Compare commits
	
		
			1584 Commits
		
	
	
		
			OpenSSL_1_
			...
			OpenSSL_1_
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
| 
						 | 
					2a8c2799e1 | ||
| 
						 | 
					2ad310ffde | ||
| 
						 | 
					6cbc78906b | ||
| 
						 | 
					fffcf87a55 | ||
| 
						 | 
					3adca975dc | ||
| 
						 | 
					517899e6c8 | ||
| 
						 | 
					f61bbf8da5 | ||
| 
						 | 
					1f31458a77 | ||
| 
						 | 
					5fbc59cac6 | ||
| 
						 | 
					370ac32030 | ||
| 
						 | 
					dd90a91d87 | ||
| 
						 | 
					176b59d157 | ||
| 
						 | 
					907f04a303 | ||
| 
						 | 
					f3b355fec3 | ||
| 
						 | 
					c4ce10773f | ||
| 
						 | 
					d46de4ce48 | ||
| 
						 | 
					418df5ea23 | ||
| 
						 | 
					d163a2cc46 | ||
| 
						 | 
					72df35acf2 | ||
| 
						 | 
					f92b196723 | ||
| 
						 | 
					e94118ae2a | ||
| 
						 | 
					106a9a5d7e | ||
| 
						 | 
					cb972a4fe7 | ||
| 
						 | 
					ee2d14be94 | ||
| 
						 | 
					3d2c3fa5fc | ||
| 
						 | 
					ba5693686e | ||
| 
						 | 
					59b5ab4aa7 | ||
| 
						 | 
					c22ed559bb | ||
| 
						 | 
					4b6f33a5c2 | ||
| 
						 | 
					c36d3840ff | ||
| 
						 | 
					05bdebb6e0 | ||
| 
						 | 
					32b2ad7e07 | ||
| 
						 | 
					1977240204 | ||
| 
						 | 
					939b496027 | ||
| 
						 | 
					cce3e4adb7 | ||
| 
						 | 
					f3e85f4359 | ||
| 
						 | 
					cc74177e71 | ||
| 
						 | 
					e2cf18c635 | ||
| 
						 | 
					df00b6eb5e | ||
| 
						 | 
					1ee85aab75 | ||
| 
						 | 
					029e8f3ac9 | ||
| 
						 | 
					28ea6ad612 | ||
| 
						 | 
					4ae1c7771d | ||
| 
						 | 
					dbcf8e3319 | ||
| 
						 | 
					5fcfef49d9 | ||
| 
						 | 
					8af1319270 | ||
| 
						 | 
					38b7073328 | ||
| 
						 | 
					75077a2277 | ||
| 
						 | 
					c62592e52f | ||
| 
						 | 
					f460f050c2 | ||
| 
						 | 
					eb797fde3f | ||
| 
						 | 
					b484b040e3 | ||
| 
						 | 
					726b5e7132 | ||
| 
						 | 
					0a9f8e0621 | ||
| 
						 | 
					1c687ff4dd | ||
| 
						 | 
					c6a39046f5 | ||
| 
						 | 
					cf1bf3f032 | ||
| 
						 | 
					f7bf8e02df | ||
| 
						 | 
					3b509e8cdc | ||
| 
						 | 
					63830384e9 | ||
| 
						 | 
					ff4de7dde9 | ||
| 
						 | 
					3372aeed2c | ||
| 
						 | 
					8568170d77 | ||
| 
						 | 
					f1612746ec | ||
| 
						 | 
					5a1f055d91 | ||
| 
						 | 
					e96de9822e | ||
| 
						 | 
					2df0ba9b4f | ||
| 
						 | 
					76b49a8ad7 | ||
| 
						 | 
					5e0ec9012b | ||
| 
						 | 
					5c122908ab | ||
| 
						 | 
					1c70c783af | ||
| 
						 | 
					9dff24e43a | ||
| 
						 | 
					6865dea2d6 | ||
| 
						 | 
					76d0c6d48e | ||
| 
						 | 
					a329ae2268 | ||
| 
						 | 
					f3c4abb377 | ||
| 
						 | 
					189e20c68c | ||
| 
						 | 
					4b771121f2 | ||
| 
						 | 
					ee827adf04 | ||
| 
						 | 
					cd258a84db | ||
| 
						 | 
					017f695f2c | ||
| 
						 | 
					ee900ed1f7 | ||
| 
						 | 
					39b36cb438 | ||
| 
						 | 
					26800340db | ||
| 
						 | 
					592ac25342 | ||
| 
						 | 
					d889682208 | ||
| 
						 | 
					951ede2a06 | ||
| 
						 | 
					974d4d675c | ||
| 
						 | 
					3be5df2272 | ||
| 
						 | 
					80a06268ae | ||
| 
						 | 
					e3dd33c25c | ||
| 
						 | 
					d695a02254 | ||
| 
						 | 
					a209623fbb | ||
| 
						 | 
					92caee08d3 | ||
| 
						 | 
					0725acd071 | ||
| 
						 | 
					5fa7c10bc4 | ||
| 
						 | 
					96d9674646 | ||
| 
						 | 
					32d3b0f52f | ||
| 
						 | 
					31d085ca74 | ||
| 
						 | 
					c70908d247 | ||
| 
						 | 
					e963109fcd | ||
| 
						 | 
					da23637e8e | ||
| 
						 | 
					5c3fbbc875 | ||
| 
						 | 
					40f26ac782 | ||
| 
						 | 
					89c2720298 | ||
| 
						 | 
					047cdde7a5 | ||
| 
						 | 
					10473a5a2c | ||
| 
						 | 
					bd41063b11 | ||
| 
						 | 
					0186f7bf87 | ||
| 
						 | 
					10a612a9e4 | ||
| 
						 | 
					a20db08e77 | ||
| 
						 | 
					9da34ad6cb | ||
| 
						 | 
					a63d3ac012 | ||
| 
						 | 
					8a46e51ed8 | ||
| 
						 | 
					fe9b85c3cb | ||
| 
						 | 
					42c9c7103c | ||
| 
						 | 
					4ebc70cc51 | ||
| 
						 | 
					2674af2f79 | ||
| 
						 | 
					bae9b9915a | ||
| 
						 | 
					750190567a | ||
| 
						 | 
					23a9b24aa1 | ||
| 
						 | 
					5d74b4b4b3 | ||
| 
						 | 
					d635f4bb36 | ||
| 
						 | 
					117476ba30 | ||
| 
						 | 
					a6a704f448 | ||
| 
						 | 
					506c106880 | ||
| 
						 | 
					686d82a7a2 | ||
| 
						 | 
					8ca79fcbf4 | ||
| 
						 | 
					a4517be9e3 | ||
| 
						 | 
					6e24e1cdd2 | ||
| 
						 | 
					ffc69bd942 | ||
| 
						 | 
					82123b5e94 | ||
| 
						 | 
					cd56a08d4e | ||
| 
						 | 
					e2acb69c76 | ||
| 
						 | 
					c982285ab6 | ||
| 
						 | 
					b485d97634 | ||
| 
						 | 
					636c42d747 | ||
| 
						 | 
					28e4f659c5 | ||
| 
						 | 
					6a43243d1d | ||
| 
						 | 
					f08731cd82 | ||
| 
						 | 
					f4b8760056 | ||
| 
						 | 
					d3554bff69 | ||
| 
						 | 
					3f9117e161 | ||
| 
						 | 
					eadc81e7dd | ||
| 
						 | 
					a2fcab9978 | ||
| 
						 | 
					1a09816435 | ||
| 
						 | 
					0e978b9a5d | ||
| 
						 | 
					f06249f112 | ||
| 
						 | 
					2407241fb2 | ||
| 
						 | 
					3942e7d9eb | ||
| 
						 | 
					2679485e69 | ||
| 
						 | 
					e6dcb08984 | ||
| 
						 | 
					0c8f422999 | ||
| 
						 | 
					cc27bec2b4 | ||
| 
						 | 
					f5ee521307 | ||
| 
						 | 
					58d8a271ab | ||
| 
						 | 
					8b7e469d06 | ||
| 
						 | 
					93cb447df2 | ||
| 
						 | 
					521246e608 | ||
| 
						 | 
					ef6d3485ec | ||
| 
						 | 
					a67303954c | ||
| 
						 | 
					cb9d5b7b53 | ||
| 
						 | 
					876ed10574 | ||
| 
						 | 
					bc2e18a3c8 | ||
| 
						 | 
					0440d4ebe4 | ||
| 
						 | 
					183db9af80 | ||
| 
						 | 
					9f11421950 | ||
| 
						 | 
					51527f1e35 | ||
| 
						 | 
					1810b04728 | ||
| 
						 | 
					5c921f14cb | ||
| 
						 | 
					d58a852fbd | ||
| 
						 | 
					323a7e76e6 | ||
| 
						 | 
					059907771b | ||
| 
						 | 
					ea65e92b22 | ||
| 
						 | 
					f3cc3da447 | ||
| 
						 | 
					1aff39de76 | ||
| 
						 | 
					eafdbd8ec3 | ||
| 
						 | 
					1159e24d56 | ||
| 
						 | 
					b91058d222 | ||
| 
						 | 
					89117535f1 | ||
| 
						 | 
					08a2df480d | ||
| 
						 | 
					9cd061725b | ||
| 
						 | 
					e347d80287 | ||
| 
						 | 
					9e7a5464d7 | ||
| 
						 | 
					e224c45317 | ||
| 
						 | 
					e961fa4479 | ||
| 
						 | 
					aafdbbc469 | ||
| 
						 | 
					a9ea906654 | ||
| 
						 | 
					bb14c2c9ca | ||
| 
						 | 
					a1331af032 | ||
| 
						 | 
					e48e86232e | ||
| 
						 | 
					66aacf3872 | ||
| 
						 | 
					97ac0d8564 | ||
| 
						 | 
					f8e662e71c | ||
| 
						 | 
					468e04bf1f | ||
| 
						 | 
					ac7d33deec | ||
| 
						 | 
					6b7c68e038 | ||
| 
						 | 
					81ce20e6ac | ||
| 
						 | 
					324a977492 | ||
| 
						 | 
					69aeb99f32 | ||
| 
						 | 
					53e652ae44 | ||
| 
						 | 
					131d3fdfe2 | ||
| 
						 | 
					1895583835 | ||
| 
						 | 
					5226c62b76 | ||
| 
						 | 
					491f3e4e8e | ||
| 
						 | 
					184693f4af | ||
| 
						 | 
					925bfca5d3 | ||
| 
						 | 
					90a5adffc7 | ||
| 
						 | 
					73f8982017 | ||
| 
						 | 
					cda8845ded | ||
| 
						 | 
					47050853f1 | ||
| 
						 | 
					10621efd32 | ||
| 
						 | 
					e498b83fed | ||
| 
						 | 
					2e4d15fd04 | ||
| 
						 | 
					3b0e0d1231 | ||
| 
						 | 
					f7b36402d6 | ||
| 
						 | 
					0f6c965823 | ||
| 
						 | 
					4651718410 | ||
| 
						 | 
					fbfad23f0c | ||
| 
						 | 
					68085a73af | ||
| 
						 | 
					bc974f8b36 | ||
| 
						 | 
					72d7ed66e2 | ||
| 
						 | 
					2655f5644d | ||
| 
						 | 
					3af30a7b8b | ||
| 
						 | 
					e060570e62 | ||
| 
						 | 
					1ac02e4b89 | ||
| 
						 | 
					7116341e18 | ||
| 
						 | 
					92fe1dbc0e | ||
| 
						 | 
					d9bd6d1f3d | ||
| 
						 | 
					c44bad6b38 | ||
| 
						 | 
					2e989d80ce | ||
| 
						 | 
					2cef4e6c29 | ||
| 
						 | 
					064198a817 | ||
| 
						 | 
					4017726f72 | ||
| 
						 | 
					1d7c823ab5 | ||
| 
						 | 
					3cf9f81b09 | ||
| 
						 | 
					5a098aeb9d | ||
| 
						 | 
					c197906261 | ||
| 
						 | 
					87309e2fc1 | ||
| 
						 | 
					9fb77b8e0d | ||
| 
						 | 
					3bb069d808 | ||
| 
						 | 
					7962ea7aa6 | ||
| 
						 | 
					cbb5afdc34 | ||
| 
						 | 
					f9189b79bf | ||
| 
						 | 
					d68e7df7ab | ||
| 
						 | 
					1c246f6bef | ||
| 
						 | 
					802e6cfc05 | ||
| 
						 | 
					b2aec696f2 | ||
| 
						 | 
					18d3333cfd | ||
| 
						 | 
					196767e08b | ||
| 
						 | 
					2e7341ec5a | ||
| 
						 | 
					3aac5918b1 | ||
| 
						 | 
					ed4260b4a0 | ||
| 
						 | 
					4cf7ba6cce | ||
| 
						 | 
					0ddec4259d | ||
| 
						 | 
					1566497495 | ||
| 
						 | 
					712548231e | ||
| 
						 | 
					ac84cb4cfe | ||
| 
						 | 
					3e9a08ecb1 | ||
| 
						 | 
					3a9a032163 | ||
| 
						 | 
					b83ceba7d5 | ||
| 
						 | 
					d9738d5f07 | ||
| 
						 | 
					583f0bc402 | ||
| 
						 | 
					e8e878bec7 | ||
| 
						 | 
					6099e629f5 | ||
| 
						 | 
					3570086760 | ||
| 
						 | 
					acb341eb6e | ||
| 
						 | 
					8fb2c9922a | ||
| 
						 | 
					a97c208c5a | ||
| 
						 | 
					cc6e9f9abb | ||
| 
						 | 
					56cd740449 | ||
| 
						 | 
					8437225d34 | ||
| 
						 | 
					b4a57c4c41 | ||
| 
						 | 
					faa8038edd | ||
| 
						 | 
					e02863b5ac | ||
| 
						 | 
					04685bc949 | ||
| 
						 | 
					98a0f9660d | ||
| 
						 | 
					45fe66b8ba | ||
| 
						 | 
					8d7aab986b | ||
| 
						 | 
					e078642dde | ||
| 
						 | 
					ffd14272c4 | ||
| 
						 | 
					f16f3ac559 | ||
| 
						 | 
					4fb433d221 | ||
| 
						 | 
					293c1e2235 | ||
| 
						 | 
					d5e16a711e | ||
| 
						 | 
					178c562a46 | ||
| 
						 | 
					61052e891e | ||
| 
						 | 
					cb951e336b | ||
| 
						 | 
					37580f43b5 | ||
| 
						 | 
					ef28c6d676 | ||
| 
						 | 
					2175744952 | ||
| 
						 | 
					2357cd2e20 | ||
| 
						 | 
					5951cc004b | ||
| 
						 | 
					a8565530e2 | ||
| 
						 | 
					9e9ee7e37f | ||
| 
						 | 
					500d67f15a | ||
| 
						 | 
					40fb8587ed | ||
| 
						 | 
					c14a808c51 | ||
| 
						 | 
					cdf42d7b43 | ||
| 
						 | 
					7858d304bc | ||
| 
						 | 
					f14a6bf515 | ||
| 
						 | 
					5dad57536f | ||
| 
						 | 
					a5fad4d6bc | ||
| 
						 | 
					d6c2e3e621 | ||
| 
						 | 
					8c46748bcb | ||
| 
						 | 
					86edf13b1c | ||
| 
						 | 
					fcd9b1073a | ||
| 
						 | 
					036df29387 | ||
| 
						 | 
					60b7d3bbb5 | ||
| 
						 | 
					7e9d42ce97 | ||
| 
						 | 
					b3147fcbe6 | ||
| 
						 | 
					feefb73ad9 | ||
| 
						 | 
					8932b82f7d | ||
| 
						 | 
					a4a759acec | ||
| 
						 | 
					6e5a554533 | ||
| 
						 | 
					2164a17a7d | ||
| 
						 | 
					dc1e493808 | ||
| 
						 | 
					1fe8304db0 | ||
| 
						 | 
					bfd19df6d0 | ||
| 
						 | 
					7f9edfd23a | ||
| 
						 | 
					9673056c25 | ||
| 
						 | 
					f50730d361 | ||
| 
						 | 
					9beb948c0d | ||
| 
						 | 
					ce5ddefc43 | ||
| 
						 | 
					458f23f610 | ||
| 
						 | 
					c983a77887 | ||
| 
						 | 
					7516eaf492 | ||
| 
						 | 
					c6a84ff351 | ||
| 
						 | 
					b8b9bcb458 | ||
| 
						 | 
					be617fbaf8 | ||
| 
						 | 
					321ba85899 | ||
| 
						 | 
					fcabfc66ae | ||
| 
						 | 
					9844573039 | ||
| 
						 | 
					6579603874 | ||
| 
						 | 
					d68aade28a | ||
| 
						 | 
					3242e5938b | ||
| 
						 | 
					35384e8e5b | ||
| 
						 | 
					4c21e004a3 | ||
| 
						 | 
					59ee70e386 | ||
| 
						 | 
					43e569921e | ||
| 
						 | 
					8aaeec9f9a | ||
| 
						 | 
					8454d3f924 | ||
| 
						 | 
					5004c22c25 | ||
| 
						 | 
					e96872f4c0 | ||
| 
						 | 
					14e9a78d47 | ||
| 
						 | 
					2aca9b272e | ||
| 
						 | 
					26d7cb400e | ||
| 
						 | 
					2db95e094d | ||
| 
						 | 
					5fc8bb6ab7 | ||
| 
						 | 
					244d0955ad | ||
| 
						 | 
					061e68c554 | ||
| 
						 | 
					3f1d582f70 | ||
| 
						 | 
					8a2e5bf6b7 | ||
| 
						 | 
					6c3d948723 | ||
| 
						 | 
					51c5ab5d3a | ||
| 
						 | 
					ff60f33811 | ||
| 
						 | 
					2cfa5edb26 | ||
| 
						 | 
					291a3e9629 | ||
| 
						 | 
					2184a14b62 | ||
| 
						 | 
					2e84084fbc | ||
| 
						 | 
					26f9cfbdca | ||
| 
						 | 
					7fc5f4f117 | ||
| 
						 | 
					249a3e362f | ||
| 
						 | 
					15d717f574 | ||
| 
						 | 
					b8712b2b9a | ||
| 
						 | 
					1eaccbef57 | ||
| 
						 | 
					e2f69f5ce7 | ||
| 
						 | 
					821bee4333 | ||
| 
						 | 
					8b6205c484 | ||
| 
						 | 
					e5cf62b04d | ||
| 
						 | 
					b1edca2a4c | ||
| 
						 | 
					e7768ebbd2 | ||
| 
						 | 
					329a76c085 | ||
| 
						 | 
					bbb76be9b5 | ||
| 
						 | 
					b726b8a60c | ||
| 
						 | 
					e298409c34 | ||
| 
						 | 
					25012d5e79 | ||
| 
						 | 
					09b7de77b3 | ||
| 
						 | 
					9bdedec0cf | ||
| 
						 | 
					f63fa8b10a | ||
| 
						 | 
					d47aebbb47 | ||
| 
						 | 
					08931f1cd6 | ||
| 
						 | 
					6ce9687b5a | ||
| 
						 | 
					20e610580e | ||
| 
						 | 
					4fa17211bb | ||
| 
						 | 
					d8d40fc676 | ||
| 
						 | 
					3c7fcdfdd4 | ||
| 
						 | 
					e356ac5c06 | ||
| 
						 | 
					872e681c00 | ||
| 
						 | 
					38b71ba8ff | ||
| 
						 | 
					f8cf36c298 | ||
| 
						 | 
					26a59d9b46 | ||
| 
						 | 
					7fd4ce6a99 | ||
| 
						 | 
					d9d09a8d0f | ||
| 
						 | 
					2b0532f398 | ||
| 
						 | 
					7d07c75c5b | ||
| 
						 | 
					f34297db80 | ||
| 
						 | 
					e2e5326e5b | ||
| 
						 | 
					592c6e1191 | ||
| 
						 | 
					8202802fad | ||
| 
						 | 
					f79bb32926 | ||
| 
						 | 
					7a3809fd97 | ||
| 
						 | 
					f13a149088 | ||
| 
						 | 
					fc586d2955 | ||
| 
						 | 
					17d45dec4d | ||
| 
						 | 
					6bfe55380a | ||
| 
						 | 
					4e05aedbca | ||
| 
						 | 
					bf3e200eb4 | ||
| 
						 | 
					55614f89f0 | ||
| 
						 | 
					b1620443f3 | ||
| 
						 | 
					4ed98b6e25 | ||
| 
						 | 
					3a33923515 | ||
| 
						 | 
					f2df488a1c | ||
| 
						 | 
					8d507aee7c | ||
| 
						 | 
					133145686e | ||
| 
						 | 
					0f04b004ac | ||
| 
						 | 
					81e3a6055c | ||
| 
						 | 
					bea9a17726 | ||
| 
						 | 
					b537ea9ce4 | ||
| 
						 | 
					13ce52be1b | ||
| 
						 | 
					11853c50ec | ||
| 
						 | 
					a60aa7e008 | ||
| 
						 | 
					a49256a349 | ||
| 
						 | 
					e517dfd3d1 | ||
| 
						 | 
					74687f5979 | ||
| 
						 | 
					8dc6617ad5 | ||
| 
						 | 
					c2119214c2 | ||
| 
						 | 
					22387f00b6 | ||
| 
						 | 
					4d16915381 | ||
| 
						 | 
					e7169a5835 | ||
| 
						 | 
					abc2dfbcc3 | ||
| 
						 | 
					23ea9f6f03 | ||
| 
						 | 
					3e5df37861 | ||
| 
						 | 
					4e5f9f8a9a | ||
| 
						 | 
					9446ecfb3a | ||
| 
						 | 
					48ecdec7a0 | ||
| 
						 | 
					8f5f782253 | ||
| 
						 | 
					228a77a4ad | ||
| 
						 | 
					03b17a5789 | ||
| 
						 | 
					391f3b5708 | ||
| 
						 | 
					fe9b9a880f | ||
| 
						 | 
					9f96ea4c2b | ||
| 
						 | 
					41a765182f | ||
| 
						 | 
					bcdd904c6c | ||
| 
						 | 
					a90b1e32d2 | ||
| 
						 | 
					0ed8e95c4b | ||
| 
						 | 
					6b5b85f4f6 | ||
| 
						 | 
					03ebf85f77 | ||
| 
						 | 
					30fbe92c78 | ||
| 
						 | 
					1241e77f15 | ||
| 
						 | 
					1433cac53c | ||
| 
						 | 
					204fb36a0e | ||
| 
						 | 
					2b45603445 | ||
| 
						 | 
					d70c0be4c1 | ||
| 
						 | 
					9b649d9a73 | ||
| 
						 | 
					abbd58559e | ||
| 
						 | 
					d15d17bb64 | ||
| 
						 | 
					966fe81f9b | ||
| 
						 | 
					83764a989d | ||
| 
						 | 
					86788e1ee6 | ||
| 
						 | 
					03b04ddac1 | ||
| 
						 | 
					88ae012c80 | ||
| 
						 | 
					fc4f4cdb8b | ||
| 
						 | 
					4e0fbdc4ec | ||
| 
						 | 
					0c37aed3f3 | ||
| 
						 | 
					099ccdb808 | ||
| 
						 | 
					9871417fb7 | ||
| 
						 | 
					fc7804ec39 | ||
| 
						 | 
					e7b9d9be48 | ||
| 
						 | 
					2172d4f63c | ||
| 
						 | 
					c34091d47e | ||
| 
						 | 
					a9f4ebd753 | ||
| 
						 | 
					604c9948a8 | ||
| 
						 | 
					281720c2a3 | ||
| 
						 | 
					2a9023f7b4 | ||
| 
						 | 
					36e8c39899 | ||
| 
						 | 
					e3f009c595 | ||
| 
						 | 
					fbe3baa773 | ||
| 
						 | 
					690998f904 | ||
| 
						 | 
					3221da845f | ||
| 
						 | 
					9aeb410419 | ||
| 
						 | 
					bf4519cde5 | ||
| 
						 | 
					e967b94356 | ||
| 
						 | 
					2316286c0e | ||
| 
						 | 
					67bde7d465 | ||
| 
						 | 
					cd63f94d4d | ||
| 
						 | 
					2054eb771e | ||
| 
						 | 
					ea0ceb11a0 | ||
| 
						 | 
					00579b98c4 | ||
| 
						 | 
					ee5a8d3e31 | ||
| 
						 | 
					72370164c3 | ||
| 
						 | 
					704422ce1e | ||
| 
						 | 
					8e8d7e1b26 | ||
| 
						 | 
					3ed6327571 | ||
| 
						 | 
					efd4f1dfd3 | ||
| 
						 | 
					00032b0ba1 | ||
| 
						 | 
					a07f514fc0 | ||
| 
						 | 
					b197c770a6 | ||
| 
						 | 
					b7c9762598 | ||
| 
						 | 
					a414bc8c3e | ||
| 
						 | 
					98a3c3c514 | ||
| 
						 | 
					157fd05aad | ||
| 
						 | 
					9f510ceb5d | ||
| 
						 | 
					675b1c2fce | ||
| 
						 | 
					c923132e9d | ||
| 
						 | 
					1864e3bed3 | ||
| 
						 | 
					af7bcd7daa | ||
| 
						 | 
					3fa2fff86f | ||
| 
						 | 
					b372a64e10 | ||
| 
						 | 
					e432336433 | ||
| 
						 | 
					f3b0e0215c | ||
| 
						 | 
					a6cc0e0a0d | ||
| 
						 | 
					b2cb6dc1ef | ||
| 
						 | 
					f87f88a69f | ||
| 
						 | 
					6d87cd2f03 | ||
| 
						 | 
					2db3ea2929 | ||
| 
						 | 
					c28b055a0c | ||
| 
						 | 
					02e8d46119 | ||
| 
						 | 
					105a3db56e | ||
| 
						 | 
					295befec25 | ||
| 
						 | 
					cb34cb1f23 | ||
| 
						 | 
					86f393ceb7 | ||
| 
						 | 
					d6d324374e | ||
| 
						 | 
					14999bcc59 | ||
| 
						 | 
					046e288edf | ||
| 
						 | 
					d8b11e75cb | ||
| 
						 | 
					0df7959d43 | ||
| 
						 | 
					5894eb1f33 | ||
| 
						 | 
					6daba1dc6a | ||
| 
						 | 
					69b8f2895b | ||
| 
						 | 
					0ace876730 | ||
| 
						 | 
					e9daf8a9ce | ||
| 
						 | 
					cf0156622a | ||
| 
						 | 
					86cac6d3b2 | ||
| 
						 | 
					f46ea1d8e2 | ||
| 
						 | 
					0980992d44 | ||
| 
						 | 
					38a503fb8a | ||
| 
						 | 
					fef58ce79e | ||
| 
						 | 
					da0d5e78bc | ||
| 
						 | 
					ad212c1ed1 | ||
| 
						 | 
					e1bce59fd3 | ||
| 
						 | 
					9beb75d3c4 | ||
| 
						 | 
					042ef467ee | ||
| 
						 | 
					01736e6c41 | ||
| 
						 | 
					29411a0c7a | ||
| 
						 | 
					b66f59adfa | ||
| 
						 | 
					9ab788aa23 | ||
| 
						 | 
					87887a7a65 | ||
| 
						 | 
					5a0d057e49 | ||
| 
						 | 
					aa59369b4c | ||
| 
						 | 
					18c7f2fce8 | ||
| 
						 | 
					6a8d6f039a | ||
| 
						 | 
					5ff9c21f72 | ||
| 
						 | 
					5c52c04650 | ||
| 
						 | 
					6c86bf7a1e | ||
| 
						 | 
					0d4d2e02eb | ||
| 
						 | 
					151399a944 | ||
| 
						 | 
					049615e35d | ||
| 
						 | 
					6b72417a00 | ||
| 
						 | 
					aabbe99fcb | ||
| 
						 | 
					8011cd56e3 | ||
| 
						 | 
					d3152655d5 | ||
| 
						 | 
					006cd7083f | ||
| 
						 | 
					bc8923b1ec | ||
| 
						 | 
					1632ef7448 | ||
| 
						 | 
					f1f4fbde2a | ||
| 
						 | 
					1854c48005 | ||
| 
						 | 
					ebda73f867 | ||
| 
						 | 
					bcc311668e | ||
| 
						 | 
					1dd26414df | ||
| 
						 | 
					056389eb1c | ||
| 
						 | 
					a07856a08d | ||
| 
						 | 
					19ce768c6b | ||
| 
						 | 
					aaed77c55e | ||
| 
						 | 
					49270d0431 | ||
| 
						 | 
					673c42b238 | ||
| 
						 | 
					5541b18ba8 | ||
| 
						 | 
					28e117f49f | ||
| 
						 | 
					46bfc05480 | ||
| 
						 | 
					427a37ca3f | ||
| 
						 | 
					39ae3b338f | ||
| 
						 | 
					48f5b3efce | ||
| 
						 | 
					f8dc000699 | ||
| 
						 | 
					bf8d6f9ab8 | ||
| 
						 | 
					17e844a450 | ||
| 
						 | 
					8ca7d12430 | ||
| 
						 | 
					67b9c82ea2 | ||
| 
						 | 
					a6f5b991eb | ||
| 
						 | 
					756587dcb9 | ||
| 
						 | 
					0a084f7b3a | ||
| 
						 | 
					da0a95b23a | ||
| 
						 | 
					599fe418a1 | ||
| 
						 | 
					4519e7b839 | ||
| 
						 | 
					4659b53e7d | ||
| 
						 | 
					dc22495d35 | ||
| 
						 | 
					ab0d964259 | ||
| 
						 | 
					dac3654e2d | ||
| 
						 | 
					989d87cb1a | ||
| 
						 | 
					d6934a02b5 | ||
| 
						 | 
					f9986e9abf | ||
| 
						 | 
					1f5e321ec1 | ||
| 
						 | 
					b6adb6ef58 | ||
| 
						 | 
					bfdaf45141 | ||
| 
						 | 
					69526a354d | ||
| 
						 | 
					778f2b648c | ||
| 
						 | 
					2223317bef | ||
| 
						 | 
					b107586c0c | ||
| 
						 | 
					d544755389 | ||
| 
						 | 
					88398e9ba3 | ||
| 
						 | 
					15c1ac03c8 | ||
| 
						 | 
					c3c6fc7855 | ||
| 
						 | 
					4d8cca8a7e | ||
| 
						 | 
					d61be85581 | ||
| 
						 | 
					9e456a8537 | ||
| 
						 | 
					f179e2b899 | ||
| 
						 | 
					6a60b41431 | ||
| 
						 | 
					c6a47f988c | ||
| 
						 | 
					d0666f289a | ||
| 
						 | 
					d8afda60a9 | ||
| 
						 | 
					804ab36df6 | ||
| 
						 | 
					a41d5174e2 | ||
| 
						 | 
					9c5d953a07 | ||
| 
						 | 
					7b7b18c57e | ||
| 
						 | 
					8eb094b946 | ||
| 
						 | 
					7fa18a63cb | ||
| 
						 | 
					90600a5e3b | ||
| 
						 | 
					23f5908ac7 | ||
| 
						 | 
					e622237d12 | ||
| 
						 | 
					f0816174d2 | ||
| 
						 | 
					057444f844 | ||
| 
						 | 
					725c5f1ad3 | ||
| 
						 | 
					9c8dc84ac1 | ||
| 
						 | 
					e3899ababb | ||
| 
						 | 
					3fc880ac5d | ||
| 
						 | 
					602b2790ca | ||
| 
						 | 
					b05a3ad765 | ||
| 
						 | 
					3d8f4f23af | ||
| 
						 | 
					a74bee5fc7 | ||
| 
						 | 
					55c9e24875 | ||
| 
						 | 
					ebe221948d | ||
| 
						 | 
					b2d951e423 | ||
| 
						 | 
					c5993d10a8 | ||
| 
						 | 
					5be1ae28ef | ||
| 
						 | 
					96db9023b8 | ||
| 
						 | 
					0d7717fc9c | ||
| 
						 | 
					aba7600029 | ||
| 
						 | 
					00acdfbf98 | ||
| 
						 | 
					51624dbdae | ||
| 
						 | 
					9e29df0027 | ||
| 
						 | 
					f54167d1dc | ||
| 
						 | 
					6042582b62 | ||
| 
						 | 
					50522642a0 | ||
| 
						 | 
					bfc3424d1f | ||
| 
						 | 
					1c65936882 | ||
| 
						 | 
					40acdb192e | ||
| 
						 | 
					4b7a4ba29c | ||
| 
						 | 
					e0660c6257 | ||
| 
						 | 
					b4ada742d1 | ||
| 
						 | 
					a93d952cd4 | ||
| 
						 | 
					5b56fec6f5 | ||
| 
						 | 
					32171e4e07 | ||
| 
						 | 
					48e6edabed | ||
| 
						 | 
					069607124d | ||
| 
						 | 
					caf55bfacf | ||
| 
						 | 
					ce3631015e | ||
| 
						 | 
					3ae1b53496 | ||
| 
						 | 
					79bb00534d | ||
| 
						 | 
					c4b16ddc8f | ||
| 
						 | 
					deb3b08ff2 | ||
| 
						 | 
					b45b3efd5d | ||
| 
						 | 
					e420060ac9 | ||
| 
						 | 
					d8ec8a4a65 | ||
| 
						 | 
					040ed7b4d0 | ||
| 
						 | 
					c76e5b08a1 | ||
| 
						 | 
					0071215832 | ||
| 
						 | 
					4a55631e4d | ||
| 
						 | 
					19a68574a9 | ||
| 
						 | 
					f21e6b6ecb | ||
| 
						 | 
					e1549a01c7 | ||
| 
						 | 
					765be74d24 | ||
| 
						 | 
					9614d2c676 | ||
| 
						 | 
					ad03c71ea1 | ||
| 
						 | 
					4eedf86a16 | ||
| 
						 | 
					eb85ee9a88 | ||
| 
						 | 
					fa2026dc88 | ||
| 
						 | 
					fe08007399 | ||
| 
						 | 
					e3ebdcff12 | ||
| 
						 | 
					cb10cf1224 | ||
| 
						 | 
					c0dd71c97c | ||
| 
						 | 
					51478be956 | ||
| 
						 | 
					a7304e4b98 | ||
| 
						 | 
					0d8776344c | ||
| 
						 | 
					197e0ea817 | ||
| 
						 | 
					c776a3f398 | ||
| 
						 | 
					25c9fa6026 | ||
| 
						 | 
					d2dc33d57c | ||
| 
						 | 
					f3dcc8411e | ||
| 
						 | 
					1c2c5e402a | ||
| 
						 | 
					34628967f1 | ||
| 
						 | 
					a6c62f0c25 | ||
| 
						 | 
					ca989269a2 | ||
| 
						 | 
					2ec4181ba9 | ||
| 
						 | 
					0294b2be5f | ||
| 
						 | 
					f1068a1ab7 | ||
| 
						 | 
					cadde467a8 | ||
| 
						 | 
					c2bdcba347 | ||
| 
						 | 
					60df657b3a | ||
| 
						 | 
					17a2d0801f | ||
| 
						 | 
					accb3007ac | ||
| 
						 | 
					b13dff6141 | ||
| 
						 | 
					4ade6a8ca4 | ||
| 
						 | 
					00fadef414 | ||
| 
						 | 
					7ed244a0b3 | ||
| 
						 | 
					e94a23876c | ||
| 
						 | 
					041f681943 | ||
| 
						 | 
					afec9f57da | ||
| 
						 | 
					0ec1a77891 | ||
| 
						 | 
					62c2b6d944 | ||
| 
						 | 
					5b98979712 | ||
| 
						 | 
					9abbf5cce7 | ||
| 
						 | 
					ddfe486e4c | ||
| 
						 | 
					834d30bc63 | ||
| 
						 | 
					e26faa9e0c | ||
| 
						 | 
					025f7dbdd1 | ||
| 
						 | 
					44f4934bde | ||
| 
						 | 
					453ca706cc | ||
| 
						 | 
					5e1ff664f9 | ||
| 
						 | 
					833a896681 | ||
| 
						 | 
					34e43b909f | ||
| 
						 | 
					62036c6fc3 | ||
| 
						 | 
					68dd8512b7 | ||
| 
						 | 
					bbf9f3c654 | ||
| 
						 | 
					2583270191 | ||
| 
						 | 
					3da721dac9 | ||
| 
						 | 
					eb22b7ec75 | ||
| 
						 | 
					b93916149d | ||
| 
						 | 
					82f42a1d2e | ||
| 
						 | 
					a4870de5aa | ||
| 
						 | 
					39aabe59c8 | ||
| 
						 | 
					f4c93b46ed | ||
| 
						 | 
					4af793036f | ||
| 
						 | 
					13bca90ac5 | ||
| 
						 | 
					c9a6ddafc5 | ||
| 
						 | 
					f4a51970d2 | ||
| 
						 | 
					937f125efc | ||
| 
						 | 
					4b61f6d2a6 | ||
| 
						 | 
					d5bff72615 | ||
| 
						 | 
					3b4be0018b | ||
| 
						 | 
					125c2ed8a3 | ||
| 
						 | 
					09da95542a | ||
| 
						 | 
					cc53b38574 | ||
| 
						 | 
					0aeeae0c9c | ||
| 
						 | 
					00c991f028 | ||
| 
						 | 
					55856a7b74 | ||
| 
						 | 
					83a3af9f4e | ||
| 
						 | 
					76bf0cf27c | ||
| 
						 | 
					7cf0529b52 | ||
| 
						 | 
					6c03af135b | ||
| 
						 | 
					5cd1aa4f15 | ||
| 
						 | 
					04b80f4003 | ||
| 
						 | 
					591c55a981 | ||
| 
						 | 
					cd2693862b | ||
| 
						 | 
					25370e93c6 | ||
| 
						 | 
					cdb6c48445 | ||
| 
						 | 
					04b727b4dd | ||
| 
						 | 
					cbd93a0636 | ||
| 
						 | 
					b9e84f007f | ||
| 
						 | 
					29a546720b | ||
| 
						 | 
					0e9dd387ea | ||
| 
						 | 
					79dabcc137 | ||
| 
						 | 
					944bc29f90 | ||
| 
						 | 
					03e1b3a153 | ||
| 
						 | 
					9c95ff968a | ||
| 
						 | 
					96b680f210 | ||
| 
						 | 
					9ab3ce1246 | ||
| 
						 | 
					3972dbe462 | ||
| 
						 | 
					85615e33e5 | ||
| 
						 | 
					f4cfc3444a | ||
| 
						 | 
					24f599af21 | ||
| 
						 | 
					bca0d7fdb5 | ||
| 
						 | 
					bc4ae2cb0b | ||
| 
						 | 
					ef4b9f001a | ||
| 
						 | 
					08f8933fa3 | ||
| 
						 | 
					41958376b5 | ||
| 
						 | 
					9fe4603b82 | ||
| 
						 | 
					147dbb2fe3 | ||
| 
						 | 
					cbf9b4aed3 | ||
| 
						 | 
					625a55324f | ||
| 
						 | 
					3151e328e0 | ||
| 
						 | 
					46ebd9e3bb | ||
| 
						 | 
					f66db68e1f | ||
| 
						 | 
					0c4b72e9c0 | ||
| 
						 | 
					f88dbb8385 | ||
| 
						 | 
					1113fc31ba | ||
| 
						 | 
					0898147090 | ||
| 
						 | 
					4d8da30fc1 | ||
| 
						 | 
					579f3a631e | ||
| 
						 | 
					47061af106 | ||
| 
						 | 
					13e225300f | ||
| 
						 | 
					26bc56d014 | ||
| 
						 | 
					496681cd51 | ||
| 
						 | 
					746c6f3a53 | ||
| 
						 | 
					8545f73b89 | ||
| 
						 | 
					32cc2479b4 | ||
| 
						 | 
					f306b87d76 | ||
| 
						 | 
					41cf07f0ec | ||
| 
						 | 
					62f4033381 | ||
| 
						 | 
					f9f6a8f96c | ||
| 
						 | 
					df0d93564e | ||
| 
						 | 
					0d589ac150 | ||
| 
						 | 
					35d732fc2e | ||
| 
						 | 
					896ddb9851 | ||
| 
						 | 
					e630b3c218 | ||
| 
						 | 
					f1ca56a69f | ||
| 
						 | 
					529d27ea47 | ||
| 
						 | 
					b2226c6c83 | ||
| 
						 | 
					024de2174b | ||
| 
						 | 
					125093b59f | ||
| 
						 | 
					f3e99ea072 | ||
| 
						 | 
					8bfd4c659f | ||
| 
						 | 
					ec07246a08 | ||
| 
						 | 
					04e45b52ee | ||
| 
						 | 
					d5371324d9 | ||
| 
						 | 
					36260233e7 | ||
| 
						 | 
					cab13fc847 | ||
| 
						 | 
					34ab3c8c71 | ||
| 
						 | 
					25c93fd240 | ||
| 
						 | 
					428c1064c3 | ||
| 
						 | 
					81ce0e14e7 | ||
| 
						 | 
					b908e88ec1 | ||
| 
						 | 
					62e4506a7d | ||
| 
						 | 
					014265eb02 | ||
| 
						 | 
					9f27de170d | ||
| 
						 | 
					6cb19b7681 | ||
| 
						 | 
					e130841bcc | ||
| 
						 | 
					2ee798880a | ||
| 
						 | 
					ffcf4c6164 | ||
| 
						 | 
					b286a96811 | ||
| 
						 | 
					2a2df2e9f2 | ||
| 
						 | 
					15481c5e42 | ||
| 
						 | 
					366b60b9da | ||
| 
						 | 
					4782444a35 | ||
| 
						 | 
					8a17e161d1 | ||
| 
						 | 
					72f27cd2df | ||
| 
						 | 
					3b3674ae58 | ||
| 
						 | 
					9d75e765bc | ||
| 
						 | 
					bf07bd4d61 | ||
| 
						 | 
					296cc7f4b8 | ||
| 
						 | 
					3d92984689 | ||
| 
						 | 
					51447d5db5 | ||
| 
						 | 
					1dcf520fe2 | ||
| 
						 | 
					fca84dabe6 | ||
| 
						 | 
					3ea1e13569 | ||
| 
						 | 
					dd6639bd3a | ||
| 
						 | 
					bee0550397 | ||
| 
						 | 
					fc57c58c81 | ||
| 
						 | 
					5bb6d96558 | ||
| 
						 | 
					28e1bd35bd | ||
| 
						 | 
					dd83cc298d | ||
| 
						 | 
					ea00598596 | ||
| 
						 | 
					a650314f72 | ||
| 
						 | 
					54fdc39a08 | ||
| 
						 | 
					7dc98a62b2 | ||
| 
						 | 
					f20ba1c9bb | ||
| 
						 | 
					7c3562947a | ||
| 
						 | 
					eb3a3911fc | ||
| 
						 | 
					540f7c75ef | ||
| 
						 | 
					d6342aab08 | ||
| 
						 | 
					e7b85bc402 | ||
| 
						 | 
					07eaaab2f6 | ||
| 
						 | 
					96f7fafa24 | ||
| 
						 | 
					487a0df700 | ||
| 
						 | 
					09ef5f6258 | ||
| 
						 | 
					bcc0e4ca7c | ||
| 
						 | 
					caac8fefdc | ||
| 
						 | 
					353e845120 | ||
| 
						 | 
					d1451f18d9 | ||
| 
						 | 
					c3a5b7b82a | ||
| 
						 | 
					70d91d60bc | ||
| 
						 | 
					bc78883017 | ||
| 
						 | 
					f929f201fb | ||
| 
						 | 
					554cf97f03 | ||
| 
						 | 
					48ccbeefda | ||
| 
						 | 
					7a217076d9 | ||
| 
						 | 
					0720bf7df1 | ||
| 
						 | 
					9d6727781d | ||
| 
						 | 
					12c1621523 | ||
| 
						 | 
					f9b48d60f2 | ||
| 
						 | 
					5c29127666 | ||
| 
						 | 
					78d767f5ec | ||
| 
						 | 
					c8b979e929 | ||
| 
						 | 
					2beaa91ca7 | ||
| 
						 | 
					efa288ceac | ||
| 
						 | 
					ad3bbd4a16 | ||
| 
						 | 
					73913443a5 | ||
| 
						 | 
					e133ff7190 | ||
| 
						 | 
					25da47c3c8 | ||
| 
						 | 
					4dc40f5eec | ||
| 
						 | 
					a1a37575f0 | ||
| 
						 | 
					c64c0e03d3 | ||
| 
						 | 
					e1e882a368 | ||
| 
						 | 
					36b0719793 | ||
| 
						 | 
					7655044dd3 | ||
| 
						 | 
					58fdd30664 | ||
| 
						 | 
					7175dbaeba | ||
| 
						 | 
					af454b5bb0 | ||
| 
						 | 
					5b2bbf37fa | ||
| 
						 | 
					6321ac9e15 | ||
| 
						 | 
					eeca72f71e | ||
| 
						 | 
					6e164e5c3d | ||
| 
						 | 
					1b452133ae | ||
| 
						 | 
					d9c34505e5 | ||
| 
						 | 
					f9885acc8c | ||
| 
						 | 
					fa9df48401 | ||
| 
						 | 
					d414a5a0f0 | ||
| 
						 | 
					9eb4460e68 | ||
| 
						 | 
					6984d16671 | ||
| 
						 | 
					5b9d0995a1 | ||
| 
						 | 
					7ad8e1fc4e | ||
| 
						 | 
					c9b31189a9 | ||
| 
						 | 
					c76b7a1a82 | ||
| 
						 | 
					c940e07014 | ||
| 
						 | 
					88be4ebfbc | ||
| 
						 | 
					effa47b80a | ||
| 
						 | 
					067400b16e | ||
| 
						 | 
					748628ced0 | ||
| 
						 | 
					6791060eae | ||
| 
						 | 
					502dfeb8de | ||
| 
						 | 
					5bbed29518 | ||
| 
						 | 
					2f2d33f470 | ||
| 
						 | 
					be60a3feaa | ||
| 
						 | 
					e504a829a0 | ||
| 
						 | 
					0d829f6681 | ||
| 
						 | 
					d9540579c5 | ||
| 
						 | 
					ecf963b80d | ||
| 
						 | 
					7fc6d35be0 | ||
| 
						 | 
					e7d2a37158 | ||
| 
						 | 
					531c6fc8f3 | ||
| 
						 | 
					e011d0a3c4 | ||
| 
						 | 
					8d5505d099 | ||
| 
						 | 
					d36e0ee460 | ||
| 
						 | 
					143619ccf6 | ||
| 
						 | 
					9f339d75b5 | ||
| 
						 | 
					28583660fb | ||
| 
						 | 
					dedfe959dd | ||
| 
						 | 
					4d936ace08 | ||
| 
						 | 
					89bd25eb26 | ||
| 
						 | 
					4a1cf50187 | ||
| 
						 | 
					32e12316e5 | ||
| 
						 | 
					ad7b24f145 | ||
| 
						 | 
					c2770c0e0e | ||
| 
						 | 
					371056f2b9 | ||
| 
						 | 
					2d613908e8 | ||
| 
						 | 
					18fb1fae08 | ||
| 
						 | 
					39ef161c72 | ||
| 
						 | 
					a7612c5066 | ||
| 
						 | 
					6cbae10b5e | ||
| 
						 | 
					ebe81134c0 | ||
| 
						 | 
					a1d573e282 | ||
| 
						 | 
					e959e24b47 | ||
| 
						 | 
					3f98d7c0b5 | ||
| 
						 | 
					d2f950c984 | ||
| 
						 | 
					63e8f16737 | ||
| 
						 | 
					9bf5fd894f | ||
| 
						 | 
					6296729fae | ||
| 
						 | 
					67d216801b | ||
| 
						 | 
					0a5575f3f6 | ||
| 
						 | 
					418044cbab | ||
| 
						 | 
					8c67b13407 | ||
| 
						 | 
					2a477ccf0b | ||
| 
						 | 
					c34137bef9 | ||
| 
						 | 
					914d91c5b3 | ||
| 
						 | 
					e733dea3ce | ||
| 
						 | 
					78c5d2a9bb | ||
| 
						 | 
					3bf4e14cc3 | ||
| 
						 | 
					d68d160cb7 | ||
| 
						 | 
					202cb42fbb | ||
| 
						 | 
					49f6cb968f | ||
| 
						 | 
					07e120b7da | ||
| 
						 | 
					f3dcae15ac | ||
| 
						 | 
					25ec498dc7 | ||
| 
						 | 
					9cc42cb091 | ||
| 
						 | 
					bcf9cf89e7 | ||
| 
						 | 
					f0729fc3e0 | ||
| 
						 | 
					8186c00ef3 | ||
| 
						 | 
					c0b31ccb87 | ||
| 
						 | 
					267c950c5f | ||
| 
						 | 
					ce1605b508 | ||
| 
						 | 
					66fdb1c0d4 | ||
| 
						 | 
					25bfdca16a | ||
| 
						 | 
					9c284f9651 | ||
| 
						 | 
					6d78c381f6 | ||
| 
						 | 
					784e2080df | ||
| 
						 | 
					70505bc334 | ||
| 
						 | 
					8e8b247341 | ||
| 
						 | 
					a8595879ec | ||
| 
						 | 
					33a688e806 | ||
| 
						 | 
					5c2bfad9b4 | ||
| 
						 | 
					250f979237 | ||
| 
						 | 
					b527b6e8ff | ||
| 
						 | 
					a54ce007e6 | ||
| 
						 | 
					4ed1f3490e | ||
| 
						 | 
					0a082e9b37 | ||
| 
						 | 
					236a99a409 | ||
| 
						 | 
					04b4363ec8 | ||
| 
						 | 
					37ebc20093 | ||
| 
						 | 
					cef781cc87 | ||
| 
						 | 
					08e4c7a967 | ||
| 
						 | 
					697e4edcad | ||
| 
						 | 
					b26297ca51 | ||
| 
						 | 
					6ca7dba0cf | ||
| 
						 | 
					f1fa05b407 | ||
| 
						 | 
					02e22c35fe | ||
| 
						 | 
					b935714237 | ||
| 
						 | 
					a8314df902 | ||
| 
						 | 
					0cd7a0325f | ||
| 
						 | 
					16b7c81d55 | ||
| 
						 | 
					424ba8b588 | ||
| 
						 | 
					bf493e8d62 | ||
| 
						 | 
					c714e43c8d | ||
| 
						 | 
					cdf9d6f6ed | ||
| 
						 | 
					cc4b48c27c | ||
| 
						 | 
					cac9c92cc0 | ||
| 
						 | 
					d40abf1689 | ||
| 
						 | 
					69e9c69e70 | ||
| 
						 | 
					c489ea7d01 | ||
| 
						 | 
					26c6857a59 | ||
| 
						 | 
					508bd3d1aa | ||
| 
						 | 
					8705846710 | ||
| 
						 | 
					c944a9696e | ||
| 
						 | 
					943cc09d8a | ||
| 
						 | 
					fc6800d19f | ||
| 
						 | 
					d06f047b04 | ||
| 
						 | 
					ddc899bada | ||
| 
						 | 
					bd479e25c7 | ||
| 
						 | 
					eaf5bd168e | ||
| 
						 | 
					d7ecc206ba | ||
| 
						 | 
					11ea212e8c | ||
| 
						 | 
					cb29d8c11f | ||
| 
						 | 
					adcea5a043 | ||
| 
						 | 
					f02f7c2c4a | ||
| 
						 | 
					a1e44cc14f | ||
| 
						 | 
					d2d09bf68c | ||
| 
						 | 
					e2dfb655f7 | ||
| 
						 | 
					463e76b63c | ||
| 
						 | 
					2dc4b0dbe8 | ||
| 
						 | 
					7b23c126e6 | ||
| 
						 | 
					25e3d2225a | ||
| 
						 | 
					c8e0b5d7b6 | ||
| 
						 | 
					4fb7e2b445 | ||
| 
						 | 
					9138e3c061 | ||
| 
						 | 
					9b2a29660b | ||
| 
						 | 
					b7b4a9fa57 | ||
| 
						 | 
					1fb07a7de8 | ||
| 
						 | 
					b9cbcaad58 | ||
| 
						 | 
					c6706a6f6c | ||
| 
						 | 
					958e6a75a1 | ||
| 
						 | 
					397977726c | ||
| 
						 | 
					285d9189c7 | ||
| 
						 | 
					767d3e0054 | ||
| 
						 | 
					409d2a1b71 | ||
| 
						 | 
					e0b9678d7f | ||
| 
						 | 
					166dea6ac8 | ||
| 
						 | 
					52bef4d677 | ||
| 
						 | 
					801e5ef840 | ||
| 
						 | 
					0044739ae5 | ||
| 
						 | 
					4e44bd3650 | ||
| 
						 | 
					0cffb0cd3e | ||
| 
						 | 
					aaa3850ccd | ||
| 
						 | 
					a17b5d5a4f | ||
| 
						 | 
					2f97765bc3 | ||
| 
						 | 
					3205ca8deb | ||
| 
						 | 
					1cb4d65b87 | ||
| 
						 | 
					7b2dd292bc | ||
| 
						 | 
					ab585551c0 | ||
| 
						 | 
					6cf0d7b999 | ||
| 
						 | 
					9d972207f0 | ||
| 
						 | 
					d9834ff24b | ||
| 
						 | 
					d9c3ba05e7 | ||
| 
						 | 
					03467ce6bd | ||
| 
						 | 
					6e750fcb1e | ||
| 
						 | 
					bd6941cfaa | ||
| 
						 | 
					578519edd0 | ||
| 
						 | 
					5c05f69450 | ||
| 
						 | 
					f529dca488 | ||
| 
						 | 
					296aca9dcf | ||
| 
						 | 
					b170703128 | ||
| 
						 | 
					b300fb7734 | ||
| 
						 | 
					f89af47438 | ||
| 
						 | 
					7bb4f8ff12 | ||
| 
						 | 
					7dd6407a4c | ||
| 
						 | 
					53de315b78 | ||
| 
						 | 
					e065e6cda2 | ||
| 
						 | 
					60553cc209 | ||
| 
						 | 
					2d4c9ab518 | ||
| 
						 | 
					50771f7ce3 | ||
| 
						 | 
					242f8d644c | ||
| 
						 | 
					f5575cd167 | ||
| 
						 | 
					dd0ddc3e78 | ||
| 
						 | 
					62308f3f4a | ||
| 
						 | 
					cecafcce94 | ||
| 
						 | 
					ca0efb7594 | ||
| 
						 | 
					1d05ff2779 | ||
| 
						 | 
					941811ccb9 | ||
| 
						 | 
					700384be8e | ||
| 
						 | 
					b8a22c40e0 | ||
| 
						 | 
					3918de9ad1 | ||
| 
						 | 
					96fe35e7d4 | ||
| 
						 | 
					e87afb1518 | ||
| 
						 | 
					7b467c6b81 | ||
| 
						 | 
					eb8ebafe87 | ||
| 
						 | 
					e559febaf1 | ||
| 
						 | 
					6bcc6d38c7 | ||
| 
						 | 
					8173960305 | ||
| 
						 | 
					f2e590942e | ||
| 
						 | 
					6a4b87eb9d | ||
| 
						 | 
					edcba19c23 | ||
| 
						 | 
					b140ae9137 | ||
| 
						 | 
					8ee0591f28 | ||
| 
						 | 
					97d0c596a1 | ||
| 
						 | 
					7454cba4fa | ||
| 
						 | 
					5713411893 | ||
| 
						 | 
					a0cf79e841 | ||
| 
						 | 
					825e1a7c56 | ||
| 
						 | 
					9f2b453338 | ||
| 
						 | 
					a0dce9be76 | ||
| 
						 | 
					cf2b938529 | ||
| 
						 | 
					62f685a9cd | ||
| 
						 | 
					2c7d978c2d | ||
| 
						 | 
					8cd897a42c | ||
| 
						 | 
					1dc44d3130 | ||
| 
						 | 
					2a6e3ef37e | ||
| 
						 | 
					115d528c23 | ||
| 
						 | 
					a310428527 | ||
| 
						 | 
					7e0fd45ce3 | ||
| 
						 | 
					b138ea54ee | ||
| 
						 | 
					d7125d8d85 | ||
| 
						 | 
					9c115a4acc | ||
| 
						 | 
					43716567f5 | ||
| 
						 | 
					0a8f00af34 | ||
| 
						 | 
					b1d7429186 | ||
| 
						 | 
					060a38a2c0 | ||
| 
						 | 
					58402976b4 | ||
| 
						 | 
					cd7b854bbb | ||
| 
						 | 
					aecc0756e8 | ||
| 
						 | 
					e6ccc6ed70 | ||
| 
						 | 
					e959a01fac | ||
| 
						 | 
					17674bfdf7 | ||
| 
						 | 
					d807d4c21f | ||
| 
						 | 
					b4690d2eab | ||
| 
						 | 
					886657a641 | ||
| 
						 | 
					db896db5a7 | ||
| 
						 | 
					2357ae17e7 | ||
| 
						 | 
					9f1c5491d2 | ||
| 
						 | 
					70b52222f5 | ||
| 
						 | 
					88cb59727c | ||
| 
						 | 
					781bfdc314 | ||
| 
						 | 
					b66723b23e | ||
| 
						 | 
					cf96d71c22 | ||
| 
						 | 
					1a111921da | ||
| 
						 | 
					5d9bb428bb | ||
| 
						 | 
					9833757b5d | ||
| 
						 | 
					4195343c0d | ||
| 
						 | 
					042bee4e5c | ||
| 
						 | 
					4afba1f3d9 | ||
| 
						 | 
					5999d45a5d | ||
| 
						 | 
					f69e5d6a19 | ||
| 
						 | 
					3517637702 | ||
| 
						 | 
					e2809bfb42 | ||
| 
						 | 
					68b33cc5c7 | ||
| 
						 | 
					4c02cf8ecc | ||
| 
						 | 
					271daaf768 | ||
| 
						 | 
					efbb7ee432 | ||
| 
						 | 
					6471ec71aa | ||
| 
						 | 
					cb45708061 | ||
| 
						 | 
					02597f2885 | ||
| 
						 | 
					8c6a514edf | ||
| 
						 | 
					7f3fdab793 | ||
| 
						 | 
					5372f5f989 | ||
| 
						 | 
					6d24c09a69 | ||
| 
						 | 
					a8d72c79db | ||
| 
						 | 
					1f713e0106 | ||
| 
						 | 
					03f84c8260 | ||
| 
						 | 
					6d5eb464c9 | ||
| 
						 | 
					67f8de9ab8 | ||
| 
						 | 
					2d95ceedc5 | ||
| 
						 | 
					6526d765fc | ||
| 
						 | 
					3d520f7c2d | ||
| 
						 | 
					9c37519b55 | ||
| 
						 | 
					7e9cfcd0dc | ||
| 
						 | 
					a99ce1f5b1 | ||
| 
						 | 
					42660b3cf1 | ||
| 
						 | 
					f30258c439 | ||
| 
						 | 
					93ff4c69f7 | ||
| 
						 | 
					79571bb1ca | ||
| 
						 | 
					f72c1a58cb | ||
| 
						 | 
					2461396f69 | ||
| 
						 | 
					81a071df2f | ||
| 
						 | 
					6841abe842 | ||
| 
						 | 
					cb70355d87 | ||
| 
						 | 
					b17442bb04 | ||
| 
						 | 
					4874e235fb | ||
| 
						 | 
					06afa6eb94 | ||
| 
						 | 
					58e4205d6c | ||
| 
						 | 
					733394d6dd | ||
| 
						 | 
					2de9558dea | ||
| 
						 | 
					6bd173fced | ||
| 
						 | 
					6b00cd746a | ||
| 
						 | 
					9309ea6617 | ||
| 
						 | 
					05c9e3aea5 | ||
| 
						 | 
					88bac3e664 | ||
| 
						 | 
					5473b6bc2f | ||
| 
						 | 
					38e408076e | ||
| 
						 | 
					dc100d87b5 | ||
| 
						 | 
					6f6b31dadc | ||
| 
						 | 
					b08b158b44 | ||
| 
						 | 
					177f27d71e | ||
| 
						 | 
					928bd9a149 | ||
| 
						 | 
					e53113b8ac | ||
| 
						 | 
					1fe83b4afe | ||
| 
						 | 
					e8f31f80d1 | ||
| 
						 | 
					56f5ab43c2 | ||
| 
						 | 
					370385571c | ||
| 
						 | 
					e34a303ce1 | ||
| 
						 | 
					36f120cd20 | ||
| 
						 | 
					0ae7c43fa5 | ||
| 
						 | 
					c0d2943952 | ||
| 
						 | 
					7d453a3b49 | ||
| 
						 | 
					cd447875e6 | ||
| 
						 | 
					692a94293c | ||
| 
						 | 
					efebb10829 | ||
| 
						 | 
					3c3f025923 | ||
| 
						 | 
					5ff6e2dfbb | ||
| 
						 | 
					61ac68f9f6 | ||
| 
						 | 
					7f1022a8b1 | ||
| 
						 | 
					edf6b025b1 | ||
| 
						 | 
					d799df36b3 | ||
| 
						 | 
					9e96812934 | ||
| 
						 | 
					91e97cbe4c | ||
| 
						 | 
					63ee3b32fe | ||
| 
						 | 
					4ff1a2da10 | ||
| 
						 | 
					4c3c975066 | ||
| 
						 | 
					ec5d74f868 | ||
| 
						 | 
					be0853358c | ||
| 
						 | 
					fea15b553d | ||
| 
						 | 
					88ef78745e | ||
| 
						 | 
					be79342515 | ||
| 
						 | 
					064a6176ac | ||
| 
						 | 
					84e7485bfb | ||
| 
						 | 
					f56f72f219 | ||
| 
						 | 
					2bfb23f102 | ||
| 
						 | 
					cf199fec52 | ||
| 
						 | 
					165c20c2c4 | ||
| 
						 | 
					625c6ba4c7 | ||
| 
						 | 
					a32bede701 | ||
| 
						 | 
					8ff5c8874f | ||
| 
						 | 
					c5d38fc262 | ||
| 
						 | 
					6b71970520 | ||
| 
						 | 
					0209e111f6 | ||
| 
						 | 
					dc01af7723 | ||
| 
						 | 
					5435d0412f | ||
| 
						 | 
					922ac25f64 | ||
| 
						 | 
					aed53d6c5a | ||
| 
						 | 
					61cdb9f36a | ||
| 
						 | 
					1acd042c85 | ||
| 
						 | 
					572712d82a | ||
| 
						 | 
					d1697a7556 | ||
| 
						 | 
					c8c6e9ecd9 | ||
| 
						 | 
					90f3e4cf05 | ||
| 
						 | 
					7bd8bf58bb | ||
| 
						 | 
					1190d3f442 | ||
| 
						 | 
					0e4f5cfbab | ||
| 
						 | 
					f1c8db9f8c | ||
| 
						 | 
					2c9abbd554 | ||
| 
						 | 
					2305ae5d8c | ||
| 
						 | 
					dec54bd0ba | ||
| 
						 | 
					aade369737 | ||
| 
						 | 
					2a5e042c70 | ||
| 
						 | 
					1dc4c8c727 | ||
| 
						 | 
					7ca035db88 | ||
| 
						 | 
					a460c42f94 | ||
| 
						 | 
					d16743e728 | ||
| 
						 | 
					4a29fa8caf | ||
| 
						 | 
					250bb54dba | ||
| 
						 | 
					847d05d0b4 | ||
| 
						 | 
					8315aa03fc | ||
| 
						 | 
					b7a4c480d6 | ||
| 
						 | 
					9a35faaa29 | ||
| 
						 | 
					fbe2e28911 | ||
| 
						 | 
					84968e25f3 | ||
| 
						 | 
					10fd0b7b55 | ||
| 
						 | 
					4a46dc6e5c | ||
| 
						 | 
					0ec55604c0 | ||
| 
						 | 
					500007c9ed | ||
| 
						 | 
					f75abba013 | ||
| 
						 | 
					dea113b428 | ||
| 
						 | 
					6abc406a69 | ||
| 
						 | 
					dcbe723bc5 | ||
| 
						 | 
					33c98a28ac | ||
| 
						 | 
					b2ddddfb20 | ||
| 
						 | 
					c24367ebb9 | ||
| 
						 | 
					7397b35379 | ||
| 
						 | 
					baee44c3de | ||
| 
						 | 
					1f2e4ecc30 | ||
| 
						 | 
					955e28006d | ||
| 
						 | 
					bf0736eb1f | ||
| 
						 | 
					3a5b97b7f1 | ||
| 
						 | 
					45bf825066 | ||
| 
						 | 
					4a18d5c89b | ||
| 
						 | 
					174b26c497 | ||
| 
						 | 
					5cacc82f61 | ||
| 
						 | 
					29a90816ff | ||
| 
						 | 
					4bea454021 | ||
| 
						 | 
					8bfd0ae4c4 | ||
| 
						 | 
					378943ce67 | ||
| 
						 | 
					c65d409afd | ||
| 
						 | 
					ed1bbe2cad | ||
| 
						 | 
					b0b3d09063 | ||
| 
						 | 
					0ede2af7a0 | ||
| 
						 | 
					e8d23f7811 | ||
| 
						 | 
					907cd7217e | ||
| 
						 | 
					7c402e5af3 | ||
| 
						 | 
					b8d78a5520 | ||
| 
						 | 
					dfa5862960 | ||
| 
						 | 
					4276908f51 | ||
| 
						 | 
					be23b71e87 | ||
| 
						 | 
					f851acbfff | ||
| 
						 | 
					78ef9b0205 | ||
| 
						 | 
					ed9b0e5cba | ||
| 
						 | 
					752c1a0ce9 | ||
| 
						 | 
					cc30415d0c | ||
| 
						 | 
					03e16611a3 | ||
| 
						 | 
					8e2f3c1c83 | ||
| 
						 | 
					b6d63b2516 | ||
| 
						 | 
					e6b88d02bd | ||
| 
						 | 
					125060ca63 | ||
| 
						 | 
					b4baca9261 | ||
| 
						 | 
					6342b6e332 | ||
| 
						 | 
					a6dc77822b | ||
| 
						 | 
					59bc67052b | ||
| 
						 | 
					c090562828 | ||
| 
						 | 
					69e2ec63c5 | ||
| 
						 | 
					f610a516a0 | ||
| 
						 | 
					2e51a4caa3 | ||
| 
						 | 
					c6fa97a6d6 | ||
| 
						 | 
					24d7159abd | ||
| 
						 | 
					7978dc989d | ||
| 
						 | 
					d99e6b5014 | ||
| 
						 | 
					2cf40fc2b8 | ||
| 
						 | 
					260d08b814 | ||
| 
						 | 
					53dd05d8f6 | ||
| 
						 | 
					fbe7055370 | ||
| 
						 | 
					a5b386205f | ||
| 
						 | 
					916bcab28e | ||
| 
						 | 
					c7373c3dee | ||
| 
						 | 
					9f2c8eb2a1 | ||
| 
						 | 
					65300dcfb0 | ||
| 
						 | 
					9ddc574f9a | ||
| 
						 | 
					2dd9e67874 | ||
| 
						 | 
					f93b03a5e6 | ||
| 
						 | 
					55a47cd30f | ||
| 
						 | 
					5792219d1d | ||
| 
						 | 
					293c58c1e7 | ||
| 
						 | 
					9f375a752e | ||
| 
						 | 
					04dc5a9ca6 | ||
| 
						 | 
					ae6cb5483e | ||
| 
						 | 
					a168ec1d27 | ||
| 
						 | 
					2a35144327 | ||
| 
						 | 
					7207eca1ee | ||
| 
						 | 
					9c34782478 | ||
| 
						 | 
					20e6d22709 | ||
| 
						 | 
					24dd0c61ef | ||
| 
						 | 
					565c15363c | ||
| 
						 | 
					ed67f7b7a7 | ||
| 
						 | 
					6ea8d138d3 | ||
| 
						 | 
					4159ac43aa | ||
| 
						 | 
					419b09b053 | ||
| 
						 | 
					88530f6b76 | ||
| 
						 | 
					a8cb8177f6 | ||
| 
						 | 
					277f8a34f4 | ||
| 
						 | 
					4dde470865 | ||
| 
						 | 
					ab08405984 | ||
| 
						 | 
					b81fde02aa | ||
| 
						 | 
					57dd2ea808 | ||
| 
						 | 
					7043fa702f | ||
| 
						 | 
					f98d2e5cc1 | ||
| 
						 | 
					1a5538251f | ||
| 
						 | 
					f4ddbb5ad1 | ||
| 
						 | 
					74bf705ea8 | ||
| 
						 | 
					676cd3a283 | ||
| 
						 | 
					c6ead3cdd3 | ||
| 
						 | 
					2d53648ce7 | ||
| 
						 | 
					64ca6ac26b | ||
| 
						 | 
					4fe4c00eca | ||
| 
						 | 
					376838a606 | ||
| 
						 | 
					d768a816aa | ||
| 
						 | 
					766e0cb7d1 | ||
| 
						 | 
					6a6b0c8b51 | ||
| 
						 | 
					e24b01cc6f | ||
| 
						 | 
					7f9ef5621a | ||
| 
						 | 
					d7fc9ffc51 | ||
| 
						 | 
					39348038df | ||
| 
						 | 
					9472baae0d | ||
| 
						 | 
					ae17b9ecd5 | ||
| 
						 | 
					74096890ba | ||
| 
						 | 
					889c2282a5 | ||
| 
						 | 
					dca30c44f5 | ||
| 
						 | 
					f2c358c6ce | ||
| 
						 | 
					2ab42de1ec | ||
| 
						 | 
					ac2024ccbf | ||
| 
						 | 
					93164a7d64 | ||
| 
						 | 
					ecff2e5ce1 | ||
| 
						 | 
					c9d630dab6 | ||
| 
						 | 
					d135906dbc | ||
| 
						 | 
					9f427a52cb | ||
| 
						 | 
					5a39d3a838 | ||
| 
						 | 
					013f3d999f | ||
| 
						 | 
					64d30d7adc | ||
| 
						 | 
					7062cb56a9 | ||
| 
						 | 
					9d57828d66 | ||
| 
						 | 
					9ed8dee71b | ||
| 
						 | 
					4692b3345d | ||
| 
						 | 
					e59fb00735 | ||
| 
						 | 
					9275853084 | ||
| 
						 | 
					0c81aa29f9 | ||
| 
						 | 
					01d2e27a2b | ||
| 
						 | 
					dd7aadf7b2 | ||
| 
						 | 
					b2fdf501c5 | ||
| 
						 | 
					345e515735 | ||
| 
						 | 
					945982b0b2 | ||
| 
						 | 
					18ad9cbd10 | ||
| 
						 | 
					f433a75569 | ||
| 
						 | 
					b05389c825 | ||
| 
						 | 
					68875fdf32 | ||
| 
						 | 
					3393e0c02c | ||
| 
						 | 
					a149b2466e | ||
| 
						 | 
					13e230d505 | ||
| 
						 | 
					80b3d7a3c9 | ||
| 
						 | 
					4bd48de60c | ||
| 
						 | 
					2eab92f8e3 | ||
| 
						 | 
					2bbd82cf24 | ||
| 
						 | 
					1bfd3d7f58 | ||
| 
						 | 
					cd77b3e88b | ||
| 
						 | 
					8c93c4dd42 | ||
| 
						 | 
					45d63a5408 | ||
| 
						 | 
					decef971f4 | ||
| 
						 | 
					a288aaefc4 | ||
| 
						 | 
					eed56c77b4 | ||
| 
						 | 
					346601bc32 | ||
| 
						 | 
					5080fbbef0 | ||
| 
						 | 
					b5b724348d | ||
| 
						 | 
					c3ee90d8ca | ||
| 
						 | 
					e1435034ae | ||
| 
						 | 
					bf35c5dc7f | ||
| 
						 | 
					c42d223ac2 | ||
| 
						 | 
					d5654d2b20 | ||
| 
						 | 
					a7508fec1a | ||
| 
						 | 
					c31945e682 | ||
| 
						 | 
					d3203b931e | ||
| 
						 | 
					947f4e90c3 | ||
| 
						 | 
					d184c7b271 | ||
| 
						 | 
					913488c066 | ||
| 
						 | 
					7fa27d9ac6 | ||
| 
						 | 
					c341b9cce5 | ||
| 
						 | 
					bbbf0d45ba | ||
| 
						 | 
					114c402d9e | ||
| 
						 | 
					d51519eba4 | ||
| 
						 | 
					e650f9988b | ||
| 
						 | 
					8ed8454115 | ||
| 
						 | 
					6e101bebb1 | ||
| 
						 | 
					4577b38d22 | ||
| 
						 | 
					a8515e2d28 | ||
| 
						 | 
					964e91052e | ||
| 
						 | 
					4e55e69bff | ||
| 
						 | 
					e501dbb658 | ||
| 
						 | 
					20e505e4b7 | ||
| 
						 | 
					291a26e6e3 | ||
| 
						 | 
					0383911887 | ||
| 
						 | 
					a5c5eb77b5 | ||
| 
						 | 
					90d02be7c5 | ||
| 
						 | 
					04221983ac | ||
| 
						 | 
					dfda027ae8 | ||
| 
						 | 
					21b5a79121 | ||
| 
						 | 
					411a388c62 | ||
| 
						 | 
					61c10d42f6 | ||
| 
						 | 
					68ecfb69a5 | ||
| 
						 | 
					e62fee8eb3 | ||
| 
						 | 
					5566d49103 | ||
| 
						 | 
					48337a4a35 | ||
| 
						 | 
					2c5c4fca14 | ||
| 
						 | 
					4fab95ed20 | ||
| 
						 | 
					6c36ca4628 | ||
| 
						 | 
					9c61c57896 | ||
| 
						 | 
					a618011ca1 | ||
| 
						 | 
					95eef4df79 | ||
| 
						 | 
					ec1e714ac1 | ||
| 
						 | 
					736d658080 | ||
| 
						 | 
					aa2920584e | ||
| 
						 | 
					9d13bfc258 | ||
| 
						 | 
					e43633011c | ||
| 
						 | 
					97027f7fb3 | ||
| 
						 | 
					bf5adc9be4 | ||
| 
						 | 
					7665b436f0 | ||
| 
						 | 
					ffca7b85c2 | ||
| 
						 | 
					eef2fa00d9 | ||
| 
						 | 
					c55551ad7c | ||
| 
						 | 
					c91b521111 | ||
| 
						 | 
					deb35e3e2c | ||
| 
						 | 
					5e2d3c9ec1 | ||
| 
						 | 
					dda454434b | ||
| 
						 | 
					b97d371ce0 | ||
| 
						 | 
					a25c98ac73 | ||
| 
						 | 
					fd47013111 | ||
| 
						 | 
					b3aa469c21 | ||
| 
						 | 
					981c0de27a | ||
| 
						 | 
					1bfe9acbbf | ||
| 
						 | 
					2d1e9ce753 | ||
| 
						 | 
					19043426b9 | ||
| 
						 | 
					6e21ce592e | ||
| 
						 | 
					975c6efbe4 | ||
| 
						 | 
					972491aece | ||
| 
						 | 
					1a8ecda3ee | ||
| 
						 | 
					d36c7b618d | ||
| 
						 | 
					251431ff4f | ||
| 
						 | 
					1a3052793e | ||
| 
						 | 
					84fbc56fd0 | ||
| 
						 | 
					4444ff7632 | ||
| 
						 | 
					7770da4b41 | ||
| 
						 | 
					7202a4d42b | ||
| 
						 | 
					3fa29765fd | ||
| 
						 | 
					b9e468c163 | ||
| 
						 | 
					0172ad2902 | ||
| 
						 | 
					d9aa352ff0 | ||
| 
						 | 
					945ba0300d | ||
| 
						 | 
					9e15cc606e | ||
| 
						 | 
					e011160f3c | ||
| 
						 | 
					9447da5065 | ||
| 
						 | 
					387ed39f6d | ||
| 
						 | 
					e50e5f9336 | ||
| 
						 | 
					6f0d9950f3 | ||
| 
						 | 
					4705ff7d6d | ||
| 
						 | 
					36778eb231 | ||
| 
						 | 
					c6dd154b3e | ||
| 
						 | 
					74b5feea7b | ||
| 
						 | 
					35cae95032 | ||
| 
						 | 
					11a36aa96f | ||
| 
						 | 
					9b0e97ae10 | ||
| 
						 | 
					02ba02604c | ||
| 
						 | 
					42ecf418f5 | ||
| 
						 | 
					48ce525d16 | ||
| 
						 | 
					3081e2ca73 | ||
| 
						 | 
					48ae85b6ff | ||
| 
						 | 
					82281ce47d | ||
| 
						 | 
					4ecd2bafbb | ||
| 
						 | 
					308b9ad8f0 | ||
| 
						 | 
					73b408c242 | ||
| 
						 | 
					51c9eb321a | ||
| 
						 | 
					1657fca2f4 | ||
| 
						 | 
					0d25aad90d | ||
| 
						 | 
					b8c1cb1c2c | ||
| 
						 | 
					6e1d44fd56 | ||
| 
						 | 
					528ff4b451 | ||
| 
						 | 
					f6c29ba3dc | ||
| 
						 | 
					160f9b5bf6 | ||
| 
						 | 
					53e7985c8d | ||
| 
						 | 
					9102342795 | ||
| 
						 | 
					c4488936b2 | ||
| 
						 | 
					4e2b990734 | ||
| 
						 | 
					6ca1418587 | ||
| 
						 | 
					30dd06812e | ||
| 
						 | 
					b29b89ef21 | ||
| 
						 | 
					81ae27d56a | ||
| 
						 | 
					f90bf72280 | ||
| 
						 | 
					abcf7aa591 | ||
| 
						 | 
					40b6d49387 | ||
| 
						 | 
					497b4f92d2 | ||
| 
						 | 
					28566b4966 | ||
| 
						 | 
					b4b15f68c0 | ||
| 
						 | 
					1eb1cf452b | ||
| 
						 | 
					c549810def | ||
| 
						 | 
					0d0ed9187a | ||
| 
						 | 
					2840dcd2a6 | ||
| 
						 | 
					a9c5de8654 | ||
| 
						 | 
					837685c522 | 
							
								
								
									
										5
									
								
								.gitignore
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										5
									
								
								.gitignore
									
									
									
									
										vendored
									
									
								
							@@ -7,7 +7,6 @@
 | 
			
		||||
.#*
 | 
			
		||||
#*#
 | 
			
		||||
*~
 | 
			
		||||
/.dir-locals.el
 | 
			
		||||
 | 
			
		||||
# Top level excludes
 | 
			
		||||
/Makefile.bak
 | 
			
		||||
@@ -96,8 +95,12 @@ tags
 | 
			
		||||
TAGS
 | 
			
		||||
 | 
			
		||||
# Windows
 | 
			
		||||
/tmp32
 | 
			
		||||
/tmp32.dbg
 | 
			
		||||
/tmp32dll
 | 
			
		||||
/tmp32dll.dbg
 | 
			
		||||
/out32
 | 
			
		||||
/out32.dbg
 | 
			
		||||
/out32dll
 | 
			
		||||
/out32dll.dbg
 | 
			
		||||
/inc32
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										50
									
								
								.travis.yml
									
									
									
									
									
								
							
							
						
						
									
										50
									
								
								.travis.yml
									
									
									
									
									
								
							@@ -1,50 +0,0 @@
 | 
			
		||||
language: c
 | 
			
		||||
 | 
			
		||||
addons:
 | 
			
		||||
    apt_packages:
 | 
			
		||||
        - binutils-mingw-w64
 | 
			
		||||
        - gcc-mingw-w64
 | 
			
		||||
 | 
			
		||||
os:
 | 
			
		||||
    - linux
 | 
			
		||||
    - osx
 | 
			
		||||
 | 
			
		||||
compiler:
 | 
			
		||||
    - clang
 | 
			
		||||
    - gcc
 | 
			
		||||
    - i686-w64-mingw32-gcc
 | 
			
		||||
    - x86_64-w64-mingw32-gcc
 | 
			
		||||
 | 
			
		||||
env:
 | 
			
		||||
    - CONFIG_OPTS=""
 | 
			
		||||
    - CONFIG_OPTS="shared"
 | 
			
		||||
    - CONFIG_OPTS="-d"
 | 
			
		||||
 | 
			
		||||
matrix:
 | 
			
		||||
    exclude:
 | 
			
		||||
        - os: osx
 | 
			
		||||
          compiler: i686-w64-mingw32-gcc
 | 
			
		||||
        - os: osx
 | 
			
		||||
          compiler: x86_64-w64-mingw32-gcc
 | 
			
		||||
 | 
			
		||||
before_script:
 | 
			
		||||
    - if [ "$CC" == i686-w64-mingw32-gcc ]; then
 | 
			
		||||
          export CROSS_COMPILE=${CC%%gcc}; unset CC;
 | 
			
		||||
          ./Configure mingw $CONFIG_OPTS;
 | 
			
		||||
      elif [ "$CC" == x86_64-w64-mingw32-gcc ]; then
 | 
			
		||||
          export CROSS_COMPILE=${CC%%gcc}; unset CC;
 | 
			
		||||
          ./Configure mingw64 $CONFIG_OPTS;
 | 
			
		||||
      else
 | 
			
		||||
          ./config $CONFIG_OPTS;
 | 
			
		||||
      fi
 | 
			
		||||
 | 
			
		||||
script:
 | 
			
		||||
    - make
 | 
			
		||||
    - if [ -z "$CROSS_COMPILE" ]; then make test; fi
 | 
			
		||||
 | 
			
		||||
notifications:
 | 
			
		||||
    recipient:
 | 
			
		||||
        - openssl-commits@openssl.org
 | 
			
		||||
    email:
 | 
			
		||||
        on_success: change
 | 
			
		||||
        on_failure: always
 | 
			
		||||
							
								
								
									
										527
									
								
								CHANGES
									
									
									
									
									
								
							
							
						
						
									
										527
									
								
								CHANGES
									
									
									
									
									
								
							@@ -2,30 +2,13 @@
 | 
			
		||||
 OpenSSL CHANGES
 | 
			
		||||
 _______________
 | 
			
		||||
 | 
			
		||||
 Changes between 1.0.0s and 1.0.0t [3 Dec 2015]
 | 
			
		||||
 Changes between 1.0.1n and 1.0.1o [12 Jun 2015]
 | 
			
		||||
 | 
			
		||||
  *) X509_ATTRIBUTE memory leak
 | 
			
		||||
  *) Fix HMAC ABI incompatibility. The previous version introduced an ABI
 | 
			
		||||
     incompatibility in the handling of HMAC. The previous ABI has now been
 | 
			
		||||
     restored.
 | 
			
		||||
 | 
			
		||||
     When presented with a malformed X509_ATTRIBUTE structure OpenSSL will leak
 | 
			
		||||
     memory. This structure is used by the PKCS#7 and CMS routines so any
 | 
			
		||||
     application which reads PKCS#7 or CMS data from untrusted sources is
 | 
			
		||||
     affected. SSL/TLS is not affected.
 | 
			
		||||
 | 
			
		||||
     This issue was reported to OpenSSL by Adam Langley (Google/BoringSSL) using
 | 
			
		||||
     libFuzzer.
 | 
			
		||||
     (CVE-2015-3195)
 | 
			
		||||
     [Stephen Henson]
 | 
			
		||||
 | 
			
		||||
  *) Race condition handling PSK identify hint
 | 
			
		||||
 | 
			
		||||
     If PSK identity hints are received by a multi-threaded client then
 | 
			
		||||
     the values are wrongly updated in the parent SSL_CTX structure. This can
 | 
			
		||||
     result in a race condition potentially leading to a double free of the
 | 
			
		||||
     identify hint data.
 | 
			
		||||
     (CVE-2015-3196)
 | 
			
		||||
     [Stephen Henson]
 | 
			
		||||
 | 
			
		||||
 Changes between 1.0.0r and 1.0.0s [11 Jun 2015]
 | 
			
		||||
 Changes between 1.0.1m and 1.0.1n [11 Jun 2015]
 | 
			
		||||
 | 
			
		||||
  *) Malformed ECParameters causes infinite loop
 | 
			
		||||
 | 
			
		||||
@@ -93,7 +76,10 @@
 | 
			
		||||
     (CVE-2015-1791)
 | 
			
		||||
     [Matt Caswell]
 | 
			
		||||
 | 
			
		||||
 Changes between 1.0.0q and 1.0.0r [19 Mar 2015]
 | 
			
		||||
  *) Reject DH handshakes with parameters shorter than 768 bits.
 | 
			
		||||
     [Kurt Roeckx and Emilia Kasper]
 | 
			
		||||
 | 
			
		||||
 Changes between 1.0.1l and 1.0.1m [19 Mar 2015]
 | 
			
		||||
 | 
			
		||||
  *) Segmentation fault in ASN1_TYPE_cmp fix
 | 
			
		||||
 | 
			
		||||
@@ -170,12 +156,12 @@
 | 
			
		||||
  *) Removed the export ciphers from the DEFAULT ciphers
 | 
			
		||||
     [Kurt Roeckx]
 | 
			
		||||
 | 
			
		||||
 Changes between 1.0.0p and 1.0.0q [15 Jan 2015]
 | 
			
		||||
 Changes between 1.0.1k and 1.0.1l [15 Jan 2015]
 | 
			
		||||
 | 
			
		||||
  *) Build fixes for the Windows and OpenVMS platforms
 | 
			
		||||
     [Matt Caswell and Richard Levitte]
 | 
			
		||||
 | 
			
		||||
 Changes between 1.0.0o and 1.0.0p [8 Jan 2015]
 | 
			
		||||
 Changes between 1.0.1j and 1.0.1k [8 Jan 2015]
 | 
			
		||||
 | 
			
		||||
  *) Fix DTLS segmentation fault in dtls1_get_record. A carefully crafted DTLS
 | 
			
		||||
     message can cause a segmentation fault in OpenSSL due to a NULL pointer
 | 
			
		||||
@@ -199,7 +185,7 @@
 | 
			
		||||
     dereference. Thanks to Frank Schmirler for reporting this issue.
 | 
			
		||||
     (CVE-2014-3569)
 | 
			
		||||
     [Kurt Roeckx]
 | 
			
		||||
     
 | 
			
		||||
 | 
			
		||||
  *) Abort handshake if server key exchange message is omitted for ephemeral
 | 
			
		||||
     ECDH ciphersuites.
 | 
			
		||||
 | 
			
		||||
@@ -228,16 +214,12 @@
 | 
			
		||||
     (CVE-2015-0205)
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
   *) Correct Bignum squaring. Bignum squaring (BN_sqr) may produce incorrect
 | 
			
		||||
      results on some platforms, including x86_64. This bug occurs at random
 | 
			
		||||
      with a very low probability, and is not known to be exploitable in any
 | 
			
		||||
      way, though its exact impact is difficult to determine. Thanks to Pieter
 | 
			
		||||
      Wuille (Blockstream) who reported this issue and also suggested an initial
 | 
			
		||||
      fix. Further analysis was conducted by the OpenSSL development team and
 | 
			
		||||
      Adam Langley of Google. The final fix was developed by Andy Polyakov of
 | 
			
		||||
      the OpenSSL core team.
 | 
			
		||||
      (CVE-2014-3570)
 | 
			
		||||
      [Andy Polyakov]
 | 
			
		||||
  *) Ensure that the session ID context of an SSL is updated when its
 | 
			
		||||
     SSL_CTX is updated via SSL_set_SSL_CTX.
 | 
			
		||||
 | 
			
		||||
     The session ID context is typically set from the parent SSL_CTX,
 | 
			
		||||
     and can vary with the CTX.
 | 
			
		||||
     [Adam Langley]
 | 
			
		||||
 | 
			
		||||
  *) Fix various certificate fingerprint issues.
 | 
			
		||||
 | 
			
		||||
@@ -276,7 +258,54 @@
 | 
			
		||||
     (CVE-2014-8275)
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
 Changes between 1.0.0n and 1.0.0o [15 Oct 2014]
 | 
			
		||||
   *) Correct Bignum squaring. Bignum squaring (BN_sqr) may produce incorrect
 | 
			
		||||
      results on some platforms, including x86_64. This bug occurs at random
 | 
			
		||||
      with a very low probability, and is not known to be exploitable in any
 | 
			
		||||
      way, though its exact impact is difficult to determine. Thanks to Pieter
 | 
			
		||||
      Wuille (Blockstream) who reported this issue and also suggested an initial
 | 
			
		||||
      fix. Further analysis was conducted by the OpenSSL development team and
 | 
			
		||||
      Adam Langley of Google. The final fix was developed by Andy Polyakov of
 | 
			
		||||
      the OpenSSL core team.
 | 
			
		||||
      (CVE-2014-3570)
 | 
			
		||||
      [Andy Polyakov]
 | 
			
		||||
 | 
			
		||||
   *) Do not resume sessions on the server if the negotiated protocol
 | 
			
		||||
      version does not match the session's version. Resuming with a different
 | 
			
		||||
      version, while not strictly forbidden by the RFC, is of questionable
 | 
			
		||||
      sanity and breaks all known clients.
 | 
			
		||||
      [David Benjamin, Emilia K<>sper]
 | 
			
		||||
 | 
			
		||||
   *) Tighten handling of the ChangeCipherSpec (CCS) message: reject
 | 
			
		||||
      early CCS messages during renegotiation. (Note that because
 | 
			
		||||
      renegotiation is encrypted, this early CCS was not exploitable.)
 | 
			
		||||
      [Emilia K<>sper]
 | 
			
		||||
 | 
			
		||||
   *) Tighten client-side session ticket handling during renegotiation:
 | 
			
		||||
      ensure that the client only accepts a session ticket if the server sends
 | 
			
		||||
      the extension anew in the ServerHello. Previously, a TLS client would
 | 
			
		||||
      reuse the old extension state and thus accept a session ticket if one was
 | 
			
		||||
      announced in the initial ServerHello.
 | 
			
		||||
 | 
			
		||||
      Similarly, ensure that the client requires a session ticket if one
 | 
			
		||||
      was advertised in the ServerHello. Previously, a TLS client would
 | 
			
		||||
      ignore a missing NewSessionTicket message.
 | 
			
		||||
      [Emilia K<>sper]
 | 
			
		||||
 | 
			
		||||
 Changes between 1.0.1i and 1.0.1j [15 Oct 2014]
 | 
			
		||||
 | 
			
		||||
  *) SRTP Memory Leak.
 | 
			
		||||
 | 
			
		||||
     A flaw in the DTLS SRTP extension parsing code allows an attacker, who
 | 
			
		||||
     sends a carefully crafted handshake message, to cause OpenSSL to fail
 | 
			
		||||
     to free up to 64k of memory causing a memory leak. This could be
 | 
			
		||||
     exploited in a Denial Of Service attack. This issue affects OpenSSL
 | 
			
		||||
     1.0.1 server implementations for both SSL/TLS and DTLS regardless of
 | 
			
		||||
     whether SRTP is used or configured. Implementations of OpenSSL that
 | 
			
		||||
     have been compiled with OPENSSL_NO_SRTP defined are not affected.
 | 
			
		||||
 | 
			
		||||
     The fix was developed by the OpenSSL team.
 | 
			
		||||
     (CVE-2014-3513)
 | 
			
		||||
     [OpenSSL team]
 | 
			
		||||
 | 
			
		||||
  *) Session Ticket Memory Leak.
 | 
			
		||||
 | 
			
		||||
@@ -313,7 +342,27 @@
 | 
			
		||||
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
 Changes between 1.0.0m and 1.0.0n [6 Aug 2014]
 | 
			
		||||
 Changes between 1.0.1h and 1.0.1i [6 Aug 2014]
 | 
			
		||||
 | 
			
		||||
  *) Fix SRP buffer overrun vulnerability. Invalid parameters passed to the
 | 
			
		||||
     SRP code can be overrun an internal buffer. Add sanity check that
 | 
			
		||||
     g, A, B < N to SRP code.
 | 
			
		||||
 | 
			
		||||
     Thanks to Sean Devlin and Watson Ladd of Cryptography Services, NCC
 | 
			
		||||
     Group for discovering this issue.
 | 
			
		||||
     (CVE-2014-3512)
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) A flaw in the OpenSSL SSL/TLS server code causes the server to negotiate
 | 
			
		||||
     TLS 1.0 instead of higher protocol versions when the ClientHello message
 | 
			
		||||
     is badly fragmented. This allows a man-in-the-middle attacker to force a
 | 
			
		||||
     downgrade to TLS 1.0 even if both the server and the client support a
 | 
			
		||||
     higher protocol version, by modifying the client's TLS records.
 | 
			
		||||
 | 
			
		||||
     Thanks to David Benjamin and Adam Langley (Google) for discovering and
 | 
			
		||||
     researching this issue.
 | 
			
		||||
     (CVE-2014-3511)
 | 
			
		||||
     [David Benjamin]
 | 
			
		||||
 | 
			
		||||
  *) OpenSSL DTLS clients enabling anonymous (EC)DH ciphersuites are subject
 | 
			
		||||
     to a denial of service attack. A malicious server can crash the client
 | 
			
		||||
@@ -355,6 +404,16 @@
 | 
			
		||||
     (CVE-2014-3509)
 | 
			
		||||
     [Gabor Tyukasz]
 | 
			
		||||
 | 
			
		||||
  *) A malicious server can crash an OpenSSL client with a null pointer
 | 
			
		||||
     dereference (read) by specifying an SRP ciphersuite even though it was not
 | 
			
		||||
     properly negotiated with the client. This can be exploited through a
 | 
			
		||||
     Denial of Service attack.
 | 
			
		||||
 | 
			
		||||
     Thanks to Joonas Kuorilehto and Riku Hietam<61>ki (Codenomicon) for
 | 
			
		||||
     discovering and researching this issue.
 | 
			
		||||
     (CVE-2014-5139)
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) A flaw in OBJ_obj2txt may cause pretty printing functions such as
 | 
			
		||||
     X509_name_oneline, X509_name_print_ex et al. to leak some information
 | 
			
		||||
     from the stack. Applications may be affected if they echo pretty printing
 | 
			
		||||
@@ -369,7 +428,7 @@
 | 
			
		||||
     bogus results, with non-infinity inputs mapped to infinity too.)
 | 
			
		||||
     [Bodo Moeller]
 | 
			
		||||
 | 
			
		||||
 Changes between 1.0.0l and 1.0.0m [5 Jun 2014]
 | 
			
		||||
 Changes between 1.0.1g and 1.0.1h [5 Jun 2014]
 | 
			
		||||
 | 
			
		||||
  *) Fix for SSL/TLS MITM flaw. An attacker using a carefully crafted
 | 
			
		||||
     handshake can force the use of weak keying material in OpenSSL
 | 
			
		||||
@@ -413,6 +472,17 @@
 | 
			
		||||
  *) Fix some double frees. These are not thought to be exploitable.
 | 
			
		||||
     [mancha <mancha1@zoho.com>]
 | 
			
		||||
 | 
			
		||||
 Changes between 1.0.1f and 1.0.1g [7 Apr 2014]
 | 
			
		||||
 | 
			
		||||
  *) A missing bounds check in the handling of the TLS heartbeat extension
 | 
			
		||||
     can be used to reveal up to 64k of memory to a connected client or
 | 
			
		||||
     server.
 | 
			
		||||
 | 
			
		||||
     Thanks for Neel Mehta of Google Security for discovering this bug and to
 | 
			
		||||
     Adam Langley <agl@chromium.org> and Bodo Moeller <bmoeller@acm.org> for
 | 
			
		||||
     preparing the fix (CVE-2014-0160)
 | 
			
		||||
     [Adam Langley, Bodo Moeller]
 | 
			
		||||
 | 
			
		||||
  *) Fix for the attack described in the paper "Recovering OpenSSL
 | 
			
		||||
     ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack"
 | 
			
		||||
     by Yuval Yarom and Naomi Benger. Details can be obtained from:
 | 
			
		||||
@@ -422,7 +492,21 @@
 | 
			
		||||
     flaw and to Yuval Yarom for supplying a fix (CVE-2014-0076)
 | 
			
		||||
     [Yuval Yarom and Naomi Benger]
 | 
			
		||||
 | 
			
		||||
 Changes between 1.0.0k and 1.0.0l [6 Jan 2014]
 | 
			
		||||
  *) TLS pad extension: draft-agl-tls-padding-03
 | 
			
		||||
 | 
			
		||||
     Workaround for the "TLS hang bug" (see FAQ and PR#2771): if the
 | 
			
		||||
     TLS client Hello record length value would otherwise be > 255 and
 | 
			
		||||
     less that 512 pad with a dummy extension containing zeroes so it
 | 
			
		||||
     is at least 512 bytes long.
 | 
			
		||||
 | 
			
		||||
     [Adam Langley, Steve Henson]
 | 
			
		||||
 | 
			
		||||
 Changes between 1.0.1e and 1.0.1f [6 Jan 2014]
 | 
			
		||||
 | 
			
		||||
  *) Fix for TLS record tampering bug. A carefully crafted invalid 
 | 
			
		||||
     handshake could crash OpenSSL with a NULL pointer exception.
 | 
			
		||||
     Thanks to Anton Johansson for reporting this issues.
 | 
			
		||||
     (CVE-2013-4353)
 | 
			
		||||
 | 
			
		||||
  *) Keep original DTLS digest and encryption contexts in retransmission
 | 
			
		||||
     structures so we can use the previous session parameters if they need
 | 
			
		||||
@@ -437,7 +521,13 @@
 | 
			
		||||
     10.8..10.8.3 and forcing users to upgrade to 10.8.4 or newer.
 | 
			
		||||
     [Rob Stradling, Adam Langley]
 | 
			
		||||
 | 
			
		||||
 Changes between 1.0.0j and 1.0.0k [5 Feb 2013]
 | 
			
		||||
 Changes between 1.0.1d and 1.0.1e [11 Feb 2013]
 | 
			
		||||
 | 
			
		||||
  *) Correct fix for CVE-2013-0169. The original didn't work on AES-NI
 | 
			
		||||
     supporting platforms or when small records were transferred.
 | 
			
		||||
     [Andy Polyakov, Steve Henson]
 | 
			
		||||
 | 
			
		||||
 Changes between 1.0.1c and 1.0.1d [5 Feb 2013]
 | 
			
		||||
 | 
			
		||||
  *) Make the decoding of SSLv3, TLS and DTLS CBC records constant time.
 | 
			
		||||
 | 
			
		||||
@@ -452,27 +542,38 @@
 | 
			
		||||
     (CVE-2013-0169)
 | 
			
		||||
     [Emilia K<>sper, Adam Langley, Ben Laurie, Andy Polyakov, Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) Fix flaw in AESNI handling of TLS 1.2 and 1.1 records for CBC mode
 | 
			
		||||
     ciphersuites which can be exploited in a denial of service attack.
 | 
			
		||||
     Thanks go to and to Adam Langley <agl@chromium.org> for discovering
 | 
			
		||||
     and detecting this bug and to Wolfgang Ettlinger
 | 
			
		||||
     <wolfgang.ettlinger@gmail.com> for independently discovering this issue.
 | 
			
		||||
     (CVE-2012-2686)
 | 
			
		||||
     [Adam Langley]
 | 
			
		||||
 | 
			
		||||
  *) Return an error when checking OCSP signatures when key is NULL.
 | 
			
		||||
     This fixes a DoS attack. (CVE-2013-0166)
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) Make openssl verify return errors.
 | 
			
		||||
     [Chris Palmer <palmer@google.com> and Ben Laurie]
 | 
			
		||||
 | 
			
		||||
  *) Call OCSP Stapling callback after ciphersuite has been chosen, so
 | 
			
		||||
     the right response is stapled. Also change SSL_get_certificate()
 | 
			
		||||
     so it returns the certificate actually sent.
 | 
			
		||||
     See http://rt.openssl.org/Ticket/Display.html?id=2836.
 | 
			
		||||
     (This is a backport)
 | 
			
		||||
     [Rob Stradling <rob.stradling@comodo.com>]
 | 
			
		||||
 | 
			
		||||
  *) Fix possible deadlock when decoding public keys.
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
 Changes between 1.0.0i and 1.0.0j [10 May 2012]
 | 
			
		||||
  *) Don't use TLS 1.0 record version number in initial client hello
 | 
			
		||||
     if renegotiating.
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  [NB: OpenSSL 1.0.0i and later 1.0.0 patch levels were released after
 | 
			
		||||
  OpenSSL 1.0.1.]
 | 
			
		||||
 Changes between 1.0.1b and 1.0.1c [10 May 2012]
 | 
			
		||||
 | 
			
		||||
  *) Sanity check record length before skipping explicit IV in DTLS
 | 
			
		||||
     to fix DoS attack.
 | 
			
		||||
  *) Sanity check record length before skipping explicit IV in TLS
 | 
			
		||||
     1.2, 1.1 and DTLS to fix DoS attack.
 | 
			
		||||
 | 
			
		||||
     Thanks to Codenomicon for discovering this issue using Fuzz-o-Matic
 | 
			
		||||
     fuzzing as a service testing platform.
 | 
			
		||||
@@ -483,7 +584,34 @@
 | 
			
		||||
     Thanks to Solar Designer of Openwall for reporting this issue.
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
 Changes between 1.0.0h and 1.0.0i [19 Apr 2012]
 | 
			
		||||
  *) In FIPS mode don't try to use composite ciphers as they are not
 | 
			
		||||
     approved.
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
 Changes between 1.0.1a and 1.0.1b [26 Apr 2012]
 | 
			
		||||
 | 
			
		||||
  *) OpenSSL 1.0.0 sets SSL_OP_ALL to 0x80000FFFL and OpenSSL 1.0.1 and
 | 
			
		||||
     1.0.1a set SSL_OP_NO_TLSv1_1 to 0x00000400L which would unfortunately
 | 
			
		||||
     mean any application compiled against OpenSSL 1.0.0 headers setting
 | 
			
		||||
     SSL_OP_ALL would also set SSL_OP_NO_TLSv1_1, unintentionally disablng
 | 
			
		||||
     TLS 1.1 also. Fix this by changing the value of SSL_OP_NO_TLSv1_1 to
 | 
			
		||||
     0x10000000L Any application which was previously compiled against
 | 
			
		||||
     OpenSSL 1.0.1 or 1.0.1a headers and which cares about SSL_OP_NO_TLSv1_1
 | 
			
		||||
     will need to be recompiled as a result. Letting be results in
 | 
			
		||||
     inability to disable specifically TLS 1.1 and in client context,
 | 
			
		||||
     in unlike event, limit maximum offered version to TLS 1.0 [see below].
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) In order to ensure interoperabilty SSL_OP_NO_protocolX does not
 | 
			
		||||
     disable just protocol X, but all protocols above X *if* there are
 | 
			
		||||
     protocols *below* X still enabled. In more practical terms it means
 | 
			
		||||
     that if application wants to disable TLS1.0 in favor of TLS1.1 and
 | 
			
		||||
     above, it's not sufficient to pass SSL_OP_NO_TLSv1, one has to pass
 | 
			
		||||
     SSL_OP_NO_TLSv1|SSL_OP_NO_SSLv3|SSL_OP_NO_SSLv2. This applies to
 | 
			
		||||
     client side.
 | 
			
		||||
     [Andy Polyakov]
 | 
			
		||||
 | 
			
		||||
 Changes between 1.0.1 and 1.0.1a [19 Apr 2012]
 | 
			
		||||
 | 
			
		||||
  *) Check for potentially exploitable overflows in asn1_d2i_read_bio
 | 
			
		||||
     BUF_mem_grow and BUF_mem_grow_clean. Refuse attempts to shrink buffer
 | 
			
		||||
@@ -494,6 +622,309 @@
 | 
			
		||||
     (CVE-2012-2110)
 | 
			
		||||
     [Adam Langley (Google), Tavis Ormandy, Google Security Team]
 | 
			
		||||
 | 
			
		||||
  *) Don't allow TLS 1.2 SHA-256 ciphersuites in TLS 1.0, 1.1 connections.
 | 
			
		||||
     [Adam Langley]
 | 
			
		||||
 | 
			
		||||
  *) Workarounds for some broken servers that "hang" if a client hello
 | 
			
		||||
     record length exceeds 255 bytes.
 | 
			
		||||
 | 
			
		||||
     1. Do not use record version number > TLS 1.0 in initial client
 | 
			
		||||
        hello: some (but not all) hanging servers will now work.
 | 
			
		||||
     2. If we set OPENSSL_MAX_TLS1_2_CIPHER_LENGTH this will truncate
 | 
			
		||||
	the number of ciphers sent in the client hello. This should be
 | 
			
		||||
        set to an even number, such as 50, for example by passing:
 | 
			
		||||
        -DOPENSSL_MAX_TLS1_2_CIPHER_LENGTH=50 to config or Configure.
 | 
			
		||||
        Most broken servers should now work.
 | 
			
		||||
     3. If all else fails setting OPENSSL_NO_TLS1_2_CLIENT will disable
 | 
			
		||||
	TLS 1.2 client support entirely.
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) Fix SEGV in Vector Permutation AES module observed in OpenSSH.
 | 
			
		||||
     [Andy Polyakov]
 | 
			
		||||
 | 
			
		||||
 Changes between 1.0.0h and 1.0.1  [14 Mar 2012]
 | 
			
		||||
 | 
			
		||||
  *) Add compatibility with old MDC2 signatures which use an ASN1 OCTET
 | 
			
		||||
     STRING form instead of a DigestInfo.
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) The format used for MDC2 RSA signatures is inconsistent between EVP
 | 
			
		||||
     and the RSA_sign/RSA_verify functions. This was made more apparent when
 | 
			
		||||
     OpenSSL used RSA_sign/RSA_verify for some RSA signatures in particular
 | 
			
		||||
     those which went through EVP_PKEY_METHOD in 1.0.0 and later. Detect 
 | 
			
		||||
     the correct format in RSA_verify so both forms transparently work.
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) Some servers which support TLS 1.0 can choke if we initially indicate
 | 
			
		||||
     support for TLS 1.2 and later renegotiate using TLS 1.0 in the RSA
 | 
			
		||||
     encrypted premaster secret. As a workaround use the maximum pemitted
 | 
			
		||||
     client version in client hello, this should keep such servers happy
 | 
			
		||||
     and still work with previous versions of OpenSSL.
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) Add support for TLS/DTLS heartbeats.
 | 
			
		||||
     [Robin Seggelmann <seggelmann@fh-muenster.de>]
 | 
			
		||||
 | 
			
		||||
  *) Add support for SCTP.
 | 
			
		||||
     [Robin Seggelmann <seggelmann@fh-muenster.de>]
 | 
			
		||||
 | 
			
		||||
  *) Improved PRNG seeding for VOS.
 | 
			
		||||
     [Paul Green <Paul.Green@stratus.com>]
 | 
			
		||||
 | 
			
		||||
  *) Extensive assembler packs updates, most notably:
 | 
			
		||||
 | 
			
		||||
	- x86[_64]:     AES-NI, PCLMULQDQ, RDRAND support;
 | 
			
		||||
	- x86[_64]:     SSSE3 support (SHA1, vector-permutation AES);
 | 
			
		||||
	- x86_64:       bit-sliced AES implementation;
 | 
			
		||||
	- ARM:          NEON support, contemporary platforms optimizations;
 | 
			
		||||
	- s390x:        z196 support;
 | 
			
		||||
	- *:            GHASH and GF(2^m) multiplication implementations;
 | 
			
		||||
 | 
			
		||||
     [Andy Polyakov]
 | 
			
		||||
 | 
			
		||||
  *) Make TLS-SRP code conformant with RFC 5054 API cleanup
 | 
			
		||||
     (removal of unnecessary code)
 | 
			
		||||
     [Peter Sylvester <peter.sylvester@edelweb.fr>]
 | 
			
		||||
 | 
			
		||||
  *) Add TLS key material exporter from RFC 5705.
 | 
			
		||||
     [Eric Rescorla]
 | 
			
		||||
 | 
			
		||||
  *) Add DTLS-SRTP negotiation from RFC 5764.
 | 
			
		||||
     [Eric Rescorla]
 | 
			
		||||
 | 
			
		||||
  *) Add Next Protocol Negotiation,
 | 
			
		||||
     http://tools.ietf.org/html/draft-agl-tls-nextprotoneg-00. Can be
 | 
			
		||||
     disabled with a no-npn flag to config or Configure. Code donated
 | 
			
		||||
     by Google.
 | 
			
		||||
     [Adam Langley <agl@google.com> and Ben Laurie]
 | 
			
		||||
 | 
			
		||||
  *) Add optional 64-bit optimized implementations of elliptic curves NIST-P224,
 | 
			
		||||
     NIST-P256, NIST-P521, with constant-time single point multiplication on
 | 
			
		||||
     typical inputs. Compiler support for the nonstandard type __uint128_t is
 | 
			
		||||
     required to use this (present in gcc 4.4 and later, for 64-bit builds).
 | 
			
		||||
     Code made available under Apache License version 2.0.
 | 
			
		||||
 | 
			
		||||
     Specify "enable-ec_nistp_64_gcc_128" on the Configure (or config) command
 | 
			
		||||
     line to include this in your build of OpenSSL, and run "make depend" (or
 | 
			
		||||
     "make update"). This enables the following EC_METHODs:
 | 
			
		||||
 | 
			
		||||
         EC_GFp_nistp224_method()
 | 
			
		||||
         EC_GFp_nistp256_method()
 | 
			
		||||
         EC_GFp_nistp521_method()
 | 
			
		||||
 | 
			
		||||
     EC_GROUP_new_by_curve_name() will automatically use these (while
 | 
			
		||||
     EC_GROUP_new_curve_GFp() currently prefers the more flexible
 | 
			
		||||
     implementations).
 | 
			
		||||
     [Emilia K<>sper, Adam Langley, Bodo Moeller (Google)]
 | 
			
		||||
 | 
			
		||||
  *) Use type ossl_ssize_t instad of ssize_t which isn't available on
 | 
			
		||||
     all platforms. Move ssize_t definition from e_os.h to the public
 | 
			
		||||
     header file e_os2.h as it now appears in public header file cms.h
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) New -sigopt option to the ca, req and x509 utilities. Additional
 | 
			
		||||
     signature parameters can be passed using this option and in
 | 
			
		||||
     particular PSS. 
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) Add RSA PSS signing function. This will generate and set the
 | 
			
		||||
     appropriate AlgorithmIdentifiers for PSS based on those in the
 | 
			
		||||
     corresponding EVP_MD_CTX structure. No application support yet.
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) Support for companion algorithm specific ASN1 signing routines.
 | 
			
		||||
     New function ASN1_item_sign_ctx() signs a pre-initialised
 | 
			
		||||
     EVP_MD_CTX structure and sets AlgorithmIdentifiers based on
 | 
			
		||||
     the appropriate parameters.
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) Add new algorithm specific ASN1 verification initialisation function
 | 
			
		||||
     to EVP_PKEY_ASN1_METHOD: this is not in EVP_PKEY_METHOD since the ASN1
 | 
			
		||||
     handling will be the same no matter what EVP_PKEY_METHOD is used.
 | 
			
		||||
     Add a PSS handler to support verification of PSS signatures: checked
 | 
			
		||||
     against a number of sample certificates.
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) Add signature printing for PSS. Add PSS OIDs.
 | 
			
		||||
     [Steve Henson, Martin Kaiser <lists@kaiser.cx>]
 | 
			
		||||
 | 
			
		||||
  *) Add algorithm specific signature printing. An individual ASN1 method
 | 
			
		||||
     can now print out signatures instead of the standard hex dump. 
 | 
			
		||||
 | 
			
		||||
     More complex signatures (e.g. PSS) can print out more meaningful
 | 
			
		||||
     information. Include DSA version that prints out the signature
 | 
			
		||||
     parameters r, s.
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) Password based recipient info support for CMS library: implementing
 | 
			
		||||
     RFC3211.
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) Split password based encryption into PBES2 and PBKDF2 functions. This
 | 
			
		||||
     neatly separates the code into cipher and PBE sections and is required
 | 
			
		||||
     for some algorithms that split PBES2 into separate pieces (such as
 | 
			
		||||
     password based CMS).
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) Session-handling fixes:
 | 
			
		||||
     - Fix handling of connections that are resuming with a session ID,
 | 
			
		||||
       but also support Session Tickets.
 | 
			
		||||
     - Fix a bug that suppressed issuing of a new ticket if the client
 | 
			
		||||
       presented a ticket with an expired session.
 | 
			
		||||
     - Try to set the ticket lifetime hint to something reasonable.
 | 
			
		||||
     - Make tickets shorter by excluding irrelevant information.
 | 
			
		||||
     - On the client side, don't ignore renewed tickets.
 | 
			
		||||
     [Adam Langley, Bodo Moeller (Google)]
 | 
			
		||||
 | 
			
		||||
  *) Fix PSK session representation.
 | 
			
		||||
     [Bodo Moeller]
 | 
			
		||||
 | 
			
		||||
  *) Add RC4-MD5 and AESNI-SHA1 "stitched" implementations.
 | 
			
		||||
 | 
			
		||||
     This work was sponsored by Intel.
 | 
			
		||||
     [Andy Polyakov]
 | 
			
		||||
 | 
			
		||||
  *) Add GCM support to TLS library. Some custom code is needed to split
 | 
			
		||||
     the IV between the fixed (from PRF) and explicit (from TLS record)
 | 
			
		||||
     portions. This adds all GCM ciphersuites supported by RFC5288 and 
 | 
			
		||||
     RFC5289. Generalise some AES* cipherstrings to inlclude GCM and
 | 
			
		||||
     add a special AESGCM string for GCM only.
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) Expand range of ctrls for AES GCM. Permit setting invocation
 | 
			
		||||
     field on decrypt and retrieval of invocation field only on encrypt.
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) Add HMAC ECC ciphersuites from RFC5289. Include SHA384 PRF support.
 | 
			
		||||
     As required by RFC5289 these ciphersuites cannot be used if for
 | 
			
		||||
     versions of TLS earlier than 1.2.
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) For FIPS capable OpenSSL interpret a NULL default public key method
 | 
			
		||||
     as unset and return the appopriate default but do *not* set the default.
 | 
			
		||||
     This means we can return the appopriate method in applications that
 | 
			
		||||
     swicth between FIPS and non-FIPS modes.
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) Redirect HMAC and CMAC operations to FIPS module in FIPS mode. If an
 | 
			
		||||
     ENGINE is used then we cannot handle that in the FIPS module so we
 | 
			
		||||
     keep original code iff non-FIPS operations are allowed.
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) Add -attime option to openssl utilities.
 | 
			
		||||
     [Peter Eckersley <pde@eff.org>, Ben Laurie and Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) Redirect DSA and DH operations to FIPS module in FIPS mode.
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) Redirect ECDSA and ECDH operations to FIPS module in FIPS mode. Also use
 | 
			
		||||
     FIPS EC methods unconditionally for now.
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) New build option no-ec2m to disable characteristic 2 code.
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) Backport libcrypto audit of return value checking from 1.1.0-dev; not
 | 
			
		||||
     all cases can be covered as some introduce binary incompatibilities.
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) Redirect RSA operations to FIPS module including keygen,
 | 
			
		||||
     encrypt, decrypt, sign and verify. Block use of non FIPS RSA methods.
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) Add similar low level API blocking to ciphers.
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) Low level digest APIs are not approved in FIPS mode: any attempt
 | 
			
		||||
     to use these will cause a fatal error. Applications that *really* want
 | 
			
		||||
     to use them can use the private_* version instead.
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) Redirect cipher operations to FIPS module for FIPS builds. 
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) Redirect digest operations to FIPS module for FIPS builds. 
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) Update build system to add "fips" flag which will link in fipscanister.o
 | 
			
		||||
     for static and shared library builds embedding a signature if needed.
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) Output TLS supported curves in preference order instead of numerical
 | 
			
		||||
     order. This is currently hardcoded for the highest order curves first.
 | 
			
		||||
     This should be configurable so applications can judge speed vs strength.
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) Add TLS v1.2 server support for client authentication. 
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) Add support for FIPS mode in ssl library: disable SSLv3, non-FIPS ciphers
 | 
			
		||||
     and enable MD5.
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) Functions FIPS_mode_set() and FIPS_mode() which call the underlying
 | 
			
		||||
     FIPS modules versions.
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) Add TLS v1.2 client side support for client authentication. Keep cache
 | 
			
		||||
     of handshake records longer as we don't know the hash algorithm to use
 | 
			
		||||
     until after the certificate request message is received.
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) Initial TLS v1.2 client support. Add a default signature algorithms
 | 
			
		||||
     extension including all the algorithms we support. Parse new signature
 | 
			
		||||
     format in client key exchange. Relax some ECC signing restrictions for
 | 
			
		||||
     TLS v1.2 as indicated in RFC5246.
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) Add server support for TLS v1.2 signature algorithms extension. Switch
 | 
			
		||||
     to new signature format when needed using client digest preference.
 | 
			
		||||
     All server ciphersuites should now work correctly in TLS v1.2. No client
 | 
			
		||||
     support yet and no support for client certificates.
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) Initial TLS v1.2 support. Add new SHA256 digest to ssl code, switch
 | 
			
		||||
     to SHA256 for PRF when using TLS v1.2 and later. Add new SHA256 based
 | 
			
		||||
     ciphersuites. At present only RSA key exchange ciphersuites work with
 | 
			
		||||
     TLS v1.2. Add new option for TLS v1.2 replacing the old and obsolete
 | 
			
		||||
     SSL_OP_PKCS1_CHECK flags with SSL_OP_NO_TLSv1_2. New TLSv1.2 methods
 | 
			
		||||
     and version checking.
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) New option OPENSSL_NO_SSL_INTERN. If an application can be compiled
 | 
			
		||||
     with this defined it will not be affected by any changes to ssl internal
 | 
			
		||||
     structures. Add several utility functions to allow openssl application
 | 
			
		||||
     to work with OPENSSL_NO_SSL_INTERN defined.
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) Add SRP support.
 | 
			
		||||
     [Tom Wu <tjw@cs.stanford.edu> and Ben Laurie]
 | 
			
		||||
 | 
			
		||||
  *) Add functions to copy EVP_PKEY_METHOD and retrieve flags and id.
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) Permit abbreviated handshakes when renegotiating using the function
 | 
			
		||||
     SSL_renegotiate_abbreviated().
 | 
			
		||||
     [Robin Seggelmann <seggelmann@fh-muenster.de>]
 | 
			
		||||
 | 
			
		||||
  *) Add call to ENGINE_register_all_complete() to
 | 
			
		||||
     ENGINE_load_builtin_engines(), so some implementations get used
 | 
			
		||||
     automatically instead of needing explicit application support.
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) Add support for TLS key exporter as described in RFC5705.
 | 
			
		||||
     [Robin Seggelmann <seggelmann@fh-muenster.de>, Steve Henson]
 | 
			
		||||
 | 
			
		||||
  *) Initial TLSv1.1 support. Since TLSv1.1 is very similar to TLS v1.0 only
 | 
			
		||||
     a few changes are required:
 | 
			
		||||
 | 
			
		||||
       Add SSL_OP_NO_TLSv1_1 flag.
 | 
			
		||||
       Add TLSv1_1 methods.
 | 
			
		||||
       Update version checking logic to handle version 1.1.
 | 
			
		||||
       Add explicit IV handling (ported from DTLS code).
 | 
			
		||||
       Add command line options to s_client/s_server.
 | 
			
		||||
     [Steve Henson]
 | 
			
		||||
 | 
			
		||||
 Changes between 1.0.0g and 1.0.0h [12 Mar 2012]
 | 
			
		||||
 | 
			
		||||
  *) Fix MMA (Bleichenbacher's attack on PKCS #1 v1.5 RSA padding) weakness
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										334
									
								
								Configure
									
									
									
									
									
								
							
							
						
						
									
										334
									
								
								Configure
									
									
									
									
									
								
							@@ -10,7 +10,7 @@ use strict;
 | 
			
		||||
 | 
			
		||||
# see INSTALL for instructions.
 | 
			
		||||
 | 
			
		||||
my $usage="Usage: Configure [no-<cipher> ...] [enable-<cipher> ...] [experimental-<cipher> ...] [-Dxxx] [-lxxx] [-Lxxx] [-fxxx] [-Kxxx] [no-hw-xxx|no-hw] [[no-]threads] [[no-]shared] [[no-]zlib|zlib-dynamic] [no-asm] [no-dso] [no-krb5] [386] [--prefix=DIR] [--openssldir=OPENSSLDIR] [--with-xxx[=vvv]] [--test-sanity] os/compiler[:flags]\n";
 | 
			
		||||
my $usage="Usage: Configure [no-<cipher> ...] [enable-<cipher> ...] [experimental-<cipher> ...] [-Dxxx] [-lxxx] [-Lxxx] [-fxxx] [-Kxxx] [no-hw-xxx|no-hw] [[no-]threads] [[no-]shared] [[no-]zlib|zlib-dynamic] [no-asm] [no-dso] [no-krb5] [sctp] [386] [--prefix=DIR] [--openssldir=OPENSSLDIR] [--with-xxx[=vvv]] [--test-sanity] os/compiler[:flags]\n";
 | 
			
		||||
 | 
			
		||||
# Options:
 | 
			
		||||
#
 | 
			
		||||
@@ -56,6 +56,7 @@ my $usage="Usage: Configure [no-<cipher> ...] [enable-<cipher> ...] [experimenta
 | 
			
		||||
# [no-]zlib     [don't] compile support for zlib compression.
 | 
			
		||||
# zlib-dynamic	Like "zlib", but the zlib library is expected to be a shared
 | 
			
		||||
#		library and will be loaded in run-time by the OpenSSL library.
 | 
			
		||||
# sctp          include SCTP support
 | 
			
		||||
# 386           generate 80386 code
 | 
			
		||||
# no-sse2	disables IA-32 SSE2 code, above option implies no-sse2
 | 
			
		||||
# no-<cipher>   build without specified algorithm (rsa, idea, rc5, ...)
 | 
			
		||||
@@ -123,21 +124,24 @@ my $tlib="-lnsl -lsocket";
 | 
			
		||||
my $bits1="THIRTY_TWO_BIT ";
 | 
			
		||||
my $bits2="SIXTY_FOUR_BIT ";
 | 
			
		||||
 | 
			
		||||
my $x86_asm="x86cpuid.o:bn-586.o co-586.o x86-mont.o:des-586.o crypt586.o:aes-586.o:bf-586.o:md5-586.o:sha1-586.o sha256-586.o sha512-586.o:cast-586.o:rc4-586.o:rmd-586.o:rc5-586.o:wp_block.o wp-mmx.o:cmll-x86.o";
 | 
			
		||||
my $x86_asm="x86cpuid.o:bn-586.o co-586.o x86-mont.o x86-gf2m.o:des-586.o crypt586.o:aes-586.o vpaes-x86.o aesni-x86.o:bf-586.o:md5-586.o:sha1-586.o sha256-586.o sha512-586.o:cast-586.o:rc4-586.o:rmd-586.o:rc5-586.o:wp_block.o wp-mmx.o:cmll-x86.o:ghash-x86.o:";
 | 
			
		||||
 | 
			
		||||
my $x86_elf_asm="$x86_asm:elf";
 | 
			
		||||
 | 
			
		||||
my $x86_64_asm="x86_64cpuid.o:x86_64-gcc.o x86_64-mont.o::aes-x86_64.o::md5-x86_64.o:sha1-x86_64.o sha256-x86_64.o sha512-x86_64.o::rc4-x86_64.o:::wp-x86_64.o:cmll-x86_64.o cmll_misc.o";
 | 
			
		||||
my $ia64_asm="ia64cpuid.o:bn-ia64.o::aes_core.o aes_cbc.o aes-ia64.o::md5-ia64.o:sha1-ia64.o sha256-ia64.o sha512-ia64.o::rc4-ia64.o rc4_skey.o:::::void";
 | 
			
		||||
my $sparcv9_asm="sparcv9cap.o sparccpuid.o:bn-sparcv9.o sparcv9-mont.o sparcv9a-mont.o:des_enc-sparc.o fcrypt_b.o:aes_core.o aes_cbc.o aes-sparcv9.o:::sha1-sparcv9.o sha256-sparcv9.o sha512-sparcv9.o:::::::void";
 | 
			
		||||
my $sparcv8_asm=":sparcv8.o:des_enc-sparc.o fcrypt_b.o:::::::::::void";
 | 
			
		||||
my $alpha_asm="alphacpuid.o:bn_asm.o alpha-mont.o::::::::::::void";
 | 
			
		||||
my $mips3_asm=":bn-mips3.o::::::::::::void";
 | 
			
		||||
my $s390x_asm="s390xcap.o s390xcpuid.o:bn-s390x.o s390x-mont.o::aes-s390x.o:::sha1-s390x.o sha256-s390x.o sha512-s390x.o::rc4-s390x.o:::::void";
 | 
			
		||||
my $armv4_asm=":bn_asm.o armv4-mont.o::aes_cbc.o aes-armv4.o:::sha1-armv4-large.o sha256-armv4.o sha512-armv4.o:::::::void";
 | 
			
		||||
my $ppc32_asm="ppccpuid.o:bn-ppc.o::aes_core.o aes_cbc.o aes-ppc.o:::sha1-ppc.o sha256-ppc.o::::::";
 | 
			
		||||
my $ppc64_asm="ppccpuid.o:bn-ppc.o ppc-mont.o::aes_core.o aes_cbc.o aes-ppc.o:::sha1-ppc.o sha256-ppc.o sha512-ppc.o::::::";
 | 
			
		||||
my $no_asm=":::::::::::::void";
 | 
			
		||||
my $x86_64_asm="x86_64cpuid.o:x86_64-gcc.o x86_64-mont.o x86_64-mont5.o x86_64-gf2m.o modexp512-x86_64.o::aes-x86_64.o vpaes-x86_64.o bsaes-x86_64.o aesni-x86_64.o aesni-sha1-x86_64.o::md5-x86_64.o:sha1-x86_64.o sha256-x86_64.o sha512-x86_64.o::rc4-x86_64.o rc4-md5-x86_64.o:::wp-x86_64.o:cmll-x86_64.o cmll_misc.o:ghash-x86_64.o:";
 | 
			
		||||
my $ia64_asm="ia64cpuid.o:bn-ia64.o ia64-mont.o::aes_core.o aes_cbc.o aes-ia64.o::md5-ia64.o:sha1-ia64.o sha256-ia64.o sha512-ia64.o::rc4-ia64.o rc4_skey.o:::::ghash-ia64.o::void";
 | 
			
		||||
my $sparcv9_asm="sparcv9cap.o sparccpuid.o:bn-sparcv9.o sparcv9-mont.o sparcv9a-mont.o:des_enc-sparc.o fcrypt_b.o:aes_core.o aes_cbc.o aes-sparcv9.o:::sha1-sparcv9.o sha256-sparcv9.o sha512-sparcv9.o:::::::ghash-sparcv9.o::void";
 | 
			
		||||
my $sparcv8_asm=":sparcv8.o:des_enc-sparc.o fcrypt_b.o:::::::::::::void";
 | 
			
		||||
my $alpha_asm="alphacpuid.o:bn_asm.o alpha-mont.o:::::sha1-alpha.o:::::::ghash-alpha.o::void";
 | 
			
		||||
my $mips32_asm=":bn-mips.o::aes_cbc.o aes-mips.o:::sha1-mips.o sha256-mips.o::::::::";
 | 
			
		||||
my $mips64_asm=":bn-mips.o mips-mont.o::aes_cbc.o aes-mips.o:::sha1-mips.o sha256-mips.o sha512-mips.o::::::::";
 | 
			
		||||
my $s390x_asm="s390xcap.o s390xcpuid.o:bn-s390x.o s390x-mont.o s390x-gf2m.o::aes-s390x.o aes-ctr.o aes-xts.o:::sha1-s390x.o sha256-s390x.o sha512-s390x.o::rc4-s390x.o:::::ghash-s390x.o:";
 | 
			
		||||
my $armv4_asm="armcap.o armv4cpuid.o:bn_asm.o armv4-mont.o armv4-gf2m.o::aes_cbc.o aes-armv4.o:::sha1-armv4-large.o sha256-armv4.o sha512-armv4.o:::::::ghash-armv4.o::void";
 | 
			
		||||
my $parisc11_asm="pariscid.o:bn_asm.o parisc-mont.o::aes_core.o aes_cbc.o aes-parisc.o:::sha1-parisc.o sha256-parisc.o sha512-parisc.o::rc4-parisc.o:::::ghash-parisc.o::32";
 | 
			
		||||
my $parisc20_asm="pariscid.o:pa-risc2W.o parisc-mont.o::aes_core.o aes_cbc.o aes-parisc.o:::sha1-parisc.o sha256-parisc.o sha512-parisc.o::rc4-parisc.o:::::ghash-parisc.o::64";
 | 
			
		||||
my $ppc32_asm="ppccpuid.o ppccap.o:bn-ppc.o ppc-mont.o ppc64-mont.o::aes_core.o aes_cbc.o aes-ppc.o:::sha1-ppc.o sha256-ppc.o::::::::";
 | 
			
		||||
my $ppc64_asm="ppccpuid.o ppccap.o:bn-ppc.o ppc-mont.o ppc64-mont.o::aes_core.o aes_cbc.o aes-ppc.o:::sha1-ppc.o sha256-ppc.o sha512-ppc.o::::::::";
 | 
			
		||||
my $no_asm=":::::::::::::::void";
 | 
			
		||||
 | 
			
		||||
# As for $BSDthreads. Idea is to maintain "collective" set of flags,
 | 
			
		||||
# which would cover all BSD flavors. -pthread applies to them all, 
 | 
			
		||||
@@ -148,7 +152,7 @@ my $no_asm=":::::::::::::void";
 | 
			
		||||
# seems to be sufficient?
 | 
			
		||||
my $BSDthreads="-pthread -D_THREAD_SAFE -D_REENTRANT";
 | 
			
		||||
 | 
			
		||||
#config-string	$cc : $cflags : $unistd : $thread_cflag : $sys_id : $lflags : $bn_ops : $cpuid_obj : $bn_obj : $des_obj : $aes_obj : $bf_obj : $md5_obj : $sha1_obj : $cast_obj : $rc4_obj : $rmd160_obj : $rc5_obj : $wp_obj : $cmll_obj : $dso_scheme : $shared_target : $shared_cflag : $shared_ldflag : $shared_extension : $ranlib : $arflags : $multilib
 | 
			
		||||
#config-string	$cc : $cflags : $unistd : $thread_cflag : $sys_id : $lflags : $bn_ops : $cpuid_obj : $bn_obj : $des_obj : $aes_obj : $bf_obj : $md5_obj : $sha1_obj : $cast_obj : $rc4_obj : $rmd160_obj : $rc5_obj : $wp_obj : $cmll_obj : $modes_obj : $engines_obj : $dso_scheme : $shared_target : $shared_cflag : $shared_ldflag : $shared_extension : $ranlib : $arflags : $multilib
 | 
			
		||||
 | 
			
		||||
my %table=(
 | 
			
		||||
# File 'TABLE' (created by 'make TABLE') contains the data from this list,
 | 
			
		||||
@@ -163,33 +167,36 @@ my %table=(
 | 
			
		||||
# Our development configs
 | 
			
		||||
"purify",	"purify gcc:-g -DPURIFY -Wall::(unknown)::-lsocket -lnsl::::",
 | 
			
		||||
"debug",	"gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG -DOPENSSL_NO_ASM -ggdb -g2 -Wformat -Wshadow -Wmissing-prototypes -Wmissing-declarations -Werror::(unknown)::-lefence::::",
 | 
			
		||||
"debug-ben",	"gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG -DPEDANTIC -DDEBUG_SAFESTACK -DDEBUG_UNUSED -O2 -pedantic -Wall -Wshadow -Werror -pipe::(unknown):::::bn86-elf.o co86-elf.o",
 | 
			
		||||
"debug-ben",	"gcc:$gcc_devteam_warn -DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG -DDEBUG_SAFESTACK -O2 -pipe::(unknown):::::",
 | 
			
		||||
"debug-ben-openbsd","gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG -DPEDANTIC -DDEBUG_SAFESTACK -DOPENSSL_OPENBSD_DEV_CRYPTO -DOPENSSL_NO_ASM -O2 -pedantic -Wall -Wshadow -Werror -pipe::(unknown)::::",
 | 
			
		||||
"debug-ben-openbsd-debug","gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG -DPEDANTIC -DDEBUG_SAFESTACK -DOPENSSL_OPENBSD_DEV_CRYPTO -DOPENSSL_NO_ASM -g3 -O2 -pedantic -Wall -Wshadow -Werror -pipe::(unknown)::::",
 | 
			
		||||
"debug-ben-debug",	"gcc44:$gcc_devteam_warn -DBN_DEBUG -DCONF_DEBUG -DDEBUG_SAFESTACK -DDEBUG_UNUSED -g3 -O2 -pipe::(unknown)::::::",
 | 
			
		||||
"debug-ben-debug-64",	"gcc:$gcc_devteam_warn -Wno-error=overlength-strings -Wno-error=strict-aliasing -Wno-error=uninitialized -DBN_DEBUG -DCONF_DEBUG -DDEBUG_SAFESTACK -DDEBUG_UNUSED -g3 -O3 -pipe::${BSDthreads}:::SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_UNROLL:${x86_64_asm}:elf:dlfcn:bsd-gcc-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-ben-debug-64",	"gcc:$gcc_devteam_warn -Wno-error=overlength-strings -DBN_DEBUG -DCONF_DEBUG -DDEBUG_SAFESTACK -DDEBUG_UNUSED -g3 -O3 -pipe::${BSDthreads}:::SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_UNROLL:${x86_64_asm}:elf:dlfcn:bsd-gcc-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-ben-macos",	"cc:$gcc_devteam_warn -arch i386 -DBN_DEBUG -DCONF_DEBUG -DDEBUG_SAFESTACK -DDEBUG_UNUSED -DOPENSSL_THREADS -D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -O3 -DL_ENDIAN -g3 -pipe::(unknown)::-Wl,-search_paths_first::::",
 | 
			
		||||
"debug-ben-macos-gcc46",	"gcc-mp-4.6:$gcc_devteam_warn -Wconversion -DBN_DEBUG -DCONF_DEBUG -DDEBUG_SAFESTACK -DDEBUG_UNUSED -DOPENSSL_THREADS -D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -O3 -DL_ENDIAN -g3 -pipe::(unknown)::::::",
 | 
			
		||||
"debug-ben-darwin64","cc:$gcc_devteam_warn -Wno-language-extension-token -Wno-extended-offsetof -arch x86_64 -O3 -DL_ENDIAN -Wall::-D_REENTRANT:MACOSX:-Wl,-search_paths_first%:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL:".eval{my $asm=$x86_64_asm;$asm=~s/rc4\-[^:]+//;$asm}.":macosx:dlfcn:darwin-shared:-fPIC -fno-common:-arch x86_64 -dynamiclib:.\$(SHLIB_MAJOR).\$(SHLIB_MINOR).dylib",
 | 
			
		||||
"debug-ben-no-opt",	"gcc: -Wall -Wmissing-prototypes -Wstrict-prototypes -Wmissing-declarations -DDEBUG_SAFESTACK -DCRYPTO_MDEBUG -Werror -DL_ENDIAN -DTERMIOS -Wall -g3::(unknown)::::::",
 | 
			
		||||
"debug-ben-strict",	"gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG -DCONST_STRICT -O2 -Wall -Wshadow -Werror -Wpointer-arith -Wcast-qual -Wwrite-strings -pipe::(unknown)::::::",
 | 
			
		||||
"debug-rse","cc:-DTERMIOS -DL_ENDIAN -pipe -O -g -ggdb3 -Wall::(unknown):::BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}",
 | 
			
		||||
"debug-bodo",	"gcc:$gcc_devteam_warn -Wno-error=overlength-strings -DBN_DEBUG -DBN_DEBUG_RAND -DCONF_DEBUG -DBIO_PAIR_DEBUG -m64 -DL_ENDIAN -DTERMIO -g -DMD32_REG_T=int::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_UNROLL:${x86_64_asm}:elf:dlfcn:linux-shared:-fPIC:-m64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::64",
 | 
			
		||||
"debug-ulf", "gcc:-DTERMIOS -DL_ENDIAN -march=i486 -Wall -DBN_DEBUG -DBN_DEBUG_RAND -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG -DOPENSSL_NO_ASM -g -Wformat -Wshadow -Wmissing-prototypes -Wmissing-declarations:::CYGWIN32:::${no_asm}:win32:cygwin-shared:::.dll",
 | 
			
		||||
"debug-steve64", "gcc:$gcc_devteam_warn -m64 -DL_ENDIAN -DTERMIO -DCONF_DEBUG -DDEBUG_SAFESTACK -g -DMD32_REG_T=int::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_UNROLL:${x86_64_asm}:elf:dlfcn:linux-shared:-fPIC:-m64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-steve64", "gcc:$gcc_devteam_warn -m64 -DL_ENDIAN -DTERMIO -DCONF_DEBUG -DDEBUG_SAFESTACK -Wno-overlength-strings -g::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_UNROLL:${x86_64_asm}:elf:dlfcn:linux-shared:-fPIC:-m64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-steve32", "gcc:$gcc_devteam_warn -m32 -DL_ENDIAN -DCONF_DEBUG -DDEBUG_SAFESTACK -g -pipe::-D_REENTRANT::-rdynamic -ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn:linux-shared:-fPIC:-m32:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-steve-opt", "gcc:$gcc_devteam_warn -m64 -O3 -DL_ENDIAN -DTERMIO -DCONF_DEBUG -DDEBUG_SAFESTACK -g -DMD32_REG_T=int::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_UNROLL:${x86_64_asm}:elf:dlfcn:linux-shared:-fPIC:-m64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-steve-opt", "gcc:$gcc_devteam_warn -m64 -O3 -DL_ENDIAN -DTERMIO -DCONF_DEBUG -DDEBUG_SAFESTACK -g::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_UNROLL:${x86_64_asm}:elf:dlfcn:linux-shared:-fPIC:-m64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-levitte-linux-elf","gcc:-DLEVITTE_DEBUG -DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DCRYPTO_MDEBUG -DL_ENDIAN -ggdb -g3 -Wall::-D_REENTRANT::-ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-levitte-linux-noasm","gcc:-DLEVITTE_DEBUG -DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DCRYPTO_MDEBUG -DOPENSSL_NO_ASM -DL_ENDIAN -ggdb -g3 -Wall::-D_REENTRANT::-ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${no_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-levitte-linux-elf-extreme","gcc:-DLEVITTE_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_DEBUG -DBN_DEBUG_RAND -DCRYPTO_MDEBUG -DENGINE_CONF_DEBUG -DL_ENDIAN -DTERMIO -DPEDANTIC -ggdb -g3 -pedantic -ansi -Wall -W -Wundef -Wshadow -Wcast-align -Wstrict-prototypes -Wmissing-prototypes -Wno-long-long -Wundef -Wconversion -pipe::-D_REENTRANT::-ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-levitte-linux-noasm-extreme","gcc:-DLEVITTE_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_DEBUG -DBN_DEBUG_RAND -DCRYPTO_MDEBUG -DENGINE_CONF_DEBUG -DOPENSSL_NO_ASM -DL_ENDIAN -DTERMIO -DPEDANTIC -ggdb -g3 -pedantic -ansi -Wall -W -Wundef -Wshadow -Wcast-align -Wstrict-prototypes -Wmissing-prototypes -Wno-long-long -Wundef -Wconversion -pipe::-D_REENTRANT::-ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${no_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-geoff32","gcc:-DBN_DEBUG -DBN_DEBUG_RAND -DBN_STRICT -DPURIFY -DOPENSSL_NO_DEPRECATED -DOPENSSL_NO_ASM -DOPENSSL_NO_INLINE_ASM -DL_ENDIAN -DTERMIO -DPEDANTIC -DMD32_REG_T=int -O1 -ggdb2 -Wall -Werror -Wundef -pedantic -Wshadow -Wpointer-arith -Wbad-function-cast -Wcast-align -Wsign-compare -Wmissing-prototypes -Wmissing-declarations -Wno-long-long::-D_REENTRANT::-ldl:BN_LLONG:${no_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-geoff64","gcc:-DBN_DEBUG -DBN_DEBUG_RAND -DBN_STRICT -DPURIFY -DOPENSSL_NO_DEPRECATED -DOPENSSL_NO_ASM -DOPENSSL_NO_INLINE_ASM -DL_ENDIAN -DTERMIO -DPEDANTIC -DMD32_REG_T=int -O1 -ggdb2 -Wall -Werror -Wundef -pedantic -Wshadow -Wpointer-arith -Wbad-function-cast -Wcast-align -Wsign-compare -Wmissing-prototypes -Wmissing-declarations -Wno-long-long::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL BF_PTR:${no_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-linux-pentium","gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG -DL_ENDIAN -DTERMIO -g -mcpu=pentium -Wall::-D_REENTRANT::-ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn",
 | 
			
		||||
"debug-linux-ppro","gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG -DL_ENDIAN -DTERMIO -g -mcpu=pentiumpro -Wall::-D_REENTRANT::-ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn",
 | 
			
		||||
"debug-linux-elf","gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG -DL_ENDIAN -DTERMIO -g -march=i486 -Wall::-D_REENTRANT::-lefence -ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-linux-elf-noefence","gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG -DL_ENDIAN -DTERMIO -g -march=i486 -Wall::-D_REENTRANT::-ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-linux-ia32-aes", "gcc:-DAES_EXPERIMENTAL -DL_ENDIAN -DTERMIO -O3 -fomit-frame-pointer -Wall::-D_REENTRANT::-ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:x86cpuid.o:bn-586.o co-586.o x86-mont.o:des-586.o crypt586.o:aes_x86core.o aes_cbc.o:bf-586.o:md5-586.o:sha1-586.o sha256-586.o sha512-586.o:cast-586.o:rc4-586.o:rmd-586.o:rc5-586.o:wp_block.o wp-mmx.o::elf:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-linux-generic32","gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DCRYPTO_MDEBUG -DTERMIO -g -Wall::-D_REENTRANT::-ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL BF_PTR:${no_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-linux-generic64","gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DCRYPTO_MDEBUG -DTERMIO -g -Wall::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL BF_PTR:${no_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-linux-x86_64",	"gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DCRYPTO_MDEBUG -m64 -DL_ENDIAN -DTERMIO -g -Wall -DMD32_REG_T=int::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_UNROLL:${x86_64_asm}:elf:dlfcn:linux-shared:-fPIC:-m64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::64",
 | 
			
		||||
"debug-levitte-linux-elf-extreme","gcc:-DLEVITTE_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_DEBUG -DBN_DEBUG_RAND -DCRYPTO_MDEBUG -DENGINE_CONF_DEBUG -DL_ENDIAN -DPEDANTIC -ggdb -g3 -pedantic -ansi -Wall -W -Wundef -Wshadow -Wcast-align -Wstrict-prototypes -Wmissing-prototypes -Wno-long-long -Wundef -Wconversion -pipe::-D_REENTRANT::-ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-levitte-linux-noasm-extreme","gcc:-DLEVITTE_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_DEBUG -DBN_DEBUG_RAND -DCRYPTO_MDEBUG -DENGINE_CONF_DEBUG -DOPENSSL_NO_ASM -DL_ENDIAN -DPEDANTIC -ggdb -g3 -pedantic -ansi -Wall -W -Wundef -Wshadow -Wcast-align -Wstrict-prototypes -Wmissing-prototypes -Wno-long-long -Wundef -Wconversion -pipe::-D_REENTRANT::-ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${no_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-geoff32","gcc:-DBN_DEBUG -DBN_DEBUG_RAND -DBN_STRICT -DPURIFY -DOPENSSL_NO_DEPRECATED -DOPENSSL_NO_ASM -DOPENSSL_NO_INLINE_ASM -DL_ENDIAN -DTERMIO -DPEDANTIC -O1 -ggdb2 -Wall -Werror -Wundef -pedantic -Wshadow -Wpointer-arith -Wbad-function-cast -Wcast-align -Wsign-compare -Wmissing-prototypes -Wmissing-declarations -Wno-long-long::-D_REENTRANT::-ldl:BN_LLONG:${no_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-geoff64","gcc:-DBN_DEBUG -DBN_DEBUG_RAND -DBN_STRICT -DPURIFY -DOPENSSL_NO_DEPRECATED -DOPENSSL_NO_ASM -DOPENSSL_NO_INLINE_ASM -DL_ENDIAN -DTERMIO -DPEDANTIC -O1 -ggdb2 -Wall -Werror -Wundef -pedantic -Wshadow -Wpointer-arith -Wbad-function-cast -Wcast-align -Wsign-compare -Wmissing-prototypes -Wmissing-declarations -Wno-long-long::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL BF_PTR:${no_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-linux-pentium","gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG -DL_ENDIAN -g -mcpu=pentium -Wall::-D_REENTRANT::-ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn",
 | 
			
		||||
"debug-linux-ppro","gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG -DL_ENDIAN -g -mcpu=pentiumpro -Wall::-D_REENTRANT::-ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn",
 | 
			
		||||
"debug-linux-elf","gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG -DL_ENDIAN -g -march=i486 -Wall::-D_REENTRANT::-lefence -ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-linux-elf-noefence","gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG -DL_ENDIAN -g -march=i486 -Wall::-D_REENTRANT::-ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-linux-ia32-aes", "gcc:-DAES_EXPERIMENTAL -DL_ENDIAN -O3 -fomit-frame-pointer -Wall::-D_REENTRANT::-ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:x86cpuid.o:bn-586.o co-586.o x86-mont.o:des-586.o crypt586.o:aes_x86core.o aes_cbc.o aesni-x86.o:bf-586.o:md5-586.o:sha1-586.o sha256-586.o sha512-586.o:cast-586.o:rc4-586.o:rmd-586.o:rc5-586.o:wp_block.o wp-mmx.o::ghash-x86.o::elf:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-linux-generic32","gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DCRYPTO_MDEBUG -g -Wall::-D_REENTRANT::-ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL BF_PTR:${no_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-linux-generic64","gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DCRYPTO_MDEBUG -g -Wall::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL BF_PTR:${no_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-linux-x86_64","gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DCRYPTO_MDEBUG -m64 -DL_ENDIAN -g -Wall::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_UNROLL:${x86_64_asm}:elf:dlfcn:linux-shared:-fPIC:-m64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::64",
 | 
			
		||||
"dist",		"cc:-O::(unknown)::::::",
 | 
			
		||||
 | 
			
		||||
# Basic configs that should work on any (32 and less bit) box
 | 
			
		||||
@@ -215,7 +222,7 @@ my %table=(
 | 
			
		||||
# actually recommend to consider using gcc shared build even with vendor
 | 
			
		||||
# compiler:-)
 | 
			
		||||
#						<appro@fy.chalmers.se>
 | 
			
		||||
"solaris64-x86_64-gcc","gcc:-m64 -O3 -Wall -DL_ENDIAN -DMD32_REG_T=int::-D_REENTRANT::-lsocket -lnsl -ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_UNROLL:${x86_64_asm}:elf:dlfcn:solaris-shared:-fPIC:-m64 -shared -static-libgcc:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::/64",
 | 
			
		||||
"solaris64-x86_64-gcc","gcc:-m64 -O3 -Wall -DL_ENDIAN::-D_REENTRANT::-lsocket -lnsl -ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_UNROLL:${x86_64_asm}:elf:dlfcn:solaris-shared:-fPIC:-m64 -shared -static-libgcc:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::/64",
 | 
			
		||||
 
 | 
			
		||||
#### Solaris x86 with Sun C setups
 | 
			
		||||
"solaris-x86-cc","cc:-fast -O -Xa::-D_REENTRANT::-lsocket -lnsl -ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_PTR DES_UNROLL BF_PTR:${no_asm}:dlfcn:solaris-shared:-KPIC:-G -dy -z text:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
@@ -223,12 +230,12 @@ my %table=(
 | 
			
		||||
 | 
			
		||||
#### SPARC Solaris with GNU C setups
 | 
			
		||||
"solaris-sparcv7-gcc","gcc:-O3 -fomit-frame-pointer -Wall -DB_ENDIAN -DBN_DIV2W::-D_REENTRANT::-lsocket -lnsl -ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_UNROLL BF_PTR:${no_asm}:dlfcn:solaris-shared:-fPIC:-shared:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"solaris-sparcv8-gcc","gcc:-mv8 -O3 -fomit-frame-pointer -Wall -DB_ENDIAN -DBN_DIV2W::-D_REENTRANT::-lsocket -lnsl -ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_UNROLL BF_PTR:${sparcv8_asm}:dlfcn:solaris-shared:-fPIC:-shared:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"solaris-sparcv8-gcc","gcc:-mcpu=v8 -O3 -fomit-frame-pointer -Wall -DB_ENDIAN -DBN_DIV2W::-D_REENTRANT::-lsocket -lnsl -ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_UNROLL BF_PTR:${sparcv8_asm}:dlfcn:solaris-shared:-fPIC:-shared:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
# -m32 should be safe to add as long as driver recognizes -mcpu=ultrasparc
 | 
			
		||||
"solaris-sparcv9-gcc","gcc:-m32 -mcpu=ultrasparc -O3 -fomit-frame-pointer -Wall -DB_ENDIAN -DBN_DIV2W::-D_REENTRANT:ULTRASPARC:-lsocket -lnsl -ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_UNROLL BF_PTR:${sparcv9_asm}:dlfcn:solaris-shared:-fPIC:-shared:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"solaris64-sparcv9-gcc","gcc:-m64 -mcpu=ultrasparc -O3 -Wall -DB_ENDIAN::-D_REENTRANT:ULTRASPARC:-lsocket -lnsl -ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_INT DES_PTR DES_RISC1 DES_UNROLL BF_PTR:${sparcv9_asm}:dlfcn:solaris-shared:-fPIC:-m64 -shared:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::/64",
 | 
			
		||||
####
 | 
			
		||||
"debug-solaris-sparcv8-gcc","gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG_ALL -O -g -mv8 -Wall -DB_ENDIAN::-D_REENTRANT::-lsocket -lnsl -ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_UNROLL BF_PTR:${sparcv8_asm}:dlfcn:solaris-shared:-fPIC:-shared:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-solaris-sparcv8-gcc","gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG_ALL -O -g -mcpu=v8 -Wall -DB_ENDIAN::-D_REENTRANT::-lsocket -lnsl -ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_UNROLL BF_PTR:${sparcv8_asm}:dlfcn:solaris-shared:-fPIC:-shared:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-solaris-sparcv9-gcc","gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG_ALL -DPEDANTIC -O -g -mcpu=ultrasparc -pedantic -ansi -Wall -Wshadow -Wno-long-long -D__EXTENSIONS__ -DB_ENDIAN -DBN_DIV2W::-D_REENTRANT:ULTRASPARC:-lsocket -lnsl -ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_UNROLL BF_PTR:${sparcv9_asm}:dlfcn:solaris-shared:-fPIC:-shared:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
 | 
			
		||||
#### SPARC Solaris with Sun C setups
 | 
			
		||||
@@ -245,20 +252,20 @@ my %table=(
 | 
			
		||||
 | 
			
		||||
#### SunOS configs, assuming sparc for the gcc one.
 | 
			
		||||
#"sunos-cc", "cc:-O4 -DNOPROTO -DNOCONST::(unknown):SUNOS::DES_UNROLL:${no_asm}::",
 | 
			
		||||
"sunos-gcc","gcc:-O3 -mv8 -Dssize_t=int::(unknown):SUNOS::BN_LLONG RC4_CHAR RC4_CHUNK DES_UNROLL DES_PTR DES_RISC1:${no_asm}::",
 | 
			
		||||
"sunos-gcc","gcc:-O3 -mcpu=v8 -Dssize_t=int::(unknown):SUNOS::BN_LLONG RC4_CHAR RC4_CHUNK DES_UNROLL DES_PTR DES_RISC1:${no_asm}::",
 | 
			
		||||
 | 
			
		||||
#### IRIX 5.x configs
 | 
			
		||||
# -mips2 flag is added by ./config when appropriate.
 | 
			
		||||
"irix-gcc","gcc:-O3 -DTERMIOS -DB_ENDIAN::(unknown):::BN_LLONG MD2_CHAR RC4_INDEX RC4_CHAR RC4_CHUNK DES_UNROLL DES_RISC2 DES_PTR BF_PTR:${no_asm}:dlfcn:irix-shared:::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"irix-cc", "cc:-O2 -use_readonly_const -DTERMIOS -DB_ENDIAN::(unknown):::BN_LLONG RC4_CHAR RC4_CHUNK DES_PTR DES_RISC2 DES_UNROLL BF_PTR:${no_asm}:dlfcn:irix-shared:::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"irix-gcc","gcc:-O3 -DB_ENDIAN::(unknown):::BN_LLONG MD2_CHAR RC4_INDEX RC4_CHAR RC4_CHUNK DES_UNROLL DES_RISC2 DES_PTR BF_PTR:${mips32_asm}:o32:dlfcn:irix-shared:::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"irix-cc", "cc:-O2 -use_readonly_const -DB_ENDIAN::(unknown):::BN_LLONG RC4_CHAR RC4_CHUNK DES_PTR DES_RISC2 DES_UNROLL BF_PTR:${mips32_asm}:o32:dlfcn:irix-shared:::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
#### IRIX 6.x configs
 | 
			
		||||
# Only N32 and N64 ABIs are supported. If you need O32 ABI build, invoke
 | 
			
		||||
# './Configure irix-cc -o32' manually.
 | 
			
		||||
"irix-mips3-gcc","gcc:-mabi=n32 -O3 -DTERMIOS -DB_ENDIAN -DBN_DIV3W::-D_SGI_MP_SOURCE:::MD2_CHAR RC4_INDEX RC4_CHAR RC4_CHUNK_LL DES_UNROLL DES_RISC2 DES_PTR BF_PTR SIXTY_FOUR_BIT:${mips3_asm}:dlfcn:irix-shared::-mabi=n32:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::32",
 | 
			
		||||
"irix-mips3-cc", "cc:-n32 -mips3 -O2 -use_readonly_const -G0 -rdata_shared -DTERMIOS -DB_ENDIAN -DBN_DIV3W::-D_SGI_MP_SOURCE:::DES_PTR RC4_CHAR RC4_CHUNK_LL DES_RISC2 DES_UNROLL BF_PTR SIXTY_FOUR_BIT:${mips3_asm}:dlfcn:irix-shared::-n32:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::32",
 | 
			
		||||
"irix-mips3-gcc","gcc:-mabi=n32 -O3 -DB_ENDIAN -DBN_DIV3W::-D_SGI_MP_SOURCE:::MD2_CHAR RC4_INDEX RC4_CHAR RC4_CHUNK_LL DES_UNROLL DES_RISC2 DES_PTR BF_PTR SIXTY_FOUR_BIT:${mips64_asm}:n32:dlfcn:irix-shared::-mabi=n32:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::32",
 | 
			
		||||
"irix-mips3-cc", "cc:-n32 -mips3 -O2 -use_readonly_const -G0 -rdata_shared -DB_ENDIAN -DBN_DIV3W::-D_SGI_MP_SOURCE:::DES_PTR RC4_CHAR RC4_CHUNK_LL DES_RISC2 DES_UNROLL BF_PTR SIXTY_FOUR_BIT:${mips64_asm}:n32:dlfcn:irix-shared::-n32:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::32",
 | 
			
		||||
# N64 ABI builds.
 | 
			
		||||
"irix64-mips4-gcc","gcc:-mabi=64 -mips4 -O3 -DTERMIOS -DB_ENDIAN -DBN_DIV3W::-D_SGI_MP_SOURCE:::RC4_CHAR RC4_CHUNK DES_RISC2 DES_UNROLL SIXTY_FOUR_BIT_LONG:${mips3_asm}:dlfcn:irix-shared::-mabi=64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::64",
 | 
			
		||||
"irix64-mips4-cc", "cc:-64 -mips4 -O2 -use_readonly_const -G0 -rdata_shared -DTERMIOS -DB_ENDIAN -DBN_DIV3W::-D_SGI_MP_SOURCE:::RC4_CHAR RC4_CHUNK DES_RISC2 DES_UNROLL SIXTY_FOUR_BIT_LONG:${mips3_asm}:dlfcn:irix-shared::-64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::64",
 | 
			
		||||
"irix64-mips4-gcc","gcc:-mabi=64 -mips4 -O3 -DB_ENDIAN -DBN_DIV3W::-D_SGI_MP_SOURCE:::RC4_CHAR RC4_CHUNK DES_RISC2 DES_UNROLL SIXTY_FOUR_BIT_LONG:${mips64_asm}:64:dlfcn:irix-shared::-mabi=64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::64",
 | 
			
		||||
"irix64-mips4-cc", "cc:-64 -mips4 -O2 -use_readonly_const -G0 -rdata_shared -DB_ENDIAN -DBN_DIV3W::-D_SGI_MP_SOURCE:::RC4_CHAR RC4_CHUNK DES_RISC2 DES_UNROLL SIXTY_FOUR_BIT_LONG:${mips64_asm}:64:dlfcn:irix-shared::-64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::64",
 | 
			
		||||
 | 
			
		||||
#### Unified HP-UX ANSI C configs.
 | 
			
		||||
# Special notes:
 | 
			
		||||
@@ -291,17 +298,18 @@ my %table=(
 | 
			
		||||
# Since there is mention of this in shlib/hpux10-cc.sh
 | 
			
		||||
"hpux-parisc-cc-o4","cc:-Ae +O4 +ESlit -z -DB_ENDIAN -DBN_DIV2W -DMD32_XARRAY::-D_REENTRANT::-ldld:BN_LLONG DES_PTR DES_UNROLL DES_RISC1:${no_asm}:dl:hpux-shared:+Z:-b:.sl.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"hpux-parisc-gcc","gcc:-O3 -DB_ENDIAN -DBN_DIV2W::-D_REENTRANT::-Wl,+s -ldld:BN_LLONG DES_PTR DES_UNROLL DES_RISC1:${no_asm}:dl:hpux-shared:-fPIC:-shared:.sl.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"hpux-parisc2-gcc","gcc:-march=2.0 -O3 -DB_ENDIAN -D_REENTRANT::::-Wl,+s -ldld:SIXTY_FOUR_BIT RC4_CHAR RC4_CHUNK DES_PTR DES_UNROLL DES_RISC1::pa-risc2.o::::::::::::void:dl:hpux-shared:-fPIC:-shared:.sl.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"hpux64-parisc2-gcc","gcc:-O3 -DB_ENDIAN -D_REENTRANT::::-ldl:SIXTY_FOUR_BIT_LONG MD2_CHAR RC4_INDEX RC4_CHAR DES_UNROLL DES_RISC1 DES_INT::pa-risc2W.o::::::::::::void:dlfcn:hpux-shared:-fpic:-shared:.sl.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::/pa20_64",
 | 
			
		||||
"hpux-parisc1_1-gcc","gcc:-O3 -DB_ENDIAN -DBN_DIV2W::-D_REENTRANT::-Wl,+s -ldld:BN_LLONG DES_PTR DES_UNROLL DES_RISC1:${parisc11_asm}:dl:hpux-shared:-fPIC:-shared:.sl.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::/pa1.1",
 | 
			
		||||
"hpux-parisc2-gcc","gcc:-march=2.0 -O3 -DB_ENDIAN -D_REENTRANT::::-Wl,+s -ldld:SIXTY_FOUR_BIT RC4_CHAR RC4_CHUNK DES_PTR DES_UNROLL DES_RISC1:".eval{my $asm=$parisc20_asm;$asm=~s/2W\./2\./;$asm=~s/:64/:32/;$asm}.":dl:hpux-shared:-fPIC:-shared:.sl.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::/pa20_32",
 | 
			
		||||
"hpux64-parisc2-gcc","gcc:-O3 -DB_ENDIAN -D_REENTRANT::::-ldl:SIXTY_FOUR_BIT_LONG MD2_CHAR RC4_INDEX RC4_CHAR DES_UNROLL DES_RISC1 DES_INT::pa-risc2W.o::::::::::::::void:dlfcn:hpux-shared:-fpic:-shared:.sl.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::/pa20_64",
 | 
			
		||||
 | 
			
		||||
# More attempts at unified 10.X and 11.X targets for HP C compiler.
 | 
			
		||||
#
 | 
			
		||||
# Chris Ruemmler <ruemmler@cup.hp.com>
 | 
			
		||||
# Kevin Steves <ks@hp.se>
 | 
			
		||||
"hpux-parisc-cc","cc:+O3 +Optrs_strongly_typed -Ae +ESlit -DB_ENDIAN -DBN_DIV2W -DMD32_XARRAY::-D_REENTRANT::-Wl,+s -ldld:MD2_CHAR RC4_INDEX RC4_CHAR DES_UNROLL DES_RISC1 DES_INT:${no_asm}:dl:hpux-shared:+Z:-b:.sl.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"hpux-parisc1_0-cc","cc:+DAportable +O3 +Optrs_strongly_typed -Ae +ESlit -DB_ENDIAN -DMD32_XARRAY::-D_REENTRANT::-Wl,+s -ldld:MD2_CHAR RC4_INDEX RC4_CHAR DES_UNROLL DES_RISC1 DES_INT:${no_asm}:dl:hpux-shared:+Z:-b:.sl.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"hpux-parisc2-cc","cc:+DA2.0 +DS2.0 +O3 +Optrs_strongly_typed -Ae +ESlit -DB_ENDIAN -DMD32_XARRAY -D_REENTRANT::::-Wl,+s -ldld:SIXTY_FOUR_BIT MD2_CHAR RC4_INDEX RC4_CHAR DES_UNROLL DES_RISC1 DES_INT::pa-risc2.o::::::::::::void:dl:hpux-shared:+Z:-b:.sl.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"hpux64-parisc2-cc","cc:+DD64 +O3 +Optrs_strongly_typed -Ae +ESlit -DB_ENDIAN -DMD32_XARRAY -D_REENTRANT::::-ldl:SIXTY_FOUR_BIT_LONG MD2_CHAR RC4_INDEX RC4_CHAR DES_UNROLL DES_RISC1 DES_INT::pa-risc2W.o::::::::::::void:dlfcn:hpux-shared:+Z:+DD64 -b:.sl.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::/pa20_64",
 | 
			
		||||
"hpux-parisc1_1-cc","cc:+DA1.1 +O3 +Optrs_strongly_typed -Ae +ESlit -DB_ENDIAN -DMD32_XARRAY::-D_REENTRANT::-Wl,+s -ldld:MD2_CHAR RC4_INDEX RC4_CHAR DES_UNROLL DES_RISC1 DES_INT:${parisc11_asm}:dl:hpux-shared:+Z:-b:.sl.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::/pa1.1",
 | 
			
		||||
"hpux-parisc2-cc","cc:+DA2.0 +DS2.0 +O3 +Optrs_strongly_typed -Ae +ESlit -DB_ENDIAN -DMD32_XARRAY -D_REENTRANT::::-Wl,+s -ldld:SIXTY_FOUR_BIT MD2_CHAR RC4_INDEX RC4_CHAR DES_UNROLL DES_RISC1 DES_INT:".eval{my $asm=$parisc20_asm;$asm=~s/2W\./2\./;$asm=~s/:64/:32/;$asm}.":dl:hpux-shared:+Z:-b:.sl.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::/pa20_32",
 | 
			
		||||
"hpux64-parisc2-cc","cc:+DD64 +O3 +Optrs_strongly_typed -Ae +ESlit -DB_ENDIAN -DMD32_XARRAY -D_REENTRANT::::-ldl:SIXTY_FOUR_BIT_LONG MD2_CHAR RC4_INDEX RC4_CHAR DES_UNROLL DES_RISC1 DES_INT:${parisc20_asm}:dlfcn:hpux-shared:+Z:+DD64 -b:.sl.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::/pa20_64",
 | 
			
		||||
 | 
			
		||||
# HP/UX IA-64 targets
 | 
			
		||||
"hpux-ia64-cc","cc:-Ae +DD32 +O2 +Olit=all -z -DB_ENDIAN -D_REENTRANT::::-ldl:SIXTY_FOUR_BIT MD2_CHAR RC4_INDEX DES_UNROLL DES_RISC1 DES_INT:${ia64_asm}:dlfcn:hpux-shared:+Z:+DD32 -b:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::/hpux32",
 | 
			
		||||
@@ -337,32 +345,46 @@ my %table=(
 | 
			
		||||
####
 | 
			
		||||
# *-generic* is endian-neutral target, but ./config is free to
 | 
			
		||||
# throw in -D[BL]_ENDIAN, whichever appropriate...
 | 
			
		||||
"linux-generic32","gcc:-DTERMIO -O3 -fomit-frame-pointer -Wall::-D_REENTRANT::-ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL BF_PTR:${no_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"linux-ppc",	"gcc:-DB_ENDIAN -DTERMIO -O3 -Wall::-D_REENTRANT::-ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_RISC1 DES_UNROLL:${ppc32_asm}:linux32:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"linux-generic32","gcc:-O3 -fomit-frame-pointer -Wall::-D_REENTRANT::-ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL BF_PTR:${no_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"linux-ppc",	"gcc:-DB_ENDIAN -O3 -Wall::-D_REENTRANT::-ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_RISC1 DES_UNROLL:${ppc32_asm}:linux32:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
# It's believed that majority of ARM toolchains predefine appropriate -march.
 | 
			
		||||
# If you compiler does not, do complement config command line with one!
 | 
			
		||||
"linux-armv4",	"gcc:-DTERMIO -O3 -Wall::-D_REENTRANT::-ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL BF_PTR:${armv4_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"linux-armv4",	"gcc:-O3 -Wall::-D_REENTRANT::-ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL BF_PTR:${armv4_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
#### IA-32 targets...
 | 
			
		||||
"linux-ia32-icc",	"icc:-DL_ENDIAN -DTERMIO -O2 -no_cpprt::-D_REENTRANT::-ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn:linux-shared:-KPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"linux-elf",	"gcc:-DL_ENDIAN -DTERMIO -O3 -fomit-frame-pointer -Wall::-D_REENTRANT::-ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"linux-aout",	"gcc:-DL_ENDIAN -DTERMIO -O3 -fomit-frame-pointer -march=i486 -Wall::(unknown):::BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_asm}:a.out",
 | 
			
		||||
"linux-ia32-icc",	"icc:-DL_ENDIAN -O2 -no_cpprt::-D_REENTRANT::-ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn:linux-shared:-KPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"linux-elf",	"gcc:-DL_ENDIAN -O3 -fomit-frame-pointer -Wall::-D_REENTRANT::-ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"linux-aout",	"gcc:-DL_ENDIAN -O3 -fomit-frame-pointer -march=i486 -Wall::(unknown):::BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_asm}:a.out",
 | 
			
		||||
####
 | 
			
		||||
"linux-generic64","gcc:-DTERMIO -O3 -Wall::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL BF_PTR:${no_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"linux-ppc64",	"gcc:-m64 -DB_ENDIAN -DTERMIO -O3 -Wall::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_RISC1 DES_UNROLL:${ppc64_asm}:linux64:dlfcn:linux-shared:-fPIC:-m64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::64",
 | 
			
		||||
"linux-ia64",	"gcc:-DL_ENDIAN -DTERMIO -O3 -Wall::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_UNROLL DES_INT:${ia64_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"linux-ia64-ecc","ecc:-DL_ENDIAN -DTERMIO -O2 -Wall -no_cpprt::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT:${ia64_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"linux-ia64-icc","icc:-DL_ENDIAN -DTERMIO -O2 -Wall -no_cpprt::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_RISC1 DES_INT:${ia64_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"linux-x86_64",	"gcc:-m64 -DL_ENDIAN -DTERMIO -O3 -Wall -DMD32_REG_T=int::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_UNROLL:${x86_64_asm}:elf:dlfcn:linux-shared:-fPIC:-m64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::64",
 | 
			
		||||
"linux-s390x",	"gcc:-m64 -DB_ENDIAN -DTERMIO -O3 -Wall::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL:${s390x_asm}:dlfcn:linux-shared:-fPIC:-m64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::64",
 | 
			
		||||
"linux-generic64","gcc:-O3 -Wall::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL BF_PTR:${no_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"linux-ppc64",	"gcc:-m64 -DB_ENDIAN -O3 -Wall::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_RISC1 DES_UNROLL:${ppc64_asm}:linux64:dlfcn:linux-shared:-fPIC:-m64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::64",
 | 
			
		||||
"linux-ia64",	"gcc:-DL_ENDIAN -O3 -Wall::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_UNROLL DES_INT:${ia64_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"linux-ia64-ecc","ecc:-DL_ENDIAN -O2 -Wall -no_cpprt::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT:${ia64_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"linux-ia64-icc","icc:-DL_ENDIAN -O2 -Wall -no_cpprt::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_RISC1 DES_INT:${ia64_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"linux-x86_64",	"gcc:-m64 -DL_ENDIAN -O3 -Wall::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_UNROLL:${x86_64_asm}:elf:dlfcn:linux-shared:-fPIC:-m64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::64",
 | 
			
		||||
"linux64-s390x",	"gcc:-m64 -DB_ENDIAN -O3 -Wall::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL:${s390x_asm}:64:dlfcn:linux-shared:-fPIC:-m64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::64",
 | 
			
		||||
#### So called "highgprs" target for z/Architecture CPUs
 | 
			
		||||
# "Highgprs" is kernel feature first implemented in Linux 2.6.32, see
 | 
			
		||||
# /proc/cpuinfo. The idea is to preserve most significant bits of
 | 
			
		||||
# general purpose registers not only upon 32-bit process context
 | 
			
		||||
# switch, but even on asynchronous signal delivery to such process.
 | 
			
		||||
# This makes it possible to deploy 64-bit instructions even in legacy
 | 
			
		||||
# application context and achieve better [or should we say adequate]
 | 
			
		||||
# performance. The build is binary compatible with linux-generic32,
 | 
			
		||||
# and the idea is to be able to install the resulting libcrypto.so
 | 
			
		||||
# alongside generic one, e.g. as /lib/highgprs/libcrypto.so.x.y, for
 | 
			
		||||
# ldconfig and run-time linker to autodiscover. Unfortunately it
 | 
			
		||||
# doesn't work just yet, because of couple of bugs in glibc
 | 
			
		||||
# sysdeps/s390/dl-procinfo.c affecting ldconfig and ld.so.1...
 | 
			
		||||
"linux32-s390x",	"gcc:-m31 -Wa,-mzarch -DB_ENDIAN -O3 -Wall::-D_REENTRANT::-ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL:".eval{my $asm=$s390x_asm;$asm=~s/bn\-s390x\.o/bn_asm.o/;$asm}.":31:dlfcn:linux-shared:-fPIC:-m31:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::/highgprs",
 | 
			
		||||
#### SPARC Linux setups
 | 
			
		||||
# Ray Miller <ray.miller@computing-services.oxford.ac.uk> has patiently
 | 
			
		||||
# assisted with debugging of following two configs.
 | 
			
		||||
"linux-sparcv8","gcc:-mv8 -DB_ENDIAN -DTERMIO -O3 -fomit-frame-pointer -Wall -DBN_DIV2W::-D_REENTRANT::-ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_UNROLL BF_PTR:${sparcv8_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"linux-sparcv8","gcc:-mcpu=v8 -DB_ENDIAN -O3 -fomit-frame-pointer -Wall -DBN_DIV2W::-D_REENTRANT::-ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_UNROLL BF_PTR:${sparcv8_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
# it's a real mess with -mcpu=ultrasparc option under Linux, but
 | 
			
		||||
# -Wa,-Av8plus should do the trick no matter what.
 | 
			
		||||
"linux-sparcv9","gcc:-m32 -mcpu=ultrasparc -DB_ENDIAN -DTERMIO -O3 -fomit-frame-pointer -Wall -Wa,-Av8plus -DBN_DIV2W::-D_REENTRANT:ULTRASPARC:-ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_UNROLL BF_PTR:${sparcv9_asm}:dlfcn:linux-shared:-fPIC:-m32:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"linux-sparcv9","gcc:-m32 -mcpu=ultrasparc -DB_ENDIAN -O3 -fomit-frame-pointer -Wall -Wa,-Av8plus -DBN_DIV2W::-D_REENTRANT:ULTRASPARC:-ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_UNROLL BF_PTR:${sparcv9_asm}:dlfcn:linux-shared:-fPIC:-m32:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
# GCC 3.1 is a requirement
 | 
			
		||||
"linux64-sparcv9","gcc:-m64 -mcpu=ultrasparc -DB_ENDIAN -DTERMIO -O3 -fomit-frame-pointer -Wall::-D_REENTRANT:ULTRASPARC:-ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_INT DES_PTR DES_RISC1 DES_UNROLL BF_PTR:${sparcv9_asm}:dlfcn:linux-shared:-fPIC:-m64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::64",
 | 
			
		||||
"linux64-sparcv9","gcc:-m64 -mcpu=ultrasparc -DB_ENDIAN -O3 -fomit-frame-pointer -Wall::-D_REENTRANT:ULTRASPARC:-ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_INT DES_PTR DES_RISC1 DES_UNROLL BF_PTR:${sparcv9_asm}:dlfcn:linux-shared:-fPIC:-m64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::64",
 | 
			
		||||
#### Alpha Linux with GNU C and Compaq C setups
 | 
			
		||||
# Special notes:
 | 
			
		||||
# - linux-alpha+bwx-gcc is ment to be used from ./config only. If you
 | 
			
		||||
@@ -376,25 +398,30 @@ my %table=(
 | 
			
		||||
#
 | 
			
		||||
#					<appro@fy.chalmers.se>
 | 
			
		||||
#
 | 
			
		||||
"linux-alpha-gcc","gcc:-O3 -DL_ENDIAN -DTERMIO::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_RISC1 DES_UNROLL:${alpha_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"linux-alpha+bwx-gcc","gcc:-O3 -DL_ENDIAN -DTERMIO::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_RISC1 DES_UNROLL:${alpha_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"linux-alpha-ccc","ccc:-fast -readonly_strings -DL_ENDIAN -DTERMIO::-D_REENTRANT:::SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_PTR DES_RISC1 DES_UNROLL:${alpha_asm}",
 | 
			
		||||
"linux-alpha+bwx-ccc","ccc:-fast -readonly_strings -DL_ENDIAN -DTERMIO::-D_REENTRANT:::SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_INT DES_PTR DES_RISC1 DES_UNROLL:${alpha_asm}",
 | 
			
		||||
"linux-alpha-gcc","gcc:-O3 -DL_ENDIAN::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_RISC1 DES_UNROLL:${alpha_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"linux-alpha+bwx-gcc","gcc:-O3 -DL_ENDIAN::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_RISC1 DES_UNROLL:${alpha_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"linux-alpha-ccc","ccc:-fast -readonly_strings -DL_ENDIAN::-D_REENTRANT:::SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_PTR DES_RISC1 DES_UNROLL:${alpha_asm}",
 | 
			
		||||
"linux-alpha+bwx-ccc","ccc:-fast -readonly_strings -DL_ENDIAN::-D_REENTRANT:::SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_INT DES_PTR DES_RISC1 DES_UNROLL:${alpha_asm}",
 | 
			
		||||
 | 
			
		||||
# Android: linux-* but without pointers to headers and libs.
 | 
			
		||||
"android","gcc:-mandroid -I\$(ANDROID_DEV)/include -B\$(ANDROID_DEV)/lib -O3 -fomit-frame-pointer -Wall::-D_REENTRANT::-ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL BF_PTR:${no_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"android-x86","gcc:-mandroid -I\$(ANDROID_DEV)/include -B\$(ANDROID_DEV)/lib -O3 -fomit-frame-pointer -Wall::-D_REENTRANT::-ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:".eval{my $asm=${x86_elf_asm};$asm=~s/:elf/:android/;$asm}.":dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"android-armv7","gcc:-march=armv7-a -mandroid -I\$(ANDROID_DEV)/include -B\$(ANDROID_DEV)/lib -O3 -fomit-frame-pointer -Wall::-D_REENTRANT::-ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL BF_PTR:${armv4_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
 | 
			
		||||
#### *BSD [do see comment about ${BSDthreads} above!]
 | 
			
		||||
"BSD-generic32","gcc:-DTERMIOS -O3 -fomit-frame-pointer -Wall::${BSDthreads}:::BN_LLONG RC2_CHAR RC4_INDEX DES_INT DES_UNROLL:${no_asm}:dlfcn:bsd-gcc-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"BSD-x86",	"gcc:-DL_ENDIAN -DTERMIOS -O3 -fomit-frame-pointer -Wall::${BSDthreads}:::BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_asm}:a.out:dlfcn:bsd-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"BSD-x86-elf",	"gcc:-DL_ENDIAN -DTERMIOS -O3 -fomit-frame-pointer -Wall::${BSDthreads}:::BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn:bsd-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-BSD-x86-elf",	"gcc:-DL_ENDIAN -DTERMIOS -O3 -Wall -g::${BSDthreads}:::BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn:bsd-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"BSD-sparcv8",	"gcc:-DB_ENDIAN -DTERMIOS -O3 -mv8 -Wall::${BSDthreads}:::BN_LLONG RC2_CHAR RC4_INDEX DES_INT DES_UNROLL:${sparcv8_asm}:dlfcn:bsd-gcc-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"BSD-generic32","gcc:-O3 -fomit-frame-pointer -Wall::${BSDthreads}:::BN_LLONG RC2_CHAR RC4_INDEX DES_INT DES_UNROLL:${no_asm}:dlfcn:bsd-gcc-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"BSD-x86",	"gcc:-DL_ENDIAN -O3 -fomit-frame-pointer -Wall::${BSDthreads}:::BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_asm}:a.out:dlfcn:bsd-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"BSD-x86-elf",	"gcc:-DL_ENDIAN -O3 -fomit-frame-pointer -Wall::${BSDthreads}:::BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn:bsd-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"debug-BSD-x86-elf",	"gcc:-DL_ENDIAN -O3 -Wall -g::${BSDthreads}:::BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn:bsd-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"BSD-sparcv8",	"gcc:-DB_ENDIAN -O3 -mcpu=v8 -Wall::${BSDthreads}:::BN_LLONG RC2_CHAR RC4_INDEX DES_INT DES_UNROLL:${sparcv8_asm}:dlfcn:bsd-gcc-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
 | 
			
		||||
"BSD-generic64","gcc:-DTERMIOS -O3 -Wall::${BSDthreads}:::SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_UNROLL:${no_asm}:dlfcn:bsd-gcc-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"BSD-generic64","gcc:-O3 -Wall::${BSDthreads}:::SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_UNROLL:${no_asm}:dlfcn:bsd-gcc-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
# -DMD32_REG_T=int doesn't actually belong in sparc64 target, it
 | 
			
		||||
# simply *happens* to work around a compiler bug in gcc 3.3.3,
 | 
			
		||||
# triggered by RIPEMD160 code.
 | 
			
		||||
"BSD-sparc64",	"gcc:-DB_ENDIAN -DTERMIOS -O3 -DMD32_REG_T=int -Wall::${BSDthreads}:::BN_LLONG RC2_CHAR RC4_CHUNK DES_INT DES_PTR DES_RISC2 BF_PTR:${sparcv9_asm}:dlfcn:bsd-gcc-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"BSD-ia64",	"gcc:-DL_ENDIAN -DTERMIOS -O3 -Wall::${BSDthreads}:::SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_UNROLL DES_INT:${ia64_asm}:dlfcn:bsd-gcc-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"BSD-x86_64",	"gcc:-DL_ENDIAN -DTERMIOS -O3 -DMD32_REG_T=int -Wall::${BSDthreads}:::SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_UNROLL:${x86_64_asm}:elf:dlfcn:bsd-gcc-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"BSD-sparc64",	"gcc:-DB_ENDIAN -O3 -DMD32_REG_T=int -Wall::${BSDthreads}:::BN_LLONG RC2_CHAR RC4_CHUNK DES_INT DES_PTR DES_RISC2 BF_PTR:${sparcv9_asm}:dlfcn:bsd-gcc-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"BSD-ia64",	"gcc:-DL_ENDIAN -O3 -Wall::${BSDthreads}:::SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_UNROLL DES_INT:${ia64_asm}:dlfcn:bsd-gcc-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"BSD-x86_64",	"gcc:-DL_ENDIAN -O3 -Wall::${BSDthreads}:::SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_UNROLL:${x86_64_asm}:elf:dlfcn:bsd-gcc-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
 | 
			
		||||
"bsdi-elf-gcc",     "gcc:-DPERL5 -DL_ENDIAN -fomit-frame-pointer -O3 -march=i486 -Wall::(unknown)::-ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn:bsd-gcc-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
 | 
			
		||||
@@ -406,8 +433,8 @@ my %table=(
 | 
			
		||||
 | 
			
		||||
# QNX
 | 
			
		||||
"qnx4",	"cc:-DL_ENDIAN -DTERMIO::(unknown):::${x86_gcc_des} ${x86_gcc_opts}:",
 | 
			
		||||
"QNX6",       "gcc:-DTERMIOS::::-lsocket::${no_asm}:dlfcn:bsd-gcc-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"QNX6-i386",  "gcc:-DL_ENDIAN -DTERMIOS -O2 -Wall::::-lsocket:${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn:bsd-gcc-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"QNX6",       "gcc:::::-lsocket::${no_asm}:dlfcn:bsd-gcc-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
"QNX6-i386",  "gcc:-DL_ENDIAN -O2 -Wall::::-lsocket:${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn:bsd-gcc-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
 | 
			
		||||
 | 
			
		||||
# BeOS
 | 
			
		||||
"beos-x86-r5",   "gcc:-DL_ENDIAN -DTERMIOS -O3 -fomit-frame-pointer -mcpu=pentium -Wall::-D_REENTRANT:BEOS:-lbe -lnet:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:beos:beos-shared:-fPIC -DPIC:-shared:.so",
 | 
			
		||||
@@ -480,7 +507,7 @@ my %table=(
 | 
			
		||||
"SINIX-N","/usr/ucb/cc:-O2 -misaligned::(unknown)::-lucb:RC4_INDEX RC4_CHAR:::",
 | 
			
		||||
 | 
			
		||||
# SIEMENS BS2000/OSD: an EBCDIC-based mainframe
 | 
			
		||||
"BS2000-OSD","c89:-O -XLLML -XLLMK -XL -DB_ENDIAN -DTERMIOS -DCHARSET_EBCDIC::(unknown)::-lsocket -lnsl:THIRTY_TWO_BIT DES_PTR DES_UNROLL MD2_CHAR RC4_INDEX RC4_CHAR BF_PTR:::",
 | 
			
		||||
"BS2000-OSD","c89:-O -XLLML -XLLMK -XL -DB_ENDIAN -DCHARSET_EBCDIC::(unknown)::-lsocket -lnsl:THIRTY_TWO_BIT DES_PTR DES_UNROLL MD2_CHAR RC4_INDEX RC4_CHAR BF_PTR:::",
 | 
			
		||||
 | 
			
		||||
# OS/390 Unix an EBCDIC-based Unix system on IBM mainframe
 | 
			
		||||
# You need to compile using the c89.sh wrapper in the tools directory, because the
 | 
			
		||||
@@ -491,15 +518,15 @@ my %table=(
 | 
			
		||||
# Visual C targets
 | 
			
		||||
#
 | 
			
		||||
# Win64 targets, WIN64I denotes IA-64 and WIN64A - AMD64
 | 
			
		||||
"VC-WIN64I","cl:-W3 -Gs0 -Gy -nologo -DOPENSSL_SYSNAME_WIN32 -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -DUNICODE -D_UNICODE -D_CRT_SECURE_NO_DEPRECATE:::WIN64I::SIXTY_FOUR_BIT RC4_CHUNK_LL DES_INT EXPORT_VAR_AS_FN:ia64cpuid.o:ia64.o::aes_core.o aes_cbc.o aes-ia64.o::md5-ia64.o:sha1-ia64.o sha256-ia64.o sha512-ia64.o:::::::ias:win32",
 | 
			
		||||
"VC-WIN64A","cl:-W3 -Gs0 -Gy -nologo -DOPENSSL_SYSNAME_WIN32 -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -DUNICODE -D_UNICODE -D_CRT_SECURE_NO_DEPRECATE:::WIN64A::SIXTY_FOUR_BIT RC4_CHUNK_LL DES_INT EXPORT_VAR_AS_FN:x86_64cpuid.o:bn_asm.o x86_64-mont.o::aes-x86_64.o::md5-x86_64.o:sha1-x86_64.o sha256-x86_64.o sha512-x86_64.o::rc4-x86_64.o:::wp-x86_64.o:cmll-x86_64.o cmll_misc.o:auto:win32",
 | 
			
		||||
"debug-VC-WIN64I","cl:-W3 -Gs0 -Gy -Zi -nologo -DOPENSSL_SYSNAME_WIN32 -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -DUNICODE -D_UNICODE -D_CRT_SECURE_NO_DEPRECATE:::WIN64I::SIXTY_FOUR_BIT RC4_CHUNK_LL DES_INT EXPORT_VAR_AS_FN:ia64cpuid.o:ia64.o::aes_core.o aes_cbc.o aes-ia64.o::md5-ia64.o:sha1-ia64.o sha256-ia64.o sha512-ia64.o:::::::ias:win32",
 | 
			
		||||
"debug-VC-WIN64A","cl:-W3 -Gs0 -Gy -Zi -nologo -DOPENSSL_SYSNAME_WIN32 -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -DUNICODE -D_UNICODE -D_CRT_SECURE_NO_DEPRECATE:::WIN64A::SIXTY_FOUR_BIT RC4_CHUNK_LL DES_INT EXPORT_VAR_AS_FN:x86_64cpuid.o:bn_asm.o x86_64-mont.o::aes-x86_64.o::md5-x86_64.o:sha1-x86_64.o sha256-x86_64.o sha512-x86_64.o::rc4-x86_64.o:::wp-x86_64.o:cmll-x86_64.o cmll_misc.o:auto:win32",
 | 
			
		||||
"VC-WIN64I","cl:-W3 -Gs0 -Gy -nologo -DOPENSSL_SYSNAME_WIN32 -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -DUNICODE -D_UNICODE -D_CRT_SECURE_NO_DEPRECATE:::WIN64I::SIXTY_FOUR_BIT RC4_CHUNK_LL DES_INT EXPORT_VAR_AS_FN:ia64cpuid.o:ia64.o ia64-mont.o::aes_core.o aes_cbc.o aes-ia64.o::md5-ia64.o:sha1-ia64.o sha256-ia64.o sha512-ia64.o:::::::ghash-ia64.o::ias:win32",
 | 
			
		||||
"VC-WIN64A","cl:-W3 -Gs0 -Gy -nologo -DOPENSSL_SYSNAME_WIN32 -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -DUNICODE -D_UNICODE -D_CRT_SECURE_NO_DEPRECATE:::WIN64A::SIXTY_FOUR_BIT RC4_CHUNK_LL DES_INT EXPORT_VAR_AS_FN:".eval{my $asm=$x86_64_asm;$asm=~s/x86_64-gcc\.o/bn_asm.o/;$asm}.":auto:win32",
 | 
			
		||||
"debug-VC-WIN64I","cl:-W3 -Gs0 -Gy -Zi -nologo -DOPENSSL_SYSNAME_WIN32 -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -DUNICODE -D_UNICODE -D_CRT_SECURE_NO_DEPRECATE:::WIN64I::SIXTY_FOUR_BIT RC4_CHUNK_LL DES_INT EXPORT_VAR_AS_FN:ia64cpuid.o:ia64.o::aes_core.o aes_cbc.o aes-ia64.o::md5-ia64.o:sha1-ia64.o sha256-ia64.o sha512-ia64.o:::::::ghash-ia64.o::ias:win32",
 | 
			
		||||
"debug-VC-WIN64A","cl:-W3 -Gs0 -Gy -Zi -nologo -DOPENSSL_SYSNAME_WIN32 -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -DUNICODE -D_UNICODE -D_CRT_SECURE_NO_DEPRECATE:::WIN64A::SIXTY_FOUR_BIT RC4_CHUNK_LL DES_INT EXPORT_VAR_AS_FN:".eval{my $asm=$x86_64_asm;$asm=~s/x86_64-gcc\.o/bn_asm.o/;$asm}.":auto:win32",
 | 
			
		||||
# x86 Win32 target defaults to ANSI API, if you want UNICODE, complement
 | 
			
		||||
# 'perl Configure VC-WIN32' with '-DUNICODE -D_UNICODE'
 | 
			
		||||
"VC-WIN32","cl:-W3 -WX -Gs0 -GF -Gy -nologo -DOPENSSL_SYSNAME_WIN32 -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -D_CRT_SECURE_NO_DEPRECATE:::WIN32::BN_LLONG RC4_INDEX EXPORT_VAR_AS_FN ${x86_gcc_opts}:${x86_asm}:win32n:win32",
 | 
			
		||||
"VC-WIN32","cl:-W3 -Gs0 -GF -Gy -nologo -DOPENSSL_SYSNAME_WIN32 -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -D_CRT_SECURE_NO_DEPRECATE:::WIN32::BN_LLONG RC4_INDEX EXPORT_VAR_AS_FN ${x86_gcc_opts}:${x86_asm}:win32n:win32",
 | 
			
		||||
# Unified CE target
 | 
			
		||||
"debug-VC-WIN32","cl:-W3 -WX -Gs0 -GF -Gy -Zi -nologo -DOPENSSL_SYSNAME_WIN32 -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -D_CRT_SECURE_NO_DEPRECATE:::WIN32::BN_LLONG RC4_INDEX EXPORT_VAR_AS_FN ${x86_gcc_opts}:${x86_asm}:win32n:win32",
 | 
			
		||||
"debug-VC-WIN32","cl:-W3 -Gs0 -GF -Gy -Zi -nologo -DOPENSSL_SYSNAME_WIN32 -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -D_CRT_SECURE_NO_DEPRECATE:::WIN32::BN_LLONG RC4_INDEX EXPORT_VAR_AS_FN ${x86_gcc_opts}:${x86_asm}:win32n:win32",
 | 
			
		||||
"VC-CE","cl::::WINCE::BN_LLONG RC4_INDEX EXPORT_VAR_AS_FN ${x86_gcc_opts}:${no_asm}:win32",
 | 
			
		||||
 | 
			
		||||
# Borland C++ 4.5
 | 
			
		||||
@@ -540,7 +567,7 @@ my %table=(
 | 
			
		||||
"netware-libc-bsdsock-gcc", "i586-netware-gcc:-nostdinc -I/ndk/libc/include -DNETWARE_BSDSOCK -DL_ENDIAN -DNETWARE_LIBC -DOPENSSL_SYSNAME_NETWARE -DTERMIO -O2 -Wall:::::BN_LLONG ${x86_gcc_opts}::",
 | 
			
		||||
 | 
			
		||||
# DJGPP
 | 
			
		||||
"DJGPP", "gcc:-I/dev/env/WATT_ROOT/inc -DTERMIOS -DL_ENDIAN -fomit-frame-pointer -O2 -Wall:::MSDOS:-L/dev/env/WATT_ROOT/lib -lwatt:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_asm}:a.out:",
 | 
			
		||||
"DJGPP", "gcc:-I/dev/env/WATT_ROOT/inc -DTERMIO -DL_ENDIAN -fomit-frame-pointer -O2 -Wall:::MSDOS:-L/dev/env/WATT_ROOT/lib -lwatt:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_asm}:a.out:",
 | 
			
		||||
 | 
			
		||||
# Ultrix from Bernhard Simon <simon@zid.tuwien.ac.at>
 | 
			
		||||
"ultrix-cc","cc:-std1 -O -Olimit 2500 -DL_ENDIAN::(unknown):::::::",
 | 
			
		||||
@@ -552,10 +579,12 @@ my %table=(
 | 
			
		||||
"rhapsody-ppc-cc","cc:-O3 -DB_ENDIAN::(unknown):MACOSX_RHAPSODY::BN_LLONG RC4_CHAR RC4_CHUNK DES_UNROLL BF_PTR:${no_asm}::",
 | 
			
		||||
"darwin-ppc-cc","cc:-arch ppc -O3 -DB_ENDIAN -Wa,-force_cpusubtype_ALL::-D_REENTRANT:MACOSX:-Wl,-search_paths_first%:BN_LLONG RC4_CHAR RC4_CHUNK DES_UNROLL BF_PTR:${ppc32_asm}:osx32:dlfcn:darwin-shared:-fPIC -fno-common:-arch ppc -dynamiclib:.\$(SHLIB_MAJOR).\$(SHLIB_MINOR).dylib",
 | 
			
		||||
"darwin64-ppc-cc","cc:-arch ppc64 -O3 -DB_ENDIAN::-D_REENTRANT:MACOSX:-Wl,-search_paths_first%:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_UNROLL BF_PTR:${ppc64_asm}:osx64:dlfcn:darwin-shared:-fPIC -fno-common:-arch ppc64 -dynamiclib:.\$(SHLIB_MAJOR).\$(SHLIB_MINOR).dylib",
 | 
			
		||||
"darwin-i386-cc","cc:-arch i386 -O3 -fomit-frame-pointer -DL_ENDIAN::-D_REENTRANT:MACOSX:-Wl,-search_paths_first%:BN_LLONG RC4_INT RC4_CHUNK DES_UNROLL BF_PTR:${x86_asm}:macosx:dlfcn:darwin-shared:-fPIC -fno-common:-arch i386 -dynamiclib:.\$(SHLIB_MAJOR).\$(SHLIB_MINOR).dylib",
 | 
			
		||||
"darwin-i386-cc","cc:-arch i386 -O3 -fomit-frame-pointer -DL_ENDIAN::-D_REENTRANT:MACOSX:-Wl,-search_paths_first%:BN_LLONG RC4_INT RC4_CHUNK DES_UNROLL BF_PTR:".eval{my $asm=$x86_asm;$asm=~s/cast\-586\.o//;$asm}.":macosx:dlfcn:darwin-shared:-fPIC -fno-common:-arch i386 -dynamiclib:.\$(SHLIB_MAJOR).\$(SHLIB_MINOR).dylib",
 | 
			
		||||
"debug-darwin-i386-cc","cc:-arch i386 -g3 -DL_ENDIAN::-D_REENTRANT:MACOSX:-Wl,-search_paths_first%:BN_LLONG RC4_INT RC4_CHUNK DES_UNROLL BF_PTR:${x86_asm}:macosx:dlfcn:darwin-shared:-fPIC -fno-common:-arch i386 -dynamiclib:.\$(SHLIB_MAJOR).\$(SHLIB_MINOR).dylib",
 | 
			
		||||
"darwin64-x86_64-cc","cc:-arch x86_64 -O3 -DL_ENDIAN -DMD32_REG_T=int -Wall::-D_REENTRANT:MACOSX:-Wl,-search_paths_first%:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL:".eval{my $asm=$x86_64_asm;$asm=~s/rc4\-[^:]+//;$asm}.":macosx:dlfcn:darwin-shared:-fPIC -fno-common:-arch x86_64 -dynamiclib:.\$(SHLIB_MAJOR).\$(SHLIB_MINOR).dylib",
 | 
			
		||||
"darwin64-x86_64-cc","cc:-arch x86_64 -O3 -DL_ENDIAN -Wall::-D_REENTRANT:MACOSX:-Wl,-search_paths_first%:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL:".eval{my $asm=$x86_64_asm;$asm=~s/rc4\-[^:]+//;$asm}.":macosx:dlfcn:darwin-shared:-fPIC -fno-common:-arch x86_64 -dynamiclib:.\$(SHLIB_MAJOR).\$(SHLIB_MINOR).dylib",
 | 
			
		||||
"debug-darwin-ppc-cc","cc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DCRYPTO_MDEBUG -DB_ENDIAN -g -Wall -O::-D_REENTRANT:MACOSX::BN_LLONG RC4_CHAR RC4_CHUNK DES_UNROLL BF_PTR:${ppc32_asm}:osx32:dlfcn:darwin-shared:-fPIC:-dynamiclib:.\$(SHLIB_MAJOR).\$(SHLIB_MINOR).dylib",
 | 
			
		||||
# iPhoneOS/iOS
 | 
			
		||||
"iphoneos-cross","llvm-gcc:-O3 -isysroot \$(CROSS_TOP)/SDKs/\$(CROSS_SDK) -fomit-frame-pointer -fno-common::-D_REENTRANT:iOS:-Wl,-search_paths_first%:BN_LLONG RC4_CHAR RC4_CHUNK DES_UNROLL BF_PTR:${no_asm}:dlfcn:darwin-shared:-fPIC -fno-common:-dynamiclib:.\$(SHLIB_MAJOR).\$(SHLIB_MINOR).dylib",
 | 
			
		||||
 | 
			
		||||
##### A/UX
 | 
			
		||||
"aux3-gcc","gcc:-O2 -DTERMIO::(unknown):AUX:-lbsd:RC4_CHAR RC4_CHUNK DES_UNROLL BF_PTR:::",
 | 
			
		||||
@@ -564,24 +593,27 @@ my %table=(
 | 
			
		||||
"newsos4-gcc","gcc:-O -DB_ENDIAN::(unknown):NEWS4:-lmld -liberty:BN_LLONG RC4_CHAR RC4_CHUNK DES_PTR DES_RISC1 DES_UNROLL BF_PTR::::",
 | 
			
		||||
 | 
			
		||||
##### GNU Hurd
 | 
			
		||||
"hurd-x86",  "gcc:-DL_ENDIAN -DTERMIOS -O3 -fomit-frame-pointer -march=i486 -Wall::-D_REENTRANT::-ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn:linux-shared:-fPIC",
 | 
			
		||||
"hurd-x86",  "gcc:-DL_ENDIAN -O3 -fomit-frame-pointer -march=i486 -Wall::-D_REENTRANT::-ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn:linux-shared:-fPIC",
 | 
			
		||||
 | 
			
		||||
##### OS/2 EMX
 | 
			
		||||
"OS2-EMX", "gcc::::::::",
 | 
			
		||||
 | 
			
		||||
##### VxWorks for various targets
 | 
			
		||||
"vxworks-ppc60x","ccppc:-D_REENTRANT -mrtp -mhard-float -mstrict-align -fno-implicit-fp -DPPC32_fp60x -O2 -fstrength-reduce -fno-builtin -fno-strict-aliasing -Wall -DCPU=PPC32 -DTOOL_FAMILY=gnu -DTOOL=gnu -I\$(WIND_BASE)/target/usr/h -I\$(WIND_BASE)/target/usr/h/wrn/coreip:::VXWORKS:-Wl,--defsym,__wrs_rtp_base=0xe0000000 -L \$(WIND_BASE)/target/usr/lib/ppc/PPC32/common:::::",
 | 
			
		||||
"vxworks-ppcgen","ccppc:-D_REENTRANT -mrtp -msoft-float -mstrict-align -O1 -fno-builtin -fno-strict-aliasing -Wall -DCPU=PPC32 -DTOOL_FAMILY=gnu -DTOOL=gnu -I\$(WIND_BASE)/target/usr/h -I\$(WIND_BASE)/target/usr/h/wrn/coreip:::VXWORKS:-Wl,--defsym,__wrs_rtp_base=0xe0000000 -L \$(WIND_BASE)/target/usr/lib/ppc/PPC32/sfcommon:::::",
 | 
			
		||||
"vxworks-ppc405","ccppc:-g -msoft-float -mlongcall -DCPU=PPC405 -I\$(WIND_BASE)/target/h:::VXWORKS:-r:::::",
 | 
			
		||||
"vxworks-ppc750","ccppc:-ansi -nostdinc -DPPC750 -D_REENTRANT -fvolatile -fno-builtin -fno-for-scope -fsigned-char -Wall -msoft-float -mlongcall -DCPU=PPC604 -I\$(WIND_BASE)/target/h \$(DEBUG_FLAG):::VXWORKS:-r:::::",
 | 
			
		||||
"vxworks-ppc750-debug","ccppc:-ansi -nostdinc -DPPC750 -D_REENTRANT -fvolatile -fno-builtin -fno-for-scope -fsigned-char -Wall -msoft-float -mlongcall -DCPU=PPC604 -I\$(WIND_BASE)/target/h -DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG -DPEDANTIC -DDEBUG_SAFESTACK -DDEBUG -g:::VXWORKS:-r:::::",
 | 
			
		||||
"vxworks-ppc860","ccppc:-nostdinc -msoft-float -DCPU=PPC860 -DNO_STRINGS_H -I\$(WIND_BASE)/target/h:::VXWORKS:-r:::::",
 | 
			
		||||
"vxworks-mipsle","ccmips:-B\$(WIND_BASE)/host/\$(WIND_HOST_TYPE)/lib/gcc-lib/ -DL_ENDIAN -EL -Wl,-EL -mips2 -mno-branch-likely -G 0 -fno-builtin -msoft-float -DCPU=MIPS32 -DMIPSEL -DNO_STRINGS_H -I\$(WIND_BASE)/target/h:::VXWORKS:-r::${no_asm}::::::ranlibmips:",
 | 
			
		||||
"vxworks-simlinux","ccpentium:-B\$(WIND_BASE)/host/\$(WIND_HOST_TYPE)/lib/gcc-lib/ -D_VSB_CONFIG_FILE=\"\$(WIND_BASE)/target/lib/h/config/vsbConfig.h\" -DL_ENDIAN -DCPU=SIMLINUX -DTOOL_FAMILY=gnu -DTOOL=gnu -fno-builtin -fno-defer-pop -DNO_STRINGS_H -I\$(WIND_BASE)/target/h -I\$(WIND_BASE)/target/h/wrn/coreip -DOPENSSL_NO_HW_PADLOCK:::VXWORKS:-r::${no_asm}::::::ranlibpentium:",
 | 
			
		||||
"vxworks-mips","ccmips:-mrtp -mips2 -O -G 0 -B\$(WIND_BASE)/host/\$(WIND_HOST_TYPE)/lib/gcc-lib/ -D_VSB_CONFIG_FILE=\"\$(WIND_BASE)/target/lib/h/config/vsbConfig.h\" -DCPU=MIPS32 -msoft-float -mno-branch-likely -DTOOL_FAMILY=gnu -DTOOL=gnu -fno-builtin -fno-defer-pop -DNO_STRINGS_H -I\$(WIND_BASE)/target/usr/h -I\$(WIND_BASE)/target/h/wrn/coreip::-D_REENTRANT:VXWORKS:-Wl,--defsym,__wrs_rtp_base=0xe0000000 -L \$(WIND_BASE)/target/usr/lib/mips/MIPSI32/sfcommon::${mips32_asm}:o32::::::ranlibmips:",
 | 
			
		||||
 | 
			
		||||
##### Compaq Non-Stop Kernel (Tandem)
 | 
			
		||||
"tandem-c89","c89:-Ww -D__TANDEM -D_XOPEN_SOURCE -D_XOPEN_SOURCE_EXTENDED=1 -D_TANDEM_SOURCE -DB_ENDIAN::(unknown):::THIRTY_TWO_BIT:::",
 | 
			
		||||
 | 
			
		||||
# uClinux
 | 
			
		||||
"uClinux-dist","$ENV{'CC'}:\$(CFLAGS)::-D_REENTRANT::\$(LDFLAGS) \$(LDLIBS):BN_LLONG:::::::::::::::$ENV{'LIBSSL_dlfcn'}:linux-shared:-fPIC:-shared:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):$ENV{'RANLIB'}::",
 | 
			
		||||
"uClinux-dist64","$ENV{'CC'}:\$(CFLAGS)::-D_REENTRANT::\$(LDFLAGS) \$(LDLIBS):SIXTY_FOUR_BIT_LONG:::::::::::::::$ENV{'LIBSSL_dlfcn'}:linux-shared:-fPIC:-shared:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):$ENV{'RANLIB'}::",
 | 
			
		||||
"uClinux-dist","$ENV{'CC'}:\$(CFLAGS)::-D_REENTRANT::\$(LDFLAGS) \$(LDLIBS):BN_LLONG:${no_asm}:$ENV{'LIBSSL_dlfcn'}:linux-shared:-fPIC:-shared:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):$ENV{'RANLIB'}::",
 | 
			
		||||
"uClinux-dist64","$ENV{'CC'}:\$(CFLAGS)::-D_REENTRANT::\$(LDFLAGS) \$(LDLIBS):SIXTY_FOUR_BIT_LONG:${no_asm}:$ENV{'LIBSSL_dlfcn'}:linux-shared:-fPIC:-shared:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):$ENV{'RANLIB'}::",
 | 
			
		||||
 | 
			
		||||
);
 | 
			
		||||
 | 
			
		||||
@@ -613,6 +645,8 @@ my $idx_rmd160_obj = $idx++;
 | 
			
		||||
my $idx_rc5_obj = $idx++;
 | 
			
		||||
my $idx_wp_obj = $idx++;
 | 
			
		||||
my $idx_cmll_obj = $idx++;
 | 
			
		||||
my $idx_modes_obj = $idx++;
 | 
			
		||||
my $idx_engines_obj = $idx++;
 | 
			
		||||
my $idx_perlasm_scheme = $idx++;
 | 
			
		||||
my $idx_dso_scheme = $idx++;
 | 
			
		||||
my $idx_shared_target = $idx++;
 | 
			
		||||
@@ -629,6 +663,9 @@ my $openssldir="";
 | 
			
		||||
my $exe_ext="";
 | 
			
		||||
my $install_prefix= "$ENV{'INSTALL_PREFIX'}";
 | 
			
		||||
my $cross_compile_prefix="";
 | 
			
		||||
my $fipsdir="/usr/local/ssl/fips-2.0";
 | 
			
		||||
my $fipslibdir="";
 | 
			
		||||
my $baseaddr="0xFB00000";
 | 
			
		||||
my $no_threads=0;
 | 
			
		||||
my $threads=0;
 | 
			
		||||
my $no_shared=0; # but "no-shared" is default
 | 
			
		||||
@@ -663,26 +700,35 @@ my $cmll_enc="camellia.o cmll_misc.o cmll_cbc.o";
 | 
			
		||||
my $processor="";
 | 
			
		||||
my $default_ranlib;
 | 
			
		||||
my $perl;
 | 
			
		||||
my $fips=0;
 | 
			
		||||
 | 
			
		||||
if (exists $ENV{FIPSDIR})
 | 
			
		||||
	{
 | 
			
		||||
	$fipsdir = $ENV{FIPSDIR};
 | 
			
		||||
	$fipsdir =~ s/\/$//;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
# All of the following is disabled by default (RC5 was enabled before 0.9.8):
 | 
			
		||||
 | 
			
		||||
my %disabled = ( # "what"         => "comment" [or special keyword "experimental"]
 | 
			
		||||
		 "ec_nistp_64_gcc_128" => "default",
 | 
			
		||||
		 "gmp"		  => "default",
 | 
			
		||||
                 "jpake"          => "experimental",
 | 
			
		||||
                 "md2"            => "default",
 | 
			
		||||
                 "rc5"            => "default",
 | 
			
		||||
		 "jpake"          => "experimental",
 | 
			
		||||
		 "md2"            => "default",
 | 
			
		||||
		 "rc5"            => "default",
 | 
			
		||||
		 "rfc3779"	  => "default",
 | 
			
		||||
                 "shared"         => "default",
 | 
			
		||||
		 "sctp"       => "default",
 | 
			
		||||
		 "shared"         => "default",
 | 
			
		||||
		 "store"	  => "experimental",
 | 
			
		||||
                 "zlib"           => "default",
 | 
			
		||||
                 "zlib-dynamic"   => "default"
 | 
			
		||||
               );
 | 
			
		||||
		 "unit-test"	  => "default",
 | 
			
		||||
		 "zlib"           => "default",
 | 
			
		||||
		 "zlib-dynamic"   => "default"
 | 
			
		||||
	       );
 | 
			
		||||
my @experimental = ();
 | 
			
		||||
 | 
			
		||||
# This is what $depflags will look like with the above defaults
 | 
			
		||||
# (we need this to see if we should advise the user to run "make depend"):
 | 
			
		||||
my $default_depflags = " -DOPENSSL_NO_GMP -DOPENSSL_NO_JPAKE -DOPENSSL_NO_MD2 -DOPENSSL_NO_RC5 -DOPENSSL_NO_RFC3779 -DOPENSSL_NO_STORE";
 | 
			
		||||
my $default_depflags = " -DOPENSSL_NO_EC_NISTP_64_GCC_128 -DOPENSSL_NO_GMP -DOPENSSL_NO_JPAKE -DOPENSSL_NO_MD2 -DOPENSSL_NO_RC5 -DOPENSSL_NO_RFC3779 -DOPENSSL_NO_SCTP -DOPENSSL_NO_STORE -DOPENSSL_NO_UNIT_TEST";
 | 
			
		||||
 | 
			
		||||
# Explicit "no-..." options will be collected in %disabled along with the defaults.
 | 
			
		||||
# To remove something from %disabled, use "enable-foo" (unless it's experimental).
 | 
			
		||||
@@ -740,6 +786,7 @@ PROCESS_ARGS:
 | 
			
		||||
 | 
			
		||||
		# rewrite some options in "enable-..." form
 | 
			
		||||
		s /^-?-?shared$/enable-shared/;
 | 
			
		||||
		s /^sctp$/enable-sctp/;
 | 
			
		||||
		s /^threads$/enable-threads/;
 | 
			
		||||
		s /^zlib$/enable-zlib/;
 | 
			
		||||
		s /^zlib-dynamic$/enable-zlib-dynamic/;
 | 
			
		||||
@@ -757,6 +804,11 @@ PROCESS_ARGS:
 | 
			
		||||
					{
 | 
			
		||||
					$disabled{"tls1"} = "option(tls)"
 | 
			
		||||
					}
 | 
			
		||||
				elsif ($1 eq "ssl3-method")
 | 
			
		||||
					{
 | 
			
		||||
					$disabled{"ssl3-method"} = "option(ssl)";
 | 
			
		||||
					$disabled{"ssl3"} = "option(ssl)";
 | 
			
		||||
					}
 | 
			
		||||
				else
 | 
			
		||||
					{
 | 
			
		||||
					$disabled{$1} = "option";
 | 
			
		||||
@@ -809,6 +861,10 @@ PROCESS_ARGS:
 | 
			
		||||
			}
 | 
			
		||||
		elsif (/^386$/)
 | 
			
		||||
			{ $processor=386; }
 | 
			
		||||
		elsif (/^fips$/)
 | 
			
		||||
			{
 | 
			
		||||
			$fips=1;
 | 
			
		||||
			}
 | 
			
		||||
		elsif (/^rsaref$/)
 | 
			
		||||
			{
 | 
			
		||||
			# No RSAref support any more since it's not needed.
 | 
			
		||||
@@ -823,6 +879,7 @@ PROCESS_ARGS:
 | 
			
		||||
				}
 | 
			
		||||
			elsif (/^-[^-]/ or /^\+/)
 | 
			
		||||
				{
 | 
			
		||||
				$_ =~ s/%([0-9a-f]{1,2})/chr(hex($1))/gei;
 | 
			
		||||
				$flags.=$_." ";
 | 
			
		||||
				}
 | 
			
		||||
			elsif (/^--prefix=(.*)$/)
 | 
			
		||||
@@ -853,6 +910,18 @@ PROCESS_ARGS:
 | 
			
		||||
				{
 | 
			
		||||
				$withargs{"zlib-include"}="-I$1";
 | 
			
		||||
				}
 | 
			
		||||
			elsif (/^--with-fipsdir=(.*)$/)
 | 
			
		||||
				{
 | 
			
		||||
				$fipsdir="$1";
 | 
			
		||||
				}
 | 
			
		||||
			elsif (/^--with-fipslibdir=(.*)$/)
 | 
			
		||||
				{
 | 
			
		||||
				$fipslibdir="$1";
 | 
			
		||||
				}
 | 
			
		||||
			elsif (/^--with-baseaddr=(.*)$/)
 | 
			
		||||
				{
 | 
			
		||||
				$baseaddr="$1";
 | 
			
		||||
				}
 | 
			
		||||
			elsif (/^--cross-compile-prefix=(.*)$/)
 | 
			
		||||
				{
 | 
			
		||||
				$cross_compile_prefix=$1;
 | 
			
		||||
@@ -927,6 +996,17 @@ if (defined($disabled{"md5"}) || defined($disabled{"rsa"}))
 | 
			
		||||
	$disabled{"ssl2"} = "forced";
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
if ($fips && $fipslibdir eq "")
 | 
			
		||||
	{
 | 
			
		||||
	$fipslibdir = $fipsdir . "/lib/";
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
# RSAX ENGINE sets default non-FIPS RSA method.
 | 
			
		||||
if ($fips)
 | 
			
		||||
	{
 | 
			
		||||
	$disabled{"rsax"} = "forced";
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
# SSL 3.0 and TLS requires MD5 and SHA and either RSA or DSA+DH
 | 
			
		||||
if (defined($disabled{"md5"}) || defined($disabled{"sha"})
 | 
			
		||||
    || (defined($disabled{"rsa"})
 | 
			
		||||
@@ -947,6 +1027,13 @@ if (defined($disabled{"ec"}) || defined($disabled{"dsa"})
 | 
			
		||||
	$disabled{"gost"} = "forced";
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
# SRP and HEARTBEATS require TLSEXT
 | 
			
		||||
if (defined($disabled{"tlsext"}))
 | 
			
		||||
	{
 | 
			
		||||
	$disabled{"srp"} = "forced";
 | 
			
		||||
	$disabled{"heartbeats"} = "forced";
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
if ($target eq "TABLE") {
 | 
			
		||||
	foreach $target (sort keys %table) {
 | 
			
		||||
		print_table_entry($target);
 | 
			
		||||
@@ -996,7 +1083,7 @@ foreach (sort (keys %disabled))
 | 
			
		||||
	else
 | 
			
		||||
		{
 | 
			
		||||
		my ($ALGO, $algo);
 | 
			
		||||
		($ALGO = $algo = $_) =~ tr/[a-z]/[A-Z]/;
 | 
			
		||||
		($ALGO = $algo = $_) =~ tr/[\-a-z]/[_A-Z]/;
 | 
			
		||||
 | 
			
		||||
		if (/^asm$/ || /^err$/ || /^hw$/ || /^hw-/)
 | 
			
		||||
			{
 | 
			
		||||
@@ -1088,6 +1175,8 @@ my $rmd160_obj = $fields[$idx_rmd160_obj];
 | 
			
		||||
my $rc5_obj = $fields[$idx_rc5_obj];
 | 
			
		||||
my $wp_obj = $fields[$idx_wp_obj];
 | 
			
		||||
my $cmll_obj = $fields[$idx_cmll_obj];
 | 
			
		||||
my $modes_obj = $fields[$idx_modes_obj];
 | 
			
		||||
my $engines_obj = $fields[$idx_engines_obj];
 | 
			
		||||
my $perlasm_scheme = $fields[$idx_perlasm_scheme];
 | 
			
		||||
my $dso_scheme = $fields[$idx_dso_scheme];
 | 
			
		||||
my $shared_target = $fields[$idx_shared_target];
 | 
			
		||||
@@ -1248,7 +1337,7 @@ if ($no_asm)
 | 
			
		||||
	{
 | 
			
		||||
	$cpuid_obj=$bn_obj=
 | 
			
		||||
	$des_obj=$aes_obj=$bf_obj=$cast_obj=$rc4_obj=$rc5_obj=$cmll_obj=
 | 
			
		||||
	$sha1_obj=$md5_obj=$rmd160_obj=$wp_obj="";
 | 
			
		||||
	$modes_obj=$sha1_obj=$md5_obj=$rmd160_obj=$wp_obj=$engines_obj="";
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
if (!$no_shared)
 | 
			
		||||
@@ -1312,7 +1401,7 @@ if (!$IsMK1MF)
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
$cpuid_obj.=" uplink.o uplink-cof.o" if ($cflags =~ /\-DOPENSSL_USE_APPLINK/);
 | 
			
		||||
$cpuid_obj.=" uplink.o uplink-x86.o" if ($cflags =~ /\-DOPENSSL_USE_APPLINK/);
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Platform fix-ups
 | 
			
		||||
@@ -1380,6 +1469,14 @@ $cflags.=" -DOPENSSL_BN_ASM_PART_WORDS" if ($bn_obj =~ /bn-586/);
 | 
			
		||||
$cflags.=" -DOPENSSL_IA32_SSE2" if (!$no_sse2 && $bn_obj =~ /86/);
 | 
			
		||||
 | 
			
		||||
$cflags.=" -DOPENSSL_BN_ASM_MONT" if ($bn_obj =~ /-mont/);
 | 
			
		||||
$cflags.=" -DOPENSSL_BN_ASM_MONT5" if ($bn_obj =~ /-mont5/);
 | 
			
		||||
$cflags.=" -DOPENSSL_BN_ASM_GF2m" if ($bn_obj =~ /-gf2m/);
 | 
			
		||||
 | 
			
		||||
if ($fips)
 | 
			
		||||
	{
 | 
			
		||||
	$openssl_other_defines.="#define OPENSSL_FIPS\n";
 | 
			
		||||
	$cflags .= " -I\$(FIPSDIR)/include";
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
$cpuid_obj="mem_clr.o"	unless ($cpuid_obj =~ /\.o$/);
 | 
			
		||||
$des_obj=$des_enc	unless ($des_obj =~ /\.o$/);
 | 
			
		||||
@@ -1413,6 +1510,14 @@ if ($rmd160_obj =~ /\.o$/)
 | 
			
		||||
if ($aes_obj =~ /\.o$/)
 | 
			
		||||
	{
 | 
			
		||||
	$cflags.=" -DAES_ASM";
 | 
			
		||||
	# aes-ctr.o is not a real file, only indication that assembler
 | 
			
		||||
	# module implements AES_ctr32_encrypt...
 | 
			
		||||
	$cflags.=" -DAES_CTR_ASM" if ($aes_obj =~ s/\s*aes\-ctr\.o//);
 | 
			
		||||
	# aes-xts.o indicates presense of AES_xts_[en|de]crypt...
 | 
			
		||||
	$cflags.=" -DAES_XTS_ASM" if ($aes_obj =~ s/\s*aes\-xts\.o//);
 | 
			
		||||
	$aes_obj =~ s/\s*(vpaes|aesni)\-x86\.o//g if ($no_sse2);
 | 
			
		||||
	$cflags.=" -DVPAES_ASM" if ($aes_obj =~ m/vpaes/);
 | 
			
		||||
	$cflags.=" -DBSAES_ASM" if ($aes_obj =~ m/bsaes/);
 | 
			
		||||
	}
 | 
			
		||||
else	{
 | 
			
		||||
	$aes_obj=$aes_enc;
 | 
			
		||||
@@ -1426,6 +1531,10 @@ else	{
 | 
			
		||||
	$wp_obj="wp_block.o";
 | 
			
		||||
	}
 | 
			
		||||
$cmll_obj=$cmll_enc	unless ($cmll_obj =~ /.o$/);
 | 
			
		||||
if ($modes_obj =~ /ghash/)
 | 
			
		||||
	{
 | 
			
		||||
	$cflags.=" -DGHASH_ASM";
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
# "Stringify" the C flags string.  This permits it to be made part of a string
 | 
			
		||||
# and works as well on command lines.
 | 
			
		||||
@@ -1540,6 +1649,8 @@ while (<IN>)
 | 
			
		||||
	s/^RMD160_ASM_OBJ=.*$/RMD160_ASM_OBJ= $rmd160_obj/;
 | 
			
		||||
	s/^WP_ASM_OBJ=.*$/WP_ASM_OBJ= $wp_obj/;
 | 
			
		||||
	s/^CMLL_ENC=.*$/CMLL_ENC= $cmll_obj/;
 | 
			
		||||
	s/^MODES_ASM_OBJ.=*$/MODES_ASM_OBJ= $modes_obj/;
 | 
			
		||||
	s/^ENGINES_ASM_OBJ.=*$/ENGINES_ASM_OBJ= $engines_obj/;
 | 
			
		||||
	s/^PERLASM_SCHEME=.*$/PERLASM_SCHEME= $perlasm_scheme/;
 | 
			
		||||
	s/^PROCESSOR=.*/PROCESSOR= $processor/;
 | 
			
		||||
	s/^ARFLAGS=.*/ARFLAGS= $arflags/;
 | 
			
		||||
@@ -1548,6 +1659,12 @@ while (<IN>)
 | 
			
		||||
	s/^LIBKRB5=.*/LIBKRB5=$withargs{"krb5-lib"}/;
 | 
			
		||||
	s/^LIBZLIB=.*/LIBZLIB=$withargs{"zlib-lib"}/;
 | 
			
		||||
	s/^ZLIB_INCLUDE=.*/ZLIB_INCLUDE=$withargs{"zlib-include"}/;
 | 
			
		||||
 | 
			
		||||
	s/^FIPSDIR=.*/FIPSDIR=$fipsdir/;
 | 
			
		||||
	s/^FIPSLIBDIR=.*/FIPSLIBDIR=$fipslibdir/;
 | 
			
		||||
	s/^FIPSCANLIB=.*/FIPSCANLIB=libcrypto/ if $fips;
 | 
			
		||||
	s/^BASEADDR=.*/BASEADDR=$baseaddr/;
 | 
			
		||||
 | 
			
		||||
	s/^SHLIB_TARGET=.*/SHLIB_TARGET=$shared_target/;
 | 
			
		||||
	s/^SHLIB_MARK=.*/SHLIB_MARK=$shared_mark/;
 | 
			
		||||
	s/^SHARED_LIBS=.*/SHARED_LIBS=\$(SHARED_CRYPTO) \$(SHARED_SSL)/ if (!$no_shared);
 | 
			
		||||
@@ -1591,7 +1708,9 @@ print "RC5_ENC       =$rc5_obj\n";
 | 
			
		||||
print "MD5_OBJ_ASM   =$md5_obj\n";
 | 
			
		||||
print "SHA1_OBJ_ASM  =$sha1_obj\n";
 | 
			
		||||
print "RMD160_OBJ_ASM=$rmd160_obj\n";
 | 
			
		||||
print "CMLL_ENC=     =$cmll_obj\n";
 | 
			
		||||
print "CMLL_ENC      =$cmll_obj\n";
 | 
			
		||||
print "MODES_OBJ     =$modes_obj\n";
 | 
			
		||||
print "ENGINES_OBJ   =$engines_obj\n";
 | 
			
		||||
print "PROCESSOR     =$processor\n";
 | 
			
		||||
print "RANLIB        =$ranlib\n";
 | 
			
		||||
print "ARFLAGS       =$arflags\n";
 | 
			
		||||
@@ -1653,6 +1772,9 @@ open(OUT,'>crypto/opensslconf.h.new') || die "unable to create crypto/opensslcon
 | 
			
		||||
print OUT "/* opensslconf.h */\n";
 | 
			
		||||
print OUT "/* WARNING: Generated automatically from opensslconf.h.in by Configure. */\n\n";
 | 
			
		||||
 | 
			
		||||
print OUT "#ifdef  __cplusplus\n";
 | 
			
		||||
print OUT "extern \"C\" {\n";
 | 
			
		||||
print OUT "#endif\n";
 | 
			
		||||
print OUT "/* OpenSSL was configured with the following options: */\n";
 | 
			
		||||
my $openssl_algorithm_defines_trans = $openssl_algorithm_defines;
 | 
			
		||||
$openssl_experimental_defines =~ s/^\s*#\s*define\s+OPENSSL_NO_(.*)/#ifndef OPENSSL_EXPERIMENTAL_$1\n# ifndef OPENSSL_NO_$1\n#  define OPENSSL_NO_$1\n# endif\n#endif/mg;
 | 
			
		||||
@@ -1757,6 +1879,9 @@ while (<IN>)
 | 
			
		||||
		{ print OUT $_; }
 | 
			
		||||
	}
 | 
			
		||||
close(IN);
 | 
			
		||||
print OUT "#ifdef  __cplusplus\n";
 | 
			
		||||
print OUT "}\n";
 | 
			
		||||
print OUT "#endif\n";
 | 
			
		||||
close(OUT);
 | 
			
		||||
rename("crypto/opensslconf.h","crypto/opensslconf.h.bak") || die "unable to rename crypto/opensslconf.h\n" if -e "crypto/opensslconf.h";
 | 
			
		||||
rename("crypto/opensslconf.h.new","crypto/opensslconf.h") || die "unable to rename crypto/opensslconf.h.new\n";
 | 
			
		||||
@@ -1984,7 +2109,8 @@ sub print_table_entry
 | 
			
		||||
	(my $cc,my $cflags,my $unistd,my $thread_cflag,my $sys_id,my $lflags,
 | 
			
		||||
	my $bn_ops,my $cpuid_obj,my $bn_obj,my $des_obj,my $aes_obj, my $bf_obj,
 | 
			
		||||
	my $md5_obj,my $sha1_obj,my $cast_obj,my $rc4_obj,my $rmd160_obj,
 | 
			
		||||
	my $rc5_obj,my $wp_obj,my $cmll_obj,my $perlasm_scheme,my $dso_scheme,my $shared_target,my $shared_cflag,
 | 
			
		||||
	my $rc5_obj,my $wp_obj,my $cmll_obj,my $modes_obj, my $engines_obj,
 | 
			
		||||
	my $perlasm_scheme,my $dso_scheme,my $shared_target,my $shared_cflag,
 | 
			
		||||
	my $shared_ldflag,my $shared_extension,my $ranlib,my $arflags,my $multilib)=
 | 
			
		||||
	split(/\s*:\s*/,$table{$target} . ":" x 30 , -1);
 | 
			
		||||
			
 | 
			
		||||
@@ -2011,6 +2137,8 @@ sub print_table_entry
 | 
			
		||||
\$rc5_obj      = $rc5_obj
 | 
			
		||||
\$wp_obj       = $wp_obj
 | 
			
		||||
\$cmll_obj     = $cmll_obj
 | 
			
		||||
\$modes_obj    = $modes_obj
 | 
			
		||||
\$engines_obj  = $engines_obj
 | 
			
		||||
\$perlasm_scheme = $perlasm_scheme
 | 
			
		||||
\$dso_scheme   = $dso_scheme
 | 
			
		||||
\$shared_target= $shared_target
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										97
									
								
								Makefile.org
									
									
									
									
									
								
							
							
						
						
									
										97
									
								
								Makefile.org
									
									
									
									
									
								
							@@ -69,7 +69,7 @@ RANLIB= ranlib
 | 
			
		||||
NM= nm
 | 
			
		||||
PERL= perl
 | 
			
		||||
TAR= tar
 | 
			
		||||
TARFLAGS= --no-recursion
 | 
			
		||||
TARFLAGS= --no-recursion --record-size=10240
 | 
			
		||||
MAKEDEPPROG=makedepend
 | 
			
		||||
LIBDIR=lib
 | 
			
		||||
 | 
			
		||||
@@ -99,6 +99,8 @@ SHA1_ASM_OBJ=
 | 
			
		||||
RMD160_ASM_OBJ= 
 | 
			
		||||
WP_ASM_OBJ=
 | 
			
		||||
CMLL_ENC=
 | 
			
		||||
MODES_ASM_OBJ=
 | 
			
		||||
ENGINES_ASM_OBJ=
 | 
			
		||||
PERLASM_SCHEME=
 | 
			
		||||
 | 
			
		||||
# KRB5 stuff
 | 
			
		||||
@@ -109,6 +111,30 @@ LIBKRB5=
 | 
			
		||||
ZLIB_INCLUDE=
 | 
			
		||||
LIBZLIB=
 | 
			
		||||
 | 
			
		||||
# TOP level FIPS install directory.
 | 
			
		||||
FIPSDIR=
 | 
			
		||||
 | 
			
		||||
# This is the location of fipscanister.o and friends.
 | 
			
		||||
# The FIPS module build will place it $(INSTALLTOP)/lib
 | 
			
		||||
# but since $(INSTALLTOP) can only take the default value
 | 
			
		||||
# when the module is built it will be in /usr/local/ssl/lib
 | 
			
		||||
# $(INSTALLTOP) for this build may be different so hard
 | 
			
		||||
# code the path.
 | 
			
		||||
 | 
			
		||||
FIPSLIBDIR=
 | 
			
		||||
 | 
			
		||||
# The location of the library which contains fipscanister.o
 | 
			
		||||
# normally it will be libcrypto unless fipsdso is set in which
 | 
			
		||||
# case it will be libfips. If not compiling in FIPS mode at all
 | 
			
		||||
# this is empty making it a useful test for a FIPS compile.
 | 
			
		||||
 | 
			
		||||
FIPSCANLIB=
 | 
			
		||||
 | 
			
		||||
# Shared library base address. Currently only used on Windows.
 | 
			
		||||
#
 | 
			
		||||
 | 
			
		||||
BASEADDR=
 | 
			
		||||
 | 
			
		||||
DIRS=   crypto ssl engines apps test tools
 | 
			
		||||
ENGDIRS= ccgost
 | 
			
		||||
SHLIBDIRS= crypto ssl
 | 
			
		||||
@@ -121,7 +147,7 @@ SDIRS=  \
 | 
			
		||||
	bn ec rsa dsa ecdsa dh ecdh dso engine \
 | 
			
		||||
	buffer bio stack lhash rand err \
 | 
			
		||||
	evp asn1 pem x509 x509v3 conf txt_db pkcs7 pkcs12 comp ocsp ui krb5 \
 | 
			
		||||
	cms pqueue ts jpake store
 | 
			
		||||
	cms pqueue ts jpake srp store cmac
 | 
			
		||||
# keep in mind that the above list is adjusted by ./Configure
 | 
			
		||||
# according to no-xxx arguments...
 | 
			
		||||
 | 
			
		||||
@@ -158,7 +184,7 @@ WTARFILE=       $(NAME)-win.tar
 | 
			
		||||
EXHEADER=       e_os2.h
 | 
			
		||||
HEADER=         e_os.h
 | 
			
		||||
 | 
			
		||||
all: Makefile build_all openssl.pc libssl.pc libcrypto.pc
 | 
			
		||||
all: Makefile build_all
 | 
			
		||||
 | 
			
		||||
# as we stick to -e, CLEARENV ensures that local variables in lower
 | 
			
		||||
# Makefiles remain local and variable. $${VAR+VAR} is tribute to Korn
 | 
			
		||||
@@ -204,7 +230,12 @@ BUILDENV=	PLATFORM='$(PLATFORM)' PROCESSOR='$(PROCESSOR)' \
 | 
			
		||||
		MD5_ASM_OBJ='$(MD5_ASM_OBJ)'			\
 | 
			
		||||
		RMD160_ASM_OBJ='$(RMD160_ASM_OBJ)'		\
 | 
			
		||||
		WP_ASM_OBJ='$(WP_ASM_OBJ)'			\
 | 
			
		||||
		MODES_ASM_OBJ='$(MODES_ASM_OBJ)'		\
 | 
			
		||||
		ENGINES_ASM_OBJ='$(ENGINES_ASM_OBJ)'		\
 | 
			
		||||
		PERLASM_SCHEME='$(PERLASM_SCHEME)'		\
 | 
			
		||||
		FIPSLIBDIR='${FIPSLIBDIR}'			\
 | 
			
		||||
		FIPSDIR='${FIPSDIR}'				\
 | 
			
		||||
		FIPSCANLIB="$${FIPSCANLIB:-$(FIPSCANLIB)}"	\
 | 
			
		||||
		THIS=$${THIS:-$@} MAKEFILE=Makefile MAKEOVERRIDES=
 | 
			
		||||
# MAKEOVERRIDES= effectively "equalizes" GNU-ish and SysV-ish make flavors,
 | 
			
		||||
# which in turn eliminates ambiguities in variable treatment with -e.
 | 
			
		||||
@@ -239,7 +270,10 @@ reflect:
 | 
			
		||||
sub_all: build_all
 | 
			
		||||
build_all: build_libs build_apps build_tests build_tools
 | 
			
		||||
 | 
			
		||||
build_libs: build_crypto build_ssl build_engines
 | 
			
		||||
build_libs: build_libcrypto build_libssl openssl.pc
 | 
			
		||||
 | 
			
		||||
build_libcrypto: build_crypto build_engines libcrypto.pc
 | 
			
		||||
build_libssl: build_ssl libssl.pc
 | 
			
		||||
 | 
			
		||||
build_crypto:
 | 
			
		||||
	@dir=crypto; target=all; $(BUILD_ONE_CMD)
 | 
			
		||||
@@ -258,9 +292,21 @@ all_testapps: build_libs build_testapps
 | 
			
		||||
build_testapps:
 | 
			
		||||
	@dir=crypto; target=testapps; $(BUILD_ONE_CMD)
 | 
			
		||||
 | 
			
		||||
libcrypto$(SHLIB_EXT): libcrypto.a
 | 
			
		||||
fips_premain_dso$(EXE_EXT): libcrypto.a
 | 
			
		||||
	[ -z "$(FIPSCANLIB)" ] || $(CC) $(CFLAG) -Iinclude \
 | 
			
		||||
		-DFINGERPRINT_PREMAIN_DSO_LOAD -o $@  \
 | 
			
		||||
		$(FIPSLIBDIR)fips_premain.c $(FIPSLIBDIR)fipscanister.o \
 | 
			
		||||
		libcrypto.a $(EX_LIBS)
 | 
			
		||||
 | 
			
		||||
libcrypto$(SHLIB_EXT): libcrypto.a fips_premain_dso$(EXE_EXT)
 | 
			
		||||
	@if [ "$(SHLIB_TARGET)" != "" ]; then \
 | 
			
		||||
		$(MAKE) SHLIBDIRS=crypto build-shared; \
 | 
			
		||||
		if [ "$(FIPSCANLIB)" = "libcrypto" ]; then \
 | 
			
		||||
			FIPSLD_LIBCRYPTO=libcrypto.a ; \
 | 
			
		||||
			FIPSLD_CC="$(CC)"; CC=$(FIPSDIR)/bin/fipsld; \
 | 
			
		||||
			export CC FIPSLD_CC FIPSLD_LIBCRYPTO; \
 | 
			
		||||
		fi; \
 | 
			
		||||
		$(MAKE) -e SHLIBDIRS=crypto  CC="$${CC:-$(CC)}" build-shared && \
 | 
			
		||||
		(touch -c fips_premain_dso$(EXE_EXT) || :); \
 | 
			
		||||
	else \
 | 
			
		||||
		echo "There's no support for shared libraries on this platform" >&2; \
 | 
			
		||||
		exit 1; \
 | 
			
		||||
@@ -360,7 +406,7 @@ Makefile: Makefile.org Configure config
 | 
			
		||||
	@false
 | 
			
		||||
 | 
			
		||||
libclean:
 | 
			
		||||
	rm -f *.map *.so *.so.* *.dll engines/*.so engines/*.dll *.a engines/*.a */lib */*/lib
 | 
			
		||||
	rm -f *.map *.so *.so.* *.dylib *.dll engines/*.so engines/*.dll engines/*.dylib *.a engines/*.a */lib */*/lib
 | 
			
		||||
 | 
			
		||||
clean:	libclean
 | 
			
		||||
	rm -f shlib/*.o *.o core a.out fluff rehash.time testlog make.log cctest cctest.c
 | 
			
		||||
@@ -402,7 +448,7 @@ rehash.time: certs apps
 | 
			
		||||
		[ -x "apps/openssl.exe" ] && OPENSSL="apps/openssl.exe" || :; \
 | 
			
		||||
		OPENSSL_DEBUG_MEMORY=on; \
 | 
			
		||||
		export OPENSSL OPENSSL_DEBUG_MEMORY; \
 | 
			
		||||
		$(PERL) tools/c_rehash certs) && \
 | 
			
		||||
		$(PERL) tools/c_rehash certs/demo) && \
 | 
			
		||||
		touch rehash.time; \
 | 
			
		||||
	else :; fi
 | 
			
		||||
 | 
			
		||||
@@ -430,9 +476,9 @@ tags:
 | 
			
		||||
	find . -name '[^.]*.[ch]' | xargs etags -a
 | 
			
		||||
 | 
			
		||||
errors:
 | 
			
		||||
	$(PERL) util/ck_errf.pl -strict */*.c */*/*.c
 | 
			
		||||
	$(PERL) util/mkerr.pl -recurse -write
 | 
			
		||||
	(cd engines; $(MAKE) PERL=$(PERL) errors)
 | 
			
		||||
	$(PERL) util/ck_errf.pl */*.c */*/*.c
 | 
			
		||||
 | 
			
		||||
stacks:
 | 
			
		||||
	$(PERL) util/mkstack.pl -write
 | 
			
		||||
@@ -452,28 +498,25 @@ TABLE: Configure
 | 
			
		||||
# would occur. Therefore the list of files is temporarily stored into a file
 | 
			
		||||
# and read directly, requiring GNU-Tar. Call "make TAR=gtar dist" if the normal
 | 
			
		||||
# tar does not support the --files-from option.
 | 
			
		||||
TAR_COMMAND=$(TAR) $(TARFLAGS) --files-from ../$(TARFILE).list \
 | 
			
		||||
	                       --owner openssl:0 --group openssl:0 \
 | 
			
		||||
			       --transform 's|^|openssl-$(VERSION)/|' \
 | 
			
		||||
			       -cvf -
 | 
			
		||||
 | 
			
		||||
../$(TARFILE).list:
 | 
			
		||||
	find * \! -name STATUS \! -name TABLE \! -name '*.o' \! -name '*.a' \
 | 
			
		||||
	       \! -name '*.so' \! -name '*.so.*'  \! -name 'openssl' \
 | 
			
		||||
	       \! -name '*test' \! -name '.#*' \! -name '*~' \
 | 
			
		||||
	    | sort > ../$(TARFILE).list
 | 
			
		||||
 | 
			
		||||
tar: ../$(TARFILE).list
 | 
			
		||||
tar:
 | 
			
		||||
	find . -type d -print | xargs chmod 755
 | 
			
		||||
	find . -type f -print | xargs chmod a+r
 | 
			
		||||
	find . -type f -perm -0100 -print | xargs chmod a+x
 | 
			
		||||
	$(TAR_COMMAND) | gzip --best >../$(TARFILE).gz
 | 
			
		||||
	rm -f ../$(TARFILE).list
 | 
			
		||||
	find * \! -path CVS/\* \! -path \*/CVS/\* \! -name CVS \! -name .cvsignore \! -name STATUS \! -name TABLE | sort > ../$(TARFILE).list; \
 | 
			
		||||
	$(TAR) $(TARFLAGS) --files-from ../$(TARFILE).list -cvf - | \
 | 
			
		||||
	tardy --user_number=0  --user_name=openssl \
 | 
			
		||||
	      --group_number=0 --group_name=openssl \
 | 
			
		||||
	      --prefix=openssl-$(VERSION) - |\
 | 
			
		||||
	gzip --best >../$(TARFILE).gz; \
 | 
			
		||||
	rm -f ../$(TARFILE).list; \
 | 
			
		||||
	ls -l ../$(TARFILE).gz
 | 
			
		||||
 | 
			
		||||
tar-snap: ../$(TARFILE).list
 | 
			
		||||
	$(TAR_COMMAND) > ../$(TARFILE)
 | 
			
		||||
	rm -f ../$(TARFILE).list
 | 
			
		||||
tar-snap:
 | 
			
		||||
	@$(TAR) $(TARFLAGS) -cvf - \
 | 
			
		||||
		`find * \! -path CVS/\* \! -path \*/CVS/\* \! -name CVS \! -name .cvsignore \! -name STATUS \! -name TABLE \! -name '*.o' \! -name '*.a' \! -name '*.so' \! -name '*.so.*'  \! -name 'openssl' \! -name '*test' \! -name '.#*' \! -name '*~' | sort` |\
 | 
			
		||||
	tardy --user_number=0  --user_name=openssl \
 | 
			
		||||
	      --group_number=0 --group_name=openssl \
 | 
			
		||||
	      --prefix=openssl-$(VERSION) - > ../$(TARFILE);\
 | 
			
		||||
	ls -l ../$(TARFILE)
 | 
			
		||||
 | 
			
		||||
dist:   
 | 
			
		||||
@@ -502,7 +545,7 @@ install_sw:
 | 
			
		||||
	chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl/$$i ); \
 | 
			
		||||
	done;
 | 
			
		||||
	@set -e; target=install; $(RECURSIVE_BUILD_CMD)
 | 
			
		||||
	@set -e; for i in $(LIBS) ;\
 | 
			
		||||
	@set -e; liblist="$(LIBS)"; for i in $$liblist ;\
 | 
			
		||||
	do \
 | 
			
		||||
		if [ -f "$$i" ]; then \
 | 
			
		||||
		(       echo installing $$i; \
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										80
									
								
								NEWS
									
									
									
									
									
								
							
							
						
						
									
										80
									
								
								NEWS
									
									
									
									
									
								
							@@ -5,12 +5,11 @@
 | 
			
		||||
  This file gives a brief overview of the major changes between each OpenSSL
 | 
			
		||||
  release. For more details please read the CHANGES file.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.0s and OpenSSL 1.0.0t [3 Dec 2015]
 | 
			
		||||
  Major changes between OpenSSL 1.0.1n and OpenSSL 1.0.1o [12 Jun 2015]
 | 
			
		||||
 | 
			
		||||
      o X509_ATTRIBUTE memory leak (CVE-2015-3195)
 | 
			
		||||
      o Race condition handling PSK identify hint (CVE-2015-3196)
 | 
			
		||||
      o Fix HMAC ABI incompatibility
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.0r and OpenSSL 1.0.0s [11 Jun 2015]
 | 
			
		||||
  Major changes between OpenSSL 1.0.1m and OpenSSL 1.0.1n [11 Jun 2015]
 | 
			
		||||
 | 
			
		||||
      o Malformed ECParameters causes infinite loop (CVE-2015-1788)
 | 
			
		||||
      o Exploitable out-of-bounds read in X509_cmp_time (CVE-2015-1789)
 | 
			
		||||
@@ -18,7 +17,7 @@
 | 
			
		||||
      o CMS verify infinite loop with unknown hash function (CVE-2015-1792)
 | 
			
		||||
      o Race condition handling NewSessionTicket (CVE-2015-1791)
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.0q and OpenSSL 1.0.0r [19 Mar 2015]
 | 
			
		||||
  Major changes between OpenSSL 1.0.1l and OpenSSL 1.0.1m [19 Mar 2015]
 | 
			
		||||
 | 
			
		||||
      o Segmentation fault in ASN1_TYPE_cmp fix (CVE-2015-0286)
 | 
			
		||||
      o ASN.1 structure reuse memory corruption fix (CVE-2015-0287)
 | 
			
		||||
@@ -28,11 +27,11 @@
 | 
			
		||||
      o X509_to_X509_REQ NULL pointer deref fix (CVE-2015-0288)
 | 
			
		||||
      o Removed the export ciphers from the DEFAULT ciphers
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.0p and OpenSSL 1.0.0q [15 Jan 2015]
 | 
			
		||||
  Major changes between OpenSSL 1.0.1k and OpenSSL 1.0.1l [15 Jan 2015]
 | 
			
		||||
 | 
			
		||||
      o Build fixes for the Windows and OpenVMS platforms
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.0o and OpenSSL 1.0.0p [8 Jan 2015]
 | 
			
		||||
  Major changes between OpenSSL 1.0.1j and OpenSSL 1.0.1k [8 Jan 2015]
 | 
			
		||||
 | 
			
		||||
      o Fix for CVE-2014-3571
 | 
			
		||||
      o Fix for CVE-2015-0206
 | 
			
		||||
@@ -43,55 +42,88 @@
 | 
			
		||||
      o Fix for CVE-2014-8275
 | 
			
		||||
      o Fix for CVE-2014-3570
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.0n and OpenSSL 1.0.0o [15 Oct 2014]
 | 
			
		||||
  Major changes between OpenSSL 1.0.1i and OpenSSL 1.0.1j [15 Oct 2014]
 | 
			
		||||
 | 
			
		||||
      o Fix for CVE-2014-3513
 | 
			
		||||
      o Fix for CVE-2014-3567
 | 
			
		||||
      o Mitigation for CVE-2014-3566 (SSL protocol vulnerability)
 | 
			
		||||
      o Fix for CVE-2014-3568
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.0m and OpenSSL 1.0.0n [6 Aug 2014]
 | 
			
		||||
  Major changes between OpenSSL 1.0.1h and OpenSSL 1.0.1i [6 Aug 2014]
 | 
			
		||||
 | 
			
		||||
      o Fix for CVE-2014-3512
 | 
			
		||||
      o Fix for CVE-2014-3511
 | 
			
		||||
      o Fix for CVE-2014-3510
 | 
			
		||||
      o Fix for CVE-2014-3507
 | 
			
		||||
      o Fix for CVE-2014-3506
 | 
			
		||||
      o Fix for CVE-2014-3505
 | 
			
		||||
      o Fix for CVE-2014-3509
 | 
			
		||||
      o Fix for CVE-2014-5139
 | 
			
		||||
      o Fix for CVE-2014-3508
 | 
			
		||||
 | 
			
		||||
  Known issues in OpenSSL 1.0.0m:
 | 
			
		||||
 | 
			
		||||
      o EAP-FAST and other applications using tls_session_secret_cb
 | 
			
		||||
        wont resume sessions. Fixed in 1.0.0n-dev
 | 
			
		||||
      o Compilation failure of s3_pkt.c on some platforms due to missing
 | 
			
		||||
        <limits.h> include. Fixed in 1.0.0n-dev
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.0l and OpenSSL 1.0.0m [5 Jun 2014]
 | 
			
		||||
  Major changes between OpenSSL 1.0.1g and OpenSSL 1.0.1h [5 Jun 2014]
 | 
			
		||||
 | 
			
		||||
      o Fix for CVE-2014-0224
 | 
			
		||||
      o Fix for CVE-2014-0221
 | 
			
		||||
      o Fix for CVE-2014-0198
 | 
			
		||||
      o Fix for CVE-2014-0195
 | 
			
		||||
      o Fix for CVE-2014-3470
 | 
			
		||||
      o Fix for CVE-2014-0076
 | 
			
		||||
      o Fix for CVE-2010-5298
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.0k and OpenSSL 1.0.0l [6 Jan 2014]
 | 
			
		||||
  Major changes between OpenSSL 1.0.1f and OpenSSL 1.0.1g [7 Apr 2014]
 | 
			
		||||
 | 
			
		||||
      o Fix for CVE-2014-0160
 | 
			
		||||
      o Add TLS padding extension workaround for broken servers.
 | 
			
		||||
      o Fix for CVE-2014-0076
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.1e and OpenSSL 1.0.1f [6 Jan 2014]
 | 
			
		||||
 | 
			
		||||
      o Don't include gmt_unix_time in TLS server and client random values
 | 
			
		||||
      o Fix for TLS record tampering bug CVE-2013-4353
 | 
			
		||||
      o Fix for TLS version checking bug CVE-2013-6449
 | 
			
		||||
      o Fix for DTLS retransmission bug CVE-2013-6450
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.0j and OpenSSL 1.0.0k [5 Feb 2013]:
 | 
			
		||||
  Major changes between OpenSSL 1.0.1d and OpenSSL 1.0.1e [11 Feb 2013]:
 | 
			
		||||
 | 
			
		||||
      o Fix for SSL/TLS/DTLS CBC plaintext recovery attack CVE-2013-0169
 | 
			
		||||
      o Corrected fix for CVE-2013-0169
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.1c and OpenSSL 1.0.1d [4 Feb 2013]:
 | 
			
		||||
 | 
			
		||||
      o Fix renegotiation in TLS 1.1, 1.2 by using the correct TLS version.
 | 
			
		||||
      o Include the fips configuration module.
 | 
			
		||||
      o Fix OCSP bad key DoS attack CVE-2013-0166
 | 
			
		||||
      o Fix for SSL/TLS/DTLS CBC plaintext recovery attack CVE-2013-0169
 | 
			
		||||
      o Fix for TLS AESNI record handling flaw CVE-2012-2686
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.0i and OpenSSL 1.0.0j [10 May 2012]:
 | 
			
		||||
  Major changes between OpenSSL 1.0.1b and OpenSSL 1.0.1c [10 May 2012]:
 | 
			
		||||
 | 
			
		||||
      o Fix DTLS record length checking bug CVE-2012-2333
 | 
			
		||||
      o Fix TLS/DTLS record length checking bug CVE-2012-2333
 | 
			
		||||
      o Don't attempt to use non-FIPS composite ciphers in FIPS mode.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.0h and OpenSSL 1.0.0i [19 Apr 2012]:
 | 
			
		||||
  Major changes between OpenSSL 1.0.1a and OpenSSL 1.0.1b [26 Apr 2012]:
 | 
			
		||||
 | 
			
		||||
      o Fix compilation error on non-x86 platforms.
 | 
			
		||||
      o Make FIPS capable OpenSSL ciphers work in non-FIPS mode.
 | 
			
		||||
      o Fix SSL_OP_NO_TLSv1_1 clash with SSL_OP_ALL in OpenSSL 1.0.0
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.1 and OpenSSL 1.0.1a [19 Apr 2012]:
 | 
			
		||||
 | 
			
		||||
      o Fix for ASN1 overflow bug CVE-2012-2110
 | 
			
		||||
      o Workarounds for some servers that hang on long client hellos.
 | 
			
		||||
      o Fix SEGV in AES code.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.0h and OpenSSL 1.0.1 [14 Mar 2012]:
 | 
			
		||||
 | 
			
		||||
      o TLS/DTLS heartbeat support.
 | 
			
		||||
      o SCTP support.
 | 
			
		||||
      o RFC 5705 TLS key material exporter.
 | 
			
		||||
      o RFC 5764 DTLS-SRTP negotiation.
 | 
			
		||||
      o Next Protocol Negotiation.
 | 
			
		||||
      o PSS signatures in certificates, requests and CRLs.
 | 
			
		||||
      o Support for password based recipient info for CMS.
 | 
			
		||||
      o Support TLS v1.2 and TLS v1.1.
 | 
			
		||||
      o Preliminary FIPS capability for unvalidated 2.0 FIPS module.
 | 
			
		||||
      o SRP support.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.0g and OpenSSL 1.0.0h [12 Mar 2012]:
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										34
									
								
								README
									
									
									
									
									
								
							
							
						
						
									
										34
									
								
								README
									
									
									
									
									
								
							@@ -1,5 +1,5 @@
 | 
			
		||||
 | 
			
		||||
 OpenSSL 1.0.0t 3 Dec 2015
 | 
			
		||||
 OpenSSL 1.0.1o 12 Jun 2015
 | 
			
		||||
 | 
			
		||||
 Copyright (c) 1998-2011 The OpenSSL Project
 | 
			
		||||
 Copyright (c) 1995-1998 Eric A. Young, Tim J. Hudson
 | 
			
		||||
@@ -164,23 +164,16 @@
 | 
			
		||||
 Report the bug to the OpenSSL project via the Request Tracker
 | 
			
		||||
 (http://www.openssl.org/support/rt.html) by mail to:
 | 
			
		||||
 | 
			
		||||
    rt@openssl.org
 | 
			
		||||
    openssl-bugs@openssl.org
 | 
			
		||||
 | 
			
		||||
 In order to avoid spam, this is a moderated mailing list, and it might
 | 
			
		||||
 take a day for the ticket to show up.  (We also scan posts to make sure
 | 
			
		||||
 that security disclosures aren't publically posted by mistake.) Mail to
 | 
			
		||||
 this address is recorded in the public RT (request tracker) database (see
 | 
			
		||||
 https://www.openssl.org/support/rt.html for details) and also forwarded
 | 
			
		||||
 the public openssl-dev mailing list.  Confidential mail may be sent to
 | 
			
		||||
 openssl-security@openssl.org (PGP key available from the key servers).
 | 
			
		||||
 Note that the request tracker should NOT be used for general assistance
 | 
			
		||||
 or support queries. Just because something doesn't work the way you expect
 | 
			
		||||
 does not mean it is necessarily a bug in OpenSSL.
 | 
			
		||||
 | 
			
		||||
 Please do NOT use this for general assistance or support queries.
 | 
			
		||||
 Just because something doesn't work the way you expect does not mean it
 | 
			
		||||
 is necessarily a bug in OpenSSL.
 | 
			
		||||
 | 
			
		||||
 You can also make GitHub pull requests. If you do this, please also send
 | 
			
		||||
 mail to rt@openssl.org with a link to the PR so that we can more easily
 | 
			
		||||
 keep track of it.
 | 
			
		||||
 Note that mail to openssl-bugs@openssl.org is recorded in the publicly
 | 
			
		||||
 readable request tracker database and is forwarded to a public
 | 
			
		||||
 mailing list. Confidential mail may be sent to openssl-security@openssl.org
 | 
			
		||||
 (PGP key available from the key servers).
 | 
			
		||||
 | 
			
		||||
 HOW TO CONTRIBUTE TO OpenSSL
 | 
			
		||||
 ----------------------------
 | 
			
		||||
@@ -197,10 +190,11 @@
 | 
			
		||||
 reason as to why that feature isn't implemented.
 | 
			
		||||
 | 
			
		||||
 Patches should be as up to date as possible, preferably relative to the
 | 
			
		||||
 current Git or the last snapshot. They should follow our coding style
 | 
			
		||||
 (see http://openssl.org/about/codingstyle.txt) and compile without
 | 
			
		||||
 warnings using the --strict-warnings flag.  OpenSSL compiles on many
 | 
			
		||||
 varied platforms: try to ensure you only use portable features.
 | 
			
		||||
 current Git or the last snapshot. They should follow the coding style of
 | 
			
		||||
 OpenSSL and compile without warnings. Some of the core team developer targets
 | 
			
		||||
 can be used for testing purposes, (debug-steve64, debug-geoff etc). OpenSSL
 | 
			
		||||
 compiles on many varied platforms: try to ensure you only use portable
 | 
			
		||||
 features.
 | 
			
		||||
 | 
			
		||||
 Note: For legal reasons, contributions from the US can be accepted only
 | 
			
		||||
 if a TSU notification and a copy of the patch are sent to crypt@bis.doc.gov
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										173
									
								
								apps/Makefile
									
									
									
									
									
								
							
							
						
						
									
										173
									
								
								apps/Makefile
									
									
									
									
									
								
							@@ -39,7 +39,7 @@ E_EXE=	verify asn1pars req dgst dh dhparam enc passwd gendh errstr \
 | 
			
		||||
	ca crl rsa rsautl dsa dsaparam ec ecparam \
 | 
			
		||||
	x509 genrsa gendsa genpkey s_server s_client speed \
 | 
			
		||||
	s_time version pkcs7 cms crl2pkcs7 sess_id ciphers nseq pkcs12 \
 | 
			
		||||
	pkcs8 pkey pkeyparam pkeyutl spkac smime rand engine ocsp prime ts
 | 
			
		||||
	pkcs8 pkey pkeyparam pkeyutl spkac smime rand engine ocsp prime ts srp
 | 
			
		||||
 | 
			
		||||
PROGS= $(PROGRAM).c
 | 
			
		||||
 | 
			
		||||
@@ -56,7 +56,7 @@ E_OBJ=	verify.o asn1pars.o req.o dgst.o dh.o dhparam.o enc.o passwd.o gendh.o er
 | 
			
		||||
	x509.o genrsa.o gendsa.o genpkey.o s_server.o s_client.o speed.o \
 | 
			
		||||
	s_time.o $(A_OBJ) $(S_OBJ) $(RAND_OBJ) version.o sess_id.o \
 | 
			
		||||
	ciphers.o nseq.o pkcs12.o pkcs8.o pkey.o pkeyparam.o pkeyutl.o \
 | 
			
		||||
	spkac.o smime.o cms.o rand.o engine.o ocsp.o prime.o ts.o
 | 
			
		||||
	spkac.o smime.o cms.o rand.o engine.o ocsp.o prime.o ts.o srp.o
 | 
			
		||||
 | 
			
		||||
E_SRC=	verify.c asn1pars.c req.c dgst.c dh.c enc.c passwd.c gendh.c errstr.c ca.c \
 | 
			
		||||
	pkcs7.c crl2p7.c crl.c \
 | 
			
		||||
@@ -64,7 +64,7 @@ E_SRC=	verify.c asn1pars.c req.c dgst.c dh.c enc.c passwd.c gendh.c errstr.c ca.
 | 
			
		||||
	x509.c genrsa.c gendsa.c genpkey.c s_server.c s_client.c speed.c \
 | 
			
		||||
	s_time.c $(A_SRC) $(S_SRC) $(RAND_SRC) version.c sess_id.c \
 | 
			
		||||
	ciphers.c nseq.c pkcs12.c pkcs8.c pkey.c pkeyparam.c pkeyutl.c \
 | 
			
		||||
	spkac.c smime.c cms.c rand.c engine.c ocsp.c prime.c ts.c
 | 
			
		||||
	spkac.c smime.c cms.c rand.c engine.c ocsp.c prime.c ts.c srp.c
 | 
			
		||||
 | 
			
		||||
SRC=$(E_SRC)
 | 
			
		||||
 | 
			
		||||
@@ -135,7 +135,7 @@ update: openssl-vms.cnf local_depend
 | 
			
		||||
depend: local_depend
 | 
			
		||||
	@if [ -z "$(THIS)" ]; then $(MAKE) -f $(TOP)/Makefile reflect THIS=$@; fi
 | 
			
		||||
local_depend:
 | 
			
		||||
	@[ -z "$(THIS)" ] || $(MAKEDEPEND) -- $(CFLAG) $(INCLUDES) $(DEPFLAG) -- $(PROGS) $(SRC)
 | 
			
		||||
	@[ -z "$(THIS)" ] || $(MAKEDEPEND) -- $(CFLAG) $(INCLUDES) $(DEPFLAG) -- $(PROGS) $(SRC); \
 | 
			
		||||
 | 
			
		||||
dclean:
 | 
			
		||||
	$(PERL) -pe 'if (/^# DO NOT DELETE THIS LINE/) {print; exit(0);}' $(MAKEFILE) >Makefile.new
 | 
			
		||||
@@ -147,15 +147,17 @@ clean:
 | 
			
		||||
	rm -f req
 | 
			
		||||
 | 
			
		||||
$(DLIBSSL):
 | 
			
		||||
	(cd ..; $(MAKE) DIRS=ssl all)
 | 
			
		||||
	(cd ..; $(MAKE) build_libssl)
 | 
			
		||||
 | 
			
		||||
$(DLIBCRYPTO):
 | 
			
		||||
	(cd ..; $(MAKE) DIRS=crypto all)
 | 
			
		||||
	(cd ..; $(MAKE) build_libcrypto)
 | 
			
		||||
 | 
			
		||||
$(EXE): progs.h $(E_OBJ) $(PROGRAM).o $(DLIBCRYPTO) $(DLIBSSL)
 | 
			
		||||
	$(RM) $(EXE)
 | 
			
		||||
	shlib_target=; if [ -n "$(SHARED_LIBS)" ]; then \
 | 
			
		||||
		shlib_target="$(SHLIB_TARGET)"; \
 | 
			
		||||
	elif [ -n "$(FIPSCANLIB)" ]; then \
 | 
			
		||||
	  FIPSLD_CC="$(CC)"; CC=$(FIPSDIR)/bin/fipsld; export CC FIPSLD_CC; \
 | 
			
		||||
	fi; \
 | 
			
		||||
	LIBRARIES="$(LIBSSL) $(LIBKRB5) $(LIBCRYPTO)" ; \
 | 
			
		||||
	$(MAKE) -f $(TOP)/Makefile.shared -e \
 | 
			
		||||
@@ -248,13 +250,13 @@ ciphers.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
 | 
			
		||||
ciphers.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
 | 
			
		||||
ciphers.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
 | 
			
		||||
ciphers.o: ../include/openssl/pqueue.h ../include/openssl/safestack.h
 | 
			
		||||
ciphers.o: ../include/openssl/sha.h ../include/openssl/ssl.h
 | 
			
		||||
ciphers.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
 | 
			
		||||
ciphers.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
 | 
			
		||||
ciphers.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
 | 
			
		||||
ciphers.o: ../include/openssl/txt_db.h ../include/openssl/x509.h
 | 
			
		||||
ciphers.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h
 | 
			
		||||
ciphers.o: ciphers.c
 | 
			
		||||
ciphers.o: ../include/openssl/sha.h ../include/openssl/srtp.h
 | 
			
		||||
ciphers.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
 | 
			
		||||
ciphers.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
 | 
			
		||||
ciphers.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
 | 
			
		||||
ciphers.o: ../include/openssl/tls1.h ../include/openssl/txt_db.h
 | 
			
		||||
ciphers.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
 | 
			
		||||
ciphers.o: ../include/openssl/x509v3.h apps.h ciphers.c
 | 
			
		||||
cms.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
cms.o: ../include/openssl/buffer.h ../include/openssl/cms.h
 | 
			
		||||
cms.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
@@ -430,13 +432,13 @@ engine.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
 | 
			
		||||
engine.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
 | 
			
		||||
engine.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
 | 
			
		||||
engine.o: ../include/openssl/pqueue.h ../include/openssl/safestack.h
 | 
			
		||||
engine.o: ../include/openssl/sha.h ../include/openssl/ssl.h
 | 
			
		||||
engine.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
 | 
			
		||||
engine.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
 | 
			
		||||
engine.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
 | 
			
		||||
engine.o: ../include/openssl/txt_db.h ../include/openssl/x509.h
 | 
			
		||||
engine.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h
 | 
			
		||||
engine.o: engine.c
 | 
			
		||||
engine.o: ../include/openssl/sha.h ../include/openssl/srtp.h
 | 
			
		||||
engine.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
 | 
			
		||||
engine.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
 | 
			
		||||
engine.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
 | 
			
		||||
engine.o: ../include/openssl/tls1.h ../include/openssl/txt_db.h
 | 
			
		||||
engine.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
 | 
			
		||||
engine.o: ../include/openssl/x509v3.h apps.h engine.c
 | 
			
		||||
errstr.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
errstr.o: ../include/openssl/buffer.h ../include/openssl/comp.h
 | 
			
		||||
errstr.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
@@ -451,13 +453,13 @@ errstr.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
 | 
			
		||||
errstr.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
 | 
			
		||||
errstr.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
 | 
			
		||||
errstr.o: ../include/openssl/pqueue.h ../include/openssl/safestack.h
 | 
			
		||||
errstr.o: ../include/openssl/sha.h ../include/openssl/ssl.h
 | 
			
		||||
errstr.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
 | 
			
		||||
errstr.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
 | 
			
		||||
errstr.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
 | 
			
		||||
errstr.o: ../include/openssl/txt_db.h ../include/openssl/x509.h
 | 
			
		||||
errstr.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h
 | 
			
		||||
errstr.o: errstr.c
 | 
			
		||||
errstr.o: ../include/openssl/sha.h ../include/openssl/srtp.h
 | 
			
		||||
errstr.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
 | 
			
		||||
errstr.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
 | 
			
		||||
errstr.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
 | 
			
		||||
errstr.o: ../include/openssl/tls1.h ../include/openssl/txt_db.h
 | 
			
		||||
errstr.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
 | 
			
		||||
errstr.o: ../include/openssl/x509v3.h apps.h errstr.c
 | 
			
		||||
gendh.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
gendh.o: ../include/openssl/bn.h ../include/openssl/buffer.h
 | 
			
		||||
gendh.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
@@ -559,12 +561,12 @@ ocsp.o: ../include/openssl/opensslv.h ../include/openssl/ossl_typ.h
 | 
			
		||||
ocsp.o: ../include/openssl/pem.h ../include/openssl/pem2.h
 | 
			
		||||
ocsp.o: ../include/openssl/pkcs7.h ../include/openssl/pqueue.h
 | 
			
		||||
ocsp.o: ../include/openssl/safestack.h ../include/openssl/sha.h
 | 
			
		||||
ocsp.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
 | 
			
		||||
ocsp.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
 | 
			
		||||
ocsp.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
 | 
			
		||||
ocsp.o: ../include/openssl/tls1.h ../include/openssl/txt_db.h
 | 
			
		||||
ocsp.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
 | 
			
		||||
ocsp.o: ../include/openssl/x509v3.h apps.h ocsp.c
 | 
			
		||||
ocsp.o: ../include/openssl/srtp.h ../include/openssl/ssl.h
 | 
			
		||||
ocsp.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
 | 
			
		||||
ocsp.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
 | 
			
		||||
ocsp.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
 | 
			
		||||
ocsp.o: ../include/openssl/txt_db.h ../include/openssl/x509.h
 | 
			
		||||
ocsp.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h ocsp.c
 | 
			
		||||
openssl.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
openssl.o: ../include/openssl/buffer.h ../include/openssl/comp.h
 | 
			
		||||
openssl.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
@@ -578,8 +580,9 @@ openssl.o: ../include/openssl/objects.h ../include/openssl/ocsp.h
 | 
			
		||||
openssl.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
 | 
			
		||||
openssl.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
 | 
			
		||||
openssl.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
 | 
			
		||||
openssl.o: ../include/openssl/pqueue.h ../include/openssl/safestack.h
 | 
			
		||||
openssl.o: ../include/openssl/sha.h ../include/openssl/ssl.h
 | 
			
		||||
openssl.o: ../include/openssl/pqueue.h ../include/openssl/rand.h
 | 
			
		||||
openssl.o: ../include/openssl/safestack.h ../include/openssl/sha.h
 | 
			
		||||
openssl.o: ../include/openssl/srtp.h ../include/openssl/ssl.h
 | 
			
		||||
openssl.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
 | 
			
		||||
openssl.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
 | 
			
		||||
openssl.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
 | 
			
		||||
@@ -794,12 +797,13 @@ s_cb.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
 | 
			
		||||
s_cb.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
 | 
			
		||||
s_cb.o: ../include/openssl/pqueue.h ../include/openssl/rand.h
 | 
			
		||||
s_cb.o: ../include/openssl/safestack.h ../include/openssl/sha.h
 | 
			
		||||
s_cb.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
 | 
			
		||||
s_cb.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
 | 
			
		||||
s_cb.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
 | 
			
		||||
s_cb.o: ../include/openssl/tls1.h ../include/openssl/txt_db.h
 | 
			
		||||
s_cb.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
 | 
			
		||||
s_cb.o: ../include/openssl/x509v3.h apps.h s_apps.h s_cb.c
 | 
			
		||||
s_cb.o: ../include/openssl/srtp.h ../include/openssl/ssl.h
 | 
			
		||||
s_cb.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
 | 
			
		||||
s_cb.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
 | 
			
		||||
s_cb.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
 | 
			
		||||
s_cb.o: ../include/openssl/txt_db.h ../include/openssl/x509.h
 | 
			
		||||
s_cb.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h
 | 
			
		||||
s_cb.o: s_apps.h s_cb.c
 | 
			
		||||
s_client.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
s_client.o: ../include/openssl/bn.h ../include/openssl/buffer.h
 | 
			
		||||
s_client.o: ../include/openssl/comp.h ../include/openssl/conf.h
 | 
			
		||||
@@ -815,7 +819,8 @@ s_client.o: ../include/openssl/opensslv.h ../include/openssl/ossl_typ.h
 | 
			
		||||
s_client.o: ../include/openssl/pem.h ../include/openssl/pem2.h
 | 
			
		||||
s_client.o: ../include/openssl/pkcs7.h ../include/openssl/pqueue.h
 | 
			
		||||
s_client.o: ../include/openssl/rand.h ../include/openssl/safestack.h
 | 
			
		||||
s_client.o: ../include/openssl/sha.h ../include/openssl/ssl.h
 | 
			
		||||
s_client.o: ../include/openssl/sha.h ../include/openssl/srp.h
 | 
			
		||||
s_client.o: ../include/openssl/srtp.h ../include/openssl/ssl.h
 | 
			
		||||
s_client.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
 | 
			
		||||
s_client.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
 | 
			
		||||
s_client.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
 | 
			
		||||
@@ -839,6 +844,7 @@ s_server.o: ../include/openssl/pem.h ../include/openssl/pem2.h
 | 
			
		||||
s_server.o: ../include/openssl/pkcs7.h ../include/openssl/pqueue.h
 | 
			
		||||
s_server.o: ../include/openssl/rand.h ../include/openssl/rsa.h
 | 
			
		||||
s_server.o: ../include/openssl/safestack.h ../include/openssl/sha.h
 | 
			
		||||
s_server.o: ../include/openssl/srp.h ../include/openssl/srtp.h
 | 
			
		||||
s_server.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
 | 
			
		||||
s_server.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
 | 
			
		||||
s_server.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
 | 
			
		||||
@@ -860,13 +866,13 @@ s_socket.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
 | 
			
		||||
s_socket.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
 | 
			
		||||
s_socket.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
 | 
			
		||||
s_socket.o: ../include/openssl/pqueue.h ../include/openssl/safestack.h
 | 
			
		||||
s_socket.o: ../include/openssl/sha.h ../include/openssl/ssl.h
 | 
			
		||||
s_socket.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
 | 
			
		||||
s_socket.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
 | 
			
		||||
s_socket.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
 | 
			
		||||
s_socket.o: ../include/openssl/txt_db.h ../include/openssl/x509.h
 | 
			
		||||
s_socket.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h
 | 
			
		||||
s_socket.o: s_apps.h s_socket.c
 | 
			
		||||
s_socket.o: ../include/openssl/sha.h ../include/openssl/srtp.h
 | 
			
		||||
s_socket.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
 | 
			
		||||
s_socket.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
 | 
			
		||||
s_socket.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
 | 
			
		||||
s_socket.o: ../include/openssl/tls1.h ../include/openssl/txt_db.h
 | 
			
		||||
s_socket.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
 | 
			
		||||
s_socket.o: ../include/openssl/x509v3.h apps.h s_apps.h s_socket.c
 | 
			
		||||
s_time.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
s_time.o: ../include/openssl/buffer.h ../include/openssl/comp.h
 | 
			
		||||
s_time.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
@@ -881,13 +887,13 @@ s_time.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
 | 
			
		||||
s_time.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
 | 
			
		||||
s_time.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
 | 
			
		||||
s_time.o: ../include/openssl/pqueue.h ../include/openssl/safestack.h
 | 
			
		||||
s_time.o: ../include/openssl/sha.h ../include/openssl/ssl.h
 | 
			
		||||
s_time.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
 | 
			
		||||
s_time.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
 | 
			
		||||
s_time.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
 | 
			
		||||
s_time.o: ../include/openssl/txt_db.h ../include/openssl/x509.h
 | 
			
		||||
s_time.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h
 | 
			
		||||
s_time.o: s_apps.h s_time.c
 | 
			
		||||
s_time.o: ../include/openssl/sha.h ../include/openssl/srtp.h
 | 
			
		||||
s_time.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
 | 
			
		||||
s_time.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
 | 
			
		||||
s_time.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
 | 
			
		||||
s_time.o: ../include/openssl/tls1.h ../include/openssl/txt_db.h
 | 
			
		||||
s_time.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
 | 
			
		||||
s_time.o: ../include/openssl/x509v3.h apps.h s_apps.h s_time.c
 | 
			
		||||
sess_id.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
sess_id.o: ../include/openssl/buffer.h ../include/openssl/comp.h
 | 
			
		||||
sess_id.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
@@ -902,13 +908,13 @@ sess_id.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
 | 
			
		||||
sess_id.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
 | 
			
		||||
sess_id.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
 | 
			
		||||
sess_id.o: ../include/openssl/pqueue.h ../include/openssl/safestack.h
 | 
			
		||||
sess_id.o: ../include/openssl/sha.h ../include/openssl/ssl.h
 | 
			
		||||
sess_id.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
 | 
			
		||||
sess_id.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
 | 
			
		||||
sess_id.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
 | 
			
		||||
sess_id.o: ../include/openssl/txt_db.h ../include/openssl/x509.h
 | 
			
		||||
sess_id.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h
 | 
			
		||||
sess_id.o: sess_id.c
 | 
			
		||||
sess_id.o: ../include/openssl/sha.h ../include/openssl/srtp.h
 | 
			
		||||
sess_id.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
 | 
			
		||||
sess_id.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
 | 
			
		||||
sess_id.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
 | 
			
		||||
sess_id.o: ../include/openssl/tls1.h ../include/openssl/txt_db.h
 | 
			
		||||
sess_id.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
 | 
			
		||||
sess_id.o: ../include/openssl/x509v3.h apps.h sess_id.c
 | 
			
		||||
smime.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
smime.o: ../include/openssl/buffer.h ../include/openssl/conf.h
 | 
			
		||||
smime.o: ../include/openssl/crypto.h ../include/openssl/e_os2.h
 | 
			
		||||
@@ -938,19 +944,19 @@ speed.o: ../include/openssl/err.h ../include/openssl/evp.h
 | 
			
		||||
speed.o: ../include/openssl/hmac.h ../include/openssl/idea.h
 | 
			
		||||
speed.o: ../include/openssl/lhash.h ../include/openssl/md4.h
 | 
			
		||||
speed.o: ../include/openssl/md5.h ../include/openssl/mdc2.h
 | 
			
		||||
speed.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
 | 
			
		||||
speed.o: ../include/openssl/ocsp.h ../include/openssl/opensslconf.h
 | 
			
		||||
speed.o: ../include/openssl/opensslv.h ../include/openssl/ossl_typ.h
 | 
			
		||||
speed.o: ../include/openssl/pkcs7.h ../include/openssl/rand.h
 | 
			
		||||
speed.o: ../include/openssl/rc2.h ../include/openssl/rc4.h
 | 
			
		||||
speed.o: ../include/openssl/ripemd.h ../include/openssl/rsa.h
 | 
			
		||||
speed.o: ../include/openssl/safestack.h ../include/openssl/seed.h
 | 
			
		||||
speed.o: ../include/openssl/sha.h ../include/openssl/stack.h
 | 
			
		||||
speed.o: ../include/openssl/symhacks.h ../include/openssl/txt_db.h
 | 
			
		||||
speed.o: ../include/openssl/ui.h ../include/openssl/ui_compat.h
 | 
			
		||||
speed.o: ../include/openssl/whrlpool.h ../include/openssl/x509.h
 | 
			
		||||
speed.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h
 | 
			
		||||
speed.o: speed.c testdsa.h testrsa.h
 | 
			
		||||
speed.o: ../include/openssl/modes.h ../include/openssl/obj_mac.h
 | 
			
		||||
speed.o: ../include/openssl/objects.h ../include/openssl/ocsp.h
 | 
			
		||||
speed.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
 | 
			
		||||
speed.o: ../include/openssl/ossl_typ.h ../include/openssl/pkcs7.h
 | 
			
		||||
speed.o: ../include/openssl/rand.h ../include/openssl/rc2.h
 | 
			
		||||
speed.o: ../include/openssl/rc4.h ../include/openssl/ripemd.h
 | 
			
		||||
speed.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
 | 
			
		||||
speed.o: ../include/openssl/seed.h ../include/openssl/sha.h
 | 
			
		||||
speed.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
 | 
			
		||||
speed.o: ../include/openssl/txt_db.h ../include/openssl/ui.h
 | 
			
		||||
speed.o: ../include/openssl/ui_compat.h ../include/openssl/whrlpool.h
 | 
			
		||||
speed.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
 | 
			
		||||
speed.o: ../include/openssl/x509v3.h apps.h speed.c testdsa.h testrsa.h
 | 
			
		||||
spkac.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
spkac.o: ../include/openssl/buffer.h ../include/openssl/conf.h
 | 
			
		||||
spkac.o: ../include/openssl/crypto.h ../include/openssl/e_os2.h
 | 
			
		||||
@@ -967,6 +973,21 @@ spkac.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
 | 
			
		||||
spkac.o: ../include/openssl/txt_db.h ../include/openssl/x509.h
 | 
			
		||||
spkac.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h
 | 
			
		||||
spkac.o: spkac.c
 | 
			
		||||
srp.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
srp.o: ../include/openssl/bn.h ../include/openssl/buffer.h
 | 
			
		||||
srp.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
srp.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
 | 
			
		||||
srp.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
 | 
			
		||||
srp.o: ../include/openssl/engine.h ../include/openssl/err.h
 | 
			
		||||
srp.o: ../include/openssl/evp.h ../include/openssl/lhash.h
 | 
			
		||||
srp.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
 | 
			
		||||
srp.o: ../include/openssl/ocsp.h ../include/openssl/opensslconf.h
 | 
			
		||||
srp.o: ../include/openssl/opensslv.h ../include/openssl/ossl_typ.h
 | 
			
		||||
srp.o: ../include/openssl/pkcs7.h ../include/openssl/safestack.h
 | 
			
		||||
srp.o: ../include/openssl/sha.h ../include/openssl/srp.h
 | 
			
		||||
srp.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
 | 
			
		||||
srp.o: ../include/openssl/txt_db.h ../include/openssl/x509.h
 | 
			
		||||
srp.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h srp.c
 | 
			
		||||
ts.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
ts.o: ../include/openssl/bn.h ../include/openssl/buffer.h
 | 
			
		||||
ts.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										81
									
								
								apps/apps.c
									
									
									
									
									
								
							
							
						
						
									
										81
									
								
								apps/apps.c
									
									
									
									
									
								
							@@ -572,6 +572,11 @@ int password_callback(char *buf, int bufsiz, int verify, PW_CB_DATA *cb_tmp)
 | 
			
		||||
        char *prompt = NULL;
 | 
			
		||||
 | 
			
		||||
        prompt = UI_construct_prompt(ui, "pass phrase", prompt_info);
 | 
			
		||||
        if (!prompt) {
 | 
			
		||||
            BIO_printf(bio_err, "Out of memory\n");
 | 
			
		||||
            UI_free(ui);
 | 
			
		||||
            return 0;
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        ui_flags |= UI_INPUT_FLAG_DEFAULT_PWD;
 | 
			
		||||
        UI_ctrl(ui, UI_CTRL_PRINT_ERRORS, 1, 0, 0);
 | 
			
		||||
@@ -581,6 +586,12 @@ int password_callback(char *buf, int bufsiz, int verify, PW_CB_DATA *cb_tmp)
 | 
			
		||||
                                     PW_MIN_LENGTH, bufsiz - 1);
 | 
			
		||||
        if (ok >= 0 && verify) {
 | 
			
		||||
            buff = (char *)OPENSSL_malloc(bufsiz);
 | 
			
		||||
            if (!buff) {
 | 
			
		||||
                BIO_printf(bio_err, "Out of memory\n");
 | 
			
		||||
                UI_free(ui);
 | 
			
		||||
                OPENSSL_free(prompt);
 | 
			
		||||
                return 0;
 | 
			
		||||
            }
 | 
			
		||||
            ok = UI_add_verify_string(ui, prompt, ui_flags, buff,
 | 
			
		||||
                                      PW_MIN_LENGTH, bufsiz - 1, buf);
 | 
			
		||||
        }
 | 
			
		||||
@@ -1236,11 +1247,7 @@ int set_name_ex(unsigned long *flags, const char *arg)
 | 
			
		||||
        {"ca_default", XN_FLAG_MULTILINE, 0xffffffffL},
 | 
			
		||||
        {NULL, 0, 0}
 | 
			
		||||
    };
 | 
			
		||||
    if (set_multi_opts(flags, arg, ex_tbl) == 0)
 | 
			
		||||
        return 0;
 | 
			
		||||
    if ((*flags & XN_FLAG_SEP_MASK) == 0)
 | 
			
		||||
        *flags |= XN_FLAG_SEP_CPLUS_SPC;
 | 
			
		||||
    return 1;
 | 
			
		||||
    return set_multi_opts(flags, arg, ex_tbl);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
int set_ext_copy(int *copy_type, const char *arg)
 | 
			
		||||
@@ -2151,6 +2158,7 @@ int args_verify(char ***pargs, int *pargc,
 | 
			
		||||
    int purpose = 0, depth = -1;
 | 
			
		||||
    char **oldargs = *pargs;
 | 
			
		||||
    char *arg = **pargs, *argn = (*pargs)[1];
 | 
			
		||||
    time_t at_time = 0;
 | 
			
		||||
    if (!strcmp(arg, "-policy")) {
 | 
			
		||||
        if (!argn)
 | 
			
		||||
            *badarg = 1;
 | 
			
		||||
@@ -2188,6 +2196,22 @@ int args_verify(char ***pargs, int *pargc,
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
        (*pargs)++;
 | 
			
		||||
    } else if (strcmp(arg, "-attime") == 0) {
 | 
			
		||||
        if (!argn)
 | 
			
		||||
            *badarg = 1;
 | 
			
		||||
        else {
 | 
			
		||||
            long timestamp;
 | 
			
		||||
            /*
 | 
			
		||||
             * interpret the -attime argument as seconds since Epoch
 | 
			
		||||
             */
 | 
			
		||||
            if (sscanf(argn, "%li", ×tamp) != 1) {
 | 
			
		||||
                BIO_printf(bio_err, "Error parsing timestamp %s\n", argn);
 | 
			
		||||
                *badarg = 1;
 | 
			
		||||
            }
 | 
			
		||||
            /* on some platforms time_t may be a float */
 | 
			
		||||
            at_time = (time_t)timestamp;
 | 
			
		||||
        }
 | 
			
		||||
        (*pargs)++;
 | 
			
		||||
    } else if (!strcmp(arg, "-ignore_critical"))
 | 
			
		||||
        flags |= X509_V_FLAG_IGNORE_CRITICAL;
 | 
			
		||||
    else if (!strcmp(arg, "-issuer_checks"))
 | 
			
		||||
@@ -2214,6 +2238,8 @@ int args_verify(char ***pargs, int *pargc,
 | 
			
		||||
        flags |= X509_V_FLAG_NOTIFY_POLICY;
 | 
			
		||||
    else if (!strcmp(arg, "-check_ss_sig"))
 | 
			
		||||
        flags |= X509_V_FLAG_CHECK_SS_SIGNATURE;
 | 
			
		||||
    else if (!strcmp(arg, "-no_alt_chains"))
 | 
			
		||||
        flags |= X509_V_FLAG_NO_ALT_CHAINS;
 | 
			
		||||
    else
 | 
			
		||||
        return 0;
 | 
			
		||||
 | 
			
		||||
@@ -2240,6 +2266,9 @@ int args_verify(char ***pargs, int *pargc,
 | 
			
		||||
    if (depth >= 0)
 | 
			
		||||
        X509_VERIFY_PARAM_set_depth(*pm, depth);
 | 
			
		||||
 | 
			
		||||
    if (at_time)
 | 
			
		||||
        X509_VERIFY_PARAM_set_time(*pm, at_time);
 | 
			
		||||
 | 
			
		||||
 end:
 | 
			
		||||
 | 
			
		||||
    (*pargs)++;
 | 
			
		||||
@@ -2562,6 +2591,48 @@ void jpake_server_auth(BIO *out, BIO *conn, const char *secret)
 | 
			
		||||
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#if !defined(OPENSSL_NO_TLSEXT) && !defined(OPENSSL_NO_NEXTPROTONEG)
 | 
			
		||||
/*-
 | 
			
		||||
 * next_protos_parse parses a comma separated list of strings into a string
 | 
			
		||||
 * in a format suitable for passing to SSL_CTX_set_next_protos_advertised.
 | 
			
		||||
 *   outlen: (output) set to the length of the resulting buffer on success.
 | 
			
		||||
 *   err: (maybe NULL) on failure, an error message line is written to this BIO.
 | 
			
		||||
 *   in: a NUL termianted string like "abc,def,ghi"
 | 
			
		||||
 *
 | 
			
		||||
 *   returns: a malloced buffer or NULL on failure.
 | 
			
		||||
 */
 | 
			
		||||
unsigned char *next_protos_parse(unsigned short *outlen, const char *in)
 | 
			
		||||
{
 | 
			
		||||
    size_t len;
 | 
			
		||||
    unsigned char *out;
 | 
			
		||||
    size_t i, start = 0;
 | 
			
		||||
 | 
			
		||||
    len = strlen(in);
 | 
			
		||||
    if (len >= 65535)
 | 
			
		||||
        return NULL;
 | 
			
		||||
 | 
			
		||||
    out = OPENSSL_malloc(strlen(in) + 1);
 | 
			
		||||
    if (!out)
 | 
			
		||||
        return NULL;
 | 
			
		||||
 | 
			
		||||
    for (i = 0; i <= len; ++i) {
 | 
			
		||||
        if (i == len || in[i] == ',') {
 | 
			
		||||
            if (i - start > 255) {
 | 
			
		||||
                OPENSSL_free(out);
 | 
			
		||||
                return NULL;
 | 
			
		||||
            }
 | 
			
		||||
            out[start] = i - start;
 | 
			
		||||
            start = i + 1;
 | 
			
		||||
        } else
 | 
			
		||||
            out[i + 1] = in[i];
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    *outlen = len + 1;
 | 
			
		||||
    return out;
 | 
			
		||||
}
 | 
			
		||||
#endif                          /* !OPENSSL_NO_TLSEXT &&
 | 
			
		||||
                                 * !OPENSSL_NO_NEXTPROTONEG */
 | 
			
		||||
 | 
			
		||||
/*
 | 
			
		||||
 * Platform-specific sections
 | 
			
		||||
 */
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										16
									
								
								apps/apps.h
									
									
									
									
									
								
							
							
						
						
									
										16
									
								
								apps/apps.h
									
									
									
									
									
								
							@@ -189,6 +189,7 @@ extern BIO *bio_err;
 | 
			
		||||
                        do { CONF_modules_unload(1); destroy_ui_method(); \
 | 
			
		||||
                        OBJ_cleanup(); EVP_cleanup(); ENGINE_cleanup(); \
 | 
			
		||||
                        CRYPTO_cleanup_all_ex_data(); ERR_remove_thread_state(NULL); \
 | 
			
		||||
                        RAND_cleanup(); \
 | 
			
		||||
                        ERR_free_strings(); zlib_cleanup();} while(0)
 | 
			
		||||
#  else
 | 
			
		||||
#   define apps_startup() \
 | 
			
		||||
@@ -199,6 +200,7 @@ extern BIO *bio_err;
 | 
			
		||||
                        do { CONF_modules_unload(1); destroy_ui_method(); \
 | 
			
		||||
                        OBJ_cleanup(); EVP_cleanup(); \
 | 
			
		||||
                        CRYPTO_cleanup_all_ex_data(); ERR_remove_thread_state(NULL); \
 | 
			
		||||
                        RAND_cleanup(); \
 | 
			
		||||
                        ERR_free_strings(); zlib_cleanup(); } while(0)
 | 
			
		||||
#  endif
 | 
			
		||||
# endif
 | 
			
		||||
@@ -318,6 +320,12 @@ int bio_to_mem(unsigned char **out, int maxlen, BIO *in);
 | 
			
		||||
int pkey_ctrl_string(EVP_PKEY_CTX *ctx, char *value);
 | 
			
		||||
int init_gen_str(BIO *err, EVP_PKEY_CTX **pctx,
 | 
			
		||||
                 const char *algname, ENGINE *e, int do_param);
 | 
			
		||||
int do_X509_sign(BIO *err, X509 *x, EVP_PKEY *pkey, const EVP_MD *md,
 | 
			
		||||
                 STACK_OF(OPENSSL_STRING) *sigopts);
 | 
			
		||||
int do_X509_REQ_sign(BIO *err, X509_REQ *x, EVP_PKEY *pkey, const EVP_MD *md,
 | 
			
		||||
                     STACK_OF(OPENSSL_STRING) *sigopts);
 | 
			
		||||
int do_X509_CRL_sign(BIO *err, X509_CRL *x, EVP_PKEY *pkey, const EVP_MD *md,
 | 
			
		||||
                     STACK_OF(OPENSSL_STRING) *sigopts);
 | 
			
		||||
# ifndef OPENSSL_NO_PSK
 | 
			
		||||
extern char *psk_key;
 | 
			
		||||
# endif
 | 
			
		||||
@@ -326,6 +334,11 @@ void jpake_client_auth(BIO *out, BIO *conn, const char *secret);
 | 
			
		||||
void jpake_server_auth(BIO *out, BIO *conn, const char *secret);
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
# if !defined(OPENSSL_NO_TLSEXT) && !defined(OPENSSL_NO_NEXTPROTONEG)
 | 
			
		||||
unsigned char *next_protos_parse(unsigned short *outlen, const char *in);
 | 
			
		||||
# endif                         /* !OPENSSL_NO_TLSEXT &&
 | 
			
		||||
                                 * !OPENSSL_NO_NEXTPROTONEG */
 | 
			
		||||
 | 
			
		||||
# define FORMAT_UNDEF    0
 | 
			
		||||
# define FORMAT_ASN1     1
 | 
			
		||||
# define FORMAT_TEXT     2
 | 
			
		||||
@@ -358,4 +371,7 @@ int raw_write_stdout(const void *, int);
 | 
			
		||||
# define TM_START        0
 | 
			
		||||
# define TM_STOP         1
 | 
			
		||||
double app_tminterval(int stop, int usertime);
 | 
			
		||||
 | 
			
		||||
# define OPENSSL_NO_SSL_INTERN
 | 
			
		||||
 | 
			
		||||
#endif
 | 
			
		||||
 
 | 
			
		||||
@@ -313,9 +313,9 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            }
 | 
			
		||||
            typ = ASN1_TYPE_get(at);
 | 
			
		||||
            if ((typ == V_ASN1_OBJECT)
 | 
			
		||||
                || (typ == V_ASN1_BOOLEAN)
 | 
			
		||||
                || (typ == V_ASN1_NULL)) {
 | 
			
		||||
                BIO_printf(bio_err, "Can't parse %s type\n", ASN1_tag2str(typ));
 | 
			
		||||
                BIO_printf(bio_err, "Can't parse %s type\n",
 | 
			
		||||
                           typ == V_ASN1_NULL ? "NULL" : "OBJECT");
 | 
			
		||||
                ERR_print_errors(bio_err);
 | 
			
		||||
                goto end;
 | 
			
		||||
            }
 | 
			
		||||
@@ -375,7 +375,7 @@ static int do_generate(BIO *bio, char *genstr, char *genconf, BUF_MEM *buf)
 | 
			
		||||
{
 | 
			
		||||
    CONF *cnf = NULL;
 | 
			
		||||
    int len;
 | 
			
		||||
    long errline;
 | 
			
		||||
    long errline = 0;
 | 
			
		||||
    unsigned char *p;
 | 
			
		||||
    ASN1_TYPE *atyp = NULL;
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										155
									
								
								apps/ca.c
									
									
									
									
									
								
							
							
						
						
									
										155
									
								
								apps/ca.c
									
									
									
									
									
								
							@@ -197,23 +197,25 @@ extern int EF_ALIGNMENT;
 | 
			
		||||
 | 
			
		||||
static void lookup_fail(const char *name, const char *tag);
 | 
			
		||||
static int certify(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
 | 
			
		||||
                   const EVP_MD *dgst, STACK_OF(CONF_VALUE) *policy,
 | 
			
		||||
                   CA_DB *db, BIGNUM *serial, char *subj,
 | 
			
		||||
                   unsigned long chtype, int multirdn, int email_dn,
 | 
			
		||||
                   char *startdate, char *enddate, long days, int batch,
 | 
			
		||||
                   char *ext_sect, CONF *conf, int verbose,
 | 
			
		||||
                   unsigned long certopt, unsigned long nameopt,
 | 
			
		||||
                   const EVP_MD *dgst, STACK_OF(OPENSSL_STRING) *sigopts,
 | 
			
		||||
                   STACK_OF(CONF_VALUE) *policy, CA_DB *db,
 | 
			
		||||
                   BIGNUM *serial, char *subj, unsigned long chtype,
 | 
			
		||||
                   int multirdn, int email_dn, char *startdate, char *enddate,
 | 
			
		||||
                   long days, int batch, char *ext_sect, CONF *conf,
 | 
			
		||||
                   int verbose, unsigned long certopt, unsigned long nameopt,
 | 
			
		||||
                   int default_op, int ext_copy, int selfsign);
 | 
			
		||||
static int certify_cert(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
 | 
			
		||||
                        const EVP_MD *dgst, STACK_OF(CONF_VALUE) *policy,
 | 
			
		||||
                        CA_DB *db, BIGNUM *serial, char *subj,
 | 
			
		||||
                        unsigned long chtype, int multirdn, int email_dn,
 | 
			
		||||
                        char *startdate, char *enddate, long days, int batch,
 | 
			
		||||
                        char *ext_sect, CONF *conf, int verbose,
 | 
			
		||||
                        unsigned long certopt, unsigned long nameopt,
 | 
			
		||||
                        int default_op, int ext_copy, ENGINE *e);
 | 
			
		||||
                        const EVP_MD *dgst, STACK_OF(OPENSSL_STRING) *sigopts,
 | 
			
		||||
                        STACK_OF(CONF_VALUE) *policy, CA_DB *db,
 | 
			
		||||
                        BIGNUM *serial, char *subj, unsigned long chtype,
 | 
			
		||||
                        int multirdn, int email_dn, char *startdate,
 | 
			
		||||
                        char *enddate, long days, int batch, char *ext_sect,
 | 
			
		||||
                        CONF *conf, int verbose, unsigned long certopt,
 | 
			
		||||
                        unsigned long nameopt, int default_op, int ext_copy,
 | 
			
		||||
                        ENGINE *e);
 | 
			
		||||
static int certify_spkac(X509 **xret, char *infile, EVP_PKEY *pkey,
 | 
			
		||||
                         X509 *x509, const EVP_MD *dgst,
 | 
			
		||||
                         STACK_OF(OPENSSL_STRING) *sigopts,
 | 
			
		||||
                         STACK_OF(CONF_VALUE) *policy, CA_DB *db,
 | 
			
		||||
                         BIGNUM *serial, char *subj, unsigned long chtype,
 | 
			
		||||
                         int multirdn, int email_dn, char *startdate,
 | 
			
		||||
@@ -223,12 +225,12 @@ static int certify_spkac(X509 **xret, char *infile, EVP_PKEY *pkey,
 | 
			
		||||
static void write_new_certificate(BIO *bp, X509 *x, int output_der,
 | 
			
		||||
                                  int notext);
 | 
			
		||||
static int do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509,
 | 
			
		||||
                   const EVP_MD *dgst, STACK_OF(CONF_VALUE) *policy,
 | 
			
		||||
                   CA_DB *db, BIGNUM *serial, char *subj,
 | 
			
		||||
                   unsigned long chtype, int multirdn, int email_dn,
 | 
			
		||||
                   char *startdate, char *enddate, long days, int batch,
 | 
			
		||||
                   int verbose, X509_REQ *req, char *ext_sect, CONF *conf,
 | 
			
		||||
                   unsigned long certopt, unsigned long nameopt,
 | 
			
		||||
                   const EVP_MD *dgst, STACK_OF(OPENSSL_STRING) *sigopts,
 | 
			
		||||
                   STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial,
 | 
			
		||||
                   char *subj, unsigned long chtype, int multirdn,
 | 
			
		||||
                   int email_dn, char *startdate, char *enddate, long days,
 | 
			
		||||
                   int batch, int verbose, X509_REQ *req, char *ext_sect,
 | 
			
		||||
                   CONF *conf, unsigned long certopt, unsigned long nameopt,
 | 
			
		||||
                   int default_op, int ext_copy, int selfsign);
 | 
			
		||||
static int do_revoke(X509 *x509, CA_DB *db, int ext, char *extval);
 | 
			
		||||
static int get_certificate_status(const char *ser_status, CA_DB *db);
 | 
			
		||||
@@ -318,6 +320,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    const EVP_MD *dgst = NULL;
 | 
			
		||||
    STACK_OF(CONF_VALUE) *attribs = NULL;
 | 
			
		||||
    STACK_OF(X509) *cert_sk = NULL;
 | 
			
		||||
    STACK_OF(OPENSSL_STRING) *sigopts = NULL;
 | 
			
		||||
#undef BSIZE
 | 
			
		||||
#define BSIZE 256
 | 
			
		||||
    MS_STATIC char buf[3][BSIZE];
 | 
			
		||||
@@ -425,6 +428,13 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            outdir = *(++argv);
 | 
			
		||||
        } else if (strcmp(*argv, "-sigopt") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            if (!sigopts)
 | 
			
		||||
                sigopts = sk_OPENSSL_STRING_new_null();
 | 
			
		||||
            if (!sigopts || !sk_OPENSSL_STRING_push(sigopts, *(++argv)))
 | 
			
		||||
                goto bad;
 | 
			
		||||
        } else if (strcmp(*argv, "-notext") == 0)
 | 
			
		||||
            notext = 1;
 | 
			
		||||
        else if (strcmp(*argv, "-batch") == 0)
 | 
			
		||||
@@ -548,10 +558,18 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
        len = strlen(s) + sizeof(CONFIG_FILE);
 | 
			
		||||
        tofree = OPENSSL_malloc(len);
 | 
			
		||||
        if (!tofree) {
 | 
			
		||||
            BIO_printf(bio_err, "Out of memory\n");
 | 
			
		||||
            goto err;
 | 
			
		||||
        }
 | 
			
		||||
        strcpy(tofree, s);
 | 
			
		||||
#else
 | 
			
		||||
        len = strlen(s) + sizeof(CONFIG_FILE) + 1;
 | 
			
		||||
        tofree = OPENSSL_malloc(len);
 | 
			
		||||
        if (!tofree) {
 | 
			
		||||
            BIO_printf(bio_err, "Out of memory\n");
 | 
			
		||||
            goto err;
 | 
			
		||||
        }
 | 
			
		||||
        BUF_strlcpy(tofree, s, len);
 | 
			
		||||
        BUF_strlcat(tofree, "/", len);
 | 
			
		||||
#endif
 | 
			
		||||
@@ -649,7 +667,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        ERR_clear_error();
 | 
			
		||||
#ifdef RL_DEBUG
 | 
			
		||||
    if (!p)
 | 
			
		||||
        BIO_printf(bio_err, "DEBUG: unique_subject undefined\n", p);
 | 
			
		||||
        BIO_printf(bio_err, "DEBUG: unique_subject undefined\n");
 | 
			
		||||
#endif
 | 
			
		||||
#ifdef RL_DEBUG
 | 
			
		||||
    BIO_printf(bio_err, "DEBUG: configured unique_subject is %d\n",
 | 
			
		||||
@@ -1090,10 +1108,10 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        }
 | 
			
		||||
        if (spkac_file != NULL) {
 | 
			
		||||
            total++;
 | 
			
		||||
            j = certify_spkac(&x, spkac_file, pkey, x509, dgst, attribs, db,
 | 
			
		||||
                              serial, subj, chtype, multirdn, email_dn,
 | 
			
		||||
                              startdate, enddate, days, extensions, conf,
 | 
			
		||||
                              verbose, certopt, nameopt, default_op,
 | 
			
		||||
            j = certify_spkac(&x, spkac_file, pkey, x509, dgst, sigopts,
 | 
			
		||||
                              attribs, db, serial, subj, chtype, multirdn,
 | 
			
		||||
                              email_dn, startdate, enddate, days, extensions,
 | 
			
		||||
                              conf, verbose, certopt, nameopt, default_op,
 | 
			
		||||
                              ext_copy);
 | 
			
		||||
            if (j < 0)
 | 
			
		||||
                goto err;
 | 
			
		||||
@@ -1114,7 +1132,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        }
 | 
			
		||||
        if (ss_cert_file != NULL) {
 | 
			
		||||
            total++;
 | 
			
		||||
            j = certify_cert(&x, ss_cert_file, pkey, x509, dgst, attribs,
 | 
			
		||||
            j = certify_cert(&x, ss_cert_file, pkey, x509, dgst, sigopts,
 | 
			
		||||
                             attribs,
 | 
			
		||||
                             db, serial, subj, chtype, multirdn, email_dn,
 | 
			
		||||
                             startdate, enddate, days, batch, extensions,
 | 
			
		||||
                             conf, verbose, certopt, nameopt, default_op,
 | 
			
		||||
@@ -1134,7 +1153,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        }
 | 
			
		||||
        if (infile != NULL) {
 | 
			
		||||
            total++;
 | 
			
		||||
            j = certify(&x, infile, pkey, x509p, dgst, attribs, db,
 | 
			
		||||
            j = certify(&x, infile, pkey, x509p, dgst, sigopts, attribs, db,
 | 
			
		||||
                        serial, subj, chtype, multirdn, email_dn, startdate,
 | 
			
		||||
                        enddate, days, batch, extensions, conf, verbose,
 | 
			
		||||
                        certopt, nameopt, default_op, ext_copy, selfsign);
 | 
			
		||||
@@ -1153,7 +1172,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        }
 | 
			
		||||
        for (i = 0; i < argc; i++) {
 | 
			
		||||
            total++;
 | 
			
		||||
            j = certify(&x, argv[i], pkey, x509p, dgst, attribs, db,
 | 
			
		||||
            j = certify(&x, argv[i], pkey, x509p, dgst, sigopts, attribs, db,
 | 
			
		||||
                        serial, subj, chtype, multirdn, email_dn, startdate,
 | 
			
		||||
                        enddate, days, batch, extensions, conf, verbose,
 | 
			
		||||
                        certopt, nameopt, default_op, ext_copy, selfsign);
 | 
			
		||||
@@ -1305,6 +1324,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            if (!NCONF_get_number(conf, section,
 | 
			
		||||
                                  ENV_DEFAULT_CRL_HOURS, &crlhours))
 | 
			
		||||
                crlhours = 0;
 | 
			
		||||
            ERR_clear_error();
 | 
			
		||||
        }
 | 
			
		||||
        if ((crldays == 0) && (crlhours == 0) && (crlsec == 0)) {
 | 
			
		||||
            BIO_printf(bio_err,
 | 
			
		||||
@@ -1401,7 +1421,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            crlnumber = NULL;
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        if (!X509_CRL_sign(crl, pkey, dgst))
 | 
			
		||||
        if (!do_X509_CRL_sign(bio_err, crl, pkey, dgst, sigopts))
 | 
			
		||||
            goto err;
 | 
			
		||||
 | 
			
		||||
        PEM_write_bio_X509_CRL(Sout, crl);
 | 
			
		||||
@@ -1456,6 +1476,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    BN_free(serial);
 | 
			
		||||
    BN_free(crlnumber);
 | 
			
		||||
    free_index(db);
 | 
			
		||||
    if (sigopts)
 | 
			
		||||
        sk_OPENSSL_STRING_free(sigopts);
 | 
			
		||||
    EVP_PKEY_free(pkey);
 | 
			
		||||
    if (x509)
 | 
			
		||||
        X509_free(x509);
 | 
			
		||||
@@ -1473,12 +1495,12 @@ static void lookup_fail(const char *name, const char *tag)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static int certify(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
 | 
			
		||||
                   const EVP_MD *dgst, STACK_OF(CONF_VALUE) *policy,
 | 
			
		||||
                   CA_DB *db, BIGNUM *serial, char *subj,
 | 
			
		||||
                   unsigned long chtype, int multirdn, int email_dn,
 | 
			
		||||
                   char *startdate, char *enddate, long days, int batch,
 | 
			
		||||
                   char *ext_sect, CONF *lconf, int verbose,
 | 
			
		||||
                   unsigned long certopt, unsigned long nameopt,
 | 
			
		||||
                   const EVP_MD *dgst, STACK_OF(OPENSSL_STRING) *sigopts,
 | 
			
		||||
                   STACK_OF(CONF_VALUE) *policy, CA_DB *db,
 | 
			
		||||
                   BIGNUM *serial, char *subj, unsigned long chtype,
 | 
			
		||||
                   int multirdn, int email_dn, char *startdate, char *enddate,
 | 
			
		||||
                   long days, int batch, char *ext_sect, CONF *lconf,
 | 
			
		||||
                   int verbose, unsigned long certopt, unsigned long nameopt,
 | 
			
		||||
                   int default_op, int ext_copy, int selfsign)
 | 
			
		||||
{
 | 
			
		||||
    X509_REQ *req = NULL;
 | 
			
		||||
@@ -1529,10 +1551,10 @@ static int certify(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
 | 
			
		||||
    } else
 | 
			
		||||
        BIO_printf(bio_err, "Signature ok\n");
 | 
			
		||||
 | 
			
		||||
    ok = do_body(xret, pkey, x509, dgst, policy, db, serial, subj, chtype,
 | 
			
		||||
                 multirdn, email_dn, startdate, enddate, days, batch, verbose,
 | 
			
		||||
                 req, ext_sect, lconf, certopt, nameopt, default_op, ext_copy,
 | 
			
		||||
                 selfsign);
 | 
			
		||||
    ok = do_body(xret, pkey, x509, dgst, sigopts, policy, db, serial, subj,
 | 
			
		||||
                 chtype, multirdn, email_dn, startdate, enddate, days, batch,
 | 
			
		||||
                 verbose, req, ext_sect, lconf, certopt, nameopt, default_op,
 | 
			
		||||
                 ext_copy, selfsign);
 | 
			
		||||
 | 
			
		||||
 err:
 | 
			
		||||
    if (req != NULL)
 | 
			
		||||
@@ -1543,13 +1565,14 @@ static int certify(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static int certify_cert(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
 | 
			
		||||
                        const EVP_MD *dgst, STACK_OF(CONF_VALUE) *policy,
 | 
			
		||||
                        CA_DB *db, BIGNUM *serial, char *subj,
 | 
			
		||||
                        unsigned long chtype, int multirdn, int email_dn,
 | 
			
		||||
                        char *startdate, char *enddate, long days, int batch,
 | 
			
		||||
                        char *ext_sect, CONF *lconf, int verbose,
 | 
			
		||||
                        unsigned long certopt, unsigned long nameopt,
 | 
			
		||||
                        int default_op, int ext_copy, ENGINE *e)
 | 
			
		||||
                        const EVP_MD *dgst, STACK_OF(OPENSSL_STRING) *sigopts,
 | 
			
		||||
                        STACK_OF(CONF_VALUE) *policy, CA_DB *db,
 | 
			
		||||
                        BIGNUM *serial, char *subj, unsigned long chtype,
 | 
			
		||||
                        int multirdn, int email_dn, char *startdate,
 | 
			
		||||
                        char *enddate, long days, int batch, char *ext_sect,
 | 
			
		||||
                        CONF *lconf, int verbose, unsigned long certopt,
 | 
			
		||||
                        unsigned long nameopt, int default_op, int ext_copy,
 | 
			
		||||
                        ENGINE *e)
 | 
			
		||||
{
 | 
			
		||||
    X509 *req = NULL;
 | 
			
		||||
    X509_REQ *rreq = NULL;
 | 
			
		||||
@@ -1585,9 +1608,9 @@ static int certify_cert(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
 | 
			
		||||
    if ((rreq = X509_to_X509_REQ(req, NULL, EVP_md5())) == NULL)
 | 
			
		||||
        goto err;
 | 
			
		||||
 | 
			
		||||
    ok = do_body(xret, pkey, x509, dgst, policy, db, serial, subj, chtype,
 | 
			
		||||
                 multirdn, email_dn, startdate, enddate, days, batch, verbose,
 | 
			
		||||
                 rreq, ext_sect, lconf, certopt, nameopt, default_op,
 | 
			
		||||
    ok = do_body(xret, pkey, x509, dgst, sigopts, policy, db, serial, subj,
 | 
			
		||||
                 chtype, multirdn, email_dn, startdate, enddate, days, batch,
 | 
			
		||||
                 verbose, rreq, ext_sect, lconf, certopt, nameopt, default_op,
 | 
			
		||||
                 ext_copy, 0);
 | 
			
		||||
 | 
			
		||||
 err:
 | 
			
		||||
@@ -1599,12 +1622,12 @@ static int certify_cert(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static int do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509,
 | 
			
		||||
                   const EVP_MD *dgst, STACK_OF(CONF_VALUE) *policy,
 | 
			
		||||
                   CA_DB *db, BIGNUM *serial, char *subj,
 | 
			
		||||
                   unsigned long chtype, int multirdn, int email_dn,
 | 
			
		||||
                   char *startdate, char *enddate, long days, int batch,
 | 
			
		||||
                   int verbose, X509_REQ *req, char *ext_sect, CONF *lconf,
 | 
			
		||||
                   unsigned long certopt, unsigned long nameopt,
 | 
			
		||||
                   const EVP_MD *dgst, STACK_OF(OPENSSL_STRING) *sigopts,
 | 
			
		||||
                   STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial,
 | 
			
		||||
                   char *subj, unsigned long chtype, int multirdn,
 | 
			
		||||
                   int email_dn, char *startdate, char *enddate, long days,
 | 
			
		||||
                   int batch, int verbose, X509_REQ *req, char *ext_sect,
 | 
			
		||||
                   CONF *lconf, unsigned long certopt, unsigned long nameopt,
 | 
			
		||||
                   int default_op, int ext_copy, int selfsign)
 | 
			
		||||
{
 | 
			
		||||
    X509_NAME *name = NULL, *CAname = NULL, *subject = NULL, *dn_subject =
 | 
			
		||||
@@ -2071,7 +2094,7 @@ static int do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509,
 | 
			
		||||
        EVP_PKEY_copy_parameters(pktmp, pkey);
 | 
			
		||||
    EVP_PKEY_free(pktmp);
 | 
			
		||||
 | 
			
		||||
    if (!X509_sign(ret, pkey, dgst))
 | 
			
		||||
    if (!do_X509_sign(bio_err, ret, pkey, dgst, sigopts))
 | 
			
		||||
        goto err;
 | 
			
		||||
 | 
			
		||||
    /* We now just add it to the database */
 | 
			
		||||
@@ -2164,6 +2187,7 @@ static void write_new_certificate(BIO *bp, X509 *x, int output_der,
 | 
			
		||||
 | 
			
		||||
static int certify_spkac(X509 **xret, char *infile, EVP_PKEY *pkey,
 | 
			
		||||
                         X509 *x509, const EVP_MD *dgst,
 | 
			
		||||
                         STACK_OF(OPENSSL_STRING) *sigopts,
 | 
			
		||||
                         STACK_OF(CONF_VALUE) *policy, CA_DB *db,
 | 
			
		||||
                         BIGNUM *serial, char *subj, unsigned long chtype,
 | 
			
		||||
                         int multirdn, int email_dn, char *startdate,
 | 
			
		||||
@@ -2286,10 +2310,10 @@ static int certify_spkac(X509 **xret, char *infile, EVP_PKEY *pkey,
 | 
			
		||||
 | 
			
		||||
    X509_REQ_set_pubkey(req, pktmp);
 | 
			
		||||
    EVP_PKEY_free(pktmp);
 | 
			
		||||
    ok = do_body(xret, pkey, x509, dgst, policy, db, serial, subj, chtype,
 | 
			
		||||
                 multirdn, email_dn, startdate, enddate, days, 1, verbose,
 | 
			
		||||
                 req, ext_sect, lconf, certopt, nameopt, default_op, ext_copy,
 | 
			
		||||
                 0);
 | 
			
		||||
    ok = do_body(xret, pkey, x509, dgst, sigopts, policy, db, serial, subj,
 | 
			
		||||
                 chtype, multirdn, email_dn, startdate, enddate, days, 1,
 | 
			
		||||
                 verbose, req, ext_sect, lconf, certopt, nameopt, default_op,
 | 
			
		||||
                 ext_copy, 0);
 | 
			
		||||
 err:
 | 
			
		||||
    if (req != NULL)
 | 
			
		||||
        X509_REQ_free(req);
 | 
			
		||||
@@ -2779,6 +2803,11 @@ int unpack_revinfo(ASN1_TIME **prevtm, int *preason, ASN1_OBJECT **phold,
 | 
			
		||||
    ASN1_GENERALIZEDTIME *comp_time = NULL;
 | 
			
		||||
    tmp = BUF_strdup(str);
 | 
			
		||||
 | 
			
		||||
    if (!tmp) {
 | 
			
		||||
        BIO_printf(bio_err, "memory allocation failure\n");
 | 
			
		||||
        goto err;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    p = strchr(tmp, ',');
 | 
			
		||||
 | 
			
		||||
    rtime_str = tmp;
 | 
			
		||||
@@ -2796,6 +2825,10 @@ int unpack_revinfo(ASN1_TIME **prevtm, int *preason, ASN1_OBJECT **phold,
 | 
			
		||||
 | 
			
		||||
    if (prevtm) {
 | 
			
		||||
        *prevtm = ASN1_UTCTIME_new();
 | 
			
		||||
        if (!*prevtm) {
 | 
			
		||||
            BIO_printf(bio_err, "memory allocation failure\n");
 | 
			
		||||
            goto err;
 | 
			
		||||
        }
 | 
			
		||||
        if (!ASN1_UTCTIME_set_string(*prevtm, rtime_str)) {
 | 
			
		||||
            BIO_printf(bio_err, "invalid revocation date %s\n", rtime_str);
 | 
			
		||||
            goto err;
 | 
			
		||||
@@ -2836,6 +2869,10 @@ int unpack_revinfo(ASN1_TIME **prevtm, int *preason, ASN1_OBJECT **phold,
 | 
			
		||||
                goto err;
 | 
			
		||||
            }
 | 
			
		||||
            comp_time = ASN1_GENERALIZEDTIME_new();
 | 
			
		||||
            if (!comp_time) {
 | 
			
		||||
                BIO_printf(bio_err, "memory allocation failure\n");
 | 
			
		||||
                goto err;
 | 
			
		||||
            }
 | 
			
		||||
            if (!ASN1_GENERALIZEDTIME_set_string(comp_time, arg_str)) {
 | 
			
		||||
                BIO_printf(bio_err, "invalid compromised time %s\n", arg_str);
 | 
			
		||||
                goto err;
 | 
			
		||||
 
 | 
			
		||||
@@ -182,7 +182,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            c = sk_SSL_CIPHER_value(sk, i);
 | 
			
		||||
 | 
			
		||||
            if (Verbose) {
 | 
			
		||||
                unsigned long id = c->id;
 | 
			
		||||
                unsigned long id = SSL_CIPHER_get_id(c);
 | 
			
		||||
                int id0 = (int)(id >> 24);
 | 
			
		||||
                int id1 = (int)((id >> 16) & 0xffL);
 | 
			
		||||
                int id2 = (int)((id >> 8) & 0xffL);
 | 
			
		||||
 
 | 
			
		||||
@@ -1,24 +1,52 @@
 | 
			
		||||
issuer= /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test CA (1024 bit)
 | 
			
		||||
subject=/C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Client test cert (512 bit)
 | 
			
		||||
subject= C = UK, O = OpenSSL Group, OU = FOR TESTING PURPOSES ONLY, CN = Test Client Cert
 | 
			
		||||
issuer= C = UK, O = OpenSSL Group, OU = FOR TESTING PURPOSES ONLY, CN = OpenSSL Test Intermediate CA
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIIB6TCCAVICAQIwDQYJKoZIhvcNAQEEBQAwWzELMAkGA1UEBhMCQVUxEzARBgNV
 | 
			
		||||
BAgTClF1ZWVuc2xhbmQxGjAYBgNVBAoTEUNyeXB0U29mdCBQdHkgTHRkMRswGQYD
 | 
			
		||||
VQQDExJUZXN0IENBICgxMDI0IGJpdCkwHhcNOTcwNjA5MTM1NzU2WhcNOTgwNjA5
 | 
			
		||||
MTM1NzU2WjBjMQswCQYDVQQGEwJBVTETMBEGA1UECBMKUXVlZW5zbGFuZDEaMBgG
 | 
			
		||||
A1UEChMRQ3J5cHRTb2Z0IFB0eSBMdGQxIzAhBgNVBAMTGkNsaWVudCB0ZXN0IGNl
 | 
			
		||||
cnQgKDUxMiBiaXQpMFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBALtv55QyzG6i2Plw
 | 
			
		||||
Z1pah7++Gv8L5j6Hnyr/uTZE1NLG0ABDDexmq/R4KedLjFEIYjocDui+IXs62NNt
 | 
			
		||||
XrT8odkCAwEAATANBgkqhkiG9w0BAQQFAAOBgQBwtMmI7oGUG8nKmftQssATViH5
 | 
			
		||||
NRRtoEw07DxJp/LfatHdrhqQB73eGdL5WILZJXk46Xz2e9WMSUjVCSYhdKxtflU3
 | 
			
		||||
UR2Ajv1Oo0sTNdfz0wDqJNirLNtzyhhsaq8qMTrLwXrCP31VxBiigFSQSUFnZyTE
 | 
			
		||||
9TKwhS4GlwbtCfxSKQ==
 | 
			
		||||
MIID5zCCAs+gAwIBAgIJALnu1NlVpZ6yMA0GCSqGSIb3DQEBBQUAMHAxCzAJBgNV
 | 
			
		||||
BAYTAlVLMRYwFAYDVQQKDA1PcGVuU1NMIEdyb3VwMSIwIAYDVQQLDBlGT1IgVEVT
 | 
			
		||||
VElORyBQVVJQT1NFUyBPTkxZMSUwIwYDVQQDDBxPcGVuU1NMIFRlc3QgSW50ZXJt
 | 
			
		||||
ZWRpYXRlIENBMB4XDTExMTIwODE0MDE0OFoXDTIxMTAxNjE0MDE0OFowZDELMAkG
 | 
			
		||||
A1UEBhMCVUsxFjAUBgNVBAoMDU9wZW5TU0wgR3JvdXAxIjAgBgNVBAsMGUZPUiBU
 | 
			
		||||
RVNUSU5HIFBVUlBPU0VTIE9OTFkxGTAXBgNVBAMMEFRlc3QgQ2xpZW50IENlcnQw
 | 
			
		||||
ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC0ranbHRLcLVqN+0BzcZpY
 | 
			
		||||
+yOLqxzDWT1LD9eW1stC4NzXX9/DCtSIVyN7YIHdGLrIPr64IDdXXaMRzgZ2rOKs
 | 
			
		||||
lmHCAiFpO/ja99gGCJRxH0xwQatqAULfJVHeUhs7OEGOZc2nWifjqKvGfNTilP7D
 | 
			
		||||
nwi69ipQFq9oS19FmhwVHk2wg7KZGHI1qDyG04UrfCZMRitvS9+UVhPpIPjuiBi2
 | 
			
		||||
x3/FZIpL5gXJvvFK6xHY63oq2asyzBATntBgnP4qJFWWcvRx24wF1PnZabxuVoL2
 | 
			
		||||
bPnQ/KvONDrw3IdqkKhYNTul7jEcu3OlcZIMw+7DiaKJLAzKb/bBF5gm/pwW6As9
 | 
			
		||||
AgMBAAGjgY8wgYwwDAYDVR0TAQH/BAIwADAOBgNVHQ8BAf8EBAMCBeAwLAYJYIZI
 | 
			
		||||
AYb4QgENBB8WHU9wZW5TU0wgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQW
 | 
			
		||||
BBSZHKyLoTh7Mb409Zn/mK1ceSDAjDAfBgNVHSMEGDAWgBQ2w2yI55X+sL3szj49
 | 
			
		||||
hqshgYfa2jANBgkqhkiG9w0BAQUFAAOCAQEAD0mL7PtPYgCEuDyOQSbLpeND5hVS
 | 
			
		||||
curxQdGnrJ6Acrhodb7E9ccATokeb0PLx6HBLQUicxhTZIQ9FbO43YkQcOU6C3BB
 | 
			
		||||
IlwskqmtN6+VmrQzNolHCDzvxNZs9lYL2VbGPGqVRyjZeHpoAlf9cQr8PgDb4d4b
 | 
			
		||||
vUx2KAhHQvV2nkmYvKyXcgnRuHggumF87mkxidriGAEFwH4qfOqetUg64WyxP7P2
 | 
			
		||||
QLipm04SyQa7ONtIApfVXgHcE42Py4/f4arzCzMjKe3VyhGkS7nsT55X/fWgTaRm
 | 
			
		||||
CQPkO+H94P958WTvQDt77bQ+D3IvYaVvfil8n6HJMOJfFT0LJuSUbpSXJg==
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
-----BEGIN RSA PRIVATE KEY-----
 | 
			
		||||
MIIBOwIBAAJBALtv55QyzG6i2PlwZ1pah7++Gv8L5j6Hnyr/uTZE1NLG0ABDDexm
 | 
			
		||||
q/R4KedLjFEIYjocDui+IXs62NNtXrT8odkCAwEAAQJAbwXq0vJ/+uyEvsNgxLko
 | 
			
		||||
/V86mGXQ/KrSkeKlL0r4ENxjcyeMAGoKu6J9yMY7+X9+Zm4nxShNfTsf/+Freoe1
 | 
			
		||||
HQIhAPOSm5Q1YI+KIsII2GeVJx1U69+wnd71OasIPakS1L1XAiEAxQAW+J3/JWE0
 | 
			
		||||
ftEYakbhUOKL8tD1OaFZS71/5GdG7E8CIQCefUMmySSvwd6kC0VlATSWbW+d+jp/
 | 
			
		||||
nWmM1KvqnAo5uQIhALqEADu5U1Wvt8UN8UDGBRPQulHWNycuNV45d3nnskWPAiAw
 | 
			
		||||
ueTyr6WsZ5+SD8g/Hy3xuvF3nPmJRH+rwvVihlcFOg==
 | 
			
		||||
MIIEpQIBAAKCAQEAtK2p2x0S3C1ajftAc3GaWPsji6scw1k9Sw/XltbLQuDc11/f
 | 
			
		||||
wwrUiFcje2CB3Ri6yD6+uCA3V12jEc4GdqzirJZhwgIhaTv42vfYBgiUcR9McEGr
 | 
			
		||||
agFC3yVR3lIbOzhBjmXNp1on46irxnzU4pT+w58IuvYqUBavaEtfRZocFR5NsIOy
 | 
			
		||||
mRhyNag8htOFK3wmTEYrb0vflFYT6SD47ogYtsd/xWSKS+YFyb7xSusR2Ot6Ktmr
 | 
			
		||||
MswQE57QYJz+KiRVlnL0cduMBdT52Wm8blaC9mz50PyrzjQ68NyHapCoWDU7pe4x
 | 
			
		||||
HLtzpXGSDMPuw4miiSwMym/2wReYJv6cFugLPQIDAQABAoIBAAZOyc9MhIwLSU4L
 | 
			
		||||
p4RgQvM4UVVe8/Id+3XTZ8NsXExJbWxXfIhiqGjaIfL8u4vsgRjcl+v1s/jo2/iT
 | 
			
		||||
KMab4o4D8gXD7UavQVDjtjb/ta79WL3SjRl2Uc9YjjMkyq6WmDNQeo2NKDdafCTB
 | 
			
		||||
1uzSJtLNipB8Z53ELPuHJhxX9QMHrMnuha49riQgXZ7buP9iQrHJFhImBjSzbxJx
 | 
			
		||||
L+TI6rkyLSf9Wi0Pd3L27Ob3QWNfNRYNSeTE+08eSRChkur5W0RuXAcuAICdQlCl
 | 
			
		||||
LBvWO/LmmvbzCqiDcgy/TliSb6CGGwgiNG7LJZmlkYNj8laGwalNlYZs3UrVv6NO
 | 
			
		||||
Br2loAECgYEA2kvCvPGj0Dg/6g7WhXDvAkEbcaL1tSeCxBbNH+6HS2UWMWvyTtCn
 | 
			
		||||
/bbD519QIdkvayy1QjEf32GV/UjUVmlULMLBcDy0DGjtL3+XpIhLKWDNxN1v1/ai
 | 
			
		||||
1oz23ZJCOgnk6K4qtFtlRS1XtynjA+rBetvYvLP9SKeFrnpzCgaA2r0CgYEA0+KX
 | 
			
		||||
1ACXDTNH5ySX3kMjSS9xdINf+OOw4CvPHFwbtc9aqk2HePlEsBTz5I/W3rKwXva3
 | 
			
		||||
NqZ/bRqVVeZB/hHKFywgdUQk2Uc5z/S7Lw70/w1HubNTXGU06Ngb6zOFAo/o/TwZ
 | 
			
		||||
zTP1BMIKSOB6PAZPS3l+aLO4FRIRotfFhgRHOoECgYEAmiZbqt8cJaJDB/5YYDzC
 | 
			
		||||
mp3tSk6gIb936Q6M5VqkMYp9pIKsxhk0N8aDCnTU+kIK6SzWBpr3/d9Ecmqmfyq7
 | 
			
		||||
5SvWO3KyVf0WWK9KH0abhOm2BKm2HBQvI0DB5u8sUx2/hsvOnjPYDISbZ11t0MtK
 | 
			
		||||
u35Zy89yMYcSsIYJjG/ROCUCgYEAgI2P9G5PNxEP5OtMwOsW84Y3Xat/hPAQFlI+
 | 
			
		||||
HES+AzbFGWJkeT8zL2nm95tVkFP1sggZ7Kxjz3w7cpx7GX0NkbWSE9O+T51pNASV
 | 
			
		||||
tN1sQ3p5M+/a+cnlqgfEGJVvc7iAcXQPa3LEi5h2yPR49QYXAgG6cifn3dDSpmwn
 | 
			
		||||
SUI7PQECgYEApGCIIpSRPLAEHTGmP87RBL1smurhwmy2s/pghkvUkWehtxg0sGHh
 | 
			
		||||
kuaqDWcskogv+QC0sVdytiLSz8G0DwcEcsHK1Fkyb8A+ayiw6jWJDo2m9+IF4Fww
 | 
			
		||||
1Te6jFPYDESnbhq7+TLGgHGhtwcu5cnb4vSuYXGXKupZGzoLOBbv1Zw=
 | 
			
		||||
-----END RSA PRIVATE KEY-----
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										31
									
								
								apps/cms.c
									
									
									
									
									
								
							
							
						
						
									
										31
									
								
								apps/cms.c
									
									
									
									
									
								
							@@ -137,6 +137,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    char *engine = NULL;
 | 
			
		||||
# endif
 | 
			
		||||
    unsigned char *secret_key = NULL, *secret_keyid = NULL;
 | 
			
		||||
    unsigned char *pwri_pass = NULL, *pwri_tmp = NULL;
 | 
			
		||||
    size_t secret_keylen = 0, secret_keyidlen = 0;
 | 
			
		||||
 | 
			
		||||
    ASN1_OBJECT *econtent_type = NULL;
 | 
			
		||||
@@ -313,6 +314,11 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                goto argerr;
 | 
			
		||||
            }
 | 
			
		||||
            secret_keyidlen = (size_t)ltmp;
 | 
			
		||||
        } else if (!strcmp(*args, "-pwri_password")) {
 | 
			
		||||
            if (!args[1])
 | 
			
		||||
                goto argerr;
 | 
			
		||||
            args++;
 | 
			
		||||
            pwri_pass = (unsigned char *)*args;
 | 
			
		||||
        } else if (!strcmp(*args, "-econtent_type")) {
 | 
			
		||||
            if (!args[1])
 | 
			
		||||
                goto argerr;
 | 
			
		||||
@@ -490,13 +496,13 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    else if (operation == SMIME_DECRYPT) {
 | 
			
		||||
        if (!recipfile && !keyfile && !secret_key) {
 | 
			
		||||
        if (!recipfile && !keyfile && !secret_key && !pwri_pass) {
 | 
			
		||||
            BIO_printf(bio_err,
 | 
			
		||||
                       "No recipient certificate or key specified\n");
 | 
			
		||||
            badarg = 1;
 | 
			
		||||
        }
 | 
			
		||||
    } else if (operation == SMIME_ENCRYPT) {
 | 
			
		||||
        if (!*args && !secret_key) {
 | 
			
		||||
        if (!*args && !secret_key && !pwri_pass) {
 | 
			
		||||
            BIO_printf(bio_err, "No recipient(s) certificate(s) specified\n");
 | 
			
		||||
            badarg = 1;
 | 
			
		||||
        }
 | 
			
		||||
@@ -574,6 +580,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-CApath dir    trusted certificates directory\n");
 | 
			
		||||
        BIO_printf(bio_err, "-CAfile file   trusted certificates file\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-no_alt_chains only ever use the first certificate chain found\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-crl_check     check revocation status of signer's certificate using CRLs\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
@@ -810,6 +818,16 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            secret_key = NULL;
 | 
			
		||||
            secret_keyid = NULL;
 | 
			
		||||
        }
 | 
			
		||||
        if (pwri_pass) {
 | 
			
		||||
            pwri_tmp = (unsigned char *)BUF_strdup((char *)pwri_pass);
 | 
			
		||||
            if (!pwri_tmp)
 | 
			
		||||
                goto end;
 | 
			
		||||
            if (!CMS_add0_recipient_password(cms,
 | 
			
		||||
                                             -1, NID_undef, NID_undef,
 | 
			
		||||
                                             pwri_tmp, -1, NULL))
 | 
			
		||||
                goto end;
 | 
			
		||||
            pwri_tmp = NULL;
 | 
			
		||||
        }
 | 
			
		||||
        if (!(flags & CMS_STREAM)) {
 | 
			
		||||
            if (!CMS_final(cms, in, NULL, flags))
 | 
			
		||||
                goto end;
 | 
			
		||||
@@ -915,6 +933,13 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        if (pwri_pass) {
 | 
			
		||||
            if (!CMS_decrypt_set1_password(cms, pwri_pass, -1)) {
 | 
			
		||||
                BIO_puts(bio_err, "Error decrypting CMS using password\n");
 | 
			
		||||
                goto end;
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        if (!CMS_decrypt(cms, NULL, NULL, indata, out, flags)) {
 | 
			
		||||
            BIO_printf(bio_err, "Error decrypting CMS structure\n");
 | 
			
		||||
            goto end;
 | 
			
		||||
@@ -1012,6 +1037,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        OPENSSL_free(secret_key);
 | 
			
		||||
    if (secret_keyid)
 | 
			
		||||
        OPENSSL_free(secret_keyid);
 | 
			
		||||
    if (pwri_tmp)
 | 
			
		||||
        OPENSSL_free(pwri_tmp);
 | 
			
		||||
    if (econtent_type)
 | 
			
		||||
        ASN1_OBJECT_free(econtent_type);
 | 
			
		||||
    if (rr)
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										6
									
								
								apps/demoSRP/srp_verifier.txt
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										6
									
								
								apps/demoSRP/srp_verifier.txt
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,6 @@
 | 
			
		||||
# This is a file that will be filled by the openssl srp routine.
 | 
			
		||||
# You can initialize the file with additional groups, these are
 | 
			
		||||
# records starting with a I followed by the g and N values and the id.
 | 
			
		||||
# The exact values ... you have to dig this out from the source of srp.c
 | 
			
		||||
# or srp_vfy.c
 | 
			
		||||
# The last value of an I is used as the default group for new users.  
 | 
			
		||||
							
								
								
									
										1
									
								
								apps/demoSRP/srp_verifier.txt.attr
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										1
									
								
								apps/demoSRP/srp_verifier.txt.attr
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1 @@
 | 
			
		||||
unique_subject = yes
 | 
			
		||||
							
								
								
									
										28
									
								
								apps/dgst.c
									
									
									
									
									
								
							
							
						
						
									
										28
									
								
								apps/dgst.c
									
									
									
									
									
								
							@@ -127,6 +127,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
#endif
 | 
			
		||||
    char *hmac_key = NULL;
 | 
			
		||||
    char *mac_name = NULL;
 | 
			
		||||
    int non_fips_allow = 0;
 | 
			
		||||
    STACK_OF(OPENSSL_STRING) *sigopts = NULL, *macopts = NULL;
 | 
			
		||||
 | 
			
		||||
    apps_startup();
 | 
			
		||||
@@ -206,6 +207,10 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            out_bin = 1;
 | 
			
		||||
        else if (strcmp(*argv, "-d") == 0)
 | 
			
		||||
            debug = 1;
 | 
			
		||||
        else if (!strcmp(*argv, "-fips-fingerprint"))
 | 
			
		||||
            hmac_key = "etaonrishdlcupfm";
 | 
			
		||||
        else if (strcmp(*argv, "-non-fips-allow") == 0)
 | 
			
		||||
            non_fips_allow = 1;
 | 
			
		||||
        else if (!strcmp(*argv, "-hmac")) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                break;
 | 
			
		||||
@@ -252,6 +257,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        BIO_printf(bio_err, "-d              to output debug info\n");
 | 
			
		||||
        BIO_printf(bio_err, "-hex            output as hex dump\n");
 | 
			
		||||
        BIO_printf(bio_err, "-binary         output in binary form\n");
 | 
			
		||||
        BIO_printf(bio_err, "-hmac arg       set the HMAC key to arg\n");
 | 
			
		||||
        BIO_printf(bio_err, "-non-fips-allow allow use of non FIPS digest\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-sign   file    sign digest using private key in file\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
@@ -280,6 +287,11 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
 | 
			
		||||
    in = BIO_new(BIO_s_file());
 | 
			
		||||
    bmd = BIO_new(BIO_f_md());
 | 
			
		||||
    if ((in == NULL) || (bmd == NULL)) {
 | 
			
		||||
        ERR_print_errors(bio_err);
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (debug) {
 | 
			
		||||
        BIO_set_callback(in, BIO_debug_callback);
 | 
			
		||||
        /* needed for windows 3.1 */
 | 
			
		||||
@@ -291,11 +303,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if ((in == NULL) || (bmd == NULL)) {
 | 
			
		||||
        ERR_print_errors(bio_err);
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (out_bin == -1) {
 | 
			
		||||
        if (keyfile)
 | 
			
		||||
            out_bin = 1;
 | 
			
		||||
@@ -377,6 +384,12 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (non_fips_allow) {
 | 
			
		||||
        EVP_MD_CTX *md_ctx;
 | 
			
		||||
        BIO_get_md_ctx(bmd, &md_ctx);
 | 
			
		||||
        EVP_MD_CTX_set_flags(md_ctx, EVP_MD_CTX_FLAG_NON_FIPS_ALLOW);
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (hmac_key) {
 | 
			
		||||
        sigkey = EVP_PKEY_new_mac_key(EVP_PKEY_HMAC, e,
 | 
			
		||||
                                      (unsigned char *)hmac_key, -1);
 | 
			
		||||
@@ -435,6 +448,11 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            ERR_print_errors(bio_err);
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
        if (!sigbuf) {
 | 
			
		||||
            BIO_printf(bio_err, "Out of memory\n");
 | 
			
		||||
            ERR_print_errors(bio_err);
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
        siglen = BIO_read(sigbio, sigbuf, siglen);
 | 
			
		||||
        BIO_free(sigbio);
 | 
			
		||||
        if (siglen <= 0) {
 | 
			
		||||
 
 | 
			
		||||
@@ -130,7 +130,7 @@
 | 
			
		||||
# undef PROG
 | 
			
		||||
# define PROG    dhparam_main
 | 
			
		||||
 | 
			
		||||
# define DEFBITS 512
 | 
			
		||||
# define DEFBITS 2048
 | 
			
		||||
 | 
			
		||||
/*-
 | 
			
		||||
 * -inform arg  - input format - default PEM (DER or PEM)
 | 
			
		||||
@@ -254,7 +254,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   " -5            generate parameters using  5 as the generator value\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   " numbits       number of bits in to generate (default 512)\n");
 | 
			
		||||
                   " numbits       number of bits in to generate (default 2048)\n");
 | 
			
		||||
# ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   " -engine e     use engine e, possibly a hardware device.\n");
 | 
			
		||||
 
 | 
			
		||||
@@ -310,6 +310,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                goto end;
 | 
			
		||||
            }
 | 
			
		||||
# endif
 | 
			
		||||
            ERR_print_errors(bio_err);
 | 
			
		||||
            BIO_printf(bio_err, "Error, DSA key generation failed\n");
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
@@ -405,8 +406,11 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        assert(need_rand);
 | 
			
		||||
        if ((dsakey = DSAparams_dup(dsa)) == NULL)
 | 
			
		||||
            goto end;
 | 
			
		||||
        if (!DSA_generate_key(dsakey))
 | 
			
		||||
        if (!DSA_generate_key(dsakey)) {
 | 
			
		||||
            ERR_print_errors(bio_err);
 | 
			
		||||
            DSA_free(dsakey);
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
        if (outformat == FORMAT_ASN1)
 | 
			
		||||
            i = i2d_DSAPrivateKey_bio(out, dsakey);
 | 
			
		||||
        else if (outformat == FORMAT_PEM)
 | 
			
		||||
@@ -414,6 +418,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                                            NULL);
 | 
			
		||||
        else {
 | 
			
		||||
            BIO_printf(bio_err, "bad output format specified for outfile\n");
 | 
			
		||||
            DSA_free(dsakey);
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
        DSA_free(dsakey);
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										36
									
								
								apps/enc.c
									
									
									
									
									
								
							
							
						
						
									
										36
									
								
								apps/enc.c
									
									
									
									
									
								
							@@ -130,6 +130,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    char *engine = NULL;
 | 
			
		||||
#endif
 | 
			
		||||
    const EVP_MD *dgst = NULL;
 | 
			
		||||
    int non_fips_allow = 0;
 | 
			
		||||
 | 
			
		||||
    apps_startup();
 | 
			
		||||
 | 
			
		||||
@@ -265,8 +266,10 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            md = *(++argv);
 | 
			
		||||
        } else if ((argv[0][0] == '-') &&
 | 
			
		||||
                   ((c = EVP_get_cipherbyname(&(argv[0][1]))) != NULL)) {
 | 
			
		||||
        } else if (strcmp(*argv, "-non-fips-allow") == 0)
 | 
			
		||||
            non_fips_allow = 1;
 | 
			
		||||
        else if ((argv[0][0] == '-') &&
 | 
			
		||||
                 ((c = EVP_get_cipherbyname(&(argv[0][1]))) != NULL)) {
 | 
			
		||||
            cipher = c;
 | 
			
		||||
        } else if (strcmp(*argv, "-none") == 0)
 | 
			
		||||
            cipher = NULL;
 | 
			
		||||
@@ -323,6 +326,18 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    setup_engine(bio_err, engine, 0);
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
    if (cipher && EVP_CIPHER_flags(cipher) & EVP_CIPH_FLAG_AEAD_CIPHER) {
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "AEAD ciphers not supported by the enc utility\n");
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (cipher && (EVP_CIPHER_mode(cipher) == EVP_CIPH_XTS_MODE)) {
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "Ciphers in XTS mode are not supported by the enc utility\n");
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (md && (dgst = EVP_get_digestbyname(md)) == NULL) {
 | 
			
		||||
        BIO_printf(bio_err, "%s is an unsupported message digest type\n", md);
 | 
			
		||||
        goto end;
 | 
			
		||||
@@ -533,9 +548,14 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            else
 | 
			
		||||
                OPENSSL_cleanse(str, strlen(str));
 | 
			
		||||
        }
 | 
			
		||||
        if ((hiv != NULL) && !set_hex(hiv, iv, sizeof iv)) {
 | 
			
		||||
            BIO_printf(bio_err, "invalid hex iv value\n");
 | 
			
		||||
            goto end;
 | 
			
		||||
        if (hiv != NULL) {
 | 
			
		||||
            int siz = EVP_CIPHER_iv_length(cipher);
 | 
			
		||||
            if (siz == 0) {
 | 
			
		||||
                BIO_printf(bio_err, "warning: iv not use by this cipher\n");
 | 
			
		||||
            } else if (!set_hex(hiv, iv, sizeof iv)) {
 | 
			
		||||
                BIO_printf(bio_err, "invalid hex iv value\n");
 | 
			
		||||
                goto end;
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
        if ((hiv == NULL) && (str == NULL)
 | 
			
		||||
            && EVP_CIPHER_iv_length(cipher) != 0) {
 | 
			
		||||
@@ -547,7 +567,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            BIO_printf(bio_err, "iv undefined\n");
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
        if ((hkey != NULL) && !set_hex(hkey, key, sizeof key)) {
 | 
			
		||||
        if ((hkey != NULL) && !set_hex(hkey, key, EVP_CIPHER_key_length(cipher))) {
 | 
			
		||||
            BIO_printf(bio_err, "invalid hex key value\n");
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
@@ -561,6 +581,10 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
         */
 | 
			
		||||
 | 
			
		||||
        BIO_get_cipher_ctx(benc, &ctx);
 | 
			
		||||
 | 
			
		||||
        if (non_fips_allow)
 | 
			
		||||
            EVP_CIPHER_CTX_set_flags(ctx, EVP_CIPH_FLAG_NON_FIPS_ALLOW);
 | 
			
		||||
 | 
			
		||||
        if (!EVP_CipherInit_ex(ctx, cipher, NULL, NULL, NULL, enc)) {
 | 
			
		||||
            BIO_printf(bio_err, "Error setting cipher %s\n",
 | 
			
		||||
                       EVP_CIPHER_name(cipher));
 | 
			
		||||
 
 | 
			
		||||
@@ -80,7 +80,7 @@
 | 
			
		||||
# include <openssl/x509.h>
 | 
			
		||||
# include <openssl/pem.h>
 | 
			
		||||
 | 
			
		||||
# define DEFBITS 512
 | 
			
		||||
# define DEFBITS 2048
 | 
			
		||||
# undef PROG
 | 
			
		||||
# define PROG gendh_main
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -80,7 +80,7 @@
 | 
			
		||||
# include <openssl/pem.h>
 | 
			
		||||
# include <openssl/rand.h>
 | 
			
		||||
 | 
			
		||||
# define DEFBITS 512
 | 
			
		||||
# define DEFBITS 1024
 | 
			
		||||
# undef PROG
 | 
			
		||||
# define PROG genrsa_main
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -184,7 +184,7 @@ $ LIB_OPENSSL = "VERIFY,ASN1PARS,REQ,DGST,DH,DHPARAM,ENC,PASSWD,GENDH,ERRSTR,"+-
 | 
			
		||||
	      	"X509,GENRSA,GENDSA,GENPKEY,S_SERVER,S_CLIENT,SPEED,"+-
 | 
			
		||||
	      	"S_TIME,APPS,S_CB,S_SOCKET,APP_RAND,VERSION,SESS_ID,"+-
 | 
			
		||||
	      	"CIPHERS,NSEQ,PKCS12,PKCS8,PKEY,PKEYPARAM,PKEYUTL,"+ -
 | 
			
		||||
	      	"SPKAC,SMIME,CMS,RAND,ENGINE,OCSP,PRIME,TS"
 | 
			
		||||
	      	"SPKAC,SMIME,CMS,RAND,ENGINE,OCSP,PRIME,TS,SRP"
 | 
			
		||||
$!
 | 
			
		||||
$ LIB_OPENSSL = LIB_OPENSSL+ ",VMS_DECC_INIT"
 | 
			
		||||
$!
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										11
									
								
								apps/ocsp.c
									
									
									
									
									
								
							
							
						
						
									
										11
									
								
								apps/ocsp.c
									
									
									
									
									
								
							@@ -518,6 +518,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                   "-CApath dir          trusted certificates directory\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-CAfile file         trusted certificates file\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-no_alt_chains       only ever use the first certificate chain found\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-VAfile file         validator certificates file\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
@@ -1300,16 +1302,7 @@ OCSP_RESPONSE *process_responder(BIO *err, OCSP_REQUEST *req,
 | 
			
		||||
        BIO_set_conn_port(cbio, port);
 | 
			
		||||
    if (use_ssl == 1) {
 | 
			
		||||
        BIO *sbio;
 | 
			
		||||
# if !defined(OPENSSL_NO_SSL2) && !defined(OPENSSL_NO_SSL3)
 | 
			
		||||
        ctx = SSL_CTX_new(SSLv23_client_method());
 | 
			
		||||
# elif !defined(OPENSSL_NO_SSL3)
 | 
			
		||||
        ctx = SSL_CTX_new(SSLv3_client_method());
 | 
			
		||||
# elif !defined(OPENSSL_NO_SSL2)
 | 
			
		||||
        ctx = SSL_CTX_new(SSLv2_client_method());
 | 
			
		||||
# else
 | 
			
		||||
        BIO_printf(err, "SSL is disabled\n");
 | 
			
		||||
        goto end;
 | 
			
		||||
# endif
 | 
			
		||||
        if (ctx == NULL) {
 | 
			
		||||
            BIO_printf(err, "Error creating SSL context.\n");
 | 
			
		||||
            goto end;
 | 
			
		||||
 
 | 
			
		||||
@@ -117,6 +117,7 @@
 | 
			
		||||
#include "apps.h"
 | 
			
		||||
#include <openssl/bio.h>
 | 
			
		||||
#include <openssl/crypto.h>
 | 
			
		||||
#include <openssl/rand.h>
 | 
			
		||||
#include <openssl/lhash.h>
 | 
			
		||||
#include <openssl/conf.h>
 | 
			
		||||
#include <openssl/x509.h>
 | 
			
		||||
@@ -130,6 +131,9 @@
 | 
			
		||||
#include "progs.h"
 | 
			
		||||
#include "s_apps.h"
 | 
			
		||||
#include <openssl/err.h>
 | 
			
		||||
#ifdef OPENSSL_FIPS
 | 
			
		||||
# include <openssl/fips.h>
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
/*
 | 
			
		||||
 * The LHASH callbacks ("hash" & "cmp") have been replaced by functions with
 | 
			
		||||
@@ -304,6 +308,19 @@ int main(int Argc, char *ARGV[])
 | 
			
		||||
        CRYPTO_set_locking_callback(lock_dbg_cb);
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (getenv("OPENSSL_FIPS")) {
 | 
			
		||||
#ifdef OPENSSL_FIPS
 | 
			
		||||
        if (!FIPS_mode_set(1)) {
 | 
			
		||||
            ERR_load_crypto_strings();
 | 
			
		||||
            ERR_print_errors(BIO_new_fp(stderr, BIO_NOCLOSE));
 | 
			
		||||
            EXIT(1);
 | 
			
		||||
        }
 | 
			
		||||
#else
 | 
			
		||||
        fprintf(stderr, "FIPS mode not supported.\n");
 | 
			
		||||
        EXIT(1);
 | 
			
		||||
#endif
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    apps_startup();
 | 
			
		||||
 | 
			
		||||
    /* Lets load up our environment a little */
 | 
			
		||||
@@ -411,19 +428,19 @@ int main(int Argc, char *ARGV[])
 | 
			
		||||
    if (arg.data != NULL)
 | 
			
		||||
        OPENSSL_free(arg.data);
 | 
			
		||||
 | 
			
		||||
    apps_shutdown();
 | 
			
		||||
 | 
			
		||||
    CRYPTO_mem_leaks(bio_err);
 | 
			
		||||
    if (bio_err != NULL) {
 | 
			
		||||
        BIO_free(bio_err);
 | 
			
		||||
        bio_err = NULL;
 | 
			
		||||
    }
 | 
			
		||||
#if defined( OPENSSL_SYS_VMS) && (__INITIAL_POINTER_SIZE == 64)
 | 
			
		||||
    /* Free any duplicate Argv[] storage. */
 | 
			
		||||
    if (free_Argv) {
 | 
			
		||||
        OPENSSL_free(Argv);
 | 
			
		||||
    }
 | 
			
		||||
#endif
 | 
			
		||||
    apps_shutdown();
 | 
			
		||||
    CRYPTO_mem_leaks(bio_err);
 | 
			
		||||
    if (bio_err != NULL) {
 | 
			
		||||
        BIO_free(bio_err);
 | 
			
		||||
        bio_err = NULL;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    OPENSSL_EXIT(ret);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -116,7 +116,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    int maciter = PKCS12_DEFAULT_ITER;
 | 
			
		||||
    int twopass = 0;
 | 
			
		||||
    int keytype = 0;
 | 
			
		||||
    int cert_pbe = NID_pbe_WithSHA1And40BitRC2_CBC;
 | 
			
		||||
    int cert_pbe;
 | 
			
		||||
    int key_pbe = NID_pbe_WithSHA1And3_Key_TripleDES_CBC;
 | 
			
		||||
    int ret = 1;
 | 
			
		||||
    int macver = 1;
 | 
			
		||||
@@ -134,6 +134,13 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
 | 
			
		||||
    apps_startup();
 | 
			
		||||
 | 
			
		||||
# ifdef OPENSSL_FIPS
 | 
			
		||||
    if (FIPS_mode())
 | 
			
		||||
        cert_pbe = NID_pbe_WithSHA1And3_Key_TripleDES_CBC;
 | 
			
		||||
    else
 | 
			
		||||
# endif
 | 
			
		||||
        cert_pbe = NID_pbe_WithSHA1And40BitRC2_CBC;
 | 
			
		||||
 | 
			
		||||
    enc = EVP_des_ede3_cbc();
 | 
			
		||||
    if (bio_err == NULL)
 | 
			
		||||
        bio_err = BIO_new_fp(stderr, BIO_NOCLOSE);
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										10
									
								
								apps/pkcs7.c
									
									
									
									
									
								
							
							
						
						
									
										10
									
								
								apps/pkcs7.c
									
									
									
									
									
								
							@@ -189,11 +189,11 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    if (infile == NULL)
 | 
			
		||||
        BIO_set_fp(in, stdin, BIO_NOCLOSE);
 | 
			
		||||
    else {
 | 
			
		||||
        if (BIO_read_filename(in, infile) <= 0)
 | 
			
		||||
            if (in == NULL) {
 | 
			
		||||
                perror(infile);
 | 
			
		||||
                goto end;
 | 
			
		||||
            }
 | 
			
		||||
        if (BIO_read_filename(in, infile) <= 0) {
 | 
			
		||||
            BIO_printf(bio_err, "unable to load input file\n");
 | 
			
		||||
            ERR_print_errors(bio_err);
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (informat == FORMAT_ASN1)
 | 
			
		||||
 
 | 
			
		||||
@@ -46,6 +46,7 @@ extern int engine_main(int argc, char *argv[]);
 | 
			
		||||
extern int ocsp_main(int argc, char *argv[]);
 | 
			
		||||
extern int prime_main(int argc, char *argv[]);
 | 
			
		||||
extern int ts_main(int argc, char *argv[]);
 | 
			
		||||
extern int srp_main(int argc, char *argv[]);
 | 
			
		||||
 | 
			
		||||
#define FUNC_TYPE_GENERAL       1
 | 
			
		||||
#define FUNC_TYPE_MD            2
 | 
			
		||||
@@ -147,6 +148,9 @@ FUNCTION functions[] = {
 | 
			
		||||
#endif
 | 
			
		||||
    {FUNC_TYPE_GENERAL, "prime", prime_main},
 | 
			
		||||
    {FUNC_TYPE_GENERAL, "ts", ts_main},
 | 
			
		||||
#ifndef OPENSSL_NO_SRP
 | 
			
		||||
    {FUNC_TYPE_GENERAL, "srp", srp_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_MD2
 | 
			
		||||
    {FUNC_TYPE_MD, "md2", dgst_main},
 | 
			
		||||
#endif
 | 
			
		||||
 
 | 
			
		||||
@@ -51,6 +51,8 @@ foreach (@ARGV)
 | 
			
		||||
		{ print "#ifndef OPENSSL_NO_CMS\n${str}#endif\n"; }
 | 
			
		||||
	elsif ( ($_ =~ /^ocsp$/))
 | 
			
		||||
		{ print "#ifndef OPENSSL_NO_OCSP\n${str}#endif\n"; }
 | 
			
		||||
	elsif ( ($_ =~ /^srp$/))
 | 
			
		||||
		{ print "#ifndef OPENSSL_NO_SRP\n${str}#endif\n"; }
 | 
			
		||||
	else
 | 
			
		||||
		{ print $str; }
 | 
			
		||||
	}
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										75
									
								
								apps/req.c
									
									
									
									
									
								
							
							
						
						
									
										75
									
								
								apps/req.c
									
									
									
									
									
								
							@@ -169,7 +169,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    EVP_PKEY_CTX *genctx = NULL;
 | 
			
		||||
    const char *keyalg = NULL;
 | 
			
		||||
    char *keyalgstr = NULL;
 | 
			
		||||
    STACK_OF(OPENSSL_STRING) *pkeyopts = NULL;
 | 
			
		||||
    STACK_OF(OPENSSL_STRING) *pkeyopts = NULL, *sigopts = NULL;
 | 
			
		||||
    EVP_PKEY *pkey = NULL;
 | 
			
		||||
    int i = 0, badops = 0, newreq = 0, verbose = 0, pkey_type = -1;
 | 
			
		||||
    long newkey = -1;
 | 
			
		||||
@@ -295,6 +295,13 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                pkeyopts = sk_OPENSSL_STRING_new_null();
 | 
			
		||||
            if (!pkeyopts || !sk_OPENSSL_STRING_push(pkeyopts, *(++argv)))
 | 
			
		||||
                goto bad;
 | 
			
		||||
        } else if (strcmp(*argv, "-sigopt") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            if (!sigopts)
 | 
			
		||||
                sigopts = sk_OPENSSL_STRING_new_null();
 | 
			
		||||
            if (!sigopts || !sk_OPENSSL_STRING_push(sigopts, *(++argv)))
 | 
			
		||||
                goto bad;
 | 
			
		||||
        } else if (strcmp(*argv, "-batch") == 0)
 | 
			
		||||
            batch = 1;
 | 
			
		||||
        else if (strcmp(*argv, "-newhdr") == 0)
 | 
			
		||||
@@ -818,7 +825,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                goto end;
 | 
			
		||||
            }
 | 
			
		||||
 | 
			
		||||
            if (!(i = X509_sign(x509ss, pkey, digest))) {
 | 
			
		||||
            i = do_X509_sign(bio_err, x509ss, pkey, digest, sigopts);
 | 
			
		||||
            if (!i) {
 | 
			
		||||
                ERR_print_errors(bio_err);
 | 
			
		||||
                goto end;
 | 
			
		||||
            }
 | 
			
		||||
@@ -838,7 +846,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                           req_exts);
 | 
			
		||||
                goto end;
 | 
			
		||||
            }
 | 
			
		||||
            if (!(i = X509_REQ_sign(req, pkey, digest))) {
 | 
			
		||||
            i = do_X509_REQ_sign(bio_err, req, pkey, digest, sigopts);
 | 
			
		||||
            if (!i) {
 | 
			
		||||
                ERR_print_errors(bio_err);
 | 
			
		||||
                goto end;
 | 
			
		||||
            }
 | 
			
		||||
@@ -1019,6 +1028,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        EVP_PKEY_CTX_free(genctx);
 | 
			
		||||
    if (pkeyopts)
 | 
			
		||||
        sk_OPENSSL_STRING_free(pkeyopts);
 | 
			
		||||
    if (sigopts)
 | 
			
		||||
        sk_OPENSSL_STRING_free(sigopts);
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
    if (gen_eng)
 | 
			
		||||
        ENGINE_free(gen_eng);
 | 
			
		||||
@@ -1661,3 +1672,61 @@ static int genpkey_cb(EVP_PKEY_CTX *ctx)
 | 
			
		||||
#endif
 | 
			
		||||
    return 1;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static int do_sign_init(BIO *err, EVP_MD_CTX *ctx, EVP_PKEY *pkey,
 | 
			
		||||
                        const EVP_MD *md, STACK_OF(OPENSSL_STRING) *sigopts)
 | 
			
		||||
{
 | 
			
		||||
    EVP_PKEY_CTX *pkctx = NULL;
 | 
			
		||||
    int i;
 | 
			
		||||
    EVP_MD_CTX_init(ctx);
 | 
			
		||||
    if (!EVP_DigestSignInit(ctx, &pkctx, md, NULL, pkey))
 | 
			
		||||
        return 0;
 | 
			
		||||
    for (i = 0; i < sk_OPENSSL_STRING_num(sigopts); i++) {
 | 
			
		||||
        char *sigopt = sk_OPENSSL_STRING_value(sigopts, i);
 | 
			
		||||
        if (pkey_ctrl_string(pkctx, sigopt) <= 0) {
 | 
			
		||||
            BIO_printf(err, "parameter error \"%s\"\n", sigopt);
 | 
			
		||||
            ERR_print_errors(bio_err);
 | 
			
		||||
            return 0;
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
    return 1;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
int do_X509_sign(BIO *err, X509 *x, EVP_PKEY *pkey, const EVP_MD *md,
 | 
			
		||||
                 STACK_OF(OPENSSL_STRING) *sigopts)
 | 
			
		||||
{
 | 
			
		||||
    int rv;
 | 
			
		||||
    EVP_MD_CTX mctx;
 | 
			
		||||
    EVP_MD_CTX_init(&mctx);
 | 
			
		||||
    rv = do_sign_init(err, &mctx, pkey, md, sigopts);
 | 
			
		||||
    if (rv > 0)
 | 
			
		||||
        rv = X509_sign_ctx(x, &mctx);
 | 
			
		||||
    EVP_MD_CTX_cleanup(&mctx);
 | 
			
		||||
    return rv > 0 ? 1 : 0;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
int do_X509_REQ_sign(BIO *err, X509_REQ *x, EVP_PKEY *pkey, const EVP_MD *md,
 | 
			
		||||
                     STACK_OF(OPENSSL_STRING) *sigopts)
 | 
			
		||||
{
 | 
			
		||||
    int rv;
 | 
			
		||||
    EVP_MD_CTX mctx;
 | 
			
		||||
    EVP_MD_CTX_init(&mctx);
 | 
			
		||||
    rv = do_sign_init(err, &mctx, pkey, md, sigopts);
 | 
			
		||||
    if (rv > 0)
 | 
			
		||||
        rv = X509_REQ_sign_ctx(x, &mctx);
 | 
			
		||||
    EVP_MD_CTX_cleanup(&mctx);
 | 
			
		||||
    return rv > 0 ? 1 : 0;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
int do_X509_CRL_sign(BIO *err, X509_CRL *x, EVP_PKEY *pkey, const EVP_MD *md,
 | 
			
		||||
                     STACK_OF(OPENSSL_STRING) *sigopts)
 | 
			
		||||
{
 | 
			
		||||
    int rv;
 | 
			
		||||
    EVP_MD_CTX mctx;
 | 
			
		||||
    EVP_MD_CTX_init(&mctx);
 | 
			
		||||
    rv = do_sign_init(err, &mctx, pkey, md, sigopts);
 | 
			
		||||
    if (rv > 0)
 | 
			
		||||
        rv = X509_CRL_sign_ctx(x, &mctx);
 | 
			
		||||
    EVP_MD_CTX_cleanup(&mctx);
 | 
			
		||||
    return rv > 0 ? 1 : 0;
 | 
			
		||||
}
 | 
			
		||||
 
 | 
			
		||||
@@ -268,6 +268,11 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
 | 
			
		||||
    rsa_in = OPENSSL_malloc(keysize * 2);
 | 
			
		||||
    rsa_out = OPENSSL_malloc(keysize);
 | 
			
		||||
    if (!rsa_in || !rsa_out) {
 | 
			
		||||
        BIO_printf(bio_err, "Out of memory\n");
 | 
			
		||||
        ERR_print_errors(bio_err);
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    /* Read the input data */
 | 
			
		||||
    rsa_inlen = BIO_read(in, rsa_in, keysize * 2);
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										75
									
								
								apps/s_cb.c
									
									
									
									
									
								
							
							
						
						
									
										75
									
								
								apps/s_cb.c
									
									
									
									
									
								
							@@ -111,6 +111,7 @@
 | 
			
		||||
 | 
			
		||||
#include <stdio.h>
 | 
			
		||||
#include <stdlib.h>
 | 
			
		||||
#include <string.h> /* for memcpy() */
 | 
			
		||||
#define USE_SOCKETS
 | 
			
		||||
#define NON_MAIN
 | 
			
		||||
#include "apps.h"
 | 
			
		||||
@@ -345,6 +346,12 @@ void MS_CALLBACK msg_cb(int write_p, int version, int content_type,
 | 
			
		||||
    case TLS1_VERSION:
 | 
			
		||||
        str_version = "TLS 1.0 ";
 | 
			
		||||
        break;
 | 
			
		||||
    case TLS1_1_VERSION:
 | 
			
		||||
        str_version = "TLS 1.1 ";
 | 
			
		||||
        break;
 | 
			
		||||
    case TLS1_2_VERSION:
 | 
			
		||||
        str_version = "TLS 1.2 ";
 | 
			
		||||
        break;
 | 
			
		||||
    case DTLS1_VERSION:
 | 
			
		||||
        str_version = "DTLS 1.0 ";
 | 
			
		||||
        break;
 | 
			
		||||
@@ -415,6 +422,8 @@ void MS_CALLBACK msg_cb(int write_p, int version, int content_type,
 | 
			
		||||
 | 
			
		||||
    if (version == SSL3_VERSION ||
 | 
			
		||||
        version == TLS1_VERSION ||
 | 
			
		||||
        version == TLS1_1_VERSION ||
 | 
			
		||||
        version == TLS1_2_VERSION ||
 | 
			
		||||
        version == DTLS1_VERSION || version == DTLS1_BAD_VER) {
 | 
			
		||||
        switch (content_type) {
 | 
			
		||||
        case 20:
 | 
			
		||||
@@ -527,6 +536,9 @@ void MS_CALLBACK msg_cb(int write_p, int version, int content_type,
 | 
			
		||||
                case 114:
 | 
			
		||||
                    str_details2 = " bad_certificate_hash_value";
 | 
			
		||||
                    break;
 | 
			
		||||
                case 115:
 | 
			
		||||
                    str_details2 = " unknown_psk_identity";
 | 
			
		||||
                    break;
 | 
			
		||||
                }
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
@@ -572,6 +584,22 @@ void MS_CALLBACK msg_cb(int write_p, int version, int content_type,
 | 
			
		||||
                }
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
#ifndef OPENSSL_NO_HEARTBEATS
 | 
			
		||||
        if (content_type == 24) { /* Heartbeat */
 | 
			
		||||
            str_details1 = ", Heartbeat";
 | 
			
		||||
 | 
			
		||||
            if (len > 0) {
 | 
			
		||||
                switch (((const unsigned char *)buf)[0]) {
 | 
			
		||||
                case 1:
 | 
			
		||||
                    str_details1 = ", HeartbeatRequest";
 | 
			
		||||
                    break;
 | 
			
		||||
                case 2:
 | 
			
		||||
                    str_details1 = ", HeartbeatResponse";
 | 
			
		||||
                    break;
 | 
			
		||||
                }
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
#endif
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    BIO_printf(bio, "%s %s%s [length %04lx]%s%s\n", str_write_p, str_version,
 | 
			
		||||
@@ -630,6 +658,22 @@ void MS_CALLBACK tlsext_cb(SSL *s, int client_server, int type,
 | 
			
		||||
        extname = "status request";
 | 
			
		||||
        break;
 | 
			
		||||
 | 
			
		||||
    case TLSEXT_TYPE_user_mapping:
 | 
			
		||||
        extname = "user mapping";
 | 
			
		||||
        break;
 | 
			
		||||
 | 
			
		||||
    case TLSEXT_TYPE_client_authz:
 | 
			
		||||
        extname = "client authz";
 | 
			
		||||
        break;
 | 
			
		||||
 | 
			
		||||
    case TLSEXT_TYPE_server_authz:
 | 
			
		||||
        extname = "server authz";
 | 
			
		||||
        break;
 | 
			
		||||
 | 
			
		||||
    case TLSEXT_TYPE_cert_type:
 | 
			
		||||
        extname = "cert type";
 | 
			
		||||
        break;
 | 
			
		||||
 | 
			
		||||
    case TLSEXT_TYPE_elliptic_curves:
 | 
			
		||||
        extname = "elliptic curves";
 | 
			
		||||
        break;
 | 
			
		||||
@@ -638,12 +682,28 @@ void MS_CALLBACK tlsext_cb(SSL *s, int client_server, int type,
 | 
			
		||||
        extname = "EC point formats";
 | 
			
		||||
        break;
 | 
			
		||||
 | 
			
		||||
    case TLSEXT_TYPE_srp:
 | 
			
		||||
        extname = "SRP";
 | 
			
		||||
        break;
 | 
			
		||||
 | 
			
		||||
    case TLSEXT_TYPE_signature_algorithms:
 | 
			
		||||
        extname = "signature algorithms";
 | 
			
		||||
        break;
 | 
			
		||||
 | 
			
		||||
    case TLSEXT_TYPE_use_srtp:
 | 
			
		||||
        extname = "use SRTP";
 | 
			
		||||
        break;
 | 
			
		||||
 | 
			
		||||
    case TLSEXT_TYPE_heartbeat:
 | 
			
		||||
        extname = "heartbeat";
 | 
			
		||||
        break;
 | 
			
		||||
 | 
			
		||||
    case TLSEXT_TYPE_session_ticket:
 | 
			
		||||
        extname = "server ticket";
 | 
			
		||||
        extname = "session ticket";
 | 
			
		||||
        break;
 | 
			
		||||
 | 
			
		||||
    case TLSEXT_TYPE_renegotiate:
 | 
			
		||||
        extname = "renegotiate";
 | 
			
		||||
        extname = "renegotiation info";
 | 
			
		||||
        break;
 | 
			
		||||
 | 
			
		||||
#ifdef TLSEXT_TYPE_opaque_prf_input
 | 
			
		||||
@@ -651,6 +711,15 @@ void MS_CALLBACK tlsext_cb(SSL *s, int client_server, int type,
 | 
			
		||||
        extname = "opaque PRF input";
 | 
			
		||||
        break;
 | 
			
		||||
#endif
 | 
			
		||||
#ifdef TLSEXT_TYPE_next_proto_neg
 | 
			
		||||
    case TLSEXT_TYPE_next_proto_neg:
 | 
			
		||||
        extname = "next protocol";
 | 
			
		||||
        break;
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
    case TLSEXT_TYPE_padding:
 | 
			
		||||
        extname = "TLS padding";
 | 
			
		||||
        break;
 | 
			
		||||
 | 
			
		||||
    default:
 | 
			
		||||
        extname = "unknown";
 | 
			
		||||
@@ -679,7 +748,7 @@ int MS_CALLBACK generate_cookie_callback(SSL *ssl, unsigned char *cookie,
 | 
			
		||||
 | 
			
		||||
    /* Initialize a random secret */
 | 
			
		||||
    if (!cookie_initialized) {
 | 
			
		||||
        if (!RAND_bytes(cookie_secret, COOKIE_SECRET_LENGTH)) {
 | 
			
		||||
        if (RAND_bytes(cookie_secret, COOKIE_SECRET_LENGTH) <= 0) {
 | 
			
		||||
            BIO_printf(bio_err, "error setting random cookie secret\n");
 | 
			
		||||
            return 0;
 | 
			
		||||
        }
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										418
									
								
								apps/s_client.c
									
									
									
									
									
								
							
							
						
						
									
										418
									
								
								apps/s_client.c
									
									
									
									
									
								
							@@ -165,6 +165,9 @@ typedef unsigned int u_int;
 | 
			
		||||
#include <openssl/rand.h>
 | 
			
		||||
#include <openssl/ocsp.h>
 | 
			
		||||
#include <openssl/bn.h>
 | 
			
		||||
#ifndef OPENSSL_NO_SRP
 | 
			
		||||
# include <openssl/srp.h>
 | 
			
		||||
#endif
 | 
			
		||||
#include "s_apps.h"
 | 
			
		||||
#include "timeouts.h"
 | 
			
		||||
 | 
			
		||||
@@ -212,6 +215,9 @@ static int c_status_req = 0;
 | 
			
		||||
static int c_msg = 0;
 | 
			
		||||
static int c_showcerts = 0;
 | 
			
		||||
 | 
			
		||||
static char *keymatexportlabel = NULL;
 | 
			
		||||
static int keymatexportlen = 20;
 | 
			
		||||
 | 
			
		||||
static void sc_usage(void);
 | 
			
		||||
static void print_stuff(BIO *berr, SSL *con, int full);
 | 
			
		||||
#ifndef OPENSSL_NO_TLSEXT
 | 
			
		||||
@@ -316,6 +322,8 @@ static void sc_usage(void)
 | 
			
		||||
               " -pass arg     - private key file pass phrase source\n");
 | 
			
		||||
    BIO_printf(bio_err, " -CApath arg   - PEM format directory of CA's\n");
 | 
			
		||||
    BIO_printf(bio_err, " -CAfile arg   - PEM format file of CA's\n");
 | 
			
		||||
    BIO_printf(bio_err,
 | 
			
		||||
               " -no_alt_chains - only ever use the first certificate chain found\n");
 | 
			
		||||
    BIO_printf(bio_err,
 | 
			
		||||
               " -reconnect    - Drop and re-make the connection with the same Session-ID\n");
 | 
			
		||||
    BIO_printf(bio_err,
 | 
			
		||||
@@ -346,15 +354,31 @@ static void sc_usage(void)
 | 
			
		||||
# ifndef OPENSSL_NO_JPAKE
 | 
			
		||||
    BIO_printf(bio_err, " -jpake arg    - JPAKE secret to use\n");
 | 
			
		||||
# endif
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_SRP
 | 
			
		||||
    BIO_printf(bio_err,
 | 
			
		||||
               " -srpuser user     - SRP authentification for 'user'\n");
 | 
			
		||||
    BIO_printf(bio_err, " -srppass arg      - password for 'user'\n");
 | 
			
		||||
    BIO_printf(bio_err,
 | 
			
		||||
               " -srp_lateuser     - SRP username into second ClientHello message\n");
 | 
			
		||||
    BIO_printf(bio_err,
 | 
			
		||||
               " -srp_moregroups   - Tolerate other than the known g N values.\n");
 | 
			
		||||
    BIO_printf(bio_err,
 | 
			
		||||
               " -srp_strength int - minimal length in bits for N (default %d).\n",
 | 
			
		||||
               SRP_MINIMAL_N);
 | 
			
		||||
#endif
 | 
			
		||||
    BIO_printf(bio_err, " -ssl2         - just use SSLv2\n");
 | 
			
		||||
#ifndef OPENSSL_NO_SSL3_METHOD
 | 
			
		||||
    BIO_printf(bio_err, " -ssl3         - just use SSLv3\n");
 | 
			
		||||
#endif
 | 
			
		||||
    BIO_printf(bio_err, " -tls1_2       - just use TLSv1.2\n");
 | 
			
		||||
    BIO_printf(bio_err, " -tls1_1       - just use TLSv1.1\n");
 | 
			
		||||
    BIO_printf(bio_err, " -tls1         - just use TLSv1\n");
 | 
			
		||||
    BIO_printf(bio_err, " -dtls1        - just use DTLSv1\n");
 | 
			
		||||
    BIO_printf(bio_err, " -fallback_scsv - send TLS_FALLBACK_SCSV\n");
 | 
			
		||||
    BIO_printf(bio_err, " -mtu          - set the link layer MTU\n");
 | 
			
		||||
    BIO_printf(bio_err,
 | 
			
		||||
               " -no_tls1/-no_ssl3/-no_ssl2 - turn off that protocol\n");
 | 
			
		||||
               " -no_tls1_2/-no_tls1_1/-no_tls1/-no_ssl3/-no_ssl2 - turn off that protocol\n");
 | 
			
		||||
    BIO_printf(bio_err,
 | 
			
		||||
               " -bugs         - Switch on all SSL implementation bug workarounds\n");
 | 
			
		||||
    BIO_printf(bio_err,
 | 
			
		||||
@@ -389,9 +413,21 @@ static void sc_usage(void)
 | 
			
		||||
               " -status           - request certificate status from server\n");
 | 
			
		||||
    BIO_printf(bio_err,
 | 
			
		||||
               " -no_ticket        - disable use of RFC4507bis session tickets\n");
 | 
			
		||||
# ifndef OPENSSL_NO_NEXTPROTONEG
 | 
			
		||||
    BIO_printf(bio_err,
 | 
			
		||||
               " -nextprotoneg arg - enable NPN extension, considering named protocols supported (comma-separated list)\n");
 | 
			
		||||
# endif
 | 
			
		||||
#endif
 | 
			
		||||
    BIO_printf(bio_err,
 | 
			
		||||
               " -legacy_renegotiation - enable use of legacy renegotiation (dangerous)\n");
 | 
			
		||||
#ifndef OPENSSL_NO_SRTP
 | 
			
		||||
    BIO_printf(bio_err,
 | 
			
		||||
               " -use_srtp profiles - Offer SRTP key management with a colon-separated profile list\n");
 | 
			
		||||
#endif
 | 
			
		||||
    BIO_printf(bio_err,
 | 
			
		||||
               " -keymatexport label   - Export keying material using label\n");
 | 
			
		||||
    BIO_printf(bio_err,
 | 
			
		||||
               " -keymatexportlen len  - Export len bytes of keying material (default 20)\n");
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_TLSEXT
 | 
			
		||||
@@ -413,6 +449,162 @@ static int MS_CALLBACK ssl_servername_cb(SSL *s, int *ad, void *arg)
 | 
			
		||||
 | 
			
		||||
    return SSL_TLSEXT_ERR_OK;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# ifndef OPENSSL_NO_SRP
 | 
			
		||||
 | 
			
		||||
/* This is a context that we pass to all callbacks */
 | 
			
		||||
typedef struct srp_arg_st {
 | 
			
		||||
    char *srppassin;
 | 
			
		||||
    char *srplogin;
 | 
			
		||||
    int msg;                    /* copy from c_msg */
 | 
			
		||||
    int debug;                  /* copy from c_debug */
 | 
			
		||||
    int amp;                    /* allow more groups */
 | 
			
		||||
    int strength /* minimal size for N */ ;
 | 
			
		||||
} SRP_ARG;
 | 
			
		||||
 | 
			
		||||
#  define SRP_NUMBER_ITERATIONS_FOR_PRIME 64
 | 
			
		||||
 | 
			
		||||
static int srp_Verify_N_and_g(BIGNUM *N, BIGNUM *g)
 | 
			
		||||
{
 | 
			
		||||
    BN_CTX *bn_ctx = BN_CTX_new();
 | 
			
		||||
    BIGNUM *p = BN_new();
 | 
			
		||||
    BIGNUM *r = BN_new();
 | 
			
		||||
    int ret =
 | 
			
		||||
        g != NULL && N != NULL && bn_ctx != NULL && BN_is_odd(N) &&
 | 
			
		||||
        BN_is_prime_ex(N, SRP_NUMBER_ITERATIONS_FOR_PRIME, bn_ctx, NULL) &&
 | 
			
		||||
        p != NULL && BN_rshift1(p, N) &&
 | 
			
		||||
        /* p = (N-1)/2 */
 | 
			
		||||
        BN_is_prime_ex(p, SRP_NUMBER_ITERATIONS_FOR_PRIME, bn_ctx, NULL) &&
 | 
			
		||||
        r != NULL &&
 | 
			
		||||
        /* verify g^((N-1)/2) == -1 (mod N) */
 | 
			
		||||
        BN_mod_exp(r, g, p, N, bn_ctx) &&
 | 
			
		||||
        BN_add_word(r, 1) && BN_cmp(r, N) == 0;
 | 
			
		||||
 | 
			
		||||
    if (r)
 | 
			
		||||
        BN_free(r);
 | 
			
		||||
    if (p)
 | 
			
		||||
        BN_free(p);
 | 
			
		||||
    if (bn_ctx)
 | 
			
		||||
        BN_CTX_free(bn_ctx);
 | 
			
		||||
    return ret;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
/*-
 | 
			
		||||
 * This callback is used here for two purposes:
 | 
			
		||||
 * - extended debugging
 | 
			
		||||
 * - making some primality tests for unknown groups
 | 
			
		||||
 * The callback is only called for a non default group.
 | 
			
		||||
 *
 | 
			
		||||
 * An application does not need the call back at all if
 | 
			
		||||
 * only the stanard groups are used.  In real life situations,
 | 
			
		||||
 * client and server already share well known groups,
 | 
			
		||||
 * thus there is no need to verify them.
 | 
			
		||||
 * Furthermore, in case that a server actually proposes a group that
 | 
			
		||||
 * is not one of those defined in RFC 5054, it is more appropriate
 | 
			
		||||
 * to add the group to a static list and then compare since
 | 
			
		||||
 * primality tests are rather cpu consuming.
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
static int MS_CALLBACK ssl_srp_verify_param_cb(SSL *s, void *arg)
 | 
			
		||||
{
 | 
			
		||||
    SRP_ARG *srp_arg = (SRP_ARG *)arg;
 | 
			
		||||
    BIGNUM *N = NULL, *g = NULL;
 | 
			
		||||
    if (!(N = SSL_get_srp_N(s)) || !(g = SSL_get_srp_g(s)))
 | 
			
		||||
        return 0;
 | 
			
		||||
    if (srp_arg->debug || srp_arg->msg || srp_arg->amp == 1) {
 | 
			
		||||
        BIO_printf(bio_err, "SRP parameters:\n");
 | 
			
		||||
        BIO_printf(bio_err, "\tN=");
 | 
			
		||||
        BN_print(bio_err, N);
 | 
			
		||||
        BIO_printf(bio_err, "\n\tg=");
 | 
			
		||||
        BN_print(bio_err, g);
 | 
			
		||||
        BIO_printf(bio_err, "\n");
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (SRP_check_known_gN_param(g, N))
 | 
			
		||||
        return 1;
 | 
			
		||||
 | 
			
		||||
    if (srp_arg->amp == 1) {
 | 
			
		||||
        if (srp_arg->debug)
 | 
			
		||||
            BIO_printf(bio_err,
 | 
			
		||||
                       "SRP param N and g are not known params, going to check deeper.\n");
 | 
			
		||||
 | 
			
		||||
        /*
 | 
			
		||||
         * The srp_moregroups is a real debugging feature. Implementors
 | 
			
		||||
         * should rather add the value to the known ones. The minimal size
 | 
			
		||||
         * has already been tested.
 | 
			
		||||
         */
 | 
			
		||||
        if (BN_num_bits(g) <= BN_BITS && srp_Verify_N_and_g(N, g))
 | 
			
		||||
            return 1;
 | 
			
		||||
    }
 | 
			
		||||
    BIO_printf(bio_err, "SRP param N and g rejected.\n");
 | 
			
		||||
    return 0;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
#  define PWD_STRLEN 1024
 | 
			
		||||
 | 
			
		||||
static char *MS_CALLBACK ssl_give_srp_client_pwd_cb(SSL *s, void *arg)
 | 
			
		||||
{
 | 
			
		||||
    SRP_ARG *srp_arg = (SRP_ARG *)arg;
 | 
			
		||||
    char *pass = (char *)OPENSSL_malloc(PWD_STRLEN + 1);
 | 
			
		||||
    PW_CB_DATA cb_tmp;
 | 
			
		||||
    int l;
 | 
			
		||||
 | 
			
		||||
    if (!pass) {
 | 
			
		||||
        BIO_printf(bio_err, "Malloc failure\n");
 | 
			
		||||
        return NULL;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    cb_tmp.password = (char *)srp_arg->srppassin;
 | 
			
		||||
    cb_tmp.prompt_info = "SRP user";
 | 
			
		||||
    if ((l = password_callback(pass, PWD_STRLEN, 0, &cb_tmp)) < 0) {
 | 
			
		||||
        BIO_printf(bio_err, "Can't read Password\n");
 | 
			
		||||
        OPENSSL_free(pass);
 | 
			
		||||
        return NULL;
 | 
			
		||||
    }
 | 
			
		||||
    *(pass + l) = '\0';
 | 
			
		||||
 | 
			
		||||
    return pass;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# endif
 | 
			
		||||
# ifndef OPENSSL_NO_SRTP
 | 
			
		||||
char *srtp_profiles = NULL;
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
# ifndef OPENSSL_NO_NEXTPROTONEG
 | 
			
		||||
/* This the context that we pass to next_proto_cb */
 | 
			
		||||
typedef struct tlsextnextprotoctx_st {
 | 
			
		||||
    unsigned char *data;
 | 
			
		||||
    unsigned short len;
 | 
			
		||||
    int status;
 | 
			
		||||
} tlsextnextprotoctx;
 | 
			
		||||
 | 
			
		||||
static tlsextnextprotoctx next_proto;
 | 
			
		||||
 | 
			
		||||
static int next_proto_cb(SSL *s, unsigned char **out, unsigned char *outlen,
 | 
			
		||||
                         const unsigned char *in, unsigned int inlen,
 | 
			
		||||
                         void *arg)
 | 
			
		||||
{
 | 
			
		||||
    tlsextnextprotoctx *ctx = arg;
 | 
			
		||||
 | 
			
		||||
    if (!c_quiet) {
 | 
			
		||||
        /* We can assume that |in| is syntactically valid. */
 | 
			
		||||
        unsigned i;
 | 
			
		||||
        BIO_printf(bio_c_out, "Protocols advertised by server: ");
 | 
			
		||||
        for (i = 0; i < inlen;) {
 | 
			
		||||
            if (i)
 | 
			
		||||
                BIO_write(bio_c_out, ", ", 2);
 | 
			
		||||
            BIO_write(bio_c_out, &in[i + 1], in[i]);
 | 
			
		||||
            i += in[i] + 1;
 | 
			
		||||
        }
 | 
			
		||||
        BIO_write(bio_c_out, "\n", 1);
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    ctx->status =
 | 
			
		||||
        SSL_select_next_proto(out, outlen, in, inlen, ctx->data, ctx->len);
 | 
			
		||||
    return SSL_TLSEXT_ERR_OK;
 | 
			
		||||
}
 | 
			
		||||
# endif                         /* ndef OPENSSL_NO_NEXTPROTONEG */
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
enum {
 | 
			
		||||
@@ -430,6 +622,9 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
{
 | 
			
		||||
    unsigned int off = 0, clr = 0;
 | 
			
		||||
    SSL *con = NULL;
 | 
			
		||||
#ifndef OPENSSL_NO_KRB5
 | 
			
		||||
    KSSL_CTX *kctx;
 | 
			
		||||
#endif
 | 
			
		||||
    int s, k, width, state = 0;
 | 
			
		||||
    char *cbuf = NULL, *sbuf = NULL, *mbuf = NULL;
 | 
			
		||||
    int cbuf_len, cbuf_off;
 | 
			
		||||
@@ -474,6 +669,9 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
#ifndef OPENSSL_NO_TLSEXT
 | 
			
		||||
    char *servername = NULL;
 | 
			
		||||
    tlsextctx tlsextcbp = { NULL, 0 };
 | 
			
		||||
# ifndef OPENSSL_NO_NEXTPROTONEG
 | 
			
		||||
    const char *next_proto_neg_in = NULL;
 | 
			
		||||
# endif
 | 
			
		||||
#endif
 | 
			
		||||
    char *sess_in = NULL;
 | 
			
		||||
    char *sess_out = NULL;
 | 
			
		||||
@@ -485,6 +683,11 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
#ifndef OPENSSL_NO_JPAKE
 | 
			
		||||
    char *jpake_secret = NULL;
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_SRP
 | 
			
		||||
    char *srppass = NULL;
 | 
			
		||||
    int srp_lateuser = 0;
 | 
			
		||||
    SRP_ARG srp_arg = { NULL, NULL, 0, 0, 0, 1024 };
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
    meth = SSLv23_client_method();
 | 
			
		||||
 | 
			
		||||
@@ -613,15 +816,45 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_SRP
 | 
			
		||||
        else if (strcmp(*argv, "-srpuser") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            srp_arg.srplogin = *(++argv);
 | 
			
		||||
            meth = TLSv1_client_method();
 | 
			
		||||
        } else if (strcmp(*argv, "-srppass") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            srppass = *(++argv);
 | 
			
		||||
            meth = TLSv1_client_method();
 | 
			
		||||
        } else if (strcmp(*argv, "-srp_strength") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            srp_arg.strength = atoi(*(++argv));
 | 
			
		||||
            BIO_printf(bio_err, "SRP minimal length for N is %d\n",
 | 
			
		||||
                       srp_arg.strength);
 | 
			
		||||
            meth = TLSv1_client_method();
 | 
			
		||||
        } else if (strcmp(*argv, "-srp_lateuser") == 0) {
 | 
			
		||||
            srp_lateuser = 1;
 | 
			
		||||
            meth = TLSv1_client_method();
 | 
			
		||||
        } else if (strcmp(*argv, "-srp_moregroups") == 0) {
 | 
			
		||||
            srp_arg.amp = 1;
 | 
			
		||||
            meth = TLSv1_client_method();
 | 
			
		||||
        }
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_SSL2
 | 
			
		||||
        else if (strcmp(*argv, "-ssl2") == 0)
 | 
			
		||||
            meth = SSLv2_client_method();
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_SSL3
 | 
			
		||||
#ifndef OPENSSL_NO_SSL3_METHOD
 | 
			
		||||
        else if (strcmp(*argv, "-ssl3") == 0)
 | 
			
		||||
            meth = SSLv3_client_method();
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_TLS1
 | 
			
		||||
        else if (strcmp(*argv, "-tls1_2") == 0)
 | 
			
		||||
            meth = TLSv1_2_client_method();
 | 
			
		||||
        else if (strcmp(*argv, "-tls1_1") == 0)
 | 
			
		||||
            meth = TLSv1_1_client_method();
 | 
			
		||||
        else if (strcmp(*argv, "-tls1") == 0)
 | 
			
		||||
            meth = TLSv1_client_method();
 | 
			
		||||
#endif
 | 
			
		||||
@@ -629,6 +862,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        else if (strcmp(*argv, "-dtls1") == 0) {
 | 
			
		||||
            meth = DTLSv1_client_method();
 | 
			
		||||
            socket_type = SOCK_DGRAM;
 | 
			
		||||
        } else if (strcmp(*argv, "-fallback_scsv") == 0) {
 | 
			
		||||
            fallback_scsv = 1;
 | 
			
		||||
        } else if (strcmp(*argv, "-timeout") == 0)
 | 
			
		||||
            enable_timeouts = 1;
 | 
			
		||||
        else if (strcmp(*argv, "-mtu") == 0) {
 | 
			
		||||
@@ -637,9 +872,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            socket_mtu = atol(*(++argv));
 | 
			
		||||
        }
 | 
			
		||||
#endif
 | 
			
		||||
        else if (strcmp(*argv, "-fallback_scsv") == 0) {
 | 
			
		||||
            fallback_scsv = 1;
 | 
			
		||||
        } else if (strcmp(*argv, "-bugs") == 0)
 | 
			
		||||
        else if (strcmp(*argv, "-bugs") == 0)
 | 
			
		||||
            bugs = 1;
 | 
			
		||||
        else if (strcmp(*argv, "-keyform") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
@@ -663,7 +896,11 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            CAfile = *(++argv);
 | 
			
		||||
        } else if (strcmp(*argv, "-no_tls1") == 0)
 | 
			
		||||
        } else if (strcmp(*argv, "-no_tls1_2") == 0)
 | 
			
		||||
            off |= SSL_OP_NO_TLSv1_2;
 | 
			
		||||
        else if (strcmp(*argv, "-no_tls1_1") == 0)
 | 
			
		||||
            off |= SSL_OP_NO_TLSv1_1;
 | 
			
		||||
        else if (strcmp(*argv, "-no_tls1") == 0)
 | 
			
		||||
            off |= SSL_OP_NO_TLSv1;
 | 
			
		||||
        else if (strcmp(*argv, "-no_ssl3") == 0)
 | 
			
		||||
            off |= SSL_OP_NO_SSLv3;
 | 
			
		||||
@@ -676,6 +913,13 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        else if (strcmp(*argv, "-no_ticket") == 0) {
 | 
			
		||||
            off |= SSL_OP_NO_TICKET;
 | 
			
		||||
        }
 | 
			
		||||
# ifndef OPENSSL_NO_NEXTPROTONEG
 | 
			
		||||
        else if (strcmp(*argv, "-nextprotoneg") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            next_proto_neg_in = *(++argv);
 | 
			
		||||
        }
 | 
			
		||||
# endif
 | 
			
		||||
#endif
 | 
			
		||||
        else if (strcmp(*argv, "-serverpref") == 0)
 | 
			
		||||
            off |= SSL_OP_CIPHER_SERVER_PREFERENCE;
 | 
			
		||||
@@ -743,7 +987,24 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            jpake_secret = *++argv;
 | 
			
		||||
        }
 | 
			
		||||
#endif
 | 
			
		||||
        else {
 | 
			
		||||
#ifndef OPENSSL_NO_SRTP
 | 
			
		||||
        else if (strcmp(*argv, "-use_srtp") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            srtp_profiles = *(++argv);
 | 
			
		||||
        }
 | 
			
		||||
#endif
 | 
			
		||||
        else if (strcmp(*argv, "-keymatexport") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            keymatexportlabel = *(++argv);
 | 
			
		||||
        } else if (strcmp(*argv, "-keymatexportlen") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            keymatexportlen = atoi(*(++argv));
 | 
			
		||||
            if (keymatexportlen == 0)
 | 
			
		||||
                goto bad;
 | 
			
		||||
        } else {
 | 
			
		||||
            BIO_printf(bio_err, "unknown option %s\n", *argv);
 | 
			
		||||
            badop = 1;
 | 
			
		||||
            break;
 | 
			
		||||
@@ -774,6 +1035,19 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    OpenSSL_add_ssl_algorithms();
 | 
			
		||||
    SSL_load_error_strings();
 | 
			
		||||
 | 
			
		||||
#if !defined(OPENSSL_NO_TLSEXT) && !defined(OPENSSL_NO_NEXTPROTONEG)
 | 
			
		||||
    next_proto.status = -1;
 | 
			
		||||
    if (next_proto_neg_in) {
 | 
			
		||||
        next_proto.data =
 | 
			
		||||
            next_protos_parse(&next_proto.len, next_proto_neg_in);
 | 
			
		||||
        if (next_proto.data == NULL) {
 | 
			
		||||
            BIO_printf(bio_err, "Error parsing -nextprotoneg argument\n");
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
    } else
 | 
			
		||||
        next_proto.data = NULL;
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
    e = setup_engine(bio_err, engine_id, 1);
 | 
			
		||||
    if (ssl_client_engine_id) {
 | 
			
		||||
@@ -830,6 +1104,12 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                bio_c_out = BIO_new_fp(stdout, BIO_NOCLOSE);
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
#ifndef OPENSSL_NO_SRP
 | 
			
		||||
    if (!app_passwd(bio_err, srppass, NULL, &srp_arg.srppassin, NULL)) {
 | 
			
		||||
        BIO_printf(bio_err, "Error getting password\n");
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
    ctx = SSL_CTX_new(meth);
 | 
			
		||||
    if (ctx == NULL) {
 | 
			
		||||
@@ -864,6 +1144,10 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                       "PSK key given or JPAKE in use, setting client callback\n");
 | 
			
		||||
        SSL_CTX_set_psk_client_callback(ctx, psk_client_cb);
 | 
			
		||||
    }
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_SRTP
 | 
			
		||||
    if (srtp_profiles != NULL)
 | 
			
		||||
        SSL_CTX_set_tlsext_use_srtp(ctx, srtp_profiles);
 | 
			
		||||
#endif
 | 
			
		||||
    if (bugs)
 | 
			
		||||
        SSL_CTX_set_options(ctx, SSL_OP_ALL | off);
 | 
			
		||||
@@ -872,12 +1156,11 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
 | 
			
		||||
    if (clr)
 | 
			
		||||
        SSL_CTX_clear_options(ctx, clr);
 | 
			
		||||
    /*
 | 
			
		||||
     * DTLS: partial reads end up discarding unread UDP bytes :-( Setting
 | 
			
		||||
     * read ahead solves this problem.
 | 
			
		||||
     */
 | 
			
		||||
    if (socket_type == SOCK_DGRAM)
 | 
			
		||||
        SSL_CTX_set_read_ahead(ctx, 1);
 | 
			
		||||
 | 
			
		||||
#if !defined(OPENSSL_NO_TLSEXT) && !defined(OPENSSL_NO_NEXTPROTONEG)
 | 
			
		||||
    if (next_proto.data)
 | 
			
		||||
        SSL_CTX_set_next_proto_select_cb(ctx, next_proto_cb, &next_proto);
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
    if (state)
 | 
			
		||||
        SSL_CTX_set_info_callback(ctx, apps_ssl_info_callback);
 | 
			
		||||
@@ -896,13 +1179,12 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    if (!set_cert_key_stuff(ctx, cert, key))
 | 
			
		||||
        goto end;
 | 
			
		||||
 | 
			
		||||
    if ((!SSL_CTX_load_verify_locations(ctx, CAfile, CApath)) ||
 | 
			
		||||
        (!SSL_CTX_set_default_verify_paths(ctx))) {
 | 
			
		||||
        /*
 | 
			
		||||
         * BIO_printf(bio_err,"error setting default verify locations\n");
 | 
			
		||||
         */
 | 
			
		||||
    if ((CAfile || CApath)
 | 
			
		||||
        && !SSL_CTX_load_verify_locations(ctx, CAfile, CApath)) {
 | 
			
		||||
        ERR_print_errors(bio_err);
 | 
			
		||||
    }
 | 
			
		||||
    if (!SSL_CTX_set_default_verify_paths(ctx)) {
 | 
			
		||||
        ERR_print_errors(bio_err);
 | 
			
		||||
        /* goto end; */
 | 
			
		||||
    }
 | 
			
		||||
#ifndef OPENSSL_NO_TLSEXT
 | 
			
		||||
    if (servername != NULL) {
 | 
			
		||||
@@ -910,6 +1192,22 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        SSL_CTX_set_tlsext_servername_callback(ctx, ssl_servername_cb);
 | 
			
		||||
        SSL_CTX_set_tlsext_servername_arg(ctx, &tlsextcbp);
 | 
			
		||||
    }
 | 
			
		||||
# ifndef OPENSSL_NO_SRP
 | 
			
		||||
    if (srp_arg.srplogin) {
 | 
			
		||||
        if (!srp_lateuser && !SSL_CTX_set_srp_username(ctx, srp_arg.srplogin)) {
 | 
			
		||||
            BIO_printf(bio_err, "Unable to set SRP username\n");
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
        srp_arg.msg = c_msg;
 | 
			
		||||
        srp_arg.debug = c_debug;
 | 
			
		||||
        SSL_CTX_set_srp_cb_arg(ctx, &srp_arg);
 | 
			
		||||
        SSL_CTX_set_srp_client_pwd_callback(ctx, ssl_give_srp_client_pwd_cb);
 | 
			
		||||
        SSL_CTX_set_srp_strength(ctx, srp_arg.strength);
 | 
			
		||||
        if (c_msg || c_debug || srp_arg.amp == 0)
 | 
			
		||||
            SSL_CTX_set_srp_verify_param_callback(ctx,
 | 
			
		||||
                                                  ssl_srp_verify_param_cb);
 | 
			
		||||
    }
 | 
			
		||||
# endif
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
    con = SSL_new(ctx);
 | 
			
		||||
@@ -945,8 +1243,9 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    }
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_KRB5
 | 
			
		||||
    if (con && (con->kssl_ctx = kssl_ctx_new()) != NULL) {
 | 
			
		||||
        kssl_ctx_setstring(con->kssl_ctx, KSSL_SERVER, host);
 | 
			
		||||
    if (con && (kctx = kssl_ctx_new()) != NULL) {
 | 
			
		||||
        SSL_set0_kssl_ctx(con, kctx);
 | 
			
		||||
        kssl_ctx_setstring(kctx, KSSL_SERVER, host);
 | 
			
		||||
    }
 | 
			
		||||
#endif                          /* OPENSSL_NO_KRB5 */
 | 
			
		||||
/*      SSL_set_cipher_list(con,"RC4-MD5"); */
 | 
			
		||||
@@ -976,7 +1275,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    }
 | 
			
		||||
#endif
 | 
			
		||||
    if (c_Pause & 0x01)
 | 
			
		||||
        con->debug = 1;
 | 
			
		||||
        SSL_set_debug(con, 1);
 | 
			
		||||
 | 
			
		||||
    if (SSL_version(con) == DTLS1_VERSION) {
 | 
			
		||||
 | 
			
		||||
@@ -1027,7 +1326,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (c_debug) {
 | 
			
		||||
        con->debug = 1;
 | 
			
		||||
        SSL_set_debug(con, 1);
 | 
			
		||||
        BIO_set_callback(sbio, bio_dump_callback);
 | 
			
		||||
        BIO_set_callback_arg(sbio, (char *)bio_c_out);
 | 
			
		||||
    }
 | 
			
		||||
@@ -1540,7 +1839,15 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                BIO_printf(bio_err, "RENEGOTIATING\n");
 | 
			
		||||
                SSL_renegotiate(con);
 | 
			
		||||
                cbuf_len = 0;
 | 
			
		||||
            } else {
 | 
			
		||||
            }
 | 
			
		||||
#ifndef OPENSSL_NO_HEARTBEATS
 | 
			
		||||
            else if ((!c_ign_eof) && (cbuf[0] == 'B')) {
 | 
			
		||||
                BIO_printf(bio_err, "HEARTBEATING\n");
 | 
			
		||||
                SSL_heartbeat(con);
 | 
			
		||||
                cbuf_len = 0;
 | 
			
		||||
            }
 | 
			
		||||
#endif
 | 
			
		||||
            else {
 | 
			
		||||
                cbuf_len = i;
 | 
			
		||||
                cbuf_off = 0;
 | 
			
		||||
#ifdef CHARSET_EBCDIC
 | 
			
		||||
@@ -1565,6 +1872,10 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            print_stuff(bio_c_out, con, 1);
 | 
			
		||||
        SSL_free(con);
 | 
			
		||||
    }
 | 
			
		||||
#if !defined(OPENSSL_NO_TLSEXT) && !defined(OPENSSL_NO_NEXTPROTONEG)
 | 
			
		||||
    if (next_proto.data)
 | 
			
		||||
        OPENSSL_free(next_proto.data);
 | 
			
		||||
#endif
 | 
			
		||||
    if (ctx != NULL)
 | 
			
		||||
        SSL_CTX_free(ctx);
 | 
			
		||||
    if (cert)
 | 
			
		||||
@@ -1609,6 +1920,7 @@ static void print_stuff(BIO *bio, SSL *s, int full)
 | 
			
		||||
#ifndef OPENSSL_NO_COMP
 | 
			
		||||
    const COMP_METHOD *comp, *expansion;
 | 
			
		||||
#endif
 | 
			
		||||
    unsigned char *exportedkeymat;
 | 
			
		||||
 | 
			
		||||
    if (full) {
 | 
			
		||||
        int got_a_chain = 0;
 | 
			
		||||
@@ -1688,7 +2000,7 @@ static void print_stuff(BIO *bio, SSL *s, int full)
 | 
			
		||||
                   BIO_number_read(SSL_get_rbio(s)),
 | 
			
		||||
                   BIO_number_written(SSL_get_wbio(s)));
 | 
			
		||||
    }
 | 
			
		||||
    BIO_printf(bio, ((s->hit) ? "---\nReused, " : "---\nNew, "));
 | 
			
		||||
    BIO_printf(bio, (SSL_cache_hit(s) ? "---\nReused, " : "---\nNew, "));
 | 
			
		||||
    c = SSL_get_current_cipher(s);
 | 
			
		||||
    BIO_printf(bio, "%s, Cipher is %s\n",
 | 
			
		||||
               SSL_CIPHER_get_version(c), SSL_CIPHER_get_name(c));
 | 
			
		||||
@@ -1709,7 +2021,63 @@ static void print_stuff(BIO *bio, SSL *s, int full)
 | 
			
		||||
    BIO_printf(bio, "Expansion: %s\n",
 | 
			
		||||
               expansion ? SSL_COMP_get_name(expansion) : "NONE");
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#ifdef SSL_DEBUG
 | 
			
		||||
    {
 | 
			
		||||
        /* Print out local port of connection: useful for debugging */
 | 
			
		||||
        int sock;
 | 
			
		||||
        struct sockaddr_in ladd;
 | 
			
		||||
        socklen_t ladd_size = sizeof(ladd);
 | 
			
		||||
        sock = SSL_get_fd(s);
 | 
			
		||||
        getsockname(sock, (struct sockaddr *)&ladd, &ladd_size);
 | 
			
		||||
        BIO_printf(bio_c_out, "LOCAL PORT is %u\n", ntohs(ladd.sin_port));
 | 
			
		||||
    }
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#if !defined(OPENSSL_NO_TLSEXT) && !defined(OPENSSL_NO_NEXTPROTONEG)
 | 
			
		||||
    if (next_proto.status != -1) {
 | 
			
		||||
        const unsigned char *proto;
 | 
			
		||||
        unsigned int proto_len;
 | 
			
		||||
        SSL_get0_next_proto_negotiated(s, &proto, &proto_len);
 | 
			
		||||
        BIO_printf(bio, "Next protocol: (%d) ", next_proto.status);
 | 
			
		||||
        BIO_write(bio, proto, proto_len);
 | 
			
		||||
        BIO_write(bio, "\n", 1);
 | 
			
		||||
    }
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_SRTP
 | 
			
		||||
    {
 | 
			
		||||
        SRTP_PROTECTION_PROFILE *srtp_profile =
 | 
			
		||||
            SSL_get_selected_srtp_profile(s);
 | 
			
		||||
 | 
			
		||||
        if (srtp_profile)
 | 
			
		||||
            BIO_printf(bio, "SRTP Extension negotiated, profile=%s\n",
 | 
			
		||||
                       srtp_profile->name);
 | 
			
		||||
    }
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
    SSL_SESSION_print(bio, SSL_get_session(s));
 | 
			
		||||
    if (keymatexportlabel != NULL) {
 | 
			
		||||
        BIO_printf(bio, "Keying material exporter:\n");
 | 
			
		||||
        BIO_printf(bio, "    Label: '%s'\n", keymatexportlabel);
 | 
			
		||||
        BIO_printf(bio, "    Length: %i bytes\n", keymatexportlen);
 | 
			
		||||
        exportedkeymat = OPENSSL_malloc(keymatexportlen);
 | 
			
		||||
        if (exportedkeymat != NULL) {
 | 
			
		||||
            if (!SSL_export_keying_material(s, exportedkeymat,
 | 
			
		||||
                                            keymatexportlen,
 | 
			
		||||
                                            keymatexportlabel,
 | 
			
		||||
                                            strlen(keymatexportlabel),
 | 
			
		||||
                                            NULL, 0, 0)) {
 | 
			
		||||
                BIO_printf(bio, "    Error\n");
 | 
			
		||||
            } else {
 | 
			
		||||
                BIO_printf(bio, "    Keying material: ");
 | 
			
		||||
                for (i = 0; i < keymatexportlen; i++)
 | 
			
		||||
                    BIO_printf(bio, "%02X", exportedkeymat[i]);
 | 
			
		||||
                BIO_printf(bio, "\n");
 | 
			
		||||
            }
 | 
			
		||||
            OPENSSL_free(exportedkeymat);
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
    BIO_printf(bio, "---\n");
 | 
			
		||||
    if (peer != NULL)
 | 
			
		||||
        X509_free(peer);
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										456
									
								
								apps/s_server.c
									
									
									
									
									
								
							
							
						
						
									
										456
									
								
								apps/s_server.c
									
									
									
									
									
								
							@@ -191,6 +191,9 @@ typedef unsigned int u_int;
 | 
			
		||||
#ifndef OPENSSL_NO_RSA
 | 
			
		||||
# include <openssl/rsa.h>
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_SRP
 | 
			
		||||
# include <openssl/srp.h>
 | 
			
		||||
#endif
 | 
			
		||||
#include "s_apps.h"
 | 
			
		||||
#include "timeouts.h"
 | 
			
		||||
 | 
			
		||||
@@ -216,7 +219,7 @@ static int generate_session_id(const SSL *ssl, unsigned char *id,
 | 
			
		||||
                               unsigned int *id_len);
 | 
			
		||||
#ifndef OPENSSL_NO_DH
 | 
			
		||||
static DH *load_dh_param(const char *dhfile);
 | 
			
		||||
static DH *get_dh512(void);
 | 
			
		||||
static DH *get_dh2048(void);
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#ifdef MONOLITH
 | 
			
		||||
@@ -224,30 +227,48 @@ static void s_server_init(void);
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_DH
 | 
			
		||||
static unsigned char dh512_p[] = {
 | 
			
		||||
    0xDA, 0x58, 0x3C, 0x16, 0xD9, 0x85, 0x22, 0x89, 0xD0, 0xE4, 0xAF, 0x75,
 | 
			
		||||
    0x6F, 0x4C, 0xCA, 0x92, 0xDD, 0x4B, 0xE5, 0x33, 0xB8, 0x04, 0xFB, 0x0F,
 | 
			
		||||
    0xED, 0x94, 0xEF, 0x9C, 0x8A, 0x44, 0x03, 0xED, 0x57, 0x46, 0x50, 0xD3,
 | 
			
		||||
    0x69, 0x99, 0xDB, 0x29, 0xD7, 0x76, 0x27, 0x6B, 0xA2, 0xD3, 0xD4, 0x12,
 | 
			
		||||
    0xE2, 0x18, 0xF4, 0xDD, 0x1E, 0x08, 0x4C, 0xF6, 0xD8, 0x00, 0x3E, 0x7C,
 | 
			
		||||
    0x47, 0x74, 0xE8, 0x33,
 | 
			
		||||
static unsigned char dh2048_p[] = {
 | 
			
		||||
    0xF6,0x42,0x57,0xB7,0x08,0x7F,0x08,0x17,0x72,0xA2,0xBA,0xD6,
 | 
			
		||||
    0xA9,0x42,0xF3,0x05,0xE8,0xF9,0x53,0x11,0x39,0x4F,0xB6,0xF1,
 | 
			
		||||
    0x6E,0xB9,0x4B,0x38,0x20,0xDA,0x01,0xA7,0x56,0xA3,0x14,0xE9,
 | 
			
		||||
    0x8F,0x40,0x55,0xF3,0xD0,0x07,0xC6,0xCB,0x43,0xA9,0x94,0xAD,
 | 
			
		||||
    0xF7,0x4C,0x64,0x86,0x49,0xF8,0x0C,0x83,0xBD,0x65,0xE9,0x17,
 | 
			
		||||
    0xD4,0xA1,0xD3,0x50,0xF8,0xF5,0x59,0x5F,0xDC,0x76,0x52,0x4F,
 | 
			
		||||
    0x3D,0x3D,0x8D,0xDB,0xCE,0x99,0xE1,0x57,0x92,0x59,0xCD,0xFD,
 | 
			
		||||
    0xB8,0xAE,0x74,0x4F,0xC5,0xFC,0x76,0xBC,0x83,0xC5,0x47,0x30,
 | 
			
		||||
    0x61,0xCE,0x7C,0xC9,0x66,0xFF,0x15,0xF9,0xBB,0xFD,0x91,0x5E,
 | 
			
		||||
    0xC7,0x01,0xAA,0xD3,0x5B,0x9E,0x8D,0xA0,0xA5,0x72,0x3A,0xD4,
 | 
			
		||||
    0x1A,0xF0,0xBF,0x46,0x00,0x58,0x2B,0xE5,0xF4,0x88,0xFD,0x58,
 | 
			
		||||
    0x4E,0x49,0xDB,0xCD,0x20,0xB4,0x9D,0xE4,0x91,0x07,0x36,0x6B,
 | 
			
		||||
    0x33,0x6C,0x38,0x0D,0x45,0x1D,0x0F,0x7C,0x88,0xB3,0x1C,0x7C,
 | 
			
		||||
    0x5B,0x2D,0x8E,0xF6,0xF3,0xC9,0x23,0xC0,0x43,0xF0,0xA5,0x5B,
 | 
			
		||||
    0x18,0x8D,0x8E,0xBB,0x55,0x8C,0xB8,0x5D,0x38,0xD3,0x34,0xFD,
 | 
			
		||||
    0x7C,0x17,0x57,0x43,0xA3,0x1D,0x18,0x6C,0xDE,0x33,0x21,0x2C,
 | 
			
		||||
    0xB5,0x2A,0xFF,0x3C,0xE1,0xB1,0x29,0x40,0x18,0x11,0x8D,0x7C,
 | 
			
		||||
    0x84,0xA7,0x0A,0x72,0xD6,0x86,0xC4,0x03,0x19,0xC8,0x07,0x29,
 | 
			
		||||
    0x7A,0xCA,0x95,0x0C,0xD9,0x96,0x9F,0xAB,0xD0,0x0A,0x50,0x9B,
 | 
			
		||||
    0x02,0x46,0xD3,0x08,0x3D,0x66,0xA4,0x5D,0x41,0x9F,0x9C,0x7C,
 | 
			
		||||
    0xBD,0x89,0x4B,0x22,0x19,0x26,0xBA,0xAB,0xA2,0x5E,0xC3,0x55,
 | 
			
		||||
    0xE9,0x32,0x0B,0x3B,
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
static unsigned char dh512_g[] = {
 | 
			
		||||
static unsigned char dh2048_g[] = {
 | 
			
		||||
    0x02,
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
static DH *get_dh512(void)
 | 
			
		||||
DH *get_dh2048()
 | 
			
		||||
{
 | 
			
		||||
    DH *dh = NULL;
 | 
			
		||||
    DH *dh;
 | 
			
		||||
 | 
			
		||||
    if ((dh = DH_new()) == NULL)
 | 
			
		||||
        return (NULL);
 | 
			
		||||
    dh->p = BN_bin2bn(dh512_p, sizeof(dh512_p), NULL);
 | 
			
		||||
    dh->g = BN_bin2bn(dh512_g, sizeof(dh512_g), NULL);
 | 
			
		||||
    if ((dh->p == NULL) || (dh->g == NULL))
 | 
			
		||||
        return (NULL);
 | 
			
		||||
    return (dh);
 | 
			
		||||
        return NULL;
 | 
			
		||||
    dh->p=BN_bin2bn(dh2048_p, sizeof(dh2048_p), NULL);
 | 
			
		||||
    dh->g=BN_bin2bn(dh2048_g, sizeof(dh2048_g), NULL);
 | 
			
		||||
    if (dh->p == NULL || dh->g == NULL) {
 | 
			
		||||
        DH_free(dh);
 | 
			
		||||
        return NULL;
 | 
			
		||||
    }
 | 
			
		||||
    return dh;
 | 
			
		||||
}
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
@@ -296,6 +317,9 @@ static int cert_status_cb(SSL *s, void *arg);
 | 
			
		||||
static int s_msg = 0;
 | 
			
		||||
static int s_quiet = 0;
 | 
			
		||||
 | 
			
		||||
static char *keymatexportlabel = NULL;
 | 
			
		||||
static int keymatexportlen = 20;
 | 
			
		||||
 | 
			
		||||
static int hack = 0;
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
static char *engine_id = NULL;
 | 
			
		||||
@@ -328,7 +352,7 @@ static unsigned int psk_server_cb(SSL *ssl, const char *identity,
 | 
			
		||||
    }
 | 
			
		||||
    if (s_debug)
 | 
			
		||||
        BIO_printf(bio_s_out, "identity_len=%d identity=%s\n",
 | 
			
		||||
                   identity ? (int)strlen(identity) : 0, identity);
 | 
			
		||||
                   (int)strlen(identity), identity);
 | 
			
		||||
 | 
			
		||||
    /* here we could lookup the given identity e.g. from a database */
 | 
			
		||||
    if (strcmp(identity, psk_identity) != 0) {
 | 
			
		||||
@@ -373,6 +397,52 @@ static unsigned int psk_server_cb(SSL *ssl, const char *identity,
 | 
			
		||||
}
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_SRP
 | 
			
		||||
/* This is a context that we pass to callbacks */
 | 
			
		||||
typedef struct srpsrvparm_st {
 | 
			
		||||
    char *login;
 | 
			
		||||
    SRP_VBASE *vb;
 | 
			
		||||
    SRP_user_pwd *user;
 | 
			
		||||
} srpsrvparm;
 | 
			
		||||
 | 
			
		||||
/*
 | 
			
		||||
 * This callback pretends to require some asynchronous logic in order to
 | 
			
		||||
 * obtain a verifier. When the callback is called for a new connection we
 | 
			
		||||
 * return with a negative value. This will provoke the accept etc to return
 | 
			
		||||
 * with an LOOKUP_X509. The main logic of the reinvokes the suspended call
 | 
			
		||||
 * (which would normally occur after a worker has finished) and we set the
 | 
			
		||||
 * user parameters.
 | 
			
		||||
 */
 | 
			
		||||
static int MS_CALLBACK ssl_srp_server_param_cb(SSL *s, int *ad, void *arg)
 | 
			
		||||
{
 | 
			
		||||
    srpsrvparm *p = (srpsrvparm *) arg;
 | 
			
		||||
    if (p->login == NULL && p->user == NULL) {
 | 
			
		||||
        p->login = SSL_get_srp_username(s);
 | 
			
		||||
        BIO_printf(bio_err, "SRP username = \"%s\"\n", p->login);
 | 
			
		||||
        return (-1);
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (p->user == NULL) {
 | 
			
		||||
        BIO_printf(bio_err, "User %s doesn't exist\n", p->login);
 | 
			
		||||
        return SSL3_AL_FATAL;
 | 
			
		||||
    }
 | 
			
		||||
    if (SSL_set_srp_server_param
 | 
			
		||||
        (s, p->user->N, p->user->g, p->user->s, p->user->v,
 | 
			
		||||
         p->user->info) < 0) {
 | 
			
		||||
        *ad = SSL_AD_INTERNAL_ERROR;
 | 
			
		||||
        return SSL3_AL_FATAL;
 | 
			
		||||
    }
 | 
			
		||||
    BIO_printf(bio_err,
 | 
			
		||||
               "SRP parameters set: username = \"%s\" info=\"%s\" \n",
 | 
			
		||||
               p->login, p->user->info);
 | 
			
		||||
    /* need to check whether there are memory leaks */
 | 
			
		||||
    p->user = NULL;
 | 
			
		||||
    p->login = NULL;
 | 
			
		||||
    return SSL_ERROR_NONE;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#ifdef MONOLITH
 | 
			
		||||
static void s_server_init(void)
 | 
			
		||||
{
 | 
			
		||||
@@ -470,6 +540,8 @@ static void sv_usage(void)
 | 
			
		||||
    BIO_printf(bio_err, " -state        - Print the SSL states\n");
 | 
			
		||||
    BIO_printf(bio_err, " -CApath arg   - PEM format directory of CA's\n");
 | 
			
		||||
    BIO_printf(bio_err, " -CAfile arg   - PEM format file of CA's\n");
 | 
			
		||||
    BIO_printf(bio_err,
 | 
			
		||||
               " -no_alt_chains - only ever use the first certificate chain found\n");
 | 
			
		||||
    BIO_printf(bio_err,
 | 
			
		||||
               " -nocert       - Don't use any certificates (Anon-DH)\n");
 | 
			
		||||
    BIO_printf(bio_err,
 | 
			
		||||
@@ -483,9 +555,18 @@ static void sv_usage(void)
 | 
			
		||||
# ifndef OPENSSL_NO_JPAKE
 | 
			
		||||
    BIO_printf(bio_err, " -jpake arg    - JPAKE secret to use\n");
 | 
			
		||||
# endif
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_SRP
 | 
			
		||||
    BIO_printf(bio_err, " -srpvfile file      - The verifier file for SRP\n");
 | 
			
		||||
    BIO_printf(bio_err,
 | 
			
		||||
               " -srpuserseed string - A seed string for a default user salt.\n");
 | 
			
		||||
#endif
 | 
			
		||||
    BIO_printf(bio_err, " -ssl2         - Just talk SSLv2\n");
 | 
			
		||||
#ifndef OPENSSL_NO_SSL3_METHOD
 | 
			
		||||
    BIO_printf(bio_err, " -ssl3         - Just talk SSLv3\n");
 | 
			
		||||
#endif
 | 
			
		||||
    BIO_printf(bio_err, " -tls1_2       - Just talk TLSv1.2\n");
 | 
			
		||||
    BIO_printf(bio_err, " -tls1_1       - Just talk TLSv1.1\n");
 | 
			
		||||
    BIO_printf(bio_err, " -tls1         - Just talk TLSv1\n");
 | 
			
		||||
    BIO_printf(bio_err, " -dtls1        - Just talk DTLSv1\n");
 | 
			
		||||
    BIO_printf(bio_err, " -timeout      - Enable timeouts\n");
 | 
			
		||||
@@ -494,6 +575,8 @@ static void sv_usage(void)
 | 
			
		||||
    BIO_printf(bio_err, " -no_ssl2      - Just disable SSLv2\n");
 | 
			
		||||
    BIO_printf(bio_err, " -no_ssl3      - Just disable SSLv3\n");
 | 
			
		||||
    BIO_printf(bio_err, " -no_tls1      - Just disable TLSv1\n");
 | 
			
		||||
    BIO_printf(bio_err, " -no_tls1_1    - Just disable TLSv1.1\n");
 | 
			
		||||
    BIO_printf(bio_err, " -no_tls1_2    - Just disable TLSv1.2\n");
 | 
			
		||||
#ifndef OPENSSL_NO_DH
 | 
			
		||||
    BIO_printf(bio_err, " -no_dhe       - Disable ephemeral DH\n");
 | 
			
		||||
#endif
 | 
			
		||||
@@ -537,7 +620,19 @@ static void sv_usage(void)
 | 
			
		||||
               " -no_ticket    - disable use of RFC4507bis session tickets\n");
 | 
			
		||||
    BIO_printf(bio_err,
 | 
			
		||||
               " -legacy_renegotiation - enable use of legacy renegotiation (dangerous)\n");
 | 
			
		||||
# ifndef OPENSSL_NO_NEXTPROTONEG
 | 
			
		||||
    BIO_printf(bio_err,
 | 
			
		||||
               " -nextprotoneg arg - set the advertised protocols for the NPN extension (comma-separated list)\n");
 | 
			
		||||
# endif
 | 
			
		||||
# ifndef OPENSSL_NO_SRTP
 | 
			
		||||
    BIO_printf(bio_err,
 | 
			
		||||
               " -use_srtp profiles - Offer SRTP key management with a colon-separated profile list\n");
 | 
			
		||||
# endif
 | 
			
		||||
#endif
 | 
			
		||||
    BIO_printf(bio_err,
 | 
			
		||||
               " -keymatexport label   - Export keying material using label\n");
 | 
			
		||||
    BIO_printf(bio_err,
 | 
			
		||||
               " -keymatexportlen len  - Export len bytes of keying material (default 20)\n");
 | 
			
		||||
    BIO_printf(bio_err,
 | 
			
		||||
               " -status           - respond to certificate status requests\n");
 | 
			
		||||
    BIO_printf(bio_err,
 | 
			
		||||
@@ -587,6 +682,8 @@ static int ebcdic_new(BIO *bi)
 | 
			
		||||
    EBCDIC_OUTBUFF *wbuf;
 | 
			
		||||
 | 
			
		||||
    wbuf = (EBCDIC_OUTBUFF *) OPENSSL_malloc(sizeof(EBCDIC_OUTBUFF) + 1024);
 | 
			
		||||
    if (!wbuf)
 | 
			
		||||
        return 0;
 | 
			
		||||
    wbuf->alloced = 1024;
 | 
			
		||||
    wbuf->buff[0] = '\0';
 | 
			
		||||
 | 
			
		||||
@@ -641,9 +738,11 @@ static int ebcdic_write(BIO *b, const char *in, int inl)
 | 
			
		||||
        num = num + num;        /* double the size */
 | 
			
		||||
        if (num < inl)
 | 
			
		||||
            num = inl;
 | 
			
		||||
        OPENSSL_free(wbuf);
 | 
			
		||||
        wbuf =
 | 
			
		||||
            (EBCDIC_OUTBUFF *) OPENSSL_malloc(sizeof(EBCDIC_OUTBUFF) + num);
 | 
			
		||||
        if (!wbuf)
 | 
			
		||||
            return 0;
 | 
			
		||||
        OPENSSL_free(b->ptr);
 | 
			
		||||
 | 
			
		||||
        wbuf->alloced = num;
 | 
			
		||||
        wbuf->buff[0] = '\0';
 | 
			
		||||
@@ -869,6 +968,26 @@ static int cert_status_cb(SSL *s, void *arg)
 | 
			
		||||
    ret = SSL_TLSEXT_ERR_ALERT_FATAL;
 | 
			
		||||
    goto done;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# ifndef OPENSSL_NO_NEXTPROTONEG
 | 
			
		||||
/* This is the context that we pass to next_proto_cb */
 | 
			
		||||
typedef struct tlsextnextprotoctx_st {
 | 
			
		||||
    unsigned char *data;
 | 
			
		||||
    unsigned int len;
 | 
			
		||||
} tlsextnextprotoctx;
 | 
			
		||||
 | 
			
		||||
static int next_proto_cb(SSL *s, const unsigned char **data,
 | 
			
		||||
                         unsigned int *len, void *arg)
 | 
			
		||||
{
 | 
			
		||||
    tlsextnextprotoctx *next_proto = arg;
 | 
			
		||||
 | 
			
		||||
    *data = next_proto->data;
 | 
			
		||||
    *len = next_proto->len;
 | 
			
		||||
 | 
			
		||||
    return SSL_TLSEXT_ERR_OK;
 | 
			
		||||
}
 | 
			
		||||
# endif                         /* ndef OPENSSL_NO_NEXTPROTONEG */
 | 
			
		||||
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
int MAIN(int, char **);
 | 
			
		||||
@@ -876,6 +995,12 @@ int MAIN(int, char **);
 | 
			
		||||
#ifndef OPENSSL_NO_JPAKE
 | 
			
		||||
static char *jpake_secret = NULL;
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_SRP
 | 
			
		||||
static srpsrvparm srp_callback_parm;
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_SRTP
 | 
			
		||||
static char *srtp_profiles = NULL;
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
int MAIN(int argc, char *argv[])
 | 
			
		||||
{
 | 
			
		||||
@@ -891,7 +1016,10 @@ int MAIN(int argc, char *argv[])
 | 
			
		||||
    int badop = 0, bugs = 0;
 | 
			
		||||
    int ret = 1;
 | 
			
		||||
    int off = 0;
 | 
			
		||||
    int no_tmp_rsa = 0, no_dhe = 0, no_ecdhe = 0, nocert = 0;
 | 
			
		||||
    int no_tmp_rsa = 0, no_dhe = 0, nocert = 0;
 | 
			
		||||
#ifndef OPENSSL_NO_ECDH
 | 
			
		||||
    int no_ecdhe = 0;
 | 
			
		||||
#endif
 | 
			
		||||
    int state = 0;
 | 
			
		||||
    const SSL_METHOD *meth = NULL;
 | 
			
		||||
    int socket_type = SOCK_STREAM;
 | 
			
		||||
@@ -907,13 +1035,19 @@ int MAIN(int argc, char *argv[])
 | 
			
		||||
#ifndef OPENSSL_NO_TLSEXT
 | 
			
		||||
    EVP_PKEY *s_key2 = NULL;
 | 
			
		||||
    X509 *s_cert2 = NULL;
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_TLSEXT
 | 
			
		||||
    tlsextctx tlsextcbp = { NULL, NULL, SSL_TLSEXT_ERR_ALERT_WARNING };
 | 
			
		||||
# ifndef OPENSSL_NO_NEXTPROTONEG
 | 
			
		||||
    const char *next_proto_neg_in = NULL;
 | 
			
		||||
    tlsextnextprotoctx next_proto;
 | 
			
		||||
# endif
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_PSK
 | 
			
		||||
    /* by default do not send a PSK identity hint */
 | 
			
		||||
    static char *psk_identity_hint = NULL;
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_SRP
 | 
			
		||||
    char *srpuserseed = NULL;
 | 
			
		||||
    char *srp_verifier_file = NULL;
 | 
			
		||||
#endif
 | 
			
		||||
    meth = SSLv23_server_method();
 | 
			
		||||
 | 
			
		||||
@@ -1100,9 +1234,12 @@ int MAIN(int argc, char *argv[])
 | 
			
		||||
            no_tmp_rsa = 1;
 | 
			
		||||
        } else if (strcmp(*argv, "-no_dhe") == 0) {
 | 
			
		||||
            no_dhe = 1;
 | 
			
		||||
        } else if (strcmp(*argv, "-no_ecdhe") == 0) {
 | 
			
		||||
        }
 | 
			
		||||
#ifndef OPENSSL_NO_ECDH
 | 
			
		||||
        else if (strcmp(*argv, "-no_ecdhe") == 0) {
 | 
			
		||||
            no_ecdhe = 1;
 | 
			
		||||
        }
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_PSK
 | 
			
		||||
        else if (strcmp(*argv, "-psk_hint") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
@@ -1121,6 +1258,19 @@ int MAIN(int argc, char *argv[])
 | 
			
		||||
                goto bad;
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_SRP
 | 
			
		||||
        else if (strcmp(*argv, "-srpvfile") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            srp_verifier_file = *(++argv);
 | 
			
		||||
            meth = TLSv1_server_method();
 | 
			
		||||
        } else if (strcmp(*argv, "-srpuserseed") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            srpuserseed = *(++argv);
 | 
			
		||||
            meth = TLSv1_server_method();
 | 
			
		||||
        }
 | 
			
		||||
#endif
 | 
			
		||||
        else if (strcmp(*argv, "-www") == 0) {
 | 
			
		||||
            www = 1;
 | 
			
		||||
@@ -1134,6 +1284,10 @@ int MAIN(int argc, char *argv[])
 | 
			
		||||
            off |= SSL_OP_NO_SSLv3;
 | 
			
		||||
        } else if (strcmp(*argv, "-no_tls1") == 0) {
 | 
			
		||||
            off |= SSL_OP_NO_TLSv1;
 | 
			
		||||
        } else if (strcmp(*argv, "-no_tls1_1") == 0) {
 | 
			
		||||
            off |= SSL_OP_NO_TLSv1_1;
 | 
			
		||||
        } else if (strcmp(*argv, "-no_tls1_2") == 0) {
 | 
			
		||||
            off |= SSL_OP_NO_TLSv1_2;
 | 
			
		||||
        } else if (strcmp(*argv, "-no_comp") == 0) {
 | 
			
		||||
            off |= SSL_OP_NO_COMPRESSION;
 | 
			
		||||
        }
 | 
			
		||||
@@ -1147,7 +1301,7 @@ int MAIN(int argc, char *argv[])
 | 
			
		||||
            meth = SSLv2_server_method();
 | 
			
		||||
        }
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_SSL3
 | 
			
		||||
#ifndef OPENSSL_NO_SSL3_METHOD
 | 
			
		||||
        else if (strcmp(*argv, "-ssl3") == 0) {
 | 
			
		||||
            meth = SSLv3_server_method();
 | 
			
		||||
        }
 | 
			
		||||
@@ -1155,6 +1309,10 @@ int MAIN(int argc, char *argv[])
 | 
			
		||||
#ifndef OPENSSL_NO_TLS1
 | 
			
		||||
        else if (strcmp(*argv, "-tls1") == 0) {
 | 
			
		||||
            meth = TLSv1_server_method();
 | 
			
		||||
        } else if (strcmp(*argv, "-tls1_1") == 0) {
 | 
			
		||||
            meth = TLSv1_1_server_method();
 | 
			
		||||
        } else if (strcmp(*argv, "-tls1_2") == 0) {
 | 
			
		||||
            meth = TLSv1_2_server_method();
 | 
			
		||||
        }
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_DTLS1
 | 
			
		||||
@@ -1203,6 +1361,13 @@ int MAIN(int argc, char *argv[])
 | 
			
		||||
                goto bad;
 | 
			
		||||
            s_key_file2 = *(++argv);
 | 
			
		||||
        }
 | 
			
		||||
# ifndef OPENSSL_NO_NEXTPROTONEG
 | 
			
		||||
        else if (strcmp(*argv, "-nextprotoneg") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            next_proto_neg_in = *(++argv);
 | 
			
		||||
        }
 | 
			
		||||
# endif
 | 
			
		||||
#endif
 | 
			
		||||
#if !defined(OPENSSL_NO_JPAKE) && !defined(OPENSSL_NO_PSK)
 | 
			
		||||
        else if (strcmp(*argv, "-jpake") == 0) {
 | 
			
		||||
@@ -1211,7 +1376,24 @@ int MAIN(int argc, char *argv[])
 | 
			
		||||
            jpake_secret = *(++argv);
 | 
			
		||||
        }
 | 
			
		||||
#endif
 | 
			
		||||
        else {
 | 
			
		||||
#ifndef OPENSSL_NO_SRTP
 | 
			
		||||
        else if (strcmp(*argv, "-use_srtp") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            srtp_profiles = *(++argv);
 | 
			
		||||
        }
 | 
			
		||||
#endif
 | 
			
		||||
        else if (strcmp(*argv, "-keymatexport") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            keymatexportlabel = *(++argv);
 | 
			
		||||
        } else if (strcmp(*argv, "-keymatexportlen") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            keymatexportlen = atoi(*(++argv));
 | 
			
		||||
            if (keymatexportlen == 0)
 | 
			
		||||
                goto bad;
 | 
			
		||||
        } else {
 | 
			
		||||
            BIO_printf(bio_err, "unknown option %s\n", *argv);
 | 
			
		||||
            badop = 1;
 | 
			
		||||
            break;
 | 
			
		||||
@@ -1299,6 +1481,17 @@ int MAIN(int argc, char *argv[])
 | 
			
		||||
        }
 | 
			
		||||
#endif
 | 
			
		||||
    }
 | 
			
		||||
#if !defined(OPENSSL_NO_TLSEXT) && !defined(OPENSSL_NO_NEXTPROTONEG)
 | 
			
		||||
    if (next_proto_neg_in) {
 | 
			
		||||
        unsigned short len;
 | 
			
		||||
        next_proto.data = next_protos_parse(&len, next_proto_neg_in);
 | 
			
		||||
        if (next_proto.data == NULL)
 | 
			
		||||
            goto end;
 | 
			
		||||
        next_proto.len = len;
 | 
			
		||||
    } else {
 | 
			
		||||
        next_proto.data = NULL;
 | 
			
		||||
    }
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
    if (s_dcert_file) {
 | 
			
		||||
 | 
			
		||||
@@ -1378,12 +1571,6 @@ int MAIN(int argc, char *argv[])
 | 
			
		||||
    if (hack)
 | 
			
		||||
        SSL_CTX_set_options(ctx, SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG);
 | 
			
		||||
    SSL_CTX_set_options(ctx, off);
 | 
			
		||||
    /*
 | 
			
		||||
     * DTLS: partial reads end up discarding unread UDP bytes :-( Setting
 | 
			
		||||
     * read ahead solves this problem.
 | 
			
		||||
     */
 | 
			
		||||
    if (socket_type == SOCK_DGRAM)
 | 
			
		||||
        SSL_CTX_set_read_ahead(ctx, 1);
 | 
			
		||||
 | 
			
		||||
    if (state)
 | 
			
		||||
        SSL_CTX_set_info_callback(ctx, apps_ssl_info_callback);
 | 
			
		||||
@@ -1392,6 +1579,11 @@ int MAIN(int argc, char *argv[])
 | 
			
		||||
    else
 | 
			
		||||
        SSL_CTX_sess_set_cache_size(ctx, 128);
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_SRTP
 | 
			
		||||
    if (srtp_profiles != NULL)
 | 
			
		||||
        SSL_CTX_set_tlsext_use_srtp(ctx, srtp_profiles);
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#if 0
 | 
			
		||||
    if (cipher == NULL)
 | 
			
		||||
        cipher = getenv("SSL_CIPHER");
 | 
			
		||||
@@ -1446,12 +1638,6 @@ int MAIN(int argc, char *argv[])
 | 
			
		||||
        if (hack)
 | 
			
		||||
            SSL_CTX_set_options(ctx2, SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG);
 | 
			
		||||
        SSL_CTX_set_options(ctx2, off);
 | 
			
		||||
        /*
 | 
			
		||||
         * DTLS: partial reads end up discarding unread UDP bytes :-(
 | 
			
		||||
         * Setting read ahead solves this problem.
 | 
			
		||||
         */
 | 
			
		||||
        if (socket_type == SOCK_DGRAM)
 | 
			
		||||
            SSL_CTX_set_read_ahead(ctx2, 1);
 | 
			
		||||
 | 
			
		||||
        if (state)
 | 
			
		||||
            SSL_CTX_set_info_callback(ctx2, apps_ssl_info_callback);
 | 
			
		||||
@@ -1468,6 +1654,11 @@ int MAIN(int argc, char *argv[])
 | 
			
		||||
        if (vpm)
 | 
			
		||||
            SSL_CTX_set1_param(ctx2, vpm);
 | 
			
		||||
    }
 | 
			
		||||
# ifndef OPENSSL_NO_NEXTPROTONEG
 | 
			
		||||
    if (next_proto.data)
 | 
			
		||||
        SSL_CTX_set_next_protos_advertised_cb(ctx, next_proto_cb,
 | 
			
		||||
                                              &next_proto);
 | 
			
		||||
# endif
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_DH
 | 
			
		||||
@@ -1483,7 +1674,11 @@ int MAIN(int argc, char *argv[])
 | 
			
		||||
            BIO_printf(bio_s_out, "Setting temp DH parameters\n");
 | 
			
		||||
        } else {
 | 
			
		||||
            BIO_printf(bio_s_out, "Using default temp DH parameters\n");
 | 
			
		||||
            dh = get_dh512();
 | 
			
		||||
            dh = get_dh2048();
 | 
			
		||||
            if (dh == NULL) {
 | 
			
		||||
                ERR_print_errors(bio_err);
 | 
			
		||||
                goto end;
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
        (void)BIO_flush(bio_s_out);
 | 
			
		||||
 | 
			
		||||
@@ -1650,6 +1845,24 @@ int MAIN(int argc, char *argv[])
 | 
			
		||||
    }
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_SRP
 | 
			
		||||
    if (srp_verifier_file != NULL) {
 | 
			
		||||
        srp_callback_parm.vb = SRP_VBASE_new(srpuserseed);
 | 
			
		||||
        srp_callback_parm.user = NULL;
 | 
			
		||||
        srp_callback_parm.login = NULL;
 | 
			
		||||
        if ((ret =
 | 
			
		||||
             SRP_VBASE_init(srp_callback_parm.vb,
 | 
			
		||||
                            srp_verifier_file)) != SRP_NO_ERROR) {
 | 
			
		||||
            BIO_printf(bio_err,
 | 
			
		||||
                       "Cannot initialize SRP verifier file \"%s\":ret=%d\n",
 | 
			
		||||
                       srp_verifier_file, ret);
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
        SSL_CTX_set_verify(ctx, SSL_VERIFY_NONE, verify_callback);
 | 
			
		||||
        SSL_CTX_set_srp_cb_arg(ctx, &srp_callback_parm);
 | 
			
		||||
        SSL_CTX_set_srp_username_callback(ctx, ssl_srp_server_param_cb);
 | 
			
		||||
    } else
 | 
			
		||||
#endif
 | 
			
		||||
    if (CAfile != NULL) {
 | 
			
		||||
        SSL_CTX_set_client_CA_list(ctx, SSL_load_client_CA_file(CAfile));
 | 
			
		||||
#ifndef OPENSSL_NO_TLSEXT
 | 
			
		||||
@@ -1742,6 +1955,9 @@ static int sv_body(char *hostname, int s, unsigned char *context)
 | 
			
		||||
    unsigned long l;
 | 
			
		||||
    SSL *con = NULL;
 | 
			
		||||
    BIO *sbio;
 | 
			
		||||
#ifndef OPENSSL_NO_KRB5
 | 
			
		||||
    KSSL_CTX *kctx;
 | 
			
		||||
#endif
 | 
			
		||||
    struct timeval timeout;
 | 
			
		||||
#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS) || defined(OPENSSL_SYS_NETWARE) || defined(OPENSSL_SYS_BEOS_R5)
 | 
			
		||||
    struct timeval tv;
 | 
			
		||||
@@ -1778,9 +1994,10 @@ static int sv_body(char *hostname, int s, unsigned char *context)
 | 
			
		||||
        }
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_KRB5
 | 
			
		||||
        if ((con->kssl_ctx = kssl_ctx_new()) != NULL) {
 | 
			
		||||
            kssl_ctx_setstring(con->kssl_ctx, KSSL_SERVICE, KRB5SVC);
 | 
			
		||||
            kssl_ctx_setstring(con->kssl_ctx, KSSL_KEYTAB, KRB5KEYTAB);
 | 
			
		||||
        if ((kctx = kssl_ctx_new()) != NULL) {
 | 
			
		||||
            SSL_set0_kssl_ctx(con, kctx);
 | 
			
		||||
            kssl_ctx_setstring(kctx, KSSL_SERVICE, KRB5SVC);
 | 
			
		||||
            kssl_ctx_setstring(kctx, KSSL_KEYTAB, KRB5KEYTAB);
 | 
			
		||||
        }
 | 
			
		||||
#endif                          /* OPENSSL_NO_KRB5 */
 | 
			
		||||
        if (context)
 | 
			
		||||
@@ -1847,7 +2064,7 @@ static int sv_body(char *hostname, int s, unsigned char *context)
 | 
			
		||||
    /* SSL_set_fd(con,s); */
 | 
			
		||||
 | 
			
		||||
    if (s_debug) {
 | 
			
		||||
        con->debug = 1;
 | 
			
		||||
        SSL_set_debug(con, 1);
 | 
			
		||||
        BIO_set_callback(SSL_get_rbio(con), bio_dump_callback);
 | 
			
		||||
        BIO_set_callback_arg(SSL_get_rbio(con), (char *)bio_s_out);
 | 
			
		||||
    }
 | 
			
		||||
@@ -1968,7 +2185,14 @@ static int sv_body(char *hostname, int s, unsigned char *context)
 | 
			
		||||
                     */
 | 
			
		||||
                    goto err;
 | 
			
		||||
                }
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_HEARTBEATS
 | 
			
		||||
                if ((buf[0] == 'B') && ((buf[1] == '\n') || (buf[1] == '\r'))) {
 | 
			
		||||
                    BIO_printf(bio_err, "HEARTBEATING\n");
 | 
			
		||||
                    SSL_heartbeat(con);
 | 
			
		||||
                    i = 0;
 | 
			
		||||
                    continue;
 | 
			
		||||
                }
 | 
			
		||||
#endif
 | 
			
		||||
                if ((buf[0] == 'r') && ((buf[1] == '\n') || (buf[1] == '\r'))) {
 | 
			
		||||
                    SSL_renegotiate(con);
 | 
			
		||||
                    i = SSL_do_handshake(con);
 | 
			
		||||
@@ -2017,6 +2241,20 @@ static int sv_body(char *hostname, int s, unsigned char *context)
 | 
			
		||||
                }
 | 
			
		||||
#endif
 | 
			
		||||
                k = SSL_write(con, &(buf[l]), (unsigned int)i);
 | 
			
		||||
#ifndef OPENSSL_NO_SRP
 | 
			
		||||
                while (SSL_get_error(con, k) == SSL_ERROR_WANT_X509_LOOKUP) {
 | 
			
		||||
                    BIO_printf(bio_s_out, "LOOKUP renego during write\n");
 | 
			
		||||
                    srp_callback_parm.user =
 | 
			
		||||
                        SRP_VBASE_get_by_user(srp_callback_parm.vb,
 | 
			
		||||
                                              srp_callback_parm.login);
 | 
			
		||||
                    if (srp_callback_parm.user)
 | 
			
		||||
                        BIO_printf(bio_s_out, "LOOKUP done %s\n",
 | 
			
		||||
                                   srp_callback_parm.user->info);
 | 
			
		||||
                    else
 | 
			
		||||
                        BIO_printf(bio_s_out, "LOOKUP not successful\n");
 | 
			
		||||
                    k = SSL_write(con, &(buf[l]), (unsigned int)i);
 | 
			
		||||
                }
 | 
			
		||||
#endif
 | 
			
		||||
                switch (SSL_get_error(con, k)) {
 | 
			
		||||
                case SSL_ERROR_NONE:
 | 
			
		||||
                    break;
 | 
			
		||||
@@ -2059,6 +2297,20 @@ static int sv_body(char *hostname, int s, unsigned char *context)
 | 
			
		||||
            } else {
 | 
			
		||||
 again:
 | 
			
		||||
                i = SSL_read(con, (char *)buf, bufsize);
 | 
			
		||||
#ifndef OPENSSL_NO_SRP
 | 
			
		||||
                while (SSL_get_error(con, i) == SSL_ERROR_WANT_X509_LOOKUP) {
 | 
			
		||||
                    BIO_printf(bio_s_out, "LOOKUP renego during read\n");
 | 
			
		||||
                    srp_callback_parm.user =
 | 
			
		||||
                        SRP_VBASE_get_by_user(srp_callback_parm.vb,
 | 
			
		||||
                                              srp_callback_parm.login);
 | 
			
		||||
                    if (srp_callback_parm.user)
 | 
			
		||||
                        BIO_printf(bio_s_out, "LOOKUP done %s\n",
 | 
			
		||||
                                   srp_callback_parm.user->info);
 | 
			
		||||
                    else
 | 
			
		||||
                        BIO_printf(bio_s_out, "LOOKUP not successful\n");
 | 
			
		||||
                    i = SSL_read(con, (char *)buf, bufsize);
 | 
			
		||||
                }
 | 
			
		||||
#endif
 | 
			
		||||
                switch (SSL_get_error(con, i)) {
 | 
			
		||||
                case SSL_ERROR_NONE:
 | 
			
		||||
#ifdef CHARSET_EBCDIC
 | 
			
		||||
@@ -2070,7 +2322,6 @@ static int sv_body(char *hostname, int s, unsigned char *context)
 | 
			
		||||
                    break;
 | 
			
		||||
                case SSL_ERROR_WANT_WRITE:
 | 
			
		||||
                case SSL_ERROR_WANT_READ:
 | 
			
		||||
                case SSL_ERROR_WANT_X509_LOOKUP:
 | 
			
		||||
                    BIO_printf(bio_s_out, "Read BLOCK\n");
 | 
			
		||||
                    break;
 | 
			
		||||
                case SSL_ERROR_SYSCALL:
 | 
			
		||||
@@ -2122,8 +2373,32 @@ static int init_ssl_connection(SSL *con)
 | 
			
		||||
    X509 *peer;
 | 
			
		||||
    long verify_error;
 | 
			
		||||
    MS_STATIC char buf[BUFSIZ];
 | 
			
		||||
#ifndef OPENSSL_NO_KRB5
 | 
			
		||||
    char *client_princ;
 | 
			
		||||
#endif
 | 
			
		||||
#if !defined(OPENSSL_NO_TLSEXT) && !defined(OPENSSL_NO_NEXTPROTONEG)
 | 
			
		||||
    const unsigned char *next_proto_neg;
 | 
			
		||||
    unsigned next_proto_neg_len;
 | 
			
		||||
#endif
 | 
			
		||||
    unsigned char *exportedkeymat;
 | 
			
		||||
 | 
			
		||||
    if ((i = SSL_accept(con)) <= 0) {
 | 
			
		||||
    i = SSL_accept(con);
 | 
			
		||||
#ifndef OPENSSL_NO_SRP
 | 
			
		||||
    while (i <= 0 && SSL_get_error(con, i) == SSL_ERROR_WANT_X509_LOOKUP) {
 | 
			
		||||
        BIO_printf(bio_s_out, "LOOKUP during accept %s\n",
 | 
			
		||||
                   srp_callback_parm.login);
 | 
			
		||||
        srp_callback_parm.user =
 | 
			
		||||
            SRP_VBASE_get_by_user(srp_callback_parm.vb,
 | 
			
		||||
                                  srp_callback_parm.login);
 | 
			
		||||
        if (srp_callback_parm.user)
 | 
			
		||||
            BIO_printf(bio_s_out, "LOOKUP done %s\n",
 | 
			
		||||
                       srp_callback_parm.user->info);
 | 
			
		||||
        else
 | 
			
		||||
            BIO_printf(bio_s_out, "LOOKUP not successful\n");
 | 
			
		||||
        i = SSL_accept(con);
 | 
			
		||||
    }
 | 
			
		||||
#endif
 | 
			
		||||
    if (i <= 0) {
 | 
			
		||||
        if (BIO_sock_should_retry(i)) {
 | 
			
		||||
            BIO_printf(bio_s_out, "DELAY\n");
 | 
			
		||||
            return (1);
 | 
			
		||||
@@ -2156,19 +2431,61 @@ static int init_ssl_connection(SSL *con)
 | 
			
		||||
        BIO_printf(bio_s_out, "Shared ciphers:%s\n", buf);
 | 
			
		||||
    str = SSL_CIPHER_get_name(SSL_get_current_cipher(con));
 | 
			
		||||
    BIO_printf(bio_s_out, "CIPHER is %s\n", (str != NULL) ? str : "(NONE)");
 | 
			
		||||
    if (con->hit)
 | 
			
		||||
 | 
			
		||||
#if !defined(OPENSSL_NO_TLSEXT) && !defined(OPENSSL_NO_NEXTPROTONEG)
 | 
			
		||||
    SSL_get0_next_proto_negotiated(con, &next_proto_neg, &next_proto_neg_len);
 | 
			
		||||
    if (next_proto_neg) {
 | 
			
		||||
        BIO_printf(bio_s_out, "NEXTPROTO is ");
 | 
			
		||||
        BIO_write(bio_s_out, next_proto_neg, next_proto_neg_len);
 | 
			
		||||
        BIO_printf(bio_s_out, "\n");
 | 
			
		||||
    }
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_SRTP
 | 
			
		||||
    {
 | 
			
		||||
        SRTP_PROTECTION_PROFILE *srtp_profile
 | 
			
		||||
            = SSL_get_selected_srtp_profile(con);
 | 
			
		||||
 | 
			
		||||
        if (srtp_profile)
 | 
			
		||||
            BIO_printf(bio_s_out, "SRTP Extension negotiated, profile=%s\n",
 | 
			
		||||
                       srtp_profile->name);
 | 
			
		||||
    }
 | 
			
		||||
#endif
 | 
			
		||||
    if (SSL_cache_hit(con))
 | 
			
		||||
        BIO_printf(bio_s_out, "Reused session-id\n");
 | 
			
		||||
    if (SSL_ctrl(con, SSL_CTRL_GET_FLAGS, 0, NULL) &
 | 
			
		||||
        TLS1_FLAGS_TLS_PADDING_BUG)
 | 
			
		||||
        BIO_printf(bio_s_out, "Peer has incorrect TLSv1 block padding\n");
 | 
			
		||||
#ifndef OPENSSL_NO_KRB5
 | 
			
		||||
    if (con->kssl_ctx->client_princ != NULL) {
 | 
			
		||||
    client_princ = kssl_ctx_get0_client_princ(SSL_get0_kssl_ctx(con));
 | 
			
		||||
    if (client_princ != NULL) {
 | 
			
		||||
        BIO_printf(bio_s_out, "Kerberos peer principal is %s\n",
 | 
			
		||||
                   con->kssl_ctx->client_princ);
 | 
			
		||||
                   client_princ);
 | 
			
		||||
    }
 | 
			
		||||
#endif                          /* OPENSSL_NO_KRB5 */
 | 
			
		||||
    BIO_printf(bio_s_out, "Secure Renegotiation IS%s supported\n",
 | 
			
		||||
               SSL_get_secure_renegotiation_support(con) ? "" : " NOT");
 | 
			
		||||
    if (keymatexportlabel != NULL) {
 | 
			
		||||
        BIO_printf(bio_s_out, "Keying material exporter:\n");
 | 
			
		||||
        BIO_printf(bio_s_out, "    Label: '%s'\n", keymatexportlabel);
 | 
			
		||||
        BIO_printf(bio_s_out, "    Length: %i bytes\n", keymatexportlen);
 | 
			
		||||
        exportedkeymat = OPENSSL_malloc(keymatexportlen);
 | 
			
		||||
        if (exportedkeymat != NULL) {
 | 
			
		||||
            if (!SSL_export_keying_material(con, exportedkeymat,
 | 
			
		||||
                                            keymatexportlen,
 | 
			
		||||
                                            keymatexportlabel,
 | 
			
		||||
                                            strlen(keymatexportlabel),
 | 
			
		||||
                                            NULL, 0, 0)) {
 | 
			
		||||
                BIO_printf(bio_s_out, "    Error\n");
 | 
			
		||||
            } else {
 | 
			
		||||
                BIO_printf(bio_s_out, "    Keying material: ");
 | 
			
		||||
                for (i = 0; i < keymatexportlen; i++)
 | 
			
		||||
                    BIO_printf(bio_s_out, "%02X", exportedkeymat[i]);
 | 
			
		||||
                BIO_printf(bio_s_out, "\n");
 | 
			
		||||
            }
 | 
			
		||||
            OPENSSL_free(exportedkeymat);
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    return (1);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
@@ -2187,6 +2504,9 @@ static DH *load_dh_param(const char *dhfile)
 | 
			
		||||
    return (ret);
 | 
			
		||||
}
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_KRB5
 | 
			
		||||
char *client_princ;
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#if 0
 | 
			
		||||
static int load_CA(SSL_CTX *ctx, char *file)
 | 
			
		||||
@@ -2217,6 +2537,9 @@ static int www_body(char *hostname, int s, unsigned char *context)
 | 
			
		||||
    SSL *con;
 | 
			
		||||
    const SSL_CIPHER *c;
 | 
			
		||||
    BIO *io, *ssl_bio, *sbio;
 | 
			
		||||
#ifndef OPENSSL_NO_KRB5
 | 
			
		||||
    KSSL_CTX *kctx;
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
    buf = OPENSSL_malloc(bufsize);
 | 
			
		||||
    if (buf == NULL)
 | 
			
		||||
@@ -2250,9 +2573,9 @@ static int www_body(char *hostname, int s, unsigned char *context)
 | 
			
		||||
    }
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_KRB5
 | 
			
		||||
    if ((con->kssl_ctx = kssl_ctx_new()) != NULL) {
 | 
			
		||||
        kssl_ctx_setstring(con->kssl_ctx, KSSL_SERVICE, KRB5SVC);
 | 
			
		||||
        kssl_ctx_setstring(con->kssl_ctx, KSSL_KEYTAB, KRB5KEYTAB);
 | 
			
		||||
    if ((kctx = kssl_ctx_new()) != NULL) {
 | 
			
		||||
        kssl_ctx_setstring(kctx, KSSL_SERVICE, KRB5SVC);
 | 
			
		||||
        kssl_ctx_setstring(kctx, KSSL_KEYTAB, KRB5KEYTAB);
 | 
			
		||||
    }
 | 
			
		||||
#endif                          /* OPENSSL_NO_KRB5 */
 | 
			
		||||
    if (context)
 | 
			
		||||
@@ -2276,7 +2599,7 @@ static int www_body(char *hostname, int s, unsigned char *context)
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
    if (s_debug) {
 | 
			
		||||
        con->debug = 1;
 | 
			
		||||
        SSL_set_debug(con, 1);
 | 
			
		||||
        BIO_set_callback(SSL_get_rbio(con), bio_dump_callback);
 | 
			
		||||
        BIO_set_callback_arg(SSL_get_rbio(con), (char *)bio_s_out);
 | 
			
		||||
    }
 | 
			
		||||
@@ -2288,7 +2611,22 @@ static int www_body(char *hostname, int s, unsigned char *context)
 | 
			
		||||
    for (;;) {
 | 
			
		||||
        if (hack) {
 | 
			
		||||
            i = SSL_accept(con);
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_SRP
 | 
			
		||||
            while (i <= 0
 | 
			
		||||
                   && SSL_get_error(con, i) == SSL_ERROR_WANT_X509_LOOKUP) {
 | 
			
		||||
                BIO_printf(bio_s_out, "LOOKUP during accept %s\n",
 | 
			
		||||
                           srp_callback_parm.login);
 | 
			
		||||
                srp_callback_parm.user =
 | 
			
		||||
                    SRP_VBASE_get_by_user(srp_callback_parm.vb,
 | 
			
		||||
                                          srp_callback_parm.login);
 | 
			
		||||
                if (srp_callback_parm.user)
 | 
			
		||||
                    BIO_printf(bio_s_out, "LOOKUP done %s\n",
 | 
			
		||||
                               srp_callback_parm.user->info);
 | 
			
		||||
                else
 | 
			
		||||
                    BIO_printf(bio_s_out, "LOOKUP not successful\n");
 | 
			
		||||
                i = SSL_accept(con);
 | 
			
		||||
            }
 | 
			
		||||
#endif
 | 
			
		||||
            switch (SSL_get_error(con, i)) {
 | 
			
		||||
            case SSL_ERROR_NONE:
 | 
			
		||||
                break;
 | 
			
		||||
@@ -2330,7 +2668,7 @@ static int www_body(char *hostname, int s, unsigned char *context)
 | 
			
		||||
 | 
			
		||||
        /* else we have data */
 | 
			
		||||
        if (((www == 1) && (strncmp("GET ", buf, 4) == 0)) ||
 | 
			
		||||
            ((www == 2) && (strncmp("GET /stats ", buf, 10) == 0))) {
 | 
			
		||||
            ((www == 2) && (strncmp("GET /stats ", buf, 11) == 0))) {
 | 
			
		||||
            char *p;
 | 
			
		||||
            X509 *peer;
 | 
			
		||||
            STACK_OF(SSL_CIPHER) *sk;
 | 
			
		||||
@@ -2348,6 +2686,11 @@ static int www_body(char *hostname, int s, unsigned char *context)
 | 
			
		||||
            }
 | 
			
		||||
            BIO_puts(io, "\n");
 | 
			
		||||
 | 
			
		||||
            BIO_printf(io,
 | 
			
		||||
                       "Secure Renegotiation IS%s supported\n",
 | 
			
		||||
                       SSL_get_secure_renegotiation_support(con) ?
 | 
			
		||||
                       "" : " NOT");
 | 
			
		||||
 | 
			
		||||
            /*
 | 
			
		||||
             * The following is evil and should not really be done
 | 
			
		||||
             */
 | 
			
		||||
@@ -2381,7 +2724,7 @@ static int www_body(char *hostname, int s, unsigned char *context)
 | 
			
		||||
                }
 | 
			
		||||
                BIO_puts(io, "\n");
 | 
			
		||||
            }
 | 
			
		||||
            BIO_printf(io, ((con->hit)
 | 
			
		||||
            BIO_printf(io, (SSL_cache_hit(con)
 | 
			
		||||
                            ? "---\nReused, " : "---\nNew, "));
 | 
			
		||||
            c = SSL_get_current_cipher(con);
 | 
			
		||||
            BIO_printf(io, "%s, Cipher is %s\n",
 | 
			
		||||
@@ -2599,7 +2942,8 @@ static int generate_session_id(const SSL *ssl, unsigned char *id,
 | 
			
		||||
{
 | 
			
		||||
    unsigned int count = 0;
 | 
			
		||||
    do {
 | 
			
		||||
        RAND_pseudo_bytes(id, *id_len);
 | 
			
		||||
        if (RAND_pseudo_bytes(id, *id_len) < 0)
 | 
			
		||||
            return 0;
 | 
			
		||||
        /*
 | 
			
		||||
         * Prefix the session_id with the required prefix. NB: If our prefix
 | 
			
		||||
         * is too long, clip it - but there will be worse effects anyway, eg.
 | 
			
		||||
 
 | 
			
		||||
@@ -235,10 +235,10 @@ int init_client(int *sock, char *host, int port, int type)
 | 
			
		||||
{
 | 
			
		||||
    unsigned char ip[4];
 | 
			
		||||
 | 
			
		||||
    if (!host_ip(host, &(ip[0]))) {
 | 
			
		||||
        return (0);
 | 
			
		||||
    }
 | 
			
		||||
    return (init_client_ip(sock, ip, port, type));
 | 
			
		||||
    memset(ip, '\0', sizeof ip);
 | 
			
		||||
    if (!host_ip(host, &(ip[0])))
 | 
			
		||||
        return 0;
 | 
			
		||||
    return init_client_ip(sock, ip, port, type);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static int init_client_ip(int *sock, unsigned char ip[4], int port, int type)
 | 
			
		||||
 
 | 
			
		||||
@@ -302,6 +302,10 @@ static int parseArgs(int argc, char **argv)
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            maxTime = atoi(*(++argv));
 | 
			
		||||
            if (maxTime <= 0) {
 | 
			
		||||
                BIO_printf(bio_err, "time must be > 0\n");
 | 
			
		||||
                badop = 1;
 | 
			
		||||
            }
 | 
			
		||||
        } else {
 | 
			
		||||
            BIO_printf(bio_err, "unknown option %s\n", *argv);
 | 
			
		||||
            badop = 1;
 | 
			
		||||
@@ -357,13 +361,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    if (bio_err == NULL)
 | 
			
		||||
        bio_err = BIO_new_fp(stderr, BIO_NOCLOSE);
 | 
			
		||||
 | 
			
		||||
#if !defined(OPENSSL_NO_SSL2) && !defined(OPENSSL_NO_SSL3)
 | 
			
		||||
    s_time_meth = SSLv23_client_method();
 | 
			
		||||
#elif !defined(OPENSSL_NO_SSL3)
 | 
			
		||||
    s_time_meth = SSLv3_client_method();
 | 
			
		||||
#elif !defined(OPENSSL_NO_SSL2)
 | 
			
		||||
    s_time_meth = SSLv2_client_method();
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
    /* parse the command line arguments */
 | 
			
		||||
    if (parseArgs(argc, argv) < 0)
 | 
			
		||||
@@ -556,7 +554,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
         nConn, totalTime, ((double)nConn / totalTime), bytes_read);
 | 
			
		||||
    printf
 | 
			
		||||
        ("%d connections in %ld real seconds, %ld bytes read per connection\n",
 | 
			
		||||
         nConn, (long)time(NULL) - finishtime + maxTime, bytes_read / nConn);
 | 
			
		||||
         nConn, (long)time(NULL) - finishtime + maxTime,
 | 
			
		||||
         bytes_read / (nConn?nConn:1));
 | 
			
		||||
 | 
			
		||||
    ret = 0;
 | 
			
		||||
 end:
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										413
									
								
								apps/server.pem
									
									
									
									
									
								
							
							
						
						
									
										413
									
								
								apps/server.pem
									
									
									
									
									
								
							@@ -1,369 +1,52 @@
 | 
			
		||||
issuer= /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test CA (1024 bit)
 | 
			
		||||
subject= /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Server test cert (512 bit)
 | 
			
		||||
subject= C = UK, O = OpenSSL Group, OU = FOR TESTING PURPOSES ONLY, CN = Test Server Cert
 | 
			
		||||
issuer= C = UK, O = OpenSSL Group, OU = FOR TESTING PURPOSES ONLY, CN = OpenSSL Test Intermediate CA
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIIB6TCCAVICAQYwDQYJKoZIhvcNAQEEBQAwWzELMAkGA1UEBhMCQVUxEzARBgNV
 | 
			
		||||
BAgTClF1ZWVuc2xhbmQxGjAYBgNVBAoTEUNyeXB0U29mdCBQdHkgTHRkMRswGQYD
 | 
			
		||||
VQQDExJUZXN0IENBICgxMDI0IGJpdCkwHhcNMDAxMDE2MjIzMTAzWhcNMDMwMTE0
 | 
			
		||||
MjIzMTAzWjBjMQswCQYDVQQGEwJBVTETMBEGA1UECBMKUXVlZW5zbGFuZDEaMBgG
 | 
			
		||||
A1UEChMRQ3J5cHRTb2Z0IFB0eSBMdGQxIzAhBgNVBAMTGlNlcnZlciB0ZXN0IGNl
 | 
			
		||||
cnQgKDUxMiBiaXQpMFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBAJ+zw4Qnlf8SMVIP
 | 
			
		||||
Fe9GEcStgOY2Ww/dgNdhjeD8ckUJNP5VZkVDTGiXav6ooKXfX3j/7tdkuD8Ey2//
 | 
			
		||||
Kv7+ue0CAwEAATANBgkqhkiG9w0BAQQFAAOBgQCT0grFQeZaqYb5EYfk20XixZV4
 | 
			
		||||
GmyAbXMftG1Eo7qGiMhYzRwGNWxEYojf5PZkYZXvSqZ/ZXHXa4g59jK/rJNnaVGM
 | 
			
		||||
k+xIX8mxQvlV0n5O9PIha5BX5teZnkHKgL8aKKLKW1BK7YTngsfSzzaeame5iKfz
 | 
			
		||||
itAE+OjGF+PFKbwX8Q==
 | 
			
		||||
MIID5zCCAs+gAwIBAgIJALnu1NlVpZ6zMA0GCSqGSIb3DQEBBQUAMHAxCzAJBgNV
 | 
			
		||||
BAYTAlVLMRYwFAYDVQQKDA1PcGVuU1NMIEdyb3VwMSIwIAYDVQQLDBlGT1IgVEVT
 | 
			
		||||
VElORyBQVVJQT1NFUyBPTkxZMSUwIwYDVQQDDBxPcGVuU1NMIFRlc3QgSW50ZXJt
 | 
			
		||||
ZWRpYXRlIENBMB4XDTExMTIwODE0MDE0OFoXDTIxMTAxNjE0MDE0OFowZDELMAkG
 | 
			
		||||
A1UEBhMCVUsxFjAUBgNVBAoMDU9wZW5TU0wgR3JvdXAxIjAgBgNVBAsMGUZPUiBU
 | 
			
		||||
RVNUSU5HIFBVUlBPU0VTIE9OTFkxGTAXBgNVBAMMEFRlc3QgU2VydmVyIENlcnQw
 | 
			
		||||
ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDzhPOSNtyyRspmeuUpxfNJ
 | 
			
		||||
KCLTuf7g3uQ4zu4iHOmRO5TQci+HhVlLZrHF9XqFXcIP0y4pWDbMSGuiorUmzmfi
 | 
			
		||||
R7bfSdI/+qIQt8KXRH6HNG1t8ou0VSvWId5TS5Dq/er5ODUr9OaaDva7EquHIcMv
 | 
			
		||||
vPQGuI+OEAcnleVCy9HVEIySrO4P3CNIicnGkwwiAud05yUAq/gPXBC1hTtmlPD7
 | 
			
		||||
TVcGVSEiJdvzqqlgv02qedGrkki6GY4S7GjZxrrf7Foc2EP+51LJzwLQx3/JfrCU
 | 
			
		||||
41NEWAsu/Sl0tQabXESN+zJ1pDqoZ3uHMgpQjeGiE0olr+YcsSW/tJmiU9OiAr8R
 | 
			
		||||
AgMBAAGjgY8wgYwwDAYDVR0TAQH/BAIwADAOBgNVHQ8BAf8EBAMCBeAwLAYJYIZI
 | 
			
		||||
AYb4QgENBB8WHU9wZW5TU0wgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQW
 | 
			
		||||
BBSCvM8AABPR9zklmifnr9LvIBturDAfBgNVHSMEGDAWgBQ2w2yI55X+sL3szj49
 | 
			
		||||
hqshgYfa2jANBgkqhkiG9w0BAQUFAAOCAQEAqb1NV0B0/pbpK9Z4/bNjzPQLTRLK
 | 
			
		||||
WnSNm/Jh5v0GEUOE/Beg7GNjNrmeNmqxAlpqWz9qoeoFZax+QBpIZYjROU3TS3fp
 | 
			
		||||
yLsrnlr0CDQ5R7kCCDGa8dkXxemmpZZLbUCpW2Uoy8sAA4JjN9OtsZY7dvUXFgJ7
 | 
			
		||||
vVNTRnI01ghknbtD+2SxSQd3CWF6QhcRMAzZJ1z1cbbwGDDzfvGFPzJ+Sq+zEPds
 | 
			
		||||
xoVLLSetCiBc+40ZcDS5dV98h9XD7JMTQfxzA7mNGv73JoZJA6nFgj+ADSlJsY/t
 | 
			
		||||
JBv+z1iQRueoh9Qeee+ZbRifPouCB8FDx+AltvHTANdAq0t/K3o+pplMVA==
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
-----BEGIN RSA PRIVATE KEY-----
 | 
			
		||||
MIIBPAIBAAJBAJ+zw4Qnlf8SMVIPFe9GEcStgOY2Ww/dgNdhjeD8ckUJNP5VZkVD
 | 
			
		||||
TGiXav6ooKXfX3j/7tdkuD8Ey2//Kv7+ue0CAwEAAQJAN6W31vDEP2DjdqhzCDDu
 | 
			
		||||
OA4NACqoiFqyblo7yc2tM4h4xMbC3Yx5UKMN9ZkCtX0gzrz6DyF47bdKcWBzNWCj
 | 
			
		||||
gQIhANEoojVt7hq+SQ6MCN6FTAysGgQf56Q3TYoJMoWvdiXVAiEAw3e3rc+VJpOz
 | 
			
		||||
rHuDo6bgpjUAAXM+v3fcpsfZSNO6V7kCIQCtbVjanpUwvZkMI9by02oUk9taki3b
 | 
			
		||||
PzPfAfNPYAbCJQIhAJXNQDWyqwn/lGmR11cqY2y9nZ1+5w3yHGatLrcDnQHxAiEA
 | 
			
		||||
vnlEGo8K85u+KwIOimM48ZG8oTk7iFdkqLJR1utT3aU=
 | 
			
		||||
MIIEpAIBAAKCAQEA84TzkjbcskbKZnrlKcXzSSgi07n+4N7kOM7uIhzpkTuU0HIv
 | 
			
		||||
h4VZS2axxfV6hV3CD9MuKVg2zEhroqK1Js5n4ke230nSP/qiELfCl0R+hzRtbfKL
 | 
			
		||||
tFUr1iHeU0uQ6v3q+Tg1K/Tmmg72uxKrhyHDL7z0BriPjhAHJ5XlQsvR1RCMkqzu
 | 
			
		||||
D9wjSInJxpMMIgLndOclAKv4D1wQtYU7ZpTw+01XBlUhIiXb86qpYL9NqnnRq5JI
 | 
			
		||||
uhmOEuxo2ca63+xaHNhD/udSyc8C0Md/yX6wlONTRFgLLv0pdLUGm1xEjfsydaQ6
 | 
			
		||||
qGd7hzIKUI3hohNKJa/mHLElv7SZolPTogK/EQIDAQABAoIBAADq9FwNtuE5IRQn
 | 
			
		||||
zGtO4q7Y5uCzZ8GDNYr9RKp+P2cbuWDbvVAecYq2NV9QoIiWJOAYZKklOvekIju3
 | 
			
		||||
r0UZLA0PRiIrTg6NrESx3JrjWDK8QNlUO7CPTZ39/K+FrmMkV9lem9yxjJjyC34D
 | 
			
		||||
AQB+YRTx+l14HppjdxNwHjAVQpIx/uO2F5xAMuk32+3K+pq9CZUtrofe1q4Agj9R
 | 
			
		||||
5s8mSy9pbRo9kW9wl5xdEotz1LivFOEiqPUJTUq5J5PeMKao3vdK726XI4Z455Nm
 | 
			
		||||
W2/MA0YV0ug2FYinHcZdvKM6dimH8GLfa3X8xKRfzjGjTiMSwsdjgMa4awY3tEHH
 | 
			
		||||
674jhAECgYEA/zqMrc0zsbNk83sjgaYIug5kzEpN4ic020rSZsmQxSCerJTgNhmg
 | 
			
		||||
utKSCt0Re09Jt3LqG48msahX8ycqDsHNvlEGPQSbMu9IYeO3Wr3fAm75GEtFWePY
 | 
			
		||||
BhM73I7gkRt4s8bUiUepMG/wY45c5tRF23xi8foReHFFe9MDzh8fJFECgYEA9EFX
 | 
			
		||||
4qAik1pOJGNei9BMwmx0I0gfVEIgu0tzeVqT45vcxbxr7RkTEaDoAG6PlbWP6D9a
 | 
			
		||||
WQNLp4gsgRM90ZXOJ4up5DsAWDluvaF4/omabMA+MJJ5kGZ0gCj5rbZbKqUws7x8
 | 
			
		||||
bp+6iBfUPJUbcqNqFmi/08Yt7vrDnMnyMw2A/sECgYEAiiuRMxnuzVm34hQcsbhH
 | 
			
		||||
6ymVqf7j0PW2qK0F4H1ocT9qhzWFd+RB3kHWrCjnqODQoI6GbGr/4JepHUpre1ex
 | 
			
		||||
4UEN5oSS3G0ru0rC3U4C59dZ5KwDHFm7ffZ1pr52ljfQDUsrjjIMRtuiwNK2OoRa
 | 
			
		||||
WSsqiaL+SDzSB+nBmpnAizECgYBdt/y6rerWUx4MhDwwtTnel7JwHyo2MDFS6/5g
 | 
			
		||||
n8qC2Lj6/fMDRE22w+CA2esp7EJNQJGv+b27iFpbJEDh+/Lf5YzIT4MwVskQ5bYB
 | 
			
		||||
JFcmRxUVmf4e09D7o705U/DjCgMH09iCsbLmqQ38ONIRSHZaJtMDtNTHD1yi+jF+
 | 
			
		||||
OT43gQKBgQC/2OHZoko6iRlNOAQ/tMVFNq7fL81GivoQ9F1U0Qr+DH3ZfaH8eIkX
 | 
			
		||||
xT0ToMPJUzWAn8pZv0snA0um6SIgvkCuxO84OkANCVbttzXImIsL7pFzfcwV/ERK
 | 
			
		||||
UM6j0ZuSMFOCr/lGPAoOQU0fskidGEHi1/kW+suSr28TqsyYZpwBDQ==
 | 
			
		||||
-----END RSA PRIVATE KEY-----
 | 
			
		||||
subject=/C=US/O=AT&T Bell Laboratories/OU=Prototype Research CA
 | 
			
		||||
issuer= /C=US/O=AT&T Bell Laboratories/OU=Prototype Research CA
 | 
			
		||||
notBefore=950413210656Z
 | 
			
		||||
notAfter =970412210656Z
 | 
			
		||||
-----BEGIN X509 CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
MIICCDCCAXECAQAwDQYJKoZIhvcNAQEEBQAwTjELMAkGA1UEBhMCVVMxHzAdBgNV
 | 
			
		||||
BAoUFkFUJlQgQmVsbCBMYWJvcmF0b3JpZXMxHjAcBgNVBAsUFVByb3RvdHlwZSBS
 | 
			
		||||
ZXNlYXJjaCBDQTAeFw05NTA0MTMyMTA2NTZaFw05NzA0MTIyMTA2NTZaME4xCzAJ
 | 
			
		||||
BgNVBAYTAlVTMR8wHQYDVQQKFBZBVCZUIEJlbGwgTGFib3JhdG9yaWVzMR4wHAYD
 | 
			
		||||
VQQLFBVQcm90b3R5cGUgUmVzZWFyY2ggQ0EwgZwwDQYJKoZIhvcNAQEBBQADgYoA
 | 
			
		||||
MIGGAoGAebOmgtSCl+wCYZc86UGYeTLY8cjmW2P0FN8ToT/u2pECCoFdrlycX0OR
 | 
			
		||||
3wt0ZhpFXLVNeDnHwEE9veNUih7pCL2ZBFqoIoQkB1lZmXRiVtjGonz8BLm/qrFM
 | 
			
		||||
YHb0lme/Ol+s118mwKVxnn6bSAeI/OXKhLaVdYZWk+aEaxEDkVkCAQ8wDQYJKoZI
 | 
			
		||||
hvcNAQEEBQADgYEAAZMG14lZmZ8bahkaHaTV9dQf4p2FZiQTFwHP9ZyGsXPC+LT5
 | 
			
		||||
dG5iTaRmyjNIJdPWohZDl97kAci79aBndvuEvRKOjLHs3WRGBIwERnAcnY9Mz8u/
 | 
			
		||||
zIHK23PjYVxGGaZd669OJwD0CYyqH22HH9nFUGaoJdsv39ChW0NRdLE9+y8=
 | 
			
		||||
-----END X509 CERTIFICATE-----
 | 
			
		||||
issuer= /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test PCA (1024 bit)
 | 
			
		||||
subject=/C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test CA (1024 bit)
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICJjCCAY8CAQAwDQYJKoZIhvcNAQEEBQAwXDELMAkGA1UEBhMCQVUxEzARBgNV
 | 
			
		||||
BAgTClF1ZWVuc2xhbmQxGjAYBgNVBAoTEUNyeXB0U29mdCBQdHkgTHRkMRwwGgYD
 | 
			
		||||
VQQDExNUZXN0IFBDQSAoMTAyNCBiaXQpMB4XDTk3MDYwOTEzNTc0M1oXDTAxMDYw
 | 
			
		||||
OTEzNTc0M1owWzELMAkGA1UEBhMCQVUxEzARBgNVBAgTClF1ZWVuc2xhbmQxGjAY
 | 
			
		||||
BgNVBAoTEUNyeXB0U29mdCBQdHkgTHRkMRswGQYDVQQDExJUZXN0IENBICgxMDI0
 | 
			
		||||
IGJpdCkwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAKO7o8t116VP6cgybTsZ
 | 
			
		||||
DCZhr95nYlZuya3aCi1IKoztqwWnjbmDFIriOqGFPrZQ+moMETC9D59iRW/dFXSv
 | 
			
		||||
1F65ka/XY2hLh9exCCo7XuUcDs53Qp3bI3AmMqHjgzE8oO3ajyJAzJkTTOUecQU2
 | 
			
		||||
mw/gI4tMM0LqWMQS7luTy4+xAgMBAAEwDQYJKoZIhvcNAQEEBQADgYEAM7achv3v
 | 
			
		||||
hLQJcv/65eGEpBXM40ZDVoFQFFJWaY5p883HTqLB1x4FdzsXHH0QKBTcKpWwqyu4
 | 
			
		||||
YDm3fb8oDugw72bCzfyZK/zVZPR/hVlqI/fvU109Qoc+7oPvIXWky71HfcK6ZBCA
 | 
			
		||||
q30KIqGM/uoM60INq97qjDmCJapagcNBGQs=
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
-----BEGIN RSA PRIVATE KEY-----
 | 
			
		||||
MIICXQIBAAKBgQCju6PLddelT+nIMm07GQwmYa/eZ2JWbsmt2gotSCqM7asFp425
 | 
			
		||||
gxSK4jqhhT62UPpqDBEwvQ+fYkVv3RV0r9ReuZGv12NoS4fXsQgqO17lHA7Od0Kd
 | 
			
		||||
2yNwJjKh44MxPKDt2o8iQMyZE0zlHnEFNpsP4COLTDNC6ljEEu5bk8uPsQIDAQAB
 | 
			
		||||
AoGAVZmpFZsDZfr0l2S9tLLwpjRWNOlKATQkno6q2WesT0eGLQufTciY+c8ypfU6
 | 
			
		||||
hyio8r5iUl/VhhdjhAtKx1mRpiotftHo/eYf8rtsrnprOnWG0bWjLjtIoMbcxGn2
 | 
			
		||||
J3bN6LJmbJMjDs0eJ3KnTu646F3nDUw2oGAwmpzKXA1KAP0CQQDRvQhxk2D3Pehs
 | 
			
		||||
HvG665u2pB5ipYQngEFlZO7RHJZzJOZEWSLuuMqaF/7pTfA5jiBvWqCgJeCRRInL
 | 
			
		||||
21ru4dlPAkEAx9jj7BgKn5TYnMoBSSe0afjsV9oApVpN1Nacb1YDtCwy+scp3++s
 | 
			
		||||
nFxlv98wxIlSdpwMUn+AUWfjiWR7Tu/G/wJBAJ/KjwZIrFVxewP0x2ILYsTRYLzz
 | 
			
		||||
MS4PDsO7FB+I0i7DbBOifXS2oNSpd3I0CNMwrxFnUHzynpbOStVfN3ZL5w0CQQCa
 | 
			
		||||
pwFahxBRhkJKsxhjoFJBX9yl75JoY4Wvm5Tbo9ih6UJaRx3kqfkN14L2BKYcsZgb
 | 
			
		||||
KY9vmDOYy6iNfjDeWTfJAkBkfPUb8oTJ/nSP5zN6sqGxSY4krc4xLxpRmxoJ8HL2
 | 
			
		||||
XfhqXkTzbU13RX9JJ/NZ8vQN9Vm2NhxRGJocQkmcdVtJ
 | 
			
		||||
-----END RSA PRIVATE KEY-----
 | 
			
		||||
-----BEGIN X509 CERTIFICATE-----
 | 
			
		||||
MIICYDCCAiACAgEoMAkGBSsOAwINBQAwfDELMAkGA1UEBhMCVVMxNjA0BgNVBAoT
 | 
			
		||||
LU5hdGlvbmFsIEFlcm9uYXV0aWNzIGFuZCBTcGFjZSBBZG1pbmlzdHJhdGlvbjEZ
 | 
			
		||||
MBcGA1UECxMQVGVzdCBFbnZpcm9ubWVudDEaMBgGA1UECxMRRFNTLU5BU0EtUGls
 | 
			
		||||
b3QtQ0EwHhcNOTYwMjI2MTYzMjQ1WhcNOTcwMjI1MTYzMjQ1WjB8MQswCQYDVQQG
 | 
			
		||||
EwJVUzE2MDQGA1UEChMtTmF0aW9uYWwgQWVyb25hdXRpY3MgYW5kIFNwYWNlIEFk
 | 
			
		||||
bWluaXN0cmF0aW9uMRkwFwYDVQQLExBUZXN0IEVudmlyb25tZW50MRowGAYDVQQL
 | 
			
		||||
ExFEU1MtTkFTQS1QaWxvdC1DQTCB8jAJBgUrDgMCDAUAA4HkADCB4AJBAMA/ssKb
 | 
			
		||||
hPNUG7ZlASfVwEJU21O5OyF/iyBzgHI1O8eOhJGUYO8cc8wDMjR508Mr9cp6Uhl/
 | 
			
		||||
ZB7FV5GkLNEnRHYCQQDUEaSg45P2qrDwixTRhFhmWz5Nvc4lRFQ/42XPcchiJBLb
 | 
			
		||||
bn3QK74T2IxY1yY+kCNq8XrIqf5fJJzIH0J/xUP3AhUAsg2wsQHfDGYk/BOSulX3
 | 
			
		||||
fVd0geUCQQCzCFUQAh+ZkEmp5804cs6ZWBhrUAfnra8lJItYo9xPcXgdIfLfibcX
 | 
			
		||||
R71UsyO77MRD7B0+Ag2tq794IleCVcEEMAkGBSsOAwINBQADLwAwLAIUUayDfreR
 | 
			
		||||
Yh2WeU86/pHNdkUC1IgCFEfxe1f0oMpxJyrJ5XIxTi7vGdoK
 | 
			
		||||
-----END X509 CERTIFICATE-----
 | 
			
		||||
-----BEGIN X509 CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
MIICGTCCAdgCAwCqTDAJBgUrDgMCDQUAMHwxCzAJBgNVBAYTAlVTMTYwNAYDVQQK
 | 
			
		||||
Ey1OYXRpb25hbCBBZXJvbmF1dGljcyBhbmQgU3BhY2UgQWRtaW5pc3RyYXRpb24x
 | 
			
		||||
GTAXBgNVBAsTEFRlc3QgRW52aXJvbm1lbnQxGjAYBgNVBAsTEURTUy1OQVNBLVBp
 | 
			
		||||
bG90LUNBMB4XDTk2MDUxNDE3MDE0MVoXDTk3MDUxNDE3MDE0MVowMzELMAkGA1UE
 | 
			
		||||
BhMCQVUxDzANBgNVBAoTBk1pbmNvbTETMBEGA1UEAxMKRXJpYyBZb3VuZzCB8jAJ
 | 
			
		||||
BgUrDgMCDAUAA4HkADCB4AJBAKbfHz6vE6pXXMTpswtGUec2tvnfLJUsoxE9qs4+
 | 
			
		||||
ObZX7LmLvragNPUeiTJx7UOWZ5DfBj6bXLc8eYne0lP1g3ACQQDUEaSg45P2qrDw
 | 
			
		||||
ixTRhFhmWz5Nvc4lRFQ/42XPcchiJBLbbn3QK74T2IxY1yY+kCNq8XrIqf5fJJzI
 | 
			
		||||
H0J/xUP3AhUAsg2wsQHfDGYk/BOSulX3fVd0geUCQQCzCFUQAh+ZkEmp5804cs6Z
 | 
			
		||||
WBhrUAfnra8lJItYo9xPcXgdIfLfibcXR71UsyO77MRD7B0+Ag2tq794IleCVcEE
 | 
			
		||||
MAkGBSsOAwINBQADMAAwLQIUWsuuJRE3VT4ueWkWMAJMJaZjj1ECFQCYY0zX4bzM
 | 
			
		||||
LC7obsrHD8XAHG+ZRG==
 | 
			
		||||
-----END X509 CERTIFICATE-----
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICTTCCAbagAwIBAgIBADANBgkqhkiG9w0BAQQFADBMMQswCQYDVQQGEwJHQjEM
 | 
			
		||||
MAoGA1UEChMDVUNMMRgwFgYDVQQLEw9JQ0UtVEVMIFByb2plY3QxFTATBgNVBAMT
 | 
			
		||||
DFRydXN0RmFjdG9yeTAeFw05NzA0MjIxNDM5MTRaFw05ODA0MjIxNDM5MTRaMEwx
 | 
			
		||||
CzAJBgNVBAYTAkdCMQwwCgYDVQQKEwNVQ0wxGDAWBgNVBAsTD0lDRS1URUwgUHJv
 | 
			
		||||
amVjdDEVMBMGA1UEAxMMVHJ1c3RGYWN0b3J5MIGcMAoGBFUIAQECAgQAA4GNADCB
 | 
			
		||||
iQKBgQCEieR8NcXkUW1f0G6aC6u0i8q/98JqS6RxK5YmHIGKCkuTWAUjzLfUa4dt
 | 
			
		||||
U9igGCjTuxaDqlzEim+t/02pmiBZT9HaX++35MjQPUWmsChcYU5WyzGErXi+rQaw
 | 
			
		||||
zlwS73zM8qiPj/97lXYycWhgL0VaiDSPxRXEUdWoaGruom4mNQIDAQABo0IwQDAd
 | 
			
		||||
BgNVHQ4EFgQUHal1LZr7oVg5z6lYzrhTgZRCmcUwDgYDVR0PAQH/BAQDAgH2MA8G
 | 
			
		||||
A1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEEBQADgYEAfaggfl6FZoioecjv0dq8
 | 
			
		||||
/DXo/u11iMZvXn08gjX/zl2b4wtPbShOSY5FhkSm8GeySasz+/Nwb/uzfnIhokWi
 | 
			
		||||
lfPZHtlCWtXbIy/TN51eJyq04ceDCQDWvLC2enVg9KB+GJ34b5c5VaPRzq8MBxsA
 | 
			
		||||
S7ELuYGtmYgYm9NZOIr7yU0=
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIIB6jCCAZQCAgEtMA0GCSqGSIb3DQEBBAUAMIGAMQswCQYDVQQGEwJVUzE2MDQG
 | 
			
		||||
A1UEChMtTmF0aW9uYWwgQWVyb25hdXRpY3MgYW5kIFNwYWNlIEFkbWluaXN0cmF0
 | 
			
		||||
aW9uMRkwFwYDVQQLExBUZXN0IEVudmlyb25tZW50MR4wHAYDVQQLExVNRDUtUlNB
 | 
			
		||||
LU5BU0EtUGlsb3QtQ0EwHhcNOTYwNDMwMjIwNTAwWhcNOTcwNDMwMjIwNTAwWjCB
 | 
			
		||||
gDELMAkGA1UEBhMCVVMxNjA0BgNVBAoTLU5hdGlvbmFsIEFlcm9uYXV0aWNzIGFu
 | 
			
		||||
ZCBTcGFjZSBBZG1pbmlzdHJhdGlvbjEZMBcGA1UECxMQVGVzdCBFbnZpcm9ubWVu
 | 
			
		||||
dDEeMBwGA1UECxMVTUQ1LVJTQS1OQVNBLVBpbG90LUNBMFkwCgYEVQgBAQICAgAD
 | 
			
		||||
SwAwSAJBALmmX5+GqAvcrWK13rfDrNX9UfeA7f+ijyBgeFQjYUoDpFqapw4nzQBL
 | 
			
		||||
bAXug8pKkRwa2Zh8YODhXsRWu2F/UckCAwEAATANBgkqhkiG9w0BAQQFAANBAH9a
 | 
			
		||||
OBA+QCsjxXgnSqHx04gcU8S49DVUb1f2XVoLnHlIb8RnX0k5O6mpHT5eti9bLkiW
 | 
			
		||||
GJNMJ4L0AJ/ac+SmHZc=
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICajCCAdMCBDGA0QUwDQYJKoZIhvcNAQEEBQAwfTELMAkGA1UEBhMCQ2ExDzAN
 | 
			
		||||
BgNVBAcTBk5lcGVhbjEeMBwGA1UECxMVTm8gTGlhYmlsaXR5IEFjY2VwdGVkMR8w
 | 
			
		||||
HQYDVQQKExZGb3IgRGVtbyBQdXJwb3NlcyBPbmx5MRwwGgYDVQQDExNFbnRydXN0
 | 
			
		||||
IERlbW8gV2ViIENBMB4XDTk2MDQyNjEzMzUwMVoXDTA2MDQyNjEzMzUwMVowfTEL
 | 
			
		||||
MAkGA1UEBhMCQ2ExDzANBgNVBAcTBk5lcGVhbjEeMBwGA1UECxMVTm8gTGlhYmls
 | 
			
		||||
aXR5IEFjY2VwdGVkMR8wHQYDVQQKExZGb3IgRGVtbyBQdXJwb3NlcyBPbmx5MRww
 | 
			
		||||
GgYDVQQDExNFbnRydXN0IERlbW8gV2ViIENBMIGdMA0GCSqGSIb3DQEBAQUAA4GL
 | 
			
		||||
ADCBhwKBgQCaroS7O1DA0hm4IefNYU1cx/nqOmzEnk291d1XqznDeF4wEgakbkCc
 | 
			
		||||
zTKxK791yNpXG5RmngqH7cygDRTHZJ6mfCRn0wGC+AI00F2vYTGqPGRQL1N3lZT0
 | 
			
		||||
YDKFC0SQeMMjFIZ1aeQigroFQnHo0VB3zWIMpNkka8PY9lxHZAmWwQIBAzANBgkq
 | 
			
		||||
hkiG9w0BAQQFAAOBgQBAx0UMVA1s54lMQyXjMX5kj99FJN5itb8bK1Rk+cegPQPF
 | 
			
		||||
cWO9SEWyEjjBjIkjjzAwBkaEszFsNGxemxtXvwjIm1xEUMTVlPEWTs2qnDvAUA9W
 | 
			
		||||
YqhWbhH0toGT36236QAsqCZ76rbTRVSSX2BHyJwJMG2tCRv7kRJ//NIgxj3H4w==
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
issuer= /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test PCA (1024 bit)
 | 
			
		||||
subject=/C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test PCA (1024 bit)
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICJzCCAZACAQAwDQYJKoZIhvcNAQEEBQAwXDELMAkGA1UEBhMCQVUxEzARBgNV
 | 
			
		||||
BAgTClF1ZWVuc2xhbmQxGjAYBgNVBAoTEUNyeXB0U29mdCBQdHkgTHRkMRwwGgYD
 | 
			
		||||
VQQDExNUZXN0IFBDQSAoMTAyNCBiaXQpMB4XDTk3MDYwOTEzNTczN1oXDTAxMDYw
 | 
			
		||||
OTEzNTczN1owXDELMAkGA1UEBhMCQVUxEzARBgNVBAgTClF1ZWVuc2xhbmQxGjAY
 | 
			
		||||
BgNVBAoTEUNyeXB0U29mdCBQdHkgTHRkMRwwGgYDVQQDExNUZXN0IFBDQSAoMTAy
 | 
			
		||||
NCBiaXQpMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCdoWk/3+WcMlfjIrkg
 | 
			
		||||
40ketmnQaEogQe1LLcuOJV6rKfUSAsPgwgsabJ/wn8TxA1yy3eKJbFl3OiUXMRsp
 | 
			
		||||
22Jp85PmemiDzyUIStwk72qhp1imbANZvlmlCFKiQrjUyuDfu4TABmn+kkt3vR1Y
 | 
			
		||||
BEOGt+IFye1UBVSATVdRJ2UVhwIDAQABMA0GCSqGSIb3DQEBBAUAA4GBABNA1u/S
 | 
			
		||||
Cg/LJZWb7GliiKJsvuhxlE4E5JxQF2zMub/CSNbF97//tYSyj96sxeFQxZXbcjm9
 | 
			
		||||
xt6mr/xNLA4szNQMJ4P+L7b5e/jC5DSqlwS+CUYJgaFs/SP+qJoCSu1bR3IM9XWO
 | 
			
		||||
cRBpDmcBbYLkSyB92WURvsZ1LtjEcn+cdQVI
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
-----BEGIN RSA PRIVATE KEY-----
 | 
			
		||||
MIICXAIBAAKBgQCdoWk/3+WcMlfjIrkg40ketmnQaEogQe1LLcuOJV6rKfUSAsPg
 | 
			
		||||
wgsabJ/wn8TxA1yy3eKJbFl3OiUXMRsp22Jp85PmemiDzyUIStwk72qhp1imbANZ
 | 
			
		||||
vlmlCFKiQrjUyuDfu4TABmn+kkt3vR1YBEOGt+IFye1UBVSATVdRJ2UVhwIDAQAB
 | 
			
		||||
AoGAba4fTtuap5l7/8ZsbE7Z1O32KJY4ZcOZukLOLUUhXxXduT+FTgGWujc0/rgc
 | 
			
		||||
z9qYCLlNZHOouMYTgtSfYvuMuLZ11VIt0GYH+nRioLShE59Yy+zCRyC+gPigS1kz
 | 
			
		||||
xvo14AsOIPYV14Tk/SsHyq6E0eTk7VzaIE197giiINUERPECQQDSKmtPTh/lRKw7
 | 
			
		||||
HSZSM0I1mFWn/1zqrAbontRQY5w98QWIOe5qmzYyFbPXYT3d9BzlsMyhgiRNoBbD
 | 
			
		||||
yvohSHXJAkEAwAHx6ezAZeWWzD5yXD36nyjpkVCw7Tk7TSmOceLJMWt1QcrCfqlS
 | 
			
		||||
xA5jjpQ6Z8suU5DdtWAryM2sAir1WisYzwJAd6Zcx56jvAQ3xcPXsE6scBTVFzrj
 | 
			
		||||
7FqZ6E+cclPzfLQ+QQsyOBE7bpI6e/FJppY26XGZXo3YGzV8IGXrt40oOQJALETG
 | 
			
		||||
h86EFXo3qGOFbmsDy4pdP5nBERCu8X1xUCSfintiD4c2DInxgS5oGclnJeMcjTvL
 | 
			
		||||
QjQoJCX3UJCi/OUO1QJBAKgcDHWjMvt+l1pjJBsSEZ0HX9AAIIVx0RQmbFGS+F2Q
 | 
			
		||||
hhu5l77WnnZOQ9vvhV5u7NPCUF9nhU3jh60qWWO8mkc=
 | 
			
		||||
-----END RSA PRIVATE KEY-----
 | 
			
		||||
subject=/C=US/O=RSA Data Security, Inc./OU=Commercial Certification Authority
 | 
			
		||||
issuer= /C=US/O=RSA Data Security, Inc./OU=Commercial Certification Authority
 | 
			
		||||
notBefore=941104185834Z
 | 
			
		||||
notAfter =991103185834Z
 | 
			
		||||
-----BEGIN X509 CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
MIICIzCCAZACBQJBAAAWMA0GCSqGSIb3DQEBAgUAMFwxCzAJBgNVBAYTAlVTMSAw
 | 
			
		||||
HgYDVQQKExdSU0EgRGF0YSBTZWN1cml0eSwgSW5jLjErMCkGA1UECxMiQ29tbWVy
 | 
			
		||||
Y2lhbCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw05NDExMDQxODU4MzRaFw05
 | 
			
		||||
OTExMDMxODU4MzRaMFwxCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdSU0EgRGF0YSBT
 | 
			
		||||
ZWN1cml0eSwgSW5jLjErMCkGA1UECxMiQ29tbWVyY2lhbCBDZXJ0aWZpY2F0aW9u
 | 
			
		||||
IEF1dGhvcml0eTCBmzANBgkqhkiG9w0BAQEFAAOBiQAwgYUCfgCk+4Fie84QJ93o
 | 
			
		||||
975sbsZwmdu41QUDaSiCnHJ/lj+O7Kwpkj+KFPhCdr69XQO5kNTQvAayUTNfxMK/
 | 
			
		||||
touPmbZiImDd298ggrTKoi8tUO2UMt7gVY3UaOLgTNLNBRYulWZcYVI4HlGogqHE
 | 
			
		||||
7yXpCuaLK44xZtn42f29O2nZ6wIDAQABMA0GCSqGSIb3DQEBAgUAA34AdrW2EP4j
 | 
			
		||||
9/dZYkuwX5zBaLxJu7NJbyFHXSudVMQAKD+YufKKg5tgf+tQx6sFEC097TgCwaVI
 | 
			
		||||
0v5loMC86qYjFmZsGySp8+x5NRhPJsjjr1BKx6cxa9B8GJ1Qv6km+iYrRpwUqbtb
 | 
			
		||||
MJhCKLVLU7tDCZJAuqiqWqTGtotXTcU=
 | 
			
		||||
-----END X509 CERTIFICATE-----
 | 
			
		||||
subject=/C=US/O=RSA Data Security, Inc./OU=Secure Server Certification Authority
 | 
			
		||||
issuer= /C=US/O=RSA Data Security, Inc./OU=Secure Server Certification Authority
 | 
			
		||||
notBefore=941109235417Z
 | 
			
		||||
notAfter =991231235417Z
 | 
			
		||||
-----BEGIN X509 CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
MIICKTCCAZYCBQJBAAABMA0GCSqGSIb3DQEBAgUAMF8xCzAJBgNVBAYTAlVTMSAw
 | 
			
		||||
HgYDVQQKExdSU0EgRGF0YSBTZWN1cml0eSwgSW5jLjEuMCwGA1UECxMlU2VjdXJl
 | 
			
		||||
IFNlcnZlciBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw05NDExMDkyMzU0MTda
 | 
			
		||||
Fw05OTEyMzEyMzU0MTdaMF8xCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdSU0EgRGF0
 | 
			
		||||
YSBTZWN1cml0eSwgSW5jLjEuMCwGA1UECxMlU2VjdXJlIFNlcnZlciBDZXJ0aWZp
 | 
			
		||||
Y2F0aW9uIEF1dGhvcml0eTCBmzANBgkqhkiG9w0BAQEFAAOBiQAwgYUCfgCSznrB
 | 
			
		||||
roM+WqqJg1esJQF2DK2ujiw3zus1eGRUA+WEQFHJv48I4oqCCNIWhjdV6bEhAq12
 | 
			
		||||
aIGaBaJLyUslZiJWbIgHj/eBWW2EB2VwE3F2Ppt3TONQiVaYSLkdpykaEy5KEVmc
 | 
			
		||||
HhXVSVQsczppgrGXOZxtcGdI5d0t1sgeewIDAQABMA0GCSqGSIb3DQEBAgUAA34A
 | 
			
		||||
iNHReSHO4ovo+MF9NFM/YYPZtgs4F7boviGNjwC4i1N+RGceIr2XJ+CchcxK9oU7
 | 
			
		||||
suK+ktPlDemvXA4MRpX/oRxePug2WHpzpgr4IhFrwwk4fia7c+8AvQKk8xQNMD9h
 | 
			
		||||
cHsg/jKjn7P0Z1LctO6EjJY2IN6BCINxIYoPnqk=
 | 
			
		||||
-----END X509 CERTIFICATE-----
 | 
			
		||||
subject=/C=ZA/SP=Western Cape/L=Cape Town/O=Thawte Consulting cc
 | 
			
		||||
	/OU=Certification Services Division/CN=Thawte Server CA
 | 
			
		||||
	/Email=server-certs@thawte.com
 | 
			
		||||
issuer= /C=ZA/SP=Western Cape/L=Cape Town/O=Thawte Consulting cc
 | 
			
		||||
	/OU=Certification Services Division/CN=Thawte Server CA
 | 
			
		||||
	/Email=server-certs@thawte.com
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIIC+TCCAmICAQAwDQYJKoZIhvcNAQEEBQAwgcQxCzAJBgNVBAYTAlpBMRUwEwYD
 | 
			
		||||
VQQIEwxXZXN0ZXJuIENhcGUxEjAQBgNVBAcTCUNhcGUgVG93bjEdMBsGA1UEChMU
 | 
			
		||||
VGhhd3RlIENvbnN1bHRpbmcgY2MxKDAmBgNVBAsTH0NlcnRpZmljYXRpb24gU2Vy
 | 
			
		||||
dmljZXMgRGl2aXNpb24xGTAXBgNVBAMTEFRoYXd0ZSBTZXJ2ZXIgQ0ExJjAkBgkq
 | 
			
		||||
hkiG9w0BCQEWF3NlcnZlci1jZXJ0c0B0aGF3dGUuY29tMB4XDTk2MDcyNzE4MDc1
 | 
			
		||||
N1oXDTk4MDcyNzE4MDc1N1owgcQxCzAJBgNVBAYTAlpBMRUwEwYDVQQIEwxXZXN0
 | 
			
		||||
ZXJuIENhcGUxEjAQBgNVBAcTCUNhcGUgVG93bjEdMBsGA1UEChMUVGhhd3RlIENv
 | 
			
		||||
bnN1bHRpbmcgY2MxKDAmBgNVBAsTH0NlcnRpZmljYXRpb24gU2VydmljZXMgRGl2
 | 
			
		||||
aXNpb24xGTAXBgNVBAMTEFRoYXd0ZSBTZXJ2ZXIgQ0ExJjAkBgkqhkiG9w0BCQEW
 | 
			
		||||
F3NlcnZlci1jZXJ0c0B0aGF3dGUuY29tMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCB
 | 
			
		||||
iQKBgQDTpFBuyP9Wa+bPXbbqDGh1R6KqwtqEJfyo9EdR2oW1IHSUhh4PdcnpCGH1
 | 
			
		||||
Bm0wbhUZAulSwGLbTZme4moMRDjN/r7jZAlwxf6xaym2L0nIO9QnBCUQly/nkG3A
 | 
			
		||||
KEKZ10xD3sP1IW1Un13DWOHA5NlbsLjctHvfNjrCtWYiEtaHDQIDAQABMA0GCSqG
 | 
			
		||||
SIb3DQEBBAUAA4GBAIsvn7ifX3RUIrvYXtpI4DOfARkTogwm6o7OwVdl93yFhDcX
 | 
			
		||||
7h5t0XZ11MUAMziKdde3rmTvzUYIUCYoY5b032IwGMTvdiclK+STN6NP2m5nvFAM
 | 
			
		||||
qJT5gC5O+j/jBuZRQ4i0AMYQr5F4lT8oBJnhgafw6PL8aDY2vMHGSPl9+7uf
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIIDDTCCAnYCAQAwDQYJKoZIhvcNAQEEBQAwgc4xCzAJBgNVBAYTAlpBMRUwEwYD
 | 
			
		||||
VQQIEwxXZXN0ZXJuIENhcGUxEjAQBgNVBAcTCUNhcGUgVG93bjEdMBsGA1UEChMU
 | 
			
		||||
VGhhd3RlIENvbnN1bHRpbmcgY2MxKDAmBgNVBAsTH0NlcnRpZmljYXRpb24gU2Vy
 | 
			
		||||
dmljZXMgRGl2aXNpb24xITAfBgNVBAMTGFRoYXd0ZSBQcmVtaXVtIFNlcnZlciBD
 | 
			
		||||
QTEoMCYGCSqGSIb3DQEJARYZcHJlbWl1bS1zZXJ2ZXJAdGhhd3RlLmNvbTAeFw05
 | 
			
		||||
NjA3MjcxODA3MTRaFw05ODA3MjcxODA3MTRaMIHOMQswCQYDVQQGEwJaQTEVMBMG
 | 
			
		||||
A1UECBMMV2VzdGVybiBDYXBlMRIwEAYDVQQHEwlDYXBlIFRvd24xHTAbBgNVBAoT
 | 
			
		||||
FFRoYXd0ZSBDb25zdWx0aW5nIGNjMSgwJgYDVQQLEx9DZXJ0aWZpY2F0aW9uIFNl
 | 
			
		||||
cnZpY2VzIERpdmlzaW9uMSEwHwYDVQQDExhUaGF3dGUgUHJlbWl1bSBTZXJ2ZXIg
 | 
			
		||||
Q0ExKDAmBgkqhkiG9w0BCQEWGXByZW1pdW0tc2VydmVyQHRoYXd0ZS5jb20wgZ8w
 | 
			
		||||
DQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBANI2NmqL18JbntqBQWKPOO5JBFXW0O8c
 | 
			
		||||
G5UWR+8YSDU6UvQragaPOy/qVuOvho2eF/eetGV1Ak3vywmiIVHYm9Bn0LoNkgYU
 | 
			
		||||
c9STy5cqAJxcTgy8+hVS/PJEbtoRSm4Iny8t4/mqOoZztkZTWMiJBb2DEbhzP6oH
 | 
			
		||||
jfRCTedAnRw3AgMBAAEwDQYJKoZIhvcNAQEEBQADgYEAutFIgTRZVYerIZfL9lvR
 | 
			
		||||
w9Eifvvo5KTZ3h+Bj+VzNnyw4Qc/IyXkPOu6SIiH9LQ3sCmWBdxpe+qr4l77rLj2
 | 
			
		||||
GYuMtESFfn1XVALzkYgC7JcPuTOjMfIiMByt+uFf8AV8x0IW/Qkuv+hEQcyM9vxK
 | 
			
		||||
3VZdLbCVIhNoEsysrxCpxcI=
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
Tims test GCI CA
 | 
			
		||||
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIIB8DCCAZoCAQAwDQYJKoZIhvcNAQEEBQAwgYIxCzAJBgNVBAYTAkFVMRMwEQYD
 | 
			
		||||
VQQIEwpRdWVlbnNsYW5kMREwDwYDVQQHEwhCcmlzYmFuZTEaMBgGA1UEChMRQ3J5
 | 
			
		||||
cHRTb2Z0IFB0eSBMdGQxFDASBgNVBAsTC2RldmVsb3BtZW50MRkwFwYDVQQDExBD
 | 
			
		||||
cnlwdFNvZnQgRGV2IENBMB4XDTk3MDMyMjEzMzQwNFoXDTk4MDMyMjEzMzQwNFow
 | 
			
		||||
gYIxCzAJBgNVBAYTAkFVMRMwEQYDVQQIEwpRdWVlbnNsYW5kMREwDwYDVQQHEwhC
 | 
			
		||||
cmlzYmFuZTEaMBgGA1UEChMRQ3J5cHRTb2Z0IFB0eSBMdGQxFDASBgNVBAsTC2Rl
 | 
			
		||||
dmVsb3BtZW50MRkwFwYDVQQDExBDcnlwdFNvZnQgRGV2IENBMFwwDQYJKoZIhvcN
 | 
			
		||||
AQEBBQADSwAwSAJBAOAOAqogG5QwAmLhzyO4CoRnx/wVy4NZP4dxJy83O1EnL0rw
 | 
			
		||||
OdsamJKvPOLHgSXo3gDu9uVyvCf/QJmZAmC5ml8CAwEAATANBgkqhkiG9w0BAQQF
 | 
			
		||||
AANBADRRS/GVdd7rAqRW6SdmgLJduOU2yq3avBu99kRqbp9A/dLu6r6jU+eP4oOA
 | 
			
		||||
TfdbFZtAAD2Hx9jUtY3tfdrJOb8= 
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICVjCCAgACAQAwDQYJKoZIhvcNAQEEBQAwgbUxCzAJBgNVBAYTAkFVMRMwEQYD
 | 
			
		||||
VQQIEwpRdWVlbnNsYW5kMREwDwYDVQQHEwhCcmlzYmFuZTEaMBgGA1UEChMRQ3J5
 | 
			
		||||
cHRTb2Z0IFB0eSBMdGQxLDAqBgNVBAsTI1dPUlRITEVTUyBDRVJUSUZJQ0FUSU9O
 | 
			
		||||
IEFVVEhPUklUSUVTMTQwMgYDVQQDEytaRVJPIFZBTFVFIENBIC0gREVNT05TVFJB
 | 
			
		||||
VElPTiBQVVJQT1NFUyBPTkxZMB4XDTk3MDQwMzEzMjI1NFoXDTk4MDQwMzEzMjI1
 | 
			
		||||
NFowgbUxCzAJBgNVBAYTAkFVMRMwEQYDVQQIEwpRdWVlbnNsYW5kMREwDwYDVQQH
 | 
			
		||||
EwhCcmlzYmFuZTEaMBgGA1UEChMRQ3J5cHRTb2Z0IFB0eSBMdGQxLDAqBgNVBAsT
 | 
			
		||||
I1dPUlRITEVTUyBDRVJUSUZJQ0FUSU9OIEFVVEhPUklUSUVTMTQwMgYDVQQDEyta
 | 
			
		||||
RVJPIFZBTFVFIENBIC0gREVNT05TVFJBVElPTiBQVVJQT1NFUyBPTkxZMFwwDQYJ
 | 
			
		||||
KoZIhvcNAQEBBQADSwAwSAJBAOZ7T7yqP/tyspcko3yPY1y0Cm2EmwNvzW4QgVXR
 | 
			
		||||
Fjs3HmJ4xtSpXdo6mwcGezL3Abt/aQXaxv9PU8xt+Jr0OFUCAwEAATANBgkqhkiG
 | 
			
		||||
9w0BAQQFAANBAOQpYmGgyCqCy1OljgJhCqQOu627oVlHzK1L+t9vBaMfn40AVUR4
 | 
			
		||||
WzQVWO31KTgi5vTK1U+3h46fgUWqQ0h+6rU=
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIAwgKADAgECAgEAMA0GCSqGSIb3DQEBBAUAMGIxETAPBgNVBAcTCEludGVybmV0
 | 
			
		||||
MRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjE0MDIGA1UECxMrVmVyaVNpZ24gQ2xh
 | 
			
		||||
c3MgMSBDQSAtIEluZGl2aWR1YWwgU3Vic2NyaWJlcjAeFw05NjA0MDgxMDIwMjda
 | 
			
		||||
Fw05NzA0MDgxMDIwMjdaMGIxETAPBgNVBAcTCEludGVybmV0MRcwFQYDVQQKEw5W
 | 
			
		||||
ZXJpU2lnbiwgSW5jLjE0MDIGA1UECxMrVmVyaVNpZ24gQ2xhc3MgMSBDQSAtIElu
 | 
			
		||||
ZGl2aWR1YWwgU3Vic2NyaWJlcjCAMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC2
 | 
			
		||||
FKbPTdAFDdjKI9BvqrQpkmOOLPhvltcunXZLEbE2jVfJw/0cxrr+Hgi6M8qV6r7j
 | 
			
		||||
W80GqLd5HUQq7XPysVKDaBBwZJHXPmv5912dFEObbpdFmIFH0S3L3bty10w/cari
 | 
			
		||||
QPJUObwW7s987LrbP2wqsxaxhhKdrpM01bjV0Pc+qQIDAQABAAAAADANBgkqhkiG
 | 
			
		||||
9w0BAQQFAAOBgQA+1nJryNt8VBRjRr07ArDAV/3jAH7GjDc9jsrxZS68ost9v06C
 | 
			
		||||
TvTNKGL+LISNmFLXl+JXhgGB0JZ9fvyYzNgHQ46HBUng1H6voalfJgS2KdEo50wW
 | 
			
		||||
8EFZYMDkT1k4uynwJqkVN2QJK/2q4/A/VCov5h6SlM8Affg2W+1TLqvqkwAA
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
 subject=/L=Internet/O=VeriSign, Inc./OU=VeriSign Class 2 CA - Individual Subscriber
 | 
			
		||||
 issuer= /L=Internet/O=VeriSign, Inc./OU=VeriSign Class 2 CA - Individual Subscriber
 | 
			
		||||
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIIEkzCCA/ygAwIBAgIRANDTUpSRL3nTFeMrMayFSPAwDQYJKoZIhvcNAQECBQAw
 | 
			
		||||
YjERMA8GA1UEBxMISW50ZXJuZXQxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMTQw
 | 
			
		||||
MgYDVQQLEytWZXJpU2lnbiBDbGFzcyAyIENBIC0gSW5kaXZpZHVhbCBTdWJzY3Jp
 | 
			
		||||
YmVyMB4XDTk2MDYwNDAwMDAwMFoXDTk4MDYwNDIzNTk1OVowYjERMA8GA1UEBxMI
 | 
			
		||||
SW50ZXJuZXQxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMTQwMgYDVQQLEytWZXJp
 | 
			
		||||
U2lnbiBDbGFzcyAyIENBIC0gSW5kaXZpZHVhbCBTdWJzY3JpYmVyMIGfMA0GCSqG
 | 
			
		||||
SIb3DQEBAQUAA4GNADCBiQKBgQC6A+2czKGRcYMfm8gdnk+0de99TDDzsqo0v5nb
 | 
			
		||||
RsbUmMcdRQ7nsMbRWe0SAb/9QoLTZ/cJ0iOBqdrkz7UpqqKarVoTSdlSMVM92tWp
 | 
			
		||||
3bJncZHQD1t4xd6lQVdI1/T6R+5J0T1ukOdsI9Jmf+F28S6g3R3L1SFwiHKeZKZv
 | 
			
		||||
z+793wIDAQABo4ICRzCCAkMwggIpBgNVHQMBAf8EggIdMIICGTCCAhUwggIRBgtg
 | 
			
		||||
hkgBhvhFAQcBATCCAgAWggGrVGhpcyBjZXJ0aWZpY2F0ZSBpbmNvcnBvcmF0ZXMg
 | 
			
		||||
YnkgcmVmZXJlbmNlLCBhbmQgaXRzIHVzZSBpcyBzdHJpY3RseSBzdWJqZWN0IHRv
 | 
			
		||||
LCB0aGUgVmVyaVNpZ24gQ2VydGlmaWNhdGlvbiBQcmFjdGljZSBTdGF0ZW1lbnQg
 | 
			
		||||
KENQUyksIGF2YWlsYWJsZSBhdDogaHR0cHM6Ly93d3cudmVyaXNpZ24uY29tL0NQ
 | 
			
		||||
Uy0xLjA7IGJ5IEUtbWFpbCBhdCBDUFMtcmVxdWVzdHNAdmVyaXNpZ24uY29tOyBv
 | 
			
		||||
ciBieSBtYWlsIGF0IFZlcmlTaWduLCBJbmMuLCAyNTkzIENvYXN0IEF2ZS4sIE1v
 | 
			
		||||
dW50YWluIFZpZXcsIENBIDk0MDQzIFVTQSBUZWwuICsxICg0MTUpIDk2MS04ODMw
 | 
			
		||||
IENvcHlyaWdodCAoYykgMTk5NiBWZXJpU2lnbiwgSW5jLiAgQWxsIFJpZ2h0cyBS
 | 
			
		||||
ZXNlcnZlZC4gQ0VSVEFJTiBXQVJSQU5USUVTIERJU0NMQUlNRUQgYW5kIExJQUJJ
 | 
			
		||||
TElUWSBMSU1JVEVELqAOBgxghkgBhvhFAQcBAQGhDgYMYIZIAYb4RQEHAQECMC8w
 | 
			
		||||
LRYraHR0cHM6Ly93d3cudmVyaXNpZ24uY29tL3JlcG9zaXRvcnkvQ1BTLTEuMDAU
 | 
			
		||||
BglghkgBhvhCAQEBAf8EBAMCAgQwDQYJKoZIhvcNAQECBQADgYEApRJRkNBqLLgs
 | 
			
		||||
53IR/d18ODdLOWMTZ+QOOxBrq460iBEdUwgF8vmPRX1ku7UiDeNzaLlurE6eFqHq
 | 
			
		||||
2zPyK5j60zfTLVJMWKcQWwTJLjHtXrW8pxhNtFc6Fdvy5ZkHnC/9NIl7/t4U6WqB
 | 
			
		||||
p4y+p7SdMIkEwIZfds0VbnQyX5MRUJY=
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
 subject=/C=US/O=VeriSign, Inc./OU=Class 3 Public Primary Certification Authority
 | 
			
		||||
 issuer= /C=US/O=VeriSign, Inc./OU=Class 3 Public Primary Certification Authority
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICMTCCAZoCBQKhAAABMA0GCSqGSIb3DQEBAgUAMF8xCzAJBgNVBAYTAlVTMRcw
 | 
			
		||||
FQYDVQQKEw5WZXJpU2lnbiwgSW5jLjE3MDUGA1UECxMuQ2xhc3MgMyBQdWJsaWMg
 | 
			
		||||
UHJpbWFyeSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw05NjAxMjkwMDAwMDBa
 | 
			
		||||
Fw05OTEyMzEyMzU5NTlaMF8xCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2ln
 | 
			
		||||
biwgSW5jLjE3MDUGA1UECxMuQ2xhc3MgMyBQdWJsaWMgUHJpbWFyeSBDZXJ0aWZp
 | 
			
		||||
Y2F0aW9uIEF1dGhvcml0eTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAyVxZ
 | 
			
		||||
nvIbigEUtBDfBEDb41evakVAj4QMC9Ez2dkRz+4CWB8l9yqoRAWq7AMfeH+ek7ma
 | 
			
		||||
AKojfdashaJjRcdyJ8z0TMZ1cdI5709C8HXfCpDGjiBvmA/4rCNfcCk2pMmG57Ga
 | 
			
		||||
IMtTpYXnPb59mv4kRTPcdhXtD6JxZExlLoFoRacCAwEAATANBgkqhkiG9w0BAQIF
 | 
			
		||||
AAOBgQB1Zmw+0c2B27X4LzZRtvdCvM1Cr9wO+hVs+GeTVzrrtpLotgHKjLeOQ7RJ
 | 
			
		||||
Zfk+7r11Ri7J/CVdqMcvi5uPaM+0nJcYwE3vH9mvgrPmZLiEXIqaB1JDYft0nls6
 | 
			
		||||
NvxMsvwaPxUupVs8G5DsiCnkWRb5zget7Ond2tIxik/W2O8XjQ==
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
 subject=/C=US/O=VeriSign, Inc./OU=Class 4 Public Primary Certification Authority
 | 
			
		||||
 issuer= /C=US/O=VeriSign, Inc./OU=Class 4 Public Primary Certification Authority
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICMTCCAZoCBQKmAAABMA0GCSqGSIb3DQEBAgUAMF8xCzAJBgNVBAYTAlVTMRcw
 | 
			
		||||
FQYDVQQKEw5WZXJpU2lnbiwgSW5jLjE3MDUGA1UECxMuQ2xhc3MgNCBQdWJsaWMg
 | 
			
		||||
UHJpbWFyeSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw05NjAxMjkwMDAwMDBa
 | 
			
		||||
Fw05OTEyMzEyMzU5NTlaMF8xCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2ln
 | 
			
		||||
biwgSW5jLjE3MDUGA1UECxMuQ2xhc3MgNCBQdWJsaWMgUHJpbWFyeSBDZXJ0aWZp
 | 
			
		||||
Y2F0aW9uIEF1dGhvcml0eTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA0LJ1
 | 
			
		||||
9njQrlpQ9OlQqZ+M1++RlHDo0iSQdomF1t+s5gEXMoDwnZNHvJplnR+Xrr/phnVj
 | 
			
		||||
IIm9gFidBAydqMEk6QvlMXi9/C0MN2qeeIDpRnX57aP7E3vIwUzSo+/1PLBij0pd
 | 
			
		||||
O92VZ48TucE81qcmm+zDO3rZTbxtm+gVAePwR6kCAwEAATANBgkqhkiG9w0BAQIF
 | 
			
		||||
AAOBgQBT3dPwnCR+QKri/AAa19oM/DJhuBUNlvP6Vxt/M3yv6ZiaYch6s7f/sdyZ
 | 
			
		||||
g9ysEvxwyR84Qu1E9oAuW2szaayc01znX1oYx7EteQSWQZGZQbE8DbqEOcY7l/Am
 | 
			
		||||
yY7uvcxClf8exwI/VAx49byqYHwCaejcrOICdmHEPgPq0ook0Q==
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										420
									
								
								apps/server2.pem
									
									
									
									
									
								
							
							
						
						
									
										420
									
								
								apps/server2.pem
									
									
									
									
									
								
							@@ -1,376 +1,52 @@
 | 
			
		||||
issuer= /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test CA (1024 bit)
 | 
			
		||||
subject=/C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Server test cert (1024 bit)
 | 
			
		||||
subject= C = UK, O = OpenSSL Group, OU = FOR TESTING PURPOSES ONLY, CN = Test Server Cert #2
 | 
			
		||||
issuer= C = UK, O = OpenSSL Group, OU = FOR TESTING PURPOSES ONLY, CN = OpenSSL Test Intermediate CA
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICLjCCAZcCAQEwDQYJKoZIhvcNAQEEBQAwWzELMAkGA1UEBhMCQVUxEzARBgNV
 | 
			
		||||
BAgTClF1ZWVuc2xhbmQxGjAYBgNVBAoTEUNyeXB0U29mdCBQdHkgTHRkMRswGQYD
 | 
			
		||||
VQQDExJUZXN0IENBICgxMDI0IGJpdCkwHhcNOTcwNjA5MTM1NzU0WhcNOTgwNjA5
 | 
			
		||||
MTM1NzU0WjBkMQswCQYDVQQGEwJBVTETMBEGA1UECBMKUXVlZW5zbGFuZDEaMBgG
 | 
			
		||||
A1UEChMRQ3J5cHRTb2Z0IFB0eSBMdGQxJDAiBgNVBAMTG1NlcnZlciB0ZXN0IGNl
 | 
			
		||||
cnQgKDEwMjQgYml0KTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAsxH1PBPm
 | 
			
		||||
RkxrR11eV4bzNi4N9n11CI8nV29+ARlT1+qDe/mjVUvXlmsr1v/vf71G9GgqopSa
 | 
			
		||||
6RXrICLVdk/FYYYzhPvl1M+OrjaXDFO8BzBAF1Lnz6c7aRZvGRJNrRSr2nZEkqDf
 | 
			
		||||
JW9dY7r2VZEpD5QeuaRYUnuECkqeieB65GMCAwEAATANBgkqhkiG9w0BAQQFAAOB
 | 
			
		||||
gQCWsOta6C0wiVzXz8wPmJKyTrurMlgUss2iSuW9366iwofZddsNg7FXniMzkIf6
 | 
			
		||||
dp7jnmWZwKZ9cXsNUS2o4OL07qOk2HOywC0YsNZQsOBu1CBTYYkIefDiKFL1zQHh
 | 
			
		||||
8lwwNd4NP+OE3NzUNkCfh4DnFfg9WHkXUlD5UpxNRJ4gJA==
 | 
			
		||||
MIID6jCCAtKgAwIBAgIJALnu1NlVpZ60MA0GCSqGSIb3DQEBBQUAMHAxCzAJBgNV
 | 
			
		||||
BAYTAlVLMRYwFAYDVQQKDA1PcGVuU1NMIEdyb3VwMSIwIAYDVQQLDBlGT1IgVEVT
 | 
			
		||||
VElORyBQVVJQT1NFUyBPTkxZMSUwIwYDVQQDDBxPcGVuU1NMIFRlc3QgSW50ZXJt
 | 
			
		||||
ZWRpYXRlIENBMB4XDTExMTIwODE0MDE0OFoXDTIxMTAxNjE0MDE0OFowZzELMAkG
 | 
			
		||||
A1UEBhMCVUsxFjAUBgNVBAoMDU9wZW5TU0wgR3JvdXAxIjAgBgNVBAsMGUZPUiBU
 | 
			
		||||
RVNUSU5HIFBVUlBPU0VTIE9OTFkxHDAaBgNVBAMME1Rlc3QgU2VydmVyIENlcnQg
 | 
			
		||||
IzIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDrdi7j9yctG+L4EjBy
 | 
			
		||||
gjPmEqZzOJEQba26MoQGzglU7e5Xf59Rb/hgVQuKAoiZe7/R8rK4zJ4W7iXdXw0L
 | 
			
		||||
qBpyG8B5aGKeI32w+A9TcBApoXXL2CrYQEQjZwUIpLlYBIi2NkJj3nVkq5dgl1gO
 | 
			
		||||
ALiQ+W8jg3kzg5Ec9rimp9r93N8wsSL3awsafurmYCvOf7leHaMP1WJ/zDRGUNHG
 | 
			
		||||
/WtDjXc8ZUG1+6EXU9Jc2Fs+2Omf7fcN0l00AK/wPg8OaNS0rKyGq9JdIT9FRGV1
 | 
			
		||||
bXe/rx58FaE5CItdwCSYhJvF/O95LWQoxJXye5bCFLmvDTEyVq9FMSCptfsmbXjE
 | 
			
		||||
ZGsXAgMBAAGjgY8wgYwwDAYDVR0TAQH/BAIwADAOBgNVHQ8BAf8EBAMCBeAwLAYJ
 | 
			
		||||
YIZIAYb4QgENBB8WHU9wZW5TU0wgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1Ud
 | 
			
		||||
DgQWBBR52UaWWTKzZGDH/X4mWNcuqeQVazAfBgNVHSMEGDAWgBQ2w2yI55X+sL3s
 | 
			
		||||
zj49hqshgYfa2jANBgkqhkiG9w0BAQUFAAOCAQEANBW+XYLlHBqVY/31ie+3gRlS
 | 
			
		||||
LPfy4SIqn0t3RJjagT29MXprblBO2cbMO8VGjkQdKGpmMXjxbht2arOOUXRHX4n/
 | 
			
		||||
XTyn/QHEf0bcwIITMReO3DZUPAEw8hSjn9xEOM0IRVOCP+mH5fi74QzzQaZVCyYg
 | 
			
		||||
5VtLKdww/+sc0nCbKl2KWgDluriH0nfVx95qgW3mg9dhXRr0zmf1w2zkBHYpARYL
 | 
			
		||||
Dew6Z8EE4tS3HJu8/qM6meWzNtrfonQ3eiiMxjZBxzV46jchBwa2z9XYhP6AmpPb
 | 
			
		||||
oeTSzcQNbWsxaGYzWo46oLDUZmJOwSBawbS31bZNMCoPIY6ukoesCzFSsUKZww==
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
-----BEGIN RSA PRIVATE KEY-----
 | 
			
		||||
MIICXgIBAAKBgQCzEfU8E+ZGTGtHXV5XhvM2Lg32fXUIjydXb34BGVPX6oN7+aNV
 | 
			
		||||
S9eWayvW/+9/vUb0aCqilJrpFesgItV2T8VhhjOE++XUz46uNpcMU7wHMEAXUufP
 | 
			
		||||
pztpFm8ZEk2tFKvadkSSoN8lb11juvZVkSkPlB65pFhSe4QKSp6J4HrkYwIDAQAB
 | 
			
		||||
AoGBAKy8jvb0Lzby8q11yNLf7+78wCVdYi7ugMHcYA1JVFK8+zb1WfSm44FLQo/0
 | 
			
		||||
dSChAjgz36TTexeLODPYxleJndjVcOMVzsLJjSM8dLpXsTS4FCeMbhw2s2u+xqKY
 | 
			
		||||
bbPWfk+HOTyJjfnkcC5Nbg44eOmruq0gSmBeUXVM5UntlTnxAkEA7TGCA3h7kx5E
 | 
			
		||||
Bl4zl2pc3gPAGt+dyfk5Po9mGJUUXhF5p2zueGmYWW74TmOWB1kzt4QRdYMzFePq
 | 
			
		||||
zfDNXEa1CwJBAMFErdY0xp0UJ13WwBbUTk8rujqQdHtjw0klhpbuKkjxu2hN0wwM
 | 
			
		||||
6p0D9qxF7JHaghqVRI0fAW/EE0OzdHMR9QkCQQDNR26dMFXKsoPu+vItljj/UEGf
 | 
			
		||||
QG7gERiQ4yxaFBPHgdpGo0kT31eh9x9hQGDkxTe0GNG/YSgCRvm8+C3TMcKXAkBD
 | 
			
		||||
dhGn36wkUFCddMSAM4NSJ1VN8/Z0y5HzCmI8dM3VwGtGMUQlxKxwOl30LEQzdS5M
 | 
			
		||||
0SWojNYXiT2gOBfBwtbhAkEAhafl5QEOIgUz+XazS/IlZ8goNKdDVfYgK3mHHjvv
 | 
			
		||||
nY5G+AuGebdNkXJr4KSWxDcN+C2i47zuj4QXA16MAOandA==
 | 
			
		||||
MIIEowIBAAKCAQEA63Yu4/cnLRvi+BIwcoIz5hKmcziREG2tujKEBs4JVO3uV3+f
 | 
			
		||||
UW/4YFULigKImXu/0fKyuMyeFu4l3V8NC6gachvAeWhiniN9sPgPU3AQKaF1y9gq
 | 
			
		||||
2EBEI2cFCKS5WASItjZCY951ZKuXYJdYDgC4kPlvI4N5M4ORHPa4pqfa/dzfMLEi
 | 
			
		||||
92sLGn7q5mArzn+5Xh2jD9Vif8w0RlDRxv1rQ413PGVBtfuhF1PSXNhbPtjpn+33
 | 
			
		||||
DdJdNACv8D4PDmjUtKyshqvSXSE/RURldW13v68efBWhOQiLXcAkmISbxfzveS1k
 | 
			
		||||
KMSV8nuWwhS5rw0xMlavRTEgqbX7Jm14xGRrFwIDAQABAoIBAHLsTPihIfLnYIE5
 | 
			
		||||
x4GsQQ5zXeBw5ITDM37ktwHnQDC+rIzyUl1aLD1AZRBoKinXd4lOTqLZ4/NHKx4A
 | 
			
		||||
DYr58mZtWyUmqLOMmQVuHXTZBlp7XtYuXMMNovQwjQlp9LicBeoBU6gQ5PVMtubD
 | 
			
		||||
F4xGF89Sn0cTHW3iMkqTtQ5KcR1j57OcJO0FEb1vPvk2MXI5ZyAatUYE7YacbEzd
 | 
			
		||||
rg02uIwx3FqNSkuSI79uz4hMdV5TPtuhxx9nTwj9aLUhXFeZ0mn2PVgVzEnnMoJb
 | 
			
		||||
+znlsZDgzDlJqdaD744YGWh8Z3OEssB35KfzFcdOeO6yH8lmv2Zfznk7pNPT7LTb
 | 
			
		||||
Lae9VgkCgYEA92p1qnAB3NtJtNcaW53i0S5WJgS1hxWKvUDx3lTB9s8X9fHpqL1a
 | 
			
		||||
E94fDfWzp/hax6FefUKIvBOukPLQ6bYjTMiFoOHzVirghAIuIUoMI5VtLhwD1hKs
 | 
			
		||||
Lr7l/dptMgKb1nZHyXoKHRBthsy3K4+udsPi8TzMvYElgEqyQIe/Rk0CgYEA86GL
 | 
			
		||||
8HC6zLszzKERDPBxrboRmoFvVUCTQDhsfj1M8aR3nQ8V5LkdIJc7Wqm/Ggfk9QRf
 | 
			
		||||
rJ8M2WUMlU5CNnCn/KCrKzCNZIReze3fV+HnKdbcXGLvgbHPrhnz8yYehUFG+RGq
 | 
			
		||||
bVyDWRU94T38izy2s5qMYrMJWZEYyXncSPbfcPMCgYAtaXfxcZ+V5xYPQFARMtiX
 | 
			
		||||
5nZfggvDoJuXgx0h3tK/N2HBfcaSdzbaYLG4gTmZggc/jwnl2dl5E++9oSPhUdIG
 | 
			
		||||
3ONSFUbxsOsGr9PBvnKd8WZZyUCXAVRjPBzAzF+whzQNWCZy/5htnz9LN7YDI9s0
 | 
			
		||||
5113Q96cheDZPFydZY0hHQKBgQDVbEhNukM5xCiNcu+f2SaMnLp9EjQ4h5g3IvaP
 | 
			
		||||
5B16daw/Dw8LzcohWboqIxeAsze0GD/D1ZUJAEd0qBjC3g+a9BjefervCjKOzXng
 | 
			
		||||
38mEUm+6EwVjJSQcjSmycEs+Sr/kwr/8i5WYvU32+jk4tFgMoC+o6tQe/Uesf68k
 | 
			
		||||
z/dPVwKBgGbF7Vv1/3SmhlOy+zYyvJ0CrWtKxH9QP6tLIEgEpd8x7YTSuCH94yok
 | 
			
		||||
kToMXYA3sWNPt22GbRDZ+rcp4c7HkDx6I6vpdP9aQEwJTp0EPy0sgWr2XwYmreIQ
 | 
			
		||||
NFmkk8Itn9EY2R9VBaP7GLv5kvwxDdLAnmwGmzVtbmaVdxCaBwUk
 | 
			
		||||
-----END RSA PRIVATE KEY-----
 | 
			
		||||
subject=/C=US/O=AT&T Bell Laboratories/OU=Prototype Research CA
 | 
			
		||||
issuer= /C=US/O=AT&T Bell Laboratories/OU=Prototype Research CA
 | 
			
		||||
notBefore=950413210656Z
 | 
			
		||||
notAfter =970412210656Z
 | 
			
		||||
-----BEGIN X509 CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
MIICCDCCAXECAQAwDQYJKoZIhvcNAQEEBQAwTjELMAkGA1UEBhMCVVMxHzAdBgNV
 | 
			
		||||
BAoUFkFUJlQgQmVsbCBMYWJvcmF0b3JpZXMxHjAcBgNVBAsUFVByb3RvdHlwZSBS
 | 
			
		||||
ZXNlYXJjaCBDQTAeFw05NTA0MTMyMTA2NTZaFw05NzA0MTIyMTA2NTZaME4xCzAJ
 | 
			
		||||
BgNVBAYTAlVTMR8wHQYDVQQKFBZBVCZUIEJlbGwgTGFib3JhdG9yaWVzMR4wHAYD
 | 
			
		||||
VQQLFBVQcm90b3R5cGUgUmVzZWFyY2ggQ0EwgZwwDQYJKoZIhvcNAQEBBQADgYoA
 | 
			
		||||
MIGGAoGAebOmgtSCl+wCYZc86UGYeTLY8cjmW2P0FN8ToT/u2pECCoFdrlycX0OR
 | 
			
		||||
3wt0ZhpFXLVNeDnHwEE9veNUih7pCL2ZBFqoIoQkB1lZmXRiVtjGonz8BLm/qrFM
 | 
			
		||||
YHb0lme/Ol+s118mwKVxnn6bSAeI/OXKhLaVdYZWk+aEaxEDkVkCAQ8wDQYJKoZI
 | 
			
		||||
hvcNAQEEBQADgYEAAZMG14lZmZ8bahkaHaTV9dQf4p2FZiQTFwHP9ZyGsXPC+LT5
 | 
			
		||||
dG5iTaRmyjNIJdPWohZDl97kAci79aBndvuEvRKOjLHs3WRGBIwERnAcnY9Mz8u/
 | 
			
		||||
zIHK23PjYVxGGaZd669OJwD0CYyqH22HH9nFUGaoJdsv39ChW0NRdLE9+y8=
 | 
			
		||||
-----END X509 CERTIFICATE-----
 | 
			
		||||
issuer= /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test PCA (1024 bit)
 | 
			
		||||
subject=/C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test CA (1024 bit)
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICJjCCAY8CAQAwDQYJKoZIhvcNAQEEBQAwXDELMAkGA1UEBhMCQVUxEzARBgNV
 | 
			
		||||
BAgTClF1ZWVuc2xhbmQxGjAYBgNVBAoTEUNyeXB0U29mdCBQdHkgTHRkMRwwGgYD
 | 
			
		||||
VQQDExNUZXN0IFBDQSAoMTAyNCBiaXQpMB4XDTk3MDYwOTEzNTc0M1oXDTAxMDYw
 | 
			
		||||
OTEzNTc0M1owWzELMAkGA1UEBhMCQVUxEzARBgNVBAgTClF1ZWVuc2xhbmQxGjAY
 | 
			
		||||
BgNVBAoTEUNyeXB0U29mdCBQdHkgTHRkMRswGQYDVQQDExJUZXN0IENBICgxMDI0
 | 
			
		||||
IGJpdCkwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAKO7o8t116VP6cgybTsZ
 | 
			
		||||
DCZhr95nYlZuya3aCi1IKoztqwWnjbmDFIriOqGFPrZQ+moMETC9D59iRW/dFXSv
 | 
			
		||||
1F65ka/XY2hLh9exCCo7XuUcDs53Qp3bI3AmMqHjgzE8oO3ajyJAzJkTTOUecQU2
 | 
			
		||||
mw/gI4tMM0LqWMQS7luTy4+xAgMBAAEwDQYJKoZIhvcNAQEEBQADgYEAM7achv3v
 | 
			
		||||
hLQJcv/65eGEpBXM40ZDVoFQFFJWaY5p883HTqLB1x4FdzsXHH0QKBTcKpWwqyu4
 | 
			
		||||
YDm3fb8oDugw72bCzfyZK/zVZPR/hVlqI/fvU109Qoc+7oPvIXWky71HfcK6ZBCA
 | 
			
		||||
q30KIqGM/uoM60INq97qjDmCJapagcNBGQs=
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
-----BEGIN RSA PRIVATE KEY-----
 | 
			
		||||
MIICXQIBAAKBgQCju6PLddelT+nIMm07GQwmYa/eZ2JWbsmt2gotSCqM7asFp425
 | 
			
		||||
gxSK4jqhhT62UPpqDBEwvQ+fYkVv3RV0r9ReuZGv12NoS4fXsQgqO17lHA7Od0Kd
 | 
			
		||||
2yNwJjKh44MxPKDt2o8iQMyZE0zlHnEFNpsP4COLTDNC6ljEEu5bk8uPsQIDAQAB
 | 
			
		||||
AoGAVZmpFZsDZfr0l2S9tLLwpjRWNOlKATQkno6q2WesT0eGLQufTciY+c8ypfU6
 | 
			
		||||
hyio8r5iUl/VhhdjhAtKx1mRpiotftHo/eYf8rtsrnprOnWG0bWjLjtIoMbcxGn2
 | 
			
		||||
J3bN6LJmbJMjDs0eJ3KnTu646F3nDUw2oGAwmpzKXA1KAP0CQQDRvQhxk2D3Pehs
 | 
			
		||||
HvG665u2pB5ipYQngEFlZO7RHJZzJOZEWSLuuMqaF/7pTfA5jiBvWqCgJeCRRInL
 | 
			
		||||
21ru4dlPAkEAx9jj7BgKn5TYnMoBSSe0afjsV9oApVpN1Nacb1YDtCwy+scp3++s
 | 
			
		||||
nFxlv98wxIlSdpwMUn+AUWfjiWR7Tu/G/wJBAJ/KjwZIrFVxewP0x2ILYsTRYLzz
 | 
			
		||||
MS4PDsO7FB+I0i7DbBOifXS2oNSpd3I0CNMwrxFnUHzynpbOStVfN3ZL5w0CQQCa
 | 
			
		||||
pwFahxBRhkJKsxhjoFJBX9yl75JoY4Wvm5Tbo9ih6UJaRx3kqfkN14L2BKYcsZgb
 | 
			
		||||
KY9vmDOYy6iNfjDeWTfJAkBkfPUb8oTJ/nSP5zN6sqGxSY4krc4xLxpRmxoJ8HL2
 | 
			
		||||
XfhqXkTzbU13RX9JJ/NZ8vQN9Vm2NhxRGJocQkmcdVtJ
 | 
			
		||||
-----END RSA PRIVATE KEY-----
 | 
			
		||||
-----BEGIN X509 CERTIFICATE-----
 | 
			
		||||
MIICYDCCAiACAgEoMAkGBSsOAwINBQAwfDELMAkGA1UEBhMCVVMxNjA0BgNVBAoT
 | 
			
		||||
LU5hdGlvbmFsIEFlcm9uYXV0aWNzIGFuZCBTcGFjZSBBZG1pbmlzdHJhdGlvbjEZ
 | 
			
		||||
MBcGA1UECxMQVGVzdCBFbnZpcm9ubWVudDEaMBgGA1UECxMRRFNTLU5BU0EtUGls
 | 
			
		||||
b3QtQ0EwHhcNOTYwMjI2MTYzMjQ1WhcNOTcwMjI1MTYzMjQ1WjB8MQswCQYDVQQG
 | 
			
		||||
EwJVUzE2MDQGA1UEChMtTmF0aW9uYWwgQWVyb25hdXRpY3MgYW5kIFNwYWNlIEFk
 | 
			
		||||
bWluaXN0cmF0aW9uMRkwFwYDVQQLExBUZXN0IEVudmlyb25tZW50MRowGAYDVQQL
 | 
			
		||||
ExFEU1MtTkFTQS1QaWxvdC1DQTCB8jAJBgUrDgMCDAUAA4HkADCB4AJBAMA/ssKb
 | 
			
		||||
hPNUG7ZlASfVwEJU21O5OyF/iyBzgHI1O8eOhJGUYO8cc8wDMjR508Mr9cp6Uhl/
 | 
			
		||||
ZB7FV5GkLNEnRHYCQQDUEaSg45P2qrDwixTRhFhmWz5Nvc4lRFQ/42XPcchiJBLb
 | 
			
		||||
bn3QK74T2IxY1yY+kCNq8XrIqf5fJJzIH0J/xUP3AhUAsg2wsQHfDGYk/BOSulX3
 | 
			
		||||
fVd0geUCQQCzCFUQAh+ZkEmp5804cs6ZWBhrUAfnra8lJItYo9xPcXgdIfLfibcX
 | 
			
		||||
R71UsyO77MRD7B0+Ag2tq794IleCVcEEMAkGBSsOAwINBQADLwAwLAIUUayDfreR
 | 
			
		||||
Yh2WeU86/pHNdkUC1IgCFEfxe1f0oMpxJyrJ5XIxTi7vGdoK
 | 
			
		||||
-----END X509 CERTIFICATE-----
 | 
			
		||||
-----BEGIN X509 CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
MIICGTCCAdgCAwCqTDAJBgUrDgMCDQUAMHwxCzAJBgNVBAYTAlVTMTYwNAYDVQQK
 | 
			
		||||
Ey1OYXRpb25hbCBBZXJvbmF1dGljcyBhbmQgU3BhY2UgQWRtaW5pc3RyYXRpb24x
 | 
			
		||||
GTAXBgNVBAsTEFRlc3QgRW52aXJvbm1lbnQxGjAYBgNVBAsTEURTUy1OQVNBLVBp
 | 
			
		||||
bG90LUNBMB4XDTk2MDUxNDE3MDE0MVoXDTk3MDUxNDE3MDE0MVowMzELMAkGA1UE
 | 
			
		||||
BhMCQVUxDzANBgNVBAoTBk1pbmNvbTETMBEGA1UEAxMKRXJpYyBZb3VuZzCB8jAJ
 | 
			
		||||
BgUrDgMCDAUAA4HkADCB4AJBAKbfHz6vE6pXXMTpswtGUec2tvnfLJUsoxE9qs4+
 | 
			
		||||
ObZX7LmLvragNPUeiTJx7UOWZ5DfBj6bXLc8eYne0lP1g3ACQQDUEaSg45P2qrDw
 | 
			
		||||
ixTRhFhmWz5Nvc4lRFQ/42XPcchiJBLbbn3QK74T2IxY1yY+kCNq8XrIqf5fJJzI
 | 
			
		||||
H0J/xUP3AhUAsg2wsQHfDGYk/BOSulX3fVd0geUCQQCzCFUQAh+ZkEmp5804cs6Z
 | 
			
		||||
WBhrUAfnra8lJItYo9xPcXgdIfLfibcXR71UsyO77MRD7B0+Ag2tq794IleCVcEE
 | 
			
		||||
MAkGBSsOAwINBQADMAAwLQIUWsuuJRE3VT4ueWkWMAJMJaZjj1ECFQCYY0zX4bzM
 | 
			
		||||
LC7obsrHD8XAHG+ZRG==
 | 
			
		||||
-----END X509 CERTIFICATE-----
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICTTCCAbagAwIBAgIBADANBgkqhkiG9w0BAQQFADBMMQswCQYDVQQGEwJHQjEM
 | 
			
		||||
MAoGA1UEChMDVUNMMRgwFgYDVQQLEw9JQ0UtVEVMIFByb2plY3QxFTATBgNVBAMT
 | 
			
		||||
DFRydXN0RmFjdG9yeTAeFw05NzA0MjIxNDM5MTRaFw05ODA0MjIxNDM5MTRaMEwx
 | 
			
		||||
CzAJBgNVBAYTAkdCMQwwCgYDVQQKEwNVQ0wxGDAWBgNVBAsTD0lDRS1URUwgUHJv
 | 
			
		||||
amVjdDEVMBMGA1UEAxMMVHJ1c3RGYWN0b3J5MIGcMAoGBFUIAQECAgQAA4GNADCB
 | 
			
		||||
iQKBgQCEieR8NcXkUW1f0G6aC6u0i8q/98JqS6RxK5YmHIGKCkuTWAUjzLfUa4dt
 | 
			
		||||
U9igGCjTuxaDqlzEim+t/02pmiBZT9HaX++35MjQPUWmsChcYU5WyzGErXi+rQaw
 | 
			
		||||
zlwS73zM8qiPj/97lXYycWhgL0VaiDSPxRXEUdWoaGruom4mNQIDAQABo0IwQDAd
 | 
			
		||||
BgNVHQ4EFgQUHal1LZr7oVg5z6lYzrhTgZRCmcUwDgYDVR0PAQH/BAQDAgH2MA8G
 | 
			
		||||
A1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEEBQADgYEAfaggfl6FZoioecjv0dq8
 | 
			
		||||
/DXo/u11iMZvXn08gjX/zl2b4wtPbShOSY5FhkSm8GeySasz+/Nwb/uzfnIhokWi
 | 
			
		||||
lfPZHtlCWtXbIy/TN51eJyq04ceDCQDWvLC2enVg9KB+GJ34b5c5VaPRzq8MBxsA
 | 
			
		||||
S7ELuYGtmYgYm9NZOIr7yU0=
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIIB6jCCAZQCAgEtMA0GCSqGSIb3DQEBBAUAMIGAMQswCQYDVQQGEwJVUzE2MDQG
 | 
			
		||||
A1UEChMtTmF0aW9uYWwgQWVyb25hdXRpY3MgYW5kIFNwYWNlIEFkbWluaXN0cmF0
 | 
			
		||||
aW9uMRkwFwYDVQQLExBUZXN0IEVudmlyb25tZW50MR4wHAYDVQQLExVNRDUtUlNB
 | 
			
		||||
LU5BU0EtUGlsb3QtQ0EwHhcNOTYwNDMwMjIwNTAwWhcNOTcwNDMwMjIwNTAwWjCB
 | 
			
		||||
gDELMAkGA1UEBhMCVVMxNjA0BgNVBAoTLU5hdGlvbmFsIEFlcm9uYXV0aWNzIGFu
 | 
			
		||||
ZCBTcGFjZSBBZG1pbmlzdHJhdGlvbjEZMBcGA1UECxMQVGVzdCBFbnZpcm9ubWVu
 | 
			
		||||
dDEeMBwGA1UECxMVTUQ1LVJTQS1OQVNBLVBpbG90LUNBMFkwCgYEVQgBAQICAgAD
 | 
			
		||||
SwAwSAJBALmmX5+GqAvcrWK13rfDrNX9UfeA7f+ijyBgeFQjYUoDpFqapw4nzQBL
 | 
			
		||||
bAXug8pKkRwa2Zh8YODhXsRWu2F/UckCAwEAATANBgkqhkiG9w0BAQQFAANBAH9a
 | 
			
		||||
OBA+QCsjxXgnSqHx04gcU8S49DVUb1f2XVoLnHlIb8RnX0k5O6mpHT5eti9bLkiW
 | 
			
		||||
GJNMJ4L0AJ/ac+SmHZc=
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICajCCAdMCBDGA0QUwDQYJKoZIhvcNAQEEBQAwfTELMAkGA1UEBhMCQ2ExDzAN
 | 
			
		||||
BgNVBAcTBk5lcGVhbjEeMBwGA1UECxMVTm8gTGlhYmlsaXR5IEFjY2VwdGVkMR8w
 | 
			
		||||
HQYDVQQKExZGb3IgRGVtbyBQdXJwb3NlcyBPbmx5MRwwGgYDVQQDExNFbnRydXN0
 | 
			
		||||
IERlbW8gV2ViIENBMB4XDTk2MDQyNjEzMzUwMVoXDTA2MDQyNjEzMzUwMVowfTEL
 | 
			
		||||
MAkGA1UEBhMCQ2ExDzANBgNVBAcTBk5lcGVhbjEeMBwGA1UECxMVTm8gTGlhYmls
 | 
			
		||||
aXR5IEFjY2VwdGVkMR8wHQYDVQQKExZGb3IgRGVtbyBQdXJwb3NlcyBPbmx5MRww
 | 
			
		||||
GgYDVQQDExNFbnRydXN0IERlbW8gV2ViIENBMIGdMA0GCSqGSIb3DQEBAQUAA4GL
 | 
			
		||||
ADCBhwKBgQCaroS7O1DA0hm4IefNYU1cx/nqOmzEnk291d1XqznDeF4wEgakbkCc
 | 
			
		||||
zTKxK791yNpXG5RmngqH7cygDRTHZJ6mfCRn0wGC+AI00F2vYTGqPGRQL1N3lZT0
 | 
			
		||||
YDKFC0SQeMMjFIZ1aeQigroFQnHo0VB3zWIMpNkka8PY9lxHZAmWwQIBAzANBgkq
 | 
			
		||||
hkiG9w0BAQQFAAOBgQBAx0UMVA1s54lMQyXjMX5kj99FJN5itb8bK1Rk+cegPQPF
 | 
			
		||||
cWO9SEWyEjjBjIkjjzAwBkaEszFsNGxemxtXvwjIm1xEUMTVlPEWTs2qnDvAUA9W
 | 
			
		||||
YqhWbhH0toGT36236QAsqCZ76rbTRVSSX2BHyJwJMG2tCRv7kRJ//NIgxj3H4w==
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
issuer= /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test PCA (1024 bit)
 | 
			
		||||
subject=/C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test PCA (1024 bit)
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICJzCCAZACAQAwDQYJKoZIhvcNAQEEBQAwXDELMAkGA1UEBhMCQVUxEzARBgNV
 | 
			
		||||
BAgTClF1ZWVuc2xhbmQxGjAYBgNVBAoTEUNyeXB0U29mdCBQdHkgTHRkMRwwGgYD
 | 
			
		||||
VQQDExNUZXN0IFBDQSAoMTAyNCBiaXQpMB4XDTk3MDYwOTEzNTczN1oXDTAxMDYw
 | 
			
		||||
OTEzNTczN1owXDELMAkGA1UEBhMCQVUxEzARBgNVBAgTClF1ZWVuc2xhbmQxGjAY
 | 
			
		||||
BgNVBAoTEUNyeXB0U29mdCBQdHkgTHRkMRwwGgYDVQQDExNUZXN0IFBDQSAoMTAy
 | 
			
		||||
NCBiaXQpMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCdoWk/3+WcMlfjIrkg
 | 
			
		||||
40ketmnQaEogQe1LLcuOJV6rKfUSAsPgwgsabJ/wn8TxA1yy3eKJbFl3OiUXMRsp
 | 
			
		||||
22Jp85PmemiDzyUIStwk72qhp1imbANZvlmlCFKiQrjUyuDfu4TABmn+kkt3vR1Y
 | 
			
		||||
BEOGt+IFye1UBVSATVdRJ2UVhwIDAQABMA0GCSqGSIb3DQEBBAUAA4GBABNA1u/S
 | 
			
		||||
Cg/LJZWb7GliiKJsvuhxlE4E5JxQF2zMub/CSNbF97//tYSyj96sxeFQxZXbcjm9
 | 
			
		||||
xt6mr/xNLA4szNQMJ4P+L7b5e/jC5DSqlwS+CUYJgaFs/SP+qJoCSu1bR3IM9XWO
 | 
			
		||||
cRBpDmcBbYLkSyB92WURvsZ1LtjEcn+cdQVI
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
-----BEGIN RSA PRIVATE KEY-----
 | 
			
		||||
MIICXAIBAAKBgQCdoWk/3+WcMlfjIrkg40ketmnQaEogQe1LLcuOJV6rKfUSAsPg
 | 
			
		||||
wgsabJ/wn8TxA1yy3eKJbFl3OiUXMRsp22Jp85PmemiDzyUIStwk72qhp1imbANZ
 | 
			
		||||
vlmlCFKiQrjUyuDfu4TABmn+kkt3vR1YBEOGt+IFye1UBVSATVdRJ2UVhwIDAQAB
 | 
			
		||||
AoGAba4fTtuap5l7/8ZsbE7Z1O32KJY4ZcOZukLOLUUhXxXduT+FTgGWujc0/rgc
 | 
			
		||||
z9qYCLlNZHOouMYTgtSfYvuMuLZ11VIt0GYH+nRioLShE59Yy+zCRyC+gPigS1kz
 | 
			
		||||
xvo14AsOIPYV14Tk/SsHyq6E0eTk7VzaIE197giiINUERPECQQDSKmtPTh/lRKw7
 | 
			
		||||
HSZSM0I1mFWn/1zqrAbontRQY5w98QWIOe5qmzYyFbPXYT3d9BzlsMyhgiRNoBbD
 | 
			
		||||
yvohSHXJAkEAwAHx6ezAZeWWzD5yXD36nyjpkVCw7Tk7TSmOceLJMWt1QcrCfqlS
 | 
			
		||||
xA5jjpQ6Z8suU5DdtWAryM2sAir1WisYzwJAd6Zcx56jvAQ3xcPXsE6scBTVFzrj
 | 
			
		||||
7FqZ6E+cclPzfLQ+QQsyOBE7bpI6e/FJppY26XGZXo3YGzV8IGXrt40oOQJALETG
 | 
			
		||||
h86EFXo3qGOFbmsDy4pdP5nBERCu8X1xUCSfintiD4c2DInxgS5oGclnJeMcjTvL
 | 
			
		||||
QjQoJCX3UJCi/OUO1QJBAKgcDHWjMvt+l1pjJBsSEZ0HX9AAIIVx0RQmbFGS+F2Q
 | 
			
		||||
hhu5l77WnnZOQ9vvhV5u7NPCUF9nhU3jh60qWWO8mkc=
 | 
			
		||||
-----END RSA PRIVATE KEY-----
 | 
			
		||||
subject=/C=US/O=RSA Data Security, Inc./OU=Commercial Certification Authority
 | 
			
		||||
issuer= /C=US/O=RSA Data Security, Inc./OU=Commercial Certification Authority
 | 
			
		||||
notBefore=941104185834Z
 | 
			
		||||
notAfter =991103185834Z
 | 
			
		||||
-----BEGIN X509 CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
MIICIzCCAZACBQJBAAAWMA0GCSqGSIb3DQEBAgUAMFwxCzAJBgNVBAYTAlVTMSAw
 | 
			
		||||
HgYDVQQKExdSU0EgRGF0YSBTZWN1cml0eSwgSW5jLjErMCkGA1UECxMiQ29tbWVy
 | 
			
		||||
Y2lhbCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw05NDExMDQxODU4MzRaFw05
 | 
			
		||||
OTExMDMxODU4MzRaMFwxCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdSU0EgRGF0YSBT
 | 
			
		||||
ZWN1cml0eSwgSW5jLjErMCkGA1UECxMiQ29tbWVyY2lhbCBDZXJ0aWZpY2F0aW9u
 | 
			
		||||
IEF1dGhvcml0eTCBmzANBgkqhkiG9w0BAQEFAAOBiQAwgYUCfgCk+4Fie84QJ93o
 | 
			
		||||
975sbsZwmdu41QUDaSiCnHJ/lj+O7Kwpkj+KFPhCdr69XQO5kNTQvAayUTNfxMK/
 | 
			
		||||
touPmbZiImDd298ggrTKoi8tUO2UMt7gVY3UaOLgTNLNBRYulWZcYVI4HlGogqHE
 | 
			
		||||
7yXpCuaLK44xZtn42f29O2nZ6wIDAQABMA0GCSqGSIb3DQEBAgUAA34AdrW2EP4j
 | 
			
		||||
9/dZYkuwX5zBaLxJu7NJbyFHXSudVMQAKD+YufKKg5tgf+tQx6sFEC097TgCwaVI
 | 
			
		||||
0v5loMC86qYjFmZsGySp8+x5NRhPJsjjr1BKx6cxa9B8GJ1Qv6km+iYrRpwUqbtb
 | 
			
		||||
MJhCKLVLU7tDCZJAuqiqWqTGtotXTcU=
 | 
			
		||||
-----END X509 CERTIFICATE-----
 | 
			
		||||
subject=/C=US/O=RSA Data Security, Inc./OU=Secure Server Certification Authority
 | 
			
		||||
issuer= /C=US/O=RSA Data Security, Inc./OU=Secure Server Certification Authority
 | 
			
		||||
notBefore=941109235417Z
 | 
			
		||||
notAfter =991231235417Z
 | 
			
		||||
-----BEGIN X509 CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
MIICKTCCAZYCBQJBAAABMA0GCSqGSIb3DQEBAgUAMF8xCzAJBgNVBAYTAlVTMSAw
 | 
			
		||||
HgYDVQQKExdSU0EgRGF0YSBTZWN1cml0eSwgSW5jLjEuMCwGA1UECxMlU2VjdXJl
 | 
			
		||||
IFNlcnZlciBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw05NDExMDkyMzU0MTda
 | 
			
		||||
Fw05OTEyMzEyMzU0MTdaMF8xCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdSU0EgRGF0
 | 
			
		||||
YSBTZWN1cml0eSwgSW5jLjEuMCwGA1UECxMlU2VjdXJlIFNlcnZlciBDZXJ0aWZp
 | 
			
		||||
Y2F0aW9uIEF1dGhvcml0eTCBmzANBgkqhkiG9w0BAQEFAAOBiQAwgYUCfgCSznrB
 | 
			
		||||
roM+WqqJg1esJQF2DK2ujiw3zus1eGRUA+WEQFHJv48I4oqCCNIWhjdV6bEhAq12
 | 
			
		||||
aIGaBaJLyUslZiJWbIgHj/eBWW2EB2VwE3F2Ppt3TONQiVaYSLkdpykaEy5KEVmc
 | 
			
		||||
HhXVSVQsczppgrGXOZxtcGdI5d0t1sgeewIDAQABMA0GCSqGSIb3DQEBAgUAA34A
 | 
			
		||||
iNHReSHO4ovo+MF9NFM/YYPZtgs4F7boviGNjwC4i1N+RGceIr2XJ+CchcxK9oU7
 | 
			
		||||
suK+ktPlDemvXA4MRpX/oRxePug2WHpzpgr4IhFrwwk4fia7c+8AvQKk8xQNMD9h
 | 
			
		||||
cHsg/jKjn7P0Z1LctO6EjJY2IN6BCINxIYoPnqk=
 | 
			
		||||
-----END X509 CERTIFICATE-----
 | 
			
		||||
subject=/C=ZA/SP=Western Cape/L=Cape Town/O=Thawte Consulting cc
 | 
			
		||||
	/OU=Certification Services Division/CN=Thawte Server CA
 | 
			
		||||
	/Email=server-certs@thawte.com
 | 
			
		||||
issuer= /C=ZA/SP=Western Cape/L=Cape Town/O=Thawte Consulting cc
 | 
			
		||||
	/OU=Certification Services Division/CN=Thawte Server CA
 | 
			
		||||
	/Email=server-certs@thawte.com
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIIC+TCCAmICAQAwDQYJKoZIhvcNAQEEBQAwgcQxCzAJBgNVBAYTAlpBMRUwEwYD
 | 
			
		||||
VQQIEwxXZXN0ZXJuIENhcGUxEjAQBgNVBAcTCUNhcGUgVG93bjEdMBsGA1UEChMU
 | 
			
		||||
VGhhd3RlIENvbnN1bHRpbmcgY2MxKDAmBgNVBAsTH0NlcnRpZmljYXRpb24gU2Vy
 | 
			
		||||
dmljZXMgRGl2aXNpb24xGTAXBgNVBAMTEFRoYXd0ZSBTZXJ2ZXIgQ0ExJjAkBgkq
 | 
			
		||||
hkiG9w0BCQEWF3NlcnZlci1jZXJ0c0B0aGF3dGUuY29tMB4XDTk2MDcyNzE4MDc1
 | 
			
		||||
N1oXDTk4MDcyNzE4MDc1N1owgcQxCzAJBgNVBAYTAlpBMRUwEwYDVQQIEwxXZXN0
 | 
			
		||||
ZXJuIENhcGUxEjAQBgNVBAcTCUNhcGUgVG93bjEdMBsGA1UEChMUVGhhd3RlIENv
 | 
			
		||||
bnN1bHRpbmcgY2MxKDAmBgNVBAsTH0NlcnRpZmljYXRpb24gU2VydmljZXMgRGl2
 | 
			
		||||
aXNpb24xGTAXBgNVBAMTEFRoYXd0ZSBTZXJ2ZXIgQ0ExJjAkBgkqhkiG9w0BCQEW
 | 
			
		||||
F3NlcnZlci1jZXJ0c0B0aGF3dGUuY29tMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCB
 | 
			
		||||
iQKBgQDTpFBuyP9Wa+bPXbbqDGh1R6KqwtqEJfyo9EdR2oW1IHSUhh4PdcnpCGH1
 | 
			
		||||
Bm0wbhUZAulSwGLbTZme4moMRDjN/r7jZAlwxf6xaym2L0nIO9QnBCUQly/nkG3A
 | 
			
		||||
KEKZ10xD3sP1IW1Un13DWOHA5NlbsLjctHvfNjrCtWYiEtaHDQIDAQABMA0GCSqG
 | 
			
		||||
SIb3DQEBBAUAA4GBAIsvn7ifX3RUIrvYXtpI4DOfARkTogwm6o7OwVdl93yFhDcX
 | 
			
		||||
7h5t0XZ11MUAMziKdde3rmTvzUYIUCYoY5b032IwGMTvdiclK+STN6NP2m5nvFAM
 | 
			
		||||
qJT5gC5O+j/jBuZRQ4i0AMYQr5F4lT8oBJnhgafw6PL8aDY2vMHGSPl9+7uf
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIIDDTCCAnYCAQAwDQYJKoZIhvcNAQEEBQAwgc4xCzAJBgNVBAYTAlpBMRUwEwYD
 | 
			
		||||
VQQIEwxXZXN0ZXJuIENhcGUxEjAQBgNVBAcTCUNhcGUgVG93bjEdMBsGA1UEChMU
 | 
			
		||||
VGhhd3RlIENvbnN1bHRpbmcgY2MxKDAmBgNVBAsTH0NlcnRpZmljYXRpb24gU2Vy
 | 
			
		||||
dmljZXMgRGl2aXNpb24xITAfBgNVBAMTGFRoYXd0ZSBQcmVtaXVtIFNlcnZlciBD
 | 
			
		||||
QTEoMCYGCSqGSIb3DQEJARYZcHJlbWl1bS1zZXJ2ZXJAdGhhd3RlLmNvbTAeFw05
 | 
			
		||||
NjA3MjcxODA3MTRaFw05ODA3MjcxODA3MTRaMIHOMQswCQYDVQQGEwJaQTEVMBMG
 | 
			
		||||
A1UECBMMV2VzdGVybiBDYXBlMRIwEAYDVQQHEwlDYXBlIFRvd24xHTAbBgNVBAoT
 | 
			
		||||
FFRoYXd0ZSBDb25zdWx0aW5nIGNjMSgwJgYDVQQLEx9DZXJ0aWZpY2F0aW9uIFNl
 | 
			
		||||
cnZpY2VzIERpdmlzaW9uMSEwHwYDVQQDExhUaGF3dGUgUHJlbWl1bSBTZXJ2ZXIg
 | 
			
		||||
Q0ExKDAmBgkqhkiG9w0BCQEWGXByZW1pdW0tc2VydmVyQHRoYXd0ZS5jb20wgZ8w
 | 
			
		||||
DQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBANI2NmqL18JbntqBQWKPOO5JBFXW0O8c
 | 
			
		||||
G5UWR+8YSDU6UvQragaPOy/qVuOvho2eF/eetGV1Ak3vywmiIVHYm9Bn0LoNkgYU
 | 
			
		||||
c9STy5cqAJxcTgy8+hVS/PJEbtoRSm4Iny8t4/mqOoZztkZTWMiJBb2DEbhzP6oH
 | 
			
		||||
jfRCTedAnRw3AgMBAAEwDQYJKoZIhvcNAQEEBQADgYEAutFIgTRZVYerIZfL9lvR
 | 
			
		||||
w9Eifvvo5KTZ3h+Bj+VzNnyw4Qc/IyXkPOu6SIiH9LQ3sCmWBdxpe+qr4l77rLj2
 | 
			
		||||
GYuMtESFfn1XVALzkYgC7JcPuTOjMfIiMByt+uFf8AV8x0IW/Qkuv+hEQcyM9vxK
 | 
			
		||||
3VZdLbCVIhNoEsysrxCpxcI=
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
Tims test GCI CA
 | 
			
		||||
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIIB8DCCAZoCAQAwDQYJKoZIhvcNAQEEBQAwgYIxCzAJBgNVBAYTAkFVMRMwEQYD
 | 
			
		||||
VQQIEwpRdWVlbnNsYW5kMREwDwYDVQQHEwhCcmlzYmFuZTEaMBgGA1UEChMRQ3J5
 | 
			
		||||
cHRTb2Z0IFB0eSBMdGQxFDASBgNVBAsTC2RldmVsb3BtZW50MRkwFwYDVQQDExBD
 | 
			
		||||
cnlwdFNvZnQgRGV2IENBMB4XDTk3MDMyMjEzMzQwNFoXDTk4MDMyMjEzMzQwNFow
 | 
			
		||||
gYIxCzAJBgNVBAYTAkFVMRMwEQYDVQQIEwpRdWVlbnNsYW5kMREwDwYDVQQHEwhC
 | 
			
		||||
cmlzYmFuZTEaMBgGA1UEChMRQ3J5cHRTb2Z0IFB0eSBMdGQxFDASBgNVBAsTC2Rl
 | 
			
		||||
dmVsb3BtZW50MRkwFwYDVQQDExBDcnlwdFNvZnQgRGV2IENBMFwwDQYJKoZIhvcN
 | 
			
		||||
AQEBBQADSwAwSAJBAOAOAqogG5QwAmLhzyO4CoRnx/wVy4NZP4dxJy83O1EnL0rw
 | 
			
		||||
OdsamJKvPOLHgSXo3gDu9uVyvCf/QJmZAmC5ml8CAwEAATANBgkqhkiG9w0BAQQF
 | 
			
		||||
AANBADRRS/GVdd7rAqRW6SdmgLJduOU2yq3avBu99kRqbp9A/dLu6r6jU+eP4oOA
 | 
			
		||||
TfdbFZtAAD2Hx9jUtY3tfdrJOb8= 
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICVjCCAgACAQAwDQYJKoZIhvcNAQEEBQAwgbUxCzAJBgNVBAYTAkFVMRMwEQYD
 | 
			
		||||
VQQIEwpRdWVlbnNsYW5kMREwDwYDVQQHEwhCcmlzYmFuZTEaMBgGA1UEChMRQ3J5
 | 
			
		||||
cHRTb2Z0IFB0eSBMdGQxLDAqBgNVBAsTI1dPUlRITEVTUyBDRVJUSUZJQ0FUSU9O
 | 
			
		||||
IEFVVEhPUklUSUVTMTQwMgYDVQQDEytaRVJPIFZBTFVFIENBIC0gREVNT05TVFJB
 | 
			
		||||
VElPTiBQVVJQT1NFUyBPTkxZMB4XDTk3MDQwMzEzMjI1NFoXDTk4MDQwMzEzMjI1
 | 
			
		||||
NFowgbUxCzAJBgNVBAYTAkFVMRMwEQYDVQQIEwpRdWVlbnNsYW5kMREwDwYDVQQH
 | 
			
		||||
EwhCcmlzYmFuZTEaMBgGA1UEChMRQ3J5cHRTb2Z0IFB0eSBMdGQxLDAqBgNVBAsT
 | 
			
		||||
I1dPUlRITEVTUyBDRVJUSUZJQ0FUSU9OIEFVVEhPUklUSUVTMTQwMgYDVQQDEyta
 | 
			
		||||
RVJPIFZBTFVFIENBIC0gREVNT05TVFJBVElPTiBQVVJQT1NFUyBPTkxZMFwwDQYJ
 | 
			
		||||
KoZIhvcNAQEBBQADSwAwSAJBAOZ7T7yqP/tyspcko3yPY1y0Cm2EmwNvzW4QgVXR
 | 
			
		||||
Fjs3HmJ4xtSpXdo6mwcGezL3Abt/aQXaxv9PU8xt+Jr0OFUCAwEAATANBgkqhkiG
 | 
			
		||||
9w0BAQQFAANBAOQpYmGgyCqCy1OljgJhCqQOu627oVlHzK1L+t9vBaMfn40AVUR4
 | 
			
		||||
WzQVWO31KTgi5vTK1U+3h46fgUWqQ0h+6rU=
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIAwgKADAgECAgEAMA0GCSqGSIb3DQEBBAUAMGIxETAPBgNVBAcTCEludGVybmV0
 | 
			
		||||
MRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjE0MDIGA1UECxMrVmVyaVNpZ24gQ2xh
 | 
			
		||||
c3MgMSBDQSAtIEluZGl2aWR1YWwgU3Vic2NyaWJlcjAeFw05NjA0MDgxMDIwMjda
 | 
			
		||||
Fw05NzA0MDgxMDIwMjdaMGIxETAPBgNVBAcTCEludGVybmV0MRcwFQYDVQQKEw5W
 | 
			
		||||
ZXJpU2lnbiwgSW5jLjE0MDIGA1UECxMrVmVyaVNpZ24gQ2xhc3MgMSBDQSAtIElu
 | 
			
		||||
ZGl2aWR1YWwgU3Vic2NyaWJlcjCAMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC2
 | 
			
		||||
FKbPTdAFDdjKI9BvqrQpkmOOLPhvltcunXZLEbE2jVfJw/0cxrr+Hgi6M8qV6r7j
 | 
			
		||||
W80GqLd5HUQq7XPysVKDaBBwZJHXPmv5912dFEObbpdFmIFH0S3L3bty10w/cari
 | 
			
		||||
QPJUObwW7s987LrbP2wqsxaxhhKdrpM01bjV0Pc+qQIDAQABAAAAADANBgkqhkiG
 | 
			
		||||
9w0BAQQFAAOBgQA+1nJryNt8VBRjRr07ArDAV/3jAH7GjDc9jsrxZS68ost9v06C
 | 
			
		||||
TvTNKGL+LISNmFLXl+JXhgGB0JZ9fvyYzNgHQ46HBUng1H6voalfJgS2KdEo50wW
 | 
			
		||||
8EFZYMDkT1k4uynwJqkVN2QJK/2q4/A/VCov5h6SlM8Affg2W+1TLqvqkwAA
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
 subject=/L=Internet/O=VeriSign, Inc./OU=VeriSign Class 2 CA - Individual Subscriber
 | 
			
		||||
 issuer= /L=Internet/O=VeriSign, Inc./OU=VeriSign Class 2 CA - Individual Subscriber
 | 
			
		||||
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIIEkzCCA/ygAwIBAgIRANDTUpSRL3nTFeMrMayFSPAwDQYJKoZIhvcNAQECBQAw
 | 
			
		||||
YjERMA8GA1UEBxMISW50ZXJuZXQxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMTQw
 | 
			
		||||
MgYDVQQLEytWZXJpU2lnbiBDbGFzcyAyIENBIC0gSW5kaXZpZHVhbCBTdWJzY3Jp
 | 
			
		||||
YmVyMB4XDTk2MDYwNDAwMDAwMFoXDTk4MDYwNDIzNTk1OVowYjERMA8GA1UEBxMI
 | 
			
		||||
SW50ZXJuZXQxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMTQwMgYDVQQLEytWZXJp
 | 
			
		||||
U2lnbiBDbGFzcyAyIENBIC0gSW5kaXZpZHVhbCBTdWJzY3JpYmVyMIGfMA0GCSqG
 | 
			
		||||
SIb3DQEBAQUAA4GNADCBiQKBgQC6A+2czKGRcYMfm8gdnk+0de99TDDzsqo0v5nb
 | 
			
		||||
RsbUmMcdRQ7nsMbRWe0SAb/9QoLTZ/cJ0iOBqdrkz7UpqqKarVoTSdlSMVM92tWp
 | 
			
		||||
3bJncZHQD1t4xd6lQVdI1/T6R+5J0T1ukOdsI9Jmf+F28S6g3R3L1SFwiHKeZKZv
 | 
			
		||||
z+793wIDAQABo4ICRzCCAkMwggIpBgNVHQMBAf8EggIdMIICGTCCAhUwggIRBgtg
 | 
			
		||||
hkgBhvhFAQcBATCCAgAWggGrVGhpcyBjZXJ0aWZpY2F0ZSBpbmNvcnBvcmF0ZXMg
 | 
			
		||||
YnkgcmVmZXJlbmNlLCBhbmQgaXRzIHVzZSBpcyBzdHJpY3RseSBzdWJqZWN0IHRv
 | 
			
		||||
LCB0aGUgVmVyaVNpZ24gQ2VydGlmaWNhdGlvbiBQcmFjdGljZSBTdGF0ZW1lbnQg
 | 
			
		||||
KENQUyksIGF2YWlsYWJsZSBhdDogaHR0cHM6Ly93d3cudmVyaXNpZ24uY29tL0NQ
 | 
			
		||||
Uy0xLjA7IGJ5IEUtbWFpbCBhdCBDUFMtcmVxdWVzdHNAdmVyaXNpZ24uY29tOyBv
 | 
			
		||||
ciBieSBtYWlsIGF0IFZlcmlTaWduLCBJbmMuLCAyNTkzIENvYXN0IEF2ZS4sIE1v
 | 
			
		||||
dW50YWluIFZpZXcsIENBIDk0MDQzIFVTQSBUZWwuICsxICg0MTUpIDk2MS04ODMw
 | 
			
		||||
IENvcHlyaWdodCAoYykgMTk5NiBWZXJpU2lnbiwgSW5jLiAgQWxsIFJpZ2h0cyBS
 | 
			
		||||
ZXNlcnZlZC4gQ0VSVEFJTiBXQVJSQU5USUVTIERJU0NMQUlNRUQgYW5kIExJQUJJ
 | 
			
		||||
TElUWSBMSU1JVEVELqAOBgxghkgBhvhFAQcBAQGhDgYMYIZIAYb4RQEHAQECMC8w
 | 
			
		||||
LRYraHR0cHM6Ly93d3cudmVyaXNpZ24uY29tL3JlcG9zaXRvcnkvQ1BTLTEuMDAU
 | 
			
		||||
BglghkgBhvhCAQEBAf8EBAMCAgQwDQYJKoZIhvcNAQECBQADgYEApRJRkNBqLLgs
 | 
			
		||||
53IR/d18ODdLOWMTZ+QOOxBrq460iBEdUwgF8vmPRX1ku7UiDeNzaLlurE6eFqHq
 | 
			
		||||
2zPyK5j60zfTLVJMWKcQWwTJLjHtXrW8pxhNtFc6Fdvy5ZkHnC/9NIl7/t4U6WqB
 | 
			
		||||
p4y+p7SdMIkEwIZfds0VbnQyX5MRUJY=
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
 subject=/C=US/O=VeriSign, Inc./OU=Class 3 Public Primary Certification Authority
 | 
			
		||||
 issuer= /C=US/O=VeriSign, Inc./OU=Class 3 Public Primary Certification Authority
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICMTCCAZoCBQKhAAABMA0GCSqGSIb3DQEBAgUAMF8xCzAJBgNVBAYTAlVTMRcw
 | 
			
		||||
FQYDVQQKEw5WZXJpU2lnbiwgSW5jLjE3MDUGA1UECxMuQ2xhc3MgMyBQdWJsaWMg
 | 
			
		||||
UHJpbWFyeSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw05NjAxMjkwMDAwMDBa
 | 
			
		||||
Fw05OTEyMzEyMzU5NTlaMF8xCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2ln
 | 
			
		||||
biwgSW5jLjE3MDUGA1UECxMuQ2xhc3MgMyBQdWJsaWMgUHJpbWFyeSBDZXJ0aWZp
 | 
			
		||||
Y2F0aW9uIEF1dGhvcml0eTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAyVxZ
 | 
			
		||||
nvIbigEUtBDfBEDb41evakVAj4QMC9Ez2dkRz+4CWB8l9yqoRAWq7AMfeH+ek7ma
 | 
			
		||||
AKojfdashaJjRcdyJ8z0TMZ1cdI5709C8HXfCpDGjiBvmA/4rCNfcCk2pMmG57Ga
 | 
			
		||||
IMtTpYXnPb59mv4kRTPcdhXtD6JxZExlLoFoRacCAwEAATANBgkqhkiG9w0BAQIF
 | 
			
		||||
AAOBgQB1Zmw+0c2B27X4LzZRtvdCvM1Cr9wO+hVs+GeTVzrrtpLotgHKjLeOQ7RJ
 | 
			
		||||
Zfk+7r11Ri7J/CVdqMcvi5uPaM+0nJcYwE3vH9mvgrPmZLiEXIqaB1JDYft0nls6
 | 
			
		||||
NvxMsvwaPxUupVs8G5DsiCnkWRb5zget7Ond2tIxik/W2O8XjQ==
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
 subject=/C=US/O=VeriSign, Inc./OU=Class 4 Public Primary Certification Authority
 | 
			
		||||
 issuer= /C=US/O=VeriSign, Inc./OU=Class 4 Public Primary Certification Authority
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICMTCCAZoCBQKmAAABMA0GCSqGSIb3DQEBAgUAMF8xCzAJBgNVBAYTAlVTMRcw
 | 
			
		||||
FQYDVQQKEw5WZXJpU2lnbiwgSW5jLjE3MDUGA1UECxMuQ2xhc3MgNCBQdWJsaWMg
 | 
			
		||||
UHJpbWFyeSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw05NjAxMjkwMDAwMDBa
 | 
			
		||||
Fw05OTEyMzEyMzU5NTlaMF8xCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2ln
 | 
			
		||||
biwgSW5jLjE3MDUGA1UECxMuQ2xhc3MgNCBQdWJsaWMgUHJpbWFyeSBDZXJ0aWZp
 | 
			
		||||
Y2F0aW9uIEF1dGhvcml0eTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA0LJ1
 | 
			
		||||
9njQrlpQ9OlQqZ+M1++RlHDo0iSQdomF1t+s5gEXMoDwnZNHvJplnR+Xrr/phnVj
 | 
			
		||||
IIm9gFidBAydqMEk6QvlMXi9/C0MN2qeeIDpRnX57aP7E3vIwUzSo+/1PLBij0pd
 | 
			
		||||
O92VZ48TucE81qcmm+zDO3rZTbxtm+gVAePwR6kCAwEAATANBgkqhkiG9w0BAQIF
 | 
			
		||||
AAOBgQBT3dPwnCR+QKri/AAa19oM/DJhuBUNlvP6Vxt/M3yv6ZiaYch6s7f/sdyZ
 | 
			
		||||
g9ysEvxwyR84Qu1E9oAuW2szaayc01znX1oYx7EteQSWQZGZQbE8DbqEOcY7l/Am
 | 
			
		||||
yY7uvcxClf8exwI/VAx49byqYHwCaejcrOICdmHEPgPq0ook0Q==
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
 
 | 
			
		||||
@@ -90,6 +90,7 @@ int MAIN(int, char **);
 | 
			
		||||
int MAIN(int argc, char **argv)
 | 
			
		||||
{
 | 
			
		||||
    SSL_SESSION *x = NULL;
 | 
			
		||||
    X509 *peer = NULL;
 | 
			
		||||
    int ret = 1, i, num, badops = 0;
 | 
			
		||||
    BIO *out = NULL;
 | 
			
		||||
    int informat, outformat;
 | 
			
		||||
@@ -157,14 +158,15 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    if (x == NULL) {
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
    peer = SSL_SESSION_get0_peer(x);
 | 
			
		||||
 | 
			
		||||
    if (context) {
 | 
			
		||||
        x->sid_ctx_length = strlen(context);
 | 
			
		||||
        if (x->sid_ctx_length > SSL_MAX_SID_CTX_LENGTH) {
 | 
			
		||||
        size_t ctx_len = strlen(context);
 | 
			
		||||
        if (ctx_len > SSL_MAX_SID_CTX_LENGTH) {
 | 
			
		||||
            BIO_printf(bio_err, "Context too long\n");
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
        memcpy(x->sid_ctx, context, x->sid_ctx_length);
 | 
			
		||||
        SSL_SESSION_set1_id_context(x, (unsigned char *)context, ctx_len);
 | 
			
		||||
    }
 | 
			
		||||
#ifdef undef
 | 
			
		||||
    /* just testing for memory leaks :-) */
 | 
			
		||||
@@ -214,10 +216,10 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        SSL_SESSION_print(out, x);
 | 
			
		||||
 | 
			
		||||
        if (cert) {
 | 
			
		||||
            if (x->peer == NULL)
 | 
			
		||||
            if (peer == NULL)
 | 
			
		||||
                BIO_puts(out, "No certificate present\n");
 | 
			
		||||
            else
 | 
			
		||||
                X509_print(out, x->peer);
 | 
			
		||||
                X509_print(out, peer);
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
@@ -234,11 +236,11 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            BIO_printf(bio_err, "unable to write SSL_SESSION\n");
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
    } else if (!noout && (x->peer != NULL)) { /* just print the certificate */
 | 
			
		||||
    } else if (!noout && (peer != NULL)) { /* just print the certificate */
 | 
			
		||||
        if (outformat == FORMAT_ASN1)
 | 
			
		||||
            i = (int)i2d_X509_bio(out, x->peer);
 | 
			
		||||
            i = (int)i2d_X509_bio(out, peer);
 | 
			
		||||
        else if (outformat == FORMAT_PEM)
 | 
			
		||||
            i = PEM_write_bio_X509(out, x->peer);
 | 
			
		||||
            i = PEM_write_bio_X509(out, peer);
 | 
			
		||||
        else {
 | 
			
		||||
            BIO_printf(bio_err, "bad output format specified for outfile\n");
 | 
			
		||||
            goto end;
 | 
			
		||||
 
 | 
			
		||||
@@ -441,6 +441,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-CApath dir    trusted certificates directory\n");
 | 
			
		||||
        BIO_printf(bio_err, "-CAfile file   trusted certificates file\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-no_alt_chains only ever use the first certificate chain found\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-crl_check     check revocation status of signer's certificate using CRLs\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										66
									
								
								apps/speed.c
									
									
									
									
									
								
							
							
						
						
									
										66
									
								
								apps/speed.c
									
									
									
									
									
								
							@@ -108,8 +108,16 @@
 | 
			
		||||
#  include <signal.h>
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
# ifdef _WIN32
 | 
			
		||||
# if defined(_WIN32) || defined(__CYGWIN__)
 | 
			
		||||
#  include <windows.h>
 | 
			
		||||
#  if defined(__CYGWIN__) && !defined(_WIN32)
 | 
			
		||||
  /*
 | 
			
		||||
   * <windows.h> should define _WIN32, which normally is mutually exclusive
 | 
			
		||||
   * with __CYGWIN__, but if it didn't...
 | 
			
		||||
   */
 | 
			
		||||
#   define _WIN32
 | 
			
		||||
  /* this is done because Cygwin alarm() fails sometimes. */
 | 
			
		||||
#  endif
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
# include <openssl/bn.h>
 | 
			
		||||
@@ -183,6 +191,25 @@
 | 
			
		||||
# ifndef OPENSSL_NO_ECDH
 | 
			
		||||
#  include <openssl/ecdh.h>
 | 
			
		||||
# endif
 | 
			
		||||
# include <openssl/modes.h>
 | 
			
		||||
 | 
			
		||||
# ifdef OPENSSL_FIPS
 | 
			
		||||
#  ifdef OPENSSL_DOING_MAKEDEPEND
 | 
			
		||||
#   undef AES_set_encrypt_key
 | 
			
		||||
#   undef AES_set_decrypt_key
 | 
			
		||||
#   undef DES_set_key_unchecked
 | 
			
		||||
#  endif
 | 
			
		||||
#  define BF_set_key      private_BF_set_key
 | 
			
		||||
#  define CAST_set_key    private_CAST_set_key
 | 
			
		||||
#  define idea_set_encrypt_key    private_idea_set_encrypt_key
 | 
			
		||||
#  define SEED_set_key    private_SEED_set_key
 | 
			
		||||
#  define RC2_set_key     private_RC2_set_key
 | 
			
		||||
#  define RC4_set_key     private_RC4_set_key
 | 
			
		||||
#  define DES_set_key_unchecked   private_DES_set_key_unchecked
 | 
			
		||||
#  define AES_set_encrypt_key     private_AES_set_encrypt_key
 | 
			
		||||
#  define AES_set_decrypt_key     private_AES_set_decrypt_key
 | 
			
		||||
#  define Camellia_set_key        private_Camellia_set_key
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
# ifndef HAVE_FORK
 | 
			
		||||
#  if defined(OPENSSL_SYS_VMS) || defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MACINTOSH_CLASSIC) || defined(OPENSSL_SYS_OS2) || defined(OPENSSL_SYS_NETWARE)
 | 
			
		||||
@@ -200,7 +227,7 @@
 | 
			
		||||
 | 
			
		||||
# undef BUFSIZE
 | 
			
		||||
# define BUFSIZE ((long)1024*8+1)
 | 
			
		||||
int run = 0;
 | 
			
		||||
static volatile int run = 0;
 | 
			
		||||
 | 
			
		||||
static int mr = 0;
 | 
			
		||||
static int usertime = 1;
 | 
			
		||||
@@ -214,7 +241,7 @@ static void print_result(int alg, int run_no, int count, double time_used);
 | 
			
		||||
static int do_multi(int multi);
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
# define ALGOR_NUM       29
 | 
			
		||||
# define ALGOR_NUM       30
 | 
			
		||||
# define SIZE_NUM        5
 | 
			
		||||
# define RSA_NUM         4
 | 
			
		||||
# define DSA_NUM         3
 | 
			
		||||
@@ -229,7 +256,7 @@ static const char *names[ALGOR_NUM] = {
 | 
			
		||||
    "aes-128 cbc", "aes-192 cbc", "aes-256 cbc",
 | 
			
		||||
    "camellia-128 cbc", "camellia-192 cbc", "camellia-256 cbc",
 | 
			
		||||
    "evp", "sha256", "sha512", "whirlpool",
 | 
			
		||||
    "aes-128 ige", "aes-192 ige", "aes-256 ige"
 | 
			
		||||
    "aes-128 ige", "aes-192 ige", "aes-256 ige", "ghash"
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
static double results[ALGOR_NUM][SIZE_NUM];
 | 
			
		||||
@@ -277,13 +304,17 @@ static SIGRETTYPE sig_done(int sig)
 | 
			
		||||
 | 
			
		||||
# if defined(_WIN32)
 | 
			
		||||
 | 
			
		||||
#  define SIGALRM
 | 
			
		||||
#  if !defined(SIGALRM)
 | 
			
		||||
#   define SIGALRM
 | 
			
		||||
#  endif
 | 
			
		||||
static unsigned int lapse, schlock;
 | 
			
		||||
static void alarm(unsigned int secs)
 | 
			
		||||
static void alarm_win32(unsigned int secs)
 | 
			
		||||
{
 | 
			
		||||
    lapse = secs * 1000;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
#  define alarm alarm_win32
 | 
			
		||||
 | 
			
		||||
static DWORD WINAPI sleepy(VOID * arg)
 | 
			
		||||
{
 | 
			
		||||
    schlock = 1;
 | 
			
		||||
@@ -482,6 +513,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
# define D_IGE_128_AES   26
 | 
			
		||||
# define D_IGE_192_AES   27
 | 
			
		||||
# define D_IGE_256_AES   28
 | 
			
		||||
# define D_GHASH         29
 | 
			
		||||
    double d = 0.0;
 | 
			
		||||
    long c[ALGOR_NUM][SIZE_NUM];
 | 
			
		||||
# define R_DSA_512       0
 | 
			
		||||
@@ -923,6 +955,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            doit[D_CBC_128_AES] = 1;
 | 
			
		||||
            doit[D_CBC_192_AES] = 1;
 | 
			
		||||
            doit[D_CBC_256_AES] = 1;
 | 
			
		||||
        } else if (strcmp(*argv, "ghash") == 0) {
 | 
			
		||||
            doit[D_GHASH] = 1;
 | 
			
		||||
        } else
 | 
			
		||||
# endif
 | 
			
		||||
# ifndef OPENSSL_NO_CAMELLIA
 | 
			
		||||
@@ -1329,6 +1363,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    c[D_IGE_128_AES][0] = count;
 | 
			
		||||
    c[D_IGE_192_AES][0] = count;
 | 
			
		||||
    c[D_IGE_256_AES][0] = count;
 | 
			
		||||
    c[D_GHASH][0] = count;
 | 
			
		||||
 | 
			
		||||
    for (i = 1; i < SIZE_NUM; i++) {
 | 
			
		||||
        c[D_MD2][i] = c[D_MD2][0] * 4 * lengths[0] / lengths[i];
 | 
			
		||||
@@ -1497,7 +1532,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
#   error "You cannot disable DES on systems without SIGALRM."
 | 
			
		||||
#  endif                        /* OPENSSL_NO_DES */
 | 
			
		||||
# else
 | 
			
		||||
#  define COND(c) (run)
 | 
			
		||||
#  define COND(c) (run && count<0x7fffffff)
 | 
			
		||||
#  define COUNT(d) (count)
 | 
			
		||||
#  ifndef _WIN32
 | 
			
		||||
    signal(SIGALRM, sig_done);
 | 
			
		||||
@@ -1764,6 +1799,21 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            print_result(D_IGE_256_AES, j, count, d);
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
    if (doit[D_GHASH]) {
 | 
			
		||||
        GCM128_CONTEXT *ctx =
 | 
			
		||||
            CRYPTO_gcm128_new(&aes_ks1, (block128_f) AES_encrypt);
 | 
			
		||||
        CRYPTO_gcm128_setiv(ctx, (unsigned char *)"0123456789ab", 12);
 | 
			
		||||
 | 
			
		||||
        for (j = 0; j < SIZE_NUM; j++) {
 | 
			
		||||
            print_message(names[D_GHASH], c[D_GHASH][j], lengths[j]);
 | 
			
		||||
            Time_F(START);
 | 
			
		||||
            for (count = 0, run = 1; COND(c[D_GHASH][j]); count++)
 | 
			
		||||
                CRYPTO_gcm128_aad(ctx, buf, lengths[j]);
 | 
			
		||||
            d = Time_F(STOP);
 | 
			
		||||
            print_result(D_GHASH, j, count, d);
 | 
			
		||||
        }
 | 
			
		||||
        CRYPTO_gcm128_release(ctx);
 | 
			
		||||
    }
 | 
			
		||||
# endif
 | 
			
		||||
# ifndef OPENSSL_NO_CAMELLIA
 | 
			
		||||
    if (doit[D_CBC_128_CML]) {
 | 
			
		||||
@@ -2487,7 +2537,7 @@ static void pkey_print_message(const char *str, const char *str2, long num,
 | 
			
		||||
               mr ? "+DTP:%d:%s:%s:%d\n"
 | 
			
		||||
               : "Doing %d bit %s %s's for %ds: ", bits, str, str2, tm);
 | 
			
		||||
    (void)BIO_flush(bio_err);
 | 
			
		||||
    alarm(RSA_SECONDS);
 | 
			
		||||
    alarm(tm);
 | 
			
		||||
# else
 | 
			
		||||
    BIO_printf(bio_err,
 | 
			
		||||
               mr ? "+DNP:%ld:%d:%s:%s\n"
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										768
									
								
								apps/srp.c
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										768
									
								
								apps/srp.c
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,768 @@
 | 
			
		||||
/* apps/srp.c */
 | 
			
		||||
/*
 | 
			
		||||
 * Written by Peter Sylvester (peter.sylvester@edelweb.fr) for the EdelKey
 | 
			
		||||
 * project and contributed to the OpenSSL project 2004.
 | 
			
		||||
 */
 | 
			
		||||
/* ====================================================================
 | 
			
		||||
 * Copyright (c) 2004 The OpenSSL Project.  All rights reserved.
 | 
			
		||||
 *
 | 
			
		||||
 * Redistribution and use in source and binary forms, with or without
 | 
			
		||||
 * modification, are permitted provided that the following conditions
 | 
			
		||||
 * are met:
 | 
			
		||||
 *
 | 
			
		||||
 * 1. Redistributions of source code must retain the above copyright
 | 
			
		||||
 *    notice, this list of conditions and the following disclaimer.
 | 
			
		||||
 *
 | 
			
		||||
 * 2. Redistributions in binary form must reproduce the above copyright
 | 
			
		||||
 *    notice, this list of conditions and the following disclaimer in
 | 
			
		||||
 *    the documentation and/or other materials provided with the
 | 
			
		||||
 *    distribution.
 | 
			
		||||
 *
 | 
			
		||||
 * 3. All advertising materials mentioning features or use of this
 | 
			
		||||
 *    software must display the following acknowledgment:
 | 
			
		||||
 *    "This product includes software developed by the OpenSSL Project
 | 
			
		||||
 *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
 | 
			
		||||
 *
 | 
			
		||||
 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
 | 
			
		||||
 *    endorse or promote products derived from this software without
 | 
			
		||||
 *    prior written permission. For written permission, please contact
 | 
			
		||||
 *    licensing@OpenSSL.org.
 | 
			
		||||
 *
 | 
			
		||||
 * 5. Products derived from this software may not be called "OpenSSL"
 | 
			
		||||
 *    nor may "OpenSSL" appear in their names without prior written
 | 
			
		||||
 *    permission of the OpenSSL Project.
 | 
			
		||||
 *
 | 
			
		||||
 * 6. Redistributions of any form whatsoever must retain the following
 | 
			
		||||
 *    acknowledgment:
 | 
			
		||||
 *    "This product includes software developed by the OpenSSL Project
 | 
			
		||||
 *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
 | 
			
		||||
 *
 | 
			
		||||
 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
 | 
			
		||||
 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 | 
			
		||||
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
 | 
			
		||||
 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
 | 
			
		||||
 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 | 
			
		||||
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 | 
			
		||||
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
 | 
			
		||||
 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 | 
			
		||||
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
 | 
			
		||||
 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 | 
			
		||||
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
 | 
			
		||||
 * OF THE POSSIBILITY OF SUCH DAMAGE.
 | 
			
		||||
 * ====================================================================
 | 
			
		||||
 *
 | 
			
		||||
 * This product includes cryptographic software written by Eric Young
 | 
			
		||||
 * (eay@cryptsoft.com).  This product includes software written by Tim
 | 
			
		||||
 * Hudson (tjh@cryptsoft.com).
 | 
			
		||||
 *
 | 
			
		||||
 */
 | 
			
		||||
#include <openssl/opensslconf.h>
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_SRP
 | 
			
		||||
# include <stdio.h>
 | 
			
		||||
# include <stdlib.h>
 | 
			
		||||
# include <string.h>
 | 
			
		||||
# include <openssl/conf.h>
 | 
			
		||||
# include <openssl/bio.h>
 | 
			
		||||
# include <openssl/err.h>
 | 
			
		||||
# include <openssl/txt_db.h>
 | 
			
		||||
# include <openssl/buffer.h>
 | 
			
		||||
# include <openssl/srp.h>
 | 
			
		||||
 | 
			
		||||
# include "apps.h"
 | 
			
		||||
 | 
			
		||||
# undef PROG
 | 
			
		||||
# define PROG srp_main
 | 
			
		||||
 | 
			
		||||
# define BASE_SECTION    "srp"
 | 
			
		||||
# define CONFIG_FILE "openssl.cnf"
 | 
			
		||||
 | 
			
		||||
# define ENV_RANDFILE            "RANDFILE"
 | 
			
		||||
 | 
			
		||||
# define ENV_DATABASE            "srpvfile"
 | 
			
		||||
# define ENV_DEFAULT_SRP         "default_srp"
 | 
			
		||||
 | 
			
		||||
static char *srp_usage[] = {
 | 
			
		||||
    "usage: srp [args] [user] \n",
 | 
			
		||||
    "\n",
 | 
			
		||||
    " -verbose        Talk alot while doing things\n",
 | 
			
		||||
    " -config file    A config file\n",
 | 
			
		||||
    " -name arg       The particular srp definition to use\n",
 | 
			
		||||
    " -srpvfile arg   The srp verifier file name\n",
 | 
			
		||||
    " -add            add an user and srp verifier\n",
 | 
			
		||||
    " -modify         modify the srp verifier of an existing user\n",
 | 
			
		||||
    " -delete         delete user from verifier file\n",
 | 
			
		||||
    " -list           list user\n",
 | 
			
		||||
    " -gn arg         g and N values to be used for new verifier\n",
 | 
			
		||||
    " -userinfo arg   additional info to be set for user\n",
 | 
			
		||||
    " -passin arg     input file pass phrase source\n",
 | 
			
		||||
    " -passout arg    output file pass phrase source\n",
 | 
			
		||||
# ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
    " -engine e         - use engine e, possibly a hardware device.\n",
 | 
			
		||||
# endif
 | 
			
		||||
    NULL
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
# ifdef EFENCE
 | 
			
		||||
extern int EF_PROTECT_FREE;
 | 
			
		||||
extern int EF_PROTECT_BELOW;
 | 
			
		||||
extern int EF_ALIGNMENT;
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
static CONF *conf = NULL;
 | 
			
		||||
static char *section = NULL;
 | 
			
		||||
 | 
			
		||||
# define VERBOSE if (verbose)
 | 
			
		||||
# define VVERBOSE if (verbose>1)
 | 
			
		||||
 | 
			
		||||
int MAIN(int, char **);
 | 
			
		||||
 | 
			
		||||
static int get_index(CA_DB *db, char *id, char type)
 | 
			
		||||
{
 | 
			
		||||
    char **pp;
 | 
			
		||||
    int i;
 | 
			
		||||
    if (id == NULL)
 | 
			
		||||
        return -1;
 | 
			
		||||
    if (type == DB_SRP_INDEX)
 | 
			
		||||
        for (i = 0; i < sk_OPENSSL_PSTRING_num(db->db->data); i++) {
 | 
			
		||||
            pp = sk_OPENSSL_PSTRING_value(db->db->data, i);
 | 
			
		||||
            if (pp[DB_srptype][0] == DB_SRP_INDEX
 | 
			
		||||
                && !strcmp(id, pp[DB_srpid]))
 | 
			
		||||
                return i;
 | 
			
		||||
    } else
 | 
			
		||||
        for (i = 0; i < sk_OPENSSL_PSTRING_num(db->db->data); i++) {
 | 
			
		||||
            pp = sk_OPENSSL_PSTRING_value(db->db->data, i);
 | 
			
		||||
 | 
			
		||||
            if (pp[DB_srptype][0] != DB_SRP_INDEX
 | 
			
		||||
                && !strcmp(id, pp[DB_srpid]))
 | 
			
		||||
                return i;
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
    return -1;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static void print_entry(CA_DB *db, BIO *bio, int indx, int verbose, char *s)
 | 
			
		||||
{
 | 
			
		||||
    if (indx >= 0 && verbose) {
 | 
			
		||||
        int j;
 | 
			
		||||
        char **pp = sk_OPENSSL_PSTRING_value(db->db->data, indx);
 | 
			
		||||
        BIO_printf(bio, "%s \"%s\"\n", s, pp[DB_srpid]);
 | 
			
		||||
        for (j = 0; j < DB_NUMBER; j++) {
 | 
			
		||||
            BIO_printf(bio_err, "  %d = \"%s\"\n", j, pp[j]);
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static void print_index(CA_DB *db, BIO *bio, int indexindex, int verbose)
 | 
			
		||||
{
 | 
			
		||||
    print_entry(db, bio, indexindex, verbose, "g N entry");
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static void print_user(CA_DB *db, BIO *bio, int userindex, int verbose)
 | 
			
		||||
{
 | 
			
		||||
    if (verbose > 0) {
 | 
			
		||||
        char **pp = sk_OPENSSL_PSTRING_value(db->db->data, userindex);
 | 
			
		||||
 | 
			
		||||
        if (pp[DB_srptype][0] != 'I') {
 | 
			
		||||
            print_entry(db, bio, userindex, verbose, "User entry");
 | 
			
		||||
            print_entry(db, bio, get_index(db, pp[DB_srpgN], 'I'), verbose,
 | 
			
		||||
                        "g N entry");
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
    }
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static int update_index(CA_DB *db, BIO *bio, char **row)
 | 
			
		||||
{
 | 
			
		||||
    char **irow;
 | 
			
		||||
    int i;
 | 
			
		||||
 | 
			
		||||
    if ((irow =
 | 
			
		||||
         (char **)OPENSSL_malloc(sizeof(char *) * (DB_NUMBER + 1))) == NULL) {
 | 
			
		||||
        BIO_printf(bio_err, "Memory allocation failure\n");
 | 
			
		||||
        return 0;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    for (i = 0; i < DB_NUMBER; i++) {
 | 
			
		||||
        irow[i] = row[i];
 | 
			
		||||
        row[i] = NULL;
 | 
			
		||||
    }
 | 
			
		||||
    irow[DB_NUMBER] = NULL;
 | 
			
		||||
 | 
			
		||||
    if (!TXT_DB_insert(db->db, irow)) {
 | 
			
		||||
        BIO_printf(bio, "failed to update srpvfile\n");
 | 
			
		||||
        BIO_printf(bio, "TXT_DB error number %ld\n", db->db->error);
 | 
			
		||||
        OPENSSL_free(irow);
 | 
			
		||||
        return 0;
 | 
			
		||||
    }
 | 
			
		||||
    return 1;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static void lookup_fail(const char *name, char *tag)
 | 
			
		||||
{
 | 
			
		||||
    BIO_printf(bio_err, "variable lookup failed for %s::%s\n", name, tag);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static char *srp_verify_user(const char *user, const char *srp_verifier,
 | 
			
		||||
                             char *srp_usersalt, const char *g, const char *N,
 | 
			
		||||
                             const char *passin, BIO *bio, int verbose)
 | 
			
		||||
{
 | 
			
		||||
    char password[1024];
 | 
			
		||||
    PW_CB_DATA cb_tmp;
 | 
			
		||||
    char *verifier = NULL;
 | 
			
		||||
    char *gNid = NULL;
 | 
			
		||||
 | 
			
		||||
    cb_tmp.prompt_info = user;
 | 
			
		||||
    cb_tmp.password = passin;
 | 
			
		||||
 | 
			
		||||
    if (password_callback(password, 1024, 0, &cb_tmp) > 0) {
 | 
			
		||||
        VERBOSE BIO_printf(bio,
 | 
			
		||||
                           "Validating\n   user=\"%s\"\n srp_verifier=\"%s\"\n srp_usersalt=\"%s\"\n g=\"%s\"\n N=\"%s\"\n",
 | 
			
		||||
                           user, srp_verifier, srp_usersalt, g, N);
 | 
			
		||||
        BIO_printf(bio, "Pass %s\n", password);
 | 
			
		||||
 | 
			
		||||
        if (!
 | 
			
		||||
            (gNid =
 | 
			
		||||
             SRP_create_verifier(user, password, &srp_usersalt, &verifier, N,
 | 
			
		||||
                                 g))) {
 | 
			
		||||
            BIO_printf(bio, "Internal error validating SRP verifier\n");
 | 
			
		||||
        } else {
 | 
			
		||||
            if (strcmp(verifier, srp_verifier))
 | 
			
		||||
                gNid = NULL;
 | 
			
		||||
            OPENSSL_free(verifier);
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
    return gNid;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static char *srp_create_user(char *user, char **srp_verifier,
 | 
			
		||||
                             char **srp_usersalt, char *g, char *N,
 | 
			
		||||
                             char *passout, BIO *bio, int verbose)
 | 
			
		||||
{
 | 
			
		||||
    char password[1024];
 | 
			
		||||
    PW_CB_DATA cb_tmp;
 | 
			
		||||
    char *gNid = NULL;
 | 
			
		||||
    char *salt = NULL;
 | 
			
		||||
    cb_tmp.prompt_info = user;
 | 
			
		||||
    cb_tmp.password = passout;
 | 
			
		||||
 | 
			
		||||
    if (password_callback(password, 1024, 1, &cb_tmp) > 0) {
 | 
			
		||||
        VERBOSE BIO_printf(bio,
 | 
			
		||||
                           "Creating\n user=\"%s\"\n g=\"%s\"\n N=\"%s\"\n",
 | 
			
		||||
                           user, g, N);
 | 
			
		||||
        if (!
 | 
			
		||||
            (gNid =
 | 
			
		||||
             SRP_create_verifier(user, password, &salt, srp_verifier, N,
 | 
			
		||||
                                 g))) {
 | 
			
		||||
            BIO_printf(bio, "Internal error creating SRP verifier\n");
 | 
			
		||||
        } else
 | 
			
		||||
            *srp_usersalt = salt;
 | 
			
		||||
        VVERBOSE BIO_printf(bio, "gNid=%s salt =\"%s\"\n verifier =\"%s\"\n",
 | 
			
		||||
                            gNid, salt, *srp_verifier);
 | 
			
		||||
 | 
			
		||||
    }
 | 
			
		||||
    return gNid;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
int MAIN(int argc, char **argv)
 | 
			
		||||
{
 | 
			
		||||
    int add_user = 0;
 | 
			
		||||
    int list_user = 0;
 | 
			
		||||
    int delete_user = 0;
 | 
			
		||||
    int modify_user = 0;
 | 
			
		||||
    char *user = NULL;
 | 
			
		||||
 | 
			
		||||
    char *passargin = NULL, *passargout = NULL;
 | 
			
		||||
    char *passin = NULL, *passout = NULL;
 | 
			
		||||
    char *gN = NULL;
 | 
			
		||||
    int gNindex = -1;
 | 
			
		||||
    char **gNrow = NULL;
 | 
			
		||||
    int maxgN = -1;
 | 
			
		||||
 | 
			
		||||
    char *userinfo = NULL;
 | 
			
		||||
 | 
			
		||||
    int badops = 0;
 | 
			
		||||
    int ret = 1;
 | 
			
		||||
    int errors = 0;
 | 
			
		||||
    int verbose = 0;
 | 
			
		||||
    int doupdatedb = 0;
 | 
			
		||||
    char *configfile = NULL;
 | 
			
		||||
    char *dbfile = NULL;
 | 
			
		||||
    CA_DB *db = NULL;
 | 
			
		||||
    char **pp;
 | 
			
		||||
    int i;
 | 
			
		||||
    long errorline = -1;
 | 
			
		||||
    char *randfile = NULL;
 | 
			
		||||
# ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
    char *engine = NULL;
 | 
			
		||||
# endif
 | 
			
		||||
    char *tofree = NULL;
 | 
			
		||||
    DB_ATTR db_attr;
 | 
			
		||||
 | 
			
		||||
# ifdef EFENCE
 | 
			
		||||
    EF_PROTECT_FREE = 1;
 | 
			
		||||
    EF_PROTECT_BELOW = 1;
 | 
			
		||||
    EF_ALIGNMENT = 0;
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
    apps_startup();
 | 
			
		||||
 | 
			
		||||
    conf = NULL;
 | 
			
		||||
    section = NULL;
 | 
			
		||||
 | 
			
		||||
    if (bio_err == NULL)
 | 
			
		||||
        if ((bio_err = BIO_new(BIO_s_file())) != NULL)
 | 
			
		||||
            BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
 | 
			
		||||
 | 
			
		||||
    argc--;
 | 
			
		||||
    argv++;
 | 
			
		||||
    while (argc >= 1 && badops == 0) {
 | 
			
		||||
        if (strcmp(*argv, "-verbose") == 0)
 | 
			
		||||
            verbose++;
 | 
			
		||||
        else if (strcmp(*argv, "-config") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            configfile = *(++argv);
 | 
			
		||||
        } else if (strcmp(*argv, "-name") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            section = *(++argv);
 | 
			
		||||
        } else if (strcmp(*argv, "-srpvfile") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            dbfile = *(++argv);
 | 
			
		||||
        } else if (strcmp(*argv, "-add") == 0)
 | 
			
		||||
            add_user = 1;
 | 
			
		||||
        else if (strcmp(*argv, "-delete") == 0)
 | 
			
		||||
            delete_user = 1;
 | 
			
		||||
        else if (strcmp(*argv, "-modify") == 0)
 | 
			
		||||
            modify_user = 1;
 | 
			
		||||
        else if (strcmp(*argv, "-list") == 0)
 | 
			
		||||
            list_user = 1;
 | 
			
		||||
        else if (strcmp(*argv, "-gn") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            gN = *(++argv);
 | 
			
		||||
        } else if (strcmp(*argv, "-userinfo") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            userinfo = *(++argv);
 | 
			
		||||
        } else if (strcmp(*argv, "-passin") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            passargin = *(++argv);
 | 
			
		||||
        } else if (strcmp(*argv, "-passout") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            passargout = *(++argv);
 | 
			
		||||
        }
 | 
			
		||||
# ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
        else if (strcmp(*argv, "-engine") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            engine = *(++argv);
 | 
			
		||||
        }
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
        else if (**argv == '-') {
 | 
			
		||||
 bad:
 | 
			
		||||
            BIO_printf(bio_err, "unknown option %s\n", *argv);
 | 
			
		||||
            badops = 1;
 | 
			
		||||
            break;
 | 
			
		||||
        } else
 | 
			
		||||
            break;
 | 
			
		||||
 | 
			
		||||
        argc--;
 | 
			
		||||
        argv++;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (dbfile && configfile) {
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-dbfile and -configfile cannot be specified together.\n");
 | 
			
		||||
        badops = 1;
 | 
			
		||||
    }
 | 
			
		||||
    if (add_user + delete_user + modify_user + list_user != 1) {
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "Exactly one of the options -add, -delete, -modify -list must be specified.\n");
 | 
			
		||||
        badops = 1;
 | 
			
		||||
    }
 | 
			
		||||
    if (delete_user + modify_user + delete_user == 1 && argc <= 0) {
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "Need at least one user for options -add, -delete, -modify. \n");
 | 
			
		||||
        badops = 1;
 | 
			
		||||
    }
 | 
			
		||||
    if ((passin || passout) && argc != 1) {
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-passin, -passout arguments only valid with one user.\n");
 | 
			
		||||
        badops = 1;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (badops) {
 | 
			
		||||
        for (pp = srp_usage; (*pp != NULL); pp++)
 | 
			
		||||
            BIO_printf(bio_err, "%s", *pp);
 | 
			
		||||
 | 
			
		||||
        BIO_printf(bio_err, " -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR,
 | 
			
		||||
                   LIST_SEPARATOR_CHAR);
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "                 load the file (or the files in the directory) into\n");
 | 
			
		||||
        BIO_printf(bio_err, "                 the random number generator\n");
 | 
			
		||||
        goto err;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    ERR_load_crypto_strings();
 | 
			
		||||
 | 
			
		||||
# ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
    setup_engine(bio_err, engine, 0);
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
    if (!app_passwd(bio_err, passargin, passargout, &passin, &passout)) {
 | 
			
		||||
        BIO_printf(bio_err, "Error getting passwords\n");
 | 
			
		||||
        goto err;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (!dbfile) {
 | 
			
		||||
 | 
			
		||||
        /*****************************************************************/
 | 
			
		||||
        tofree = NULL;
 | 
			
		||||
        if (configfile == NULL)
 | 
			
		||||
            configfile = getenv("OPENSSL_CONF");
 | 
			
		||||
        if (configfile == NULL)
 | 
			
		||||
            configfile = getenv("SSLEAY_CONF");
 | 
			
		||||
        if (configfile == NULL) {
 | 
			
		||||
            const char *s = X509_get_default_cert_area();
 | 
			
		||||
            size_t len;
 | 
			
		||||
 | 
			
		||||
# ifdef OPENSSL_SYS_VMS
 | 
			
		||||
            len = strlen(s) + sizeof(CONFIG_FILE);
 | 
			
		||||
            tofree = OPENSSL_malloc(len);
 | 
			
		||||
            if (!tofree) {
 | 
			
		||||
                BIO_printf(bio_err, "Out of memory\n");
 | 
			
		||||
                goto err;
 | 
			
		||||
            }
 | 
			
		||||
            strcpy(tofree, s);
 | 
			
		||||
# else
 | 
			
		||||
            len = strlen(s) + sizeof(CONFIG_FILE) + 1;
 | 
			
		||||
            tofree = OPENSSL_malloc(len);
 | 
			
		||||
            if (!tofree) {
 | 
			
		||||
                BIO_printf(bio_err, "Out of memory\n");
 | 
			
		||||
                goto err;
 | 
			
		||||
            }
 | 
			
		||||
            BUF_strlcpy(tofree, s, len);
 | 
			
		||||
            BUF_strlcat(tofree, "/", len);
 | 
			
		||||
# endif
 | 
			
		||||
            BUF_strlcat(tofree, CONFIG_FILE, len);
 | 
			
		||||
            configfile = tofree;
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        VERBOSE BIO_printf(bio_err, "Using configuration from %s\n",
 | 
			
		||||
                           configfile);
 | 
			
		||||
        conf = NCONF_new(NULL);
 | 
			
		||||
        if (NCONF_load(conf, configfile, &errorline) <= 0) {
 | 
			
		||||
            if (errorline <= 0)
 | 
			
		||||
                BIO_printf(bio_err, "error loading the config file '%s'\n",
 | 
			
		||||
                           configfile);
 | 
			
		||||
            else
 | 
			
		||||
                BIO_printf(bio_err, "error on line %ld of config file '%s'\n",
 | 
			
		||||
                           errorline, configfile);
 | 
			
		||||
            goto err;
 | 
			
		||||
        }
 | 
			
		||||
        if (tofree) {
 | 
			
		||||
            OPENSSL_free(tofree);
 | 
			
		||||
            tofree = NULL;
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        if (!load_config(bio_err, conf))
 | 
			
		||||
            goto err;
 | 
			
		||||
 | 
			
		||||
        /* Lets get the config section we are using */
 | 
			
		||||
        if (section == NULL) {
 | 
			
		||||
            VERBOSE BIO_printf(bio_err,
 | 
			
		||||
                               "trying to read " ENV_DEFAULT_SRP
 | 
			
		||||
                               " in \" BASE_SECTION \"\n");
 | 
			
		||||
 | 
			
		||||
            section = NCONF_get_string(conf, BASE_SECTION, ENV_DEFAULT_SRP);
 | 
			
		||||
            if (section == NULL) {
 | 
			
		||||
                lookup_fail(BASE_SECTION, ENV_DEFAULT_SRP);
 | 
			
		||||
                goto err;
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        if (randfile == NULL && conf)
 | 
			
		||||
            randfile = NCONF_get_string(conf, BASE_SECTION, "RANDFILE");
 | 
			
		||||
 | 
			
		||||
        VERBOSE BIO_printf(bio_err,
 | 
			
		||||
                           "trying to read " ENV_DATABASE
 | 
			
		||||
                           " in section \"%s\"\n", section);
 | 
			
		||||
 | 
			
		||||
        if ((dbfile = NCONF_get_string(conf, section, ENV_DATABASE)) == NULL) {
 | 
			
		||||
            lookup_fail(section, ENV_DATABASE);
 | 
			
		||||
            goto err;
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
    }
 | 
			
		||||
    if (randfile == NULL)
 | 
			
		||||
        ERR_clear_error();
 | 
			
		||||
    else
 | 
			
		||||
        app_RAND_load_file(randfile, bio_err, 0);
 | 
			
		||||
 | 
			
		||||
    VERBOSE BIO_printf(bio_err, "Trying to read SRP verifier file \"%s\"\n",
 | 
			
		||||
                       dbfile);
 | 
			
		||||
 | 
			
		||||
    db = load_index(dbfile, &db_attr);
 | 
			
		||||
    if (db == NULL)
 | 
			
		||||
        goto err;
 | 
			
		||||
 | 
			
		||||
    /* Lets check some fields */
 | 
			
		||||
    for (i = 0; i < sk_OPENSSL_PSTRING_num(db->db->data); i++) {
 | 
			
		||||
        pp = sk_OPENSSL_PSTRING_value(db->db->data, i);
 | 
			
		||||
 | 
			
		||||
        if (pp[DB_srptype][0] == DB_SRP_INDEX) {
 | 
			
		||||
            maxgN = i;
 | 
			
		||||
            if (gNindex < 0 && gN != NULL && !strcmp(gN, pp[DB_srpid]))
 | 
			
		||||
                gNindex = i;
 | 
			
		||||
 | 
			
		||||
            print_index(db, bio_err, i, verbose > 1);
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    VERBOSE BIO_printf(bio_err, "Database initialised\n");
 | 
			
		||||
 | 
			
		||||
    if (gNindex >= 0) {
 | 
			
		||||
        gNrow = sk_OPENSSL_PSTRING_value(db->db->data, gNindex);
 | 
			
		||||
        print_entry(db, bio_err, gNindex, verbose > 1, "Default g and N");
 | 
			
		||||
    } else if (maxgN > 0 && !SRP_get_default_gN(gN)) {
 | 
			
		||||
        BIO_printf(bio_err, "No g and N value for index \"%s\"\n", gN);
 | 
			
		||||
        goto err;
 | 
			
		||||
    } else {
 | 
			
		||||
        VERBOSE BIO_printf(bio_err, "Database has no g N information.\n");
 | 
			
		||||
        gNrow = NULL;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    VVERBOSE BIO_printf(bio_err, "Starting user processing\n");
 | 
			
		||||
 | 
			
		||||
    if (argc > 0)
 | 
			
		||||
        user = *(argv++);
 | 
			
		||||
 | 
			
		||||
    while (list_user || user) {
 | 
			
		||||
        int userindex = -1;
 | 
			
		||||
        if (user)
 | 
			
		||||
            VVERBOSE BIO_printf(bio_err, "Processing user \"%s\"\n", user);
 | 
			
		||||
        if ((userindex = get_index(db, user, 'U')) >= 0) {
 | 
			
		||||
            print_user(db, bio_err, userindex, (verbose > 0) || list_user);
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        if (list_user) {
 | 
			
		||||
            if (user == NULL) {
 | 
			
		||||
                BIO_printf(bio_err, "List all users\n");
 | 
			
		||||
 | 
			
		||||
                for (i = 0; i < sk_OPENSSL_PSTRING_num(db->db->data); i++) {
 | 
			
		||||
                    print_user(db, bio_err, i, 1);
 | 
			
		||||
                }
 | 
			
		||||
                list_user = 0;
 | 
			
		||||
            } else if (userindex < 0) {
 | 
			
		||||
                BIO_printf(bio_err,
 | 
			
		||||
                           "user \"%s\" does not exist, ignored. t\n", user);
 | 
			
		||||
                errors++;
 | 
			
		||||
            }
 | 
			
		||||
        } else if (add_user) {
 | 
			
		||||
            if (userindex >= 0) {
 | 
			
		||||
                /* reactivation of a new user */
 | 
			
		||||
                char **row =
 | 
			
		||||
                    sk_OPENSSL_PSTRING_value(db->db->data, userindex);
 | 
			
		||||
                BIO_printf(bio_err, "user \"%s\" reactivated.\n", user);
 | 
			
		||||
                row[DB_srptype][0] = 'V';
 | 
			
		||||
 | 
			
		||||
                doupdatedb = 1;
 | 
			
		||||
            } else {
 | 
			
		||||
                char *row[DB_NUMBER];
 | 
			
		||||
                char *gNid;
 | 
			
		||||
                row[DB_srpverifier] = NULL;
 | 
			
		||||
                row[DB_srpsalt] = NULL;
 | 
			
		||||
                row[DB_srpinfo] = NULL;
 | 
			
		||||
                if (!
 | 
			
		||||
                    (gNid =
 | 
			
		||||
                     srp_create_user(user, &(row[DB_srpverifier]),
 | 
			
		||||
                                     &(row[DB_srpsalt]),
 | 
			
		||||
                                     gNrow ? gNrow[DB_srpsalt] : gN,
 | 
			
		||||
                                     gNrow ? gNrow[DB_srpverifier] : NULL,
 | 
			
		||||
                                     passout, bio_err, verbose))) {
 | 
			
		||||
                    BIO_printf(bio_err,
 | 
			
		||||
                               "Cannot create srp verifier for user \"%s\", operation abandoned .\n",
 | 
			
		||||
                               user);
 | 
			
		||||
                    errors++;
 | 
			
		||||
                    goto err;
 | 
			
		||||
                }
 | 
			
		||||
                row[DB_srpid] = BUF_strdup(user);
 | 
			
		||||
                row[DB_srptype] = BUF_strdup("v");
 | 
			
		||||
                row[DB_srpgN] = BUF_strdup(gNid);
 | 
			
		||||
 | 
			
		||||
                if (!row[DB_srpid] || !row[DB_srpgN] || !row[DB_srptype]
 | 
			
		||||
                    || !row[DB_srpverifier] || !row[DB_srpsalt] || (userinfo
 | 
			
		||||
                                                                    &&
 | 
			
		||||
                                                                    (!(row
 | 
			
		||||
                                                                       [DB_srpinfo]
 | 
			
		||||
                                                                       =
 | 
			
		||||
                                                                       BUF_strdup
 | 
			
		||||
                                                                       (userinfo))))
 | 
			
		||||
                    || !update_index(db, bio_err, row)) {
 | 
			
		||||
                    if (row[DB_srpid])
 | 
			
		||||
                        OPENSSL_free(row[DB_srpid]);
 | 
			
		||||
                    if (row[DB_srpgN])
 | 
			
		||||
                        OPENSSL_free(row[DB_srpgN]);
 | 
			
		||||
                    if (row[DB_srpinfo])
 | 
			
		||||
                        OPENSSL_free(row[DB_srpinfo]);
 | 
			
		||||
                    if (row[DB_srptype])
 | 
			
		||||
                        OPENSSL_free(row[DB_srptype]);
 | 
			
		||||
                    if (row[DB_srpverifier])
 | 
			
		||||
                        OPENSSL_free(row[DB_srpverifier]);
 | 
			
		||||
                    if (row[DB_srpsalt])
 | 
			
		||||
                        OPENSSL_free(row[DB_srpsalt]);
 | 
			
		||||
                    goto err;
 | 
			
		||||
                }
 | 
			
		||||
                doupdatedb = 1;
 | 
			
		||||
            }
 | 
			
		||||
        } else if (modify_user) {
 | 
			
		||||
            if (userindex < 0) {
 | 
			
		||||
                BIO_printf(bio_err,
 | 
			
		||||
                           "user \"%s\" does not exist, operation ignored.\n",
 | 
			
		||||
                           user);
 | 
			
		||||
                errors++;
 | 
			
		||||
            } else {
 | 
			
		||||
 | 
			
		||||
                char **row =
 | 
			
		||||
                    sk_OPENSSL_PSTRING_value(db->db->data, userindex);
 | 
			
		||||
                char type = row[DB_srptype][0];
 | 
			
		||||
                if (type == 'v') {
 | 
			
		||||
                    BIO_printf(bio_err,
 | 
			
		||||
                               "user \"%s\" already updated, operation ignored.\n",
 | 
			
		||||
                               user);
 | 
			
		||||
                    errors++;
 | 
			
		||||
                } else {
 | 
			
		||||
                    char *gNid;
 | 
			
		||||
 | 
			
		||||
                    if (row[DB_srptype][0] == 'V') {
 | 
			
		||||
                        int user_gN;
 | 
			
		||||
                        char **irow = NULL;
 | 
			
		||||
                        VERBOSE BIO_printf(bio_err,
 | 
			
		||||
                                           "Verifying password for user \"%s\"\n",
 | 
			
		||||
                                           user);
 | 
			
		||||
                        if ((user_gN =
 | 
			
		||||
                             get_index(db, row[DB_srpgN], DB_SRP_INDEX)) >= 0)
 | 
			
		||||
                            irow =
 | 
			
		||||
                                (char **)sk_OPENSSL_PSTRING_value(db->
 | 
			
		||||
                                                                  db->data,
 | 
			
		||||
                                                                  userindex);
 | 
			
		||||
 | 
			
		||||
                        if (!srp_verify_user
 | 
			
		||||
                            (user, row[DB_srpverifier], row[DB_srpsalt],
 | 
			
		||||
                             irow ? irow[DB_srpsalt] : row[DB_srpgN],
 | 
			
		||||
                             irow ? irow[DB_srpverifier] : NULL, passin,
 | 
			
		||||
                             bio_err, verbose)) {
 | 
			
		||||
                            BIO_printf(bio_err,
 | 
			
		||||
                                       "Invalid password for user \"%s\", operation abandoned.\n",
 | 
			
		||||
                                       user);
 | 
			
		||||
                            errors++;
 | 
			
		||||
                            goto err;
 | 
			
		||||
                        }
 | 
			
		||||
                    }
 | 
			
		||||
                    VERBOSE BIO_printf(bio_err,
 | 
			
		||||
                                       "Password for user \"%s\" ok.\n",
 | 
			
		||||
                                       user);
 | 
			
		||||
 | 
			
		||||
                    if (!
 | 
			
		||||
                        (gNid =
 | 
			
		||||
                         srp_create_user(user, &(row[DB_srpverifier]),
 | 
			
		||||
                                         &(row[DB_srpsalt]),
 | 
			
		||||
                                         gNrow ? gNrow[DB_srpsalt] : NULL,
 | 
			
		||||
                                         gNrow ? gNrow[DB_srpverifier] : NULL,
 | 
			
		||||
                                         passout, bio_err, verbose))) {
 | 
			
		||||
                        BIO_printf(bio_err,
 | 
			
		||||
                                   "Cannot create srp verifier for user \"%s\", operation abandoned.\n",
 | 
			
		||||
                                   user);
 | 
			
		||||
                        errors++;
 | 
			
		||||
                        goto err;
 | 
			
		||||
                    }
 | 
			
		||||
 | 
			
		||||
                    row[DB_srptype][0] = 'v';
 | 
			
		||||
                    row[DB_srpgN] = BUF_strdup(gNid);
 | 
			
		||||
 | 
			
		||||
                    if (!row[DB_srpid] || !row[DB_srpgN] || !row[DB_srptype]
 | 
			
		||||
                        || !row[DB_srpverifier] || !row[DB_srpsalt]
 | 
			
		||||
                        || (userinfo
 | 
			
		||||
                            && (!(row[DB_srpinfo] = BUF_strdup(userinfo)))))
 | 
			
		||||
                        goto err;
 | 
			
		||||
 | 
			
		||||
                    doupdatedb = 1;
 | 
			
		||||
                }
 | 
			
		||||
            }
 | 
			
		||||
        } else if (delete_user) {
 | 
			
		||||
            if (userindex < 0) {
 | 
			
		||||
                BIO_printf(bio_err,
 | 
			
		||||
                           "user \"%s\" does not exist, operation ignored. t\n",
 | 
			
		||||
                           user);
 | 
			
		||||
                errors++;
 | 
			
		||||
            } else {
 | 
			
		||||
                char **xpp =
 | 
			
		||||
                    sk_OPENSSL_PSTRING_value(db->db->data, userindex);
 | 
			
		||||
                BIO_printf(bio_err, "user \"%s\" revoked. t\n", user);
 | 
			
		||||
 | 
			
		||||
                xpp[DB_srptype][0] = 'R';
 | 
			
		||||
 | 
			
		||||
                doupdatedb = 1;
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
        if (--argc > 0)
 | 
			
		||||
            user = *(argv++);
 | 
			
		||||
        else {
 | 
			
		||||
            user = NULL;
 | 
			
		||||
            list_user = 0;
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    VERBOSE BIO_printf(bio_err, "User procession done.\n");
 | 
			
		||||
 | 
			
		||||
    if (doupdatedb) {
 | 
			
		||||
        /* Lets check some fields */
 | 
			
		||||
        for (i = 0; i < sk_OPENSSL_PSTRING_num(db->db->data); i++) {
 | 
			
		||||
            pp = sk_OPENSSL_PSTRING_value(db->db->data, i);
 | 
			
		||||
 | 
			
		||||
            if (pp[DB_srptype][0] == 'v') {
 | 
			
		||||
                pp[DB_srptype][0] = 'V';
 | 
			
		||||
                print_user(db, bio_err, i, verbose);
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        VERBOSE BIO_printf(bio_err, "Trying to update srpvfile.\n");
 | 
			
		||||
        if (!save_index(dbfile, "new", db))
 | 
			
		||||
            goto err;
 | 
			
		||||
 | 
			
		||||
        VERBOSE BIO_printf(bio_err, "Temporary srpvfile created.\n");
 | 
			
		||||
        if (!rotate_index(dbfile, "new", "old"))
 | 
			
		||||
            goto err;
 | 
			
		||||
 | 
			
		||||
        VERBOSE BIO_printf(bio_err, "srpvfile updated.\n");
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    ret = (errors != 0);
 | 
			
		||||
 err:
 | 
			
		||||
    if (errors != 0)
 | 
			
		||||
        VERBOSE BIO_printf(bio_err, "User errors %d.\n", errors);
 | 
			
		||||
 | 
			
		||||
    VERBOSE BIO_printf(bio_err, "SRP terminating with code %d.\n", ret);
 | 
			
		||||
    if (tofree)
 | 
			
		||||
        OPENSSL_free(tofree);
 | 
			
		||||
    if (ret)
 | 
			
		||||
        ERR_print_errors(bio_err);
 | 
			
		||||
    if (randfile)
 | 
			
		||||
        app_RAND_write_file(randfile, bio_err);
 | 
			
		||||
    if (conf)
 | 
			
		||||
        NCONF_free(conf);
 | 
			
		||||
    if (db)
 | 
			
		||||
        free_index(db);
 | 
			
		||||
 | 
			
		||||
    OBJ_cleanup();
 | 
			
		||||
    apps_shutdown();
 | 
			
		||||
    OPENSSL_EXIT(ret);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
#endif
 | 
			
		||||
@@ -213,20 +213,26 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (argc < 1)
 | 
			
		||||
        check(cert_ctx, NULL, untrusted, trusted, crls, e);
 | 
			
		||||
    else
 | 
			
		||||
        for (i = 0; i < argc; i++)
 | 
			
		||||
            check(cert_ctx, argv[i], untrusted, trusted, crls, e);
 | 
			
		||||
    ret = 0;
 | 
			
		||||
    if (argc < 1) {
 | 
			
		||||
        if (1 != check(cert_ctx, NULL, untrusted, trusted, crls, e))
 | 
			
		||||
            ret = -1;
 | 
			
		||||
    } else {
 | 
			
		||||
        for (i = 0; i < argc; i++)
 | 
			
		||||
            if (1 != check(cert_ctx, argv[i], untrusted, trusted, crls, e))
 | 
			
		||||
                ret = -1;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
 end:
 | 
			
		||||
    if (ret == 1) {
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "usage: verify [-verbose] [-CApath path] [-CAfile file] [-purpose purpose] [-crl_check]");
 | 
			
		||||
        BIO_printf(bio_err, " [-no_alt_chains] [-attime timestamp]");
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
        BIO_printf(bio_err, " [-engine e]");
 | 
			
		||||
#endif
 | 
			
		||||
        BIO_printf(bio_err, " cert1 cert2 ...\n");
 | 
			
		||||
 | 
			
		||||
        BIO_printf(bio_err, "recognized usages:\n");
 | 
			
		||||
        for (i = 0; i < X509_PURPOSE_get_count(); i++) {
 | 
			
		||||
            X509_PURPOSE *ptmp;
 | 
			
		||||
@@ -244,7 +250,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    sk_X509_pop_free(trusted, X509_free);
 | 
			
		||||
    sk_X509_CRL_pop_free(crls, X509_CRL_free);
 | 
			
		||||
    apps_shutdown();
 | 
			
		||||
    OPENSSL_EXIT(ret);
 | 
			
		||||
    OPENSSL_EXIT(ret < 0 ? 2 : ret);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static int check(X509_STORE *ctx, char *file,
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										37
									
								
								apps/x509.c
									
									
									
									
									
								
							
							
						
						
									
										37
									
								
								apps/x509.c
									
									
									
									
									
								
							@@ -157,7 +157,8 @@ static int MS_CALLBACK callb(int ok, X509_STORE_CTX *ctx);
 | 
			
		||||
static int sign(X509 *x, EVP_PKEY *pkey, int days, int clrext,
 | 
			
		||||
                const EVP_MD *digest, CONF *conf, char *section);
 | 
			
		||||
static int x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest,
 | 
			
		||||
                        X509 *x, X509 *xca, EVP_PKEY *pkey, char *serial,
 | 
			
		||||
                        X509 *x, X509 *xca, EVP_PKEY *pkey,
 | 
			
		||||
                        STACK_OF(OPENSSL_STRING) *sigopts, char *serial,
 | 
			
		||||
                        int create, int days, int clrext, CONF *conf,
 | 
			
		||||
                        char *section, ASN1_INTEGER *sno);
 | 
			
		||||
static int purpose_print(BIO *bio, X509 *cert, X509_PURPOSE *pt);
 | 
			
		||||
@@ -172,6 +173,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    X509_REQ *req = NULL;
 | 
			
		||||
    X509 *x = NULL, *xca = NULL;
 | 
			
		||||
    ASN1_OBJECT *objtmp;
 | 
			
		||||
    STACK_OF(OPENSSL_STRING) *sigopts = NULL;
 | 
			
		||||
    EVP_PKEY *Upkey = NULL, *CApkey = NULL;
 | 
			
		||||
    ASN1_INTEGER *sno = NULL;
 | 
			
		||||
    int i, num, badops = 0;
 | 
			
		||||
@@ -265,12 +267,19 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            CAkeyformat = str2fmt(*(++argv));
 | 
			
		||||
        } else if (strcmp(*argv, "-sigopt") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            if (!sigopts)
 | 
			
		||||
                sigopts = sk_OPENSSL_STRING_new_null();
 | 
			
		||||
            if (!sigopts || !sk_OPENSSL_STRING_push(sigopts, *(++argv)))
 | 
			
		||||
                goto bad;
 | 
			
		||||
        } else if (strcmp(*argv, "-days") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            days = atoi(*(++argv));
 | 
			
		||||
            if (days == 0) {
 | 
			
		||||
                BIO_printf(STDout, "bad number of days\n");
 | 
			
		||||
                BIO_printf(bio_err, "bad number of days\n");
 | 
			
		||||
                goto bad;
 | 
			
		||||
            }
 | 
			
		||||
        } else if (strcmp(*argv, "-passin") == 0) {
 | 
			
		||||
@@ -774,6 +783,11 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
 | 
			
		||||
                z = i2d_X509(x, NULL);
 | 
			
		||||
                m = OPENSSL_malloc(z);
 | 
			
		||||
                if (!m) {
 | 
			
		||||
                    BIO_printf(bio_err, "Out of memory\n");
 | 
			
		||||
                    ERR_print_errors(bio_err);
 | 
			
		||||
                    goto end;
 | 
			
		||||
                }
 | 
			
		||||
 | 
			
		||||
                d = (unsigned char *)m;
 | 
			
		||||
                z = i2d_X509_NAME(X509_get_subject_name(x), &d);
 | 
			
		||||
@@ -816,7 +830,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
 | 
			
		||||
                OPENSSL_free(m);
 | 
			
		||||
            } else if (text == i) {
 | 
			
		||||
                X509_print_ex(out, x, nmflag, certflag);
 | 
			
		||||
                X509_print_ex(STDout, x, nmflag, certflag);
 | 
			
		||||
            } else if (startdate == i) {
 | 
			
		||||
                BIO_puts(STDout, "notBefore=");
 | 
			
		||||
                ASN1_TIME_print(STDout, X509_get_notBefore(x));
 | 
			
		||||
@@ -872,8 +886,9 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
 | 
			
		||||
                assert(need_rand);
 | 
			
		||||
                if (!x509_certify(ctx, CAfile, digest, x, xca,
 | 
			
		||||
                                  CApkey, CAserial, CA_createserial, days,
 | 
			
		||||
                                  clrext, extconf, extsect, sno))
 | 
			
		||||
                                  CApkey, sigopts,
 | 
			
		||||
                                  CAserial, CA_createserial, days, clrext,
 | 
			
		||||
                                  extconf, extsect, sno))
 | 
			
		||||
                    goto end;
 | 
			
		||||
            } else if (x509req == i) {
 | 
			
		||||
                EVP_PKEY *pk;
 | 
			
		||||
@@ -967,6 +982,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    X509_free(xca);
 | 
			
		||||
    EVP_PKEY_free(Upkey);
 | 
			
		||||
    EVP_PKEY_free(CApkey);
 | 
			
		||||
    if (sigopts)
 | 
			
		||||
        sk_OPENSSL_STRING_free(sigopts);
 | 
			
		||||
    X509_REQ_free(rq);
 | 
			
		||||
    ASN1_INTEGER_free(sno);
 | 
			
		||||
    sk_ASN1_OBJECT_pop_free(trust, ASN1_OBJECT_free);
 | 
			
		||||
@@ -1024,9 +1041,11 @@ static ASN1_INTEGER *x509_load_serial(char *CAfile, char *serialfile,
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static int x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest,
 | 
			
		||||
                        X509 *x, X509 *xca, EVP_PKEY *pkey, char *serialfile,
 | 
			
		||||
                        int create, int days, int clrext, CONF *conf,
 | 
			
		||||
                        char *section, ASN1_INTEGER *sno)
 | 
			
		||||
                        X509 *x, X509 *xca, EVP_PKEY *pkey,
 | 
			
		||||
                        STACK_OF(OPENSSL_STRING) *sigopts,
 | 
			
		||||
                        char *serialfile, int create,
 | 
			
		||||
                        int days, int clrext, CONF *conf, char *section,
 | 
			
		||||
                        ASN1_INTEGER *sno)
 | 
			
		||||
{
 | 
			
		||||
    int ret = 0;
 | 
			
		||||
    ASN1_INTEGER *bs = NULL;
 | 
			
		||||
@@ -1089,7 +1108,7 @@ static int x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest,
 | 
			
		||||
            goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (!X509_sign(x, pkey, digest))
 | 
			
		||||
    if (!do_X509_sign(bio_err, x, pkey, digest, sigopts))
 | 
			
		||||
        goto end;
 | 
			
		||||
    ret = 1;
 | 
			
		||||
 end:
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										96
									
								
								config
									
									
									
									
									
								
							
							
						
						
									
										96
									
								
								config
									
									
									
									
									
								
							@@ -370,6 +370,10 @@ case "${SYSTEM}:${RELEASE}:${VERSION}:${MACHINE}" in
 | 
			
		||||
    NONSTOP_KERNEL*)
 | 
			
		||||
       echo "nsr-tandem-nsk"; exit 0;
 | 
			
		||||
       ;;
 | 
			
		||||
 | 
			
		||||
    vxworks*)
 | 
			
		||||
       echo "${MACHINE}-whatever-vxworks"; exit 0;
 | 
			
		||||
       ;;
 | 
			
		||||
esac
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
@@ -407,23 +411,18 @@ exit 0
 | 
			
		||||
# this is where the translation occurs into SSLeay terms
 | 
			
		||||
# ---------------------------------------------------------------------------
 | 
			
		||||
 | 
			
		||||
GCCVER=`(gcc -dumpversion) 2>/dev/null`
 | 
			
		||||
if [ "$GCCVER" != "" ]; then
 | 
			
		||||
  # then strip off whatever prefix egcs prepends the number with...
 | 
			
		||||
  # Hopefully, this will work for any future prefixes as well.
 | 
			
		||||
  GCCVER=`echo $GCCVER | LC_ALL=C sed 's/^[a-zA-Z]*\-//'`
 | 
			
		||||
  # Since gcc 3.1 gcc --version behaviour has changed.  gcc -dumpversion
 | 
			
		||||
  # does give us what we want though, so we use that.  We just just the
 | 
			
		||||
  # major and minor version numbers.
 | 
			
		||||
  # peak single digit before and after first dot, e.g. 2.95.1 gives 29
 | 
			
		||||
  GCCVER=`echo $GCCVER | sed 's/\([0-9]\)\.\([0-9]\).*/\1\2/'`
 | 
			
		||||
fi
 | 
			
		||||
 | 
			
		||||
# Only set CC if not supplied already
 | 
			
		||||
if [ -z "$CC" ]; then
 | 
			
		||||
# figure out if gcc is available and if so we use it otherwise
 | 
			
		||||
# we fallback to whatever cc does on the system
 | 
			
		||||
if [ -z "$CROSS_COMPILE$CC" ]; then
 | 
			
		||||
  GCCVER=`sh -c "gcc -dumpversion" 2>/dev/null`
 | 
			
		||||
  if [ "$GCCVER" != "" ]; then
 | 
			
		||||
    # then strip off whatever prefix egcs prepends the number with...
 | 
			
		||||
    # Hopefully, this will work for any future prefixes as well.
 | 
			
		||||
    GCCVER=`echo $GCCVER | LC_ALL=C sed 's/^[a-zA-Z]*\-//'`
 | 
			
		||||
    # Since gcc 3.1 gcc --version behaviour has changed.  gcc -dumpversion
 | 
			
		||||
    # does give us what we want though, so we use that.  We just just the
 | 
			
		||||
    # major and minor version numbers.
 | 
			
		||||
    # peak single digit before and after first dot, e.g. 2.95.1 gives 29
 | 
			
		||||
    GCCVER=`echo $GCCVER | sed 's/\([0-9]\)\.\([0-9]\).*/\1\2/'`
 | 
			
		||||
    CC=gcc
 | 
			
		||||
  else
 | 
			
		||||
    CC=cc
 | 
			
		||||
@@ -539,7 +538,7 @@ case "$GUESSOS" in
 | 
			
		||||
  ppc-apple-rhapsody) OUT="rhapsody-ppc-cc" ;;
 | 
			
		||||
  ppc-apple-darwin*)
 | 
			
		||||
	ISA64=`(sysctl -n hw.optional.64bitops) 2>/dev/null`
 | 
			
		||||
	if [ "$ISA64" = "1" ]; then
 | 
			
		||||
	if [ "$ISA64" = "1" -a -z "$KERNEL_BITS" ]; then
 | 
			
		||||
	    echo "WARNING! If you wish to build 64-bit library, then you have to"
 | 
			
		||||
	    echo "         invoke './Configure darwin64-ppc-cc' *manually*."
 | 
			
		||||
	    if [ "$TEST" = "false" -a -t 1 ]; then
 | 
			
		||||
@@ -547,10 +546,14 @@ case "$GUESSOS" in
 | 
			
		||||
	      (trap "stty `stty -g`" 2 0; stty -icanon min 0 time 50; read waste) <&1
 | 
			
		||||
	    fi
 | 
			
		||||
	fi
 | 
			
		||||
	OUT="darwin-ppc-cc" ;;
 | 
			
		||||
	if [ "$ISA64" = "1" -a "$KERNEL_BITS" = "64" ]; then
 | 
			
		||||
	    OUT="darwin64-ppc-cc"
 | 
			
		||||
	else
 | 
			
		||||
	    OUT="darwin-ppc-cc"
 | 
			
		||||
	fi ;;
 | 
			
		||||
  i?86-apple-darwin*)
 | 
			
		||||
	ISA64=`(sysctl -n hw.optional.x86_64) 2>/dev/null`
 | 
			
		||||
	if [ "$ISA64" = "1" ]; then
 | 
			
		||||
	if [ "$ISA64" = "1" -a -z "$KERNEL_BITS" ]; then
 | 
			
		||||
	    echo "WARNING! If you wish to build 64-bit library, then you have to"
 | 
			
		||||
	    echo "         invoke './Configure darwin64-x86_64-cc' *manually*."
 | 
			
		||||
	    if [ "$TEST" = "false" -a -t 1 ]; then
 | 
			
		||||
@@ -558,7 +561,17 @@ case "$GUESSOS" in
 | 
			
		||||
	      (trap "stty `stty -g`" 2 0; stty -icanon min 0 time 50; read waste) <&1
 | 
			
		||||
	    fi
 | 
			
		||||
	fi
 | 
			
		||||
	OUT="darwin-i386-cc" ;;
 | 
			
		||||
	if [ "$ISA64" = "1" -a "$KERNEL_BITS" = "64" ]; then
 | 
			
		||||
	    OUT="darwin64-x86_64-cc"
 | 
			
		||||
	else
 | 
			
		||||
	    OUT="darwin-i386-cc"
 | 
			
		||||
	fi ;;
 | 
			
		||||
  armv6+7-*-iphoneos)
 | 
			
		||||
	options="$options -arch%20armv6 -arch%20armv7"
 | 
			
		||||
	OUT="iphoneos-cross" ;;
 | 
			
		||||
  *-*-iphoneos)
 | 
			
		||||
	options="$options -arch%20${MACHINE}"
 | 
			
		||||
	OUT="iphoneos-cross" ;;
 | 
			
		||||
  alpha-*-linux2)
 | 
			
		||||
        ISA=`awk '/cpu model/{print$4;exit(0);}' /proc/cpuinfo`
 | 
			
		||||
	case ${ISA:-generic} in
 | 
			
		||||
@@ -583,6 +596,11 @@ case "$GUESSOS" in
 | 
			
		||||
	OUT="linux-ppc"
 | 
			
		||||
	;;
 | 
			
		||||
  ppc-*-linux2) OUT="linux-ppc" ;;
 | 
			
		||||
  ppc60x-*-vxworks*) OUT="vxworks-ppc60x" ;;
 | 
			
		||||
  ppcgen-*-vxworks*) OUT="vxworks-ppcgen" ;;
 | 
			
		||||
  pentium-*-vxworks*) OUT="vxworks-pentium" ;;
 | 
			
		||||
  simlinux-*-vxworks*) OUT="vxworks-simlinux" ;;
 | 
			
		||||
  mips-*-vxworks*) OUT="vxworks-mips";;
 | 
			
		||||
  ia64-*-linux?) OUT="linux-ia64" ;;
 | 
			
		||||
  sparc64-*-linux2)
 | 
			
		||||
	echo "WARNING! If you *know* that your GNU C supports 64-bit/V9 ABI"
 | 
			
		||||
@@ -624,12 +642,24 @@ case "$GUESSOS" in
 | 
			
		||||
	options="$options -DB_ENDIAN -mschedule=$CPUSCHEDULE -march=$CPUARCH"
 | 
			
		||||
	OUT="linux-generic32" ;;
 | 
			
		||||
  armv[1-3]*-*-linux2) OUT="linux-generic32" ;;
 | 
			
		||||
  armv[7-9]*-*-linux2) OUT="linux-armv4"; options="$options -march=armv7-a" ;;
 | 
			
		||||
  arm*-*-linux2) OUT="linux-armv4" ;;
 | 
			
		||||
  sh*b-*-linux2) OUT="linux-generic32"; options="$options -DB_ENDIAN" ;;
 | 
			
		||||
  sh*-*-linux2)  OUT="linux-generic32"; options="$options -DL_ENDIAN" ;;
 | 
			
		||||
  m68k*-*-linux2) OUT="linux-generic32"; options="$options -DB_ENDIAN" ;;
 | 
			
		||||
  s390-*-linux2) OUT="linux-generic32"; options="$options -DB_ENDIAN" ;;
 | 
			
		||||
  s390x-*-linux2) OUT="linux-s390x" ;;
 | 
			
		||||
  s390x-*-linux2)
 | 
			
		||||
	# To be uncommented when glibc bug is fixed, see Configure...
 | 
			
		||||
	#if egrep -e '^features.* highgprs' /proc/cpuinfo >/dev/null ; then
 | 
			
		||||
	#  echo "WARNING! If you wish to build \"highgprs\" 32-bit library, then you"
 | 
			
		||||
	#  echo "         have to invoke './Configure linux32-s390x' *manually*."
 | 
			
		||||
	#  if [ "$TEST" = "false" -a -t -1 ]; then
 | 
			
		||||
	#    echo "         You have about 5 seconds to press Ctrl-C to abort."
 | 
			
		||||
	#    (trap "stty `stty -g`" 2 0; stty -icanon min 0 time 50; read waste) <&1
 | 
			
		||||
	#  fi
 | 
			
		||||
	#fi
 | 
			
		||||
	OUT="linux64-s390x"
 | 
			
		||||
	;;
 | 
			
		||||
  x86_64-*-linux?) OUT="linux-x86_64" ;;
 | 
			
		||||
  *86-*-linux2) OUT="linux-elf"
 | 
			
		||||
	if [ "$GCCVER" -gt 28 ]; then
 | 
			
		||||
@@ -648,7 +678,7 @@ case "$GUESSOS" in
 | 
			
		||||
  sun4[uv]*-*-solaris2)
 | 
			
		||||
	OUT="solaris-sparcv9-$CC"
 | 
			
		||||
	ISA64=`(isalist) 2>/dev/null | grep sparcv9`
 | 
			
		||||
	if [ "$ISA64" != "" ]; then
 | 
			
		||||
	if [ "$ISA64" != "" -a "$KERNEL_BITS" = "" ]; then
 | 
			
		||||
	    if [ "$CC" = "cc" -a $CCVER -ge 50 ]; then
 | 
			
		||||
		echo "WARNING! If you wish to build 64-bit library, then you have to"
 | 
			
		||||
		echo "         invoke './Configure solaris64-sparcv9-cc' *manually*."
 | 
			
		||||
@@ -678,13 +708,16 @@ case "$GUESSOS" in
 | 
			
		||||
		fi
 | 
			
		||||
	    fi
 | 
			
		||||
	fi
 | 
			
		||||
	if [ "$ISA64" != "" -a "$KERNEL_BITS" = "64" ]; then
 | 
			
		||||
	    OUT="solaris64-sparcv9-$CC"
 | 
			
		||||
	fi
 | 
			
		||||
	;;
 | 
			
		||||
  sun4m-*-solaris2)	OUT="solaris-sparcv8-$CC" ;;
 | 
			
		||||
  sun4d-*-solaris2)	OUT="solaris-sparcv8-$CC" ;;
 | 
			
		||||
  sun4*-*-solaris2)	OUT="solaris-sparcv7-$CC" ;;
 | 
			
		||||
  *86*-*-solaris2)
 | 
			
		||||
	ISA64=`(isalist) 2>/dev/null | grep amd64`
 | 
			
		||||
	if [ "$ISA64" != "" ]; then
 | 
			
		||||
	if [ "$ISA64" != "" -a ${KERNEL_BITS:-64} -eq 64 ]; then
 | 
			
		||||
	    OUT="solaris64-x86_64-$CC"
 | 
			
		||||
	else
 | 
			
		||||
	    OUT="solaris-x86-$CC"
 | 
			
		||||
@@ -736,20 +769,17 @@ case "$GUESSOS" in
 | 
			
		||||
	if [ $CC = "gcc" -a $GCC_BITS = "64" ]; then
 | 
			
		||||
	    OUT="hpux64-parisc2-gcc"
 | 
			
		||||
	fi
 | 
			
		||||
	KERNEL_BITS=`(getconf KERNEL_BITS) 2>/dev/null`
 | 
			
		||||
	[ "$KERNEL_BITS" ] || KERNEL_BITS=`(getconf KERNEL_BITS) 2>/dev/null`
 | 
			
		||||
	KERNEL_BITS=${KERNEL_BITS:-32}
 | 
			
		||||
	CPU_VERSION=`(getconf CPU_VERSION) 2>/dev/null`
 | 
			
		||||
	CPU_VERSION=${CPU_VERSION:-0}
 | 
			
		||||
	# See <sys/unistd.h> for further info on CPU_VERSION.
 | 
			
		||||
	if   [ $CPU_VERSION -ge 768 ]; then	# IA-64 CPU
 | 
			
		||||
	     echo "WARNING! 64-bit ABI is the default configured ABI on HP-UXi."
 | 
			
		||||
	     echo "         If you wish to build 32-bit library, the you have to"
 | 
			
		||||
	     echo "         invoke './Configure hpux-ia64-cc' *manually*."
 | 
			
		||||
	     if [ "$TEST" = "false" -a -t 1 ]; then
 | 
			
		||||
		echo "         You have about 5 seconds to press Ctrl-C to abort."
 | 
			
		||||
		(trap "stty `stty -g`" 2 0; stty -icanon min 0 time 50; read waste) <&1
 | 
			
		||||
	     fi
 | 
			
		||||
	     OUT="hpux64-ia64-cc"
 | 
			
		||||
	     if [ $KERNEL_BITS -eq 64 -a "$CC" = "cc" ]; then
 | 
			
		||||
	        OUT="hpux64-ia64-cc"
 | 
			
		||||
             else
 | 
			
		||||
	        OUT="hpux-ia64-cc"
 | 
			
		||||
             fi
 | 
			
		||||
	elif [ $CPU_VERSION -ge 532 ]; then	# PA-RISC 2.x CPU
 | 
			
		||||
	     OUT=${OUT:-"hpux-parisc2-${CC}"}
 | 
			
		||||
	     if [ $KERNEL_BITS -eq 64 -a "$CC" = "cc" ]; then
 | 
			
		||||
@@ -770,7 +800,7 @@ case "$GUESSOS" in
 | 
			
		||||
	options="$options -D_REENTRANT" ;;
 | 
			
		||||
  *-hpux)	OUT="hpux-parisc-$CC" ;;
 | 
			
		||||
  *-aix)
 | 
			
		||||
	KERNEL_BITS=`(getconf KERNEL_BITMODE) 2>/dev/null`
 | 
			
		||||
	[ "$KERNEL_BITS" ] || KERNEL_BITS=`(getconf KERNEL_BITMODE) 2>/dev/null`
 | 
			
		||||
	KERNEL_BITS=${KERNEL_BITS:-32}
 | 
			
		||||
	OBJECT_MODE=${OBJECT_MODE:-32}
 | 
			
		||||
	if [ "$CC" = "gcc" ]; then
 | 
			
		||||
@@ -810,6 +840,8 @@ case "$GUESSOS" in
 | 
			
		||||
  beos-*) OUT="$GUESSOS" ;;
 | 
			
		||||
  x86pc-*-qnx6) OUT="QNX6-i386" ;;
 | 
			
		||||
  *-*-qnx6) OUT="QNX6" ;;
 | 
			
		||||
  x86-*-android|i?86-*-android) OUT="android-x86" ;;
 | 
			
		||||
  armv[7-9]*-*-android) OUT="android-armv7" ;;
 | 
			
		||||
  *) OUT=`echo $GUESSOS | awk -F- '{print $3}'`;;
 | 
			
		||||
esac
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -7,7 +7,7 @@ TOP=		..
 | 
			
		||||
CC=		cc
 | 
			
		||||
INCLUDE=	-I. -I$(TOP) -I../include $(ZLIB_INCLUDE)
 | 
			
		||||
# INCLUDES targets sudbirs!
 | 
			
		||||
INCLUDES=	-I.. -I../.. -I../asn1 -I../evp -I../../include $(ZLIB_INCLUDE)
 | 
			
		||||
INCLUDES=	-I.. -I../.. -I../modes -I../asn1 -I../evp -I../../include $(ZLIB_INCLUDE)
 | 
			
		||||
CFLAG=		-g
 | 
			
		||||
MAKEDEPPROG=	makedepend
 | 
			
		||||
MAKEDEPEND=	$(TOP)/util/domd $(TOP) -MD $(MAKEDEPPROG)
 | 
			
		||||
@@ -35,8 +35,10 @@ TEST=constant_time_test.c
 | 
			
		||||
 | 
			
		||||
LIB= $(TOP)/libcrypto.a
 | 
			
		||||
SHARED_LIB= libcrypto$(SHLIB_EXT)
 | 
			
		||||
LIBSRC=	cryptlib.c mem.c mem_clr.c mem_dbg.c cversion.c ex_data.c cpt_err.c ebcdic.c uid.c o_time.c o_str.c o_dir.c
 | 
			
		||||
LIBOBJ= cryptlib.o mem.o mem_dbg.o cversion.o ex_data.o cpt_err.o ebcdic.o uid.o o_time.o o_str.o o_dir.o $(CPUID_OBJ)
 | 
			
		||||
LIBSRC=	cryptlib.c mem.c mem_clr.c mem_dbg.c cversion.c ex_data.c cpt_err.c \
 | 
			
		||||
	ebcdic.c uid.c o_time.c o_str.c o_dir.c o_fips.c o_init.c fips_ers.c
 | 
			
		||||
LIBOBJ= cryptlib.o mem.o mem_dbg.o cversion.o ex_data.o cpt_err.o ebcdic.o \
 | 
			
		||||
	uid.o o_time.o o_str.o o_dir.o o_fips.o o_init.o fips_ers.o $(CPUID_OBJ)
 | 
			
		||||
 | 
			
		||||
SRC= $(LIBSRC)
 | 
			
		||||
 | 
			
		||||
@@ -64,16 +66,17 @@ applink.o:	$(TOP)/ms/applink.c
 | 
			
		||||
uplink.o:	$(TOP)/ms/uplink.c applink.o
 | 
			
		||||
	$(CC) $(CFLAGS) -c -o $@ $(TOP)/ms/uplink.c
 | 
			
		||||
 | 
			
		||||
uplink-cof.s:	$(TOP)/ms/uplink.pl
 | 
			
		||||
	$(PERL) $(TOP)/ms/uplink.pl coff > $@
 | 
			
		||||
uplink-x86.s:	$(TOP)/ms/uplink-x86.pl
 | 
			
		||||
	$(PERL) $(TOP)/ms/uplink-x86.pl $(PERLASM_SCHEME) > $@
 | 
			
		||||
 | 
			
		||||
x86_64cpuid.s: x86_64cpuid.pl
 | 
			
		||||
	$(PERL) x86_64cpuid.pl $(PERLASM_SCHEME) > $@
 | 
			
		||||
ia64cpuid.s: ia64cpuid.S
 | 
			
		||||
	$(CC) $(CFLAGS) -E ia64cpuid.S > $@
 | 
			
		||||
x86_64cpuid.s: x86_64cpuid.pl;	$(PERL) x86_64cpuid.pl $(PERLASM_SCHEME) > $@
 | 
			
		||||
ia64cpuid.s: ia64cpuid.S;	$(CC) $(CFLAGS) -E ia64cpuid.S > $@
 | 
			
		||||
ppccpuid.s:	ppccpuid.pl;	$(PERL) ppccpuid.pl $(PERLASM_SCHEME) $@
 | 
			
		||||
pariscid.s:	pariscid.pl;	$(PERL) pariscid.pl $(PERLASM_SCHEME) $@
 | 
			
		||||
alphacpuid.s:	alphacpuid.pl
 | 
			
		||||
	$(PERL) $< | $(CC) -E - | tee $@ > /dev/null
 | 
			
		||||
	(preproc=/tmp/$$$$.$@; trap "rm $$preproc" INT; \
 | 
			
		||||
	$(PERL) alphacpuid.pl > $$preproc && \
 | 
			
		||||
	$(CC) -E $$preproc > $@ && rm $$preproc)
 | 
			
		||||
 | 
			
		||||
testapps:
 | 
			
		||||
	[ -z "$(THIS)" ] || (	if echo $(SDIRS) | fgrep ' des '; \
 | 
			
		||||
@@ -99,6 +102,7 @@ lib:	$(LIB)
 | 
			
		||||
	@touch lib
 | 
			
		||||
$(LIB):	$(LIBOBJ)
 | 
			
		||||
	$(AR) $(LIB) $(LIBOBJ)
 | 
			
		||||
	[ -z "$(FIPSLIBDIR)" ] || $(AR) $(LIB) $(FIPSLIBDIR)fipscanister.o
 | 
			
		||||
	$(RANLIB) $(LIB) || echo Never mind.
 | 
			
		||||
 | 
			
		||||
shared: buildinf.h lib subdirs
 | 
			
		||||
@@ -173,6 +177,7 @@ ex_data.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
 | 
			
		||||
ex_data.o: ../include/openssl/ossl_typ.h ../include/openssl/safestack.h
 | 
			
		||||
ex_data.o: ../include/openssl/stack.h ../include/openssl/symhacks.h cryptlib.h
 | 
			
		||||
ex_data.o: ex_data.c
 | 
			
		||||
fips_ers.o: ../include/openssl/opensslconf.h fips_ers.c
 | 
			
		||||
mem.o: ../e_os.h ../include/openssl/bio.h ../include/openssl/buffer.h
 | 
			
		||||
mem.o: ../include/openssl/crypto.h ../include/openssl/e_os2.h
 | 
			
		||||
mem.o: ../include/openssl/err.h ../include/openssl/lhash.h
 | 
			
		||||
@@ -193,6 +198,19 @@ mem_dbg.o: ../include/openssl/stack.h ../include/openssl/symhacks.h cryptlib.h
 | 
			
		||||
mem_dbg.o: mem_dbg.c
 | 
			
		||||
o_dir.o: ../e_os.h ../include/openssl/e_os2.h ../include/openssl/opensslconf.h
 | 
			
		||||
o_dir.o: LPdir_unix.c o_dir.c o_dir.h
 | 
			
		||||
o_fips.o: ../e_os.h ../include/openssl/bio.h ../include/openssl/buffer.h
 | 
			
		||||
o_fips.o: ../include/openssl/crypto.h ../include/openssl/e_os2.h
 | 
			
		||||
o_fips.o: ../include/openssl/err.h ../include/openssl/lhash.h
 | 
			
		||||
o_fips.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
 | 
			
		||||
o_fips.o: ../include/openssl/ossl_typ.h ../include/openssl/safestack.h
 | 
			
		||||
o_fips.o: ../include/openssl/stack.h ../include/openssl/symhacks.h cryptlib.h
 | 
			
		||||
o_fips.o: o_fips.c
 | 
			
		||||
o_init.o: ../e_os.h ../include/openssl/bio.h ../include/openssl/crypto.h
 | 
			
		||||
o_init.o: ../include/openssl/e_os2.h ../include/openssl/err.h
 | 
			
		||||
o_init.o: ../include/openssl/lhash.h ../include/openssl/opensslconf.h
 | 
			
		||||
o_init.o: ../include/openssl/opensslv.h ../include/openssl/ossl_typ.h
 | 
			
		||||
o_init.o: ../include/openssl/safestack.h ../include/openssl/stack.h
 | 
			
		||||
o_init.o: ../include/openssl/symhacks.h o_init.c
 | 
			
		||||
o_str.o: ../e_os.h ../include/openssl/e_os2.h ../include/openssl/opensslconf.h
 | 
			
		||||
o_str.o: o_str.c o_str.h
 | 
			
		||||
o_time.o: ../include/openssl/e_os2.h ../include/openssl/opensslconf.h o_time.c
 | 
			
		||||
 
 | 
			
		||||
@@ -50,9 +50,21 @@ aes-ia64.s: asm/aes-ia64.S
 | 
			
		||||
 | 
			
		||||
aes-586.s:	asm/aes-586.pl ../perlasm/x86asm.pl
 | 
			
		||||
	$(PERL) asm/aes-586.pl $(PERLASM_SCHEME) $(CFLAGS) $(PROCESSOR) > $@
 | 
			
		||||
vpaes-x86.s:	asm/vpaes-x86.pl ../perlasm/x86asm.pl
 | 
			
		||||
	$(PERL) asm/vpaes-x86.pl $(PERLASM_SCHEME) $(CFLAGS) $(PROCESSOR) > $@
 | 
			
		||||
aesni-x86.s:	asm/aesni-x86.pl ../perlasm/x86asm.pl
 | 
			
		||||
	$(PERL) asm/aesni-x86.pl $(PERLASM_SCHEME) $(CFLAGS) $(PROCESSOR) > $@
 | 
			
		||||
 | 
			
		||||
aes-x86_64.s: asm/aes-x86_64.pl
 | 
			
		||||
	$(PERL) asm/aes-x86_64.pl $(PERLASM_SCHEME) > $@
 | 
			
		||||
vpaes-x86_64.s:	asm/vpaes-x86_64.pl
 | 
			
		||||
	$(PERL) asm/vpaes-x86_64.pl $(PERLASM_SCHEME) > $@
 | 
			
		||||
bsaes-x86_64.s:	asm/bsaes-x86_64.pl
 | 
			
		||||
	$(PERL) asm/bsaes-x86_64.pl $(PERLASM_SCHEME) > $@
 | 
			
		||||
aesni-x86_64.s: asm/aesni-x86_64.pl
 | 
			
		||||
	$(PERL) asm/aesni-x86_64.pl $(PERLASM_SCHEME) > $@
 | 
			
		||||
aesni-sha1-x86_64.s:	asm/aesni-sha1-x86_64.pl
 | 
			
		||||
	$(PERL) asm/aesni-sha1-x86_64.pl $(PERLASM_SCHEME) > $@
 | 
			
		||||
 | 
			
		||||
aes-sparcv9.s: asm/aes-sparcv9.pl
 | 
			
		||||
	$(PERL) asm/aes-sparcv9.pl $(CFLAGS) > $@
 | 
			
		||||
@@ -60,8 +72,15 @@ aes-sparcv9.s: asm/aes-sparcv9.pl
 | 
			
		||||
aes-ppc.s:	asm/aes-ppc.pl
 | 
			
		||||
	$(PERL) asm/aes-ppc.pl $(PERLASM_SCHEME) $@
 | 
			
		||||
 | 
			
		||||
aes-parisc.s:	asm/aes-parisc.pl
 | 
			
		||||
	$(PERL) asm/aes-parisc.pl $(PERLASM_SCHEME) $@
 | 
			
		||||
 | 
			
		||||
aes-mips.S:	asm/aes-mips.pl
 | 
			
		||||
	$(PERL) asm/aes-mips.pl $(PERLASM_SCHEME) $@
 | 
			
		||||
 | 
			
		||||
# GNU make "catch all"
 | 
			
		||||
aes-%.s:	asm/aes-%.pl;	$(PERL) $< $(CFLAGS) > $@
 | 
			
		||||
aes-%.S:	asm/aes-%.pl;	$(PERL) $< $(PERLASM_SCHEME) > $@
 | 
			
		||||
aes-armv4.o:	aes-armv4.S
 | 
			
		||||
 | 
			
		||||
files:
 | 
			
		||||
	$(PERL) $(TOP)/util/files.pl Makefile >> $(TOP)/MINFO
 | 
			
		||||
@@ -119,9 +138,11 @@ aes_ige.o: ../../include/openssl/lhash.h ../../include/openssl/opensslconf.h
 | 
			
		||||
aes_ige.o: ../../include/openssl/opensslv.h ../../include/openssl/ossl_typ.h
 | 
			
		||||
aes_ige.o: ../../include/openssl/safestack.h ../../include/openssl/stack.h
 | 
			
		||||
aes_ige.o: ../../include/openssl/symhacks.h ../cryptlib.h aes_ige.c aes_locl.h
 | 
			
		||||
aes_misc.o: ../../include/openssl/aes.h ../../include/openssl/e_os2.h
 | 
			
		||||
aes_misc.o: ../../include/openssl/opensslconf.h
 | 
			
		||||
aes_misc.o: ../../include/openssl/opensslv.h aes_locl.h aes_misc.c
 | 
			
		||||
aes_misc.o: ../../include/openssl/aes.h ../../include/openssl/crypto.h
 | 
			
		||||
aes_misc.o: ../../include/openssl/e_os2.h ../../include/openssl/opensslconf.h
 | 
			
		||||
aes_misc.o: ../../include/openssl/opensslv.h ../../include/openssl/ossl_typ.h
 | 
			
		||||
aes_misc.o: ../../include/openssl/safestack.h ../../include/openssl/stack.h
 | 
			
		||||
aes_misc.o: ../../include/openssl/symhacks.h aes_locl.h aes_misc.c
 | 
			
		||||
aes_ofb.o: ../../include/openssl/aes.h ../../include/openssl/modes.h
 | 
			
		||||
aes_ofb.o: ../../include/openssl/opensslconf.h aes_ofb.c
 | 
			
		||||
aes_wrap.o: ../../e_os.h ../../include/openssl/aes.h
 | 
			
		||||
 
 | 
			
		||||
@@ -92,6 +92,11 @@ int AES_set_encrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
int AES_set_decrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
                        AES_KEY *key);
 | 
			
		||||
 | 
			
		||||
int private_AES_set_encrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
                                AES_KEY *key);
 | 
			
		||||
int private_AES_set_decrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
                                AES_KEY *key);
 | 
			
		||||
 | 
			
		||||
void AES_encrypt(const unsigned char *in, unsigned char *out,
 | 
			
		||||
                 const AES_KEY *key);
 | 
			
		||||
void AES_decrypt(const unsigned char *in, unsigned char *out,
 | 
			
		||||
 
 | 
			
		||||
@@ -625,8 +625,8 @@ static const u32 rcon[] = {
 | 
			
		||||
/**
 | 
			
		||||
 * Expand the cipher key into the encryption key schedule.
 | 
			
		||||
 */
 | 
			
		||||
int AES_set_encrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
                        AES_KEY *key)
 | 
			
		||||
int private_AES_set_encrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
                                AES_KEY *key)
 | 
			
		||||
{
 | 
			
		||||
 | 
			
		||||
    u32 *rk;
 | 
			
		||||
@@ -727,8 +727,8 @@ int AES_set_encrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
/**
 | 
			
		||||
 * Expand the cipher key into the decryption key schedule.
 | 
			
		||||
 */
 | 
			
		||||
int AES_set_decrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
                        AES_KEY *key)
 | 
			
		||||
int private_AES_set_decrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
                                AES_KEY *key)
 | 
			
		||||
{
 | 
			
		||||
 | 
			
		||||
    u32 *rk;
 | 
			
		||||
@@ -736,7 +736,7 @@ int AES_set_decrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
    u32 temp;
 | 
			
		||||
 | 
			
		||||
    /* first, start with an encryption schedule */
 | 
			
		||||
    status = AES_set_encrypt_key(userKey, bits, key);
 | 
			
		||||
    status = private_AES_set_encrypt_key(userKey, bits, key);
 | 
			
		||||
    if (status < 0)
 | 
			
		||||
        return status;
 | 
			
		||||
 | 
			
		||||
@@ -1130,31 +1130,31 @@ void AES_decrypt(const unsigned char *in, unsigned char *out,
 | 
			
		||||
     * map cipher state to byte array block:
 | 
			
		||||
     */
 | 
			
		||||
    s0 =
 | 
			
		||||
        (Td4[(t0 >> 24)       ] << 24) ^
 | 
			
		||||
        (Td4[(t3 >> 16) & 0xff] << 16) ^
 | 
			
		||||
        (Td4[(t2 >>  8) & 0xff] <<  8) ^
 | 
			
		||||
        (Td4[(t1      ) & 0xff])       ^
 | 
			
		||||
        ((u32)Td4[(t0 >> 24)       ] << 24) ^
 | 
			
		||||
        ((u32)Td4[(t3 >> 16) & 0xff] << 16) ^
 | 
			
		||||
        ((u32)Td4[(t2 >>  8) & 0xff] <<  8) ^
 | 
			
		||||
        ((u32)Td4[(t1      ) & 0xff])       ^
 | 
			
		||||
        rk[0];
 | 
			
		||||
    PUTU32(out     , s0);
 | 
			
		||||
    s1 =
 | 
			
		||||
        (Td4[(t1 >> 24)       ] << 24) ^
 | 
			
		||||
        (Td4[(t0 >> 16) & 0xff] << 16) ^
 | 
			
		||||
        (Td4[(t3 >>  8) & 0xff] <<  8) ^
 | 
			
		||||
        (Td4[(t2      ) & 0xff])       ^
 | 
			
		||||
        ((u32)Td4[(t1 >> 24)       ] << 24) ^
 | 
			
		||||
        ((u32)Td4[(t0 >> 16) & 0xff] << 16) ^
 | 
			
		||||
        ((u32)Td4[(t3 >>  8) & 0xff] <<  8) ^
 | 
			
		||||
        ((u32)Td4[(t2      ) & 0xff])       ^
 | 
			
		||||
        rk[1];
 | 
			
		||||
    PUTU32(out +  4, s1);
 | 
			
		||||
    s2 =
 | 
			
		||||
        (Td4[(t2 >> 24)       ] << 24) ^
 | 
			
		||||
        (Td4[(t1 >> 16) & 0xff] << 16) ^
 | 
			
		||||
        (Td4[(t0 >>  8) & 0xff] <<  8) ^
 | 
			
		||||
        (Td4[(t3      ) & 0xff])       ^
 | 
			
		||||
        ((u32)Td4[(t2 >> 24)       ] << 24) ^
 | 
			
		||||
        ((u32)Td4[(t1 >> 16) & 0xff] << 16) ^
 | 
			
		||||
        ((u32)Td4[(t0 >>  8) & 0xff] <<  8) ^
 | 
			
		||||
        ((u32)Td4[(t3      ) & 0xff])       ^
 | 
			
		||||
        rk[2];
 | 
			
		||||
    PUTU32(out +  8, s2);
 | 
			
		||||
    s3 =
 | 
			
		||||
        (Td4[(t3 >> 24)       ] << 24) ^
 | 
			
		||||
        (Td4[(t2 >> 16) & 0xff] << 16) ^
 | 
			
		||||
        (Td4[(t1 >>  8) & 0xff] <<  8) ^
 | 
			
		||||
        (Td4[(t0      ) & 0xff])       ^
 | 
			
		||||
        ((u32)Td4[(t3 >> 24)       ] << 24) ^
 | 
			
		||||
        ((u32)Td4[(t2 >> 16) & 0xff] << 16) ^
 | 
			
		||||
        ((u32)Td4[(t1 >>  8) & 0xff] <<  8) ^
 | 
			
		||||
        ((u32)Td4[(t0      ) & 0xff])       ^
 | 
			
		||||
        rk[3];
 | 
			
		||||
    PUTU32(out + 12, s3);
 | 
			
		||||
}
 | 
			
		||||
@@ -1204,8 +1204,8 @@ static const u32 rcon[] = {
 | 
			
		||||
/**
 | 
			
		||||
 * Expand the cipher key into the encryption key schedule.
 | 
			
		||||
 */
 | 
			
		||||
int AES_set_encrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
                        AES_KEY *key)
 | 
			
		||||
int private_AES_set_encrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
                                AES_KEY *key)
 | 
			
		||||
{
 | 
			
		||||
    u32 *rk;
 | 
			
		||||
   	int i = 0;
 | 
			
		||||
@@ -1233,10 +1233,10 @@ int AES_set_encrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
        while (1) {
 | 
			
		||||
            temp  = rk[3];
 | 
			
		||||
            rk[4] = rk[0] ^
 | 
			
		||||
                (Te4[(temp >> 16) & 0xff] << 24) ^
 | 
			
		||||
                (Te4[(temp >>  8) & 0xff] << 16) ^
 | 
			
		||||
                (Te4[(temp      ) & 0xff] << 8) ^
 | 
			
		||||
                (Te4[(temp >> 24)       ]) ^
 | 
			
		||||
                ((u32)Te4[(temp >> 16) & 0xff] << 24) ^
 | 
			
		||||
                ((u32)Te4[(temp >>  8) & 0xff] << 16) ^
 | 
			
		||||
                ((u32)Te4[(temp      ) & 0xff] << 8) ^
 | 
			
		||||
                ((u32)Te4[(temp >> 24)       ]) ^
 | 
			
		||||
                rcon[i];
 | 
			
		||||
            rk[5] = rk[1] ^ rk[4];
 | 
			
		||||
            rk[6] = rk[2] ^ rk[5];
 | 
			
		||||
@@ -1253,10 +1253,10 @@ int AES_set_encrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
        while (1) {
 | 
			
		||||
            temp = rk[ 5];
 | 
			
		||||
            rk[ 6] = rk[ 0] ^
 | 
			
		||||
                (Te4[(temp >> 16) & 0xff] << 24) ^
 | 
			
		||||
                (Te4[(temp >>  8) & 0xff] << 16) ^
 | 
			
		||||
                (Te4[(temp      ) & 0xff] << 8) ^
 | 
			
		||||
                (Te4[(temp >> 24)       ]) ^
 | 
			
		||||
                ((u32)Te4[(temp >> 16) & 0xff] << 24) ^
 | 
			
		||||
                ((u32)Te4[(temp >>  8) & 0xff] << 16) ^
 | 
			
		||||
                ((u32)Te4[(temp      ) & 0xff] << 8) ^
 | 
			
		||||
                ((u32)Te4[(temp >> 24)       ]) ^
 | 
			
		||||
                rcon[i];
 | 
			
		||||
            rk[ 7] = rk[ 1] ^ rk[ 6];
 | 
			
		||||
            rk[ 8] = rk[ 2] ^ rk[ 7];
 | 
			
		||||
@@ -1275,10 +1275,10 @@ int AES_set_encrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
        while (1) {
 | 
			
		||||
            temp = rk[ 7];
 | 
			
		||||
            rk[ 8] = rk[ 0] ^
 | 
			
		||||
                (Te4[(temp >> 16) & 0xff] << 24) ^
 | 
			
		||||
                (Te4[(temp >>  8) & 0xff] << 16) ^
 | 
			
		||||
                (Te4[(temp      ) & 0xff] << 8) ^
 | 
			
		||||
                (Te4[(temp >> 24)       ]) ^
 | 
			
		||||
                ((u32)Te4[(temp >> 16) & 0xff] << 24) ^
 | 
			
		||||
                ((u32)Te4[(temp >>  8) & 0xff] << 16) ^
 | 
			
		||||
                ((u32)Te4[(temp      ) & 0xff] << 8) ^
 | 
			
		||||
                ((u32)Te4[(temp >> 24)       ]) ^
 | 
			
		||||
                rcon[i];
 | 
			
		||||
            rk[ 9] = rk[ 1] ^ rk[ 8];
 | 
			
		||||
            rk[10] = rk[ 2] ^ rk[ 9];
 | 
			
		||||
@@ -1288,10 +1288,10 @@ int AES_set_encrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
            }
 | 
			
		||||
            temp = rk[11];
 | 
			
		||||
            rk[12] = rk[ 4] ^
 | 
			
		||||
                (Te4[(temp >> 24)       ] << 24) ^
 | 
			
		||||
                (Te4[(temp >> 16) & 0xff] << 16) ^
 | 
			
		||||
                (Te4[(temp >>  8) & 0xff] << 8) ^
 | 
			
		||||
                (Te4[(temp      ) & 0xff]);
 | 
			
		||||
                ((u32)Te4[(temp >> 24)       ] << 24) ^
 | 
			
		||||
                ((u32)Te4[(temp >> 16) & 0xff] << 16) ^
 | 
			
		||||
                ((u32)Te4[(temp >>  8) & 0xff] << 8) ^
 | 
			
		||||
                ((u32)Te4[(temp      ) & 0xff]);
 | 
			
		||||
            rk[13] = rk[ 5] ^ rk[12];
 | 
			
		||||
            rk[14] = rk[ 6] ^ rk[13];
 | 
			
		||||
            rk[15] = rk[ 7] ^ rk[14];
 | 
			
		||||
@@ -1305,15 +1305,16 @@ int AES_set_encrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
/**
 | 
			
		||||
 * Expand the cipher key into the decryption key schedule.
 | 
			
		||||
 */
 | 
			
		||||
int AES_set_decrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
                        AES_KEY *key)
 | 
			
		||||
int private_AES_set_decrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
                                AES_KEY *key)
 | 
			
		||||
{
 | 
			
		||||
 | 
			
		||||
    u32 *rk;
 | 
			
		||||
    int i, j, status;
 | 
			
		||||
    u32 temp;
 | 
			
		||||
 | 
			
		||||
    /* first, start with an encryption schedule */
 | 
			
		||||
    status = AES_set_encrypt_key(userKey, bits, key);
 | 
			
		||||
    status = private_AES_set_encrypt_key(userKey, bits, key);
 | 
			
		||||
    if (status < 0)
 | 
			
		||||
        return status;
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -50,6 +50,7 @@
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
#include <openssl/opensslv.h>
 | 
			
		||||
#include <openssl/crypto.h>
 | 
			
		||||
#include <openssl/aes.h>
 | 
			
		||||
#include "aes_locl.h"
 | 
			
		||||
 | 
			
		||||
@@ -63,3 +64,23 @@ const char *AES_options(void)
 | 
			
		||||
    return "aes(partial)";
 | 
			
		||||
#endif
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
/* FIPS wrapper functions to block low level AES calls in FIPS mode */
 | 
			
		||||
 | 
			
		||||
int AES_set_encrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
                        AES_KEY *key)
 | 
			
		||||
{
 | 
			
		||||
#ifdef OPENSSL_FIPS
 | 
			
		||||
    fips_cipher_abort(AES);
 | 
			
		||||
#endif
 | 
			
		||||
    return private_AES_set_encrypt_key(userKey, bits, key);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
int AES_set_decrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
                        AES_KEY *key)
 | 
			
		||||
{
 | 
			
		||||
#ifdef OPENSSL_FIPS
 | 
			
		||||
    fips_cipher_abort(AES);
 | 
			
		||||
#endif
 | 
			
		||||
    return private_AES_set_decrypt_key(userKey, bits, key);
 | 
			
		||||
}
 | 
			
		||||
 
 | 
			
		||||
@@ -497,10 +497,10 @@ int AES_set_encrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
        while (1) {
 | 
			
		||||
            temp  = rk[3];
 | 
			
		||||
            rk[4] = rk[0] ^
 | 
			
		||||
                (Te4[(temp >>  8) & 0xff]      ) ^
 | 
			
		||||
                (Te4[(temp >> 16) & 0xff] <<  8) ^
 | 
			
		||||
                (Te4[(temp >> 24)       ] << 16) ^
 | 
			
		||||
                (Te4[(temp      ) & 0xff] << 24) ^
 | 
			
		||||
                ((u32)Te4[(temp >>  8) & 0xff]      ) ^
 | 
			
		||||
                ((u32)Te4[(temp >> 16) & 0xff] <<  8) ^
 | 
			
		||||
                ((u32)Te4[(temp >> 24)       ] << 16) ^
 | 
			
		||||
                ((u32)Te4[(temp      ) & 0xff] << 24) ^
 | 
			
		||||
                rcon[i];
 | 
			
		||||
            rk[5] = rk[1] ^ rk[4];
 | 
			
		||||
            rk[6] = rk[2] ^ rk[5];
 | 
			
		||||
@@ -517,10 +517,10 @@ int AES_set_encrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
        while (1) {
 | 
			
		||||
            temp = rk[ 5];
 | 
			
		||||
            rk[ 6] = rk[ 0] ^
 | 
			
		||||
                (Te4[(temp >>  8) & 0xff]      ) ^
 | 
			
		||||
                (Te4[(temp >> 16) & 0xff] <<  8) ^
 | 
			
		||||
                (Te4[(temp >> 24)       ] << 16) ^
 | 
			
		||||
                (Te4[(temp      ) & 0xff] << 24) ^
 | 
			
		||||
                ((u32)Te4[(temp >>  8) & 0xff]      ) ^
 | 
			
		||||
                ((u32)Te4[(temp >> 16) & 0xff] <<  8) ^
 | 
			
		||||
                ((u32)Te4[(temp >> 24)       ] << 16) ^
 | 
			
		||||
                ((u32)Te4[(temp      ) & 0xff] << 24) ^
 | 
			
		||||
                rcon[i];
 | 
			
		||||
            rk[ 7] = rk[ 1] ^ rk[ 6];
 | 
			
		||||
            rk[ 8] = rk[ 2] ^ rk[ 7];
 | 
			
		||||
@@ -539,10 +539,10 @@ int AES_set_encrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
        while (1) {
 | 
			
		||||
            temp = rk[ 7];
 | 
			
		||||
            rk[ 8] = rk[ 0] ^
 | 
			
		||||
                (Te4[(temp >>  8) & 0xff]      ) ^
 | 
			
		||||
                (Te4[(temp >> 16) & 0xff] <<  8) ^
 | 
			
		||||
                (Te4[(temp >> 24)       ] << 16) ^
 | 
			
		||||
                (Te4[(temp      ) & 0xff] << 24) ^
 | 
			
		||||
                ((u32)Te4[(temp >>  8) & 0xff]      ) ^
 | 
			
		||||
                ((u32)Te4[(temp >> 16) & 0xff] <<  8) ^
 | 
			
		||||
                ((u32)Te4[(temp >> 24)       ] << 16) ^
 | 
			
		||||
                ((u32)Te4[(temp      ) & 0xff] << 24) ^
 | 
			
		||||
                rcon[i];
 | 
			
		||||
            rk[ 9] = rk[ 1] ^ rk[ 8];
 | 
			
		||||
            rk[10] = rk[ 2] ^ rk[ 9];
 | 
			
		||||
@@ -552,10 +552,10 @@ int AES_set_encrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
            }
 | 
			
		||||
            temp = rk[11];
 | 
			
		||||
            rk[12] = rk[ 4] ^
 | 
			
		||||
                (Te4[(temp      ) & 0xff]      ) ^
 | 
			
		||||
                (Te4[(temp >>  8) & 0xff] <<  8) ^
 | 
			
		||||
                (Te4[(temp >> 16) & 0xff] << 16) ^
 | 
			
		||||
                (Te4[(temp >> 24)       ] << 24);
 | 
			
		||||
                ((u32)Te4[(temp      ) & 0xff]      ) ^
 | 
			
		||||
                ((u32)Te4[(temp >>  8) & 0xff] <<  8) ^
 | 
			
		||||
                ((u32)Te4[(temp >> 16) & 0xff] << 16) ^
 | 
			
		||||
                ((u32)Te4[(temp >> 24)       ] << 24);
 | 
			
		||||
            rk[13] = rk[ 5] ^ rk[12];
 | 
			
		||||
            rk[14] = rk[ 6] ^ rk[13];
 | 
			
		||||
            rk[15] = rk[ 7] ^ rk[14];
 | 
			
		||||
@@ -674,22 +674,22 @@ void AES_encrypt(const unsigned char *in, unsigned char *out,
 | 
			
		||||
#if defined(AES_COMPACT_IN_OUTER_ROUNDS)
 | 
			
		||||
    prefetch256(Te4);
 | 
			
		||||
 | 
			
		||||
    t[0] =  Te4[(s0      ) & 0xff]       ^
 | 
			
		||||
        Te4[(s1 >>  8) & 0xff] <<  8 ^
 | 
			
		||||
        Te4[(s2 >> 16) & 0xff] << 16 ^
 | 
			
		||||
        Te4[(s3 >> 24)       ] << 24;
 | 
			
		||||
    t[1] =  Te4[(s1      ) & 0xff]       ^
 | 
			
		||||
        Te4[(s2 >>  8) & 0xff] <<  8 ^
 | 
			
		||||
        Te4[(s3 >> 16) & 0xff] << 16 ^
 | 
			
		||||
        Te4[(s0 >> 24)       ] << 24;
 | 
			
		||||
    t[2] =  Te4[(s2      ) & 0xff]       ^
 | 
			
		||||
        Te4[(s3 >>  8) & 0xff] <<  8 ^
 | 
			
		||||
        Te4[(s0 >> 16) & 0xff] << 16 ^
 | 
			
		||||
        Te4[(s1 >> 24)       ] << 24;
 | 
			
		||||
    t[3] =  Te4[(s3      ) & 0xff]       ^
 | 
			
		||||
        Te4[(s0 >>  8) & 0xff] <<  8 ^
 | 
			
		||||
        Te4[(s1 >> 16) & 0xff] << 16 ^
 | 
			
		||||
        Te4[(s2 >> 24)       ] << 24;
 | 
			
		||||
    t[0] = (u32)Te4[(s0      ) & 0xff]       ^
 | 
			
		||||
           (u32)Te4[(s1 >>  8) & 0xff] <<  8 ^
 | 
			
		||||
           (u32)Te4[(s2 >> 16) & 0xff] << 16 ^
 | 
			
		||||
           (u32)Te4[(s3 >> 24)       ] << 24;
 | 
			
		||||
    t[1] = (u32)Te4[(s1      ) & 0xff]       ^
 | 
			
		||||
           (u32)Te4[(s2 >>  8) & 0xff] <<  8 ^
 | 
			
		||||
           (u32)Te4[(s3 >> 16) & 0xff] << 16 ^
 | 
			
		||||
           (u32)Te4[(s0 >> 24)       ] << 24;
 | 
			
		||||
    t[2] = (u32)Te4[(s2      ) & 0xff]       ^
 | 
			
		||||
           (u32)Te4[(s3 >>  8) & 0xff] <<  8 ^
 | 
			
		||||
           (u32)Te4[(s0 >> 16) & 0xff] << 16 ^
 | 
			
		||||
           (u32)Te4[(s1 >> 24)       ] << 24;
 | 
			
		||||
    t[3] = (u32)Te4[(s3      ) & 0xff]       ^
 | 
			
		||||
           (u32)Te4[(s0 >>  8) & 0xff] <<  8 ^
 | 
			
		||||
           (u32)Te4[(s1 >> 16) & 0xff] << 16 ^
 | 
			
		||||
           (u32)Te4[(s2 >> 24)       ] << 24;
 | 
			
		||||
 | 
			
		||||
    /* now do the linear transform using words */
 | 
			
		||||
    {   int i;
 | 
			
		||||
@@ -740,22 +740,22 @@ void AES_encrypt(const unsigned char *in, unsigned char *out,
 | 
			
		||||
     */
 | 
			
		||||
    for (rk+=8,r=key->rounds-2; r>0; rk+=4,r--) {
 | 
			
		||||
#if defined(AES_COMPACT_IN_INNER_ROUNDS)
 | 
			
		||||
        t[0] =  Te4[(s0      ) & 0xff]       ^
 | 
			
		||||
            Te4[(s1 >>  8) & 0xff] <<  8 ^
 | 
			
		||||
            Te4[(s2 >> 16) & 0xff] << 16 ^
 | 
			
		||||
            Te4[(s3 >> 24)       ] << 24;
 | 
			
		||||
        t[1] =  Te4[(s1      ) & 0xff]       ^
 | 
			
		||||
            Te4[(s2 >>  8) & 0xff] <<  8 ^
 | 
			
		||||
            Te4[(s3 >> 16) & 0xff] << 16 ^
 | 
			
		||||
            Te4[(s0 >> 24)       ] << 24;
 | 
			
		||||
        t[2] =  Te4[(s2      ) & 0xff]       ^
 | 
			
		||||
            Te4[(s3 >>  8) & 0xff] <<  8 ^
 | 
			
		||||
            Te4[(s0 >> 16) & 0xff] << 16 ^
 | 
			
		||||
            Te4[(s1 >> 24)       ] << 24;
 | 
			
		||||
        t[3] =  Te4[(s3      ) & 0xff]       ^
 | 
			
		||||
            Te4[(s0 >>  8) & 0xff] <<  8 ^
 | 
			
		||||
            Te4[(s1 >> 16) & 0xff] << 16 ^
 | 
			
		||||
            Te4[(s2 >> 24)       ] << 24;
 | 
			
		||||
        t[0] = (u32)Te4[(s0      ) & 0xff]       ^
 | 
			
		||||
               (u32)Te4[(s1 >>  8) & 0xff] <<  8 ^
 | 
			
		||||
               (u32)Te4[(s2 >> 16) & 0xff] << 16 ^
 | 
			
		||||
               (u32)Te4[(s3 >> 24)       ] << 24;
 | 
			
		||||
        t[1] = (u32)Te4[(s1      ) & 0xff]       ^
 | 
			
		||||
               (u32)Te4[(s2 >>  8) & 0xff] <<  8 ^
 | 
			
		||||
               (u32)Te4[(s3 >> 16) & 0xff] << 16 ^
 | 
			
		||||
               (u32)Te4[(s0 >> 24)       ] << 24;
 | 
			
		||||
        t[2] = (u32)Te4[(s2      ) & 0xff]       ^
 | 
			
		||||
               (u32)Te4[(s3 >>  8) & 0xff] <<  8 ^
 | 
			
		||||
               (u32)Te4[(s0 >> 16) & 0xff] << 16 ^
 | 
			
		||||
               (u32)Te4[(s1 >> 24)       ] << 24;
 | 
			
		||||
        t[3] = (u32)Te4[(s3      ) & 0xff]       ^
 | 
			
		||||
               (u32)Te4[(s0 >>  8) & 0xff] <<  8 ^
 | 
			
		||||
               (u32)Te4[(s1 >> 16) & 0xff] << 16 ^
 | 
			
		||||
               (u32)Te4[(s2 >> 24)       ] << 24;
 | 
			
		||||
 | 
			
		||||
        /* now do the linear transform using words */
 | 
			
		||||
        {
 | 
			
		||||
@@ -810,28 +810,28 @@ void AES_encrypt(const unsigned char *in, unsigned char *out,
 | 
			
		||||
    prefetch256(Te4);
 | 
			
		||||
 | 
			
		||||
    *(u32*)(out+0) =
 | 
			
		||||
        Te4[(s0      ) & 0xff]       ^
 | 
			
		||||
        Te4[(s1 >>  8) & 0xff] <<  8 ^
 | 
			
		||||
        Te4[(s2 >> 16) & 0xff] << 16 ^
 | 
			
		||||
        Te4[(s3 >> 24)       ] << 24 ^
 | 
			
		||||
           (u32)Te4[(s0      ) & 0xff]       ^
 | 
			
		||||
           (u32)Te4[(s1 >>  8) & 0xff] <<  8 ^
 | 
			
		||||
           (u32)Te4[(s2 >> 16) & 0xff] << 16 ^
 | 
			
		||||
           (u32)Te4[(s3 >> 24)       ] << 24 ^
 | 
			
		||||
        rk[0];
 | 
			
		||||
    *(u32*)(out+4) =
 | 
			
		||||
        Te4[(s1      ) & 0xff]       ^
 | 
			
		||||
        Te4[(s2 >>  8) & 0xff] <<  8 ^
 | 
			
		||||
        Te4[(s3 >> 16) & 0xff] << 16 ^
 | 
			
		||||
        Te4[(s0 >> 24)       ] << 24 ^
 | 
			
		||||
           (u32)Te4[(s1      ) & 0xff]       ^
 | 
			
		||||
           (u32)Te4[(s2 >>  8) & 0xff] <<  8 ^
 | 
			
		||||
           (u32)Te4[(s3 >> 16) & 0xff] << 16 ^
 | 
			
		||||
           (u32)Te4[(s0 >> 24)       ] << 24 ^
 | 
			
		||||
        rk[1];
 | 
			
		||||
    *(u32*)(out+8) =
 | 
			
		||||
        Te4[(s2      ) & 0xff]       ^
 | 
			
		||||
        Te4[(s3 >>  8) & 0xff] <<  8 ^
 | 
			
		||||
        Te4[(s0 >> 16) & 0xff] << 16 ^
 | 
			
		||||
        Te4[(s1 >> 24)       ] << 24 ^
 | 
			
		||||
           (u32)Te4[(s2      ) & 0xff]       ^
 | 
			
		||||
           (u32)Te4[(s3 >>  8) & 0xff] <<  8 ^
 | 
			
		||||
           (u32)Te4[(s0 >> 16) & 0xff] << 16 ^
 | 
			
		||||
           (u32)Te4[(s1 >> 24)       ] << 24 ^
 | 
			
		||||
        rk[2];
 | 
			
		||||
    *(u32*)(out+12) =
 | 
			
		||||
        Te4[(s3      ) & 0xff]       ^
 | 
			
		||||
        Te4[(s0 >>  8) & 0xff] <<  8 ^
 | 
			
		||||
        Te4[(s1 >> 16) & 0xff] << 16 ^
 | 
			
		||||
        Te4[(s2 >> 24)       ] << 24 ^
 | 
			
		||||
           (u32)Te4[(s3      ) & 0xff]       ^
 | 
			
		||||
           (u32)Te4[(s0 >>  8) & 0xff] <<  8 ^
 | 
			
		||||
           (u32)Te4[(s1 >> 16) & 0xff] << 16 ^
 | 
			
		||||
           (u32)Te4[(s2 >> 24)       ] << 24 ^
 | 
			
		||||
        rk[3];
 | 
			
		||||
#else
 | 
			
		||||
    *(u32*)(out+0) =
 | 
			
		||||
@@ -888,22 +888,22 @@ void AES_decrypt(const unsigned char *in, unsigned char *out,
 | 
			
		||||
#if defined(AES_COMPACT_IN_OUTER_ROUNDS)
 | 
			
		||||
    prefetch256(Td4);
 | 
			
		||||
 | 
			
		||||
    t[0] =  Td4[(s0      ) & 0xff]       ^
 | 
			
		||||
    Td4[(s3 >>  8) & 0xff] <<  8 ^
 | 
			
		||||
    Td4[(s2 >> 16) & 0xff] << 16 ^
 | 
			
		||||
    Td4[(s1 >> 24)       ] << 24;
 | 
			
		||||
    t[1] =  Td4[(s1      ) & 0xff]       ^
 | 
			
		||||
    Td4[(s0 >>  8) & 0xff] <<  8 ^
 | 
			
		||||
    Td4[(s3 >> 16) & 0xff] << 16 ^
 | 
			
		||||
    Td4[(s2 >> 24)       ] << 24;
 | 
			
		||||
    t[2] =  Td4[(s2      ) & 0xff]       ^
 | 
			
		||||
    Td4[(s1 >>  8) & 0xff] <<  8 ^
 | 
			
		||||
    Td4[(s0 >> 16) & 0xff] << 16 ^
 | 
			
		||||
    Td4[(s3 >> 24)       ] << 24;
 | 
			
		||||
    t[3] =  Td4[(s3      ) & 0xff]       ^
 | 
			
		||||
    Td4[(s2 >>  8) & 0xff] <<  8 ^
 | 
			
		||||
    Td4[(s1 >> 16) & 0xff] << 16 ^
 | 
			
		||||
    Td4[(s0 >> 24)       ] << 24;
 | 
			
		||||
    t[0] = (u32)Td4[(s0      ) & 0xff]       ^
 | 
			
		||||
           (u32)Td4[(s3 >>  8) & 0xff] <<  8 ^
 | 
			
		||||
           (u32)Td4[(s2 >> 16) & 0xff] << 16 ^
 | 
			
		||||
           (u32)Td4[(s1 >> 24)       ] << 24;
 | 
			
		||||
    t[1] = (u32)Td4[(s1      ) & 0xff]       ^
 | 
			
		||||
           (u32)Td4[(s0 >>  8) & 0xff] <<  8 ^
 | 
			
		||||
           (u32)Td4[(s3 >> 16) & 0xff] << 16 ^
 | 
			
		||||
           (u32)Td4[(s2 >> 24)       ] << 24;
 | 
			
		||||
    t[2] = (u32)Td4[(s2      ) & 0xff]       ^
 | 
			
		||||
           (u32)Td4[(s1 >>  8) & 0xff] <<  8 ^
 | 
			
		||||
           (u32)Td4[(s0 >> 16) & 0xff] << 16 ^
 | 
			
		||||
           (u32)Td4[(s3 >> 24)       ] << 24;
 | 
			
		||||
    t[3] = (u32)Td4[(s3      ) & 0xff]       ^
 | 
			
		||||
           (u32)Td4[(s2 >>  8) & 0xff] <<  8 ^
 | 
			
		||||
           (u32)Td4[(s1 >> 16) & 0xff] << 16 ^
 | 
			
		||||
           (u32)Td4[(s0 >> 24)       ] << 24;
 | 
			
		||||
 | 
			
		||||
    /* now do the linear transform using words */ 
 | 
			
		||||
    {
 | 
			
		||||
@@ -965,22 +965,22 @@ void AES_decrypt(const unsigned char *in, unsigned char *out,
 | 
			
		||||
     */
 | 
			
		||||
    for (rk+=8,r=key->rounds-2; r>0; rk+=4,r--) {
 | 
			
		||||
#if defined(AES_COMPACT_IN_INNER_ROUNDS)
 | 
			
		||||
        t[0] =  Td4[(s0      ) & 0xff]       ^
 | 
			
		||||
        Td4[(s3 >>  8) & 0xff] <<  8 ^
 | 
			
		||||
        Td4[(s2 >> 16) & 0xff] << 16 ^
 | 
			
		||||
        Td4[(s1 >> 24)       ] << 24;
 | 
			
		||||
        t[1] =  Td4[(s1      ) & 0xff]       ^
 | 
			
		||||
        Td4[(s0 >>  8) & 0xff] <<  8 ^
 | 
			
		||||
        Td4[(s3 >> 16) & 0xff] << 16 ^
 | 
			
		||||
        Td4[(s2 >> 24)       ] << 24;
 | 
			
		||||
        t[2] =  Td4[(s2      ) & 0xff]       ^
 | 
			
		||||
        Td4[(s1 >>  8) & 0xff] <<  8 ^
 | 
			
		||||
        Td4[(s0 >> 16) & 0xff] << 16 ^
 | 
			
		||||
        Td4[(s3 >> 24)       ] << 24;
 | 
			
		||||
        t[3] =  Td4[(s3      ) & 0xff]       ^
 | 
			
		||||
        Td4[(s2 >>  8) & 0xff] <<  8 ^
 | 
			
		||||
        Td4[(s1 >> 16) & 0xff] << 16 ^
 | 
			
		||||
        Td4[(s0 >> 24)       ] << 24;
 | 
			
		||||
        t[0] = (u32)Td4[(s0      ) & 0xff]       ^
 | 
			
		||||
               (u32)Td4[(s3 >>  8) & 0xff] <<  8 ^
 | 
			
		||||
               (u32)Td4[(s2 >> 16) & 0xff] << 16 ^
 | 
			
		||||
               (u32)Td4[(s1 >> 24)       ] << 24;
 | 
			
		||||
        t[1] = (u32)Td4[(s1      ) & 0xff]       ^
 | 
			
		||||
               (u32)Td4[(s0 >>  8) & 0xff] <<  8 ^
 | 
			
		||||
               (u32)Td4[(s3 >> 16) & 0xff] << 16 ^
 | 
			
		||||
               (u32)Td4[(s2 >> 24)       ] << 24;
 | 
			
		||||
        t[2] = (u32)Td4[(s2      ) & 0xff]       ^
 | 
			
		||||
               (u32)Td4[(s1 >>  8) & 0xff] <<  8 ^
 | 
			
		||||
               (u32)Td4[(s0 >> 16) & 0xff] << 16 ^
 | 
			
		||||
               (u32)Td4[(s3 >> 24)       ] << 24;
 | 
			
		||||
        t[3] = (u32)Td4[(s3      ) & 0xff]       ^
 | 
			
		||||
               (u32)Td4[(s2 >>  8) & 0xff] <<  8 ^
 | 
			
		||||
               (u32)Td4[(s1 >> 16) & 0xff] << 16 ^
 | 
			
		||||
               (u32)Td4[(s0 >> 24)       ] << 24;
 | 
			
		||||
 | 
			
		||||
    /* now do the linear transform using words */ 
 | 
			
		||||
    {
 | 
			
		||||
@@ -1044,27 +1044,27 @@ void AES_decrypt(const unsigned char *in, unsigned char *out,
 | 
			
		||||
    prefetch256(Td4);
 | 
			
		||||
 | 
			
		||||
    *(u32*)(out+0) =
 | 
			
		||||
        (Td4[(s0      ) & 0xff])    ^
 | 
			
		||||
        (Td4[(s3 >>  8) & 0xff] <<  8) ^
 | 
			
		||||
        (Td4[(s2 >> 16) & 0xff] << 16) ^
 | 
			
		||||
        (Td4[(s1 >> 24)       ] << 24) ^
 | 
			
		||||
        ((u32)Td4[(s0      ) & 0xff])    ^
 | 
			
		||||
        ((u32)Td4[(s3 >>  8) & 0xff] <<  8) ^
 | 
			
		||||
        ((u32)Td4[(s2 >> 16) & 0xff] << 16) ^
 | 
			
		||||
        ((u32)Td4[(s1 >> 24)       ] << 24) ^
 | 
			
		||||
        rk[0];
 | 
			
		||||
    *(u32*)(out+4) =
 | 
			
		||||
        (Td4[(s1      ) & 0xff])     ^
 | 
			
		||||
        (Td4[(s0 >>  8) & 0xff] <<  8) ^
 | 
			
		||||
        (Td4[(s3 >> 16) & 0xff] << 16) ^
 | 
			
		||||
        (Td4[(s2 >> 24)       ] << 24) ^
 | 
			
		||||
        ((u32)Td4[(s1      ) & 0xff])     ^
 | 
			
		||||
        ((u32)Td4[(s0 >>  8) & 0xff] <<  8) ^
 | 
			
		||||
        ((u32)Td4[(s3 >> 16) & 0xff] << 16) ^
 | 
			
		||||
        ((u32)Td4[(s2 >> 24)       ] << 24) ^
 | 
			
		||||
        rk[1];
 | 
			
		||||
    *(u32*)(out+8) =
 | 
			
		||||
        (Td4[(s2      ) & 0xff])     ^
 | 
			
		||||
        (Td4[(s1 >>  8) & 0xff] <<  8) ^
 | 
			
		||||
        (Td4[(s0 >> 16) & 0xff] << 16) ^
 | 
			
		||||
        (Td4[(s3 >> 24)       ] << 24) ^
 | 
			
		||||
        ((u32)Td4[(s2      ) & 0xff])     ^
 | 
			
		||||
        ((u32)Td4[(s1 >>  8) & 0xff] <<  8) ^
 | 
			
		||||
        ((u32)Td4[(s0 >> 16) & 0xff] << 16) ^
 | 
			
		||||
        ((u32)Td4[(s3 >> 24)       ] << 24) ^
 | 
			
		||||
        rk[2];
 | 
			
		||||
    *(u32*)(out+12) =
 | 
			
		||||
        (Td4[(s3      ) & 0xff])     ^
 | 
			
		||||
        (Td4[(s2 >>  8) & 0xff] <<  8) ^
 | 
			
		||||
        (Td4[(s1 >> 16) & 0xff] << 16) ^
 | 
			
		||||
        (Td4[(s0 >> 24)       ] << 24) ^
 | 
			
		||||
        ((u32)Td4[(s3      ) & 0xff])     ^
 | 
			
		||||
        ((u32)Td4[(s2 >>  8) & 0xff] <<  8) ^
 | 
			
		||||
        ((u32)Td4[(s1 >> 16) & 0xff] << 16) ^
 | 
			
		||||
        ((u32)Td4[(s0 >> 24)       ] << 24) ^
 | 
			
		||||
        rk[3];
 | 
			
		||||
}
 | 
			
		||||
 
 | 
			
		||||
@@ -39,7 +39,7 @@
 | 
			
		||||
# but exhibits up to 10% improvement on other cores.
 | 
			
		||||
#
 | 
			
		||||
# Second version is "monolithic" replacement for aes_core.c, which in
 | 
			
		||||
# addition to AES_[de|en]crypt implements AES_set_[de|en]cryption_key.
 | 
			
		||||
# addition to AES_[de|en]crypt implements private_AES_set_[de|en]cryption_key.
 | 
			
		||||
# This made it possible to implement little-endian variant of the
 | 
			
		||||
# algorithm without modifying the base C code. Motivating factor for
 | 
			
		||||
# the undertaken effort was that it appeared that in tight IA-32
 | 
			
		||||
@@ -2854,12 +2854,12 @@ sub enckey()
 | 
			
		||||
    &set_label("exit");
 | 
			
		||||
&function_end("_x86_AES_set_encrypt_key");
 | 
			
		||||
 | 
			
		||||
# int AES_set_encrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
# int private_AES_set_encrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
#                        AES_KEY *key)
 | 
			
		||||
&function_begin_B("AES_set_encrypt_key");
 | 
			
		||||
&function_begin_B("private_AES_set_encrypt_key");
 | 
			
		||||
	&call	("_x86_AES_set_encrypt_key");
 | 
			
		||||
	&ret	();
 | 
			
		||||
&function_end_B("AES_set_encrypt_key");
 | 
			
		||||
&function_end_B("private_AES_set_encrypt_key");
 | 
			
		||||
 | 
			
		||||
sub deckey()
 | 
			
		||||
{ my ($i,$key,$tp1,$tp2,$tp4,$tp8) = @_;
 | 
			
		||||
@@ -2916,9 +2916,9 @@ sub deckey()
 | 
			
		||||
	&mov	(&DWP(4*$i,$key),$tp1);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# int AES_set_decrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
# int private_AES_set_decrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
#                        AES_KEY *key)
 | 
			
		||||
&function_begin_B("AES_set_decrypt_key");
 | 
			
		||||
&function_begin_B("private_AES_set_decrypt_key");
 | 
			
		||||
	&call	("_x86_AES_set_encrypt_key");
 | 
			
		||||
	&cmp	("eax",0);
 | 
			
		||||
	&je	(&label("proceed"));
 | 
			
		||||
@@ -2974,7 +2974,7 @@ sub deckey()
 | 
			
		||||
	&jb	(&label("permute"));
 | 
			
		||||
 | 
			
		||||
	&xor	("eax","eax");			# return success
 | 
			
		||||
&function_end("AES_set_decrypt_key");
 | 
			
		||||
&function_end("private_AES_set_decrypt_key");
 | 
			
		||||
&asciz("AES for x86, CRYPTOGAMS by <appro\@openssl.org>");
 | 
			
		||||
 | 
			
		||||
&asm_finish();
 | 
			
		||||
 
 | 
			
		||||
@@ -27,6 +27,11 @@
 | 
			
		||||
# Rescheduling for dual-issue pipeline resulted in 12% improvement on
 | 
			
		||||
# Cortex A8 core and ~25 cycles per byte processed with 128-bit key.
 | 
			
		||||
 | 
			
		||||
# February 2011.
 | 
			
		||||
#
 | 
			
		||||
# Profiler-assisted and platform-specific optimization resulted in 16%
 | 
			
		||||
# improvement on Cortex A8 core and ~21.5 cycles per byte.
 | 
			
		||||
 | 
			
		||||
while (($output=shift) && ($output!~/^\w[\w\-]*\.\w+$/)) {}
 | 
			
		||||
open STDOUT,">$output";
 | 
			
		||||
 | 
			
		||||
@@ -46,6 +51,7 @@ $key="r11";
 | 
			
		||||
$rounds="r12";
 | 
			
		||||
 | 
			
		||||
$code=<<___;
 | 
			
		||||
#include "arm_arch.h"
 | 
			
		||||
.text
 | 
			
		||||
.code	32
 | 
			
		||||
 | 
			
		||||
@@ -166,7 +172,7 @@ AES_encrypt:
 | 
			
		||||
	mov	$rounds,r0		@ inp
 | 
			
		||||
	mov	$key,r2
 | 
			
		||||
	sub	$tbl,r3,#AES_encrypt-AES_Te	@ Te
 | 
			
		||||
 | 
			
		||||
#if __ARM_ARCH__<7
 | 
			
		||||
	ldrb	$s0,[$rounds,#3]	@ load input data in endian-neutral
 | 
			
		||||
	ldrb	$t1,[$rounds,#2]	@ manner...
 | 
			
		||||
	ldrb	$t2,[$rounds,#1]
 | 
			
		||||
@@ -195,10 +201,33 @@ AES_encrypt:
 | 
			
		||||
	orr	$s3,$s3,$t1,lsl#8
 | 
			
		||||
	orr	$s3,$s3,$t2,lsl#16
 | 
			
		||||
	orr	$s3,$s3,$t3,lsl#24
 | 
			
		||||
 | 
			
		||||
#else
 | 
			
		||||
	ldr	$s0,[$rounds,#0]
 | 
			
		||||
	ldr	$s1,[$rounds,#4]
 | 
			
		||||
	ldr	$s2,[$rounds,#8]
 | 
			
		||||
	ldr	$s3,[$rounds,#12]
 | 
			
		||||
#ifdef __ARMEL__
 | 
			
		||||
	rev	$s0,$s0
 | 
			
		||||
	rev	$s1,$s1
 | 
			
		||||
	rev	$s2,$s2
 | 
			
		||||
	rev	$s3,$s3
 | 
			
		||||
#endif
 | 
			
		||||
#endif
 | 
			
		||||
	bl	_armv4_AES_encrypt
 | 
			
		||||
 | 
			
		||||
	ldr	$rounds,[sp],#4		@ pop out
 | 
			
		||||
#if __ARM_ARCH__>=7
 | 
			
		||||
#ifdef __ARMEL__
 | 
			
		||||
	rev	$s0,$s0
 | 
			
		||||
	rev	$s1,$s1
 | 
			
		||||
	rev	$s2,$s2
 | 
			
		||||
	rev	$s3,$s3
 | 
			
		||||
#endif
 | 
			
		||||
	str	$s0,[$rounds,#0]
 | 
			
		||||
	str	$s1,[$rounds,#4]
 | 
			
		||||
	str	$s2,[$rounds,#8]
 | 
			
		||||
	str	$s3,[$rounds,#12]
 | 
			
		||||
#else
 | 
			
		||||
	mov	$t1,$s0,lsr#24		@ write output in endian-neutral
 | 
			
		||||
	mov	$t2,$s0,lsr#16		@ manner...
 | 
			
		||||
	mov	$t3,$s0,lsr#8
 | 
			
		||||
@@ -227,11 +256,15 @@ AES_encrypt:
 | 
			
		||||
	strb	$t2,[$rounds,#13]
 | 
			
		||||
	strb	$t3,[$rounds,#14]
 | 
			
		||||
	strb	$s3,[$rounds,#15]
 | 
			
		||||
 | 
			
		||||
#endif
 | 
			
		||||
#if __ARM_ARCH__>=5
 | 
			
		||||
	ldmia	sp!,{r4-r12,pc}
 | 
			
		||||
#else
 | 
			
		||||
	ldmia   sp!,{r4-r12,lr}
 | 
			
		||||
	tst	lr,#1
 | 
			
		||||
	moveq	pc,lr			@ be binary compatible with V4, yet
 | 
			
		||||
	bx	lr			@ interoperable with Thumb ISA:-)
 | 
			
		||||
#endif
 | 
			
		||||
.size	AES_encrypt,.-AES_encrypt
 | 
			
		||||
 | 
			
		||||
.type   _armv4_AES_encrypt,%function
 | 
			
		||||
@@ -271,11 +304,11 @@ _armv4_AES_encrypt:
 | 
			
		||||
	and	$i2,lr,$s2,lsr#16	@ i1
 | 
			
		||||
	eor	$t3,$t3,$i3,ror#8
 | 
			
		||||
	and	$i3,lr,$s2
 | 
			
		||||
	eor	$s1,$s1,$t1,ror#24
 | 
			
		||||
	ldr	$i1,[$tbl,$i1,lsl#2]	@ Te2[s2>>8]
 | 
			
		||||
	eor	$s1,$s1,$t1,ror#24
 | 
			
		||||
	ldr	$i2,[$tbl,$i2,lsl#2]	@ Te1[s2>>16]
 | 
			
		||||
	mov	$s2,$s2,lsr#24
 | 
			
		||||
 | 
			
		||||
	ldr	$i2,[$tbl,$i2,lsl#2]	@ Te1[s2>>16]
 | 
			
		||||
	ldr	$i3,[$tbl,$i3,lsl#2]	@ Te3[s2>>0]
 | 
			
		||||
	eor	$s0,$s0,$i1,ror#16
 | 
			
		||||
	ldr	$s2,[$tbl,$s2,lsl#2]	@ Te0[s2>>24]
 | 
			
		||||
@@ -284,16 +317,16 @@ _armv4_AES_encrypt:
 | 
			
		||||
	and	$i2,lr,$s3,lsr#8	@ i1
 | 
			
		||||
	eor	$t3,$t3,$i3,ror#16
 | 
			
		||||
	and	$i3,lr,$s3,lsr#16	@ i2
 | 
			
		||||
	eor	$s2,$s2,$t2,ror#16
 | 
			
		||||
	ldr	$i1,[$tbl,$i1,lsl#2]	@ Te3[s3>>0]
 | 
			
		||||
	eor	$s2,$s2,$t2,ror#16
 | 
			
		||||
	ldr	$i2,[$tbl,$i2,lsl#2]	@ Te2[s3>>8]
 | 
			
		||||
	mov	$s3,$s3,lsr#24
 | 
			
		||||
 | 
			
		||||
	ldr	$i2,[$tbl,$i2,lsl#2]	@ Te2[s3>>8]
 | 
			
		||||
	ldr	$i3,[$tbl,$i3,lsl#2]	@ Te1[s3>>16]
 | 
			
		||||
	eor	$s0,$s0,$i1,ror#24
 | 
			
		||||
	ldr	$s3,[$tbl,$s3,lsl#2]	@ Te0[s3>>24]
 | 
			
		||||
	eor	$s1,$s1,$i2,ror#16
 | 
			
		||||
	ldr	$i1,[$key],#16
 | 
			
		||||
	eor	$s1,$s1,$i2,ror#16
 | 
			
		||||
	ldr	$s3,[$tbl,$s3,lsl#2]	@ Te0[s3>>24]
 | 
			
		||||
	eor	$s2,$s2,$i3,ror#8
 | 
			
		||||
	ldr	$t1,[$key,#-12]
 | 
			
		||||
	eor	$s3,$s3,$t3,ror#8
 | 
			
		||||
@@ -333,11 +366,11 @@ _armv4_AES_encrypt:
 | 
			
		||||
	and	$i2,lr,$s2,lsr#16	@ i1
 | 
			
		||||
	eor	$t3,$i3,$t3,lsl#8
 | 
			
		||||
	and	$i3,lr,$s2
 | 
			
		||||
	eor	$s1,$t1,$s1,lsl#24
 | 
			
		||||
	ldrb	$i1,[$tbl,$i1,lsl#2]	@ Te4[s2>>8]
 | 
			
		||||
	eor	$s1,$t1,$s1,lsl#24
 | 
			
		||||
	ldrb	$i2,[$tbl,$i2,lsl#2]	@ Te4[s2>>16]
 | 
			
		||||
	mov	$s2,$s2,lsr#24
 | 
			
		||||
 | 
			
		||||
	ldrb	$i2,[$tbl,$i2,lsl#2]	@ Te4[s2>>16]
 | 
			
		||||
	ldrb	$i3,[$tbl,$i3,lsl#2]	@ Te4[s2>>0]
 | 
			
		||||
	eor	$s0,$i1,$s0,lsl#8
 | 
			
		||||
	ldrb	$s2,[$tbl,$s2,lsl#2]	@ Te4[s2>>24]
 | 
			
		||||
@@ -346,15 +379,15 @@ _armv4_AES_encrypt:
 | 
			
		||||
	and	$i2,lr,$s3,lsr#8	@ i1
 | 
			
		||||
	eor	$t3,$i3,$t3,lsl#8
 | 
			
		||||
	and	$i3,lr,$s3,lsr#16	@ i2
 | 
			
		||||
	eor	$s2,$t2,$s2,lsl#24
 | 
			
		||||
	ldrb	$i1,[$tbl,$i1,lsl#2]	@ Te4[s3>>0]
 | 
			
		||||
	eor	$s2,$t2,$s2,lsl#24
 | 
			
		||||
	ldrb	$i2,[$tbl,$i2,lsl#2]	@ Te4[s3>>8]
 | 
			
		||||
	mov	$s3,$s3,lsr#24
 | 
			
		||||
 | 
			
		||||
	ldrb	$i2,[$tbl,$i2,lsl#2]	@ Te4[s3>>8]
 | 
			
		||||
	ldrb	$i3,[$tbl,$i3,lsl#2]	@ Te4[s3>>16]
 | 
			
		||||
	eor	$s0,$i1,$s0,lsl#8
 | 
			
		||||
	ldrb	$s3,[$tbl,$s3,lsl#2]	@ Te4[s3>>24]
 | 
			
		||||
	ldr	$i1,[$key,#0]
 | 
			
		||||
	ldrb	$s3,[$tbl,$s3,lsl#2]	@ Te4[s3>>24]
 | 
			
		||||
	eor	$s1,$s1,$i2,lsl#8
 | 
			
		||||
	ldr	$t1,[$key,#4]
 | 
			
		||||
	eor	$s2,$s2,$i3,lsl#16
 | 
			
		||||
@@ -371,10 +404,11 @@ _armv4_AES_encrypt:
 | 
			
		||||
	ldr	pc,[sp],#4		@ pop and return
 | 
			
		||||
.size	_armv4_AES_encrypt,.-_armv4_AES_encrypt
 | 
			
		||||
 | 
			
		||||
.global AES_set_encrypt_key
 | 
			
		||||
.type   AES_set_encrypt_key,%function
 | 
			
		||||
.global private_AES_set_encrypt_key
 | 
			
		||||
.type   private_AES_set_encrypt_key,%function
 | 
			
		||||
.align	5
 | 
			
		||||
AES_set_encrypt_key:
 | 
			
		||||
private_AES_set_encrypt_key:
 | 
			
		||||
_armv4_AES_set_encrypt_key:
 | 
			
		||||
	sub	r3,pc,#8		@ AES_set_encrypt_key
 | 
			
		||||
	teq	r0,#0
 | 
			
		||||
	moveq	r0,#-1
 | 
			
		||||
@@ -392,12 +426,13 @@ AES_set_encrypt_key:
 | 
			
		||||
	bne	.Labrt
 | 
			
		||||
 | 
			
		||||
.Lok:	stmdb   sp!,{r4-r12,lr}
 | 
			
		||||
	sub	$tbl,r3,#AES_set_encrypt_key-AES_Te-1024	@ Te4
 | 
			
		||||
	sub	$tbl,r3,#_armv4_AES_set_encrypt_key-AES_Te-1024	@ Te4
 | 
			
		||||
 | 
			
		||||
	mov	$rounds,r0		@ inp
 | 
			
		||||
	mov	lr,r1			@ bits
 | 
			
		||||
	mov	$key,r2			@ key
 | 
			
		||||
 | 
			
		||||
#if __ARM_ARCH__<7
 | 
			
		||||
	ldrb	$s0,[$rounds,#3]	@ load input data in endian-neutral
 | 
			
		||||
	ldrb	$t1,[$rounds,#2]	@ manner...
 | 
			
		||||
	ldrb	$t2,[$rounds,#1]
 | 
			
		||||
@@ -430,6 +465,22 @@ AES_set_encrypt_key:
 | 
			
		||||
	orr	$s3,$s3,$t3,lsl#24
 | 
			
		||||
	str	$s2,[$key,#-8]
 | 
			
		||||
	str	$s3,[$key,#-4]
 | 
			
		||||
#else
 | 
			
		||||
	ldr	$s0,[$rounds,#0]
 | 
			
		||||
	ldr	$s1,[$rounds,#4]
 | 
			
		||||
	ldr	$s2,[$rounds,#8]
 | 
			
		||||
	ldr	$s3,[$rounds,#12]
 | 
			
		||||
#ifdef __ARMEL__
 | 
			
		||||
	rev	$s0,$s0
 | 
			
		||||
	rev	$s1,$s1
 | 
			
		||||
	rev	$s2,$s2
 | 
			
		||||
	rev	$s3,$s3
 | 
			
		||||
#endif
 | 
			
		||||
	str	$s0,[$key],#16
 | 
			
		||||
	str	$s1,[$key,#-12]
 | 
			
		||||
	str	$s2,[$key,#-8]
 | 
			
		||||
	str	$s3,[$key,#-4]
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	teq	lr,#128
 | 
			
		||||
	bne	.Lnot128
 | 
			
		||||
@@ -466,6 +517,7 @@ AES_set_encrypt_key:
 | 
			
		||||
	b	.Ldone
 | 
			
		||||
 | 
			
		||||
.Lnot128:
 | 
			
		||||
#if __ARM_ARCH__<7
 | 
			
		||||
	ldrb	$i2,[$rounds,#19]
 | 
			
		||||
	ldrb	$t1,[$rounds,#18]
 | 
			
		||||
	ldrb	$t2,[$rounds,#17]
 | 
			
		||||
@@ -482,6 +534,16 @@ AES_set_encrypt_key:
 | 
			
		||||
	str	$i2,[$key],#8
 | 
			
		||||
	orr	$i3,$i3,$t3,lsl#24
 | 
			
		||||
	str	$i3,[$key,#-4]
 | 
			
		||||
#else
 | 
			
		||||
	ldr	$i2,[$rounds,#16]
 | 
			
		||||
	ldr	$i3,[$rounds,#20]
 | 
			
		||||
#ifdef __ARMEL__
 | 
			
		||||
	rev	$i2,$i2
 | 
			
		||||
	rev	$i3,$i3
 | 
			
		||||
#endif
 | 
			
		||||
	str	$i2,[$key],#8
 | 
			
		||||
	str	$i3,[$key,#-4]
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	teq	lr,#192
 | 
			
		||||
	bne	.Lnot192
 | 
			
		||||
@@ -526,6 +588,7 @@ AES_set_encrypt_key:
 | 
			
		||||
	b	.L192_loop
 | 
			
		||||
 | 
			
		||||
.Lnot192:
 | 
			
		||||
#if __ARM_ARCH__<7
 | 
			
		||||
	ldrb	$i2,[$rounds,#27]
 | 
			
		||||
	ldrb	$t1,[$rounds,#26]
 | 
			
		||||
	ldrb	$t2,[$rounds,#25]
 | 
			
		||||
@@ -542,6 +605,16 @@ AES_set_encrypt_key:
 | 
			
		||||
	str	$i2,[$key],#8
 | 
			
		||||
	orr	$i3,$i3,$t3,lsl#24
 | 
			
		||||
	str	$i3,[$key,#-4]
 | 
			
		||||
#else
 | 
			
		||||
	ldr	$i2,[$rounds,#24]
 | 
			
		||||
	ldr	$i3,[$rounds,#28]
 | 
			
		||||
#ifdef __ARMEL__
 | 
			
		||||
	rev	$i2,$i2
 | 
			
		||||
	rev	$i3,$i3
 | 
			
		||||
#endif
 | 
			
		||||
	str	$i2,[$key],#8
 | 
			
		||||
	str	$i3,[$key,#-4]
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	mov	$rounds,#14
 | 
			
		||||
	str	$rounds,[$key,#240-32]
 | 
			
		||||
@@ -606,14 +679,14 @@ AES_set_encrypt_key:
 | 
			
		||||
.Labrt:	tst	lr,#1
 | 
			
		||||
	moveq	pc,lr			@ be binary compatible with V4, yet
 | 
			
		||||
	bx	lr			@ interoperable with Thumb ISA:-)
 | 
			
		||||
.size	AES_set_encrypt_key,.-AES_set_encrypt_key
 | 
			
		||||
.size	private_AES_set_encrypt_key,.-private_AES_set_encrypt_key
 | 
			
		||||
 | 
			
		||||
.global AES_set_decrypt_key
 | 
			
		||||
.type   AES_set_decrypt_key,%function
 | 
			
		||||
.global private_AES_set_decrypt_key
 | 
			
		||||
.type   private_AES_set_decrypt_key,%function
 | 
			
		||||
.align	5
 | 
			
		||||
AES_set_decrypt_key:
 | 
			
		||||
private_AES_set_decrypt_key:
 | 
			
		||||
	str	lr,[sp,#-4]!            @ push lr
 | 
			
		||||
	bl	AES_set_encrypt_key
 | 
			
		||||
	bl	_armv4_AES_set_encrypt_key
 | 
			
		||||
	teq	r0,#0
 | 
			
		||||
	ldrne	lr,[sp],#4              @ pop lr
 | 
			
		||||
	bne	.Labrt
 | 
			
		||||
@@ -692,11 +765,15 @@ $code.=<<___;
 | 
			
		||||
	bne	.Lmix
 | 
			
		||||
 | 
			
		||||
	mov	r0,#0
 | 
			
		||||
#if __ARM_ARCH__>=5
 | 
			
		||||
	ldmia	sp!,{r4-r12,pc}
 | 
			
		||||
#else
 | 
			
		||||
	ldmia   sp!,{r4-r12,lr}
 | 
			
		||||
	tst	lr,#1
 | 
			
		||||
	moveq	pc,lr			@ be binary compatible with V4, yet
 | 
			
		||||
	bx	lr			@ interoperable with Thumb ISA:-)
 | 
			
		||||
.size	AES_set_decrypt_key,.-AES_set_decrypt_key
 | 
			
		||||
#endif
 | 
			
		||||
.size	private_AES_set_decrypt_key,.-private_AES_set_decrypt_key
 | 
			
		||||
 | 
			
		||||
.type	AES_Td,%object
 | 
			
		||||
.align	5
 | 
			
		||||
@@ -811,7 +888,7 @@ AES_decrypt:
 | 
			
		||||
	mov	$rounds,r0		@ inp
 | 
			
		||||
	mov	$key,r2
 | 
			
		||||
	sub	$tbl,r3,#AES_decrypt-AES_Td		@ Td
 | 
			
		||||
 | 
			
		||||
#if __ARM_ARCH__<7
 | 
			
		||||
	ldrb	$s0,[$rounds,#3]	@ load input data in endian-neutral
 | 
			
		||||
	ldrb	$t1,[$rounds,#2]	@ manner...
 | 
			
		||||
	ldrb	$t2,[$rounds,#1]
 | 
			
		||||
@@ -840,10 +917,33 @@ AES_decrypt:
 | 
			
		||||
	orr	$s3,$s3,$t1,lsl#8
 | 
			
		||||
	orr	$s3,$s3,$t2,lsl#16
 | 
			
		||||
	orr	$s3,$s3,$t3,lsl#24
 | 
			
		||||
 | 
			
		||||
#else
 | 
			
		||||
	ldr	$s0,[$rounds,#0]
 | 
			
		||||
	ldr	$s1,[$rounds,#4]
 | 
			
		||||
	ldr	$s2,[$rounds,#8]
 | 
			
		||||
	ldr	$s3,[$rounds,#12]
 | 
			
		||||
#ifdef __ARMEL__
 | 
			
		||||
	rev	$s0,$s0
 | 
			
		||||
	rev	$s1,$s1
 | 
			
		||||
	rev	$s2,$s2
 | 
			
		||||
	rev	$s3,$s3
 | 
			
		||||
#endif
 | 
			
		||||
#endif
 | 
			
		||||
	bl	_armv4_AES_decrypt
 | 
			
		||||
 | 
			
		||||
	ldr	$rounds,[sp],#4		@ pop out
 | 
			
		||||
#if __ARM_ARCH__>=7
 | 
			
		||||
#ifdef __ARMEL__
 | 
			
		||||
	rev	$s0,$s0
 | 
			
		||||
	rev	$s1,$s1
 | 
			
		||||
	rev	$s2,$s2
 | 
			
		||||
	rev	$s3,$s3
 | 
			
		||||
#endif
 | 
			
		||||
	str	$s0,[$rounds,#0]
 | 
			
		||||
	str	$s1,[$rounds,#4]
 | 
			
		||||
	str	$s2,[$rounds,#8]
 | 
			
		||||
	str	$s3,[$rounds,#12]
 | 
			
		||||
#else
 | 
			
		||||
	mov	$t1,$s0,lsr#24		@ write output in endian-neutral
 | 
			
		||||
	mov	$t2,$s0,lsr#16		@ manner...
 | 
			
		||||
	mov	$t3,$s0,lsr#8
 | 
			
		||||
@@ -872,11 +972,15 @@ AES_decrypt:
 | 
			
		||||
	strb	$t2,[$rounds,#13]
 | 
			
		||||
	strb	$t3,[$rounds,#14]
 | 
			
		||||
	strb	$s3,[$rounds,#15]
 | 
			
		||||
 | 
			
		||||
#endif
 | 
			
		||||
#if __ARM_ARCH__>=5
 | 
			
		||||
	ldmia	sp!,{r4-r12,pc}
 | 
			
		||||
#else
 | 
			
		||||
	ldmia   sp!,{r4-r12,lr}
 | 
			
		||||
	tst	lr,#1
 | 
			
		||||
	moveq	pc,lr			@ be binary compatible with V4, yet
 | 
			
		||||
	bx	lr			@ interoperable with Thumb ISA:-)
 | 
			
		||||
#endif
 | 
			
		||||
.size	AES_decrypt,.-AES_decrypt
 | 
			
		||||
 | 
			
		||||
.type   _armv4_AES_decrypt,%function
 | 
			
		||||
@@ -916,11 +1020,11 @@ _armv4_AES_decrypt:
 | 
			
		||||
	and	$i2,lr,$s2		@ i1
 | 
			
		||||
	eor	$t3,$i3,$t3,ror#8
 | 
			
		||||
	and	$i3,lr,$s2,lsr#16
 | 
			
		||||
	eor	$s1,$s1,$t1,ror#8
 | 
			
		||||
	ldr	$i1,[$tbl,$i1,lsl#2]	@ Td2[s2>>8]
 | 
			
		||||
	eor	$s1,$s1,$t1,ror#8
 | 
			
		||||
	ldr	$i2,[$tbl,$i2,lsl#2]	@ Td3[s2>>0]
 | 
			
		||||
	mov	$s2,$s2,lsr#24
 | 
			
		||||
 | 
			
		||||
	ldr	$i2,[$tbl,$i2,lsl#2]	@ Td3[s2>>0]
 | 
			
		||||
	ldr	$i3,[$tbl,$i3,lsl#2]	@ Td1[s2>>16]
 | 
			
		||||
	eor	$s0,$s0,$i1,ror#16
 | 
			
		||||
	ldr	$s2,[$tbl,$s2,lsl#2]	@ Td0[s2>>24]
 | 
			
		||||
@@ -929,22 +1033,22 @@ _armv4_AES_decrypt:
 | 
			
		||||
	and	$i2,lr,$s3,lsr#8	@ i1
 | 
			
		||||
	eor	$t3,$i3,$t3,ror#8
 | 
			
		||||
	and	$i3,lr,$s3		@ i2
 | 
			
		||||
	eor	$s2,$s2,$t2,ror#8
 | 
			
		||||
	ldr	$i1,[$tbl,$i1,lsl#2]	@ Td1[s3>>16]
 | 
			
		||||
	eor	$s2,$s2,$t2,ror#8
 | 
			
		||||
	ldr	$i2,[$tbl,$i2,lsl#2]	@ Td2[s3>>8]
 | 
			
		||||
	mov	$s3,$s3,lsr#24
 | 
			
		||||
 | 
			
		||||
	ldr	$i2,[$tbl,$i2,lsl#2]	@ Td2[s3>>8]
 | 
			
		||||
	ldr	$i3,[$tbl,$i3,lsl#2]	@ Td3[s3>>0]
 | 
			
		||||
	eor	$s0,$s0,$i1,ror#8
 | 
			
		||||
	ldr	$s3,[$tbl,$s3,lsl#2]	@ Td0[s3>>24]
 | 
			
		||||
	eor	$s1,$s1,$i2,ror#16
 | 
			
		||||
	eor	$s2,$s2,$i3,ror#24
 | 
			
		||||
	ldr	$i1,[$key],#16
 | 
			
		||||
	eor	$s3,$s3,$t3,ror#8
 | 
			
		||||
	eor	$s1,$s1,$i2,ror#16
 | 
			
		||||
	ldr	$s3,[$tbl,$s3,lsl#2]	@ Td0[s3>>24]
 | 
			
		||||
	eor	$s2,$s2,$i3,ror#24
 | 
			
		||||
 | 
			
		||||
	ldr	$t1,[$key,#-12]
 | 
			
		||||
	ldr	$t2,[$key,#-8]
 | 
			
		||||
	eor	$s0,$s0,$i1
 | 
			
		||||
	ldr	$t2,[$key,#-8]
 | 
			
		||||
	eor	$s3,$s3,$t3,ror#8
 | 
			
		||||
	ldr	$t3,[$key,#-4]
 | 
			
		||||
	and	$i1,lr,$s0,lsr#16
 | 
			
		||||
	eor	$s1,$s1,$t1
 | 
			
		||||
@@ -985,11 +1089,11 @@ _armv4_AES_decrypt:
 | 
			
		||||
	and	$i1,lr,$s2,lsr#8	@ i0
 | 
			
		||||
	eor	$t2,$t2,$i2,lsl#8
 | 
			
		||||
	and	$i2,lr,$s2		@ i1
 | 
			
		||||
	eor	$t3,$t3,$i3,lsl#8
 | 
			
		||||
	ldrb	$i1,[$tbl,$i1]		@ Td4[s2>>8]
 | 
			
		||||
	eor	$t3,$t3,$i3,lsl#8
 | 
			
		||||
	ldrb	$i2,[$tbl,$i2]		@ Td4[s2>>0]
 | 
			
		||||
	and	$i3,lr,$s2,lsr#16
 | 
			
		||||
 | 
			
		||||
	ldrb	$i2,[$tbl,$i2]		@ Td4[s2>>0]
 | 
			
		||||
	ldrb	$s2,[$tbl,$s2,lsr#24]	@ Td4[s2>>24]
 | 
			
		||||
	eor	$s0,$s0,$i1,lsl#8
 | 
			
		||||
	ldrb	$i3,[$tbl,$i3]		@ Td4[s2>>16]
 | 
			
		||||
@@ -997,11 +1101,11 @@ _armv4_AES_decrypt:
 | 
			
		||||
	and	$i1,lr,$s3,lsr#16	@ i0
 | 
			
		||||
	eor	$s2,$t2,$s2,lsl#16
 | 
			
		||||
	and	$i2,lr,$s3,lsr#8	@ i1
 | 
			
		||||
	eor	$t3,$t3,$i3,lsl#16
 | 
			
		||||
	ldrb	$i1,[$tbl,$i1]		@ Td4[s3>>16]
 | 
			
		||||
	eor	$t3,$t3,$i3,lsl#16
 | 
			
		||||
	ldrb	$i2,[$tbl,$i2]		@ Td4[s3>>8]
 | 
			
		||||
	and	$i3,lr,$s3		@ i2
 | 
			
		||||
 | 
			
		||||
	ldrb	$i2,[$tbl,$i2]		@ Td4[s3>>8]
 | 
			
		||||
	ldrb	$i3,[$tbl,$i3]		@ Td4[s3>>0]
 | 
			
		||||
	ldrb	$s3,[$tbl,$s3,lsr#24]	@ Td4[s3>>24]
 | 
			
		||||
	eor	$s0,$s0,$i1,lsl#16
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										1611
									
								
								crypto/aes/asm/aes-mips.pl
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										1611
									
								
								crypto/aes/asm/aes-mips.pl
									
									
									
									
									
										Normal file
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							
							
								
								
									
										1022
									
								
								crypto/aes/asm/aes-parisc.pl
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										1022
									
								
								crypto/aes/asm/aes-parisc.pl
									
									
									
									
									
										Normal file
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							@@ -7,7 +7,7 @@
 | 
			
		||||
# details see http://www.openssl.org/~appro/cryptogams/.
 | 
			
		||||
# ====================================================================
 | 
			
		||||
 | 
			
		||||
# Needs more work: key setup, page boundaries, CBC routine...
 | 
			
		||||
# Needs more work: key setup, CBC routine...
 | 
			
		||||
#
 | 
			
		||||
# ppc_AES_[en|de]crypt perform at 18 cycles per byte processed with
 | 
			
		||||
# 128-bit key, which is ~40% better than 64-bit code generated by gcc
 | 
			
		||||
@@ -18,7 +18,7 @@
 | 
			
		||||
 | 
			
		||||
# February 2010
 | 
			
		||||
#
 | 
			
		||||
# Rescheduling instructions to favour Power6 pipeline gives 10%
 | 
			
		||||
# Rescheduling instructions to favour Power6 pipeline gave 10%
 | 
			
		||||
# performance improvement on the platfrom in question (and marginal
 | 
			
		||||
# improvement even on others). It should be noted that Power6 fails
 | 
			
		||||
# to process byte in 18 cycles, only in 23, because it fails to issue
 | 
			
		||||
@@ -33,11 +33,13 @@ $flavour = shift;
 | 
			
		||||
 | 
			
		||||
if ($flavour =~ /64/) {
 | 
			
		||||
	$SIZE_T	=8;
 | 
			
		||||
	$LRSAVE	=2*$SIZE_T;
 | 
			
		||||
	$STU	="stdu";
 | 
			
		||||
	$POP	="ld";
 | 
			
		||||
	$PUSH	="std";
 | 
			
		||||
} elsif ($flavour =~ /32/) {
 | 
			
		||||
	$SIZE_T	=4;
 | 
			
		||||
	$LRSAVE	=$SIZE_T;
 | 
			
		||||
	$STU	="stwu";
 | 
			
		||||
	$POP	="lwz";
 | 
			
		||||
	$PUSH	="stw";
 | 
			
		||||
@@ -116,15 +118,19 @@ LAES_Te:
 | 
			
		||||
	addi	$Tbl0,$Tbl0,`128-8`
 | 
			
		||||
	mtlr	r0
 | 
			
		||||
	blr
 | 
			
		||||
	.space	`32-24`
 | 
			
		||||
	.long	0
 | 
			
		||||
	.byte	0,12,0x14,0,0,0,0,0
 | 
			
		||||
	.space	`64-9*4`
 | 
			
		||||
LAES_Td:
 | 
			
		||||
	mflr	r0
 | 
			
		||||
	bcl	20,31,\$+4
 | 
			
		||||
	mflr	$Tbl0	;    vvvvvvvv "distance" between . and 1st data entry
 | 
			
		||||
	addi	$Tbl0,$Tbl0,`128-8-32+2048+256`
 | 
			
		||||
	addi	$Tbl0,$Tbl0,`128-64-8+2048+256`
 | 
			
		||||
	mtlr	r0
 | 
			
		||||
	blr
 | 
			
		||||
	.space	`128-32-24`
 | 
			
		||||
	.long	0
 | 
			
		||||
	.byte	0,12,0x14,0,0,0,0,0
 | 
			
		||||
	.space	`128-64-9*4`
 | 
			
		||||
___
 | 
			
		||||
&_data_word(
 | 
			
		||||
	0xc66363a5, 0xf87c7c84, 0xee777799, 0xf67b7b8d,
 | 
			
		||||
@@ -328,10 +334,9 @@ $code.=<<___;
 | 
			
		||||
.globl	.AES_encrypt
 | 
			
		||||
.align	7
 | 
			
		||||
.AES_encrypt:
 | 
			
		||||
	mflr	r0
 | 
			
		||||
	$STU	$sp,-$FRAME($sp)
 | 
			
		||||
	mflr	r0
 | 
			
		||||
 | 
			
		||||
	$PUSH	r0,`$FRAME-$SIZE_T*21`($sp)
 | 
			
		||||
	$PUSH	$toc,`$FRAME-$SIZE_T*20`($sp)
 | 
			
		||||
	$PUSH	r13,`$FRAME-$SIZE_T*19`($sp)
 | 
			
		||||
	$PUSH	r14,`$FRAME-$SIZE_T*18`($sp)
 | 
			
		||||
@@ -352,7 +357,14 @@ $code.=<<___;
 | 
			
		||||
	$PUSH	r29,`$FRAME-$SIZE_T*3`($sp)
 | 
			
		||||
	$PUSH	r30,`$FRAME-$SIZE_T*2`($sp)
 | 
			
		||||
	$PUSH	r31,`$FRAME-$SIZE_T*1`($sp)
 | 
			
		||||
	$PUSH	r0,`$FRAME+$LRSAVE`($sp)
 | 
			
		||||
 | 
			
		||||
	andi.	$t0,$inp,3
 | 
			
		||||
	andi.	$t1,$out,3
 | 
			
		||||
	or.	$t0,$t0,$t1
 | 
			
		||||
	bne	Lenc_unaligned
 | 
			
		||||
 | 
			
		||||
Lenc_unaligned_ok:
 | 
			
		||||
	lwz	$s0,0($inp)
 | 
			
		||||
	lwz	$s1,4($inp)
 | 
			
		||||
	lwz	$s2,8($inp)
 | 
			
		||||
@@ -363,8 +375,80 @@ $code.=<<___;
 | 
			
		||||
	stw	$s1,4($out)
 | 
			
		||||
	stw	$s2,8($out)
 | 
			
		||||
	stw	$s3,12($out)
 | 
			
		||||
	b	Lenc_done
 | 
			
		||||
 | 
			
		||||
	$POP	r0,`$FRAME-$SIZE_T*21`($sp)
 | 
			
		||||
Lenc_unaligned:
 | 
			
		||||
	subfic	$t0,$inp,4096
 | 
			
		||||
	subfic	$t1,$out,4096
 | 
			
		||||
	andi.	$t0,$t0,4096-16
 | 
			
		||||
	beq	Lenc_xpage
 | 
			
		||||
	andi.	$t1,$t1,4096-16
 | 
			
		||||
	bne	Lenc_unaligned_ok
 | 
			
		||||
 | 
			
		||||
Lenc_xpage:
 | 
			
		||||
	lbz	$acc00,0($inp)
 | 
			
		||||
	lbz	$acc01,1($inp)
 | 
			
		||||
	lbz	$acc02,2($inp)
 | 
			
		||||
	lbz	$s0,3($inp)
 | 
			
		||||
	lbz	$acc04,4($inp)
 | 
			
		||||
	lbz	$acc05,5($inp)
 | 
			
		||||
	lbz	$acc06,6($inp)
 | 
			
		||||
	lbz	$s1,7($inp)
 | 
			
		||||
	lbz	$acc08,8($inp)
 | 
			
		||||
	lbz	$acc09,9($inp)
 | 
			
		||||
	lbz	$acc10,10($inp)
 | 
			
		||||
	insrwi	$s0,$acc00,8,0
 | 
			
		||||
	lbz	$s2,11($inp)
 | 
			
		||||
	insrwi	$s1,$acc04,8,0
 | 
			
		||||
	lbz	$acc12,12($inp)
 | 
			
		||||
	insrwi	$s0,$acc01,8,8
 | 
			
		||||
	lbz	$acc13,13($inp)
 | 
			
		||||
	insrwi	$s1,$acc05,8,8
 | 
			
		||||
	lbz	$acc14,14($inp)
 | 
			
		||||
	insrwi	$s0,$acc02,8,16
 | 
			
		||||
	lbz	$s3,15($inp)
 | 
			
		||||
	insrwi	$s1,$acc06,8,16
 | 
			
		||||
	insrwi	$s2,$acc08,8,0
 | 
			
		||||
	insrwi	$s3,$acc12,8,0
 | 
			
		||||
	insrwi	$s2,$acc09,8,8
 | 
			
		||||
	insrwi	$s3,$acc13,8,8
 | 
			
		||||
	insrwi	$s2,$acc10,8,16
 | 
			
		||||
	insrwi	$s3,$acc14,8,16
 | 
			
		||||
 | 
			
		||||
	bl	LAES_Te
 | 
			
		||||
	bl	Lppc_AES_encrypt_compact
 | 
			
		||||
 | 
			
		||||
	extrwi	$acc00,$s0,8,0
 | 
			
		||||
	extrwi	$acc01,$s0,8,8
 | 
			
		||||
	stb	$acc00,0($out)
 | 
			
		||||
	extrwi	$acc02,$s0,8,16
 | 
			
		||||
	stb	$acc01,1($out)
 | 
			
		||||
	stb	$acc02,2($out)
 | 
			
		||||
	extrwi	$acc04,$s1,8,0
 | 
			
		||||
	stb	$s0,3($out)
 | 
			
		||||
	extrwi	$acc05,$s1,8,8
 | 
			
		||||
	stb	$acc04,4($out)
 | 
			
		||||
	extrwi	$acc06,$s1,8,16
 | 
			
		||||
	stb	$acc05,5($out)
 | 
			
		||||
	stb	$acc06,6($out)
 | 
			
		||||
	extrwi	$acc08,$s2,8,0
 | 
			
		||||
	stb	$s1,7($out)
 | 
			
		||||
	extrwi	$acc09,$s2,8,8
 | 
			
		||||
	stb	$acc08,8($out)
 | 
			
		||||
	extrwi	$acc10,$s2,8,16
 | 
			
		||||
	stb	$acc09,9($out)
 | 
			
		||||
	stb	$acc10,10($out)
 | 
			
		||||
	extrwi	$acc12,$s3,8,0
 | 
			
		||||
	stb	$s2,11($out)
 | 
			
		||||
	extrwi	$acc13,$s3,8,8
 | 
			
		||||
	stb	$acc12,12($out)
 | 
			
		||||
	extrwi	$acc14,$s3,8,16
 | 
			
		||||
	stb	$acc13,13($out)
 | 
			
		||||
	stb	$acc14,14($out)
 | 
			
		||||
	stb	$s3,15($out)
 | 
			
		||||
 | 
			
		||||
Lenc_done:
 | 
			
		||||
	$POP	r0,`$FRAME+$LRSAVE`($sp)
 | 
			
		||||
	$POP	$toc,`$FRAME-$SIZE_T*20`($sp)
 | 
			
		||||
	$POP	r13,`$FRAME-$SIZE_T*19`($sp)
 | 
			
		||||
	$POP	r14,`$FRAME-$SIZE_T*18`($sp)
 | 
			
		||||
@@ -388,18 +472,21 @@ $code.=<<___;
 | 
			
		||||
	mtlr	r0
 | 
			
		||||
	addi	$sp,$sp,$FRAME
 | 
			
		||||
	blr
 | 
			
		||||
	.long	0
 | 
			
		||||
	.byte	0,12,4,1,0x80,18,3,0
 | 
			
		||||
	.long	0
 | 
			
		||||
 | 
			
		||||
.align	5
 | 
			
		||||
Lppc_AES_encrypt:
 | 
			
		||||
	lwz	$acc00,240($key)
 | 
			
		||||
	lwz	$t0,0($key)
 | 
			
		||||
	lwz	$t1,4($key)
 | 
			
		||||
	lwz	$t2,8($key)
 | 
			
		||||
	lwz	$t3,12($key)
 | 
			
		||||
	addi	$Tbl1,$Tbl0,3
 | 
			
		||||
	lwz	$t0,0($key)
 | 
			
		||||
	addi	$Tbl2,$Tbl0,2
 | 
			
		||||
	lwz	$t1,4($key)
 | 
			
		||||
	addi	$Tbl3,$Tbl0,1
 | 
			
		||||
	lwz	$t2,8($key)
 | 
			
		||||
	addi	$acc00,$acc00,-1
 | 
			
		||||
	lwz	$t3,12($key)
 | 
			
		||||
	addi	$key,$key,16
 | 
			
		||||
	xor	$s0,$s0,$t0
 | 
			
		||||
	xor	$s1,$s1,$t1
 | 
			
		||||
@@ -413,44 +500,44 @@ Lenc_loop:
 | 
			
		||||
	rlwinm	$acc02,$s2,`32-24+3`,21,28
 | 
			
		||||
	rlwinm	$acc03,$s3,`32-24+3`,21,28
 | 
			
		||||
	lwz	$t0,0($key)
 | 
			
		||||
	lwz	$t1,4($key)
 | 
			
		||||
	rlwinm	$acc04,$s1,`32-16+3`,21,28
 | 
			
		||||
	lwz	$t1,4($key)
 | 
			
		||||
	rlwinm	$acc05,$s2,`32-16+3`,21,28
 | 
			
		||||
	lwz	$t2,8($key)
 | 
			
		||||
	lwz	$t3,12($key)
 | 
			
		||||
	rlwinm	$acc06,$s3,`32-16+3`,21,28
 | 
			
		||||
	lwz	$t3,12($key)
 | 
			
		||||
	rlwinm	$acc07,$s0,`32-16+3`,21,28
 | 
			
		||||
	lwzx	$acc00,$Tbl0,$acc00
 | 
			
		||||
	lwzx	$acc01,$Tbl0,$acc01
 | 
			
		||||
	rlwinm	$acc08,$s2,`32-8+3`,21,28
 | 
			
		||||
	lwzx	$acc01,$Tbl0,$acc01
 | 
			
		||||
	rlwinm	$acc09,$s3,`32-8+3`,21,28
 | 
			
		||||
	lwzx	$acc02,$Tbl0,$acc02
 | 
			
		||||
	lwzx	$acc03,$Tbl0,$acc03
 | 
			
		||||
	rlwinm	$acc10,$s0,`32-8+3`,21,28
 | 
			
		||||
	lwzx	$acc03,$Tbl0,$acc03
 | 
			
		||||
	rlwinm	$acc11,$s1,`32-8+3`,21,28
 | 
			
		||||
	lwzx	$acc04,$Tbl1,$acc04
 | 
			
		||||
	lwzx	$acc05,$Tbl1,$acc05
 | 
			
		||||
	rlwinm	$acc12,$s3,`0+3`,21,28
 | 
			
		||||
	lwzx	$acc05,$Tbl1,$acc05
 | 
			
		||||
	rlwinm	$acc13,$s0,`0+3`,21,28
 | 
			
		||||
	lwzx	$acc06,$Tbl1,$acc06
 | 
			
		||||
	lwzx	$acc07,$Tbl1,$acc07
 | 
			
		||||
	rlwinm	$acc14,$s1,`0+3`,21,28
 | 
			
		||||
	lwzx	$acc07,$Tbl1,$acc07
 | 
			
		||||
	rlwinm	$acc15,$s2,`0+3`,21,28
 | 
			
		||||
	lwzx	$acc08,$Tbl2,$acc08
 | 
			
		||||
	lwzx	$acc09,$Tbl2,$acc09
 | 
			
		||||
	xor	$t0,$t0,$acc00
 | 
			
		||||
	lwzx	$acc09,$Tbl2,$acc09
 | 
			
		||||
	xor	$t1,$t1,$acc01
 | 
			
		||||
	lwzx	$acc10,$Tbl2,$acc10
 | 
			
		||||
	lwzx	$acc11,$Tbl2,$acc11
 | 
			
		||||
	xor	$t2,$t2,$acc02
 | 
			
		||||
	lwzx	$acc11,$Tbl2,$acc11
 | 
			
		||||
	xor	$t3,$t3,$acc03
 | 
			
		||||
	lwzx	$acc12,$Tbl3,$acc12
 | 
			
		||||
	lwzx	$acc13,$Tbl3,$acc13
 | 
			
		||||
	xor	$t0,$t0,$acc04
 | 
			
		||||
	lwzx	$acc13,$Tbl3,$acc13
 | 
			
		||||
	xor	$t1,$t1,$acc05
 | 
			
		||||
	lwzx	$acc14,$Tbl3,$acc14
 | 
			
		||||
	lwzx	$acc15,$Tbl3,$acc15
 | 
			
		||||
	xor	$t2,$t2,$acc06
 | 
			
		||||
	lwzx	$acc15,$Tbl3,$acc15
 | 
			
		||||
	xor	$t3,$t3,$acc07
 | 
			
		||||
	xor	$t0,$t0,$acc08
 | 
			
		||||
	xor	$t1,$t1,$acc09
 | 
			
		||||
@@ -466,60 +553,60 @@ Lenc_loop:
 | 
			
		||||
	addi	$Tbl2,$Tbl0,2048
 | 
			
		||||
	nop
 | 
			
		||||
	lwz	$t0,0($key)
 | 
			
		||||
	lwz	$t1,4($key)
 | 
			
		||||
	rlwinm	$acc00,$s0,`32-24`,24,31
 | 
			
		||||
	lwz	$t1,4($key)
 | 
			
		||||
	rlwinm	$acc01,$s1,`32-24`,24,31
 | 
			
		||||
	lwz	$t2,8($key)
 | 
			
		||||
	lwz	$t3,12($key)
 | 
			
		||||
	rlwinm	$acc02,$s2,`32-24`,24,31
 | 
			
		||||
	lwz	$t3,12($key)
 | 
			
		||||
	rlwinm	$acc03,$s3,`32-24`,24,31
 | 
			
		||||
	lwz	$acc08,`2048+0`($Tbl0)	! prefetch Te4
 | 
			
		||||
	lwz	$acc09,`2048+32`($Tbl0)
 | 
			
		||||
	rlwinm	$acc04,$s1,`32-16`,24,31
 | 
			
		||||
	lwz	$acc09,`2048+32`($Tbl0)
 | 
			
		||||
	rlwinm	$acc05,$s2,`32-16`,24,31
 | 
			
		||||
	lwz	$acc10,`2048+64`($Tbl0)
 | 
			
		||||
	lwz	$acc11,`2048+96`($Tbl0)
 | 
			
		||||
	rlwinm	$acc06,$s3,`32-16`,24,31
 | 
			
		||||
	lwz	$acc11,`2048+96`($Tbl0)
 | 
			
		||||
	rlwinm	$acc07,$s0,`32-16`,24,31
 | 
			
		||||
	lwz	$acc12,`2048+128`($Tbl0)
 | 
			
		||||
	lwz	$acc13,`2048+160`($Tbl0)
 | 
			
		||||
	rlwinm	$acc08,$s2,`32-8`,24,31
 | 
			
		||||
	lwz	$acc13,`2048+160`($Tbl0)
 | 
			
		||||
	rlwinm	$acc09,$s3,`32-8`,24,31
 | 
			
		||||
	lwz	$acc14,`2048+192`($Tbl0)
 | 
			
		||||
	lwz	$acc15,`2048+224`($Tbl0)
 | 
			
		||||
	rlwinm	$acc10,$s0,`32-8`,24,31
 | 
			
		||||
	lwz	$acc15,`2048+224`($Tbl0)
 | 
			
		||||
	rlwinm	$acc11,$s1,`32-8`,24,31
 | 
			
		||||
	lbzx	$acc00,$Tbl2,$acc00
 | 
			
		||||
	lbzx	$acc01,$Tbl2,$acc01
 | 
			
		||||
	rlwinm	$acc12,$s3,`0`,24,31
 | 
			
		||||
	lbzx	$acc01,$Tbl2,$acc01
 | 
			
		||||
	rlwinm	$acc13,$s0,`0`,24,31
 | 
			
		||||
	lbzx	$acc02,$Tbl2,$acc02
 | 
			
		||||
	lbzx	$acc03,$Tbl2,$acc03
 | 
			
		||||
	rlwinm	$acc14,$s1,`0`,24,31
 | 
			
		||||
	lbzx	$acc03,$Tbl2,$acc03
 | 
			
		||||
	rlwinm	$acc15,$s2,`0`,24,31
 | 
			
		||||
	lbzx	$acc04,$Tbl2,$acc04
 | 
			
		||||
	lbzx	$acc05,$Tbl2,$acc05
 | 
			
		||||
	rlwinm	$s0,$acc00,24,0,7
 | 
			
		||||
	lbzx	$acc05,$Tbl2,$acc05
 | 
			
		||||
	rlwinm	$s1,$acc01,24,0,7
 | 
			
		||||
	lbzx	$acc06,$Tbl2,$acc06
 | 
			
		||||
	lbzx	$acc07,$Tbl2,$acc07
 | 
			
		||||
	rlwinm	$s2,$acc02,24,0,7
 | 
			
		||||
	lbzx	$acc07,$Tbl2,$acc07
 | 
			
		||||
	rlwinm	$s3,$acc03,24,0,7
 | 
			
		||||
	lbzx	$acc08,$Tbl2,$acc08
 | 
			
		||||
	lbzx	$acc09,$Tbl2,$acc09
 | 
			
		||||
	rlwimi	$s0,$acc04,16,8,15
 | 
			
		||||
	lbzx	$acc09,$Tbl2,$acc09
 | 
			
		||||
	rlwimi	$s1,$acc05,16,8,15
 | 
			
		||||
	lbzx	$acc10,$Tbl2,$acc10
 | 
			
		||||
	lbzx	$acc11,$Tbl2,$acc11
 | 
			
		||||
	rlwimi	$s2,$acc06,16,8,15
 | 
			
		||||
	lbzx	$acc11,$Tbl2,$acc11
 | 
			
		||||
	rlwimi	$s3,$acc07,16,8,15
 | 
			
		||||
	lbzx	$acc12,$Tbl2,$acc12
 | 
			
		||||
	lbzx	$acc13,$Tbl2,$acc13
 | 
			
		||||
	rlwimi	$s0,$acc08,8,16,23
 | 
			
		||||
	lbzx	$acc13,$Tbl2,$acc13
 | 
			
		||||
	rlwimi	$s1,$acc09,8,16,23
 | 
			
		||||
	lbzx	$acc14,$Tbl2,$acc14
 | 
			
		||||
	lbzx	$acc15,$Tbl2,$acc15
 | 
			
		||||
	rlwimi	$s2,$acc10,8,16,23
 | 
			
		||||
	lbzx	$acc15,$Tbl2,$acc15
 | 
			
		||||
	rlwimi	$s3,$acc11,8,16,23
 | 
			
		||||
	or	$s0,$s0,$acc12
 | 
			
		||||
	or	$s1,$s1,$acc13
 | 
			
		||||
@@ -530,29 +617,31 @@ Lenc_loop:
 | 
			
		||||
	xor	$s2,$s2,$t2
 | 
			
		||||
	xor	$s3,$s3,$t3
 | 
			
		||||
	blr
 | 
			
		||||
	.long	0
 | 
			
		||||
	.byte	0,12,0x14,0,0,0,0,0
 | 
			
		||||
 | 
			
		||||
.align	4
 | 
			
		||||
Lppc_AES_encrypt_compact:
 | 
			
		||||
	lwz	$acc00,240($key)
 | 
			
		||||
	lwz	$t0,0($key)
 | 
			
		||||
	lwz	$t1,4($key)
 | 
			
		||||
	lwz	$t2,8($key)
 | 
			
		||||
	lwz	$t3,12($key)
 | 
			
		||||
	addi	$Tbl1,$Tbl0,2048
 | 
			
		||||
	lwz	$t0,0($key)
 | 
			
		||||
	lis	$mask80,0x8080
 | 
			
		||||
	lwz	$t1,4($key)
 | 
			
		||||
	lis	$mask1b,0x1b1b
 | 
			
		||||
	addi	$key,$key,16
 | 
			
		||||
	lwz	$t2,8($key)
 | 
			
		||||
	ori	$mask80,$mask80,0x8080
 | 
			
		||||
	lwz	$t3,12($key)
 | 
			
		||||
	ori	$mask1b,$mask1b,0x1b1b
 | 
			
		||||
	addi	$key,$key,16
 | 
			
		||||
	mtctr	$acc00
 | 
			
		||||
.align	4
 | 
			
		||||
Lenc_compact_loop:
 | 
			
		||||
	xor	$s0,$s0,$t0
 | 
			
		||||
	xor	$s1,$s1,$t1
 | 
			
		||||
	xor	$s2,$s2,$t2
 | 
			
		||||
	xor	$s3,$s3,$t3
 | 
			
		||||
	rlwinm	$acc00,$s0,`32-24`,24,31
 | 
			
		||||
	xor	$s2,$s2,$t2
 | 
			
		||||
	rlwinm	$acc01,$s1,`32-24`,24,31
 | 
			
		||||
	xor	$s3,$s3,$t3
 | 
			
		||||
	rlwinm	$acc02,$s2,`32-24`,24,31
 | 
			
		||||
	rlwinm	$acc03,$s3,`32-24`,24,31
 | 
			
		||||
	rlwinm	$acc04,$s1,`32-16`,24,31
 | 
			
		||||
@@ -560,48 +649,48 @@ Lenc_compact_loop:
 | 
			
		||||
	rlwinm	$acc06,$s3,`32-16`,24,31
 | 
			
		||||
	rlwinm	$acc07,$s0,`32-16`,24,31
 | 
			
		||||
	lbzx	$acc00,$Tbl1,$acc00
 | 
			
		||||
	lbzx	$acc01,$Tbl1,$acc01
 | 
			
		||||
	rlwinm	$acc08,$s2,`32-8`,24,31
 | 
			
		||||
	lbzx	$acc01,$Tbl1,$acc01
 | 
			
		||||
	rlwinm	$acc09,$s3,`32-8`,24,31
 | 
			
		||||
	lbzx	$acc02,$Tbl1,$acc02
 | 
			
		||||
	lbzx	$acc03,$Tbl1,$acc03
 | 
			
		||||
	rlwinm	$acc10,$s0,`32-8`,24,31
 | 
			
		||||
	lbzx	$acc03,$Tbl1,$acc03
 | 
			
		||||
	rlwinm	$acc11,$s1,`32-8`,24,31
 | 
			
		||||
	lbzx	$acc04,$Tbl1,$acc04
 | 
			
		||||
	lbzx	$acc05,$Tbl1,$acc05
 | 
			
		||||
	rlwinm	$acc12,$s3,`0`,24,31
 | 
			
		||||
	lbzx	$acc05,$Tbl1,$acc05
 | 
			
		||||
	rlwinm	$acc13,$s0,`0`,24,31
 | 
			
		||||
	lbzx	$acc06,$Tbl1,$acc06
 | 
			
		||||
	lbzx	$acc07,$Tbl1,$acc07
 | 
			
		||||
	rlwinm	$acc14,$s1,`0`,24,31
 | 
			
		||||
	lbzx	$acc07,$Tbl1,$acc07
 | 
			
		||||
	rlwinm	$acc15,$s2,`0`,24,31
 | 
			
		||||
	lbzx	$acc08,$Tbl1,$acc08
 | 
			
		||||
	lbzx	$acc09,$Tbl1,$acc09
 | 
			
		||||
	rlwinm	$s0,$acc00,24,0,7
 | 
			
		||||
	lbzx	$acc09,$Tbl1,$acc09
 | 
			
		||||
	rlwinm	$s1,$acc01,24,0,7
 | 
			
		||||
	lbzx	$acc10,$Tbl1,$acc10
 | 
			
		||||
	lbzx	$acc11,$Tbl1,$acc11
 | 
			
		||||
	rlwinm	$s2,$acc02,24,0,7
 | 
			
		||||
	lbzx	$acc11,$Tbl1,$acc11
 | 
			
		||||
	rlwinm	$s3,$acc03,24,0,7
 | 
			
		||||
	lbzx	$acc12,$Tbl1,$acc12
 | 
			
		||||
	lbzx	$acc13,$Tbl1,$acc13
 | 
			
		||||
	rlwimi	$s0,$acc04,16,8,15
 | 
			
		||||
	lbzx	$acc13,$Tbl1,$acc13
 | 
			
		||||
	rlwimi	$s1,$acc05,16,8,15
 | 
			
		||||
	lbzx	$acc14,$Tbl1,$acc14
 | 
			
		||||
	lbzx	$acc15,$Tbl1,$acc15
 | 
			
		||||
	rlwimi	$s2,$acc06,16,8,15
 | 
			
		||||
	lbzx	$acc15,$Tbl1,$acc15
 | 
			
		||||
	rlwimi	$s3,$acc07,16,8,15
 | 
			
		||||
	rlwimi	$s0,$acc08,8,16,23
 | 
			
		||||
	rlwimi	$s1,$acc09,8,16,23
 | 
			
		||||
	rlwimi	$s2,$acc10,8,16,23
 | 
			
		||||
	rlwimi	$s3,$acc11,8,16,23
 | 
			
		||||
	lwz	$t0,0($key)
 | 
			
		||||
	lwz	$t1,4($key)
 | 
			
		||||
	or	$s0,$s0,$acc12
 | 
			
		||||
	lwz	$t1,4($key)
 | 
			
		||||
	or	$s1,$s1,$acc13
 | 
			
		||||
	lwz	$t2,8($key)
 | 
			
		||||
	lwz	$t3,12($key)
 | 
			
		||||
	or	$s2,$s2,$acc14
 | 
			
		||||
	lwz	$t3,12($key)
 | 
			
		||||
	or	$s3,$s3,$acc15
 | 
			
		||||
 | 
			
		||||
	addi	$key,$key,16
 | 
			
		||||
@@ -612,12 +701,12 @@ Lenc_compact_loop:
 | 
			
		||||
	and	$acc02,$s2,$mask80
 | 
			
		||||
	and	$acc03,$s3,$mask80
 | 
			
		||||
	srwi	$acc04,$acc00,7		# r1>>7
 | 
			
		||||
	srwi	$acc05,$acc01,7
 | 
			
		||||
	srwi	$acc06,$acc02,7
 | 
			
		||||
	srwi	$acc07,$acc03,7
 | 
			
		||||
	andc	$acc08,$s0,$mask80	# r0&0x7f7f7f7f
 | 
			
		||||
	srwi	$acc05,$acc01,7
 | 
			
		||||
	andc	$acc09,$s1,$mask80
 | 
			
		||||
	srwi	$acc06,$acc02,7
 | 
			
		||||
	andc	$acc10,$s2,$mask80
 | 
			
		||||
	srwi	$acc07,$acc03,7
 | 
			
		||||
	andc	$acc11,$s3,$mask80
 | 
			
		||||
	sub	$acc00,$acc00,$acc04	# r1-(r1>>7)
 | 
			
		||||
	sub	$acc01,$acc01,$acc05
 | 
			
		||||
@@ -633,32 +722,32 @@ Lenc_compact_loop:
 | 
			
		||||
	and	$acc03,$acc03,$mask1b
 | 
			
		||||
	xor	$acc00,$acc00,$acc08	# r2
 | 
			
		||||
	xor	$acc01,$acc01,$acc09
 | 
			
		||||
	 rotlwi	$acc12,$s0,16		# ROTATE(r0,16)
 | 
			
		||||
	xor	$acc02,$acc02,$acc10
 | 
			
		||||
	 rotlwi	$acc13,$s1,16
 | 
			
		||||
	xor	$acc03,$acc03,$acc11
 | 
			
		||||
	 rotlwi	$acc14,$s2,16
 | 
			
		||||
 | 
			
		||||
	rotlwi	$acc12,$s0,16		# ROTATE(r0,16)
 | 
			
		||||
	rotlwi	$acc13,$s1,16
 | 
			
		||||
	rotlwi	$acc14,$s2,16
 | 
			
		||||
	rotlwi	$acc15,$s3,16
 | 
			
		||||
	xor	$s0,$s0,$acc00		# r0^r2
 | 
			
		||||
	rotlwi	$acc15,$s3,16
 | 
			
		||||
	xor	$s1,$s1,$acc01
 | 
			
		||||
	xor	$s2,$s2,$acc02
 | 
			
		||||
	xor	$s3,$s3,$acc03
 | 
			
		||||
	rotrwi	$s0,$s0,24		# ROTATE(r2^r0,24)
 | 
			
		||||
	xor	$s2,$s2,$acc02
 | 
			
		||||
	rotrwi	$s1,$s1,24
 | 
			
		||||
	xor	$s3,$s3,$acc03
 | 
			
		||||
	rotrwi	$s2,$s2,24
 | 
			
		||||
	rotrwi	$s3,$s3,24
 | 
			
		||||
	xor	$s0,$s0,$acc00		# ROTATE(r2^r0,24)^r2
 | 
			
		||||
	rotrwi	$s3,$s3,24
 | 
			
		||||
	xor	$s1,$s1,$acc01
 | 
			
		||||
	xor	$s2,$s2,$acc02
 | 
			
		||||
	xor	$s3,$s3,$acc03
 | 
			
		||||
	rotlwi	$acc08,$acc12,8		# ROTATE(r0,24)
 | 
			
		||||
	rotlwi	$acc09,$acc13,8
 | 
			
		||||
	rotlwi	$acc10,$acc14,8
 | 
			
		||||
	rotlwi	$acc11,$acc15,8
 | 
			
		||||
	xor	$s0,$s0,$acc12		#
 | 
			
		||||
	rotlwi	$acc09,$acc13,8
 | 
			
		||||
	xor	$s1,$s1,$acc13
 | 
			
		||||
	rotlwi	$acc10,$acc14,8
 | 
			
		||||
	xor	$s2,$s2,$acc14
 | 
			
		||||
	rotlwi	$acc11,$acc15,8
 | 
			
		||||
	xor	$s3,$s3,$acc15
 | 
			
		||||
	xor	$s0,$s0,$acc08		#
 | 
			
		||||
	xor	$s1,$s1,$acc09
 | 
			
		||||
@@ -673,14 +762,15 @@ Lenc_compact_done:
 | 
			
		||||
	xor	$s2,$s2,$t2
 | 
			
		||||
	xor	$s3,$s3,$t3
 | 
			
		||||
	blr
 | 
			
		||||
	.long	0
 | 
			
		||||
	.byte	0,12,0x14,0,0,0,0,0
 | 
			
		||||
 | 
			
		||||
.globl	.AES_decrypt
 | 
			
		||||
.align	7
 | 
			
		||||
.AES_decrypt:
 | 
			
		||||
	mflr	r0
 | 
			
		||||
	$STU	$sp,-$FRAME($sp)
 | 
			
		||||
	mflr	r0
 | 
			
		||||
 | 
			
		||||
	$PUSH	r0,`$FRAME-$SIZE_T*21`($sp)
 | 
			
		||||
	$PUSH	$toc,`$FRAME-$SIZE_T*20`($sp)
 | 
			
		||||
	$PUSH	r13,`$FRAME-$SIZE_T*19`($sp)
 | 
			
		||||
	$PUSH	r14,`$FRAME-$SIZE_T*18`($sp)
 | 
			
		||||
@@ -701,7 +791,14 @@ Lenc_compact_done:
 | 
			
		||||
	$PUSH	r29,`$FRAME-$SIZE_T*3`($sp)
 | 
			
		||||
	$PUSH	r30,`$FRAME-$SIZE_T*2`($sp)
 | 
			
		||||
	$PUSH	r31,`$FRAME-$SIZE_T*1`($sp)
 | 
			
		||||
	$PUSH	r0,`$FRAME+$LRSAVE`($sp)
 | 
			
		||||
 | 
			
		||||
	andi.	$t0,$inp,3
 | 
			
		||||
	andi.	$t1,$out,3
 | 
			
		||||
	or.	$t0,$t0,$t1
 | 
			
		||||
	bne	Ldec_unaligned
 | 
			
		||||
 | 
			
		||||
Ldec_unaligned_ok:
 | 
			
		||||
	lwz	$s0,0($inp)
 | 
			
		||||
	lwz	$s1,4($inp)
 | 
			
		||||
	lwz	$s2,8($inp)
 | 
			
		||||
@@ -712,8 +809,80 @@ Lenc_compact_done:
 | 
			
		||||
	stw	$s1,4($out)
 | 
			
		||||
	stw	$s2,8($out)
 | 
			
		||||
	stw	$s3,12($out)
 | 
			
		||||
	b	Ldec_done
 | 
			
		||||
 | 
			
		||||
	$POP	r0,`$FRAME-$SIZE_T*21`($sp)
 | 
			
		||||
Ldec_unaligned:
 | 
			
		||||
	subfic	$t0,$inp,4096
 | 
			
		||||
	subfic	$t1,$out,4096
 | 
			
		||||
	andi.	$t0,$t0,4096-16
 | 
			
		||||
	beq	Ldec_xpage
 | 
			
		||||
	andi.	$t1,$t1,4096-16
 | 
			
		||||
	bne	Ldec_unaligned_ok
 | 
			
		||||
 | 
			
		||||
Ldec_xpage:
 | 
			
		||||
	lbz	$acc00,0($inp)
 | 
			
		||||
	lbz	$acc01,1($inp)
 | 
			
		||||
	lbz	$acc02,2($inp)
 | 
			
		||||
	lbz	$s0,3($inp)
 | 
			
		||||
	lbz	$acc04,4($inp)
 | 
			
		||||
	lbz	$acc05,5($inp)
 | 
			
		||||
	lbz	$acc06,6($inp)
 | 
			
		||||
	lbz	$s1,7($inp)
 | 
			
		||||
	lbz	$acc08,8($inp)
 | 
			
		||||
	lbz	$acc09,9($inp)
 | 
			
		||||
	lbz	$acc10,10($inp)
 | 
			
		||||
	insrwi	$s0,$acc00,8,0
 | 
			
		||||
	lbz	$s2,11($inp)
 | 
			
		||||
	insrwi	$s1,$acc04,8,0
 | 
			
		||||
	lbz	$acc12,12($inp)
 | 
			
		||||
	insrwi	$s0,$acc01,8,8
 | 
			
		||||
	lbz	$acc13,13($inp)
 | 
			
		||||
	insrwi	$s1,$acc05,8,8
 | 
			
		||||
	lbz	$acc14,14($inp)
 | 
			
		||||
	insrwi	$s0,$acc02,8,16
 | 
			
		||||
	lbz	$s3,15($inp)
 | 
			
		||||
	insrwi	$s1,$acc06,8,16
 | 
			
		||||
	insrwi	$s2,$acc08,8,0
 | 
			
		||||
	insrwi	$s3,$acc12,8,0
 | 
			
		||||
	insrwi	$s2,$acc09,8,8
 | 
			
		||||
	insrwi	$s3,$acc13,8,8
 | 
			
		||||
	insrwi	$s2,$acc10,8,16
 | 
			
		||||
	insrwi	$s3,$acc14,8,16
 | 
			
		||||
 | 
			
		||||
	bl	LAES_Td
 | 
			
		||||
	bl	Lppc_AES_decrypt_compact
 | 
			
		||||
 | 
			
		||||
	extrwi	$acc00,$s0,8,0
 | 
			
		||||
	extrwi	$acc01,$s0,8,8
 | 
			
		||||
	stb	$acc00,0($out)
 | 
			
		||||
	extrwi	$acc02,$s0,8,16
 | 
			
		||||
	stb	$acc01,1($out)
 | 
			
		||||
	stb	$acc02,2($out)
 | 
			
		||||
	extrwi	$acc04,$s1,8,0
 | 
			
		||||
	stb	$s0,3($out)
 | 
			
		||||
	extrwi	$acc05,$s1,8,8
 | 
			
		||||
	stb	$acc04,4($out)
 | 
			
		||||
	extrwi	$acc06,$s1,8,16
 | 
			
		||||
	stb	$acc05,5($out)
 | 
			
		||||
	stb	$acc06,6($out)
 | 
			
		||||
	extrwi	$acc08,$s2,8,0
 | 
			
		||||
	stb	$s1,7($out)
 | 
			
		||||
	extrwi	$acc09,$s2,8,8
 | 
			
		||||
	stb	$acc08,8($out)
 | 
			
		||||
	extrwi	$acc10,$s2,8,16
 | 
			
		||||
	stb	$acc09,9($out)
 | 
			
		||||
	stb	$acc10,10($out)
 | 
			
		||||
	extrwi	$acc12,$s3,8,0
 | 
			
		||||
	stb	$s2,11($out)
 | 
			
		||||
	extrwi	$acc13,$s3,8,8
 | 
			
		||||
	stb	$acc12,12($out)
 | 
			
		||||
	extrwi	$acc14,$s3,8,16
 | 
			
		||||
	stb	$acc13,13($out)
 | 
			
		||||
	stb	$acc14,14($out)
 | 
			
		||||
	stb	$s3,15($out)
 | 
			
		||||
 | 
			
		||||
Ldec_done:
 | 
			
		||||
	$POP	r0,`$FRAME+$LRSAVE`($sp)
 | 
			
		||||
	$POP	$toc,`$FRAME-$SIZE_T*20`($sp)
 | 
			
		||||
	$POP	r13,`$FRAME-$SIZE_T*19`($sp)
 | 
			
		||||
	$POP	r14,`$FRAME-$SIZE_T*18`($sp)
 | 
			
		||||
@@ -737,18 +906,21 @@ Lenc_compact_done:
 | 
			
		||||
	mtlr	r0
 | 
			
		||||
	addi	$sp,$sp,$FRAME
 | 
			
		||||
	blr
 | 
			
		||||
	.long	0
 | 
			
		||||
	.byte	0,12,4,1,0x80,18,3,0
 | 
			
		||||
	.long	0
 | 
			
		||||
 | 
			
		||||
.align	5
 | 
			
		||||
Lppc_AES_decrypt:
 | 
			
		||||
	lwz	$acc00,240($key)
 | 
			
		||||
	lwz	$t0,0($key)
 | 
			
		||||
	lwz	$t1,4($key)
 | 
			
		||||
	lwz	$t2,8($key)
 | 
			
		||||
	lwz	$t3,12($key)
 | 
			
		||||
	addi	$Tbl1,$Tbl0,3
 | 
			
		||||
	lwz	$t0,0($key)
 | 
			
		||||
	addi	$Tbl2,$Tbl0,2
 | 
			
		||||
	lwz	$t1,4($key)
 | 
			
		||||
	addi	$Tbl3,$Tbl0,1
 | 
			
		||||
	lwz	$t2,8($key)
 | 
			
		||||
	addi	$acc00,$acc00,-1
 | 
			
		||||
	lwz	$t3,12($key)
 | 
			
		||||
	addi	$key,$key,16
 | 
			
		||||
	xor	$s0,$s0,$t0
 | 
			
		||||
	xor	$s1,$s1,$t1
 | 
			
		||||
@@ -762,44 +934,44 @@ Ldec_loop:
 | 
			
		||||
	rlwinm	$acc02,$s2,`32-24+3`,21,28
 | 
			
		||||
	rlwinm	$acc03,$s3,`32-24+3`,21,28
 | 
			
		||||
	lwz	$t0,0($key)
 | 
			
		||||
	lwz	$t1,4($key)
 | 
			
		||||
	rlwinm	$acc04,$s3,`32-16+3`,21,28
 | 
			
		||||
	lwz	$t1,4($key)
 | 
			
		||||
	rlwinm	$acc05,$s0,`32-16+3`,21,28
 | 
			
		||||
	lwz	$t2,8($key)
 | 
			
		||||
	lwz	$t3,12($key)
 | 
			
		||||
	rlwinm	$acc06,$s1,`32-16+3`,21,28
 | 
			
		||||
	lwz	$t3,12($key)
 | 
			
		||||
	rlwinm	$acc07,$s2,`32-16+3`,21,28
 | 
			
		||||
	lwzx	$acc00,$Tbl0,$acc00
 | 
			
		||||
	lwzx	$acc01,$Tbl0,$acc01
 | 
			
		||||
	rlwinm	$acc08,$s2,`32-8+3`,21,28
 | 
			
		||||
	lwzx	$acc01,$Tbl0,$acc01
 | 
			
		||||
	rlwinm	$acc09,$s3,`32-8+3`,21,28
 | 
			
		||||
	lwzx	$acc02,$Tbl0,$acc02
 | 
			
		||||
	lwzx	$acc03,$Tbl0,$acc03
 | 
			
		||||
	rlwinm	$acc10,$s0,`32-8+3`,21,28
 | 
			
		||||
	lwzx	$acc03,$Tbl0,$acc03
 | 
			
		||||
	rlwinm	$acc11,$s1,`32-8+3`,21,28
 | 
			
		||||
	lwzx	$acc04,$Tbl1,$acc04
 | 
			
		||||
	lwzx	$acc05,$Tbl1,$acc05
 | 
			
		||||
	rlwinm	$acc12,$s1,`0+3`,21,28
 | 
			
		||||
	lwzx	$acc05,$Tbl1,$acc05
 | 
			
		||||
	rlwinm	$acc13,$s2,`0+3`,21,28
 | 
			
		||||
	lwzx	$acc06,$Tbl1,$acc06
 | 
			
		||||
	lwzx	$acc07,$Tbl1,$acc07
 | 
			
		||||
	rlwinm	$acc14,$s3,`0+3`,21,28
 | 
			
		||||
	lwzx	$acc07,$Tbl1,$acc07
 | 
			
		||||
	rlwinm	$acc15,$s0,`0+3`,21,28
 | 
			
		||||
	lwzx	$acc08,$Tbl2,$acc08
 | 
			
		||||
	lwzx	$acc09,$Tbl2,$acc09
 | 
			
		||||
	xor	$t0,$t0,$acc00
 | 
			
		||||
	lwzx	$acc09,$Tbl2,$acc09
 | 
			
		||||
	xor	$t1,$t1,$acc01
 | 
			
		||||
	lwzx	$acc10,$Tbl2,$acc10
 | 
			
		||||
	lwzx	$acc11,$Tbl2,$acc11
 | 
			
		||||
	xor	$t2,$t2,$acc02
 | 
			
		||||
	lwzx	$acc11,$Tbl2,$acc11
 | 
			
		||||
	xor	$t3,$t3,$acc03
 | 
			
		||||
	lwzx	$acc12,$Tbl3,$acc12
 | 
			
		||||
	lwzx	$acc13,$Tbl3,$acc13
 | 
			
		||||
	xor	$t0,$t0,$acc04
 | 
			
		||||
	lwzx	$acc13,$Tbl3,$acc13
 | 
			
		||||
	xor	$t1,$t1,$acc05
 | 
			
		||||
	lwzx	$acc14,$Tbl3,$acc14
 | 
			
		||||
	lwzx	$acc15,$Tbl3,$acc15
 | 
			
		||||
	xor	$t2,$t2,$acc06
 | 
			
		||||
	lwzx	$acc15,$Tbl3,$acc15
 | 
			
		||||
	xor	$t3,$t3,$acc07
 | 
			
		||||
	xor	$t0,$t0,$acc08
 | 
			
		||||
	xor	$t1,$t1,$acc09
 | 
			
		||||
@@ -815,56 +987,56 @@ Ldec_loop:
 | 
			
		||||
	addi	$Tbl2,$Tbl0,2048
 | 
			
		||||
	nop
 | 
			
		||||
	lwz	$t0,0($key)
 | 
			
		||||
	lwz	$t1,4($key)
 | 
			
		||||
	rlwinm	$acc00,$s0,`32-24`,24,31
 | 
			
		||||
	lwz	$t1,4($key)
 | 
			
		||||
	rlwinm	$acc01,$s1,`32-24`,24,31
 | 
			
		||||
	lwz	$t2,8($key)
 | 
			
		||||
	lwz	$t3,12($key)
 | 
			
		||||
	rlwinm	$acc02,$s2,`32-24`,24,31
 | 
			
		||||
	lwz	$t3,12($key)
 | 
			
		||||
	rlwinm	$acc03,$s3,`32-24`,24,31
 | 
			
		||||
	lwz	$acc08,`2048+0`($Tbl0)	! prefetch Td4
 | 
			
		||||
	lwz	$acc09,`2048+32`($Tbl0)
 | 
			
		||||
	rlwinm	$acc04,$s3,`32-16`,24,31
 | 
			
		||||
	lwz	$acc09,`2048+32`($Tbl0)
 | 
			
		||||
	rlwinm	$acc05,$s0,`32-16`,24,31
 | 
			
		||||
	lwz	$acc10,`2048+64`($Tbl0)
 | 
			
		||||
	lwz	$acc11,`2048+96`($Tbl0)
 | 
			
		||||
	lbzx	$acc00,$Tbl2,$acc00
 | 
			
		||||
	lwz	$acc11,`2048+96`($Tbl0)
 | 
			
		||||
	lbzx	$acc01,$Tbl2,$acc01
 | 
			
		||||
	lwz	$acc12,`2048+128`($Tbl0)
 | 
			
		||||
	lwz	$acc13,`2048+160`($Tbl0)
 | 
			
		||||
	rlwinm	$acc06,$s1,`32-16`,24,31
 | 
			
		||||
	lwz	$acc13,`2048+160`($Tbl0)
 | 
			
		||||
	rlwinm	$acc07,$s2,`32-16`,24,31
 | 
			
		||||
	lwz	$acc14,`2048+192`($Tbl0)
 | 
			
		||||
	lwz	$acc15,`2048+224`($Tbl0)
 | 
			
		||||
	rlwinm	$acc08,$s2,`32-8`,24,31
 | 
			
		||||
	lwz	$acc15,`2048+224`($Tbl0)
 | 
			
		||||
	rlwinm	$acc09,$s3,`32-8`,24,31
 | 
			
		||||
	lbzx	$acc02,$Tbl2,$acc02
 | 
			
		||||
	lbzx	$acc03,$Tbl2,$acc03
 | 
			
		||||
	rlwinm	$acc10,$s0,`32-8`,24,31
 | 
			
		||||
	lbzx	$acc03,$Tbl2,$acc03
 | 
			
		||||
	rlwinm	$acc11,$s1,`32-8`,24,31
 | 
			
		||||
	lbzx	$acc04,$Tbl2,$acc04
 | 
			
		||||
	lbzx	$acc05,$Tbl2,$acc05
 | 
			
		||||
	rlwinm	$acc12,$s1,`0`,24,31
 | 
			
		||||
	lbzx	$acc05,$Tbl2,$acc05
 | 
			
		||||
	rlwinm	$acc13,$s2,`0`,24,31
 | 
			
		||||
	lbzx	$acc06,$Tbl2,$acc06
 | 
			
		||||
	lbzx	$acc07,$Tbl2,$acc07
 | 
			
		||||
	rlwinm	$acc14,$s3,`0`,24,31
 | 
			
		||||
	lbzx	$acc07,$Tbl2,$acc07
 | 
			
		||||
	rlwinm	$acc15,$s0,`0`,24,31
 | 
			
		||||
	lbzx	$acc08,$Tbl2,$acc08
 | 
			
		||||
	lbzx	$acc09,$Tbl2,$acc09
 | 
			
		||||
	rlwinm	$s0,$acc00,24,0,7
 | 
			
		||||
	lbzx	$acc09,$Tbl2,$acc09
 | 
			
		||||
	rlwinm	$s1,$acc01,24,0,7
 | 
			
		||||
	lbzx	$acc10,$Tbl2,$acc10
 | 
			
		||||
	lbzx	$acc11,$Tbl2,$acc11
 | 
			
		||||
	rlwinm	$s2,$acc02,24,0,7
 | 
			
		||||
	lbzx	$acc11,$Tbl2,$acc11
 | 
			
		||||
	rlwinm	$s3,$acc03,24,0,7
 | 
			
		||||
	lbzx	$acc12,$Tbl2,$acc12
 | 
			
		||||
	lbzx	$acc13,$Tbl2,$acc13
 | 
			
		||||
	rlwimi	$s0,$acc04,16,8,15
 | 
			
		||||
	lbzx	$acc13,$Tbl2,$acc13
 | 
			
		||||
	rlwimi	$s1,$acc05,16,8,15
 | 
			
		||||
	lbzx	$acc14,$Tbl2,$acc14
 | 
			
		||||
	lbzx	$acc15,$Tbl2,$acc15
 | 
			
		||||
	rlwimi	$s2,$acc06,16,8,15
 | 
			
		||||
	lbzx	$acc15,$Tbl2,$acc15
 | 
			
		||||
	rlwimi	$s3,$acc07,16,8,15
 | 
			
		||||
	rlwimi	$s0,$acc08,8,16,23
 | 
			
		||||
	rlwimi	$s1,$acc09,8,16,23
 | 
			
		||||
@@ -879,20 +1051,22 @@ Ldec_loop:
 | 
			
		||||
	xor	$s2,$s2,$t2
 | 
			
		||||
	xor	$s3,$s3,$t3
 | 
			
		||||
	blr
 | 
			
		||||
	.long	0
 | 
			
		||||
	.byte	0,12,0x14,0,0,0,0,0
 | 
			
		||||
 | 
			
		||||
.align	4
 | 
			
		||||
Lppc_AES_decrypt_compact:
 | 
			
		||||
	lwz	$acc00,240($key)
 | 
			
		||||
	lwz	$t0,0($key)
 | 
			
		||||
	lwz	$t1,4($key)
 | 
			
		||||
	lwz	$t2,8($key)
 | 
			
		||||
	lwz	$t3,12($key)
 | 
			
		||||
	addi	$Tbl1,$Tbl0,2048
 | 
			
		||||
	lwz	$t0,0($key)
 | 
			
		||||
	lis	$mask80,0x8080
 | 
			
		||||
	lwz	$t1,4($key)
 | 
			
		||||
	lis	$mask1b,0x1b1b
 | 
			
		||||
	addi	$key,$key,16
 | 
			
		||||
	lwz	$t2,8($key)
 | 
			
		||||
	ori	$mask80,$mask80,0x8080
 | 
			
		||||
	lwz	$t3,12($key)
 | 
			
		||||
	ori	$mask1b,$mask1b,0x1b1b
 | 
			
		||||
	addi	$key,$key,16
 | 
			
		||||
___
 | 
			
		||||
$code.=<<___ if ($SIZE_T==8);
 | 
			
		||||
	insrdi	$mask80,$mask80,32,0
 | 
			
		||||
@@ -904,10 +1078,10 @@ $code.=<<___;
 | 
			
		||||
Ldec_compact_loop:
 | 
			
		||||
	xor	$s0,$s0,$t0
 | 
			
		||||
	xor	$s1,$s1,$t1
 | 
			
		||||
	xor	$s2,$s2,$t2
 | 
			
		||||
	xor	$s3,$s3,$t3
 | 
			
		||||
	rlwinm	$acc00,$s0,`32-24`,24,31
 | 
			
		||||
	xor	$s2,$s2,$t2
 | 
			
		||||
	rlwinm	$acc01,$s1,`32-24`,24,31
 | 
			
		||||
	xor	$s3,$s3,$t3
 | 
			
		||||
	rlwinm	$acc02,$s2,`32-24`,24,31
 | 
			
		||||
	rlwinm	$acc03,$s3,`32-24`,24,31
 | 
			
		||||
	rlwinm	$acc04,$s3,`32-16`,24,31
 | 
			
		||||
@@ -915,48 +1089,48 @@ Ldec_compact_loop:
 | 
			
		||||
	rlwinm	$acc06,$s1,`32-16`,24,31
 | 
			
		||||
	rlwinm	$acc07,$s2,`32-16`,24,31
 | 
			
		||||
	lbzx	$acc00,$Tbl1,$acc00
 | 
			
		||||
	lbzx	$acc01,$Tbl1,$acc01
 | 
			
		||||
	rlwinm	$acc08,$s2,`32-8`,24,31
 | 
			
		||||
	lbzx	$acc01,$Tbl1,$acc01
 | 
			
		||||
	rlwinm	$acc09,$s3,`32-8`,24,31
 | 
			
		||||
	lbzx	$acc02,$Tbl1,$acc02
 | 
			
		||||
	lbzx	$acc03,$Tbl1,$acc03
 | 
			
		||||
	rlwinm	$acc10,$s0,`32-8`,24,31
 | 
			
		||||
	lbzx	$acc03,$Tbl1,$acc03
 | 
			
		||||
	rlwinm	$acc11,$s1,`32-8`,24,31
 | 
			
		||||
	lbzx	$acc04,$Tbl1,$acc04
 | 
			
		||||
	lbzx	$acc05,$Tbl1,$acc05
 | 
			
		||||
	rlwinm	$acc12,$s1,`0`,24,31
 | 
			
		||||
	lbzx	$acc05,$Tbl1,$acc05
 | 
			
		||||
	rlwinm	$acc13,$s2,`0`,24,31
 | 
			
		||||
	lbzx	$acc06,$Tbl1,$acc06
 | 
			
		||||
	lbzx	$acc07,$Tbl1,$acc07
 | 
			
		||||
	rlwinm	$acc14,$s3,`0`,24,31
 | 
			
		||||
	lbzx	$acc07,$Tbl1,$acc07
 | 
			
		||||
	rlwinm	$acc15,$s0,`0`,24,31
 | 
			
		||||
	lbzx	$acc08,$Tbl1,$acc08
 | 
			
		||||
	lbzx	$acc09,$Tbl1,$acc09
 | 
			
		||||
	rlwinm	$s0,$acc00,24,0,7
 | 
			
		||||
	lbzx	$acc09,$Tbl1,$acc09
 | 
			
		||||
	rlwinm	$s1,$acc01,24,0,7
 | 
			
		||||
	lbzx	$acc10,$Tbl1,$acc10
 | 
			
		||||
	lbzx	$acc11,$Tbl1,$acc11
 | 
			
		||||
	rlwinm	$s2,$acc02,24,0,7
 | 
			
		||||
	lbzx	$acc11,$Tbl1,$acc11
 | 
			
		||||
	rlwinm	$s3,$acc03,24,0,7
 | 
			
		||||
	lbzx	$acc12,$Tbl1,$acc12
 | 
			
		||||
	lbzx	$acc13,$Tbl1,$acc13
 | 
			
		||||
	rlwimi	$s0,$acc04,16,8,15
 | 
			
		||||
	lbzx	$acc13,$Tbl1,$acc13
 | 
			
		||||
	rlwimi	$s1,$acc05,16,8,15
 | 
			
		||||
	lbzx	$acc14,$Tbl1,$acc14
 | 
			
		||||
	lbzx	$acc15,$Tbl1,$acc15
 | 
			
		||||
	rlwimi	$s2,$acc06,16,8,15
 | 
			
		||||
	lbzx	$acc15,$Tbl1,$acc15
 | 
			
		||||
	rlwimi	$s3,$acc07,16,8,15
 | 
			
		||||
	rlwimi	$s0,$acc08,8,16,23
 | 
			
		||||
	rlwimi	$s1,$acc09,8,16,23
 | 
			
		||||
	rlwimi	$s2,$acc10,8,16,23
 | 
			
		||||
	rlwimi	$s3,$acc11,8,16,23
 | 
			
		||||
	lwz	$t0,0($key)
 | 
			
		||||
	lwz	$t1,4($key)
 | 
			
		||||
	or	$s0,$s0,$acc12
 | 
			
		||||
	lwz	$t1,4($key)
 | 
			
		||||
	or	$s1,$s1,$acc13
 | 
			
		||||
	lwz	$t2,8($key)
 | 
			
		||||
	lwz	$t3,12($key)
 | 
			
		||||
	or	$s2,$s2,$acc14
 | 
			
		||||
	lwz	$t3,12($key)
 | 
			
		||||
	or	$s3,$s3,$acc15
 | 
			
		||||
 | 
			
		||||
	addi	$key,$key,16
 | 
			
		||||
@@ -1030,12 +1204,12 @@ $code.=<<___ if ($SIZE_T==4);
 | 
			
		||||
	and	$acc02,$s2,$mask80
 | 
			
		||||
	and	$acc03,$s3,$mask80
 | 
			
		||||
	srwi	$acc04,$acc00,7		# r1>>7
 | 
			
		||||
	srwi	$acc05,$acc01,7
 | 
			
		||||
	srwi	$acc06,$acc02,7
 | 
			
		||||
	srwi	$acc07,$acc03,7
 | 
			
		||||
	andc	$acc08,$s0,$mask80	# r0&0x7f7f7f7f
 | 
			
		||||
	srwi	$acc05,$acc01,7
 | 
			
		||||
	andc	$acc09,$s1,$mask80
 | 
			
		||||
	srwi	$acc06,$acc02,7
 | 
			
		||||
	andc	$acc10,$s2,$mask80
 | 
			
		||||
	srwi	$acc07,$acc03,7
 | 
			
		||||
	andc	$acc11,$s3,$mask80
 | 
			
		||||
	sub	$acc00,$acc00,$acc04	# r1-(r1>>7)
 | 
			
		||||
	sub	$acc01,$acc01,$acc05
 | 
			
		||||
@@ -1059,12 +1233,12 @@ $code.=<<___ if ($SIZE_T==4);
 | 
			
		||||
	and	$acc06,$acc02,$mask80
 | 
			
		||||
	and	$acc07,$acc03,$mask80
 | 
			
		||||
	srwi	$acc08,$acc04,7		# r1>>7
 | 
			
		||||
	srwi	$acc09,$acc05,7
 | 
			
		||||
	srwi	$acc10,$acc06,7
 | 
			
		||||
	srwi	$acc11,$acc07,7
 | 
			
		||||
	andc	$acc12,$acc00,$mask80	# r2&0x7f7f7f7f
 | 
			
		||||
	srwi	$acc09,$acc05,7
 | 
			
		||||
	andc	$acc13,$acc01,$mask80
 | 
			
		||||
	srwi	$acc10,$acc06,7
 | 
			
		||||
	andc	$acc14,$acc02,$mask80
 | 
			
		||||
	srwi	$acc11,$acc07,7
 | 
			
		||||
	andc	$acc15,$acc03,$mask80
 | 
			
		||||
	sub	$acc04,$acc04,$acc08	# r1-(r1>>7)
 | 
			
		||||
	sub	$acc05,$acc05,$acc09
 | 
			
		||||
@@ -1085,13 +1259,13 @@ $code.=<<___ if ($SIZE_T==4);
 | 
			
		||||
 | 
			
		||||
	and	$acc08,$acc04,$mask80	# r1=r4&0x80808080
 | 
			
		||||
	and	$acc09,$acc05,$mask80
 | 
			
		||||
	and	$acc10,$acc06,$mask80
 | 
			
		||||
	and	$acc11,$acc07,$mask80
 | 
			
		||||
	srwi	$acc12,$acc08,7		# r1>>7
 | 
			
		||||
	and	$acc10,$acc06,$mask80
 | 
			
		||||
	srwi	$acc13,$acc09,7
 | 
			
		||||
	and	$acc11,$acc07,$mask80
 | 
			
		||||
	srwi	$acc14,$acc10,7
 | 
			
		||||
	srwi	$acc15,$acc11,7
 | 
			
		||||
	sub	$acc08,$acc08,$acc12	# r1-(r1>>7)
 | 
			
		||||
	srwi	$acc15,$acc11,7
 | 
			
		||||
	sub	$acc09,$acc09,$acc13
 | 
			
		||||
	sub	$acc10,$acc10,$acc14
 | 
			
		||||
	sub	$acc11,$acc11,$acc15
 | 
			
		||||
@@ -1124,10 +1298,10 @@ ___
 | 
			
		||||
$code.=<<___;
 | 
			
		||||
	rotrwi	$s0,$s0,8		# = ROTATE(r0,8)
 | 
			
		||||
	rotrwi	$s1,$s1,8
 | 
			
		||||
	rotrwi	$s2,$s2,8
 | 
			
		||||
	rotrwi	$s3,$s3,8
 | 
			
		||||
	xor	$s0,$s0,$acc00		# ^= r2^r0
 | 
			
		||||
	rotrwi	$s2,$s2,8
 | 
			
		||||
	xor	$s1,$s1,$acc01
 | 
			
		||||
	rotrwi	$s3,$s3,8
 | 
			
		||||
	xor	$s2,$s2,$acc02
 | 
			
		||||
	xor	$s3,$s3,$acc03
 | 
			
		||||
	xor	$acc00,$acc00,$acc08
 | 
			
		||||
@@ -1135,32 +1309,32 @@ $code.=<<___;
 | 
			
		||||
	xor	$acc02,$acc02,$acc10
 | 
			
		||||
	xor	$acc03,$acc03,$acc11
 | 
			
		||||
	xor	$s0,$s0,$acc04		# ^= r4^r0
 | 
			
		||||
	xor	$s1,$s1,$acc05
 | 
			
		||||
	xor	$s2,$s2,$acc06
 | 
			
		||||
	xor	$s3,$s3,$acc07
 | 
			
		||||
	rotrwi	$acc00,$acc00,24
 | 
			
		||||
	xor	$s1,$s1,$acc05
 | 
			
		||||
	rotrwi	$acc01,$acc01,24
 | 
			
		||||
	xor	$s2,$s2,$acc06
 | 
			
		||||
	rotrwi	$acc02,$acc02,24
 | 
			
		||||
	xor	$s3,$s3,$acc07
 | 
			
		||||
	rotrwi	$acc03,$acc03,24
 | 
			
		||||
	xor	$acc04,$acc04,$acc08
 | 
			
		||||
	xor	$acc05,$acc05,$acc09
 | 
			
		||||
	xor	$acc06,$acc06,$acc10
 | 
			
		||||
	xor	$acc07,$acc07,$acc11
 | 
			
		||||
	xor	$s0,$s0,$acc08		# ^= r8 [^((r4^r0)^(r2^r0)=r4^r2)]
 | 
			
		||||
	xor	$s1,$s1,$acc09
 | 
			
		||||
	xor	$s2,$s2,$acc10
 | 
			
		||||
	xor	$s3,$s3,$acc11
 | 
			
		||||
	rotrwi	$acc04,$acc04,16
 | 
			
		||||
	xor	$s1,$s1,$acc09
 | 
			
		||||
	rotrwi	$acc05,$acc05,16
 | 
			
		||||
	xor	$s2,$s2,$acc10
 | 
			
		||||
	rotrwi	$acc06,$acc06,16
 | 
			
		||||
	xor	$s3,$s3,$acc11
 | 
			
		||||
	rotrwi	$acc07,$acc07,16
 | 
			
		||||
	xor	$s0,$s0,$acc00		# ^= ROTATE(r8^r2^r0,24)
 | 
			
		||||
	xor	$s1,$s1,$acc01
 | 
			
		||||
	xor	$s2,$s2,$acc02
 | 
			
		||||
	xor	$s3,$s3,$acc03
 | 
			
		||||
	rotrwi	$acc08,$acc08,8
 | 
			
		||||
	xor	$s1,$s1,$acc01
 | 
			
		||||
	rotrwi	$acc09,$acc09,8
 | 
			
		||||
	xor	$s2,$s2,$acc02
 | 
			
		||||
	rotrwi	$acc10,$acc10,8
 | 
			
		||||
	xor	$s3,$s3,$acc03
 | 
			
		||||
	rotrwi	$acc11,$acc11,8
 | 
			
		||||
	xor	$s0,$s0,$acc04		# ^= ROTATE(r8^r4^r0,16)
 | 
			
		||||
	xor	$s1,$s1,$acc05
 | 
			
		||||
@@ -1179,7 +1353,9 @@ Ldec_compact_done:
 | 
			
		||||
	xor	$s2,$s2,$t2
 | 
			
		||||
	xor	$s3,$s3,$t3
 | 
			
		||||
	blr
 | 
			
		||||
.long	0
 | 
			
		||||
	.long	0
 | 
			
		||||
	.byte	0,12,0x14,0,0,0,0,0
 | 
			
		||||
 | 
			
		||||
.asciz	"AES for PPC, CRYPTOGAMS by <appro\@openssl.org>"
 | 
			
		||||
.align	7
 | 
			
		||||
___
 | 
			
		||||
 
 | 
			
		||||
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							@@ -589,6 +589,9 @@ $code.=<<___;
 | 
			
		||||
.globl	AES_encrypt
 | 
			
		||||
.type	AES_encrypt,\@function,3
 | 
			
		||||
.align	16
 | 
			
		||||
.globl	asm_AES_encrypt
 | 
			
		||||
.hidden	asm_AES_encrypt
 | 
			
		||||
asm_AES_encrypt:
 | 
			
		||||
AES_encrypt:
 | 
			
		||||
	push	%rbx
 | 
			
		||||
	push	%rbp
 | 
			
		||||
@@ -1185,6 +1188,9 @@ $code.=<<___;
 | 
			
		||||
.globl	AES_decrypt
 | 
			
		||||
.type	AES_decrypt,\@function,3
 | 
			
		||||
.align	16
 | 
			
		||||
.globl	asm_AES_decrypt
 | 
			
		||||
.hidden	asm_AES_decrypt
 | 
			
		||||
asm_AES_decrypt:
 | 
			
		||||
AES_decrypt:
 | 
			
		||||
	push	%rbx
 | 
			
		||||
	push	%rbp
 | 
			
		||||
@@ -1278,13 +1284,13 @@ $code.=<<___;
 | 
			
		||||
___
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# int AES_set_encrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
# int private_AES_set_encrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
#                        AES_KEY *key)
 | 
			
		||||
$code.=<<___;
 | 
			
		||||
.globl	AES_set_encrypt_key
 | 
			
		||||
.type	AES_set_encrypt_key,\@function,3
 | 
			
		||||
.globl	private_AES_set_encrypt_key
 | 
			
		||||
.type	private_AES_set_encrypt_key,\@function,3
 | 
			
		||||
.align	16
 | 
			
		||||
AES_set_encrypt_key:
 | 
			
		||||
private_AES_set_encrypt_key:
 | 
			
		||||
	push	%rbx
 | 
			
		||||
	push	%rbp
 | 
			
		||||
	push	%r12			# redundant, but allows to share 
 | 
			
		||||
@@ -1305,7 +1311,7 @@ AES_set_encrypt_key:
 | 
			
		||||
	add	\$56,%rsp
 | 
			
		||||
.Lenc_key_epilogue:
 | 
			
		||||
	ret
 | 
			
		||||
.size	AES_set_encrypt_key,.-AES_set_encrypt_key
 | 
			
		||||
.size	private_AES_set_encrypt_key,.-private_AES_set_encrypt_key
 | 
			
		||||
 | 
			
		||||
.type	_x86_64_AES_set_encrypt_key,\@abi-omnipotent
 | 
			
		||||
.align	16
 | 
			
		||||
@@ -1548,13 +1554,13 @@ $code.=<<___;
 | 
			
		||||
___
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# int AES_set_decrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
# int private_AES_set_decrypt_key(const unsigned char *userKey, const int bits,
 | 
			
		||||
#                        AES_KEY *key)
 | 
			
		||||
$code.=<<___;
 | 
			
		||||
.globl	AES_set_decrypt_key
 | 
			
		||||
.type	AES_set_decrypt_key,\@function,3
 | 
			
		||||
.globl	private_AES_set_decrypt_key
 | 
			
		||||
.type	private_AES_set_decrypt_key,\@function,3
 | 
			
		||||
.align	16
 | 
			
		||||
AES_set_decrypt_key:
 | 
			
		||||
private_AES_set_decrypt_key:
 | 
			
		||||
	push	%rbx
 | 
			
		||||
	push	%rbp
 | 
			
		||||
	push	%r12
 | 
			
		||||
@@ -1623,7 +1629,7 @@ $code.=<<___;
 | 
			
		||||
	add	\$56,%rsp
 | 
			
		||||
.Ldec_key_epilogue:
 | 
			
		||||
	ret
 | 
			
		||||
.size	AES_set_decrypt_key,.-AES_set_decrypt_key
 | 
			
		||||
.size	private_AES_set_decrypt_key,.-private_AES_set_decrypt_key
 | 
			
		||||
___
 | 
			
		||||
 | 
			
		||||
# void AES_cbc_encrypt (const void char *inp, unsigned char *out,
 | 
			
		||||
@@ -1649,6 +1655,9 @@ $code.=<<___;
 | 
			
		||||
.type	AES_cbc_encrypt,\@function,6
 | 
			
		||||
.align	16
 | 
			
		||||
.extern	OPENSSL_ia32cap_P
 | 
			
		||||
.globl	asm_AES_cbc_encrypt
 | 
			
		||||
.hidden	asm_AES_cbc_encrypt
 | 
			
		||||
asm_AES_cbc_encrypt:
 | 
			
		||||
AES_cbc_encrypt:
 | 
			
		||||
	cmp	\$0,%rdx	# check length
 | 
			
		||||
	je	.Lcbc_epilogue
 | 
			
		||||
@@ -2767,13 +2776,13 @@ cbc_se_handler:
 | 
			
		||||
	.rva	.LSEH_end_AES_decrypt
 | 
			
		||||
	.rva	.LSEH_info_AES_decrypt
 | 
			
		||||
 | 
			
		||||
	.rva	.LSEH_begin_AES_set_encrypt_key
 | 
			
		||||
	.rva	.LSEH_end_AES_set_encrypt_key
 | 
			
		||||
	.rva	.LSEH_info_AES_set_encrypt_key
 | 
			
		||||
	.rva	.LSEH_begin_private_AES_set_encrypt_key
 | 
			
		||||
	.rva	.LSEH_end_private_AES_set_encrypt_key
 | 
			
		||||
	.rva	.LSEH_info_private_AES_set_encrypt_key
 | 
			
		||||
 | 
			
		||||
	.rva	.LSEH_begin_AES_set_decrypt_key
 | 
			
		||||
	.rva	.LSEH_end_AES_set_decrypt_key
 | 
			
		||||
	.rva	.LSEH_info_AES_set_decrypt_key
 | 
			
		||||
	.rva	.LSEH_begin_private_AES_set_decrypt_key
 | 
			
		||||
	.rva	.LSEH_end_private_AES_set_decrypt_key
 | 
			
		||||
	.rva	.LSEH_info_private_AES_set_decrypt_key
 | 
			
		||||
 | 
			
		||||
	.rva	.LSEH_begin_AES_cbc_encrypt
 | 
			
		||||
	.rva	.LSEH_end_AES_cbc_encrypt
 | 
			
		||||
@@ -2789,11 +2798,11 @@ cbc_se_handler:
 | 
			
		||||
	.byte	9,0,0,0
 | 
			
		||||
	.rva	block_se_handler
 | 
			
		||||
	.rva	.Ldec_prologue,.Ldec_epilogue	# HandlerData[]
 | 
			
		||||
.LSEH_info_AES_set_encrypt_key:
 | 
			
		||||
.LSEH_info_private_AES_set_encrypt_key:
 | 
			
		||||
	.byte	9,0,0,0
 | 
			
		||||
	.rva	key_se_handler
 | 
			
		||||
	.rva	.Lenc_key_prologue,.Lenc_key_epilogue	# HandlerData[]
 | 
			
		||||
.LSEH_info_AES_set_decrypt_key:
 | 
			
		||||
.LSEH_info_private_AES_set_decrypt_key:
 | 
			
		||||
	.byte	9,0,0,0
 | 
			
		||||
	.rva	key_se_handler
 | 
			
		||||
	.rva	.Ldec_key_prologue,.Ldec_key_epilogue	# HandlerData[]
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										1250
									
								
								crypto/aes/asm/aesni-sha1-x86_64.pl
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										1250
									
								
								crypto/aes/asm/aesni-sha1-x86_64.pl
									
									
									
									
									
										Normal file
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							
							
								
								
									
										2189
									
								
								crypto/aes/asm/aesni-x86.pl
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										2189
									
								
								crypto/aes/asm/aesni-x86.pl
									
									
									
									
									
										Normal file
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							
							
								
								
									
										3071
									
								
								crypto/aes/asm/aesni-x86_64.pl
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										3071
									
								
								crypto/aes/asm/aesni-x86_64.pl
									
									
									
									
									
										Normal file
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							
							
								
								
									
										3108
									
								
								crypto/aes/asm/bsaes-x86_64.pl
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										3108
									
								
								crypto/aes/asm/bsaes-x86_64.pl
									
									
									
									
									
										Normal file
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							
							
								
								
									
										903
									
								
								crypto/aes/asm/vpaes-x86.pl
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										903
									
								
								crypto/aes/asm/vpaes-x86.pl
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,903 @@
 | 
			
		||||
#!/usr/bin/env perl
 | 
			
		||||
 | 
			
		||||
######################################################################
 | 
			
		||||
## Constant-time SSSE3 AES core implementation.
 | 
			
		||||
## version 0.1
 | 
			
		||||
##
 | 
			
		||||
## By Mike Hamburg (Stanford University), 2009
 | 
			
		||||
## Public domain.
 | 
			
		||||
##
 | 
			
		||||
## For details see http://shiftleft.org/papers/vector_aes/ and
 | 
			
		||||
## http://crypto.stanford.edu/vpaes/.
 | 
			
		||||
 | 
			
		||||
######################################################################
 | 
			
		||||
# September 2011.
 | 
			
		||||
#
 | 
			
		||||
# Port vpaes-x86_64.pl as 32-bit "almost" drop-in replacement for
 | 
			
		||||
# aes-586.pl. "Almost" refers to the fact that AES_cbc_encrypt
 | 
			
		||||
# doesn't handle partial vectors (doesn't have to if called from
 | 
			
		||||
# EVP only). "Drop-in" implies that this module doesn't share key
 | 
			
		||||
# schedule structure with the original nor does it make assumption
 | 
			
		||||
# about its alignment...
 | 
			
		||||
#
 | 
			
		||||
# Performance summary. aes-586.pl column lists large-block CBC
 | 
			
		||||
# encrypt/decrypt/with-hyper-threading-off(*) results in cycles per
 | 
			
		||||
# byte processed with 128-bit key, and vpaes-x86.pl column - [also
 | 
			
		||||
# large-block CBC] encrypt/decrypt.
 | 
			
		||||
#
 | 
			
		||||
#		aes-586.pl		vpaes-x86.pl
 | 
			
		||||
#
 | 
			
		||||
# Core 2(**)	29.1/42.3/18.3		22.0/25.6(***)
 | 
			
		||||
# Nehalem	27.9/40.4/18.1		10.3/12.0
 | 
			
		||||
# Atom		102./119./60.1		64.5/85.3(***)
 | 
			
		||||
#
 | 
			
		||||
# (*)	"Hyper-threading" in the context refers rather to cache shared
 | 
			
		||||
#	among multiple cores, than to specifically Intel HTT. As vast
 | 
			
		||||
#	majority of contemporary cores share cache, slower code path
 | 
			
		||||
#	is common place. In other words "with-hyper-threading-off"
 | 
			
		||||
#	results are presented mostly for reference purposes.
 | 
			
		||||
#
 | 
			
		||||
# (**)	"Core 2" refers to initial 65nm design, a.k.a. Conroe.
 | 
			
		||||
#
 | 
			
		||||
# (***)	Less impressive improvement on Core 2 and Atom is due to slow
 | 
			
		||||
#	pshufb,	yet it's respectable +32%/65%  improvement on Core 2
 | 
			
		||||
#	and +58%/40% on Atom (as implied, over "hyper-threading-safe"
 | 
			
		||||
#	code path).
 | 
			
		||||
#
 | 
			
		||||
#						<appro@openssl.org>
 | 
			
		||||
 | 
			
		||||
$0 =~ m/(.*[\/\\])[^\/\\]+$/; $dir=$1;
 | 
			
		||||
push(@INC,"${dir}","${dir}../../perlasm");
 | 
			
		||||
require "x86asm.pl";
 | 
			
		||||
 | 
			
		||||
&asm_init($ARGV[0],"vpaes-x86.pl",$x86only = $ARGV[$#ARGV] eq "386");
 | 
			
		||||
 | 
			
		||||
$PREFIX="vpaes";
 | 
			
		||||
 | 
			
		||||
my  ($round, $base, $magic, $key, $const, $inp, $out)=
 | 
			
		||||
    ("eax",  "ebx", "ecx",  "edx","ebp",  "esi","edi");
 | 
			
		||||
 | 
			
		||||
&static_label("_vpaes_consts");
 | 
			
		||||
&static_label("_vpaes_schedule_low_round");
 | 
			
		||||
 | 
			
		||||
&set_label("_vpaes_consts",64);
 | 
			
		||||
$k_inv=-0x30;		# inv, inva
 | 
			
		||||
	&data_word(0x0D080180,0x0E05060F,0x0A0B0C02,0x04070309);
 | 
			
		||||
	&data_word(0x0F0B0780,0x01040A06,0x02050809,0x030D0E0C);
 | 
			
		||||
 | 
			
		||||
$k_s0F=-0x10;		# s0F
 | 
			
		||||
	&data_word(0x0F0F0F0F,0x0F0F0F0F,0x0F0F0F0F,0x0F0F0F0F);
 | 
			
		||||
 | 
			
		||||
$k_ipt=0x00;		# input transform (lo, hi)
 | 
			
		||||
	&data_word(0x5A2A7000,0xC2B2E898,0x52227808,0xCABAE090);
 | 
			
		||||
	&data_word(0x317C4D00,0x4C01307D,0xB0FDCC81,0xCD80B1FC);
 | 
			
		||||
 | 
			
		||||
$k_sb1=0x20;		# sb1u, sb1t
 | 
			
		||||
	&data_word(0xCB503E00,0xB19BE18F,0x142AF544,0xA5DF7A6E);
 | 
			
		||||
	&data_word(0xFAE22300,0x3618D415,0x0D2ED9EF,0x3BF7CCC1);
 | 
			
		||||
$k_sb2=0x40;		# sb2u, sb2t
 | 
			
		||||
	&data_word(0x0B712400,0xE27A93C6,0xBC982FCD,0x5EB7E955);
 | 
			
		||||
	&data_word(0x0AE12900,0x69EB8840,0xAB82234A,0xC2A163C8);
 | 
			
		||||
$k_sbo=0x60;		# sbou, sbot
 | 
			
		||||
	&data_word(0x6FBDC700,0xD0D26D17,0xC502A878,0x15AABF7A);
 | 
			
		||||
	&data_word(0x5FBB6A00,0xCFE474A5,0x412B35FA,0x8E1E90D1);
 | 
			
		||||
 | 
			
		||||
$k_mc_forward=0x80;	# mc_forward
 | 
			
		||||
	&data_word(0x00030201,0x04070605,0x080B0A09,0x0C0F0E0D);
 | 
			
		||||
	&data_word(0x04070605,0x080B0A09,0x0C0F0E0D,0x00030201);
 | 
			
		||||
	&data_word(0x080B0A09,0x0C0F0E0D,0x00030201,0x04070605);
 | 
			
		||||
	&data_word(0x0C0F0E0D,0x00030201,0x04070605,0x080B0A09);
 | 
			
		||||
 | 
			
		||||
$k_mc_backward=0xc0;	# mc_backward
 | 
			
		||||
	&data_word(0x02010003,0x06050407,0x0A09080B,0x0E0D0C0F);
 | 
			
		||||
	&data_word(0x0E0D0C0F,0x02010003,0x06050407,0x0A09080B);
 | 
			
		||||
	&data_word(0x0A09080B,0x0E0D0C0F,0x02010003,0x06050407);
 | 
			
		||||
	&data_word(0x06050407,0x0A09080B,0x0E0D0C0F,0x02010003);
 | 
			
		||||
 | 
			
		||||
$k_sr=0x100;		# sr
 | 
			
		||||
	&data_word(0x03020100,0x07060504,0x0B0A0908,0x0F0E0D0C);
 | 
			
		||||
	&data_word(0x0F0A0500,0x030E0904,0x07020D08,0x0B06010C);
 | 
			
		||||
	&data_word(0x0B020900,0x0F060D04,0x030A0108,0x070E050C);
 | 
			
		||||
	&data_word(0x070A0D00,0x0B0E0104,0x0F020508,0x0306090C);
 | 
			
		||||
 | 
			
		||||
$k_rcon=0x140;		# rcon
 | 
			
		||||
	&data_word(0xAF9DEEB6,0x1F8391B9,0x4D7C7D81,0x702A9808);
 | 
			
		||||
 | 
			
		||||
$k_s63=0x150;		# s63: all equal to 0x63 transformed
 | 
			
		||||
	&data_word(0x5B5B5B5B,0x5B5B5B5B,0x5B5B5B5B,0x5B5B5B5B);
 | 
			
		||||
 | 
			
		||||
$k_opt=0x160;		# output transform
 | 
			
		||||
	&data_word(0xD6B66000,0xFF9F4929,0xDEBE6808,0xF7974121);
 | 
			
		||||
	&data_word(0x50BCEC00,0x01EDBD51,0xB05C0CE0,0xE10D5DB1);
 | 
			
		||||
 | 
			
		||||
$k_deskew=0x180;	# deskew tables: inverts the sbox's "skew"
 | 
			
		||||
	&data_word(0x47A4E300,0x07E4A340,0x5DBEF91A,0x1DFEB95A);
 | 
			
		||||
	&data_word(0x83EA6900,0x5F36B5DC,0xF49D1E77,0x2841C2AB);
 | 
			
		||||
##
 | 
			
		||||
##  Decryption stuff
 | 
			
		||||
##  Key schedule constants
 | 
			
		||||
##
 | 
			
		||||
$k_dksd=0x1a0;		# decryption key schedule: invskew x*D
 | 
			
		||||
	&data_word(0xA3E44700,0xFEB91A5D,0x5A1DBEF9,0x0740E3A4);
 | 
			
		||||
	&data_word(0xB5368300,0x41C277F4,0xAB289D1E,0x5FDC69EA);
 | 
			
		||||
$k_dksb=0x1c0;		# decryption key schedule: invskew x*B
 | 
			
		||||
	&data_word(0x8550D500,0x9A4FCA1F,0x1CC94C99,0x03D65386);
 | 
			
		||||
	&data_word(0xB6FC4A00,0x115BEDA7,0x7E3482C8,0xD993256F);
 | 
			
		||||
$k_dkse=0x1e0;		# decryption key schedule: invskew x*E + 0x63
 | 
			
		||||
	&data_word(0x1FC9D600,0xD5031CCA,0x994F5086,0x53859A4C);
 | 
			
		||||
	&data_word(0x4FDC7BE8,0xA2319605,0x20B31487,0xCD5EF96A);
 | 
			
		||||
$k_dks9=0x200;		# decryption key schedule: invskew x*9
 | 
			
		||||
	&data_word(0x7ED9A700,0xB6116FC8,0x82255BFC,0x4AED9334);
 | 
			
		||||
	&data_word(0x27143300,0x45765162,0xE9DAFDCE,0x8BB89FAC);
 | 
			
		||||
 | 
			
		||||
##
 | 
			
		||||
##  Decryption stuff
 | 
			
		||||
##  Round function constants
 | 
			
		||||
##
 | 
			
		||||
$k_dipt=0x220;		# decryption input transform
 | 
			
		||||
	&data_word(0x0B545F00,0x0F505B04,0x114E451A,0x154A411E);
 | 
			
		||||
	&data_word(0x60056500,0x86E383E6,0xF491F194,0x12771772);
 | 
			
		||||
 | 
			
		||||
$k_dsb9=0x240;		# decryption sbox output *9*u, *9*t
 | 
			
		||||
	&data_word(0x9A86D600,0x851C0353,0x4F994CC9,0xCAD51F50);
 | 
			
		||||
	&data_word(0xECD74900,0xC03B1789,0xB2FBA565,0x725E2C9E);
 | 
			
		||||
$k_dsbd=0x260;		# decryption sbox output *D*u, *D*t
 | 
			
		||||
	&data_word(0xE6B1A200,0x7D57CCDF,0x882A4439,0xF56E9B13);
 | 
			
		||||
	&data_word(0x24C6CB00,0x3CE2FAF7,0x15DEEFD3,0x2931180D);
 | 
			
		||||
$k_dsbb=0x280;		# decryption sbox output *B*u, *B*t
 | 
			
		||||
	&data_word(0x96B44200,0xD0226492,0xB0F2D404,0x602646F6);
 | 
			
		||||
	&data_word(0xCD596700,0xC19498A6,0x3255AA6B,0xF3FF0C3E);
 | 
			
		||||
$k_dsbe=0x2a0;		# decryption sbox output *E*u, *E*t
 | 
			
		||||
	&data_word(0x26D4D000,0x46F29296,0x64B4F6B0,0x22426004);
 | 
			
		||||
	&data_word(0xFFAAC100,0x0C55A6CD,0x98593E32,0x9467F36B);
 | 
			
		||||
$k_dsbo=0x2c0;		# decryption sbox final output
 | 
			
		||||
	&data_word(0x7EF94000,0x1387EA53,0xD4943E2D,0xC7AA6DB9);
 | 
			
		||||
	&data_word(0x93441D00,0x12D7560F,0xD8C58E9C,0xCA4B8159);
 | 
			
		||||
&asciz	("Vector Permutation AES for x86/SSSE3, Mike Hamburg (Stanford University)");
 | 
			
		||||
&align	(64);
 | 
			
		||||
 | 
			
		||||
&function_begin_B("_vpaes_preheat");
 | 
			
		||||
	&add	($const,&DWP(0,"esp"));
 | 
			
		||||
	&movdqa	("xmm7",&QWP($k_inv,$const));
 | 
			
		||||
	&movdqa	("xmm6",&QWP($k_s0F,$const));
 | 
			
		||||
	&ret	();
 | 
			
		||||
&function_end_B("_vpaes_preheat");
 | 
			
		||||
 | 
			
		||||
##
 | 
			
		||||
##  _aes_encrypt_core
 | 
			
		||||
##
 | 
			
		||||
##  AES-encrypt %xmm0.
 | 
			
		||||
##
 | 
			
		||||
##  Inputs:
 | 
			
		||||
##     %xmm0 = input
 | 
			
		||||
##     %xmm6-%xmm7 as in _vpaes_preheat
 | 
			
		||||
##    (%edx) = scheduled keys
 | 
			
		||||
##
 | 
			
		||||
##  Output in %xmm0
 | 
			
		||||
##  Clobbers  %xmm1-%xmm5, %eax, %ebx, %ecx, %edx
 | 
			
		||||
##
 | 
			
		||||
##
 | 
			
		||||
&function_begin_B("_vpaes_encrypt_core");
 | 
			
		||||
	&mov	($magic,16);
 | 
			
		||||
	&mov	($round,&DWP(240,$key));
 | 
			
		||||
	&movdqa	("xmm1","xmm6")
 | 
			
		||||
	&movdqa	("xmm2",&QWP($k_ipt,$const));
 | 
			
		||||
	&pandn	("xmm1","xmm0");
 | 
			
		||||
	&movdqu	("xmm5",&QWP(0,$key));
 | 
			
		||||
	&psrld	("xmm1",4);
 | 
			
		||||
	&pand	("xmm0","xmm6");
 | 
			
		||||
	&pshufb	("xmm2","xmm0");
 | 
			
		||||
	&movdqa	("xmm0",&QWP($k_ipt+16,$const));
 | 
			
		||||
	&pshufb	("xmm0","xmm1");
 | 
			
		||||
	&pxor	("xmm2","xmm5");
 | 
			
		||||
	&pxor	("xmm0","xmm2");
 | 
			
		||||
	&add	($key,16);
 | 
			
		||||
	&lea	($base,&DWP($k_mc_backward,$const));
 | 
			
		||||
	&jmp	(&label("enc_entry"));
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
&set_label("enc_loop",16);
 | 
			
		||||
	# middle of middle round
 | 
			
		||||
	&movdqa	("xmm4",&QWP($k_sb1,$const));	# 4 : sb1u
 | 
			
		||||
	&pshufb	("xmm4","xmm2");		# 4 = sb1u
 | 
			
		||||
	&pxor	("xmm4","xmm5");		# 4 = sb1u + k
 | 
			
		||||
	&movdqa	("xmm0",&QWP($k_sb1+16,$const));# 0 : sb1t
 | 
			
		||||
	&pshufb	("xmm0","xmm3");		# 0 = sb1t
 | 
			
		||||
	&pxor	("xmm0","xmm4");		# 0 = A
 | 
			
		||||
	&movdqa	("xmm5",&QWP($k_sb2,$const));	# 4 : sb2u
 | 
			
		||||
	&pshufb	("xmm5","xmm2");		# 4 = sb2u
 | 
			
		||||
	&movdqa	("xmm1",&QWP(-0x40,$base,$magic));# .Lk_mc_forward[]
 | 
			
		||||
	&movdqa	("xmm2",&QWP($k_sb2+16,$const));# 2 : sb2t
 | 
			
		||||
	&pshufb	("xmm2","xmm3");		# 2 = sb2t
 | 
			
		||||
	&pxor	("xmm2","xmm5");		# 2 = 2A
 | 
			
		||||
	&movdqa	("xmm4",&QWP(0,$base,$magic));	# .Lk_mc_backward[]
 | 
			
		||||
	&movdqa	("xmm3","xmm0");		# 3 = A
 | 
			
		||||
	&pshufb	("xmm0","xmm1");		# 0 = B
 | 
			
		||||
	&add	($key,16);			# next key
 | 
			
		||||
	&pxor	("xmm0","xmm2");		# 0 = 2A+B
 | 
			
		||||
	&pshufb	("xmm3","xmm4");		# 3 = D
 | 
			
		||||
	&add	($magic,16);			# next mc
 | 
			
		||||
	&pxor	("xmm3","xmm0");		# 3 = 2A+B+D
 | 
			
		||||
	&pshufb	("xmm0","xmm1");		# 0 = 2B+C
 | 
			
		||||
	&and	($magic,0x30);			# ... mod 4
 | 
			
		||||
	&pxor	("xmm0","xmm3");		# 0 = 2A+3B+C+D
 | 
			
		||||
	&sub	($round,1);			# nr--
 | 
			
		||||
 | 
			
		||||
&set_label("enc_entry");
 | 
			
		||||
	# top of round
 | 
			
		||||
	&movdqa	("xmm1","xmm6");		# 1 : i
 | 
			
		||||
	&pandn	("xmm1","xmm0");		# 1 = i<<4
 | 
			
		||||
	&psrld	("xmm1",4);			# 1 = i
 | 
			
		||||
	&pand	("xmm0","xmm6");		# 0 = k
 | 
			
		||||
	&movdqa	("xmm5",&QWP($k_inv+16,$const));# 2 : a/k
 | 
			
		||||
	&pshufb	("xmm5","xmm0");		# 2 = a/k
 | 
			
		||||
	&pxor	("xmm0","xmm1");		# 0 = j
 | 
			
		||||
	&movdqa	("xmm3","xmm7");		# 3 : 1/i
 | 
			
		||||
	&pshufb	("xmm3","xmm1");		# 3 = 1/i
 | 
			
		||||
	&pxor	("xmm3","xmm5");		# 3 = iak = 1/i + a/k
 | 
			
		||||
	&movdqa	("xmm4","xmm7");		# 4 : 1/j
 | 
			
		||||
	&pshufb	("xmm4","xmm0");		# 4 = 1/j
 | 
			
		||||
	&pxor	("xmm4","xmm5");		# 4 = jak = 1/j + a/k
 | 
			
		||||
	&movdqa	("xmm2","xmm7");		# 2 : 1/iak
 | 
			
		||||
	&pshufb	("xmm2","xmm3");		# 2 = 1/iak
 | 
			
		||||
	&pxor	("xmm2","xmm0");		# 2 = io
 | 
			
		||||
	&movdqa	("xmm3","xmm7");		# 3 : 1/jak
 | 
			
		||||
	&movdqu	("xmm5",&QWP(0,$key));
 | 
			
		||||
	&pshufb	("xmm3","xmm4");		# 3 = 1/jak
 | 
			
		||||
	&pxor	("xmm3","xmm1");		# 3 = jo
 | 
			
		||||
	&jnz	(&label("enc_loop"));
 | 
			
		||||
 | 
			
		||||
	# middle of last round
 | 
			
		||||
	&movdqa	("xmm4",&QWP($k_sbo,$const));	# 3 : sbou      .Lk_sbo
 | 
			
		||||
	&movdqa	("xmm0",&QWP($k_sbo+16,$const));# 3 : sbot      .Lk_sbo+16
 | 
			
		||||
	&pshufb	("xmm4","xmm2");		# 4 = sbou
 | 
			
		||||
	&pxor	("xmm4","xmm5");		# 4 = sb1u + k
 | 
			
		||||
	&pshufb	("xmm0","xmm3");		# 0 = sb1t
 | 
			
		||||
	&movdqa	("xmm1",&QWP(0x40,$base,$magic));# .Lk_sr[]
 | 
			
		||||
	&pxor	("xmm0","xmm4");		# 0 = A
 | 
			
		||||
	&pshufb	("xmm0","xmm1");
 | 
			
		||||
	&ret	();
 | 
			
		||||
&function_end_B("_vpaes_encrypt_core");
 | 
			
		||||
 | 
			
		||||
##
 | 
			
		||||
##  Decryption core
 | 
			
		||||
##
 | 
			
		||||
##  Same API as encryption core.
 | 
			
		||||
##
 | 
			
		||||
&function_begin_B("_vpaes_decrypt_core");
 | 
			
		||||
	&mov	($round,&DWP(240,$key));
 | 
			
		||||
	&lea	($base,&DWP($k_dsbd,$const));
 | 
			
		||||
	&movdqa	("xmm1","xmm6");
 | 
			
		||||
	&movdqa	("xmm2",&QWP($k_dipt-$k_dsbd,$base));
 | 
			
		||||
	&pandn	("xmm1","xmm0");
 | 
			
		||||
	&mov	($magic,$round);
 | 
			
		||||
	&psrld	("xmm1",4)
 | 
			
		||||
	&movdqu	("xmm5",&QWP(0,$key));
 | 
			
		||||
	&shl	($magic,4);
 | 
			
		||||
	&pand	("xmm0","xmm6");
 | 
			
		||||
	&pshufb	("xmm2","xmm0");
 | 
			
		||||
	&movdqa	("xmm0",&QWP($k_dipt-$k_dsbd+16,$base));
 | 
			
		||||
	&xor	($magic,0x30);
 | 
			
		||||
	&pshufb	("xmm0","xmm1");
 | 
			
		||||
	&and	($magic,0x30);
 | 
			
		||||
	&pxor	("xmm2","xmm5");
 | 
			
		||||
	&movdqa	("xmm5",&QWP($k_mc_forward+48,$const));
 | 
			
		||||
	&pxor	("xmm0","xmm2");
 | 
			
		||||
	&add	($key,16);
 | 
			
		||||
	&lea	($magic,&DWP($k_sr-$k_dsbd,$base,$magic));
 | 
			
		||||
	&jmp	(&label("dec_entry"));
 | 
			
		||||
 | 
			
		||||
&set_label("dec_loop",16);
 | 
			
		||||
##
 | 
			
		||||
##  Inverse mix columns
 | 
			
		||||
##
 | 
			
		||||
	&movdqa	("xmm4",&QWP(-0x20,$base));	# 4 : sb9u
 | 
			
		||||
	&pshufb	("xmm4","xmm2");		# 4 = sb9u
 | 
			
		||||
	&pxor	("xmm4","xmm0");
 | 
			
		||||
	&movdqa	("xmm0",&QWP(-0x10,$base));	# 0 : sb9t
 | 
			
		||||
	&pshufb	("xmm0","xmm3");		# 0 = sb9t
 | 
			
		||||
	&pxor	("xmm0","xmm4");		# 0 = ch
 | 
			
		||||
	&add	($key,16);			# next round key
 | 
			
		||||
 | 
			
		||||
	&pshufb	("xmm0","xmm5");		# MC ch
 | 
			
		||||
	&movdqa	("xmm4",&QWP(0,$base));		# 4 : sbdu
 | 
			
		||||
	&pshufb	("xmm4","xmm2");		# 4 = sbdu
 | 
			
		||||
	&pxor	("xmm4","xmm0");		# 4 = ch
 | 
			
		||||
	&movdqa	("xmm0",&QWP(0x10,$base));	# 0 : sbdt
 | 
			
		||||
	&pshufb	("xmm0","xmm3");		# 0 = sbdt
 | 
			
		||||
	&pxor	("xmm0","xmm4");		# 0 = ch
 | 
			
		||||
	&sub	($round,1);			# nr--
 | 
			
		||||
 | 
			
		||||
	&pshufb	("xmm0","xmm5");		# MC ch
 | 
			
		||||
	&movdqa	("xmm4",&QWP(0x20,$base));	# 4 : sbbu
 | 
			
		||||
	&pshufb	("xmm4","xmm2");		# 4 = sbbu
 | 
			
		||||
	&pxor	("xmm4","xmm0");		# 4 = ch
 | 
			
		||||
	&movdqa	("xmm0",&QWP(0x30,$base));	# 0 : sbbt
 | 
			
		||||
	&pshufb	("xmm0","xmm3");		# 0 = sbbt
 | 
			
		||||
	&pxor	("xmm0","xmm4");		# 0 = ch
 | 
			
		||||
 | 
			
		||||
	&pshufb	("xmm0","xmm5");		# MC ch
 | 
			
		||||
	&movdqa	("xmm4",&QWP(0x40,$base));	# 4 : sbeu
 | 
			
		||||
	&pshufb	("xmm4","xmm2");		# 4 = sbeu
 | 
			
		||||
	&pxor	("xmm4","xmm0");		# 4 = ch
 | 
			
		||||
	&movdqa	("xmm0",&QWP(0x50,$base));	# 0 : sbet
 | 
			
		||||
	&pshufb	("xmm0","xmm3");		# 0 = sbet
 | 
			
		||||
	&pxor	("xmm0","xmm4");		# 0 = ch
 | 
			
		||||
 | 
			
		||||
	&palignr("xmm5","xmm5",12);
 | 
			
		||||
 | 
			
		||||
&set_label("dec_entry");
 | 
			
		||||
	# top of round
 | 
			
		||||
	&movdqa	("xmm1","xmm6");		# 1 : i
 | 
			
		||||
	&pandn	("xmm1","xmm0");		# 1 = i<<4
 | 
			
		||||
	&psrld	("xmm1",4);			# 1 = i
 | 
			
		||||
	&pand	("xmm0","xmm6");		# 0 = k
 | 
			
		||||
	&movdqa	("xmm2",&QWP($k_inv+16,$const));# 2 : a/k
 | 
			
		||||
	&pshufb	("xmm2","xmm0");		# 2 = a/k
 | 
			
		||||
	&pxor	("xmm0","xmm1");		# 0 = j
 | 
			
		||||
	&movdqa	("xmm3","xmm7");		# 3 : 1/i
 | 
			
		||||
	&pshufb	("xmm3","xmm1");		# 3 = 1/i
 | 
			
		||||
	&pxor	("xmm3","xmm2");		# 3 = iak = 1/i + a/k
 | 
			
		||||
	&movdqa	("xmm4","xmm7");		# 4 : 1/j
 | 
			
		||||
	&pshufb	("xmm4","xmm0");		# 4 = 1/j
 | 
			
		||||
	&pxor	("xmm4","xmm2");		# 4 = jak = 1/j + a/k
 | 
			
		||||
	&movdqa	("xmm2","xmm7");		# 2 : 1/iak
 | 
			
		||||
	&pshufb	("xmm2","xmm3");		# 2 = 1/iak
 | 
			
		||||
	&pxor	("xmm2","xmm0");		# 2 = io
 | 
			
		||||
	&movdqa	("xmm3","xmm7");		# 3 : 1/jak
 | 
			
		||||
	&pshufb	("xmm3","xmm4");		# 3 = 1/jak
 | 
			
		||||
	&pxor	("xmm3","xmm1");		# 3 = jo
 | 
			
		||||
	&movdqu	("xmm0",&QWP(0,$key));
 | 
			
		||||
	&jnz	(&label("dec_loop"));
 | 
			
		||||
 | 
			
		||||
	# middle of last round
 | 
			
		||||
	&movdqa	("xmm4",&QWP(0x60,$base));	# 3 : sbou
 | 
			
		||||
	&pshufb	("xmm4","xmm2");		# 4 = sbou
 | 
			
		||||
	&pxor	("xmm4","xmm0");		# 4 = sb1u + k
 | 
			
		||||
	&movdqa	("xmm0",&QWP(0x70,$base));	# 0 : sbot
 | 
			
		||||
	&movdqa	("xmm2",&QWP(0,$magic));
 | 
			
		||||
	&pshufb	("xmm0","xmm3");		# 0 = sb1t
 | 
			
		||||
	&pxor	("xmm0","xmm4");		# 0 = A
 | 
			
		||||
	&pshufb	("xmm0","xmm2");
 | 
			
		||||
	&ret	();
 | 
			
		||||
&function_end_B("_vpaes_decrypt_core");
 | 
			
		||||
 | 
			
		||||
########################################################
 | 
			
		||||
##                                                    ##
 | 
			
		||||
##                  AES key schedule                  ##
 | 
			
		||||
##                                                    ##
 | 
			
		||||
########################################################
 | 
			
		||||
&function_begin_B("_vpaes_schedule_core");
 | 
			
		||||
	&add	($const,&DWP(0,"esp"));
 | 
			
		||||
	&movdqu	("xmm0",&QWP(0,$inp));		# load key (unaligned)
 | 
			
		||||
	&movdqa	("xmm2",&QWP($k_rcon,$const));	# load rcon
 | 
			
		||||
 | 
			
		||||
	# input transform
 | 
			
		||||
	&movdqa	("xmm3","xmm0");
 | 
			
		||||
	&lea	($base,&DWP($k_ipt,$const));
 | 
			
		||||
	&movdqa	(&QWP(4,"esp"),"xmm2");		# xmm8
 | 
			
		||||
	&call	("_vpaes_schedule_transform");
 | 
			
		||||
	&movdqa	("xmm7","xmm0");
 | 
			
		||||
 | 
			
		||||
	&test	($out,$out);
 | 
			
		||||
	&jnz	(&label("schedule_am_decrypting"));
 | 
			
		||||
 | 
			
		||||
	# encrypting, output zeroth round key after transform
 | 
			
		||||
	&movdqu	(&QWP(0,$key),"xmm0");
 | 
			
		||||
	&jmp	(&label("schedule_go"));
 | 
			
		||||
 | 
			
		||||
&set_label("schedule_am_decrypting");
 | 
			
		||||
	# decrypting, output zeroth round key after shiftrows
 | 
			
		||||
	&movdqa	("xmm1",&QWP($k_sr,$const,$magic));
 | 
			
		||||
	&pshufb	("xmm3","xmm1");
 | 
			
		||||
	&movdqu	(&QWP(0,$key),"xmm3");
 | 
			
		||||
	&xor	($magic,0x30);
 | 
			
		||||
 | 
			
		||||
&set_label("schedule_go");
 | 
			
		||||
	&cmp	($round,192);
 | 
			
		||||
	&ja	(&label("schedule_256"));
 | 
			
		||||
	&je	(&label("schedule_192"));
 | 
			
		||||
	# 128: fall though
 | 
			
		||||
 | 
			
		||||
##
 | 
			
		||||
##  .schedule_128
 | 
			
		||||
##
 | 
			
		||||
##  128-bit specific part of key schedule.
 | 
			
		||||
##
 | 
			
		||||
##  This schedule is really simple, because all its parts
 | 
			
		||||
##  are accomplished by the subroutines.
 | 
			
		||||
##
 | 
			
		||||
&set_label("schedule_128");
 | 
			
		||||
	&mov	($round,10);
 | 
			
		||||
 | 
			
		||||
&set_label("loop_schedule_128");
 | 
			
		||||
	&call	("_vpaes_schedule_round");
 | 
			
		||||
	&dec	($round);
 | 
			
		||||
	&jz	(&label("schedule_mangle_last"));
 | 
			
		||||
	&call	("_vpaes_schedule_mangle");	# write output
 | 
			
		||||
	&jmp	(&label("loop_schedule_128"));
 | 
			
		||||
 | 
			
		||||
##
 | 
			
		||||
##  .aes_schedule_192
 | 
			
		||||
##
 | 
			
		||||
##  192-bit specific part of key schedule.
 | 
			
		||||
##
 | 
			
		||||
##  The main body of this schedule is the same as the 128-bit
 | 
			
		||||
##  schedule, but with more smearing.  The long, high side is
 | 
			
		||||
##  stored in %xmm7 as before, and the short, low side is in
 | 
			
		||||
##  the high bits of %xmm6.
 | 
			
		||||
##
 | 
			
		||||
##  This schedule is somewhat nastier, however, because each
 | 
			
		||||
##  round produces 192 bits of key material, or 1.5 round keys.
 | 
			
		||||
##  Therefore, on each cycle we do 2 rounds and produce 3 round
 | 
			
		||||
##  keys.
 | 
			
		||||
##
 | 
			
		||||
&set_label("schedule_192",16);
 | 
			
		||||
	&movdqu	("xmm0",&QWP(8,$inp));		# load key part 2 (very unaligned)
 | 
			
		||||
	&call	("_vpaes_schedule_transform");	# input transform	
 | 
			
		||||
	&movdqa	("xmm6","xmm0");		# save short part
 | 
			
		||||
	&pxor	("xmm4","xmm4");		# clear 4
 | 
			
		||||
	&movhlps("xmm6","xmm4");		# clobber low side with zeros
 | 
			
		||||
	&mov	($round,4);
 | 
			
		||||
 | 
			
		||||
&set_label("loop_schedule_192");
 | 
			
		||||
	&call	("_vpaes_schedule_round");
 | 
			
		||||
	&palignr("xmm0","xmm6",8);
 | 
			
		||||
	&call	("_vpaes_schedule_mangle");	# save key n
 | 
			
		||||
	&call	("_vpaes_schedule_192_smear");
 | 
			
		||||
	&call	("_vpaes_schedule_mangle");	# save key n+1
 | 
			
		||||
	&call	("_vpaes_schedule_round");
 | 
			
		||||
	&dec	($round);
 | 
			
		||||
	&jz	(&label("schedule_mangle_last"));
 | 
			
		||||
	&call	("_vpaes_schedule_mangle");	# save key n+2
 | 
			
		||||
	&call	("_vpaes_schedule_192_smear");
 | 
			
		||||
	&jmp	(&label("loop_schedule_192"));
 | 
			
		||||
 | 
			
		||||
##
 | 
			
		||||
##  .aes_schedule_256
 | 
			
		||||
##
 | 
			
		||||
##  256-bit specific part of key schedule.
 | 
			
		||||
##
 | 
			
		||||
##  The structure here is very similar to the 128-bit
 | 
			
		||||
##  schedule, but with an additional "low side" in
 | 
			
		||||
##  %xmm6.  The low side's rounds are the same as the
 | 
			
		||||
##  high side's, except no rcon and no rotation.
 | 
			
		||||
##
 | 
			
		||||
&set_label("schedule_256",16);
 | 
			
		||||
	&movdqu	("xmm0",&QWP(16,$inp));		# load key part 2 (unaligned)
 | 
			
		||||
	&call	("_vpaes_schedule_transform");	# input transform	
 | 
			
		||||
	&mov	($round,7);
 | 
			
		||||
 | 
			
		||||
&set_label("loop_schedule_256");
 | 
			
		||||
	&call	("_vpaes_schedule_mangle");	# output low result
 | 
			
		||||
	&movdqa	("xmm6","xmm0");		# save cur_lo in xmm6
 | 
			
		||||
 | 
			
		||||
	# high round
 | 
			
		||||
	&call	("_vpaes_schedule_round");
 | 
			
		||||
	&dec	($round);
 | 
			
		||||
	&jz	(&label("schedule_mangle_last"));
 | 
			
		||||
	&call	("_vpaes_schedule_mangle");	
 | 
			
		||||
 | 
			
		||||
	# low round. swap xmm7 and xmm6
 | 
			
		||||
	&pshufd	("xmm0","xmm0",0xFF);
 | 
			
		||||
	&movdqa	(&QWP(20,"esp"),"xmm7");
 | 
			
		||||
	&movdqa	("xmm7","xmm6");
 | 
			
		||||
	&call	("_vpaes_schedule_low_round");
 | 
			
		||||
	&movdqa	("xmm7",&QWP(20,"esp"));
 | 
			
		||||
 | 
			
		||||
	&jmp	(&label("loop_schedule_256"));
 | 
			
		||||
 | 
			
		||||
##
 | 
			
		||||
##  .aes_schedule_mangle_last
 | 
			
		||||
##
 | 
			
		||||
##  Mangler for last round of key schedule
 | 
			
		||||
##  Mangles %xmm0
 | 
			
		||||
##    when encrypting, outputs out(%xmm0) ^ 63
 | 
			
		||||
##    when decrypting, outputs unskew(%xmm0)
 | 
			
		||||
##
 | 
			
		||||
##  Always called right before return... jumps to cleanup and exits
 | 
			
		||||
##
 | 
			
		||||
&set_label("schedule_mangle_last",16);
 | 
			
		||||
	# schedule last round key from xmm0
 | 
			
		||||
	&lea	($base,&DWP($k_deskew,$const));
 | 
			
		||||
	&test	($out,$out);
 | 
			
		||||
	&jnz	(&label("schedule_mangle_last_dec"));
 | 
			
		||||
 | 
			
		||||
	# encrypting
 | 
			
		||||
	&movdqa	("xmm1",&QWP($k_sr,$const,$magic));
 | 
			
		||||
	&pshufb	("xmm0","xmm1");		# output permute
 | 
			
		||||
	&lea	($base,&DWP($k_opt,$const));	# prepare to output transform
 | 
			
		||||
	&add	($key,32);
 | 
			
		||||
 | 
			
		||||
&set_label("schedule_mangle_last_dec");
 | 
			
		||||
	&add	($key,-16);
 | 
			
		||||
	&pxor	("xmm0",&QWP($k_s63,$const));
 | 
			
		||||
	&call	("_vpaes_schedule_transform");	# output transform
 | 
			
		||||
	&movdqu	(&QWP(0,$key),"xmm0");		# save last key
 | 
			
		||||
 | 
			
		||||
	# cleanup
 | 
			
		||||
	&pxor	("xmm0","xmm0");
 | 
			
		||||
	&pxor	("xmm1","xmm1");
 | 
			
		||||
	&pxor	("xmm2","xmm2");
 | 
			
		||||
	&pxor	("xmm3","xmm3");
 | 
			
		||||
	&pxor	("xmm4","xmm4");
 | 
			
		||||
	&pxor	("xmm5","xmm5");
 | 
			
		||||
	&pxor	("xmm6","xmm6");
 | 
			
		||||
	&pxor	("xmm7","xmm7");
 | 
			
		||||
	&ret	();
 | 
			
		||||
&function_end_B("_vpaes_schedule_core");
 | 
			
		||||
 | 
			
		||||
##
 | 
			
		||||
##  .aes_schedule_192_smear
 | 
			
		||||
##
 | 
			
		||||
##  Smear the short, low side in the 192-bit key schedule.
 | 
			
		||||
##
 | 
			
		||||
##  Inputs:
 | 
			
		||||
##    %xmm7: high side, b  a  x  y
 | 
			
		||||
##    %xmm6:  low side, d  c  0  0
 | 
			
		||||
##    %xmm13: 0
 | 
			
		||||
##
 | 
			
		||||
##  Outputs:
 | 
			
		||||
##    %xmm6: b+c+d  b+c  0  0
 | 
			
		||||
##    %xmm0: b+c+d  b+c  b  a
 | 
			
		||||
##
 | 
			
		||||
&function_begin_B("_vpaes_schedule_192_smear");
 | 
			
		||||
	&pshufd	("xmm0","xmm6",0x80);		# d c 0 0 -> c 0 0 0
 | 
			
		||||
	&pxor	("xmm6","xmm0");		# -> c+d c 0 0
 | 
			
		||||
	&pshufd	("xmm0","xmm7",0xFE);		# b a _ _ -> b b b a
 | 
			
		||||
	&pxor	("xmm6","xmm0");		# -> b+c+d b+c b a
 | 
			
		||||
	&movdqa	("xmm0","xmm6");
 | 
			
		||||
	&pxor	("xmm1","xmm1");
 | 
			
		||||
	&movhlps("xmm6","xmm1");		# clobber low side with zeros
 | 
			
		||||
	&ret	();
 | 
			
		||||
&function_end_B("_vpaes_schedule_192_smear");
 | 
			
		||||
 | 
			
		||||
##
 | 
			
		||||
##  .aes_schedule_round
 | 
			
		||||
##
 | 
			
		||||
##  Runs one main round of the key schedule on %xmm0, %xmm7
 | 
			
		||||
##
 | 
			
		||||
##  Specifically, runs subbytes on the high dword of %xmm0
 | 
			
		||||
##  then rotates it by one byte and xors into the low dword of
 | 
			
		||||
##  %xmm7.
 | 
			
		||||
##
 | 
			
		||||
##  Adds rcon from low byte of %xmm8, then rotates %xmm8 for
 | 
			
		||||
##  next rcon.
 | 
			
		||||
##
 | 
			
		||||
##  Smears the dwords of %xmm7 by xoring the low into the
 | 
			
		||||
##  second low, result into third, result into highest.
 | 
			
		||||
##
 | 
			
		||||
##  Returns results in %xmm7 = %xmm0.
 | 
			
		||||
##  Clobbers %xmm1-%xmm5.
 | 
			
		||||
##
 | 
			
		||||
&function_begin_B("_vpaes_schedule_round");
 | 
			
		||||
	# extract rcon from xmm8
 | 
			
		||||
	&movdqa	("xmm2",&QWP(8,"esp"));		# xmm8
 | 
			
		||||
	&pxor	("xmm1","xmm1");
 | 
			
		||||
	&palignr("xmm1","xmm2",15);
 | 
			
		||||
	&palignr("xmm2","xmm2",15);
 | 
			
		||||
	&pxor	("xmm7","xmm1");
 | 
			
		||||
 | 
			
		||||
	# rotate
 | 
			
		||||
	&pshufd	("xmm0","xmm0",0xFF);
 | 
			
		||||
	&palignr("xmm0","xmm0",1);
 | 
			
		||||
 | 
			
		||||
	# fall through...
 | 
			
		||||
	&movdqa	(&QWP(8,"esp"),"xmm2");		# xmm8
 | 
			
		||||
 | 
			
		||||
	# low round: same as high round, but no rotation and no rcon.
 | 
			
		||||
&set_label("_vpaes_schedule_low_round");
 | 
			
		||||
	# smear xmm7
 | 
			
		||||
	&movdqa	("xmm1","xmm7");
 | 
			
		||||
	&pslldq	("xmm7",4);
 | 
			
		||||
	&pxor	("xmm7","xmm1");
 | 
			
		||||
	&movdqa	("xmm1","xmm7");
 | 
			
		||||
	&pslldq	("xmm7",8);
 | 
			
		||||
	&pxor	("xmm7","xmm1");
 | 
			
		||||
	&pxor	("xmm7",&QWP($k_s63,$const));
 | 
			
		||||
 | 
			
		||||
	# subbyte
 | 
			
		||||
	&movdqa	("xmm4",&QWP($k_s0F,$const));
 | 
			
		||||
	&movdqa	("xmm5",&QWP($k_inv,$const));	# 4 : 1/j
 | 
			
		||||
	&movdqa	("xmm1","xmm4");	
 | 
			
		||||
	&pandn	("xmm1","xmm0");
 | 
			
		||||
	&psrld	("xmm1",4);			# 1 = i
 | 
			
		||||
	&pand	("xmm0","xmm4");		# 0 = k
 | 
			
		||||
	&movdqa	("xmm2",&QWP($k_inv+16,$const));# 2 : a/k
 | 
			
		||||
	&pshufb	("xmm2","xmm0");		# 2 = a/k
 | 
			
		||||
	&pxor	("xmm0","xmm1");		# 0 = j
 | 
			
		||||
	&movdqa	("xmm3","xmm5");		# 3 : 1/i
 | 
			
		||||
	&pshufb	("xmm3","xmm1");		# 3 = 1/i
 | 
			
		||||
	&pxor	("xmm3","xmm2");		# 3 = iak = 1/i + a/k
 | 
			
		||||
	&movdqa	("xmm4","xmm5");		# 4 : 1/j
 | 
			
		||||
	&pshufb	("xmm4","xmm0");		# 4 = 1/j
 | 
			
		||||
	&pxor	("xmm4","xmm2");		# 4 = jak = 1/j + a/k
 | 
			
		||||
	&movdqa	("xmm2","xmm5");		# 2 : 1/iak
 | 
			
		||||
	&pshufb	("xmm2","xmm3");		# 2 = 1/iak
 | 
			
		||||
	&pxor	("xmm2","xmm0");		# 2 = io
 | 
			
		||||
	&movdqa	("xmm3","xmm5");		# 3 : 1/jak
 | 
			
		||||
	&pshufb	("xmm3","xmm4");		# 3 = 1/jak
 | 
			
		||||
	&pxor	("xmm3","xmm1");		# 3 = jo
 | 
			
		||||
	&movdqa	("xmm4",&QWP($k_sb1,$const));	# 4 : sbou
 | 
			
		||||
	&pshufb	("xmm4","xmm2");		# 4 = sbou
 | 
			
		||||
	&movdqa	("xmm0",&QWP($k_sb1+16,$const));# 0 : sbot
 | 
			
		||||
	&pshufb	("xmm0","xmm3");		# 0 = sb1t
 | 
			
		||||
	&pxor	("xmm0","xmm4");		# 0 = sbox output
 | 
			
		||||
 | 
			
		||||
	# add in smeared stuff
 | 
			
		||||
	&pxor	("xmm0","xmm7");
 | 
			
		||||
	&movdqa	("xmm7","xmm0");
 | 
			
		||||
	&ret	();
 | 
			
		||||
&function_end_B("_vpaes_schedule_round");
 | 
			
		||||
 | 
			
		||||
##
 | 
			
		||||
##  .aes_schedule_transform
 | 
			
		||||
##
 | 
			
		||||
##  Linear-transform %xmm0 according to tables at (%ebx)
 | 
			
		||||
##
 | 
			
		||||
##  Output in %xmm0
 | 
			
		||||
##  Clobbers %xmm1, %xmm2
 | 
			
		||||
##
 | 
			
		||||
&function_begin_B("_vpaes_schedule_transform");
 | 
			
		||||
	&movdqa	("xmm2",&QWP($k_s0F,$const));
 | 
			
		||||
	&movdqa	("xmm1","xmm2");
 | 
			
		||||
	&pandn	("xmm1","xmm0");
 | 
			
		||||
	&psrld	("xmm1",4);
 | 
			
		||||
	&pand	("xmm0","xmm2");
 | 
			
		||||
	&movdqa	("xmm2",&QWP(0,$base));
 | 
			
		||||
	&pshufb	("xmm2","xmm0");
 | 
			
		||||
	&movdqa	("xmm0",&QWP(16,$base));
 | 
			
		||||
	&pshufb	("xmm0","xmm1");
 | 
			
		||||
	&pxor	("xmm0","xmm2");
 | 
			
		||||
	&ret	();
 | 
			
		||||
&function_end_B("_vpaes_schedule_transform");
 | 
			
		||||
 | 
			
		||||
##
 | 
			
		||||
##  .aes_schedule_mangle
 | 
			
		||||
##
 | 
			
		||||
##  Mangle xmm0 from (basis-transformed) standard version
 | 
			
		||||
##  to our version.
 | 
			
		||||
##
 | 
			
		||||
##  On encrypt,
 | 
			
		||||
##    xor with 0x63
 | 
			
		||||
##    multiply by circulant 0,1,1,1
 | 
			
		||||
##    apply shiftrows transform
 | 
			
		||||
##
 | 
			
		||||
##  On decrypt,
 | 
			
		||||
##    xor with 0x63
 | 
			
		||||
##    multiply by "inverse mixcolumns" circulant E,B,D,9
 | 
			
		||||
##    deskew
 | 
			
		||||
##    apply shiftrows transform
 | 
			
		||||
##
 | 
			
		||||
##
 | 
			
		||||
##  Writes out to (%edx), and increments or decrements it
 | 
			
		||||
##  Keeps track of round number mod 4 in %ecx
 | 
			
		||||
##  Preserves xmm0
 | 
			
		||||
##  Clobbers xmm1-xmm5
 | 
			
		||||
##
 | 
			
		||||
&function_begin_B("_vpaes_schedule_mangle");
 | 
			
		||||
	&movdqa	("xmm4","xmm0");	# save xmm0 for later
 | 
			
		||||
	&movdqa	("xmm5",&QWP($k_mc_forward,$const));
 | 
			
		||||
	&test	($out,$out);
 | 
			
		||||
	&jnz	(&label("schedule_mangle_dec"));
 | 
			
		||||
 | 
			
		||||
	# encrypting
 | 
			
		||||
	&add	($key,16);
 | 
			
		||||
	&pxor	("xmm4",&QWP($k_s63,$const));
 | 
			
		||||
	&pshufb	("xmm4","xmm5");
 | 
			
		||||
	&movdqa	("xmm3","xmm4");
 | 
			
		||||
	&pshufb	("xmm4","xmm5");
 | 
			
		||||
	&pxor	("xmm3","xmm4");
 | 
			
		||||
	&pshufb	("xmm4","xmm5");
 | 
			
		||||
	&pxor	("xmm3","xmm4");
 | 
			
		||||
 | 
			
		||||
	&jmp	(&label("schedule_mangle_both"));
 | 
			
		||||
 | 
			
		||||
&set_label("schedule_mangle_dec",16);
 | 
			
		||||
	# inverse mix columns
 | 
			
		||||
	&movdqa	("xmm2",&QWP($k_s0F,$const));
 | 
			
		||||
	&lea	($inp,&DWP($k_dksd,$const));
 | 
			
		||||
	&movdqa	("xmm1","xmm2");
 | 
			
		||||
	&pandn	("xmm1","xmm4");
 | 
			
		||||
	&psrld	("xmm1",4);			# 1 = hi
 | 
			
		||||
	&pand	("xmm4","xmm2");		# 4 = lo
 | 
			
		||||
 | 
			
		||||
	&movdqa	("xmm2",&QWP(0,$inp));
 | 
			
		||||
	&pshufb	("xmm2","xmm4");
 | 
			
		||||
	&movdqa	("xmm3",&QWP(0x10,$inp));
 | 
			
		||||
	&pshufb	("xmm3","xmm1");
 | 
			
		||||
	&pxor	("xmm3","xmm2");
 | 
			
		||||
	&pshufb	("xmm3","xmm5");
 | 
			
		||||
 | 
			
		||||
	&movdqa	("xmm2",&QWP(0x20,$inp));
 | 
			
		||||
	&pshufb	("xmm2","xmm4");
 | 
			
		||||
	&pxor	("xmm2","xmm3");
 | 
			
		||||
	&movdqa	("xmm3",&QWP(0x30,$inp));
 | 
			
		||||
	&pshufb	("xmm3","xmm1");
 | 
			
		||||
	&pxor	("xmm3","xmm2");
 | 
			
		||||
	&pshufb	("xmm3","xmm5");
 | 
			
		||||
 | 
			
		||||
	&movdqa	("xmm2",&QWP(0x40,$inp));
 | 
			
		||||
	&pshufb	("xmm2","xmm4");
 | 
			
		||||
	&pxor	("xmm2","xmm3");
 | 
			
		||||
	&movdqa	("xmm3",&QWP(0x50,$inp));
 | 
			
		||||
	&pshufb	("xmm3","xmm1");
 | 
			
		||||
	&pxor	("xmm3","xmm2");
 | 
			
		||||
	&pshufb	("xmm3","xmm5");
 | 
			
		||||
 | 
			
		||||
	&movdqa	("xmm2",&QWP(0x60,$inp));
 | 
			
		||||
	&pshufb	("xmm2","xmm4");
 | 
			
		||||
	&pxor	("xmm2","xmm3");
 | 
			
		||||
	&movdqa	("xmm3",&QWP(0x70,$inp));
 | 
			
		||||
	&pshufb	("xmm3","xmm1");
 | 
			
		||||
	&pxor	("xmm3","xmm2");
 | 
			
		||||
 | 
			
		||||
	&add	($key,-16);
 | 
			
		||||
 | 
			
		||||
&set_label("schedule_mangle_both");
 | 
			
		||||
	&movdqa	("xmm1",&QWP($k_sr,$const,$magic));
 | 
			
		||||
	&pshufb	("xmm3","xmm1");
 | 
			
		||||
	&add	($magic,-16);
 | 
			
		||||
	&and	($magic,0x30);
 | 
			
		||||
	&movdqu	(&QWP(0,$key),"xmm3");
 | 
			
		||||
	&ret	();
 | 
			
		||||
&function_end_B("_vpaes_schedule_mangle");
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Interface to OpenSSL
 | 
			
		||||
#
 | 
			
		||||
&function_begin("${PREFIX}_set_encrypt_key");
 | 
			
		||||
	&mov	($inp,&wparam(0));		# inp
 | 
			
		||||
	&lea	($base,&DWP(-56,"esp"));
 | 
			
		||||
	&mov	($round,&wparam(1));		# bits
 | 
			
		||||
	&and	($base,-16);
 | 
			
		||||
	&mov	($key,&wparam(2));		# key
 | 
			
		||||
	&xchg	($base,"esp");			# alloca
 | 
			
		||||
	&mov	(&DWP(48,"esp"),$base);
 | 
			
		||||
 | 
			
		||||
	&mov	($base,$round);
 | 
			
		||||
	&shr	($base,5);
 | 
			
		||||
	&add	($base,5);
 | 
			
		||||
	&mov	(&DWP(240,$key),$base);		# AES_KEY->rounds = nbits/32+5;
 | 
			
		||||
	&mov	($magic,0x30);
 | 
			
		||||
	&mov	($out,0);
 | 
			
		||||
 | 
			
		||||
	&lea	($const,&DWP(&label("_vpaes_consts")."+0x30-".&label("pic_point")));
 | 
			
		||||
	&call	("_vpaes_schedule_core");
 | 
			
		||||
&set_label("pic_point");
 | 
			
		||||
 | 
			
		||||
	&mov	("esp",&DWP(48,"esp"));
 | 
			
		||||
	&xor	("eax","eax");
 | 
			
		||||
&function_end("${PREFIX}_set_encrypt_key");
 | 
			
		||||
 | 
			
		||||
&function_begin("${PREFIX}_set_decrypt_key");
 | 
			
		||||
	&mov	($inp,&wparam(0));		# inp
 | 
			
		||||
	&lea	($base,&DWP(-56,"esp"));
 | 
			
		||||
	&mov	($round,&wparam(1));		# bits
 | 
			
		||||
	&and	($base,-16);
 | 
			
		||||
	&mov	($key,&wparam(2));		# key
 | 
			
		||||
	&xchg	($base,"esp");			# alloca
 | 
			
		||||
	&mov	(&DWP(48,"esp"),$base);
 | 
			
		||||
 | 
			
		||||
	&mov	($base,$round);
 | 
			
		||||
	&shr	($base,5);
 | 
			
		||||
	&add	($base,5);
 | 
			
		||||
	&mov	(&DWP(240,$key),$base);	# AES_KEY->rounds = nbits/32+5;
 | 
			
		||||
	&shl	($base,4);
 | 
			
		||||
	&lea	($key,&DWP(16,$key,$base));
 | 
			
		||||
 | 
			
		||||
	&mov	($out,1);
 | 
			
		||||
	&mov	($magic,$round);
 | 
			
		||||
	&shr	($magic,1);
 | 
			
		||||
	&and	($magic,32);
 | 
			
		||||
	&xor	($magic,32);			# nbist==192?0:32;
 | 
			
		||||
 | 
			
		||||
	&lea	($const,&DWP(&label("_vpaes_consts")."+0x30-".&label("pic_point")));
 | 
			
		||||
	&call	("_vpaes_schedule_core");
 | 
			
		||||
&set_label("pic_point");
 | 
			
		||||
 | 
			
		||||
	&mov	("esp",&DWP(48,"esp"));
 | 
			
		||||
	&xor	("eax","eax");
 | 
			
		||||
&function_end("${PREFIX}_set_decrypt_key");
 | 
			
		||||
 | 
			
		||||
&function_begin("${PREFIX}_encrypt");
 | 
			
		||||
	&lea	($const,&DWP(&label("_vpaes_consts")."+0x30-".&label("pic_point")));
 | 
			
		||||
	&call	("_vpaes_preheat");
 | 
			
		||||
&set_label("pic_point");
 | 
			
		||||
	&mov	($inp,&wparam(0));		# inp
 | 
			
		||||
	&lea	($base,&DWP(-56,"esp"));
 | 
			
		||||
	&mov	($out,&wparam(1));		# out
 | 
			
		||||
	&and	($base,-16);
 | 
			
		||||
	&mov	($key,&wparam(2));		# key
 | 
			
		||||
	&xchg	($base,"esp");			# alloca
 | 
			
		||||
	&mov	(&DWP(48,"esp"),$base);
 | 
			
		||||
 | 
			
		||||
	&movdqu	("xmm0",&QWP(0,$inp));
 | 
			
		||||
	&call	("_vpaes_encrypt_core");
 | 
			
		||||
	&movdqu	(&QWP(0,$out),"xmm0");
 | 
			
		||||
 | 
			
		||||
	&mov	("esp",&DWP(48,"esp"));
 | 
			
		||||
&function_end("${PREFIX}_encrypt");
 | 
			
		||||
 | 
			
		||||
&function_begin("${PREFIX}_decrypt");
 | 
			
		||||
	&lea	($const,&DWP(&label("_vpaes_consts")."+0x30-".&label("pic_point")));
 | 
			
		||||
	&call	("_vpaes_preheat");
 | 
			
		||||
&set_label("pic_point");
 | 
			
		||||
	&mov	($inp,&wparam(0));		# inp
 | 
			
		||||
	&lea	($base,&DWP(-56,"esp"));
 | 
			
		||||
	&mov	($out,&wparam(1));		# out
 | 
			
		||||
	&and	($base,-16);
 | 
			
		||||
	&mov	($key,&wparam(2));		# key
 | 
			
		||||
	&xchg	($base,"esp");			# alloca
 | 
			
		||||
	&mov	(&DWP(48,"esp"),$base);
 | 
			
		||||
 | 
			
		||||
	&movdqu	("xmm0",&QWP(0,$inp));
 | 
			
		||||
	&call	("_vpaes_decrypt_core");
 | 
			
		||||
	&movdqu	(&QWP(0,$out),"xmm0");
 | 
			
		||||
 | 
			
		||||
	&mov	("esp",&DWP(48,"esp"));
 | 
			
		||||
&function_end("${PREFIX}_decrypt");
 | 
			
		||||
 | 
			
		||||
&function_begin("${PREFIX}_cbc_encrypt");
 | 
			
		||||
	&mov	($inp,&wparam(0));		# inp
 | 
			
		||||
	&mov	($out,&wparam(1));		# out
 | 
			
		||||
	&mov	($round,&wparam(2));		# len
 | 
			
		||||
	&mov	($key,&wparam(3));		# key
 | 
			
		||||
	&sub	($round,16);
 | 
			
		||||
	&jc	(&label("cbc_abort"));
 | 
			
		||||
	&lea	($base,&DWP(-56,"esp"));
 | 
			
		||||
	&mov	($const,&wparam(4));		# ivp
 | 
			
		||||
	&and	($base,-16);
 | 
			
		||||
	&mov	($magic,&wparam(5));		# enc
 | 
			
		||||
	&xchg	($base,"esp");			# alloca
 | 
			
		||||
	&movdqu	("xmm1",&QWP(0,$const));	# load IV
 | 
			
		||||
	&sub	($out,$inp);
 | 
			
		||||
	&mov	(&DWP(48,"esp"),$base);
 | 
			
		||||
 | 
			
		||||
	&mov	(&DWP(0,"esp"),$out);		# save out
 | 
			
		||||
	&mov	(&DWP(4,"esp"),$key)		# save key
 | 
			
		||||
	&mov	(&DWP(8,"esp"),$const);		# save ivp
 | 
			
		||||
	&mov	($out,$round);			# $out works as $len
 | 
			
		||||
 | 
			
		||||
	&lea	($const,&DWP(&label("_vpaes_consts")."+0x30-".&label("pic_point")));
 | 
			
		||||
	&call	("_vpaes_preheat");
 | 
			
		||||
&set_label("pic_point");
 | 
			
		||||
	&cmp	($magic,0);
 | 
			
		||||
	&je	(&label("cbc_dec_loop"));
 | 
			
		||||
	&jmp	(&label("cbc_enc_loop"));
 | 
			
		||||
 | 
			
		||||
&set_label("cbc_enc_loop",16);
 | 
			
		||||
	&movdqu	("xmm0",&QWP(0,$inp));		# load input
 | 
			
		||||
	&pxor	("xmm0","xmm1");		# inp^=iv
 | 
			
		||||
	&call	("_vpaes_encrypt_core");
 | 
			
		||||
	&mov	($base,&DWP(0,"esp"));		# restore out
 | 
			
		||||
	&mov	($key,&DWP(4,"esp"));		# restore key
 | 
			
		||||
	&movdqa	("xmm1","xmm0");
 | 
			
		||||
	&movdqu	(&QWP(0,$base,$inp),"xmm0");	# write output
 | 
			
		||||
	&lea	($inp,&DWP(16,$inp));
 | 
			
		||||
	&sub	($out,16);
 | 
			
		||||
	&jnc	(&label("cbc_enc_loop"));
 | 
			
		||||
	&jmp	(&label("cbc_done"));
 | 
			
		||||
 | 
			
		||||
&set_label("cbc_dec_loop",16);
 | 
			
		||||
	&movdqu	("xmm0",&QWP(0,$inp));		# load input
 | 
			
		||||
	&movdqa	(&QWP(16,"esp"),"xmm1");	# save IV
 | 
			
		||||
	&movdqa	(&QWP(32,"esp"),"xmm0");	# save future IV
 | 
			
		||||
	&call	("_vpaes_decrypt_core");
 | 
			
		||||
	&mov	($base,&DWP(0,"esp"));		# restore out
 | 
			
		||||
	&mov	($key,&DWP(4,"esp"));		# restore key
 | 
			
		||||
	&pxor	("xmm0",&QWP(16,"esp"));	# out^=iv
 | 
			
		||||
	&movdqa	("xmm1",&QWP(32,"esp"));	# load next IV
 | 
			
		||||
	&movdqu	(&QWP(0,$base,$inp),"xmm0");	# write output
 | 
			
		||||
	&lea	($inp,&DWP(16,$inp));
 | 
			
		||||
	&sub	($out,16);
 | 
			
		||||
	&jnc	(&label("cbc_dec_loop"));
 | 
			
		||||
 | 
			
		||||
&set_label("cbc_done");
 | 
			
		||||
	&mov	($base,&DWP(8,"esp"));		# restore ivp
 | 
			
		||||
	&mov	("esp",&DWP(48,"esp"));
 | 
			
		||||
	&movdqu	(&QWP(0,$base),"xmm1");		# write IV
 | 
			
		||||
&set_label("cbc_abort");
 | 
			
		||||
&function_end("${PREFIX}_cbc_encrypt");
 | 
			
		||||
 | 
			
		||||
&asm_finish();
 | 
			
		||||
							
								
								
									
										1207
									
								
								crypto/aes/asm/vpaes-x86_64.pl
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										1207
									
								
								crypto/aes/asm/vpaes-x86_64.pl
									
									
									
									
									
										Normal file
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							
							
								
								
									
										51
									
								
								crypto/arm_arch.h
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										51
									
								
								crypto/arm_arch.h
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,51 @@
 | 
			
		||||
#ifndef __ARM_ARCH_H__
 | 
			
		||||
# define __ARM_ARCH_H__
 | 
			
		||||
 | 
			
		||||
# if !defined(__ARM_ARCH__)
 | 
			
		||||
#  if defined(__CC_ARM)
 | 
			
		||||
#   define __ARM_ARCH__ __TARGET_ARCH_ARM
 | 
			
		||||
#   if defined(__BIG_ENDIAN)
 | 
			
		||||
#    define __ARMEB__
 | 
			
		||||
#   else
 | 
			
		||||
#    define __ARMEL__
 | 
			
		||||
#   endif
 | 
			
		||||
#  elif defined(__GNUC__)
 | 
			
		||||
  /*
 | 
			
		||||
   * Why doesn't gcc define __ARM_ARCH__? Instead it defines
 | 
			
		||||
   * bunch of below macros. See all_architectires[] table in
 | 
			
		||||
   * gcc/config/arm/arm.c. On a side note it defines
 | 
			
		||||
   * __ARMEL__/__ARMEB__ for little-/big-endian.
 | 
			
		||||
   */
 | 
			
		||||
#   if   defined(__ARM_ARCH_7__) || defined(__ARM_ARCH_7A__)     || \
 | 
			
		||||
        defined(__ARM_ARCH_7R__)|| defined(__ARM_ARCH_7M__)     || \
 | 
			
		||||
        defined(__ARM_ARCH_7EM__)
 | 
			
		||||
#    define __ARM_ARCH__ 7
 | 
			
		||||
#   elif defined(__ARM_ARCH_6__) || defined(__ARM_ARCH_6J__)     || \
 | 
			
		||||
        defined(__ARM_ARCH_6K__)|| defined(__ARM_ARCH_6M__)     || \
 | 
			
		||||
        defined(__ARM_ARCH_6Z__)|| defined(__ARM_ARCH_6ZK__)    || \
 | 
			
		||||
        defined(__ARM_ARCH_6T2__)
 | 
			
		||||
#    define __ARM_ARCH__ 6
 | 
			
		||||
#   elif defined(__ARM_ARCH_5__) || defined(__ARM_ARCH_5T__)     || \
 | 
			
		||||
        defined(__ARM_ARCH_5E__)|| defined(__ARM_ARCH_5TE__)    || \
 | 
			
		||||
        defined(__ARM_ARCH_5TEJ__)
 | 
			
		||||
#    define __ARM_ARCH__ 5
 | 
			
		||||
#   elif defined(__ARM_ARCH_4__) || defined(__ARM_ARCH_4T__)
 | 
			
		||||
#    define __ARM_ARCH__ 4
 | 
			
		||||
#   else
 | 
			
		||||
#    error "unsupported ARM architecture"
 | 
			
		||||
#   endif
 | 
			
		||||
#  endif
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
# ifdef OPENSSL_FIPSCANISTER
 | 
			
		||||
#  include <openssl/fipssyms.h>
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
# if !__ASSEMBLER__
 | 
			
		||||
extern unsigned int OPENSSL_armcap_P;
 | 
			
		||||
 | 
			
		||||
#  define ARMV7_NEON      (1<<0)
 | 
			
		||||
#  define ARMV7_TICK      (1<<1)
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
#endif
 | 
			
		||||
							
								
								
									
										81
									
								
								crypto/armcap.c
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										81
									
								
								crypto/armcap.c
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,81 @@
 | 
			
		||||
#include <stdio.h>
 | 
			
		||||
#include <stdlib.h>
 | 
			
		||||
#include <string.h>
 | 
			
		||||
#include <setjmp.h>
 | 
			
		||||
#include <signal.h>
 | 
			
		||||
#include <crypto.h>
 | 
			
		||||
 | 
			
		||||
#include "arm_arch.h"
 | 
			
		||||
 | 
			
		||||
unsigned int OPENSSL_armcap_P;
 | 
			
		||||
 | 
			
		||||
static sigset_t all_masked;
 | 
			
		||||
 | 
			
		||||
static sigjmp_buf ill_jmp;
 | 
			
		||||
static void ill_handler(int sig)
 | 
			
		||||
{
 | 
			
		||||
    siglongjmp(ill_jmp, sig);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
/*
 | 
			
		||||
 * Following subroutines could have been inlined, but it's not all
 | 
			
		||||
 * ARM compilers support inline assembler...
 | 
			
		||||
 */
 | 
			
		||||
void _armv7_neon_probe(void);
 | 
			
		||||
unsigned int _armv7_tick(void);
 | 
			
		||||
 | 
			
		||||
unsigned int OPENSSL_rdtsc(void)
 | 
			
		||||
{
 | 
			
		||||
    if (OPENSSL_armcap_P & ARMV7_TICK)
 | 
			
		||||
        return _armv7_tick();
 | 
			
		||||
    else
 | 
			
		||||
        return 0;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
#if defined(__GNUC__) && __GNUC__>=2
 | 
			
		||||
void OPENSSL_cpuid_setup(void) __attribute__ ((constructor));
 | 
			
		||||
#endif
 | 
			
		||||
void OPENSSL_cpuid_setup(void)
 | 
			
		||||
{
 | 
			
		||||
    char *e;
 | 
			
		||||
    struct sigaction ill_oact, ill_act;
 | 
			
		||||
    sigset_t oset;
 | 
			
		||||
    static int trigger = 0;
 | 
			
		||||
 | 
			
		||||
    if (trigger)
 | 
			
		||||
        return;
 | 
			
		||||
    trigger = 1;
 | 
			
		||||
 | 
			
		||||
    if ((e = getenv("OPENSSL_armcap"))) {
 | 
			
		||||
        OPENSSL_armcap_P = strtoul(e, NULL, 0);
 | 
			
		||||
        return;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    sigfillset(&all_masked);
 | 
			
		||||
    sigdelset(&all_masked, SIGILL);
 | 
			
		||||
    sigdelset(&all_masked, SIGTRAP);
 | 
			
		||||
    sigdelset(&all_masked, SIGFPE);
 | 
			
		||||
    sigdelset(&all_masked, SIGBUS);
 | 
			
		||||
    sigdelset(&all_masked, SIGSEGV);
 | 
			
		||||
 | 
			
		||||
    OPENSSL_armcap_P = 0;
 | 
			
		||||
 | 
			
		||||
    memset(&ill_act, 0, sizeof(ill_act));
 | 
			
		||||
    ill_act.sa_handler = ill_handler;
 | 
			
		||||
    ill_act.sa_mask = all_masked;
 | 
			
		||||
 | 
			
		||||
    sigprocmask(SIG_SETMASK, &ill_act.sa_mask, &oset);
 | 
			
		||||
    sigaction(SIGILL, &ill_act, &ill_oact);
 | 
			
		||||
 | 
			
		||||
    if (sigsetjmp(ill_jmp, 1) == 0) {
 | 
			
		||||
        _armv7_neon_probe();
 | 
			
		||||
        OPENSSL_armcap_P |= ARMV7_NEON;
 | 
			
		||||
    }
 | 
			
		||||
    if (sigsetjmp(ill_jmp, 1) == 0) {
 | 
			
		||||
        _armv7_tick();
 | 
			
		||||
        OPENSSL_armcap_P |= ARMV7_TICK;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    sigaction(SIGILL, &ill_oact, NULL);
 | 
			
		||||
    sigprocmask(SIG_SETMASK, &oset, NULL);
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										154
									
								
								crypto/armv4cpuid.S
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										154
									
								
								crypto/armv4cpuid.S
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,154 @@
 | 
			
		||||
#include "arm_arch.h"
 | 
			
		||||
 | 
			
		||||
.text
 | 
			
		||||
.code	32
 | 
			
		||||
 | 
			
		||||
.align	5
 | 
			
		||||
.global	_armv7_neon_probe
 | 
			
		||||
.type	_armv7_neon_probe,%function
 | 
			
		||||
_armv7_neon_probe:
 | 
			
		||||
	.word	0xf26ee1fe	@ vorr	q15,q15,q15
 | 
			
		||||
	.word	0xe12fff1e	@ bx	lr
 | 
			
		||||
.size	_armv7_neon_probe,.-_armv7_neon_probe
 | 
			
		||||
 | 
			
		||||
.global	_armv7_tick
 | 
			
		||||
.type	_armv7_tick,%function
 | 
			
		||||
_armv7_tick:
 | 
			
		||||
	mrc	p15,0,r0,c9,c13,0
 | 
			
		||||
	.word	0xe12fff1e	@ bx	lr
 | 
			
		||||
.size	_armv7_tick,.-_armv7_tick
 | 
			
		||||
 | 
			
		||||
.global	OPENSSL_atomic_add
 | 
			
		||||
.type	OPENSSL_atomic_add,%function
 | 
			
		||||
OPENSSL_atomic_add:
 | 
			
		||||
#if __ARM_ARCH__>=6
 | 
			
		||||
.Ladd:	ldrex	r2,[r0]
 | 
			
		||||
	add	r3,r2,r1
 | 
			
		||||
	strex	r2,r3,[r0]
 | 
			
		||||
	cmp	r2,#0
 | 
			
		||||
	bne	.Ladd
 | 
			
		||||
	mov	r0,r3
 | 
			
		||||
	.word	0xe12fff1e	@ bx	lr
 | 
			
		||||
#else
 | 
			
		||||
	stmdb	sp!,{r4-r6,lr}
 | 
			
		||||
	ldr	r2,.Lspinlock
 | 
			
		||||
	adr	r3,.Lspinlock
 | 
			
		||||
	mov	r4,r0
 | 
			
		||||
	mov	r5,r1
 | 
			
		||||
	add	r6,r3,r2	@ &spinlock
 | 
			
		||||
	b	.+8
 | 
			
		||||
.Lspin:	bl	sched_yield
 | 
			
		||||
	mov	r0,#-1
 | 
			
		||||
	swp	r0,r0,[r6]
 | 
			
		||||
	cmp	r0,#0
 | 
			
		||||
	bne	.Lspin
 | 
			
		||||
 | 
			
		||||
	ldr	r2,[r4]
 | 
			
		||||
	add	r2,r2,r5
 | 
			
		||||
	str	r2,[r4]
 | 
			
		||||
	str	r0,[r6]		@ release spinlock
 | 
			
		||||
	ldmia	sp!,{r4-r6,lr}
 | 
			
		||||
	tst	lr,#1
 | 
			
		||||
	moveq	pc,lr
 | 
			
		||||
	.word	0xe12fff1e	@ bx	lr
 | 
			
		||||
#endif
 | 
			
		||||
.size	OPENSSL_atomic_add,.-OPENSSL_atomic_add
 | 
			
		||||
 | 
			
		||||
.global	OPENSSL_cleanse
 | 
			
		||||
.type	OPENSSL_cleanse,%function
 | 
			
		||||
OPENSSL_cleanse:
 | 
			
		||||
	eor	ip,ip,ip
 | 
			
		||||
	cmp	r1,#7
 | 
			
		||||
	subhs	r1,r1,#4
 | 
			
		||||
	bhs	.Lot
 | 
			
		||||
	cmp	r1,#0
 | 
			
		||||
	beq	.Lcleanse_done
 | 
			
		||||
.Little:
 | 
			
		||||
	strb	ip,[r0],#1
 | 
			
		||||
	subs	r1,r1,#1
 | 
			
		||||
	bhi	.Little
 | 
			
		||||
	b	.Lcleanse_done
 | 
			
		||||
 | 
			
		||||
.Lot:	tst	r0,#3
 | 
			
		||||
	beq	.Laligned
 | 
			
		||||
	strb	ip,[r0],#1
 | 
			
		||||
	sub	r1,r1,#1
 | 
			
		||||
	b	.Lot
 | 
			
		||||
.Laligned:
 | 
			
		||||
	str	ip,[r0],#4
 | 
			
		||||
	subs	r1,r1,#4
 | 
			
		||||
	bhs	.Laligned
 | 
			
		||||
	adds	r1,r1,#4
 | 
			
		||||
	bne	.Little
 | 
			
		||||
.Lcleanse_done:
 | 
			
		||||
	tst	lr,#1
 | 
			
		||||
	moveq	pc,lr
 | 
			
		||||
	.word	0xe12fff1e	@ bx	lr
 | 
			
		||||
.size	OPENSSL_cleanse,.-OPENSSL_cleanse
 | 
			
		||||
 | 
			
		||||
.global	OPENSSL_wipe_cpu
 | 
			
		||||
.type	OPENSSL_wipe_cpu,%function
 | 
			
		||||
OPENSSL_wipe_cpu:
 | 
			
		||||
	ldr	r0,.LOPENSSL_armcap
 | 
			
		||||
	adr	r1,.LOPENSSL_armcap
 | 
			
		||||
	ldr	r0,[r1,r0]
 | 
			
		||||
	eor	r2,r2,r2
 | 
			
		||||
	eor	r3,r3,r3
 | 
			
		||||
	eor	ip,ip,ip
 | 
			
		||||
	tst	r0,#1
 | 
			
		||||
	beq	.Lwipe_done
 | 
			
		||||
	.word	0xf3000150	@ veor    q0, q0, q0
 | 
			
		||||
	.word	0xf3022152	@ veor    q1, q1, q1
 | 
			
		||||
	.word	0xf3044154	@ veor    q2, q2, q2
 | 
			
		||||
	.word	0xf3066156	@ veor    q3, q3, q3
 | 
			
		||||
	.word	0xf34001f0	@ veor    q8, q8, q8
 | 
			
		||||
	.word	0xf34221f2	@ veor    q9, q9, q9
 | 
			
		||||
	.word	0xf34441f4	@ veor    q10, q10, q10
 | 
			
		||||
	.word	0xf34661f6	@ veor    q11, q11, q11
 | 
			
		||||
	.word	0xf34881f8	@ veor    q12, q12, q12
 | 
			
		||||
	.word	0xf34aa1fa	@ veor    q13, q13, q13
 | 
			
		||||
	.word	0xf34cc1fc	@ veor    q14, q14, q14
 | 
			
		||||
	.word	0xf34ee1fe	@ veor    q15, q15, q15
 | 
			
		||||
.Lwipe_done:
 | 
			
		||||
	mov	r0,sp
 | 
			
		||||
	tst	lr,#1
 | 
			
		||||
	moveq	pc,lr
 | 
			
		||||
	.word	0xe12fff1e	@ bx	lr
 | 
			
		||||
.size	OPENSSL_wipe_cpu,.-OPENSSL_wipe_cpu
 | 
			
		||||
 | 
			
		||||
.global	OPENSSL_instrument_bus
 | 
			
		||||
.type	OPENSSL_instrument_bus,%function
 | 
			
		||||
OPENSSL_instrument_bus:
 | 
			
		||||
	eor	r0,r0,r0
 | 
			
		||||
	tst	lr,#1
 | 
			
		||||
	moveq	pc,lr
 | 
			
		||||
	.word	0xe12fff1e	@ bx	lr
 | 
			
		||||
.size	OPENSSL_instrument_bus,.-OPENSSL_instrument_bus
 | 
			
		||||
 | 
			
		||||
.global	OPENSSL_instrument_bus2
 | 
			
		||||
.type	OPENSSL_instrument_bus2,%function
 | 
			
		||||
OPENSSL_instrument_bus2:
 | 
			
		||||
	eor	r0,r0,r0
 | 
			
		||||
	tst	lr,#1
 | 
			
		||||
	moveq	pc,lr
 | 
			
		||||
	.word	0xe12fff1e	@ bx	lr
 | 
			
		||||
.size	OPENSSL_instrument_bus2,.-OPENSSL_instrument_bus2
 | 
			
		||||
 | 
			
		||||
.align	5
 | 
			
		||||
.LOPENSSL_armcap:
 | 
			
		||||
.word	OPENSSL_armcap_P-.LOPENSSL_armcap
 | 
			
		||||
#if __ARM_ARCH__>=6
 | 
			
		||||
.align	5
 | 
			
		||||
#else
 | 
			
		||||
.Lspinlock:
 | 
			
		||||
.word	atomic_add_spinlock-.Lspinlock
 | 
			
		||||
.align	5
 | 
			
		||||
 | 
			
		||||
.data
 | 
			
		||||
.align	2
 | 
			
		||||
atomic_add_spinlock:
 | 
			
		||||
.word	0
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
.comm	OPENSSL_armcap_P,4,4
 | 
			
		||||
.hidden	OPENSSL_armcap_P
 | 
			
		||||
@@ -641,7 +641,7 @@ t_x509.o: ../../include/openssl/rsa.h ../../include/openssl/safestack.h
 | 
			
		||||
t_x509.o: ../../include/openssl/sha.h ../../include/openssl/stack.h
 | 
			
		||||
t_x509.o: ../../include/openssl/symhacks.h ../../include/openssl/x509.h
 | 
			
		||||
t_x509.o: ../../include/openssl/x509_vfy.h ../../include/openssl/x509v3.h
 | 
			
		||||
t_x509.o: ../cryptlib.h t_x509.c
 | 
			
		||||
t_x509.o: ../cryptlib.h asn1_locl.h t_x509.c
 | 
			
		||||
t_x509a.o: ../../e_os.h ../../include/openssl/asn1.h
 | 
			
		||||
t_x509a.o: ../../include/openssl/bio.h ../../include/openssl/buffer.h
 | 
			
		||||
t_x509a.o: ../../include/openssl/crypto.h ../../include/openssl/e_os2.h
 | 
			
		||||
 
 | 
			
		||||
@@ -86,7 +86,8 @@ int ASN1_digest(i2d_of_void *i2d, const EVP_MD *type, char *data,
 | 
			
		||||
    p = str;
 | 
			
		||||
    i2d(data, &p);
 | 
			
		||||
 | 
			
		||||
    EVP_Digest(str, i, md, len, type, NULL);
 | 
			
		||||
    if (!EVP_Digest(str, i, md, len, type, NULL))
 | 
			
		||||
        return 0;
 | 
			
		||||
    OPENSSL_free(str);
 | 
			
		||||
    return (1);
 | 
			
		||||
}
 | 
			
		||||
@@ -103,7 +104,8 @@ int ASN1_item_digest(const ASN1_ITEM *it, const EVP_MD *type, void *asn,
 | 
			
		||||
    if (!str)
 | 
			
		||||
        return (0);
 | 
			
		||||
 | 
			
		||||
    EVP_Digest(str, i, md, len, type, NULL);
 | 
			
		||||
    if (!EVP_Digest(str, i, md, len, type, NULL))
 | 
			
		||||
        return 0;
 | 
			
		||||
    OPENSSL_free(str);
 | 
			
		||||
    return (1);
 | 
			
		||||
}
 | 
			
		||||
 
 | 
			
		||||
@@ -182,10 +182,10 @@ int ASN1_sign(i2d_of_void *i2d, X509_ALGOR *algor1, X509_ALGOR *algor2,
 | 
			
		||||
    p = buf_in;
 | 
			
		||||
 | 
			
		||||
    i2d(data, &p);
 | 
			
		||||
    EVP_SignInit_ex(&ctx, type, NULL);
 | 
			
		||||
    EVP_SignUpdate(&ctx, (unsigned char *)buf_in, inl);
 | 
			
		||||
    if (!EVP_SignFinal(&ctx, (unsigned char *)buf_out,
 | 
			
		||||
                       (unsigned int *)&outl, pkey)) {
 | 
			
		||||
    if (!EVP_SignInit_ex(&ctx, type, NULL)
 | 
			
		||||
        || !EVP_SignUpdate(&ctx, (unsigned char *)buf_in, inl)
 | 
			
		||||
        || !EVP_SignFinal(&ctx, (unsigned char *)buf_out,
 | 
			
		||||
                          (unsigned int *)&outl, pkey)) {
 | 
			
		||||
        outl = 0;
 | 
			
		||||
        ASN1err(ASN1_F_ASN1_SIGN, ERR_R_EVP_LIB);
 | 
			
		||||
        goto err;
 | 
			
		||||
@@ -221,58 +221,89 @@ int ASN1_item_sign(const ASN1_ITEM *it, X509_ALGOR *algor1,
 | 
			
		||||
                   EVP_PKEY *pkey, const EVP_MD *type)
 | 
			
		||||
{
 | 
			
		||||
    EVP_MD_CTX ctx;
 | 
			
		||||
    unsigned char *buf_in = NULL, *buf_out = NULL;
 | 
			
		||||
    int inl = 0, outl = 0, outll = 0;
 | 
			
		||||
    int signid, paramtype;
 | 
			
		||||
 | 
			
		||||
    if (type == NULL) {
 | 
			
		||||
        int def_nid;
 | 
			
		||||
        if (EVP_PKEY_get_default_digest_nid(pkey, &def_nid) > 0)
 | 
			
		||||
            type = EVP_get_digestbynid(def_nid);
 | 
			
		||||
    EVP_MD_CTX_init(&ctx);
 | 
			
		||||
    if (!EVP_DigestSignInit(&ctx, NULL, type, NULL, pkey)) {
 | 
			
		||||
        EVP_MD_CTX_cleanup(&ctx);
 | 
			
		||||
        return 0;
 | 
			
		||||
    }
 | 
			
		||||
    return ASN1_item_sign_ctx(it, algor1, algor2, signature, asn, &ctx);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
    if (type == NULL) {
 | 
			
		||||
        ASN1err(ASN1_F_ASN1_ITEM_SIGN, ASN1_R_NO_DEFAULT_DIGEST);
 | 
			
		||||
int ASN1_item_sign_ctx(const ASN1_ITEM *it,
 | 
			
		||||
                       X509_ALGOR *algor1, X509_ALGOR *algor2,
 | 
			
		||||
                       ASN1_BIT_STRING *signature, void *asn, EVP_MD_CTX *ctx)
 | 
			
		||||
{
 | 
			
		||||
    const EVP_MD *type;
 | 
			
		||||
    EVP_PKEY *pkey;
 | 
			
		||||
    unsigned char *buf_in = NULL, *buf_out = NULL;
 | 
			
		||||
    size_t inl = 0, outl = 0, outll = 0;
 | 
			
		||||
    int signid, paramtype;
 | 
			
		||||
    int rv;
 | 
			
		||||
 | 
			
		||||
    type = EVP_MD_CTX_md(ctx);
 | 
			
		||||
    pkey = EVP_PKEY_CTX_get0_pkey(ctx->pctx);
 | 
			
		||||
 | 
			
		||||
    if (!type || !pkey) {
 | 
			
		||||
        ASN1err(ASN1_F_ASN1_ITEM_SIGN_CTX, ASN1_R_CONTEXT_NOT_INITIALISED);
 | 
			
		||||
        return 0;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (type->flags & EVP_MD_FLAG_PKEY_METHOD_SIGNATURE) {
 | 
			
		||||
        if (!pkey->ameth ||
 | 
			
		||||
            !OBJ_find_sigid_by_algs(&signid, EVP_MD_nid(type),
 | 
			
		||||
                                    pkey->ameth->pkey_id)) {
 | 
			
		||||
            ASN1err(ASN1_F_ASN1_ITEM_SIGN,
 | 
			
		||||
                    ASN1_R_DIGEST_AND_KEY_TYPE_NOT_SUPPORTED);
 | 
			
		||||
            return 0;
 | 
			
		||||
        }
 | 
			
		||||
    if (pkey->ameth->item_sign) {
 | 
			
		||||
        rv = pkey->ameth->item_sign(ctx, it, asn, algor1, algor2, signature);
 | 
			
		||||
        if (rv == 1)
 | 
			
		||||
            outl = signature->length;
 | 
			
		||||
        /*-
 | 
			
		||||
         * Return value meanings:
 | 
			
		||||
         * <=0: error.
 | 
			
		||||
         *   1: method does everything.
 | 
			
		||||
         *   2: carry on as normal.
 | 
			
		||||
         *   3: ASN1 method sets algorithm identifiers: just sign.
 | 
			
		||||
         */
 | 
			
		||||
        if (rv <= 0)
 | 
			
		||||
            ASN1err(ASN1_F_ASN1_ITEM_SIGN_CTX, ERR_R_EVP_LIB);
 | 
			
		||||
        if (rv <= 1)
 | 
			
		||||
            goto err;
 | 
			
		||||
    } else
 | 
			
		||||
        signid = type->pkey_type;
 | 
			
		||||
        rv = 2;
 | 
			
		||||
 | 
			
		||||
    if (pkey->ameth->pkey_flags & ASN1_PKEY_SIGPARAM_NULL)
 | 
			
		||||
        paramtype = V_ASN1_NULL;
 | 
			
		||||
    else
 | 
			
		||||
        paramtype = V_ASN1_UNDEF;
 | 
			
		||||
    if (rv == 2) {
 | 
			
		||||
        if (type->flags & EVP_MD_FLAG_PKEY_METHOD_SIGNATURE) {
 | 
			
		||||
            if (!pkey->ameth ||
 | 
			
		||||
                !OBJ_find_sigid_by_algs(&signid,
 | 
			
		||||
                                        EVP_MD_nid(type),
 | 
			
		||||
                                        pkey->ameth->pkey_id)) {
 | 
			
		||||
                ASN1err(ASN1_F_ASN1_ITEM_SIGN_CTX,
 | 
			
		||||
                        ASN1_R_DIGEST_AND_KEY_TYPE_NOT_SUPPORTED);
 | 
			
		||||
                return 0;
 | 
			
		||||
            }
 | 
			
		||||
        } else
 | 
			
		||||
            signid = type->pkey_type;
 | 
			
		||||
 | 
			
		||||
    if (algor1)
 | 
			
		||||
        X509_ALGOR_set0(algor1, OBJ_nid2obj(signid), paramtype, NULL);
 | 
			
		||||
    if (algor2)
 | 
			
		||||
        X509_ALGOR_set0(algor2, OBJ_nid2obj(signid), paramtype, NULL);
 | 
			
		||||
        if (pkey->ameth->pkey_flags & ASN1_PKEY_SIGPARAM_NULL)
 | 
			
		||||
            paramtype = V_ASN1_NULL;
 | 
			
		||||
        else
 | 
			
		||||
            paramtype = V_ASN1_UNDEF;
 | 
			
		||||
 | 
			
		||||
        if (algor1)
 | 
			
		||||
            X509_ALGOR_set0(algor1, OBJ_nid2obj(signid), paramtype, NULL);
 | 
			
		||||
        if (algor2)
 | 
			
		||||
            X509_ALGOR_set0(algor2, OBJ_nid2obj(signid), paramtype, NULL);
 | 
			
		||||
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    EVP_MD_CTX_init(&ctx);
 | 
			
		||||
    inl = ASN1_item_i2d(asn, &buf_in, it);
 | 
			
		||||
    outll = outl = EVP_PKEY_size(pkey);
 | 
			
		||||
    buf_out = (unsigned char *)OPENSSL_malloc((unsigned int)outl);
 | 
			
		||||
    buf_out = OPENSSL_malloc((unsigned int)outl);
 | 
			
		||||
    if ((buf_in == NULL) || (buf_out == NULL)) {
 | 
			
		||||
        outl = 0;
 | 
			
		||||
        ASN1err(ASN1_F_ASN1_ITEM_SIGN, ERR_R_MALLOC_FAILURE);
 | 
			
		||||
        ASN1err(ASN1_F_ASN1_ITEM_SIGN_CTX, ERR_R_MALLOC_FAILURE);
 | 
			
		||||
        goto err;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    EVP_SignInit_ex(&ctx, type, NULL);
 | 
			
		||||
    EVP_SignUpdate(&ctx, (unsigned char *)buf_in, inl);
 | 
			
		||||
    if (!EVP_SignFinal(&ctx, (unsigned char *)buf_out,
 | 
			
		||||
                       (unsigned int *)&outl, pkey)) {
 | 
			
		||||
    if (!EVP_DigestSignUpdate(ctx, buf_in, inl)
 | 
			
		||||
        || !EVP_DigestSignFinal(ctx, buf_out, &outl)) {
 | 
			
		||||
        outl = 0;
 | 
			
		||||
        ASN1err(ASN1_F_ASN1_ITEM_SIGN, ERR_R_EVP_LIB);
 | 
			
		||||
        ASN1err(ASN1_F_ASN1_ITEM_SIGN_CTX, ERR_R_EVP_LIB);
 | 
			
		||||
        goto err;
 | 
			
		||||
    }
 | 
			
		||||
    if (signature->data != NULL)
 | 
			
		||||
@@ -287,7 +318,7 @@ int ASN1_item_sign(const ASN1_ITEM *it, X509_ALGOR *algor1,
 | 
			
		||||
    signature->flags &= ~(ASN1_STRING_FLAG_BITS_LEFT | 0x07);
 | 
			
		||||
    signature->flags |= ASN1_STRING_FLAG_BITS_LEFT;
 | 
			
		||||
 err:
 | 
			
		||||
    EVP_MD_CTX_cleanup(&ctx);
 | 
			
		||||
    EVP_MD_CTX_cleanup(ctx);
 | 
			
		||||
    if (buf_in != NULL) {
 | 
			
		||||
        OPENSSL_cleanse((char *)buf_in, (unsigned int)inl);
 | 
			
		||||
        OPENSSL_free(buf_in);
 | 
			
		||||
 
 | 
			
		||||
@@ -638,6 +638,7 @@ int ASN1_STRING_to_UTF8(unsigned char **out, ASN1_STRING *in)
 | 
			
		||||
    mbflag |= MBSTRING_FLAG;
 | 
			
		||||
    stmp.data = NULL;
 | 
			
		||||
    stmp.length = 0;
 | 
			
		||||
    stmp.flags = 0;
 | 
			
		||||
    ret =
 | 
			
		||||
        ASN1_mbstring_copy(&str, in->data, in->length, mbflag,
 | 
			
		||||
                           B_ASN1_UTF8STRING);
 | 
			
		||||
 
 | 
			
		||||
@@ -267,6 +267,11 @@ int ASN1_UTCTIME_cmp_time_t(const ASN1_UTCTIME *s, time_t t)
 | 
			
		||||
    t -= offset * 60;           /* FIXME: may overflow in extreme cases */
 | 
			
		||||
 | 
			
		||||
    tm = OPENSSL_gmtime(&t, &data);
 | 
			
		||||
    /*
 | 
			
		||||
     * NB: -1, 0, 1 already valid return values so use -2 to indicate error.
 | 
			
		||||
     */
 | 
			
		||||
    if (tm == NULL)
 | 
			
		||||
        return -2;
 | 
			
		||||
 | 
			
		||||
#define return_cmp(a,b) if ((a)<(b)) return -1; else if ((a)>(b)) return 1
 | 
			
		||||
    year = g2(s->data);
 | 
			
		||||
 
 | 
			
		||||
@@ -104,8 +104,12 @@ int ASN1_verify(i2d_of_void *i2d, X509_ALGOR *a, ASN1_BIT_STRING *signature,
 | 
			
		||||
    p = buf_in;
 | 
			
		||||
 | 
			
		||||
    i2d(data, &p);
 | 
			
		||||
    EVP_VerifyInit_ex(&ctx, type, NULL);
 | 
			
		||||
    EVP_VerifyUpdate(&ctx, (unsigned char *)buf_in, inl);
 | 
			
		||||
    if (!EVP_VerifyInit_ex(&ctx, type, NULL)
 | 
			
		||||
        || !EVP_VerifyUpdate(&ctx, (unsigned char *)buf_in, inl)) {
 | 
			
		||||
        ASN1err(ASN1_F_ASN1_VERIFY, ERR_R_EVP_LIB);
 | 
			
		||||
        ret = 0;
 | 
			
		||||
        goto err;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    OPENSSL_cleanse(buf_in, (unsigned int)inl);
 | 
			
		||||
    OPENSSL_free(buf_in);
 | 
			
		||||
@@ -133,7 +137,6 @@ int ASN1_item_verify(const ASN1_ITEM *it, X509_ALGOR *a,
 | 
			
		||||
                     ASN1_BIT_STRING *signature, void *asn, EVP_PKEY *pkey)
 | 
			
		||||
{
 | 
			
		||||
    EVP_MD_CTX ctx;
 | 
			
		||||
    const EVP_MD *type = NULL;
 | 
			
		||||
    unsigned char *buf_in = NULL;
 | 
			
		||||
    int ret = -1, inl;
 | 
			
		||||
 | 
			
		||||
@@ -156,23 +159,42 @@ int ASN1_item_verify(const ASN1_ITEM *it, X509_ALGOR *a,
 | 
			
		||||
        ASN1err(ASN1_F_ASN1_ITEM_VERIFY, ASN1_R_UNKNOWN_SIGNATURE_ALGORITHM);
 | 
			
		||||
        goto err;
 | 
			
		||||
    }
 | 
			
		||||
    type = EVP_get_digestbynid(mdnid);
 | 
			
		||||
    if (type == NULL) {
 | 
			
		||||
        ASN1err(ASN1_F_ASN1_ITEM_VERIFY,
 | 
			
		||||
                ASN1_R_UNKNOWN_MESSAGE_DIGEST_ALGORITHM);
 | 
			
		||||
        goto err;
 | 
			
		||||
    }
 | 
			
		||||
    if (mdnid == NID_undef) {
 | 
			
		||||
        if (!pkey->ameth || !pkey->ameth->item_verify) {
 | 
			
		||||
            ASN1err(ASN1_F_ASN1_ITEM_VERIFY,
 | 
			
		||||
                    ASN1_R_UNKNOWN_SIGNATURE_ALGORITHM);
 | 
			
		||||
            goto err;
 | 
			
		||||
        }
 | 
			
		||||
        ret = pkey->ameth->item_verify(&ctx, it, asn, a, signature, pkey);
 | 
			
		||||
        /*
 | 
			
		||||
         * Return value of 2 means carry on, anything else means we exit
 | 
			
		||||
         * straight away: either a fatal error of the underlying verification
 | 
			
		||||
         * routine handles all verification.
 | 
			
		||||
         */
 | 
			
		||||
        if (ret != 2)
 | 
			
		||||
            goto err;
 | 
			
		||||
        ret = -1;
 | 
			
		||||
    } else {
 | 
			
		||||
        const EVP_MD *type;
 | 
			
		||||
        type = EVP_get_digestbynid(mdnid);
 | 
			
		||||
        if (type == NULL) {
 | 
			
		||||
            ASN1err(ASN1_F_ASN1_ITEM_VERIFY,
 | 
			
		||||
                    ASN1_R_UNKNOWN_MESSAGE_DIGEST_ALGORITHM);
 | 
			
		||||
            goto err;
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
    /* Check public key OID matches public key type */
 | 
			
		||||
    if (EVP_PKEY_type(pknid) != pkey->ameth->pkey_id) {
 | 
			
		||||
        ASN1err(ASN1_F_ASN1_ITEM_VERIFY, ASN1_R_WRONG_PUBLIC_KEY_TYPE);
 | 
			
		||||
        goto err;
 | 
			
		||||
    }
 | 
			
		||||
        /* Check public key OID matches public key type */
 | 
			
		||||
        if (EVP_PKEY_type(pknid) != pkey->ameth->pkey_id) {
 | 
			
		||||
            ASN1err(ASN1_F_ASN1_ITEM_VERIFY, ASN1_R_WRONG_PUBLIC_KEY_TYPE);
 | 
			
		||||
            goto err;
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        if (!EVP_DigestVerifyInit(&ctx, NULL, type, NULL, pkey)) {
 | 
			
		||||
            ASN1err(ASN1_F_ASN1_ITEM_VERIFY, ERR_R_EVP_LIB);
 | 
			
		||||
            ret = 0;
 | 
			
		||||
            goto err;
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
    if (!EVP_VerifyInit_ex(&ctx, type, NULL)) {
 | 
			
		||||
        ASN1err(ASN1_F_ASN1_ITEM_VERIFY, ERR_R_EVP_LIB);
 | 
			
		||||
        ret = 0;
 | 
			
		||||
        goto err;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    inl = ASN1_item_i2d(asn, &buf_in, it);
 | 
			
		||||
@@ -182,13 +204,17 @@ int ASN1_item_verify(const ASN1_ITEM *it, X509_ALGOR *a,
 | 
			
		||||
        goto err;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    EVP_VerifyUpdate(&ctx, (unsigned char *)buf_in, inl);
 | 
			
		||||
    if (!EVP_DigestVerifyUpdate(&ctx, buf_in, inl)) {
 | 
			
		||||
        ASN1err(ASN1_F_ASN1_ITEM_VERIFY, ERR_R_EVP_LIB);
 | 
			
		||||
        ret = 0;
 | 
			
		||||
        goto err;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    OPENSSL_cleanse(buf_in, (unsigned int)inl);
 | 
			
		||||
    OPENSSL_free(buf_in);
 | 
			
		||||
 | 
			
		||||
    if (EVP_VerifyFinal(&ctx, (unsigned char *)signature->data,
 | 
			
		||||
                        (unsigned int)signature->length, pkey) <= 0) {
 | 
			
		||||
    if (EVP_DigestVerifyFinal(&ctx, signature->data,
 | 
			
		||||
                              (size_t)signature->length) <= 0) {
 | 
			
		||||
        ASN1err(ASN1_F_ASN1_ITEM_VERIFY, ERR_R_EVP_LIB);
 | 
			
		||||
        ret = 0;
 | 
			
		||||
        goto err;
 | 
			
		||||
 
 | 
			
		||||
@@ -70,6 +70,7 @@ extern const EVP_PKEY_ASN1_METHOD dsa_asn1_meths[];
 | 
			
		||||
extern const EVP_PKEY_ASN1_METHOD dh_asn1_meth;
 | 
			
		||||
extern const EVP_PKEY_ASN1_METHOD eckey_asn1_meth;
 | 
			
		||||
extern const EVP_PKEY_ASN1_METHOD hmac_asn1_meth;
 | 
			
		||||
extern const EVP_PKEY_ASN1_METHOD cmac_asn1_meth;
 | 
			
		||||
 | 
			
		||||
/* Keep this sorted in type order !! */
 | 
			
		||||
static const EVP_PKEY_ASN1_METHOD *standard_methods[] = {
 | 
			
		||||
@@ -90,7 +91,8 @@ static const EVP_PKEY_ASN1_METHOD *standard_methods[] = {
 | 
			
		||||
#ifndef OPENSSL_NO_EC
 | 
			
		||||
    &eckey_asn1_meth,
 | 
			
		||||
#endif
 | 
			
		||||
    &hmac_asn1_meth
 | 
			
		||||
    &hmac_asn1_meth,
 | 
			
		||||
    &cmac_asn1_meth
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
typedef int sk_cmp_fn_type(const char *const *a, const char *const *b);
 | 
			
		||||
@@ -284,6 +286,8 @@ EVP_PKEY_ASN1_METHOD *EVP_PKEY_asn1_new(int id, int flags,
 | 
			
		||||
    if (!ameth)
 | 
			
		||||
        return NULL;
 | 
			
		||||
 | 
			
		||||
    memset(ameth, 0, sizeof(EVP_PKEY_ASN1_METHOD));
 | 
			
		||||
 | 
			
		||||
    ameth->pkey_id = id;
 | 
			
		||||
    ameth->pkey_base_id = id;
 | 
			
		||||
    ameth->pkey_flags = flags | ASN1_PKEY_DYNAMIC;
 | 
			
		||||
@@ -314,6 +318,9 @@ EVP_PKEY_ASN1_METHOD *EVP_PKEY_asn1_new(int id, int flags,
 | 
			
		||||
    ameth->old_priv_encode = 0;
 | 
			
		||||
    ameth->old_priv_decode = 0;
 | 
			
		||||
 | 
			
		||||
    ameth->item_verify = 0;
 | 
			
		||||
    ameth->item_sign = 0;
 | 
			
		||||
 | 
			
		||||
    ameth->pkey_size = 0;
 | 
			
		||||
    ameth->pkey_bits = 0;
 | 
			
		||||
 | 
			
		||||
@@ -365,6 +372,9 @@ void EVP_PKEY_asn1_copy(EVP_PKEY_ASN1_METHOD *dst,
 | 
			
		||||
    dst->pkey_free = src->pkey_free;
 | 
			
		||||
    dst->pkey_ctrl = src->pkey_ctrl;
 | 
			
		||||
 | 
			
		||||
    dst->item_sign = src->item_sign;
 | 
			
		||||
    dst->item_verify = src->item_verify;
 | 
			
		||||
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
void EVP_PKEY_asn1_free(EVP_PKEY_ASN1_METHOD *ameth)
 | 
			
		||||
 
 | 
			
		||||
@@ -236,7 +236,7 @@ typedef struct asn1_object_st {
 | 
			
		||||
 */
 | 
			
		||||
# define ASN1_STRING_FLAG_MSTRING 0x040
 | 
			
		||||
/* This is the base type that holds just about everything :-) */
 | 
			
		||||
typedef struct asn1_string_st {
 | 
			
		||||
struct asn1_string_st {
 | 
			
		||||
    int length;
 | 
			
		||||
    int type;
 | 
			
		||||
    unsigned char *data;
 | 
			
		||||
@@ -246,7 +246,7 @@ typedef struct asn1_string_st {
 | 
			
		||||
     * non-zero 'unused bits' value, it will be handled correctly
 | 
			
		||||
     */
 | 
			
		||||
    long flags;
 | 
			
		||||
} ASN1_STRING;
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
/*
 | 
			
		||||
 * ASN1_ENCODING structure: this is used to save the received encoding of an
 | 
			
		||||
@@ -294,7 +294,6 @@ DECLARE_STACK_OF(ASN1_STRING_TABLE)
 | 
			
		||||
 * Declarations for template structures: for full definitions see asn1t.h
 | 
			
		||||
 */
 | 
			
		||||
typedef struct ASN1_TEMPLATE_st ASN1_TEMPLATE;
 | 
			
		||||
typedef struct ASN1_ITEM_st ASN1_ITEM;
 | 
			
		||||
typedef struct ASN1_TLC_st ASN1_TLC;
 | 
			
		||||
/* This is just an opaque pointer */
 | 
			
		||||
typedef struct ASN1_VALUE_st ASN1_VALUE;
 | 
			
		||||
@@ -1205,6 +1204,7 @@ void ERR_load_ASN1_strings(void);
 | 
			
		||||
# define ASN1_F_ASN1_ITEM_I2D_FP                          193
 | 
			
		||||
# define ASN1_F_ASN1_ITEM_PACK                            198
 | 
			
		||||
# define ASN1_F_ASN1_ITEM_SIGN                            195
 | 
			
		||||
# define ASN1_F_ASN1_ITEM_SIGN_CTX                        220
 | 
			
		||||
# define ASN1_F_ASN1_ITEM_UNPACK                          199
 | 
			
		||||
# define ASN1_F_ASN1_ITEM_VERIFY                          197
 | 
			
		||||
# define ASN1_F_ASN1_MBSTRING_NCOPY                       122
 | 
			
		||||
@@ -1277,6 +1277,7 @@ void ERR_load_ASN1_strings(void);
 | 
			
		||||
# define ASN1_F_PKCS5_PBE2_SET_IV                         167
 | 
			
		||||
# define ASN1_F_PKCS5_PBE_SET                             202
 | 
			
		||||
# define ASN1_F_PKCS5_PBE_SET0_ALGOR                      215
 | 
			
		||||
# define ASN1_F_PKCS5_PBKDF2_SET                          219
 | 
			
		||||
# define ASN1_F_SMIME_READ_ASN1                           212
 | 
			
		||||
# define ASN1_F_SMIME_TEXT                                213
 | 
			
		||||
# define ASN1_F_X509_CINF_NEW                             168
 | 
			
		||||
@@ -1302,6 +1303,7 @@ void ERR_load_ASN1_strings(void);
 | 
			
		||||
# define ASN1_R_BOOLEAN_IS_WRONG_LENGTH                   106
 | 
			
		||||
# define ASN1_R_BUFFER_TOO_SMALL                          107
 | 
			
		||||
# define ASN1_R_CIPHER_HAS_NO_OBJECT_IDENTIFIER           108
 | 
			
		||||
# define ASN1_R_CONTEXT_NOT_INITIALISED                   217
 | 
			
		||||
# define ASN1_R_DATA_IS_WRONG                             109
 | 
			
		||||
# define ASN1_R_DECODE_ERROR                              110
 | 
			
		||||
# define ASN1_R_DECODING_ERROR                            111
 | 
			
		||||
 
 | 
			
		||||
@@ -107,6 +107,7 @@ static ERR_STRING_DATA ASN1_str_functs[] = {
 | 
			
		||||
    {ERR_FUNC(ASN1_F_ASN1_ITEM_I2D_FP), "ASN1_item_i2d_fp"},
 | 
			
		||||
    {ERR_FUNC(ASN1_F_ASN1_ITEM_PACK), "ASN1_item_pack"},
 | 
			
		||||
    {ERR_FUNC(ASN1_F_ASN1_ITEM_SIGN), "ASN1_item_sign"},
 | 
			
		||||
    {ERR_FUNC(ASN1_F_ASN1_ITEM_SIGN_CTX), "ASN1_item_sign_ctx"},
 | 
			
		||||
    {ERR_FUNC(ASN1_F_ASN1_ITEM_UNPACK), "ASN1_item_unpack"},
 | 
			
		||||
    {ERR_FUNC(ASN1_F_ASN1_ITEM_VERIFY), "ASN1_item_verify"},
 | 
			
		||||
    {ERR_FUNC(ASN1_F_ASN1_MBSTRING_NCOPY), "ASN1_mbstring_ncopy"},
 | 
			
		||||
@@ -180,6 +181,7 @@ static ERR_STRING_DATA ASN1_str_functs[] = {
 | 
			
		||||
    {ERR_FUNC(ASN1_F_PKCS5_PBE2_SET_IV), "PKCS5_pbe2_set_iv"},
 | 
			
		||||
    {ERR_FUNC(ASN1_F_PKCS5_PBE_SET), "PKCS5_pbe_set"},
 | 
			
		||||
    {ERR_FUNC(ASN1_F_PKCS5_PBE_SET0_ALGOR), "PKCS5_pbe_set0_algor"},
 | 
			
		||||
    {ERR_FUNC(ASN1_F_PKCS5_PBKDF2_SET), "PKCS5_pbkdf2_set"},
 | 
			
		||||
    {ERR_FUNC(ASN1_F_SMIME_READ_ASN1), "SMIME_read_ASN1"},
 | 
			
		||||
    {ERR_FUNC(ASN1_F_SMIME_TEXT), "SMIME_text"},
 | 
			
		||||
    {ERR_FUNC(ASN1_F_X509_CINF_NEW), "X509_CINF_NEW"},
 | 
			
		||||
@@ -209,6 +211,7 @@ static ERR_STRING_DATA ASN1_str_reasons[] = {
 | 
			
		||||
    {ERR_REASON(ASN1_R_BUFFER_TOO_SMALL), "buffer too small"},
 | 
			
		||||
    {ERR_REASON(ASN1_R_CIPHER_HAS_NO_OBJECT_IDENTIFIER),
 | 
			
		||||
     "cipher has no object identifier"},
 | 
			
		||||
    {ERR_REASON(ASN1_R_CONTEXT_NOT_INITIALISED), "context not initialised"},
 | 
			
		||||
    {ERR_REASON(ASN1_R_DATA_IS_WRONG), "data is wrong"},
 | 
			
		||||
    {ERR_REASON(ASN1_R_DECODE_ERROR), "decode error"},
 | 
			
		||||
    {ERR_REASON(ASN1_R_DECODING_ERROR), "decoding error"},
 | 
			
		||||
 
 | 
			
		||||
@@ -373,13 +373,17 @@ static int asn1_cb(const char *elem, int len, void *bitstr)
 | 
			
		||||
        break;
 | 
			
		||||
 | 
			
		||||
    case ASN1_GEN_FLAG_FORMAT:
 | 
			
		||||
        if (!vstart) {
 | 
			
		||||
            ASN1err(ASN1_F_ASN1_CB, ASN1_R_UNKNOWN_FORMAT);
 | 
			
		||||
            return -1;
 | 
			
		||||
        }
 | 
			
		||||
        if (!strncmp(vstart, "ASCII", 5))
 | 
			
		||||
            arg->format = ASN1_GEN_FORMAT_ASCII;
 | 
			
		||||
        else if (!strncmp(vstart, "UTF8", 4))
 | 
			
		||||
            arg->format = ASN1_GEN_FORMAT_UTF8;
 | 
			
		||||
        else if (!strncmp(vstart, "HEX", 3))
 | 
			
		||||
            arg->format = ASN1_GEN_FORMAT_HEX;
 | 
			
		||||
        else if (!strncmp(vstart, "BITLIST", 3))
 | 
			
		||||
        else if (!strncmp(vstart, "BITLIST", 7))
 | 
			
		||||
            arg->format = ASN1_GEN_FORMAT_BITLIST;
 | 
			
		||||
        else {
 | 
			
		||||
            ASN1err(ASN1_F_ASN1_CB, ASN1_R_UNKOWN_FORMAT);
 | 
			
		||||
 
 | 
			
		||||
@@ -96,12 +96,21 @@ struct evp_pkey_asn1_method_st {
 | 
			
		||||
    int (*param_cmp) (const EVP_PKEY *a, const EVP_PKEY *b);
 | 
			
		||||
    int (*param_print) (BIO *out, const EVP_PKEY *pkey, int indent,
 | 
			
		||||
                        ASN1_PCTX *pctx);
 | 
			
		||||
    int (*sig_print) (BIO *out,
 | 
			
		||||
                      const X509_ALGOR *sigalg, const ASN1_STRING *sig,
 | 
			
		||||
                      int indent, ASN1_PCTX *pctx);
 | 
			
		||||
    void (*pkey_free) (EVP_PKEY *pkey);
 | 
			
		||||
    int (*pkey_ctrl) (EVP_PKEY *pkey, int op, long arg1, void *arg2);
 | 
			
		||||
    /* Legacy functions for old PEM */
 | 
			
		||||
    int (*old_priv_decode) (EVP_PKEY *pkey,
 | 
			
		||||
                            const unsigned char **pder, int derlen);
 | 
			
		||||
    int (*old_priv_encode) (const EVP_PKEY *pkey, unsigned char **pder);
 | 
			
		||||
    /* Custom ASN1 signature verification */
 | 
			
		||||
    int (*item_verify) (EVP_MD_CTX *ctx, const ASN1_ITEM *it, void *asn,
 | 
			
		||||
                        X509_ALGOR *a, ASN1_BIT_STRING *sig, EVP_PKEY *pkey);
 | 
			
		||||
    int (*item_sign) (EVP_MD_CTX *ctx, const ASN1_ITEM *it, void *asn,
 | 
			
		||||
                      X509_ALGOR *alg1, X509_ALGOR *alg2,
 | 
			
		||||
                      ASN1_BIT_STRING *sig);
 | 
			
		||||
} /* EVP_PKEY_ASN1_METHOD */ ;
 | 
			
		||||
 | 
			
		||||
/*
 | 
			
		||||
 
 | 
			
		||||
@@ -62,10 +62,6 @@
 | 
			
		||||
#include <openssl/objects.h>
 | 
			
		||||
#include <openssl/asn1.h>
 | 
			
		||||
 | 
			
		||||
#ifndef ASN1_PARSE_MAXDEPTH
 | 
			
		||||
#define ASN1_PARSE_MAXDEPTH 128
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
static int asn1_print_info(BIO *bp, int tag, int xclass, int constructed,
 | 
			
		||||
                           int indent);
 | 
			
		||||
static int asn1_parse2(BIO *bp, const unsigned char **pp, long length,
 | 
			
		||||
@@ -132,12 +128,6 @@ static int asn1_parse2(BIO *bp, const unsigned char **pp, long length,
 | 
			
		||||
#else
 | 
			
		||||
    dump_indent = 6;            /* Because we know BIO_dump_indent() */
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
    if (depth > ASN1_PARSE_MAXDEPTH) {
 | 
			
		||||
            BIO_puts(bp, "BAD RECURSION DEPTH\n");
 | 
			
		||||
            return 0;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    p = *pp;
 | 
			
		||||
    tot = p + length;
 | 
			
		||||
    op = p - 1;
 | 
			
		||||
@@ -347,7 +337,7 @@ static int asn1_parse2(BIO *bp, const unsigned char **pp, long length,
 | 
			
		||||
                            goto end;
 | 
			
		||||
                    }
 | 
			
		||||
                } else {
 | 
			
		||||
                    if (BIO_write(bp, "BAD ENUMERATED", 11) <= 0)
 | 
			
		||||
                    if (BIO_write(bp, "BAD ENUMERATED", 14) <= 0)
 | 
			
		||||
                        goto end;
 | 
			
		||||
                }
 | 
			
		||||
                M_ASN1_ENUMERATED_free(bs);
 | 
			
		||||
 
 | 
			
		||||
@@ -289,7 +289,8 @@ int SMIME_write_ASN1(BIO *bio, ASN1_VALUE *val, BIO *data, int flags,
 | 
			
		||||
    if ((flags & SMIME_DETACHED) && data) {
 | 
			
		||||
        /* We want multipart/signed */
 | 
			
		||||
        /* Generate a random boundary */
 | 
			
		||||
        RAND_pseudo_bytes((unsigned char *)bound, 32);
 | 
			
		||||
        if (RAND_pseudo_bytes((unsigned char *)bound, 32) < 0)
 | 
			
		||||
            return 0;
 | 
			
		||||
        for (i = 0; i < 32; i++) {
 | 
			
		||||
            c = bound[i] & 0xf;
 | 
			
		||||
            if (c < 10)
 | 
			
		||||
 
 | 
			
		||||
@@ -162,6 +162,9 @@ static int ndef_prefix(BIO *b, unsigned char **pbuf, int *plen, void *parg)
 | 
			
		||||
 | 
			
		||||
    derlen = ASN1_item_ndef_i2d(ndef_aux->val, NULL, ndef_aux->it);
 | 
			
		||||
    p = OPENSSL_malloc(derlen);
 | 
			
		||||
    if (!p)
 | 
			
		||||
        return 0;
 | 
			
		||||
 | 
			
		||||
    ndef_aux->derbuf = p;
 | 
			
		||||
    *pbuf = p;
 | 
			
		||||
    derlen = ASN1_item_ndef_i2d(ndef_aux->val, &p, ndef_aux->it);
 | 
			
		||||
@@ -229,6 +232,9 @@ static int ndef_suffix(BIO *b, unsigned char **pbuf, int *plen, void *parg)
 | 
			
		||||
 | 
			
		||||
    derlen = ASN1_item_ndef_i2d(ndef_aux->val, NULL, ndef_aux->it);
 | 
			
		||||
    p = OPENSSL_malloc(derlen);
 | 
			
		||||
    if (!p)
 | 
			
		||||
        return 0;
 | 
			
		||||
 | 
			
		||||
    ndef_aux->derbuf = p;
 | 
			
		||||
    *pbuf = p;
 | 
			
		||||
    derlen = ASN1_item_ndef_i2d(ndef_aux->val, &p, ndef_aux->it);
 | 
			
		||||
 
 | 
			
		||||
@@ -125,6 +125,7 @@ int i2d_RSA_NET(const RSA *a, unsigned char **pp,
 | 
			
		||||
    unsigned char buf[256], *zz;
 | 
			
		||||
    unsigned char key[EVP_MAX_KEY_LENGTH];
 | 
			
		||||
    EVP_CIPHER_CTX ctx;
 | 
			
		||||
    EVP_CIPHER_CTX_init(&ctx);
 | 
			
		||||
 | 
			
		||||
    if (a == NULL)
 | 
			
		||||
        return (0);
 | 
			
		||||
@@ -201,24 +202,28 @@ int i2d_RSA_NET(const RSA *a, unsigned char **pp,
 | 
			
		||||
    i = strlen((char *)buf);
 | 
			
		||||
    /* If the key is used for SGC the algorithm is modified a little. */
 | 
			
		||||
    if (sgckey) {
 | 
			
		||||
        EVP_Digest(buf, i, buf, NULL, EVP_md5(), NULL);
 | 
			
		||||
        if (!EVP_Digest(buf, i, buf, NULL, EVP_md5(), NULL))
 | 
			
		||||
            goto err;
 | 
			
		||||
        memcpy(buf + 16, "SGCKEYSALT", 10);
 | 
			
		||||
        i = 26;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    EVP_BytesToKey(EVP_rc4(), EVP_md5(), NULL, buf, i, 1, key, NULL);
 | 
			
		||||
    if (!EVP_BytesToKey(EVP_rc4(), EVP_md5(), NULL, buf, i, 1, key, NULL))
 | 
			
		||||
        goto err;
 | 
			
		||||
    OPENSSL_cleanse(buf, 256);
 | 
			
		||||
 | 
			
		||||
    /* Encrypt private key in place */
 | 
			
		||||
    zz = enckey->enckey->digest->data;
 | 
			
		||||
    EVP_CIPHER_CTX_init(&ctx);
 | 
			
		||||
    EVP_EncryptInit_ex(&ctx, EVP_rc4(), NULL, key, NULL);
 | 
			
		||||
    EVP_EncryptUpdate(&ctx, zz, &i, zz, pkeylen);
 | 
			
		||||
    EVP_EncryptFinal_ex(&ctx, zz + i, &j);
 | 
			
		||||
    EVP_CIPHER_CTX_cleanup(&ctx);
 | 
			
		||||
    if (!EVP_EncryptInit_ex(&ctx, EVP_rc4(), NULL, key, NULL))
 | 
			
		||||
        goto err;
 | 
			
		||||
    if (!EVP_EncryptUpdate(&ctx, zz, &i, zz, pkeylen))
 | 
			
		||||
        goto err;
 | 
			
		||||
    if (!EVP_EncryptFinal_ex(&ctx, zz + i, &j))
 | 
			
		||||
        goto err;
 | 
			
		||||
 | 
			
		||||
    ret = i2d_NETSCAPE_ENCRYPTED_PKEY(enckey, pp);
 | 
			
		||||
 err:
 | 
			
		||||
    EVP_CIPHER_CTX_cleanup(&ctx);
 | 
			
		||||
    NETSCAPE_ENCRYPTED_PKEY_free(enckey);
 | 
			
		||||
    NETSCAPE_PKEY_free(pkey);
 | 
			
		||||
    return (ret);
 | 
			
		||||
@@ -282,6 +287,7 @@ static RSA *d2i_RSA_NET_2(RSA **a, ASN1_OCTET_STRING *os,
 | 
			
		||||
    const unsigned char *zz;
 | 
			
		||||
    unsigned char key[EVP_MAX_KEY_LENGTH];
 | 
			
		||||
    EVP_CIPHER_CTX ctx;
 | 
			
		||||
    EVP_CIPHER_CTX_init(&ctx);
 | 
			
		||||
 | 
			
		||||
    i = cb((char *)buf, 256, "Enter Private Key password:", 0);
 | 
			
		||||
    if (i != 0) {
 | 
			
		||||
@@ -291,19 +297,22 @@ static RSA *d2i_RSA_NET_2(RSA **a, ASN1_OCTET_STRING *os,
 | 
			
		||||
 | 
			
		||||
    i = strlen((char *)buf);
 | 
			
		||||
    if (sgckey) {
 | 
			
		||||
        EVP_Digest(buf, i, buf, NULL, EVP_md5(), NULL);
 | 
			
		||||
        if (!EVP_Digest(buf, i, buf, NULL, EVP_md5(), NULL))
 | 
			
		||||
            goto err;
 | 
			
		||||
        memcpy(buf + 16, "SGCKEYSALT", 10);
 | 
			
		||||
        i = 26;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    EVP_BytesToKey(EVP_rc4(), EVP_md5(), NULL, buf, i, 1, key, NULL);
 | 
			
		||||
    if (!EVP_BytesToKey(EVP_rc4(), EVP_md5(), NULL, buf, i, 1, key, NULL))
 | 
			
		||||
        goto err;
 | 
			
		||||
    OPENSSL_cleanse(buf, 256);
 | 
			
		||||
 | 
			
		||||
    EVP_CIPHER_CTX_init(&ctx);
 | 
			
		||||
    EVP_DecryptInit_ex(&ctx, EVP_rc4(), NULL, key, NULL);
 | 
			
		||||
    EVP_DecryptUpdate(&ctx, os->data, &i, os->data, os->length);
 | 
			
		||||
    EVP_DecryptFinal_ex(&ctx, &(os->data[i]), &j);
 | 
			
		||||
    EVP_CIPHER_CTX_cleanup(&ctx);
 | 
			
		||||
    if (!EVP_DecryptInit_ex(&ctx, EVP_rc4(), NULL, key, NULL))
 | 
			
		||||
        goto err;
 | 
			
		||||
    if (!EVP_DecryptUpdate(&ctx, os->data, &i, os->data, os->length))
 | 
			
		||||
        goto err;
 | 
			
		||||
    if (!EVP_DecryptFinal_ex(&ctx, &(os->data[i]), &j))
 | 
			
		||||
        goto err;
 | 
			
		||||
    os->length = i + j;
 | 
			
		||||
 | 
			
		||||
    zz = os->data;
 | 
			
		||||
@@ -320,6 +329,7 @@ static RSA *d2i_RSA_NET_2(RSA **a, ASN1_OCTET_STRING *os,
 | 
			
		||||
        goto err;
 | 
			
		||||
    }
 | 
			
		||||
 err:
 | 
			
		||||
    EVP_CIPHER_CTX_cleanup(&ctx);
 | 
			
		||||
    NETSCAPE_PKEY_free(pkey);
 | 
			
		||||
    return (ret);
 | 
			
		||||
}
 | 
			
		||||
 
 | 
			
		||||
@@ -92,12 +92,10 @@ X509_ALGOR *PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter,
 | 
			
		||||
                              unsigned char *aiv, int prf_nid)
 | 
			
		||||
{
 | 
			
		||||
    X509_ALGOR *scheme = NULL, *kalg = NULL, *ret = NULL;
 | 
			
		||||
    int alg_nid;
 | 
			
		||||
    int alg_nid, keylen;
 | 
			
		||||
    EVP_CIPHER_CTX ctx;
 | 
			
		||||
    unsigned char iv[EVP_MAX_IV_LENGTH];
 | 
			
		||||
    PBKDF2PARAM *kdf = NULL;
 | 
			
		||||
    PBE2PARAM *pbe2 = NULL;
 | 
			
		||||
    ASN1_OCTET_STRING *osalt = NULL;
 | 
			
		||||
    ASN1_OBJECT *obj;
 | 
			
		||||
 | 
			
		||||
    alg_nid = EVP_CIPHER_type(cipher);
 | 
			
		||||
@@ -129,7 +127,8 @@ X509_ALGOR *PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter,
 | 
			
		||||
    EVP_CIPHER_CTX_init(&ctx);
 | 
			
		||||
 | 
			
		||||
    /* Dummy cipherinit to just setup the IV, and PRF */
 | 
			
		||||
    EVP_CipherInit_ex(&ctx, cipher, NULL, NULL, iv, 0);
 | 
			
		||||
    if (!EVP_CipherInit_ex(&ctx, cipher, NULL, NULL, iv, 0))
 | 
			
		||||
        goto err;
 | 
			
		||||
    if (EVP_CIPHER_param_to_asn1(&ctx, scheme->parameter) < 0) {
 | 
			
		||||
        ASN1err(ASN1_F_PKCS5_PBE2_SET_IV, ASN1_R_ERROR_SETTING_CIPHER_PARAMS);
 | 
			
		||||
        EVP_CIPHER_CTX_cleanup(&ctx);
 | 
			
		||||
@@ -146,65 +145,22 @@ X509_ALGOR *PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter,
 | 
			
		||||
    }
 | 
			
		||||
    EVP_CIPHER_CTX_cleanup(&ctx);
 | 
			
		||||
 | 
			
		||||
    if (!(kdf = PBKDF2PARAM_new()))
 | 
			
		||||
        goto merr;
 | 
			
		||||
    if (!(osalt = M_ASN1_OCTET_STRING_new()))
 | 
			
		||||
        goto merr;
 | 
			
		||||
 | 
			
		||||
    if (!saltlen)
 | 
			
		||||
        saltlen = PKCS5_SALT_LEN;
 | 
			
		||||
    if (!(osalt->data = OPENSSL_malloc(saltlen)))
 | 
			
		||||
        goto merr;
 | 
			
		||||
    osalt->length = saltlen;
 | 
			
		||||
    if (salt)
 | 
			
		||||
        memcpy(osalt->data, salt, saltlen);
 | 
			
		||||
    else if (RAND_pseudo_bytes(osalt->data, saltlen) < 0)
 | 
			
		||||
        goto merr;
 | 
			
		||||
 | 
			
		||||
    if (iter <= 0)
 | 
			
		||||
        iter = PKCS5_DEFAULT_ITER;
 | 
			
		||||
    if (!ASN1_INTEGER_set(kdf->iter, iter))
 | 
			
		||||
        goto merr;
 | 
			
		||||
 | 
			
		||||
    /* Now include salt in kdf structure */
 | 
			
		||||
    kdf->salt->value.octet_string = osalt;
 | 
			
		||||
    kdf->salt->type = V_ASN1_OCTET_STRING;
 | 
			
		||||
    osalt = NULL;
 | 
			
		||||
 | 
			
		||||
    /* If its RC2 then we'd better setup the key length */
 | 
			
		||||
 | 
			
		||||
    if (alg_nid == NID_rc2_cbc) {
 | 
			
		||||
        if (!(kdf->keylength = M_ASN1_INTEGER_new()))
 | 
			
		||||
            goto merr;
 | 
			
		||||
        if (!ASN1_INTEGER_set(kdf->keylength, EVP_CIPHER_key_length(cipher)))
 | 
			
		||||
            goto merr;
 | 
			
		||||
    }
 | 
			
		||||
    if (alg_nid == NID_rc2_cbc)
 | 
			
		||||
        keylen = EVP_CIPHER_key_length(cipher);
 | 
			
		||||
    else
 | 
			
		||||
        keylen = -1;
 | 
			
		||||
 | 
			
		||||
    /* prf can stay NULL if we are using hmacWithSHA1 */
 | 
			
		||||
    if (prf_nid != NID_hmacWithSHA1) {
 | 
			
		||||
        kdf->prf = X509_ALGOR_new();
 | 
			
		||||
        if (!kdf->prf)
 | 
			
		||||
            goto merr;
 | 
			
		||||
        X509_ALGOR_set0(kdf->prf, OBJ_nid2obj(prf_nid), V_ASN1_NULL, NULL);
 | 
			
		||||
    }
 | 
			
		||||
    /* Setup keyfunc */
 | 
			
		||||
 | 
			
		||||
    /* Now setup the PBE2PARAM keyfunc structure */
 | 
			
		||||
    X509_ALGOR_free(pbe2->keyfunc);
 | 
			
		||||
 | 
			
		||||
    pbe2->keyfunc->algorithm = OBJ_nid2obj(NID_id_pbkdf2);
 | 
			
		||||
    pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen);
 | 
			
		||||
 | 
			
		||||
    /* Encode PBKDF2PARAM into parameter of pbe2 */
 | 
			
		||||
 | 
			
		||||
    if (!(pbe2->keyfunc->parameter = ASN1_TYPE_new()))
 | 
			
		||||
    if (!pbe2->keyfunc)
 | 
			
		||||
        goto merr;
 | 
			
		||||
 | 
			
		||||
    if (!ASN1_item_pack(kdf, ASN1_ITEM_rptr(PBKDF2PARAM),
 | 
			
		||||
                        &pbe2->keyfunc->parameter->value.sequence))
 | 
			
		||||
         goto merr;
 | 
			
		||||
    pbe2->keyfunc->parameter->type = V_ASN1_SEQUENCE;
 | 
			
		||||
 | 
			
		||||
    PBKDF2PARAM_free(kdf);
 | 
			
		||||
    kdf = NULL;
 | 
			
		||||
 | 
			
		||||
    /* Now set up top level AlgorithmIdentifier */
 | 
			
		||||
 | 
			
		||||
    if (!(ret = X509_ALGOR_new()))
 | 
			
		||||
@@ -232,8 +188,6 @@ X509_ALGOR *PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter,
 | 
			
		||||
 err:
 | 
			
		||||
    PBE2PARAM_free(pbe2);
 | 
			
		||||
    /* Note 'scheme' is freed as part of pbe2 */
 | 
			
		||||
    M_ASN1_OCTET_STRING_free(osalt);
 | 
			
		||||
    PBKDF2PARAM_free(kdf);
 | 
			
		||||
    X509_ALGOR_free(kalg);
 | 
			
		||||
    X509_ALGOR_free(ret);
 | 
			
		||||
 | 
			
		||||
@@ -246,3 +200,81 @@ X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter,
 | 
			
		||||
{
 | 
			
		||||
    return PKCS5_pbe2_set_iv(cipher, iter, salt, saltlen, NULL, -1);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
X509_ALGOR *PKCS5_pbkdf2_set(int iter, unsigned char *salt, int saltlen,
 | 
			
		||||
                             int prf_nid, int keylen)
 | 
			
		||||
{
 | 
			
		||||
    X509_ALGOR *keyfunc = NULL;
 | 
			
		||||
    PBKDF2PARAM *kdf = NULL;
 | 
			
		||||
    ASN1_OCTET_STRING *osalt = NULL;
 | 
			
		||||
 | 
			
		||||
    if (!(kdf = PBKDF2PARAM_new()))
 | 
			
		||||
        goto merr;
 | 
			
		||||
    if (!(osalt = M_ASN1_OCTET_STRING_new()))
 | 
			
		||||
        goto merr;
 | 
			
		||||
 | 
			
		||||
    kdf->salt->value.octet_string = osalt;
 | 
			
		||||
    kdf->salt->type = V_ASN1_OCTET_STRING;
 | 
			
		||||
 | 
			
		||||
    if (!saltlen)
 | 
			
		||||
        saltlen = PKCS5_SALT_LEN;
 | 
			
		||||
    if (!(osalt->data = OPENSSL_malloc(saltlen)))
 | 
			
		||||
        goto merr;
 | 
			
		||||
 | 
			
		||||
    osalt->length = saltlen;
 | 
			
		||||
 | 
			
		||||
    if (salt)
 | 
			
		||||
        memcpy(osalt->data, salt, saltlen);
 | 
			
		||||
    else if (RAND_pseudo_bytes(osalt->data, saltlen) < 0)
 | 
			
		||||
        goto merr;
 | 
			
		||||
 | 
			
		||||
    if (iter <= 0)
 | 
			
		||||
        iter = PKCS5_DEFAULT_ITER;
 | 
			
		||||
 | 
			
		||||
    if (!ASN1_INTEGER_set(kdf->iter, iter))
 | 
			
		||||
        goto merr;
 | 
			
		||||
 | 
			
		||||
    /* If have a key len set it up */
 | 
			
		||||
 | 
			
		||||
    if (keylen > 0) {
 | 
			
		||||
        if (!(kdf->keylength = M_ASN1_INTEGER_new()))
 | 
			
		||||
            goto merr;
 | 
			
		||||
        if (!ASN1_INTEGER_set(kdf->keylength, keylen))
 | 
			
		||||
            goto merr;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    /* prf can stay NULL if we are using hmacWithSHA1 */
 | 
			
		||||
    if (prf_nid > 0 && prf_nid != NID_hmacWithSHA1) {
 | 
			
		||||
        kdf->prf = X509_ALGOR_new();
 | 
			
		||||
        if (!kdf->prf)
 | 
			
		||||
            goto merr;
 | 
			
		||||
        X509_ALGOR_set0(kdf->prf, OBJ_nid2obj(prf_nid), V_ASN1_NULL, NULL);
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    /* Finally setup the keyfunc structure */
 | 
			
		||||
 | 
			
		||||
    keyfunc = X509_ALGOR_new();
 | 
			
		||||
    if (!keyfunc)
 | 
			
		||||
        goto merr;
 | 
			
		||||
 | 
			
		||||
    keyfunc->algorithm = OBJ_nid2obj(NID_id_pbkdf2);
 | 
			
		||||
 | 
			
		||||
    /* Encode PBKDF2PARAM into parameter of pbe2 */
 | 
			
		||||
 | 
			
		||||
    if (!(keyfunc->parameter = ASN1_TYPE_new()))
 | 
			
		||||
        goto merr;
 | 
			
		||||
 | 
			
		||||
    if (!ASN1_item_pack(kdf, ASN1_ITEM_rptr(PBKDF2PARAM),
 | 
			
		||||
                        &keyfunc->parameter->value.sequence))
 | 
			
		||||
         goto merr;
 | 
			
		||||
    keyfunc->parameter->type = V_ASN1_SEQUENCE;
 | 
			
		||||
 | 
			
		||||
    PBKDF2PARAM_free(kdf);
 | 
			
		||||
    return keyfunc;
 | 
			
		||||
 | 
			
		||||
 merr:
 | 
			
		||||
    ASN1err(ASN1_F_PKCS5_PBKDF2_SET, ERR_R_MALLOC_FAILURE);
 | 
			
		||||
    PBKDF2PARAM_free(kdf);
 | 
			
		||||
    X509_ALGOR_free(keyfunc);
 | 
			
		||||
    return NULL;
 | 
			
		||||
}
 | 
			
		||||
 
 | 
			
		||||
@@ -94,8 +94,7 @@ int X509_CRL_print(BIO *out, X509_CRL *x)
 | 
			
		||||
    l = X509_CRL_get_version(x);
 | 
			
		||||
    BIO_printf(out, "%8sVersion %lu (0x%lx)\n", "", l + 1, l);
 | 
			
		||||
    i = OBJ_obj2nid(x->sig_alg->algorithm);
 | 
			
		||||
    BIO_printf(out, "%8sSignature Algorithm: %s\n", "",
 | 
			
		||||
               (i == NID_undef) ? "NONE" : OBJ_nid2ln(i));
 | 
			
		||||
    X509_signature_print(out, x->sig_alg, NULL);
 | 
			
		||||
    p = X509_NAME_oneline(X509_CRL_get_issuer(x), NULL, 0);
 | 
			
		||||
    BIO_printf(out, "%8sIssuer: %s\n", "", p);
 | 
			
		||||
    OPENSSL_free(p);
 | 
			
		||||
 
 | 
			
		||||
@@ -72,6 +72,7 @@
 | 
			
		||||
#include <openssl/objects.h>
 | 
			
		||||
#include <openssl/x509.h>
 | 
			
		||||
#include <openssl/x509v3.h>
 | 
			
		||||
#include "asn1_locl.h"
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_FP_API
 | 
			
		||||
int X509_print_fp(FILE *fp, X509 *x)
 | 
			
		||||
@@ -139,7 +140,7 @@ int X509_print_ex(BIO *bp, X509 *x, unsigned long nmflags,
 | 
			
		||||
            goto err;
 | 
			
		||||
 | 
			
		||||
        bs = X509_get_serialNumber(x);
 | 
			
		||||
        if (bs->length <= 4) {
 | 
			
		||||
        if (bs->length <= (int)sizeof(long)) {
 | 
			
		||||
            l = ASN1_INTEGER_get(bs);
 | 
			
		||||
            if (bs->type == V_ASN1_NEG_INTEGER) {
 | 
			
		||||
                l = -l;
 | 
			
		||||
@@ -163,12 +164,16 @@ int X509_print_ex(BIO *bp, X509 *x, unsigned long nmflags,
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (!(cflag & X509_FLAG_NO_SIGNAME)) {
 | 
			
		||||
        if (X509_signature_print(bp, ci->signature, NULL) <= 0)
 | 
			
		||||
            goto err;
 | 
			
		||||
#if 0
 | 
			
		||||
        if (BIO_printf(bp, "%8sSignature Algorithm: ", "") <= 0)
 | 
			
		||||
            goto err;
 | 
			
		||||
        if (i2a_ASN1_OBJECT(bp, ci->signature->algorithm) <= 0)
 | 
			
		||||
            goto err;
 | 
			
		||||
        if (BIO_puts(bp, "\n") <= 0)
 | 
			
		||||
            goto err;
 | 
			
		||||
#endif
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (!(cflag & X509_FLAG_NO_ISSUER)) {
 | 
			
		||||
@@ -260,7 +265,8 @@ int X509_ocspid_print(BIO *bp, X509 *x)
 | 
			
		||||
        goto err;
 | 
			
		||||
    i2d_X509_NAME(x->cert_info->subject, &dertmp);
 | 
			
		||||
 | 
			
		||||
    EVP_Digest(der, derlen, SHA1md, NULL, EVP_sha1(), NULL);
 | 
			
		||||
    if (!EVP_Digest(der, derlen, SHA1md, NULL, EVP_sha1(), NULL))
 | 
			
		||||
        goto err;
 | 
			
		||||
    for (i = 0; i < SHA_DIGEST_LENGTH; i++) {
 | 
			
		||||
        if (BIO_printf(bp, "%02X", SHA1md[i]) <= 0)
 | 
			
		||||
            goto err;
 | 
			
		||||
@@ -274,9 +280,10 @@ int X509_ocspid_print(BIO *bp, X509 *x)
 | 
			
		||||
    if (BIO_printf(bp, "\n        Public key OCSP hash: ") <= 0)
 | 
			
		||||
        goto err;
 | 
			
		||||
 | 
			
		||||
    EVP_Digest(x->cert_info->key->public_key->data,
 | 
			
		||||
               x->cert_info->key->public_key->length, SHA1md, NULL,
 | 
			
		||||
               EVP_sha1(), NULL);
 | 
			
		||||
    if (!EVP_Digest(x->cert_info->key->public_key->data,
 | 
			
		||||
                    x->cert_info->key->public_key->length,
 | 
			
		||||
                    SHA1md, NULL, EVP_sha1(), NULL))
 | 
			
		||||
        goto err;
 | 
			
		||||
    for (i = 0; i < SHA_DIGEST_LENGTH; i++) {
 | 
			
		||||
        if (BIO_printf(bp, "%02X", SHA1md[i]) <= 0)
 | 
			
		||||
            goto err;
 | 
			
		||||
@@ -290,25 +297,50 @@ int X509_ocspid_print(BIO *bp, X509 *x)
 | 
			
		||||
    return (0);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
int X509_signature_dump(BIO *bp, const ASN1_STRING *sig, int indent)
 | 
			
		||||
{
 | 
			
		||||
    const unsigned char *s;
 | 
			
		||||
    int i, n;
 | 
			
		||||
 | 
			
		||||
    n = sig->length;
 | 
			
		||||
    s = sig->data;
 | 
			
		||||
    for (i = 0; i < n; i++) {
 | 
			
		||||
        if ((i % 18) == 0) {
 | 
			
		||||
            if (BIO_write(bp, "\n", 1) <= 0)
 | 
			
		||||
                return 0;
 | 
			
		||||
            if (BIO_indent(bp, indent, indent) <= 0)
 | 
			
		||||
                return 0;
 | 
			
		||||
        }
 | 
			
		||||
        if (BIO_printf(bp, "%02x%s", s[i], ((i + 1) == n) ? "" : ":") <= 0)
 | 
			
		||||
            return 0;
 | 
			
		||||
    }
 | 
			
		||||
    if (BIO_write(bp, "\n", 1) != 1)
 | 
			
		||||
        return 0;
 | 
			
		||||
 | 
			
		||||
    return 1;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
int X509_signature_print(BIO *bp, X509_ALGOR *sigalg, ASN1_STRING *sig)
 | 
			
		||||
{
 | 
			
		||||
    unsigned char *s;
 | 
			
		||||
    int i, n;
 | 
			
		||||
    int sig_nid;
 | 
			
		||||
    if (BIO_puts(bp, "    Signature Algorithm: ") <= 0)
 | 
			
		||||
        return 0;
 | 
			
		||||
    if (i2a_ASN1_OBJECT(bp, sigalg->algorithm) <= 0)
 | 
			
		||||
        return 0;
 | 
			
		||||
 | 
			
		||||
    n = sig->length;
 | 
			
		||||
    s = sig->data;
 | 
			
		||||
    for (i = 0; i < n; i++) {
 | 
			
		||||
        if ((i % 18) == 0)
 | 
			
		||||
            if (BIO_write(bp, "\n        ", 9) <= 0)
 | 
			
		||||
                return 0;
 | 
			
		||||
        if (BIO_printf(bp, "%02x%s", s[i], ((i + 1) == n) ? "" : ":") <= 0)
 | 
			
		||||
            return 0;
 | 
			
		||||
    sig_nid = OBJ_obj2nid(sigalg->algorithm);
 | 
			
		||||
    if (sig_nid != NID_undef) {
 | 
			
		||||
        int pkey_nid, dig_nid;
 | 
			
		||||
        const EVP_PKEY_ASN1_METHOD *ameth;
 | 
			
		||||
        if (OBJ_find_sigid_algs(sig_nid, &dig_nid, &pkey_nid)) {
 | 
			
		||||
            ameth = EVP_PKEY_asn1_find(NULL, pkey_nid);
 | 
			
		||||
            if (ameth && ameth->sig_print)
 | 
			
		||||
                return ameth->sig_print(bp, sigalg, sig, 9, 0);
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
    if (BIO_write(bp, "\n", 1) != 1)
 | 
			
		||||
    if (sig)
 | 
			
		||||
        return X509_signature_dump(bp, sig, 9);
 | 
			
		||||
    else if (BIO_puts(bp, "\n") <= 0)
 | 
			
		||||
        return 0;
 | 
			
		||||
    return 1;
 | 
			
		||||
}
 | 
			
		||||
 
 | 
			
		||||
@@ -140,17 +140,11 @@ ASN1_VALUE *ASN1_item_d2i(ASN1_VALUE **pval,
 | 
			
		||||
{
 | 
			
		||||
    ASN1_TLC c;
 | 
			
		||||
    ASN1_VALUE *ptmpval = NULL;
 | 
			
		||||
    if (!pval)
 | 
			
		||||
        pval = &ptmpval;
 | 
			
		||||
    asn1_tlc_clear_nc(&c);
 | 
			
		||||
    if (pval && *pval && it->itype == ASN1_ITYPE_PRIMITIVE)
 | 
			
		||||
        ptmpval = *pval;
 | 
			
		||||
    if (ASN1_item_ex_d2i(&ptmpval, in, len, it, -1, 0, 0, &c) > 0) {
 | 
			
		||||
        if (pval && it->itype != ASN1_ITYPE_PRIMITIVE) {
 | 
			
		||||
            if (*pval)
 | 
			
		||||
                ASN1_item_free(*pval, it);
 | 
			
		||||
            *pval = ptmpval;
 | 
			
		||||
        }
 | 
			
		||||
        return ptmpval;
 | 
			
		||||
    }
 | 
			
		||||
    if (ASN1_item_ex_d2i(pval, in, len, it, -1, 0, 0, &c) > 0)
 | 
			
		||||
        return *pval;
 | 
			
		||||
    return NULL;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
@@ -186,8 +180,6 @@ int ASN1_item_ex_d2i(ASN1_VALUE **pval, const unsigned char **in, long len,
 | 
			
		||||
    int otag;
 | 
			
		||||
    int ret = 0;
 | 
			
		||||
    ASN1_VALUE **pchptr, *ptmpval;
 | 
			
		||||
    int combine = aclass & ASN1_TFLG_COMBINE;
 | 
			
		||||
    aclass &= ~ASN1_TFLG_COMBINE;
 | 
			
		||||
    if (!pval)
 | 
			
		||||
        return 0;
 | 
			
		||||
    if (aux && aux->asn1_cb)
 | 
			
		||||
@@ -508,8 +500,7 @@ int ASN1_item_ex_d2i(ASN1_VALUE **pval, const unsigned char **in, long len,
 | 
			
		||||
 auxerr:
 | 
			
		||||
    ASN1err(ASN1_F_ASN1_ITEM_EX_D2I, ASN1_R_AUX_ERROR);
 | 
			
		||||
 err:
 | 
			
		||||
    if (combine == 0)
 | 
			
		||||
        ASN1_item_ex_free(pval, it);
 | 
			
		||||
    ASN1_item_ex_free(pval, it);
 | 
			
		||||
    if (errtt)
 | 
			
		||||
        ERR_add_error_data(4, "Field=", errtt->field_name,
 | 
			
		||||
                           ", Type=", it->sname);
 | 
			
		||||
@@ -698,7 +689,7 @@ static int asn1_template_noexp_d2i(ASN1_VALUE **val,
 | 
			
		||||
    } else {
 | 
			
		||||
        /* Nothing special */
 | 
			
		||||
        ret = ASN1_item_ex_d2i(val, &p, len, ASN1_ITEM_ptr(tt->item),
 | 
			
		||||
                               -1, tt->flags & ASN1_TFLG_COMBINE, opt, ctx);
 | 
			
		||||
                               -1, 0, opt, ctx);
 | 
			
		||||
        if (!ret) {
 | 
			
		||||
            ASN1err(ASN1_F_ASN1_TEMPLATE_NOEXP_D2I, ERR_R_NESTED_ASN1_ERROR);
 | 
			
		||||
            goto err;
 | 
			
		||||
 
 | 
			
		||||
@@ -312,13 +312,16 @@ int ASN1_primitive_new(ASN1_VALUE **pval, const ASN1_ITEM *it)
 | 
			
		||||
    ASN1_STRING *str;
 | 
			
		||||
    int utype;
 | 
			
		||||
 | 
			
		||||
    if (it && it->funcs) {
 | 
			
		||||
    if (!it)
 | 
			
		||||
        return 0;
 | 
			
		||||
 | 
			
		||||
    if (it->funcs) {
 | 
			
		||||
        const ASN1_PRIMITIVE_FUNCS *pf = it->funcs;
 | 
			
		||||
        if (pf->prim_new)
 | 
			
		||||
            return pf->prim_new(pval, it);
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (!it || (it->itype == ASN1_ITYPE_MSTRING))
 | 
			
		||||
    if (it->itype == ASN1_ITYPE_MSTRING)
 | 
			
		||||
        utype = -1;
 | 
			
		||||
    else
 | 
			
		||||
        utype = it->utype;
 | 
			
		||||
 
 | 
			
		||||
@@ -290,6 +290,8 @@ static int asn1_item_print_ctx(BIO *out, ASN1_VALUE **fld, int indent,
 | 
			
		||||
        for (i = 0, tt = it->templates; i < it->tcount; i++, tt++) {
 | 
			
		||||
            const ASN1_TEMPLATE *seqtt;
 | 
			
		||||
            seqtt = asn1_do_adb(fld, tt, 1);
 | 
			
		||||
            if (!seqtt)
 | 
			
		||||
                return 0;
 | 
			
		||||
            tmpfld = asn1_get_field_ptr(fld, seqtt);
 | 
			
		||||
            if (!asn1_template_print_ctx(out, tmpfld,
 | 
			
		||||
                                         indent + 2, seqtt, pctx))
 | 
			
		||||
 
 | 
			
		||||
@@ -121,6 +121,21 @@ void X509_ALGOR_get0(ASN1_OBJECT **paobj, int *pptype, void **ppval,
 | 
			
		||||
    }
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
/* Set up an X509_ALGOR DigestAlgorithmIdentifier from an EVP_MD */
 | 
			
		||||
 | 
			
		||||
void X509_ALGOR_set_md(X509_ALGOR *alg, const EVP_MD *md)
 | 
			
		||||
{
 | 
			
		||||
    int param_type;
 | 
			
		||||
 | 
			
		||||
    if (md->flags & EVP_MD_FLAG_DIGALGID_ABSENT)
 | 
			
		||||
        param_type = V_ASN1_UNDEF;
 | 
			
		||||
    else
 | 
			
		||||
        param_type = V_ASN1_NULL;
 | 
			
		||||
 | 
			
		||||
    X509_ALGOR_set0(alg, OBJ_nid2obj(EVP_MD_type(md)), param_type, NULL);
 | 
			
		||||
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
int X509_ALGOR_cmp(const X509_ALGOR *a, const X509_ALGOR *b)
 | 
			
		||||
{
 | 
			
		||||
    int rv;
 | 
			
		||||
 
 | 
			
		||||
@@ -366,6 +366,8 @@ static int x509_name_canon(X509_NAME *a)
 | 
			
		||||
            set = entry->set;
 | 
			
		||||
        }
 | 
			
		||||
        tmpentry = X509_NAME_ENTRY_new();
 | 
			
		||||
        if (!tmpentry)
 | 
			
		||||
            goto err;
 | 
			
		||||
        tmpentry->object = OBJ_dup(entry->object);
 | 
			
		||||
        if (!asn1_string_canon(tmpentry->value, entry->value))
 | 
			
		||||
            goto err;
 | 
			
		||||
 
 | 
			
		||||
@@ -96,5 +96,8 @@ bf_enc.o: ../../include/openssl/blowfish.h ../../include/openssl/e_os2.h
 | 
			
		||||
bf_enc.o: ../../include/openssl/opensslconf.h bf_enc.c bf_locl.h
 | 
			
		||||
bf_ofb64.o: ../../include/openssl/blowfish.h ../../include/openssl/e_os2.h
 | 
			
		||||
bf_ofb64.o: ../../include/openssl/opensslconf.h bf_locl.h bf_ofb64.c
 | 
			
		||||
bf_skey.o: ../../include/openssl/blowfish.h ../../include/openssl/e_os2.h
 | 
			
		||||
bf_skey.o: ../../include/openssl/opensslconf.h bf_locl.h bf_pi.h bf_skey.c
 | 
			
		||||
bf_skey.o: ../../include/openssl/blowfish.h ../../include/openssl/crypto.h
 | 
			
		||||
bf_skey.o: ../../include/openssl/e_os2.h ../../include/openssl/opensslconf.h
 | 
			
		||||
bf_skey.o: ../../include/openssl/opensslv.h ../../include/openssl/ossl_typ.h
 | 
			
		||||
bf_skey.o: ../../include/openssl/safestack.h ../../include/openssl/stack.h
 | 
			
		||||
bf_skey.o: ../../include/openssl/symhacks.h bf_locl.h bf_pi.h bf_skey.c
 | 
			
		||||
 
 | 
			
		||||
@@ -58,11 +58,20 @@
 | 
			
		||||
 | 
			
		||||
#include <stdio.h>
 | 
			
		||||
#include <string.h>
 | 
			
		||||
#include <openssl/crypto.h>
 | 
			
		||||
#include <openssl/blowfish.h>
 | 
			
		||||
#include "bf_locl.h"
 | 
			
		||||
#include "bf_pi.h"
 | 
			
		||||
 | 
			
		||||
void BF_set_key(BF_KEY *key, int len, const unsigned char *data)
 | 
			
		||||
#ifdef OPENSSL_FIPS
 | 
			
		||||
{
 | 
			
		||||
    fips_cipher_abort(BLOWFISH);
 | 
			
		||||
    private_BF_set_key(key, len, data);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
void private_BF_set_key(BF_KEY *key, int len, const unsigned char *data)
 | 
			
		||||
#endif
 | 
			
		||||
{
 | 
			
		||||
    int i;
 | 
			
		||||
    BF_LONG *p, ri, in[2];
 | 
			
		||||
 
 | 
			
		||||
@@ -103,6 +103,9 @@ typedef struct bf_key_st {
 | 
			
		||||
    BF_LONG S[4 * 256];
 | 
			
		||||
} BF_KEY;
 | 
			
		||||
 | 
			
		||||
# ifdef OPENSSL_FIPS
 | 
			
		||||
void private_BF_set_key(BF_KEY *key, int len, const unsigned char *data);
 | 
			
		||||
# endif
 | 
			
		||||
void BF_set_key(BF_KEY *key, int len, const unsigned char *data);
 | 
			
		||||
 | 
			
		||||
void BF_encrypt(BF_LONG *data, const BF_KEY *key);
 | 
			
		||||
 
 | 
			
		||||
@@ -592,7 +592,6 @@ fmtfp(char **sbuffer,
 | 
			
		||||
    int fplace = 0;
 | 
			
		||||
    int padlen = 0;
 | 
			
		||||
    int zpadlen = 0;
 | 
			
		||||
    int caps = 0;
 | 
			
		||||
    long intpart;
 | 
			
		||||
    long fracpart;
 | 
			
		||||
    long max10;
 | 
			
		||||
@@ -630,8 +629,7 @@ fmtfp(char **sbuffer,
 | 
			
		||||
 | 
			
		||||
    /* convert integer part */
 | 
			
		||||
    do {
 | 
			
		||||
        iconvert[iplace++] =
 | 
			
		||||
            (caps ? "0123456789ABCDEF" : "0123456789abcdef")[intpart % 10];
 | 
			
		||||
        iconvert[iplace++] = "0123456789"[intpart % 10];
 | 
			
		||||
        intpart = (intpart / 10);
 | 
			
		||||
    } while (intpart && (iplace < (int)sizeof(iconvert)));
 | 
			
		||||
    if (iplace == sizeof iconvert)
 | 
			
		||||
@@ -640,8 +638,7 @@ fmtfp(char **sbuffer,
 | 
			
		||||
 | 
			
		||||
    /* convert fractional part */
 | 
			
		||||
    do {
 | 
			
		||||
        fconvert[fplace++] =
 | 
			
		||||
            (caps ? "0123456789ABCDEF" : "0123456789abcdef")[fracpart % 10];
 | 
			
		||||
        fconvert[fplace++] = "0123456789"[fracpart % 10];
 | 
			
		||||
        fracpart = (fracpart / 10);
 | 
			
		||||
    } while (fplace < max);
 | 
			
		||||
    if (fplace == sizeof fconvert)
 | 
			
		||||
@@ -707,24 +704,29 @@ doapr_outch(char **sbuffer,
 | 
			
		||||
    /* If we haven't at least one buffer, someone has doe a big booboo */
 | 
			
		||||
    assert(*sbuffer != NULL || buffer != NULL);
 | 
			
		||||
 | 
			
		||||
    if (buffer) {
 | 
			
		||||
        while (*currlen >= *maxlen) {
 | 
			
		||||
            if (*buffer == NULL) {
 | 
			
		||||
                if (*maxlen == 0)
 | 
			
		||||
                    *maxlen = 1024;
 | 
			
		||||
                *buffer = OPENSSL_malloc(*maxlen);
 | 
			
		||||
                if (*currlen > 0) {
 | 
			
		||||
                    assert(*sbuffer != NULL);
 | 
			
		||||
                    memcpy(*buffer, *sbuffer, *currlen);
 | 
			
		||||
                }
 | 
			
		||||
                *sbuffer = NULL;
 | 
			
		||||
            } else {
 | 
			
		||||
                *maxlen += 1024;
 | 
			
		||||
                *buffer = OPENSSL_realloc(*buffer, *maxlen);
 | 
			
		||||
    /* |currlen| must always be <= |*maxlen| */
 | 
			
		||||
    assert(*currlen <= *maxlen);
 | 
			
		||||
 | 
			
		||||
    if (buffer && *currlen == *maxlen) {
 | 
			
		||||
        *maxlen += 1024;
 | 
			
		||||
        if (*buffer == NULL) {
 | 
			
		||||
            *buffer = OPENSSL_malloc(*maxlen);
 | 
			
		||||
            if (!*buffer) {
 | 
			
		||||
                /* Panic! Can't really do anything sensible. Just return */
 | 
			
		||||
                return;
 | 
			
		||||
            }
 | 
			
		||||
            if (*currlen > 0) {
 | 
			
		||||
                assert(*sbuffer != NULL);
 | 
			
		||||
                memcpy(*buffer, *sbuffer, *currlen);
 | 
			
		||||
            }
 | 
			
		||||
            *sbuffer = NULL;
 | 
			
		||||
        } else {
 | 
			
		||||
            *buffer = OPENSSL_realloc(*buffer, *maxlen);
 | 
			
		||||
            if (!*buffer) {
 | 
			
		||||
                /* Panic! Can't really do anything sensible. Just return */
 | 
			
		||||
                return;
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
        /* What to do if *buffer is NULL? */
 | 
			
		||||
        assert(*sbuffer != NULL || *buffer != NULL);
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (*currlen < *maxlen) {
 | 
			
		||||
 
 | 
			
		||||
@@ -139,7 +139,8 @@ static int nbiof_read(BIO *b, char *out, int outl)
 | 
			
		||||
 | 
			
		||||
    BIO_clear_retry_flags(b);
 | 
			
		||||
#if 1
 | 
			
		||||
    RAND_pseudo_bytes(&n, 1);
 | 
			
		||||
    if (RAND_pseudo_bytes(&n, 1) < 0)
 | 
			
		||||
        return -1;
 | 
			
		||||
    num = (n & 0x07);
 | 
			
		||||
 | 
			
		||||
    if (outl > num)
 | 
			
		||||
@@ -178,7 +179,8 @@ static int nbiof_write(BIO *b, const char *in, int inl)
 | 
			
		||||
        num = nt->lwn;
 | 
			
		||||
        nt->lwn = 0;
 | 
			
		||||
    } else {
 | 
			
		||||
        RAND_pseudo_bytes(&n, 1);
 | 
			
		||||
        if (RAND_pseudo_bytes(&n, 1) < 0)
 | 
			
		||||
            return -1;
 | 
			
		||||
        num = (n & 7);
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -68,6 +68,14 @@
 | 
			
		||||
 | 
			
		||||
# include <openssl/crypto.h>
 | 
			
		||||
 | 
			
		||||
# ifndef OPENSSL_NO_SCTP
 | 
			
		||||
#  ifndef OPENSSL_SYS_VMS
 | 
			
		||||
#   include <stdint.h>
 | 
			
		||||
#  else
 | 
			
		||||
#   include <inttypes.h>
 | 
			
		||||
#  endif
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
#ifdef  __cplusplus
 | 
			
		||||
extern "C" {
 | 
			
		||||
#endif
 | 
			
		||||
@@ -95,6 +103,9 @@ extern "C" {
 | 
			
		||||
# define BIO_TYPE_BIO            (19|0x0400)/* (half a) BIO pair */
 | 
			
		||||
# define BIO_TYPE_LINEBUFFER     (20|0x0200)/* filter */
 | 
			
		||||
# define BIO_TYPE_DGRAM          (21|0x0400|0x0100)
 | 
			
		||||
# ifndef OPENSSL_NO_SCTP
 | 
			
		||||
#  define BIO_TYPE_DGRAM_SCTP     (24|0x0400|0x0100)
 | 
			
		||||
# endif
 | 
			
		||||
# define BIO_TYPE_ASN1           (22|0x0200)/* filter */
 | 
			
		||||
# define BIO_TYPE_COMP           (23|0x0200)/* filter */
 | 
			
		||||
 | 
			
		||||
@@ -163,8 +174,24 @@ extern "C" {
 | 
			
		||||
 | 
			
		||||
# define BIO_CTRL_DGRAM_SET_NEXT_TIMEOUT   45/* Next DTLS handshake timeout
 | 
			
		||||
                                              * to adjust socket timeouts */
 | 
			
		||||
 | 
			
		||||
# define BIO_CTRL_DGRAM_GET_MTU_OVERHEAD   49
 | 
			
		||||
 | 
			
		||||
# ifndef OPENSSL_NO_SCTP
 | 
			
		||||
/* SCTP stuff */
 | 
			
		||||
#  define BIO_CTRL_DGRAM_SCTP_SET_IN_HANDSHAKE    50
 | 
			
		||||
#  define BIO_CTRL_DGRAM_SCTP_ADD_AUTH_KEY                51
 | 
			
		||||
#  define BIO_CTRL_DGRAM_SCTP_NEXT_AUTH_KEY               52
 | 
			
		||||
#  define BIO_CTRL_DGRAM_SCTP_AUTH_CCS_RCVD               53
 | 
			
		||||
#  define BIO_CTRL_DGRAM_SCTP_GET_SNDINFO         60
 | 
			
		||||
#  define BIO_CTRL_DGRAM_SCTP_SET_SNDINFO         61
 | 
			
		||||
#  define BIO_CTRL_DGRAM_SCTP_GET_RCVINFO         62
 | 
			
		||||
#  define BIO_CTRL_DGRAM_SCTP_SET_RCVINFO         63
 | 
			
		||||
#  define BIO_CTRL_DGRAM_SCTP_GET_PRINFO                  64
 | 
			
		||||
#  define BIO_CTRL_DGRAM_SCTP_SET_PRINFO                  65
 | 
			
		||||
#  define BIO_CTRL_DGRAM_SCTP_SAVE_SHUTDOWN               70
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
/* modifiers */
 | 
			
		||||
# define BIO_FP_READ             0x02
 | 
			
		||||
# define BIO_FP_WRITE            0x04
 | 
			
		||||
@@ -263,7 +290,7 @@ void BIO_clear_flags(BIO *b, int flags);
 | 
			
		||||
 * BIO_CB_RETURN flag indicates if it is after the call
 | 
			
		||||
 */
 | 
			
		||||
# define BIO_CB_RETURN   0x80
 | 
			
		||||
# define BIO_CB_return(a) ((a)|BIO_CB_RETURN)
 | 
			
		||||
# define BIO_CB_return(a) ((a)|BIO_CB_RETURN))
 | 
			
		||||
# define BIO_cb_pre(a)   (!((a)&BIO_CB_RETURN))
 | 
			
		||||
# define BIO_cb_post(a)  ((a)&BIO_CB_RETURN)
 | 
			
		||||
 | 
			
		||||
@@ -342,6 +369,31 @@ typedef struct bio_f_buffer_ctx_struct {
 | 
			
		||||
typedef int asn1_ps_func (BIO *b, unsigned char **pbuf, int *plen,
 | 
			
		||||
                          void *parg);
 | 
			
		||||
 | 
			
		||||
# ifndef OPENSSL_NO_SCTP
 | 
			
		||||
/* SCTP parameter structs */
 | 
			
		||||
struct bio_dgram_sctp_sndinfo {
 | 
			
		||||
    uint16_t snd_sid;
 | 
			
		||||
    uint16_t snd_flags;
 | 
			
		||||
    uint32_t snd_ppid;
 | 
			
		||||
    uint32_t snd_context;
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
struct bio_dgram_sctp_rcvinfo {
 | 
			
		||||
    uint16_t rcv_sid;
 | 
			
		||||
    uint16_t rcv_ssn;
 | 
			
		||||
    uint16_t rcv_flags;
 | 
			
		||||
    uint32_t rcv_ppid;
 | 
			
		||||
    uint32_t rcv_tsn;
 | 
			
		||||
    uint32_t rcv_cumtsn;
 | 
			
		||||
    uint32_t rcv_context;
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
struct bio_dgram_sctp_prinfo {
 | 
			
		||||
    uint16_t pr_policy;
 | 
			
		||||
    uint32_t pr_value;
 | 
			
		||||
};
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
/* connect BIO stuff */
 | 
			
		||||
# define BIO_CONN_S_BEFORE               1
 | 
			
		||||
# define BIO_CONN_S_GET_IP               2
 | 
			
		||||
@@ -650,6 +702,9 @@ BIO_METHOD *BIO_f_linebuffer(void);
 | 
			
		||||
BIO_METHOD *BIO_f_nbio_test(void);
 | 
			
		||||
# ifndef OPENSSL_NO_DGRAM
 | 
			
		||||
BIO_METHOD *BIO_s_datagram(void);
 | 
			
		||||
#  ifndef OPENSSL_NO_SCTP
 | 
			
		||||
BIO_METHOD *BIO_s_datagram_sctp(void);
 | 
			
		||||
#  endif
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
/* BIO_METHOD *BIO_f_ber(void); */
 | 
			
		||||
@@ -693,6 +748,18 @@ int BIO_set_tcp_ndelay(int sock, int turn_on);
 | 
			
		||||
 | 
			
		||||
BIO *BIO_new_socket(int sock, int close_flag);
 | 
			
		||||
BIO *BIO_new_dgram(int fd, int close_flag);
 | 
			
		||||
# ifndef OPENSSL_NO_SCTP
 | 
			
		||||
BIO *BIO_new_dgram_sctp(int fd, int close_flag);
 | 
			
		||||
int BIO_dgram_is_sctp(BIO *bio);
 | 
			
		||||
int BIO_dgram_sctp_notification_cb(BIO *b,
 | 
			
		||||
                                   void (*handle_notifications) (BIO *bio,
 | 
			
		||||
                                                                 void
 | 
			
		||||
                                                                 *context,
 | 
			
		||||
                                                                 void *buf),
 | 
			
		||||
                                   void *context);
 | 
			
		||||
int BIO_dgram_sctp_wait_for_dry(BIO *b);
 | 
			
		||||
int BIO_dgram_sctp_msg_waiting(BIO *b);
 | 
			
		||||
# endif
 | 
			
		||||
BIO *BIO_new_fd(int fd, int close_flag);
 | 
			
		||||
BIO *BIO_new_connect(char *host_port);
 | 
			
		||||
BIO *BIO_new_accept(char *host_port);
 | 
			
		||||
@@ -761,6 +828,8 @@ void ERR_load_BIO_strings(void);
 | 
			
		||||
# define BIO_F_BUFFER_CTRL                                114
 | 
			
		||||
# define BIO_F_CONN_CTRL                                  127
 | 
			
		||||
# define BIO_F_CONN_STATE                                 115
 | 
			
		||||
# define BIO_F_DGRAM_SCTP_READ                            132
 | 
			
		||||
# define BIO_F_DGRAM_SCTP_WRITE                           133
 | 
			
		||||
# define BIO_F_FILE_CTRL                                  116
 | 
			
		||||
# define BIO_F_FILE_READ                                  130
 | 
			
		||||
# define BIO_F_LINEBUFFER_CTRL                            129
 | 
			
		||||
 
 | 
			
		||||
@@ -70,14 +70,17 @@ long MS_CALLBACK BIO_debug_callback(BIO *bio, int cmd, const char *argp,
 | 
			
		||||
    MS_STATIC char buf[256];
 | 
			
		||||
    char *p;
 | 
			
		||||
    long r = 1;
 | 
			
		||||
    int len;
 | 
			
		||||
    size_t p_maxlen;
 | 
			
		||||
 | 
			
		||||
    if (BIO_CB_RETURN & cmd)
 | 
			
		||||
        r = ret;
 | 
			
		||||
 | 
			
		||||
    BIO_snprintf(buf, sizeof buf, "BIO[%08lX]:", (unsigned long)bio);
 | 
			
		||||
    p = &(buf[14]);
 | 
			
		||||
    p_maxlen = sizeof buf - 14;
 | 
			
		||||
    len = BIO_snprintf(buf,sizeof buf,"BIO[%p]: ",(void *)bio);
 | 
			
		||||
 | 
			
		||||
    p = buf + len;
 | 
			
		||||
    p_maxlen = sizeof(buf) - len;
 | 
			
		||||
 | 
			
		||||
    switch (cmd) {
 | 
			
		||||
    case BIO_CB_FREE:
 | 
			
		||||
        BIO_snprintf(p, p_maxlen, "Free - %s\n", bio->method->name);
 | 
			
		||||
 
 | 
			
		||||
Some files were not shown because too many files have changed in this diff Show More
		Reference in New Issue
	
	Block a user