		else if (strcmp(*argv,"-timeout") == 0)
 | 
			
		||||
			enable_timeouts=1;
 | 
			
		||||
		else if (strcmp(*argv,"-mtu") == 0)
 | 
			
		||||
@@ -645,6 +872,10 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			CAfile= *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
		else if (strcmp(*argv,"-no_tls1_2") == 0)
 | 
			
		||||
			off|=SSL_OP_NO_TLSv1_2;
 | 
			
		||||
		else if (strcmp(*argv,"-no_tls1_1") == 0)
 | 
			
		||||
			off|=SSL_OP_NO_TLSv1_1;
 | 
			
		||||
		else if (strcmp(*argv,"-no_tls1") == 0)
 | 
			
		||||
			off|=SSL_OP_NO_TLSv1;
 | 
			
		||||
		else if (strcmp(*argv,"-no_ssl3") == 0)
 | 
			
		||||
@@ -656,6 +887,13 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
#ifndef OPENSSL_NO_TLSEXT
 | 
			
		||||
		else if	(strcmp(*argv,"-no_ticket") == 0)
 | 
			
		||||
			{ off|=SSL_OP_NO_TICKET; }
 | 
			
		||||
# ifndef OPENSSL_NO_NEXTPROTONEG
 | 
			
		||||
		else if (strcmp(*argv,"-nextprotoneg") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			next_proto_neg_in = *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
# endif
 | 
			
		||||
#endif
 | 
			
		||||
		else if (strcmp(*argv,"-serverpref") == 0)
 | 
			
		||||
			off|=SSL_OP_CIPHER_SERVER_PREFERENCE;
 | 
			
		||||
@@ -723,7 +961,25 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			jpake_secret = *++argv;
 | 
			
		||||
			}
 | 
			
		||||
#endif
 | 
			
		||||
		else
 | 
			
		||||
#ifndef OPENSSL_NO_SRTP
 | 
			
		||||
		else if (strcmp(*argv,"-use_srtp") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			srtp_profiles = *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
#endif
 | 
			
		||||
		else if (strcmp(*argv,"-keymatexport") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			keymatexportlabel= *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
		else if (strcmp(*argv,"-keymatexportlen") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			keymatexportlen=atoi(*(++argv));
 | 
			
		||||
			if (keymatexportlen == 0) goto bad;
 | 
			
		||||
			}
 | 
			
		||||
                else
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(bio_err,"unknown option %s\n",*argv);
 | 
			
		||||
			badop=1;
 | 
			
		||||
@@ -749,19 +1005,33 @@ bad:
 | 
			
		||||
			goto end;
 | 
			
		||||
			}
 | 
			
		||||
		psk_identity = "JPAKE";
 | 
			
		||||
		if (cipher)
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(bio_err, "JPAKE sets cipher to PSK\n");
 | 
			
		||||
			goto end;
 | 
			
		||||
			}
 | 
			
		||||
		cipher = "PSK";
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	if (cipher)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf(bio_err, "JPAKE sets cipher to PSK\n");
 | 
			
		||||
		goto end;
 | 
			
		||||
		}
 | 
			
		||||
	cipher = "PSK";
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	OpenSSL_add_ssl_algorithms();
 | 
			
		||||
	SSL_load_error_strings();
 | 
			
		||||
 | 
			
		||||
#if !defined(OPENSSL_NO_TLSEXT) && !defined(OPENSSL_NO_NEXTPROTONEG)
 | 
			
		||||
	next_proto.status = -1;
 | 
			
		||||
	if (next_proto_neg_in)
 | 
			
		||||
		{
 | 
			
		||||
		next_proto.data = next_protos_parse(&next_proto.len, next_proto_neg_in);
 | 
			
		||||
		if (next_proto.data == NULL)
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(bio_err, "Error parsing -nextprotoneg argument\n");
 | 
			
		||||
			goto end;
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
	else
 | 
			
		||||
		next_proto.data = NULL;
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
        e = setup_engine(bio_err, engine_id, 1);
 | 
			
		||||
	if (ssl_client_engine_id)
 | 
			
		||||
@@ -835,6 +1105,14 @@ bad:
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_SRP
 | 
			
		||||
	if(!app_passwd(bio_err, srppass, NULL, &srp_arg.srppassin, NULL))
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf(bio_err, "Error getting password\n");
 | 
			
		||||
		goto end;
 | 
			
		||||
		}
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	ctx=SSL_CTX_new(meth);
 | 
			
		||||
	if (ctx == NULL)
 | 
			
		||||
		{
 | 
			
		||||
@@ -870,6 +1148,10 @@ bad:
 | 
			
		||||
			BIO_printf(bio_c_out, "PSK key given or JPAKE in use, setting client callback\n");
 | 
			
		||||
		SSL_CTX_set_psk_client_callback(ctx, psk_client_cb);
 | 
			
		||||
		}
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_SRTP
 | 
			
		||||
	if (srtp_profiles != NULL)
 | 
			
		||||
		SSL_CTX_set_tlsext_use_srtp(ctx, srtp_profiles);
 | 
			
		||||
#endif
 | 
			
		||||
	if (bugs)
 | 
			
		||||
		SSL_CTX_set_options(ctx,SSL_OP_ALL|off);
 | 
			
		||||
@@ -883,6 +1165,11 @@ bad:
 | 
			
		||||
	 */
 | 
			
		||||
	if (socket_type == SOCK_DGRAM) SSL_CTX_set_read_ahead(ctx, 1);
 | 
			
		||||
 | 
			
		||||
#if !defined(OPENSSL_NO_TLSEXT) && !defined(OPENSSL_NO_NEXTPROTONEG)
 | 
			
		||||
	if (next_proto.data)
 | 
			
		||||
		SSL_CTX_set_next_proto_select_cb(ctx, next_proto_cb, &next_proto);
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	if (state) SSL_CTX_set_info_callback(ctx,apps_ssl_info_callback);
 | 
			
		||||
	if (cipher != NULL)
 | 
			
		||||
		if(!SSL_CTX_set_cipher_list(ctx,cipher)) {
 | 
			
		||||
@@ -914,6 +1201,24 @@ bad:
 | 
			
		||||
		SSL_CTX_set_tlsext_servername_callback(ctx, ssl_servername_cb);
 | 
			
		||||
		SSL_CTX_set_tlsext_servername_arg(ctx, &tlsextcbp);
 | 
			
		||||
		}
 | 
			
		||||
#ifndef OPENSSL_NO_SRP
 | 
			
		||||
        if (srp_arg.srplogin)
 | 
			
		||||
		{
 | 
			
		||||
		if (!srp_lateuser && !SSL_CTX_set_srp_username(ctx, srp_arg.srplogin))
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(bio_err,"Unable to set SRP username\n");
 | 
			
		||||
			goto end;
 | 
			
		||||
			}
 | 
			
		||||
		srp_arg.msg = c_msg;
 | 
			
		||||
		srp_arg.debug = c_debug ;
 | 
			
		||||
		SSL_CTX_set_srp_cb_arg(ctx,&srp_arg);
 | 
			
		||||
		SSL_CTX_set_srp_client_pwd_callback(ctx, ssl_give_srp_client_pwd_cb);
 | 
			
		||||
		SSL_CTX_set_srp_strength(ctx, srp_arg.strength);
 | 
			
		||||
		if (c_msg || c_debug || srp_arg.amp == 0)
 | 
			
		||||
			SSL_CTX_set_srp_verify_param_callback(ctx, ssl_srp_verify_param_cb);
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
#endif
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	con=SSL_new(ctx);
 | 
			
		||||
@@ -940,6 +1245,10 @@ bad:
 | 
			
		||||
		SSL_set_session(con, sess);
 | 
			
		||||
		SSL_SESSION_free(sess);
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	if (fallback_scsv)
 | 
			
		||||
		SSL_set_mode(con, SSL_MODE_SEND_FALLBACK_SCSV);
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_TLSEXT
 | 
			
		||||
	if (servername != NULL)
 | 
			
		||||
		{
 | 
			
		||||
@@ -952,9 +1261,10 @@ bad:
 | 
			
		||||
		}
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_KRB5
 | 
			
		||||
	if (con  &&  (con->kssl_ctx = kssl_ctx_new()) != NULL)
 | 
			
		||||
	if (con  &&  (kctx = kssl_ctx_new()) != NULL)
 | 
			
		||||
                {
 | 
			
		||||
                kssl_ctx_setstring(con->kssl_ctx, KSSL_SERVER, host);
 | 
			
		||||
		SSL_set0_kssl_ctx(con, kctx);
 | 
			
		||||
                kssl_ctx_setstring(kctx, KSSL_SERVER, host);
 | 
			
		||||
		}
 | 
			
		||||
#endif	/* OPENSSL_NO_KRB5  */
 | 
			
		||||
/*	SSL_set_cipher_list(con,"RC4-MD5"); */
 | 
			
		||||
@@ -986,7 +1296,7 @@ re_start:
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
#endif                                              
 | 
			
		||||
	if (c_Pause & 0x01) con->debug=1;
 | 
			
		||||
	if (c_Pause & 0x01) SSL_set_debug(con, 1);
 | 
			
		||||
 | 
			
		||||
	if ( SSL_version(con) == DTLS1_VERSION)
 | 
			
		||||
		{
 | 
			
		||||
@@ -1013,10 +1323,22 @@ re_start:
 | 
			
		||||
			BIO_ctrl(sbio, BIO_CTRL_DGRAM_SET_SEND_TIMEOUT, 0, &timeout);
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
		if (socket_mtu > 28)
 | 
			
		||||
		if (socket_mtu)
 | 
			
		||||
			{
 | 
			
		||||
			if(socket_mtu < DTLS_get_link_min_mtu(con))
 | 
			
		||||
				{
 | 
			
		||||
				BIO_printf(bio_err,"MTU too small. Must be at least %ld\n",
 | 
			
		||||
					DTLS_get_link_min_mtu(con));
 | 
			
		||||
				BIO_free(sbio);
 | 
			
		||||
				goto shut;
 | 
			
		||||
				}
 | 
			
		||||
			SSL_set_options(con, SSL_OP_NO_QUERY_MTU);
 | 
			
		||||
			SSL_set_mtu(con, socket_mtu - 28);
 | 
			
		||||
			if(!DTLS_set_link_mtu(con, socket_mtu))
 | 
			
		||||
				{
 | 
			
		||||
				BIO_printf(bio_err, "Failed to set MTU\n");
 | 
			
		||||
				BIO_free(sbio);
 | 
			
		||||
				goto shut;
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
		else
 | 
			
		||||
			/* want to do MTU discovery */
 | 
			
		||||
@@ -1035,7 +1357,7 @@ re_start:
 | 
			
		||||
 | 
			
		||||
	if (c_debug)
 | 
			
		||||
		{
 | 
			
		||||
		con->debug=1;
 | 
			
		||||
		SSL_set_debug(con, 1);
 | 
			
		||||
		BIO_set_callback(sbio,bio_dump_callback);
 | 
			
		||||
		BIO_set_callback_arg(sbio,(char *)bio_c_out);
 | 
			
		||||
		}
 | 
			
		||||
@@ -1286,7 +1608,7 @@ SSL_set_tlsext_status_ids(con, ids);
 | 
			
		||||
					openssl_fdset(SSL_get_fd(con),&writefds);
 | 
			
		||||
			}
 | 
			
		||||
#endif
 | 
			
		||||
/*			printf("mode tty(%d %d%d) ssl(%d%d)\n",
 | 
			
		||||
/*-			printf("mode tty(%d %d%d) ssl(%d%d)\n",
 | 
			
		||||
				tty_on,read_tty,write_tty,read_ssl,write_ssl);*/
 | 
			
		||||
 | 
			
		||||
			/* Note: under VMS with SOCKETSHR the second parameter
 | 
			
		||||
@@ -1569,6 +1891,14 @@ printf("read=%d pending=%d peek=%d\n",k,SSL_pending(con),SSL_peek(con,zbuf,10240
 | 
			
		||||
				SSL_renegotiate(con);
 | 
			
		||||
				cbuf_len=0;
 | 
			
		||||
				}
 | 
			
		||||
#ifndef OPENSSL_NO_HEARTBEATS
 | 
			
		||||
			else if ((!c_ign_eof) && (cbuf[0] == 'B'))
 | 
			
		||||
 				{
 | 
			
		||||
				BIO_printf(bio_err,"HEARTBEATING\n");
 | 
			
		||||
				SSL_heartbeat(con);
 | 
			
		||||
				cbuf_len=0;
 | 
			
		||||
				}
 | 
			
		||||
#endif
 | 
			
		||||
			else
 | 
			
		||||
				{
 | 
			
		||||
				cbuf_len=i;
 | 
			
		||||
@@ -1596,6 +1926,10 @@ end:
 | 
			
		||||
			print_stuff(bio_c_out,con,1);
 | 
			
		||||
		SSL_free(con);
 | 
			
		||||
		}
 | 
			
		||||
#if !defined(OPENSSL_NO_TLSEXT) && !defined(OPENSSL_NO_NEXTPROTONEG)
 | 
			
		||||
	if (next_proto.data)
 | 
			
		||||
		OPENSSL_free(next_proto.data);
 | 
			
		||||
#endif
 | 
			
		||||
	if (ctx != NULL) SSL_CTX_free(ctx);
 | 
			
		||||
	if (cert)
 | 
			
		||||
		X509_free(cert);
 | 
			
		||||
@@ -1603,6 +1937,8 @@ end:
 | 
			
		||||
		EVP_PKEY_free(key);
 | 
			
		||||
	if (pass)
 | 
			
		||||
		OPENSSL_free(pass);
 | 
			
		||||
	if (vpm)
 | 
			
		||||
		X509_VERIFY_PARAM_free(vpm);
 | 
			
		||||
	if (cbuf != NULL) { OPENSSL_cleanse(cbuf,BUFSIZZ); OPENSSL_free(cbuf); }
 | 
			
		||||
	if (sbuf != NULL) { OPENSSL_cleanse(sbuf,BUFSIZZ); OPENSSL_free(sbuf); }
 | 
			
		||||
	if (mbuf != NULL) { OPENSSL_cleanse(mbuf,BUFSIZZ); OPENSSL_free(mbuf); }
 | 
			
		||||
@@ -1630,6 +1966,7 @@ static void print_stuff(BIO *bio, SSL *s, int full)
 | 
			
		||||
#ifndef OPENSSL_NO_COMP
 | 
			
		||||
	const COMP_METHOD *comp, *expansion;
 | 
			
		||||
#endif
 | 
			
		||||
	unsigned char *exportedkeymat;
 | 
			
		||||
 | 
			
		||||
	if (full)
 | 
			
		||||
		{
 | 
			
		||||
@@ -1659,7 +1996,9 @@ static void print_stuff(BIO *bio, SSL *s, int full)
 | 
			
		||||
		if (peer != NULL)
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(bio,"Server certificate\n");
 | 
			
		||||
			if (!(c_showcerts && got_a_chain)) /* Redundant if we showed the whole chain */
 | 
			
		||||
 | 
			
		||||
			/* Redundant if we showed the whole chain */
 | 
			
		||||
			if (!(c_showcerts && got_a_chain))
 | 
			
		||||
				PEM_write_bio_X509(bio,peer);
 | 
			
		||||
			X509_NAME_oneline(X509_get_subject_name(peer),
 | 
			
		||||
				buf,sizeof buf);
 | 
			
		||||
@@ -1720,7 +2059,7 @@ static void print_stuff(BIO *bio, SSL *s, int full)
 | 
			
		||||
			BIO_number_read(SSL_get_rbio(s)),
 | 
			
		||||
			BIO_number_written(SSL_get_wbio(s)));
 | 
			
		||||
		}
 | 
			
		||||
	BIO_printf(bio,((s->hit)?"---\nReused, ":"---\nNew, "));
 | 
			
		||||
	BIO_printf(bio,(SSL_cache_hit(s)?"---\nReused, ":"---\nNew, "));
 | 
			
		||||
	c=SSL_get_current_cipher(s);
 | 
			
		||||
	BIO_printf(bio,"%s, Cipher is %s\n",
 | 
			
		||||
		SSL_CIPHER_get_version(c),
 | 
			
		||||
@@ -1742,7 +2081,68 @@ static void print_stuff(BIO *bio, SSL *s, int full)
 | 
			
		||||
	BIO_printf(bio,"Expansion: %s\n",
 | 
			
		||||
		expansion ? SSL_COMP_get_name(expansion) : "NONE");
 | 
			
		||||
#endif
 | 
			
		||||
 
 | 
			
		||||
#ifdef SSL_DEBUG
 | 
			
		||||
	{
 | 
			
		||||
	/* Print out local port of connection: useful for debugging */
 | 
			
		||||
	int sock;
 | 
			
		||||
	struct sockaddr_in ladd;
 | 
			
		||||
	socklen_t ladd_size = sizeof(ladd);
 | 
			
		||||
	sock = SSL_get_fd(s);
 | 
			
		||||
	getsockname(sock, (struct sockaddr *)&ladd, &ladd_size);
 | 
			
		||||
	BIO_printf(bio_c_out, "LOCAL PORT is %u\n", ntohs(ladd.sin_port));
 | 
			
		||||
	}
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#if !defined(OPENSSL_NO_TLSEXT) && !defined(OPENSSL_NO_NEXTPROTONEG)
 | 
			
		||||
	if (next_proto.status != -1) {
 | 
			
		||||
		const unsigned char *proto;
 | 
			
		||||
		unsigned int proto_len;
 | 
			
		||||
		SSL_get0_next_proto_negotiated(s, &proto, &proto_len);
 | 
			
		||||
		BIO_printf(bio, "Next protocol: (%d) ", next_proto.status);
 | 
			
		||||
		BIO_write(bio, proto, proto_len);
 | 
			
		||||
		BIO_write(bio, "\n", 1);
 | 
			
		||||
	}
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_SRTP
 | 
			
		||||
 	{
 | 
			
		||||
 	SRTP_PROTECTION_PROFILE *srtp_profile=SSL_get_selected_srtp_profile(s);
 | 
			
		||||
 
 | 
			
		||||
	if(srtp_profile)
 | 
			
		||||
		BIO_printf(bio,"SRTP Extension negotiated, profile=%s\n",
 | 
			
		||||
			   srtp_profile->name);
 | 
			
		||||
	}
 | 
			
		||||
#endif
 | 
			
		||||
 
 | 
			
		||||
	SSL_SESSION_print(bio,SSL_get_session(s));
 | 
			
		||||
	if (keymatexportlabel != NULL)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf(bio, "Keying material exporter:\n");
 | 
			
		||||
		BIO_printf(bio, "    Label: '%s'\n", keymatexportlabel);
 | 
			
		||||
		BIO_printf(bio, "    Length: %i bytes\n", keymatexportlen);
 | 
			
		||||
		exportedkeymat = OPENSSL_malloc(keymatexportlen);
 | 
			
		||||
		if (exportedkeymat != NULL)
 | 
			
		||||
			{
 | 
			
		||||
			if (!SSL_export_keying_material(s, exportedkeymat,
 | 
			
		||||
						        keymatexportlen,
 | 
			
		||||
						        keymatexportlabel,
 | 
			
		||||
						        strlen(keymatexportlabel),
 | 
			
		||||
						        NULL, 0, 0))
 | 
			
		||||
				{
 | 
			
		||||
				BIO_printf(bio, "    Error\n");
 | 
			
		||||
				}
 | 
			
		||||
			else
 | 
			
		||||
				{
 | 
			
		||||
				BIO_printf(bio, "    Keying material: ");
 | 
			
		||||
				for (i=0; i<keymatexportlen; i++)
 | 
			
		||||
					BIO_printf(bio, "%02X",
 | 
			
		||||
						   exportedkeymat[i]);
 | 
			
		||||
				BIO_printf(bio, "\n");
 | 
			
		||||
				}
 | 
			
		||||
			OPENSSL_free(exportedkeymat);
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
	BIO_printf(bio,"---\n");
 | 
			
		||||
	if (peer != NULL)
 | 
			
		||||
		X509_free(peer);
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										424
									
								
								apps/s_server.c
									
									
									
									
									
								
							
							
						
						
									
										424
									
								
								apps/s_server.c
									
									
									
									
									
								
							@@ -157,7 +157,8 @@
 | 
			
		||||
#define APPS_WIN16
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#if !defined(OPENSSL_SYS_NETWARE)  /* conflicts with winsock2 stuff on netware */
 | 
			
		||||
/* conflicts with winsock2 stuff on netware */
 | 
			
		||||
#if !defined(OPENSSL_SYS_NETWARE)
 | 
			
		||||
#include <sys/types.h>
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
@@ -186,6 +187,9 @@ typedef unsigned int u_int;
 | 
			
		||||
#ifndef OPENSSL_NO_RSA
 | 
			
		||||
#include <openssl/rsa.h>
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_SRP
 | 
			
		||||
#include <openssl/srp.h>
 | 
			
		||||
#endif
 | 
			
		||||
#include "s_apps.h"
 | 
			
		||||
#include "timeouts.h"
 | 
			
		||||
 | 
			
		||||
@@ -290,6 +294,9 @@ static int cert_status_cb(SSL *s, void *arg);
 | 
			
		||||
static int s_msg=0;
 | 
			
		||||
static int s_quiet=0;
 | 
			
		||||
 | 
			
		||||
static char *keymatexportlabel=NULL;
 | 
			
		||||
static int keymatexportlen=20;
 | 
			
		||||
 | 
			
		||||
static int hack=0;
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
static char *engine_id=NULL;
 | 
			
		||||
@@ -302,6 +309,7 @@ static long socket_mtu;
 | 
			
		||||
static int cert_chain = 0;
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_PSK
 | 
			
		||||
static char *psk_identity="Client_identity";
 | 
			
		||||
char *psk_key=NULL; /* by default PSK is not used */
 | 
			
		||||
@@ -369,6 +377,52 @@ static unsigned int psk_server_cb(SSL *ssl, const char *identity,
 | 
			
		||||
        }
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_SRP
 | 
			
		||||
/* This is a context that we pass to callbacks */
 | 
			
		||||
typedef struct srpsrvparm_st
 | 
			
		||||
	{
 | 
			
		||||
	char *login;
 | 
			
		||||
	SRP_VBASE *vb;
 | 
			
		||||
	SRP_user_pwd *user;
 | 
			
		||||
	} srpsrvparm;
 | 
			
		||||
 | 
			
		||||
/* This callback pretends to require some asynchronous logic in order to obtain
 | 
			
		||||
   a verifier. When the callback is called for a new connection we return
 | 
			
		||||
   with a negative value. This will provoke the accept etc to return with
 | 
			
		||||
   an LOOKUP_X509. The main logic of the reinvokes the suspended call 
 | 
			
		||||
   (which would normally occur after a worker has finished) and we
 | 
			
		||||
   set the user parameters. 
 | 
			
		||||
*/
 | 
			
		||||
static int MS_CALLBACK ssl_srp_server_param_cb(SSL *s, int *ad, void *arg)
 | 
			
		||||
	{
 | 
			
		||||
	srpsrvparm *p = (srpsrvparm *)arg;
 | 
			
		||||
	if (p->login == NULL && p->user == NULL )
 | 
			
		||||
		{
 | 
			
		||||
		p->login = SSL_get_srp_username(s);
 | 
			
		||||
		BIO_printf(bio_err, "SRP username = \"%s\"\n", p->login);
 | 
			
		||||
		return (-1) ;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	if (p->user == NULL)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf(bio_err, "User %s doesn't exist\n", p->login);
 | 
			
		||||
		return SSL3_AL_FATAL;
 | 
			
		||||
		}
 | 
			
		||||
	if (SSL_set_srp_server_param(s, p->user->N, p->user->g, p->user->s, p->user->v,
 | 
			
		||||
				     p->user->info) < 0)
 | 
			
		||||
		{
 | 
			
		||||
		*ad = SSL_AD_INTERNAL_ERROR;
 | 
			
		||||
		return SSL3_AL_FATAL;
 | 
			
		||||
		}
 | 
			
		||||
	BIO_printf(bio_err, "SRP parameters set: username = \"%s\" info=\"%s\" \n", p->login,p->user->info);
 | 
			
		||||
	/* need to check whether there are memory leaks */
 | 
			
		||||
	p->user = NULL;
 | 
			
		||||
	p->login = NULL;
 | 
			
		||||
	return SSL_ERROR_NONE;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#ifdef MONOLITH
 | 
			
		||||
static void s_server_init(void)
 | 
			
		||||
	{
 | 
			
		||||
@@ -410,6 +464,7 @@ static void sv_usage(void)
 | 
			
		||||
	BIO_printf(bio_err," -context arg  - set session ID context\n");
 | 
			
		||||
	BIO_printf(bio_err," -verify arg   - turn on peer certificate verification\n");
 | 
			
		||||
	BIO_printf(bio_err," -Verify arg   - turn on peer certificate verification, must have a cert.\n");
 | 
			
		||||
	BIO_printf(bio_err," -verify_return_error - return verification errors\n");
 | 
			
		||||
	BIO_printf(bio_err," -cert arg     - certificate file to use\n");
 | 
			
		||||
	BIO_printf(bio_err,"                 (default is %s)\n",TEST_CERT);
 | 
			
		||||
	BIO_printf(bio_err," -crl_check    - check the peer certificate has not been revoked by its CA.\n" \
 | 
			
		||||
@@ -455,9 +510,17 @@ static void sv_usage(void)
 | 
			
		||||
# ifndef OPENSSL_NO_JPAKE
 | 
			
		||||
	BIO_printf(bio_err," -jpake arg    - JPAKE secret to use\n");
 | 
			
		||||
# endif
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_SRP
 | 
			
		||||
	BIO_printf(bio_err," -srpvfile file      - The verifier file for SRP\n");
 | 
			
		||||
	BIO_printf(bio_err," -srpuserseed string - A seed string for a default user salt.\n");
 | 
			
		||||
#endif
 | 
			
		||||
	BIO_printf(bio_err," -ssl2         - Just talk SSLv2\n");
 | 
			
		||||
#ifndef OPENSSL_NO_SSL3_METHOD
 | 
			
		||||
	BIO_printf(bio_err," -ssl3         - Just talk SSLv3\n");
 | 
			
		||||
#endif
 | 
			
		||||
	BIO_printf(bio_err," -tls1_2       - Just talk TLSv1.2\n");
 | 
			
		||||
	BIO_printf(bio_err," -tls1_1       - Just talk TLSv1.1\n");
 | 
			
		||||
	BIO_printf(bio_err," -tls1         - Just talk TLSv1\n");
 | 
			
		||||
	BIO_printf(bio_err," -dtls1        - Just talk DTLSv1\n");
 | 
			
		||||
	BIO_printf(bio_err," -timeout      - Enable timeouts\n");
 | 
			
		||||
@@ -466,6 +529,8 @@ static void sv_usage(void)
 | 
			
		||||
	BIO_printf(bio_err," -no_ssl2      - Just disable SSLv2\n");
 | 
			
		||||
	BIO_printf(bio_err," -no_ssl3      - Just disable SSLv3\n");
 | 
			
		||||
	BIO_printf(bio_err," -no_tls1      - Just disable TLSv1\n");
 | 
			
		||||
	BIO_printf(bio_err," -no_tls1_1    - Just disable TLSv1.1\n");
 | 
			
		||||
	BIO_printf(bio_err," -no_tls1_2    - Just disable TLSv1.2\n");
 | 
			
		||||
#ifndef OPENSSL_NO_DH
 | 
			
		||||
	BIO_printf(bio_err," -no_dhe       - Disable ephemeral DH\n");
 | 
			
		||||
#endif
 | 
			
		||||
@@ -473,6 +538,7 @@ static void sv_usage(void)
 | 
			
		||||
	BIO_printf(bio_err," -no_ecdhe     - Disable ephemeral ECDH\n");
 | 
			
		||||
#endif
 | 
			
		||||
	BIO_printf(bio_err," -bugs         - Turn on SSL bug compatibility\n");
 | 
			
		||||
	BIO_printf(bio_err," -hack         - workaround for early Netscape code\n");
 | 
			
		||||
	BIO_printf(bio_err," -www          - Respond to a 'GET /' with a status page\n");
 | 
			
		||||
	BIO_printf(bio_err," -WWW          - Respond to a 'GET /<path> HTTP/1.0' with file ./<path>\n");
 | 
			
		||||
	BIO_printf(bio_err," -HTTP         - Respond to a 'GET /<path> HTTP/1.0' with file ./<path>\n");
 | 
			
		||||
@@ -492,7 +558,19 @@ static void sv_usage(void)
 | 
			
		||||
	BIO_printf(bio_err," -tlsextdebug  - hex dump of all TLS extensions received\n");
 | 
			
		||||
	BIO_printf(bio_err," -no_ticket    - disable use of RFC4507bis session tickets\n");
 | 
			
		||||
	BIO_printf(bio_err," -legacy_renegotiation - enable use of legacy renegotiation (dangerous)\n");
 | 
			
		||||
# ifndef OPENSSL_NO_NEXTPROTONEG
 | 
			
		||||
	BIO_printf(bio_err," -nextprotoneg arg - set the advertised protocols for the NPN extension (comma-separated list)\n");
 | 
			
		||||
# endif
 | 
			
		||||
# ifndef OPENSSL_NO_SRTP
 | 
			
		||||
        BIO_printf(bio_err," -use_srtp profiles - Offer SRTP key management with a colon-separated profile list\n");
 | 
			
		||||
# endif
 | 
			
		||||
#endif
 | 
			
		||||
	BIO_printf(bio_err," -keymatexport label   - Export keying material using label\n");
 | 
			
		||||
	BIO_printf(bio_err," -keymatexportlen len  - Export len bytes of keying material (default 20)\n");
 | 
			
		||||
	BIO_printf(bio_err," -status           - respond to certificate status requests\n");
 | 
			
		||||
	BIO_printf(bio_err," -status_verbose   - enable status request verbose printout\n");
 | 
			
		||||
	BIO_printf(bio_err," -status_timeout n - status request responder timeout\n");
 | 
			
		||||
	BIO_printf(bio_err," -status_url URL   - status request fallback URL\n");
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
static int local_argc=0;
 | 
			
		||||
@@ -670,7 +748,7 @@ static int MS_CALLBACK ssl_servername_cb(SSL *s, int *ad, void *arg)
 | 
			
		||||
	
 | 
			
		||||
	if (servername)
 | 
			
		||||
		{
 | 
			
		||||
    		if (strcmp(servername,p->servername)) 
 | 
			
		||||
    		if (strcasecmp(servername,p->servername)) 
 | 
			
		||||
			return p->extension_error;
 | 
			
		||||
		if (ctx2)
 | 
			
		||||
			{
 | 
			
		||||
@@ -826,6 +904,26 @@ BIO_printf(err, "cert_status: received %d ids\n", sk_OCSP_RESPID_num(ids));
 | 
			
		||||
	ret = SSL_TLSEXT_ERR_ALERT_FATAL;
 | 
			
		||||
	goto done;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
# ifndef OPENSSL_NO_NEXTPROTONEG
 | 
			
		||||
/* This is the context that we pass to next_proto_cb */
 | 
			
		||||
typedef struct tlsextnextprotoctx_st {
 | 
			
		||||
	unsigned char *data;
 | 
			
		||||
	unsigned int len;
 | 
			
		||||
} tlsextnextprotoctx;
 | 
			
		||||
 | 
			
		||||
static int next_proto_cb(SSL *s, const unsigned char **data, unsigned int *len, void *arg)
 | 
			
		||||
	{
 | 
			
		||||
	tlsextnextprotoctx *next_proto = arg;
 | 
			
		||||
 | 
			
		||||
	*data = next_proto->data;
 | 
			
		||||
	*len = next_proto->len;
 | 
			
		||||
 | 
			
		||||
	return SSL_TLSEXT_ERR_OK;
 | 
			
		||||
	}
 | 
			
		||||
# endif  /* ndef OPENSSL_NO_NEXTPROTONEG */
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
int MAIN(int, char **);
 | 
			
		||||
@@ -833,6 +931,12 @@ int MAIN(int, char **);
 | 
			
		||||
#ifndef OPENSSL_NO_JPAKE
 | 
			
		||||
static char *jpake_secret = NULL;
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_SRP
 | 
			
		||||
	static srpsrvparm srp_callback_parm;
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_SRTP
 | 
			
		||||
static char *srtp_profiles = NULL;
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
int MAIN(int argc, char *argv[])
 | 
			
		||||
	{
 | 
			
		||||
@@ -864,21 +968,21 @@ int MAIN(int argc, char *argv[])
 | 
			
		||||
#ifndef OPENSSL_NO_TLSEXT
 | 
			
		||||
	EVP_PKEY *s_key2 = NULL;
 | 
			
		||||
	X509 *s_cert2 = NULL;
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_TLSEXT
 | 
			
		||||
        tlsextctx tlsextcbp = {NULL, NULL, SSL_TLSEXT_ERR_ALERT_WARNING};
 | 
			
		||||
# ifndef OPENSSL_NO_NEXTPROTONEG
 | 
			
		||||
	const char *next_proto_neg_in = NULL;
 | 
			
		||||
	tlsextnextprotoctx next_proto;
 | 
			
		||||
# endif
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_PSK
 | 
			
		||||
	/* by default do not send a PSK identity hint */
 | 
			
		||||
	static char *psk_identity_hint=NULL;
 | 
			
		||||
#endif
 | 
			
		||||
#if !defined(OPENSSL_NO_SSL2) && !defined(OPENSSL_NO_SSL3)
 | 
			
		||||
	meth=SSLv23_server_method();
 | 
			
		||||
#elif !defined(OPENSSL_NO_SSL3)
 | 
			
		||||
	meth=SSLv3_server_method();
 | 
			
		||||
#elif !defined(OPENSSL_NO_SSL2)
 | 
			
		||||
	meth=SSLv2_server_method();
 | 
			
		||||
#ifndef OPENSSL_NO_SRP
 | 
			
		||||
	char *srpuserseed = NULL;
 | 
			
		||||
	char *srp_verifier_file = NULL;
 | 
			
		||||
#endif
 | 
			
		||||
	meth=SSLv23_server_method();
 | 
			
		||||
 | 
			
		||||
	local_argc=argc;
 | 
			
		||||
	local_argv=argv;
 | 
			
		||||
@@ -1103,12 +1207,26 @@ int MAIN(int argc, char *argv[])
 | 
			
		||||
			psk_key=*(++argv);
 | 
			
		||||
			for (i=0; i<strlen(psk_key); i++)
 | 
			
		||||
				{
 | 
			
		||||
				if (isxdigit((int)psk_key[i]))
 | 
			
		||||
				if (isxdigit((unsigned char)psk_key[i]))
 | 
			
		||||
					continue;
 | 
			
		||||
				BIO_printf(bio_err,"Not a hex number '%s'\n",*argv);
 | 
			
		||||
				goto bad;
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_SRP
 | 
			
		||||
		else if (strcmp(*argv, "-srpvfile") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			srp_verifier_file = *(++argv);
 | 
			
		||||
			meth = TLSv1_server_method();
 | 
			
		||||
			}
 | 
			
		||||
		else if (strcmp(*argv, "-srpuserseed") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			srpuserseed = *(++argv);
 | 
			
		||||
			meth = TLSv1_server_method();
 | 
			
		||||
			}
 | 
			
		||||
#endif
 | 
			
		||||
		else if	(strcmp(*argv,"-www") == 0)
 | 
			
		||||
			{ www=1; }
 | 
			
		||||
@@ -1122,6 +1240,10 @@ int MAIN(int argc, char *argv[])
 | 
			
		||||
			{ off|=SSL_OP_NO_SSLv3; }
 | 
			
		||||
		else if	(strcmp(*argv,"-no_tls1") == 0)
 | 
			
		||||
			{ off|=SSL_OP_NO_TLSv1; }
 | 
			
		||||
		else if	(strcmp(*argv,"-no_tls1_1") == 0)
 | 
			
		||||
			{ off|=SSL_OP_NO_TLSv1_1; }
 | 
			
		||||
		else if	(strcmp(*argv,"-no_tls1_2") == 0)
 | 
			
		||||
			{ off|=SSL_OP_NO_TLSv1_2; }
 | 
			
		||||
		else if	(strcmp(*argv,"-no_comp") == 0)
 | 
			
		||||
			{ off|=SSL_OP_NO_COMPRESSION; }
 | 
			
		||||
#ifndef OPENSSL_NO_TLSEXT
 | 
			
		||||
@@ -1132,13 +1254,17 @@ int MAIN(int argc, char *argv[])
 | 
			
		||||
		else if	(strcmp(*argv,"-ssl2") == 0)
 | 
			
		||||
			{ meth=SSLv2_server_method(); }
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_SSL3
 | 
			
		||||
#ifndef OPENSSL_NO_SSL3_METHOD
 | 
			
		||||
		else if	(strcmp(*argv,"-ssl3") == 0)
 | 
			
		||||
			{ meth=SSLv3_server_method(); }
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_TLS1
 | 
			
		||||
		else if	(strcmp(*argv,"-tls1") == 0)
 | 
			
		||||
			{ meth=TLSv1_server_method(); }
 | 
			
		||||
		else if	(strcmp(*argv,"-tls1_1") == 0)
 | 
			
		||||
			{ meth=TLSv1_1_server_method(); }
 | 
			
		||||
		else if	(strcmp(*argv,"-tls1_2") == 0)
 | 
			
		||||
			{ meth=TLSv1_2_server_method(); }
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_DTLS1
 | 
			
		||||
		else if	(strcmp(*argv,"-dtls1") == 0)
 | 
			
		||||
@@ -1191,7 +1317,13 @@ int MAIN(int argc, char *argv[])
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			s_key_file2= *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
			
 | 
			
		||||
# ifndef OPENSSL_NO_NEXTPROTONEG
 | 
			
		||||
		else if	(strcmp(*argv,"-nextprotoneg") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			next_proto_neg_in = *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
# endif
 | 
			
		||||
#endif
 | 
			
		||||
#if !defined(OPENSSL_NO_JPAKE) && !defined(OPENSSL_NO_PSK)
 | 
			
		||||
		else if (strcmp(*argv,"-jpake") == 0)
 | 
			
		||||
@@ -1200,6 +1332,24 @@ int MAIN(int argc, char *argv[])
 | 
			
		||||
			jpake_secret = *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_SRTP
 | 
			
		||||
		else if (strcmp(*argv,"-use_srtp") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			srtp_profiles = *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
#endif
 | 
			
		||||
		else if (strcmp(*argv,"-keymatexport") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			keymatexportlabel= *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
		else if (strcmp(*argv,"-keymatexportlen") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			keymatexportlen=atoi(*(++argv));
 | 
			
		||||
			if (keymatexportlen == 0) goto bad;
 | 
			
		||||
			}
 | 
			
		||||
		else
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(bio_err,"unknown option %s\n",*argv);
 | 
			
		||||
@@ -1215,6 +1365,14 @@ bad:
 | 
			
		||||
		sv_usage();
 | 
			
		||||
		goto end;
 | 
			
		||||
		}
 | 
			
		||||
#ifndef OPENSSL_NO_DTLS1
 | 
			
		||||
	if (www && socket_type == SOCK_DGRAM)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf(bio_err,
 | 
			
		||||
				"Can't use -HTTP, -www or -WWW with DTLS\n");
 | 
			
		||||
		goto end;
 | 
			
		||||
		}
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#if !defined(OPENSSL_NO_JPAKE) && !defined(OPENSSL_NO_PSK)
 | 
			
		||||
	if (jpake_secret)
 | 
			
		||||
@@ -1299,6 +1457,21 @@ bad:
 | 
			
		||||
#endif
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
#if !defined(OPENSSL_NO_TLSEXT) && !defined(OPENSSL_NO_NEXTPROTONEG) 
 | 
			
		||||
	if (next_proto_neg_in)
 | 
			
		||||
		{
 | 
			
		||||
		unsigned short len;
 | 
			
		||||
		next_proto.data = next_protos_parse(&len, next_proto_neg_in);
 | 
			
		||||
		if (next_proto.data == NULL)
 | 
			
		||||
			goto end;
 | 
			
		||||
		next_proto.len = len;
 | 
			
		||||
		}
 | 
			
		||||
	else
 | 
			
		||||
		{
 | 
			
		||||
		next_proto.data = NULL;
 | 
			
		||||
		}
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
	if (s_dcert_file)
 | 
			
		||||
		{
 | 
			
		||||
@@ -1399,6 +1572,11 @@ bad:
 | 
			
		||||
	else
 | 
			
		||||
		SSL_CTX_sess_set_cache_size(ctx,128);
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_SRTP
 | 
			
		||||
	if (srtp_profiles != NULL)
 | 
			
		||||
		SSL_CTX_set_tlsext_use_srtp(ctx, srtp_profiles);
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#if 0
 | 
			
		||||
	if (cipher == NULL) cipher=getenv("SSL_CIPHER");
 | 
			
		||||
#endif
 | 
			
		||||
@@ -1476,6 +1654,11 @@ bad:
 | 
			
		||||
		if (vpm)
 | 
			
		||||
			SSL_CTX_set1_param(ctx2, vpm);
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
# ifndef OPENSSL_NO_NEXTPROTONEG
 | 
			
		||||
	if (next_proto.data)
 | 
			
		||||
		SSL_CTX_set_next_protos_advertised_cb(ctx, next_proto_cb, &next_proto);
 | 
			
		||||
# endif
 | 
			
		||||
#endif 
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_DH
 | 
			
		||||
@@ -1571,7 +1754,7 @@ bad:
 | 
			
		||||
		}
 | 
			
		||||
#endif
 | 
			
		||||
	
 | 
			
		||||
	if (!set_cert_key_stuff(ctx,s_cert,s_key))
 | 
			
		||||
	if (!set_cert_key_stuff(ctx, s_cert, s_key))
 | 
			
		||||
		goto end;
 | 
			
		||||
#ifndef OPENSSL_NO_TLSEXT
 | 
			
		||||
	if (ctx2 && !set_cert_key_stuff(ctx2,s_cert2,s_key2))
 | 
			
		||||
@@ -1579,7 +1762,7 @@ bad:
 | 
			
		||||
#endif
 | 
			
		||||
	if (s_dcert != NULL)
 | 
			
		||||
		{
 | 
			
		||||
		if (!set_cert_key_stuff(ctx,s_dcert,s_dkey))
 | 
			
		||||
		if (!set_cert_key_stuff(ctx, s_dcert, s_dkey))
 | 
			
		||||
			goto end;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
@@ -1684,6 +1867,25 @@ bad:
 | 
			
		||||
		}
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_SRP
 | 
			
		||||
	if (srp_verifier_file != NULL)
 | 
			
		||||
		{
 | 
			
		||||
		srp_callback_parm.vb = SRP_VBASE_new(srpuserseed);
 | 
			
		||||
		srp_callback_parm.user = NULL;
 | 
			
		||||
		srp_callback_parm.login = NULL;
 | 
			
		||||
		if ((ret = SRP_VBASE_init(srp_callback_parm.vb, srp_verifier_file)) != SRP_NO_ERROR)
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(bio_err,
 | 
			
		||||
				   "Cannot initialize SRP verifier file \"%s\":ret=%d\n",
 | 
			
		||||
				   srp_verifier_file, ret);
 | 
			
		||||
				goto end;
 | 
			
		||||
			}
 | 
			
		||||
		SSL_CTX_set_verify(ctx, SSL_VERIFY_NONE,verify_callback);
 | 
			
		||||
		SSL_CTX_set_srp_cb_arg(ctx, &srp_callback_parm);  			
 | 
			
		||||
		SSL_CTX_set_srp_username_callback(ctx, ssl_srp_server_param_cb);
 | 
			
		||||
		}
 | 
			
		||||
	else
 | 
			
		||||
#endif
 | 
			
		||||
	if (CAfile != NULL)
 | 
			
		||||
		{
 | 
			
		||||
		SSL_CTX_set_client_CA_list(ctx,SSL_load_client_CA_file(CAfile));
 | 
			
		||||
@@ -1715,7 +1917,15 @@ end:
 | 
			
		||||
		OPENSSL_free(pass);
 | 
			
		||||
	if (dpass)
 | 
			
		||||
		OPENSSL_free(dpass);
 | 
			
		||||
	if (vpm)
 | 
			
		||||
		X509_VERIFY_PARAM_free(vpm);
 | 
			
		||||
#ifndef OPENSSL_NO_TLSEXT
 | 
			
		||||
	if (tlscstatp.host)
 | 
			
		||||
		OPENSSL_free(tlscstatp.host);
 | 
			
		||||
	if (tlscstatp.port)
 | 
			
		||||
		OPENSSL_free(tlscstatp.port);
 | 
			
		||||
	if (tlscstatp.path)
 | 
			
		||||
		OPENSSL_free(tlscstatp.path);
 | 
			
		||||
	if (ctx2 != NULL) SSL_CTX_free(ctx2);
 | 
			
		||||
	if (s_cert2)
 | 
			
		||||
		X509_free(s_cert2);
 | 
			
		||||
@@ -1765,6 +1975,9 @@ static int sv_body(char *hostname, int s, unsigned char *context)
 | 
			
		||||
	unsigned long l;
 | 
			
		||||
	SSL *con=NULL;
 | 
			
		||||
	BIO *sbio;
 | 
			
		||||
#ifndef OPENSSL_NO_KRB5
 | 
			
		||||
	KSSL_CTX *kctx;
 | 
			
		||||
#endif
 | 
			
		||||
	struct timeval timeout;
 | 
			
		||||
#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS) || defined(OPENSSL_SYS_NETWARE) || defined(OPENSSL_SYS_BEOS_R5)
 | 
			
		||||
	struct timeval tv;
 | 
			
		||||
@@ -1805,12 +2018,11 @@ static int sv_body(char *hostname, int s, unsigned char *context)
 | 
			
		||||
		}
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_KRB5
 | 
			
		||||
		if ((con->kssl_ctx = kssl_ctx_new()) != NULL)
 | 
			
		||||
		if ((kctx = kssl_ctx_new()) != NULL)
 | 
			
		||||
                        {
 | 
			
		||||
                        kssl_ctx_setstring(con->kssl_ctx, KSSL_SERVICE,
 | 
			
		||||
								KRB5SVC);
 | 
			
		||||
                        kssl_ctx_setstring(con->kssl_ctx, KSSL_KEYTAB,
 | 
			
		||||
								KRB5KEYTAB);
 | 
			
		||||
			SSL_set0_kssl_ctx(con, kctx);
 | 
			
		||||
                        kssl_ctx_setstring(kctx, KSSL_SERVICE, KRB5SVC);
 | 
			
		||||
                        kssl_ctx_setstring(kctx, KSSL_KEYTAB, KRB5KEYTAB);
 | 
			
		||||
                        }
 | 
			
		||||
#endif	/* OPENSSL_NO_KRB5 */
 | 
			
		||||
		if(context)
 | 
			
		||||
@@ -1840,10 +2052,24 @@ static int sv_body(char *hostname, int s, unsigned char *context)
 | 
			
		||||
			BIO_ctrl(sbio, BIO_CTRL_DGRAM_SET_SEND_TIMEOUT, 0, &timeout);
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
		if (socket_mtu > 28)
 | 
			
		||||
		if (socket_mtu)
 | 
			
		||||
			{
 | 
			
		||||
			if(socket_mtu < DTLS_get_link_min_mtu(con))
 | 
			
		||||
				{
 | 
			
		||||
				BIO_printf(bio_err,"MTU too small. Must be at least %ld\n",
 | 
			
		||||
					DTLS_get_link_min_mtu(con));
 | 
			
		||||
				ret = -1;
 | 
			
		||||
				BIO_free(sbio);
 | 
			
		||||
				goto err;
 | 
			
		||||
				}
 | 
			
		||||
			SSL_set_options(con, SSL_OP_NO_QUERY_MTU);
 | 
			
		||||
			SSL_set_mtu(con, socket_mtu - 28);
 | 
			
		||||
			if(!DTLS_set_link_mtu(con, socket_mtu))
 | 
			
		||||
				{
 | 
			
		||||
				BIO_printf(bio_err, "Failed to set MTU\n");
 | 
			
		||||
				ret = -1;
 | 
			
		||||
				BIO_free(sbio);
 | 
			
		||||
				goto err;
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
		else
 | 
			
		||||
			/* want to do MTU discovery */
 | 
			
		||||
@@ -1873,7 +2099,7 @@ static int sv_body(char *hostname, int s, unsigned char *context)
 | 
			
		||||
 | 
			
		||||
	if (s_debug)
 | 
			
		||||
		{
 | 
			
		||||
		con->debug=1;
 | 
			
		||||
		SSL_set_debug(con, 1);
 | 
			
		||||
		BIO_set_callback(SSL_get_rbio(con),bio_dump_callback);
 | 
			
		||||
		BIO_set_callback_arg(SSL_get_rbio(con),(char *)bio_s_out);
 | 
			
		||||
		}
 | 
			
		||||
@@ -2002,6 +2228,16 @@ static int sv_body(char *hostname, int s, unsigned char *context)
 | 
			
		||||
					goto err;
 | 
			
		||||
					}
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_HEARTBEATS
 | 
			
		||||
				if ((buf[0] == 'B') &&
 | 
			
		||||
					((buf[1] == '\n') || (buf[1] == '\r')))
 | 
			
		||||
					{
 | 
			
		||||
					BIO_printf(bio_err,"HEARTBEATING\n");
 | 
			
		||||
					SSL_heartbeat(con);
 | 
			
		||||
					i=0;
 | 
			
		||||
					continue;
 | 
			
		||||
					}
 | 
			
		||||
#endif
 | 
			
		||||
				if ((buf[0] == 'r') && 
 | 
			
		||||
					((buf[1] == '\n') || (buf[1] == '\r')))
 | 
			
		||||
					{
 | 
			
		||||
@@ -2045,6 +2281,18 @@ static int sv_body(char *hostname, int s, unsigned char *context)
 | 
			
		||||
{ static count=0; if (++count == 100) { count=0; SSL_renegotiate(con); } }
 | 
			
		||||
#endif
 | 
			
		||||
				k=SSL_write(con,&(buf[l]),(unsigned int)i);
 | 
			
		||||
#ifndef OPENSSL_NO_SRP
 | 
			
		||||
				while (SSL_get_error(con,k) == SSL_ERROR_WANT_X509_LOOKUP)
 | 
			
		||||
					{
 | 
			
		||||
					BIO_printf(bio_s_out,"LOOKUP renego during write\n");
 | 
			
		||||
					srp_callback_parm.user = SRP_VBASE_get_by_user(srp_callback_parm.vb, srp_callback_parm.login); 
 | 
			
		||||
					if (srp_callback_parm.user) 
 | 
			
		||||
						BIO_printf(bio_s_out,"LOOKUP done %s\n",srp_callback_parm.user->info);
 | 
			
		||||
					else 
 | 
			
		||||
						BIO_printf(bio_s_out,"LOOKUP not successful\n");
 | 
			
		||||
						k=SSL_write(con,&(buf[l]),(unsigned int)i);
 | 
			
		||||
					}
 | 
			
		||||
#endif
 | 
			
		||||
				switch (SSL_get_error(con,k))
 | 
			
		||||
					{
 | 
			
		||||
				case SSL_ERROR_NONE:
 | 
			
		||||
@@ -2092,6 +2340,18 @@ static int sv_body(char *hostname, int s, unsigned char *context)
 | 
			
		||||
				{
 | 
			
		||||
again:	
 | 
			
		||||
				i=SSL_read(con,(char *)buf,bufsize);
 | 
			
		||||
#ifndef OPENSSL_NO_SRP
 | 
			
		||||
				while (SSL_get_error(con,i) == SSL_ERROR_WANT_X509_LOOKUP)
 | 
			
		||||
					{
 | 
			
		||||
					BIO_printf(bio_s_out,"LOOKUP renego during read\n");
 | 
			
		||||
					srp_callback_parm.user = SRP_VBASE_get_by_user(srp_callback_parm.vb, srp_callback_parm.login); 
 | 
			
		||||
					if (srp_callback_parm.user) 
 | 
			
		||||
						BIO_printf(bio_s_out,"LOOKUP done %s\n",srp_callback_parm.user->info);
 | 
			
		||||
					else 
 | 
			
		||||
						BIO_printf(bio_s_out,"LOOKUP not successful\n");
 | 
			
		||||
					i=SSL_read(con,(char *)buf,bufsize);
 | 
			
		||||
					}
 | 
			
		||||
#endif
 | 
			
		||||
				switch (SSL_get_error(con,i))
 | 
			
		||||
					{
 | 
			
		||||
				case SSL_ERROR_NONE:
 | 
			
		||||
@@ -2104,7 +2364,6 @@ again:
 | 
			
		||||
					break;
 | 
			
		||||
				case SSL_ERROR_WANT_WRITE:
 | 
			
		||||
				case SSL_ERROR_WANT_READ:
 | 
			
		||||
				case SSL_ERROR_WANT_X509_LOOKUP:
 | 
			
		||||
					BIO_printf(bio_s_out,"Read BLOCK\n");
 | 
			
		||||
					break;
 | 
			
		||||
				case SSL_ERROR_SYSCALL:
 | 
			
		||||
@@ -2159,8 +2418,30 @@ static int init_ssl_connection(SSL *con)
 | 
			
		||||
	X509 *peer;
 | 
			
		||||
	long verify_error;
 | 
			
		||||
	MS_STATIC char buf[BUFSIZ];
 | 
			
		||||
#ifndef OPENSSL_NO_KRB5
 | 
			
		||||
	char *client_princ;
 | 
			
		||||
#endif
 | 
			
		||||
#if !defined(OPENSSL_NO_TLSEXT) && !defined(OPENSSL_NO_NEXTPROTONEG)
 | 
			
		||||
	const unsigned char *next_proto_neg;
 | 
			
		||||
	unsigned next_proto_neg_len;
 | 
			
		||||
#endif
 | 
			
		||||
	unsigned char *exportedkeymat;
 | 
			
		||||
 | 
			
		||||
	if ((i=SSL_accept(con)) <= 0)
 | 
			
		||||
 | 
			
		||||
	i=SSL_accept(con);
 | 
			
		||||
#ifndef OPENSSL_NO_SRP
 | 
			
		||||
	while (i <= 0 &&  SSL_get_error(con,i) == SSL_ERROR_WANT_X509_LOOKUP) 
 | 
			
		||||
		{
 | 
			
		||||
			BIO_printf(bio_s_out,"LOOKUP during accept %s\n",srp_callback_parm.login);
 | 
			
		||||
			srp_callback_parm.user = SRP_VBASE_get_by_user(srp_callback_parm.vb, srp_callback_parm.login); 
 | 
			
		||||
			if (srp_callback_parm.user) 
 | 
			
		||||
				BIO_printf(bio_s_out,"LOOKUP done %s\n",srp_callback_parm.user->info);
 | 
			
		||||
			else 
 | 
			
		||||
				BIO_printf(bio_s_out,"LOOKUP not successful\n");
 | 
			
		||||
			i=SSL_accept(con);
 | 
			
		||||
		}
 | 
			
		||||
#endif
 | 
			
		||||
	if (i <= 0)
 | 
			
		||||
		{
 | 
			
		||||
		if (BIO_sock_should_retry(i))
 | 
			
		||||
			{
 | 
			
		||||
@@ -2198,19 +2479,70 @@ static int init_ssl_connection(SSL *con)
 | 
			
		||||
		BIO_printf(bio_s_out,"Shared ciphers:%s\n",buf);
 | 
			
		||||
	str=SSL_CIPHER_get_name(SSL_get_current_cipher(con));
 | 
			
		||||
	BIO_printf(bio_s_out,"CIPHER is %s\n",(str != NULL)?str:"(NONE)");
 | 
			
		||||
	if (con->hit) BIO_printf(bio_s_out,"Reused session-id\n");
 | 
			
		||||
 | 
			
		||||
#if !defined(OPENSSL_NO_TLSEXT) && !defined(OPENSSL_NO_NEXTPROTONEG)
 | 
			
		||||
	SSL_get0_next_proto_negotiated(con, &next_proto_neg, &next_proto_neg_len);
 | 
			
		||||
	if (next_proto_neg)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf(bio_s_out,"NEXTPROTO is ");
 | 
			
		||||
		BIO_write(bio_s_out, next_proto_neg, next_proto_neg_len);
 | 
			
		||||
		BIO_printf(bio_s_out, "\n");
 | 
			
		||||
		}
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_SRTP
 | 
			
		||||
	{
 | 
			
		||||
	SRTP_PROTECTION_PROFILE *srtp_profile
 | 
			
		||||
	  = SSL_get_selected_srtp_profile(con);
 | 
			
		||||
 | 
			
		||||
	if(srtp_profile)
 | 
			
		||||
		BIO_printf(bio_s_out,"SRTP Extension negotiated, profile=%s\n",
 | 
			
		||||
			   srtp_profile->name);
 | 
			
		||||
	}
 | 
			
		||||
#endif
 | 
			
		||||
	if (SSL_cache_hit(con)) BIO_printf(bio_s_out,"Reused session-id\n");
 | 
			
		||||
	if (SSL_ctrl(con,SSL_CTRL_GET_FLAGS,0,NULL) &
 | 
			
		||||
		TLS1_FLAGS_TLS_PADDING_BUG)
 | 
			
		||||
		BIO_printf(bio_s_out,"Peer has incorrect TLSv1 block padding\n");
 | 
			
		||||
		BIO_printf(bio_s_out,
 | 
			
		||||
			   "Peer has incorrect TLSv1 block padding\n");
 | 
			
		||||
#ifndef OPENSSL_NO_KRB5
 | 
			
		||||
	if (con->kssl_ctx->client_princ != NULL)
 | 
			
		||||
	client_princ = kssl_ctx_get0_client_princ(SSL_get0_kssl_ctx(con));
 | 
			
		||||
	if (client_princ != NULL)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf(bio_s_out,"Kerberos peer principal is %s\n",
 | 
			
		||||
			con->kssl_ctx->client_princ);
 | 
			
		||||
								client_princ);
 | 
			
		||||
		}
 | 
			
		||||
#endif /* OPENSSL_NO_KRB5 */
 | 
			
		||||
	BIO_printf(bio_s_out, "Secure Renegotiation IS%s supported\n",
 | 
			
		||||
		      SSL_get_secure_renegotiation_support(con) ? "" : " NOT");
 | 
			
		||||
	if (keymatexportlabel != NULL)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf(bio_s_out, "Keying material exporter:\n");
 | 
			
		||||
		BIO_printf(bio_s_out, "    Label: '%s'\n", keymatexportlabel);
 | 
			
		||||
		BIO_printf(bio_s_out, "    Length: %i bytes\n",
 | 
			
		||||
			   keymatexportlen);
 | 
			
		||||
		exportedkeymat = OPENSSL_malloc(keymatexportlen);
 | 
			
		||||
		if (exportedkeymat != NULL)
 | 
			
		||||
			{
 | 
			
		||||
			if (!SSL_export_keying_material(con, exportedkeymat,
 | 
			
		||||
						        keymatexportlen,
 | 
			
		||||
						        keymatexportlabel,
 | 
			
		||||
						        strlen(keymatexportlabel),
 | 
			
		||||
						        NULL, 0, 0))
 | 
			
		||||
				{
 | 
			
		||||
				BIO_printf(bio_s_out, "    Error\n");
 | 
			
		||||
				}
 | 
			
		||||
			else
 | 
			
		||||
				{
 | 
			
		||||
				BIO_printf(bio_s_out, "    Keying material: ");
 | 
			
		||||
				for (i=0; i<keymatexportlen; i++)
 | 
			
		||||
					BIO_printf(bio_s_out, "%02X",
 | 
			
		||||
						   exportedkeymat[i]);
 | 
			
		||||
				BIO_printf(bio_s_out, "\n");
 | 
			
		||||
				}
 | 
			
		||||
			OPENSSL_free(exportedkeymat);
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	return(1);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
@@ -2228,6 +2560,9 @@ err:
 | 
			
		||||
	return(ret);
 | 
			
		||||
	}
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_KRB5
 | 
			
		||||
	char *client_princ;
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#if 0
 | 
			
		||||
static int load_CA(SSL_CTX *ctx, char *file)
 | 
			
		||||
@@ -2258,6 +2593,9 @@ static int www_body(char *hostname, int s, unsigned char *context)
 | 
			
		||||
	SSL *con;
 | 
			
		||||
	const SSL_CIPHER *c;
 | 
			
		||||
	BIO *io,*ssl_bio,*sbio;
 | 
			
		||||
#ifndef OPENSSL_NO_KRB5
 | 
			
		||||
	KSSL_CTX *kctx;
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	buf=OPENSSL_malloc(bufsize);
 | 
			
		||||
	if (buf == NULL) return(0);
 | 
			
		||||
@@ -2289,10 +2627,10 @@ static int www_body(char *hostname, int s, unsigned char *context)
 | 
			
		||||
			}
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_KRB5
 | 
			
		||||
	if ((con->kssl_ctx = kssl_ctx_new()) != NULL)
 | 
			
		||||
	if ((kctx = kssl_ctx_new()) != NULL)
 | 
			
		||||
		{
 | 
			
		||||
		kssl_ctx_setstring(con->kssl_ctx, KSSL_SERVICE, KRB5SVC);
 | 
			
		||||
		kssl_ctx_setstring(con->kssl_ctx, KSSL_KEYTAB, KRB5KEYTAB);
 | 
			
		||||
		kssl_ctx_setstring(kctx, KSSL_SERVICE, KRB5SVC);
 | 
			
		||||
		kssl_ctx_setstring(kctx, KSSL_KEYTAB, KRB5KEYTAB);
 | 
			
		||||
		}
 | 
			
		||||
#endif	/* OPENSSL_NO_KRB5 */
 | 
			
		||||
	if(context) SSL_set_session_id_context(con, context,
 | 
			
		||||
@@ -2318,7 +2656,7 @@ static int www_body(char *hostname, int s, unsigned char *context)
 | 
			
		||||
 | 
			
		||||
	if (s_debug)
 | 
			
		||||
		{
 | 
			
		||||
		con->debug=1;
 | 
			
		||||
		SSL_set_debug(con, 1);
 | 
			
		||||
		BIO_set_callback(SSL_get_rbio(con),bio_dump_callback);
 | 
			
		||||
		BIO_set_callback_arg(SSL_get_rbio(con),(char *)bio_s_out);
 | 
			
		||||
		}
 | 
			
		||||
@@ -2333,7 +2671,18 @@ static int www_body(char *hostname, int s, unsigned char *context)
 | 
			
		||||
		if (hack)
 | 
			
		||||
			{
 | 
			
		||||
			i=SSL_accept(con);
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_SRP
 | 
			
		||||
			while (i <= 0 &&  SSL_get_error(con,i) == SSL_ERROR_WANT_X509_LOOKUP) 
 | 
			
		||||
		{
 | 
			
		||||
			BIO_printf(bio_s_out,"LOOKUP during accept %s\n",srp_callback_parm.login);
 | 
			
		||||
			srp_callback_parm.user = SRP_VBASE_get_by_user(srp_callback_parm.vb, srp_callback_parm.login); 
 | 
			
		||||
			if (srp_callback_parm.user) 
 | 
			
		||||
				BIO_printf(bio_s_out,"LOOKUP done %s\n",srp_callback_parm.user->info);
 | 
			
		||||
			else 
 | 
			
		||||
				BIO_printf(bio_s_out,"LOOKUP not successful\n");
 | 
			
		||||
			i=SSL_accept(con);
 | 
			
		||||
		}
 | 
			
		||||
#endif
 | 
			
		||||
			switch (SSL_get_error(con,i))
 | 
			
		||||
				{
 | 
			
		||||
			case SSL_ERROR_NONE:
 | 
			
		||||
@@ -2401,6 +2750,11 @@ static int www_body(char *hostname, int s, unsigned char *context)
 | 
			
		||||
				}
 | 
			
		||||
			BIO_puts(io,"\n");
 | 
			
		||||
 | 
			
		||||
			BIO_printf(io,
 | 
			
		||||
				"Secure Renegotiation IS%s supported\n",
 | 
			
		||||
		      		SSL_get_secure_renegotiation_support(con) ?
 | 
			
		||||
							"" : " NOT");
 | 
			
		||||
 | 
			
		||||
			/* The following is evil and should not really
 | 
			
		||||
			 * be done */
 | 
			
		||||
			BIO_printf(io,"Ciphers supported in s_server binary\n");
 | 
			
		||||
@@ -2439,7 +2793,7 @@ static int www_body(char *hostname, int s, unsigned char *context)
 | 
			
		||||
					}
 | 
			
		||||
				BIO_puts(io,"\n");
 | 
			
		||||
				}
 | 
			
		||||
			BIO_printf(io,((con->hit)
 | 
			
		||||
			BIO_printf(io,(SSL_cache_hit(con)
 | 
			
		||||
				?"---\nReused, "
 | 
			
		||||
				:"---\nNew, "));
 | 
			
		||||
			c=SSL_get_current_cipher(con);
 | 
			
		||||
 
 | 
			
		||||
@@ -238,11 +238,10 @@ int init_client(int *sock, char *host, int port, int type)
 | 
			
		||||
	{
 | 
			
		||||
	unsigned char ip[4];
 | 
			
		||||
 | 
			
		||||
	memset(ip, '\0', sizeof ip);
 | 
			
		||||
	if (!host_ip(host,&(ip[0])))
 | 
			
		||||
		{
 | 
			
		||||
		return(0);
 | 
			
		||||
		}
 | 
			
		||||
	return(init_client_ip(sock,ip,port,type));
 | 
			
		||||
		return 0;
 | 
			
		||||
	return init_client_ip(sock,ip,port,type);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
static int init_client_ip(int *sock, unsigned char ip[4], int port, int type)
 | 
			
		||||
@@ -275,7 +274,7 @@ static int init_client_ip(int *sock, unsigned char ip[4], int port, int type)
 | 
			
		||||
		{
 | 
			
		||||
		i=0;
 | 
			
		||||
		i=setsockopt(s,SOL_SOCKET,SO_KEEPALIVE,(char *)&i,sizeof(i));
 | 
			
		||||
		if (i < 0) { perror("keepalive"); return(0); }
 | 
			
		||||
		if (i < 0) { closesocket(s); perror("keepalive"); return(0); }
 | 
			
		||||
		}
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
@@ -421,7 +420,7 @@ redoit:
 | 
			
		||||
		return(0);
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
/*
 | 
			
		||||
/*-
 | 
			
		||||
	ling.l_onoff=1;
 | 
			
		||||
	ling.l_linger=0;
 | 
			
		||||
	i=setsockopt(ret,SOL_SOCKET,SO_LINGER,(char *)&ling,sizeof(ling));
 | 
			
		||||
@@ -451,6 +450,7 @@ redoit:
 | 
			
		||||
		if ((*host=(char *)OPENSSL_malloc(strlen(h1->h_name)+1)) == NULL)
 | 
			
		||||
			{
 | 
			
		||||
			perror("OPENSSL_malloc");
 | 
			
		||||
			closesocket(ret);
 | 
			
		||||
			return(0);
 | 
			
		||||
			}
 | 
			
		||||
		BUF_strlcpy(*host,h1->h_name,strlen(h1->h_name)+1);
 | 
			
		||||
@@ -459,11 +459,13 @@ redoit:
 | 
			
		||||
		if (h2 == NULL)
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(bio_err,"gethostbyname failure\n");
 | 
			
		||||
			closesocket(ret);
 | 
			
		||||
			return(0);
 | 
			
		||||
			}
 | 
			
		||||
		if (h2->h_addrtype != AF_INET)
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(bio_err,"gethostbyname addr is not AF_INET\n");
 | 
			
		||||
			closesocket(ret);
 | 
			
		||||
			return(0);
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 
 | 
			
		||||
@@ -93,7 +93,8 @@
 | 
			
		||||
 | 
			
		||||
#define SSL_CONNECT_NAME	"localhost:4433"
 | 
			
		||||
 | 
			
		||||
/*#define TEST_CERT "client.pem" */ /* no default cert. */
 | 
			
		||||
/* no default cert. */
 | 
			
		||||
/*#define TEST_CERT "client.pem" */
 | 
			
		||||
 | 
			
		||||
#undef BUFSIZZ
 | 
			
		||||
#define BUFSIZZ 1024*10
 | 
			
		||||
@@ -349,13 +350,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	if (bio_err == NULL)
 | 
			
		||||
		bio_err=BIO_new_fp(stderr,BIO_NOCLOSE);
 | 
			
		||||
 | 
			
		||||
#if !defined(OPENSSL_NO_SSL2) && !defined(OPENSSL_NO_SSL3)
 | 
			
		||||
	s_time_meth=SSLv23_client_method();
 | 
			
		||||
#elif !defined(OPENSSL_NO_SSL3)
 | 
			
		||||
	s_time_meth=SSLv3_client_method();
 | 
			
		||||
#elif !defined(OPENSSL_NO_SSL2)
 | 
			
		||||
	s_time_meth=SSLv2_client_method();
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	/* parse the command line arguments */
 | 
			
		||||
	if( parseArgs( argc, argv ) < 0 )
 | 
			
		||||
@@ -556,7 +551,7 @@ end:
 | 
			
		||||
	OPENSSL_EXIT(ret);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
/***********************************************************************
 | 
			
		||||
/*-
 | 
			
		||||
 * doConnection - make a connection
 | 
			
		||||
 * Args:
 | 
			
		||||
 *		scon	= earlier ssl connection for session id, or NULL
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										413
									
								
								apps/server.pem
									
									
									
									
									
								
							
							
						
						
									
										413
									
								
								apps/server.pem
									
									
									
									
									
								
							@@ -1,369 +1,52 @@
 | 
			
		||||
issuer= /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test CA (1024 bit)
 | 
			
		||||
subject= /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Server test cert (512 bit)
 | 
			
		||||
subject= C = UK, O = OpenSSL Group, OU = FOR TESTING PURPOSES ONLY, CN = Test Server Cert
 | 
			
		||||
issuer= C = UK, O = OpenSSL Group, OU = FOR TESTING PURPOSES ONLY, CN = OpenSSL Test Intermediate CA
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIIB6TCCAVICAQYwDQYJKoZIhvcNAQEEBQAwWzELMAkGA1UEBhMCQVUxEzARBgNV
 | 
			
		||||
BAgTClF1ZWVuc2xhbmQxGjAYBgNVBAoTEUNyeXB0U29mdCBQdHkgTHRkMRswGQYD
 | 
			
		||||
VQQDExJUZXN0IENBICgxMDI0IGJpdCkwHhcNMDAxMDE2MjIzMTAzWhcNMDMwMTE0
 | 
			
		||||
MjIzMTAzWjBjMQswCQYDVQQGEwJBVTETMBEGA1UECBMKUXVlZW5zbGFuZDEaMBgG
 | 
			
		||||
A1UEChMRQ3J5cHRTb2Z0IFB0eSBMdGQxIzAhBgNVBAMTGlNlcnZlciB0ZXN0IGNl
 | 
			
		||||
cnQgKDUxMiBiaXQpMFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBAJ+zw4Qnlf8SMVIP
 | 
			
		||||
Fe9GEcStgOY2Ww/dgNdhjeD8ckUJNP5VZkVDTGiXav6ooKXfX3j/7tdkuD8Ey2//
 | 
			
		||||
Kv7+ue0CAwEAATANBgkqhkiG9w0BAQQFAAOBgQCT0grFQeZaqYb5EYfk20XixZV4
 | 
			
		||||
GmyAbXMftG1Eo7qGiMhYzRwGNWxEYojf5PZkYZXvSqZ/ZXHXa4g59jK/rJNnaVGM
 | 
			
		||||
k+xIX8mxQvlV0n5O9PIha5BX5teZnkHKgL8aKKLKW1BK7YTngsfSzzaeame5iKfz
 | 
			
		||||
itAE+OjGF+PFKbwX8Q==
 | 
			
		||||
MIID5zCCAs+gAwIBAgIJALnu1NlVpZ6zMA0GCSqGSIb3DQEBBQUAMHAxCzAJBgNV
 | 
			
		||||
BAYTAlVLMRYwFAYDVQQKDA1PcGVuU1NMIEdyb3VwMSIwIAYDVQQLDBlGT1IgVEVT
 | 
			
		||||
VElORyBQVVJQT1NFUyBPTkxZMSUwIwYDVQQDDBxPcGVuU1NMIFRlc3QgSW50ZXJt
 | 
			
		||||
ZWRpYXRlIENBMB4XDTExMTIwODE0MDE0OFoXDTIxMTAxNjE0MDE0OFowZDELMAkG
 | 
			
		||||
A1UEBhMCVUsxFjAUBgNVBAoMDU9wZW5TU0wgR3JvdXAxIjAgBgNVBAsMGUZPUiBU
 | 
			
		||||
RVNUSU5HIFBVUlBPU0VTIE9OTFkxGTAXBgNVBAMMEFRlc3QgU2VydmVyIENlcnQw
 | 
			
		||||
ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDzhPOSNtyyRspmeuUpxfNJ
 | 
			
		||||
KCLTuf7g3uQ4zu4iHOmRO5TQci+HhVlLZrHF9XqFXcIP0y4pWDbMSGuiorUmzmfi
 | 
			
		||||
R7bfSdI/+qIQt8KXRH6HNG1t8ou0VSvWId5TS5Dq/er5ODUr9OaaDva7EquHIcMv
 | 
			
		||||
vPQGuI+OEAcnleVCy9HVEIySrO4P3CNIicnGkwwiAud05yUAq/gPXBC1hTtmlPD7
 | 
			
		||||
TVcGVSEiJdvzqqlgv02qedGrkki6GY4S7GjZxrrf7Foc2EP+51LJzwLQx3/JfrCU
 | 
			
		||||
41NEWAsu/Sl0tQabXESN+zJ1pDqoZ3uHMgpQjeGiE0olr+YcsSW/tJmiU9OiAr8R
 | 
			
		||||
AgMBAAGjgY8wgYwwDAYDVR0TAQH/BAIwADAOBgNVHQ8BAf8EBAMCBeAwLAYJYIZI
 | 
			
		||||
AYb4QgENBB8WHU9wZW5TU0wgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQW
 | 
			
		||||
BBSCvM8AABPR9zklmifnr9LvIBturDAfBgNVHSMEGDAWgBQ2w2yI55X+sL3szj49
 | 
			
		||||
hqshgYfa2jANBgkqhkiG9w0BAQUFAAOCAQEAqb1NV0B0/pbpK9Z4/bNjzPQLTRLK
 | 
			
		||||
WnSNm/Jh5v0GEUOE/Beg7GNjNrmeNmqxAlpqWz9qoeoFZax+QBpIZYjROU3TS3fp
 | 
			
		||||
yLsrnlr0CDQ5R7kCCDGa8dkXxemmpZZLbUCpW2Uoy8sAA4JjN9OtsZY7dvUXFgJ7
 | 
			
		||||
vVNTRnI01ghknbtD+2SxSQd3CWF6QhcRMAzZJ1z1cbbwGDDzfvGFPzJ+Sq+zEPds
 | 
			
		||||
xoVLLSetCiBc+40ZcDS5dV98h9XD7JMTQfxzA7mNGv73JoZJA6nFgj+ADSlJsY/t
 | 
			
		||||
JBv+z1iQRueoh9Qeee+ZbRifPouCB8FDx+AltvHTANdAq0t/K3o+pplMVA==
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
-----BEGIN RSA PRIVATE KEY-----
 | 
			
		||||
MIIBPAIBAAJBAJ+zw4Qnlf8SMVIPFe9GEcStgOY2Ww/dgNdhjeD8ckUJNP5VZkVD
 | 
			
		||||
TGiXav6ooKXfX3j/7tdkuD8Ey2//Kv7+ue0CAwEAAQJAN6W31vDEP2DjdqhzCDDu
 | 
			
		||||
OA4NACqoiFqyblo7yc2tM4h4xMbC3Yx5UKMN9ZkCtX0gzrz6DyF47bdKcWBzNWCj
 | 
			
		||||
gQIhANEoojVt7hq+SQ6MCN6FTAysGgQf56Q3TYoJMoWvdiXVAiEAw3e3rc+VJpOz
 | 
			
		||||
rHuDo6bgpjUAAXM+v3fcpsfZSNO6V7kCIQCtbVjanpUwvZkMI9by02oUk9taki3b
 | 
			
		||||
PzPfAfNPYAbCJQIhAJXNQDWyqwn/lGmR11cqY2y9nZ1+5w3yHGatLrcDnQHxAiEA
 | 
			
		||||
vnlEGo8K85u+KwIOimM48ZG8oTk7iFdkqLJR1utT3aU=
 | 
			
		||||
MIIEpAIBAAKCAQEA84TzkjbcskbKZnrlKcXzSSgi07n+4N7kOM7uIhzpkTuU0HIv
 | 
			
		||||
h4VZS2axxfV6hV3CD9MuKVg2zEhroqK1Js5n4ke230nSP/qiELfCl0R+hzRtbfKL
 | 
			
		||||
tFUr1iHeU0uQ6v3q+Tg1K/Tmmg72uxKrhyHDL7z0BriPjhAHJ5XlQsvR1RCMkqzu
 | 
			
		||||
D9wjSInJxpMMIgLndOclAKv4D1wQtYU7ZpTw+01XBlUhIiXb86qpYL9NqnnRq5JI
 | 
			
		||||
uhmOEuxo2ca63+xaHNhD/udSyc8C0Md/yX6wlONTRFgLLv0pdLUGm1xEjfsydaQ6
 | 
			
		||||
qGd7hzIKUI3hohNKJa/mHLElv7SZolPTogK/EQIDAQABAoIBAADq9FwNtuE5IRQn
 | 
			
		||||
zGtO4q7Y5uCzZ8GDNYr9RKp+P2cbuWDbvVAecYq2NV9QoIiWJOAYZKklOvekIju3
 | 
			
		||||
r0UZLA0PRiIrTg6NrESx3JrjWDK8QNlUO7CPTZ39/K+FrmMkV9lem9yxjJjyC34D
 | 
			
		||||
AQB+YRTx+l14HppjdxNwHjAVQpIx/uO2F5xAMuk32+3K+pq9CZUtrofe1q4Agj9R
 | 
			
		||||
5s8mSy9pbRo9kW9wl5xdEotz1LivFOEiqPUJTUq5J5PeMKao3vdK726XI4Z455Nm
 | 
			
		||||
W2/MA0YV0ug2FYinHcZdvKM6dimH8GLfa3X8xKRfzjGjTiMSwsdjgMa4awY3tEHH
 | 
			
		||||
674jhAECgYEA/zqMrc0zsbNk83sjgaYIug5kzEpN4ic020rSZsmQxSCerJTgNhmg
 | 
			
		||||
utKSCt0Re09Jt3LqG48msahX8ycqDsHNvlEGPQSbMu9IYeO3Wr3fAm75GEtFWePY
 | 
			
		||||
BhM73I7gkRt4s8bUiUepMG/wY45c5tRF23xi8foReHFFe9MDzh8fJFECgYEA9EFX
 | 
			
		||||
4qAik1pOJGNei9BMwmx0I0gfVEIgu0tzeVqT45vcxbxr7RkTEaDoAG6PlbWP6D9a
 | 
			
		||||
WQNLp4gsgRM90ZXOJ4up5DsAWDluvaF4/omabMA+MJJ5kGZ0gCj5rbZbKqUws7x8
 | 
			
		||||
bp+6iBfUPJUbcqNqFmi/08Yt7vrDnMnyMw2A/sECgYEAiiuRMxnuzVm34hQcsbhH
 | 
			
		||||
6ymVqf7j0PW2qK0F4H1ocT9qhzWFd+RB3kHWrCjnqODQoI6GbGr/4JepHUpre1ex
 | 
			
		||||
4UEN5oSS3G0ru0rC3U4C59dZ5KwDHFm7ffZ1pr52ljfQDUsrjjIMRtuiwNK2OoRa
 | 
			
		||||
WSsqiaL+SDzSB+nBmpnAizECgYBdt/y6rerWUx4MhDwwtTnel7JwHyo2MDFS6/5g
 | 
			
		||||
n8qC2Lj6/fMDRE22w+CA2esp7EJNQJGv+b27iFpbJEDh+/Lf5YzIT4MwVskQ5bYB
 | 
			
		||||
JFcmRxUVmf4e09D7o705U/DjCgMH09iCsbLmqQ38ONIRSHZaJtMDtNTHD1yi+jF+
 | 
			
		||||
OT43gQKBgQC/2OHZoko6iRlNOAQ/tMVFNq7fL81GivoQ9F1U0Qr+DH3ZfaH8eIkX
 | 
			
		||||
xT0ToMPJUzWAn8pZv0snA0um6SIgvkCuxO84OkANCVbttzXImIsL7pFzfcwV/ERK
 | 
			
		||||
UM6j0ZuSMFOCr/lGPAoOQU0fskidGEHi1/kW+suSr28TqsyYZpwBDQ==
 | 
			
		||||
-----END RSA PRIVATE KEY-----
 | 
			
		||||
subject=/C=US/O=AT&T Bell Laboratories/OU=Prototype Research CA
 | 
			
		||||
issuer= /C=US/O=AT&T Bell Laboratories/OU=Prototype Research CA
 | 
			
		||||
notBefore=950413210656Z
 | 
			
		||||
notAfter =970412210656Z
 | 
			
		||||
-----BEGIN X509 CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
MIICCDCCAXECAQAwDQYJKoZIhvcNAQEEBQAwTjELMAkGA1UEBhMCVVMxHzAdBgNV
 | 
			
		||||
BAoUFkFUJlQgQmVsbCBMYWJvcmF0b3JpZXMxHjAcBgNVBAsUFVByb3RvdHlwZSBS
 | 
			
		||||
ZXNlYXJjaCBDQTAeFw05NTA0MTMyMTA2NTZaFw05NzA0MTIyMTA2NTZaME4xCzAJ
 | 
			
		||||
BgNVBAYTAlVTMR8wHQYDVQQKFBZBVCZUIEJlbGwgTGFib3JhdG9yaWVzMR4wHAYD
 | 
			
		||||
VQQLFBVQcm90b3R5cGUgUmVzZWFyY2ggQ0EwgZwwDQYJKoZIhvcNAQEBBQADgYoA
 | 
			
		||||
MIGGAoGAebOmgtSCl+wCYZc86UGYeTLY8cjmW2P0FN8ToT/u2pECCoFdrlycX0OR
 | 
			
		||||
3wt0ZhpFXLVNeDnHwEE9veNUih7pCL2ZBFqoIoQkB1lZmXRiVtjGonz8BLm/qrFM
 | 
			
		||||
YHb0lme/Ol+s118mwKVxnn6bSAeI/OXKhLaVdYZWk+aEaxEDkVkCAQ8wDQYJKoZI
 | 
			
		||||
hvcNAQEEBQADgYEAAZMG14lZmZ8bahkaHaTV9dQf4p2FZiQTFwHP9ZyGsXPC+LT5
 | 
			
		||||
dG5iTaRmyjNIJdPWohZDl97kAci79aBndvuEvRKOjLHs3WRGBIwERnAcnY9Mz8u/
 | 
			
		||||
zIHK23PjYVxGGaZd669OJwD0CYyqH22HH9nFUGaoJdsv39ChW0NRdLE9+y8=
 | 
			
		||||
-----END X509 CERTIFICATE-----
 | 
			
		||||
issuer= /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test PCA (1024 bit)
 | 
			
		||||
subject=/C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test CA (1024 bit)
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICJjCCAY8CAQAwDQYJKoZIhvcNAQEEBQAwXDELMAkGA1UEBhMCQVUxEzARBgNV
 | 
			
		||||
BAgTClF1ZWVuc2xhbmQxGjAYBgNVBAoTEUNyeXB0U29mdCBQdHkgTHRkMRwwGgYD
 | 
			
		||||
VQQDExNUZXN0IFBDQSAoMTAyNCBiaXQpMB4XDTk3MDYwOTEzNTc0M1oXDTAxMDYw
 | 
			
		||||
OTEzNTc0M1owWzELMAkGA1UEBhMCQVUxEzARBgNVBAgTClF1ZWVuc2xhbmQxGjAY
 | 
			
		||||
BgNVBAoTEUNyeXB0U29mdCBQdHkgTHRkMRswGQYDVQQDExJUZXN0IENBICgxMDI0
 | 
			
		||||
IGJpdCkwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAKO7o8t116VP6cgybTsZ
 | 
			
		||||
DCZhr95nYlZuya3aCi1IKoztqwWnjbmDFIriOqGFPrZQ+moMETC9D59iRW/dFXSv
 | 
			
		||||
1F65ka/XY2hLh9exCCo7XuUcDs53Qp3bI3AmMqHjgzE8oO3ajyJAzJkTTOUecQU2
 | 
			
		||||
mw/gI4tMM0LqWMQS7luTy4+xAgMBAAEwDQYJKoZIhvcNAQEEBQADgYEAM7achv3v
 | 
			
		||||
hLQJcv/65eGEpBXM40ZDVoFQFFJWaY5p883HTqLB1x4FdzsXHH0QKBTcKpWwqyu4
 | 
			
		||||
YDm3fb8oDugw72bCzfyZK/zVZPR/hVlqI/fvU109Qoc+7oPvIXWky71HfcK6ZBCA
 | 
			
		||||
q30KIqGM/uoM60INq97qjDmCJapagcNBGQs=
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
-----BEGIN RSA PRIVATE KEY-----
 | 
			
		||||
MIICXQIBAAKBgQCju6PLddelT+nIMm07GQwmYa/eZ2JWbsmt2gotSCqM7asFp425
 | 
			
		||||
gxSK4jqhhT62UPpqDBEwvQ+fYkVv3RV0r9ReuZGv12NoS4fXsQgqO17lHA7Od0Kd
 | 
			
		||||
2yNwJjKh44MxPKDt2o8iQMyZE0zlHnEFNpsP4COLTDNC6ljEEu5bk8uPsQIDAQAB
 | 
			
		||||
AoGAVZmpFZsDZfr0l2S9tLLwpjRWNOlKATQkno6q2WesT0eGLQufTciY+c8ypfU6
 | 
			
		||||
hyio8r5iUl/VhhdjhAtKx1mRpiotftHo/eYf8rtsrnprOnWG0bWjLjtIoMbcxGn2
 | 
			
		||||
J3bN6LJmbJMjDs0eJ3KnTu646F3nDUw2oGAwmpzKXA1KAP0CQQDRvQhxk2D3Pehs
 | 
			
		||||
HvG665u2pB5ipYQngEFlZO7RHJZzJOZEWSLuuMqaF/7pTfA5jiBvWqCgJeCRRInL
 | 
			
		||||
21ru4dlPAkEAx9jj7BgKn5TYnMoBSSe0afjsV9oApVpN1Nacb1YDtCwy+scp3++s
 | 
			
		||||
nFxlv98wxIlSdpwMUn+AUWfjiWR7Tu/G/wJBAJ/KjwZIrFVxewP0x2ILYsTRYLzz
 | 
			
		||||
MS4PDsO7FB+I0i7DbBOifXS2oNSpd3I0CNMwrxFnUHzynpbOStVfN3ZL5w0CQQCa
 | 
			
		||||
pwFahxBRhkJKsxhjoFJBX9yl75JoY4Wvm5Tbo9ih6UJaRx3kqfkN14L2BKYcsZgb
 | 
			
		||||
KY9vmDOYy6iNfjDeWTfJAkBkfPUb8oTJ/nSP5zN6sqGxSY4krc4xLxpRmxoJ8HL2
 | 
			
		||||
XfhqXkTzbU13RX9JJ/NZ8vQN9Vm2NhxRGJocQkmcdVtJ
 | 
			
		||||
-----END RSA PRIVATE KEY-----
 | 
			
		||||
-----BEGIN X509 CERTIFICATE-----
 | 
			
		||||
MIICYDCCAiACAgEoMAkGBSsOAwINBQAwfDELMAkGA1UEBhMCVVMxNjA0BgNVBAoT
 | 
			
		||||
LU5hdGlvbmFsIEFlcm9uYXV0aWNzIGFuZCBTcGFjZSBBZG1pbmlzdHJhdGlvbjEZ
 | 
			
		||||
MBcGA1UECxMQVGVzdCBFbnZpcm9ubWVudDEaMBgGA1UECxMRRFNTLU5BU0EtUGls
 | 
			
		||||
b3QtQ0EwHhcNOTYwMjI2MTYzMjQ1WhcNOTcwMjI1MTYzMjQ1WjB8MQswCQYDVQQG
 | 
			
		||||
EwJVUzE2MDQGA1UEChMtTmF0aW9uYWwgQWVyb25hdXRpY3MgYW5kIFNwYWNlIEFk
 | 
			
		||||
bWluaXN0cmF0aW9uMRkwFwYDVQQLExBUZXN0IEVudmlyb25tZW50MRowGAYDVQQL
 | 
			
		||||
ExFEU1MtTkFTQS1QaWxvdC1DQTCB8jAJBgUrDgMCDAUAA4HkADCB4AJBAMA/ssKb
 | 
			
		||||
hPNUG7ZlASfVwEJU21O5OyF/iyBzgHI1O8eOhJGUYO8cc8wDMjR508Mr9cp6Uhl/
 | 
			
		||||
ZB7FV5GkLNEnRHYCQQDUEaSg45P2qrDwixTRhFhmWz5Nvc4lRFQ/42XPcchiJBLb
 | 
			
		||||
bn3QK74T2IxY1yY+kCNq8XrIqf5fJJzIH0J/xUP3AhUAsg2wsQHfDGYk/BOSulX3
 | 
			
		||||
fVd0geUCQQCzCFUQAh+ZkEmp5804cs6ZWBhrUAfnra8lJItYo9xPcXgdIfLfibcX
 | 
			
		||||
R71UsyO77MRD7B0+Ag2tq794IleCVcEEMAkGBSsOAwINBQADLwAwLAIUUayDfreR
 | 
			
		||||
Yh2WeU86/pHNdkUC1IgCFEfxe1f0oMpxJyrJ5XIxTi7vGdoK
 | 
			
		||||
-----END X509 CERTIFICATE-----
 | 
			
		||||
-----BEGIN X509 CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
MIICGTCCAdgCAwCqTDAJBgUrDgMCDQUAMHwxCzAJBgNVBAYTAlVTMTYwNAYDVQQK
 | 
			
		||||
Ey1OYXRpb25hbCBBZXJvbmF1dGljcyBhbmQgU3BhY2UgQWRtaW5pc3RyYXRpb24x
 | 
			
		||||
GTAXBgNVBAsTEFRlc3QgRW52aXJvbm1lbnQxGjAYBgNVBAsTEURTUy1OQVNBLVBp
 | 
			
		||||
bG90LUNBMB4XDTk2MDUxNDE3MDE0MVoXDTk3MDUxNDE3MDE0MVowMzELMAkGA1UE
 | 
			
		||||
BhMCQVUxDzANBgNVBAoTBk1pbmNvbTETMBEGA1UEAxMKRXJpYyBZb3VuZzCB8jAJ
 | 
			
		||||
BgUrDgMCDAUAA4HkADCB4AJBAKbfHz6vE6pXXMTpswtGUec2tvnfLJUsoxE9qs4+
 | 
			
		||||
ObZX7LmLvragNPUeiTJx7UOWZ5DfBj6bXLc8eYne0lP1g3ACQQDUEaSg45P2qrDw
 | 
			
		||||
ixTRhFhmWz5Nvc4lRFQ/42XPcchiJBLbbn3QK74T2IxY1yY+kCNq8XrIqf5fJJzI
 | 
			
		||||
H0J/xUP3AhUAsg2wsQHfDGYk/BOSulX3fVd0geUCQQCzCFUQAh+ZkEmp5804cs6Z
 | 
			
		||||
WBhrUAfnra8lJItYo9xPcXgdIfLfibcXR71UsyO77MRD7B0+Ag2tq794IleCVcEE
 | 
			
		||||
MAkGBSsOAwINBQADMAAwLQIUWsuuJRE3VT4ueWkWMAJMJaZjj1ECFQCYY0zX4bzM
 | 
			
		||||
LC7obsrHD8XAHG+ZRG==
 | 
			
		||||
-----END X509 CERTIFICATE-----
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICTTCCAbagAwIBAgIBADANBgkqhkiG9w0BAQQFADBMMQswCQYDVQQGEwJHQjEM
 | 
			
		||||
MAoGA1UEChMDVUNMMRgwFgYDVQQLEw9JQ0UtVEVMIFByb2plY3QxFTATBgNVBAMT
 | 
			
		||||
DFRydXN0RmFjdG9yeTAeFw05NzA0MjIxNDM5MTRaFw05ODA0MjIxNDM5MTRaMEwx
 | 
			
		||||
CzAJBgNVBAYTAkdCMQwwCgYDVQQKEwNVQ0wxGDAWBgNVBAsTD0lDRS1URUwgUHJv
 | 
			
		||||
amVjdDEVMBMGA1UEAxMMVHJ1c3RGYWN0b3J5MIGcMAoGBFUIAQECAgQAA4GNADCB
 | 
			
		||||
iQKBgQCEieR8NcXkUW1f0G6aC6u0i8q/98JqS6RxK5YmHIGKCkuTWAUjzLfUa4dt
 | 
			
		||||
U9igGCjTuxaDqlzEim+t/02pmiBZT9HaX++35MjQPUWmsChcYU5WyzGErXi+rQaw
 | 
			
		||||
zlwS73zM8qiPj/97lXYycWhgL0VaiDSPxRXEUdWoaGruom4mNQIDAQABo0IwQDAd
 | 
			
		||||
BgNVHQ4EFgQUHal1LZr7oVg5z6lYzrhTgZRCmcUwDgYDVR0PAQH/BAQDAgH2MA8G
 | 
			
		||||
A1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEEBQADgYEAfaggfl6FZoioecjv0dq8
 | 
			
		||||
/DXo/u11iMZvXn08gjX/zl2b4wtPbShOSY5FhkSm8GeySasz+/Nwb/uzfnIhokWi
 | 
			
		||||
lfPZHtlCWtXbIy/TN51eJyq04ceDCQDWvLC2enVg9KB+GJ34b5c5VaPRzq8MBxsA
 | 
			
		||||
S7ELuYGtmYgYm9NZOIr7yU0=
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIIB6jCCAZQCAgEtMA0GCSqGSIb3DQEBBAUAMIGAMQswCQYDVQQGEwJVUzE2MDQG
 | 
			
		||||
A1UEChMtTmF0aW9uYWwgQWVyb25hdXRpY3MgYW5kIFNwYWNlIEFkbWluaXN0cmF0
 | 
			
		||||
aW9uMRkwFwYDVQQLExBUZXN0IEVudmlyb25tZW50MR4wHAYDVQQLExVNRDUtUlNB
 | 
			
		||||
LU5BU0EtUGlsb3QtQ0EwHhcNOTYwNDMwMjIwNTAwWhcNOTcwNDMwMjIwNTAwWjCB
 | 
			
		||||
gDELMAkGA1UEBhMCVVMxNjA0BgNVBAoTLU5hdGlvbmFsIEFlcm9uYXV0aWNzIGFu
 | 
			
		||||
ZCBTcGFjZSBBZG1pbmlzdHJhdGlvbjEZMBcGA1UECxMQVGVzdCBFbnZpcm9ubWVu
 | 
			
		||||
dDEeMBwGA1UECxMVTUQ1LVJTQS1OQVNBLVBpbG90LUNBMFkwCgYEVQgBAQICAgAD
 | 
			
		||||
SwAwSAJBALmmX5+GqAvcrWK13rfDrNX9UfeA7f+ijyBgeFQjYUoDpFqapw4nzQBL
 | 
			
		||||
bAXug8pKkRwa2Zh8YODhXsRWu2F/UckCAwEAATANBgkqhkiG9w0BAQQFAANBAH9a
 | 
			
		||||
OBA+QCsjxXgnSqHx04gcU8S49DVUb1f2XVoLnHlIb8RnX0k5O6mpHT5eti9bLkiW
 | 
			
		||||
GJNMJ4L0AJ/ac+SmHZc=
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICajCCAdMCBDGA0QUwDQYJKoZIhvcNAQEEBQAwfTELMAkGA1UEBhMCQ2ExDzAN
 | 
			
		||||
BgNVBAcTBk5lcGVhbjEeMBwGA1UECxMVTm8gTGlhYmlsaXR5IEFjY2VwdGVkMR8w
 | 
			
		||||
HQYDVQQKExZGb3IgRGVtbyBQdXJwb3NlcyBPbmx5MRwwGgYDVQQDExNFbnRydXN0
 | 
			
		||||
IERlbW8gV2ViIENBMB4XDTk2MDQyNjEzMzUwMVoXDTA2MDQyNjEzMzUwMVowfTEL
 | 
			
		||||
MAkGA1UEBhMCQ2ExDzANBgNVBAcTBk5lcGVhbjEeMBwGA1UECxMVTm8gTGlhYmls
 | 
			
		||||
aXR5IEFjY2VwdGVkMR8wHQYDVQQKExZGb3IgRGVtbyBQdXJwb3NlcyBPbmx5MRww
 | 
			
		||||
GgYDVQQDExNFbnRydXN0IERlbW8gV2ViIENBMIGdMA0GCSqGSIb3DQEBAQUAA4GL
 | 
			
		||||
ADCBhwKBgQCaroS7O1DA0hm4IefNYU1cx/nqOmzEnk291d1XqznDeF4wEgakbkCc
 | 
			
		||||
zTKxK791yNpXG5RmngqH7cygDRTHZJ6mfCRn0wGC+AI00F2vYTGqPGRQL1N3lZT0
 | 
			
		||||
YDKFC0SQeMMjFIZ1aeQigroFQnHo0VB3zWIMpNkka8PY9lxHZAmWwQIBAzANBgkq
 | 
			
		||||
hkiG9w0BAQQFAAOBgQBAx0UMVA1s54lMQyXjMX5kj99FJN5itb8bK1Rk+cegPQPF
 | 
			
		||||
cWO9SEWyEjjBjIkjjzAwBkaEszFsNGxemxtXvwjIm1xEUMTVlPEWTs2qnDvAUA9W
 | 
			
		||||
YqhWbhH0toGT36236QAsqCZ76rbTRVSSX2BHyJwJMG2tCRv7kRJ//NIgxj3H4w==
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
issuer= /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test PCA (1024 bit)
 | 
			
		||||
subject=/C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test PCA (1024 bit)
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICJzCCAZACAQAwDQYJKoZIhvcNAQEEBQAwXDELMAkGA1UEBhMCQVUxEzARBgNV
 | 
			
		||||
BAgTClF1ZWVuc2xhbmQxGjAYBgNVBAoTEUNyeXB0U29mdCBQdHkgTHRkMRwwGgYD
 | 
			
		||||
VQQDExNUZXN0IFBDQSAoMTAyNCBiaXQpMB4XDTk3MDYwOTEzNTczN1oXDTAxMDYw
 | 
			
		||||
OTEzNTczN1owXDELMAkGA1UEBhMCQVUxEzARBgNVBAgTClF1ZWVuc2xhbmQxGjAY
 | 
			
		||||
BgNVBAoTEUNyeXB0U29mdCBQdHkgTHRkMRwwGgYDVQQDExNUZXN0IFBDQSAoMTAy
 | 
			
		||||
NCBiaXQpMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCdoWk/3+WcMlfjIrkg
 | 
			
		||||
40ketmnQaEogQe1LLcuOJV6rKfUSAsPgwgsabJ/wn8TxA1yy3eKJbFl3OiUXMRsp
 | 
			
		||||
22Jp85PmemiDzyUIStwk72qhp1imbANZvlmlCFKiQrjUyuDfu4TABmn+kkt3vR1Y
 | 
			
		||||
BEOGt+IFye1UBVSATVdRJ2UVhwIDAQABMA0GCSqGSIb3DQEBBAUAA4GBABNA1u/S
 | 
			
		||||
Cg/LJZWb7GliiKJsvuhxlE4E5JxQF2zMub/CSNbF97//tYSyj96sxeFQxZXbcjm9
 | 
			
		||||
xt6mr/xNLA4szNQMJ4P+L7b5e/jC5DSqlwS+CUYJgaFs/SP+qJoCSu1bR3IM9XWO
 | 
			
		||||
cRBpDmcBbYLkSyB92WURvsZ1LtjEcn+cdQVI
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
-----BEGIN RSA PRIVATE KEY-----
 | 
			
		||||
MIICXAIBAAKBgQCdoWk/3+WcMlfjIrkg40ketmnQaEogQe1LLcuOJV6rKfUSAsPg
 | 
			
		||||
wgsabJ/wn8TxA1yy3eKJbFl3OiUXMRsp22Jp85PmemiDzyUIStwk72qhp1imbANZ
 | 
			
		||||
vlmlCFKiQrjUyuDfu4TABmn+kkt3vR1YBEOGt+IFye1UBVSATVdRJ2UVhwIDAQAB
 | 
			
		||||
AoGAba4fTtuap5l7/8ZsbE7Z1O32KJY4ZcOZukLOLUUhXxXduT+FTgGWujc0/rgc
 | 
			
		||||
z9qYCLlNZHOouMYTgtSfYvuMuLZ11VIt0GYH+nRioLShE59Yy+zCRyC+gPigS1kz
 | 
			
		||||
xvo14AsOIPYV14Tk/SsHyq6E0eTk7VzaIE197giiINUERPECQQDSKmtPTh/lRKw7
 | 
			
		||||
HSZSM0I1mFWn/1zqrAbontRQY5w98QWIOe5qmzYyFbPXYT3d9BzlsMyhgiRNoBbD
 | 
			
		||||
yvohSHXJAkEAwAHx6ezAZeWWzD5yXD36nyjpkVCw7Tk7TSmOceLJMWt1QcrCfqlS
 | 
			
		||||
xA5jjpQ6Z8suU5DdtWAryM2sAir1WisYzwJAd6Zcx56jvAQ3xcPXsE6scBTVFzrj
 | 
			
		||||
7FqZ6E+cclPzfLQ+QQsyOBE7bpI6e/FJppY26XGZXo3YGzV8IGXrt40oOQJALETG
 | 
			
		||||
h86EFXo3qGOFbmsDy4pdP5nBERCu8X1xUCSfintiD4c2DInxgS5oGclnJeMcjTvL
 | 
			
		||||
QjQoJCX3UJCi/OUO1QJBAKgcDHWjMvt+l1pjJBsSEZ0HX9AAIIVx0RQmbFGS+F2Q
 | 
			
		||||
hhu5l77WnnZOQ9vvhV5u7NPCUF9nhU3jh60qWWO8mkc=
 | 
			
		||||
-----END RSA PRIVATE KEY-----
 | 
			
		||||
subject=/C=US/O=RSA Data Security, Inc./OU=Commercial Certification Authority
 | 
			
		||||
issuer= /C=US/O=RSA Data Security, Inc./OU=Commercial Certification Authority
 | 
			
		||||
notBefore=941104185834Z
 | 
			
		||||
notAfter =991103185834Z
 | 
			
		||||
-----BEGIN X509 CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
MIICIzCCAZACBQJBAAAWMA0GCSqGSIb3DQEBAgUAMFwxCzAJBgNVBAYTAlVTMSAw
 | 
			
		||||
HgYDVQQKExdSU0EgRGF0YSBTZWN1cml0eSwgSW5jLjErMCkGA1UECxMiQ29tbWVy
 | 
			
		||||
Y2lhbCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw05NDExMDQxODU4MzRaFw05
 | 
			
		||||
OTExMDMxODU4MzRaMFwxCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdSU0EgRGF0YSBT
 | 
			
		||||
ZWN1cml0eSwgSW5jLjErMCkGA1UECxMiQ29tbWVyY2lhbCBDZXJ0aWZpY2F0aW9u
 | 
			
		||||
IEF1dGhvcml0eTCBmzANBgkqhkiG9w0BAQEFAAOBiQAwgYUCfgCk+4Fie84QJ93o
 | 
			
		||||
975sbsZwmdu41QUDaSiCnHJ/lj+O7Kwpkj+KFPhCdr69XQO5kNTQvAayUTNfxMK/
 | 
			
		||||
touPmbZiImDd298ggrTKoi8tUO2UMt7gVY3UaOLgTNLNBRYulWZcYVI4HlGogqHE
 | 
			
		||||
7yXpCuaLK44xZtn42f29O2nZ6wIDAQABMA0GCSqGSIb3DQEBAgUAA34AdrW2EP4j
 | 
			
		||||
9/dZYkuwX5zBaLxJu7NJbyFHXSudVMQAKD+YufKKg5tgf+tQx6sFEC097TgCwaVI
 | 
			
		||||
0v5loMC86qYjFmZsGySp8+x5NRhPJsjjr1BKx6cxa9B8GJ1Qv6km+iYrRpwUqbtb
 | 
			
		||||
MJhCKLVLU7tDCZJAuqiqWqTGtotXTcU=
 | 
			
		||||
-----END X509 CERTIFICATE-----
 | 
			
		||||
subject=/C=US/O=RSA Data Security, Inc./OU=Secure Server Certification Authority
 | 
			
		||||
issuer= /C=US/O=RSA Data Security, Inc./OU=Secure Server Certification Authority
 | 
			
		||||
notBefore=941109235417Z
 | 
			
		||||
notAfter =991231235417Z
 | 
			
		||||
-----BEGIN X509 CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
MIICKTCCAZYCBQJBAAABMA0GCSqGSIb3DQEBAgUAMF8xCzAJBgNVBAYTAlVTMSAw
 | 
			
		||||
HgYDVQQKExdSU0EgRGF0YSBTZWN1cml0eSwgSW5jLjEuMCwGA1UECxMlU2VjdXJl
 | 
			
		||||
IFNlcnZlciBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw05NDExMDkyMzU0MTda
 | 
			
		||||
Fw05OTEyMzEyMzU0MTdaMF8xCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdSU0EgRGF0
 | 
			
		||||
YSBTZWN1cml0eSwgSW5jLjEuMCwGA1UECxMlU2VjdXJlIFNlcnZlciBDZXJ0aWZp
 | 
			
		||||
Y2F0aW9uIEF1dGhvcml0eTCBmzANBgkqhkiG9w0BAQEFAAOBiQAwgYUCfgCSznrB
 | 
			
		||||
roM+WqqJg1esJQF2DK2ujiw3zus1eGRUA+WEQFHJv48I4oqCCNIWhjdV6bEhAq12
 | 
			
		||||
aIGaBaJLyUslZiJWbIgHj/eBWW2EB2VwE3F2Ppt3TONQiVaYSLkdpykaEy5KEVmc
 | 
			
		||||
HhXVSVQsczppgrGXOZxtcGdI5d0t1sgeewIDAQABMA0GCSqGSIb3DQEBAgUAA34A
 | 
			
		||||
iNHReSHO4ovo+MF9NFM/YYPZtgs4F7boviGNjwC4i1N+RGceIr2XJ+CchcxK9oU7
 | 
			
		||||
suK+ktPlDemvXA4MRpX/oRxePug2WHpzpgr4IhFrwwk4fia7c+8AvQKk8xQNMD9h
 | 
			
		||||
cHsg/jKjn7P0Z1LctO6EjJY2IN6BCINxIYoPnqk=
 | 
			
		||||
-----END X509 CERTIFICATE-----
 | 
			
		||||
subject=/C=ZA/SP=Western Cape/L=Cape Town/O=Thawte Consulting cc
 | 
			
		||||
	/OU=Certification Services Division/CN=Thawte Server CA
 | 
			
		||||
	/Email=server-certs@thawte.com
 | 
			
		||||
issuer= /C=ZA/SP=Western Cape/L=Cape Town/O=Thawte Consulting cc
 | 
			
		||||
	/OU=Certification Services Division/CN=Thawte Server CA
 | 
			
		||||
	/Email=server-certs@thawte.com
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIIC+TCCAmICAQAwDQYJKoZIhvcNAQEEBQAwgcQxCzAJBgNVBAYTAlpBMRUwEwYD
 | 
			
		||||
VQQIEwxXZXN0ZXJuIENhcGUxEjAQBgNVBAcTCUNhcGUgVG93bjEdMBsGA1UEChMU
 | 
			
		||||
VGhhd3RlIENvbnN1bHRpbmcgY2MxKDAmBgNVBAsTH0NlcnRpZmljYXRpb24gU2Vy
 | 
			
		||||
dmljZXMgRGl2aXNpb24xGTAXBgNVBAMTEFRoYXd0ZSBTZXJ2ZXIgQ0ExJjAkBgkq
 | 
			
		||||
hkiG9w0BCQEWF3NlcnZlci1jZXJ0c0B0aGF3dGUuY29tMB4XDTk2MDcyNzE4MDc1
 | 
			
		||||
N1oXDTk4MDcyNzE4MDc1N1owgcQxCzAJBgNVBAYTAlpBMRUwEwYDVQQIEwxXZXN0
 | 
			
		||||
ZXJuIENhcGUxEjAQBgNVBAcTCUNhcGUgVG93bjEdMBsGA1UEChMUVGhhd3RlIENv
 | 
			
		||||
bnN1bHRpbmcgY2MxKDAmBgNVBAsTH0NlcnRpZmljYXRpb24gU2VydmljZXMgRGl2
 | 
			
		||||
aXNpb24xGTAXBgNVBAMTEFRoYXd0ZSBTZXJ2ZXIgQ0ExJjAkBgkqhkiG9w0BCQEW
 | 
			
		||||
F3NlcnZlci1jZXJ0c0B0aGF3dGUuY29tMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCB
 | 
			
		||||
iQKBgQDTpFBuyP9Wa+bPXbbqDGh1R6KqwtqEJfyo9EdR2oW1IHSUhh4PdcnpCGH1
 | 
			
		||||
Bm0wbhUZAulSwGLbTZme4moMRDjN/r7jZAlwxf6xaym2L0nIO9QnBCUQly/nkG3A
 | 
			
		||||
KEKZ10xD3sP1IW1Un13DWOHA5NlbsLjctHvfNjrCtWYiEtaHDQIDAQABMA0GCSqG
 | 
			
		||||
SIb3DQEBBAUAA4GBAIsvn7ifX3RUIrvYXtpI4DOfARkTogwm6o7OwVdl93yFhDcX
 | 
			
		||||
7h5t0XZ11MUAMziKdde3rmTvzUYIUCYoY5b032IwGMTvdiclK+STN6NP2m5nvFAM
 | 
			
		||||
qJT5gC5O+j/jBuZRQ4i0AMYQr5F4lT8oBJnhgafw6PL8aDY2vMHGSPl9+7uf
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIIDDTCCAnYCAQAwDQYJKoZIhvcNAQEEBQAwgc4xCzAJBgNVBAYTAlpBMRUwEwYD
 | 
			
		||||
VQQIEwxXZXN0ZXJuIENhcGUxEjAQBgNVBAcTCUNhcGUgVG93bjEdMBsGA1UEChMU
 | 
			
		||||
VGhhd3RlIENvbnN1bHRpbmcgY2MxKDAmBgNVBAsTH0NlcnRpZmljYXRpb24gU2Vy
 | 
			
		||||
dmljZXMgRGl2aXNpb24xITAfBgNVBAMTGFRoYXd0ZSBQcmVtaXVtIFNlcnZlciBD
 | 
			
		||||
QTEoMCYGCSqGSIb3DQEJARYZcHJlbWl1bS1zZXJ2ZXJAdGhhd3RlLmNvbTAeFw05
 | 
			
		||||
NjA3MjcxODA3MTRaFw05ODA3MjcxODA3MTRaMIHOMQswCQYDVQQGEwJaQTEVMBMG
 | 
			
		||||
A1UECBMMV2VzdGVybiBDYXBlMRIwEAYDVQQHEwlDYXBlIFRvd24xHTAbBgNVBAoT
 | 
			
		||||
FFRoYXd0ZSBDb25zdWx0aW5nIGNjMSgwJgYDVQQLEx9DZXJ0aWZpY2F0aW9uIFNl
 | 
			
		||||
cnZpY2VzIERpdmlzaW9uMSEwHwYDVQQDExhUaGF3dGUgUHJlbWl1bSBTZXJ2ZXIg
 | 
			
		||||
Q0ExKDAmBgkqhkiG9w0BCQEWGXByZW1pdW0tc2VydmVyQHRoYXd0ZS5jb20wgZ8w
 | 
			
		||||
DQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBANI2NmqL18JbntqBQWKPOO5JBFXW0O8c
 | 
			
		||||
G5UWR+8YSDU6UvQragaPOy/qVuOvho2eF/eetGV1Ak3vywmiIVHYm9Bn0LoNkgYU
 | 
			
		||||
c9STy5cqAJxcTgy8+hVS/PJEbtoRSm4Iny8t4/mqOoZztkZTWMiJBb2DEbhzP6oH
 | 
			
		||||
jfRCTedAnRw3AgMBAAEwDQYJKoZIhvcNAQEEBQADgYEAutFIgTRZVYerIZfL9lvR
 | 
			
		||||
w9Eifvvo5KTZ3h+Bj+VzNnyw4Qc/IyXkPOu6SIiH9LQ3sCmWBdxpe+qr4l77rLj2
 | 
			
		||||
GYuMtESFfn1XVALzkYgC7JcPuTOjMfIiMByt+uFf8AV8x0IW/Qkuv+hEQcyM9vxK
 | 
			
		||||
3VZdLbCVIhNoEsysrxCpxcI=
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
Tims test GCI CA
 | 
			
		||||
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIIB8DCCAZoCAQAwDQYJKoZIhvcNAQEEBQAwgYIxCzAJBgNVBAYTAkFVMRMwEQYD
 | 
			
		||||
VQQIEwpRdWVlbnNsYW5kMREwDwYDVQQHEwhCcmlzYmFuZTEaMBgGA1UEChMRQ3J5
 | 
			
		||||
cHRTb2Z0IFB0eSBMdGQxFDASBgNVBAsTC2RldmVsb3BtZW50MRkwFwYDVQQDExBD
 | 
			
		||||
cnlwdFNvZnQgRGV2IENBMB4XDTk3MDMyMjEzMzQwNFoXDTk4MDMyMjEzMzQwNFow
 | 
			
		||||
gYIxCzAJBgNVBAYTAkFVMRMwEQYDVQQIEwpRdWVlbnNsYW5kMREwDwYDVQQHEwhC
 | 
			
		||||
cmlzYmFuZTEaMBgGA1UEChMRQ3J5cHRTb2Z0IFB0eSBMdGQxFDASBgNVBAsTC2Rl
 | 
			
		||||
dmVsb3BtZW50MRkwFwYDVQQDExBDcnlwdFNvZnQgRGV2IENBMFwwDQYJKoZIhvcN
 | 
			
		||||
AQEBBQADSwAwSAJBAOAOAqogG5QwAmLhzyO4CoRnx/wVy4NZP4dxJy83O1EnL0rw
 | 
			
		||||
OdsamJKvPOLHgSXo3gDu9uVyvCf/QJmZAmC5ml8CAwEAATANBgkqhkiG9w0BAQQF
 | 
			
		||||
AANBADRRS/GVdd7rAqRW6SdmgLJduOU2yq3avBu99kRqbp9A/dLu6r6jU+eP4oOA
 | 
			
		||||
TfdbFZtAAD2Hx9jUtY3tfdrJOb8= 
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICVjCCAgACAQAwDQYJKoZIhvcNAQEEBQAwgbUxCzAJBgNVBAYTAkFVMRMwEQYD
 | 
			
		||||
VQQIEwpRdWVlbnNsYW5kMREwDwYDVQQHEwhCcmlzYmFuZTEaMBgGA1UEChMRQ3J5
 | 
			
		||||
cHRTb2Z0IFB0eSBMdGQxLDAqBgNVBAsTI1dPUlRITEVTUyBDRVJUSUZJQ0FUSU9O
 | 
			
		||||
IEFVVEhPUklUSUVTMTQwMgYDVQQDEytaRVJPIFZBTFVFIENBIC0gREVNT05TVFJB
 | 
			
		||||
VElPTiBQVVJQT1NFUyBPTkxZMB4XDTk3MDQwMzEzMjI1NFoXDTk4MDQwMzEzMjI1
 | 
			
		||||
NFowgbUxCzAJBgNVBAYTAkFVMRMwEQYDVQQIEwpRdWVlbnNsYW5kMREwDwYDVQQH
 | 
			
		||||
EwhCcmlzYmFuZTEaMBgGA1UEChMRQ3J5cHRTb2Z0IFB0eSBMdGQxLDAqBgNVBAsT
 | 
			
		||||
I1dPUlRITEVTUyBDRVJUSUZJQ0FUSU9OIEFVVEhPUklUSUVTMTQwMgYDVQQDEyta
 | 
			
		||||
RVJPIFZBTFVFIENBIC0gREVNT05TVFJBVElPTiBQVVJQT1NFUyBPTkxZMFwwDQYJ
 | 
			
		||||
KoZIhvcNAQEBBQADSwAwSAJBAOZ7T7yqP/tyspcko3yPY1y0Cm2EmwNvzW4QgVXR
 | 
			
		||||
Fjs3HmJ4xtSpXdo6mwcGezL3Abt/aQXaxv9PU8xt+Jr0OFUCAwEAATANBgkqhkiG
 | 
			
		||||
9w0BAQQFAANBAOQpYmGgyCqCy1OljgJhCqQOu627oVlHzK1L+t9vBaMfn40AVUR4
 | 
			
		||||
WzQVWO31KTgi5vTK1U+3h46fgUWqQ0h+6rU=
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIAwgKADAgECAgEAMA0GCSqGSIb3DQEBBAUAMGIxETAPBgNVBAcTCEludGVybmV0
 | 
			
		||||
MRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjE0MDIGA1UECxMrVmVyaVNpZ24gQ2xh
 | 
			
		||||
c3MgMSBDQSAtIEluZGl2aWR1YWwgU3Vic2NyaWJlcjAeFw05NjA0MDgxMDIwMjda
 | 
			
		||||
Fw05NzA0MDgxMDIwMjdaMGIxETAPBgNVBAcTCEludGVybmV0MRcwFQYDVQQKEw5W
 | 
			
		||||
ZXJpU2lnbiwgSW5jLjE0MDIGA1UECxMrVmVyaVNpZ24gQ2xhc3MgMSBDQSAtIElu
 | 
			
		||||
ZGl2aWR1YWwgU3Vic2NyaWJlcjCAMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC2
 | 
			
		||||
FKbPTdAFDdjKI9BvqrQpkmOOLPhvltcunXZLEbE2jVfJw/0cxrr+Hgi6M8qV6r7j
 | 
			
		||||
W80GqLd5HUQq7XPysVKDaBBwZJHXPmv5912dFEObbpdFmIFH0S3L3bty10w/cari
 | 
			
		||||
QPJUObwW7s987LrbP2wqsxaxhhKdrpM01bjV0Pc+qQIDAQABAAAAADANBgkqhkiG
 | 
			
		||||
9w0BAQQFAAOBgQA+1nJryNt8VBRjRr07ArDAV/3jAH7GjDc9jsrxZS68ost9v06C
 | 
			
		||||
TvTNKGL+LISNmFLXl+JXhgGB0JZ9fvyYzNgHQ46HBUng1H6voalfJgS2KdEo50wW
 | 
			
		||||
8EFZYMDkT1k4uynwJqkVN2QJK/2q4/A/VCov5h6SlM8Affg2W+1TLqvqkwAA
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
 subject=/L=Internet/O=VeriSign, Inc./OU=VeriSign Class 2 CA - Individual Subscriber
 | 
			
		||||
 issuer= /L=Internet/O=VeriSign, Inc./OU=VeriSign Class 2 CA - Individual Subscriber
 | 
			
		||||
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIIEkzCCA/ygAwIBAgIRANDTUpSRL3nTFeMrMayFSPAwDQYJKoZIhvcNAQECBQAw
 | 
			
		||||
YjERMA8GA1UEBxMISW50ZXJuZXQxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMTQw
 | 
			
		||||
MgYDVQQLEytWZXJpU2lnbiBDbGFzcyAyIENBIC0gSW5kaXZpZHVhbCBTdWJzY3Jp
 | 
			
		||||
YmVyMB4XDTk2MDYwNDAwMDAwMFoXDTk4MDYwNDIzNTk1OVowYjERMA8GA1UEBxMI
 | 
			
		||||
SW50ZXJuZXQxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMTQwMgYDVQQLEytWZXJp
 | 
			
		||||
U2lnbiBDbGFzcyAyIENBIC0gSW5kaXZpZHVhbCBTdWJzY3JpYmVyMIGfMA0GCSqG
 | 
			
		||||
SIb3DQEBAQUAA4GNADCBiQKBgQC6A+2czKGRcYMfm8gdnk+0de99TDDzsqo0v5nb
 | 
			
		||||
RsbUmMcdRQ7nsMbRWe0SAb/9QoLTZ/cJ0iOBqdrkz7UpqqKarVoTSdlSMVM92tWp
 | 
			
		||||
3bJncZHQD1t4xd6lQVdI1/T6R+5J0T1ukOdsI9Jmf+F28S6g3R3L1SFwiHKeZKZv
 | 
			
		||||
z+793wIDAQABo4ICRzCCAkMwggIpBgNVHQMBAf8EggIdMIICGTCCAhUwggIRBgtg
 | 
			
		||||
hkgBhvhFAQcBATCCAgAWggGrVGhpcyBjZXJ0aWZpY2F0ZSBpbmNvcnBvcmF0ZXMg
 | 
			
		||||
YnkgcmVmZXJlbmNlLCBhbmQgaXRzIHVzZSBpcyBzdHJpY3RseSBzdWJqZWN0IHRv
 | 
			
		||||
LCB0aGUgVmVyaVNpZ24gQ2VydGlmaWNhdGlvbiBQcmFjdGljZSBTdGF0ZW1lbnQg
 | 
			
		||||
KENQUyksIGF2YWlsYWJsZSBhdDogaHR0cHM6Ly93d3cudmVyaXNpZ24uY29tL0NQ
 | 
			
		||||
Uy0xLjA7IGJ5IEUtbWFpbCBhdCBDUFMtcmVxdWVzdHNAdmVyaXNpZ24uY29tOyBv
 | 
			
		||||
ciBieSBtYWlsIGF0IFZlcmlTaWduLCBJbmMuLCAyNTkzIENvYXN0IEF2ZS4sIE1v
 | 
			
		||||
dW50YWluIFZpZXcsIENBIDk0MDQzIFVTQSBUZWwuICsxICg0MTUpIDk2MS04ODMw
 | 
			
		||||
IENvcHlyaWdodCAoYykgMTk5NiBWZXJpU2lnbiwgSW5jLiAgQWxsIFJpZ2h0cyBS
 | 
			
		||||
ZXNlcnZlZC4gQ0VSVEFJTiBXQVJSQU5USUVTIERJU0NMQUlNRUQgYW5kIExJQUJJ
 | 
			
		||||
TElUWSBMSU1JVEVELqAOBgxghkgBhvhFAQcBAQGhDgYMYIZIAYb4RQEHAQECMC8w
 | 
			
		||||
LRYraHR0cHM6Ly93d3cudmVyaXNpZ24uY29tL3JlcG9zaXRvcnkvQ1BTLTEuMDAU
 | 
			
		||||
BglghkgBhvhCAQEBAf8EBAMCAgQwDQYJKoZIhvcNAQECBQADgYEApRJRkNBqLLgs
 | 
			
		||||
53IR/d18ODdLOWMTZ+QOOxBrq460iBEdUwgF8vmPRX1ku7UiDeNzaLlurE6eFqHq
 | 
			
		||||
2zPyK5j60zfTLVJMWKcQWwTJLjHtXrW8pxhNtFc6Fdvy5ZkHnC/9NIl7/t4U6WqB
 | 
			
		||||
p4y+p7SdMIkEwIZfds0VbnQyX5MRUJY=
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
 subject=/C=US/O=VeriSign, Inc./OU=Class 3 Public Primary Certification Authority
 | 
			
		||||
 issuer= /C=US/O=VeriSign, Inc./OU=Class 3 Public Primary Certification Authority
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICMTCCAZoCBQKhAAABMA0GCSqGSIb3DQEBAgUAMF8xCzAJBgNVBAYTAlVTMRcw
 | 
			
		||||
FQYDVQQKEw5WZXJpU2lnbiwgSW5jLjE3MDUGA1UECxMuQ2xhc3MgMyBQdWJsaWMg
 | 
			
		||||
UHJpbWFyeSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw05NjAxMjkwMDAwMDBa
 | 
			
		||||
Fw05OTEyMzEyMzU5NTlaMF8xCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2ln
 | 
			
		||||
biwgSW5jLjE3MDUGA1UECxMuQ2xhc3MgMyBQdWJsaWMgUHJpbWFyeSBDZXJ0aWZp
 | 
			
		||||
Y2F0aW9uIEF1dGhvcml0eTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAyVxZ
 | 
			
		||||
nvIbigEUtBDfBEDb41evakVAj4QMC9Ez2dkRz+4CWB8l9yqoRAWq7AMfeH+ek7ma
 | 
			
		||||
AKojfdashaJjRcdyJ8z0TMZ1cdI5709C8HXfCpDGjiBvmA/4rCNfcCk2pMmG57Ga
 | 
			
		||||
IMtTpYXnPb59mv4kRTPcdhXtD6JxZExlLoFoRacCAwEAATANBgkqhkiG9w0BAQIF
 | 
			
		||||
AAOBgQB1Zmw+0c2B27X4LzZRtvdCvM1Cr9wO+hVs+GeTVzrrtpLotgHKjLeOQ7RJ
 | 
			
		||||
Zfk+7r11Ri7J/CVdqMcvi5uPaM+0nJcYwE3vH9mvgrPmZLiEXIqaB1JDYft0nls6
 | 
			
		||||
NvxMsvwaPxUupVs8G5DsiCnkWRb5zget7Ond2tIxik/W2O8XjQ==
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
 subject=/C=US/O=VeriSign, Inc./OU=Class 4 Public Primary Certification Authority
 | 
			
		||||
 issuer= /C=US/O=VeriSign, Inc./OU=Class 4 Public Primary Certification Authority
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICMTCCAZoCBQKmAAABMA0GCSqGSIb3DQEBAgUAMF8xCzAJBgNVBAYTAlVTMRcw
 | 
			
		||||
FQYDVQQKEw5WZXJpU2lnbiwgSW5jLjE3MDUGA1UECxMuQ2xhc3MgNCBQdWJsaWMg
 | 
			
		||||
UHJpbWFyeSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw05NjAxMjkwMDAwMDBa
 | 
			
		||||
Fw05OTEyMzEyMzU5NTlaMF8xCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2ln
 | 
			
		||||
biwgSW5jLjE3MDUGA1UECxMuQ2xhc3MgNCBQdWJsaWMgUHJpbWFyeSBDZXJ0aWZp
 | 
			
		||||
Y2F0aW9uIEF1dGhvcml0eTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA0LJ1
 | 
			
		||||
9njQrlpQ9OlQqZ+M1++RlHDo0iSQdomF1t+s5gEXMoDwnZNHvJplnR+Xrr/phnVj
 | 
			
		||||
IIm9gFidBAydqMEk6QvlMXi9/C0MN2qeeIDpRnX57aP7E3vIwUzSo+/1PLBij0pd
 | 
			
		||||
O92VZ48TucE81qcmm+zDO3rZTbxtm+gVAePwR6kCAwEAATANBgkqhkiG9w0BAQIF
 | 
			
		||||
AAOBgQBT3dPwnCR+QKri/AAa19oM/DJhuBUNlvP6Vxt/M3yv6ZiaYch6s7f/sdyZ
 | 
			
		||||
g9ysEvxwyR84Qu1E9oAuW2szaayc01znX1oYx7EteQSWQZGZQbE8DbqEOcY7l/Am
 | 
			
		||||
yY7uvcxClf8exwI/VAx49byqYHwCaejcrOICdmHEPgPq0ook0Q==
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										420
									
								
								apps/server2.pem
									
									
									
									
									
								
							
							
						
						
									
										420
									
								
								apps/server2.pem
									
									
									
									
									
								
							@@ -1,376 +1,52 @@
 | 
			
		||||
issuer= /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test CA (1024 bit)
 | 
			
		||||
subject=/C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Server test cert (1024 bit)
 | 
			
		||||
subject= C = UK, O = OpenSSL Group, OU = FOR TESTING PURPOSES ONLY, CN = Test Server Cert #2
 | 
			
		||||
issuer= C = UK, O = OpenSSL Group, OU = FOR TESTING PURPOSES ONLY, CN = OpenSSL Test Intermediate CA
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICLjCCAZcCAQEwDQYJKoZIhvcNAQEEBQAwWzELMAkGA1UEBhMCQVUxEzARBgNV
 | 
			
		||||
BAgTClF1ZWVuc2xhbmQxGjAYBgNVBAoTEUNyeXB0U29mdCBQdHkgTHRkMRswGQYD
 | 
			
		||||
VQQDExJUZXN0IENBICgxMDI0IGJpdCkwHhcNOTcwNjA5MTM1NzU0WhcNOTgwNjA5
 | 
			
		||||
MTM1NzU0WjBkMQswCQYDVQQGEwJBVTETMBEGA1UECBMKUXVlZW5zbGFuZDEaMBgG
 | 
			
		||||
A1UEChMRQ3J5cHRTb2Z0IFB0eSBMdGQxJDAiBgNVBAMTG1NlcnZlciB0ZXN0IGNl
 | 
			
		||||
cnQgKDEwMjQgYml0KTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAsxH1PBPm
 | 
			
		||||
RkxrR11eV4bzNi4N9n11CI8nV29+ARlT1+qDe/mjVUvXlmsr1v/vf71G9GgqopSa
 | 
			
		||||
6RXrICLVdk/FYYYzhPvl1M+OrjaXDFO8BzBAF1Lnz6c7aRZvGRJNrRSr2nZEkqDf
 | 
			
		||||
JW9dY7r2VZEpD5QeuaRYUnuECkqeieB65GMCAwEAATANBgkqhkiG9w0BAQQFAAOB
 | 
			
		||||
gQCWsOta6C0wiVzXz8wPmJKyTrurMlgUss2iSuW9366iwofZddsNg7FXniMzkIf6
 | 
			
		||||
dp7jnmWZwKZ9cXsNUS2o4OL07qOk2HOywC0YsNZQsOBu1CBTYYkIefDiKFL1zQHh
 | 
			
		||||
8lwwNd4NP+OE3NzUNkCfh4DnFfg9WHkXUlD5UpxNRJ4gJA==
 | 
			
		||||
MIID6jCCAtKgAwIBAgIJALnu1NlVpZ60MA0GCSqGSIb3DQEBBQUAMHAxCzAJBgNV
 | 
			
		||||
BAYTAlVLMRYwFAYDVQQKDA1PcGVuU1NMIEdyb3VwMSIwIAYDVQQLDBlGT1IgVEVT
 | 
			
		||||
VElORyBQVVJQT1NFUyBPTkxZMSUwIwYDVQQDDBxPcGVuU1NMIFRlc3QgSW50ZXJt
 | 
			
		||||
ZWRpYXRlIENBMB4XDTExMTIwODE0MDE0OFoXDTIxMTAxNjE0MDE0OFowZzELMAkG
 | 
			
		||||
A1UEBhMCVUsxFjAUBgNVBAoMDU9wZW5TU0wgR3JvdXAxIjAgBgNVBAsMGUZPUiBU
 | 
			
		||||
RVNUSU5HIFBVUlBPU0VTIE9OTFkxHDAaBgNVBAMME1Rlc3QgU2VydmVyIENlcnQg
 | 
			
		||||
IzIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDrdi7j9yctG+L4EjBy
 | 
			
		||||
gjPmEqZzOJEQba26MoQGzglU7e5Xf59Rb/hgVQuKAoiZe7/R8rK4zJ4W7iXdXw0L
 | 
			
		||||
qBpyG8B5aGKeI32w+A9TcBApoXXL2CrYQEQjZwUIpLlYBIi2NkJj3nVkq5dgl1gO
 | 
			
		||||
ALiQ+W8jg3kzg5Ec9rimp9r93N8wsSL3awsafurmYCvOf7leHaMP1WJ/zDRGUNHG
 | 
			
		||||
/WtDjXc8ZUG1+6EXU9Jc2Fs+2Omf7fcN0l00AK/wPg8OaNS0rKyGq9JdIT9FRGV1
 | 
			
		||||
bXe/rx58FaE5CItdwCSYhJvF/O95LWQoxJXye5bCFLmvDTEyVq9FMSCptfsmbXjE
 | 
			
		||||
ZGsXAgMBAAGjgY8wgYwwDAYDVR0TAQH/BAIwADAOBgNVHQ8BAf8EBAMCBeAwLAYJ
 | 
			
		||||
YIZIAYb4QgENBB8WHU9wZW5TU0wgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1Ud
 | 
			
		||||
DgQWBBR52UaWWTKzZGDH/X4mWNcuqeQVazAfBgNVHSMEGDAWgBQ2w2yI55X+sL3s
 | 
			
		||||
zj49hqshgYfa2jANBgkqhkiG9w0BAQUFAAOCAQEANBW+XYLlHBqVY/31ie+3gRlS
 | 
			
		||||
LPfy4SIqn0t3RJjagT29MXprblBO2cbMO8VGjkQdKGpmMXjxbht2arOOUXRHX4n/
 | 
			
		||||
XTyn/QHEf0bcwIITMReO3DZUPAEw8hSjn9xEOM0IRVOCP+mH5fi74QzzQaZVCyYg
 | 
			
		||||
5VtLKdww/+sc0nCbKl2KWgDluriH0nfVx95qgW3mg9dhXRr0zmf1w2zkBHYpARYL
 | 
			
		||||
Dew6Z8EE4tS3HJu8/qM6meWzNtrfonQ3eiiMxjZBxzV46jchBwa2z9XYhP6AmpPb
 | 
			
		||||
oeTSzcQNbWsxaGYzWo46oLDUZmJOwSBawbS31bZNMCoPIY6ukoesCzFSsUKZww==
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
-----BEGIN RSA PRIVATE KEY-----
 | 
			
		||||
MIICXgIBAAKBgQCzEfU8E+ZGTGtHXV5XhvM2Lg32fXUIjydXb34BGVPX6oN7+aNV
 | 
			
		||||
S9eWayvW/+9/vUb0aCqilJrpFesgItV2T8VhhjOE++XUz46uNpcMU7wHMEAXUufP
 | 
			
		||||
pztpFm8ZEk2tFKvadkSSoN8lb11juvZVkSkPlB65pFhSe4QKSp6J4HrkYwIDAQAB
 | 
			
		||||
AoGBAKy8jvb0Lzby8q11yNLf7+78wCVdYi7ugMHcYA1JVFK8+zb1WfSm44FLQo/0
 | 
			
		||||
dSChAjgz36TTexeLODPYxleJndjVcOMVzsLJjSM8dLpXsTS4FCeMbhw2s2u+xqKY
 | 
			
		||||
bbPWfk+HOTyJjfnkcC5Nbg44eOmruq0gSmBeUXVM5UntlTnxAkEA7TGCA3h7kx5E
 | 
			
		||||
Bl4zl2pc3gPAGt+dyfk5Po9mGJUUXhF5p2zueGmYWW74TmOWB1kzt4QRdYMzFePq
 | 
			
		||||
zfDNXEa1CwJBAMFErdY0xp0UJ13WwBbUTk8rujqQdHtjw0klhpbuKkjxu2hN0wwM
 | 
			
		||||
6p0D9qxF7JHaghqVRI0fAW/EE0OzdHMR9QkCQQDNR26dMFXKsoPu+vItljj/UEGf
 | 
			
		||||
QG7gERiQ4yxaFBPHgdpGo0kT31eh9x9hQGDkxTe0GNG/YSgCRvm8+C3TMcKXAkBD
 | 
			
		||||
dhGn36wkUFCddMSAM4NSJ1VN8/Z0y5HzCmI8dM3VwGtGMUQlxKxwOl30LEQzdS5M
 | 
			
		||||
0SWojNYXiT2gOBfBwtbhAkEAhafl5QEOIgUz+XazS/IlZ8goNKdDVfYgK3mHHjvv
 | 
			
		||||
nY5G+AuGebdNkXJr4KSWxDcN+C2i47zuj4QXA16MAOandA==
 | 
			
		||||
MIIEowIBAAKCAQEA63Yu4/cnLRvi+BIwcoIz5hKmcziREG2tujKEBs4JVO3uV3+f
 | 
			
		||||
UW/4YFULigKImXu/0fKyuMyeFu4l3V8NC6gachvAeWhiniN9sPgPU3AQKaF1y9gq
 | 
			
		||||
2EBEI2cFCKS5WASItjZCY951ZKuXYJdYDgC4kPlvI4N5M4ORHPa4pqfa/dzfMLEi
 | 
			
		||||
92sLGn7q5mArzn+5Xh2jD9Vif8w0RlDRxv1rQ413PGVBtfuhF1PSXNhbPtjpn+33
 | 
			
		||||
DdJdNACv8D4PDmjUtKyshqvSXSE/RURldW13v68efBWhOQiLXcAkmISbxfzveS1k
 | 
			
		||||
KMSV8nuWwhS5rw0xMlavRTEgqbX7Jm14xGRrFwIDAQABAoIBAHLsTPihIfLnYIE5
 | 
			
		||||
x4GsQQ5zXeBw5ITDM37ktwHnQDC+rIzyUl1aLD1AZRBoKinXd4lOTqLZ4/NHKx4A
 | 
			
		||||
DYr58mZtWyUmqLOMmQVuHXTZBlp7XtYuXMMNovQwjQlp9LicBeoBU6gQ5PVMtubD
 | 
			
		||||
F4xGF89Sn0cTHW3iMkqTtQ5KcR1j57OcJO0FEb1vPvk2MXI5ZyAatUYE7YacbEzd
 | 
			
		||||
rg02uIwx3FqNSkuSI79uz4hMdV5TPtuhxx9nTwj9aLUhXFeZ0mn2PVgVzEnnMoJb
 | 
			
		||||
+znlsZDgzDlJqdaD744YGWh8Z3OEssB35KfzFcdOeO6yH8lmv2Zfznk7pNPT7LTb
 | 
			
		||||
Lae9VgkCgYEA92p1qnAB3NtJtNcaW53i0S5WJgS1hxWKvUDx3lTB9s8X9fHpqL1a
 | 
			
		||||
E94fDfWzp/hax6FefUKIvBOukPLQ6bYjTMiFoOHzVirghAIuIUoMI5VtLhwD1hKs
 | 
			
		||||
Lr7l/dptMgKb1nZHyXoKHRBthsy3K4+udsPi8TzMvYElgEqyQIe/Rk0CgYEA86GL
 | 
			
		||||
8HC6zLszzKERDPBxrboRmoFvVUCTQDhsfj1M8aR3nQ8V5LkdIJc7Wqm/Ggfk9QRf
 | 
			
		||||
rJ8M2WUMlU5CNnCn/KCrKzCNZIReze3fV+HnKdbcXGLvgbHPrhnz8yYehUFG+RGq
 | 
			
		||||
bVyDWRU94T38izy2s5qMYrMJWZEYyXncSPbfcPMCgYAtaXfxcZ+V5xYPQFARMtiX
 | 
			
		||||
5nZfggvDoJuXgx0h3tK/N2HBfcaSdzbaYLG4gTmZggc/jwnl2dl5E++9oSPhUdIG
 | 
			
		||||
3ONSFUbxsOsGr9PBvnKd8WZZyUCXAVRjPBzAzF+whzQNWCZy/5htnz9LN7YDI9s0
 | 
			
		||||
5113Q96cheDZPFydZY0hHQKBgQDVbEhNukM5xCiNcu+f2SaMnLp9EjQ4h5g3IvaP
 | 
			
		||||
5B16daw/Dw8LzcohWboqIxeAsze0GD/D1ZUJAEd0qBjC3g+a9BjefervCjKOzXng
 | 
			
		||||
38mEUm+6EwVjJSQcjSmycEs+Sr/kwr/8i5WYvU32+jk4tFgMoC+o6tQe/Uesf68k
 | 
			
		||||
z/dPVwKBgGbF7Vv1/3SmhlOy+zYyvJ0CrWtKxH9QP6tLIEgEpd8x7YTSuCH94yok
 | 
			
		||||
kToMXYA3sWNPt22GbRDZ+rcp4c7HkDx6I6vpdP9aQEwJTp0EPy0sgWr2XwYmreIQ
 | 
			
		||||
NFmkk8Itn9EY2R9VBaP7GLv5kvwxDdLAnmwGmzVtbmaVdxCaBwUk
 | 
			
		||||
-----END RSA PRIVATE KEY-----
 | 
			
		||||
subject=/C=US/O=AT&T Bell Laboratories/OU=Prototype Research CA
 | 
			
		||||
issuer= /C=US/O=AT&T Bell Laboratories/OU=Prototype Research CA
 | 
			
		||||
notBefore=950413210656Z
 | 
			
		||||
notAfter =970412210656Z
 | 
			
		||||
-----BEGIN X509 CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
MIICCDCCAXECAQAwDQYJKoZIhvcNAQEEBQAwTjELMAkGA1UEBhMCVVMxHzAdBgNV
 | 
			
		||||
BAoUFkFUJlQgQmVsbCBMYWJvcmF0b3JpZXMxHjAcBgNVBAsUFVByb3RvdHlwZSBS
 | 
			
		||||
ZXNlYXJjaCBDQTAeFw05NTA0MTMyMTA2NTZaFw05NzA0MTIyMTA2NTZaME4xCzAJ
 | 
			
		||||
BgNVBAYTAlVTMR8wHQYDVQQKFBZBVCZUIEJlbGwgTGFib3JhdG9yaWVzMR4wHAYD
 | 
			
		||||
VQQLFBVQcm90b3R5cGUgUmVzZWFyY2ggQ0EwgZwwDQYJKoZIhvcNAQEBBQADgYoA
 | 
			
		||||
MIGGAoGAebOmgtSCl+wCYZc86UGYeTLY8cjmW2P0FN8ToT/u2pECCoFdrlycX0OR
 | 
			
		||||
3wt0ZhpFXLVNeDnHwEE9veNUih7pCL2ZBFqoIoQkB1lZmXRiVtjGonz8BLm/qrFM
 | 
			
		||||
YHb0lme/Ol+s118mwKVxnn6bSAeI/OXKhLaVdYZWk+aEaxEDkVkCAQ8wDQYJKoZI
 | 
			
		||||
hvcNAQEEBQADgYEAAZMG14lZmZ8bahkaHaTV9dQf4p2FZiQTFwHP9ZyGsXPC+LT5
 | 
			
		||||
dG5iTaRmyjNIJdPWohZDl97kAci79aBndvuEvRKOjLHs3WRGBIwERnAcnY9Mz8u/
 | 
			
		||||
zIHK23PjYVxGGaZd669OJwD0CYyqH22HH9nFUGaoJdsv39ChW0NRdLE9+y8=
 | 
			
		||||
-----END X509 CERTIFICATE-----
 | 
			
		||||
issuer= /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test PCA (1024 bit)
 | 
			
		||||
subject=/C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test CA (1024 bit)
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICJjCCAY8CAQAwDQYJKoZIhvcNAQEEBQAwXDELMAkGA1UEBhMCQVUxEzARBgNV
 | 
			
		||||
BAgTClF1ZWVuc2xhbmQxGjAYBgNVBAoTEUNyeXB0U29mdCBQdHkgTHRkMRwwGgYD
 | 
			
		||||
VQQDExNUZXN0IFBDQSAoMTAyNCBiaXQpMB4XDTk3MDYwOTEzNTc0M1oXDTAxMDYw
 | 
			
		||||
OTEzNTc0M1owWzELMAkGA1UEBhMCQVUxEzARBgNVBAgTClF1ZWVuc2xhbmQxGjAY
 | 
			
		||||
BgNVBAoTEUNyeXB0U29mdCBQdHkgTHRkMRswGQYDVQQDExJUZXN0IENBICgxMDI0
 | 
			
		||||
IGJpdCkwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAKO7o8t116VP6cgybTsZ
 | 
			
		||||
DCZhr95nYlZuya3aCi1IKoztqwWnjbmDFIriOqGFPrZQ+moMETC9D59iRW/dFXSv
 | 
			
		||||
1F65ka/XY2hLh9exCCo7XuUcDs53Qp3bI3AmMqHjgzE8oO3ajyJAzJkTTOUecQU2
 | 
			
		||||
mw/gI4tMM0LqWMQS7luTy4+xAgMBAAEwDQYJKoZIhvcNAQEEBQADgYEAM7achv3v
 | 
			
		||||
hLQJcv/65eGEpBXM40ZDVoFQFFJWaY5p883HTqLB1x4FdzsXHH0QKBTcKpWwqyu4
 | 
			
		||||
YDm3fb8oDugw72bCzfyZK/zVZPR/hVlqI/fvU109Qoc+7oPvIXWky71HfcK6ZBCA
 | 
			
		||||
q30KIqGM/uoM60INq97qjDmCJapagcNBGQs=
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
-----BEGIN RSA PRIVATE KEY-----
 | 
			
		||||
MIICXQIBAAKBgQCju6PLddelT+nIMm07GQwmYa/eZ2JWbsmt2gotSCqM7asFp425
 | 
			
		||||
gxSK4jqhhT62UPpqDBEwvQ+fYkVv3RV0r9ReuZGv12NoS4fXsQgqO17lHA7Od0Kd
 | 
			
		||||
2yNwJjKh44MxPKDt2o8iQMyZE0zlHnEFNpsP4COLTDNC6ljEEu5bk8uPsQIDAQAB
 | 
			
		||||
AoGAVZmpFZsDZfr0l2S9tLLwpjRWNOlKATQkno6q2WesT0eGLQufTciY+c8ypfU6
 | 
			
		||||
hyio8r5iUl/VhhdjhAtKx1mRpiotftHo/eYf8rtsrnprOnWG0bWjLjtIoMbcxGn2
 | 
			
		||||
J3bN6LJmbJMjDs0eJ3KnTu646F3nDUw2oGAwmpzKXA1KAP0CQQDRvQhxk2D3Pehs
 | 
			
		||||
HvG665u2pB5ipYQngEFlZO7RHJZzJOZEWSLuuMqaF/7pTfA5jiBvWqCgJeCRRInL
 | 
			
		||||
21ru4dlPAkEAx9jj7BgKn5TYnMoBSSe0afjsV9oApVpN1Nacb1YDtCwy+scp3++s
 | 
			
		||||
nFxlv98wxIlSdpwMUn+AUWfjiWR7Tu/G/wJBAJ/KjwZIrFVxewP0x2ILYsTRYLzz
 | 
			
		||||
MS4PDsO7FB+I0i7DbBOifXS2oNSpd3I0CNMwrxFnUHzynpbOStVfN3ZL5w0CQQCa
 | 
			
		||||
pwFahxBRhkJKsxhjoFJBX9yl75JoY4Wvm5Tbo9ih6UJaRx3kqfkN14L2BKYcsZgb
 | 
			
		||||
KY9vmDOYy6iNfjDeWTfJAkBkfPUb8oTJ/nSP5zN6sqGxSY4krc4xLxpRmxoJ8HL2
 | 
			
		||||
XfhqXkTzbU13RX9JJ/NZ8vQN9Vm2NhxRGJocQkmcdVtJ
 | 
			
		||||
-----END RSA PRIVATE KEY-----
 | 
			
		||||
-----BEGIN X509 CERTIFICATE-----
 | 
			
		||||
MIICYDCCAiACAgEoMAkGBSsOAwINBQAwfDELMAkGA1UEBhMCVVMxNjA0BgNVBAoT
 | 
			
		||||
LU5hdGlvbmFsIEFlcm9uYXV0aWNzIGFuZCBTcGFjZSBBZG1pbmlzdHJhdGlvbjEZ
 | 
			
		||||
MBcGA1UECxMQVGVzdCBFbnZpcm9ubWVudDEaMBgGA1UECxMRRFNTLU5BU0EtUGls
 | 
			
		||||
b3QtQ0EwHhcNOTYwMjI2MTYzMjQ1WhcNOTcwMjI1MTYzMjQ1WjB8MQswCQYDVQQG
 | 
			
		||||
EwJVUzE2MDQGA1UEChMtTmF0aW9uYWwgQWVyb25hdXRpY3MgYW5kIFNwYWNlIEFk
 | 
			
		||||
bWluaXN0cmF0aW9uMRkwFwYDVQQLExBUZXN0IEVudmlyb25tZW50MRowGAYDVQQL
 | 
			
		||||
ExFEU1MtTkFTQS1QaWxvdC1DQTCB8jAJBgUrDgMCDAUAA4HkADCB4AJBAMA/ssKb
 | 
			
		||||
hPNUG7ZlASfVwEJU21O5OyF/iyBzgHI1O8eOhJGUYO8cc8wDMjR508Mr9cp6Uhl/
 | 
			
		||||
ZB7FV5GkLNEnRHYCQQDUEaSg45P2qrDwixTRhFhmWz5Nvc4lRFQ/42XPcchiJBLb
 | 
			
		||||
bn3QK74T2IxY1yY+kCNq8XrIqf5fJJzIH0J/xUP3AhUAsg2wsQHfDGYk/BOSulX3
 | 
			
		||||
fVd0geUCQQCzCFUQAh+ZkEmp5804cs6ZWBhrUAfnra8lJItYo9xPcXgdIfLfibcX
 | 
			
		||||
R71UsyO77MRD7B0+Ag2tq794IleCVcEEMAkGBSsOAwINBQADLwAwLAIUUayDfreR
 | 
			
		||||
Yh2WeU86/pHNdkUC1IgCFEfxe1f0oMpxJyrJ5XIxTi7vGdoK
 | 
			
		||||
-----END X509 CERTIFICATE-----
 | 
			
		||||
-----BEGIN X509 CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
MIICGTCCAdgCAwCqTDAJBgUrDgMCDQUAMHwxCzAJBgNVBAYTAlVTMTYwNAYDVQQK
 | 
			
		||||
Ey1OYXRpb25hbCBBZXJvbmF1dGljcyBhbmQgU3BhY2UgQWRtaW5pc3RyYXRpb24x
 | 
			
		||||
GTAXBgNVBAsTEFRlc3QgRW52aXJvbm1lbnQxGjAYBgNVBAsTEURTUy1OQVNBLVBp
 | 
			
		||||
bG90LUNBMB4XDTk2MDUxNDE3MDE0MVoXDTk3MDUxNDE3MDE0MVowMzELMAkGA1UE
 | 
			
		||||
BhMCQVUxDzANBgNVBAoTBk1pbmNvbTETMBEGA1UEAxMKRXJpYyBZb3VuZzCB8jAJ
 | 
			
		||||
BgUrDgMCDAUAA4HkADCB4AJBAKbfHz6vE6pXXMTpswtGUec2tvnfLJUsoxE9qs4+
 | 
			
		||||
ObZX7LmLvragNPUeiTJx7UOWZ5DfBj6bXLc8eYne0lP1g3ACQQDUEaSg45P2qrDw
 | 
			
		||||
ixTRhFhmWz5Nvc4lRFQ/42XPcchiJBLbbn3QK74T2IxY1yY+kCNq8XrIqf5fJJzI
 | 
			
		||||
H0J/xUP3AhUAsg2wsQHfDGYk/BOSulX3fVd0geUCQQCzCFUQAh+ZkEmp5804cs6Z
 | 
			
		||||
WBhrUAfnra8lJItYo9xPcXgdIfLfibcXR71UsyO77MRD7B0+Ag2tq794IleCVcEE
 | 
			
		||||
MAkGBSsOAwINBQADMAAwLQIUWsuuJRE3VT4ueWkWMAJMJaZjj1ECFQCYY0zX4bzM
 | 
			
		||||
LC7obsrHD8XAHG+ZRG==
 | 
			
		||||
-----END X509 CERTIFICATE-----
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICTTCCAbagAwIBAgIBADANBgkqhkiG9w0BAQQFADBMMQswCQYDVQQGEwJHQjEM
 | 
			
		||||
MAoGA1UEChMDVUNMMRgwFgYDVQQLEw9JQ0UtVEVMIFByb2plY3QxFTATBgNVBAMT
 | 
			
		||||
DFRydXN0RmFjdG9yeTAeFw05NzA0MjIxNDM5MTRaFw05ODA0MjIxNDM5MTRaMEwx
 | 
			
		||||
CzAJBgNVBAYTAkdCMQwwCgYDVQQKEwNVQ0wxGDAWBgNVBAsTD0lDRS1URUwgUHJv
 | 
			
		||||
amVjdDEVMBMGA1UEAxMMVHJ1c3RGYWN0b3J5MIGcMAoGBFUIAQECAgQAA4GNADCB
 | 
			
		||||
iQKBgQCEieR8NcXkUW1f0G6aC6u0i8q/98JqS6RxK5YmHIGKCkuTWAUjzLfUa4dt
 | 
			
		||||
U9igGCjTuxaDqlzEim+t/02pmiBZT9HaX++35MjQPUWmsChcYU5WyzGErXi+rQaw
 | 
			
		||||
zlwS73zM8qiPj/97lXYycWhgL0VaiDSPxRXEUdWoaGruom4mNQIDAQABo0IwQDAd
 | 
			
		||||
BgNVHQ4EFgQUHal1LZr7oVg5z6lYzrhTgZRCmcUwDgYDVR0PAQH/BAQDAgH2MA8G
 | 
			
		||||
A1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEEBQADgYEAfaggfl6FZoioecjv0dq8
 | 
			
		||||
/DXo/u11iMZvXn08gjX/zl2b4wtPbShOSY5FhkSm8GeySasz+/Nwb/uzfnIhokWi
 | 
			
		||||
lfPZHtlCWtXbIy/TN51eJyq04ceDCQDWvLC2enVg9KB+GJ34b5c5VaPRzq8MBxsA
 | 
			
		||||
S7ELuYGtmYgYm9NZOIr7yU0=
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIIB6jCCAZQCAgEtMA0GCSqGSIb3DQEBBAUAMIGAMQswCQYDVQQGEwJVUzE2MDQG
 | 
			
		||||
A1UEChMtTmF0aW9uYWwgQWVyb25hdXRpY3MgYW5kIFNwYWNlIEFkbWluaXN0cmF0
 | 
			
		||||
aW9uMRkwFwYDVQQLExBUZXN0IEVudmlyb25tZW50MR4wHAYDVQQLExVNRDUtUlNB
 | 
			
		||||
LU5BU0EtUGlsb3QtQ0EwHhcNOTYwNDMwMjIwNTAwWhcNOTcwNDMwMjIwNTAwWjCB
 | 
			
		||||
gDELMAkGA1UEBhMCVVMxNjA0BgNVBAoTLU5hdGlvbmFsIEFlcm9uYXV0aWNzIGFu
 | 
			
		||||
ZCBTcGFjZSBBZG1pbmlzdHJhdGlvbjEZMBcGA1UECxMQVGVzdCBFbnZpcm9ubWVu
 | 
			
		||||
dDEeMBwGA1UECxMVTUQ1LVJTQS1OQVNBLVBpbG90LUNBMFkwCgYEVQgBAQICAgAD
 | 
			
		||||
SwAwSAJBALmmX5+GqAvcrWK13rfDrNX9UfeA7f+ijyBgeFQjYUoDpFqapw4nzQBL
 | 
			
		||||
bAXug8pKkRwa2Zh8YODhXsRWu2F/UckCAwEAATANBgkqhkiG9w0BAQQFAANBAH9a
 | 
			
		||||
OBA+QCsjxXgnSqHx04gcU8S49DVUb1f2XVoLnHlIb8RnX0k5O6mpHT5eti9bLkiW
 | 
			
		||||
GJNMJ4L0AJ/ac+SmHZc=
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICajCCAdMCBDGA0QUwDQYJKoZIhvcNAQEEBQAwfTELMAkGA1UEBhMCQ2ExDzAN
 | 
			
		||||
BgNVBAcTBk5lcGVhbjEeMBwGA1UECxMVTm8gTGlhYmlsaXR5IEFjY2VwdGVkMR8w
 | 
			
		||||
HQYDVQQKExZGb3IgRGVtbyBQdXJwb3NlcyBPbmx5MRwwGgYDVQQDExNFbnRydXN0
 | 
			
		||||
IERlbW8gV2ViIENBMB4XDTk2MDQyNjEzMzUwMVoXDTA2MDQyNjEzMzUwMVowfTEL
 | 
			
		||||
MAkGA1UEBhMCQ2ExDzANBgNVBAcTBk5lcGVhbjEeMBwGA1UECxMVTm8gTGlhYmls
 | 
			
		||||
aXR5IEFjY2VwdGVkMR8wHQYDVQQKExZGb3IgRGVtbyBQdXJwb3NlcyBPbmx5MRww
 | 
			
		||||
GgYDVQQDExNFbnRydXN0IERlbW8gV2ViIENBMIGdMA0GCSqGSIb3DQEBAQUAA4GL
 | 
			
		||||
ADCBhwKBgQCaroS7O1DA0hm4IefNYU1cx/nqOmzEnk291d1XqznDeF4wEgakbkCc
 | 
			
		||||
zTKxK791yNpXG5RmngqH7cygDRTHZJ6mfCRn0wGC+AI00F2vYTGqPGRQL1N3lZT0
 | 
			
		||||
YDKFC0SQeMMjFIZ1aeQigroFQnHo0VB3zWIMpNkka8PY9lxHZAmWwQIBAzANBgkq
 | 
			
		||||
hkiG9w0BAQQFAAOBgQBAx0UMVA1s54lMQyXjMX5kj99FJN5itb8bK1Rk+cegPQPF
 | 
			
		||||
cWO9SEWyEjjBjIkjjzAwBkaEszFsNGxemxtXvwjIm1xEUMTVlPEWTs2qnDvAUA9W
 | 
			
		||||
YqhWbhH0toGT36236QAsqCZ76rbTRVSSX2BHyJwJMG2tCRv7kRJ//NIgxj3H4w==
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
issuer= /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test PCA (1024 bit)
 | 
			
		||||
subject=/C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test PCA (1024 bit)
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICJzCCAZACAQAwDQYJKoZIhvcNAQEEBQAwXDELMAkGA1UEBhMCQVUxEzARBgNV
 | 
			
		||||
BAgTClF1ZWVuc2xhbmQxGjAYBgNVBAoTEUNyeXB0U29mdCBQdHkgTHRkMRwwGgYD
 | 
			
		||||
VQQDExNUZXN0IFBDQSAoMTAyNCBiaXQpMB4XDTk3MDYwOTEzNTczN1oXDTAxMDYw
 | 
			
		||||
OTEzNTczN1owXDELMAkGA1UEBhMCQVUxEzARBgNVBAgTClF1ZWVuc2xhbmQxGjAY
 | 
			
		||||
BgNVBAoTEUNyeXB0U29mdCBQdHkgTHRkMRwwGgYDVQQDExNUZXN0IFBDQSAoMTAy
 | 
			
		||||
NCBiaXQpMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCdoWk/3+WcMlfjIrkg
 | 
			
		||||
40ketmnQaEogQe1LLcuOJV6rKfUSAsPgwgsabJ/wn8TxA1yy3eKJbFl3OiUXMRsp
 | 
			
		||||
22Jp85PmemiDzyUIStwk72qhp1imbANZvlmlCFKiQrjUyuDfu4TABmn+kkt3vR1Y
 | 
			
		||||
BEOGt+IFye1UBVSATVdRJ2UVhwIDAQABMA0GCSqGSIb3DQEBBAUAA4GBABNA1u/S
 | 
			
		||||
Cg/LJZWb7GliiKJsvuhxlE4E5JxQF2zMub/CSNbF97//tYSyj96sxeFQxZXbcjm9
 | 
			
		||||
xt6mr/xNLA4szNQMJ4P+L7b5e/jC5DSqlwS+CUYJgaFs/SP+qJoCSu1bR3IM9XWO
 | 
			
		||||
cRBpDmcBbYLkSyB92WURvsZ1LtjEcn+cdQVI
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
-----BEGIN RSA PRIVATE KEY-----
 | 
			
		||||
MIICXAIBAAKBgQCdoWk/3+WcMlfjIrkg40ketmnQaEogQe1LLcuOJV6rKfUSAsPg
 | 
			
		||||
wgsabJ/wn8TxA1yy3eKJbFl3OiUXMRsp22Jp85PmemiDzyUIStwk72qhp1imbANZ
 | 
			
		||||
vlmlCFKiQrjUyuDfu4TABmn+kkt3vR1YBEOGt+IFye1UBVSATVdRJ2UVhwIDAQAB
 | 
			
		||||
AoGAba4fTtuap5l7/8ZsbE7Z1O32KJY4ZcOZukLOLUUhXxXduT+FTgGWujc0/rgc
 | 
			
		||||
z9qYCLlNZHOouMYTgtSfYvuMuLZ11VIt0GYH+nRioLShE59Yy+zCRyC+gPigS1kz
 | 
			
		||||
xvo14AsOIPYV14Tk/SsHyq6E0eTk7VzaIE197giiINUERPECQQDSKmtPTh/lRKw7
 | 
			
		||||
HSZSM0I1mFWn/1zqrAbontRQY5w98QWIOe5qmzYyFbPXYT3d9BzlsMyhgiRNoBbD
 | 
			
		||||
yvohSHXJAkEAwAHx6ezAZeWWzD5yXD36nyjpkVCw7Tk7TSmOceLJMWt1QcrCfqlS
 | 
			
		||||
xA5jjpQ6Z8suU5DdtWAryM2sAir1WisYzwJAd6Zcx56jvAQ3xcPXsE6scBTVFzrj
 | 
			
		||||
7FqZ6E+cclPzfLQ+QQsyOBE7bpI6e/FJppY26XGZXo3YGzV8IGXrt40oOQJALETG
 | 
			
		||||
h86EFXo3qGOFbmsDy4pdP5nBERCu8X1xUCSfintiD4c2DInxgS5oGclnJeMcjTvL
 | 
			
		||||
QjQoJCX3UJCi/OUO1QJBAKgcDHWjMvt+l1pjJBsSEZ0HX9AAIIVx0RQmbFGS+F2Q
 | 
			
		||||
hhu5l77WnnZOQ9vvhV5u7NPCUF9nhU3jh60qWWO8mkc=
 | 
			
		||||
-----END RSA PRIVATE KEY-----
 | 
			
		||||
subject=/C=US/O=RSA Data Security, Inc./OU=Commercial Certification Authority
 | 
			
		||||
issuer= /C=US/O=RSA Data Security, Inc./OU=Commercial Certification Authority
 | 
			
		||||
notBefore=941104185834Z
 | 
			
		||||
notAfter =991103185834Z
 | 
			
		||||
-----BEGIN X509 CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
MIICIzCCAZACBQJBAAAWMA0GCSqGSIb3DQEBAgUAMFwxCzAJBgNVBAYTAlVTMSAw
 | 
			
		||||
HgYDVQQKExdSU0EgRGF0YSBTZWN1cml0eSwgSW5jLjErMCkGA1UECxMiQ29tbWVy
 | 
			
		||||
Y2lhbCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw05NDExMDQxODU4MzRaFw05
 | 
			
		||||
OTExMDMxODU4MzRaMFwxCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdSU0EgRGF0YSBT
 | 
			
		||||
ZWN1cml0eSwgSW5jLjErMCkGA1UECxMiQ29tbWVyY2lhbCBDZXJ0aWZpY2F0aW9u
 | 
			
		||||
IEF1dGhvcml0eTCBmzANBgkqhkiG9w0BAQEFAAOBiQAwgYUCfgCk+4Fie84QJ93o
 | 
			
		||||
975sbsZwmdu41QUDaSiCnHJ/lj+O7Kwpkj+KFPhCdr69XQO5kNTQvAayUTNfxMK/
 | 
			
		||||
touPmbZiImDd298ggrTKoi8tUO2UMt7gVY3UaOLgTNLNBRYulWZcYVI4HlGogqHE
 | 
			
		||||
7yXpCuaLK44xZtn42f29O2nZ6wIDAQABMA0GCSqGSIb3DQEBAgUAA34AdrW2EP4j
 | 
			
		||||
9/dZYkuwX5zBaLxJu7NJbyFHXSudVMQAKD+YufKKg5tgf+tQx6sFEC097TgCwaVI
 | 
			
		||||
0v5loMC86qYjFmZsGySp8+x5NRhPJsjjr1BKx6cxa9B8GJ1Qv6km+iYrRpwUqbtb
 | 
			
		||||
MJhCKLVLU7tDCZJAuqiqWqTGtotXTcU=
 | 
			
		||||
-----END X509 CERTIFICATE-----
 | 
			
		||||
subject=/C=US/O=RSA Data Security, Inc./OU=Secure Server Certification Authority
 | 
			
		||||
issuer= /C=US/O=RSA Data Security, Inc./OU=Secure Server Certification Authority
 | 
			
		||||
notBefore=941109235417Z
 | 
			
		||||
notAfter =991231235417Z
 | 
			
		||||
-----BEGIN X509 CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
MIICKTCCAZYCBQJBAAABMA0GCSqGSIb3DQEBAgUAMF8xCzAJBgNVBAYTAlVTMSAw
 | 
			
		||||
HgYDVQQKExdSU0EgRGF0YSBTZWN1cml0eSwgSW5jLjEuMCwGA1UECxMlU2VjdXJl
 | 
			
		||||
IFNlcnZlciBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw05NDExMDkyMzU0MTda
 | 
			
		||||
Fw05OTEyMzEyMzU0MTdaMF8xCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdSU0EgRGF0
 | 
			
		||||
YSBTZWN1cml0eSwgSW5jLjEuMCwGA1UECxMlU2VjdXJlIFNlcnZlciBDZXJ0aWZp
 | 
			
		||||
Y2F0aW9uIEF1dGhvcml0eTCBmzANBgkqhkiG9w0BAQEFAAOBiQAwgYUCfgCSznrB
 | 
			
		||||
roM+WqqJg1esJQF2DK2ujiw3zus1eGRUA+WEQFHJv48I4oqCCNIWhjdV6bEhAq12
 | 
			
		||||
aIGaBaJLyUslZiJWbIgHj/eBWW2EB2VwE3F2Ppt3TONQiVaYSLkdpykaEy5KEVmc
 | 
			
		||||
HhXVSVQsczppgrGXOZxtcGdI5d0t1sgeewIDAQABMA0GCSqGSIb3DQEBAgUAA34A
 | 
			
		||||
iNHReSHO4ovo+MF9NFM/YYPZtgs4F7boviGNjwC4i1N+RGceIr2XJ+CchcxK9oU7
 | 
			
		||||
suK+ktPlDemvXA4MRpX/oRxePug2WHpzpgr4IhFrwwk4fia7c+8AvQKk8xQNMD9h
 | 
			
		||||
cHsg/jKjn7P0Z1LctO6EjJY2IN6BCINxIYoPnqk=
 | 
			
		||||
-----END X509 CERTIFICATE-----
 | 
			
		||||
subject=/C=ZA/SP=Western Cape/L=Cape Town/O=Thawte Consulting cc
 | 
			
		||||
	/OU=Certification Services Division/CN=Thawte Server CA
 | 
			
		||||
	/Email=server-certs@thawte.com
 | 
			
		||||
issuer= /C=ZA/SP=Western Cape/L=Cape Town/O=Thawte Consulting cc
 | 
			
		||||
	/OU=Certification Services Division/CN=Thawte Server CA
 | 
			
		||||
	/Email=server-certs@thawte.com
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIIC+TCCAmICAQAwDQYJKoZIhvcNAQEEBQAwgcQxCzAJBgNVBAYTAlpBMRUwEwYD
 | 
			
		||||
VQQIEwxXZXN0ZXJuIENhcGUxEjAQBgNVBAcTCUNhcGUgVG93bjEdMBsGA1UEChMU
 | 
			
		||||
VGhhd3RlIENvbnN1bHRpbmcgY2MxKDAmBgNVBAsTH0NlcnRpZmljYXRpb24gU2Vy
 | 
			
		||||
dmljZXMgRGl2aXNpb24xGTAXBgNVBAMTEFRoYXd0ZSBTZXJ2ZXIgQ0ExJjAkBgkq
 | 
			
		||||
hkiG9w0BCQEWF3NlcnZlci1jZXJ0c0B0aGF3dGUuY29tMB4XDTk2MDcyNzE4MDc1
 | 
			
		||||
N1oXDTk4MDcyNzE4MDc1N1owgcQxCzAJBgNVBAYTAlpBMRUwEwYDVQQIEwxXZXN0
 | 
			
		||||
ZXJuIENhcGUxEjAQBgNVBAcTCUNhcGUgVG93bjEdMBsGA1UEChMUVGhhd3RlIENv
 | 
			
		||||
bnN1bHRpbmcgY2MxKDAmBgNVBAsTH0NlcnRpZmljYXRpb24gU2VydmljZXMgRGl2
 | 
			
		||||
aXNpb24xGTAXBgNVBAMTEFRoYXd0ZSBTZXJ2ZXIgQ0ExJjAkBgkqhkiG9w0BCQEW
 | 
			
		||||
F3NlcnZlci1jZXJ0c0B0aGF3dGUuY29tMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCB
 | 
			
		||||
iQKBgQDTpFBuyP9Wa+bPXbbqDGh1R6KqwtqEJfyo9EdR2oW1IHSUhh4PdcnpCGH1
 | 
			
		||||
Bm0wbhUZAulSwGLbTZme4moMRDjN/r7jZAlwxf6xaym2L0nIO9QnBCUQly/nkG3A
 | 
			
		||||
KEKZ10xD3sP1IW1Un13DWOHA5NlbsLjctHvfNjrCtWYiEtaHDQIDAQABMA0GCSqG
 | 
			
		||||
SIb3DQEBBAUAA4GBAIsvn7ifX3RUIrvYXtpI4DOfARkTogwm6o7OwVdl93yFhDcX
 | 
			
		||||
7h5t0XZ11MUAMziKdde3rmTvzUYIUCYoY5b032IwGMTvdiclK+STN6NP2m5nvFAM
 | 
			
		||||
qJT5gC5O+j/jBuZRQ4i0AMYQr5F4lT8oBJnhgafw6PL8aDY2vMHGSPl9+7uf
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIIDDTCCAnYCAQAwDQYJKoZIhvcNAQEEBQAwgc4xCzAJBgNVBAYTAlpBMRUwEwYD
 | 
			
		||||
VQQIEwxXZXN0ZXJuIENhcGUxEjAQBgNVBAcTCUNhcGUgVG93bjEdMBsGA1UEChMU
 | 
			
		||||
VGhhd3RlIENvbnN1bHRpbmcgY2MxKDAmBgNVBAsTH0NlcnRpZmljYXRpb24gU2Vy
 | 
			
		||||
dmljZXMgRGl2aXNpb24xITAfBgNVBAMTGFRoYXd0ZSBQcmVtaXVtIFNlcnZlciBD
 | 
			
		||||
QTEoMCYGCSqGSIb3DQEJARYZcHJlbWl1bS1zZXJ2ZXJAdGhhd3RlLmNvbTAeFw05
 | 
			
		||||
NjA3MjcxODA3MTRaFw05ODA3MjcxODA3MTRaMIHOMQswCQYDVQQGEwJaQTEVMBMG
 | 
			
		||||
A1UECBMMV2VzdGVybiBDYXBlMRIwEAYDVQQHEwlDYXBlIFRvd24xHTAbBgNVBAoT
 | 
			
		||||
FFRoYXd0ZSBDb25zdWx0aW5nIGNjMSgwJgYDVQQLEx9DZXJ0aWZpY2F0aW9uIFNl
 | 
			
		||||
cnZpY2VzIERpdmlzaW9uMSEwHwYDVQQDExhUaGF3dGUgUHJlbWl1bSBTZXJ2ZXIg
 | 
			
		||||
Q0ExKDAmBgkqhkiG9w0BCQEWGXByZW1pdW0tc2VydmVyQHRoYXd0ZS5jb20wgZ8w
 | 
			
		||||
DQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBANI2NmqL18JbntqBQWKPOO5JBFXW0O8c
 | 
			
		||||
G5UWR+8YSDU6UvQragaPOy/qVuOvho2eF/eetGV1Ak3vywmiIVHYm9Bn0LoNkgYU
 | 
			
		||||
c9STy5cqAJxcTgy8+hVS/PJEbtoRSm4Iny8t4/mqOoZztkZTWMiJBb2DEbhzP6oH
 | 
			
		||||
jfRCTedAnRw3AgMBAAEwDQYJKoZIhvcNAQEEBQADgYEAutFIgTRZVYerIZfL9lvR
 | 
			
		||||
w9Eifvvo5KTZ3h+Bj+VzNnyw4Qc/IyXkPOu6SIiH9LQ3sCmWBdxpe+qr4l77rLj2
 | 
			
		||||
GYuMtESFfn1XVALzkYgC7JcPuTOjMfIiMByt+uFf8AV8x0IW/Qkuv+hEQcyM9vxK
 | 
			
		||||
3VZdLbCVIhNoEsysrxCpxcI=
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
Tims test GCI CA
 | 
			
		||||
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIIB8DCCAZoCAQAwDQYJKoZIhvcNAQEEBQAwgYIxCzAJBgNVBAYTAkFVMRMwEQYD
 | 
			
		||||
VQQIEwpRdWVlbnNsYW5kMREwDwYDVQQHEwhCcmlzYmFuZTEaMBgGA1UEChMRQ3J5
 | 
			
		||||
cHRTb2Z0IFB0eSBMdGQxFDASBgNVBAsTC2RldmVsb3BtZW50MRkwFwYDVQQDExBD
 | 
			
		||||
cnlwdFNvZnQgRGV2IENBMB4XDTk3MDMyMjEzMzQwNFoXDTk4MDMyMjEzMzQwNFow
 | 
			
		||||
gYIxCzAJBgNVBAYTAkFVMRMwEQYDVQQIEwpRdWVlbnNsYW5kMREwDwYDVQQHEwhC
 | 
			
		||||
cmlzYmFuZTEaMBgGA1UEChMRQ3J5cHRTb2Z0IFB0eSBMdGQxFDASBgNVBAsTC2Rl
 | 
			
		||||
dmVsb3BtZW50MRkwFwYDVQQDExBDcnlwdFNvZnQgRGV2IENBMFwwDQYJKoZIhvcN
 | 
			
		||||
AQEBBQADSwAwSAJBAOAOAqogG5QwAmLhzyO4CoRnx/wVy4NZP4dxJy83O1EnL0rw
 | 
			
		||||
OdsamJKvPOLHgSXo3gDu9uVyvCf/QJmZAmC5ml8CAwEAATANBgkqhkiG9w0BAQQF
 | 
			
		||||
AANBADRRS/GVdd7rAqRW6SdmgLJduOU2yq3avBu99kRqbp9A/dLu6r6jU+eP4oOA
 | 
			
		||||
TfdbFZtAAD2Hx9jUtY3tfdrJOb8= 
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICVjCCAgACAQAwDQYJKoZIhvcNAQEEBQAwgbUxCzAJBgNVBAYTAkFVMRMwEQYD
 | 
			
		||||
VQQIEwpRdWVlbnNsYW5kMREwDwYDVQQHEwhCcmlzYmFuZTEaMBgGA1UEChMRQ3J5
 | 
			
		||||
cHRTb2Z0IFB0eSBMdGQxLDAqBgNVBAsTI1dPUlRITEVTUyBDRVJUSUZJQ0FUSU9O
 | 
			
		||||
IEFVVEhPUklUSUVTMTQwMgYDVQQDEytaRVJPIFZBTFVFIENBIC0gREVNT05TVFJB
 | 
			
		||||
VElPTiBQVVJQT1NFUyBPTkxZMB4XDTk3MDQwMzEzMjI1NFoXDTk4MDQwMzEzMjI1
 | 
			
		||||
NFowgbUxCzAJBgNVBAYTAkFVMRMwEQYDVQQIEwpRdWVlbnNsYW5kMREwDwYDVQQH
 | 
			
		||||
EwhCcmlzYmFuZTEaMBgGA1UEChMRQ3J5cHRTb2Z0IFB0eSBMdGQxLDAqBgNVBAsT
 | 
			
		||||
I1dPUlRITEVTUyBDRVJUSUZJQ0FUSU9OIEFVVEhPUklUSUVTMTQwMgYDVQQDEyta
 | 
			
		||||
RVJPIFZBTFVFIENBIC0gREVNT05TVFJBVElPTiBQVVJQT1NFUyBPTkxZMFwwDQYJ
 | 
			
		||||
KoZIhvcNAQEBBQADSwAwSAJBAOZ7T7yqP/tyspcko3yPY1y0Cm2EmwNvzW4QgVXR
 | 
			
		||||
Fjs3HmJ4xtSpXdo6mwcGezL3Abt/aQXaxv9PU8xt+Jr0OFUCAwEAATANBgkqhkiG
 | 
			
		||||
9w0BAQQFAANBAOQpYmGgyCqCy1OljgJhCqQOu627oVlHzK1L+t9vBaMfn40AVUR4
 | 
			
		||||
WzQVWO31KTgi5vTK1U+3h46fgUWqQ0h+6rU=
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIAwgKADAgECAgEAMA0GCSqGSIb3DQEBBAUAMGIxETAPBgNVBAcTCEludGVybmV0
 | 
			
		||||
MRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjE0MDIGA1UECxMrVmVyaVNpZ24gQ2xh
 | 
			
		||||
c3MgMSBDQSAtIEluZGl2aWR1YWwgU3Vic2NyaWJlcjAeFw05NjA0MDgxMDIwMjda
 | 
			
		||||
Fw05NzA0MDgxMDIwMjdaMGIxETAPBgNVBAcTCEludGVybmV0MRcwFQYDVQQKEw5W
 | 
			
		||||
ZXJpU2lnbiwgSW5jLjE0MDIGA1UECxMrVmVyaVNpZ24gQ2xhc3MgMSBDQSAtIElu
 | 
			
		||||
ZGl2aWR1YWwgU3Vic2NyaWJlcjCAMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC2
 | 
			
		||||
FKbPTdAFDdjKI9BvqrQpkmOOLPhvltcunXZLEbE2jVfJw/0cxrr+Hgi6M8qV6r7j
 | 
			
		||||
W80GqLd5HUQq7XPysVKDaBBwZJHXPmv5912dFEObbpdFmIFH0S3L3bty10w/cari
 | 
			
		||||
QPJUObwW7s987LrbP2wqsxaxhhKdrpM01bjV0Pc+qQIDAQABAAAAADANBgkqhkiG
 | 
			
		||||
9w0BAQQFAAOBgQA+1nJryNt8VBRjRr07ArDAV/3jAH7GjDc9jsrxZS68ost9v06C
 | 
			
		||||
TvTNKGL+LISNmFLXl+JXhgGB0JZ9fvyYzNgHQ46HBUng1H6voalfJgS2KdEo50wW
 | 
			
		||||
8EFZYMDkT1k4uynwJqkVN2QJK/2q4/A/VCov5h6SlM8Affg2W+1TLqvqkwAA
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
 subject=/L=Internet/O=VeriSign, Inc./OU=VeriSign Class 2 CA - Individual Subscriber
 | 
			
		||||
 issuer= /L=Internet/O=VeriSign, Inc./OU=VeriSign Class 2 CA - Individual Subscriber
 | 
			
		||||
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIIEkzCCA/ygAwIBAgIRANDTUpSRL3nTFeMrMayFSPAwDQYJKoZIhvcNAQECBQAw
 | 
			
		||||
YjERMA8GA1UEBxMISW50ZXJuZXQxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMTQw
 | 
			
		||||
MgYDVQQLEytWZXJpU2lnbiBDbGFzcyAyIENBIC0gSW5kaXZpZHVhbCBTdWJzY3Jp
 | 
			
		||||
YmVyMB4XDTk2MDYwNDAwMDAwMFoXDTk4MDYwNDIzNTk1OVowYjERMA8GA1UEBxMI
 | 
			
		||||
SW50ZXJuZXQxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMTQwMgYDVQQLEytWZXJp
 | 
			
		||||
U2lnbiBDbGFzcyAyIENBIC0gSW5kaXZpZHVhbCBTdWJzY3JpYmVyMIGfMA0GCSqG
 | 
			
		||||
SIb3DQEBAQUAA4GNADCBiQKBgQC6A+2czKGRcYMfm8gdnk+0de99TDDzsqo0v5nb
 | 
			
		||||
RsbUmMcdRQ7nsMbRWe0SAb/9QoLTZ/cJ0iOBqdrkz7UpqqKarVoTSdlSMVM92tWp
 | 
			
		||||
3bJncZHQD1t4xd6lQVdI1/T6R+5J0T1ukOdsI9Jmf+F28S6g3R3L1SFwiHKeZKZv
 | 
			
		||||
z+793wIDAQABo4ICRzCCAkMwggIpBgNVHQMBAf8EggIdMIICGTCCAhUwggIRBgtg
 | 
			
		||||
hkgBhvhFAQcBATCCAgAWggGrVGhpcyBjZXJ0aWZpY2F0ZSBpbmNvcnBvcmF0ZXMg
 | 
			
		||||
YnkgcmVmZXJlbmNlLCBhbmQgaXRzIHVzZSBpcyBzdHJpY3RseSBzdWJqZWN0IHRv
 | 
			
		||||
LCB0aGUgVmVyaVNpZ24gQ2VydGlmaWNhdGlvbiBQcmFjdGljZSBTdGF0ZW1lbnQg
 | 
			
		||||
KENQUyksIGF2YWlsYWJsZSBhdDogaHR0cHM6Ly93d3cudmVyaXNpZ24uY29tL0NQ
 | 
			
		||||
Uy0xLjA7IGJ5IEUtbWFpbCBhdCBDUFMtcmVxdWVzdHNAdmVyaXNpZ24uY29tOyBv
 | 
			
		||||
ciBieSBtYWlsIGF0IFZlcmlTaWduLCBJbmMuLCAyNTkzIENvYXN0IEF2ZS4sIE1v
 | 
			
		||||
dW50YWluIFZpZXcsIENBIDk0MDQzIFVTQSBUZWwuICsxICg0MTUpIDk2MS04ODMw
 | 
			
		||||
IENvcHlyaWdodCAoYykgMTk5NiBWZXJpU2lnbiwgSW5jLiAgQWxsIFJpZ2h0cyBS
 | 
			
		||||
ZXNlcnZlZC4gQ0VSVEFJTiBXQVJSQU5USUVTIERJU0NMQUlNRUQgYW5kIExJQUJJ
 | 
			
		||||
TElUWSBMSU1JVEVELqAOBgxghkgBhvhFAQcBAQGhDgYMYIZIAYb4RQEHAQECMC8w
 | 
			
		||||
LRYraHR0cHM6Ly93d3cudmVyaXNpZ24uY29tL3JlcG9zaXRvcnkvQ1BTLTEuMDAU
 | 
			
		||||
BglghkgBhvhCAQEBAf8EBAMCAgQwDQYJKoZIhvcNAQECBQADgYEApRJRkNBqLLgs
 | 
			
		||||
53IR/d18ODdLOWMTZ+QOOxBrq460iBEdUwgF8vmPRX1ku7UiDeNzaLlurE6eFqHq
 | 
			
		||||
2zPyK5j60zfTLVJMWKcQWwTJLjHtXrW8pxhNtFc6Fdvy5ZkHnC/9NIl7/t4U6WqB
 | 
			
		||||
p4y+p7SdMIkEwIZfds0VbnQyX5MRUJY=
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
 subject=/C=US/O=VeriSign, Inc./OU=Class 3 Public Primary Certification Authority
 | 
			
		||||
 issuer= /C=US/O=VeriSign, Inc./OU=Class 3 Public Primary Certification Authority
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICMTCCAZoCBQKhAAABMA0GCSqGSIb3DQEBAgUAMF8xCzAJBgNVBAYTAlVTMRcw
 | 
			
		||||
FQYDVQQKEw5WZXJpU2lnbiwgSW5jLjE3MDUGA1UECxMuQ2xhc3MgMyBQdWJsaWMg
 | 
			
		||||
UHJpbWFyeSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw05NjAxMjkwMDAwMDBa
 | 
			
		||||
Fw05OTEyMzEyMzU5NTlaMF8xCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2ln
 | 
			
		||||
biwgSW5jLjE3MDUGA1UECxMuQ2xhc3MgMyBQdWJsaWMgUHJpbWFyeSBDZXJ0aWZp
 | 
			
		||||
Y2F0aW9uIEF1dGhvcml0eTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAyVxZ
 | 
			
		||||
nvIbigEUtBDfBEDb41evakVAj4QMC9Ez2dkRz+4CWB8l9yqoRAWq7AMfeH+ek7ma
 | 
			
		||||
AKojfdashaJjRcdyJ8z0TMZ1cdI5709C8HXfCpDGjiBvmA/4rCNfcCk2pMmG57Ga
 | 
			
		||||
IMtTpYXnPb59mv4kRTPcdhXtD6JxZExlLoFoRacCAwEAATANBgkqhkiG9w0BAQIF
 | 
			
		||||
AAOBgQB1Zmw+0c2B27X4LzZRtvdCvM1Cr9wO+hVs+GeTVzrrtpLotgHKjLeOQ7RJ
 | 
			
		||||
Zfk+7r11Ri7J/CVdqMcvi5uPaM+0nJcYwE3vH9mvgrPmZLiEXIqaB1JDYft0nls6
 | 
			
		||||
NvxMsvwaPxUupVs8G5DsiCnkWRb5zget7Ond2tIxik/W2O8XjQ==
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
 subject=/C=US/O=VeriSign, Inc./OU=Class 4 Public Primary Certification Authority
 | 
			
		||||
 issuer= /C=US/O=VeriSign, Inc./OU=Class 4 Public Primary Certification Authority
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICMTCCAZoCBQKmAAABMA0GCSqGSIb3DQEBAgUAMF8xCzAJBgNVBAYTAlVTMRcw
 | 
			
		||||
FQYDVQQKEw5WZXJpU2lnbiwgSW5jLjE3MDUGA1UECxMuQ2xhc3MgNCBQdWJsaWMg
 | 
			
		||||
UHJpbWFyeSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw05NjAxMjkwMDAwMDBa
 | 
			
		||||
Fw05OTEyMzEyMzU5NTlaMF8xCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2ln
 | 
			
		||||
biwgSW5jLjE3MDUGA1UECxMuQ2xhc3MgNCBQdWJsaWMgUHJpbWFyeSBDZXJ0aWZp
 | 
			
		||||
Y2F0aW9uIEF1dGhvcml0eTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA0LJ1
 | 
			
		||||
9njQrlpQ9OlQqZ+M1++RlHDo0iSQdomF1t+s5gEXMoDwnZNHvJplnR+Xrr/phnVj
 | 
			
		||||
IIm9gFidBAydqMEk6QvlMXi9/C0MN2qeeIDpRnX57aP7E3vIwUzSo+/1PLBij0pd
 | 
			
		||||
O92VZ48TucE81qcmm+zDO3rZTbxtm+gVAePwR6kCAwEAATANBgkqhkiG9w0BAQIF
 | 
			
		||||
AAOBgQBT3dPwnCR+QKri/AAa19oM/DJhuBUNlvP6Vxt/M3yv6ZiaYch6s7f/sdyZ
 | 
			
		||||
g9ysEvxwyR84Qu1E9oAuW2szaayc01znX1oYx7EteQSWQZGZQbE8DbqEOcY7l/Am
 | 
			
		||||
yY7uvcxClf8exwI/VAx49byqYHwCaejcrOICdmHEPgPq0ook0Q==
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
 
 | 
			
		||||
@@ -90,6 +90,7 @@ int MAIN(int, char **);
 | 
			
		||||
int MAIN(int argc, char **argv)
 | 
			
		||||
	{
 | 
			
		||||
	SSL_SESSION *x=NULL;
 | 
			
		||||
	X509 *peer = NULL;
 | 
			
		||||
	int ret=1,i,num,badops=0;
 | 
			
		||||
	BIO *out=NULL;
 | 
			
		||||
	int informat,outformat;
 | 
			
		||||
@@ -163,16 +164,17 @@ bad:
 | 
			
		||||
	ERR_load_crypto_strings();
 | 
			
		||||
	x=load_sess_id(infile,informat);
 | 
			
		||||
	if (x == NULL) { goto end; }
 | 
			
		||||
	peer = SSL_SESSION_get0_peer(x);
 | 
			
		||||
 | 
			
		||||
	if(context)
 | 
			
		||||
	    {
 | 
			
		||||
	    x->sid_ctx_length=strlen(context);
 | 
			
		||||
	    if(x->sid_ctx_length > SSL_MAX_SID_CTX_LENGTH)
 | 
			
		||||
	    size_t ctx_len = strlen(context);
 | 
			
		||||
	    if(ctx_len > SSL_MAX_SID_CTX_LENGTH)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf(bio_err,"Context too long\n");
 | 
			
		||||
		goto end;
 | 
			
		||||
		}
 | 
			
		||||
	    memcpy(x->sid_ctx,context,x->sid_ctx_length);
 | 
			
		||||
	    SSL_SESSION_set1_id_context(x, (unsigned char *)context, ctx_len);
 | 
			
		||||
	    }
 | 
			
		||||
 | 
			
		||||
#ifdef undef
 | 
			
		||||
@@ -231,10 +233,10 @@ bad:
 | 
			
		||||
 | 
			
		||||
		if (cert)
 | 
			
		||||
			{
 | 
			
		||||
			if (x->peer == NULL)
 | 
			
		||||
			if (peer == NULL)
 | 
			
		||||
				BIO_puts(out,"No certificate present\n");
 | 
			
		||||
			else
 | 
			
		||||
				X509_print(out,x->peer);
 | 
			
		||||
				X509_print(out,peer);
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
@@ -253,12 +255,12 @@ bad:
 | 
			
		||||
			goto end;
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
	else if (!noout && (x->peer != NULL)) /* just print the certificate */
 | 
			
		||||
	else if (!noout && (peer != NULL)) /* just print the certificate */
 | 
			
		||||
		{
 | 
			
		||||
		if 	(outformat == FORMAT_ASN1)
 | 
			
		||||
			i=(int)i2d_X509_bio(out,x->peer);
 | 
			
		||||
			i=(int)i2d_X509_bio(out,peer);
 | 
			
		||||
		else if (outformat == FORMAT_PEM)
 | 
			
		||||
			i=PEM_write_bio_X509(out,x->peer);
 | 
			
		||||
			i=PEM_write_bio_X509(out,peer);
 | 
			
		||||
		else	{
 | 
			
		||||
			BIO_printf(bio_err,"bad output format specified for outfile\n");
 | 
			
		||||
			goto end;
 | 
			
		||||
 
 | 
			
		||||
@@ -541,8 +541,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		{
 | 
			
		||||
		if (!cipher)
 | 
			
		||||
			{
 | 
			
		||||
#ifndef OPENSSL_NO_RC2			
 | 
			
		||||
			cipher = EVP_rc2_40_cbc();
 | 
			
		||||
#ifndef OPENSSL_NO_DES			
 | 
			
		||||
			cipher = EVP_des_ede3_cbc();
 | 
			
		||||
#else
 | 
			
		||||
			BIO_printf(bio_err, "No cipher selected\n");
 | 
			
		||||
			goto end;
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										222
									
								
								apps/speed.c
									
									
									
									
									
								
							
							
						
						
									
										222
									
								
								apps/speed.c
									
									
									
									
									
								
							@@ -108,8 +108,14 @@
 | 
			
		||||
#include <signal.h>
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#ifdef _WIN32
 | 
			
		||||
#if defined(_WIN32) || defined(__CYGWIN__)
 | 
			
		||||
#include <windows.h>
 | 
			
		||||
# if defined(__CYGWIN__) && !defined(_WIN32)
 | 
			
		||||
  /* <windows.h> should define _WIN32, which normally is mutually
 | 
			
		||||
   * exclusive with __CYGWIN__, but if it didn't... */
 | 
			
		||||
#  define _WIN32
 | 
			
		||||
  /* this is done because Cygwin alarm() fails sometimes. */
 | 
			
		||||
# endif
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#include <openssl/bn.h>
 | 
			
		||||
@@ -183,6 +189,25 @@
 | 
			
		||||
#ifndef OPENSSL_NO_ECDH
 | 
			
		||||
#include <openssl/ecdh.h>
 | 
			
		||||
#endif
 | 
			
		||||
#include <openssl/modes.h>
 | 
			
		||||
 | 
			
		||||
#ifdef OPENSSL_FIPS
 | 
			
		||||
#ifdef OPENSSL_DOING_MAKEDEPEND
 | 
			
		||||
#undef AES_set_encrypt_key
 | 
			
		||||
#undef AES_set_decrypt_key
 | 
			
		||||
#undef DES_set_key_unchecked
 | 
			
		||||
#endif
 | 
			
		||||
#define BF_set_key	private_BF_set_key
 | 
			
		||||
#define CAST_set_key	private_CAST_set_key
 | 
			
		||||
#define idea_set_encrypt_key	private_idea_set_encrypt_key
 | 
			
		||||
#define SEED_set_key	private_SEED_set_key
 | 
			
		||||
#define RC2_set_key	private_RC2_set_key
 | 
			
		||||
#define RC4_set_key	private_RC4_set_key
 | 
			
		||||
#define DES_set_key_unchecked	private_DES_set_key_unchecked
 | 
			
		||||
#define AES_set_encrypt_key	private_AES_set_encrypt_key
 | 
			
		||||
#define AES_set_decrypt_key	private_AES_set_decrypt_key
 | 
			
		||||
#define Camellia_set_key	private_Camellia_set_key
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#ifndef HAVE_FORK
 | 
			
		||||
# if defined(OPENSSL_SYS_VMS) || defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MACINTOSH_CLASSIC) || defined(OPENSSL_SYS_OS2) || defined(OPENSSL_SYS_NETWARE)
 | 
			
		||||
@@ -200,7 +225,7 @@
 | 
			
		||||
 | 
			
		||||
#undef BUFSIZE
 | 
			
		||||
#define BUFSIZE	((long)1024*8+1)
 | 
			
		||||
int run=0;
 | 
			
		||||
static volatile int run=0;
 | 
			
		||||
 | 
			
		||||
static int mr=0;
 | 
			
		||||
static int usertime=1;
 | 
			
		||||
@@ -214,7 +239,7 @@ static void print_result(int alg,int run_no,int count,double time_used);
 | 
			
		||||
static int do_multi(int multi);
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#define ALGOR_NUM	29
 | 
			
		||||
#define ALGOR_NUM	30
 | 
			
		||||
#define SIZE_NUM	5
 | 
			
		||||
#define RSA_NUM		4
 | 
			
		||||
#define DSA_NUM		3
 | 
			
		||||
@@ -229,7 +254,7 @@ static const char *names[ALGOR_NUM]={
 | 
			
		||||
  "aes-128 cbc","aes-192 cbc","aes-256 cbc",
 | 
			
		||||
  "camellia-128 cbc","camellia-192 cbc","camellia-256 cbc",
 | 
			
		||||
  "evp","sha256","sha512","whirlpool",
 | 
			
		||||
  "aes-128 ige","aes-192 ige","aes-256 ige"};
 | 
			
		||||
  "aes-128 ige","aes-192 ige","aes-256 ige","ghash" };
 | 
			
		||||
static double results[ALGOR_NUM][SIZE_NUM];
 | 
			
		||||
static int lengths[SIZE_NUM]={16,64,256,1024,8*1024};
 | 
			
		||||
#ifndef OPENSSL_NO_RSA
 | 
			
		||||
@@ -273,9 +298,12 @@ static SIGRETTYPE sig_done(int sig)
 | 
			
		||||
 | 
			
		||||
#if defined(_WIN32)
 | 
			
		||||
 | 
			
		||||
#define SIGALRM
 | 
			
		||||
#if !defined(SIGALRM)
 | 
			
		||||
# define SIGALRM
 | 
			
		||||
#endif
 | 
			
		||||
static unsigned int lapse,schlock;
 | 
			
		||||
static void alarm(unsigned int secs) { lapse = secs*1000; }
 | 
			
		||||
static void alarm_win32(unsigned int secs) { lapse = secs*1000; }
 | 
			
		||||
#define alarm alarm_win32
 | 
			
		||||
 | 
			
		||||
static DWORD WINAPI sleepy(VOID *arg)
 | 
			
		||||
	{
 | 
			
		||||
@@ -394,27 +422,27 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
#ifndef OPENSSL_NO_CAST
 | 
			
		||||
	CAST_KEY cast_ks;
 | 
			
		||||
#endif
 | 
			
		||||
	static const unsigned char key16[16]=
 | 
			
		||||
		{0x12,0x34,0x56,0x78,0x9a,0xbc,0xde,0xf0,
 | 
			
		||||
	static const unsigned char key16[16]= {
 | 
			
		||||
		0x12,0x34,0x56,0x78,0x9a,0xbc,0xde,0xf0,
 | 
			
		||||
		 0x34,0x56,0x78,0x9a,0xbc,0xde,0xf0,0x12};
 | 
			
		||||
#ifndef OPENSSL_NO_AES
 | 
			
		||||
	static const unsigned char key24[24]=
 | 
			
		||||
		{0x12,0x34,0x56,0x78,0x9a,0xbc,0xde,0xf0,
 | 
			
		||||
	static const unsigned char key24[24]= {
 | 
			
		||||
		 0x12,0x34,0x56,0x78,0x9a,0xbc,0xde,0xf0,
 | 
			
		||||
		 0x34,0x56,0x78,0x9a,0xbc,0xde,0xf0,0x12,
 | 
			
		||||
		 0x56,0x78,0x9a,0xbc,0xde,0xf0,0x12,0x34};
 | 
			
		||||
	static const unsigned char key32[32]=
 | 
			
		||||
		{0x12,0x34,0x56,0x78,0x9a,0xbc,0xde,0xf0,
 | 
			
		||||
	static const unsigned char key32[32]= {
 | 
			
		||||
		 0x12,0x34,0x56,0x78,0x9a,0xbc,0xde,0xf0,
 | 
			
		||||
		 0x34,0x56,0x78,0x9a,0xbc,0xde,0xf0,0x12,
 | 
			
		||||
		 0x56,0x78,0x9a,0xbc,0xde,0xf0,0x12,0x34,
 | 
			
		||||
		 0x78,0x9a,0xbc,0xde,0xf0,0x12,0x34,0x56};
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_CAMELLIA
 | 
			
		||||
	static const unsigned char ckey24[24]=
 | 
			
		||||
		{0x12,0x34,0x56,0x78,0x9a,0xbc,0xde,0xf0,
 | 
			
		||||
	static const unsigned char ckey24[24]= {
 | 
			
		||||
		 0x12,0x34,0x56,0x78,0x9a,0xbc,0xde,0xf0,
 | 
			
		||||
		 0x34,0x56,0x78,0x9a,0xbc,0xde,0xf0,0x12,
 | 
			
		||||
		 0x56,0x78,0x9a,0xbc,0xde,0xf0,0x12,0x34};
 | 
			
		||||
	static const unsigned char ckey32[32]=
 | 
			
		||||
		{0x12,0x34,0x56,0x78,0x9a,0xbc,0xde,0xf0,
 | 
			
		||||
	static const unsigned char ckey32[32]= {
 | 
			
		||||
		 0x12,0x34,0x56,0x78,0x9a,0xbc,0xde,0xf0,
 | 
			
		||||
		 0x34,0x56,0x78,0x9a,0xbc,0xde,0xf0,0x12,
 | 
			
		||||
		 0x56,0x78,0x9a,0xbc,0xde,0xf0,0x12,0x34,
 | 
			
		||||
		 0x78,0x9a,0xbc,0xde,0xf0,0x12,0x34,0x56};
 | 
			
		||||
@@ -427,9 +455,9 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	unsigned char DES_iv[8];
 | 
			
		||||
	unsigned char iv[2*MAX_BLOCK_SIZE/8];
 | 
			
		||||
#ifndef OPENSSL_NO_DES
 | 
			
		||||
	static DES_cblock key ={0x12,0x34,0x56,0x78,0x9a,0xbc,0xde,0xf0};
 | 
			
		||||
	static DES_cblock key2={0x34,0x56,0x78,0x9a,0xbc,0xde,0xf0,0x12};
 | 
			
		||||
	static DES_cblock key3={0x56,0x78,0x9a,0xbc,0xde,0xf0,0x12,0x34};
 | 
			
		||||
	static DES_cblock key = { 0x12,0x34,0x56,0x78,0x9a,0xbc,0xde,0xf0 };
 | 
			
		||||
	static DES_cblock key2= { 0x34,0x56,0x78,0x9a,0xbc,0xde,0xf0,0x12 };
 | 
			
		||||
	static DES_cblock key3= { 0x56,0x78,0x9a,0xbc,0xde,0xf0,0x12,0x34 };
 | 
			
		||||
	DES_key_schedule sch;
 | 
			
		||||
	DES_key_schedule sch2;
 | 
			
		||||
	DES_key_schedule sch3;
 | 
			
		||||
@@ -469,6 +497,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
#define D_IGE_128_AES   26
 | 
			
		||||
#define D_IGE_192_AES   27
 | 
			
		||||
#define D_IGE_256_AES   28
 | 
			
		||||
#define D_GHASH		29
 | 
			
		||||
	double d=0.0;
 | 
			
		||||
	long c[ALGOR_NUM][SIZE_NUM];
 | 
			
		||||
#define	R_DSA_512	0
 | 
			
		||||
@@ -499,9 +528,10 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
#ifndef OPENSSL_NO_RSA
 | 
			
		||||
	RSA *rsa_key[RSA_NUM];
 | 
			
		||||
	long rsa_c[RSA_NUM][2];
 | 
			
		||||
	static unsigned int rsa_bits[RSA_NUM]={512,1024,2048,4096};
 | 
			
		||||
	static unsigned char *rsa_data[RSA_NUM]=
 | 
			
		||||
		{test512,test1024,test2048,test4096};
 | 
			
		||||
	static unsigned int rsa_bits[RSA_NUM]={
 | 
			
		||||
		512,1024,2048,4096};
 | 
			
		||||
	static unsigned char *rsa_data[RSA_NUM]={
 | 
			
		||||
		test512,test1024,test2048,test4096};
 | 
			
		||||
	static int rsa_data_length[RSA_NUM]={
 | 
			
		||||
		sizeof(test512),sizeof(test1024),
 | 
			
		||||
		sizeof(test2048),sizeof(test4096)};
 | 
			
		||||
@@ -894,6 +924,10 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			doit[D_CBC_192_AES]=1;
 | 
			
		||||
			doit[D_CBC_256_AES]=1;
 | 
			
		||||
			}
 | 
			
		||||
		else if (strcmp(*argv,"ghash") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			doit[D_GHASH]=1;
 | 
			
		||||
			}
 | 
			
		||||
		else
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_CAMELLIA
 | 
			
		||||
@@ -1056,13 +1090,15 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			BIO_printf(bio_err,"dsa512   dsa1024  dsa2048\n");
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_ECDSA
 | 
			
		||||
			BIO_printf(bio_err,"ecdsap160 ecdsap192 ecdsap224 ecdsap256 ecdsap384 ecdsap521\n");
 | 
			
		||||
			BIO_printf(bio_err,"ecdsap160 ecdsap192 ecdsap224 "
 | 
			
		||||
				"ecdsap256 ecdsap384 ecdsap521\n");
 | 
			
		||||
			BIO_printf(bio_err,"ecdsak163 ecdsak233 ecdsak283 ecdsak409 ecdsak571\n");
 | 
			
		||||
			BIO_printf(bio_err,"ecdsab163 ecdsab233 ecdsab283 ecdsab409 ecdsab571\n");
 | 
			
		||||
			BIO_printf(bio_err,"ecdsa\n");
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_ECDH
 | 
			
		||||
			BIO_printf(bio_err,"ecdhp160  ecdhp192  ecdhp224  ecdhp256  ecdhp384  ecdhp521\n");
 | 
			
		||||
			BIO_printf(bio_err,"ecdhp160  ecdhp192  ecdhp224 "
 | 
			
		||||
				"ecdhp256  ecdhp384  ecdhp521\n");
 | 
			
		||||
			BIO_printf(bio_err,"ecdhk163  ecdhk233  ecdhk283  ecdhk409  ecdhk571\n");
 | 
			
		||||
			BIO_printf(bio_err,"ecdhb163  ecdhb233  ecdhb283  ecdhb409  ecdhb571\n");
 | 
			
		||||
			BIO_printf(bio_err,"ecdh\n");
 | 
			
		||||
@@ -1102,16 +1138,27 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			BIO_printf(bio_err,"\n");
 | 
			
		||||
			BIO_printf(bio_err,"Available options:\n");
 | 
			
		||||
#if defined(TIMES) || defined(USE_TOD)
 | 
			
		||||
			BIO_printf(bio_err,"-elapsed        measure time in real time instead of CPU user time.\n");
 | 
			
		||||
			BIO_printf(bio_err,"-elapsed        "
 | 
			
		||||
				"measure time in real time instead of CPU user time.\n");
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
			BIO_printf(bio_err,"-engine e       use engine e, possibly a hardware device.\n");
 | 
			
		||||
			BIO_printf(bio_err,
 | 
			
		||||
				"-engine e       "
 | 
			
		||||
				"use engine e, possibly a hardware device.\n");
 | 
			
		||||
#endif
 | 
			
		||||
			BIO_printf(bio_err,"-evp e          use EVP e.\n");
 | 
			
		||||
			BIO_printf(bio_err,"-decrypt        time decryption instead of encryption (only EVP).\n");
 | 
			
		||||
			BIO_printf(bio_err,"-mr             produce machine readable output.\n");
 | 
			
		||||
			BIO_printf(bio_err,
 | 
			
		||||
				"-evp e          "
 | 
			
		||||
				"use EVP e.\n");
 | 
			
		||||
			BIO_printf(bio_err,
 | 
			
		||||
				"-decrypt        "
 | 
			
		||||
				"time decryption instead of encryption (only EVP).\n");
 | 
			
		||||
			BIO_printf(bio_err,
 | 
			
		||||
				"-mr             "
 | 
			
		||||
				"produce machine readable output.\n");
 | 
			
		||||
#ifndef NO_FORK
 | 
			
		||||
			BIO_printf(bio_err,"-multi n        run n benchmarks in parallel.\n");
 | 
			
		||||
			BIO_printf(bio_err,
 | 
			
		||||
				"-multi n        "
 | 
			
		||||
				"run n benchmarks in parallel.\n");
 | 
			
		||||
#endif
 | 
			
		||||
			goto end;
 | 
			
		||||
			}
 | 
			
		||||
@@ -1149,7 +1196,9 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		if (doit[i]) pr_header++;
 | 
			
		||||
 | 
			
		||||
	if (usertime == 0 && !mr)
 | 
			
		||||
		BIO_printf(bio_err,"You have chosen to measure elapsed time instead of user CPU time.\n");
 | 
			
		||||
		BIO_printf(bio_err,
 | 
			
		||||
			"You have chosen to measure elapsed time "
 | 
			
		||||
			"instead of user CPU time.\n");
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_RSA
 | 
			
		||||
	for (i=0; i<RSA_NUM; i++)
 | 
			
		||||
@@ -1166,7 +1215,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
#if 0
 | 
			
		||||
		else
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(bio_err,mr ? "+RK:%d:"
 | 
			
		||||
			BIO_printf(bio_err,
 | 
			
		||||
				   mr ? "+RK:%d:"
 | 
			
		||||
				   : "Loaded RSA key, %d bit modulus and e= 0x",
 | 
			
		||||
				   BN_num_bits(rsa_key[i]->n));
 | 
			
		||||
			BN_print(bio_err,rsa_key[i]->e);
 | 
			
		||||
@@ -1264,6 +1314,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	c[D_IGE_128_AES][0]=count;
 | 
			
		||||
	c[D_IGE_192_AES][0]=count;
 | 
			
		||||
	c[D_IGE_256_AES][0]=count;
 | 
			
		||||
	c[D_GHASH][0]=count;
 | 
			
		||||
 | 
			
		||||
	for (i=1; i<SIZE_NUM; i++)
 | 
			
		||||
		{
 | 
			
		||||
@@ -1458,7 +1509,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
# error "You cannot disable DES on systems without SIGALRM."
 | 
			
		||||
#endif /* OPENSSL_NO_DES */
 | 
			
		||||
#else
 | 
			
		||||
#define COND(c)	(run)
 | 
			
		||||
#define COND(c)	(run && count<0x7fffffff)
 | 
			
		||||
#define COUNT(d) (count)
 | 
			
		||||
#ifndef _WIN32
 | 
			
		||||
	signal(SIGALRM,sig_done);
 | 
			
		||||
@@ -1754,7 +1805,22 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			print_result(D_IGE_256_AES,j,count,d);
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
	if (doit[D_GHASH])
 | 
			
		||||
		{
 | 
			
		||||
		GCM128_CONTEXT *ctx = CRYPTO_gcm128_new(&aes_ks1,(block128_f)AES_encrypt);
 | 
			
		||||
		CRYPTO_gcm128_setiv (ctx,(unsigned char *)"0123456789ab",12);
 | 
			
		||||
 | 
			
		||||
		for (j=0; j<SIZE_NUM; j++)
 | 
			
		||||
			{
 | 
			
		||||
			print_message(names[D_GHASH],c[D_GHASH][j],lengths[j]);
 | 
			
		||||
			Time_F(START);
 | 
			
		||||
			for (count=0,run=1; COND(c[D_GHASH][j]); count++)
 | 
			
		||||
				CRYPTO_gcm128_aad(ctx,buf,lengths[j]);
 | 
			
		||||
			d=Time_F(STOP);
 | 
			
		||||
			print_result(D_GHASH,j,count,d);
 | 
			
		||||
			}
 | 
			
		||||
		CRYPTO_gcm128_release(ctx);
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_CAMELLIA
 | 
			
		||||
@@ -1969,7 +2035,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			pkey_print_message("private","rsa",
 | 
			
		||||
				rsa_c[j][0],rsa_bits[j],
 | 
			
		||||
				RSA_SECONDS);
 | 
			
		||||
/*			RSA_blinding_on(rsa_key[j],NULL); */
 | 
			
		||||
			/* RSA_blinding_on(rsa_key[j],NULL); */
 | 
			
		||||
			Time_F(START);
 | 
			
		||||
			for (count=0,run=1; COND(rsa_c[j][0]); count++)
 | 
			
		||||
				{
 | 
			
		||||
@@ -1985,7 +2051,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
					}
 | 
			
		||||
				}
 | 
			
		||||
			d=Time_F(STOP);
 | 
			
		||||
			BIO_printf(bio_err,mr ? "+R1:%ld:%d:%.2f\n"
 | 
			
		||||
			BIO_printf(bio_err,
 | 
			
		||||
				   mr ? "+R1:%ld:%d:%.2f\n"
 | 
			
		||||
				   : "%ld %d bit private RSA's in %.2fs\n",
 | 
			
		||||
				   count,rsa_bits[j],d);
 | 
			
		||||
			rsa_results[j][0]=d/(double)count;
 | 
			
		||||
@@ -2020,7 +2087,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
					}
 | 
			
		||||
				}
 | 
			
		||||
			d=Time_F(STOP);
 | 
			
		||||
			BIO_printf(bio_err,mr ? "+R2:%ld:%d:%.2f\n"
 | 
			
		||||
			BIO_printf(bio_err,
 | 
			
		||||
				   mr ? "+R2:%ld:%d:%.2f\n"
 | 
			
		||||
				   : "%ld %d bit public RSA's in %.2fs\n",
 | 
			
		||||
				   count,rsa_bits[j],d);
 | 
			
		||||
			rsa_results[j][1]=d/(double)count;
 | 
			
		||||
@@ -2049,8 +2117,9 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		int ret;
 | 
			
		||||
 | 
			
		||||
		if (!dsa_doit[j]) continue;
 | 
			
		||||
/*		DSA_generate_key(dsa_key[j]); */
 | 
			
		||||
/*		DSA_sign_setup(dsa_key[j],NULL); */
 | 
			
		||||
 | 
			
		||||
		/* DSA_generate_key(dsa_key[j]); */
 | 
			
		||||
		/* DSA_sign_setup(dsa_key[j],NULL); */
 | 
			
		||||
		ret=DSA_sign(EVP_PKEY_DSA,buf,20,buf2,
 | 
			
		||||
			&kk,dsa_key[j]);
 | 
			
		||||
		if (ret == 0)
 | 
			
		||||
@@ -2079,7 +2148,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
					}
 | 
			
		||||
				}
 | 
			
		||||
			d=Time_F(STOP);
 | 
			
		||||
			BIO_printf(bio_err,mr ? "+R3:%ld:%d:%.2f\n"
 | 
			
		||||
			BIO_printf(bio_err,
 | 
			
		||||
				   mr ? "+R3:%ld:%d:%.2f\n"
 | 
			
		||||
				   : "%ld %d bit DSA signs in %.2fs\n",
 | 
			
		||||
				   count,dsa_bits[j],d);
 | 
			
		||||
			dsa_results[j][0]=d/(double)count;
 | 
			
		||||
@@ -2114,7 +2184,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
					}
 | 
			
		||||
				}
 | 
			
		||||
			d=Time_F(STOP);
 | 
			
		||||
			BIO_printf(bio_err,mr ? "+R4:%ld:%d:%.2f\n"
 | 
			
		||||
			BIO_printf(bio_err,
 | 
			
		||||
				   mr ? "+R4:%ld:%d:%.2f\n"
 | 
			
		||||
				   : "%ld %d bit DSA verify in %.2fs\n",
 | 
			
		||||
				   count,dsa_bits[j],d);
 | 
			
		||||
			dsa_results[j][1]=d/(double)count;
 | 
			
		||||
@@ -2187,7 +2258,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
					}
 | 
			
		||||
				d=Time_F(STOP);
 | 
			
		||||
 | 
			
		||||
				BIO_printf(bio_err, mr ? "+R5:%ld:%d:%.2f\n" :
 | 
			
		||||
				BIO_printf(bio_err,
 | 
			
		||||
					mr ? "+R5:%ld:%d:%.2f\n" :
 | 
			
		||||
					"%ld %d bit ECDSA signs in %.2fs \n", 
 | 
			
		||||
					count, test_curves_bits[j], d);
 | 
			
		||||
				ecdsa_results[j][0]=d/(double)count;
 | 
			
		||||
@@ -2222,7 +2294,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
						}
 | 
			
		||||
					}
 | 
			
		||||
				d=Time_F(STOP);
 | 
			
		||||
				BIO_printf(bio_err, mr? "+R6:%ld:%d:%.2f\n"
 | 
			
		||||
				BIO_printf(bio_err,
 | 
			
		||||
						mr ? "+R6:%ld:%d:%.2f\n"
 | 
			
		||||
						: "%ld %d bit ECDSA verify in %.2fs\n",
 | 
			
		||||
				count, test_curves_bits[j], d);
 | 
			
		||||
				ecdsa_results[j][1]=d/(double)count;
 | 
			
		||||
@@ -2268,8 +2341,10 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
				}
 | 
			
		||||
			else
 | 
			
		||||
				{
 | 
			
		||||
				/* If field size is not more than 24 octets, then use SHA-1 hash of result;
 | 
			
		||||
				 * otherwise, use result (see section 4.8 of draft-ietf-tls-ecc-03.txt).
 | 
			
		||||
				/* If field size is not more than 24 octets,
 | 
			
		||||
				 * then use SHA-1 hash of result; otherwise,
 | 
			
		||||
				 * use result (see section 4.8 of
 | 
			
		||||
				 * draft-ietf-tls-ecc-03.txt).
 | 
			
		||||
				 */
 | 
			
		||||
				int field_size, outlen;
 | 
			
		||||
				void *(*kdf)(const void *in, size_t inlen, void *out, size_t *xoutlen);
 | 
			
		||||
@@ -2284,10 +2359,12 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
					outlen = (field_size+7)/8;
 | 
			
		||||
					kdf = NULL;
 | 
			
		||||
					}
 | 
			
		||||
				secret_size_a = ECDH_compute_key(secret_a, outlen,
 | 
			
		||||
				secret_size_a =
 | 
			
		||||
					ECDH_compute_key(secret_a, outlen,
 | 
			
		||||
					EC_KEY_get0_public_key(ecdh_b[j]),
 | 
			
		||||
					ecdh_a[j], kdf);
 | 
			
		||||
				secret_size_b = ECDH_compute_key(secret_b, outlen,
 | 
			
		||||
				secret_size_b =
 | 
			
		||||
					ECDH_compute_key(secret_b, outlen,
 | 
			
		||||
					EC_KEY_get0_public_key(ecdh_a[j]),
 | 
			
		||||
					ecdh_b[j], kdf);
 | 
			
		||||
				if (secret_size_a != secret_size_b) 
 | 
			
		||||
@@ -2323,7 +2400,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
					ecdh_a[j], kdf);
 | 
			
		||||
					}
 | 
			
		||||
				d=Time_F(STOP);
 | 
			
		||||
				BIO_printf(bio_err, mr ? "+R7:%ld:%d:%.2f\n" :"%ld %d-bit ECDH ops in %.2fs\n",
 | 
			
		||||
				BIO_printf(bio_err,
 | 
			
		||||
					mr ? "+R7:%ld:%d:%.2f\n" :"%ld %d-bit ECDH ops in %.2fs\n",
 | 
			
		||||
				count, test_curves_bits[j], d);
 | 
			
		||||
				ecdh_results[j][0]=d/(double)count;
 | 
			
		||||
				rsa_count=count;
 | 
			
		||||
@@ -2527,12 +2605,14 @@ end:
 | 
			
		||||
static void print_message(const char *s, long num, int length)
 | 
			
		||||
	{
 | 
			
		||||
#ifdef SIGALRM
 | 
			
		||||
	BIO_printf(bio_err,mr ? "+DT:%s:%d:%d\n"
 | 
			
		||||
	BIO_printf(bio_err,
 | 
			
		||||
		   mr ? "+DT:%s:%d:%d\n"
 | 
			
		||||
		   : "Doing %s for %ds on %d size blocks: ",s,SECONDS,length);
 | 
			
		||||
	(void)BIO_flush(bio_err);
 | 
			
		||||
	alarm(SECONDS);
 | 
			
		||||
#else
 | 
			
		||||
	BIO_printf(bio_err,mr ? "+DN:%s:%ld:%d\n"
 | 
			
		||||
	BIO_printf(bio_err,
 | 
			
		||||
		   mr ? "+DN:%s:%ld:%d\n"
 | 
			
		||||
		   : "Doing %s %ld times on %d size blocks: ",s,num,length);
 | 
			
		||||
	(void)BIO_flush(bio_err);
 | 
			
		||||
#endif
 | 
			
		||||
@@ -2545,12 +2625,14 @@ static void pkey_print_message(const char *str, const char *str2, long num,
 | 
			
		||||
	int bits, int tm)
 | 
			
		||||
	{
 | 
			
		||||
#ifdef SIGALRM
 | 
			
		||||
	BIO_printf(bio_err,mr ? "+DTP:%d:%s:%s:%d\n"
 | 
			
		||||
	BIO_printf(bio_err,
 | 
			
		||||
			   mr ? "+DTP:%d:%s:%s:%d\n"
 | 
			
		||||
			   : "Doing %d bit %s %s's for %ds: ",bits,str,str2,tm);
 | 
			
		||||
	(void)BIO_flush(bio_err);
 | 
			
		||||
	alarm(RSA_SECONDS);
 | 
			
		||||
	alarm(tm);
 | 
			
		||||
#else
 | 
			
		||||
	BIO_printf(bio_err,mr ? "+DNP:%ld:%d:%s:%s\n"
 | 
			
		||||
	BIO_printf(bio_err,
 | 
			
		||||
			   mr ? "+DNP:%ld:%d:%s:%s\n"
 | 
			
		||||
			   : "Doing %ld %d bit %s %s's: ",num,bits,str,str2);
 | 
			
		||||
	(void)BIO_flush(bio_err);
 | 
			
		||||
#endif
 | 
			
		||||
@@ -2561,7 +2643,8 @@ static void pkey_print_message(const char *str, const char *str2, long num,
 | 
			
		||||
 | 
			
		||||
static void print_result(int alg,int run_no,int count,double time_used)
 | 
			
		||||
	{
 | 
			
		||||
	BIO_printf(bio_err,mr ? "+R:%d:%s:%f\n"
 | 
			
		||||
	BIO_printf(bio_err,
 | 
			
		||||
		   mr ? "+R:%d:%s:%f\n"
 | 
			
		||||
		   : "%d %s's in %.2fs\n",count,names[alg],time_used);
 | 
			
		||||
	results[alg][run_no]=((double)count)/time_used*lengths[run_no];
 | 
			
		||||
	}
 | 
			
		||||
@@ -2608,7 +2691,11 @@ static int do_multi(int multi)
 | 
			
		||||
	fds=malloc(multi*sizeof *fds);
 | 
			
		||||
	for(n=0 ; n < multi ; ++n)
 | 
			
		||||
		{
 | 
			
		||||
		pipe(fd);
 | 
			
		||||
		if (pipe(fd) == -1)
 | 
			
		||||
			{
 | 
			
		||||
			fprintf(stderr, "pipe failure\n");
 | 
			
		||||
			exit(1);
 | 
			
		||||
			}
 | 
			
		||||
		fflush(stdout);
 | 
			
		||||
		fflush(stderr);
 | 
			
		||||
		if(fork())
 | 
			
		||||
@@ -2620,7 +2707,11 @@ static int do_multi(int multi)
 | 
			
		||||
			{
 | 
			
		||||
			close(fd[0]);
 | 
			
		||||
			close(1);
 | 
			
		||||
			dup(fd[1]);
 | 
			
		||||
			if (dup(fd[1]) == -1)
 | 
			
		||||
				{
 | 
			
		||||
				fprintf(stderr, "dup failed\n");
 | 
			
		||||
				exit(1);
 | 
			
		||||
				}
 | 
			
		||||
			close(fd[1]);
 | 
			
		||||
			mr=1;
 | 
			
		||||
			usertime=0;
 | 
			
		||||
@@ -2670,27 +2761,6 @@ static int do_multi(int multi)
 | 
			
		||||
				k=atoi(sstrsep(&p,sep));
 | 
			
		||||
				sstrsep(&p,sep);
 | 
			
		||||
 | 
			
		||||
				d=atof(sstrsep(&p,sep));
 | 
			
		||||
				if(n)
 | 
			
		||||
					rsa_results[k][0]=1/(1/rsa_results[k][0]+1/d);
 | 
			
		||||
				else
 | 
			
		||||
					rsa_results[k][0]=d;
 | 
			
		||||
 | 
			
		||||
				d=atof(sstrsep(&p,sep));
 | 
			
		||||
				if(n)
 | 
			
		||||
					rsa_results[k][1]=1/(1/rsa_results[k][1]+1/d);
 | 
			
		||||
				else
 | 
			
		||||
					rsa_results[k][1]=d;
 | 
			
		||||
				}
 | 
			
		||||
			else if(!strncmp(buf,"+F2:",4))
 | 
			
		||||
				{
 | 
			
		||||
				int k;
 | 
			
		||||
				double d;
 | 
			
		||||
				
 | 
			
		||||
				p=buf+4;
 | 
			
		||||
				k=atoi(sstrsep(&p,sep));
 | 
			
		||||
				sstrsep(&p,sep);
 | 
			
		||||
 | 
			
		||||
				d=atof(sstrsep(&p,sep));
 | 
			
		||||
				if(n)
 | 
			
		||||
					rsa_results[k][0]=1/(1/rsa_results[k][0]+1/d);
 | 
			
		||||
 
 | 
			
		||||
@@ -73,7 +73,8 @@
 | 
			
		||||
#undef PROG
 | 
			
		||||
#define PROG	spkac_main
 | 
			
		||||
 | 
			
		||||
/* -in arg	- input file - default stdin
 | 
			
		||||
/*-
 | 
			
		||||
 * -in arg	- input file - default stdin
 | 
			
		||||
 * -out arg	- output file - default stdout
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										756
									
								
								apps/srp.c
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										756
									
								
								apps/srp.c
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,756 @@
 | 
			
		||||
/* apps/srp.c */
 | 
			
		||||
/* Written by Peter Sylvester (peter.sylvester@edelweb.fr)  
 | 
			
		||||
 * for the EdelKey project and contributed to the OpenSSL project 2004.
 | 
			
		||||
 */
 | 
			
		||||
/* ====================================================================
 | 
			
		||||
 * Copyright (c) 2004 The OpenSSL Project.  All rights reserved.
 | 
			
		||||
 *
 | 
			
		||||
 * Redistribution and use in source and binary forms, with or without
 | 
			
		||||
 * modification, are permitted provided that the following conditions
 | 
			
		||||
 * are met:
 | 
			
		||||
 *
 | 
			
		||||
 * 1. Redistributions of source code must retain the above copyright
 | 
			
		||||
 *    notice, this list of conditions and the following disclaimer. 
 | 
			
		||||
 *
 | 
			
		||||
 * 2. Redistributions in binary form must reproduce the above copyright
 | 
			
		||||
 *    notice, this list of conditions and the following disclaimer in
 | 
			
		||||
 *    the documentation and/or other materials provided with the
 | 
			
		||||
 *    distribution.
 | 
			
		||||
 *
 | 
			
		||||
 * 3. All advertising materials mentioning features or use of this
 | 
			
		||||
 *    software must display the following acknowledgment:
 | 
			
		||||
 *    "This product includes software developed by the OpenSSL Project
 | 
			
		||||
 *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
 | 
			
		||||
 *
 | 
			
		||||
 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
 | 
			
		||||
 *    endorse or promote products derived from this software without
 | 
			
		||||
 *    prior written permission. For written permission, please contact
 | 
			
		||||
 *    licensing@OpenSSL.org.
 | 
			
		||||
 *
 | 
			
		||||
 * 5. Products derived from this software may not be called "OpenSSL"
 | 
			
		||||
 *    nor may "OpenSSL" appear in their names without prior written
 | 
			
		||||
 *    permission of the OpenSSL Project.
 | 
			
		||||
 *
 | 
			
		||||
 * 6. Redistributions of any form whatsoever must retain the following
 | 
			
		||||
 *    acknowledgment:
 | 
			
		||||
 *    "This product includes software developed by the OpenSSL Project
 | 
			
		||||
 *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
 | 
			
		||||
 *
 | 
			
		||||
 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
 | 
			
		||||
 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 | 
			
		||||
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
 | 
			
		||||
 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
 | 
			
		||||
 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 | 
			
		||||
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 | 
			
		||||
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
 | 
			
		||||
 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 | 
			
		||||
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
 | 
			
		||||
 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 | 
			
		||||
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
 | 
			
		||||
 * OF THE POSSIBILITY OF SUCH DAMAGE.
 | 
			
		||||
 * ====================================================================
 | 
			
		||||
 *
 | 
			
		||||
 * This product includes cryptographic software written by Eric Young
 | 
			
		||||
 * (eay@cryptsoft.com).  This product includes software written by Tim
 | 
			
		||||
 * Hudson (tjh@cryptsoft.com).
 | 
			
		||||
 *
 | 
			
		||||
 */
 | 
			
		||||
#include <openssl/opensslconf.h>
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_SRP
 | 
			
		||||
#include <stdio.h>
 | 
			
		||||
#include <stdlib.h>
 | 
			
		||||
#include <string.h>
 | 
			
		||||
#include <openssl/conf.h>
 | 
			
		||||
#include <openssl/bio.h>
 | 
			
		||||
#include <openssl/err.h>
 | 
			
		||||
#include <openssl/txt_db.h>
 | 
			
		||||
#include <openssl/buffer.h>
 | 
			
		||||
#include <openssl/srp.h>
 | 
			
		||||
 | 
			
		||||
#include "apps.h"
 | 
			
		||||
 | 
			
		||||
#undef PROG
 | 
			
		||||
#define PROG srp_main
 | 
			
		||||
 | 
			
		||||
#define BASE_SECTION	"srp"
 | 
			
		||||
#define CONFIG_FILE "openssl.cnf"
 | 
			
		||||
 | 
			
		||||
#define ENV_RANDFILE		"RANDFILE"
 | 
			
		||||
 | 
			
		||||
#define ENV_DATABASE		"srpvfile"
 | 
			
		||||
#define ENV_DEFAULT_SRP		"default_srp"
 | 
			
		||||
 | 
			
		||||
static char *srp_usage[]={
 | 
			
		||||
"usage: srp [args] [user] \n",
 | 
			
		||||
"\n",
 | 
			
		||||
" -verbose        Talk alot while doing things\n",
 | 
			
		||||
" -config file    A config file\n",
 | 
			
		||||
" -name arg       The particular srp definition to use\n",
 | 
			
		||||
" -srpvfile arg   The srp verifier file name\n",
 | 
			
		||||
" -add            add an user and srp verifier\n",
 | 
			
		||||
" -modify         modify the srp verifier of an existing user\n",
 | 
			
		||||
" -delete         delete user from verifier file\n",
 | 
			
		||||
" -list           list user\n",
 | 
			
		||||
" -gn arg         g and N values to be used for new verifier\n",
 | 
			
		||||
" -userinfo arg   additional info to be set for user\n",
 | 
			
		||||
" -passin arg     input file pass phrase source\n",
 | 
			
		||||
" -passout arg    output file pass phrase source\n",
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
" -engine e         - use engine e, possibly a hardware device.\n",
 | 
			
		||||
#endif
 | 
			
		||||
NULL
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
#ifdef EFENCE
 | 
			
		||||
extern int EF_PROTECT_FREE;
 | 
			
		||||
extern int EF_PROTECT_BELOW;
 | 
			
		||||
extern int EF_ALIGNMENT;
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
static CONF *conf=NULL;
 | 
			
		||||
static char *section=NULL;
 | 
			
		||||
 | 
			
		||||
#define VERBOSE if (verbose) 
 | 
			
		||||
#define VVERBOSE if (verbose>1) 
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
int MAIN(int, char **);
 | 
			
		||||
 | 
			
		||||
static int get_index(CA_DB *db, char* id, char type)
 | 
			
		||||
	{
 | 
			
		||||
	char ** pp;
 | 
			
		||||
	int i;
 | 
			
		||||
	if (id == NULL) return -1;
 | 
			
		||||
	if (type == DB_SRP_INDEX) 
 | 
			
		||||
	for (i = 0; i < sk_OPENSSL_PSTRING_num(db->db->data); i++)
 | 
			
		||||
		{
 | 
			
		||||
		pp = sk_OPENSSL_PSTRING_value(db->db->data,i);
 | 
			
		||||
		if (pp[DB_srptype][0] == DB_SRP_INDEX  && !strcmp(id,pp[DB_srpid])) 
 | 
			
		||||
			return i;
 | 
			
		||||
		}
 | 
			
		||||
	else for (i = 0; i < sk_OPENSSL_PSTRING_num(db->db->data); i++)
 | 
			
		||||
		{
 | 
			
		||||
		pp = sk_OPENSSL_PSTRING_value(db->db->data,i);
 | 
			
		||||
 | 
			
		||||
		if (pp[DB_srptype][0] != DB_SRP_INDEX && !strcmp(id,pp[DB_srpid])) 
 | 
			
		||||
			return i;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	return -1 ; 
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
static void print_entry(CA_DB *db, BIO *bio, int indx, int verbose, char *s)
 | 
			
		||||
	{
 | 
			
		||||
	if (indx >= 0 && verbose)
 | 
			
		||||
		{
 | 
			
		||||
		int j;
 | 
			
		||||
		char **pp = sk_OPENSSL_PSTRING_value(db->db->data, indx);
 | 
			
		||||
		BIO_printf(bio, "%s \"%s\"\n", s, pp[DB_srpid]);
 | 
			
		||||
		for (j = 0; j < DB_NUMBER; j++)
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(bio_err,"  %d = \"%s\"\n", j, pp[j]);
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
static void print_index(CA_DB *db, BIO *bio, int indexindex, int verbose)
 | 
			
		||||
	{
 | 
			
		||||
	print_entry(db, bio, indexindex, verbose, "g N entry") ;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
static void print_user(CA_DB *db, BIO *bio, int userindex, int verbose)
 | 
			
		||||
	{
 | 
			
		||||
	if (verbose > 0)
 | 
			
		||||
		{
 | 
			
		||||
		char **pp = sk_OPENSSL_PSTRING_value(db->db->data,userindex);
 | 
			
		||||
 | 
			
		||||
		if (pp[DB_srptype][0] != 'I')
 | 
			
		||||
			{
 | 
			
		||||
			print_entry(db, bio, userindex, verbose, "User entry");
 | 
			
		||||
			print_entry(db, bio, get_index(db, pp[DB_srpgN], 'I'), verbose, "g N entry");
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
static int update_index(CA_DB *db, BIO *bio, char **row)
 | 
			
		||||
	{
 | 
			
		||||
	char ** irow;
 | 
			
		||||
	int i;
 | 
			
		||||
 | 
			
		||||
	if ((irow=(char **)OPENSSL_malloc(sizeof(char *)*(DB_NUMBER+1))) == NULL)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf(bio_err,"Memory allocation failure\n");
 | 
			
		||||
		return 0;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	for (i=0; i<DB_NUMBER; i++)
 | 
			
		||||
		{
 | 
			
		||||
		irow[i]=row[i];
 | 
			
		||||
		row[i]=NULL;
 | 
			
		||||
		}
 | 
			
		||||
	irow[DB_NUMBER]=NULL;
 | 
			
		||||
 | 
			
		||||
	if (!TXT_DB_insert(db->db,irow))
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf(bio,"failed to update srpvfile\n");
 | 
			
		||||
		BIO_printf(bio,"TXT_DB error number %ld\n",db->db->error);
 | 
			
		||||
		OPENSSL_free(irow);
 | 
			
		||||
		return 0;
 | 
			
		||||
		}
 | 
			
		||||
	return 1;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
static void lookup_fail(const char *name, char *tag)
 | 
			
		||||
	{
 | 
			
		||||
	BIO_printf(bio_err,"variable lookup failed for %s::%s\n",name,tag);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
static char *srp_verify_user(const char *user, const char *srp_verifier,
 | 
			
		||||
			     char *srp_usersalt, const char *g, const char *N,
 | 
			
		||||
			     const char *passin, BIO *bio, int verbose)
 | 
			
		||||
	{
 | 
			
		||||
	char password[1024];
 | 
			
		||||
	PW_CB_DATA cb_tmp;
 | 
			
		||||
	char *verifier = NULL;
 | 
			
		||||
	char *gNid = NULL;
 | 
			
		||||
 | 
			
		||||
	cb_tmp.prompt_info = user;
 | 
			
		||||
	cb_tmp.password = passin;
 | 
			
		||||
 | 
			
		||||
 	if (password_callback(password, 1024, 0, &cb_tmp) >0)
 | 
			
		||||
		{
 | 
			
		||||
		VERBOSE BIO_printf(bio,"Validating\n   user=\"%s\"\n srp_verifier=\"%s\"\n srp_usersalt=\"%s\"\n g=\"%s\"\n N=\"%s\"\n",user,srp_verifier,srp_usersalt, g, N);
 | 
			
		||||
		BIO_printf(bio, "Pass %s\n", password);
 | 
			
		||||
 | 
			
		||||
		if (!(gNid=SRP_create_verifier(user, password, &srp_usersalt, &verifier, N, g)))
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(bio, "Internal error validating SRP verifier\n");
 | 
			
		||||
			}
 | 
			
		||||
		else
 | 
			
		||||
			{
 | 
			
		||||
			if (strcmp(verifier, srp_verifier))
 | 
			
		||||
				gNid = NULL;
 | 
			
		||||
			OPENSSL_free(verifier);
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
	return gNid;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
static char *srp_create_user(char *user, char **srp_verifier,
 | 
			
		||||
			     char **srp_usersalt, char *g, char *N,
 | 
			
		||||
			     char *passout, BIO *bio, int verbose)
 | 
			
		||||
	{
 | 
			
		||||
 	char password[1024];
 | 
			
		||||
        PW_CB_DATA cb_tmp;
 | 
			
		||||
	char *gNid = NULL;
 | 
			
		||||
	char *salt = NULL;
 | 
			
		||||
        cb_tmp.prompt_info = user;
 | 
			
		||||
        cb_tmp.password = passout;
 | 
			
		||||
 | 
			
		||||
	if (password_callback(password,1024,1,&cb_tmp) >0)
 | 
			
		||||
		{
 | 
			
		||||
		VERBOSE BIO_printf(bio,"Creating\n user=\"%s\"\n g=\"%s\"\n N=\"%s\"\n",user,g,N);
 | 
			
		||||
		if (!(gNid =SRP_create_verifier(user, password, &salt, srp_verifier, N, g)))
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(bio,"Internal error creating SRP verifier\n");
 | 
			
		||||
			}
 | 
			
		||||
		else 
 | 
			
		||||
			*srp_usersalt = salt;
 | 
			
		||||
		VVERBOSE BIO_printf(bio,"gNid=%s salt =\"%s\"\n verifier =\"%s\"\n", gNid,salt, *srp_verifier);
 | 
			
		||||
 | 
			
		||||
		}
 | 
			
		||||
	return gNid;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
int MAIN(int argc, char **argv)
 | 
			
		||||
	{
 | 
			
		||||
	int add_user = 0;
 | 
			
		||||
	int list_user= 0;
 | 
			
		||||
	int delete_user= 0;
 | 
			
		||||
	int modify_user= 0;
 | 
			
		||||
	char * user = NULL;
 | 
			
		||||
 | 
			
		||||
	char *passargin = NULL, *passargout = NULL;
 | 
			
		||||
	char *passin = NULL, *passout = NULL;
 | 
			
		||||
        char * gN = NULL;
 | 
			
		||||
	int gNindex = -1;
 | 
			
		||||
	char ** gNrow = NULL;
 | 
			
		||||
	int maxgN = -1;
 | 
			
		||||
 | 
			
		||||
	char * userinfo = NULL;
 | 
			
		||||
 | 
			
		||||
	int badops=0;
 | 
			
		||||
	int ret=1;
 | 
			
		||||
	int errors=0;
 | 
			
		||||
	int verbose=0;
 | 
			
		||||
	int doupdatedb=0;
 | 
			
		||||
	char *configfile=NULL;
 | 
			
		||||
	char *dbfile=NULL;
 | 
			
		||||
	CA_DB *db=NULL;
 | 
			
		||||
	char **pp ;
 | 
			
		||||
	int i;
 | 
			
		||||
	long errorline = -1;
 | 
			
		||||
	char *randfile=NULL;
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
	char *engine = NULL;
 | 
			
		||||
#endif
 | 
			
		||||
	char *tofree=NULL;
 | 
			
		||||
	DB_ATTR db_attr;
 | 
			
		||||
 | 
			
		||||
#ifdef EFENCE
 | 
			
		||||
EF_PROTECT_FREE=1;
 | 
			
		||||
EF_PROTECT_BELOW=1;
 | 
			
		||||
EF_ALIGNMENT=0;
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	apps_startup();
 | 
			
		||||
 | 
			
		||||
	conf = NULL;
 | 
			
		||||
	section = NULL;
 | 
			
		||||
 | 
			
		||||
	if (bio_err == NULL)
 | 
			
		||||
		if ((bio_err=BIO_new(BIO_s_file())) != NULL)
 | 
			
		||||
			BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
 | 
			
		||||
 | 
			
		||||
	argc--;
 | 
			
		||||
	argv++;
 | 
			
		||||
	while (argc >= 1 && badops == 0)
 | 
			
		||||
		{
 | 
			
		||||
		if	(strcmp(*argv,"-verbose") == 0)
 | 
			
		||||
			verbose++;
 | 
			
		||||
		else if	(strcmp(*argv,"-config") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			configfile= *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
		else if (strcmp(*argv,"-name") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			section= *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
		else if	(strcmp(*argv,"-srpvfile") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			dbfile= *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
		else if (strcmp(*argv,"-add") == 0)
 | 
			
		||||
			add_user=1;
 | 
			
		||||
		else if (strcmp(*argv,"-delete") == 0)
 | 
			
		||||
			delete_user=1;
 | 
			
		||||
		else if (strcmp(*argv,"-modify") == 0)
 | 
			
		||||
			modify_user=1;
 | 
			
		||||
		else if (strcmp(*argv,"-list") == 0)
 | 
			
		||||
			list_user=1;
 | 
			
		||||
		else if (strcmp(*argv,"-gn") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			gN= *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
		else if (strcmp(*argv,"-userinfo") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			userinfo= *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
		else if (strcmp(*argv,"-passin") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			passargin= *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
		else if (strcmp(*argv,"-passout") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			passargout= *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
		else if (strcmp(*argv,"-engine") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			engine= *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
		else if (**argv == '-')
 | 
			
		||||
			{
 | 
			
		||||
bad:
 | 
			
		||||
			BIO_printf(bio_err,"unknown option %s\n",*argv);
 | 
			
		||||
			badops=1;
 | 
			
		||||
			break;
 | 
			
		||||
			}
 | 
			
		||||
		else 
 | 
			
		||||
			break;
 | 
			
		||||
	
 | 
			
		||||
		argc--;
 | 
			
		||||
		argv++;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	if (dbfile && configfile)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf(bio_err,"-dbfile and -configfile cannot be specified together.\n");
 | 
			
		||||
		badops = 1;
 | 
			
		||||
		}
 | 
			
		||||
	if (add_user+delete_user+modify_user+list_user != 1)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf(bio_err,"Exactly one of the options -add, -delete, -modify -list must be specified.\n");
 | 
			
		||||
		badops = 1;
 | 
			
		||||
		}
 | 
			
		||||
	if (delete_user+modify_user+delete_user== 1 && argc <= 0)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf(bio_err,"Need at least one user for options -add, -delete, -modify. \n");
 | 
			
		||||
		badops = 1;
 | 
			
		||||
		}
 | 
			
		||||
	if ((passin || passout) && argc != 1 )
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf(bio_err,"-passin, -passout arguments only valid with one user.\n");
 | 
			
		||||
		badops = 1;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	if (badops)
 | 
			
		||||
		{
 | 
			
		||||
		for (pp=srp_usage; (*pp != NULL); pp++)
 | 
			
		||||
			BIO_printf(bio_err,"%s",*pp);
 | 
			
		||||
 | 
			
		||||
		BIO_printf(bio_err," -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
 | 
			
		||||
		BIO_printf(bio_err,"                 load the file (or the files in the directory) into\n");
 | 
			
		||||
		BIO_printf(bio_err,"                 the random number generator\n");
 | 
			
		||||
		goto err;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	ERR_load_crypto_strings();
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
	setup_engine(bio_err, engine, 0);
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	if(!app_passwd(bio_err, passargin, passargout, &passin, &passout))
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf(bio_err, "Error getting passwords\n");
 | 
			
		||||
		goto err;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
        if (!dbfile)
 | 
			
		||||
		{
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
	/*****************************************************************/
 | 
			
		||||
		tofree=NULL;
 | 
			
		||||
		if (configfile == NULL) configfile = getenv("OPENSSL_CONF");
 | 
			
		||||
		if (configfile == NULL) configfile = getenv("SSLEAY_CONF");
 | 
			
		||||
		if (configfile == NULL)
 | 
			
		||||
			{
 | 
			
		||||
			const char *s=X509_get_default_cert_area();
 | 
			
		||||
			size_t len;
 | 
			
		||||
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
			len = strlen(s)+sizeof(CONFIG_FILE);
 | 
			
		||||
			tofree=OPENSSL_malloc(len);
 | 
			
		||||
			strcpy(tofree,s);
 | 
			
		||||
#else
 | 
			
		||||
			len = strlen(s)+sizeof(CONFIG_FILE)+1;
 | 
			
		||||
			tofree=OPENSSL_malloc(len);
 | 
			
		||||
			BUF_strlcpy(tofree,s,len);
 | 
			
		||||
			BUF_strlcat(tofree,"/",len);
 | 
			
		||||
#endif
 | 
			
		||||
			BUF_strlcat(tofree,CONFIG_FILE,len);
 | 
			
		||||
			configfile=tofree;
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
		VERBOSE BIO_printf(bio_err,"Using configuration from %s\n",configfile);
 | 
			
		||||
		conf = NCONF_new(NULL);
 | 
			
		||||
		if (NCONF_load(conf,configfile,&errorline) <= 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (errorline <= 0)
 | 
			
		||||
				BIO_printf(bio_err,"error loading the config file '%s'\n",
 | 
			
		||||
					configfile);
 | 
			
		||||
			else
 | 
			
		||||
				BIO_printf(bio_err,"error on line %ld of config file '%s'\n"
 | 
			
		||||
					,errorline,configfile);
 | 
			
		||||
			goto err;
 | 
			
		||||
			}
 | 
			
		||||
		if(tofree)
 | 
			
		||||
			{
 | 
			
		||||
			OPENSSL_free(tofree);
 | 
			
		||||
			tofree = NULL;
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
		if (!load_config(bio_err, conf))
 | 
			
		||||
			goto err;
 | 
			
		||||
 | 
			
		||||
	/* Lets get the config section we are using */
 | 
			
		||||
		if (section == NULL)
 | 
			
		||||
			{
 | 
			
		||||
			VERBOSE BIO_printf(bio_err,"trying to read " ENV_DEFAULT_SRP " in \" BASE_SECTION \"\n");
 | 
			
		||||
 | 
			
		||||
			section=NCONF_get_string(conf,BASE_SECTION,ENV_DEFAULT_SRP);
 | 
			
		||||
			if (section == NULL)
 | 
			
		||||
				{
 | 
			
		||||
				lookup_fail(BASE_SECTION,ENV_DEFAULT_SRP);
 | 
			
		||||
				goto err;
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
         
 | 
			
		||||
		if (randfile == NULL && conf)
 | 
			
		||||
	        	randfile = NCONF_get_string(conf, BASE_SECTION, "RANDFILE");
 | 
			
		||||
 | 
			
		||||
	
 | 
			
		||||
		VERBOSE BIO_printf(bio_err,"trying to read " ENV_DATABASE " in section \"%s\"\n",section);
 | 
			
		||||
 | 
			
		||||
		if ((dbfile=NCONF_get_string(conf,section,ENV_DATABASE)) == NULL)
 | 
			
		||||
			{
 | 
			
		||||
			lookup_fail(section,ENV_DATABASE);
 | 
			
		||||
			goto err;
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
        	}
 | 
			
		||||
	if (randfile == NULL)
 | 
			
		||||
		ERR_clear_error();
 | 
			
		||||
       	else 
 | 
			
		||||
		app_RAND_load_file(randfile, bio_err, 0);
 | 
			
		||||
 | 
			
		||||
	VERBOSE BIO_printf(bio_err,"Trying to read SRP verifier file \"%s\"\n",dbfile);
 | 
			
		||||
 | 
			
		||||
	db = load_index(dbfile, &db_attr);
 | 
			
		||||
	if (db == NULL) goto err;
 | 
			
		||||
 | 
			
		||||
	/* Lets check some fields */
 | 
			
		||||
	for (i = 0; i < sk_OPENSSL_PSTRING_num(db->db->data); i++)
 | 
			
		||||
		{
 | 
			
		||||
		pp = sk_OPENSSL_PSTRING_value(db->db->data, i);
 | 
			
		||||
	
 | 
			
		||||
		if (pp[DB_srptype][0] == DB_SRP_INDEX)
 | 
			
		||||
			{
 | 
			
		||||
			maxgN = i;
 | 
			
		||||
			if (gNindex < 0 && gN != NULL && !strcmp(gN, pp[DB_srpid]))
 | 
			
		||||
				gNindex = i;
 | 
			
		||||
 | 
			
		||||
			print_index(db, bio_err, i, verbose > 1);
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
	
 | 
			
		||||
	VERBOSE BIO_printf(bio_err, "Database initialised\n");
 | 
			
		||||
 | 
			
		||||
	if (gNindex >= 0)
 | 
			
		||||
		{
 | 
			
		||||
		gNrow = sk_OPENSSL_PSTRING_value(db->db->data,gNindex);
 | 
			
		||||
		print_entry(db, bio_err, gNindex, verbose > 1, "Default g and N");
 | 
			
		||||
		}
 | 
			
		||||
	else if (maxgN > 0 && !SRP_get_default_gN(gN))
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf(bio_err, "No g and N value for index \"%s\"\n", gN);
 | 
			
		||||
		goto err;
 | 
			
		||||
		}
 | 
			
		||||
	else
 | 
			
		||||
		{
 | 
			
		||||
		VERBOSE BIO_printf(bio_err, "Database has no g N information.\n");
 | 
			
		||||
		gNrow = NULL;
 | 
			
		||||
		}
 | 
			
		||||
	
 | 
			
		||||
 | 
			
		||||
	VVERBOSE BIO_printf(bio_err,"Starting user processing\n");
 | 
			
		||||
 | 
			
		||||
	if (argc > 0)
 | 
			
		||||
		user = *(argv++) ;
 | 
			
		||||
 | 
			
		||||
	while (list_user || user)
 | 
			
		||||
		{
 | 
			
		||||
		int userindex = -1;
 | 
			
		||||
		if (user) 
 | 
			
		||||
			VVERBOSE BIO_printf(bio_err, "Processing user \"%s\"\n", user);
 | 
			
		||||
		if ((userindex = get_index(db, user, 'U')) >= 0)
 | 
			
		||||
			{
 | 
			
		||||
			print_user(db, bio_err, userindex, (verbose > 0) || list_user);
 | 
			
		||||
			}
 | 
			
		||||
		
 | 
			
		||||
		if (list_user)
 | 
			
		||||
			{
 | 
			
		||||
			if (user == NULL)
 | 
			
		||||
				{
 | 
			
		||||
				BIO_printf(bio_err,"List all users\n");
 | 
			
		||||
 | 
			
		||||
				for (i = 0; i < sk_OPENSSL_PSTRING_num(db->db->data); i++)
 | 
			
		||||
					{
 | 
			
		||||
					print_user(db,bio_err, i, 1);
 | 
			
		||||
					}
 | 
			
		||||
				list_user = 0;
 | 
			
		||||
				}
 | 
			
		||||
			else if (userindex < 0)
 | 
			
		||||
				{
 | 
			
		||||
				BIO_printf(bio_err, "user \"%s\" does not exist, ignored. t\n",
 | 
			
		||||
					   user);
 | 
			
		||||
				errors++;
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
		else if (add_user)
 | 
			
		||||
			{
 | 
			
		||||
			if (userindex >= 0)
 | 
			
		||||
				{
 | 
			
		||||
				/* reactivation of a new user */
 | 
			
		||||
				char **row = sk_OPENSSL_PSTRING_value(db->db->data, userindex);
 | 
			
		||||
				BIO_printf(bio_err, "user \"%s\" reactivated.\n", user);
 | 
			
		||||
				row[DB_srptype][0] = 'V';
 | 
			
		||||
 | 
			
		||||
				doupdatedb = 1;
 | 
			
		||||
				}
 | 
			
		||||
			else
 | 
			
		||||
				{
 | 
			
		||||
				char *row[DB_NUMBER] ; char *gNid;
 | 
			
		||||
				row[DB_srpverifier] = NULL;
 | 
			
		||||
				row[DB_srpsalt] = NULL;
 | 
			
		||||
				row[DB_srpinfo] = NULL;
 | 
			
		||||
				if (!(gNid = srp_create_user(user,&(row[DB_srpverifier]), &(row[DB_srpsalt]),gNrow?gNrow[DB_srpsalt]:gN,gNrow?gNrow[DB_srpverifier]:NULL, passout, bio_err,verbose)))
 | 
			
		||||
					{
 | 
			
		||||
						BIO_printf(bio_err, "Cannot create srp verifier for user \"%s\", operation abandoned .\n", user);
 | 
			
		||||
						errors++;
 | 
			
		||||
						goto err;
 | 
			
		||||
					}
 | 
			
		||||
				row[DB_srpid] = BUF_strdup(user);
 | 
			
		||||
				row[DB_srptype] = BUF_strdup("v");
 | 
			
		||||
				row[DB_srpgN] = BUF_strdup(gNid);
 | 
			
		||||
 | 
			
		||||
				if (!row[DB_srpid] || !row[DB_srpgN] || !row[DB_srptype] || !row[DB_srpverifier] || !row[DB_srpsalt] ||
 | 
			
		||||
					(userinfo && (!(row[DB_srpinfo] = BUF_strdup(userinfo)))) || 
 | 
			
		||||
					!update_index(db, bio_err, row))
 | 
			
		||||
					{
 | 
			
		||||
					if (row[DB_srpid]) OPENSSL_free(row[DB_srpid]);
 | 
			
		||||
					if (row[DB_srpgN]) OPENSSL_free(row[DB_srpgN]);
 | 
			
		||||
					if (row[DB_srpinfo]) OPENSSL_free(row[DB_srpinfo]);
 | 
			
		||||
					if (row[DB_srptype]) OPENSSL_free(row[DB_srptype]);
 | 
			
		||||
					if (row[DB_srpverifier]) OPENSSL_free(row[DB_srpverifier]);
 | 
			
		||||
					if (row[DB_srpsalt]) OPENSSL_free(row[DB_srpsalt]);
 | 
			
		||||
					goto err;
 | 
			
		||||
					}
 | 
			
		||||
				doupdatedb = 1;
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
		else if (modify_user)
 | 
			
		||||
			{
 | 
			
		||||
			if (userindex < 0)
 | 
			
		||||
				{
 | 
			
		||||
				BIO_printf(bio_err,"user \"%s\" does not exist, operation ignored.\n",user);
 | 
			
		||||
				errors++;
 | 
			
		||||
				}
 | 
			
		||||
			else
 | 
			
		||||
				{
 | 
			
		||||
 | 
			
		||||
				char **row = sk_OPENSSL_PSTRING_value(db->db->data, userindex);
 | 
			
		||||
				char type = row[DB_srptype][0];
 | 
			
		||||
				if (type == 'v')
 | 
			
		||||
					{
 | 
			
		||||
					BIO_printf(bio_err,"user \"%s\" already updated, operation ignored.\n",user);
 | 
			
		||||
					errors++;
 | 
			
		||||
					}
 | 
			
		||||
				else
 | 
			
		||||
					{
 | 
			
		||||
					char *gNid;
 | 
			
		||||
 | 
			
		||||
					if (row[DB_srptype][0] == 'V')
 | 
			
		||||
						{
 | 
			
		||||
						int user_gN;
 | 
			
		||||
						char **irow = NULL;
 | 
			
		||||
						VERBOSE BIO_printf(bio_err,"Verifying password for user \"%s\"\n",user);
 | 
			
		||||
						if ( (user_gN = get_index(db, row[DB_srpgN], DB_SRP_INDEX)) >= 0)
 | 
			
		||||
							irow = (char **)sk_OPENSSL_PSTRING_value(db->db->data, userindex);
 | 
			
		||||
 | 
			
		||||
 						if (!srp_verify_user(user, row[DB_srpverifier], row[DB_srpsalt], irow ? irow[DB_srpsalt] : row[DB_srpgN], irow ? irow[DB_srpverifier] : NULL, passin, bio_err, verbose))
 | 
			
		||||
							{
 | 
			
		||||
							BIO_printf(bio_err, "Invalid password for user \"%s\", operation abandoned.\n", user);
 | 
			
		||||
							errors++;
 | 
			
		||||
							goto err;
 | 
			
		||||
							}
 | 
			
		||||
						} 
 | 
			
		||||
					VERBOSE BIO_printf(bio_err,"Password for user \"%s\" ok.\n",user);
 | 
			
		||||
 | 
			
		||||
					if (!(gNid=srp_create_user(user,&(row[DB_srpverifier]), &(row[DB_srpsalt]),gNrow?gNrow[DB_srpsalt]:NULL, gNrow?gNrow[DB_srpverifier]:NULL, passout, bio_err,verbose)))
 | 
			
		||||
						{
 | 
			
		||||
						BIO_printf(bio_err, "Cannot create srp verifier for user \"%s\", operation abandoned.\n", user);
 | 
			
		||||
						errors++;
 | 
			
		||||
						goto err;
 | 
			
		||||
						}
 | 
			
		||||
 | 
			
		||||
					row[DB_srptype][0] = 'v';
 | 
			
		||||
					row[DB_srpgN] = BUF_strdup(gNid);
 | 
			
		||||
 
 | 
			
		||||
					if (!row[DB_srpid] || !row[DB_srpgN] || !row[DB_srptype] || !row[DB_srpverifier] || !row[DB_srpsalt] ||
 | 
			
		||||
						(userinfo && (!(row[DB_srpinfo] = BUF_strdup(userinfo)))))  
 | 
			
		||||
						goto err;
 | 
			
		||||
 | 
			
		||||
					doupdatedb = 1;
 | 
			
		||||
					}
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
		else if (delete_user)
 | 
			
		||||
			{
 | 
			
		||||
			if (userindex < 0)
 | 
			
		||||
				{
 | 
			
		||||
				BIO_printf(bio_err, "user \"%s\" does not exist, operation ignored. t\n", user);
 | 
			
		||||
				errors++;
 | 
			
		||||
				}
 | 
			
		||||
			else
 | 
			
		||||
				{
 | 
			
		||||
				char **xpp = sk_OPENSSL_PSTRING_value(db->db->data,userindex);
 | 
			
		||||
				BIO_printf(bio_err, "user \"%s\" revoked. t\n", user);
 | 
			
		||||
 | 
			
		||||
				xpp[DB_srptype][0] = 'R';
 | 
			
		||||
				
 | 
			
		||||
				doupdatedb = 1;
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
		if (--argc > 0)
 | 
			
		||||
			user = *(argv++) ;
 | 
			
		||||
		else
 | 
			
		||||
			{
 | 
			
		||||
			user = NULL;
 | 
			
		||||
			list_user = 0;
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	VERBOSE BIO_printf(bio_err,"User procession done.\n");
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
	if (doupdatedb)
 | 
			
		||||
		{
 | 
			
		||||
		/* Lets check some fields */
 | 
			
		||||
		for (i = 0; i < sk_OPENSSL_PSTRING_num(db->db->data); i++)
 | 
			
		||||
			{
 | 
			
		||||
			pp = sk_OPENSSL_PSTRING_value(db->db->data,i);
 | 
			
		||||
	
 | 
			
		||||
			if (pp[DB_srptype][0] == 'v')
 | 
			
		||||
				{
 | 
			
		||||
				pp[DB_srptype][0] = 'V';
 | 
			
		||||
				print_user(db, bio_err, i, verbose);
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
		VERBOSE BIO_printf(bio_err, "Trying to update srpvfile.\n");
 | 
			
		||||
		if (!save_index(dbfile, "new", db)) goto err;
 | 
			
		||||
				
 | 
			
		||||
		VERBOSE BIO_printf(bio_err, "Temporary srpvfile created.\n");
 | 
			
		||||
		if (!rotate_index(dbfile, "new", "old")) goto err;
 | 
			
		||||
 | 
			
		||||
		VERBOSE BIO_printf(bio_err, "srpvfile updated.\n");
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	ret = (errors != 0);
 | 
			
		||||
err:
 | 
			
		||||
	if (errors != 0)
 | 
			
		||||
	VERBOSE BIO_printf(bio_err,"User errors %d.\n",errors);
 | 
			
		||||
 | 
			
		||||
	VERBOSE BIO_printf(bio_err,"SRP terminating with code %d.\n",ret);
 | 
			
		||||
	if(tofree)
 | 
			
		||||
		OPENSSL_free(tofree);
 | 
			
		||||
	if (ret) ERR_print_errors(bio_err);
 | 
			
		||||
	if (randfile) app_RAND_write_file(randfile, bio_err);
 | 
			
		||||
	if (conf) NCONF_free(conf);
 | 
			
		||||
	if (db) free_index(db);
 | 
			
		||||
 | 
			
		||||
	OBJ_cleanup();
 | 
			
		||||
	apps_shutdown();
 | 
			
		||||
	OPENSSL_EXIT(ret);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
@@ -1129,7 +1129,7 @@ static X509_STORE *create_cert_store(char *ca_path, char *ca_file)
 | 
			
		||||
 | 
			
		||||
static int MS_CALLBACK verify_cb(int ok, X509_STORE_CTX *ctx)
 | 
			
		||||
	{
 | 
			
		||||
	/*
 | 
			
		||||
	/*-
 | 
			
		||||
	char buf[256];
 | 
			
		||||
 | 
			
		||||
	if (!ok)
 | 
			
		||||
 
 | 
			
		||||
@@ -222,25 +222,37 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			goto end;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	if (argc < 1) check(cert_ctx, NULL, untrusted, trusted, crls, e);
 | 
			
		||||
	ret = 0;
 | 
			
		||||
	if (argc < 1)
 | 
			
		||||
		{ 
 | 
			
		||||
		if (1 != check(cert_ctx, NULL, untrusted, trusted, crls, e))
 | 
			
		||||
			ret = -1;
 | 
			
		||||
		}
 | 
			
		||||
	else
 | 
			
		||||
		{
 | 
			
		||||
		for (i=0; i<argc; i++)
 | 
			
		||||
			check(cert_ctx,argv[i], untrusted, trusted, crls, e);
 | 
			
		||||
	ret=0;
 | 
			
		||||
			if (1 != check(cert_ctx,argv[i], untrusted, trusted, crls, e))
 | 
			
		||||
				ret = -1;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
end:
 | 
			
		||||
	if (ret == 1) {
 | 
			
		||||
		BIO_printf(bio_err,"usage: verify [-verbose] [-CApath path] [-CAfile file] [-purpose purpose] [-crl_check]");
 | 
			
		||||
		BIO_printf(bio_err," [-attime timestamp]");
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
		BIO_printf(bio_err," [-engine e]");
 | 
			
		||||
#endif
 | 
			
		||||
		BIO_printf(bio_err," cert1 cert2 ...\n");
 | 
			
		||||
 | 
			
		||||
		BIO_printf(bio_err,"recognized usages:\n");
 | 
			
		||||
		for(i = 0; i < X509_PURPOSE_get_count(); i++) {
 | 
			
		||||
		for(i = 0; i < X509_PURPOSE_get_count(); i++)
 | 
			
		||||
			{
 | 
			
		||||
			X509_PURPOSE *ptmp;
 | 
			
		||||
			ptmp = X509_PURPOSE_get0(i);
 | 
			
		||||
			BIO_printf(bio_err, "\t%-10s\t%s\n", X509_PURPOSE_get0_sname(ptmp),
 | 
			
		||||
								X509_PURPOSE_get0_name(ptmp));
 | 
			
		||||
		}
 | 
			
		||||
			BIO_printf(bio_err, "\t%-10s\t%s\n",
 | 
			
		||||
				   X509_PURPOSE_get0_sname(ptmp),
 | 
			
		||||
				   X509_PURPOSE_get0_name(ptmp));
 | 
			
		||||
			}
 | 
			
		||||
	}
 | 
			
		||||
	if (vpm) X509_VERIFY_PARAM_free(vpm);
 | 
			
		||||
	if (cert_ctx != NULL) X509_STORE_free(cert_ctx);
 | 
			
		||||
@@ -248,7 +260,7 @@ end:
 | 
			
		||||
	sk_X509_pop_free(trusted, X509_free);
 | 
			
		||||
	sk_X509_CRL_pop_free(crls, X509_CRL_free);
 | 
			
		||||
	apps_shutdown();
 | 
			
		||||
	OPENSSL_EXIT(ret);
 | 
			
		||||
	OPENSSL_EXIT(ret < 0 ? 2 : ret);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
static int check(X509_STORE *ctx, char *file,
 | 
			
		||||
 
 | 
			
		||||
@@ -5,7 +5,7 @@
 | 
			
		||||
 | 
			
		||||
#ifdef USE_DECC_INIT
 | 
			
		||||
 | 
			
		||||
/*
 | 
			
		||||
/*-
 | 
			
		||||
 * 2010-04-26 SMS.
 | 
			
		||||
 *
 | 
			
		||||
 *----------------------------------------------------------------------
 | 
			
		||||
 
 | 
			
		||||
@@ -53,7 +53,8 @@
 | 
			
		||||
 *
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
/* Usage: winrand [filename]
 | 
			
		||||
/*-
 | 
			
		||||
 * Usage: winrand [filename]
 | 
			
		||||
 *
 | 
			
		||||
 * Collects entropy from mouse movements and other events and writes
 | 
			
		||||
 * random data to filename or .rnd
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										36
									
								
								apps/x509.c
									
									
									
									
									
								
							
							
						
						
									
										36
									
								
								apps/x509.c
									
									
									
									
									
								
							@@ -157,9 +157,10 @@ static int MS_CALLBACK callb(int ok, X509_STORE_CTX *ctx);
 | 
			
		||||
static int sign (X509 *x, EVP_PKEY *pkey,int days,int clrext, const EVP_MD *digest,
 | 
			
		||||
						CONF *conf, char *section);
 | 
			
		||||
static int x509_certify (X509_STORE *ctx,char *CAfile,const EVP_MD *digest,
 | 
			
		||||
			 X509 *x,X509 *xca,EVP_PKEY *pkey,char *serial,
 | 
			
		||||
			 int create,int days, int clrext, CONF *conf, char *section,
 | 
			
		||||
						ASN1_INTEGER *sno);
 | 
			
		||||
			 X509 *x,X509 *xca,EVP_PKEY *pkey,
 | 
			
		||||
			 STACK_OF(OPENSSL_STRING) *sigopts,
 | 
			
		||||
			 char *serial, int create ,int days, int clrext,
 | 
			
		||||
			 CONF *conf, char *section, ASN1_INTEGER *sno);
 | 
			
		||||
static int purpose_print(BIO *bio, X509 *cert, X509_PURPOSE *pt);
 | 
			
		||||
static int reqfile=0;
 | 
			
		||||
 | 
			
		||||
@@ -172,6 +173,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	X509_REQ *req=NULL;
 | 
			
		||||
	X509 *x=NULL,*xca=NULL;
 | 
			
		||||
	ASN1_OBJECT *objtmp;
 | 
			
		||||
	STACK_OF(OPENSSL_STRING) *sigopts = NULL;
 | 
			
		||||
	EVP_PKEY *Upkey=NULL,*CApkey=NULL;
 | 
			
		||||
	ASN1_INTEGER *sno = NULL;
 | 
			
		||||
	int i,num,badops=0;
 | 
			
		||||
@@ -271,13 +273,22 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			CAkeyformat=str2fmt(*(++argv));
 | 
			
		||||
			}
 | 
			
		||||
		else if (strcmp(*argv,"-sigopt") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1)
 | 
			
		||||
				goto bad;
 | 
			
		||||
			if (!sigopts)
 | 
			
		||||
				sigopts = sk_OPENSSL_STRING_new_null();
 | 
			
		||||
			if (!sigopts || !sk_OPENSSL_STRING_push(sigopts, *(++argv)))
 | 
			
		||||
				goto bad;
 | 
			
		||||
			}
 | 
			
		||||
		else if (strcmp(*argv,"-days") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			days=atoi(*(++argv));
 | 
			
		||||
			if (days == 0)
 | 
			
		||||
				{
 | 
			
		||||
				BIO_printf(STDout,"bad number of days\n");
 | 
			
		||||
				BIO_printf(bio_err,"bad number of days\n");
 | 
			
		||||
				goto bad;
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
@@ -901,7 +912,7 @@ bad:
 | 
			
		||||
				}
 | 
			
		||||
			else if (text == i)
 | 
			
		||||
				{
 | 
			
		||||
				X509_print_ex(out,x,nmflag, certflag);
 | 
			
		||||
				X509_print_ex(STDout,x,nmflag, certflag);
 | 
			
		||||
				}
 | 
			
		||||
			else if (startdate == i)
 | 
			
		||||
				{
 | 
			
		||||
@@ -970,7 +981,8 @@ bad:
 | 
			
		||||
				
 | 
			
		||||
				assert(need_rand);
 | 
			
		||||
				if (!x509_certify(ctx,CAfile,digest,x,xca,
 | 
			
		||||
					CApkey, CAserial,CA_createserial,days, clrext,
 | 
			
		||||
					CApkey, sigopts,
 | 
			
		||||
					CAserial,CA_createserial,days, clrext,
 | 
			
		||||
					extconf, extsect, sno))
 | 
			
		||||
					goto end;
 | 
			
		||||
				}
 | 
			
		||||
@@ -1081,6 +1093,8 @@ end:
 | 
			
		||||
	X509_free(xca);
 | 
			
		||||
	EVP_PKEY_free(Upkey);
 | 
			
		||||
	EVP_PKEY_free(CApkey);
 | 
			
		||||
	if (sigopts)
 | 
			
		||||
		sk_OPENSSL_STRING_free(sigopts);
 | 
			
		||||
	X509_REQ_free(rq);
 | 
			
		||||
	ASN1_INTEGER_free(sno);
 | 
			
		||||
	sk_ASN1_OBJECT_pop_free(trust, ASN1_OBJECT_free);
 | 
			
		||||
@@ -1131,8 +1145,11 @@ static ASN1_INTEGER *x509_load_serial(char *CAfile, char *serialfile, int create
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
static int x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest,
 | 
			
		||||
	     X509 *x, X509 *xca, EVP_PKEY *pkey, char *serialfile, int create,
 | 
			
		||||
	     int days, int clrext, CONF *conf, char *section, ASN1_INTEGER *sno)
 | 
			
		||||
	     		X509 *x, X509 *xca, EVP_PKEY *pkey,
 | 
			
		||||
			STACK_OF(OPENSSL_STRING) *sigopts,
 | 
			
		||||
	  		char *serialfile, int create,
 | 
			
		||||
	     		int days, int clrext, CONF *conf, char *section,
 | 
			
		||||
			ASN1_INTEGER *sno)
 | 
			
		||||
	{
 | 
			
		||||
	int ret=0;
 | 
			
		||||
	ASN1_INTEGER *bs=NULL;
 | 
			
		||||
@@ -1191,7 +1208,8 @@ static int x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest,
 | 
			
		||||
                if (!X509V3_EXT_add_nconf(conf, &ctx2, section, x)) goto end;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	if (!X509_sign(x,pkey,digest)) goto end;
 | 
			
		||||
	if (!do_X509_sign(bio_err, x, pkey, digest, sigopts))
 | 
			
		||||
		goto end;
 | 
			
		||||
	ret=1;
 | 
			
		||||
end:
 | 
			
		||||
	X509_STORE_CTX_cleanup(&xsc);
 | 
			
		||||
 
 | 
			
		||||
@@ -60,7 +60,8 @@
 | 
			
		||||
 * something to watch out for.  This was fine on linux/NT/Solaris but not
 | 
			
		||||
 * Alpha */
 | 
			
		||||
 | 
			
		||||
/* it is basically an example of
 | 
			
		||||
/*-
 | 
			
		||||
 * it is basically an example of
 | 
			
		||||
 * func(*(a++),*(a++))
 | 
			
		||||
 * which parameter is evaluated first?  It is not defined in ASN1 C.
 | 
			
		||||
 */
 | 
			
		||||
 
 | 
			
		||||
@@ -14,7 +14,8 @@
 | 
			
		||||
 * copies of the valiable, one in a register and one being an address
 | 
			
		||||
 * that is passed. */
 | 
			
		||||
 | 
			
		||||
/* compare the out put from
 | 
			
		||||
/*-
 | 
			
		||||
 * compare the out put from
 | 
			
		||||
 * gcc dggccbug.c; ./a.out
 | 
			
		||||
 * and
 | 
			
		||||
 * gcc -O dggccbug.c; ./a.out
 | 
			
		||||
 
 | 
			
		||||
@@ -11,7 +11,8 @@
 | 
			
		||||
 * Gage <agage@forgetmenot.Mines.EDU>
 | 
			
		||||
 */
 | 
			
		||||
 
 | 
			
		||||
/* Compare the output from
 | 
			
		||||
/*-
 | 
			
		||||
 * Compare the output from
 | 
			
		||||
 * cc sgiccbug.c; ./a.out
 | 
			
		||||
 * and
 | 
			
		||||
 * cc -O sgiccbug.c; ./a.out
 | 
			
		||||
 
 | 
			
		||||
@@ -1,6 +1,7 @@
 | 
			
		||||
#include <stdio.h>
 | 
			
		||||
 | 
			
		||||
/* This is a cc optimiser bug for ultrix 4.3, mips CPU.
 | 
			
		||||
/*-
 | 
			
		||||
 * This is a cc optimiser bug for ultrix 4.3, mips CPU.
 | 
			
		||||
 * What happens is that the compiler, due to the (a)&7,
 | 
			
		||||
 * does
 | 
			
		||||
 * i=a&7;
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										104
									
								
								config
									
									
									
									
									
								
							
							
						
						
									
										104
									
								
								config
									
									
									
									
									
								
							@@ -370,6 +370,10 @@ case "${SYSTEM}:${RELEASE}:${VERSION}:${MACHINE}" in
 | 
			
		||||
    NONSTOP_KERNEL*)
 | 
			
		||||
       echo "nsr-tandem-nsk"; exit 0;
 | 
			
		||||
       ;;
 | 
			
		||||
 | 
			
		||||
    vxworks*)
 | 
			
		||||
       echo "${MACHINE}-whatever-vxworks"; exit 0;
 | 
			
		||||
       ;;
 | 
			
		||||
esac
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
@@ -407,23 +411,18 @@ exit 0
 | 
			
		||||
# this is where the translation occurs into SSLeay terms
 | 
			
		||||
# ---------------------------------------------------------------------------
 | 
			
		||||
 | 
			
		||||
GCCVER=`(gcc -dumpversion) 2>/dev/null`
 | 
			
		||||
if [ "$GCCVER" != "" ]; then
 | 
			
		||||
  # then strip off whatever prefix egcs prepends the number with...
 | 
			
		||||
  # Hopefully, this will work for any future prefixes as well.
 | 
			
		||||
  GCCVER=`echo $GCCVER | LC_ALL=C sed 's/^[a-zA-Z]*\-//'`
 | 
			
		||||
  # Since gcc 3.1 gcc --version behaviour has changed.  gcc -dumpversion
 | 
			
		||||
  # does give us what we want though, so we use that.  We just just the
 | 
			
		||||
  # major and minor version numbers.
 | 
			
		||||
  # peak single digit before and after first dot, e.g. 2.95.1 gives 29
 | 
			
		||||
  GCCVER=`echo $GCCVER | sed 's/\([0-9]\)\.\([0-9]\).*/\1\2/'`
 | 
			
		||||
fi
 | 
			
		||||
 | 
			
		||||
# Only set CC if not supplied already
 | 
			
		||||
if [ -z "$CC" ]; then
 | 
			
		||||
# figure out if gcc is available and if so we use it otherwise
 | 
			
		||||
# we fallback to whatever cc does on the system
 | 
			
		||||
if [ -z "$CROSS_COMPILE$CC" ]; then
 | 
			
		||||
  GCCVER=`sh -c "gcc -dumpversion" 2>/dev/null`
 | 
			
		||||
  if [ "$GCCVER" != "" ]; then
 | 
			
		||||
    # then strip off whatever prefix egcs prepends the number with...
 | 
			
		||||
    # Hopefully, this will work for any future prefixes as well.
 | 
			
		||||
    GCCVER=`echo $GCCVER | LC_ALL=C sed 's/^[a-zA-Z]*\-//'`
 | 
			
		||||
    # Since gcc 3.1 gcc --version behaviour has changed.  gcc -dumpversion
 | 
			
		||||
    # does give us what we want though, so we use that.  We just just the
 | 
			
		||||
    # major and minor version numbers.
 | 
			
		||||
    # peak single digit before and after first dot, e.g. 2.95.1 gives 29
 | 
			
		||||
    GCCVER=`echo $GCCVER | sed 's/\([0-9]\)\.\([0-9]\).*/\1\2/'`
 | 
			
		||||
    CC=gcc
 | 
			
		||||
  else
 | 
			
		||||
    CC=cc
 | 
			
		||||
@@ -539,7 +538,7 @@ case "$GUESSOS" in
 | 
			
		||||
  ppc-apple-rhapsody) OUT="rhapsody-ppc-cc" ;;
 | 
			
		||||
  ppc-apple-darwin*)
 | 
			
		||||
	ISA64=`(sysctl -n hw.optional.64bitops) 2>/dev/null`
 | 
			
		||||
	if [ "$ISA64" = "1" ]; then
 | 
			
		||||
	if [ "$ISA64" = "1" -a -z "$KERNEL_BITS" ]; then
 | 
			
		||||
	    echo "WARNING! If you wish to build 64-bit library, then you have to"
 | 
			
		||||
	    echo "         invoke './Configure darwin64-ppc-cc' *manually*."
 | 
			
		||||
	    if [ "$TEST" = "false" -a -t 1 ]; then
 | 
			
		||||
@@ -547,10 +546,14 @@ case "$GUESSOS" in
 | 
			
		||||
	      (trap "stty `stty -g`" 2 0; stty -icanon min 0 time 50; read waste) <&1
 | 
			
		||||
	    fi
 | 
			
		||||
	fi
 | 
			
		||||
	OUT="darwin-ppc-cc" ;;
 | 
			
		||||
	if [ "$ISA64" = "1" -a "$KERNEL_BITS" = "64" ]; then
 | 
			
		||||
	    OUT="darwin64-ppc-cc"
 | 
			
		||||
	else
 | 
			
		||||
	    OUT="darwin-ppc-cc"
 | 
			
		||||
	fi ;;
 | 
			
		||||
  i?86-apple-darwin*)
 | 
			
		||||
	ISA64=`(sysctl -n hw.optional.x86_64) 2>/dev/null`
 | 
			
		||||
	if [ "$ISA64" = "1" ]; then
 | 
			
		||||
	if [ "$ISA64" = "1" -a -z "$KERNEL_BITS" ]; then
 | 
			
		||||
	    echo "WARNING! If you wish to build 64-bit library, then you have to"
 | 
			
		||||
	    echo "         invoke './Configure darwin64-x86_64-cc' *manually*."
 | 
			
		||||
	    if [ "$TEST" = "false" -a -t 1 ]; then
 | 
			
		||||
@@ -558,7 +561,17 @@ case "$GUESSOS" in
 | 
			
		||||
	      (trap "stty `stty -g`" 2 0; stty -icanon min 0 time 50; read waste) <&1
 | 
			
		||||
	    fi
 | 
			
		||||
	fi
 | 
			
		||||
	OUT="darwin-i386-cc" ;;
 | 
			
		||||
	if [ "$ISA64" = "1" -a "$KERNEL_BITS" = "64" ]; then
 | 
			
		||||
	    OUT="darwin64-x86_64-cc"
 | 
			
		||||
	else
 | 
			
		||||
	    OUT="darwin-i386-cc"
 | 
			
		||||
	fi ;;
 | 
			
		||||
  armv6+7-*-iphoneos)
 | 
			
		||||
	options="$options -arch%20armv6 -arch%20armv7"
 | 
			
		||||
	OUT="iphoneos-cross" ;;
 | 
			
		||||
  *-*-iphoneos)
 | 
			
		||||
	options="$options -arch%20${MACHINE}"
 | 
			
		||||
	OUT="iphoneos-cross" ;;
 | 
			
		||||
  alpha-*-linux2)
 | 
			
		||||
        ISA=`awk '/cpu model/{print$4;exit(0);}' /proc/cpuinfo`
 | 
			
		||||
	case ${ISA:-generic} in
 | 
			
		||||
@@ -583,6 +596,11 @@ case "$GUESSOS" in
 | 
			
		||||
	OUT="linux-ppc"
 | 
			
		||||
	;;
 | 
			
		||||
  ppc-*-linux2) OUT="linux-ppc" ;;
 | 
			
		||||
  ppc60x-*-vxworks*) OUT="vxworks-ppc60x" ;;
 | 
			
		||||
  ppcgen-*-vxworks*) OUT="vxworks-ppcgen" ;;
 | 
			
		||||
  pentium-*-vxworks*) OUT="vxworks-pentium" ;;
 | 
			
		||||
  simlinux-*-vxworks*) OUT="vxworks-simlinux" ;;
 | 
			
		||||
  mips-*-vxworks*) OUT="vxworks-mips";;
 | 
			
		||||
  ia64-*-linux?) OUT="linux-ia64" ;;
 | 
			
		||||
  sparc64-*-linux2)
 | 
			
		||||
	echo "WARNING! If you *know* that your GNU C supports 64-bit/V9 ABI"
 | 
			
		||||
@@ -624,12 +642,24 @@ case "$GUESSOS" in
 | 
			
		||||
	options="$options -DB_ENDIAN -mschedule=$CPUSCHEDULE -march=$CPUARCH"
 | 
			
		||||
	OUT="linux-generic32" ;;
 | 
			
		||||
  armv[1-3]*-*-linux2) OUT="linux-generic32" ;;
 | 
			
		||||
  armv[7-9]*-*-linux2) OUT="linux-armv4"; options="$options -march=armv7-a" ;;
 | 
			
		||||
  arm*-*-linux2) OUT="linux-armv4" ;;
 | 
			
		||||
  sh*b-*-linux2) OUT="linux-generic32"; options="$options -DB_ENDIAN" ;;
 | 
			
		||||
  sh*-*-linux2)  OUT="linux-generic32"; options="$options -DL_ENDIAN" ;;
 | 
			
		||||
  m68k*-*-linux2) OUT="linux-generic32"; options="$options -DB_ENDIAN" ;;
 | 
			
		||||
  s390-*-linux2) OUT="linux-generic32"; options="$options -DB_ENDIAN" ;;
 | 
			
		||||
  s390x-*-linux2) OUT="linux-s390x" ;;
 | 
			
		||||
  s390x-*-linux2)
 | 
			
		||||
	# To be uncommented when glibc bug is fixed, see Configure...
 | 
			
		||||
	#if egrep -e '^features.* highgprs' /proc/cpuinfo >/dev/null ; then
 | 
			
		||||
	#  echo "WARNING! If you wish to build \"highgprs\" 32-bit library, then you"
 | 
			
		||||
	#  echo "         have to invoke './Configure linux32-s390x' *manually*."
 | 
			
		||||
	#  if [ "$TEST" = "false" -a -t -1 ]; then
 | 
			
		||||
	#    echo "         You have about 5 seconds to press Ctrl-C to abort."
 | 
			
		||||
	#    (trap "stty `stty -g`" 2 0; stty -icanon min 0 time 50; read waste) <&1
 | 
			
		||||
	#  fi
 | 
			
		||||
	#fi
 | 
			
		||||
	OUT="linux64-s390x"
 | 
			
		||||
	;;
 | 
			
		||||
  x86_64-*-linux?) OUT="linux-x86_64" ;;
 | 
			
		||||
  *86-*-linux2) OUT="linux-elf"
 | 
			
		||||
	if [ "$GCCVER" -gt 28 ]; then
 | 
			
		||||
@@ -648,7 +678,7 @@ case "$GUESSOS" in
 | 
			
		||||
  sun4[uv]*-*-solaris2)
 | 
			
		||||
	OUT="solaris-sparcv9-$CC"
 | 
			
		||||
	ISA64=`(isalist) 2>/dev/null | grep sparcv9`
 | 
			
		||||
	if [ "$ISA64" != "" ]; then
 | 
			
		||||
	if [ "$ISA64" != "" -a "$KERNEL_BITS" = "" ]; then
 | 
			
		||||
	    if [ "$CC" = "cc" -a $CCVER -ge 50 ]; then
 | 
			
		||||
		echo "WARNING! If you wish to build 64-bit library, then you have to"
 | 
			
		||||
		echo "         invoke './Configure solaris64-sparcv9-cc' *manually*."
 | 
			
		||||
@@ -678,13 +708,16 @@ case "$GUESSOS" in
 | 
			
		||||
		fi
 | 
			
		||||
	    fi
 | 
			
		||||
	fi
 | 
			
		||||
	if [ "$ISA64" != "" -a "$KERNEL_BITS" = "64" ]; then
 | 
			
		||||
	    OUT="solaris64-sparcv9-$CC"
 | 
			
		||||
	fi
 | 
			
		||||
	;;
 | 
			
		||||
  sun4m-*-solaris2)	OUT="solaris-sparcv8-$CC" ;;
 | 
			
		||||
  sun4d-*-solaris2)	OUT="solaris-sparcv8-$CC" ;;
 | 
			
		||||
  sun4*-*-solaris2)	OUT="solaris-sparcv7-$CC" ;;
 | 
			
		||||
  *86*-*-solaris2)
 | 
			
		||||
	ISA64=`(isalist) 2>/dev/null | grep amd64`
 | 
			
		||||
	if [ "$ISA64" != "" ]; then
 | 
			
		||||
	if [ "$ISA64" != "" -a ${KERNEL_BITS:-64} -eq 64 ]; then
 | 
			
		||||
	    OUT="solaris64-x86_64-$CC"
 | 
			
		||||
	else
 | 
			
		||||
	    OUT="solaris-x86-$CC"
 | 
			
		||||
@@ -706,7 +739,7 @@ case "$GUESSOS" in
 | 
			
		||||
			    libc=/usr/lib/libc.so
 | 
			
		||||
			else					# OpenBSD
 | 
			
		||||
			    # ld searches for highest libc.so.* and so do we
 | 
			
		||||
			    libc=`(ls /usr/lib/libc.so.* | tail -1) 2>/dev/null`
 | 
			
		||||
			    libc=`(ls /usr/lib/libc.so.* /lib/libc.so.* | tail -1) 2>/dev/null`
 | 
			
		||||
			fi
 | 
			
		||||
			case "`(file -L $libc) 2>/dev/null`" in
 | 
			
		||||
			*ELF*)	OUT="BSD-x86-elf" ;;
 | 
			
		||||
@@ -736,20 +769,17 @@ case "$GUESSOS" in
 | 
			
		||||
	if [ $CC = "gcc" -a $GCC_BITS = "64" ]; then
 | 
			
		||||
	    OUT="hpux64-parisc2-gcc"
 | 
			
		||||
	fi
 | 
			
		||||
	KERNEL_BITS=`(getconf KERNEL_BITS) 2>/dev/null`
 | 
			
		||||
	[ "$KERNEL_BITS" ] || KERNEL_BITS=`(getconf KERNEL_BITS) 2>/dev/null`
 | 
			
		||||
	KERNEL_BITS=${KERNEL_BITS:-32}
 | 
			
		||||
	CPU_VERSION=`(getconf CPU_VERSION) 2>/dev/null`
 | 
			
		||||
	CPU_VERSION=${CPU_VERSION:-0}
 | 
			
		||||
	# See <sys/unistd.h> for further info on CPU_VERSION.
 | 
			
		||||
	if   [ $CPU_VERSION -ge 768 ]; then	# IA-64 CPU
 | 
			
		||||
	     echo "WARNING! 64-bit ABI is the default configured ABI on HP-UXi."
 | 
			
		||||
	     echo "         If you wish to build 32-bit library, the you have to"
 | 
			
		||||
	     echo "         invoke './Configure hpux-ia64-cc' *manually*."
 | 
			
		||||
	     if [ "$TEST" = "false" -a -t 1 ]; then
 | 
			
		||||
		echo "         You have about 5 seconds to press Ctrl-C to abort."
 | 
			
		||||
		(trap "stty `stty -g`" 2 0; stty -icanon min 0 time 50; read waste) <&1
 | 
			
		||||
	     fi
 | 
			
		||||
	     OUT="hpux64-ia64-cc"
 | 
			
		||||
	     if [ $KERNEL_BITS -eq 64 -a "$CC" = "cc" ]; then
 | 
			
		||||
	        OUT="hpux64-ia64-cc"
 | 
			
		||||
             else
 | 
			
		||||
	        OUT="hpux-ia64-cc"
 | 
			
		||||
             fi
 | 
			
		||||
	elif [ $CPU_VERSION -ge 532 ]; then	# PA-RISC 2.x CPU
 | 
			
		||||
	     OUT=${OUT:-"hpux-parisc2-${CC}"}
 | 
			
		||||
	     if [ $KERNEL_BITS -eq 64 -a "$CC" = "cc" ]; then
 | 
			
		||||
@@ -770,7 +800,7 @@ case "$GUESSOS" in
 | 
			
		||||
	options="$options -D_REENTRANT" ;;
 | 
			
		||||
  *-hpux)	OUT="hpux-parisc-$CC" ;;
 | 
			
		||||
  *-aix)
 | 
			
		||||
	KERNEL_BITS=`(getconf KERNEL_BITMODE) 2>/dev/null`
 | 
			
		||||
	[ "$KERNEL_BITS" ] || KERNEL_BITS=`(getconf KERNEL_BITMODE) 2>/dev/null`
 | 
			
		||||
	KERNEL_BITS=${KERNEL_BITS:-32}
 | 
			
		||||
	OBJECT_MODE=${OBJECT_MODE:-32}
 | 
			
		||||
	if [ "$CC" = "gcc" ]; then
 | 
			
		||||
@@ -810,6 +840,8 @@ case "$GUESSOS" in
 | 
			
		||||
  beos-*) OUT="$GUESSOS" ;;
 | 
			
		||||
  x86pc-*-qnx6) OUT="QNX6-i386" ;;
 | 
			
		||||
  *-*-qnx6) OUT="QNX6" ;;
 | 
			
		||||
  x86-*-android|i?86-*-android) OUT="android-x86" ;;
 | 
			
		||||
  armv[7-9]*-*-android) OUT="android-armv7" ;;
 | 
			
		||||
  *) OUT=`echo $GUESSOS | awk -F- '{print $3}'`;;
 | 
			
		||||
esac
 | 
			
		||||
 | 
			
		||||
@@ -825,9 +857,11 @@ esac
 | 
			
		||||
#  options="$options -DATALLA"
 | 
			
		||||
#fi
 | 
			
		||||
 | 
			
		||||
($CC -Wa,--help -c -o /dev/null -x assembler /dev/null 2>&1 | \
 | 
			
		||||
 grep \\--noexecstack) 2>&1 > /dev/null && \
 | 
			
		||||
if expr "$options" : '.*no\-asm' > /dev/null; then :; else
 | 
			
		||||
  sh -c "$CROSS_COMPILE${CC:-gcc} -Wa,--help -c -o /tmp/null.$$.o -x assembler /dev/null && rm /tmp/null.$$.o" 2>&1 | \
 | 
			
		||||
  grep \\--noexecstack >/dev/null && \
 | 
			
		||||
  options="$options -Wa,--noexecstack"
 | 
			
		||||
fi
 | 
			
		||||
 | 
			
		||||
# gcc < 2.8 does not support -march=ultrasparc
 | 
			
		||||
if [ "$OUT" = solaris-sparcv9-gcc -a $GCCVER -lt 28 ]
 | 
			
		||||
 
 | 
			
		||||
@@ -1,4 +1,3 @@
 | 
			
		||||
/* $LP: LPlib/source/LPdir_vms.c,v 1.20 2004/08/26 13:36:05 _cvs_levitte Exp $ */
 | 
			
		||||
/*
 | 
			
		||||
 * Copyright (c) 2004, Richard Levitte <richard@levitte.org>
 | 
			
		||||
 * All rights reserved.
 | 
			
		||||
@@ -88,6 +87,12 @@ const char *LP_find_file(LP_DIR_CTX **ctx, const char *directory)
 | 
			
		||||
      size_t filespeclen = strlen(directory);
 | 
			
		||||
      char *filespec = NULL;
 | 
			
		||||
 | 
			
		||||
      if (filespeclen == 0)
 | 
			
		||||
	{
 | 
			
		||||
	  errno = ENOENT;
 | 
			
		||||
	  return 0;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
      /* MUST be a VMS directory specification!  Let's estimate if it is. */
 | 
			
		||||
      if (directory[filespeclen-1] != ']'
 | 
			
		||||
	  && directory[filespeclen-1] != '>'
 | 
			
		||||
 
 | 
			
		||||
@@ -1,4 +1,3 @@
 | 
			
		||||
/* $LP: LPlib/source/LPdir_win.c,v 1.10 2004/08/26 13:36:05 _cvs_levitte Exp $ */
 | 
			
		||||
/*
 | 
			
		||||
 * Copyright (c) 2004, Richard Levitte <richard@levitte.org>
 | 
			
		||||
 * All rights reserved.
 | 
			
		||||
@@ -37,7 +36,7 @@
 | 
			
		||||
#if defined(LP_SYS_WINCE) && !defined(FindFirstFile)
 | 
			
		||||
# define FindFirstFile FindFirstFileW
 | 
			
		||||
#endif
 | 
			
		||||
#if defined(LP_SYS_WINCE) && !defined(FindFirstFile)
 | 
			
		||||
#if defined(LP_SYS_WINCE) && !defined(FindNextFile)
 | 
			
		||||
# define FindNextFile FindNextFileW
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
@@ -63,6 +62,16 @@ const char *LP_find_file(LP_DIR_CTX **ctx, const char *directory)
 | 
			
		||||
  errno = 0;
 | 
			
		||||
  if (*ctx == NULL)
 | 
			
		||||
    {
 | 
			
		||||
      const char *extdir = directory;
 | 
			
		||||
      char *extdirbuf = NULL;
 | 
			
		||||
      size_t dirlen = strlen (directory);
 | 
			
		||||
 | 
			
		||||
      if (dirlen == 0)
 | 
			
		||||
	{
 | 
			
		||||
	  errno = ENOENT;
 | 
			
		||||
	  return 0;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
      *ctx = (LP_DIR_CTX *)malloc(sizeof(LP_DIR_CTX));
 | 
			
		||||
      if (*ctx == NULL)
 | 
			
		||||
	{
 | 
			
		||||
@@ -71,15 +80,35 @@ const char *LP_find_file(LP_DIR_CTX **ctx, const char *directory)
 | 
			
		||||
	}
 | 
			
		||||
      memset(*ctx, '\0', sizeof(LP_DIR_CTX));
 | 
			
		||||
 | 
			
		||||
      if (directory[dirlen-1] != '*')
 | 
			
		||||
	{
 | 
			
		||||
	  extdirbuf = (char *)malloc(dirlen + 3);
 | 
			
		||||
	  if (extdirbuf == NULL)
 | 
			
		||||
	    {
 | 
			
		||||
	      free(*ctx);
 | 
			
		||||
	      *ctx = NULL;
 | 
			
		||||
	      errno = ENOMEM;
 | 
			
		||||
	      return 0;
 | 
			
		||||
	    }
 | 
			
		||||
	  if (directory[dirlen-1] != '/' && directory[dirlen-1] != '\\')
 | 
			
		||||
	    extdir = strcat(strcpy (extdirbuf,directory),"/*");
 | 
			
		||||
	  else
 | 
			
		||||
	    extdir = strcat(strcpy (extdirbuf,directory),"*");
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
      if (sizeof(TCHAR) != sizeof(char))
 | 
			
		||||
	{
 | 
			
		||||
	  TCHAR *wdir = NULL;
 | 
			
		||||
	  /* len_0 denotes string length *with* trailing 0 */ 
 | 
			
		||||
	  size_t index = 0,len_0 = strlen(directory) + 1;
 | 
			
		||||
	  size_t index = 0,len_0 = strlen(extdir) + 1;
 | 
			
		||||
 | 
			
		||||
	  wdir = (TCHAR *)malloc(len_0 * sizeof(TCHAR));
 | 
			
		||||
	  wdir = (TCHAR *)calloc(len_0, sizeof(TCHAR));
 | 
			
		||||
	  if (wdir == NULL)
 | 
			
		||||
	    {
 | 
			
		||||
	      if (extdirbuf != NULL)
 | 
			
		||||
		{
 | 
			
		||||
		  free (extdirbuf);
 | 
			
		||||
		}
 | 
			
		||||
	      free(*ctx);
 | 
			
		||||
	      *ctx = NULL;
 | 
			
		||||
	      errno = ENOMEM;
 | 
			
		||||
@@ -87,17 +116,23 @@ const char *LP_find_file(LP_DIR_CTX **ctx, const char *directory)
 | 
			
		||||
	    }
 | 
			
		||||
 | 
			
		||||
#ifdef LP_MULTIBYTE_AVAILABLE
 | 
			
		||||
	  if (!MultiByteToWideChar(CP_ACP, 0, directory, len_0, (WCHAR *)wdir, len_0))
 | 
			
		||||
	  if (!MultiByteToWideChar(CP_ACP, 0, extdir, len_0, (WCHAR *)wdir, len_0))
 | 
			
		||||
#endif
 | 
			
		||||
	    for (index = 0; index < len_0; index++)
 | 
			
		||||
	      wdir[index] = (TCHAR)directory[index];
 | 
			
		||||
	      wdir[index] = (TCHAR)extdir[index];
 | 
			
		||||
 | 
			
		||||
	  (*ctx)->handle = FindFirstFile(wdir, &(*ctx)->ctx);
 | 
			
		||||
 | 
			
		||||
	  free(wdir);
 | 
			
		||||
	}
 | 
			
		||||
      else
 | 
			
		||||
	(*ctx)->handle = FindFirstFile((TCHAR *)directory, &(*ctx)->ctx);
 | 
			
		||||
	{
 | 
			
		||||
	  (*ctx)->handle = FindFirstFile((TCHAR *)extdir, &(*ctx)->ctx);
 | 
			
		||||
	}
 | 
			
		||||
      if (extdirbuf != NULL)
 | 
			
		||||
	{
 | 
			
		||||
	  free (extdirbuf);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
      if ((*ctx)->handle == INVALID_HANDLE_VALUE)
 | 
			
		||||
	{
 | 
			
		||||
@@ -114,7 +149,6 @@ const char *LP_find_file(LP_DIR_CTX **ctx, const char *directory)
 | 
			
		||||
	  return 0;
 | 
			
		||||
	}
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
  if (sizeof(TCHAR) != sizeof(char))
 | 
			
		||||
    {
 | 
			
		||||
      TCHAR *wdir = (*ctx)->ctx.cFileName;
 | 
			
		||||
 
 | 
			
		||||
@@ -7,7 +7,7 @@ TOP=		..
 | 
			
		||||
CC=		cc
 | 
			
		||||
INCLUDE=	-I. -I$(TOP) -I../include $(ZLIB_INCLUDE)
 | 
			
		||||
# INCLUDES targets sudbirs!
 | 
			
		||||
INCLUDES=	-I.. -I../.. -I../asn1 -I../evp -I../../include $(ZLIB_INCLUDE)
 | 
			
		||||
INCLUDES=	-I.. -I../.. -I../modes -I../asn1 -I../evp -I../../include $(ZLIB_INCLUDE)
 | 
			
		||||
CFLAG=		-g
 | 
			
		||||
MAKEDEPPROG=	makedepend
 | 
			
		||||
MAKEDEPEND=	$(TOP)/util/domd $(TOP) -MD $(MAKEDEPPROG)
 | 
			
		||||
@@ -31,17 +31,21 @@ CPUID_OBJ=mem_clr.o
 | 
			
		||||
LIBS=
 | 
			
		||||
 | 
			
		||||
GENERAL=Makefile README crypto-lib.com install.com
 | 
			
		||||
TEST=constant_time_test.c
 | 
			
		||||
 | 
			
		||||
LIB= $(TOP)/libcrypto.a
 | 
			
		||||
SHARED_LIB= libcrypto$(SHLIB_EXT)
 | 
			
		||||
LIBSRC=	cryptlib.c mem.c mem_clr.c mem_dbg.c cversion.c ex_data.c cpt_err.c ebcdic.c uid.c o_time.c o_str.c o_dir.c
 | 
			
		||||
LIBOBJ= cryptlib.o mem.o mem_dbg.o cversion.o ex_data.o cpt_err.o ebcdic.o uid.o o_time.o o_str.o o_dir.o $(CPUID_OBJ)
 | 
			
		||||
LIBSRC=	cryptlib.c mem.c mem_clr.c mem_dbg.c cversion.c ex_data.c cpt_err.c \
 | 
			
		||||
	ebcdic.c uid.c o_time.c o_str.c o_dir.c o_fips.c o_init.c fips_ers.c
 | 
			
		||||
LIBOBJ= cryptlib.o mem.o mem_dbg.o cversion.o ex_data.o cpt_err.o ebcdic.o \
 | 
			
		||||
	uid.o o_time.o o_str.o o_dir.o o_fips.o o_init.o fips_ers.o $(CPUID_OBJ)
 | 
			
		||||
 | 
			
		||||
SRC= $(LIBSRC)
 | 
			
		||||
 | 
			
		||||
EXHEADER= crypto.h opensslv.h opensslconf.h ebcdic.h symhacks.h \
 | 
			
		||||
	ossl_typ.h
 | 
			
		||||
HEADER=	cryptlib.h buildinf.h md32_common.h o_time.h o_str.h o_dir.h $(EXHEADER)
 | 
			
		||||
HEADER=	cryptlib.h buildinf.h md32_common.h o_time.h o_str.h o_dir.h \
 | 
			
		||||
	constant_time_locl.h $(EXHEADER)
 | 
			
		||||
 | 
			
		||||
ALL=    $(GENERAL) $(SRC) $(HEADER)
 | 
			
		||||
 | 
			
		||||
@@ -51,12 +55,7 @@ top:
 | 
			
		||||
all: shared
 | 
			
		||||
 | 
			
		||||
buildinf.h: ../Makefile
 | 
			
		||||
	( echo "#ifndef MK1MF_BUILD"; \
 | 
			
		||||
	echo '  /* auto-generated by crypto/Makefile for crypto/cversion.c */'; \
 | 
			
		||||
	echo '  #define CFLAGS "$(CC) $(CFLAG)"'; \
 | 
			
		||||
	echo '  #define PLATFORM "$(PLATFORM)"'; \
 | 
			
		||||
	echo "  #define DATE \"`LC_ALL=C LC_TIME=C date`\""; \
 | 
			
		||||
	echo '#endif' ) >buildinf.h
 | 
			
		||||
	$(PERL) $(TOP)/util/mkbuildinf.pl "$(CC) $(CFLAGS)" "$(PLATFORM)" >buildinf.h
 | 
			
		||||
 | 
			
		||||
x86cpuid.s:	x86cpuid.pl perlasm/x86asm.pl
 | 
			
		||||
	$(PERL) x86cpuid.pl $(PERLASM_SCHEME) $(CFLAGS) $(PROCESSOR) > $@
 | 
			
		||||
@@ -67,16 +66,17 @@ applink.o:	$(TOP)/ms/applink.c
 | 
			
		||||
uplink.o:	$(TOP)/ms/uplink.c applink.o
 | 
			
		||||
	$(CC) $(CFLAGS) -c -o $@ $(TOP)/ms/uplink.c
 | 
			
		||||
 | 
			
		||||
uplink-cof.s:	$(TOP)/ms/uplink.pl
 | 
			
		||||
	$(PERL) $(TOP)/ms/uplink.pl coff > $@
 | 
			
		||||
uplink-x86.s:	$(TOP)/ms/uplink-x86.pl
 | 
			
		||||
	$(PERL) $(TOP)/ms/uplink-x86.pl $(PERLASM_SCHEME) > $@
 | 
			
		||||
 | 
			
		||||
x86_64cpuid.s: x86_64cpuid.pl
 | 
			
		||||
	$(PERL) x86_64cpuid.pl $(PERLASM_SCHEME) > $@
 | 
			
		||||
ia64cpuid.s: ia64cpuid.S
 | 
			
		||||
	$(CC) $(CFLAGS) -E ia64cpuid.S > $@
 | 
			
		||||
x86_64cpuid.s: x86_64cpuid.pl;	$(PERL) x86_64cpuid.pl $(PERLASM_SCHEME) > $@
 | 
			
		||||
ia64cpuid.s: ia64cpuid.S;	$(CC) $(CFLAGS) -E ia64cpuid.S > $@
 | 
			
		||||
ppccpuid.s:	ppccpuid.pl;	$(PERL) ppccpuid.pl $(PERLASM_SCHEME) $@
 | 
			
		||||
pariscid.s:	pariscid.pl;	$(PERL) pariscid.pl $(PERLASM_SCHEME) $@
 | 
			
		||||
alphacpuid.s:	alphacpuid.pl
 | 
			
		||||
	$(PERL) $< | $(CC) -E - | tee $@ > /dev/null
 | 
			
		||||
	(preproc=/tmp/$$$$.$@; trap "rm $$preproc" INT; \
 | 
			
		||||
	$(PERL) alphacpuid.pl > $$preproc && \
 | 
			
		||||
	$(CC) -E $$preproc > $@ && rm $$preproc)
 | 
			
		||||
 | 
			
		||||
testapps:
 | 
			
		||||
	[ -z "$(THIS)" ] || (	if echo $(SDIRS) | fgrep ' des '; \
 | 
			
		||||
@@ -102,6 +102,7 @@ lib:	$(LIB)
 | 
			
		||||
	@touch lib
 | 
			
		||||
$(LIB):	$(LIBOBJ)
 | 
			
		||||
	$(AR) $(LIB) $(LIBOBJ)
 | 
			
		||||
	[ -z "$(FIPSLIBDIR)" ] || $(AR) $(LIB) $(FIPSLIBDIR)fipscanister.o
 | 
			
		||||
	$(RANLIB) $(LIB) || echo Never mind.
 | 
			
		||||
 | 
			
		||||
shared: buildinf.h lib subdirs
 | 
			
		||||
@@ -171,6 +172,7 @@ ex_data.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
 | 
			
		||||
ex_data.o: ../include/openssl/ossl_typ.h ../include/openssl/safestack.h
 | 
			
		||||
ex_data.o: ../include/openssl/stack.h ../include/openssl/symhacks.h cryptlib.h
 | 
			
		||||
ex_data.o: ex_data.c
 | 
			
		||||
fips_ers.o: ../include/openssl/opensslconf.h fips_ers.c
 | 
			
		||||
mem.o: ../e_os.h ../include/openssl/bio.h ../include/openssl/buffer.h
 | 
			
		||||
mem.o: ../include/openssl/crypto.h ../include/openssl/e_os2.h
 | 
			
		||||
mem.o: ../include/openssl/err.h ../include/openssl/lhash.h
 | 
			
		||||
@@ -191,6 +193,19 @@ mem_dbg.o: ../include/openssl/stack.h ../include/openssl/symhacks.h cryptlib.h
 | 
			
		||||
mem_dbg.o: mem_dbg.c
 | 
			
		||||
o_dir.o: ../e_os.h ../include/openssl/e_os2.h ../include/openssl/opensslconf.h
 | 
			
		||||
o_dir.o: LPdir_unix.c o_dir.c o_dir.h
 | 
			
		||||
o_fips.o: ../e_os.h ../include/openssl/bio.h ../include/openssl/buffer.h
 | 
			
		||||
o_fips.o: ../include/openssl/crypto.h ../include/openssl/e_os2.h
 | 
			
		||||
o_fips.o: ../include/openssl/err.h ../include/openssl/lhash.h
 | 
			
		||||
o_fips.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
 | 
			
		||||
o_fips.o: ../include/openssl/ossl_typ.h ../include/openssl/safestack.h
 | 
			
		||||
o_fips.o: ../include/openssl/stack.h ../include/openssl/symhacks.h cryptlib.h
 | 
			
		||||
o_fips.o: o_fips.c
 | 
			
		||||
o_init.o: ../e_os.h ../include/openssl/bio.h ../include/openssl/crypto.h
 | 
			
		||||
o_init.o: ../include/openssl/e_os2.h ../include/openssl/err.h
 | 
			
		||||
o_init.o: ../include/openssl/lhash.h ../include/openssl/opensslconf.h
 | 
			
		||||
o_init.o: ../include/openssl/opensslv.h ../include/openssl/ossl_typ.h
 | 
			
		||||
o_init.o: ../include/openssl/safestack.h ../include/openssl/stack.h
 | 
			
		||||
o_init.o: ../include/openssl/symhacks.h o_init.c
 | 
			
		||||
o_str.o: ../e_os.h ../include/openssl/e_os2.h ../include/openssl/opensslconf.h
 | 
			
		||||
o_str.o: o_str.c o_str.h
 | 
			
		||||
o_time.o: ../include/openssl/e_os2.h ../include/openssl/opensslconf.h o_time.c
 | 
			
		||||
 
 | 
			
		||||
@@ -50,9 +50,21 @@ aes-ia64.s: asm/aes-ia64.S
 | 
			
		||||
 | 
			
		||||
aes-586.s:	asm/aes-586.pl ../perlasm/x86asm.pl
 | 
			
		||||
	$(PERL) asm/aes-586.pl $(PERLASM_SCHEME) $(CFLAGS) $(PROCESSOR) > $@
 | 
			
		||||
vpaes-x86.s:	asm/vpaes-x86.pl ../perlasm/x86asm.pl
 | 
			
		||||
	$(PERL) asm/vpaes-x86.pl $(PERLASM_SCHEME) $(CFLAGS) $(PROCESSOR) > $@
 | 
			
		||||
aesni-x86.s:	asm/aesni-x86.pl ../perlasm/x86asm.pl
 | 
			
		||||
	$(PERL) asm/aesni-x86.pl $(PERLASM_SCHEME) $(CFLAGS) $(PROCESSOR) > $@
 | 
			
		||||
 | 
			
		||||
aes-x86_64.s: asm/aes-x86_64.pl
 | 
			
		||||
	$(PERL) asm/aes-x86_64.pl $(PERLASM_SCHEME) > $@
 | 
			
		||||
vpaes-x86_64.s:	asm/vpaes-x86_64.pl
 | 
			
		||||
	$(PERL) asm/vpaes-x86_64.pl $(PERLASM_SCHEME) > $@
 | 
			
		||||
bsaes-x86_64.s:	asm/bsaes-x86_64.pl
 | 
			
		||||
	$(PERL) asm/bsaes-x86_64.pl $(PERLASM_SCHEME) > $@
 | 
			
		||||
aesni-x86_64.s: asm/aesni-x86_64.pl
 | 
			
		||||
	$(PERL) asm/aesni-x86_64.pl $(PERLASM_SCHEME) > $@
 | 
			
		||||
aesni-sha1-x86_64.s:	asm/aesni-sha1-x86_64.pl
 | 
			
		||||
	$(PERL) asm/aesni-sha1-x86_64.pl $(PERLASM_SCHEME) > $@
 | 
			
		||||
 | 
			
		||||
aes-sparcv9.s: asm/aes-sparcv9.pl
 | 
			
		||||
	$(PERL) asm/aes-sparcv9.pl $(CFLAGS) > $@
 | 
			
		||||
@@ -60,8 +72,15 @@ aes-sparcv9.s: asm/aes-sparcv9.pl
 | 
			
		||||
aes-ppc.s:	asm/aes-ppc.pl
 | 
			
		||||
	$(PERL) asm/aes-ppc.pl $(PERLASM_SCHEME) $@
 | 
			
		||||
 | 
			
		||||
aes-parisc.s:	asm/aes-parisc.pl
 | 
			
		||||
	$(PERL) asm/aes-parisc.pl $(PERLASM_SCHEME) $@
 | 
			
		||||
 | 
			
		||||
aes-mips.S:	asm/aes-mips.pl
 | 
			
		||||
	$(PERL) asm/aes-mips.pl $(PERLASM_SCHEME) $@
 | 
			
		||||
 | 
			
		||||
# GNU make "catch all"
 | 
			
		||||
aes-%.s:	asm/aes-%.pl;	$(PERL) $< $(CFLAGS) > $@
 | 
			
		||||
aes-%.S:	asm/aes-%.pl;	$(PERL) $< $(PERLASM_SCHEME) > $@
 | 
			
		||||
aes-armv4.o:	aes-armv4.S
 | 
			
		||||
 | 
			
		||||
files:
 | 
			
		||||
	$(PERL) $(TOP)/util/files.pl Makefile >> $(TOP)/MINFO
 | 
			
		||||
@@ -117,9 +136,11 @@ aes_ige.o: ../../include/openssl/lhash.h ../../include/openssl/opensslconf.h
 | 
			
		||||
aes_ige.o: ../../include/openssl/opensslv.h ../../include/openssl/ossl_typ.h
 | 
			
		||||
aes_ige.o: ../../include/openssl/safestack.h ../../include/openssl/stack.h
 | 
			
		||||
aes_ige.o: ../../include/openssl/symhacks.h ../cryptlib.h aes_ige.c aes_locl.h
 | 
			
		||||
aes_misc.o: ../../include/openssl/aes.h ../../include/openssl/e_os2.h
 | 
			
		||||
aes_misc.o: ../../include/openssl/opensslconf.h
 | 
			
		||||
aes_misc.o: ../../include/openssl/opensslv.h aes_locl.h aes_misc.c
 | 
			
		||||
aes_misc.o: ../../include/openssl/aes.h ../../include/openssl/crypto.h
 | 
			
		||||
aes_misc.o: ../../include/openssl/e_os2.h ../../include/openssl/opensslconf.h
 | 
			
		||||
aes_misc.o: ../../include/openssl/opensslv.h ../../include/openssl/ossl_typ.h
 | 
			
		||||
aes_misc.o: ../../include/openssl/safestack.h ../../include/openssl/stack.h
 | 
			
		||||
aes_misc.o: ../../include/openssl/symhacks.h aes_locl.h aes_misc.c
 | 
			
		||||
aes_ofb.o: ../../include/openssl/aes.h ../../include/openssl/modes.h
 | 
			
		||||
aes_ofb.o: ../../include/openssl/opensslconf.h aes_ofb.c
 | 
			
		||||
aes_wrap.o: ../../e_os.h ../../include/openssl/aes.h
 | 
			
		||||
 
 | 
			
		||||
@@ -90,6 +90,11 @@ int AES_set_encrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
int AES_set_decrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
	AES_KEY *key);
 | 
			
		||||
 | 
			
		||||
int private_AES_set_encrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
	AES_KEY *key);
 | 
			
		||||
int private_AES_set_decrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
	AES_KEY *key);
 | 
			
		||||
 | 
			
		||||
void AES_encrypt(const unsigned char *in, unsigned char *out,
 | 
			
		||||
	const AES_KEY *key);
 | 
			
		||||
void AES_decrypt(const unsigned char *in, unsigned char *out,
 | 
			
		||||
 
 | 
			
		||||
@@ -40,7 +40,7 @@
 | 
			
		||||
#include "aes_locl.h"
 | 
			
		||||
 | 
			
		||||
#ifndef AES_ASM
 | 
			
		||||
/*
 | 
			
		||||
/*-
 | 
			
		||||
Te0[x] = S [x].[02, 01, 01, 03];
 | 
			
		||||
Te1[x] = S [x].[03, 02, 01, 01];
 | 
			
		||||
Te2[x] = S [x].[01, 03, 02, 01];
 | 
			
		||||
@@ -617,161 +617,163 @@ static const u8 Td4[256] = {
 | 
			
		||||
    0xe1U, 0x69U, 0x14U, 0x63U, 0x55U, 0x21U, 0x0cU, 0x7dU,
 | 
			
		||||
};
 | 
			
		||||
static const u32 rcon[] = {
 | 
			
		||||
	0x01000000, 0x02000000, 0x04000000, 0x08000000,
 | 
			
		||||
	0x10000000, 0x20000000, 0x40000000, 0x80000000,
 | 
			
		||||
	0x1B000000, 0x36000000, /* for 128-bit blocks, Rijndael never uses more than 10 rcon values */
 | 
			
		||||
    0x01000000, 0x02000000, 0x04000000, 0x08000000,
 | 
			
		||||
    0x10000000, 0x20000000, 0x40000000, 0x80000000,
 | 
			
		||||
    0x1B000000, 0x36000000, /* for 128-bit blocks, Rijndael never uses more than 10 rcon values */
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
/**
 | 
			
		||||
 * Expand the cipher key into the encryption key schedule.
 | 
			
		||||
 */
 | 
			
		||||
int AES_set_encrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
			AES_KEY *key) {
 | 
			
		||||
int private_AES_set_encrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
                                AES_KEY *key)
 | 
			
		||||
{
 | 
			
		||||
 | 
			
		||||
	u32 *rk;
 | 
			
		||||
   	int i = 0;
 | 
			
		||||
	u32 temp;
 | 
			
		||||
    u32 *rk;
 | 
			
		||||
    int i = 0;
 | 
			
		||||
    u32 temp;
 | 
			
		||||
 | 
			
		||||
	if (!userKey || !key)
 | 
			
		||||
		return -1;
 | 
			
		||||
	if (bits != 128 && bits != 192 && bits != 256)
 | 
			
		||||
		return -2;
 | 
			
		||||
    if (!userKey || !key)
 | 
			
		||||
        return -1;
 | 
			
		||||
    if (bits != 128 && bits != 192 && bits != 256)
 | 
			
		||||
        return -2;
 | 
			
		||||
 | 
			
		||||
	rk = key->rd_key;
 | 
			
		||||
    rk = key->rd_key;
 | 
			
		||||
 | 
			
		||||
	if (bits==128)
 | 
			
		||||
		key->rounds = 10;
 | 
			
		||||
	else if (bits==192)
 | 
			
		||||
		key->rounds = 12;
 | 
			
		||||
	else
 | 
			
		||||
		key->rounds = 14;
 | 
			
		||||
    if (bits==128)
 | 
			
		||||
        key->rounds = 10;
 | 
			
		||||
    else if (bits==192)
 | 
			
		||||
        key->rounds = 12;
 | 
			
		||||
    else
 | 
			
		||||
        key->rounds = 14;
 | 
			
		||||
 | 
			
		||||
	rk[0] = GETU32(userKey     );
 | 
			
		||||
	rk[1] = GETU32(userKey +  4);
 | 
			
		||||
	rk[2] = GETU32(userKey +  8);
 | 
			
		||||
	rk[3] = GETU32(userKey + 12);
 | 
			
		||||
	if (bits == 128) {
 | 
			
		||||
		while (1) {
 | 
			
		||||
			temp  = rk[3];
 | 
			
		||||
			rk[4] = rk[0] ^
 | 
			
		||||
				(Te2[(temp >> 16) & 0xff] & 0xff000000) ^
 | 
			
		||||
				(Te3[(temp >>  8) & 0xff] & 0x00ff0000) ^
 | 
			
		||||
				(Te0[(temp      ) & 0xff] & 0x0000ff00) ^
 | 
			
		||||
				(Te1[(temp >> 24)       ] & 0x000000ff) ^
 | 
			
		||||
				rcon[i];
 | 
			
		||||
			rk[5] = rk[1] ^ rk[4];
 | 
			
		||||
			rk[6] = rk[2] ^ rk[5];
 | 
			
		||||
			rk[7] = rk[3] ^ rk[6];
 | 
			
		||||
			if (++i == 10) {
 | 
			
		||||
				return 0;
 | 
			
		||||
			}
 | 
			
		||||
			rk += 4;
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
	rk[4] = GETU32(userKey + 16);
 | 
			
		||||
	rk[5] = GETU32(userKey + 20);
 | 
			
		||||
	if (bits == 192) {
 | 
			
		||||
		while (1) {
 | 
			
		||||
			temp = rk[ 5];
 | 
			
		||||
			rk[ 6] = rk[ 0] ^
 | 
			
		||||
				(Te2[(temp >> 16) & 0xff] & 0xff000000) ^
 | 
			
		||||
				(Te3[(temp >>  8) & 0xff] & 0x00ff0000) ^
 | 
			
		||||
				(Te0[(temp      ) & 0xff] & 0x0000ff00) ^
 | 
			
		||||
				(Te1[(temp >> 24)       ] & 0x000000ff) ^
 | 
			
		||||
				rcon[i];
 | 
			
		||||
			rk[ 7] = rk[ 1] ^ rk[ 6];
 | 
			
		||||
			rk[ 8] = rk[ 2] ^ rk[ 7];
 | 
			
		||||
			rk[ 9] = rk[ 3] ^ rk[ 8];
 | 
			
		||||
			if (++i == 8) {
 | 
			
		||||
				return 0;
 | 
			
		||||
			}
 | 
			
		||||
			rk[10] = rk[ 4] ^ rk[ 9];
 | 
			
		||||
			rk[11] = rk[ 5] ^ rk[10];
 | 
			
		||||
			rk += 6;
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
	rk[6] = GETU32(userKey + 24);
 | 
			
		||||
	rk[7] = GETU32(userKey + 28);
 | 
			
		||||
	if (bits == 256) {
 | 
			
		||||
		while (1) {
 | 
			
		||||
			temp = rk[ 7];
 | 
			
		||||
			rk[ 8] = rk[ 0] ^
 | 
			
		||||
				(Te2[(temp >> 16) & 0xff] & 0xff000000) ^
 | 
			
		||||
				(Te3[(temp >>  8) & 0xff] & 0x00ff0000) ^
 | 
			
		||||
				(Te0[(temp      ) & 0xff] & 0x0000ff00) ^
 | 
			
		||||
				(Te1[(temp >> 24)       ] & 0x000000ff) ^
 | 
			
		||||
				rcon[i];
 | 
			
		||||
			rk[ 9] = rk[ 1] ^ rk[ 8];
 | 
			
		||||
			rk[10] = rk[ 2] ^ rk[ 9];
 | 
			
		||||
			rk[11] = rk[ 3] ^ rk[10];
 | 
			
		||||
			if (++i == 7) {
 | 
			
		||||
				return 0;
 | 
			
		||||
			}
 | 
			
		||||
			temp = rk[11];
 | 
			
		||||
			rk[12] = rk[ 4] ^
 | 
			
		||||
				(Te2[(temp >> 24)       ] & 0xff000000) ^
 | 
			
		||||
				(Te3[(temp >> 16) & 0xff] & 0x00ff0000) ^
 | 
			
		||||
				(Te0[(temp >>  8) & 0xff] & 0x0000ff00) ^
 | 
			
		||||
				(Te1[(temp      ) & 0xff] & 0x000000ff);
 | 
			
		||||
			rk[13] = rk[ 5] ^ rk[12];
 | 
			
		||||
			rk[14] = rk[ 6] ^ rk[13];
 | 
			
		||||
			rk[15] = rk[ 7] ^ rk[14];
 | 
			
		||||
    rk[0] = GETU32(userKey     );
 | 
			
		||||
    rk[1] = GETU32(userKey +  4);
 | 
			
		||||
    rk[2] = GETU32(userKey +  8);
 | 
			
		||||
    rk[3] = GETU32(userKey + 12);
 | 
			
		||||
    if (bits == 128) {
 | 
			
		||||
        while (1) {
 | 
			
		||||
            temp  = rk[3];
 | 
			
		||||
            rk[4] = rk[0] ^
 | 
			
		||||
                (Te2[(temp >> 16) & 0xff] & 0xff000000) ^
 | 
			
		||||
                (Te3[(temp >>  8) & 0xff] & 0x00ff0000) ^
 | 
			
		||||
                (Te0[(temp      ) & 0xff] & 0x0000ff00) ^
 | 
			
		||||
                (Te1[(temp >> 24)       ] & 0x000000ff) ^
 | 
			
		||||
                rcon[i];
 | 
			
		||||
            rk[5] = rk[1] ^ rk[4];
 | 
			
		||||
            rk[6] = rk[2] ^ rk[5];
 | 
			
		||||
            rk[7] = rk[3] ^ rk[6];
 | 
			
		||||
            if (++i == 10) {
 | 
			
		||||
                return 0;
 | 
			
		||||
            }
 | 
			
		||||
            rk += 4;
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
    rk[4] = GETU32(userKey + 16);
 | 
			
		||||
    rk[5] = GETU32(userKey + 20);
 | 
			
		||||
    if (bits == 192) {
 | 
			
		||||
        while (1) {
 | 
			
		||||
            temp = rk[ 5];
 | 
			
		||||
            rk[ 6] = rk[ 0] ^
 | 
			
		||||
                (Te2[(temp >> 16) & 0xff] & 0xff000000) ^
 | 
			
		||||
                (Te3[(temp >>  8) & 0xff] & 0x00ff0000) ^
 | 
			
		||||
                (Te0[(temp      ) & 0xff] & 0x0000ff00) ^
 | 
			
		||||
                (Te1[(temp >> 24)       ] & 0x000000ff) ^
 | 
			
		||||
                rcon[i];
 | 
			
		||||
            rk[ 7] = rk[ 1] ^ rk[ 6];
 | 
			
		||||
            rk[ 8] = rk[ 2] ^ rk[ 7];
 | 
			
		||||
            rk[ 9] = rk[ 3] ^ rk[ 8];
 | 
			
		||||
            if (++i == 8) {
 | 
			
		||||
                return 0;
 | 
			
		||||
            }
 | 
			
		||||
            rk[10] = rk[ 4] ^ rk[ 9];
 | 
			
		||||
            rk[11] = rk[ 5] ^ rk[10];
 | 
			
		||||
            rk += 6;
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
    rk[6] = GETU32(userKey + 24);
 | 
			
		||||
    rk[7] = GETU32(userKey + 28);
 | 
			
		||||
    if (bits == 256) {
 | 
			
		||||
        while (1) {
 | 
			
		||||
            temp = rk[ 7];
 | 
			
		||||
            rk[ 8] = rk[ 0] ^
 | 
			
		||||
                (Te2[(temp >> 16) & 0xff] & 0xff000000) ^
 | 
			
		||||
                (Te3[(temp >>  8) & 0xff] & 0x00ff0000) ^
 | 
			
		||||
                (Te0[(temp      ) & 0xff] & 0x0000ff00) ^
 | 
			
		||||
                (Te1[(temp >> 24)       ] & 0x000000ff) ^
 | 
			
		||||
                rcon[i];
 | 
			
		||||
            rk[ 9] = rk[ 1] ^ rk[ 8];
 | 
			
		||||
            rk[10] = rk[ 2] ^ rk[ 9];
 | 
			
		||||
            rk[11] = rk[ 3] ^ rk[10];
 | 
			
		||||
            if (++i == 7) {
 | 
			
		||||
                return 0;
 | 
			
		||||
            }
 | 
			
		||||
            temp = rk[11];
 | 
			
		||||
            rk[12] = rk[ 4] ^
 | 
			
		||||
                (Te2[(temp >> 24)       ] & 0xff000000) ^
 | 
			
		||||
                (Te3[(temp >> 16) & 0xff] & 0x00ff0000) ^
 | 
			
		||||
                (Te0[(temp >>  8) & 0xff] & 0x0000ff00) ^
 | 
			
		||||
                (Te1[(temp      ) & 0xff] & 0x000000ff);
 | 
			
		||||
            rk[13] = rk[ 5] ^ rk[12];
 | 
			
		||||
            rk[14] = rk[ 6] ^ rk[13];
 | 
			
		||||
            rk[15] = rk[ 7] ^ rk[14];
 | 
			
		||||
 | 
			
		||||
			rk += 8;
 | 
			
		||||
        	}
 | 
			
		||||
	}
 | 
			
		||||
	return 0;
 | 
			
		||||
            rk += 8;
 | 
			
		||||
            }
 | 
			
		||||
    }
 | 
			
		||||
    return 0;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
/**
 | 
			
		||||
 * Expand the cipher key into the decryption key schedule.
 | 
			
		||||
 */
 | 
			
		||||
int AES_set_decrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
			 AES_KEY *key) {
 | 
			
		||||
int private_AES_set_decrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
                                AES_KEY *key)
 | 
			
		||||
{
 | 
			
		||||
 | 
			
		||||
        u32 *rk;
 | 
			
		||||
	int i, j, status;
 | 
			
		||||
	u32 temp;
 | 
			
		||||
    u32 *rk;
 | 
			
		||||
    int i, j, status;
 | 
			
		||||
    u32 temp;
 | 
			
		||||
 | 
			
		||||
	/* first, start with an encryption schedule */
 | 
			
		||||
	status = AES_set_encrypt_key(userKey, bits, key);
 | 
			
		||||
	if (status < 0)
 | 
			
		||||
		return status;
 | 
			
		||||
    /* first, start with an encryption schedule */
 | 
			
		||||
    status = private_AES_set_encrypt_key(userKey, bits, key);
 | 
			
		||||
    if (status < 0)
 | 
			
		||||
        return status;
 | 
			
		||||
 | 
			
		||||
	rk = key->rd_key;
 | 
			
		||||
    rk = key->rd_key;
 | 
			
		||||
 | 
			
		||||
	/* invert the order of the round keys: */
 | 
			
		||||
	for (i = 0, j = 4*(key->rounds); i < j; i += 4, j -= 4) {
 | 
			
		||||
		temp = rk[i    ]; rk[i    ] = rk[j    ]; rk[j    ] = temp;
 | 
			
		||||
		temp = rk[i + 1]; rk[i + 1] = rk[j + 1]; rk[j + 1] = temp;
 | 
			
		||||
		temp = rk[i + 2]; rk[i + 2] = rk[j + 2]; rk[j + 2] = temp;
 | 
			
		||||
		temp = rk[i + 3]; rk[i + 3] = rk[j + 3]; rk[j + 3] = temp;
 | 
			
		||||
	}
 | 
			
		||||
	/* apply the inverse MixColumn transform to all round keys but the first and the last: */
 | 
			
		||||
	for (i = 1; i < (key->rounds); i++) {
 | 
			
		||||
		rk += 4;
 | 
			
		||||
		rk[0] =
 | 
			
		||||
			Td0[Te1[(rk[0] >> 24)       ] & 0xff] ^
 | 
			
		||||
			Td1[Te1[(rk[0] >> 16) & 0xff] & 0xff] ^
 | 
			
		||||
			Td2[Te1[(rk[0] >>  8) & 0xff] & 0xff] ^
 | 
			
		||||
			Td3[Te1[(rk[0]      ) & 0xff] & 0xff];
 | 
			
		||||
		rk[1] =
 | 
			
		||||
			Td0[Te1[(rk[1] >> 24)       ] & 0xff] ^
 | 
			
		||||
			Td1[Te1[(rk[1] >> 16) & 0xff] & 0xff] ^
 | 
			
		||||
			Td2[Te1[(rk[1] >>  8) & 0xff] & 0xff] ^
 | 
			
		||||
			Td3[Te1[(rk[1]      ) & 0xff] & 0xff];
 | 
			
		||||
		rk[2] =
 | 
			
		||||
			Td0[Te1[(rk[2] >> 24)       ] & 0xff] ^
 | 
			
		||||
			Td1[Te1[(rk[2] >> 16) & 0xff] & 0xff] ^
 | 
			
		||||
			Td2[Te1[(rk[2] >>  8) & 0xff] & 0xff] ^
 | 
			
		||||
			Td3[Te1[(rk[2]      ) & 0xff] & 0xff];
 | 
			
		||||
		rk[3] =
 | 
			
		||||
			Td0[Te1[(rk[3] >> 24)       ] & 0xff] ^
 | 
			
		||||
			Td1[Te1[(rk[3] >> 16) & 0xff] & 0xff] ^
 | 
			
		||||
			Td2[Te1[(rk[3] >>  8) & 0xff] & 0xff] ^
 | 
			
		||||
			Td3[Te1[(rk[3]      ) & 0xff] & 0xff];
 | 
			
		||||
	}
 | 
			
		||||
	return 0;
 | 
			
		||||
    /* invert the order of the round keys: */
 | 
			
		||||
    for (i = 0, j = 4*(key->rounds); i < j; i += 4, j -= 4) {
 | 
			
		||||
        temp = rk[i    ]; rk[i    ] = rk[j    ]; rk[j    ] = temp;
 | 
			
		||||
        temp = rk[i + 1]; rk[i + 1] = rk[j + 1]; rk[j + 1] = temp;
 | 
			
		||||
        temp = rk[i + 2]; rk[i + 2] = rk[j + 2]; rk[j + 2] = temp;
 | 
			
		||||
        temp = rk[i + 3]; rk[i + 3] = rk[j + 3]; rk[j + 3] = temp;
 | 
			
		||||
    }
 | 
			
		||||
    /* apply the inverse MixColumn transform to all round keys but the first and the last: */
 | 
			
		||||
    for (i = 1; i < (key->rounds); i++) {
 | 
			
		||||
        rk += 4;
 | 
			
		||||
        rk[0] =
 | 
			
		||||
            Td0[Te1[(rk[0] >> 24)       ] & 0xff] ^
 | 
			
		||||
            Td1[Te1[(rk[0] >> 16) & 0xff] & 0xff] ^
 | 
			
		||||
            Td2[Te1[(rk[0] >>  8) & 0xff] & 0xff] ^
 | 
			
		||||
            Td3[Te1[(rk[0]      ) & 0xff] & 0xff];
 | 
			
		||||
        rk[1] =
 | 
			
		||||
            Td0[Te1[(rk[1] >> 24)       ] & 0xff] ^
 | 
			
		||||
            Td1[Te1[(rk[1] >> 16) & 0xff] & 0xff] ^
 | 
			
		||||
            Td2[Te1[(rk[1] >>  8) & 0xff] & 0xff] ^
 | 
			
		||||
            Td3[Te1[(rk[1]      ) & 0xff] & 0xff];
 | 
			
		||||
        rk[2] =
 | 
			
		||||
            Td0[Te1[(rk[2] >> 24)       ] & 0xff] ^
 | 
			
		||||
            Td1[Te1[(rk[2] >> 16) & 0xff] & 0xff] ^
 | 
			
		||||
            Td2[Te1[(rk[2] >>  8) & 0xff] & 0xff] ^
 | 
			
		||||
            Td3[Te1[(rk[2]      ) & 0xff] & 0xff];
 | 
			
		||||
        rk[3] =
 | 
			
		||||
            Td0[Te1[(rk[3] >> 24)       ] & 0xff] ^
 | 
			
		||||
            Td1[Te1[(rk[3] >> 16) & 0xff] & 0xff] ^
 | 
			
		||||
            Td2[Te1[(rk[3] >>  8) & 0xff] & 0xff] ^
 | 
			
		||||
            Td3[Te1[(rk[3]      ) & 0xff] & 0xff];
 | 
			
		||||
    }
 | 
			
		||||
    return 0;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
/*
 | 
			
		||||
@@ -779,71 +781,71 @@ int AES_set_decrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
 * in and out can overlap
 | 
			
		||||
 */
 | 
			
		||||
void AES_encrypt(const unsigned char *in, unsigned char *out,
 | 
			
		||||
		 const AES_KEY *key) {
 | 
			
		||||
                 const AES_KEY *key) {
 | 
			
		||||
 | 
			
		||||
	const u32 *rk;
 | 
			
		||||
	u32 s0, s1, s2, s3, t0, t1, t2, t3;
 | 
			
		||||
    const u32 *rk;
 | 
			
		||||
    u32 s0, s1, s2, s3, t0, t1, t2, t3;
 | 
			
		||||
#ifndef FULL_UNROLL
 | 
			
		||||
	int r;
 | 
			
		||||
    int r;
 | 
			
		||||
#endif /* ?FULL_UNROLL */
 | 
			
		||||
 | 
			
		||||
	assert(in && out && key);
 | 
			
		||||
	rk = key->rd_key;
 | 
			
		||||
    assert(in && out && key);
 | 
			
		||||
    rk = key->rd_key;
 | 
			
		||||
 | 
			
		||||
	/*
 | 
			
		||||
	 * map byte array block to cipher state
 | 
			
		||||
	 * and add initial round key:
 | 
			
		||||
	 */
 | 
			
		||||
	s0 = GETU32(in     ) ^ rk[0];
 | 
			
		||||
	s1 = GETU32(in +  4) ^ rk[1];
 | 
			
		||||
	s2 = GETU32(in +  8) ^ rk[2];
 | 
			
		||||
	s3 = GETU32(in + 12) ^ rk[3];
 | 
			
		||||
    /*
 | 
			
		||||
     * map byte array block to cipher state
 | 
			
		||||
     * and add initial round key:
 | 
			
		||||
     */
 | 
			
		||||
    s0 = GETU32(in     ) ^ rk[0];
 | 
			
		||||
    s1 = GETU32(in +  4) ^ rk[1];
 | 
			
		||||
    s2 = GETU32(in +  8) ^ rk[2];
 | 
			
		||||
    s3 = GETU32(in + 12) ^ rk[3];
 | 
			
		||||
#ifdef FULL_UNROLL
 | 
			
		||||
	/* round 1: */
 | 
			
		||||
   	t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >>  8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[ 4];
 | 
			
		||||
   	t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >>  8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[ 5];
 | 
			
		||||
   	t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >>  8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[ 6];
 | 
			
		||||
   	t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >>  8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[ 7];
 | 
			
		||||
   	/* round 2: */
 | 
			
		||||
   	s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >>  8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[ 8];
 | 
			
		||||
   	s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >>  8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[ 9];
 | 
			
		||||
   	s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >>  8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[10];
 | 
			
		||||
   	s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >>  8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[11];
 | 
			
		||||
	/* round 3: */
 | 
			
		||||
   	t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >>  8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[12];
 | 
			
		||||
   	t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >>  8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[13];
 | 
			
		||||
   	t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >>  8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[14];
 | 
			
		||||
   	t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >>  8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[15];
 | 
			
		||||
   	/* round 4: */
 | 
			
		||||
   	s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >>  8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[16];
 | 
			
		||||
   	s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >>  8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[17];
 | 
			
		||||
   	s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >>  8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[18];
 | 
			
		||||
   	s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >>  8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[19];
 | 
			
		||||
	/* round 5: */
 | 
			
		||||
   	t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >>  8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[20];
 | 
			
		||||
   	t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >>  8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[21];
 | 
			
		||||
   	t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >>  8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[22];
 | 
			
		||||
   	t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >>  8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[23];
 | 
			
		||||
   	/* round 6: */
 | 
			
		||||
   	s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >>  8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[24];
 | 
			
		||||
   	s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >>  8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[25];
 | 
			
		||||
   	s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >>  8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[26];
 | 
			
		||||
   	s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >>  8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[27];
 | 
			
		||||
	/* round 7: */
 | 
			
		||||
   	t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >>  8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[28];
 | 
			
		||||
   	t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >>  8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[29];
 | 
			
		||||
   	t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >>  8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[30];
 | 
			
		||||
   	t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >>  8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[31];
 | 
			
		||||
   	/* round 8: */
 | 
			
		||||
   	s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >>  8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[32];
 | 
			
		||||
   	s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >>  8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[33];
 | 
			
		||||
   	s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >>  8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[34];
 | 
			
		||||
   	s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >>  8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[35];
 | 
			
		||||
	/* round 9: */
 | 
			
		||||
   	t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >>  8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[36];
 | 
			
		||||
   	t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >>  8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[37];
 | 
			
		||||
   	t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >>  8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[38];
 | 
			
		||||
   	t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >>  8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[39];
 | 
			
		||||
    /* round 1: */
 | 
			
		||||
    t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >>  8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[ 4];
 | 
			
		||||
    t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >>  8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[ 5];
 | 
			
		||||
    t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >>  8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[ 6];
 | 
			
		||||
    t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >>  8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[ 7];
 | 
			
		||||
    /* round 2: */
 | 
			
		||||
    s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >>  8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[ 8];
 | 
			
		||||
    s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >>  8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[ 9];
 | 
			
		||||
    s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >>  8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[10];
 | 
			
		||||
    s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >>  8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[11];
 | 
			
		||||
    /* round 3: */
 | 
			
		||||
    t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >>  8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[12];
 | 
			
		||||
    t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >>  8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[13];
 | 
			
		||||
    t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >>  8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[14];
 | 
			
		||||
    t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >>  8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[15];
 | 
			
		||||
    /* round 4: */
 | 
			
		||||
    s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >>  8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[16];
 | 
			
		||||
    s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >>  8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[17];
 | 
			
		||||
    s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >>  8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[18];
 | 
			
		||||
    s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >>  8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[19];
 | 
			
		||||
    /* round 5: */
 | 
			
		||||
    t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >>  8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[20];
 | 
			
		||||
    t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >>  8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[21];
 | 
			
		||||
    t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >>  8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[22];
 | 
			
		||||
    t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >>  8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[23];
 | 
			
		||||
    /* round 6: */
 | 
			
		||||
    s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >>  8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[24];
 | 
			
		||||
    s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >>  8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[25];
 | 
			
		||||
    s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >>  8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[26];
 | 
			
		||||
    s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >>  8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[27];
 | 
			
		||||
    /* round 7: */
 | 
			
		||||
    t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >>  8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[28];
 | 
			
		||||
    t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >>  8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[29];
 | 
			
		||||
    t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >>  8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[30];
 | 
			
		||||
    t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >>  8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[31];
 | 
			
		||||
    /* round 8: */
 | 
			
		||||
    s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >>  8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[32];
 | 
			
		||||
    s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >>  8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[33];
 | 
			
		||||
    s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >>  8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[34];
 | 
			
		||||
    s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >>  8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[35];
 | 
			
		||||
    /* round 9: */
 | 
			
		||||
    t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >>  8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[36];
 | 
			
		||||
    t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >>  8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[37];
 | 
			
		||||
    t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >>  8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[38];
 | 
			
		||||
    t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >>  8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[39];
 | 
			
		||||
    if (key->rounds > 10) {
 | 
			
		||||
        /* round 10: */
 | 
			
		||||
        s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >>  8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[40];
 | 
			
		||||
@@ -932,37 +934,37 @@ void AES_encrypt(const unsigned char *in, unsigned char *out,
 | 
			
		||||
    }
 | 
			
		||||
#endif /* ?FULL_UNROLL */
 | 
			
		||||
    /*
 | 
			
		||||
	 * apply last round and
 | 
			
		||||
	 * map cipher state to byte array block:
 | 
			
		||||
	 */
 | 
			
		||||
	s0 =
 | 
			
		||||
		(Te2[(t0 >> 24)       ] & 0xff000000) ^
 | 
			
		||||
		(Te3[(t1 >> 16) & 0xff] & 0x00ff0000) ^
 | 
			
		||||
		(Te0[(t2 >>  8) & 0xff] & 0x0000ff00) ^
 | 
			
		||||
		(Te1[(t3      ) & 0xff] & 0x000000ff) ^
 | 
			
		||||
		rk[0];
 | 
			
		||||
	PUTU32(out     , s0);
 | 
			
		||||
	s1 =
 | 
			
		||||
		(Te2[(t1 >> 24)       ] & 0xff000000) ^
 | 
			
		||||
		(Te3[(t2 >> 16) & 0xff] & 0x00ff0000) ^
 | 
			
		||||
		(Te0[(t3 >>  8) & 0xff] & 0x0000ff00) ^
 | 
			
		||||
		(Te1[(t0      ) & 0xff] & 0x000000ff) ^
 | 
			
		||||
		rk[1];
 | 
			
		||||
	PUTU32(out +  4, s1);
 | 
			
		||||
	s2 =
 | 
			
		||||
		(Te2[(t2 >> 24)       ] & 0xff000000) ^
 | 
			
		||||
		(Te3[(t3 >> 16) & 0xff] & 0x00ff0000) ^
 | 
			
		||||
		(Te0[(t0 >>  8) & 0xff] & 0x0000ff00) ^
 | 
			
		||||
		(Te1[(t1      ) & 0xff] & 0x000000ff) ^
 | 
			
		||||
		rk[2];
 | 
			
		||||
	PUTU32(out +  8, s2);
 | 
			
		||||
	s3 =
 | 
			
		||||
		(Te2[(t3 >> 24)       ] & 0xff000000) ^
 | 
			
		||||
		(Te3[(t0 >> 16) & 0xff] & 0x00ff0000) ^
 | 
			
		||||
		(Te0[(t1 >>  8) & 0xff] & 0x0000ff00) ^
 | 
			
		||||
		(Te1[(t2      ) & 0xff] & 0x000000ff) ^
 | 
			
		||||
		rk[3];
 | 
			
		||||
	PUTU32(out + 12, s3);
 | 
			
		||||
     * apply last round and
 | 
			
		||||
     * map cipher state to byte array block:
 | 
			
		||||
     */
 | 
			
		||||
    s0 =
 | 
			
		||||
        (Te2[(t0 >> 24)       ] & 0xff000000) ^
 | 
			
		||||
        (Te3[(t1 >> 16) & 0xff] & 0x00ff0000) ^
 | 
			
		||||
        (Te0[(t2 >>  8) & 0xff] & 0x0000ff00) ^
 | 
			
		||||
        (Te1[(t3      ) & 0xff] & 0x000000ff) ^
 | 
			
		||||
        rk[0];
 | 
			
		||||
    PUTU32(out     , s0);
 | 
			
		||||
    s1 =
 | 
			
		||||
        (Te2[(t1 >> 24)       ] & 0xff000000) ^
 | 
			
		||||
        (Te3[(t2 >> 16) & 0xff] & 0x00ff0000) ^
 | 
			
		||||
        (Te0[(t3 >>  8) & 0xff] & 0x0000ff00) ^
 | 
			
		||||
        (Te1[(t0      ) & 0xff] & 0x000000ff) ^
 | 
			
		||||
        rk[1];
 | 
			
		||||
    PUTU32(out +  4, s1);
 | 
			
		||||
    s2 =
 | 
			
		||||
        (Te2[(t2 >> 24)       ] & 0xff000000) ^
 | 
			
		||||
        (Te3[(t3 >> 16) & 0xff] & 0x00ff0000) ^
 | 
			
		||||
        (Te0[(t0 >>  8) & 0xff] & 0x0000ff00) ^
 | 
			
		||||
        (Te1[(t1      ) & 0xff] & 0x000000ff) ^
 | 
			
		||||
        rk[2];
 | 
			
		||||
    PUTU32(out +  8, s2);
 | 
			
		||||
    s3 =
 | 
			
		||||
        (Te2[(t3 >> 24)       ] & 0xff000000) ^
 | 
			
		||||
        (Te3[(t0 >> 16) & 0xff] & 0x00ff0000) ^
 | 
			
		||||
        (Te0[(t1 >>  8) & 0xff] & 0x0000ff00) ^
 | 
			
		||||
        (Te1[(t2      ) & 0xff] & 0x000000ff) ^
 | 
			
		||||
        rk[3];
 | 
			
		||||
    PUTU32(out + 12, s3);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
/*
 | 
			
		||||
@@ -970,21 +972,22 @@ void AES_encrypt(const unsigned char *in, unsigned char *out,
 | 
			
		||||
 * in and out can overlap
 | 
			
		||||
 */
 | 
			
		||||
void AES_decrypt(const unsigned char *in, unsigned char *out,
 | 
			
		||||
		 const AES_KEY *key) {
 | 
			
		||||
                 const AES_KEY *key)
 | 
			
		||||
{
 | 
			
		||||
 | 
			
		||||
	const u32 *rk;
 | 
			
		||||
	u32 s0, s1, s2, s3, t0, t1, t2, t3;
 | 
			
		||||
    const u32 *rk;
 | 
			
		||||
    u32 s0, s1, s2, s3, t0, t1, t2, t3;
 | 
			
		||||
#ifndef FULL_UNROLL
 | 
			
		||||
	int r;
 | 
			
		||||
    int r;
 | 
			
		||||
#endif /* ?FULL_UNROLL */
 | 
			
		||||
 | 
			
		||||
	assert(in && out && key);
 | 
			
		||||
	rk = key->rd_key;
 | 
			
		||||
    assert(in && out && key);
 | 
			
		||||
    rk = key->rd_key;
 | 
			
		||||
 | 
			
		||||
	/*
 | 
			
		||||
	 * map byte array block to cipher state
 | 
			
		||||
	 * and add initial round key:
 | 
			
		||||
	 */
 | 
			
		||||
    /*
 | 
			
		||||
     * map byte array block to cipher state
 | 
			
		||||
     * and add initial round key:
 | 
			
		||||
     */
 | 
			
		||||
    s0 = GETU32(in     ) ^ rk[0];
 | 
			
		||||
    s1 = GETU32(in +  4) ^ rk[1];
 | 
			
		||||
    s2 = GETU32(in +  8) ^ rk[2];
 | 
			
		||||
@@ -1059,7 +1062,7 @@ void AES_decrypt(const unsigned char *in, unsigned char *out,
 | 
			
		||||
            t3 = Td0[s3 >> 24] ^ Td1[(s2 >> 16) & 0xff] ^ Td2[(s1 >>  8) & 0xff] ^ Td3[s0 & 0xff] ^ rk[55];
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
	rk += key->rounds << 2;
 | 
			
		||||
    rk += key->rounds << 2;
 | 
			
		||||
#else  /* !FULL_UNROLL */
 | 
			
		||||
    /*
 | 
			
		||||
     * Nr - 1 full rounds:
 | 
			
		||||
@@ -1123,37 +1126,37 @@ void AES_decrypt(const unsigned char *in, unsigned char *out,
 | 
			
		||||
    }
 | 
			
		||||
#endif /* ?FULL_UNROLL */
 | 
			
		||||
    /*
 | 
			
		||||
	 * apply last round and
 | 
			
		||||
	 * map cipher state to byte array block:
 | 
			
		||||
	 */
 | 
			
		||||
   	s0 =
 | 
			
		||||
   		(Td4[(t0 >> 24)       ] << 24) ^
 | 
			
		||||
   		(Td4[(t3 >> 16) & 0xff] << 16) ^
 | 
			
		||||
   		(Td4[(t2 >>  8) & 0xff] <<  8) ^
 | 
			
		||||
   		(Td4[(t1      ) & 0xff])       ^
 | 
			
		||||
   		rk[0];
 | 
			
		||||
	PUTU32(out     , s0);
 | 
			
		||||
   	s1 =
 | 
			
		||||
   		(Td4[(t1 >> 24)       ] << 24) ^
 | 
			
		||||
   		(Td4[(t0 >> 16) & 0xff] << 16) ^
 | 
			
		||||
   		(Td4[(t3 >>  8) & 0xff] <<  8) ^
 | 
			
		||||
   		(Td4[(t2      ) & 0xff])       ^
 | 
			
		||||
   		rk[1];
 | 
			
		||||
	PUTU32(out +  4, s1);
 | 
			
		||||
   	s2 =
 | 
			
		||||
   		(Td4[(t2 >> 24)       ] << 24) ^
 | 
			
		||||
   		(Td4[(t1 >> 16) & 0xff] << 16) ^
 | 
			
		||||
   		(Td4[(t0 >>  8) & 0xff] <<  8) ^
 | 
			
		||||
   		(Td4[(t3      ) & 0xff])       ^
 | 
			
		||||
   		rk[2];
 | 
			
		||||
	PUTU32(out +  8, s2);
 | 
			
		||||
   	s3 =
 | 
			
		||||
   		(Td4[(t3 >> 24)       ] << 24) ^
 | 
			
		||||
   		(Td4[(t2 >> 16) & 0xff] << 16) ^
 | 
			
		||||
   		(Td4[(t1 >>  8) & 0xff] <<  8) ^
 | 
			
		||||
   		(Td4[(t0      ) & 0xff])       ^
 | 
			
		||||
   		rk[3];
 | 
			
		||||
	PUTU32(out + 12, s3);
 | 
			
		||||
     * apply last round and
 | 
			
		||||
     * map cipher state to byte array block:
 | 
			
		||||
     */
 | 
			
		||||
    s0 =
 | 
			
		||||
        (Td4[(t0 >> 24)       ] << 24) ^
 | 
			
		||||
        (Td4[(t3 >> 16) & 0xff] << 16) ^
 | 
			
		||||
        (Td4[(t2 >>  8) & 0xff] <<  8) ^
 | 
			
		||||
        (Td4[(t1      ) & 0xff])       ^
 | 
			
		||||
        rk[0];
 | 
			
		||||
    PUTU32(out     , s0);
 | 
			
		||||
    s1 =
 | 
			
		||||
        (Td4[(t1 >> 24)       ] << 24) ^
 | 
			
		||||
        (Td4[(t0 >> 16) & 0xff] << 16) ^
 | 
			
		||||
        (Td4[(t3 >>  8) & 0xff] <<  8) ^
 | 
			
		||||
        (Td4[(t2      ) & 0xff])       ^
 | 
			
		||||
        rk[1];
 | 
			
		||||
    PUTU32(out +  4, s1);
 | 
			
		||||
    s2 =
 | 
			
		||||
        (Td4[(t2 >> 24)       ] << 24) ^
 | 
			
		||||
        (Td4[(t1 >> 16) & 0xff] << 16) ^
 | 
			
		||||
        (Td4[(t0 >>  8) & 0xff] <<  8) ^
 | 
			
		||||
        (Td4[(t3      ) & 0xff])       ^
 | 
			
		||||
        rk[2];
 | 
			
		||||
    PUTU32(out +  8, s2);
 | 
			
		||||
    s3 =
 | 
			
		||||
        (Td4[(t3 >> 24)       ] << 24) ^
 | 
			
		||||
        (Td4[(t2 >> 16) & 0xff] << 16) ^
 | 
			
		||||
        (Td4[(t1 >>  8) & 0xff] <<  8) ^
 | 
			
		||||
        (Td4[(t0      ) & 0xff])       ^
 | 
			
		||||
        rk[3];
 | 
			
		||||
    PUTU32(out + 12, s3);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
#else /* AES_ASM */
 | 
			
		||||
@@ -1193,166 +1196,168 @@ static const u8 Te4[256] = {
 | 
			
		||||
    0x41U, 0x99U, 0x2dU, 0x0fU, 0xb0U, 0x54U, 0xbbU, 0x16U
 | 
			
		||||
};
 | 
			
		||||
static const u32 rcon[] = {
 | 
			
		||||
	0x01000000, 0x02000000, 0x04000000, 0x08000000,
 | 
			
		||||
	0x10000000, 0x20000000, 0x40000000, 0x80000000,
 | 
			
		||||
	0x1B000000, 0x36000000, /* for 128-bit blocks, Rijndael never uses more than 10 rcon values */
 | 
			
		||||
    0x01000000, 0x02000000, 0x04000000, 0x08000000,
 | 
			
		||||
    0x10000000, 0x20000000, 0x40000000, 0x80000000,
 | 
			
		||||
    0x1B000000, 0x36000000, /* for 128-bit blocks, Rijndael never uses more than 10 rcon values */
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
/**
 | 
			
		||||
 * Expand the cipher key into the encryption key schedule.
 | 
			
		||||
 */
 | 
			
		||||
int AES_set_encrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
			AES_KEY *key) {
 | 
			
		||||
	u32 *rk;
 | 
			
		||||
int private_AES_set_encrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
                                AES_KEY *key)
 | 
			
		||||
{
 | 
			
		||||
    u32 *rk;
 | 
			
		||||
   	int i = 0;
 | 
			
		||||
	u32 temp;
 | 
			
		||||
    u32 temp;
 | 
			
		||||
 | 
			
		||||
	if (!userKey || !key)
 | 
			
		||||
		return -1;
 | 
			
		||||
	if (bits != 128 && bits != 192 && bits != 256)
 | 
			
		||||
		return -2;
 | 
			
		||||
    if (!userKey || !key)
 | 
			
		||||
        return -1;
 | 
			
		||||
    if (bits != 128 && bits != 192 && bits != 256)
 | 
			
		||||
        return -2;
 | 
			
		||||
 | 
			
		||||
	rk = key->rd_key;
 | 
			
		||||
    rk = key->rd_key;
 | 
			
		||||
 | 
			
		||||
	if (bits==128)
 | 
			
		||||
		key->rounds = 10;
 | 
			
		||||
	else if (bits==192)
 | 
			
		||||
		key->rounds = 12;
 | 
			
		||||
	else
 | 
			
		||||
		key->rounds = 14;
 | 
			
		||||
    if (bits==128)
 | 
			
		||||
        key->rounds = 10;
 | 
			
		||||
    else if (bits==192)
 | 
			
		||||
        key->rounds = 12;
 | 
			
		||||
    else
 | 
			
		||||
        key->rounds = 14;
 | 
			
		||||
 | 
			
		||||
	rk[0] = GETU32(userKey     );
 | 
			
		||||
	rk[1] = GETU32(userKey +  4);
 | 
			
		||||
	rk[2] = GETU32(userKey +  8);
 | 
			
		||||
	rk[3] = GETU32(userKey + 12);
 | 
			
		||||
	if (bits == 128) {
 | 
			
		||||
		while (1) {
 | 
			
		||||
			temp  = rk[3];
 | 
			
		||||
			rk[4] = rk[0] ^
 | 
			
		||||
				(Te4[(temp >> 16) & 0xff] << 24) ^
 | 
			
		||||
				(Te4[(temp >>  8) & 0xff] << 16) ^
 | 
			
		||||
				(Te4[(temp      ) & 0xff] << 8) ^
 | 
			
		||||
				(Te4[(temp >> 24)       ]) ^
 | 
			
		||||
				rcon[i];
 | 
			
		||||
			rk[5] = rk[1] ^ rk[4];
 | 
			
		||||
			rk[6] = rk[2] ^ rk[5];
 | 
			
		||||
			rk[7] = rk[3] ^ rk[6];
 | 
			
		||||
			if (++i == 10) {
 | 
			
		||||
				return 0;
 | 
			
		||||
			}
 | 
			
		||||
			rk += 4;
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
	rk[4] = GETU32(userKey + 16);
 | 
			
		||||
	rk[5] = GETU32(userKey + 20);
 | 
			
		||||
	if (bits == 192) {
 | 
			
		||||
		while (1) {
 | 
			
		||||
			temp = rk[ 5];
 | 
			
		||||
			rk[ 6] = rk[ 0] ^
 | 
			
		||||
				(Te4[(temp >> 16) & 0xff] << 24) ^
 | 
			
		||||
				(Te4[(temp >>  8) & 0xff] << 16) ^
 | 
			
		||||
				(Te4[(temp      ) & 0xff] << 8) ^
 | 
			
		||||
				(Te4[(temp >> 24)       ]) ^
 | 
			
		||||
				rcon[i];
 | 
			
		||||
			rk[ 7] = rk[ 1] ^ rk[ 6];
 | 
			
		||||
			rk[ 8] = rk[ 2] ^ rk[ 7];
 | 
			
		||||
			rk[ 9] = rk[ 3] ^ rk[ 8];
 | 
			
		||||
			if (++i == 8) {
 | 
			
		||||
				return 0;
 | 
			
		||||
			}
 | 
			
		||||
			rk[10] = rk[ 4] ^ rk[ 9];
 | 
			
		||||
			rk[11] = rk[ 5] ^ rk[10];
 | 
			
		||||
			rk += 6;
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
	rk[6] = GETU32(userKey + 24);
 | 
			
		||||
	rk[7] = GETU32(userKey + 28);
 | 
			
		||||
	if (bits == 256) {
 | 
			
		||||
		while (1) {
 | 
			
		||||
			temp = rk[ 7];
 | 
			
		||||
			rk[ 8] = rk[ 0] ^
 | 
			
		||||
				(Te4[(temp >> 16) & 0xff] << 24) ^
 | 
			
		||||
				(Te4[(temp >>  8) & 0xff] << 16) ^
 | 
			
		||||
				(Te4[(temp      ) & 0xff] << 8) ^
 | 
			
		||||
				(Te4[(temp >> 24)       ]) ^
 | 
			
		||||
				rcon[i];
 | 
			
		||||
			rk[ 9] = rk[ 1] ^ rk[ 8];
 | 
			
		||||
			rk[10] = rk[ 2] ^ rk[ 9];
 | 
			
		||||
			rk[11] = rk[ 3] ^ rk[10];
 | 
			
		||||
			if (++i == 7) {
 | 
			
		||||
				return 0;
 | 
			
		||||
			}
 | 
			
		||||
			temp = rk[11];
 | 
			
		||||
			rk[12] = rk[ 4] ^
 | 
			
		||||
				(Te4[(temp >> 24)       ] << 24) ^
 | 
			
		||||
				(Te4[(temp >> 16) & 0xff] << 16) ^
 | 
			
		||||
				(Te4[(temp >>  8) & 0xff] << 8) ^
 | 
			
		||||
				(Te4[(temp      ) & 0xff]);
 | 
			
		||||
			rk[13] = rk[ 5] ^ rk[12];
 | 
			
		||||
			rk[14] = rk[ 6] ^ rk[13];
 | 
			
		||||
			rk[15] = rk[ 7] ^ rk[14];
 | 
			
		||||
    rk[0] = GETU32(userKey     );
 | 
			
		||||
    rk[1] = GETU32(userKey +  4);
 | 
			
		||||
    rk[2] = GETU32(userKey +  8);
 | 
			
		||||
    rk[3] = GETU32(userKey + 12);
 | 
			
		||||
    if (bits == 128) {
 | 
			
		||||
        while (1) {
 | 
			
		||||
            temp  = rk[3];
 | 
			
		||||
            rk[4] = rk[0] ^
 | 
			
		||||
                (Te4[(temp >> 16) & 0xff] << 24) ^
 | 
			
		||||
                (Te4[(temp >>  8) & 0xff] << 16) ^
 | 
			
		||||
                (Te4[(temp      ) & 0xff] << 8) ^
 | 
			
		||||
                (Te4[(temp >> 24)       ]) ^
 | 
			
		||||
                rcon[i];
 | 
			
		||||
            rk[5] = rk[1] ^ rk[4];
 | 
			
		||||
            rk[6] = rk[2] ^ rk[5];
 | 
			
		||||
            rk[7] = rk[3] ^ rk[6];
 | 
			
		||||
            if (++i == 10) {
 | 
			
		||||
                return 0;
 | 
			
		||||
            }
 | 
			
		||||
            rk += 4;
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
    rk[4] = GETU32(userKey + 16);
 | 
			
		||||
    rk[5] = GETU32(userKey + 20);
 | 
			
		||||
    if (bits == 192) {
 | 
			
		||||
        while (1) {
 | 
			
		||||
            temp = rk[ 5];
 | 
			
		||||
            rk[ 6] = rk[ 0] ^
 | 
			
		||||
                (Te4[(temp >> 16) & 0xff] << 24) ^
 | 
			
		||||
                (Te4[(temp >>  8) & 0xff] << 16) ^
 | 
			
		||||
                (Te4[(temp      ) & 0xff] << 8) ^
 | 
			
		||||
                (Te4[(temp >> 24)       ]) ^
 | 
			
		||||
                rcon[i];
 | 
			
		||||
            rk[ 7] = rk[ 1] ^ rk[ 6];
 | 
			
		||||
            rk[ 8] = rk[ 2] ^ rk[ 7];
 | 
			
		||||
            rk[ 9] = rk[ 3] ^ rk[ 8];
 | 
			
		||||
            if (++i == 8) {
 | 
			
		||||
                return 0;
 | 
			
		||||
            }
 | 
			
		||||
            rk[10] = rk[ 4] ^ rk[ 9];
 | 
			
		||||
            rk[11] = rk[ 5] ^ rk[10];
 | 
			
		||||
            rk += 6;
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
    rk[6] = GETU32(userKey + 24);
 | 
			
		||||
    rk[7] = GETU32(userKey + 28);
 | 
			
		||||
    if (bits == 256) {
 | 
			
		||||
        while (1) {
 | 
			
		||||
            temp = rk[ 7];
 | 
			
		||||
            rk[ 8] = rk[ 0] ^
 | 
			
		||||
                (Te4[(temp >> 16) & 0xff] << 24) ^
 | 
			
		||||
                (Te4[(temp >>  8) & 0xff] << 16) ^
 | 
			
		||||
                (Te4[(temp      ) & 0xff] << 8) ^
 | 
			
		||||
                (Te4[(temp >> 24)       ]) ^
 | 
			
		||||
                rcon[i];
 | 
			
		||||
            rk[ 9] = rk[ 1] ^ rk[ 8];
 | 
			
		||||
            rk[10] = rk[ 2] ^ rk[ 9];
 | 
			
		||||
            rk[11] = rk[ 3] ^ rk[10];
 | 
			
		||||
            if (++i == 7) {
 | 
			
		||||
                return 0;
 | 
			
		||||
            }
 | 
			
		||||
            temp = rk[11];
 | 
			
		||||
            rk[12] = rk[ 4] ^
 | 
			
		||||
                (Te4[(temp >> 24)       ] << 24) ^
 | 
			
		||||
                (Te4[(temp >> 16) & 0xff] << 16) ^
 | 
			
		||||
                (Te4[(temp >>  8) & 0xff] << 8) ^
 | 
			
		||||
                (Te4[(temp      ) & 0xff]);
 | 
			
		||||
            rk[13] = rk[ 5] ^ rk[12];
 | 
			
		||||
            rk[14] = rk[ 6] ^ rk[13];
 | 
			
		||||
            rk[15] = rk[ 7] ^ rk[14];
 | 
			
		||||
 | 
			
		||||
			rk += 8;
 | 
			
		||||
        	}
 | 
			
		||||
	}
 | 
			
		||||
	return 0;
 | 
			
		||||
            rk += 8;
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
    return 0;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
/**
 | 
			
		||||
 * Expand the cipher key into the decryption key schedule.
 | 
			
		||||
 */
 | 
			
		||||
int AES_set_decrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
			 AES_KEY *key) {
 | 
			
		||||
int private_AES_set_decrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
                                AES_KEY *key)
 | 
			
		||||
{
 | 
			
		||||
 | 
			
		||||
        u32 *rk;
 | 
			
		||||
	int i, j, status;
 | 
			
		||||
	u32 temp;
 | 
			
		||||
    u32 *rk;
 | 
			
		||||
    int i, j, status;
 | 
			
		||||
    u32 temp;
 | 
			
		||||
 | 
			
		||||
	/* first, start with an encryption schedule */
 | 
			
		||||
	status = AES_set_encrypt_key(userKey, bits, key);
 | 
			
		||||
	if (status < 0)
 | 
			
		||||
		return status;
 | 
			
		||||
    /* first, start with an encryption schedule */
 | 
			
		||||
    status = private_AES_set_encrypt_key(userKey, bits, key);
 | 
			
		||||
    if (status < 0)
 | 
			
		||||
        return status;
 | 
			
		||||
 | 
			
		||||
	rk = key->rd_key;
 | 
			
		||||
    rk = key->rd_key;
 | 
			
		||||
 | 
			
		||||
	/* invert the order of the round keys: */
 | 
			
		||||
	for (i = 0, j = 4*(key->rounds); i < j; i += 4, j -= 4) {
 | 
			
		||||
		temp = rk[i    ]; rk[i    ] = rk[j    ]; rk[j    ] = temp;
 | 
			
		||||
		temp = rk[i + 1]; rk[i + 1] = rk[j + 1]; rk[j + 1] = temp;
 | 
			
		||||
		temp = rk[i + 2]; rk[i + 2] = rk[j + 2]; rk[j + 2] = temp;
 | 
			
		||||
		temp = rk[i + 3]; rk[i + 3] = rk[j + 3]; rk[j + 3] = temp;
 | 
			
		||||
	}
 | 
			
		||||
	/* apply the inverse MixColumn transform to all round keys but the first and the last: */
 | 
			
		||||
	for (i = 1; i < (key->rounds); i++) {
 | 
			
		||||
		rk += 4;
 | 
			
		||||
		for (j = 0; j < 4; j++) {
 | 
			
		||||
			u32 tp1, tp2, tp4, tp8, tp9, tpb, tpd, tpe, m;
 | 
			
		||||
    /* invert the order of the round keys: */
 | 
			
		||||
    for (i = 0, j = 4*(key->rounds); i < j; i += 4, j -= 4) {
 | 
			
		||||
        temp = rk[i    ]; rk[i    ] = rk[j    ]; rk[j    ] = temp;
 | 
			
		||||
        temp = rk[i + 1]; rk[i + 1] = rk[j + 1]; rk[j + 1] = temp;
 | 
			
		||||
        temp = rk[i + 2]; rk[i + 2] = rk[j + 2]; rk[j + 2] = temp;
 | 
			
		||||
        temp = rk[i + 3]; rk[i + 3] = rk[j + 3]; rk[j + 3] = temp;
 | 
			
		||||
    }
 | 
			
		||||
    /* apply the inverse MixColumn transform to all round keys but the first and the last: */
 | 
			
		||||
    for (i = 1; i < (key->rounds); i++) {
 | 
			
		||||
        rk += 4;
 | 
			
		||||
        for (j = 0; j < 4; j++) {
 | 
			
		||||
            u32 tp1, tp2, tp4, tp8, tp9, tpb, tpd, tpe, m;
 | 
			
		||||
 | 
			
		||||
			tp1 = rk[j];
 | 
			
		||||
			m = tp1 & 0x80808080;
 | 
			
		||||
			tp2 = ((tp1 & 0x7f7f7f7f) << 1) ^
 | 
			
		||||
				((m - (m >> 7)) & 0x1b1b1b1b);
 | 
			
		||||
			m = tp2 & 0x80808080;
 | 
			
		||||
			tp4 = ((tp2 & 0x7f7f7f7f) << 1) ^
 | 
			
		||||
				((m - (m >> 7)) & 0x1b1b1b1b);
 | 
			
		||||
			m = tp4 & 0x80808080;
 | 
			
		||||
			tp8 = ((tp4 & 0x7f7f7f7f) << 1) ^
 | 
			
		||||
				((m - (m >> 7)) & 0x1b1b1b1b);
 | 
			
		||||
			tp9 = tp8 ^ tp1;
 | 
			
		||||
			tpb = tp9 ^ tp2;
 | 
			
		||||
			tpd = tp9 ^ tp4;
 | 
			
		||||
			tpe = tp8 ^ tp4 ^ tp2;
 | 
			
		||||
            tp1 = rk[j];
 | 
			
		||||
            m = tp1 & 0x80808080;
 | 
			
		||||
            tp2 = ((tp1 & 0x7f7f7f7f) << 1) ^
 | 
			
		||||
                ((m - (m >> 7)) & 0x1b1b1b1b);
 | 
			
		||||
            m = tp2 & 0x80808080;
 | 
			
		||||
            tp4 = ((tp2 & 0x7f7f7f7f) << 1) ^
 | 
			
		||||
                ((m - (m >> 7)) & 0x1b1b1b1b);
 | 
			
		||||
            m = tp4 & 0x80808080;
 | 
			
		||||
            tp8 = ((tp4 & 0x7f7f7f7f) << 1) ^
 | 
			
		||||
                ((m - (m >> 7)) & 0x1b1b1b1b);
 | 
			
		||||
            tp9 = tp8 ^ tp1;
 | 
			
		||||
            tpb = tp9 ^ tp2;
 | 
			
		||||
            tpd = tp9 ^ tp4;
 | 
			
		||||
            tpe = tp8 ^ tp4 ^ tp2;
 | 
			
		||||
#if defined(ROTATE)
 | 
			
		||||
			rk[j] = tpe ^ ROTATE(tpd,16) ^
 | 
			
		||||
				ROTATE(tp9,24) ^ ROTATE(tpb,8);
 | 
			
		||||
            rk[j] = tpe ^ ROTATE(tpd,16) ^
 | 
			
		||||
                ROTATE(tp9,24) ^ ROTATE(tpb,8);
 | 
			
		||||
#else
 | 
			
		||||
			rk[j] = tpe ^ (tpd >> 16) ^ (tpd << 16) ^ 
 | 
			
		||||
				(tp9 >> 8) ^ (tp9 << 24) ^
 | 
			
		||||
				(tpb >> 24) ^ (tpb << 8);
 | 
			
		||||
            rk[j] = tpe ^ (tpd >> 16) ^ (tpd << 16) ^ 
 | 
			
		||||
                (tp9 >> 8) ^ (tp9 << 24) ^
 | 
			
		||||
                (tpb >> 24) ^ (tpb << 8);
 | 
			
		||||
#endif
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
	return 0;
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
    return 0;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
#endif /* AES_ASM */
 | 
			
		||||
 
 | 
			
		||||
@@ -50,6 +50,7 @@
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
#include <openssl/opensslv.h>
 | 
			
		||||
#include <openssl/crypto.h>
 | 
			
		||||
#include <openssl/aes.h>
 | 
			
		||||
#include "aes_locl.h"
 | 
			
		||||
 | 
			
		||||
@@ -62,3 +63,23 @@ const char *AES_options(void) {
 | 
			
		||||
        return "aes(partial)";
 | 
			
		||||
#endif
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
/* FIPS wrapper functions to block low level AES calls in FIPS mode */
 | 
			
		||||
 | 
			
		||||
int AES_set_encrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
			AES_KEY *key)
 | 
			
		||||
	{
 | 
			
		||||
#ifdef OPENSSL_FIPS
 | 
			
		||||
	fips_cipher_abort(AES);
 | 
			
		||||
#endif
 | 
			
		||||
	return private_AES_set_encrypt_key(userKey, bits, key);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
int AES_set_decrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
			AES_KEY *key)
 | 
			
		||||
	{
 | 
			
		||||
#ifdef OPENSSL_FIPS
 | 
			
		||||
	fips_cipher_abort(AES);
 | 
			
		||||
#endif
 | 
			
		||||
	return private_AES_set_decrypt_key(userKey, bits, key);
 | 
			
		||||
	}
 | 
			
		||||
 
 | 
			
		||||
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							@@ -39,7 +39,7 @@
 | 
			
		||||
# but exhibits up to 10% improvement on other cores.
 | 
			
		||||
#
 | 
			
		||||
# Second version is "monolithic" replacement for aes_core.c, which in
 | 
			
		||||
# addition to AES_[de|en]crypt implements AES_set_[de|en]cryption_key.
 | 
			
		||||
# addition to AES_[de|en]crypt implements private_AES_set_[de|en]cryption_key.
 | 
			
		||||
# This made it possible to implement little-endian variant of the
 | 
			
		||||
# algorithm without modifying the base C code. Motivating factor for
 | 
			
		||||
# the undertaken effort was that it appeared that in tight IA-32
 | 
			
		||||
@@ -2854,12 +2854,12 @@ sub enckey()
 | 
			
		||||
    &set_label("exit");
 | 
			
		||||
&function_end("_x86_AES_set_encrypt_key");
 | 
			
		||||
 | 
			
		||||
# int AES_set_encrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
# int private_AES_set_encrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
#                        AES_KEY *key)
 | 
			
		||||
&function_begin_B("AES_set_encrypt_key");
 | 
			
		||||
&function_begin_B("private_AES_set_encrypt_key");
 | 
			
		||||
	&call	("_x86_AES_set_encrypt_key");
 | 
			
		||||
	&ret	();
 | 
			
		||||
&function_end_B("AES_set_encrypt_key");
 | 
			
		||||
&function_end_B("private_AES_set_encrypt_key");
 | 
			
		||||
 | 
			
		||||
sub deckey()
 | 
			
		||||
{ my ($i,$key,$tp1,$tp2,$tp4,$tp8) = @_;
 | 
			
		||||
@@ -2916,9 +2916,9 @@ sub deckey()
 | 
			
		||||
	&mov	(&DWP(4*$i,$key),$tp1);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# int AES_set_decrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
# int private_AES_set_decrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
#                        AES_KEY *key)
 | 
			
		||||
&function_begin_B("AES_set_decrypt_key");
 | 
			
		||||
&function_begin_B("private_AES_set_decrypt_key");
 | 
			
		||||
	&call	("_x86_AES_set_encrypt_key");
 | 
			
		||||
	&cmp	("eax",0);
 | 
			
		||||
	&je	(&label("proceed"));
 | 
			
		||||
@@ -2974,7 +2974,7 @@ sub deckey()
 | 
			
		||||
	&jb	(&label("permute"));
 | 
			
		||||
 | 
			
		||||
	&xor	("eax","eax");			# return success
 | 
			
		||||
&function_end("AES_set_decrypt_key");
 | 
			
		||||
&function_end("private_AES_set_decrypt_key");
 | 
			
		||||
&asciz("AES for x86, CRYPTOGAMS by <appro\@openssl.org>");
 | 
			
		||||
 | 
			
		||||
&asm_finish();
 | 
			
		||||
 
 | 
			
		||||
@@ -27,6 +27,11 @@
 | 
			
		||||
# Rescheduling for dual-issue pipeline resulted in 12% improvement on
 | 
			
		||||
# Cortex A8 core and ~25 cycles per byte processed with 128-bit key.
 | 
			
		||||
 | 
			
		||||
# February 2011.
 | 
			
		||||
#
 | 
			
		||||
# Profiler-assisted and platform-specific optimization resulted in 16%
 | 
			
		||||
# improvement on Cortex A8 core and ~21.5 cycles per byte.
 | 
			
		||||
 | 
			
		||||
while (($output=shift) && ($output!~/^\w[\w\-]*\.\w+$/)) {}
 | 
			
		||||
open STDOUT,">$output";
 | 
			
		||||
 | 
			
		||||
@@ -46,6 +51,7 @@ $key="r11";
 | 
			
		||||
$rounds="r12";
 | 
			
		||||
 | 
			
		||||
$code=<<___;
 | 
			
		||||
#include "arm_arch.h"
 | 
			
		||||
.text
 | 
			
		||||
.code	32
 | 
			
		||||
 | 
			
		||||
@@ -166,7 +172,7 @@ AES_encrypt:
 | 
			
		||||
	mov	$rounds,r0		@ inp
 | 
			
		||||
	mov	$key,r2
 | 
			
		||||
	sub	$tbl,r3,#AES_encrypt-AES_Te	@ Te
 | 
			
		||||
 | 
			
		||||
#if __ARM_ARCH__<7
 | 
			
		||||
	ldrb	$s0,[$rounds,#3]	@ load input data in endian-neutral
 | 
			
		||||
	ldrb	$t1,[$rounds,#2]	@ manner...
 | 
			
		||||
	ldrb	$t2,[$rounds,#1]
 | 
			
		||||
@@ -195,10 +201,33 @@ AES_encrypt:
 | 
			
		||||
	orr	$s3,$s3,$t1,lsl#8
 | 
			
		||||
	orr	$s3,$s3,$t2,lsl#16
 | 
			
		||||
	orr	$s3,$s3,$t3,lsl#24
 | 
			
		||||
 | 
			
		||||
#else
 | 
			
		||||
	ldr	$s0,[$rounds,#0]
 | 
			
		||||
	ldr	$s1,[$rounds,#4]
 | 
			
		||||
	ldr	$s2,[$rounds,#8]
 | 
			
		||||
	ldr	$s3,[$rounds,#12]
 | 
			
		||||
#ifdef __ARMEL__
 | 
			
		||||
	rev	$s0,$s0
 | 
			
		||||
	rev	$s1,$s1
 | 
			
		||||
	rev	$s2,$s2
 | 
			
		||||
	rev	$s3,$s3
 | 
			
		||||
#endif
 | 
			
		||||
#endif
 | 
			
		||||
	bl	_armv4_AES_encrypt
 | 
			
		||||
 | 
			
		||||
	ldr	$rounds,[sp],#4		@ pop out
 | 
			
		||||
#if __ARM_ARCH__>=7
 | 
			
		||||
#ifdef __ARMEL__
 | 
			
		||||
	rev	$s0,$s0
 | 
			
		||||
	rev	$s1,$s1
 | 
			
		||||
	rev	$s2,$s2
 | 
			
		||||
	rev	$s3,$s3
 | 
			
		||||
#endif
 | 
			
		||||
	str	$s0,[$rounds,#0]
 | 
			
		||||
	str	$s1,[$rounds,#4]
 | 
			
		||||
	str	$s2,[$rounds,#8]
 | 
			
		||||
	str	$s3,[$rounds,#12]
 | 
			
		||||
#else
 | 
			
		||||
	mov	$t1,$s0,lsr#24		@ write output in endian-neutral
 | 
			
		||||
	mov	$t2,$s0,lsr#16		@ manner...
 | 
			
		||||
	mov	$t3,$s0,lsr#8
 | 
			
		||||
@@ -227,11 +256,15 @@ AES_encrypt:
 | 
			
		||||
	strb	$t2,[$rounds,#13]
 | 
			
		||||
	strb	$t3,[$rounds,#14]
 | 
			
		||||
	strb	$s3,[$rounds,#15]
 | 
			
		||||
 | 
			
		||||
#endif
 | 
			
		||||
#if __ARM_ARCH__>=5
 | 
			
		||||
	ldmia	sp!,{r4-r12,pc}
 | 
			
		||||
#else
 | 
			
		||||
	ldmia   sp!,{r4-r12,lr}
 | 
			
		||||
	tst	lr,#1
 | 
			
		||||
	moveq	pc,lr			@ be binary compatible with V4, yet
 | 
			
		||||
	bx	lr			@ interoperable with Thumb ISA:-)
 | 
			
		||||
#endif
 | 
			
		||||
.size	AES_encrypt,.-AES_encrypt
 | 
			
		||||
 | 
			
		||||
.type   _armv4_AES_encrypt,%function
 | 
			
		||||
@@ -271,11 +304,11 @@ _armv4_AES_encrypt:
 | 
			
		||||
	and	$i2,lr,$s2,lsr#16	@ i1
 | 
			
		||||
	eor	$t3,$t3,$i3,ror#8
 | 
			
		||||
	and	$i3,lr,$s2
 | 
			
		||||
	eor	$s1,$s1,$t1,ror#24
 | 
			
		||||
	ldr	$i1,[$tbl,$i1,lsl#2]	@ Te2[s2>>8]
 | 
			
		||||
	eor	$s1,$s1,$t1,ror#24
 | 
			
		||||
	ldr	$i2,[$tbl,$i2,lsl#2]	@ Te1[s2>>16]
 | 
			
		||||
	mov	$s2,$s2,lsr#24
 | 
			
		||||
 | 
			
		||||
	ldr	$i2,[$tbl,$i2,lsl#2]	@ Te1[s2>>16]
 | 
			
		||||
	ldr	$i3,[$tbl,$i3,lsl#2]	@ Te3[s2>>0]
 | 
			
		||||
	eor	$s0,$s0,$i1,ror#16
 | 
			
		||||
	ldr	$s2,[$tbl,$s2,lsl#2]	@ Te0[s2>>24]
 | 
			
		||||
@@ -284,16 +317,16 @@ _armv4_AES_encrypt:
 | 
			
		||||
	and	$i2,lr,$s3,lsr#8	@ i1
 | 
			
		||||
	eor	$t3,$t3,$i3,ror#16
 | 
			
		||||
	and	$i3,lr,$s3,lsr#16	@ i2
 | 
			
		||||
	eor	$s2,$s2,$t2,ror#16
 | 
			
		||||
	ldr	$i1,[$tbl,$i1,lsl#2]	@ Te3[s3>>0]
 | 
			
		||||
	eor	$s2,$s2,$t2,ror#16
 | 
			
		||||
	ldr	$i2,[$tbl,$i2,lsl#2]	@ Te2[s3>>8]
 | 
			
		||||
	mov	$s3,$s3,lsr#24
 | 
			
		||||
 | 
			
		||||
	ldr	$i2,[$tbl,$i2,lsl#2]	@ Te2[s3>>8]
 | 
			
		||||
	ldr	$i3,[$tbl,$i3,lsl#2]	@ Te1[s3>>16]
 | 
			
		||||
	eor	$s0,$s0,$i1,ror#24
 | 
			
		||||
	ldr	$s3,[$tbl,$s3,lsl#2]	@ Te0[s3>>24]
 | 
			
		||||
	eor	$s1,$s1,$i2,ror#16
 | 
			
		||||
	ldr	$i1,[$key],#16
 | 
			
		||||
	eor	$s1,$s1,$i2,ror#16
 | 
			
		||||
	ldr	$s3,[$tbl,$s3,lsl#2]	@ Te0[s3>>24]
 | 
			
		||||
	eor	$s2,$s2,$i3,ror#8
 | 
			
		||||
	ldr	$t1,[$key,#-12]
 | 
			
		||||
	eor	$s3,$s3,$t3,ror#8
 | 
			
		||||
@@ -333,11 +366,11 @@ _armv4_AES_encrypt:
 | 
			
		||||
	and	$i2,lr,$s2,lsr#16	@ i1
 | 
			
		||||
	eor	$t3,$i3,$t3,lsl#8
 | 
			
		||||
	and	$i3,lr,$s2
 | 
			
		||||
	eor	$s1,$t1,$s1,lsl#24
 | 
			
		||||
	ldrb	$i1,[$tbl,$i1,lsl#2]	@ Te4[s2>>8]
 | 
			
		||||
	eor	$s1,$t1,$s1,lsl#24
 | 
			
		||||
	ldrb	$i2,[$tbl,$i2,lsl#2]	@ Te4[s2>>16]
 | 
			
		||||
	mov	$s2,$s2,lsr#24
 | 
			
		||||
 | 
			
		||||
	ldrb	$i2,[$tbl,$i2,lsl#2]	@ Te4[s2>>16]
 | 
			
		||||
	ldrb	$i3,[$tbl,$i3,lsl#2]	@ Te4[s2>>0]
 | 
			
		||||
	eor	$s0,$i1,$s0,lsl#8
 | 
			
		||||
	ldrb	$s2,[$tbl,$s2,lsl#2]	@ Te4[s2>>24]
 | 
			
		||||
@@ -346,15 +379,15 @@ _armv4_AES_encrypt:
 | 
			
		||||
	and	$i2,lr,$s3,lsr#8	@ i1
 | 
			
		||||
	eor	$t3,$i3,$t3,lsl#8
 | 
			
		||||
	and	$i3,lr,$s3,lsr#16	@ i2
 | 
			
		||||
	eor	$s2,$t2,$s2,lsl#24
 | 
			
		||||
	ldrb	$i1,[$tbl,$i1,lsl#2]	@ Te4[s3>>0]
 | 
			
		||||
	eor	$s2,$t2,$s2,lsl#24
 | 
			
		||||
	ldrb	$i2,[$tbl,$i2,lsl#2]	@ Te4[s3>>8]
 | 
			
		||||
	mov	$s3,$s3,lsr#24
 | 
			
		||||
 | 
			
		||||
	ldrb	$i2,[$tbl,$i2,lsl#2]	@ Te4[s3>>8]
 | 
			
		||||
	ldrb	$i3,[$tbl,$i3,lsl#2]	@ Te4[s3>>16]
 | 
			
		||||
	eor	$s0,$i1,$s0,lsl#8
 | 
			
		||||
	ldrb	$s3,[$tbl,$s3,lsl#2]	@ Te4[s3>>24]
 | 
			
		||||
	ldr	$i1,[$key,#0]
 | 
			
		||||
	ldrb	$s3,[$tbl,$s3,lsl#2]	@ Te4[s3>>24]
 | 
			
		||||
	eor	$s1,$s1,$i2,lsl#8
 | 
			
		||||
	ldr	$t1,[$key,#4]
 | 
			
		||||
	eor	$s2,$s2,$i3,lsl#16
 | 
			
		||||
@@ -371,10 +404,11 @@ _armv4_AES_encrypt:
 | 
			
		||||
	ldr	pc,[sp],#4		@ pop and return
 | 
			
		||||
.size	_armv4_AES_encrypt,.-_armv4_AES_encrypt
 | 
			
		||||
 | 
			
		||||
.global AES_set_encrypt_key
 | 
			
		||||
.type   AES_set_encrypt_key,%function
 | 
			
		||||
.global private_AES_set_encrypt_key
 | 
			
		||||
.type   private_AES_set_encrypt_key,%function
 | 
			
		||||
.align	5
 | 
			
		||||
AES_set_encrypt_key:
 | 
			
		||||
private_AES_set_encrypt_key:
 | 
			
		||||
_armv4_AES_set_encrypt_key:
 | 
			
		||||
	sub	r3,pc,#8		@ AES_set_encrypt_key
 | 
			
		||||
	teq	r0,#0
 | 
			
		||||
	moveq	r0,#-1
 | 
			
		||||
@@ -392,12 +426,13 @@ AES_set_encrypt_key:
 | 
			
		||||
	bne	.Labrt
 | 
			
		||||
 | 
			
		||||
.Lok:	stmdb   sp!,{r4-r12,lr}
 | 
			
		||||
	sub	$tbl,r3,#AES_set_encrypt_key-AES_Te-1024	@ Te4
 | 
			
		||||
	sub	$tbl,r3,#_armv4_AES_set_encrypt_key-AES_Te-1024	@ Te4
 | 
			
		||||
 | 
			
		||||
	mov	$rounds,r0		@ inp
 | 
			
		||||
	mov	lr,r1			@ bits
 | 
			
		||||
	mov	$key,r2			@ key
 | 
			
		||||
 | 
			
		||||
#if __ARM_ARCH__<7
 | 
			
		||||
	ldrb	$s0,[$rounds,#3]	@ load input data in endian-neutral
 | 
			
		||||
	ldrb	$t1,[$rounds,#2]	@ manner...
 | 
			
		||||
	ldrb	$t2,[$rounds,#1]
 | 
			
		||||
@@ -430,6 +465,22 @@ AES_set_encrypt_key:
 | 
			
		||||
	orr	$s3,$s3,$t3,lsl#24
 | 
			
		||||
	str	$s2,[$key,#-8]
 | 
			
		||||
	str	$s3,[$key,#-4]
 | 
			
		||||
#else
 | 
			
		||||
	ldr	$s0,[$rounds,#0]
 | 
			
		||||
	ldr	$s1,[$rounds,#4]
 | 
			
		||||
	ldr	$s2,[$rounds,#8]
 | 
			
		||||
	ldr	$s3,[$rounds,#12]
 | 
			
		||||
#ifdef __ARMEL__
 | 
			
		||||
	rev	$s0,$s0
 | 
			
		||||
	rev	$s1,$s1
 | 
			
		||||
	rev	$s2,$s2
 | 
			
		||||
	rev	$s3,$s3
 | 
			
		||||
#endif
 | 
			
		||||
	str	$s0,[$key],#16
 | 
			
		||||
	str	$s1,[$key,#-12]
 | 
			
		||||
	str	$s2,[$key,#-8]
 | 
			
		||||
	str	$s3,[$key,#-4]
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	teq	lr,#128
 | 
			
		||||
	bne	.Lnot128
 | 
			
		||||
@@ -466,6 +517,7 @@ AES_set_encrypt_key:
 | 
			
		||||
	b	.Ldone
 | 
			
		||||
 | 
			
		||||
.Lnot128:
 | 
			
		||||
#if __ARM_ARCH__<7
 | 
			
		||||
	ldrb	$i2,[$rounds,#19]
 | 
			
		||||
	ldrb	$t1,[$rounds,#18]
 | 
			
		||||
	ldrb	$t2,[$rounds,#17]
 | 
			
		||||
@@ -482,6 +534,16 @@ AES_set_encrypt_key:
 | 
			
		||||
	str	$i2,[$key],#8
 | 
			
		||||
	orr	$i3,$i3,$t3,lsl#24
 | 
			
		||||
	str	$i3,[$key,#-4]
 | 
			
		||||
#else
 | 
			
		||||
	ldr	$i2,[$rounds,#16]
 | 
			
		||||
	ldr	$i3,[$rounds,#20]
 | 
			
		||||
#ifdef __ARMEL__
 | 
			
		||||
	rev	$i2,$i2
 | 
			
		||||
	rev	$i3,$i3
 | 
			
		||||
#endif
 | 
			
		||||
	str	$i2,[$key],#8
 | 
			
		||||
	str	$i3,[$key,#-4]
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	teq	lr,#192
 | 
			
		||||
	bne	.Lnot192
 | 
			
		||||
@@ -526,6 +588,7 @@ AES_set_encrypt_key:
 | 
			
		||||
	b	.L192_loop
 | 
			
		||||
 | 
			
		||||
.Lnot192:
 | 
			
		||||
#if __ARM_ARCH__<7
 | 
			
		||||
	ldrb	$i2,[$rounds,#27]
 | 
			
		||||
	ldrb	$t1,[$rounds,#26]
 | 
			
		||||
	ldrb	$t2,[$rounds,#25]
 | 
			
		||||
@@ -542,6 +605,16 @@ AES_set_encrypt_key:
 | 
			
		||||
	str	$i2,[$key],#8
 | 
			
		||||
	orr	$i3,$i3,$t3,lsl#24
 | 
			
		||||
	str	$i3,[$key,#-4]
 | 
			
		||||
#else
 | 
			
		||||
	ldr	$i2,[$rounds,#24]
 | 
			
		||||
	ldr	$i3,[$rounds,#28]
 | 
			
		||||
#ifdef __ARMEL__
 | 
			
		||||
	rev	$i2,$i2
 | 
			
		||||
	rev	$i3,$i3
 | 
			
		||||
#endif
 | 
			
		||||
	str	$i2,[$key],#8
 | 
			
		||||
	str	$i3,[$key,#-4]
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	mov	$rounds,#14
 | 
			
		||||
	str	$rounds,[$key,#240-32]
 | 
			
		||||
@@ -606,14 +679,14 @@ AES_set_encrypt_key:
 | 
			
		||||
.Labrt:	tst	lr,#1
 | 
			
		||||
	moveq	pc,lr			@ be binary compatible with V4, yet
 | 
			
		||||
	bx	lr			@ interoperable with Thumb ISA:-)
 | 
			
		||||
.size	AES_set_encrypt_key,.-AES_set_encrypt_key
 | 
			
		||||
.size	private_AES_set_encrypt_key,.-private_AES_set_encrypt_key
 | 
			
		||||
 | 
			
		||||
.global AES_set_decrypt_key
 | 
			
		||||
.type   AES_set_decrypt_key,%function
 | 
			
		||||
.global private_AES_set_decrypt_key
 | 
			
		||||
.type   private_AES_set_decrypt_key,%function
 | 
			
		||||
.align	5
 | 
			
		||||
AES_set_decrypt_key:
 | 
			
		||||
private_AES_set_decrypt_key:
 | 
			
		||||
	str	lr,[sp,#-4]!            @ push lr
 | 
			
		||||
	bl	AES_set_encrypt_key
 | 
			
		||||
	bl	_armv4_AES_set_encrypt_key
 | 
			
		||||
	teq	r0,#0
 | 
			
		||||
	ldrne	lr,[sp],#4              @ pop lr
 | 
			
		||||
	bne	.Labrt
 | 
			
		||||
@@ -692,11 +765,15 @@ $code.=<<___;
 | 
			
		||||
	bne	.Lmix
 | 
			
		||||
 | 
			
		||||
	mov	r0,#0
 | 
			
		||||
#if __ARM_ARCH__>=5
 | 
			
		||||
	ldmia	sp!,{r4-r12,pc}
 | 
			
		||||
#else
 | 
			
		||||
	ldmia   sp!,{r4-r12,lr}
 | 
			
		||||
	tst	lr,#1
 | 
			
		||||
	moveq	pc,lr			@ be binary compatible with V4, yet
 | 
			
		||||
	bx	lr			@ interoperable with Thumb ISA:-)
 | 
			
		||||
.size	AES_set_decrypt_key,.-AES_set_decrypt_key
 | 
			
		||||
#endif
 | 
			
		||||
.size	private_AES_set_decrypt_key,.-private_AES_set_decrypt_key
 | 
			
		||||
 | 
			
		||||
.type	AES_Td,%object
 | 
			
		||||
.align	5
 | 
			
		||||
@@ -811,7 +888,7 @@ AES_decrypt:
 | 
			
		||||
	mov	$rounds,r0		@ inp
 | 
			
		||||
	mov	$key,r2
 | 
			
		||||
	sub	$tbl,r3,#AES_decrypt-AES_Td		@ Td
 | 
			
		||||
 | 
			
		||||
#if __ARM_ARCH__<7
 | 
			
		||||
	ldrb	$s0,[$rounds,#3]	@ load input data in endian-neutral
 | 
			
		||||
	ldrb	$t1,[$rounds,#2]	@ manner...
 | 
			
		||||
	ldrb	$t2,[$rounds,#1]
 | 
			
		||||
@@ -840,10 +917,33 @@ AES_decrypt:
 | 
			
		||||
	orr	$s3,$s3,$t1,lsl#8
 | 
			
		||||
	orr	$s3,$s3,$t2,lsl#16
 | 
			
		||||
	orr	$s3,$s3,$t3,lsl#24
 | 
			
		||||
 | 
			
		||||
#else
 | 
			
		||||
	ldr	$s0,[$rounds,#0]
 | 
			
		||||
	ldr	$s1,[$rounds,#4]
 | 
			
		||||
	ldr	$s2,[$rounds,#8]
 | 
			
		||||
	ldr	$s3,[$rounds,#12]
 | 
			
		||||
#ifdef __ARMEL__
 | 
			
		||||
	rev	$s0,$s0
 | 
			
		||||
	rev	$s1,$s1
 | 
			
		||||
	rev	$s2,$s2
 | 
			
		||||
	rev	$s3,$s3
 | 
			
		||||
#endif
 | 
			
		||||
#endif
 | 
			
		||||
	bl	_armv4_AES_decrypt
 | 
			
		||||
 | 
			
		||||
	ldr	$rounds,[sp],#4		@ pop out
 | 
			
		||||
#if __ARM_ARCH__>=7
 | 
			
		||||
#ifdef __ARMEL__
 | 
			
		||||
	rev	$s0,$s0
 | 
			
		||||
	rev	$s1,$s1
 | 
			
		||||
	rev	$s2,$s2
 | 
			
		||||
	rev	$s3,$s3
 | 
			
		||||
#endif
 | 
			
		||||
	str	$s0,[$rounds,#0]
 | 
			
		||||
	str	$s1,[$rounds,#4]
 | 
			
		||||
	str	$s2,[$rounds,#8]
 | 
			
		||||
	str	$s3,[$rounds,#12]
 | 
			
		||||
#else
 | 
			
		||||
	mov	$t1,$s0,lsr#24		@ write output in endian-neutral
 | 
			
		||||
	mov	$t2,$s0,lsr#16		@ manner...
 | 
			
		||||
	mov	$t3,$s0,lsr#8
 | 
			
		||||
@@ -872,11 +972,15 @@ AES_decrypt:
 | 
			
		||||
	strb	$t2,[$rounds,#13]
 | 
			
		||||
	strb	$t3,[$rounds,#14]
 | 
			
		||||
	strb	$s3,[$rounds,#15]
 | 
			
		||||
 | 
			
		||||
#endif
 | 
			
		||||
#if __ARM_ARCH__>=5
 | 
			
		||||
	ldmia	sp!,{r4-r12,pc}
 | 
			
		||||
#else
 | 
			
		||||
	ldmia   sp!,{r4-r12,lr}
 | 
			
		||||
	tst	lr,#1
 | 
			
		||||
	moveq	pc,lr			@ be binary compatible with V4, yet
 | 
			
		||||
	bx	lr			@ interoperable with Thumb ISA:-)
 | 
			
		||||
#endif
 | 
			
		||||
.size	AES_decrypt,.-AES_decrypt
 | 
			
		||||
 | 
			
		||||
.type   _armv4_AES_decrypt,%function
 | 
			
		||||
@@ -916,11 +1020,11 @@ _armv4_AES_decrypt:
 | 
			
		||||
	and	$i2,lr,$s2		@ i1
 | 
			
		||||
	eor	$t3,$i3,$t3,ror#8
 | 
			
		||||
	and	$i3,lr,$s2,lsr#16
 | 
			
		||||
	eor	$s1,$s1,$t1,ror#8
 | 
			
		||||
	ldr	$i1,[$tbl,$i1,lsl#2]	@ Td2[s2>>8]
 | 
			
		||||
	eor	$s1,$s1,$t1,ror#8
 | 
			
		||||
	ldr	$i2,[$tbl,$i2,lsl#2]	@ Td3[s2>>0]
 | 
			
		||||
	mov	$s2,$s2,lsr#24
 | 
			
		||||
 | 
			
		||||
	ldr	$i2,[$tbl,$i2,lsl#2]	@ Td3[s2>>0]
 | 
			
		||||
	ldr	$i3,[$tbl,$i3,lsl#2]	@ Td1[s2>>16]
 | 
			
		||||
	eor	$s0,$s0,$i1,ror#16
 | 
			
		||||
	ldr	$s2,[$tbl,$s2,lsl#2]	@ Td0[s2>>24]
 | 
			
		||||
@@ -929,22 +1033,22 @@ _armv4_AES_decrypt:
 | 
			
		||||
	and	$i2,lr,$s3,lsr#8	@ i1
 | 
			
		||||
	eor	$t3,$i3,$t3,ror#8
 | 
			
		||||
	and	$i3,lr,$s3		@ i2
 | 
			
		||||
	eor	$s2,$s2,$t2,ror#8
 | 
			
		||||
	ldr	$i1,[$tbl,$i1,lsl#2]	@ Td1[s3>>16]
 | 
			
		||||
	eor	$s2,$s2,$t2,ror#8
 | 
			
		||||
	ldr	$i2,[$tbl,$i2,lsl#2]	@ Td2[s3>>8]
 | 
			
		||||
	mov	$s3,$s3,lsr#24
 | 
			
		||||
 | 
			
		||||
	ldr	$i2,[$tbl,$i2,lsl#2]	@ Td2[s3>>8]
 | 
			
		||||
	ldr	$i3,[$tbl,$i3,lsl#2]	@ Td3[s3>>0]
 | 
			
		||||
	eor	$s0,$s0,$i1,ror#8
 | 
			
		||||
	ldr	$s3,[$tbl,$s3,lsl#2]	@ Td0[s3>>24]
 | 
			
		||||
	eor	$s1,$s1,$i2,ror#16
 | 
			
		||||
	eor	$s2,$s2,$i3,ror#24
 | 
			
		||||
	ldr	$i1,[$key],#16
 | 
			
		||||
	eor	$s3,$s3,$t3,ror#8
 | 
			
		||||
	eor	$s1,$s1,$i2,ror#16
 | 
			
		||||
	ldr	$s3,[$tbl,$s3,lsl#2]	@ Td0[s3>>24]
 | 
			
		||||
	eor	$s2,$s2,$i3,ror#24
 | 
			
		||||
 | 
			
		||||
	ldr	$t1,[$key,#-12]
 | 
			
		||||
	ldr	$t2,[$key,#-8]
 | 
			
		||||
	eor	$s0,$s0,$i1
 | 
			
		||||
	ldr	$t2,[$key,#-8]
 | 
			
		||||
	eor	$s3,$s3,$t3,ror#8
 | 
			
		||||
	ldr	$t3,[$key,#-4]
 | 
			
		||||
	and	$i1,lr,$s0,lsr#16
 | 
			
		||||
	eor	$s1,$s1,$t1
 | 
			
		||||
@@ -985,11 +1089,11 @@ _armv4_AES_decrypt:
 | 
			
		||||
	and	$i1,lr,$s2,lsr#8	@ i0
 | 
			
		||||
	eor	$t2,$t2,$i2,lsl#8
 | 
			
		||||
	and	$i2,lr,$s2		@ i1
 | 
			
		||||
	eor	$t3,$t3,$i3,lsl#8
 | 
			
		||||
	ldrb	$i1,[$tbl,$i1]		@ Td4[s2>>8]
 | 
			
		||||
	eor	$t3,$t3,$i3,lsl#8
 | 
			
		||||
	ldrb	$i2,[$tbl,$i2]		@ Td4[s2>>0]
 | 
			
		||||
	and	$i3,lr,$s2,lsr#16
 | 
			
		||||
 | 
			
		||||
	ldrb	$i2,[$tbl,$i2]		@ Td4[s2>>0]
 | 
			
		||||
	ldrb	$s2,[$tbl,$s2,lsr#24]	@ Td4[s2>>24]
 | 
			
		||||
	eor	$s0,$s0,$i1,lsl#8
 | 
			
		||||
	ldrb	$i3,[$tbl,$i3]		@ Td4[s2>>16]
 | 
			
		||||
@@ -997,11 +1101,11 @@ _armv4_AES_decrypt:
 | 
			
		||||
	and	$i1,lr,$s3,lsr#16	@ i0
 | 
			
		||||
	eor	$s2,$t2,$s2,lsl#16
 | 
			
		||||
	and	$i2,lr,$s3,lsr#8	@ i1
 | 
			
		||||
	eor	$t3,$t3,$i3,lsl#16
 | 
			
		||||
	ldrb	$i1,[$tbl,$i1]		@ Td4[s3>>16]
 | 
			
		||||
	eor	$t3,$t3,$i3,lsl#16
 | 
			
		||||
	ldrb	$i2,[$tbl,$i2]		@ Td4[s3>>8]
 | 
			
		||||
	and	$i3,lr,$s3		@ i2
 | 
			
		||||
 | 
			
		||||
	ldrb	$i2,[$tbl,$i2]		@ Td4[s3>>8]
 | 
			
		||||
	ldrb	$i3,[$tbl,$i3]		@ Td4[s3>>0]
 | 
			
		||||
	ldrb	$s3,[$tbl,$s3,lsr#24]	@ Td4[s3>>24]
 | 
			
		||||
	eor	$s0,$s0,$i1,lsl#16
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										1611
									
								
								crypto/aes/asm/aes-mips.pl
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										1611
									
								
								crypto/aes/asm/aes-mips.pl
									
									
									
									
									
										Normal file
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							
							
								
								
									
										1022
									
								
								crypto/aes/asm/aes-parisc.pl
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										1022
									
								
								crypto/aes/asm/aes-parisc.pl
									
									
									
									
									
										Normal file
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							@@ -7,7 +7,7 @@
 | 
			
		||||
# details see http://www.openssl.org/~appro/cryptogams/.
 | 
			
		||||
# ====================================================================
 | 
			
		||||
 | 
			
		||||
# Needs more work: key setup, page boundaries, CBC routine...
 | 
			
		||||
# Needs more work: key setup, CBC routine...
 | 
			
		||||
#
 | 
			
		||||
# ppc_AES_[en|de]crypt perform at 18 cycles per byte processed with
 | 
			
		||||
# 128-bit key, which is ~40% better than 64-bit code generated by gcc
 | 
			
		||||
@@ -18,7 +18,7 @@
 | 
			
		||||
 | 
			
		||||
# February 2010
 | 
			
		||||
#
 | 
			
		||||
# Rescheduling instructions to favour Power6 pipeline gives 10%
 | 
			
		||||
# Rescheduling instructions to favour Power6 pipeline gave 10%
 | 
			
		||||
# performance improvement on the platfrom in question (and marginal
 | 
			
		||||
# improvement even on others). It should be noted that Power6 fails
 | 
			
		||||
# to process byte in 18 cycles, only in 23, because it fails to issue
 | 
			
		||||
@@ -33,11 +33,13 @@ $flavour = shift;
 | 
			
		||||
 | 
			
		||||
if ($flavour =~ /64/) {
 | 
			
		||||
	$SIZE_T	=8;
 | 
			
		||||
	$LRSAVE	=2*$SIZE_T;
 | 
			
		||||
	$STU	="stdu";
 | 
			
		||||
	$POP	="ld";
 | 
			
		||||
	$PUSH	="std";
 | 
			
		||||
} elsif ($flavour =~ /32/) {
 | 
			
		||||
	$SIZE_T	=4;
 | 
			
		||||
	$LRSAVE	=$SIZE_T;
 | 
			
		||||
	$STU	="stwu";
 | 
			
		||||
	$POP	="lwz";
 | 
			
		||||
	$PUSH	="stw";
 | 
			
		||||
@@ -116,15 +118,19 @@ LAES_Te:
 | 
			
		||||
	addi	$Tbl0,$Tbl0,`128-8`
 | 
			
		||||
	mtlr	r0
 | 
			
		||||
	blr
 | 
			
		||||
	.space	`32-24`
 | 
			
		||||
	.long	0
 | 
			
		||||
	.byte	0,12,0x14,0,0,0,0,0
 | 
			
		||||
	.space	`64-9*4`
 | 
			
		||||
LAES_Td:
 | 
			
		||||
	mflr	r0
 | 
			
		||||
	bcl	20,31,\$+4
 | 
			
		||||
	mflr	$Tbl0	;    vvvvvvvv "distance" between . and 1st data entry
 | 
			
		||||
	addi	$Tbl0,$Tbl0,`128-8-32+2048+256`
 | 
			
		||||
	addi	$Tbl0,$Tbl0,`128-64-8+2048+256`
 | 
			
		||||
	mtlr	r0
 | 
			
		||||
	blr
 | 
			
		||||
	.space	`128-32-24`
 | 
			
		||||
	.long	0
 | 
			
		||||
	.byte	0,12,0x14,0,0,0,0,0
 | 
			
		||||
	.space	`128-64-9*4`
 | 
			
		||||
___
 | 
			
		||||
&_data_word(
 | 
			
		||||
	0xc66363a5, 0xf87c7c84, 0xee777799, 0xf67b7b8d,
 | 
			
		||||
@@ -328,10 +334,9 @@ $code.=<<___;
 | 
			
		||||
.globl	.AES_encrypt
 | 
			
		||||
.align	7
 | 
			
		||||
.AES_encrypt:
 | 
			
		||||
	mflr	r0
 | 
			
		||||
	$STU	$sp,-$FRAME($sp)
 | 
			
		||||
	mflr	r0
 | 
			
		||||
 | 
			
		||||
	$PUSH	r0,`$FRAME-$SIZE_T*21`($sp)
 | 
			
		||||
	$PUSH	$toc,`$FRAME-$SIZE_T*20`($sp)
 | 
			
		||||
	$PUSH	r13,`$FRAME-$SIZE_T*19`($sp)
 | 
			
		||||
	$PUSH	r14,`$FRAME-$SIZE_T*18`($sp)
 | 
			
		||||
@@ -352,7 +357,14 @@ $code.=<<___;
 | 
			
		||||
	$PUSH	r29,`$FRAME-$SIZE_T*3`($sp)
 | 
			
		||||
	$PUSH	r30,`$FRAME-$SIZE_T*2`($sp)
 | 
			
		||||
	$PUSH	r31,`$FRAME-$SIZE_T*1`($sp)
 | 
			
		||||
	$PUSH	r0,`$FRAME+$LRSAVE`($sp)
 | 
			
		||||
 | 
			
		||||
	andi.	$t0,$inp,3
 | 
			
		||||
	andi.	$t1,$out,3
 | 
			
		||||
	or.	$t0,$t0,$t1
 | 
			
		||||
	bne	Lenc_unaligned
 | 
			
		||||
 | 
			
		||||
Lenc_unaligned_ok:
 | 
			
		||||
	lwz	$s0,0($inp)
 | 
			
		||||
	lwz	$s1,4($inp)
 | 
			
		||||
	lwz	$s2,8($inp)
 | 
			
		||||
@@ -363,8 +375,80 @@ $code.=<<___;
 | 
			
		||||
	stw	$s1,4($out)
 | 
			
		||||
	stw	$s2,8($out)
 | 
			
		||||
	stw	$s3,12($out)
 | 
			
		||||
	b	Lenc_done
 | 
			
		||||
 | 
			
		||||
	$POP	r0,`$FRAME-$SIZE_T*21`($sp)
 | 
			
		||||
Lenc_unaligned:
 | 
			
		||||
	subfic	$t0,$inp,4096
 | 
			
		||||
	subfic	$t1,$out,4096
 | 
			
		||||
	andi.	$t0,$t0,4096-16
 | 
			
		||||
	beq	Lenc_xpage
 | 
			
		||||
	andi.	$t1,$t1,4096-16
 | 
			
		||||
	bne	Lenc_unaligned_ok
 | 
			
		||||
 | 
			
		||||
Lenc_xpage:
 | 
			
		||||
	lbz	$acc00,0($inp)
 | 
			
		||||
	lbz	$acc01,1($inp)
 | 
			
		||||
	lbz	$acc02,2($inp)
 | 
			
		||||
	lbz	$s0,3($inp)
 | 
			
		||||
	lbz	$acc04,4($inp)
 | 
			
		||||
	lbz	$acc05,5($inp)
 | 
			
		||||
	lbz	$acc06,6($inp)
 | 
			
		||||
	lbz	$s1,7($inp)
 | 
			
		||||
	lbz	$acc08,8($inp)
 | 
			
		||||
	lbz	$acc09,9($inp)
 | 
			
		||||
	lbz	$acc10,10($inp)
 | 
			
		||||
	insrwi	$s0,$acc00,8,0
 | 
			
		||||
	lbz	$s2,11($inp)
 | 
			
		||||
	insrwi	$s1,$acc04,8,0
 | 
			
		||||
	lbz	$acc12,12($inp)
 | 
			
		||||
	insrwi	$s0,$acc01,8,8
 | 
			
		||||
	lbz	$acc13,13($inp)
 | 
			
		||||
	insrwi	$s1,$acc05,8,8
 | 
			
		||||
	lbz	$acc14,14($inp)
 | 
			
		||||
	insrwi	$s0,$acc02,8,16
 | 
			
		||||
	lbz	$s3,15($inp)
 | 
			
		||||
	insrwi	$s1,$acc06,8,16
 | 
			
		||||
	insrwi	$s2,$acc08,8,0
 | 
			
		||||
	insrwi	$s3,$acc12,8,0
 | 
			
		||||
	insrwi	$s2,$acc09,8,8
 | 
			
		||||
	insrwi	$s3,$acc13,8,8
 | 
			
		||||
	insrwi	$s2,$acc10,8,16
 | 
			
		||||
	insrwi	$s3,$acc14,8,16
 | 
			
		||||
 | 
			
		||||
	bl	LAES_Te
 | 
			
		||||
	bl	Lppc_AES_encrypt_compact
 | 
			
		||||
 | 
			
		||||
	extrwi	$acc00,$s0,8,0
 | 
			
		||||
	extrwi	$acc01,$s0,8,8
 | 
			
		||||
	stb	$acc00,0($out)
 | 
			
		||||
	extrwi	$acc02,$s0,8,16
 | 
			
		||||
	stb	$acc01,1($out)
 | 
			
		||||
	stb	$acc02,2($out)
 | 
			
		||||
	extrwi	$acc04,$s1,8,0
 | 
			
		||||
	stb	$s0,3($out)
 | 
			
		||||
	extrwi	$acc05,$s1,8,8
 | 
			
		||||
	stb	$acc04,4($out)
 | 
			
		||||
	extrwi	$acc06,$s1,8,16
 | 
			
		||||
	stb	$acc05,5($out)
 | 
			
		||||
	stb	$acc06,6($out)
 | 
			
		||||
	extrwi	$acc08,$s2,8,0
 | 
			
		||||
	stb	$s1,7($out)
 | 
			
		||||
	extrwi	$acc09,$s2,8,8
 | 
			
		||||
	stb	$acc08,8($out)
 | 
			
		||||
	extrwi	$acc10,$s2,8,16
 | 
			
		||||
	stb	$acc09,9($out)
 | 
			
		||||
	stb	$acc10,10($out)
 | 
			
		||||
	extrwi	$acc12,$s3,8,0
 | 
			
		||||
	stb	$s2,11($out)
 | 
			
		||||
	extrwi	$acc13,$s3,8,8
 | 
			
		||||
	stb	$acc12,12($out)
 | 
			
		||||
	extrwi	$acc14,$s3,8,16
 | 
			
		||||
	stb	$acc13,13($out)
 | 
			
		||||
	stb	$acc14,14($out)
 | 
			
		||||
	stb	$s3,15($out)
 | 
			
		||||
 | 
			
		||||
Lenc_done:
 | 
			
		||||
	$POP	r0,`$FRAME+$LRSAVE`($sp)
 | 
			
		||||
	$POP	$toc,`$FRAME-$SIZE_T*20`($sp)
 | 
			
		||||
	$POP	r13,`$FRAME-$SIZE_T*19`($sp)
 | 
			
		||||
	$POP	r14,`$FRAME-$SIZE_T*18`($sp)
 | 
			
		||||
@@ -388,18 +472,21 @@ $code.=<<___;
 | 
			
		||||
	mtlr	r0
 | 
			
		||||
	addi	$sp,$sp,$FRAME
 | 
			
		||||
	blr
 | 
			
		||||
	.long	0
 | 
			
		||||
	.byte	0,12,4,1,0x80,18,3,0
 | 
			
		||||
	.long	0
 | 
			
		||||
 | 
			
		||||
.align	5
 | 
			
		||||
Lppc_AES_encrypt:
 | 
			
		||||
	lwz	$acc00,240($key)
 | 
			
		||||
	lwz	$t0,0($key)
 | 
			
		||||
	lwz	$t1,4($key)
 | 
			
		||||
	lwz	$t2,8($key)
 | 
			
		||||
	lwz	$t3,12($key)
 | 
			
		||||
	addi	$Tbl1,$Tbl0,3
 | 
			
		||||
	lwz	$t0,0($key)
 | 
			
		||||
	addi	$Tbl2,$Tbl0,2
 | 
			
		||||
	lwz	$t1,4($key)
 | 
			
		||||
	addi	$Tbl3,$Tbl0,1
 | 
			
		||||
	lwz	$t2,8($key)
 | 
			
		||||
	addi	$acc00,$acc00,-1
 | 
			
		||||
	lwz	$t3,12($key)
 | 
			
		||||
	addi	$key,$key,16
 | 
			
		||||
	xor	$s0,$s0,$t0
 | 
			
		||||
	xor	$s1,$s1,$t1
 | 
			
		||||
@@ -413,44 +500,44 @@ Lenc_loop:
 | 
			
		||||
	rlwinm	$acc02,$s2,`32-24+3`,21,28
 | 
			
		||||
	rlwinm	$acc03,$s3,`32-24+3`,21,28
 | 
			
		||||
	lwz	$t0,0($key)
 | 
			
		||||
	lwz	$t1,4($key)
 | 
			
		||||
	rlwinm	$acc04,$s1,`32-16+3`,21,28
 | 
			
		||||
	lwz	$t1,4($key)
 | 
			
		||||
	rlwinm	$acc05,$s2,`32-16+3`,21,28
 | 
			
		||||
	lwz	$t2,8($key)
 | 
			
		||||
	lwz	$t3,12($key)
 | 
			
		||||
	rlwinm	$acc06,$s3,`32-16+3`,21,28
 | 
			
		||||
	lwz	$t3,12($key)
 | 
			
		||||
	rlwinm	$acc07,$s0,`32-16+3`,21,28
 | 
			
		||||
	lwzx	$acc00,$Tbl0,$acc00
 | 
			
		||||
	lwzx	$acc01,$Tbl0,$acc01
 | 
			
		||||
	rlwinm	$acc08,$s2,`32-8+3`,21,28
 | 
			
		||||
	lwzx	$acc01,$Tbl0,$acc01
 | 
			
		||||
	rlwinm	$acc09,$s3,`32-8+3`,21,28
 | 
			
		||||
	lwzx	$acc02,$Tbl0,$acc02
 | 
			
		||||
	lwzx	$acc03,$Tbl0,$acc03
 | 
			
		||||
	rlwinm	$acc10,$s0,`32-8+3`,21,28
 | 
			
		||||
	lwzx	$acc03,$Tbl0,$acc03
 | 
			
		||||
	rlwinm	$acc11,$s1,`32-8+3`,21,28
 | 
			
		||||
	lwzx	$acc04,$Tbl1,$acc04
 | 
			
		||||
	lwzx	$acc05,$Tbl1,$acc05
 | 
			
		||||
	rlwinm	$acc12,$s3,`0+3`,21,28
 | 
			
		||||
	lwzx	$acc05,$Tbl1,$acc05
 | 
			
		||||
	rlwinm	$acc13,$s0,`0+3`,21,28
 | 
			
		||||
	lwzx	$acc06,$Tbl1,$acc06
 | 
			
		||||
	lwzx	$acc07,$Tbl1,$acc07
 | 
			
		||||
	rlwinm	$acc14,$s1,`0+3`,21,28
 | 
			
		||||
	lwzx	$acc07,$Tbl1,$acc07
 | 
			
		||||
	rlwinm	$acc15,$s2,`0+3`,21,28
 | 
			
		||||
	lwzx	$acc08,$Tbl2,$acc08
 | 
			
		||||
	lwzx	$acc09,$Tbl2,$acc09
 | 
			
		||||
	xor	$t0,$t0,$acc00
 | 
			
		||||
	lwzx	$acc09,$Tbl2,$acc09
 | 
			
		||||
	xor	$t1,$t1,$acc01
 | 
			
		||||
	lwzx	$acc10,$Tbl2,$acc10
 | 
			
		||||
	lwzx	$acc11,$Tbl2,$acc11
 | 
			
		||||
	xor	$t2,$t2,$acc02
 | 
			
		||||
	lwzx	$acc11,$Tbl2,$acc11
 | 
			
		||||
	xor	$t3,$t3,$acc03
 | 
			
		||||
	lwzx	$acc12,$Tbl3,$acc12
 | 
			
		||||
	lwzx	$acc13,$Tbl3,$acc13
 | 
			
		||||
	xor	$t0,$t0,$acc04
 | 
			
		||||
	lwzx	$acc13,$Tbl3,$acc13
 | 
			
		||||
	xor	$t1,$t1,$acc05
 | 
			
		||||
	lwzx	$acc14,$Tbl3,$acc14
 | 
			
		||||
	lwzx	$acc15,$Tbl3,$acc15
 | 
			
		||||
	xor	$t2,$t2,$acc06
 | 
			
		||||
	lwzx	$acc15,$Tbl3,$acc15
 | 
			
		||||
	xor	$t3,$t3,$acc07
 | 
			
		||||
	xor	$t0,$t0,$acc08
 | 
			
		||||
	xor	$t1,$t1,$acc09
 | 
			
		||||
@@ -466,60 +553,60 @@ Lenc_loop:
 | 
			
		||||
	addi	$Tbl2,$Tbl0,2048
 | 
			
		||||
	nop
 | 
			
		||||
	lwz	$t0,0($key)
 | 
			
		||||
	lwz	$t1,4($key)
 | 
			
		||||
	rlwinm	$acc00,$s0,`32-24`,24,31
 | 
			
		||||
	lwz	$t1,4($key)
 | 
			
		||||
	rlwinm	$acc01,$s1,`32-24`,24,31
 | 
			
		||||
	lwz	$t2,8($key)
 | 
			
		||||
	lwz	$t3,12($key)
 | 
			
		||||
	rlwinm	$acc02,$s2,`32-24`,24,31
 | 
			
		||||
	lwz	$t3,12($key)
 | 
			
		||||
	rlwinm	$acc03,$s3,`32-24`,24,31
 | 
			
		||||
	lwz	$acc08,`2048+0`($Tbl0)	! prefetch Te4
 | 
			
		||||
	lwz	$acc09,`2048+32`($Tbl0)
 | 
			
		||||
	rlwinm	$acc04,$s1,`32-16`,24,31
 | 
			
		||||
	lwz	$acc09,`2048+32`($Tbl0)
 | 
			
		||||
	rlwinm	$acc05,$s2,`32-16`,24,31
 | 
			
		||||
	lwz	$acc10,`2048+64`($Tbl0)
 | 
			
		||||
	lwz	$acc11,`2048+96`($Tbl0)
 | 
			
		||||
	rlwinm	$acc06,$s3,`32-16`,24,31
 | 
			
		||||
	lwz	$acc11,`2048+96`($Tbl0)
 | 
			
		||||
	rlwinm	$acc07,$s0,`32-16`,24,31
 | 
			
		||||
	lwz	$acc12,`2048+128`($Tbl0)
 | 
			
		||||
	lwz	$acc13,`2048+160`($Tbl0)
 | 
			
		||||
	rlwinm	$acc08,$s2,`32-8`,24,31
 | 
			
		||||
	lwz	$acc13,`2048+160`($Tbl0)
 | 
			
		||||
	rlwinm	$acc09,$s3,`32-8`,24,31
 | 
			
		||||
	lwz	$acc14,`2048+192`($Tbl0)
 | 
			
		||||
	lwz	$acc15,`2048+224`($Tbl0)
 | 
			
		||||
	rlwinm	$acc10,$s0,`32-8`,24,31
 | 
			
		||||
	lwz	$acc15,`2048+224`($Tbl0)
 | 
			
		||||
	rlwinm	$acc11,$s1,`32-8`,24,31
 | 
			
		||||
	lbzx	$acc00,$Tbl2,$acc00
 | 
			
		||||
	lbzx	$acc01,$Tbl2,$acc01
 | 
			
		||||
	rlwinm	$acc12,$s3,`0`,24,31
 | 
			
		||||
	lbzx	$acc01,$Tbl2,$acc01
 | 
			
		||||
	rlwinm	$acc13,$s0,`0`,24,31
 | 
			
		||||
	lbzx	$acc02,$Tbl2,$acc02
 | 
			
		||||
	lbzx	$acc03,$Tbl2,$acc03
 | 
			
		||||
	rlwinm	$acc14,$s1,`0`,24,31
 | 
			
		||||
	lbzx	$acc03,$Tbl2,$acc03
 | 
			
		||||
	rlwinm	$acc15,$s2,`0`,24,31
 | 
			
		||||
	lbzx	$acc04,$Tbl2,$acc04
 | 
			
		||||
	lbzx	$acc05,$Tbl2,$acc05
 | 
			
		||||
	rlwinm	$s0,$acc00,24,0,7
 | 
			
		||||
	lbzx	$acc05,$Tbl2,$acc05
 | 
			
		||||
	rlwinm	$s1,$acc01,24,0,7
 | 
			
		||||
	lbzx	$acc06,$Tbl2,$acc06
 | 
			
		||||
	lbzx	$acc07,$Tbl2,$acc07
 | 
			
		||||
	rlwinm	$s2,$acc02,24,0,7
 | 
			
		||||
	lbzx	$acc07,$Tbl2,$acc07
 | 
			
		||||
	rlwinm	$s3,$acc03,24,0,7
 | 
			
		||||
	lbzx	$acc08,$Tbl2,$acc08
 | 
			
		||||
	lbzx	$acc09,$Tbl2,$acc09
 | 
			
		||||
	rlwimi	$s0,$acc04,16,8,15
 | 
			
		||||
	lbzx	$acc09,$Tbl2,$acc09
 | 
			
		||||
	rlwimi	$s1,$acc05,16,8,15
 | 
			
		||||
	lbzx	$acc10,$Tbl2,$acc10
 | 
			
		||||
	lbzx	$acc11,$Tbl2,$acc11
 | 
			
		||||
	rlwimi	$s2,$acc06,16,8,15
 | 
			
		||||
	lbzx	$acc11,$Tbl2,$acc11
 | 
			
		||||
	rlwimi	$s3,$acc07,16,8,15
 | 
			
		||||
	lbzx	$acc12,$Tbl2,$acc12
 | 
			
		||||
	lbzx	$acc13,$Tbl2,$acc13
 | 
			
		||||
	rlwimi	$s0,$acc08,8,16,23
 | 
			
		||||
	lbzx	$acc13,$Tbl2,$acc13
 | 
			
		||||
	rlwimi	$s1,$acc09,8,16,23
 | 
			
		||||
	lbzx	$acc14,$Tbl2,$acc14
 | 
			
		||||
	lbzx	$acc15,$Tbl2,$acc15
 | 
			
		||||
	rlwimi	$s2,$acc10,8,16,23
 | 
			
		||||
	lbzx	$acc15,$Tbl2,$acc15
 | 
			
		||||
	rlwimi	$s3,$acc11,8,16,23
 | 
			
		||||
	or	$s0,$s0,$acc12
 | 
			
		||||
	or	$s1,$s1,$acc13
 | 
			
		||||
@@ -530,29 +617,31 @@ Lenc_loop:
 | 
			
		||||
	xor	$s2,$s2,$t2
 | 
			
		||||
	xor	$s3,$s3,$t3
 | 
			
		||||
	blr
 | 
			
		||||
	.long	0
 | 
			
		||||
	.byte	0,12,0x14,0,0,0,0,0
 | 
			
		||||
 | 
			
		||||
.align	4
 | 
			
		||||
Lppc_AES_encrypt_compact:
 | 
			
		||||
	lwz	$acc00,240($key)
 | 
			
		||||
	lwz	$t0,0($key)
 | 
			
		||||
	lwz	$t1,4($key)
 | 
			
		||||
	lwz	$t2,8($key)
 | 
			
		||||
	lwz	$t3,12($key)
 | 
			
		||||
	addi	$Tbl1,$Tbl0,2048
 | 
			
		||||
	lwz	$t0,0($key)
 | 
			
		||||
	lis	$mask80,0x8080
 | 
			
		||||
	lwz	$t1,4($key)
 | 
			
		||||
	lis	$mask1b,0x1b1b
 | 
			
		||||
	addi	$key,$key,16
 | 
			
		||||
	lwz	$t2,8($key)
 | 
			
		||||
	ori	$mask80,$mask80,0x8080
 | 
			
		||||
	lwz	$t3,12($key)
 | 
			
		||||
	ori	$mask1b,$mask1b,0x1b1b
 | 
			
		||||
	addi	$key,$key,16
 | 
			
		||||
	mtctr	$acc00
 | 
			
		||||
.align	4
 | 
			
		||||
Lenc_compact_loop:
 | 
			
		||||
	xor	$s0,$s0,$t0
 | 
			
		||||
	xor	$s1,$s1,$t1
 | 
			
		||||
	xor	$s2,$s2,$t2
 | 
			
		||||
	xor	$s3,$s3,$t3
 | 
			
		||||
	rlwinm	$acc00,$s0,`32-24`,24,31
 | 
			
		||||
	xor	$s2,$s2,$t2
 | 
			
		||||
	rlwinm	$acc01,$s1,`32-24`,24,31
 | 
			
		||||
	xor	$s3,$s3,$t3
 | 
			
		||||
	rlwinm	$acc02,$s2,`32-24`,24,31
 | 
			
		||||
	rlwinm	$acc03,$s3,`32-24`,24,31
 | 
			
		||||
	rlwinm	$acc04,$s1,`32-16`,24,31
 | 
			
		||||
@@ -560,48 +649,48 @@ Lenc_compact_loop:
 | 
			
		||||
	rlwinm	$acc06,$s3,`32-16`,24,31
 | 
			
		||||
	rlwinm	$acc07,$s0,`32-16`,24,31
 | 
			
		||||
	lbzx	$acc00,$Tbl1,$acc00
 | 
			
		||||
	lbzx	$acc01,$Tbl1,$acc01
 | 
			
		||||
	rlwinm	$acc08,$s2,`32-8`,24,31
 | 
			
		||||
	lbzx	$acc01,$Tbl1,$acc01
 | 
			
		||||
	rlwinm	$acc09,$s3,`32-8`,24,31
 | 
			
		||||
	lbzx	$acc02,$Tbl1,$acc02
 | 
			
		||||
	lbzx	$acc03,$Tbl1,$acc03
 | 
			
		||||
	rlwinm	$acc10,$s0,`32-8`,24,31
 | 
			
		||||
	lbzx	$acc03,$Tbl1,$acc03
 | 
			
		||||
	rlwinm	$acc11,$s1,`32-8`,24,31
 | 
			
		||||
	lbzx	$acc04,$Tbl1,$acc04
 | 
			
		||||
	lbzx	$acc05,$Tbl1,$acc05
 | 
			
		||||
	rlwinm	$acc12,$s3,`0`,24,31
 | 
			
		||||
	lbzx	$acc05,$Tbl1,$acc05
 | 
			
		||||
	rlwinm	$acc13,$s0,`0`,24,31
 | 
			
		||||
	lbzx	$acc06,$Tbl1,$acc06
 | 
			
		||||
	lbzx	$acc07,$Tbl1,$acc07
 | 
			
		||||
	rlwinm	$acc14,$s1,`0`,24,31
 | 
			
		||||
	lbzx	$acc07,$Tbl1,$acc07
 | 
			
		||||
	rlwinm	$acc15,$s2,`0`,24,31
 | 
			
		||||
	lbzx	$acc08,$Tbl1,$acc08
 | 
			
		||||
	lbzx	$acc09,$Tbl1,$acc09
 | 
			
		||||
	rlwinm	$s0,$acc00,24,0,7
 | 
			
		||||
	lbzx	$acc09,$Tbl1,$acc09
 | 
			
		||||
	rlwinm	$s1,$acc01,24,0,7
 | 
			
		||||
	lbzx	$acc10,$Tbl1,$acc10
 | 
			
		||||
	lbzx	$acc11,$Tbl1,$acc11
 | 
			
		||||
	rlwinm	$s2,$acc02,24,0,7
 | 
			
		||||
	lbzx	$acc11,$Tbl1,$acc11
 | 
			
		||||
	rlwinm	$s3,$acc03,24,0,7
 | 
			
		||||
	lbzx	$acc12,$Tbl1,$acc12
 | 
			
		||||
	lbzx	$acc13,$Tbl1,$acc13
 | 
			
		||||
	rlwimi	$s0,$acc04,16,8,15
 | 
			
		||||
	lbzx	$acc13,$Tbl1,$acc13
 | 
			
		||||
	rlwimi	$s1,$acc05,16,8,15
 | 
			
		||||
	lbzx	$acc14,$Tbl1,$acc14
 | 
			
		||||
	lbzx	$acc15,$Tbl1,$acc15
 | 
			
		||||
	rlwimi	$s2,$acc06,16,8,15
 | 
			
		||||
	lbzx	$acc15,$Tbl1,$acc15
 | 
			
		||||
	rlwimi	$s3,$acc07,16,8,15
 | 
			
		||||
	rlwimi	$s0,$acc08,8,16,23
 | 
			
		||||
	rlwimi	$s1,$acc09,8,16,23
 | 
			
		||||
	rlwimi	$s2,$acc10,8,16,23
 | 
			
		||||
	rlwimi	$s3,$acc11,8,16,23
 | 
			
		||||
	lwz	$t0,0($key)
 | 
			
		||||
	lwz	$t1,4($key)
 | 
			
		||||
	or	$s0,$s0,$acc12
 | 
			
		||||
	lwz	$t1,4($key)
 | 
			
		||||
	or	$s1,$s1,$acc13
 | 
			
		||||
	lwz	$t2,8($key)
 | 
			
		||||
	lwz	$t3,12($key)
 | 
			
		||||
	or	$s2,$s2,$acc14
 | 
			
		||||
	lwz	$t3,12($key)
 | 
			
		||||
	or	$s3,$s3,$acc15
 | 
			
		||||
 | 
			
		||||
	addi	$key,$key,16
 | 
			
		||||
@@ -612,12 +701,12 @@ Lenc_compact_loop:
 | 
			
		||||
	and	$acc02,$s2,$mask80
 | 
			
		||||
	and	$acc03,$s3,$mask80
 | 
			
		||||
	srwi	$acc04,$acc00,7		# r1>>7
 | 
			
		||||
	srwi	$acc05,$acc01,7
 | 
			
		||||
	srwi	$acc06,$acc02,7
 | 
			
		||||
	srwi	$acc07,$acc03,7
 | 
			
		||||
	andc	$acc08,$s0,$mask80	# r0&0x7f7f7f7f
 | 
			
		||||
	srwi	$acc05,$acc01,7
 | 
			
		||||
	andc	$acc09,$s1,$mask80
 | 
			
		||||
	srwi	$acc06,$acc02,7
 | 
			
		||||
	andc	$acc10,$s2,$mask80
 | 
			
		||||
	srwi	$acc07,$acc03,7
 | 
			
		||||
	andc	$acc11,$s3,$mask80
 | 
			
		||||
	sub	$acc00,$acc00,$acc04	# r1-(r1>>7)
 | 
			
		||||
	sub	$acc01,$acc01,$acc05
 | 
			
		||||
@@ -633,32 +722,32 @@ Lenc_compact_loop:
 | 
			
		||||
	and	$acc03,$acc03,$mask1b
 | 
			
		||||
	xor	$acc00,$acc00,$acc08	# r2
 | 
			
		||||
	xor	$acc01,$acc01,$acc09
 | 
			
		||||
	 rotlwi	$acc12,$s0,16		# ROTATE(r0,16)
 | 
			
		||||
	xor	$acc02,$acc02,$acc10
 | 
			
		||||
	 rotlwi	$acc13,$s1,16
 | 
			
		||||
	xor	$acc03,$acc03,$acc11
 | 
			
		||||
	 rotlwi	$acc14,$s2,16
 | 
			
		||||
 | 
			
		||||
	rotlwi	$acc12,$s0,16		# ROTATE(r0,16)
 | 
			
		||||
	rotlwi	$acc13,$s1,16
 | 
			
		||||
	rotlwi	$acc14,$s2,16
 | 
			
		||||
	rotlwi	$acc15,$s3,16
 | 
			
		||||
	xor	$s0,$s0,$acc00		# r0^r2
 | 
			
		||||
	rotlwi	$acc15,$s3,16
 | 
			
		||||
	xor	$s1,$s1,$acc01
 | 
			
		||||
	xor	$s2,$s2,$acc02
 | 
			
		||||
	xor	$s3,$s3,$acc03
 | 
			
		||||
	rotrwi	$s0,$s0,24		# ROTATE(r2^r0,24)
 | 
			
		||||
	xor	$s2,$s2,$acc02
 | 
			
		||||
	rotrwi	$s1,$s1,24
 | 
			
		||||
	xor	$s3,$s3,$acc03
 | 
			
		||||
	rotrwi	$s2,$s2,24
 | 
			
		||||
	rotrwi	$s3,$s3,24
 | 
			
		||||
	xor	$s0,$s0,$acc00		# ROTATE(r2^r0,24)^r2
 | 
			
		||||
	rotrwi	$s3,$s3,24
 | 
			
		||||
	xor	$s1,$s1,$acc01
 | 
			
		||||
	xor	$s2,$s2,$acc02
 | 
			
		||||
	xor	$s3,$s3,$acc03
 | 
			
		||||
	rotlwi	$acc08,$acc12,8		# ROTATE(r0,24)
 | 
			
		||||
	rotlwi	$acc09,$acc13,8
 | 
			
		||||
	rotlwi	$acc10,$acc14,8
 | 
			
		||||
	rotlwi	$acc11,$acc15,8
 | 
			
		||||
	xor	$s0,$s0,$acc12		#
 | 
			
		||||
	rotlwi	$acc09,$acc13,8
 | 
			
		||||
	xor	$s1,$s1,$acc13
 | 
			
		||||
	rotlwi	$acc10,$acc14,8
 | 
			
		||||
	xor	$s2,$s2,$acc14
 | 
			
		||||
	rotlwi	$acc11,$acc15,8
 | 
			
		||||
	xor	$s3,$s3,$acc15
 | 
			
		||||
	xor	$s0,$s0,$acc08		#
 | 
			
		||||
	xor	$s1,$s1,$acc09
 | 
			
		||||
@@ -673,14 +762,15 @@ Lenc_compact_done:
 | 
			
		||||
	xor	$s2,$s2,$t2
 | 
			
		||||
	xor	$s3,$s3,$t3
 | 
			
		||||
	blr
 | 
			
		||||
	.long	0
 | 
			
		||||
	.byte	0,12,0x14,0,0,0,0,0
 | 
			
		||||
 | 
			
		||||
.globl	.AES_decrypt
 | 
			
		||||
.align	7
 | 
			
		||||
.AES_decrypt:
 | 
			
		||||
	mflr	r0
 | 
			
		||||
	$STU	$sp,-$FRAME($sp)
 | 
			
		||||
	mflr	r0
 | 
			
		||||
 | 
			
		||||
	$PUSH	r0,`$FRAME-$SIZE_T*21`($sp)
 | 
			
		||||
	$PUSH	$toc,`$FRAME-$SIZE_T*20`($sp)
 | 
			
		||||
	$PUSH	r13,`$FRAME-$SIZE_T*19`($sp)
 | 
			
		||||
	$PUSH	r14,`$FRAME-$SIZE_T*18`($sp)
 | 
			
		||||
@@ -701,7 +791,14 @@ Lenc_compact_done:
 | 
			
		||||
	$PUSH	r29,`$FRAME-$SIZE_T*3`($sp)
 | 
			
		||||
	$PUSH	r30,`$FRAME-$SIZE_T*2`($sp)
 | 
			
		||||
	$PUSH	r31,`$FRAME-$SIZE_T*1`($sp)
 | 
			
		||||
	$PUSH	r0,`$FRAME+$LRSAVE`($sp)
 | 
			
		||||
 | 
			
		||||
	andi.	$t0,$inp,3
 | 
			
		||||
	andi.	$t1,$out,3
 | 
			
		||||
	or.	$t0,$t0,$t1
 | 
			
		||||
	bne	Ldec_unaligned
 | 
			
		||||
 | 
			
		||||
Ldec_unaligned_ok:
 | 
			
		||||
	lwz	$s0,0($inp)
 | 
			
		||||
	lwz	$s1,4($inp)
 | 
			
		||||
	lwz	$s2,8($inp)
 | 
			
		||||
@@ -712,8 +809,80 @@ Lenc_compact_done:
 | 
			
		||||
	stw	$s1,4($out)
 | 
			
		||||
	stw	$s2,8($out)
 | 
			
		||||
	stw	$s3,12($out)
 | 
			
		||||
	b	Ldec_done
 | 
			
		||||
 | 
			
		||||
	$POP	r0,`$FRAME-$SIZE_T*21`($sp)
 | 
			
		||||
Ldec_unaligned:
 | 
			
		||||
	subfic	$t0,$inp,4096
 | 
			
		||||
	subfic	$t1,$out,4096
 | 
			
		||||
	andi.	$t0,$t0,4096-16
 | 
			
		||||
	beq	Ldec_xpage
 | 
			
		||||
	andi.	$t1,$t1,4096-16
 | 
			
		||||
	bne	Ldec_unaligned_ok
 | 
			
		||||
 | 
			
		||||
Ldec_xpage:
 | 
			
		||||
	lbz	$acc00,0($inp)
 | 
			
		||||
	lbz	$acc01,1($inp)
 | 
			
		||||
	lbz	$acc02,2($inp)
 | 
			
		||||
	lbz	$s0,3($inp)
 | 
			
		||||
	lbz	$acc04,4($inp)
 | 
			
		||||
	lbz	$acc05,5($inp)
 | 
			
		||||
	lbz	$acc06,6($inp)
 | 
			
		||||
	lbz	$s1,7($inp)
 | 
			
		||||
	lbz	$acc08,8($inp)
 | 
			
		||||
	lbz	$acc09,9($inp)
 | 
			
		||||
	lbz	$acc10,10($inp)
 | 
			
		||||
	insrwi	$s0,$acc00,8,0
 | 
			
		||||
	lbz	$s2,11($inp)
 | 
			
		||||
	insrwi	$s1,$acc04,8,0
 | 
			
		||||
	lbz	$acc12,12($inp)
 | 
			
		||||
	insrwi	$s0,$acc01,8,8
 | 
			
		||||
	lbz	$acc13,13($inp)
 | 
			
		||||
	insrwi	$s1,$acc05,8,8
 | 
			
		||||
	lbz	$acc14,14($inp)
 | 
			
		||||
	insrwi	$s0,$acc02,8,16
 | 
			
		||||
	lbz	$s3,15($inp)
 | 
			
		||||
	insrwi	$s1,$acc06,8,16
 | 
			
		||||
	insrwi	$s2,$acc08,8,0
 | 
			
		||||
	insrwi	$s3,$acc12,8,0
 | 
			
		||||
	insrwi	$s2,$acc09,8,8
 | 
			
		||||
	insrwi	$s3,$acc13,8,8
 | 
			
		||||
	insrwi	$s2,$acc10,8,16
 | 
			
		||||
	insrwi	$s3,$acc14,8,16
 | 
			
		||||
 | 
			
		||||
	bl	LAES_Td
 | 
			
		||||
	bl	Lppc_AES_decrypt_compact
 | 
			
		||||
 | 
			
		||||
	extrwi	$acc00,$s0,8,0
 | 
			
		||||
	extrwi	$acc01,$s0,8,8
 | 
			
		||||
	stb	$acc00,0($out)
 | 
			
		||||
	extrwi	$acc02,$s0,8,16
 | 
			
		||||
	stb	$acc01,1($out)
 | 
			
		||||
	stb	$acc02,2($out)
 | 
			
		||||
	extrwi	$acc04,$s1,8,0
 | 
			
		||||
	stb	$s0,3($out)
 | 
			
		||||
	extrwi	$acc05,$s1,8,8
 | 
			
		||||
	stb	$acc04,4($out)
 | 
			
		||||
	extrwi	$acc06,$s1,8,16
 | 
			
		||||
	stb	$acc05,5($out)
 | 
			
		||||
	stb	$acc06,6($out)
 | 
			
		||||
	extrwi	$acc08,$s2,8,0
 | 
			
		||||
	stb	$s1,7($out)
 | 
			
		||||
	extrwi	$acc09,$s2,8,8
 | 
			
		||||
	stb	$acc08,8($out)
 | 
			
		||||
	extrwi	$acc10,$s2,8,16
 | 
			
		||||
	stb	$acc09,9($out)
 | 
			
		||||
	stb	$acc10,10($out)
 | 
			
		||||
	extrwi	$acc12,$s3,8,0
 | 
			
		||||
	stb	$s2,11($out)
 | 
			
		||||
	extrwi	$acc13,$s3,8,8
 | 
			
		||||
	stb	$acc12,12($out)
 | 
			
		||||
	extrwi	$acc14,$s3,8,16
 | 
			
		||||
	stb	$acc13,13($out)
 | 
			
		||||
	stb	$acc14,14($out)
 | 
			
		||||
	stb	$s3,15($out)
 | 
			
		||||
 | 
			
		||||
Ldec_done:
 | 
			
		||||
	$POP	r0,`$FRAME+$LRSAVE`($sp)
 | 
			
		||||
	$POP	$toc,`$FRAME-$SIZE_T*20`($sp)
 | 
			
		||||
	$POP	r13,`$FRAME-$SIZE_T*19`($sp)
 | 
			
		||||
	$POP	r14,`$FRAME-$SIZE_T*18`($sp)
 | 
			
		||||
@@ -737,18 +906,21 @@ Lenc_compact_done:
 | 
			
		||||
	mtlr	r0
 | 
			
		||||
	addi	$sp,$sp,$FRAME
 | 
			
		||||
	blr
 | 
			
		||||
	.long	0
 | 
			
		||||
	.byte	0,12,4,1,0x80,18,3,0
 | 
			
		||||
	.long	0
 | 
			
		||||
 | 
			
		||||
.align	5
 | 
			
		||||
Lppc_AES_decrypt:
 | 
			
		||||
	lwz	$acc00,240($key)
 | 
			
		||||
	lwz	$t0,0($key)
 | 
			
		||||
	lwz	$t1,4($key)
 | 
			
		||||
	lwz	$t2,8($key)
 | 
			
		||||
	lwz	$t3,12($key)
 | 
			
		||||
	addi	$Tbl1,$Tbl0,3
 | 
			
		||||
	lwz	$t0,0($key)
 | 
			
		||||
	addi	$Tbl2,$Tbl0,2
 | 
			
		||||
	lwz	$t1,4($key)
 | 
			
		||||
	addi	$Tbl3,$Tbl0,1
 | 
			
		||||
	lwz	$t2,8($key)
 | 
			
		||||
	addi	$acc00,$acc00,-1
 | 
			
		||||
	lwz	$t3,12($key)
 | 
			
		||||
	addi	$key,$key,16
 | 
			
		||||
	xor	$s0,$s0,$t0
 | 
			
		||||
	xor	$s1,$s1,$t1
 | 
			
		||||
@@ -762,44 +934,44 @@ Ldec_loop:
 | 
			
		||||
	rlwinm	$acc02,$s2,`32-24+3`,21,28
 | 
			
		||||
	rlwinm	$acc03,$s3,`32-24+3`,21,28
 | 
			
		||||
	lwz	$t0,0($key)
 | 
			
		||||
	lwz	$t1,4($key)
 | 
			
		||||
	rlwinm	$acc04,$s3,`32-16+3`,21,28
 | 
			
		||||
	lwz	$t1,4($key)
 | 
			
		||||
	rlwinm	$acc05,$s0,`32-16+3`,21,28
 | 
			
		||||
	lwz	$t2,8($key)
 | 
			
		||||
	lwz	$t3,12($key)
 | 
			
		||||
	rlwinm	$acc06,$s1,`32-16+3`,21,28
 | 
			
		||||
	lwz	$t3,12($key)
 | 
			
		||||
	rlwinm	$acc07,$s2,`32-16+3`,21,28
 | 
			
		||||
	lwzx	$acc00,$Tbl0,$acc00
 | 
			
		||||
	lwzx	$acc01,$Tbl0,$acc01
 | 
			
		||||
	rlwinm	$acc08,$s2,`32-8+3`,21,28
 | 
			
		||||
	lwzx	$acc01,$Tbl0,$acc01
 | 
			
		||||
	rlwinm	$acc09,$s3,`32-8+3`,21,28
 | 
			
		||||
	lwzx	$acc02,$Tbl0,$acc02
 | 
			
		||||
	lwzx	$acc03,$Tbl0,$acc03
 | 
			
		||||
	rlwinm	$acc10,$s0,`32-8+3`,21,28
 | 
			
		||||
	lwzx	$acc03,$Tbl0,$acc03
 | 
			
		||||
	rlwinm	$acc11,$s1,`32-8+3`,21,28
 | 
			
		||||
	lwzx	$acc04,$Tbl1,$acc04
 | 
			
		||||
	lwzx	$acc05,$Tbl1,$acc05
 | 
			
		||||
	rlwinm	$acc12,$s1,`0+3`,21,28
 | 
			
		||||
	lwzx	$acc05,$Tbl1,$acc05
 | 
			
		||||
	rlwinm	$acc13,$s2,`0+3`,21,28
 | 
			
		||||
	lwzx	$acc06,$Tbl1,$acc06
 | 
			
		||||
	lwzx	$acc07,$Tbl1,$acc07
 | 
			
		||||
	rlwinm	$acc14,$s3,`0+3`,21,28
 | 
			
		||||
	lwzx	$acc07,$Tbl1,$acc07
 | 
			
		||||
	rlwinm	$acc15,$s0,`0+3`,21,28
 | 
			
		||||
	lwzx	$acc08,$Tbl2,$acc08
 | 
			
		||||
	lwzx	$acc09,$Tbl2,$acc09
 | 
			
		||||
	xor	$t0,$t0,$acc00
 | 
			
		||||
	lwzx	$acc09,$Tbl2,$acc09
 | 
			
		||||
	xor	$t1,$t1,$acc01
 | 
			
		||||
	lwzx	$acc10,$Tbl2,$acc10
 | 
			
		||||
	lwzx	$acc11,$Tbl2,$acc11
 | 
			
		||||
	xor	$t2,$t2,$acc02
 | 
			
		||||
	lwzx	$acc11,$Tbl2,$acc11
 | 
			
		||||
	xor	$t3,$t3,$acc03
 | 
			
		||||
	lwzx	$acc12,$Tbl3,$acc12
 | 
			
		||||
	lwzx	$acc13,$Tbl3,$acc13
 | 
			
		||||
	xor	$t0,$t0,$acc04
 | 
			
		||||
	lwzx	$acc13,$Tbl3,$acc13
 | 
			
		||||
	xor	$t1,$t1,$acc05
 | 
			
		||||
	lwzx	$acc14,$Tbl3,$acc14
 | 
			
		||||
	lwzx	$acc15,$Tbl3,$acc15
 | 
			
		||||
	xor	$t2,$t2,$acc06
 | 
			
		||||
	lwzx	$acc15,$Tbl3,$acc15
 | 
			
		||||
	xor	$t3,$t3,$acc07
 | 
			
		||||
	xor	$t0,$t0,$acc08
 | 
			
		||||
	xor	$t1,$t1,$acc09
 | 
			
		||||
@@ -815,56 +987,56 @@ Ldec_loop:
 | 
			
		||||
	addi	$Tbl2,$Tbl0,2048
 | 
			
		||||
	nop
 | 
			
		||||
	lwz	$t0,0($key)
 | 
			
		||||
	lwz	$t1,4($key)
 | 
			
		||||
	rlwinm	$acc00,$s0,`32-24`,24,31
 | 
			
		||||
	lwz	$t1,4($key)
 | 
			
		||||
	rlwinm	$acc01,$s1,`32-24`,24,31
 | 
			
		||||
	lwz	$t2,8($key)
 | 
			
		||||
	lwz	$t3,12($key)
 | 
			
		||||
	rlwinm	$acc02,$s2,`32-24`,24,31
 | 
			
		||||
	lwz	$t3,12($key)
 | 
			
		||||
	rlwinm	$acc03,$s3,`32-24`,24,31
 | 
			
		||||
	lwz	$acc08,`2048+0`($Tbl0)	! prefetch Td4
 | 
			
		||||
	lwz	$acc09,`2048+32`($Tbl0)
 | 
			
		||||
	rlwinm	$acc04,$s3,`32-16`,24,31
 | 
			
		||||
	lwz	$acc09,`2048+32`($Tbl0)
 | 
			
		||||
	rlwinm	$acc05,$s0,`32-16`,24,31
 | 
			
		||||
	lwz	$acc10,`2048+64`($Tbl0)
 | 
			
		||||
	lwz	$acc11,`2048+96`($Tbl0)
 | 
			
		||||
	lbzx	$acc00,$Tbl2,$acc00
 | 
			
		||||
	lwz	$acc11,`2048+96`($Tbl0)
 | 
			
		||||
	lbzx	$acc01,$Tbl2,$acc01
 | 
			
		||||
	lwz	$acc12,`2048+128`($Tbl0)
 | 
			
		||||
	lwz	$acc13,`2048+160`($Tbl0)
 | 
			
		||||
	rlwinm	$acc06,$s1,`32-16`,24,31
 | 
			
		||||
	lwz	$acc13,`2048+160`($Tbl0)
 | 
			
		||||
	rlwinm	$acc07,$s2,`32-16`,24,31
 | 
			
		||||
	lwz	$acc14,`2048+192`($Tbl0)
 | 
			
		||||
	lwz	$acc15,`2048+224`($Tbl0)
 | 
			
		||||
	rlwinm	$acc08,$s2,`32-8`,24,31
 | 
			
		||||
	lwz	$acc15,`2048+224`($Tbl0)
 | 
			
		||||
	rlwinm	$acc09,$s3,`32-8`,24,31
 | 
			
		||||
	lbzx	$acc02,$Tbl2,$acc02
 | 
			
		||||
	lbzx	$acc03,$Tbl2,$acc03
 | 
			
		||||
	rlwinm	$acc10,$s0,`32-8`,24,31
 | 
			
		||||
	lbzx	$acc03,$Tbl2,$acc03
 | 
			
		||||
	rlwinm	$acc11,$s1,`32-8`,24,31
 | 
			
		||||
	lbzx	$acc04,$Tbl2,$acc04
 | 
			
		||||
	lbzx	$acc05,$Tbl2,$acc05
 | 
			
		||||
	rlwinm	$acc12,$s1,`0`,24,31
 | 
			
		||||
	lbzx	$acc05,$Tbl2,$acc05
 | 
			
		||||
	rlwinm	$acc13,$s2,`0`,24,31
 | 
			
		||||
	lbzx	$acc06,$Tbl2,$acc06
 | 
			
		||||
	lbzx	$acc07,$Tbl2,$acc07
 | 
			
		||||
	rlwinm	$acc14,$s3,`0`,24,31
 | 
			
		||||
	lbzx	$acc07,$Tbl2,$acc07
 | 
			
		||||
	rlwinm	$acc15,$s0,`0`,24,31
 | 
			
		||||
	lbzx	$acc08,$Tbl2,$acc08
 | 
			
		||||
	lbzx	$acc09,$Tbl2,$acc09
 | 
			
		||||
	rlwinm	$s0,$acc00,24,0,7
 | 
			
		||||
	lbzx	$acc09,$Tbl2,$acc09
 | 
			
		||||
	rlwinm	$s1,$acc01,24,0,7
 | 
			
		||||
	lbzx	$acc10,$Tbl2,$acc10
 | 
			
		||||
	lbzx	$acc11,$Tbl2,$acc11
 | 
			
		||||
	rlwinm	$s2,$acc02,24,0,7
 | 
			
		||||
	lbzx	$acc11,$Tbl2,$acc11
 | 
			
		||||
	rlwinm	$s3,$acc03,24,0,7
 | 
			
		||||
	lbzx	$acc12,$Tbl2,$acc12
 | 
			
		||||
	lbzx	$acc13,$Tbl2,$acc13
 | 
			
		||||
	rlwimi	$s0,$acc04,16,8,15
 | 
			
		||||
	lbzx	$acc13,$Tbl2,$acc13
 | 
			
		||||
	rlwimi	$s1,$acc05,16,8,15
 | 
			
		||||
	lbzx	$acc14,$Tbl2,$acc14
 | 
			
		||||
	lbzx	$acc15,$Tbl2,$acc15
 | 
			
		||||
	rlwimi	$s2,$acc06,16,8,15
 | 
			
		||||
	lbzx	$acc15,$Tbl2,$acc15
 | 
			
		||||
	rlwimi	$s3,$acc07,16,8,15
 | 
			
		||||
	rlwimi	$s0,$acc08,8,16,23
 | 
			
		||||
	rlwimi	$s1,$acc09,8,16,23
 | 
			
		||||
@@ -879,20 +1051,22 @@ Ldec_loop:
 | 
			
		||||
	xor	$s2,$s2,$t2
 | 
			
		||||
	xor	$s3,$s3,$t3
 | 
			
		||||
	blr
 | 
			
		||||
	.long	0
 | 
			
		||||
	.byte	0,12,0x14,0,0,0,0,0
 | 
			
		||||
 | 
			
		||||
.align	4
 | 
			
		||||
Lppc_AES_decrypt_compact:
 | 
			
		||||
	lwz	$acc00,240($key)
 | 
			
		||||
	lwz	$t0,0($key)
 | 
			
		||||
	lwz	$t1,4($key)
 | 
			
		||||
	lwz	$t2,8($key)
 | 
			
		||||
	lwz	$t3,12($key)
 | 
			
		||||
	addi	$Tbl1,$Tbl0,2048
 | 
			
		||||
	lwz	$t0,0($key)
 | 
			
		||||
	lis	$mask80,0x8080
 | 
			
		||||
	lwz	$t1,4($key)
 | 
			
		||||
	lis	$mask1b,0x1b1b
 | 
			
		||||
	addi	$key,$key,16
 | 
			
		||||
	lwz	$t2,8($key)
 | 
			
		||||
	ori	$mask80,$mask80,0x8080
 | 
			
		||||
	lwz	$t3,12($key)
 | 
			
		||||
	ori	$mask1b,$mask1b,0x1b1b
 | 
			
		||||
	addi	$key,$key,16
 | 
			
		||||
___
 | 
			
		||||
$code.=<<___ if ($SIZE_T==8);
 | 
			
		||||
	insrdi	$mask80,$mask80,32,0
 | 
			
		||||
@@ -904,10 +1078,10 @@ $code.=<<___;
 | 
			
		||||
Ldec_compact_loop:
 | 
			
		||||
	xor	$s0,$s0,$t0
 | 
			
		||||
	xor	$s1,$s1,$t1
 | 
			
		||||
	xor	$s2,$s2,$t2
 | 
			
		||||
	xor	$s3,$s3,$t3
 | 
			
		||||
	rlwinm	$acc00,$s0,`32-24`,24,31
 | 
			
		||||
	xor	$s2,$s2,$t2
 | 
			
		||||
	rlwinm	$acc01,$s1,`32-24`,24,31
 | 
			
		||||
	xor	$s3,$s3,$t3
 | 
			
		||||
	rlwinm	$acc02,$s2,`32-24`,24,31
 | 
			
		||||
	rlwinm	$acc03,$s3,`32-24`,24,31
 | 
			
		||||
	rlwinm	$acc04,$s3,`32-16`,24,31
 | 
			
		||||
@@ -915,48 +1089,48 @@ Ldec_compact_loop:
 | 
			
		||||
	rlwinm	$acc06,$s1,`32-16`,24,31
 | 
			
		||||
	rlwinm	$acc07,$s2,`32-16`,24,31
 | 
			
		||||
	lbzx	$acc00,$Tbl1,$acc00
 | 
			
		||||
	lbzx	$acc01,$Tbl1,$acc01
 | 
			
		||||
	rlwinm	$acc08,$s2,`32-8`,24,31
 | 
			
		||||
	lbzx	$acc01,$Tbl1,$acc01
 | 
			
		||||
	rlwinm	$acc09,$s3,`32-8`,24,31
 | 
			
		||||
	lbzx	$acc02,$Tbl1,$acc02
 | 
			
		||||
	lbzx	$acc03,$Tbl1,$acc03
 | 
			
		||||
	rlwinm	$acc10,$s0,`32-8`,24,31
 | 
			
		||||
	lbzx	$acc03,$Tbl1,$acc03
 | 
			
		||||
	rlwinm	$acc11,$s1,`32-8`,24,31
 | 
			
		||||
	lbzx	$acc04,$Tbl1,$acc04
 | 
			
		||||
	lbzx	$acc05,$Tbl1,$acc05
 | 
			
		||||
	rlwinm	$acc12,$s1,`0`,24,31
 | 
			
		||||
	lbzx	$acc05,$Tbl1,$acc05
 | 
			
		||||
	rlwinm	$acc13,$s2,`0`,24,31
 | 
			
		||||
	lbzx	$acc06,$Tbl1,$acc06
 | 
			
		||||
	lbzx	$acc07,$Tbl1,$acc07
 | 
			
		||||
	rlwinm	$acc14,$s3,`0`,24,31
 | 
			
		||||
	lbzx	$acc07,$Tbl1,$acc07
 | 
			
		||||
	rlwinm	$acc15,$s0,`0`,24,31
 | 
			
		||||
	lbzx	$acc08,$Tbl1,$acc08
 | 
			
		||||
	lbzx	$acc09,$Tbl1,$acc09
 | 
			
		||||
	rlwinm	$s0,$acc00,24,0,7
 | 
			
		||||
	lbzx	$acc09,$Tbl1,$acc09
 | 
			
		||||
	rlwinm	$s1,$acc01,24,0,7
 | 
			
		||||
	lbzx	$acc10,$Tbl1,$acc10
 | 
			
		||||
	lbzx	$acc11,$Tbl1,$acc11
 | 
			
		||||
	rlwinm	$s2,$acc02,24,0,7
 | 
			
		||||
	lbzx	$acc11,$Tbl1,$acc11
 | 
			
		||||
	rlwinm	$s3,$acc03,24,0,7
 | 
			
		||||
	lbzx	$acc12,$Tbl1,$acc12
 | 
			
		||||
	lbzx	$acc13,$Tbl1,$acc13
 | 
			
		||||
	rlwimi	$s0,$acc04,16,8,15
 | 
			
		||||
	lbzx	$acc13,$Tbl1,$acc13
 | 
			
		||||
	rlwimi	$s1,$acc05,16,8,15
 | 
			
		||||
	lbzx	$acc14,$Tbl1,$acc14
 | 
			
		||||
	lbzx	$acc15,$Tbl1,$acc15
 | 
			
		||||
	rlwimi	$s2,$acc06,16,8,15
 | 
			
		||||
	lbzx	$acc15,$Tbl1,$acc15
 | 
			
		||||
	rlwimi	$s3,$acc07,16,8,15
 | 
			
		||||
	rlwimi	$s0,$acc08,8,16,23
 | 
			
		||||
	rlwimi	$s1,$acc09,8,16,23
 | 
			
		||||
	rlwimi	$s2,$acc10,8,16,23
 | 
			
		||||
	rlwimi	$s3,$acc11,8,16,23
 | 
			
		||||
	lwz	$t0,0($key)
 | 
			
		||||
	lwz	$t1,4($key)
 | 
			
		||||
	or	$s0,$s0,$acc12
 | 
			
		||||
	lwz	$t1,4($key)
 | 
			
		||||
	or	$s1,$s1,$acc13
 | 
			
		||||
	lwz	$t2,8($key)
 | 
			
		||||
	lwz	$t3,12($key)
 | 
			
		||||
	or	$s2,$s2,$acc14
 | 
			
		||||
	lwz	$t3,12($key)
 | 
			
		||||
	or	$s3,$s3,$acc15
 | 
			
		||||
 | 
			
		||||
	addi	$key,$key,16
 | 
			
		||||
@@ -1030,12 +1204,12 @@ $code.=<<___ if ($SIZE_T==4);
 | 
			
		||||
	and	$acc02,$s2,$mask80
 | 
			
		||||
	and	$acc03,$s3,$mask80
 | 
			
		||||
	srwi	$acc04,$acc00,7		# r1>>7
 | 
			
		||||
	srwi	$acc05,$acc01,7
 | 
			
		||||
	srwi	$acc06,$acc02,7
 | 
			
		||||
	srwi	$acc07,$acc03,7
 | 
			
		||||
	andc	$acc08,$s0,$mask80	# r0&0x7f7f7f7f
 | 
			
		||||
	srwi	$acc05,$acc01,7
 | 
			
		||||
	andc	$acc09,$s1,$mask80
 | 
			
		||||
	srwi	$acc06,$acc02,7
 | 
			
		||||
	andc	$acc10,$s2,$mask80
 | 
			
		||||
	srwi	$acc07,$acc03,7
 | 
			
		||||
	andc	$acc11,$s3,$mask80
 | 
			
		||||
	sub	$acc00,$acc00,$acc04	# r1-(r1>>7)
 | 
			
		||||
	sub	$acc01,$acc01,$acc05
 | 
			
		||||
@@ -1059,12 +1233,12 @@ $code.=<<___ if ($SIZE_T==4);
 | 
			
		||||
	and	$acc06,$acc02,$mask80
 | 
			
		||||
	and	$acc07,$acc03,$mask80
 | 
			
		||||
	srwi	$acc08,$acc04,7		# r1>>7
 | 
			
		||||
	srwi	$acc09,$acc05,7
 | 
			
		||||
	srwi	$acc10,$acc06,7
 | 
			
		||||
	srwi	$acc11,$acc07,7
 | 
			
		||||
	andc	$acc12,$acc00,$mask80	# r2&0x7f7f7f7f
 | 
			
		||||
	srwi	$acc09,$acc05,7
 | 
			
		||||
	andc	$acc13,$acc01,$mask80
 | 
			
		||||
	srwi	$acc10,$acc06,7
 | 
			
		||||
	andc	$acc14,$acc02,$mask80
 | 
			
		||||
	srwi	$acc11,$acc07,7
 | 
			
		||||
	andc	$acc15,$acc03,$mask80
 | 
			
		||||
	sub	$acc04,$acc04,$acc08	# r1-(r1>>7)
 | 
			
		||||
	sub	$acc05,$acc05,$acc09
 | 
			
		||||
@@ -1085,13 +1259,13 @@ $code.=<<___ if ($SIZE_T==4);
 | 
			
		||||
 | 
			
		||||
	and	$acc08,$acc04,$mask80	# r1=r4&0x80808080
 | 
			
		||||
	and	$acc09,$acc05,$mask80
 | 
			
		||||
	and	$acc10,$acc06,$mask80
 | 
			
		||||
	and	$acc11,$acc07,$mask80
 | 
			
		||||
	srwi	$acc12,$acc08,7		# r1>>7
 | 
			
		||||
	and	$acc10,$acc06,$mask80
 | 
			
		||||
	srwi	$acc13,$acc09,7
 | 
			
		||||
	and	$acc11,$acc07,$mask80
 | 
			
		||||
	srwi	$acc14,$acc10,7
 | 
			
		||||
	srwi	$acc15,$acc11,7
 | 
			
		||||
	sub	$acc08,$acc08,$acc12	# r1-(r1>>7)
 | 
			
		||||
	srwi	$acc15,$acc11,7
 | 
			
		||||
	sub	$acc09,$acc09,$acc13
 | 
			
		||||
	sub	$acc10,$acc10,$acc14
 | 
			
		||||
	sub	$acc11,$acc11,$acc15
 | 
			
		||||
@@ -1124,10 +1298,10 @@ ___
 | 
			
		||||
$code.=<<___;
 | 
			
		||||
	rotrwi	$s0,$s0,8		# = ROTATE(r0,8)
 | 
			
		||||
	rotrwi	$s1,$s1,8
 | 
			
		||||
	rotrwi	$s2,$s2,8
 | 
			
		||||
	rotrwi	$s3,$s3,8
 | 
			
		||||
	xor	$s0,$s0,$acc00		# ^= r2^r0
 | 
			
		||||
	rotrwi	$s2,$s2,8
 | 
			
		||||
	xor	$s1,$s1,$acc01
 | 
			
		||||
	rotrwi	$s3,$s3,8
 | 
			
		||||
	xor	$s2,$s2,$acc02
 | 
			
		||||
	xor	$s3,$s3,$acc03
 | 
			
		||||
	xor	$acc00,$acc00,$acc08
 | 
			
		||||
@@ -1135,32 +1309,32 @@ $code.=<<___;
 | 
			
		||||
	xor	$acc02,$acc02,$acc10
 | 
			
		||||
	xor	$acc03,$acc03,$acc11
 | 
			
		||||
	xor	$s0,$s0,$acc04		# ^= r4^r0
 | 
			
		||||
	xor	$s1,$s1,$acc05
 | 
			
		||||
	xor	$s2,$s2,$acc06
 | 
			
		||||
	xor	$s3,$s3,$acc07
 | 
			
		||||
	rotrwi	$acc00,$acc00,24
 | 
			
		||||
	xor	$s1,$s1,$acc05
 | 
			
		||||
	rotrwi	$acc01,$acc01,24
 | 
			
		||||
	xor	$s2,$s2,$acc06
 | 
			
		||||
	rotrwi	$acc02,$acc02,24
 | 
			
		||||
	xor	$s3,$s3,$acc07
 | 
			
		||||
	rotrwi	$acc03,$acc03,24
 | 
			
		||||
	xor	$acc04,$acc04,$acc08
 | 
			
		||||
	xor	$acc05,$acc05,$acc09
 | 
			
		||||
	xor	$acc06,$acc06,$acc10
 | 
			
		||||
	xor	$acc07,$acc07,$acc11
 | 
			
		||||
	xor	$s0,$s0,$acc08		# ^= r8 [^((r4^r0)^(r2^r0)=r4^r2)]
 | 
			
		||||
	xor	$s1,$s1,$acc09
 | 
			
		||||
	xor	$s2,$s2,$acc10
 | 
			
		||||
	xor	$s3,$s3,$acc11
 | 
			
		||||
	rotrwi	$acc04,$acc04,16
 | 
			
		||||
	xor	$s1,$s1,$acc09
 | 
			
		||||
	rotrwi	$acc05,$acc05,16
 | 
			
		||||
	xor	$s2,$s2,$acc10
 | 
			
		||||
	rotrwi	$acc06,$acc06,16
 | 
			
		||||
	xor	$s3,$s3,$acc11
 | 
			
		||||
	rotrwi	$acc07,$acc07,16
 | 
			
		||||
	xor	$s0,$s0,$acc00		# ^= ROTATE(r8^r2^r0,24)
 | 
			
		||||
	xor	$s1,$s1,$acc01
 | 
			
		||||
	xor	$s2,$s2,$acc02
 | 
			
		||||
	xor	$s3,$s3,$acc03
 | 
			
		||||
	rotrwi	$acc08,$acc08,8
 | 
			
		||||
	xor	$s1,$s1,$acc01
 | 
			
		||||
	rotrwi	$acc09,$acc09,8
 | 
			
		||||
	xor	$s2,$s2,$acc02
 | 
			
		||||
	rotrwi	$acc10,$acc10,8
 | 
			
		||||
	xor	$s3,$s3,$acc03
 | 
			
		||||
	rotrwi	$acc11,$acc11,8
 | 
			
		||||
	xor	$s0,$s0,$acc04		# ^= ROTATE(r8^r4^r0,16)
 | 
			
		||||
	xor	$s1,$s1,$acc05
 | 
			
		||||
@@ -1179,7 +1353,9 @@ Ldec_compact_done:
 | 
			
		||||
	xor	$s2,$s2,$t2
 | 
			
		||||
	xor	$s3,$s3,$t3
 | 
			
		||||
	blr
 | 
			
		||||
.long	0
 | 
			
		||||
	.long	0
 | 
			
		||||
	.byte	0,12,0x14,0,0,0,0,0
 | 
			
		||||
 | 
			
		||||
.asciz	"AES for PPC, CRYPTOGAMS by <appro\@openssl.org>"
 | 
			
		||||
.align	7
 | 
			
		||||
___
 | 
			
		||||
 
 | 
			
		||||
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							@@ -1176,6 +1176,7 @@ ___
 | 
			
		||||
# As UltraSPARC T1, a.k.a. Niagara, has shared FPU, FP nops can have
 | 
			
		||||
# undesired effect, so just omit them and sacrifice some portion of
 | 
			
		||||
# percent in performance...
 | 
			
		||||
$code =~ s/fmovs.*$//gem;
 | 
			
		||||
$code =~ s/fmovs.*$//gm;
 | 
			
		||||
 | 
			
		||||
print $code;
 | 
			
		||||
close STDOUT;	# ensure flush
 | 
			
		||||
 
 | 
			
		||||
@@ -36,7 +36,8 @@ $0 =~ m/(.*[\/\\])[^\/\\]+$/; $dir=$1;
 | 
			
		||||
( $xlate="${dir}../../perlasm/x86_64-xlate.pl" and -f $xlate) or
 | 
			
		||||
die "can't locate x86_64-xlate.pl";
 | 
			
		||||
 | 
			
		||||
open STDOUT,"| $^X $xlate $flavour $output";
 | 
			
		||||
open OUT,"| \"$^X\" $xlate $flavour $output";
 | 
			
		||||
*STDOUT=*OUT;
 | 
			
		||||
 | 
			
		||||
$verticalspin=1;	# unlike 32-bit version $verticalspin performs
 | 
			
		||||
			# ~15% better on both AMD and Intel cores
 | 
			
		||||
@@ -588,6 +589,9 @@ $code.=<<___;
 | 
			
		||||
.globl	AES_encrypt
 | 
			
		||||
.type	AES_encrypt,\@function,3
 | 
			
		||||
.align	16
 | 
			
		||||
.globl	asm_AES_encrypt
 | 
			
		||||
.hidden	asm_AES_encrypt
 | 
			
		||||
asm_AES_encrypt:
 | 
			
		||||
AES_encrypt:
 | 
			
		||||
	push	%rbx
 | 
			
		||||
	push	%rbp
 | 
			
		||||
@@ -1184,6 +1188,9 @@ $code.=<<___;
 | 
			
		||||
.globl	AES_decrypt
 | 
			
		||||
.type	AES_decrypt,\@function,3
 | 
			
		||||
.align	16
 | 
			
		||||
.globl	asm_AES_decrypt
 | 
			
		||||
.hidden	asm_AES_decrypt
 | 
			
		||||
asm_AES_decrypt:
 | 
			
		||||
AES_decrypt:
 | 
			
		||||
	push	%rbx
 | 
			
		||||
	push	%rbp
 | 
			
		||||
@@ -1277,13 +1284,13 @@ $code.=<<___;
 | 
			
		||||
___
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# int AES_set_encrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
# int private_AES_set_encrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
#                        AES_KEY *key)
 | 
			
		||||
$code.=<<___;
 | 
			
		||||
.globl	AES_set_encrypt_key
 | 
			
		||||
.type	AES_set_encrypt_key,\@function,3
 | 
			
		||||
.globl	private_AES_set_encrypt_key
 | 
			
		||||
.type	private_AES_set_encrypt_key,\@function,3
 | 
			
		||||
.align	16
 | 
			
		||||
AES_set_encrypt_key:
 | 
			
		||||
private_AES_set_encrypt_key:
 | 
			
		||||
	push	%rbx
 | 
			
		||||
	push	%rbp
 | 
			
		||||
	push	%r12			# redundant, but allows to share 
 | 
			
		||||
@@ -1304,7 +1311,7 @@ AES_set_encrypt_key:
 | 
			
		||||
	add	\$56,%rsp
 | 
			
		||||
.Lenc_key_epilogue:
 | 
			
		||||
	ret
 | 
			
		||||
.size	AES_set_encrypt_key,.-AES_set_encrypt_key
 | 
			
		||||
.size	private_AES_set_encrypt_key,.-private_AES_set_encrypt_key
 | 
			
		||||
 | 
			
		||||
.type	_x86_64_AES_set_encrypt_key,\@abi-omnipotent
 | 
			
		||||
.align	16
 | 
			
		||||
@@ -1547,13 +1554,13 @@ $code.=<<___;
 | 
			
		||||
___
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# int AES_set_decrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
# int private_AES_set_decrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
#                        AES_KEY *key)
 | 
			
		||||
$code.=<<___;
 | 
			
		||||
.globl	AES_set_decrypt_key
 | 
			
		||||
.type	AES_set_decrypt_key,\@function,3
 | 
			
		||||
.globl	private_AES_set_decrypt_key
 | 
			
		||||
.type	private_AES_set_decrypt_key,\@function,3
 | 
			
		||||
.align	16
 | 
			
		||||
AES_set_decrypt_key:
 | 
			
		||||
private_AES_set_decrypt_key:
 | 
			
		||||
	push	%rbx
 | 
			
		||||
	push	%rbp
 | 
			
		||||
	push	%r12
 | 
			
		||||
@@ -1622,7 +1629,7 @@ $code.=<<___;
 | 
			
		||||
	add	\$56,%rsp
 | 
			
		||||
.Ldec_key_epilogue:
 | 
			
		||||
	ret
 | 
			
		||||
.size	AES_set_decrypt_key,.-AES_set_decrypt_key
 | 
			
		||||
.size	private_AES_set_decrypt_key,.-private_AES_set_decrypt_key
 | 
			
		||||
___
 | 
			
		||||
 | 
			
		||||
# void AES_cbc_encrypt (const void char *inp, unsigned char *out,
 | 
			
		||||
@@ -1648,6 +1655,9 @@ $code.=<<___;
 | 
			
		||||
.type	AES_cbc_encrypt,\@function,6
 | 
			
		||||
.align	16
 | 
			
		||||
.extern	OPENSSL_ia32cap_P
 | 
			
		||||
.globl	asm_AES_cbc_encrypt
 | 
			
		||||
.hidden	asm_AES_cbc_encrypt
 | 
			
		||||
asm_AES_cbc_encrypt:
 | 
			
		||||
AES_cbc_encrypt:
 | 
			
		||||
	cmp	\$0,%rdx	# check length
 | 
			
		||||
	je	.Lcbc_epilogue
 | 
			
		||||
@@ -2766,13 +2776,13 @@ cbc_se_handler:
 | 
			
		||||
	.rva	.LSEH_end_AES_decrypt
 | 
			
		||||
	.rva	.LSEH_info_AES_decrypt
 | 
			
		||||
 | 
			
		||||
	.rva	.LSEH_begin_AES_set_encrypt_key
 | 
			
		||||
	.rva	.LSEH_end_AES_set_encrypt_key
 | 
			
		||||
	.rva	.LSEH_info_AES_set_encrypt_key
 | 
			
		||||
	.rva	.LSEH_begin_private_AES_set_encrypt_key
 | 
			
		||||
	.rva	.LSEH_end_private_AES_set_encrypt_key
 | 
			
		||||
	.rva	.LSEH_info_private_AES_set_encrypt_key
 | 
			
		||||
 | 
			
		||||
	.rva	.LSEH_begin_AES_set_decrypt_key
 | 
			
		||||
	.rva	.LSEH_end_AES_set_decrypt_key
 | 
			
		||||
	.rva	.LSEH_info_AES_set_decrypt_key
 | 
			
		||||
	.rva	.LSEH_begin_private_AES_set_decrypt_key
 | 
			
		||||
	.rva	.LSEH_end_private_AES_set_decrypt_key
 | 
			
		||||
	.rva	.LSEH_info_private_AES_set_decrypt_key
 | 
			
		||||
 | 
			
		||||
	.rva	.LSEH_begin_AES_cbc_encrypt
 | 
			
		||||
	.rva	.LSEH_end_AES_cbc_encrypt
 | 
			
		||||
@@ -2788,11 +2798,11 @@ cbc_se_handler:
 | 
			
		||||
	.byte	9,0,0,0
 | 
			
		||||
	.rva	block_se_handler
 | 
			
		||||
	.rva	.Ldec_prologue,.Ldec_epilogue	# HandlerData[]
 | 
			
		||||
.LSEH_info_AES_set_encrypt_key:
 | 
			
		||||
.LSEH_info_private_AES_set_encrypt_key:
 | 
			
		||||
	.byte	9,0,0,0
 | 
			
		||||
	.rva	key_se_handler
 | 
			
		||||
	.rva	.Lenc_key_prologue,.Lenc_key_epilogue	# HandlerData[]
 | 
			
		||||
.LSEH_info_AES_set_decrypt_key:
 | 
			
		||||
.LSEH_info_private_AES_set_decrypt_key:
 | 
			
		||||
	.byte	9,0,0,0
 | 
			
		||||
	.rva	key_se_handler
 | 
			
		||||
	.rva	.Ldec_key_prologue,.Ldec_key_epilogue	# HandlerData[]
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										1250
									
								
								crypto/aes/asm/aesni-sha1-x86_64.pl
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										1250
									
								
								crypto/aes/asm/aesni-sha1-x86_64.pl
									
									
									
									
									
										Normal file
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							
							
								
								
									
										2189
									
								
								crypto/aes/asm/aesni-x86.pl
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										2189
									
								
								crypto/aes/asm/aesni-x86.pl
									
									
									
									
									
										Normal file
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							
							
								
								
									
										3071
									
								
								crypto/aes/asm/aesni-x86_64.pl
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										3071
									
								
								crypto/aes/asm/aesni-x86_64.pl
									
									
									
									
									
										Normal file
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							
							
								
								
									
										3108
									
								
								crypto/aes/asm/bsaes-x86_64.pl
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										3108
									
								
								crypto/aes/asm/bsaes-x86_64.pl
									
									
									
									
									
										Normal file
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							
							
								
								
									
										903
									
								
								crypto/aes/asm/vpaes-x86.pl
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										903
									
								
								crypto/aes/asm/vpaes-x86.pl
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,903 @@
 | 
			
		||||
#!/usr/bin/env perl
 | 
			
		||||
 | 
			
		||||
######################################################################
 | 
			
		||||
## Constant-time SSSE3 AES core implementation.
 | 
			
		||||
## version 0.1
 | 
			
		||||
##
 | 
			
		||||
## By Mike Hamburg (Stanford University), 2009
 | 
			
		||||
## Public domain.
 | 
			
		||||
##
 | 
			
		||||
## For details see http://shiftleft.org/papers/vector_aes/ and
 | 
			
		||||
## http://crypto.stanford.edu/vpaes/.
 | 
			
		||||
 | 
			
		||||
######################################################################
 | 
			
		||||
# September 2011.
 | 
			
		||||
#
 | 
			
		||||
# Port vpaes-x86_64.pl as 32-bit "almost" drop-in replacement for
 | 
			
		||||
# aes-586.pl. "Almost" refers to the fact that AES_cbc_encrypt
 | 
			
		||||
# doesn't handle partial vectors (doesn't have to if called from
 | 
			
		||||
# EVP only). "Drop-in" implies that this module doesn't share key
 | 
			
		||||
# schedule structure with the original nor does it make assumption
 | 
			
		||||
# about its alignment...
 | 
			
		||||
#
 | 
			
		||||
# Performance summary. aes-586.pl column lists large-block CBC
 | 
			
		||||
# encrypt/decrypt/with-hyper-threading-off(*) results in cycles per
 | 
			
		||||
# byte processed with 128-bit key, and vpaes-x86.pl column - [also
 | 
			
		||||
# large-block CBC] encrypt/decrypt.
 | 
			
		||||
#
 | 
			
		||||
#		aes-586.pl		vpaes-x86.pl
 | 
			
		||||
#
 | 
			
		||||
# Core 2(**)	29.1/42.3/18.3		22.0/25.6(***)
 | 
			
		||||
# Nehalem	27.9/40.4/18.1		10.3/12.0
 | 
			
		||||
# Atom		102./119./60.1		64.5/85.3(***)
 | 
			
		||||
#
 | 
			
		||||
# (*)	"Hyper-threading" in the context refers rather to cache shared
 | 
			
		||||
#	among multiple cores, than to specifically Intel HTT. As vast
 | 
			
		||||
#	majority of contemporary cores share cache, slower code path
 | 
			
		||||
#	is common place. In other words "with-hyper-threading-off"
 | 
			
		||||
#	results are presented mostly for reference purposes.
 | 
			
		||||
#
 | 
			
		||||
# (**)	"Core 2" refers to initial 65nm design, a.k.a. Conroe.
 | 
			
		||||
#
 | 
			
		||||
# (***)	Less impressive improvement on Core 2 and Atom is due to slow
 | 
			
		||||
#	pshufb,	yet it's respectable +32%/65%  improvement on Core 2
 | 
			
		||||
#	and +58%/40% on Atom (as implied, over "hyper-threading-safe"
 | 
			
		||||
#	code path).
 | 
			
		||||
#
 | 
			
		||||
#						<appro@openssl.org>
 | 
			
		||||
 | 
			
		||||
$0 =~ m/(.*[\/\\])[^\/\\]+$/; $dir=$1;
 | 
			
		||||
push(@INC,"${dir}","${dir}../../perlasm");
 | 
			
		||||
require "x86asm.pl";
 | 
			
		||||
 | 
			
		||||
&asm_init($ARGV[0],"vpaes-x86.pl",$x86only = $ARGV[$#ARGV] eq "386");
 | 
			
		||||
 | 
			
		||||
$PREFIX="vpaes";
 | 
			
		||||
 | 
			
		||||
my  ($round, $base, $magic, $key, $const, $inp, $out)=
 | 
			
		||||
    ("eax",  "ebx", "ecx",  "edx","ebp",  "esi","edi");
 | 
			
		||||
 | 
			
		||||
&static_label("_vpaes_consts");
 | 
			
		||||
&static_label("_vpaes_schedule_low_round");
 | 
			
		||||
 | 
			
		||||
&set_label("_vpaes_consts",64);
 | 
			
		||||
$k_inv=-0x30;		# inv, inva
 | 
			
		||||
	&data_word(0x0D080180,0x0E05060F,0x0A0B0C02,0x04070309);
 | 
			
		||||
	&data_word(0x0F0B0780,0x01040A06,0x02050809,0x030D0E0C);
 | 
			
		||||
 | 
			
		||||
$k_s0F=-0x10;		# s0F
 | 
			
		||||
	&data_word(0x0F0F0F0F,0x0F0F0F0F,0x0F0F0F0F,0x0F0F0F0F);
 | 
			
		||||
 | 
			
		||||
$k_ipt=0x00;		# input transform (lo, hi)
 | 
			
		||||
	&data_word(0x5A2A7000,0xC2B2E898,0x52227808,0xCABAE090);
 | 
			
		||||
	&data_word(0x317C4D00,0x4C01307D,0xB0FDCC81,0xCD80B1FC);
 | 
			
		||||
 | 
			
		||||
$k_sb1=0x20;		# sb1u, sb1t
 | 
			
		||||
	&data_word(0xCB503E00,0xB19BE18F,0x142AF544,0xA5DF7A6E);
 | 
			
		||||
	&data_word(0xFAE22300,0x3618D415,0x0D2ED9EF,0x3BF7CCC1);
 | 
			
		||||
$k_sb2=0x40;		# sb2u, sb2t
 | 
			
		||||
	&data_word(0x0B712400,0xE27A93C6,0xBC982FCD,0x5EB7E955);
 | 
			
		||||
	&data_word(0x0AE12900,0x69EB8840,0xAB82234A,0xC2A163C8);
 | 
			
		||||
$k_sbo=0x60;		# sbou, sbot
 | 
			
		||||
	&data_word(0x6FBDC700,0xD0D26D17,0xC502A878,0x15AABF7A);
 | 
			
		||||
	&data_word(0x5FBB6A00,0xCFE474A5,0x412B35FA,0x8E1E90D1);
 | 
			
		||||
 | 
			
		||||
$k_mc_forward=0x80;	# mc_forward
 | 
			
		||||
	&data_word(0x00030201,0x04070605,0x080B0A09,0x0C0F0E0D);
 | 
			
		||||
	&data_word(0x04070605,0x080B0A09,0x0C0F0E0D,0x00030201);
 | 
			
		||||
	&data_word(0x080B0A09,0x0C0F0E0D,0x00030201,0x04070605);
 | 
			
		||||
	&data_word(0x0C0F0E0D,0x00030201,0x04070605,0x080B0A09);
 | 
			
		||||
 | 
			
		||||
$k_mc_backward=0xc0;	# mc_backward
 | 
			
		||||
	&data_word(0x02010003,0x06050407,0x0A09080B,0x0E0D0C0F);
 | 
			
		||||
	&data_word(0x0E0D0C0F,0x02010003,0x06050407,0x0A09080B);
 | 
			
		||||
	&data_word(0x0A09080B,0x0E0D0C0F,0x02010003,0x06050407);
 | 
			
		||||
	&data_word(0x06050407,0x0A09080B,0x0E0D0C0F,0x02010003);
 | 
			
		||||
 | 
			
		||||
$k_sr=0x100;		# sr
 | 
			
		||||
	&data_word(0x03020100,0x07060504,0x0B0A0908,0x0F0E0D0C);
 | 
			
		||||
	&data_word(0x0F0A0500,0x030E0904,0x07020D08,0x0B06010C);
 | 
			
		||||
	&data_word(0x0B020900,0x0F060D04,0x030A0108,0x070E050C);
 | 
			
		||||
	&data_word(0x070A0D00,0x0B0E0104,0x0F020508,0x0306090C);
 | 
			
		||||
 | 
			
		||||
$k_rcon=0x140;		# rcon
 | 
			
		||||
	&data_word(0xAF9DEEB6,0x1F8391B9,0x4D7C7D81,0x702A9808);
 | 
			
		||||
 | 
			
		||||
$k_s63=0x150;		# s63: all equal to 0x63 transformed
 | 
			
		||||
	&data_word(0x5B5B5B5B,0x5B5B5B5B,0x5B5B5B5B,0x5B5B5B5B);
 | 
			
		||||
 | 
			
		||||
$k_opt=0x160;		# output transform
 | 
			
		||||
	&data_word(0xD6B66000,0xFF9F4929,0xDEBE6808,0xF7974121);
 | 
			
		||||
	&data_word(0x50BCEC00,0x01EDBD51,0xB05C0CE0,0xE10D5DB1);
 | 
			
		||||
 | 
			
		||||
$k_deskew=0x180;	# deskew tables: inverts the sbox's "skew"
 | 
			
		||||
	&data_word(0x47A4E300,0x07E4A340,0x5DBEF91A,0x1DFEB95A);
 | 
			
		||||
	&data_word(0x83EA6900,0x5F36B5DC,0xF49D1E77,0x2841C2AB);
 | 
			
		||||
##
 | 
			
		||||
##  Decryption stuff
 | 
			
		||||
##  Key schedule constants
 | 
			
		||||
##
 | 
			
		||||
$k_dksd=0x1a0;		# decryption key schedule: invskew x*D
 | 
			
		||||
	&data_word(0xA3E44700,0xFEB91A5D,0x5A1DBEF9,0x0740E3A4);
 | 
			
		||||
	&data_word(0xB5368300,0x41C277F4,0xAB289D1E,0x5FDC69EA);
 | 
			
		||||
$k_dksb=0x1c0;		# decryption key schedule: invskew x*B
 | 
			
		||||
	&data_word(0x8550D500,0x9A4FCA1F,0x1CC94C99,0x03D65386);
 | 
			
		||||
	&data_word(0xB6FC4A00,0x115BEDA7,0x7E3482C8,0xD993256F);
 | 
			
		||||
$k_dkse=0x1e0;		# decryption key schedule: invskew x*E + 0x63
 | 
			
		||||
	&data_word(0x1FC9D600,0xD5031CCA,0x994F5086,0x53859A4C);
 | 
			
		||||
	&data_word(0x4FDC7BE8,0xA2319605,0x20B31487,0xCD5EF96A);
 | 
			
		||||
$k_dks9=0x200;		# decryption key schedule: invskew x*9
 | 
			
		||||
	&data_word(0x7ED9A700,0xB6116FC8,0x82255BFC,0x4AED9334);
 | 
			
		||||
	&data_word(0x27143300,0x45765162,0xE9DAFDCE,0x8BB89FAC);
 | 
			
		||||
 | 
			
		||||
##
 | 
			
		||||
##  Decryption stuff
 | 
			
		||||
##  Round function constants
 | 
			
		||||
##
 | 
			
		||||
$k_dipt=0x220;		# decryption input transform
 | 
			
		||||
	&data_word(0x0B545F00,0x0F505B04,0x114E451A,0x154A411E);
 | 
			
		||||
	&data_word(0x60056500,0x86E383E6,0xF491F194,0x12771772);
 | 
			
		||||
 | 
			
		||||
$k_dsb9=0x240;		# decryption sbox output *9*u, *9*t
 | 
			
		||||
	&data_word(0x9A86D600,0x851C0353,0x4F994CC9,0xCAD51F50);
 | 
			
		||||
	&data_word(0xECD74900,0xC03B1789,0xB2FBA565,0x725E2C9E);
 | 
			
		||||
$k_dsbd=0x260;		# decryption sbox output *D*u, *D*t
 | 
			
		||||
	&data_word(0xE6B1A200,0x7D57CCDF,0x882A4439,0xF56E9B13);
 | 
			
		||||
	&data_word(0x24C6CB00,0x3CE2FAF7,0x15DEEFD3,0x2931180D);
 | 
			
		||||
$k_dsbb=0x280;		# decryption sbox output *B*u, *B*t
 | 
			
		||||
	&data_word(0x96B44200,0xD0226492,0xB0F2D404,0x602646F6);
 | 
			
		||||
	&data_word(0xCD596700,0xC19498A6,0x3255AA6B,0xF3FF0C3E);
 | 
			
		||||
$k_dsbe=0x2a0;		# decryption sbox output *E*u, *E*t
 | 
			
		||||
	&data_word(0x26D4D000,0x46F29296,0x64B4F6B0,0x22426004);
 | 
			
		||||
	&data_word(0xFFAAC100,0x0C55A6CD,0x98593E32,0x9467F36B);
 | 
			
		||||
$k_dsbo=0x2c0;		# decryption sbox final output
 | 
			
		||||
	&data_word(0x7EF94000,0x1387EA53,0xD4943E2D,0xC7AA6DB9);
 | 
			
		||||
	&data_word(0x93441D00,0x12D7560F,0xD8C58E9C,0xCA4B8159);
 | 
			
		||||
&asciz	("Vector Permutation AES for x86/SSSE3, Mike Hamburg (Stanford University)");
 | 
			
		||||
&align	(64);
 | 
			
		||||
 | 
			
		||||
&function_begin_B("_vpaes_preheat");
 | 
			
		||||
	&add	($const,&DWP(0,"esp"));
 | 
			
		||||
	&movdqa	("xmm7",&QWP($k_inv,$const));
 | 
			
		||||
	&movdqa	("xmm6",&QWP($k_s0F,$const));
 | 
			
		||||
	&ret	();
 | 
			
		||||
&function_end_B("_vpaes_preheat");
 | 
			
		||||
 | 
			
		||||
##
 | 
			
		||||
##  _aes_encrypt_core
 | 
			
		||||
##
 | 
			
		||||
##  AES-encrypt %xmm0.
 | 
			
		||||
##
 | 
			
		||||
##  Inputs:
 | 
			
		||||
##     %xmm0 = input
 | 
			
		||||
##     %xmm6-%xmm7 as in _vpaes_preheat
 | 
			
		||||
##    (%edx) = scheduled keys
 | 
			
		||||
##
 | 
			
		||||
##  Output in %xmm0
 | 
			
		||||
##  Clobbers  %xmm1-%xmm5, %eax, %ebx, %ecx, %edx
 | 
			
		||||
##
 | 
			
		||||
##
 | 
			
		||||
&function_begin_B("_vpaes_encrypt_core");
 | 
			
		||||
	&mov	($magic,16);
 | 
			
		||||
	&mov	($round,&DWP(240,$key));
 | 
			
		||||
	&movdqa	("xmm1","xmm6")
 | 
			
		||||
	&movdqa	("xmm2",&QWP($k_ipt,$const));
 | 
			
		||||
	&pandn	("xmm1","xmm0");
 | 
			
		||||
	&movdqu	("xmm5",&QWP(0,$key));
 | 
			
		||||
	&psrld	("xmm1",4);
 | 
			
		||||
	&pand	("xmm0","xmm6");
 | 
			
		||||
	&pshufb	("xmm2","xmm0");
 | 
			
		||||
	&movdqa	("xmm0",&QWP($k_ipt+16,$const));
 | 
			
		||||
	&pshufb	("xmm0","xmm1");
 | 
			
		||||
	&pxor	("xmm2","xmm5");
 | 
			
		||||
	&pxor	("xmm0","xmm2");
 | 
			
		||||
	&add	($key,16);
 | 
			
		||||
	&lea	($base,&DWP($k_mc_backward,$const));
 | 
			
		||||
	&jmp	(&label("enc_entry"));
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
&set_label("enc_loop",16);
 | 
			
		||||
	# middle of middle round
 | 
			
		||||
	&movdqa	("xmm4",&QWP($k_sb1,$const));	# 4 : sb1u
 | 
			
		||||
	&pshufb	("xmm4","xmm2");		# 4 = sb1u
 | 
			
		||||
	&pxor	("xmm4","xmm5");		# 4 = sb1u + k
 | 
			
		||||
	&movdqa	("xmm0",&QWP($k_sb1+16,$const));# 0 : sb1t
 | 
			
		||||
	&pshufb	("xmm0","xmm3");		# 0 = sb1t
 | 
			
		||||
	&pxor	("xmm0","xmm4");		# 0 = A
 | 
			
		||||
	&movdqa	("xmm5",&QWP($k_sb2,$const));	# 4 : sb2u
 | 
			
		||||
	&pshufb	("xmm5","xmm2");		# 4 = sb2u
 | 
			
		||||
	&movdqa	("xmm1",&QWP(-0x40,$base,$magic));# .Lk_mc_forward[]
 | 
			
		||||
	&movdqa	("xmm2",&QWP($k_sb2+16,$const));# 2 : sb2t
 | 
			
		||||
	&pshufb	("xmm2","xmm3");		# 2 = sb2t
 | 
			
		||||
	&pxor	("xmm2","xmm5");		# 2 = 2A
 | 
			
		||||
	&movdqa	("xmm4",&QWP(0,$base,$magic));	# .Lk_mc_backward[]
 | 
			
		||||
	&movdqa	("xmm3","xmm0");		# 3 = A
 | 
			
		||||
	&pshufb	("xmm0","xmm1");		# 0 = B
 | 
			
		||||
	&add	($key,16);			# next key
 | 
			
		||||
	&pxor	("xmm0","xmm2");		# 0 = 2A+B
 | 
			
		||||
	&pshufb	("xmm3","xmm4");		# 3 = D
 | 
			
		||||
	&add	($magic,16);			# next mc
 | 
			
		||||
	&pxor	("xmm3","xmm0");		# 3 = 2A+B+D
 | 
			
		||||
	&pshufb	("xmm0","xmm1");		# 0 = 2B+C
 | 
			
		||||
	&and	($magic,0x30);			# ... mod 4
 | 
			
		||||
	&pxor	("xmm0","xmm3");		# 0 = 2A+3B+C+D
 | 
			
		||||
	&sub	($round,1);			# nr--
 | 
			
		||||
 | 
			
		||||
&set_label("enc_entry");
 | 
			
		||||
	# top of round
 | 
			
		||||
	&movdqa	("xmm1","xmm6");		# 1 : i
 | 
			
		||||
	&pandn	("xmm1","xmm0");		# 1 = i<<4
 | 
			
		||||
	&psrld	("xmm1",4);			# 1 = i
 | 
			
		||||
	&pand	("xmm0","xmm6");		# 0 = k
 | 
			
		||||
	&movdqa	("xmm5",&QWP($k_inv+16,$const));# 2 : a/k
 | 
			
		||||
	&pshufb	("xmm5","xmm0");		# 2 = a/k
 | 
			
		||||
	&pxor	("xmm0","xmm1");		# 0 = j
 | 
			
		||||
	&movdqa	("xmm3","xmm7");		# 3 : 1/i
 | 
			
		||||
	&pshufb	("xmm3","xmm1");		# 3 = 1/i
 | 
			
		||||
	&pxor	("xmm3","xmm5");		# 3 = iak = 1/i + a/k
 | 
			
		||||
	&movdqa	("xmm4","xmm7");		# 4 : 1/j
 | 
			
		||||
	&pshufb	("xmm4","xmm0");		# 4 = 1/j
 | 
			
		||||
	&pxor	("xmm4","xmm5");		# 4 = jak = 1/j + a/k
 | 
			
		||||
	&movdqa	("xmm2","xmm7");		# 2 : 1/iak
 | 
			
		||||
	&pshufb	("xmm2","xmm3");		# 2 = 1/iak
 | 
			
		||||
	&pxor	("xmm2","xmm0");		# 2 = io
 | 
			
		||||
	&movdqa	("xmm3","xmm7");		# 3 : 1/jak
 | 
			
		||||
	&movdqu	("xmm5",&QWP(0,$key));
 | 
			
		||||
	&pshufb	("xmm3","xmm4");		# 3 = 1/jak
 | 
			
		||||
	&pxor	("xmm3","xmm1");		# 3 = jo
 | 
			
		||||
	&jnz	(&label("enc_loop"));
 | 
			
		||||
 | 
			
		||||
	# middle of last round
 | 
			
		||||
	&movdqa	("xmm4",&QWP($k_sbo,$const));	# 3 : sbou      .Lk_sbo
 | 
			
		||||
	&movdqa	("xmm0",&QWP($k_sbo+16,$const));# 3 : sbot      .Lk_sbo+16
 | 
			
		||||
	&pshufb	("xmm4","xmm2");		# 4 = sbou
 | 
			
		||||
	&pxor	("xmm4","xmm5");		# 4 = sb1u + k
 | 
			
		||||
	&pshufb	("xmm0","xmm3");		# 0 = sb1t
 | 
			
		||||
	&movdqa	("xmm1",&QWP(0x40,$base,$magic));# .Lk_sr[]
 | 
			
		||||
	&pxor	("xmm0","xmm4");		# 0 = A
 | 
			
		||||
	&pshufb	("xmm0","xmm1");
 | 
			
		||||
	&ret	();
 | 
			
		||||
&function_end_B("_vpaes_encrypt_core");
 | 
			
		||||
 | 
			
		||||
##
 | 
			
		||||
##  Decryption core
 | 
			
		||||
##
 | 
			
		||||
##  Same API as encryption core.
 | 
			
		||||
##
 | 
			
		||||
&function_begin_B("_vpaes_decrypt_core");
 | 
			
		||||
	&mov	($round,&DWP(240,$key));
 | 
			
		||||
	&lea	($base,&DWP($k_dsbd,$const));
 | 
			
		||||
	&movdqa	("xmm1","xmm6");
 | 
			
		||||
	&movdqa	("xmm2",&QWP($k_dipt-$k_dsbd,$base));
 | 
			
		||||
	&pandn	("xmm1","xmm0");
 | 
			
		||||
	&mov	($magic,$round);
 | 
			
		||||
	&psrld	("xmm1",4)
 | 
			
		||||
	&movdqu	("xmm5",&QWP(0,$key));
 | 
			
		||||
	&shl	($magic,4);
 | 
			
		||||
	&pand	("xmm0","xmm6");
 | 
			
		||||
	&pshufb	("xmm2","xmm0");
 | 
			
		||||
	&movdqa	("xmm0",&QWP($k_dipt-$k_dsbd+16,$base));
 | 
			
		||||
	&xor	($magic,0x30);
 | 
			
		||||
	&pshufb	("xmm0","xmm1");
 | 
			
		||||
	&and	($magic,0x30);
 | 
			
		||||
	&pxor	("xmm2","xmm5");
 | 
			
		||||
	&movdqa	("xmm5",&QWP($k_mc_forward+48,$const));
 | 
			
		||||
	&pxor	("xmm0","xmm2");
 | 
			
		||||
	&add	($key,16);
 | 
			
		||||
	&lea	($magic,&DWP($k_sr-$k_dsbd,$base,$magic));
 | 
			
		||||
	&jmp	(&label("dec_entry"));
 | 
			
		||||
 | 
			
		||||
&set_label("dec_loop",16);
 | 
			
		||||
##
 | 
			
		||||
##  Inverse mix columns
 | 
			
		||||
##
 | 
			
		||||
	&movdqa	("xmm4",&QWP(-0x20,$base));	# 4 : sb9u
 | 
			
		||||
	&pshufb	("xmm4","xmm2");		# 4 = sb9u
 | 
			
		||||
	&pxor	("xmm4","xmm0");
 | 
			
		||||
	&movdqa	("xmm0",&QWP(-0x10,$base));	# 0 : sb9t
 | 
			
		||||
	&pshufb	("xmm0","xmm3");		# 0 = sb9t
 | 
			
		||||
	&pxor	("xmm0","xmm4");		# 0 = ch
 | 
			
		||||
	&add	($key,16);			# next round key
 | 
			
		||||
 | 
			
		||||
	&pshufb	("xmm0","xmm5");		# MC ch
 | 
			
		||||
	&movdqa	("xmm4",&QWP(0,$base));		# 4 : sbdu
 | 
			
		||||
	&pshufb	("xmm4","xmm2");		# 4 = sbdu
 | 
			
		||||
	&pxor	("xmm4","xmm0");		# 4 = ch
 | 
			
		||||
	&movdqa	("xmm0",&QWP(0x10,$base));	# 0 : sbdt
 | 
			
		||||
	&pshufb	("xmm0","xmm3");		# 0 = sbdt
 | 
			
		||||
	&pxor	("xmm0","xmm4");		# 0 = ch
 | 
			
		||||
	&sub	($round,1);			# nr--
 | 
			
		||||
 | 
			
		||||
	&pshufb	("xmm0","xmm5");		# MC ch
 | 
			
		||||
	&movdqa	("xmm4",&QWP(0x20,$base));	# 4 : sbbu
 | 
			
		||||
	&pshufb	("xmm4","xmm2");		# 4 = sbbu
 | 
			
		||||
	&pxor	("xmm4","xmm0");		# 4 = ch
 | 
			
		||||
	&movdqa	("xmm0",&QWP(0x30,$base));	# 0 : sbbt
 | 
			
		||||
	&pshufb	("xmm0","xmm3");		# 0 = sbbt
 | 
			
		||||
	&pxor	("xmm0","xmm4");		# 0 = ch
 | 
			
		||||
 | 
			
		||||
	&pshufb	("xmm0","xmm5");		# MC ch
 | 
			
		||||
	&movdqa	("xmm4",&QWP(0x40,$base));	# 4 : sbeu
 | 
			
		||||
	&pshufb	("xmm4","xmm2");		# 4 = sbeu
 | 
			
		||||
	&pxor	("xmm4","xmm0");		# 4 = ch
 | 
			
		||||
	&movdqa	("xmm0",&QWP(0x50,$base));	# 0 : sbet
 | 
			
		||||
	&pshufb	("xmm0","xmm3");		# 0 = sbet
 | 
			
		||||
	&pxor	("xmm0","xmm4");		# 0 = ch
 | 
			
		||||
 | 
			
		||||
	&palignr("xmm5","xmm5",12);
 | 
			
		||||
 | 
			
		||||
&set_label("dec_entry");
 | 
			
		||||
	# top of round
 | 
			
		||||
	&movdqa	("xmm1","xmm6");		# 1 : i
 | 
			
		||||
	&pandn	("xmm1","xmm0");		# 1 = i<<4
 | 
			
		||||
	&psrld	("xmm1",4);			# 1 = i
 | 
			
		||||
	&pand	("xmm0","xmm6");		# 0 = k
 | 
			
		||||
	&movdqa	("xmm2",&QWP($k_inv+16,$const));# 2 : a/k
 | 
			
		||||
	&pshufb	("xmm2","xmm0");		# 2 = a/k
 | 
			
		||||
	&pxor	("xmm0","xmm1");		# 0 = j
 | 
			
		||||
	&movdqa	("xmm3","xmm7");		# 3 : 1/i
 | 
			
		||||
	&pshufb	("xmm3","xmm1");		# 3 = 1/i
 | 
			
		||||
	&pxor	("xmm3","xmm2");		# 3 = iak = 1/i + a/k
 | 
			
		||||
	&movdqa	("xmm4","xmm7");		# 4 : 1/j
 | 
			
		||||
	&pshufb	("xmm4","xmm0");		# 4 = 1/j
 | 
			
		||||
	&pxor	("xmm4","xmm2");		# 4 = jak = 1/j + a/k
 | 
			
		||||
	&movdqa	("xmm2","xmm7");		# 2 : 1/iak
 | 
			
		||||
	&pshufb	("xmm2","xmm3");		# 2 = 1/iak
 | 
			
		||||
	&pxor	("xmm2","xmm0");		# 2 = io
 | 
			
		||||
	&movdqa	("xmm3","xmm7");		# 3 : 1/jak
 | 
			
		||||
	&pshufb	("xmm3","xmm4");		# 3 = 1/jak
 | 
			
		||||
	&pxor	("xmm3","xmm1");		# 3 = jo
 | 
			
		||||
	&movdqu	("xmm0",&QWP(0,$key));
 | 
			
		||||
	&jnz	(&label("dec_loop"));
 | 
			
		||||
 | 
			
		||||
	# middle of last round
 | 
			
		||||
	&movdqa	("xmm4",&QWP(0x60,$base));	# 3 : sbou
 | 
			
		||||
	&pshufb	("xmm4","xmm2");		# 4 = sbou
 | 
			
		||||
	&pxor	("xmm4","xmm0");		# 4 = sb1u + k
 | 
			
		||||
	&movdqa	("xmm0",&QWP(0x70,$base));	# 0 : sbot
 | 
			
		||||
	&movdqa	("xmm2",&QWP(0,$magic));
 | 
			
		||||
	&pshufb	("xmm0","xmm3");		# 0 = sb1t
 | 
			
		||||
	&pxor	("xmm0","xmm4");		# 0 = A
 | 
			
		||||
	&pshufb	("xmm0","xmm2");
 | 
			
		||||
	&ret	();
 | 
			
		||||
&function_end_B("_vpaes_decrypt_core");
 | 
			
		||||
 | 
			
		||||
########################################################
 | 
			
		||||
##                                                    ##
 | 
			
		||||
##                  AES key schedule                  ##
 | 
			
		||||
##                                                    ##
 | 
			
		||||
########################################################
 | 
			
		||||
&function_begin_B("_vpaes_schedule_core");
 | 
			
		||||
	&add	($const,&DWP(0,"esp"));
 | 
			
		||||
	&movdqu	("xmm0",&QWP(0,$inp));		# load key (unaligned)
 | 
			
		||||
	&movdqa	("xmm2",&QWP($k_rcon,$const));	# load rcon
 | 
			
		||||
 | 
			
		||||
	# input transform
 | 
			
		||||
	&movdqa	("xmm3","xmm0");
 | 
			
		||||
	&lea	($base,&DWP($k_ipt,$const));
 | 
			
		||||
	&movdqa	(&QWP(4,"esp"),"xmm2");		# xmm8
 | 
			
		||||
	&call	("_vpaes_schedule_transform");
 | 
			
		||||
	&movdqa	("xmm7","xmm0");
 | 
			
		||||
 | 
			
		||||
	&test	($out,$out);
 | 
			
		||||
	&jnz	(&label("schedule_am_decrypting"));
 | 
			
		||||
 | 
			
		||||
	# encrypting, output zeroth round key after transform
 | 
			
		||||
	&movdqu	(&QWP(0,$key),"xmm0");
 | 
			
		||||
	&jmp	(&label("schedule_go"));
 | 
			
		||||
 | 
			
		||||
&set_label("schedule_am_decrypting");
 | 
			
		||||
	# decrypting, output zeroth round key after shiftrows
 | 
			
		||||
	&movdqa	("xmm1",&QWP($k_sr,$const,$magic));
 | 
			
		||||
	&pshufb	("xmm3","xmm1");
 | 
			
		||||
	&movdqu	(&QWP(0,$key),"xmm3");
 | 
			
		||||
	&xor	($magic,0x30);
 | 
			
		||||
 | 
			
		||||
&set_label("schedule_go");
 | 
			
		||||
	&cmp	($round,192);
 | 
			
		||||
	&ja	(&label("schedule_256"));
 | 
			
		||||
	&je	(&label("schedule_192"));
 | 
			
		||||
	# 128: fall though
 | 
			
		||||
 | 
			
		||||
##
 | 
			
		||||
##  .schedule_128
 | 
			
		||||
##
 | 
			
		||||
##  128-bit specific part of key schedule.
 | 
			
		||||
##
 | 
			
		||||
##  This schedule is really simple, because all its parts
 | 
			
		||||
##  are accomplished by the subroutines.
 | 
			
		||||
##
 | 
			
		||||
&set_label("schedule_128");
 | 
			
		||||
	&mov	($round,10);
 | 
			
		||||
 | 
			
		||||
&set_label("loop_schedule_128");
 | 
			
		||||
	&call	("_vpaes_schedule_round");
 | 
			
		||||
	&dec	($round);
 | 
			
		||||
	&jz	(&label("schedule_mangle_last"));
 | 
			
		||||
	&call	("_vpaes_schedule_mangle");	# write output
 | 
			
		||||
	&jmp	(&label("loop_schedule_128"));
 | 
			
		||||
 | 
			
		||||
##
 | 
			
		||||
##  .aes_schedule_192
 | 
			
		||||
##
 | 
			
		||||
##  192-bit specific part of key schedule.
 | 
			
		||||
##
 | 
			
		||||
##  The main body of this schedule is the same as the 128-bit
 | 
			
		||||
##  schedule, but with more smearing.  The long, high side is
 | 
			
		||||
##  stored in %xmm7 as before, and the short, low side is in
 | 
			
		||||
##  the high bits of %xmm6.
 | 
			
		||||
##
 | 
			
		||||
##  This schedule is somewhat nastier, however, because each
 | 
			
		||||
##  round produces 192 bits of key material, or 1.5 round keys.
 | 
			
		||||
##  Therefore, on each cycle we do 2 rounds and produce 3 round
 | 
			
		||||
##  keys.
 | 
			
		||||
##
 | 
			
		||||
&set_label("schedule_192",16);
 | 
			
		||||
	&movdqu	("xmm0",&QWP(8,$inp));		# load key part 2 (very unaligned)
 | 
			
		||||
	&call	("_vpaes_schedule_transform");	# input transform	
 | 
			
		||||
	&movdqa	("xmm6","xmm0");		# save short part
 | 
			
		||||
	&pxor	("xmm4","xmm4");		# clear 4
 | 
			
		||||
	&movhlps("xmm6","xmm4");		# clobber low side with zeros
 | 
			
		||||
	&mov	($round,4);
 | 
			
		||||
 | 
			
		||||
&set_label("loop_schedule_192");
 | 
			
		||||
	&call	("_vpaes_schedule_round");
 | 
			
		||||
	&palignr("xmm0","xmm6",8);
 | 
			
		||||
	&call	("_vpaes_schedule_mangle");	# save key n
 | 
			
		||||
	&call	("_vpaes_schedule_192_smear");
 | 
			
		||||
	&call	("_vpaes_schedule_mangle");	# save key n+1
 | 
			
		||||
	&call	("_vpaes_schedule_round");
 | 
			
		||||
	&dec	($round);
 | 
			
		||||
	&jz	(&label("schedule_mangle_last"));
 | 
			
		||||
	&call	("_vpaes_schedule_mangle");	# save key n+2
 | 
			
		||||
	&call	("_vpaes_schedule_192_smear");
 | 
			
		||||
	&jmp	(&label("loop_schedule_192"));
 | 
			
		||||
 | 
			
		||||
##
 | 
			
		||||
##  .aes_schedule_256
 | 
			
		||||
##
 | 
			
		||||
##  256-bit specific part of key schedule.
 | 
			
		||||
##
 | 
			
		||||
##  The structure here is very similar to the 128-bit
 | 
			
		||||
##  schedule, but with an additional "low side" in
 | 
			
		||||
##  %xmm6.  The low side's rounds are the same as the
 | 
			
		||||
##  high side's, except no rcon and no rotation.
 | 
			
		||||
##
 | 
			
		||||
&set_label("schedule_256",16);
 | 
			
		||||
	&movdqu	("xmm0",&QWP(16,$inp));		# load key part 2 (unaligned)
 | 
			
		||||
	&call	("_vpaes_schedule_transform");	# input transform	
 | 
			
		||||
	&mov	($round,7);
 | 
			
		||||
 | 
			
		||||
&set_label("loop_schedule_256");
 | 
			
		||||
	&call	("_vpaes_schedule_mangle");	# output low result
 | 
			
		||||
	&movdqa	("xmm6","xmm0");		# save cur_lo in xmm6
 | 
			
		||||
 | 
			
		||||
	# high round
 | 
			
		||||
	&call	("_vpaes_schedule_round");
 | 
			
		||||
	&dec	($round);
 | 
			
		||||
	&jz	(&label("schedule_mangle_last"));
 | 
			
		||||
	&call	("_vpaes_schedule_mangle");	
 | 
			
		||||
 | 
			
		||||
	# low round. swap xmm7 and xmm6
 | 
			
		||||
	&pshufd	("xmm0","xmm0",0xFF);
 | 
			
		||||
	&movdqa	(&QWP(20,"esp"),"xmm7");
 | 
			
		||||
	&movdqa	("xmm7","xmm6");
 | 
			
		||||
	&call	("_vpaes_schedule_low_round");
 | 
			
		||||
	&movdqa	("xmm7",&QWP(20,"esp"));
 | 
			
		||||
 | 
			
		||||
	&jmp	(&label("loop_schedule_256"));
 | 
			
		||||
 | 
			
		||||
##
 | 
			
		||||
##  .aes_schedule_mangle_last
 | 
			
		||||
##
 | 
			
		||||
##  Mangler for last round of key schedule
 | 
			
		||||
##  Mangles %xmm0
 | 
			
		||||
##    when encrypting, outputs out(%xmm0) ^ 63
 | 
			
		||||
##    when decrypting, outputs unskew(%xmm0)
 | 
			
		||||
##
 | 
			
		||||
##  Always called right before return... jumps to cleanup and exits
 | 
			
		||||
##
 | 
			
		||||
&set_label("schedule_mangle_last",16);
 | 
			
		||||
	# schedule last round key from xmm0
 | 
			
		||||
	&lea	($base,&DWP($k_deskew,$const));
 | 
			
		||||
	&test	($out,$out);
 | 
			
		||||
	&jnz	(&label("schedule_mangle_last_dec"));
 | 
			
		||||
 | 
			
		||||
	# encrypting
 | 
			
		||||
	&movdqa	("xmm1",&QWP($k_sr,$const,$magic));
 | 
			
		||||
	&pshufb	("xmm0","xmm1");		# output permute
 | 
			
		||||
	&lea	($base,&DWP($k_opt,$const));	# prepare to output transform
 | 
			
		||||
	&add	($key,32);
 | 
			
		||||
 | 
			
		||||
&set_label("schedule_mangle_last_dec");
 | 
			
		||||
	&add	($key,-16);
 | 
			
		||||
	&pxor	("xmm0",&QWP($k_s63,$const));
 | 
			
		||||
	&call	("_vpaes_schedule_transform");	# output transform
 | 
			
		||||
	&movdqu	(&QWP(0,$key),"xmm0");		# save last key
 | 
			
		||||
 | 
			
		||||
	# cleanup
 | 
			
		||||
	&pxor	("xmm0","xmm0");
 | 
			
		||||
	&pxor	("xmm1","xmm1");
 | 
			
		||||
	&pxor	("xmm2","xmm2");
 | 
			
		||||
	&pxor	("xmm3","xmm3");
 | 
			
		||||
	&pxor	("xmm4","xmm4");
 | 
			
		||||
	&pxor	("xmm5","xmm5");
 | 
			
		||||
	&pxor	("xmm6","xmm6");
 | 
			
		||||
	&pxor	("xmm7","xmm7");
 | 
			
		||||
	&ret	();
 | 
			
		||||
&function_end_B("_vpaes_schedule_core");
 | 
			
		||||
 | 
			
		||||
##
 | 
			
		||||
##  .aes_schedule_192_smear
 | 
			
		||||
##
 | 
			
		||||
##  Smear the short, low side in the 192-bit key schedule.
 | 
			
		||||
##
 | 
			
		||||
##  Inputs:
 | 
			
		||||
##    %xmm7: high side, b  a  x  y
 | 
			
		||||
##    %xmm6:  low side, d  c  0  0
 | 
			
		||||
##    %xmm13: 0
 | 
			
		||||
##
 | 
			
		||||
##  Outputs:
 | 
			
		||||
##    %xmm6: b+c+d  b+c  0  0
 | 
			
		||||
##    %xmm0: b+c+d  b+c  b  a
 | 
			
		||||
##
 | 
			
		||||
&function_begin_B("_vpaes_schedule_192_smear");
 | 
			
		||||
	&pshufd	("xmm0","xmm6",0x80);		# d c 0 0 -> c 0 0 0
 | 
			
		||||
	&pxor	("xmm6","xmm0");		# -> c+d c 0 0
 | 
			
		||||
	&pshufd	("xmm0","xmm7",0xFE);		# b a _ _ -> b b b a
 | 
			
		||||
	&pxor	("xmm6","xmm0");		# -> b+c+d b+c b a
 | 
			
		||||
	&movdqa	("xmm0","xmm6");
 | 
			
		||||
	&pxor	("xmm1","xmm1");
 | 
			
		||||
	&movhlps("xmm6","xmm1");		# clobber low side with zeros
 | 
			
		||||
	&ret	();
 | 
			
		||||
&function_end_B("_vpaes_schedule_192_smear");
 | 
			
		||||
 | 
			
		||||
##
 | 
			
		||||
##  .aes_schedule_round
 | 
			
		||||
##
 | 
			
		||||
##  Runs one main round of the key schedule on %xmm0, %xmm7
 | 
			
		||||
##
 | 
			
		||||
##  Specifically, runs subbytes on the high dword of %xmm0
 | 
			
		||||
##  then rotates it by one byte and xors into the low dword of
 | 
			
		||||
##  %xmm7.
 | 
			
		||||
##
 | 
			
		||||
##  Adds rcon from low byte of %xmm8, then rotates %xmm8 for
 | 
			
		||||
##  next rcon.
 | 
			
		||||
##
 | 
			
		||||
##  Smears the dwords of %xmm7 by xoring the low into the
 | 
			
		||||
##  second low, result into third, result into highest.
 | 
			
		||||
##
 | 
			
		||||
##  Returns results in %xmm7 = %xmm0.
 | 
			
		||||
##  Clobbers %xmm1-%xmm5.
 | 
			
		||||
##
 | 
			
		||||
&function_begin_B("_vpaes_schedule_round");
 | 
			
		||||
	# extract rcon from xmm8
 | 
			
		||||
	&movdqa	("xmm2",&QWP(8,"esp"));		# xmm8
 | 
			
		||||
	&pxor	("xmm1","xmm1");
 | 
			
		||||
	&palignr("xmm1","xmm2",15);
 | 
			
		||||
	&palignr("xmm2","xmm2",15);
 | 
			
		||||
	&pxor	("xmm7","xmm1");
 | 
			
		||||
 | 
			
		||||
	# rotate
 | 
			
		||||
	&pshufd	("xmm0","xmm0",0xFF);
 | 
			
		||||
	&palignr("xmm0","xmm0",1);
 | 
			
		||||
 | 
			
		||||
	# fall through...
 | 
			
		||||
	&movdqa	(&QWP(8,"esp"),"xmm2");		# xmm8
 | 
			
		||||
 | 
			
		||||
	# low round: same as high round, but no rotation and no rcon.
 | 
			
		||||
&set_label("_vpaes_schedule_low_round");
 | 
			
		||||
	# smear xmm7
 | 
			
		||||
	&movdqa	("xmm1","xmm7");
 | 
			
		||||
	&pslldq	("xmm7",4);
 | 
			
		||||
	&pxor	("xmm7","xmm1");
 | 
			
		||||
	&movdqa	("xmm1","xmm7");
 | 
			
		||||
	&pslldq	("xmm7",8);
 | 
			
		||||
	&pxor	("xmm7","xmm1");
 | 
			
		||||
	&pxor	("xmm7",&QWP($k_s63,$const));
 | 
			
		||||
 | 
			
		||||
	# subbyte
 | 
			
		||||
	&movdqa	("xmm4",&QWP($k_s0F,$const));
 | 
			
		||||
	&movdqa	("xmm5",&QWP($k_inv,$const));	# 4 : 1/j
 | 
			
		||||
	&movdqa	("xmm1","xmm4");	
 | 
			
		||||
	&pandn	("xmm1","xmm0");
 | 
			
		||||
	&psrld	("xmm1",4);			# 1 = i
 | 
			
		||||
	&pand	("xmm0","xmm4");		# 0 = k
 | 
			
		||||
	&movdqa	("xmm2",&QWP($k_inv+16,$const));# 2 : a/k
 | 
			
		||||
	&pshufb	("xmm2","xmm0");		# 2 = a/k
 | 
			
		||||
	&pxor	("xmm0","xmm1");		# 0 = j
 | 
			
		||||
	&movdqa	("xmm3","xmm5");		# 3 : 1/i
 | 
			
		||||
	&pshufb	("xmm3","xmm1");		# 3 = 1/i
 | 
			
		||||
	&pxor	("xmm3","xmm2");		# 3 = iak = 1/i + a/k
 | 
			
		||||
	&movdqa	("xmm4","xmm5");		# 4 : 1/j
 | 
			
		||||
	&pshufb	("xmm4","xmm0");		# 4 = 1/j
 | 
			
		||||
	&pxor	("xmm4","xmm2");		# 4 = jak = 1/j + a/k
 | 
			
		||||
	&movdqa	("xmm2","xmm5");		# 2 : 1/iak
 | 
			
		||||
	&pshufb	("xmm2","xmm3");		# 2 = 1/iak
 | 
			
		||||
	&pxor	("xmm2","xmm0");		# 2 = io
 | 
			
		||||
	&movdqa	("xmm3","xmm5");		# 3 : 1/jak
 | 
			
		||||
	&pshufb	("xmm3","xmm4");		# 3 = 1/jak
 | 
			
		||||
	&pxor	("xmm3","xmm1");		# 3 = jo
 | 
			
		||||
	&movdqa	("xmm4",&QWP($k_sb1,$const));	# 4 : sbou
 | 
			
		||||
	&pshufb	("xmm4","xmm2");		# 4 = sbou
 | 
			
		||||
	&movdqa	("xmm0",&QWP($k_sb1+16,$const));# 0 : sbot
 | 
			
		||||
	&pshufb	("xmm0","xmm3");		# 0 = sb1t
 | 
			
		||||
	&pxor	("xmm0","xmm4");		# 0 = sbox output
 | 
			
		||||
 | 
			
		||||
	# add in smeared stuff
 | 
			
		||||
	&pxor	("xmm0","xmm7");
 | 
			
		||||
	&movdqa	("xmm7","xmm0");
 | 
			
		||||
	&ret	();
 | 
			
		||||
&function_end_B("_vpaes_schedule_round");
 | 
			
		||||
 | 
			
		||||
##
 | 
			
		||||
##  .aes_schedule_transform
 | 
			
		||||
##
 | 
			
		||||
##  Linear-transform %xmm0 according to tables at (%ebx)
 | 
			
		||||
##
 | 
			
		||||
##  Output in %xmm0
 | 
			
		||||
##  Clobbers %xmm1, %xmm2
 | 
			
		||||
##
 | 
			
		||||
&function_begin_B("_vpaes_schedule_transform");
 | 
			
		||||
	&movdqa	("xmm2",&QWP($k_s0F,$const));
 | 
			
		||||
	&movdqa	("xmm1","xmm2");
 | 
			
		||||
	&pandn	("xmm1","xmm0");
 | 
			
		||||
	&psrld	("xmm1",4);
 | 
			
		||||
	&pand	("xmm0","xmm2");
 | 
			
		||||
	&movdqa	("xmm2",&QWP(0,$base));
 | 
			
		||||
	&pshufb	("xmm2","xmm0");
 | 
			
		||||
	&movdqa	("xmm0",&QWP(16,$base));
 | 
			
		||||
	&pshufb	("xmm0","xmm1");
 | 
			
		||||
	&pxor	("xmm0","xmm2");
 | 
			
		||||
	&ret	();
 | 
			
		||||
&function_end_B("_vpaes_schedule_transform");
 | 
			
		||||
 | 
			
		||||
##
 | 
			
		||||
##  .aes_schedule_mangle
 | 
			
		||||
##
 | 
			
		||||
##  Mangle xmm0 from (basis-transformed) standard version
 | 
			
		||||
##  to our version.
 | 
			
		||||
##
 | 
			
		||||
##  On encrypt,
 | 
			
		||||
##    xor with 0x63
 | 
			
		||||
##    multiply by circulant 0,1,1,1
 | 
			
		||||
##    apply shiftrows transform
 | 
			
		||||
##
 | 
			
		||||
##  On decrypt,
 | 
			
		||||
##    xor with 0x63
 | 
			
		||||
##    multiply by "inverse mixcolumns" circulant E,B,D,9
 | 
			
		||||
##    deskew
 | 
			
		||||
##    apply shiftrows transform
 | 
			
		||||
##
 | 
			
		||||
##
 | 
			
		||||
##  Writes out to (%edx), and increments or decrements it
 | 
			
		||||
##  Keeps track of round number mod 4 in %ecx
 | 
			
		||||
##  Preserves xmm0
 | 
			
		||||
##  Clobbers xmm1-xmm5
 | 
			
		||||
##
 | 
			
		||||
&function_begin_B("_vpaes_schedule_mangle");
 | 
			
		||||
	&movdqa	("xmm4","xmm0");	# save xmm0 for later
 | 
			
		||||
	&movdqa	("xmm5",&QWP($k_mc_forward,$const));
 | 
			
		||||
	&test	($out,$out);
 | 
			
		||||
	&jnz	(&label("schedule_mangle_dec"));
 | 
			
		||||
 | 
			
		||||
	# encrypting
 | 
			
		||||
	&add	($key,16);
 | 
			
		||||
	&pxor	("xmm4",&QWP($k_s63,$const));
 | 
			
		||||
	&pshufb	("xmm4","xmm5");
 | 
			
		||||
	&movdqa	("xmm3","xmm4");
 | 
			
		||||
	&pshufb	("xmm4","xmm5");
 | 
			
		||||
	&pxor	("xmm3","xmm4");
 | 
			
		||||
	&pshufb	("xmm4","xmm5");
 | 
			
		||||
	&pxor	("xmm3","xmm4");
 | 
			
		||||
 | 
			
		||||
	&jmp	(&label("schedule_mangle_both"));
 | 
			
		||||
 | 
			
		||||
&set_label("schedule_mangle_dec",16);
 | 
			
		||||
	# inverse mix columns
 | 
			
		||||
	&movdqa	("xmm2",&QWP($k_s0F,$const));
 | 
			
		||||
	&lea	($inp,&DWP($k_dksd,$const));
 | 
			
		||||
	&movdqa	("xmm1","xmm2");
 | 
			
		||||
	&pandn	("xmm1","xmm4");
 | 
			
		||||
	&psrld	("xmm1",4);			# 1 = hi
 | 
			
		||||
	&pand	("xmm4","xmm2");		# 4 = lo
 | 
			
		||||
 | 
			
		||||
	&movdqa	("xmm2",&QWP(0,$inp));
 | 
			
		||||
	&pshufb	("xmm2","xmm4");
 | 
			
		||||
	&movdqa	("xmm3",&QWP(0x10,$inp));
 | 
			
		||||
	&pshufb	("xmm3","xmm1");
 | 
			
		||||
	&pxor	("xmm3","xmm2");
 | 
			
		||||
	&pshufb	("xmm3","xmm5");
 | 
			
		||||
 | 
			
		||||
	&movdqa	("xmm2",&QWP(0x20,$inp));
 | 
			
		||||
	&pshufb	("xmm2","xmm4");
 | 
			
		||||
	&pxor	("xmm2","xmm3");
 | 
			
		||||
	&movdqa	("xmm3",&QWP(0x30,$inp));
 | 
			
		||||
	&pshufb	("xmm3","xmm1");
 | 
			
		||||
	&pxor	("xmm3","xmm2");
 | 
			
		||||
	&pshufb	("xmm3","xmm5");
 | 
			
		||||
 | 
			
		||||
	&movdqa	("xmm2",&QWP(0x40,$inp));
 | 
			
		||||
	&pshufb	("xmm2","xmm4");
 | 
			
		||||
	&pxor	("xmm2","xmm3");
 | 
			
		||||
	&movdqa	("xmm3",&QWP(0x50,$inp));
 | 
			
		||||
	&pshufb	("xmm3","xmm1");
 | 
			
		||||
	&pxor	("xmm3","xmm2");
 | 
			
		||||
	&pshufb	("xmm3","xmm5");
 | 
			
		||||
 | 
			
		||||
	&movdqa	("xmm2",&QWP(0x60,$inp));
 | 
			
		||||
	&pshufb	("xmm2","xmm4");
 | 
			
		||||
	&pxor	("xmm2","xmm3");
 | 
			
		||||
	&movdqa	("xmm3",&QWP(0x70,$inp));
 | 
			
		||||
	&pshufb	("xmm3","xmm1");
 | 
			
		||||
	&pxor	("xmm3","xmm2");
 | 
			
		||||
 | 
			
		||||
	&add	($key,-16);
 | 
			
		||||
 | 
			
		||||
&set_label("schedule_mangle_both");
 | 
			
		||||
	&movdqa	("xmm1",&QWP($k_sr,$const,$magic));
 | 
			
		||||
	&pshufb	("xmm3","xmm1");
 | 
			
		||||
	&add	($magic,-16);
 | 
			
		||||
	&and	($magic,0x30);
 | 
			
		||||
	&movdqu	(&QWP(0,$key),"xmm3");
 | 
			
		||||
	&ret	();
 | 
			
		||||
&function_end_B("_vpaes_schedule_mangle");
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Interface to OpenSSL
 | 
			
		||||
#
 | 
			
		||||
&function_begin("${PREFIX}_set_encrypt_key");
 | 
			
		||||
	&mov	($inp,&wparam(0));		# inp
 | 
			
		||||
	&lea	($base,&DWP(-56,"esp"));
 | 
			
		||||
	&mov	($round,&wparam(1));		# bits
 | 
			
		||||
	&and	($base,-16);
 | 
			
		||||
	&mov	($key,&wparam(2));		# key
 | 
			
		||||
	&xchg	($base,"esp");			# alloca
 | 
			
		||||
	&mov	(&DWP(48,"esp"),$base);
 | 
			
		||||
 | 
			
		||||
	&mov	($base,$round);
 | 
			
		||||
	&shr	($base,5);
 | 
			
		||||
	&add	($base,5);
 | 
			
		||||
	&mov	(&DWP(240,$key),$base);		# AES_KEY->rounds = nbits/32+5;
 | 
			
		||||
	&mov	($magic,0x30);
 | 
			
		||||
	&mov	($out,0);
 | 
			
		||||
 | 
			
		||||
	&lea	($const,&DWP(&label("_vpaes_consts")."+0x30-".&label("pic_point")));
 | 
			
		||||
	&call	("_vpaes_schedule_core");
 | 
			
		||||
&set_label("pic_point");
 | 
			
		||||
 | 
			
		||||
	&mov	("esp",&DWP(48,"esp"));
 | 
			
		||||
	&xor	("eax","eax");
 | 
			
		||||
&function_end("${PREFIX}_set_encrypt_key");
 | 
			
		||||
 | 
			
		||||
&function_begin("${PREFIX}_set_decrypt_key");
 | 
			
		||||
	&mov	($inp,&wparam(0));		# inp
 | 
			
		||||
	&lea	($base,&DWP(-56,"esp"));
 | 
			
		||||
	&mov	($round,&wparam(1));		# bits
 | 
			
		||||
	&and	($base,-16);
 | 
			
		||||
	&mov	($key,&wparam(2));		# key
 | 
			
		||||
	&xchg	($base,"esp");			# alloca
 | 
			
		||||
	&mov	(&DWP(48,"esp"),$base);
 | 
			
		||||
 | 
			
		||||
	&mov	($base,$round);
 | 
			
		||||
	&shr	($base,5);
 | 
			
		||||
	&add	($base,5);
 | 
			
		||||
	&mov	(&DWP(240,$key),$base);	# AES_KEY->rounds = nbits/32+5;
 | 
			
		||||
	&shl	($base,4);
 | 
			
		||||
	&lea	($key,&DWP(16,$key,$base));
 | 
			
		||||
 | 
			
		||||
	&mov	($out,1);
 | 
			
		||||
	&mov	($magic,$round);
 | 
			
		||||
	&shr	($magic,1);
 | 
			
		||||
	&and	($magic,32);
 | 
			
		||||
	&xor	($magic,32);			# nbist==192?0:32;
 | 
			
		||||
 | 
			
		||||
	&lea	($const,&DWP(&label("_vpaes_consts")."+0x30-".&label("pic_point")));
 | 
			
		||||
	&call	("_vpaes_schedule_core");
 | 
			
		||||
&set_label("pic_point");
 | 
			
		||||
 | 
			
		||||
	&mov	("esp",&DWP(48,"esp"));
 | 
			
		||||
	&xor	("eax","eax");
 | 
			
		||||
&function_end("${PREFIX}_set_decrypt_key");
 | 
			
		||||
 | 
			
		||||
&function_begin("${PREFIX}_encrypt");
 | 
			
		||||
	&lea	($const,&DWP(&label("_vpaes_consts")."+0x30-".&label("pic_point")));
 | 
			
		||||
	&call	("_vpaes_preheat");
 | 
			
		||||
&set_label("pic_point");
 | 
			
		||||
	&mov	($inp,&wparam(0));		# inp
 | 
			
		||||
	&lea	($base,&DWP(-56,"esp"));
 | 
			
		||||
	&mov	($out,&wparam(1));		# out
 | 
			
		||||
	&and	($base,-16);
 | 
			
		||||
	&mov	($key,&wparam(2));		# key
 | 
			
		||||
	&xchg	($base,"esp");			# alloca
 | 
			
		||||
	&mov	(&DWP(48,"esp"),$base);
 | 
			
		||||
 | 
			
		||||
	&movdqu	("xmm0",&QWP(0,$inp));
 | 
			
		||||
	&call	("_vpaes_encrypt_core");
 | 
			
		||||
	&movdqu	(&QWP(0,$out),"xmm0");
 | 
			
		||||
 | 
			
		||||
	&mov	("esp",&DWP(48,"esp"));
 | 
			
		||||
&function_end("${PREFIX}_encrypt");
 | 
			
		||||
 | 
			
		||||
&function_begin("${PREFIX}_decrypt");
 | 
			
		||||
	&lea	($const,&DWP(&label("_vpaes_consts")."+0x30-".&label("pic_point")));
 | 
			
		||||
	&call	("_vpaes_preheat");
 | 
			
		||||
&set_label("pic_point");
 | 
			
		||||
	&mov	($inp,&wparam(0));		# inp
 | 
			
		||||
	&lea	($base,&DWP(-56,"esp"));
 | 
			
		||||
	&mov	($out,&wparam(1));		# out
 | 
			
		||||
	&and	($base,-16);
 | 
			
		||||
	&mov	($key,&wparam(2));		# key
 | 
			
		||||
	&xchg	($base,"esp");			# alloca
 | 
			
		||||
	&mov	(&DWP(48,"esp"),$base);
 | 
			
		||||
 | 
			
		||||
	&movdqu	("xmm0",&QWP(0,$inp));
 | 
			
		||||
	&call	("_vpaes_decrypt_core");
 | 
			
		||||
	&movdqu	(&QWP(0,$out),"xmm0");
 | 
			
		||||
 | 
			
		||||
	&mov	("esp",&DWP(48,"esp"));
 | 
			
		||||
&function_end("${PREFIX}_decrypt");
 | 
			
		||||
 | 
			
		||||
&function_begin("${PREFIX}_cbc_encrypt");
 | 
			
		||||
	&mov	($inp,&wparam(0));		# inp
 | 
			
		||||
	&mov	($out,&wparam(1));		# out
 | 
			
		||||
	&mov	($round,&wparam(2));		# len
 | 
			
		||||
	&mov	($key,&wparam(3));		# key
 | 
			
		||||
	&sub	($round,16);
 | 
			
		||||
	&jc	(&label("cbc_abort"));
 | 
			
		||||
	&lea	($base,&DWP(-56,"esp"));
 | 
			
		||||
	&mov	($const,&wparam(4));		# ivp
 | 
			
		||||
	&and	($base,-16);
 | 
			
		||||
	&mov	($magic,&wparam(5));		# enc
 | 
			
		||||
	&xchg	($base,"esp");			# alloca
 | 
			
		||||
	&movdqu	("xmm1",&QWP(0,$const));	# load IV
 | 
			
		||||
	&sub	($out,$inp);
 | 
			
		||||
	&mov	(&DWP(48,"esp"),$base);
 | 
			
		||||
 | 
			
		||||
	&mov	(&DWP(0,"esp"),$out);		# save out
 | 
			
		||||
	&mov	(&DWP(4,"esp"),$key)		# save key
 | 
			
		||||
	&mov	(&DWP(8,"esp"),$const);		# save ivp
 | 
			
		||||
	&mov	($out,$round);			# $out works as $len
 | 
			
		||||
 | 
			
		||||
	&lea	($const,&DWP(&label("_vpaes_consts")."+0x30-".&label("pic_point")));
 | 
			
		||||
	&call	("_vpaes_preheat");
 | 
			
		||||
&set_label("pic_point");
 | 
			
		||||
	&cmp	($magic,0);
 | 
			
		||||
	&je	(&label("cbc_dec_loop"));
 | 
			
		||||
	&jmp	(&label("cbc_enc_loop"));
 | 
			
		||||
 | 
			
		||||
&set_label("cbc_enc_loop",16);
 | 
			
		||||
	&movdqu	("xmm0",&QWP(0,$inp));		# load input
 | 
			
		||||
	&pxor	("xmm0","xmm1");		# inp^=iv
 | 
			
		||||
	&call	("_vpaes_encrypt_core");
 | 
			
		||||
	&mov	($base,&DWP(0,"esp"));		# restore out
 | 
			
		||||
	&mov	($key,&DWP(4,"esp"));		# restore key
 | 
			
		||||
	&movdqa	("xmm1","xmm0");
 | 
			
		||||
	&movdqu	(&QWP(0,$base,$inp),"xmm0");	# write output
 | 
			
		||||
	&lea	($inp,&DWP(16,$inp));
 | 
			
		||||
	&sub	($out,16);
 | 
			
		||||
	&jnc	(&label("cbc_enc_loop"));
 | 
			
		||||
	&jmp	(&label("cbc_done"));
 | 
			
		||||
 | 
			
		||||
&set_label("cbc_dec_loop",16);
 | 
			
		||||
	&movdqu	("xmm0",&QWP(0,$inp));		# load input
 | 
			
		||||
	&movdqa	(&QWP(16,"esp"),"xmm1");	# save IV
 | 
			
		||||
	&movdqa	(&QWP(32,"esp"),"xmm0");	# save future IV
 | 
			
		||||
	&call	("_vpaes_decrypt_core");
 | 
			
		||||
	&mov	($base,&DWP(0,"esp"));		# restore out
 | 
			
		||||
	&mov	($key,&DWP(4,"esp"));		# restore key
 | 
			
		||||
	&pxor	("xmm0",&QWP(16,"esp"));	# out^=iv
 | 
			
		||||
	&movdqa	("xmm1",&QWP(32,"esp"));	# load next IV
 | 
			
		||||
	&movdqu	(&QWP(0,$base,$inp),"xmm0");	# write output
 | 
			
		||||
	&lea	($inp,&DWP(16,$inp));
 | 
			
		||||
	&sub	($out,16);
 | 
			
		||||
	&jnc	(&label("cbc_dec_loop"));
 | 
			
		||||
 | 
			
		||||
&set_label("cbc_done");
 | 
			
		||||
	&mov	($base,&DWP(8,"esp"));		# restore ivp
 | 
			
		||||
	&mov	("esp",&DWP(48,"esp"));
 | 
			
		||||
	&movdqu	(&QWP(0,$base),"xmm1");		# write IV
 | 
			
		||||
&set_label("cbc_abort");
 | 
			
		||||
&function_end("${PREFIX}_cbc_encrypt");
 | 
			
		||||
 | 
			
		||||
&asm_finish();
 | 
			
		||||
							
								
								
									
										1207
									
								
								crypto/aes/asm/vpaes-x86_64.pl
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										1207
									
								
								crypto/aes/asm/vpaes-x86_64.pl
									
									
									
									
									
										Normal file
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							
							
								
								
									
										51
									
								
								crypto/arm_arch.h
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										51
									
								
								crypto/arm_arch.h
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,51 @@
 | 
			
		||||
#ifndef __ARM_ARCH_H__
 | 
			
		||||
#define __ARM_ARCH_H__
 | 
			
		||||
 | 
			
		||||
#if !defined(__ARM_ARCH__)
 | 
			
		||||
# if defined(__CC_ARM)
 | 
			
		||||
#  define __ARM_ARCH__ __TARGET_ARCH_ARM
 | 
			
		||||
#  if defined(__BIG_ENDIAN)
 | 
			
		||||
#   define __ARMEB__
 | 
			
		||||
#  else
 | 
			
		||||
#   define __ARMEL__
 | 
			
		||||
#  endif
 | 
			
		||||
# elif defined(__GNUC__)
 | 
			
		||||
  /*
 | 
			
		||||
   * Why doesn't gcc define __ARM_ARCH__? Instead it defines
 | 
			
		||||
   * bunch of below macros. See all_architectires[] table in
 | 
			
		||||
   * gcc/config/arm/arm.c. On a side note it defines
 | 
			
		||||
   * __ARMEL__/__ARMEB__ for little-/big-endian.
 | 
			
		||||
   */
 | 
			
		||||
#  if	defined(__ARM_ARCH_7__)	|| defined(__ARM_ARCH_7A__)	|| \
 | 
			
		||||
	defined(__ARM_ARCH_7R__)|| defined(__ARM_ARCH_7M__)	|| \
 | 
			
		||||
	defined(__ARM_ARCH_7EM__)
 | 
			
		||||
#   define __ARM_ARCH__ 7
 | 
			
		||||
#  elif	defined(__ARM_ARCH_6__)	|| defined(__ARM_ARCH_6J__)	|| \
 | 
			
		||||
	defined(__ARM_ARCH_6K__)|| defined(__ARM_ARCH_6M__)	|| \
 | 
			
		||||
	defined(__ARM_ARCH_6Z__)|| defined(__ARM_ARCH_6ZK__)	|| \
 | 
			
		||||
	defined(__ARM_ARCH_6T2__)
 | 
			
		||||
#   define __ARM_ARCH__ 6
 | 
			
		||||
#  elif	defined(__ARM_ARCH_5__)	|| defined(__ARM_ARCH_5T__)	|| \
 | 
			
		||||
	defined(__ARM_ARCH_5E__)|| defined(__ARM_ARCH_5TE__)	|| \
 | 
			
		||||
	defined(__ARM_ARCH_5TEJ__)
 | 
			
		||||
#   define __ARM_ARCH__ 5
 | 
			
		||||
#  elif	defined(__ARM_ARCH_4__)	|| defined(__ARM_ARCH_4T__)
 | 
			
		||||
#   define __ARM_ARCH__ 4
 | 
			
		||||
#  else
 | 
			
		||||
#   error "unsupported ARM architecture"
 | 
			
		||||
#  endif
 | 
			
		||||
# endif
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#ifdef OPENSSL_FIPSCANISTER
 | 
			
		||||
#include <openssl/fipssyms.h>
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#if !__ASSEMBLER__
 | 
			
		||||
extern unsigned int OPENSSL_armcap_P;
 | 
			
		||||
                                     
 | 
			
		||||
#define ARMV7_NEON      (1<<0)
 | 
			
		||||
#define ARMV7_TICK      (1<<1)
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#endif
 | 
			
		||||
							
								
								
									
										80
									
								
								crypto/armcap.c
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										80
									
								
								crypto/armcap.c
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,80 @@
 | 
			
		||||
#include <stdio.h>
 | 
			
		||||
#include <stdlib.h>
 | 
			
		||||
#include <string.h>
 | 
			
		||||
#include <setjmp.h>
 | 
			
		||||
#include <signal.h>
 | 
			
		||||
#include <crypto.h>
 | 
			
		||||
 | 
			
		||||
#include "arm_arch.h"
 | 
			
		||||
 | 
			
		||||
unsigned int OPENSSL_armcap_P;
 | 
			
		||||
 | 
			
		||||
static sigset_t all_masked;
 | 
			
		||||
 | 
			
		||||
static sigjmp_buf ill_jmp;
 | 
			
		||||
static void ill_handler (int sig) { siglongjmp(ill_jmp,sig); }
 | 
			
		||||
 | 
			
		||||
/*
 | 
			
		||||
 * Following subroutines could have been inlined, but it's not all
 | 
			
		||||
 * ARM compilers support inline assembler...
 | 
			
		||||
 */
 | 
			
		||||
void _armv7_neon_probe(void);
 | 
			
		||||
unsigned int _armv7_tick(void);
 | 
			
		||||
 | 
			
		||||
unsigned int OPENSSL_rdtsc(void)
 | 
			
		||||
	{
 | 
			
		||||
	if (OPENSSL_armcap_P & ARMV7_TICK)
 | 
			
		||||
		return _armv7_tick();
 | 
			
		||||
	else
 | 
			
		||||
		return 0;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
#if defined(__GNUC__) && __GNUC__>=2
 | 
			
		||||
void OPENSSL_cpuid_setup(void) __attribute__((constructor));
 | 
			
		||||
#endif
 | 
			
		||||
void OPENSSL_cpuid_setup(void)
 | 
			
		||||
	{
 | 
			
		||||
	char *e;
 | 
			
		||||
	struct sigaction	ill_oact,ill_act;
 | 
			
		||||
	sigset_t		oset;
 | 
			
		||||
	static int trigger=0;
 | 
			
		||||
 | 
			
		||||
	if (trigger) return;
 | 
			
		||||
	trigger=1;
 | 
			
		||||
 
 | 
			
		||||
	if ((e=getenv("OPENSSL_armcap")))
 | 
			
		||||
		{
 | 
			
		||||
		OPENSSL_armcap_P=strtoul(e,NULL,0);
 | 
			
		||||
		return;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	sigfillset(&all_masked);
 | 
			
		||||
	sigdelset(&all_masked,SIGILL);
 | 
			
		||||
	sigdelset(&all_masked,SIGTRAP);
 | 
			
		||||
	sigdelset(&all_masked,SIGFPE);
 | 
			
		||||
	sigdelset(&all_masked,SIGBUS);
 | 
			
		||||
	sigdelset(&all_masked,SIGSEGV);
 | 
			
		||||
 | 
			
		||||
	OPENSSL_armcap_P = 0;
 | 
			
		||||
 | 
			
		||||
	memset(&ill_act,0,sizeof(ill_act));
 | 
			
		||||
	ill_act.sa_handler = ill_handler;
 | 
			
		||||
	ill_act.sa_mask    = all_masked;
 | 
			
		||||
 | 
			
		||||
	sigprocmask(SIG_SETMASK,&ill_act.sa_mask,&oset);
 | 
			
		||||
	sigaction(SIGILL,&ill_act,&ill_oact);
 | 
			
		||||
 | 
			
		||||
	if (sigsetjmp(ill_jmp,1) == 0)
 | 
			
		||||
		{
 | 
			
		||||
		_armv7_neon_probe();
 | 
			
		||||
		OPENSSL_armcap_P |= ARMV7_NEON;
 | 
			
		||||
		}
 | 
			
		||||
	if (sigsetjmp(ill_jmp,1) == 0)
 | 
			
		||||
		{
 | 
			
		||||
		_armv7_tick();
 | 
			
		||||
		OPENSSL_armcap_P |= ARMV7_TICK;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	sigaction (SIGILL,&ill_oact,NULL);
 | 
			
		||||
	sigprocmask(SIG_SETMASK,&oset,NULL);
 | 
			
		||||
	}
 | 
			
		||||
							
								
								
									
										154
									
								
								crypto/armv4cpuid.S
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										154
									
								
								crypto/armv4cpuid.S
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,154 @@
 | 
			
		||||
#include "arm_arch.h"
 | 
			
		||||
 | 
			
		||||
.text
 | 
			
		||||
.code	32
 | 
			
		||||
 | 
			
		||||
.align	5
 | 
			
		||||
.global	_armv7_neon_probe
 | 
			
		||||
.type	_armv7_neon_probe,%function
 | 
			
		||||
_armv7_neon_probe:
 | 
			
		||||
	.word	0xf26ee1fe	@ vorr	q15,q15,q15
 | 
			
		||||
	.word	0xe12fff1e	@ bx	lr
 | 
			
		||||
.size	_armv7_neon_probe,.-_armv7_neon_probe
 | 
			
		||||
 | 
			
		||||
.global	_armv7_tick
 | 
			
		||||
.type	_armv7_tick,%function
 | 
			
		||||
_armv7_tick:
 | 
			
		||||
	mrc	p15,0,r0,c9,c13,0
 | 
			
		||||
	.word	0xe12fff1e	@ bx	lr
 | 
			
		||||
.size	_armv7_tick,.-_armv7_tick
 | 
			
		||||
 | 
			
		||||
.global	OPENSSL_atomic_add
 | 
			
		||||
.type	OPENSSL_atomic_add,%function
 | 
			
		||||
OPENSSL_atomic_add:
 | 
			
		||||
#if __ARM_ARCH__>=6
 | 
			
		||||
.Ladd:	ldrex	r2,[r0]
 | 
			
		||||
	add	r3,r2,r1
 | 
			
		||||
	strex	r2,r3,[r0]
 | 
			
		||||
	cmp	r2,#0
 | 
			
		||||
	bne	.Ladd
 | 
			
		||||
	mov	r0,r3
 | 
			
		||||
	.word	0xe12fff1e	@ bx	lr
 | 
			
		||||
#else
 | 
			
		||||
	stmdb	sp!,{r4-r6,lr}
 | 
			
		||||
	ldr	r2,.Lspinlock
 | 
			
		||||
	adr	r3,.Lspinlock
 | 
			
		||||
	mov	r4,r0
 | 
			
		||||
	mov	r5,r1
 | 
			
		||||
	add	r6,r3,r2	@ &spinlock
 | 
			
		||||
	b	.+8
 | 
			
		||||
.Lspin:	bl	sched_yield
 | 
			
		||||
	mov	r0,#-1
 | 
			
		||||
	swp	r0,r0,[r6]
 | 
			
		||||
	cmp	r0,#0
 | 
			
		||||
	bne	.Lspin
 | 
			
		||||
 | 
			
		||||
	ldr	r2,[r4]
 | 
			
		||||
	add	r2,r2,r5
 | 
			
		||||
	str	r2,[r4]
 | 
			
		||||
	str	r0,[r6]		@ release spinlock
 | 
			
		||||
	ldmia	sp!,{r4-r6,lr}
 | 
			
		||||
	tst	lr,#1
 | 
			
		||||
	moveq	pc,lr
 | 
			
		||||
	.word	0xe12fff1e	@ bx	lr
 | 
			
		||||
#endif
 | 
			
		||||
.size	OPENSSL_atomic_add,.-OPENSSL_atomic_add
 | 
			
		||||
 | 
			
		||||
.global	OPENSSL_cleanse
 | 
			
		||||
.type	OPENSSL_cleanse,%function
 | 
			
		||||
OPENSSL_cleanse:
 | 
			
		||||
	eor	ip,ip,ip
 | 
			
		||||
	cmp	r1,#7
 | 
			
		||||
	subhs	r1,r1,#4
 | 
			
		||||
	bhs	.Lot
 | 
			
		||||
	cmp	r1,#0
 | 
			
		||||
	beq	.Lcleanse_done
 | 
			
		||||
.Little:
 | 
			
		||||
	strb	ip,[r0],#1
 | 
			
		||||
	subs	r1,r1,#1
 | 
			
		||||
	bhi	.Little
 | 
			
		||||
	b	.Lcleanse_done
 | 
			
		||||
 | 
			
		||||
.Lot:	tst	r0,#3
 | 
			
		||||
	beq	.Laligned
 | 
			
		||||
	strb	ip,[r0],#1
 | 
			
		||||
	sub	r1,r1,#1
 | 
			
		||||
	b	.Lot
 | 
			
		||||
.Laligned:
 | 
			
		||||
	str	ip,[r0],#4
 | 
			
		||||
	subs	r1,r1,#4
 | 
			
		||||
	bhs	.Laligned
 | 
			
		||||
	adds	r1,r1,#4
 | 
			
		||||
	bne	.Little
 | 
			
		||||
.Lcleanse_done:
 | 
			
		||||
	tst	lr,#1
 | 
			
		||||
	moveq	pc,lr
 | 
			
		||||
	.word	0xe12fff1e	@ bx	lr
 | 
			
		||||
.size	OPENSSL_cleanse,.-OPENSSL_cleanse
 | 
			
		||||
 | 
			
		||||
.global	OPENSSL_wipe_cpu
 | 
			
		||||
.type	OPENSSL_wipe_cpu,%function
 | 
			
		||||
OPENSSL_wipe_cpu:
 | 
			
		||||
	ldr	r0,.LOPENSSL_armcap
 | 
			
		||||
	adr	r1,.LOPENSSL_armcap
 | 
			
		||||
	ldr	r0,[r1,r0]
 | 
			
		||||
	eor	r2,r2,r2
 | 
			
		||||
	eor	r3,r3,r3
 | 
			
		||||
	eor	ip,ip,ip
 | 
			
		||||
	tst	r0,#1
 | 
			
		||||
	beq	.Lwipe_done
 | 
			
		||||
	.word	0xf3000150	@ veor    q0, q0, q0
 | 
			
		||||
	.word	0xf3022152	@ veor    q1, q1, q1
 | 
			
		||||
	.word	0xf3044154	@ veor    q2, q2, q2
 | 
			
		||||
	.word	0xf3066156	@ veor    q3, q3, q3
 | 
			
		||||
	.word	0xf34001f0	@ veor    q8, q8, q8
 | 
			
		||||
	.word	0xf34221f2	@ veor    q9, q9, q9
 | 
			
		||||
	.word	0xf34441f4	@ veor    q10, q10, q10
 | 
			
		||||
	.word	0xf34661f6	@ veor    q11, q11, q11
 | 
			
		||||
	.word	0xf34881f8	@ veor    q12, q12, q12
 | 
			
		||||
	.word	0xf34aa1fa	@ veor    q13, q13, q13
 | 
			
		||||
	.word	0xf34cc1fc	@ veor    q14, q14, q14
 | 
			
		||||
	.word	0xf34ee1fe	@ veor    q15, q15, q15
 | 
			
		||||
.Lwipe_done:
 | 
			
		||||
	mov	r0,sp
 | 
			
		||||
	tst	lr,#1
 | 
			
		||||
	moveq	pc,lr
 | 
			
		||||
	.word	0xe12fff1e	@ bx	lr
 | 
			
		||||
.size	OPENSSL_wipe_cpu,.-OPENSSL_wipe_cpu
 | 
			
		||||
 | 
			
		||||
.global	OPENSSL_instrument_bus
 | 
			
		||||
.type	OPENSSL_instrument_bus,%function
 | 
			
		||||
OPENSSL_instrument_bus:
 | 
			
		||||
	eor	r0,r0,r0
 | 
			
		||||
	tst	lr,#1
 | 
			
		||||
	moveq	pc,lr
 | 
			
		||||
	.word	0xe12fff1e	@ bx	lr
 | 
			
		||||
.size	OPENSSL_instrument_bus,.-OPENSSL_instrument_bus
 | 
			
		||||
 | 
			
		||||
.global	OPENSSL_instrument_bus2
 | 
			
		||||
.type	OPENSSL_instrument_bus2,%function
 | 
			
		||||
OPENSSL_instrument_bus2:
 | 
			
		||||
	eor	r0,r0,r0
 | 
			
		||||
	tst	lr,#1
 | 
			
		||||
	moveq	pc,lr
 | 
			
		||||
	.word	0xe12fff1e	@ bx	lr
 | 
			
		||||
.size	OPENSSL_instrument_bus2,.-OPENSSL_instrument_bus2
 | 
			
		||||
 | 
			
		||||
.align	5
 | 
			
		||||
.LOPENSSL_armcap:
 | 
			
		||||
.word	OPENSSL_armcap_P-.LOPENSSL_armcap
 | 
			
		||||
#if __ARM_ARCH__>=6
 | 
			
		||||
.align	5
 | 
			
		||||
#else
 | 
			
		||||
.Lspinlock:
 | 
			
		||||
.word	atomic_add_spinlock-.Lspinlock
 | 
			
		||||
.align	5
 | 
			
		||||
 | 
			
		||||
.data
 | 
			
		||||
.align	2
 | 
			
		||||
atomic_add_spinlock:
 | 
			
		||||
.word	0
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
.comm	OPENSSL_armcap_P,4,4
 | 
			
		||||
.hidden	OPENSSL_armcap_P
 | 
			
		||||
@@ -639,7 +639,7 @@ t_x509.o: ../../include/openssl/rsa.h ../../include/openssl/safestack.h
 | 
			
		||||
t_x509.o: ../../include/openssl/sha.h ../../include/openssl/stack.h
 | 
			
		||||
t_x509.o: ../../include/openssl/symhacks.h ../../include/openssl/x509.h
 | 
			
		||||
t_x509.o: ../../include/openssl/x509_vfy.h ../../include/openssl/x509v3.h
 | 
			
		||||
t_x509.o: ../cryptlib.h t_x509.c
 | 
			
		||||
t_x509.o: ../cryptlib.h asn1_locl.h t_x509.c
 | 
			
		||||
t_x509a.o: ../../e_os.h ../../include/openssl/asn1.h
 | 
			
		||||
t_x509a.o: ../../include/openssl/bio.h ../../include/openssl/buffer.h
 | 
			
		||||
t_x509a.o: ../../include/openssl/crypto.h ../../include/openssl/e_os2.h
 | 
			
		||||
 
 | 
			
		||||
@@ -136,11 +136,16 @@ ASN1_BIT_STRING *c2i_ASN1_BIT_STRING(ASN1_BIT_STRING **a,
 | 
			
		||||
 | 
			
		||||
	p= *pp;
 | 
			
		||||
	i= *(p++);
 | 
			
		||||
	if (i > 7)
 | 
			
		||||
		{
 | 
			
		||||
		i=ASN1_R_INVALID_BIT_STRING_BITS_LEFT;
 | 
			
		||||
		goto err;
 | 
			
		||||
		}
 | 
			
		||||
	/* We do this to preserve the settings.  If we modify
 | 
			
		||||
	 * the settings, via the _set_bit function, we will recalculate
 | 
			
		||||
	 * on output */
 | 
			
		||||
	ret->flags&= ~(ASN1_STRING_FLAG_BITS_LEFT|0x07); /* clear */
 | 
			
		||||
	ret->flags|=(ASN1_STRING_FLAG_BITS_LEFT|(i&0x07)); /* set */
 | 
			
		||||
	ret->flags|=(ASN1_STRING_FLAG_BITS_LEFT|i); /* set */
 | 
			
		||||
 | 
			
		||||
	if (len-- > 1) /* using one because of the bits left byte */
 | 
			
		||||
		{
 | 
			
		||||
 
 | 
			
		||||
@@ -57,6 +57,7 @@
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
#include <stdio.h>
 | 
			
		||||
#include <limits.h>
 | 
			
		||||
#include "cryptlib.h"
 | 
			
		||||
#include <openssl/buffer.h>
 | 
			
		||||
#include <openssl/asn1_mac.h>
 | 
			
		||||
@@ -143,17 +144,11 @@ static int asn1_d2i_read_bio(BIO *in, BUF_MEM **pb)
 | 
			
		||||
	BUF_MEM *b;
 | 
			
		||||
	unsigned char *p;
 | 
			
		||||
	int i;
 | 
			
		||||
	int ret=-1;
 | 
			
		||||
	ASN1_const_CTX c;
 | 
			
		||||
	int want=HEADER_SIZE;
 | 
			
		||||
	size_t want=HEADER_SIZE;
 | 
			
		||||
	int eos=0;
 | 
			
		||||
#if defined(__GNUC__) && defined(__ia64)
 | 
			
		||||
	/* pathetic compiler bug in all known versions as of Nov. 2002 */
 | 
			
		||||
	long off=0;
 | 
			
		||||
#else
 | 
			
		||||
	int off=0;
 | 
			
		||||
#endif
 | 
			
		||||
	int len=0;
 | 
			
		||||
	size_t off=0;
 | 
			
		||||
	size_t len=0;
 | 
			
		||||
 | 
			
		||||
	b=BUF_MEM_new();
 | 
			
		||||
	if (b == NULL)
 | 
			
		||||
@@ -169,7 +164,7 @@ static int asn1_d2i_read_bio(BIO *in, BUF_MEM **pb)
 | 
			
		||||
			{
 | 
			
		||||
			want-=(len-off);
 | 
			
		||||
 | 
			
		||||
			if (!BUF_MEM_grow_clean(b,len+want))
 | 
			
		||||
			if (len + want < len || !BUF_MEM_grow_clean(b,len+want))
 | 
			
		||||
				{
 | 
			
		||||
				ASN1err(ASN1_F_ASN1_D2I_READ_BIO,ERR_R_MALLOC_FAILURE);
 | 
			
		||||
				goto err;
 | 
			
		||||
@@ -181,7 +176,14 @@ static int asn1_d2i_read_bio(BIO *in, BUF_MEM **pb)
 | 
			
		||||
				goto err;
 | 
			
		||||
				}
 | 
			
		||||
			if (i > 0)
 | 
			
		||||
				{
 | 
			
		||||
				if (len+i < len)
 | 
			
		||||
					{
 | 
			
		||||
					ASN1err(ASN1_F_ASN1_D2I_READ_BIO,ASN1_R_TOO_LONG);
 | 
			
		||||
					goto err;
 | 
			
		||||
					}
 | 
			
		||||
				len+=i;
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
		/* else data already loaded */
 | 
			
		||||
 | 
			
		||||
@@ -206,6 +208,11 @@ static int asn1_d2i_read_bio(BIO *in, BUF_MEM **pb)
 | 
			
		||||
			{
 | 
			
		||||
			/* no data body so go round again */
 | 
			
		||||
			eos++;
 | 
			
		||||
			if (eos < 0)
 | 
			
		||||
				{
 | 
			
		||||
				ASN1err(ASN1_F_ASN1_D2I_READ_BIO,ASN1_R_HEADER_TOO_LONG);
 | 
			
		||||
				goto err;
 | 
			
		||||
				}
 | 
			
		||||
			want=HEADER_SIZE;
 | 
			
		||||
			}
 | 
			
		||||
		else if (eos && (c.slen == 0) && (c.tag == V_ASN1_EOC))
 | 
			
		||||
@@ -220,10 +227,16 @@ static int asn1_d2i_read_bio(BIO *in, BUF_MEM **pb)
 | 
			
		||||
		else 
 | 
			
		||||
			{
 | 
			
		||||
			/* suck in c.slen bytes of data */
 | 
			
		||||
			want=(int)c.slen;
 | 
			
		||||
			want=c.slen;
 | 
			
		||||
			if (want > (len-off))
 | 
			
		||||
				{
 | 
			
		||||
				want-=(len-off);
 | 
			
		||||
				if (want > INT_MAX /* BIO_read takes an int length */ ||
 | 
			
		||||
					len+want < len)
 | 
			
		||||
						{
 | 
			
		||||
						ASN1err(ASN1_F_ASN1_D2I_READ_BIO,ASN1_R_TOO_LONG);
 | 
			
		||||
						goto err;
 | 
			
		||||
						}
 | 
			
		||||
				if (!BUF_MEM_grow_clean(b,len+want))
 | 
			
		||||
					{
 | 
			
		||||
					ASN1err(ASN1_F_ASN1_D2I_READ_BIO,ERR_R_MALLOC_FAILURE);
 | 
			
		||||
@@ -238,11 +251,18 @@ static int asn1_d2i_read_bio(BIO *in, BUF_MEM **pb)
 | 
			
		||||
						    ASN1_R_NOT_ENOUGH_DATA);
 | 
			
		||||
						goto err;
 | 
			
		||||
						}
 | 
			
		||||
					/* This can't overflow because
 | 
			
		||||
					 * |len+want| didn't overflow. */
 | 
			
		||||
					len+=i;
 | 
			
		||||
					want -= i;
 | 
			
		||||
					want-=i;
 | 
			
		||||
					}
 | 
			
		||||
				}
 | 
			
		||||
			off+=(int)c.slen;
 | 
			
		||||
			if (off + c.slen < off)
 | 
			
		||||
				{
 | 
			
		||||
				ASN1err(ASN1_F_ASN1_D2I_READ_BIO,ASN1_R_TOO_LONG);
 | 
			
		||||
				goto err;
 | 
			
		||||
				}
 | 
			
		||||
			off+=c.slen;
 | 
			
		||||
			if (eos <= 0)
 | 
			
		||||
				{
 | 
			
		||||
				break;
 | 
			
		||||
@@ -252,9 +272,15 @@ static int asn1_d2i_read_bio(BIO *in, BUF_MEM **pb)
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	if (off > INT_MAX)
 | 
			
		||||
		{
 | 
			
		||||
		ASN1err(ASN1_F_ASN1_D2I_READ_BIO,ASN1_R_TOO_LONG);
 | 
			
		||||
		goto err;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	*pb = b;
 | 
			
		||||
	return off;
 | 
			
		||||
err:
 | 
			
		||||
	if (b != NULL) BUF_MEM_free(b);
 | 
			
		||||
	return(ret);
 | 
			
		||||
	return -1;
 | 
			
		||||
	}
 | 
			
		||||
 
 | 
			
		||||
@@ -87,7 +87,8 @@ int ASN1_digest(i2d_of_void *i2d, const EVP_MD *type, char *data,
 | 
			
		||||
	p=str;
 | 
			
		||||
	i2d(data,&p);
 | 
			
		||||
 | 
			
		||||
	EVP_Digest(str, i, md, len, type, NULL);
 | 
			
		||||
	if (!EVP_Digest(str, i, md, len, type, NULL))
 | 
			
		||||
		return 0;
 | 
			
		||||
	OPENSSL_free(str);
 | 
			
		||||
	return(1);
 | 
			
		||||
	}
 | 
			
		||||
@@ -104,7 +105,8 @@ int ASN1_item_digest(const ASN1_ITEM *it, const EVP_MD *type, void *asn,
 | 
			
		||||
	i=ASN1_item_i2d(asn,&str, it);
 | 
			
		||||
	if (!str) return(0);
 | 
			
		||||
 | 
			
		||||
	EVP_Digest(str, i, md, len, type, NULL);
 | 
			
		||||
	if (!EVP_Digest(str, i, md, len, type, NULL))
 | 
			
		||||
		return 0;
 | 
			
		||||
	OPENSSL_free(str);
 | 
			
		||||
	return(1);
 | 
			
		||||
	}
 | 
			
		||||
 
 | 
			
		||||
@@ -86,7 +86,7 @@ int ASN1_INTEGER_cmp(const ASN1_INTEGER *x, const ASN1_INTEGER *y)
 | 
			
		||||
	}
 | 
			
		||||
	
 | 
			
		||||
 | 
			
		||||
/* 
 | 
			
		||||
/*- 
 | 
			
		||||
 * This converts an ASN1 INTEGER into its content encoding.
 | 
			
		||||
 * The internal representation is an ASN1_STRING whose data is a big endian
 | 
			
		||||
 * representation of the value, ignoring the sign. The sign is determined by
 | 
			
		||||
@@ -116,7 +116,7 @@ int i2c_ASN1_INTEGER(ASN1_INTEGER *a, unsigned char **pp)
 | 
			
		||||
	int pad=0,ret,i,neg;
 | 
			
		||||
	unsigned char *p,*n,pb=0;
 | 
			
		||||
 | 
			
		||||
	if ((a == NULL) || (a->data == NULL)) return(0);
 | 
			
		||||
	if (a == NULL) return(0);
 | 
			
		||||
	neg=a->type & V_ASN1_NEG;
 | 
			
		||||
	if (a->length == 0)
 | 
			
		||||
		ret=1;
 | 
			
		||||
@@ -386,8 +386,8 @@ long ASN1_INTEGER_get(const ASN1_INTEGER *a)
 | 
			
		||||
	
 | 
			
		||||
	if (a->length > (int)sizeof(long))
 | 
			
		||||
		{
 | 
			
		||||
		/* hmm... a bit ugly */
 | 
			
		||||
		return(0xffffffffL);
 | 
			
		||||
		/* hmm... a bit ugly, return all ones */
 | 
			
		||||
		return -1;
 | 
			
		||||
		}
 | 
			
		||||
	if (a->data == NULL)
 | 
			
		||||
		return 0;
 | 
			
		||||
 
 | 
			
		||||
@@ -283,17 +283,29 @@ err:
 | 
			
		||||
	ASN1err(ASN1_F_D2I_ASN1_OBJECT,i);
 | 
			
		||||
	return(NULL);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
ASN1_OBJECT *c2i_ASN1_OBJECT(ASN1_OBJECT **a, const unsigned char **pp,
 | 
			
		||||
	     long len)
 | 
			
		||||
	{
 | 
			
		||||
	ASN1_OBJECT *ret=NULL;
 | 
			
		||||
	const unsigned char *p;
 | 
			
		||||
	unsigned char *data;
 | 
			
		||||
	int i;
 | 
			
		||||
	/* Sanity check OID encoding: can't have leading 0x80 in
 | 
			
		||||
	 * subidentifiers, see: X.690 8.19.2
 | 
			
		||||
	int i, length;
 | 
			
		||||
 | 
			
		||||
	/* Sanity check OID encoding.
 | 
			
		||||
	 * Need at least one content octet.
 | 
			
		||||
	 * MSB must be clear in the last octet.
 | 
			
		||||
	 * can't have leading 0x80 in subidentifiers, see: X.690 8.19.2
 | 
			
		||||
	 */
 | 
			
		||||
	for (i = 0, p = *pp; i < len; i++, p++)
 | 
			
		||||
	if (len <= 0 || len > INT_MAX || pp == NULL || (p = *pp) == NULL ||
 | 
			
		||||
	    p[len - 1] & 0x80)
 | 
			
		||||
		{
 | 
			
		||||
		ASN1err(ASN1_F_C2I_ASN1_OBJECT,ASN1_R_INVALID_OBJECT_ENCODING);
 | 
			
		||||
		return NULL;
 | 
			
		||||
		}
 | 
			
		||||
	/* Now 0 < len <= INT_MAX, so the cast is safe. */
 | 
			
		||||
	length = (int)len;
 | 
			
		||||
	for (i = 0; i < length; i++, p++)
 | 
			
		||||
		{
 | 
			
		||||
		if (*p == 0x80 && (!i || !(p[-1] & 0x80)))
 | 
			
		||||
			{
 | 
			
		||||
@@ -316,23 +328,23 @@ ASN1_OBJECT *c2i_ASN1_OBJECT(ASN1_OBJECT **a, const unsigned char **pp,
 | 
			
		||||
	data = (unsigned char *)ret->data;
 | 
			
		||||
	ret->data = NULL;
 | 
			
		||||
	/* once detached we can change it */
 | 
			
		||||
	if ((data == NULL) || (ret->length < len))
 | 
			
		||||
	if ((data == NULL) || (ret->length < length))
 | 
			
		||||
		{
 | 
			
		||||
		ret->length=0;
 | 
			
		||||
		if (data != NULL) OPENSSL_free(data);
 | 
			
		||||
		data=(unsigned char *)OPENSSL_malloc(len ? (int)len : 1);
 | 
			
		||||
		data=(unsigned char *)OPENSSL_malloc(length);
 | 
			
		||||
		if (data == NULL)
 | 
			
		||||
			{ i=ERR_R_MALLOC_FAILURE; goto err; }
 | 
			
		||||
		ret->flags|=ASN1_OBJECT_FLAG_DYNAMIC_DATA;
 | 
			
		||||
		}
 | 
			
		||||
	memcpy(data,p,(int)len);
 | 
			
		||||
	memcpy(data,p,length);
 | 
			
		||||
	/* reattach data to object, after which it remains const */
 | 
			
		||||
	ret->data  =data;
 | 
			
		||||
	ret->length=(int)len;
 | 
			
		||||
	ret->length=length;
 | 
			
		||||
	ret->sn=NULL;
 | 
			
		||||
	ret->ln=NULL;
 | 
			
		||||
	/* ret->flags=ASN1_OBJECT_FLAG_DYNAMIC; we know it is dynamic */
 | 
			
		||||
	p+=len;
 | 
			
		||||
	p+=length;
 | 
			
		||||
 | 
			
		||||
	if (a != NULL) (*a)=ret;
 | 
			
		||||
	*pp=p;
 | 
			
		||||
 
 | 
			
		||||
Some files were not shown because too many files have changed in this diff Show More
		Reference in New Issue
	
	Block a user