Compare commits
	
		
			2091 Commits
		
	
	
		
			OpenSSL_1_
			...
			OpenSSL_0_
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
| 
						 | 
					0823ddc56e | ||
| 
						 | 
					ad6567965d | ||
| 
						 | 
					582f1f41d4 | ||
| 
						 | 
					fa57f74a39 | ||
| 
						 | 
					92f9a8bf38 | ||
| 
						 | 
					39bcfb129e | ||
| 
						 | 
					50d3049930 | ||
| 
						 | 
					8b4fd12b0d | ||
| 
						 | 
					17689e7dc6 | ||
| 
						 | 
					f803a417f7 | ||
| 
						 | 
					9759ff0cd9 | ||
| 
						 | 
					f9603f2673 | ||
| 
						 | 
					467daf6b6e | ||
| 
						 | 
					113d36a3fb | ||
| 
						 | 
					f16093d2d6 | ||
| 
						 | 
					aeff907218 | ||
| 
						 | 
					f3b555a601 | ||
| 
						 | 
					c0de854c9d | ||
| 
						 | 
					155ca14ea9 | ||
| 
						 | 
					303845a3b5 | ||
| 
						 | 
					1a38987de0 | ||
| 
						 | 
					5d28381ae4 | ||
| 
						 | 
					eeda966123 | ||
| 
						 | 
					c5b0f5c463 | ||
| 
						 | 
					32fbe9149e | ||
| 
						 | 
					246b35a96e | ||
| 
						 | 
					79cc5417a4 | ||
| 
						 | 
					db8334be06 | ||
| 
						 | 
					fcc5e899aa | ||
| 
						 | 
					b78c9e4a2b | ||
| 
						 | 
					c380bff888 | ||
| 
						 | 
					6655ac4e45 | ||
| 
						 | 
					c7395fb999 | ||
| 
						 | 
					d53f920365 | ||
| 
						 | 
					65c588c140 | ||
| 
						 | 
					544e3e3b69 | ||
| 
						 | 
					497d0b00dc | ||
| 
						 | 
					674341f1b0 | ||
| 
						 | 
					c58f4f73bd | ||
| 
						 | 
					c85c1e08ce | ||
| 
						 | 
					c2f5de13cd | ||
| 
						 | 
					01320ad3b9 | ||
| 
						 | 
					a065737afb | ||
| 
						 | 
					241cff623e | ||
| 
						 | 
					8a8ba07167 | ||
| 
						 | 
					1b4a8df38f | ||
| 
						 | 
					6d4655c27e | ||
| 
						 | 
					9eca2cbc16 | ||
| 
						 | 
					d7efe7ea18 | ||
| 
						 | 
					49fa6b6c2d | ||
| 
						 | 
					d64a227f1f | ||
| 
						 | 
					6844c12968 | ||
| 
						 | 
					ead95e760c | ||
| 
						 | 
					02f0c26cea | ||
| 
						 | 
					6f1f3c6653 | ||
| 
						 | 
					40720ce3ca | ||
| 
						 | 
					9d03aabea3 | ||
| 
						 | 
					117e79dd88 | ||
| 
						 | 
					bc91221636 | ||
| 
						 | 
					b9006da5d7 | ||
| 
						 | 
					d26667b28f | ||
| 
						 | 
					13270477f4 | ||
| 
						 | 
					3600d5a744 | ||
| 
						 | 
					2b2f5ac045 | ||
| 
						 | 
					7d3081c5ae | ||
| 
						 | 
					9a5d775320 | ||
| 
						 | 
					e29126f99a | ||
| 
						 | 
					175af9de89 | ||
| 
						 | 
					53d6e678dc | ||
| 
						 | 
					4191a11f36 | ||
| 
						 | 
					f6e4701f2a | ||
| 
						 | 
					86183798f3 | ||
| 
						 | 
					b527959318 | ||
| 
						 | 
					25ca15e9a3 | ||
| 
						 | 
					d1d4b4f398 | ||
| 
						 | 
					2a3e745a17 | ||
| 
						 | 
					c7c7a432df | ||
| 
						 | 
					5ba9d5bb3b | ||
| 
						 | 
					883a4d55c2 | ||
| 
						 | 
					b4f1dbdc4b | ||
| 
						 | 
					5741067dea | ||
| 
						 | 
					dd7ad2c53d | ||
| 
						 | 
					366b193f89 | ||
| 
						 | 
					402eec1ae5 | ||
| 
						 | 
					44759a0d9e | ||
| 
						 | 
					9b8089bfea | ||
| 
						 | 
					4fd2e6b032 | ||
| 
						 | 
					a2a2bbafde | ||
| 
						 | 
					b0727cd549 | ||
| 
						 | 
					d808ebd379 | ||
| 
						 | 
					23f5f5b9bb | ||
| 
						 | 
					5e121092ab | ||
| 
						 | 
					7ef6c2b9d2 | ||
| 
						 | 
					00ea17f9d7 | ||
| 
						 | 
					3e8042c38f | ||
| 
						 | 
					564ccc55d6 | ||
| 
						 | 
					b558c8d597 | ||
| 
						 | 
					ba442a7e1b | ||
| 
						 | 
					e8ccaee31c | ||
| 
						 | 
					60431d0db3 | ||
| 
						 | 
					346a46f074 | ||
| 
						 | 
					56abaa14e0 | ||
| 
						 | 
					8b8a48d099 | ||
| 
						 | 
					09caf4ffcd | ||
| 
						 | 
					9793a0713f | ||
| 
						 | 
					aa9296e331 | ||
| 
						 | 
					bc253b0902 | ||
| 
						 | 
					b873409efe | ||
| 
						 | 
					f89250f2f2 | ||
| 
						 | 
					1dc6a5441a | ||
| 
						 | 
					a4aa188799 | ||
| 
						 | 
					50befdb659 | ||
| 
						 | 
					46bf0ba876 | ||
| 
						 | 
					4b4c0a1921 | ||
| 
						 | 
					df70302441 | ||
| 
						 | 
					9c6c664041 | ||
| 
						 | 
					11f719da38 | ||
| 
						 | 
					72f1815391 | ||
| 
						 | 
					e42a2abadc | ||
| 
						 | 
					ec2fede946 | ||
| 
						 | 
					63f3c9e715 | ||
| 
						 | 
					c22e2dd6e5 | ||
| 
						 | 
					7fae32f6d6 | ||
| 
						 | 
					5260f1a483 | ||
| 
						 | 
					1cb10d9c7d | ||
| 
						 | 
					62abc80540 | ||
| 
						 | 
					722fa14271 | ||
| 
						 | 
					a2ca66f37c | ||
| 
						 | 
					6a04b0d5a4 | ||
| 
						 | 
					1acca28263 | ||
| 
						 | 
					d510c6489e | ||
| 
						 | 
					b82924741b | ||
| 
						 | 
					cbb6ccabb0 | ||
| 
						 | 
					e369af3600 | ||
| 
						 | 
					15b7f5bf88 | ||
| 
						 | 
					9880f63038 | ||
| 
						 | 
					af32df0a8e | ||
| 
						 | 
					bfb7bf1a28 | ||
| 
						 | 
					f33636faf7 | ||
| 
						 | 
					94f735cade | ||
| 
						 | 
					36216218ca | ||
| 
						 | 
					115eaf4886 | ||
| 
						 | 
					53ce5647d4 | ||
| 
						 | 
					4d2efa29f6 | ||
| 
						 | 
					cd332a0750 | ||
| 
						 | 
					2ed80d14d7 | ||
| 
						 | 
					d286606301 | ||
| 
						 | 
					3f4d81e88b | ||
| 
						 | 
					dc5dfe431c | ||
| 
						 | 
					c6a876473c | ||
| 
						 | 
					5a7fc89394 | ||
| 
						 | 
					116fd3732a | ||
| 
						 | 
					1bb01b1b5f | ||
| 
						 | 
					699d78ce98 | ||
| 
						 | 
					43d613ec18 | ||
| 
						 | 
					96e1015eec | ||
| 
						 | 
					cf4b01a766 | ||
| 
						 | 
					45d129511f | ||
| 
						 | 
					0976adac8f | ||
| 
						 | 
					db5b0d9309 | ||
| 
						 | 
					aeeedc8acc | ||
| 
						 | 
					c903866420 | ||
| 
						 | 
					9b208659aa | ||
| 
						 | 
					f54fab0fef | ||
| 
						 | 
					b30aaafbe5 | ||
| 
						 | 
					fee8d86d7a | ||
| 
						 | 
					bf3e53a7fa | ||
| 
						 | 
					44a8fced97 | ||
| 
						 | 
					4ff07f4c71 | ||
| 
						 | 
					1c5f396d36 | ||
| 
						 | 
					9fcaaef34f | ||
| 
						 | 
					b9a73f5481 | ||
| 
						 | 
					bff5319d90 | ||
| 
						 | 
					fc4bd2f287 | ||
| 
						 | 
					4c836c96c4 | ||
| 
						 | 
					6e14e7fc19 | ||
| 
						 | 
					fc15c44049 | ||
| 
						 | 
					445598b35e | ||
| 
						 | 
					338a5e7e54 | ||
| 
						 | 
					6a431cd293 | ||
| 
						 | 
					1b7024fb69 | ||
| 
						 | 
					5021f6314e | ||
| 
						 | 
					21d24dd38a | ||
| 
						 | 
					681d11b6fd | ||
| 
						 | 
					8c387e62b2 | ||
| 
						 | 
					a117329c5a | ||
| 
						 | 
					f39dbff498 | ||
| 
						 | 
					f6fefb0cb6 | ||
| 
						 | 
					febfaa53f4 | ||
| 
						 | 
					cfed221c2d | ||
| 
						 | 
					c2014ae252 | ||
| 
						 | 
					c3d317b4de | ||
| 
						 | 
					a214feb26b | ||
| 
						 | 
					7a3a82dbbd | ||
| 
						 | 
					02fef91630 | ||
| 
						 | 
					0b8cd5acd6 | ||
| 
						 | 
					97f4e235a1 | ||
| 
						 | 
					cfd2aeeb7c | ||
| 
						 | 
					a0fdc4c6d6 | ||
| 
						 | 
					b5def0243e | ||
| 
						 | 
					357f6d8add | ||
| 
						 | 
					19a71e8c16 | ||
| 
						 | 
					7faa66433f | ||
| 
						 | 
					1a0498769f | ||
| 
						 | 
					a4dde82423 | ||
| 
						 | 
					eba0aa995d | ||
| 
						 | 
					c9e6fffa53 | ||
| 
						 | 
					85dcce7c63 | ||
| 
						 | 
					2ed29615cb | ||
| 
						 | 
					d7080d624b | ||
| 
						 | 
					5d7c8a48db | ||
| 
						 | 
					00e86a74bd | ||
| 
						 | 
					9e6857a358 | ||
| 
						 | 
					715258486c | ||
| 
						 | 
					2daec41e25 | ||
| 
						 | 
					8519635923 | ||
| 
						 | 
					d0bdfdd830 | ||
| 
						 | 
					4b98488eb0 | ||
| 
						 | 
					0e2458e187 | ||
| 
						 | 
					326de18955 | ||
| 
						 | 
					1fcfd61ee7 | ||
| 
						 | 
					121f386ec7 | ||
| 
						 | 
					9fb10cfe6b | ||
| 
						 | 
					a20a6366c8 | ||
| 
						 | 
					54985b5061 | ||
| 
						 | 
					b09db677d5 | ||
| 
						 | 
					cdc596567d | ||
| 
						 | 
					70d923fb03 | ||
| 
						 | 
					def1490717 | ||
| 
						 | 
					7697d9b587 | ||
| 
						 | 
					0345354fe0 | ||
| 
						 | 
					90aef4431b | ||
| 
						 | 
					602689074a | ||
| 
						 | 
					810d2c7f6e | ||
| 
						 | 
					0a9b8dd1b4 | ||
| 
						 | 
					bfce4e5d6e | ||
| 
						 | 
					4a1190beca | ||
| 
						 | 
					047ec5d196 | ||
| 
						 | 
					bb59889305 | ||
| 
						 | 
					141a5482fd | ||
| 
						 | 
					de2422affb | ||
| 
						 | 
					897169fdf0 | ||
| 
						 | 
					410a49a4fa | ||
| 
						 | 
					82ba68c42d | ||
| 
						 | 
					4b258e73ae | ||
| 
						 | 
					6ac2f67882 | ||
| 
						 | 
					bea1d1cbd8 | ||
| 
						 | 
					61e6e80fe5 | ||
| 
						 | 
					2ce540743e | ||
| 
						 | 
					8e928aab02 | ||
| 
						 | 
					105e52bf23 | ||
| 
						 | 
					492a5010a4 | ||
| 
						 | 
					53b0b0a330 | ||
| 
						 | 
					677c117419 | ||
| 
						 | 
					bb50d30f35 | ||
| 
						 | 
					8323996d99 | ||
| 
						 | 
					ee14e33c35 | ||
| 
						 | 
					1bcb94a721 | ||
| 
						 | 
					9658c634a2 | ||
| 
						 | 
					7ee8b27267 | ||
| 
						 | 
					e4ea6f0c76 | ||
| 
						 | 
					a2c00fb210 | ||
| 
						 | 
					d06ae0fff7 | ||
| 
						 | 
					afa2ea204e | ||
| 
						 | 
					0b6394c738 | ||
| 
						 | 
					70ddf8ecca | ||
| 
						 | 
					9febee0272 | ||
| 
						 | 
					a721216f0f | ||
| 
						 | 
					47f689ac09 | ||
| 
						 | 
					f51f374199 | ||
| 
						 | 
					3c1128f43f | ||
| 
						 | 
					8185c9457e | ||
| 
						 | 
					c61f0cbffb | ||
| 
						 | 
					d90605dd00 | ||
| 
						 | 
					e56334998c | ||
| 
						 | 
					9ad5c5e4f9 | ||
| 
						 | 
					4bc24cf01d | ||
| 
						 | 
					79f57768ff | ||
| 
						 | 
					d79eb9299a | ||
| 
						 | 
					fff69a7d8c | ||
| 
						 | 
					a375025e4d | ||
| 
						 | 
					d471adf351 | ||
| 
						 | 
					2fb8642eea | ||
| 
						 | 
					c44d95c1a7 | ||
| 
						 | 
					0da40f0ffc | ||
| 
						 | 
					7f722c95f8 | ||
| 
						 | 
					4268216005 | ||
| 
						 | 
					17540b77e0 | ||
| 
						 | 
					b70e4d3e90 | ||
| 
						 | 
					d9519a4032 | ||
| 
						 | 
					5ac9786807 | ||
| 
						 | 
					0b05204c4e | ||
| 
						 | 
					a4bfeff254 | ||
| 
						 | 
					43433b3852 | ||
| 
						 | 
					020a4782bd | ||
| 
						 | 
					cadbbd51c8 | ||
| 
						 | 
					ff7b021040 | ||
| 
						 | 
					e7e4d506d6 | ||
| 
						 | 
					9204e7ef0d | ||
| 
						 | 
					257df40f00 | ||
| 
						 | 
					a44c9b9c33 | ||
| 
						 | 
					1cbd7456aa | ||
| 
						 | 
					e1e39a2451 | ||
| 
						 | 
					01de6e21cc | ||
| 
						 | 
					05689a132c | ||
| 
						 | 
					1643edc63c | ||
| 
						 | 
					1546fb780b | ||
| 
						 | 
					b7d222c519 | ||
| 
						 | 
					a93cc7c573 | ||
| 
						 | 
					8988407a0b | ||
| 
						 | 
					b2afc0a9dc | ||
| 
						 | 
					a8655eb21a | ||
| 
						 | 
					f751dc4759 | ||
| 
						 | 
					fbe621d08f | ||
| 
						 | 
					2e9fd4301f | ||
| 
						 | 
					1638ce7212 | ||
| 
						 | 
					7ecd974f5f | ||
| 
						 | 
					db731da802 | ||
| 
						 | 
					5864fd2061 | ||
| 
						 | 
					ff58eaa4b6 | ||
| 
						 | 
					76c61a5d1a | ||
| 
						 | 
					4ea7019165 | ||
| 
						 | 
					59b1129e0a | ||
| 
						 | 
					fb092ef4fc | ||
| 
						 | 
					6351adecb4 | ||
| 
						 | 
					8964efc413 | ||
| 
						 | 
					430b637bd5 | ||
| 
						 | 
					ca3b81c858 | ||
| 
						 | 
					031cbecf86 | ||
| 
						 | 
					1213e6c3c2 | ||
| 
						 | 
					32619893b4 | ||
| 
						 | 
					40e0de0395 | ||
| 
						 | 
					5f9345a2f0 | ||
| 
						 | 
					33ccde59a1 | ||
| 
						 | 
					1909df070f | ||
| 
						 | 
					c23a745820 | ||
| 
						 | 
					924b117422 | ||
| 
						 | 
					24b2806097 | ||
| 
						 | 
					99f5093347 | ||
| 
						 | 
					be88529753 | ||
| 
						 | 
					b3a959a337 | ||
| 
						 | 
					2928cb4c82 | ||
| 
						 | 
					a33e6702a0 | ||
| 
						 | 
					35a65e814b | ||
| 
						 | 
					7ad132b133 | ||
| 
						 | 
					2708813166 | ||
| 
						 | 
					affe98998a | ||
| 
						 | 
					66e8211c0b | ||
| 
						 | 
					dd2dee60f3 | ||
| 
						 | 
					6495179af6 | ||
| 
						 | 
					61b8c79d15 | ||
| 
						 | 
					42aa3ec4f2 | ||
| 
						 | 
					bb152dae8f | ||
| 
						 | 
					c42ab44087 | ||
| 
						 | 
					42e10c3fd6 | ||
| 
						 | 
					c571a3e984 | ||
| 
						 | 
					e55988bb60 | ||
| 
						 | 
					34b5ba3b60 | ||
| 
						 | 
					629ac4b4ca | ||
| 
						 | 
					75f0bc4f44 | ||
| 
						 | 
					71a2440ee5 | ||
| 
						 | 
					04e40739f7 | ||
| 
						 | 
					48bcdad0d5 | ||
| 
						 | 
					f7d2402cab | ||
| 
						 | 
					808f55351a | ||
| 
						 | 
					c06271bc35 | ||
| 
						 | 
					92e5882aca | ||
| 
						 | 
					afa0580cd5 | ||
| 
						 | 
					4baee3031c | ||
| 
						 | 
					db7a72b224 | ||
| 
						 | 
					b71e69ad8e | ||
| 
						 | 
					f856173c43 | ||
| 
						 | 
					d742f9ebbd | ||
| 
						 | 
					36dd4cba3d | ||
| 
						 | 
					3978429ad5 | ||
| 
						 | 
					885945d6e1 | ||
| 
						 | 
					e22e770147 | ||
| 
						 | 
					e0c0203341 | ||
| 
						 | 
					e1eec61e26 | ||
| 
						 | 
					296fa128c9 | ||
| 
						 | 
					6dde222aae | ||
| 
						 | 
					391ac37018 | ||
| 
						 | 
					8d038a08fb | ||
| 
						 | 
					747c6ffda4 | ||
| 
						 | 
					d4cddc54f0 | ||
| 
						 | 
					eb7112c18e | ||
| 
						 | 
					fef9e07930 | ||
| 
						 | 
					8ab27e6ef7 | ||
| 
						 | 
					6415055590 | ||
| 
						 | 
					556e27b14f | ||
| 
						 | 
					af0c009d70 | ||
| 
						 | 
					0b1cf4a139 | ||
| 
						 | 
					a9101cdcaa | ||
| 
						 | 
					e351e2a7cf | ||
| 
						 | 
					215276243d | ||
| 
						 | 
					ddb7832852 | ||
| 
						 | 
					2fad41d155 | ||
| 
						 | 
					b9c3d9168f | ||
| 
						 | 
					4f2fc3c2dd | ||
| 
						 | 
					48819f4d54 | ||
| 
						 | 
					b0cbdd3eba | ||
| 
						 | 
					5016107550 | ||
| 
						 | 
					25d5d15fd5 | ||
| 
						 | 
					725713f74a | ||
| 
						 | 
					73eb0972cf | ||
| 
						 | 
					6720779c7e | ||
| 
						 | 
					b2a2c6af2a | ||
| 
						 | 
					272993bac4 | ||
| 
						 | 
					58532ae047 | ||
| 
						 | 
					4e7f6d380d | ||
| 
						 | 
					f0be325f88 | ||
| 
						 | 
					b66af23aa9 | ||
| 
						 | 
					29d0c13e97 | ||
| 
						 | 
					8a4e81a269 | ||
| 
						 | 
					843fc7b681 | ||
| 
						 | 
					6dcb6bf1c1 | ||
| 
						 | 
					1061c3cb3c | ||
| 
						 | 
					0d0f15d8d1 | ||
| 
						 | 
					a72ce94213 | ||
| 
						 | 
					f71d59c70e | ||
| 
						 | 
					3309f8313c | ||
| 
						 | 
					6cc5f194a7 | ||
| 
						 | 
					096327a99a | ||
| 
						 | 
					cc10bcf25e | ||
| 
						 | 
					875ac0ec00 | ||
| 
						 | 
					bf240f063a | ||
| 
						 | 
					dd016b0570 | ||
| 
						 | 
					244788464a | ||
| 
						 | 
					a95808334e | ||
| 
						 | 
					b3cebd5acf | ||
| 
						 | 
					7b775145e4 | ||
| 
						 | 
					7183aa6b9d | ||
| 
						 | 
					eebefe35e7 | ||
| 
						 | 
					1db0bbdc76 | ||
| 
						 | 
					e643112dd8 | ||
| 
						 | 
					21c4b25959 | ||
| 
						 | 
					41cf2c3aef | ||
| 
						 | 
					0e3a930fb4 | ||
| 
						 | 
					0c214e0153 | ||
| 
						 | 
					6c61cfbe03 | ||
| 
						 | 
					2ee77d36a0 | ||
| 
						 | 
					24f441e0bb | ||
| 
						 | 
					740da44f20 | ||
| 
						 | 
					72033fde7b | ||
| 
						 | 
					9adf3fcf9a | ||
| 
						 | 
					65f7456652 | ||
| 
						 | 
					8794569a08 | ||
| 
						 | 
					f8731bc2fd | ||
| 
						 | 
					195d6bf760 | ||
| 
						 | 
					dacd94b9c8 | ||
| 
						 | 
					8070cb5f87 | ||
| 
						 | 
					f7d514f449 | ||
| 
						 | 
					6d50bce79f | ||
| 
						 | 
					3cf0a38b3e | ||
| 
						 | 
					91a1d08a4c | ||
| 
						 | 
					85e776885b | ||
| 
						 | 
					fc4015329f | ||
| 
						 | 
					6ec9ff83f3 | ||
| 
						 | 
					db45308477 | ||
| 
						 | 
					1c7c69a8a5 | ||
| 
						 | 
					24ad061037 | ||
| 
						 | 
					92f96fa721 | ||
| 
						 | 
					0d1e362363 | ||
| 
						 | 
					a0bf2c86ab | ||
| 
						 | 
					6a662a45f3 | ||
| 
						 | 
					24d0524f31 | ||
| 
						 | 
					c081817c95 | ||
| 
						 | 
					46a1f2487e | ||
| 
						 | 
					ac02a4b68a | ||
| 
						 | 
					4ba063d3c5 | ||
| 
						 | 
					e0e0818e4b | ||
| 
						 | 
					82a5049f6a | ||
| 
						 | 
					d027b75b73 | ||
| 
						 | 
					87421d3fc5 | ||
| 
						 | 
					87d14a3625 | ||
| 
						 | 
					cc0931e36b | ||
| 
						 | 
					22152d6885 | ||
| 
						 | 
					102bcbce8d | ||
| 
						 | 
					8655de423d | ||
| 
						 | 
					c4b2eb24b3 | ||
| 
						 | 
					03e3fbb702 | ||
| 
						 | 
					bc7ee385f5 | ||
| 
						 | 
					1e368ab08f | ||
| 
						 | 
					2c77c5c8db | ||
| 
						 | 
					1eb38c563f | ||
| 
						 | 
					fa657871ed | ||
| 
						 | 
					09dac71a45 | ||
| 
						 | 
					be70b3adce | ||
| 
						 | 
					6d12b1f82b | ||
| 
						 | 
					7116a41129 | ||
| 
						 | 
					7143acab25 | ||
| 
						 | 
					11d4086d8e | ||
| 
						 | 
					32cd1da62e | ||
| 
						 | 
					d430f56de6 | ||
| 
						 | 
					957ebe98fb | ||
| 
						 | 
					9d09fc8485 | ||
| 
						 | 
					8ea4531718 | ||
| 
						 | 
					881611678e | ||
| 
						 | 
					a3dc628d86 | ||
| 
						 | 
					3c159fc1a5 | ||
| 
						 | 
					6056afd223 | ||
| 
						 | 
					54db796991 | ||
| 
						 | 
					119e912a83 | ||
| 
						 | 
					f4a4a0fdc7 | ||
| 
						 | 
					9ad765173f | ||
| 
						 | 
					c8e3c1a9b5 | ||
| 
						 | 
					ae378b769a | ||
| 
						 | 
					4de4e35459 | ||
| 
						 | 
					5537a83e56 | ||
| 
						 | 
					c850d322a6 | ||
| 
						 | 
					b8be571868 | ||
| 
						 | 
					acd43bf38c | ||
| 
						 | 
					5eaf173647 | ||
| 
						 | 
					7890b562bc | ||
| 
						 | 
					7258d33794 | ||
| 
						 | 
					263979a2a3 | ||
| 
						 | 
					2c6d83354d | ||
| 
						 | 
					a188fc01fe | ||
| 
						 | 
					1948f9e042 | ||
| 
						 | 
					f7ffc3a6c9 | ||
| 
						 | 
					4d6af5c5d2 | ||
| 
						 | 
					efed63d783 | ||
| 
						 | 
					7e351bb560 | ||
| 
						 | 
					0067580321 | ||
| 
						 | 
					82e0073624 | ||
| 
						 | 
					7e541b1a7f | ||
| 
						 | 
					2ae47ddbc2 | ||
| 
						 | 
					3e8b8b8990 | ||
| 
						 | 
					05bbbe9204 | ||
| 
						 | 
					a073129293 | ||
| 
						 | 
					93fc0e0e40 | ||
| 
						 | 
					84f1c14396 | ||
| 
						 | 
					f10986bab4 | ||
| 
						 | 
					6cb5746b65 | ||
| 
						 | 
					0061aa9f32 | ||
| 
						 | 
					3926bbcf6d | ||
| 
						 | 
					b5cee977c2 | ||
| 
						 | 
					ae3b60ba99 | ||
| 
						 | 
					d4ba6424a1 | ||
| 
						 | 
					92a97e52a0 | ||
| 
						 | 
					78dcaa0609 | ||
| 
						 | 
					65b4c34d86 | ||
| 
						 | 
					d8486c312c | ||
| 
						 | 
					8d4baaf2f0 | ||
| 
						 | 
					50fb940f05 | ||
| 
						 | 
					63e3676e68 | ||
| 
						 | 
					1dac2cae68 | ||
| 
						 | 
					d886975835 | ||
| 
						 | 
					22872a5363 | ||
| 
						 | 
					82b6b541b1 | ||
| 
						 | 
					60a989a76e | ||
| 
						 | 
					18394ed50f | ||
| 
						 | 
					3416d11926 | ||
| 
						 | 
					c1f1a03d0c | ||
| 
						 | 
					278a447ee8 | ||
| 
						 | 
					8ceee689c7 | ||
| 
						 | 
					356f164f52 | ||
| 
						 | 
					203ef9988c | ||
| 
						 | 
					9f51bdae00 | ||
| 
						 | 
					59c4f46f0f | ||
| 
						 | 
					f9ab6255e7 | ||
| 
						 | 
					a89b665b9b | ||
| 
						 | 
					a7949b8da3 | ||
| 
						 | 
					b0b4adc3af | ||
| 
						 | 
					6e19895972 | ||
| 
						 | 
					d24f1cbf35 | ||
| 
						 | 
					b8febed96a | ||
| 
						 | 
					82687bb4c3 | ||
| 
						 | 
					6506b7754a | ||
| 
						 | 
					2eb8e5e62a | ||
| 
						 | 
					c713a4c04d | ||
| 
						 | 
					0cefa0f942 | ||
| 
						 | 
					834c85ef0c | ||
| 
						 | 
					0c8c8eab58 | ||
| 
						 | 
					bc06baca76 | ||
| 
						 | 
					9eeb779e8f | ||
| 
						 | 
					fe171f9c3e | ||
| 
						 | 
					5e613d5411 | ||
| 
						 | 
					56e930eb03 | ||
| 
						 | 
					4a052f0bb9 | ||
| 
						 | 
					f34e79f27b | ||
| 
						 | 
					ef1fe9094c | ||
| 
						 | 
					c25e8ee9b3 | ||
| 
						 | 
					4525a048ec | ||
| 
						 | 
					f421a52f56 | ||
| 
						 | 
					17a79eec0c | ||
| 
						 | 
					1eda14b44f | ||
| 
						 | 
					aa9b502619 | ||
| 
						 | 
					aaf45e6464 | ||
| 
						 | 
					be83c31cdd | ||
| 
						 | 
					76a41eec2b | ||
| 
						 | 
					ab9c0ec9fc | ||
| 
						 | 
					cf6a1dea19 | ||
| 
						 | 
					ea5b3f5e62 | ||
| 
						 | 
					c3c658e1c0 | ||
| 
						 | 
					5d013b6b32 | ||
| 
						 | 
					ee91323f52 | ||
| 
						 | 
					4fae868811 | ||
| 
						 | 
					354f92d66a | ||
| 
						 | 
					c3484e0268 | ||
| 
						 | 
					6b0be9c73d | ||
| 
						 | 
					02312a91ca | ||
| 
						 | 
					744f6b648e | ||
| 
						 | 
					f1502a491e | ||
| 
						 | 
					b70871b675 | ||
| 
						 | 
					9de450b545 | ||
| 
						 | 
					cc53036744 | ||
| 
						 | 
					4610d8dc00 | ||
| 
						 | 
					5d7dfefe82 | ||
| 
						 | 
					5e8e7054f7 | ||
| 
						 | 
					9a542ea01d | ||
| 
						 | 
					1939f83709 | ||
| 
						 | 
					b7c114f044 | ||
| 
						 | 
					ede1351997 | ||
| 
						 | 
					7786ed6a64 | ||
| 
						 | 
					bdd08277b8 | ||
| 
						 | 
					2bf4faa7e4 | ||
| 
						 | 
					2e5e604b0c | ||
| 
						 | 
					ed4cd027f3 | ||
| 
						 | 
					bab19a2ac2 | ||
| 
						 | 
					582eb96d15 | ||
| 
						 | 
					2649ce1ebc | ||
| 
						 | 
					7070cdba4e | ||
| 
						 | 
					e885de28b1 | ||
| 
						 | 
					3038649ab2 | ||
| 
						 | 
					3e4da3f7cb | ||
| 
						 | 
					53b5d04715 | ||
| 
						 | 
					defede6080 | ||
| 
						 | 
					1472f1427e | ||
| 
						 | 
					00d1ecb1da | ||
| 
						 | 
					739e0e934a | ||
| 
						 | 
					6ae9770d34 | ||
| 
						 | 
					bec7184768 | ||
| 
						 | 
					442ac8d259 | ||
| 
						 | 
					657b02d0cf | ||
| 
						 | 
					b50ef8b216 | ||
| 
						 | 
					1b690c1a8b | ||
| 
						 | 
					2873a53f5f | ||
| 
						 | 
					04a781e844 | ||
| 
						 | 
					68be98d1a6 | ||
| 
						 | 
					0bbbadf3f5 | ||
| 
						 | 
					c0c1ce125a | ||
| 
						 | 
					105861186f | ||
| 
						 | 
					4a9d335bb4 | ||
| 
						 | 
					162f1e08f8 | ||
| 
						 | 
					0484ff5ec1 | ||
| 
						 | 
					4acc2fed6c | ||
| 
						 | 
					0369804ffa | ||
| 
						 | 
					33d7b5ec07 | ||
| 
						 | 
					4b38f35e72 | ||
| 
						 | 
					82c2773423 | ||
| 
						 | 
					ded27f709c | ||
| 
						 | 
					30dc3e112b | ||
| 
						 | 
					371b262f96 | ||
| 
						 | 
					b3fb2492d5 | ||
| 
						 | 
					93b810637b | ||
| 
						 | 
					cc62974182 | ||
| 
						 | 
					9413788571 | ||
| 
						 | 
					e8387db0c4 | ||
| 
						 | 
					81f28ca567 | ||
| 
						 | 
					1b32943215 | ||
| 
						 | 
					a231d99d4c | ||
| 
						 | 
					714044cc03 | ||
| 
						 | 
					5598b99fb3 | ||
| 
						 | 
					6899d9bbf6 | ||
| 
						 | 
					cf876a9893 | ||
| 
						 | 
					8b8a2928af | ||
| 
						 | 
					031774468c | ||
| 
						 | 
					dd28d12add | ||
| 
						 | 
					6c61ee8fe3 | ||
| 
						 | 
					b86ebb55ff | ||
| 
						 | 
					66956eaba3 | ||
| 
						 | 
					444ff35029 | ||
| 
						 | 
					ff2549be1d | ||
| 
						 | 
					2557c6a812 | ||
| 
						 | 
					aae48de0f7 | ||
| 
						 | 
					766708f24b | ||
| 
						 | 
					fbeb4a9d15 | ||
| 
						 | 
					24fc4f656c | ||
| 
						 | 
					c3c3b28818 | ||
| 
						 | 
					06e2670a57 | ||
| 
						 | 
					3798a4d059 | ||
| 
						 | 
					5b8246d6eb | ||
| 
						 | 
					2e24bc421d | ||
| 
						 | 
					f244ed3ed2 | ||
| 
						 | 
					50a095ed16 | ||
| 
						 | 
					37aff2199e | ||
| 
						 | 
					309aa5fbf3 | ||
| 
						 | 
					5f40948714 | ||
| 
						 | 
					c22050be29 | ||
| 
						 | 
					54ca55fd81 | ||
| 
						 | 
					d0e79d7e2c | ||
| 
						 | 
					c1003dfd15 | ||
| 
						 | 
					98809a1458 | ||
| 
						 | 
					ccc3df8c33 | ||
| 
						 | 
					593a6dbe19 | ||
| 
						 | 
					efbe446f1a | ||
| 
						 | 
					725745d105 | ||
| 
						 | 
					c0e94f8292 | ||
| 
						 | 
					ef4bd0167c | ||
| 
						 | 
					7a8a3ef4f6 | ||
| 
						 | 
					98c7b0367d | ||
| 
						 | 
					9e5dea0ffd | ||
| 
						 | 
					cb4823fdd6 | ||
| 
						 | 
					17bb051628 | ||
| 
						 | 
					59f44e810b | ||
| 
						 | 
					7a014dceb6 | ||
| 
						 | 
					1ff44a99a4 | ||
| 
						 | 
					6cf61614e4 | ||
| 
						 | 
					82e448b92b | ||
| 
						 | 
					b172352b52 | ||
| 
						 | 
					95b14fd803 | ||
| 
						 | 
					553d2e3280 | ||
| 
						 | 
					82fb4ee89d | ||
| 
						 | 
					389fef6c9c | ||
| 
						 | 
					b6622f9623 | ||
| 
						 | 
					7f5448e3a8 | ||
| 
						 | 
					5d965f0783 | ||
| 
						 | 
					b14713c231 | ||
| 
						 | 
					637e0ba420 | ||
| 
						 | 
					9ac37cb018 | ||
| 
						 | 
					fb7751b44f | ||
| 
						 | 
					e333a8d673 | ||
| 
						 | 
					89a6daac00 | ||
| 
						 | 
					7e42945918 | ||
| 
						 | 
					b61a87b26c | ||
| 
						 | 
					2c6b141931 | ||
| 
						 | 
					af13c50d51 | ||
| 
						 | 
					65c2397fce | ||
| 
						 | 
					16e7efe3c8 | ||
| 
						 | 
					c2b78c31d6 | ||
| 
						 | 
					a1dc0336dd | ||
| 
						 | 
					d99a35f275 | ||
| 
						 | 
					949fbf073a | ||
| 
						 | 
					6156be4da3 | ||
| 
						 | 
					d7d4325655 | ||
| 
						 | 
					9f81ffe433 | ||
| 
						 | 
					8164930816 | ||
| 
						 | 
					2a8834cf89 | ||
| 
						 | 
					e6e11f4ec3 | ||
| 
						 | 
					452e41562c | ||
| 
						 | 
					8c6dd96aed | ||
| 
						 | 
					23a4ccd178 | ||
| 
						 | 
					2b4d877a27 | ||
| 
						 | 
					d916f92d6f | ||
| 
						 | 
					b9b5134e19 | ||
| 
						 | 
					9ef6fdab63 | ||
| 
						 | 
					3a0b6de4d0 | ||
| 
						 | 
					08896dc0bd | ||
| 
						 | 
					ef62799783 | ||
| 
						 | 
					8196257f00 | ||
| 
						 | 
					ac923d3377 | ||
| 
						 | 
					0ec529ac82 | ||
| 
						 | 
					d5b0c872d8 | ||
| 
						 | 
					2e8026b65a | ||
| 
						 | 
					381a9f04a0 | ||
| 
						 | 
					d7050b4424 | ||
| 
						 | 
					91ca332058 | ||
| 
						 | 
					ff095a8ac8 | ||
| 
						 | 
					ae37f9f3a2 | ||
| 
						 | 
					95d66bd867 | ||
| 
						 | 
					6d73e9d8e8 | ||
| 
						 | 
					fb5a4bbaa7 | ||
| 
						 | 
					d402f6b66f | ||
| 
						 | 
					36a38a7a27 | ||
| 
						 | 
					2a4dc7e505 | ||
| 
						 | 
					4e92353d23 | ||
| 
						 | 
					0badc909ae | ||
| 
						 | 
					3cc52ee97a | ||
| 
						 | 
					822da9ccc3 | ||
| 
						 | 
					96e20179e4 | ||
| 
						 | 
					1dfa26bd84 | ||
| 
						 | 
					9e6c97703c | ||
| 
						 | 
					a0f6e0c1e7 | ||
| 
						 | 
					edaa7a599a | ||
| 
						 | 
					3b95629db1 | ||
| 
						 | 
					afff063a14 | ||
| 
						 | 
					e1246e1ad7 | ||
| 
						 | 
					df0b451d91 | ||
| 
						 | 
					07cb0a82d1 | ||
| 
						 | 
					f2671f8ac4 | ||
| 
						 | 
					43e9e1a160 | ||
| 
						 | 
					d0969d24cf | ||
| 
						 | 
					cf51a0dccb | ||
| 
						 | 
					48b30bf0e2 | ||
| 
						 | 
					17b08b6a64 | ||
| 
						 | 
					197ab47bdd | ||
| 
						 | 
					e8cce0babe | ||
| 
						 | 
					11d655ef40 | ||
| 
						 | 
					1da61e8051 | ||
| 
						 | 
					da6ce18279 | ||
| 
						 | 
					98f43a173b | ||
| 
						 | 
					c202eda634 | ||
| 
						 | 
					f78bcb8945 | ||
| 
						 | 
					2a918d4cc0 | ||
| 
						 | 
					2c83b24cad | ||
| 
						 | 
					e75445f688 | ||
| 
						 | 
					df51d79ec4 | ||
| 
						 | 
					c21a427a14 | ||
| 
						 | 
					c6e4ef2c6e | ||
| 
						 | 
					6450908a35 | ||
| 
						 | 
					a91cb2103d | ||
| 
						 | 
					3acd3158e9 | ||
| 
						 | 
					8a04c6f894 | ||
| 
						 | 
					745565c69f | ||
| 
						 | 
					fbc4a24633 | ||
| 
						 | 
					4775a89760 | ||
| 
						 | 
					3008a7d819 | ||
| 
						 | 
					233f758523 | ||
| 
						 | 
					3af16cf694 | ||
| 
						 | 
					985b5ee735 | ||
| 
						 | 
					4df7ade829 | ||
| 
						 | 
					932858d5f9 | ||
| 
						 | 
					c4b3503b4b | ||
| 
						 | 
					f871545f7f | ||
| 
						 | 
					136b5dc7c7 | ||
| 
						 | 
					759b287f15 | ||
| 
						 | 
					5fffb5b3d9 | ||
| 
						 | 
					17620eec4c | ||
| 
						 | 
					059230b320 | ||
| 
						 | 
					19dac35e5f | ||
| 
						 | 
					f5fe2a9f6c | ||
| 
						 | 
					d36e9d160b | ||
| 
						 | 
					e58e78cab2 | ||
| 
						 | 
					b0080e3817 | ||
| 
						 | 
					4d67d79273 | ||
| 
						 | 
					83ece9f028 | ||
| 
						 | 
					cec136c30d | ||
| 
						 | 
					ded8aff2c8 | ||
| 
						 | 
					76a268a43f | ||
| 
						 | 
					6563b02980 | ||
| 
						 | 
					32d4496c1e | ||
| 
						 | 
					0b26e53c59 | ||
| 
						 | 
					7cf69ed544 | ||
| 
						 | 
					8b634ba029 | ||
| 
						 | 
					526228b78e | ||
| 
						 | 
					34d01a3b20 | ||
| 
						 | 
					856f3005de | ||
| 
						 | 
					6e2a14002e | ||
| 
						 | 
					7852c6b075 | ||
| 
						 | 
					2c5f3606d1 | ||
| 
						 | 
					1649489834 | ||
| 
						 | 
					b51291cba8 | ||
| 
						 | 
					b29b576957 | ||
| 
						 | 
					abe389fd28 | ||
| 
						 | 
					e7e7f5de4b | ||
| 
						 | 
					3dfa7416cd | ||
| 
						 | 
					d733ef7a69 | ||
| 
						 | 
					17e01d24bb | ||
| 
						 | 
					f67f815624 | ||
| 
						 | 
					ab8fe43fa2 | ||
| 
						 | 
					5e4c2225ed | ||
| 
						 | 
					167d2a1411 | ||
| 
						 | 
					3f4802a14e | ||
| 
						 | 
					9aecc3e5ff | ||
| 
						 | 
					b8a4a5bcba | ||
| 
						 | 
					6daac534d7 | ||
| 
						 | 
					79649d380e | ||
| 
						 | 
					51ebaa9f82 | ||
| 
						 | 
					efaa569c3b | ||
| 
						 | 
					15684f58c2 | ||
| 
						 | 
					0e6c24ae4b | ||
| 
						 | 
					0dc1b3c1fb | ||
| 
						 | 
					1e53b797f6 | ||
| 
						 | 
					1ddf691244 | ||
| 
						 | 
					78074baadd | ||
| 
						 | 
					7457642b8c | ||
| 
						 | 
					d1e107702b | ||
| 
						 | 
					19503ca653 | ||
| 
						 | 
					14089b1d0f | ||
| 
						 | 
					0b8eca58b9 | ||
| 
						 | 
					c2f425a06a | ||
| 
						 | 
					4930f8bbd9 | ||
| 
						 | 
					a5668db68b | ||
| 
						 | 
					996b80f990 | ||
| 
						 | 
					1998f60546 | ||
| 
						 | 
					13a4808ca4 | ||
| 
						 | 
					a176be48a2 | ||
| 
						 | 
					f47bce27e3 | ||
| 
						 | 
					f86d65110d | ||
| 
						 | 
					4730ea8a38 | ||
| 
						 | 
					3e82dfdf2d | ||
| 
						 | 
					b7d0d35a13 | ||
| 
						 | 
					e12ceb2c92 | ||
| 
						 | 
					e8d23950a0 | ||
| 
						 | 
					d7c86198d9 | ||
| 
						 | 
					76428da729 | ||
| 
						 | 
					6bf4ca0840 | ||
| 
						 | 
					efa59b8d59 | ||
| 
						 | 
					e1a2bfaaa6 | ||
| 
						 | 
					48f48d96ce | ||
| 
						 | 
					085cb7cac0 | ||
| 
						 | 
					9874ff33c3 | ||
| 
						 | 
					73cfd9cce9 | ||
| 
						 | 
					3166d16f06 | ||
| 
						 | 
					26b82246b1 | ||
| 
						 | 
					277ba3ebd2 | ||
| 
						 | 
					3e9b2042d9 | ||
| 
						 | 
					5d577d7eb0 | ||
| 
						 | 
					05ee0523c1 | ||
| 
						 | 
					43f392c9a1 | ||
| 
						 | 
					01cb2049e3 | ||
| 
						 | 
					a224fe14e9 | ||
| 
						 | 
					00d5a5ff55 | ||
| 
						 | 
					420312cec5 | ||
| 
						 | 
					3c17fa3325 | ||
| 
						 | 
					e3424084a0 | ||
| 
						 | 
					d9a55422c7 | ||
| 
						 | 
					374941f727 | ||
| 
						 | 
					caeb429055 | ||
| 
						 | 
					b00c36e366 | ||
| 
						 | 
					1f9a128519 | ||
| 
						 | 
					18df6b30b1 | ||
| 
						 | 
					0d399f97dd | ||
| 
						 | 
					3fdc2c906d | ||
| 
						 | 
					a78ded0b61 | ||
| 
						 | 
					0a629ddbd6 | ||
| 
						 | 
					353cb367e4 | ||
| 
						 | 
					6252f3bc7c | ||
| 
						 | 
					4e319926d7 | ||
| 
						 | 
					e4f456918f | ||
| 
						 | 
					c342341ea1 | ||
| 
						 | 
					9d396bee8e | ||
| 
						 | 
					a9427c2536 | ||
| 
						 | 
					7a746ecf3e | ||
| 
						 | 
					aca8bf43ce | ||
| 
						 | 
					7de0df694f | ||
| 
						 | 
					15d3cd4680 | ||
| 
						 | 
					da4fb3cb39 | ||
| 
						 | 
					e10051ef3f | ||
| 
						 | 
					c60dca1f95 | ||
| 
						 | 
					188abf7e2a | ||
| 
						 | 
					f021b7cca6 | ||
| 
						 | 
					c126b73a4a | ||
| 
						 | 
					3f03b3569d | ||
| 
						 | 
					07dd3bfcd4 | ||
| 
						 | 
					37afdc953e | ||
| 
						 | 
					044855e146 | ||
| 
						 | 
					12379c82ba | ||
| 
						 | 
					be98d6b9ad | ||
| 
						 | 
					910b484975 | ||
| 
						 | 
					1fde5b65c6 | ||
| 
						 | 
					c40bc0b11f | ||
| 
						 | 
					7a0c01b41a | ||
| 
						 | 
					6fe9c925d2 | ||
| 
						 | 
					1ebdc48d5a | ||
| 
						 | 
					395a6c69bd | ||
| 
						 | 
					0d658ddf25 | ||
| 
						 | 
					cefa7ce284 | ||
| 
						 | 
					ee4041b8bd | ||
| 
						 | 
					a17f351b56 | ||
| 
						 | 
					4fcf8d8b07 | ||
| 
						 | 
					b7650eb21e | ||
| 
						 | 
					69120ad199 | ||
| 
						 | 
					1eee8a4226 | ||
| 
						 | 
					98448a53c8 | ||
| 
						 | 
					241d088156 | ||
| 
						 | 
					a22a8dd7dd | ||
| 
						 | 
					e26ad0c4fd | ||
| 
						 | 
					6e7559ac7f | ||
| 
						 | 
					9feda63955 | ||
| 
						 | 
					1ed81ff731 | ||
| 
						 | 
					b2dc2e6dac | ||
| 
						 | 
					1b787fc04c | ||
| 
						 | 
					9a6401acdf | ||
| 
						 | 
					c40fcc1e40 | ||
| 
						 | 
					f908ca4db4 | ||
| 
						 | 
					72f6453c48 | ||
| 
						 | 
					eca7b90771 | ||
| 
						 | 
					7eb90ccefb | ||
| 
						 | 
					6ed534782f | ||
| 
						 | 
					1ee27238f7 | ||
| 
						 | 
					59689735a6 | ||
| 
						 | 
					1be16287ee | ||
| 
						 | 
					9fe4b73d97 | ||
| 
						 | 
					73cb37295d | ||
| 
						 | 
					1f35508ae6 | ||
| 
						 | 
					3e2a74c294 | ||
| 
						 | 
					a34922c476 | ||
| 
						 | 
					84be7091fd | ||
| 
						 | 
					f82c1f0dd8 | ||
| 
						 | 
					dc0cb7e74f | ||
| 
						 | 
					ab31dbc482 | ||
| 
						 | 
					36e9d3ee91 | ||
| 
						 | 
					cc8c0f6b46 | ||
| 
						 | 
					3eac70a356 | ||
| 
						 | 
					5f3ad8f82c | ||
| 
						 | 
					367316c723 | ||
| 
						 | 
					d34353cc91 | ||
| 
						 | 
					6287fa5396 | ||
| 
						 | 
					a00c3c4019 | ||
| 
						 | 
					f4677b7960 | ||
| 
						 | 
					92308905dd | ||
| 
						 | 
					6f32fc5c4e | ||
| 
						 | 
					e607e731eb | ||
| 
						 | 
					f17c45611e | ||
| 
						 | 
					1ff7b6492b | ||
| 
						 | 
					20900d6801 | ||
| 
						 | 
					4b253d904d | ||
| 
						 | 
					a51c8c64e0 | ||
| 
						 | 
					c153422388 | ||
| 
						 | 
					7f065cfdbd | ||
| 
						 | 
					667fbc0847 | ||
| 
						 | 
					6ba7bd5697 | ||
| 
						 | 
					2cad035c01 | ||
| 
						 | 
					2a76c68842 | ||
| 
						 | 
					1b00f4bc37 | ||
| 
						 | 
					be62eb6d93 | ||
| 
						 | 
					5f3878f1e3 | ||
| 
						 | 
					a523e997d3 | ||
| 
						 | 
					fe43caa4a4 | ||
| 
						 | 
					792e614144 | ||
| 
						 | 
					ce2b87d88a | ||
| 
						 | 
					f092a073a7 | ||
| 
						 | 
					6fa4cd7136 | ||
| 
						 | 
					505ed2b076 | ||
| 
						 | 
					cef3e62d2b | ||
| 
						 | 
					40ea9ff9e8 | ||
| 
						 | 
					a97a6b03bc | ||
| 
						 | 
					516f76fd2c | ||
| 
						 | 
					5a02ac6e5b | ||
| 
						 | 
					14d4074ee1 | ||
| 
						 | 
					d9f16c405c | ||
| 
						 | 
					bfc6482a7a | ||
| 
						 | 
					5aa032033e | ||
| 
						 | 
					2d59f9938f | ||
| 
						 | 
					c0ce8fe755 | ||
| 
						 | 
					55eff40084 | ||
| 
						 | 
					e5a251843d | ||
| 
						 | 
					fe46b0de29 | ||
| 
						 | 
					a581439bb1 | ||
| 
						 | 
					a43337e8c4 | ||
| 
						 | 
					33c51ec143 | ||
| 
						 | 
					448da15fbf | ||
| 
						 | 
					a1bb2d6c2f | ||
| 
						 | 
					81dde5e8fe | ||
| 
						 | 
					b84e441861 | ||
| 
						 | 
					08e012bbec | ||
| 
						 | 
					b46acc392b | ||
| 
						 | 
					28af6367b8 | ||
| 
						 | 
					2c17b493b1 | ||
| 
						 | 
					ea725a66c9 | ||
| 
						 | 
					1532493dab | ||
| 
						 | 
					3795297af8 | ||
| 
						 | 
					33fd33d423 | ||
| 
						 | 
					4e98f8863f | ||
| 
						 | 
					582ef3dbdb | ||
| 
						 | 
					6a933782fa | ||
| 
						 | 
					d1c2778e93 | ||
| 
						 | 
					8d64abacc6 | ||
| 
						 | 
					9af6802943 | ||
| 
						 | 
					c10f53a897 | ||
| 
						 | 
					2124e869a8 | ||
| 
						 | 
					3b668eedda | ||
| 
						 | 
					7471431322 | ||
| 
						 | 
					1542de4eed | ||
| 
						 | 
					b6c2bffbdf | ||
| 
						 | 
					ff09931e22 | ||
| 
						 | 
					155c70b882 | ||
| 
						 | 
					7c49452973 | ||
| 
						 | 
					312539ae9f | ||
| 
						 | 
					cc40dcce58 | ||
| 
						 | 
					5790921aea | ||
| 
						 | 
					df84c11407 | ||
| 
						 | 
					b76306c983 | ||
| 
						 | 
					cdffc716c9 | ||
| 
						 | 
					5dffc13f55 | ||
| 
						 | 
					a5873a8d3d | ||
| 
						 | 
					4db3e88459 | ||
| 
						 | 
					ab073bad4f | ||
| 
						 | 
					cfe04f607d | ||
| 
						 | 
					c0e9f540e0 | ||
| 
						 | 
					7c97aacbe8 | ||
| 
						 | 
					36b8f87566 | ||
| 
						 | 
					d875413a0b | ||
| 
						 | 
					155ad6d219 | ||
| 
						 | 
					138f20433e | ||
| 
						 | 
					7747c67861 | ||
| 
						 | 
					237a6f06b6 | ||
| 
						 | 
					fe99beb82a | ||
| 
						 | 
					736a77f275 | ||
| 
						 | 
					94539213a1 | ||
| 
						 | 
					c5c4246319 | ||
| 
						 | 
					2e6d8a8991 | ||
| 
						 | 
					e852835da6 | ||
| 
						 | 
					d245c32529 | ||
| 
						 | 
					964d58bcb0 | ||
| 
						 | 
					52702f6f92 | ||
| 
						 | 
					05794d983f | ||
| 
						 | 
					364f36f851 | ||
| 
						 | 
					9b809d6278 | ||
| 
						 | 
					bbefea3387 | ||
| 
						 | 
					d83dde6180 | ||
| 
						 | 
					63e1319d0f | ||
| 
						 | 
					8067d34b3a | ||
| 
						 | 
					e3f2860e73 | ||
| 
						 | 
					92eb44d238 | ||
| 
						 | 
					f4179bead4 | ||
| 
						 | 
					fced277486 | ||
| 
						 | 
					3d1be455ce | ||
| 
						 | 
					dee4d129cb | ||
| 
						 | 
					0067bd77a8 | ||
| 
						 | 
					d98904e5a7 | ||
| 
						 | 
					96a259e81e | ||
| 
						 | 
					59f3477b82 | ||
| 
						 | 
					f947b818bf | ||
| 
						 | 
					3fa1a444ce | ||
| 
						 | 
					a2dc9b6be2 | ||
| 
						 | 
					16349eeceb | ||
| 
						 | 
					aecf1c1f96 | ||
| 
						 | 
					4ea574fdf3 | ||
| 
						 | 
					cf8115deb0 | ||
| 
						 | 
					d25cbda074 | ||
| 
						 | 
					5d582fd516 | ||
| 
						 | 
					8ec86dcf04 | ||
| 
						 | 
					6d3b70c8da | ||
| 
						 | 
					0a4fda742b | ||
| 
						 | 
					3745e57bf9 | ||
| 
						 | 
					b7e7aa00de | ||
| 
						 | 
					1098fd48ce | ||
| 
						 | 
					393906d9be | ||
| 
						 | 
					446881468c | ||
| 
						 | 
					cfb95ba9f6 | ||
| 
						 | 
					c198c26226 | ||
| 
						 | 
					54d6ddba69 | ||
| 
						 | 
					1af12ff1d1 | ||
| 
						 | 
					bd72b8eca6 | ||
| 
						 | 
					200d00c854 | ||
| 
						 | 
					669b912dea | ||
| 
						 | 
					36a4a67b2b | ||
| 
						 | 
					3413424f01 | ||
| 
						 | 
					80fc840d89 | ||
| 
						 | 
					6455100f7a | ||
| 
						 | 
					b7c8b4fc95 | ||
| 
						 | 
					f58d0f70b6 | ||
| 
						 | 
					8f59c61d1d | ||
| 
						 | 
					fd43ae3fe4 | ||
| 
						 | 
					cdd0f3b328 | ||
| 
						 | 
					f9f6f0e9f0 | ||
| 
						 | 
					405f382144 | ||
| 
						 | 
					a750273546 | ||
| 
						 | 
					ddc5f6f328 | ||
| 
						 | 
					4231b356aa | ||
| 
						 | 
					df1f7b4b02 | ||
| 
						 | 
					0b7545b239 | ||
| 
						 | 
					3a72137211 | ||
| 
						 | 
					e5d289cc03 | ||
| 
						 | 
					0ff3766b0e | ||
| 
						 | 
					3562202306 | ||
| 
						 | 
					2bf4b96aef | ||
| 
						 | 
					811e08a2c5 | ||
| 
						 | 
					dd6e90465d | ||
| 
						 | 
					a86c626802 | ||
| 
						 | 
					705c3dec2c | ||
| 
						 | 
					4afcee8b4b | ||
| 
						 | 
					9627017f9c | ||
| 
						 | 
					e0f6c15418 | ||
| 
						 | 
					ecc20b75f8 | ||
| 
						 | 
					540e455e3a | ||
| 
						 | 
					14748adb09 | ||
| 
						 | 
					ff2ab9e6bb | ||
| 
						 | 
					cc5cc3bb8f | ||
| 
						 | 
					1f3206216b | ||
| 
						 | 
					f113bb9f4e | ||
| 
						 | 
					4681147bb3 | ||
| 
						 | 
					52c3f232e4 | ||
| 
						 | 
					3dc466424e | ||
| 
						 | 
					353415cc81 | ||
| 
						 | 
					1a12ce8ea5 | ||
| 
						 | 
					0278e15fa3 | ||
| 
						 | 
					f01f085cb9 | ||
| 
						 | 
					bca68e90cc | ||
| 
						 | 
					a3f67ec18d | ||
| 
						 | 
					56ef1cbc40 | ||
| 
						 | 
					a1411093f0 | ||
| 
						 | 
					f35f7d9fbb | ||
| 
						 | 
					dfbf646ac4 | ||
| 
						 | 
					591371566e | ||
| 
						 | 
					5799b72178 | ||
| 
						 | 
					1cfe6842d5 | ||
| 
						 | 
					f4c98a6a3d | ||
| 
						 | 
					4aefb1dd98 | ||
| 
						 | 
					aa03989791 | ||
| 
						 | 
					a865b2c320 | ||
| 
						 | 
					694ce314a8 | ||
| 
						 | 
					94299a36a6 | ||
| 
						 | 
					3aaeb5c1e5 | ||
| 
						 | 
					80ec6cc806 | ||
| 
						 | 
					3d83320279 | ||
| 
						 | 
					4ab252d198 | ||
| 
						 | 
					058ffd7623 | ||
| 
						 | 
					0330a13aea | ||
| 
						 | 
					467325b81d | ||
| 
						 | 
					00f716bbe6 | ||
| 
						 | 
					2f2f032497 | ||
| 
						 | 
					feb200bbb3 | ||
| 
						 | 
					3894667036 | ||
| 
						 | 
					203ac694e3 | ||
| 
						 | 
					bb592c75e7 | ||
| 
						 | 
					777d717c40 | ||
| 
						 | 
					143d84590f | ||
| 
						 | 
					a29669d78d | ||
| 
						 | 
					e5be1e1696 | ||
| 
						 | 
					9e47c34729 | ||
| 
						 | 
					cb896f8923 | ||
| 
						 | 
					cec9bce126 | ||
| 
						 | 
					3f79793b7e | ||
| 
						 | 
					0d01d8a735 | ||
| 
						 | 
					2c0fa03dc6 | ||
| 
						 | 
					d3b3a6d389 | ||
| 
						 | 
					fc260b09a1 | ||
| 
						 | 
					b3c79a8a27 | ||
| 
						 | 
					f0ecefc0c0 | ||
| 
						 | 
					b0118409a9 | ||
| 
						 | 
					5f23288692 | ||
| 
						 | 
					45c58c7d10 | ||
| 
						 | 
					112591be76 | ||
| 
						 | 
					1b8daa3693 | ||
| 
						 | 
					1cdbc755ee | ||
| 
						 | 
					aa9c7e4b8c | ||
| 
						 | 
					6be69a168f | ||
| 
						 | 
					eaf76feeb6 | ||
| 
						 | 
					03e79ed05e | ||
| 
						 | 
					56bef2df4f | ||
| 
						 | 
					10d3886c51 | ||
| 
						 | 
					f1c0cf5b70 | ||
| 
						 | 
					2a7ac69ee4 | ||
| 
						 | 
					d13ea8e184 | ||
| 
						 | 
					1820b04bb2 | ||
| 
						 | 
					439b7ef463 | ||
| 
						 | 
					a25fb95bd6 | ||
| 
						 | 
					6168067160 | ||
| 
						 | 
					c3031a4610 | ||
| 
						 | 
					1099a94063 | ||
| 
						 | 
					812d8a176c | ||
| 
						 | 
					db533c96e3 | ||
| 
						 | 
					8831eb7624 | ||
| 
						 | 
					3c8f315021 | ||
| 
						 | 
					0f2e636602 | ||
| 
						 | 
					98bd148b1a | ||
| 
						 | 
					292248b8c2 | ||
| 
						 | 
					d3eef3e5af | ||
| 
						 | 
					c5fbf8c1ba | ||
| 
						 | 
					1ed2d8f512 | ||
| 
						 | 
					d140890259 | ||
| 
						 | 
					eb492df2bb | ||
| 
						 | 
					2c16e78400 | ||
| 
						 | 
					bf2b87aea3 | ||
| 
						 | 
					1dff425999 | ||
| 
						 | 
					501af5ba89 | ||
| 
						 | 
					31d6e7b7ba | ||
| 
						 | 
					b983322bfb | ||
| 
						 | 
					339654e163 | ||
| 
						 | 
					5ca48cc853 | ||
| 
						 | 
					79996e3335 | ||
| 
						 | 
					173acc185c | ||
| 
						 | 
					a985ecdd17 | ||
| 
						 | 
					fb4c24b6e7 | ||
| 
						 | 
					1366f6b9bd | ||
| 
						 | 
					e13546f739 | ||
| 
						 | 
					d6c813daff | ||
| 
						 | 
					e3818a4c4b | ||
| 
						 | 
					415fe2abe9 | ||
| 
						 | 
					5bbdaaf4b7 | ||
| 
						 | 
					bf1f1a5759 | ||
| 
						 | 
					8e42429c9d | ||
| 
						 | 
					c43c2285f6 | ||
| 
						 | 
					94b2c29f9d | ||
| 
						 | 
					090f931a35 | ||
| 
						 | 
					6b8be6da76 | ||
| 
						 | 
					7ec2d392e7 | ||
| 
						 | 
					e88f66bb49 | ||
| 
						 | 
					28a2759ab8 | ||
| 
						 | 
					3edad44d6e | ||
| 
						 | 
					9e7459fc5d | ||
| 
						 | 
					b98f5ef42b | ||
| 
						 | 
					a6d4f79f24 | ||
| 
						 | 
					efcb7a75fc | ||
| 
						 | 
					30aa23fea2 | ||
| 
						 | 
					c9e045041e | ||
| 
						 | 
					fd6fa9c0b2 | ||
| 
						 | 
					9f70d09275 | ||
| 
						 | 
					3fb0f01001 | ||
| 
						 | 
					216ac24bd3 | ||
| 
						 | 
					2035af2091 | ||
| 
						 | 
					19398a175a | ||
| 
						 | 
					fa369ddbe7 | ||
| 
						 | 
					294ba3c282 | ||
| 
						 | 
					2923e91a98 | ||
| 
						 | 
					7c52b7706f | ||
| 
						 | 
					ddec587581 | ||
| 
						 | 
					4f466f8e81 | ||
| 
						 | 
					1502cda142 | ||
| 
						 | 
					ce2b5d7574 | ||
| 
						 | 
					f1c65db80b | ||
| 
						 | 
					496970b233 | ||
| 
						 | 
					3b0e61a812 | ||
| 
						 | 
					e84b0d709b | ||
| 
						 | 
					16241f0ea4 | ||
| 
						 | 
					518af4e3ae | ||
| 
						 | 
					fe01f90a1c | ||
| 
						 | 
					99a376df16 | ||
| 
						 | 
					831ffcb705 | ||
| 
						 | 
					5f297c4504 | ||
| 
						 | 
					d7623ff9f3 | ||
| 
						 | 
					df9b5405e8 | ||
| 
						 | 
					180eb5b3c2 | ||
| 
						 | 
					af7d49aaff | ||
| 
						 | 
					187b655bc2 | ||
| 
						 | 
					8612cb9239 | ||
| 
						 | 
					b2f3fafa6a | ||
| 
						 | 
					483dab147d | ||
| 
						 | 
					f39b8e697c | ||
| 
						 | 
					7d610299c9 | ||
| 
						 | 
					25550b2dd4 | ||
| 
						 | 
					5c676c47cd | ||
| 
						 | 
					e77f9d5e78 | ||
| 
						 | 
					9c04747623 | ||
| 
						 | 
					e66deb6817 | ||
| 
						 | 
					cc9a645a02 | ||
| 
						 | 
					18fb9d807e | ||
| 
						 | 
					a1cc568288 | ||
| 
						 | 
					2ea3cd8abc | ||
| 
						 | 
					095db72024 | ||
| 
						 | 
					11eb172b6e | ||
| 
						 | 
					4b60f4b175 | ||
| 
						 | 
					0794f3a798 | ||
| 
						 | 
					2b8e7b5061 | ||
| 
						 | 
					6f57311da0 | ||
| 
						 | 
					98b09d3949 | ||
| 
						 | 
					231a737a82 | ||
| 
						 | 
					236860735e | ||
| 
						 | 
					ac1ef7ec72 | ||
| 
						 | 
					5f761514e1 | ||
| 
						 | 
					32f1f622f6 | ||
| 
						 | 
					5f95651316 | ||
| 
						 | 
					ccac657556 | ||
| 
						 | 
					a9c23ea079 | ||
| 
						 | 
					33ffe2a7f7 | ||
| 
						 | 
					7c717aafc6 | ||
| 
						 | 
					225aeb171e | ||
| 
						 | 
					ffe181c366 | ||
| 
						 | 
					fd4e79a9ed | ||
| 
						 | 
					299e174d2d | ||
| 
						 | 
					ce62fc6eae | ||
| 
						 | 
					43490dfb89 | ||
| 
						 | 
					a523276786 | ||
| 
						 | 
					074471ab0c | ||
| 
						 | 
					d761421e1d | ||
| 
						 | 
					2339c5d722 | ||
| 
						 | 
					dd00266757 | ||
| 
						 | 
					bb99ce5f80 | ||
| 
						 | 
					49f42ec0f6 | ||
| 
						 | 
					91d509f0d9 | ||
| 
						 | 
					d5e858c55f | ||
| 
						 | 
					fb8fcce2ac | ||
| 
						 | 
					d4736ae701 | ||
| 
						 | 
					3e1158522a | ||
| 
						 | 
					57191f86d9 | ||
| 
						 | 
					0a89c575de | ||
| 
						 | 
					4c860910df | ||
| 
						 | 
					0fc3d51b7d | ||
| 
						 | 
					c4b0d7879e | ||
| 
						 | 
					aab1ec3f36 | ||
| 
						 | 
					fbfa11fb29 | ||
| 
						 | 
					284498fcef | ||
| 
						 | 
					07d9808496 | ||
| 
						 | 
					4ab0088bfe | ||
| 
						 | 
					3bd1690bfb | ||
| 
						 | 
					29f4b05954 | ||
| 
						 | 
					48ca0c99b2 | ||
| 
						 | 
					015052cf7b | ||
| 
						 | 
					9ce3ee47ba | ||
| 
						 | 
					2e3fd54337 | ||
| 
						 | 
					625782f7ee | ||
| 
						 | 
					1c90899eef | ||
| 
						 | 
					4f2b7d48b1 | ||
| 
						 | 
					458c3900e1 | ||
| 
						 | 
					ba75b4e750 | ||
| 
						 | 
					ab011d51be | ||
| 
						 | 
					898d9b1a87 | ||
| 
						 | 
					4f9a9d2b79 | ||
| 
						 | 
					346f2f93e1 | ||
| 
						 | 
					25b0e072dd | ||
| 
						 | 
					dc13c882fb | ||
| 
						 | 
					12a52467c8 | ||
| 
						 | 
					22e6c73dcc | ||
| 
						 | 
					53b9696f3f | ||
| 
						 | 
					7e4fe4662b | ||
| 
						 | 
					18fd413f37 | ||
| 
						 | 
					80ed5f84de | ||
| 
						 | 
					b48111df7c | ||
| 
						 | 
					73e3edd70d | ||
| 
						 | 
					d4cfbdf2c0 | ||
| 
						 | 
					294f03a812 | ||
| 
						 | 
					272f9f3d27 | ||
| 
						 | 
					927a28ba3b | ||
| 
						 | 
					a938c4284e | ||
| 
						 | 
					7a44a0cee7 | ||
| 
						 | 
					82430309ac | ||
| 
						 | 
					c2079de880 | ||
| 
						 | 
					967ead7269 | ||
| 
						 | 
					c9255df519 | ||
| 
						 | 
					27c824a1c9 | ||
| 
						 | 
					5b96d1ccf9 | ||
| 
						 | 
					29c0866b38 | ||
| 
						 | 
					0214ea0dfe | ||
| 
						 | 
					80355002a1 | ||
| 
						 | 
					0e36825228 | ||
| 
						 | 
					95a8f1469f | ||
| 
						 | 
					afdbadc704 | ||
| 
						 | 
					004cc26abf | ||
| 
						 | 
					35a924c576 | ||
| 
						 | 
					99279ac97a | ||
| 
						 | 
					87605ca1e2 | ||
| 
						 | 
					7cc586f117 | ||
| 
						 | 
					c263a6092c | ||
| 
						 | 
					f92fd85400 | ||
| 
						 | 
					e71520ddd6 | ||
| 
						 | 
					275f34b5d2 | ||
| 
						 | 
					50fbb6ed36 | ||
| 
						 | 
					34fdacbd35 | ||
| 
						 | 
					77f2d20dbc | ||
| 
						 | 
					0dbfbf26cb | ||
| 
						 | 
					2863a6878f | ||
| 
						 | 
					ae46e91e4d | ||
| 
						 | 
					865a90eb4f | ||
| 
						 | 
					0269c4507c | ||
| 
						 | 
					a5d3574984 | ||
| 
						 | 
					1040deb0c5 | ||
| 
						 | 
					05ea800faf | ||
| 
						 | 
					341f87862c | ||
| 
						 | 
					f805d30769 | ||
| 
						 | 
					4fb9472cc2 | ||
| 
						 | 
					a8098740c6 | ||
| 
						 | 
					e3af0d041e | ||
| 
						 | 
					28cfda9f30 | ||
| 
						 | 
					a313e23fff | ||
| 
						 | 
					4d2a292e8a | ||
| 
						 | 
					5a84b7fc2d | ||
| 
						 | 
					d8e660a6dc | ||
| 
						 | 
					761f3b403b | ||
| 
						 | 
					4570d29404 | ||
| 
						 | 
					14346b3456 | ||
| 
						 | 
					769f58aaaa | ||
| 
						 | 
					a166e96d16 | ||
| 
						 | 
					8dd8ce1dc3 | ||
| 
						 | 
					4c5979a107 | ||
| 
						 | 
					649ab2dcfa | ||
| 
						 | 
					71fc9b37ae | ||
| 
						 | 
					283aedf498 | ||
| 
						 | 
					1a56614af2 | ||
| 
						 | 
					693c33e407 | ||
| 
						 | 
					d9a9aa027d | ||
| 
						 | 
					b22250bb67 | ||
| 
						 | 
					d446120527 | ||
| 
						 | 
					bb9d68489c | ||
| 
						 | 
					affaea59fe | ||
| 
						 | 
					81fc4c93ef | ||
| 
						 | 
					8957121c14 | ||
| 
						 | 
					50241bc84e | ||
| 
						 | 
					e7f077f1ba | ||
| 
						 | 
					c3b82c7610 | ||
| 
						 | 
					2c12e7f6f5 | ||
| 
						 | 
					8db10d9ac4 | ||
| 
						 | 
					c3cc4662af | ||
| 
						 | 
					22892f9803 | ||
| 
						 | 
					27eb115fb6 | ||
| 
						 | 
					51a596ef4f | ||
| 
						 | 
					97de8bd1e0 | ||
| 
						 | 
					1cb7e5be5b | ||
| 
						 | 
					84dd04e761 | ||
| 
						 | 
					2ac061e487 | ||
| 
						 | 
					7cdb81582c | ||
| 
						 | 
					8f33b40302 | ||
| 
						 | 
					e600614ef5 | ||
| 
						 | 
					02581dea1f | ||
| 
						 | 
					40ad08bcc2 | ||
| 
						 | 
					9c4456a13f | ||
| 
						 | 
					f4d0392faa | ||
| 
						 | 
					45ba6cfe03 | ||
| 
						 | 
					4f23a0c797 | ||
| 
						 | 
					f6c32bbf2b | ||
| 
						 | 
					d040c951f0 | ||
| 
						 | 
					69abfb0e33 | ||
| 
						 | 
					9a1daf8482 | ||
| 
						 | 
					9de6dc3af3 | ||
| 
						 | 
					248834dcaa | ||
| 
						 | 
					11a7da7c9f | ||
| 
						 | 
					9fea0b9937 | ||
| 
						 | 
					6fd3f3260d | ||
| 
						 | 
					d9e262443c | ||
| 
						 | 
					51c3bb3b98 | ||
| 
						 | 
					7d608f9e32 | ||
| 
						 | 
					295de18c8a | ||
| 
						 | 
					3370b694b9 | ||
| 
						 | 
					3380c52f15 | ||
| 
						 | 
					1364e6f1ac | ||
| 
						 | 
					c5ac2aa62c | ||
| 
						 | 
					392a0345de | ||
| 
						 | 
					5c2fc73e7b | ||
| 
						 | 
					402b951804 | ||
| 
						 | 
					5848d13fed | ||
| 
						 | 
					5dd24ead57 | ||
| 
						 | 
					d2cb94952a | ||
| 
						 | 
					0615396d2d | ||
| 
						 | 
					82877ea449 | ||
| 
						 | 
					81fae49db9 | ||
| 
						 | 
					74ff8dc975 | ||
| 
						 | 
					ac319217d0 | ||
| 
						 | 
					cdb13ae8d0 | ||
| 
						 | 
					ab700807d9 | ||
| 
						 | 
					744b91bb9f | ||
| 
						 | 
					d69f85bf15 | ||
| 
						 | 
					52ee969e29 | ||
| 
						 | 
					55f0501201 | ||
| 
						 | 
					b2710ee19a | ||
| 
						 | 
					bbfcc4724d | ||
| 
						 | 
					c31cc72d79 | ||
| 
						 | 
					d1049ad93e | ||
| 
						 | 
					5f4cc234fb | ||
| 
						 | 
					d31a13953c | ||
| 
						 | 
					28f5873179 | ||
| 
						 | 
					8f813338f1 | ||
| 
						 | 
					6555dfa486 | ||
| 
						 | 
					5eee0253e5 | ||
| 
						 | 
					594c723f98 | ||
| 
						 | 
					f418265865 | ||
| 
						 | 
					53707e2eec | ||
| 
						 | 
					fde794e898 | ||
| 
						 | 
					082f19b42d | ||
| 
						 | 
					e31c620686 | ||
| 
						 | 
					570253315f | ||
| 
						 | 
					5dcdac6e4e | ||
| 
						 | 
					eea3fce854 | ||
| 
						 | 
					215c49d032 | ||
| 
						 | 
					923df53e25 | ||
| 
						 | 
					1a684d0020 | ||
| 
						 | 
					dc3b721fa0 | ||
| 
						 | 
					4479ce9c1c | ||
| 
						 | 
					4a0d3530e0 | ||
| 
						 | 
					9907d2992d | ||
| 
						 | 
					9d9224f184 | ||
| 
						 | 
					78d4d87e39 | ||
| 
						 | 
					6211633273 | ||
| 
						 | 
					3a4cf918bf | ||
| 
						 | 
					e25eb309ec | ||
| 
						 | 
					ffa2b2aa7d | ||
| 
						 | 
					a77a95584d | ||
| 
						 | 
					68bb98159f | ||
| 
						 | 
					8e6905d238 | ||
| 
						 | 
					1a8521ff24 | ||
| 
						 | 
					9d5460d72d | ||
| 
						 | 
					35e59297fc | ||
| 
						 | 
					9b945233b1 | ||
| 
						 | 
					b065dc2eee | ||
| 
						 | 
					66c4bb1a70 | ||
| 
						 | 
					36abe6fe61 | ||
| 
						 | 
					3c786aa6c8 | ||
| 
						 | 
					e5cce6d356 | ||
| 
						 | 
					723b7d81e4 | ||
| 
						 | 
					a3ddd7358b | ||
| 
						 | 
					45c027f31f | ||
| 
						 | 
					3b62e9eb0d | ||
| 
						 | 
					34a8c7ec87 | ||
| 
						 | 
					d4a6240005 | ||
| 
						 | 
					5c6f76da0a | ||
| 
						 | 
					4636341b05 | ||
| 
						 | 
					be3b770d8f | ||
| 
						 | 
					af32387b3f | ||
| 
						 | 
					115fc340cb | ||
| 
						 | 
					900f7a8776 | ||
| 
						 | 
					4877e30504 | ||
| 
						 | 
					4656ec3852 | ||
| 
						 | 
					e336441197 | ||
| 
						 | 
					20d6182f33 | ||
| 
						 | 
					aa145866f9 | ||
| 
						 | 
					fdff41e166 | ||
| 
						 | 
					07b4bc3979 | ||
| 
						 | 
					0c66d3ae37 | ||
| 
						 | 
					bd869183d5 | ||
| 
						 | 
					7e2bf83100 | ||
| 
						 | 
					25e52a78fb | ||
| 
						 | 
					47c4bb2ddf | ||
| 
						 | 
					951dfbb13a | ||
| 
						 | 
					81780a3b62 | ||
| 
						 | 
					c574d0cdf2 | ||
| 
						 | 
					c987c3f999 | ||
| 
						 | 
					1a5e414863 | ||
| 
						 | 
					ec3639385e | ||
| 
						 | 
					f01cfca6a4 | ||
| 
						 | 
					7d5af5e0fa | ||
| 
						 | 
					8fdb296cbd | ||
| 
						 | 
					879b30aaa3 | ||
| 
						 | 
					40ddcb717a | ||
| 
						 | 
					da1841a075 | ||
| 
						 | 
					0a0a10d127 | ||
| 
						 | 
					df20b6e79b | ||
| 
						 | 
					f4f1dc39e0 | ||
| 
						 | 
					340b4dd7df | ||
| 
						 | 
					4b9dcd821f | ||
| 
						 | 
					669c5c9380 | ||
| 
						 | 
					7f9aa6c59b | ||
| 
						 | 
					d9c06b56ca | ||
| 
						 | 
					d045e1d77e | ||
| 
						 | 
					6d14cc7ec1 | ||
| 
						 | 
					eb499b2854 | ||
| 
						 | 
					65a82ef6d7 | ||
| 
						 | 
					616f581650 | ||
| 
						 | 
					57e802656f | ||
| 
						 | 
					5d7f15daf8 | ||
| 
						 | 
					ec67e3b7e4 | ||
| 
						 | 
					0d3ff3c073 | ||
| 
						 | 
					325e48867c | ||
| 
						 | 
					8de95bc05b | ||
| 
						 | 
					5e3003bb52 | ||
| 
						 | 
					e6e3f38bfa | ||
| 
						 | 
					aa17ab7e57 | ||
| 
						 | 
					35908bd040 | ||
| 
						 | 
					4a9cfd763e | ||
| 
						 | 
					0e73294e26 | ||
| 
						 | 
					b610f46bae | ||
| 
						 | 
					1921a1adb2 | ||
| 
						 | 
					6d2cd23f40 | ||
| 
						 | 
					14fb67f28a | ||
| 
						 | 
					c552680473 | ||
| 
						 | 
					edbf9f878d | ||
| 
						 | 
					2745ddfc33 | ||
| 
						 | 
					808606034a | ||
| 
						 | 
					e18eef3d7a | ||
| 
						 | 
					e78fc11a95 | ||
| 
						 | 
					83231cb376 | ||
| 
						 | 
					986ad56124 | ||
| 
						 | 
					b723a7b11b | ||
| 
						 | 
					1b6b67b17e | ||
| 
						 | 
					1ee3236f72 | ||
| 
						 | 
					b03a4917be | ||
| 
						 | 
					84971b39f5 | ||
| 
						 | 
					5ab3e743f3 | ||
| 
						 | 
					1c5dc844e7 | ||
| 
						 | 
					f871949efd | ||
| 
						 | 
					eb2ec6bee9 | ||
| 
						 | 
					df22f59f6e | ||
| 
						 | 
					db0edc3273 | ||
| 
						 | 
					6300c14248 | ||
| 
						 | 
					d4426e79a7 | ||
| 
						 | 
					b095418d20 | ||
| 
						 | 
					d6fd880481 | ||
| 
						 | 
					cbb0b734c7 | ||
| 
						 | 
					f4bcd70f27 | ||
| 
						 | 
					6e16b45d9d | ||
| 
						 | 
					e09e7ab362 | ||
| 
						 | 
					d5cc2f19cd | ||
| 
						 | 
					b7a80146f4 | ||
| 
						 | 
					5586a71a6e | ||
| 
						 | 
					81418b7c77 | ||
| 
						 | 
					8bd0c77ae3 | ||
| 
						 | 
					e2217e7ed5 | ||
| 
						 | 
					51b75ea7ef | ||
| 
						 | 
					41d4d6721c | ||
| 
						 | 
					9d01d50459 | ||
| 
						 | 
					e27c67c5c5 | ||
| 
						 | 
					e7decd5f4d | ||
| 
						 | 
					38a3178185 | ||
| 
						 | 
					58828ae573 | ||
| 
						 | 
					6b5f5e3508 | ||
| 
						 | 
					f0ec771933 | ||
| 
						 | 
					22d1087e16 | ||
| 
						 | 
					9f85fcefdc | ||
| 
						 | 
					269d2575cd | ||
| 
						 | 
					0b8ed5de2d | ||
| 
						 | 
					c22684eac9 | ||
| 
						 | 
					c42cd4b831 | ||
| 
						 | 
					4d018f7067 | ||
| 
						 | 
					46eaf3b0cc | ||
| 
						 | 
					9df2a00b94 | ||
| 
						 | 
					fbcf4bc1f2 | ||
| 
						 | 
					ca08c064bb | ||
| 
						 | 
					02df47d349 | ||
| 
						 | 
					41c39e3366 | ||
| 
						 | 
					45803988ce | ||
| 
						 | 
					28251e7ff9 | ||
| 
						 | 
					217382d584 | ||
| 
						 | 
					82a2cb6f51 | ||
| 
						 | 
					611ed5f312 | ||
| 
						 | 
					27fbb5dbf4 | ||
| 
						 | 
					db8d9b7cf1 | ||
| 
						 | 
					60ec950517 | ||
| 
						 | 
					2cd4ebc01f | ||
| 
						 | 
					5f4dcaf781 | ||
| 
						 | 
					c55d882fab | ||
| 
						 | 
					8dc7450068 | ||
| 
						 | 
					2e885232c2 | ||
| 
						 | 
					970d9b3795 | ||
| 
						 | 
					2f58af0d85 | ||
| 
						 | 
					0ae50f19da | ||
| 
						 | 
					c4ac37361e | ||
| 
						 | 
					3152861e81 | ||
| 
						 | 
					a14afd0804 | ||
| 
						 | 
					25d5d1a60d | ||
| 
						 | 
					6ff58b9240 | ||
| 
						 | 
					99237262d4 | ||
| 
						 | 
					29982dfd15 | ||
| 
						 | 
					6c4da94687 | ||
| 
						 | 
					6986d0e6eb | ||
| 
						 | 
					bc9320452c | ||
| 
						 | 
					23d43aae27 | ||
| 
						 | 
					de71735e7c | ||
| 
						 | 
					05decf3638 | ||
| 
						 | 
					95bffa1a1f | ||
| 
						 | 
					974d52fdb8 | ||
| 
						 | 
					7614f0e55e | ||
| 
						 | 
					0632284f79 | ||
| 
						 | 
					ad4a89f070 | ||
| 
						 | 
					6104c49f31 | ||
| 
						 | 
					07fc760999 | ||
| 
						 | 
					cf6bc84148 | ||
| 
						 | 
					36d51bea93 | ||
| 
						 | 
					fc12885b1b | ||
| 
						 | 
					ec7033745e | ||
| 
						 | 
					9e31e63147 | ||
| 
						 | 
					feef17fd88 | ||
| 
						 | 
					817f011191 | ||
| 
						 | 
					98c045cf3a | ||
| 
						 | 
					8860f3a82a | ||
| 
						 | 
					43e9f4ca2f | ||
| 
						 | 
					586f843c76 | ||
| 
						 | 
					7cfc9e6d8c | ||
| 
						 | 
					4952ed0fa4 | ||
| 
						 | 
					a084185d76 | ||
| 
						 | 
					914b80d276 | ||
| 
						 | 
					282557da52 | ||
| 
						 | 
					5f649d583c | ||
| 
						 | 
					b98225ebf5 | ||
| 
						 | 
					abb0c2bba4 | ||
| 
						 | 
					b3bdb474a9 | ||
| 
						 | 
					d796e6acb7 | ||
| 
						 | 
					d3afc92bc9 | ||
| 
						 | 
					35a97b4b7b | ||
| 
						 | 
					f59463aad3 | ||
| 
						 | 
					ed656499c4 | ||
| 
						 | 
					63533e9a22 | ||
| 
						 | 
					20f7053254 | ||
| 
						 | 
					8b8ef74d39 | ||
| 
						 | 
					3bfe024d8d | ||
| 
						 | 
					063333e03d | ||
| 
						 | 
					0a0918ff38 | ||
| 
						 | 
					802c014656 | ||
| 
						 | 
					860841794d | ||
| 
						 | 
					2a87c31237 | ||
| 
						 | 
					da5f7fdcee | ||
| 
						 | 
					d8b408b1de | ||
| 
						 | 
					64932f9e4a | ||
| 
						 | 
					5a20efcf17 | ||
| 
						 | 
					2a2857bbc8 | ||
| 
						 | 
					1bef284ab1 | ||
| 
						 | 
					d8d0b6434f | ||
| 
						 | 
					416b6fd115 | ||
| 
						 | 
					f685cf920b | ||
| 
						 | 
					54f51116b2 | ||
| 
						 | 
					b0d90958fc | ||
| 
						 | 
					049ced2c2f | ||
| 
						 | 
					844b0e603b | ||
| 
						 | 
					75ef751e23 | ||
| 
						 | 
					c4f6e56fca | ||
| 
						 | 
					ff86d3d894 | ||
| 
						 | 
					85b4c03e33 | ||
| 
						 | 
					efaf159af6 | ||
| 
						 | 
					daa657fb78 | ||
| 
						 | 
					4685663d73 | ||
| 
						 | 
					ed1f716022 | ||
| 
						 | 
					d3205a4898 | ||
| 
						 | 
					86731ce2c6 | ||
| 
						 | 
					1399309624 | ||
| 
						 | 
					cb59297438 | ||
| 
						 | 
					5824f6bc06 | ||
| 
						 | 
					5ce7090d54 | ||
| 
						 | 
					7306ab29bc | ||
| 
						 | 
					3a8b42f291 | ||
| 
						 | 
					e4c25383f2 | ||
| 
						 | 
					e734dcc2c7 | ||
| 
						 | 
					0fce007b8e | ||
| 
						 | 
					5a053a3a07 | ||
| 
						 | 
					3b2ba5f7fb | ||
| 
						 | 
					7f622f6c04 | ||
| 
						 | 
					801136bcc2 | ||
| 
						 | 
					3c0e39c539 | ||
| 
						 | 
					19fddebf0e | ||
| 
						 | 
					9eaf7e14c7 | ||
| 
						 | 
					0e441bc103 | ||
| 
						 | 
					cd9911fdf8 | ||
| 
						 | 
					6086422193 | ||
| 
						 | 
					9ddb11f11c | ||
| 
						 | 
					7a20cabd03 | ||
| 
						 | 
					9dc4ca4507 | ||
| 
						 | 
					62fea98b4f | ||
| 
						 | 
					7ae4eac5b6 | ||
| 
						 | 
					fcf8ae5e2b | ||
| 
						 | 
					55b9a7938b | ||
| 
						 | 
					cf1546a60e | ||
| 
						 | 
					e7eec05af0 | ||
| 
						 | 
					98e986141b | ||
| 
						 | 
					d7e35e0371 | ||
| 
						 | 
					222f224664 | ||
| 
						 | 
					62b6cd007f | ||
| 
						 | 
					1682e8fb12 | ||
| 
						 | 
					984aefe0e8 | ||
| 
						 | 
					2d54cc69c9 | ||
| 
						 | 
					2dd8278de8 | ||
| 
						 | 
					e0d8ac972e | ||
| 
						 | 
					ec03812fb0 | ||
| 
						 | 
					93cf2b17bf | ||
| 
						 | 
					77ef1a989d | ||
| 
						 | 
					423c7ac6c6 | ||
| 
						 | 
					2c368ef148 | ||
| 
						 | 
					b3c7162fd0 | ||
| 
						 | 
					67865069eb | ||
| 
						 | 
					1896a9be60 | ||
| 
						 | 
					b5b2c037c1 | ||
| 
						 | 
					1957924d51 | ||
| 
						 | 
					104a66f256 | ||
| 
						 | 
					3de6d65ea3 | ||
| 
						 | 
					fdb0a6e004 | ||
| 
						 | 
					87b857b6bf | ||
| 
						 | 
					b18165301d | ||
| 
						 | 
					097e65944a | ||
| 
						 | 
					0cdd29ea78 | ||
| 
						 | 
					7dec24688f | ||
| 
						 | 
					e62fa54811 | ||
| 
						 | 
					1614174e79 | ||
| 
						 | 
					f95d097359 | ||
| 
						 | 
					3c6ab9aad9 | ||
| 
						 | 
					4913b88f70 | ||
| 
						 | 
					273157153c | ||
| 
						 | 
					fb5156ff38 | ||
| 
						 | 
					2a824402f3 | ||
| 
						 | 
					86a249fe4f | ||
| 
						 | 
					6cae8221c9 | ||
| 
						 | 
					750cb3d248 | ||
| 
						 | 
					f254b540b8 | ||
| 
						 | 
					11024f252e | ||
| 
						 | 
					9d5cba17ba | ||
| 
						 | 
					1d01c9d43d | ||
| 
						 | 
					e32ea81876 | ||
| 
						 | 
					ef8a18f49b | ||
| 
						 | 
					b914049c53 | ||
| 
						 | 
					dabaea8048 | ||
| 
						 | 
					09c1a425a9 | ||
| 
						 | 
					8c6fed007f | ||
| 
						 | 
					2e39604021 | ||
| 
						 | 
					fbfb947b21 | ||
| 
						 | 
					8b963f4ba4 | ||
| 
						 | 
					9152f07eaf | ||
| 
						 | 
					35f70c09f5 | ||
| 
						 | 
					cc4cba7b5d | ||
| 
						 | 
					6b695fefd0 | ||
| 
						 | 
					910d193029 | ||
| 
						 | 
					f18dd687c8 | ||
| 
						 | 
					50d5376698 | ||
| 
						 | 
					5b9b62a7db | ||
| 
						 | 
					c0e29e5b01 | ||
| 
						 | 
					2f03129d46 | ||
| 
						 | 
					b44e2d3416 | ||
| 
						 | 
					564915681c | ||
| 
						 | 
					a24b7eeb87 | ||
| 
						 | 
					0215c01861 | ||
| 
						 | 
					beae6324e5 | ||
| 
						 | 
					71a61c573e | ||
| 
						 | 
					6b3b632767 | ||
| 
						 | 
					2a2fa04b7b | ||
| 
						 | 
					79b81d194b | ||
| 
						 | 
					ef04c9aff8 | ||
| 
						 | 
					7f85197c10 | ||
| 
						 | 
					ff0bfe64af | ||
| 
						 | 
					44b3a3a5e6 | ||
| 
						 | 
					7e3033aa93 | ||
| 
						 | 
					8bdbf50772 | ||
| 
						 | 
					ec33a76641 | ||
| 
						 | 
					00ce9376c7 | ||
| 
						 | 
					46e7a9797e | ||
| 
						 | 
					7006c4ac88 | ||
| 
						 | 
					a50a2126cf | ||
| 
						 | 
					07f7b4b470 | ||
| 
						 | 
					7e726e42f4 | ||
| 
						 | 
					40ba0257de | ||
| 
						 | 
					3fbd5f9fea | ||
| 
						 | 
					57b2246d35 | ||
| 
						 | 
					2a5b22d6f9 | ||
| 
						 | 
					f247dc7522 | ||
| 
						 | 
					e6531253e2 | ||
| 
						 | 
					c938babf00 | ||
| 
						 | 
					bf3900020f | ||
| 
						 | 
					586df3bb7f | ||
| 
						 | 
					c4b13b0268 | ||
| 
						 | 
					daef72316f | ||
| 
						 | 
					1f93c96e63 | ||
| 
						 | 
					8aa9c79276 | ||
| 
						 | 
					09a7f2e734 | ||
| 
						 | 
					b2d27e376d | ||
| 
						 | 
					644c4af11e | ||
| 
						 | 
					ca3dc3a0a0 | ||
| 
						 | 
					2b975dfd5b | ||
| 
						 | 
					0932892278 | ||
| 
						 | 
					fe0b3d98c2 | ||
| 
						 | 
					8d56c8b51c | ||
| 
						 | 
					d8e6409336 | ||
| 
						 | 
					a4ae746656 | ||
| 
						 | 
					331a0a7b9b | ||
| 
						 | 
					c630a3e8d6 | ||
| 
						 | 
					7435d89edf | ||
| 
						 | 
					14557c8be4 | ||
| 
						 | 
					98b4995bad | ||
| 
						 | 
					3000bdcc3a | ||
| 
						 | 
					cbe77a6753 | ||
| 
						 | 
					c58a1f76f8 | ||
| 
						 | 
					ecf2875ebf | ||
| 
						 | 
					ce2c19e357 | ||
| 
						 | 
					1b1081a3ed | ||
| 
						 | 
					37b200389a | ||
| 
						 | 
					6b5a8f3a22 | ||
| 
						 | 
					0b18d8b0c7 | ||
| 
						 | 
					3d187ede47 | ||
| 
						 | 
					f3b9c34515 | ||
| 
						 | 
					c923394924 | ||
| 
						 | 
					d9dbd24db5 | ||
| 
						 | 
					b135819d71 | ||
| 
						 | 
					cbcbd07da2 | ||
| 
						 | 
					24f6ab73a7 | ||
| 
						 | 
					5e88347e1b | ||
| 
						 | 
					cac0d4ee6f | ||
| 
						 | 
					428759b3d4 | ||
| 
						 | 
					898d3ecce0 | ||
| 
						 | 
					004f16f6c4 | ||
| 
						 | 
					4e2a0e58f2 | ||
| 
						 | 
					39d29195a7 | ||
| 
						 | 
					727c9b8027 | ||
| 
						 | 
					bd4e9b0512 | ||
| 
						 | 
					7844ff735f | ||
| 
						 | 
					49e96badcf | ||
| 
						 | 
					eb6a81bacc | ||
| 
						 | 
					6687f12988 | ||
| 
						 | 
					fcd12fc0f1 | ||
| 
						 | 
					0fb4d54068 | ||
| 
						 | 
					830a468a23 | ||
| 
						 | 
					af3ca7b4a9 | ||
| 
						 | 
					7a6bb17255 | ||
| 
						 | 
					bc6d459a6e | ||
| 
						 | 
					ff7f34e353 | ||
| 
						 | 
					2e3d79aaec | ||
| 
						 | 
					8a41bcc934 | ||
| 
						 | 
					e2414b41ad | ||
| 
						 | 
					266958bce7 | ||
| 
						 | 
					bc5354cbf0 | ||
| 
						 | 
					cc4997843e | ||
| 
						 | 
					ab95eac286 | ||
| 
						 | 
					1cd76233d1 | ||
| 
						 | 
					3d5afc8b83 | ||
| 
						 | 
					d28b7799dd | ||
| 
						 | 
					b0fb889c29 | ||
| 
						 | 
					460e80bd1d | ||
| 
						 | 
					bc1e96e942 | ||
| 
						 | 
					7ea61df414 | ||
| 
						 | 
					431712293d | ||
| 
						 | 
					335ed97263 | ||
| 
						 | 
					e00b165e9b | ||
| 
						 | 
					5467ddf0e1 | ||
| 
						 | 
					7a37dd92ed | ||
| 
						 | 
					d0c11e9d72 | ||
| 
						 | 
					5ec52fee2c | ||
| 
						 | 
					5026bc13bb | ||
| 
						 | 
					c7d27e5247 | ||
| 
						 | 
					b7d7af7ea9 | ||
| 
						 | 
					39663d2c40 | ||
| 
						 | 
					000299a0e6 | ||
| 
						 | 
					0a47d82b9b | ||
| 
						 | 
					198bcece58 | ||
| 
						 | 
					053677d124 | ||
| 
						 | 
					804072f014 | ||
| 
						 | 
					e9429b43ce | ||
| 
						 | 
					3d37d5e24a | ||
| 
						 | 
					2728a1b4f3 | ||
| 
						 | 
					adb040d4cb | ||
| 
						 | 
					479d7934c0 | ||
| 
						 | 
					22d1acd5ac | ||
| 
						 | 
					b257c152c6 | ||
| 
						 | 
					77b97ee0d7 | ||
| 
						 | 
					e2ac4732cd | ||
| 
						 | 
					e8f665b495 | ||
| 
						 | 
					55f3ef29ea | ||
| 
						 | 
					c2d78c9623 | ||
| 
						 | 
					a4578a5413 | ||
| 
						 | 
					e884fcf785 | ||
| 
						 | 
					e96025755d | ||
| 
						 | 
					c9028b0ab5 | ||
| 
						 | 
					b4d2858f95 | ||
| 
						 | 
					dea446d995 | ||
| 
						 | 
					5cd94f9e9d | ||
| 
						 | 
					cad811fc41 | ||
| 
						 | 
					69f6a9f007 | ||
| 
						 | 
					4eeee0c59f | ||
| 
						 | 
					a5afa6c95f | ||
| 
						 | 
					625dacb93d | ||
| 
						 | 
					62e9c2e091 | ||
| 
						 | 
					e4106a4e24 | ||
| 
						 | 
					a506b8c7dd | ||
| 
						 | 
					e5cd536894 | ||
| 
						 | 
					629ea39a88 | ||
| 
						 | 
					7d9e1321c7 | ||
| 
						 | 
					83af7422a0 | ||
| 
						 | 
					ce8945f35c | ||
| 
						 | 
					dd890f0776 | ||
| 
						 | 
					af4ac437ab | ||
| 
						 | 
					607585fdaf | ||
| 
						 | 
					2f596aeef5 | ||
| 
						 | 
					69762c75fa | ||
| 
						 | 
					36b29660ce | ||
| 
						 | 
					4976983f30 | ||
| 
						 | 
					31e4ad25ba | ||
| 
						 | 
					225f4daf15 | ||
| 
						 | 
					b9927cfa2d | ||
| 
						 | 
					af6cafc603 | ||
| 
						 | 
					15da07d436 | ||
| 
						 | 
					886ed3544b | ||
| 
						 | 
					aff2922f9a | ||
| 
						 | 
					f32e0035a3 | ||
| 
						 | 
					7b1e7706d8 | ||
| 
						 | 
					cd74dda72a | ||
| 
						 | 
					032bb2a2c5 | ||
| 
						 | 
					fa96ed06d2 | ||
| 
						 | 
					43133041c9 | ||
| 
						 | 
					e0ee5ea962 | ||
| 
						 | 
					f5634286a3 | ||
| 
						 | 
					97d37c1c1e | ||
| 
						 | 
					739b139cb2 | ||
| 
						 | 
					0bc9920ad4 | ||
| 
						 | 
					3f516ce837 | ||
| 
						 | 
					9f197f9da5 | ||
| 
						 | 
					3dc2cc36e9 | ||
| 
						 | 
					ca3e683747 | ||
| 
						 | 
					38a1757168 | ||
| 
						 | 
					4104a57107 | ||
| 
						 | 
					b0c0f20071 | ||
| 
						 | 
					7870774162 | ||
| 
						 | 
					4213cdaf5d | ||
| 
						 | 
					39b4c974ee | ||
| 
						 | 
					508f56f17c | ||
| 
						 | 
					48665b7c99 | ||
| 
						 | 
					51971f7293 | ||
| 
						 | 
					3d3addb252 | ||
| 
						 | 
					3f8bdd1fdb | ||
| 
						 | 
					6181fd949f | ||
| 
						 | 
					afd61c63c2 | ||
| 
						 | 
					9a2073b4cd | ||
| 
						 | 
					f28468188b | ||
| 
						 | 
					8871d87512 | ||
| 
						 | 
					a2b81188be | ||
| 
						 | 
					f91f6cd5e4 | ||
| 
						 | 
					bd923a7bac | ||
| 
						 | 
					373c88faef | ||
| 
						 | 
					14813d8123 | ||
| 
						 | 
					92f2437f48 | ||
| 
						 | 
					da959761ff | ||
| 
						 | 
					d8cd25aa0d | ||
| 
						 | 
					d63d4f46fc | ||
| 
						 | 
					52161e090d | ||
| 
						 | 
					9e55e06501 | ||
| 
						 | 
					0b6df67fb1 | ||
| 
						 | 
					bf087e1ea1 | ||
| 
						 | 
					885818fb7c | ||
| 
						 | 
					2f370048cb | ||
| 
						 | 
					28dc02a9d8 | ||
| 
						 | 
					54ebaca535 | ||
| 
						 | 
					4fedc91a4a | ||
| 
						 | 
					f734aaa413 | ||
| 
						 | 
					a575d4b9ee | ||
| 
						 | 
					77a87ded3a | ||
| 
						 | 
					b958d2c298 | ||
| 
						 | 
					dc72a195c2 | ||
| 
						 | 
					e2812ff61f | ||
| 
						 | 
					8c2e34e27f | ||
| 
						 | 
					31f3950fbf | ||
| 
						 | 
					75b3654d18 | ||
| 
						 | 
					418f9ac5e3 | ||
| 
						 | 
					ad4afe4edf | ||
| 
						 | 
					c844b971cb | ||
| 
						 | 
					ca9b1c47af | ||
| 
						 | 
					86039d2751 | ||
| 
						 | 
					420a692f04 | ||
| 
						 | 
					1d2a464fe0 | ||
| 
						 | 
					7735dd0750 | ||
| 
						 | 
					bf7b075f0c | 
							
								
								
									
										20
									
								
								.cvsignore
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										20
									
								
								.cvsignore
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,20 @@
 | 
			
		||||
openssl.pc
 | 
			
		||||
MINFO
 | 
			
		||||
makefile.one
 | 
			
		||||
tmp
 | 
			
		||||
out
 | 
			
		||||
outinc
 | 
			
		||||
rehash.time
 | 
			
		||||
testlog
 | 
			
		||||
make.log
 | 
			
		||||
maketest.log
 | 
			
		||||
cctest
 | 
			
		||||
cctest.c
 | 
			
		||||
cctest.a
 | 
			
		||||
*.flc
 | 
			
		||||
semantic.cache
 | 
			
		||||
Makefile
 | 
			
		||||
*.so*
 | 
			
		||||
*.dll*
 | 
			
		||||
*.sl*
 | 
			
		||||
*.dylib*
 | 
			
		||||
							
								
								
									
										12
									
								
								.gitignore
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										12
									
								
								.gitignore
									
									
									
									
										vendored
									
									
								
							@@ -7,20 +7,14 @@
 | 
			
		||||
.#*
 | 
			
		||||
#*#
 | 
			
		||||
*~
 | 
			
		||||
/.dir-locals.el
 | 
			
		||||
 | 
			
		||||
# Top level excludes
 | 
			
		||||
/Makefile.bak
 | 
			
		||||
/Makefile
 | 
			
		||||
/MINFO
 | 
			
		||||
/*.a
 | 
			
		||||
/include
 | 
			
		||||
/*.pc
 | 
			
		||||
/rehash.time
 | 
			
		||||
/inc.*
 | 
			
		||||
/makefile.*
 | 
			
		||||
/out.*
 | 
			
		||||
/tmp.*
 | 
			
		||||
 | 
			
		||||
# Most *.c files under test/ are symlinks
 | 
			
		||||
/test/*.c
 | 
			
		||||
@@ -97,16 +91,10 @@ crypto/sha/asm/sha512-sse2.asm
 | 
			
		||||
lib
 | 
			
		||||
Makefile.save
 | 
			
		||||
*.bak
 | 
			
		||||
tags
 | 
			
		||||
TAGS
 | 
			
		||||
 | 
			
		||||
# Windows
 | 
			
		||||
/tmp32
 | 
			
		||||
/tmp32.dbg
 | 
			
		||||
/tmp32dll
 | 
			
		||||
/tmp32dll.dbg
 | 
			
		||||
/out32
 | 
			
		||||
/out32.dbg
 | 
			
		||||
/out32dll
 | 
			
		||||
/out32dll.dbg
 | 
			
		||||
/inc32
 | 
			
		||||
 
 | 
			
		||||
@@ -1,10 +0,0 @@
 | 
			
		||||
#! /bin/sh
 | 
			
		||||
 | 
			
		||||
# $1 is expected to be $TRAVIS_OS_NAME
 | 
			
		||||
 | 
			
		||||
if [ "$1" == osx ]; then
 | 
			
		||||
    make -f Makefile.org \
 | 
			
		||||
	 DISTTARVARS="NAME=_srcdist TAR_COMMAND='\$\$(TAR) \$\$(TARFLAGS) -s \"|^|\$\$(NAME)/|\" -T \$\$(TARFILE).list -cvf -' TARFLAGS='-n' TARFILE=_srcdist.tar" SHELL='sh -vx' dist
 | 
			
		||||
else
 | 
			
		||||
    make -f Makefile.org DISTTARVARS='TARFILE=_srcdist.tar NAME=_srcdist' SHELL='sh -v' dist
 | 
			
		||||
fi
 | 
			
		||||
							
								
								
									
										60
									
								
								.travis.yml
									
									
									
									
									
								
							
							
						
						
									
										60
									
								
								.travis.yml
									
									
									
									
									
								
							@@ -1,60 +0,0 @@
 | 
			
		||||
language: c
 | 
			
		||||
 | 
			
		||||
addons:
 | 
			
		||||
    apt_packages:
 | 
			
		||||
        - binutils-mingw-w64
 | 
			
		||||
        - gcc-mingw-w64
 | 
			
		||||
 | 
			
		||||
os:
 | 
			
		||||
    - linux
 | 
			
		||||
    - osx
 | 
			
		||||
 | 
			
		||||
compiler:
 | 
			
		||||
    - clang
 | 
			
		||||
    - gcc
 | 
			
		||||
    - i686-w64-mingw32-gcc
 | 
			
		||||
    - x86_64-w64-mingw32-gcc
 | 
			
		||||
 | 
			
		||||
env:
 | 
			
		||||
    - CONFIG_OPTS=""
 | 
			
		||||
    - CONFIG_OPTS="shared"
 | 
			
		||||
    - CONFIG_OPTS="-d --strict-warnings"
 | 
			
		||||
 | 
			
		||||
matrix:
 | 
			
		||||
    exclude:
 | 
			
		||||
        - os: osx
 | 
			
		||||
          compiler: i686-w64-mingw32-gcc
 | 
			
		||||
        - os: osx
 | 
			
		||||
          compiler: x86_64-w64-mingw32-gcc
 | 
			
		||||
        - compiler: i686-w64-mingw32-gcc
 | 
			
		||||
          env: CONFIG_OPTS="-d --strict-warnings"
 | 
			
		||||
        - compiler: x86_64-w64-mingw32-gcc
 | 
			
		||||
          env: CONFIG_OPTS="-d --strict-warnings"
 | 
			
		||||
 | 
			
		||||
before_script:
 | 
			
		||||
    - sh .travis-create-release.sh $TRAVIS_OS_NAME
 | 
			
		||||
    - tar -xvzf _srcdist.tar.gz
 | 
			
		||||
    - cd _srcdist
 | 
			
		||||
    - if [ "$CC" == i686-w64-mingw32-gcc ]; then
 | 
			
		||||
          export CROSS_COMPILE=${CC%%gcc}; unset CC;
 | 
			
		||||
          ./Configure mingw $CONFIG_OPTS;
 | 
			
		||||
      elif [ "$CC" == x86_64-w64-mingw32-gcc ]; then
 | 
			
		||||
          export CROSS_COMPILE=${CC%%gcc}; unset CC;
 | 
			
		||||
          ./Configure mingw64 $CONFIG_OPTS;
 | 
			
		||||
      else
 | 
			
		||||
          if [ "$CC" == gcc ]; then
 | 
			
		||||
              export CONFIG_OPTS="$CONFIG_OPTS -Wno-error=shadow";
 | 
			
		||||
          fi;
 | 
			
		||||
          ./config $CONFIG_OPTS;
 | 
			
		||||
      fi
 | 
			
		||||
    - cd ..
 | 
			
		||||
 | 
			
		||||
script:
 | 
			
		||||
    - cd _srcdist
 | 
			
		||||
    - make
 | 
			
		||||
    - if [ -z "$CROSS_COMPILE" ]; then make test; fi
 | 
			
		||||
    - cd ..
 | 
			
		||||
 | 
			
		||||
notifications:
 | 
			
		||||
    email:
 | 
			
		||||
        - openssl-commits@openssl.org
 | 
			
		||||
@@ -1,2 +1,30 @@
 | 
			
		||||
Please https://www.openssl.org/community/thanks.html for the current
 | 
			
		||||
acknowledgements.
 | 
			
		||||
The OpenSSL project depends on volunteer efforts and financial support from
 | 
			
		||||
the end user community. That support comes in the form of donations and paid
 | 
			
		||||
sponsorships, software support contracts, paid consulting services
 | 
			
		||||
and commissioned software development.
 | 
			
		||||
 | 
			
		||||
Since all these activities support the continued development and improvement
 | 
			
		||||
of OpenSSL we consider all these clients and customers as sponsors of the
 | 
			
		||||
OpenSSL project.
 | 
			
		||||
 | 
			
		||||
We would like to identify and thank the following such sponsors for their past
 | 
			
		||||
or current significant support of the OpenSSL project:
 | 
			
		||||
 | 
			
		||||
Major support:
 | 
			
		||||
 | 
			
		||||
	Qualys		http://www.qualys.com/
 | 
			
		||||
 | 
			
		||||
Very significant support:
 | 
			
		||||
 | 
			
		||||
	OpenGear:	http://www.opengear.com/
 | 
			
		||||
 | 
			
		||||
Significant support:
 | 
			
		||||
 | 
			
		||||
	PSW Group:	http://www.psw.net/
 | 
			
		||||
	Acano Ltd.	http://acano.com/
 | 
			
		||||
 | 
			
		||||
Please note that we ask permission to identify sponsors and that some sponsors
 | 
			
		||||
we consider eligible for inclusion here have requested to remain anonymous.
 | 
			
		||||
 | 
			
		||||
Additional sponsorship or financial support is always welcome: for more
 | 
			
		||||
information please contact the OpenSSL Software Foundation.
 | 
			
		||||
 
 | 
			
		||||
@@ -148,7 +148,7 @@ eric (about to go bushwalking for the 4 day easter break :-)
 | 
			
		||||
      This would tend to cause memory overwrites since SSLv3 has
 | 
			
		||||
      a maximum packet size of 16k.  If your program uses
 | 
			
		||||
      buffers <= 16k, you would probably never see this problem.
 | 
			
		||||
    - Fixed a few errors that were cause by malloc() not returning
 | 
			
		||||
    - Fixed a new errors that were cause by malloc() not returning
 | 
			
		||||
      0 initialised memory..
 | 
			
		||||
    - SSL_OP_NETSCAPE_CA_DN_BUG was being switched on when using
 | 
			
		||||
      SSL_CTX_set_options(ssl_ctx,SSL_OP_ALL); which was a bad thing
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										38
									
								
								CONTRIBUTING
									
									
									
									
									
								
							
							
						
						
									
										38
									
								
								CONTRIBUTING
									
									
									
									
									
								
							@@ -1,38 +0,0 @@
 | 
			
		||||
HOW TO CONTRIBUTE TO OpenSSL
 | 
			
		||||
----------------------------
 | 
			
		||||
 | 
			
		||||
Development is coordinated on the openssl-dev mailing list (see
 | 
			
		||||
http://www.openssl.org for information on subscribing). If you
 | 
			
		||||
would like to submit a patch, send it to rt@openssl.org with
 | 
			
		||||
the string "[PATCH]" in the subject. Please be sure to include a
 | 
			
		||||
textual explanation of what your patch does.
 | 
			
		||||
 | 
			
		||||
You can also make GitHub pull requests. If you do this, please also send
 | 
			
		||||
mail to rt@openssl.org with a brief description and a link to the PR so
 | 
			
		||||
that we can more easily keep track of it.
 | 
			
		||||
 | 
			
		||||
If you are unsure as to whether a feature will be useful for the general
 | 
			
		||||
OpenSSL community please discuss it on the openssl-dev mailing list first.
 | 
			
		||||
Someone may be already working on the same thing or there may be a good
 | 
			
		||||
reason as to why that feature isn't implemented.
 | 
			
		||||
 | 
			
		||||
Patches should be as up to date as possible, preferably relative to the
 | 
			
		||||
current Git or the last snapshot. They should follow our coding style
 | 
			
		||||
(see https://www.openssl.org/policies/codingstyle.html) and compile without
 | 
			
		||||
warnings using the --strict-warnings flag.  OpenSSL compiles on many varied
 | 
			
		||||
platforms: try to ensure you only use portable features.
 | 
			
		||||
 | 
			
		||||
Our preferred format for patch files is "git format-patch" output. For example
 | 
			
		||||
to provide a patch file containing the last commit in your local git repository
 | 
			
		||||
use the following command:
 | 
			
		||||
 | 
			
		||||
# git format-patch --stdout HEAD^ >mydiffs.patch
 | 
			
		||||
 | 
			
		||||
Another method of creating an acceptable patch file without using git is as
 | 
			
		||||
follows:
 | 
			
		||||
 | 
			
		||||
# cd openssl-work
 | 
			
		||||
# [your changes]
 | 
			
		||||
# ./Configure dist; make clean
 | 
			
		||||
# cd ..
 | 
			
		||||
# diff -ur openssl-orig openssl-work > mydiffs.patch
 | 
			
		||||
@@ -1,8 +0,0 @@
 | 
			
		||||
#!/bin/sh
 | 
			
		||||
 | 
			
		||||
BRANCH=`git rev-parse --abbrev-ref HEAD`
 | 
			
		||||
 | 
			
		||||
./Configure $@ no-symlinks
 | 
			
		||||
make files
 | 
			
		||||
util/mk1mf.pl OUT=out.$BRANCH TMP=tmp.$BRANCH INC=inc.$BRANCH copy > makefile.$BRANCH
 | 
			
		||||
make -f makefile.$BRANCH init
 | 
			
		||||
							
								
								
									
										5
									
								
								GitMake
									
									
									
									
									
								
							
							
						
						
									
										5
									
								
								GitMake
									
									
									
									
									
								
							@@ -1,5 +0,0 @@
 | 
			
		||||
#!/bin/sh
 | 
			
		||||
 | 
			
		||||
BRANCH=`git rev-parse --abbrev-ref HEAD`
 | 
			
		||||
 | 
			
		||||
make -f makefile.$BRANCH $@
 | 
			
		||||
							
								
								
									
										20
									
								
								INSTALL
									
									
									
									
									
								
							
							
						
						
									
										20
									
								
								INSTALL
									
									
									
									
									
								
							@@ -98,17 +98,11 @@
 | 
			
		||||
                The crypto/<cipher> directory can be removed after running
 | 
			
		||||
                "make depend".
 | 
			
		||||
 | 
			
		||||
  -Dxxx, -lxxx, -Lxxx, -fxxx, -mXXX, -Kxxx These system specific options will
 | 
			
		||||
  -Dxxx, -lxxx, -Lxxx, -fxxx, -mxxx, -Kxxx These system specific options will
 | 
			
		||||
                be passed through to the compiler to allow you to
 | 
			
		||||
                define preprocessor symbols, specify additional libraries,
 | 
			
		||||
                library directories or other compiler options.
 | 
			
		||||
 | 
			
		||||
  -DHAVE_CRYPTODEV Enable the BSD cryptodev engine even if we are not using
 | 
			
		||||
		BSD. Useful if you are running ocf-linux or something
 | 
			
		||||
		similar. Once enabled you can also enable the use of
 | 
			
		||||
		cryptodev digests, which is usually slower unless you have
 | 
			
		||||
		large amounts data. Use -DUSE_CRYPTODEV_DIGESTS to force
 | 
			
		||||
		it.
 | 
			
		||||
 | 
			
		||||
 Installation in Detail
 | 
			
		||||
 ----------------------
 | 
			
		||||
@@ -164,10 +158,10 @@
 | 
			
		||||
     standard headers).  If it is a problem with OpenSSL itself, please
 | 
			
		||||
     report the problem to <openssl-bugs@openssl.org> (note that your
 | 
			
		||||
     message will be recorded in the request tracker publicly readable
 | 
			
		||||
     at https://www.openssl.org/community/index.html#bugs and will be
 | 
			
		||||
     forwarded to a public mailing list). Include the output of "make
 | 
			
		||||
     report" in your message.  Please check out the request tracker. Maybe
 | 
			
		||||
     the bug was already reported or has already been fixed.
 | 
			
		||||
     via http://www.openssl.org/support/rt.html and will be forwarded to a
 | 
			
		||||
     public mailing list). Include the output of "make report" in your message.
 | 
			
		||||
     Please check out the request tracker. Maybe the bug was already
 | 
			
		||||
     reported or has already been fixed.
 | 
			
		||||
 | 
			
		||||
     [If you encounter assembler error messages, try the "no-asm"
 | 
			
		||||
     configuration option as an immediate fix.]
 | 
			
		||||
@@ -212,10 +206,6 @@
 | 
			
		||||
                       compile programs with libcrypto or libssl.
 | 
			
		||||
       lib             Contains the OpenSSL library files themselves.
 | 
			
		||||
 | 
			
		||||
     Use "make install_sw" to install the software without documentation,
 | 
			
		||||
     and "install_docs_html" to install HTML renditions of the manual
 | 
			
		||||
     pages.
 | 
			
		||||
 | 
			
		||||
     Package builders who want to configure the library for standard
 | 
			
		||||
     locations, but have the package installed somewhere else so that
 | 
			
		||||
     it can easily be packaged, can use
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										52
									
								
								INSTALL.VMS
									
									
									
									
									
								
							
							
						
						
									
										52
									
								
								INSTALL.VMS
									
									
									
									
									
								
							@@ -71,7 +71,7 @@ the top to understand how to use them.  However, if you want to
 | 
			
		||||
compile all you can get, the simplest is to use MAKEVMS.COM in the top
 | 
			
		||||
directory.  The syntax is the following:
 | 
			
		||||
 | 
			
		||||
  @MAKEVMS <option> <bits> <debug-p> [<compiler>]
 | 
			
		||||
  @MAKEVMS <option> <rsaref-p> <debug-p> [<compiler>]
 | 
			
		||||
 | 
			
		||||
<option> must be one of the following:
 | 
			
		||||
 | 
			
		||||
@@ -87,11 +87,24 @@ directory.  The syntax is the following:
 | 
			
		||||
      TEST      Just build the "[.xxx.EXE.TEST]" test programs for OpenSSL.
 | 
			
		||||
      APPS      Just build the "[.xxx.EXE.APPS]" application programs for OpenSSL.
 | 
			
		||||
 | 
			
		||||
<bits> must be one of the following:
 | 
			
		||||
<rsaref-p> must be one of the following:
 | 
			
		||||
 | 
			
		||||
      ""        compile using default pointer size
 | 
			
		||||
      32        compile using 32 bit pointer size
 | 
			
		||||
      64        compile using 64 bit pointer size
 | 
			
		||||
      RSAREF    compile using the RSAREF Library
 | 
			
		||||
      NORSAREF  compile without using RSAREF
 | 
			
		||||
 | 
			
		||||
Note 0: The RSAREF library IS NO LONGER NEEDED.  The RSA patent
 | 
			
		||||
        expires September 20, 2000, and RSA Security chose to make
 | 
			
		||||
        the algorithm public domain two weeks before that.
 | 
			
		||||
 | 
			
		||||
Note 1: If you still want to use RSAREF, the library is NOT INCLUDED
 | 
			
		||||
        and you have to download it.  RSA Security doesn't carry it
 | 
			
		||||
        any more, but there are a number of places where you can find
 | 
			
		||||
        it.  You have to get the ".tar-Z" file as the ".zip" file
 | 
			
		||||
        doesn't have the directory structure stored.  You have to
 | 
			
		||||
        extract the file into the [.RSAREF] directory as that is where
 | 
			
		||||
        the scripts will look for the files.
 | 
			
		||||
 | 
			
		||||
Note 2: I have never done this, so I've no idea if it works or not.
 | 
			
		||||
 | 
			
		||||
<debug-p> must be one of the following:
 | 
			
		||||
 | 
			
		||||
@@ -104,13 +117,12 @@ directory.  The syntax is the following:
 | 
			
		||||
      GNUC      For GNU C.
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
You will find the crypto library in [.xxx.EXE.CRYPTO] (where xxx is VAX,
 | 
			
		||||
ALPHA or IA64), called SSL_LIBCRYPTO32.OLB or SSL_LIBCRYPTO.OLB depending
 | 
			
		||||
on how it was built.  You will find the SSL library in [.xxx.EXE.SSL],
 | 
			
		||||
named SSL_LIBSSL32.OLB or SSL_LIBSSL.OLB, and you will find a bunch of
 | 
			
		||||
useful programs in [.xxx.EXE.APPS].  However, these shouldn't be used
 | 
			
		||||
right off unless it's just to test them.  For production use, make sure
 | 
			
		||||
you install first, see Installation below.
 | 
			
		||||
You will find the crypto library in [.xxx.EXE.CRYPTO], called LIBCRYPTO.OLB,
 | 
			
		||||
where xxx is VAX or AXP.  You will find the SSL library in [.xxx.EXE.SSL],
 | 
			
		||||
named LIBSSL.OLB, and you will find a bunch of useful programs in
 | 
			
		||||
[.xxx.EXE.APPS].  However, these shouldn't be used right off unless it's
 | 
			
		||||
just to test them.  For production use, make sure you install first, see
 | 
			
		||||
Installation below.
 | 
			
		||||
 | 
			
		||||
Note 1: Some programs in this package require a TCP/IP library.
 | 
			
		||||
 | 
			
		||||
@@ -158,14 +170,12 @@ Installation:
 | 
			
		||||
 | 
			
		||||
Installation is easy, just do the following:
 | 
			
		||||
 | 
			
		||||
  @INSTALL <root> <bits>
 | 
			
		||||
  @INSTALL <root>
 | 
			
		||||
 | 
			
		||||
<root> is the directory in which everything will be installed,
 | 
			
		||||
subdirectories, libraries, header files, programs and startup command
 | 
			
		||||
procedures.
 | 
			
		||||
 | 
			
		||||
<bits> works the same way as for MAKEVMS.COM
 | 
			
		||||
 | 
			
		||||
N.B.: INSTALL.COM builds a new directory structure, different from
 | 
			
		||||
the directory tree where you have now build OpenSSL.
 | 
			
		||||
 | 
			
		||||
@@ -186,10 +196,6 @@ following command procedures:
 | 
			
		||||
        sets up the symbols to the applications.  Should be called
 | 
			
		||||
        from for example SYS$MANAGER:SYLOGIN.COM 
 | 
			
		||||
 | 
			
		||||
  OPENSSL_UNDO.COM
 | 
			
		||||
 | 
			
		||||
	deassigns the logical names created with OPENSSL_STARTUP.COM.
 | 
			
		||||
 | 
			
		||||
The logical names that are set up are the following:
 | 
			
		||||
 | 
			
		||||
  SSLROOT       a dotted concealed logical name pointing at the
 | 
			
		||||
@@ -197,6 +203,7 @@ The logical names that are set up are the following:
 | 
			
		||||
 | 
			
		||||
  SSLCERTS      Initially an empty directory, this is the default
 | 
			
		||||
		location for certificate files.
 | 
			
		||||
  SSLMISC	Various scripts.
 | 
			
		||||
  SSLPRIVATE	Initially an empty directory, this is the default
 | 
			
		||||
		location for private key files.
 | 
			
		||||
 | 
			
		||||
@@ -204,9 +211,8 @@ The logical names that are set up are the following:
 | 
			
		||||
		programs.
 | 
			
		||||
  SSLINCLUDE    Contains the header files needed if you want to
 | 
			
		||||
		compile programs with libcrypto or libssl.
 | 
			
		||||
  SSLLIB        Contains the OpenSSL library files themselves:
 | 
			
		||||
  		- SSL_LIBCRYPTO32.OLB and SSL_LIBSSL32.OLB or
 | 
			
		||||
		- SSL_LIBCRYPTO.OLB and SSL_LIBSSL.OLB
 | 
			
		||||
  SSLLIB        Contains the OpenSSL library files (LIBCRYPTO.OLB
 | 
			
		||||
		and LIBSSL.OLB) themselves.
 | 
			
		||||
 | 
			
		||||
  OPENSSL	Same as SSLINCLUDE.  This is because the standard
 | 
			
		||||
		way to include OpenSSL header files from version
 | 
			
		||||
@@ -290,4 +296,4 @@ have any ideas.
 | 
			
		||||
 | 
			
		||||
--
 | 
			
		||||
Richard Levitte <richard@levitte.org>
 | 
			
		||||
2000-02-27, 2011-03-18
 | 
			
		||||
2000-02-27
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										180
									
								
								INSTALL.W32
									
									
									
									
									
								
							
							
						
						
									
										180
									
								
								INSTALL.W32
									
									
									
									
									
								
							@@ -5,30 +5,19 @@
 | 
			
		||||
 [Instructions for building for Windows CE can be found in INSTALL.WCE]
 | 
			
		||||
 [Instructions for building for Win64 can be found in INSTALL.W64]
 | 
			
		||||
 | 
			
		||||
 Here are a few comments about building OpenSSL for Win32 environments,
 | 
			
		||||
 such as Windows NT and Windows 9x. It should be noted though that
 | 
			
		||||
 Windows 9x are not ordinarily tested. Its mention merely means that we
 | 
			
		||||
 attempt to maintain certain programming discipline and pay attention
 | 
			
		||||
 to backward compatibility issues, in other words it's kind of expected
 | 
			
		||||
 to work on Windows 9x, but no regression tests are actually performed.
 | 
			
		||||
 Heres a few comments about building OpenSSL in Windows environments.  Most
 | 
			
		||||
 of this is tested on Win32 but it may also work in Win 3.1 with some
 | 
			
		||||
 modification.
 | 
			
		||||
 | 
			
		||||
 On additional note newer OpenSSL versions are compiled and linked with
 | 
			
		||||
 Winsock 2. This means that minimum OS requirement was elevated to NT 4
 | 
			
		||||
 and Windows 98 [there is Winsock 2 update for Windows 95 though].
 | 
			
		||||
 You need Perl for Win32.  Unless you will build on Cygwin, you will need
 | 
			
		||||
 ActiveState Perl, available from http://www.activestate.com/ActivePerl.
 | 
			
		||||
 | 
			
		||||
 - you need Perl for Win32.  Unless you will build on Cygwin, you will need
 | 
			
		||||
   ActiveState Perl, available from http://www.activestate.com/ActivePerl.
 | 
			
		||||
 | 
			
		||||
 - one of the following C compilers:
 | 
			
		||||
 and one of the following C compilers:
 | 
			
		||||
 | 
			
		||||
  * Visual C++
 | 
			
		||||
  * Borland C
 | 
			
		||||
  * GNU C (Cygwin or MinGW)
 | 
			
		||||
 | 
			
		||||
- Netwide Assembler, a.k.a. NASM, available from http://nasm.sourceforge.net/
 | 
			
		||||
  is required if you intend to utilize assembler modules. Note that NASM
 | 
			
		||||
  is now the only supported assembler.
 | 
			
		||||
 | 
			
		||||
 If you are compiling from a tarball or a Git snapshot then the Win32 files
 | 
			
		||||
 may well be not up to date. This may mean that some "tweaking" is required to
 | 
			
		||||
 get it all to work. See the trouble shooting section later on for if (when?)
 | 
			
		||||
@@ -37,18 +26,39 @@
 | 
			
		||||
 Visual C++
 | 
			
		||||
 ----------
 | 
			
		||||
 | 
			
		||||
 If you want to compile in the assembly language routines with Visual
 | 
			
		||||
 C++, then you will need already mentioned Netwide Assembler binary,
 | 
			
		||||
 nasmw.exe or nasm.exe, to be available on your %PATH%.
 | 
			
		||||
 If you want to compile in the assembly language routines with Visual C++ then
 | 
			
		||||
 you will need an assembler. This is worth doing because it will result in
 | 
			
		||||
 faster code: for example it will typically result in a 2 times speedup in the
 | 
			
		||||
 RSA routines. Currently the following assemblers are supported:
 | 
			
		||||
 | 
			
		||||
 Firstly you should run Configure with platform VC-WIN32:
 | 
			
		||||
  * Microsoft MASM (aka "ml")
 | 
			
		||||
  * Free Netwide Assembler NASM.
 | 
			
		||||
 | 
			
		||||
 > perl Configure VC-WIN32 --prefix=c:\some\openssl\dir
 | 
			
		||||
 MASM is distributed with most versions of VC++. For the versions where it is
 | 
			
		||||
 not included in VC++, it is also distributed with some Microsoft DDKs, for
 | 
			
		||||
 example the Windows NT 4.0 DDK and the Windows 98 DDK. If you do not have
 | 
			
		||||
 either of these DDKs then you can just download the binaries for the Windows
 | 
			
		||||
 98 DDK and extract and rename the two files XXXXXml.exe and XXXXXml.err, to
 | 
			
		||||
 ml.exe and ml.err and install somewhere on your PATH. Both DDKs can be
 | 
			
		||||
 downloaded from the Microsoft developers site www.msdn.com.
 | 
			
		||||
 | 
			
		||||
 Where the prefix argument specifies where OpenSSL will be installed to.
 | 
			
		||||
 NASM is freely available. Version 0.98 was used during testing: other versions
 | 
			
		||||
 may also work. It is available from many places, see for example:
 | 
			
		||||
 http://www.kernel.org/pub/software/devel/nasm/binaries/win32/
 | 
			
		||||
 The NASM binary nasmw.exe needs to be installed anywhere on your PATH.
 | 
			
		||||
 | 
			
		||||
 Next you need to build the Makefiles and optionally the assembly
 | 
			
		||||
 language files:
 | 
			
		||||
 Firstly you should run Configure:
 | 
			
		||||
 | 
			
		||||
 > perl Configure VC-WIN32 --prefix=c:/some/openssl/dir
 | 
			
		||||
 | 
			
		||||
Where the prefix argument specifies where OpenSSL will be installed to.
 | 
			
		||||
 | 
			
		||||
 Next you need to build the Makefiles and optionally the assembly language
 | 
			
		||||
 files:
 | 
			
		||||
 | 
			
		||||
 - If you are using MASM then run:
 | 
			
		||||
 | 
			
		||||
   > ms\do_masm
 | 
			
		||||
 | 
			
		||||
 - If you are using NASM then run:
 | 
			
		||||
 | 
			
		||||
@@ -56,7 +66,6 @@
 | 
			
		||||
 | 
			
		||||
 - If you don't want to use the assembly language files at all then run:
 | 
			
		||||
 | 
			
		||||
   > perl Configure VC-WIN32 no-asm --prefix=c:/some/openssl/dir
 | 
			
		||||
   > ms\do_ms
 | 
			
		||||
 | 
			
		||||
 If you get errors about things not having numbers assigned then check the
 | 
			
		||||
@@ -67,39 +76,42 @@
 | 
			
		||||
 | 
			
		||||
 > nmake -f ms\ntdll.mak
 | 
			
		||||
 | 
			
		||||
 If all is well it should compile and you will have some DLLs and
 | 
			
		||||
 executables in out32dll. If you want to try the tests then do:
 | 
			
		||||
 If all is well it should compile and you will have some DLLs and executables
 | 
			
		||||
 in out32dll. If you want to try the tests then do:
 | 
			
		||||
 
 | 
			
		||||
 > nmake -f ms\ntdll.mak test
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
 To install OpenSSL to the specified location do:
 | 
			
		||||
To install OpenSSL to the specified location do:
 | 
			
		||||
 | 
			
		||||
 > nmake -f ms\ntdll.mak install
 | 
			
		||||
> nmake -f ms\ntdll.mak install
 | 
			
		||||
 | 
			
		||||
 Tweaks:
 | 
			
		||||
 | 
			
		||||
 There are various changes you can make to the Win32 compile
 | 
			
		||||
 environment. By default the library is not compiled with debugging
 | 
			
		||||
 symbols. If you use the platform debug-VC-WIN32 instead of VC-WIN32
 | 
			
		||||
 then debugging symbols will be compiled in.
 | 
			
		||||
 There are various changes you can make to the Win32 compile environment. By
 | 
			
		||||
 default the library is not compiled with debugging symbols. If you add 'debug'
 | 
			
		||||
 to the mk1mf.pl lines in the do_* batch file then debugging symbols will be
 | 
			
		||||
 compiled in. Note that mk1mf.pl expects the platform to be the last argument
 | 
			
		||||
 on the command line, so 'debug' must appear before that, as all other options.
 | 
			
		||||
 | 
			
		||||
 By default in 1.0.0 OpenSSL will compile builtin ENGINES into the
 | 
			
		||||
 separate shared librariesy. If you specify the "enable-static-engine"
 | 
			
		||||
 option on the command line to Configure the shared library build
 | 
			
		||||
 (ms\ntdll.mak) will compile the engines into libeay32.dll instead.
 | 
			
		||||
 | 
			
		||||
 By default in 0.9.8 OpenSSL will compile builtin ENGINES into the libeay32.dll
 | 
			
		||||
 shared library. If you specify the "no-static-engine" option on the command
 | 
			
		||||
 line to Configure the shared library build (ms\ntdll.mak) will compile the
 | 
			
		||||
 engines as separate DLLs.
 | 
			
		||||
 | 
			
		||||
 The default Win32 environment is to leave out any Windows NT specific
 | 
			
		||||
 features.
 | 
			
		||||
 | 
			
		||||
 If you want to enable the NT specific features of OpenSSL (currently
 | 
			
		||||
 only the logging BIO) follow the instructions above but call the batch
 | 
			
		||||
 file do_nt.bat instead of do_ms.bat.
 | 
			
		||||
 If you want to enable the NT specific features of OpenSSL (currently only the
 | 
			
		||||
 logging BIO) follow the instructions above but call the batch file do_nt.bat
 | 
			
		||||
 instead of do_ms.bat.
 | 
			
		||||
 | 
			
		||||
 You can also build a static version of the library using the Makefile
 | 
			
		||||
 ms\nt.mak
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
 Borland C++ builder 5
 | 
			
		||||
 ---------------------
 | 
			
		||||
 | 
			
		||||
@@ -125,13 +137,17 @@
 | 
			
		||||
 GNU C (Cygwin)
 | 
			
		||||
 --------------
 | 
			
		||||
 | 
			
		||||
 Cygwin implements a Posix/Unix runtime system (cygwin1.dll) on top of
 | 
			
		||||
 Win32 subsystem and provides a bash shell and GNU tools environment.
 | 
			
		||||
 Consequently, a make of OpenSSL with Cygwin is virtually identical to
 | 
			
		||||
 Unix procedure. It is also possible to create Win32 binaries that only
 | 
			
		||||
 use the Microsoft C runtime system (msvcrt.dll or crtdll.dll) using
 | 
			
		||||
 MinGW. MinGW can be used in the Cygwin development environment or in a
 | 
			
		||||
 standalone setup as described in the following section.
 | 
			
		||||
 Cygwin provides a bash shell and GNU tools environment running
 | 
			
		||||
 on NT 4.0, Windows 9x, Windows ME, Windows 2000, and Windows XP.
 | 
			
		||||
 Consequently, a make of OpenSSL with Cygwin is closer to a GNU
 | 
			
		||||
 bash environment such as Linux than to other the other Win32
 | 
			
		||||
 makes.
 | 
			
		||||
 | 
			
		||||
 Cygwin implements a Posix/Unix runtime system (cygwin1.dll).
 | 
			
		||||
 It is also possible to create Win32 binaries that only use the
 | 
			
		||||
 Microsoft C runtime system (msvcrt.dll or crtdll.dll) using
 | 
			
		||||
 MinGW. MinGW can be used in the Cygwin development environment
 | 
			
		||||
 or in a standalone setup as described in the following section.
 | 
			
		||||
 | 
			
		||||
 To build OpenSSL using Cygwin:
 | 
			
		||||
 | 
			
		||||
@@ -176,44 +192,35 @@
 | 
			
		||||
 non-fatal error in "make test" but is otherwise harmless.  If
 | 
			
		||||
 desired and needed, GNU bc can be built with Cygwin without change.
 | 
			
		||||
 | 
			
		||||
 GNU C (MinGW/MSYS)
 | 
			
		||||
 GNU C (MinGW)
 | 
			
		||||
 -------------
 | 
			
		||||
 | 
			
		||||
 * Compiler and shell environment installation:
 | 
			
		||||
 * Compiler installation:
 | 
			
		||||
 | 
			
		||||
   MinGW and MSYS are available from http://www.mingw.org/, both are
 | 
			
		||||
   required. Run the installers and do whatever magic they say it takes
 | 
			
		||||
   to start MSYS bash shell with GNU tools on its PATH.
 | 
			
		||||
 | 
			
		||||
   N.B. Since source tar-ball can contain symbolic links, it's essential
 | 
			
		||||
   that you use accompanying MSYS tar to unpack the source. It will
 | 
			
		||||
   either handle them in one way or another or fail to extract them,
 | 
			
		||||
   which does the trick too. Latter means that you may safely ignore all
 | 
			
		||||
   "cannot create symlink" messages, as they will be "re-created" at
 | 
			
		||||
   configure stage by copying corresponding files. Alternative programs
 | 
			
		||||
   were observed to create empty files instead, which results in build
 | 
			
		||||
   failure.
 | 
			
		||||
   MinGW is available from http://www.mingw.org. Run the installer and
 | 
			
		||||
   set the MinGW bin directory to the PATH in "System Properties" or
 | 
			
		||||
   autoexec.bat.
 | 
			
		||||
 | 
			
		||||
 * Compile OpenSSL:
 | 
			
		||||
 | 
			
		||||
   $ ./config
 | 
			
		||||
   [...]
 | 
			
		||||
   $ make
 | 
			
		||||
   [...]
 | 
			
		||||
   $ make test
 | 
			
		||||
   > ms\mingw32
 | 
			
		||||
 | 
			
		||||
   This will create the library and binaries in root source directory
 | 
			
		||||
   and openssl.exe application in apps directory.
 | 
			
		||||
 | 
			
		||||
   It is also possible to cross-compile it on Linux by configuring
 | 
			
		||||
   with './Configure --cross-compile-prefix=i386-mingw32- mingw ...'.
 | 
			
		||||
   'make test' is naturally not applicable then.
 | 
			
		||||
   This will create the library and binaries in out. In case any problems
 | 
			
		||||
   occur, try
 | 
			
		||||
   > ms\mingw32 no-asm
 | 
			
		||||
   instead.
 | 
			
		||||
 | 
			
		||||
   libcrypto.a and libssl.a are the static libraries. To use the DLLs,
 | 
			
		||||
   link with libeay32.a and libssl32.a instead.
 | 
			
		||||
 | 
			
		||||
   See troubleshooting if you get error messages about functions not
 | 
			
		||||
   having a number assigned.
 | 
			
		||||
   See troubleshooting if you get error messages about functions not having
 | 
			
		||||
   a number assigned.
 | 
			
		||||
 | 
			
		||||
 * You can now try the tests:
 | 
			
		||||
 | 
			
		||||
   > cd out
 | 
			
		||||
   > ..\ms\test
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
 Installation
 | 
			
		||||
 ------------
 | 
			
		||||
@@ -300,24 +307,13 @@
 | 
			
		||||
 | 
			
		||||
 If you link with static OpenSSL libraries [those built with ms/nt.mak],
 | 
			
		||||
 then you're expected to additionally link your application with
 | 
			
		||||
 WS2_32.LIB, ADVAPI32.LIB, GDI32.LIB and USER32.LIB. Those developing
 | 
			
		||||
 WSOCK32.LIB, ADVAPI32.LIB, GDI32.LIB and USER32.LIB. Those developing
 | 
			
		||||
 non-interactive service applications might feel concerned about linking
 | 
			
		||||
 with the latter two, as they are justly associated with interactive
 | 
			
		||||
 desktop, which is not available to service processes. The toolkit is
 | 
			
		||||
 designed to detect in which context it's currently executed, GUI,
 | 
			
		||||
 console app or service, and act accordingly, namely whether or not to
 | 
			
		||||
 actually make GUI calls. Additionally those who wish to
 | 
			
		||||
 /DELAYLOAD:GDI32.DLL and /DELAYLOAD:USER32.DLL and actually keep them
 | 
			
		||||
 off service process should consider implementing and exporting from
 | 
			
		||||
 .exe image in question own _OPENSSL_isservice not relying on USER32.DLL.
 | 
			
		||||
 E.g., on Windows Vista and later you could:
 | 
			
		||||
 | 
			
		||||
	__declspec(dllexport) __cdecl BOOL _OPENSSL_isservice(void)
 | 
			
		||||
	{   DWORD sess;
 | 
			
		||||
	    if (ProcessIdToSessionId(GetCurrentProcessId(),&sess))
 | 
			
		||||
	        return sess==0;
 | 
			
		||||
	    return FALSE;
 | 
			
		||||
	}
 | 
			
		||||
 with latter two, as they are justly associated with interactive desktop,
 | 
			
		||||
 which is not available to service processes. The toolkit is designed
 | 
			
		||||
 to detect in which context it's currently executed, GUI, console app
 | 
			
		||||
 or service, and act accordingly, namely whether or not to actually make
 | 
			
		||||
 GUI calls.
 | 
			
		||||
 | 
			
		||||
 If you link with OpenSSL .DLLs, then you're expected to include into
 | 
			
		||||
 your application code small "shim" snippet, which provides glue between
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										77
									
								
								INSTALL.WCE
									
									
									
									
									
								
							
							
						
						
									
										77
									
								
								INSTALL.WCE
									
									
									
									
									
								
							@@ -4,36 +4,27 @@
 | 
			
		||||
 | 
			
		||||
 Building OpenSSL for Windows CE requires the following external tools:
 | 
			
		||||
 | 
			
		||||
  * Microsoft eMbedded Visual C++ 3.0 or later
 | 
			
		||||
  * Appropriate SDK might be required
 | 
			
		||||
  * Perl for Win32 [commonly recommended ActiveState Perl is available
 | 
			
		||||
    from http://www.activestate.com/Products/ActivePerl/]
 | 
			
		||||
  * Microsoft eMbedded Visual C++ 3.0
 | 
			
		||||
  * wcecompat compatibility library (www.essemer.com.au)
 | 
			
		||||
  * Optionally ceutils for running automated tests (www.essemer.com.au)
 | 
			
		||||
 | 
			
		||||
  * wcecompat compatibility library available at
 | 
			
		||||
    http://www.essemer.com.au/windowsce/
 | 
			
		||||
  * Optionally ceutils for running automated tests (same location)
 | 
			
		||||
 You also need Perl for Win32.  You will need ActiveState Perl, available
 | 
			
		||||
 from http://www.activestate.com/ActivePerl.
 | 
			
		||||
 | 
			
		||||
  _or_
 | 
			
		||||
 Windows CE support in OpenSSL relies on wcecompat and therefore it's
 | 
			
		||||
 appropriate to check http://www.essemer.com.au/windowsce/ for updates in
 | 
			
		||||
 case of compilation problems. As for the moment of this writing version
 | 
			
		||||
 1.1 is available and actually required for WCE 4.2 and newer platforms.
 | 
			
		||||
 All Windows CE specific issues should be directed to www.essemer.com.au.
 | 
			
		||||
 | 
			
		||||
  * PocketConsole driver and PortSDK available at
 | 
			
		||||
    http://www.symbolictools.de/public/pocketconsole/
 | 
			
		||||
  * CMD command interpreter (same location)
 | 
			
		||||
 | 
			
		||||
 As Windows CE support in OpenSSL relies on 3rd party compatibility
 | 
			
		||||
 library, it's appropriate to check corresponding URL for updates. For
 | 
			
		||||
 example if you choose wcecompat, note that as for the moment of this
 | 
			
		||||
 writing version 1.2 is available and actually required for WCE 4.2
 | 
			
		||||
 and newer platforms. All wcecompat issues should be directed to
 | 
			
		||||
 www.essemer.com.au.
 | 
			
		||||
 | 
			
		||||
 Why compatibility library at all? The C Runtime Library implementation
 | 
			
		||||
 for Windows CE that is included with Microsoft eMbedded Visual C++ is
 | 
			
		||||
 incomplete and in some places incorrect.  Compatibility library plugs
 | 
			
		||||
 the holes and tries to bring the Windows CE CRT to [more] usable level.
 | 
			
		||||
 Most gaping hole in CRT is support for stdin/stdout/stderr IO, which
 | 
			
		||||
 proposed compatibility libraries solve in two different ways: wcecompat
 | 
			
		||||
 redirects IO to active sync link, while PortSDK - to NT-like console
 | 
			
		||||
 driver on the handheld itself.
 | 
			
		||||
 The C Runtime Library implementation for Windows CE that is included with
 | 
			
		||||
 Microsoft eMbedded Visual C++ 3.0 is incomplete and in some places
 | 
			
		||||
 incorrect.  wcecompat plugs the holes and tries to bring the Windows CE
 | 
			
		||||
 CRT to a level that is more compatible with ANSI C.  wcecompat goes further
 | 
			
		||||
 and provides low-level IO and stream IO support for stdin/stdout/stderr
 | 
			
		||||
 (which Windows CE does not provide).  This IO functionality is not needed
 | 
			
		||||
 by the OpenSSL library itself but is used for the tests and openssl.exe.
 | 
			
		||||
 More information is available at www.essemer.com.au.
 | 
			
		||||
 | 
			
		||||
 Building
 | 
			
		||||
 --------
 | 
			
		||||
@@ -43,21 +34,9 @@
 | 
			
		||||
 | 
			
		||||
 > "C:\Program Files\Microsoft eMbedded Tools\EVC\WCE300\BIN\WCEARM.BAT"
 | 
			
		||||
 | 
			
		||||
 Next pick compatibility library according to your preferences.
 | 
			
		||||
 Next indicate where wcecompat is located:
 | 
			
		||||
 | 
			
		||||
 1. To choose wcecompat set up WCECOMPAT environment variable pointing
 | 
			
		||||
    at the location of wcecompat tree "root":
 | 
			
		||||
 | 
			
		||||
    > set WCECOMPAT=C:\wcecompat
 | 
			
		||||
    > set PORTSDK_LIBPATH=
 | 
			
		||||
 | 
			
		||||
 2. To choose PortSDK set up PORTSDK_LIBPATH to point at hardware-
 | 
			
		||||
    specific location where your portlib.lib is installed:
 | 
			
		||||
 | 
			
		||||
    > set PORTSDK_LIBPATH=C:\PortSDK\lib\ARM
 | 
			
		||||
    > set WCECOMPAT=
 | 
			
		||||
 | 
			
		||||
 Note that you may not set both variables.
 | 
			
		||||
 > set WCECOMPAT=C:\wcecompat
 | 
			
		||||
 | 
			
		||||
 Next you should run Configure:
 | 
			
		||||
 | 
			
		||||
@@ -73,16 +52,16 @@
 | 
			
		||||
 | 
			
		||||
 Then from the VC++ environment at a prompt do:
 | 
			
		||||
 | 
			
		||||
 - to build static libraries:
 | 
			
		||||
 | 
			
		||||
   > nmake -f ms\ce.mak
 | 
			
		||||
 | 
			
		||||
 - or to build DLLs:
 | 
			
		||||
 | 
			
		||||
   > nmake -f ms\cedll.mak
 | 
			
		||||
 | 
			
		||||
 [note that static builds are not supported under CE]
 | 
			
		||||
 | 
			
		||||
 If all is well it should compile and you will have some DLLs and executables
 | 
			
		||||
 in out32dll*. 
 | 
			
		||||
 | 
			
		||||
 <<< everyting below needs revision in respect to wcecompat vs. PortSDK >>>
 | 
			
		||||
 | 
			
		||||
 If you want
 | 
			
		||||
 If all is well it should compile and you will have some static libraries and
 | 
			
		||||
 executables in out32, or some DLLs and executables in out32dll.  If you want
 | 
			
		||||
 to try the tests then make sure the ceutils are in the path and do:
 | 
			
		||||
 
 | 
			
		||||
 > cd out32
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										2
									
								
								LICENSE
									
									
									
									
									
								
							
							
						
						
									
										2
									
								
								LICENSE
									
									
									
									
									
								
							@@ -12,7 +12,7 @@
 | 
			
		||||
  ---------------
 | 
			
		||||
 | 
			
		||||
/* ====================================================================
 | 
			
		||||
 * Copyright (c) 1998-2016 The OpenSSL Project.  All rights reserved.
 | 
			
		||||
 * Copyright (c) 1998-2011 The OpenSSL Project.  All rights reserved.
 | 
			
		||||
 *
 | 
			
		||||
 * Redistribution and use in source and binary forms, with or without
 | 
			
		||||
 * modification, are permitted provided that the following conditions
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										404
									
								
								Makefile.org
									
									
									
									
									
								
							
							
						
						
									
										404
									
								
								Makefile.org
									
									
									
									
									
								
							@@ -65,11 +65,11 @@ EX_LIBS=
 | 
			
		||||
EXE_EXT= 
 | 
			
		||||
ARFLAGS=
 | 
			
		||||
AR=ar $(ARFLAGS) r
 | 
			
		||||
ARD=ar $(ARFLAGS) d
 | 
			
		||||
RANLIB= ranlib
 | 
			
		||||
NM= nm
 | 
			
		||||
PERL= perl
 | 
			
		||||
TAR= tar
 | 
			
		||||
TARFLAGS= --no-recursion
 | 
			
		||||
TARFLAGS= --no-recursion --record-size=10240
 | 
			
		||||
MAKEDEPPROG=makedepend
 | 
			
		||||
LIBDIR=lib
 | 
			
		||||
 | 
			
		||||
@@ -88,9 +88,8 @@ PROCESSOR=
 | 
			
		||||
# CPUID module collects small commonly used assembler snippets
 | 
			
		||||
CPUID_OBJ= 
 | 
			
		||||
BN_ASM= bn_asm.o
 | 
			
		||||
EC_ASM=
 | 
			
		||||
DES_ENC= des_enc.o fcrypt_b.o
 | 
			
		||||
AES_ENC= aes_core.o aes_cbc.o
 | 
			
		||||
AES_ASM_OBJ=aes_core.o aes_cbc.o
 | 
			
		||||
BF_ENC= bf_enc.o
 | 
			
		||||
CAST_ENC= c_enc.o
 | 
			
		||||
RC4_ENC= rc4_enc.o
 | 
			
		||||
@@ -98,11 +97,6 @@ RC5_ENC= rc5_enc.o
 | 
			
		||||
MD5_ASM_OBJ= 
 | 
			
		||||
SHA1_ASM_OBJ= 
 | 
			
		||||
RMD160_ASM_OBJ= 
 | 
			
		||||
WP_ASM_OBJ=
 | 
			
		||||
CMLL_ENC=
 | 
			
		||||
MODES_ASM_OBJ=
 | 
			
		||||
ENGINES_ASM_OBJ=
 | 
			
		||||
PERLASM_SCHEME=
 | 
			
		||||
 | 
			
		||||
# KRB5 stuff
 | 
			
		||||
KRB5_INCLUDES=
 | 
			
		||||
@@ -112,17 +106,19 @@ LIBKRB5=
 | 
			
		||||
ZLIB_INCLUDE=
 | 
			
		||||
LIBZLIB=
 | 
			
		||||
 | 
			
		||||
# TOP level FIPS install directory.
 | 
			
		||||
FIPSDIR=
 | 
			
		||||
 | 
			
		||||
# This is the location of fipscanister.o and friends.
 | 
			
		||||
# The FIPS module build will place it $(INSTALLTOP)/lib
 | 
			
		||||
# but since $(INSTALLTOP) can only take the default value
 | 
			
		||||
# when the module is built it will be in /usr/local/ssl/lib
 | 
			
		||||
# $(INSTALLTOP) for this build may be different so hard
 | 
			
		||||
# $(INSTALLTOP) for this build make be different so hard
 | 
			
		||||
# code the path.
 | 
			
		||||
 | 
			
		||||
FIPSLIBDIR=
 | 
			
		||||
FIPSLIBDIR=/usr/local/ssl/$(LIBDIR)/
 | 
			
		||||
 | 
			
		||||
# This is set to "y" if fipscanister.o is compiled internally as
 | 
			
		||||
# opposed to coming from an external validated location.
 | 
			
		||||
 | 
			
		||||
FIPSCANISTERINTERNAL=n
 | 
			
		||||
 | 
			
		||||
# The location of the library which contains fipscanister.o
 | 
			
		||||
# normally it will be libcrypto unless fipsdso is set in which
 | 
			
		||||
@@ -136,19 +132,18 @@ FIPSCANLIB=
 | 
			
		||||
 | 
			
		||||
BASEADDR=
 | 
			
		||||
 | 
			
		||||
DIRS=   crypto ssl engines apps test tools
 | 
			
		||||
ENGDIRS= ccgost
 | 
			
		||||
SHLIBDIRS= crypto ssl
 | 
			
		||||
DIRS=   crypto fips ssl engines apps test tools
 | 
			
		||||
SHLIBDIRS= crypto ssl fips
 | 
			
		||||
 | 
			
		||||
# dirs in crypto to build
 | 
			
		||||
SDIRS=  \
 | 
			
		||||
	objects \
 | 
			
		||||
	md2 md4 md5 sha mdc2 hmac ripemd whrlpool \
 | 
			
		||||
	des aes rc2 rc4 rc5 idea bf cast camellia seed modes \
 | 
			
		||||
	md2 md4 md5 sha mdc2 hmac ripemd \
 | 
			
		||||
	des aes rc2 rc4 rc5 idea bf cast camellia seed \
 | 
			
		||||
	bn ec rsa dsa ecdsa dh ecdh dso engine \
 | 
			
		||||
	buffer bio stack lhash rand err \
 | 
			
		||||
	evp asn1 pem x509 x509v3 conf txt_db pkcs7 pkcs12 comp ocsp ui krb5 \
 | 
			
		||||
	cms pqueue ts jpake srp store cmac
 | 
			
		||||
	store cms pqueue jpake
 | 
			
		||||
# keep in mind that the above list is adjusted by ./Configure
 | 
			
		||||
# according to no-xxx arguments...
 | 
			
		||||
 | 
			
		||||
@@ -162,8 +157,6 @@ MANDIR=$(OPENSSLDIR)/man
 | 
			
		||||
MAN1=1
 | 
			
		||||
MAN3=3
 | 
			
		||||
MANSUFFIX=
 | 
			
		||||
HTMLSUFFIX=html
 | 
			
		||||
HTMLDIR=$(OPENSSLDIR)/html
 | 
			
		||||
SHELL=/bin/sh
 | 
			
		||||
 | 
			
		||||
TOP=    .
 | 
			
		||||
@@ -173,6 +166,7 @@ WDIRS=  windows
 | 
			
		||||
LIBS=   libcrypto.a libssl.a
 | 
			
		||||
SHARED_CRYPTO=libcrypto$(SHLIB_EXT)
 | 
			
		||||
SHARED_SSL=libssl$(SHLIB_EXT)
 | 
			
		||||
SHARED_FIPS=
 | 
			
		||||
SHARED_LIBS=
 | 
			
		||||
SHARED_LIBS_LINK_EXTS=
 | 
			
		||||
SHARED_LDFLAGS=
 | 
			
		||||
@@ -180,11 +174,12 @@ SHARED_LDFLAGS=
 | 
			
		||||
GENERAL=        Makefile
 | 
			
		||||
BASENAME=       openssl
 | 
			
		||||
NAME=           $(BASENAME)-$(VERSION)
 | 
			
		||||
TARFILE=        ../$(NAME).tar
 | 
			
		||||
TARFILE=        $(NAME).tar
 | 
			
		||||
WTARFILE=       $(NAME)-win.tar
 | 
			
		||||
EXHEADER=       e_os2.h
 | 
			
		||||
HEADER=         e_os.h
 | 
			
		||||
 | 
			
		||||
all: Makefile build_all
 | 
			
		||||
all: Makefile build_all openssl.pc libssl.pc libcrypto.pc
 | 
			
		||||
 | 
			
		||||
# as we stick to -e, CLEARENV ensures that local variables in lower
 | 
			
		||||
# Makefiles remain local and variable. $${VAR+VAR} is tribute to Korn
 | 
			
		||||
@@ -198,46 +193,38 @@ CLEARENV=	TOP= && unset TOP $${LIB+LIB} $${LIBS+LIBS}	\
 | 
			
		||||
		$${EXHEADER+EXHEADER} $${HEADER+HEADER}		\
 | 
			
		||||
		$${GENERAL+GENERAL} $${CFLAGS+CFLAGS}		\
 | 
			
		||||
		$${ASFLAGS+ASFLAGS} $${AFLAGS+AFLAGS}		\
 | 
			
		||||
		$${LDCMD+LDCMD} $${LDFLAGS+LDFLAGS} $${SCRIPTS+SCRIPTS}	\
 | 
			
		||||
		$${LDCMD+LDCMD} $${LDFLAGS+LDFLAGS}		\
 | 
			
		||||
		$${SHAREDCMD+SHAREDCMD} $${SHAREDFLAGS+SHAREDFLAGS}	\
 | 
			
		||||
		$${SHARED_LIB+SHARED_LIB} $${LIBEXTRAS+LIBEXTRAS}
 | 
			
		||||
 | 
			
		||||
# LC_ALL=C ensures that error [and other] messages are delivered in
 | 
			
		||||
# same language for uniform treatment.
 | 
			
		||||
BUILDENV=	LC_ALL=C PLATFORM='$(PLATFORM)' PROCESSOR='$(PROCESSOR)'\
 | 
			
		||||
		CC='$(CC)' CFLAG='$(CFLAG)' 			\
 | 
			
		||||
		AS='$(CC)' ASFLAG='$(CFLAG) -c'			\
 | 
			
		||||
		AR='$(AR)' NM='$(NM)' RANLIB='$(RANLIB)'	\
 | 
			
		||||
		CROSS_COMPILE='$(CROSS_COMPILE)'	\
 | 
			
		||||
		PERL='$(PERL)' ENGDIRS='$(ENGDIRS)'		\
 | 
			
		||||
		SDIRS='$(SDIRS)' LIBRPATH='$(INSTALLTOP)/$(LIBDIR)'	\
 | 
			
		||||
		INSTALL_PREFIX='$(INSTALL_PREFIX)'		\
 | 
			
		||||
		INSTALLTOP='$(INSTALLTOP)' OPENSSLDIR='$(OPENSSLDIR)'	\
 | 
			
		||||
		LIBDIR='$(LIBDIR)'				\
 | 
			
		||||
		MAKEDEPEND='$$$${TOP}/util/domd $$$${TOP} -MD $(MAKEDEPPROG)' \
 | 
			
		||||
		DEPFLAG='-DOPENSSL_NO_DEPRECATED $(DEPFLAG)'	\
 | 
			
		||||
		MAKEDEPPROG='$(MAKEDEPPROG)'			\
 | 
			
		||||
		SHARED_LDFLAGS='$(SHARED_LDFLAGS)'		\
 | 
			
		||||
		KRB5_INCLUDES='$(KRB5_INCLUDES)' LIBKRB5='$(LIBKRB5)'	\
 | 
			
		||||
		ZLIB_INCLUDE='$(ZLIB_INCLUDE)' LIBZLIB='$(LIBZLIB)'	\
 | 
			
		||||
		EXE_EXT='$(EXE_EXT)' SHARED_LIBS='$(SHARED_LIBS)'	\
 | 
			
		||||
		SHLIB_EXT='$(SHLIB_EXT)' SHLIB_TARGET='$(SHLIB_TARGET)'	\
 | 
			
		||||
		PEX_LIBS='$(PEX_LIBS)' EX_LIBS='$(EX_LIBS)'	\
 | 
			
		||||
		CPUID_OBJ='$(CPUID_OBJ)' BN_ASM='$(BN_ASM)'	\
 | 
			
		||||
		EC_ASM='$(EC_ASM)' DES_ENC='$(DES_ENC)' 	\
 | 
			
		||||
		AES_ENC='$(AES_ENC)' CMLL_ENC='$(CMLL_ENC)'	\
 | 
			
		||||
		BF_ENC='$(BF_ENC)' CAST_ENC='$(CAST_ENC)'	\
 | 
			
		||||
		RC4_ENC='$(RC4_ENC)' RC5_ENC='$(RC5_ENC)'	\
 | 
			
		||||
		SHA1_ASM_OBJ='$(SHA1_ASM_OBJ)'			\
 | 
			
		||||
		MD5_ASM_OBJ='$(MD5_ASM_OBJ)'			\
 | 
			
		||||
		RMD160_ASM_OBJ='$(RMD160_ASM_OBJ)'		\
 | 
			
		||||
		WP_ASM_OBJ='$(WP_ASM_OBJ)'			\
 | 
			
		||||
		MODES_ASM_OBJ='$(MODES_ASM_OBJ)'		\
 | 
			
		||||
		ENGINES_ASM_OBJ='$(ENGINES_ASM_OBJ)'		\
 | 
			
		||||
		PERLASM_SCHEME='$(PERLASM_SCHEME)'		\
 | 
			
		||||
BUILDENV=	PLATFORM='${PLATFORM}' PROCESSOR='${PROCESSOR}' \
 | 
			
		||||
		CC='${CC}' CFLAG='${CFLAG}' 			\
 | 
			
		||||
		AS='${CC}' ASFLAG='${CFLAG} -c'			\
 | 
			
		||||
		AR='${AR}' PERL='${PERL}' RANLIB='${RANLIB}'	\
 | 
			
		||||
		SDIRS='${SDIRS}' LIBRPATH='${INSTALLTOP}/$(LIBDIR)'	\
 | 
			
		||||
		INSTALL_PREFIX='${INSTALL_PREFIX}'		\
 | 
			
		||||
		INSTALLTOP='${INSTALLTOP}' OPENSSLDIR='${OPENSSLDIR}'	\
 | 
			
		||||
		LIBDIR='${LIBDIR}' \
 | 
			
		||||
		MAKEDEPEND='$$$${TOP}/util/domd $$$${TOP} -MD ${MAKEDEPPROG}' \
 | 
			
		||||
		DEPFLAG='-DOPENSSL_NO_DEPRECATED ${DEPFLAG}'	\
 | 
			
		||||
		MAKEDEPPROG='${MAKEDEPPROG}'			\
 | 
			
		||||
		SHARED_LDFLAGS='${SHARED_LDFLAGS}'		\
 | 
			
		||||
		KRB5_INCLUDES='${KRB5_INCLUDES}' LIBKRB5='${LIBKRB5}'	\
 | 
			
		||||
		EXE_EXT='${EXE_EXT}' SHARED_LIBS='${SHARED_LIBS}'	\
 | 
			
		||||
		SHLIB_EXT='${SHLIB_EXT}' SHLIB_TARGET='${SHLIB_TARGET}'	\
 | 
			
		||||
		PEX_LIBS='${PEX_LIBS}' EX_LIBS='${EX_LIBS}'	\
 | 
			
		||||
		CPUID_OBJ='${CPUID_OBJ}'			\
 | 
			
		||||
		BN_ASM='${BN_ASM}' DES_ENC='${DES_ENC}' 	\
 | 
			
		||||
		AES_ASM_OBJ='${AES_ASM_OBJ}'			\
 | 
			
		||||
		BF_ENC='${BF_ENC}' CAST_ENC='${CAST_ENC}'	\
 | 
			
		||||
		RC4_ENC='${RC4_ENC}' RC5_ENC='${RC5_ENC}'	\
 | 
			
		||||
		SHA1_ASM_OBJ='${SHA1_ASM_OBJ}'			\
 | 
			
		||||
		MD5_ASM_OBJ='${MD5_ASM_OBJ}'			\
 | 
			
		||||
		RMD160_ASM_OBJ='${RMD160_ASM_OBJ}'		\
 | 
			
		||||
		FIPSLIBDIR='${FIPSLIBDIR}'			\
 | 
			
		||||
		FIPSDIR='${FIPSDIR}'				\
 | 
			
		||||
		FIPSCANLIB="$${FIPSCANLIB:-$(FIPSCANLIB)}"	\
 | 
			
		||||
		FIPSCANISTERINTERNAL='${FIPSCANISTERINTERNAL}'	\
 | 
			
		||||
		FIPS_EX_OBJ='${FIPS_EX_OBJ}'	\
 | 
			
		||||
		THIS=$${THIS:-$@} MAKEFILE=Makefile MAKEOVERRIDES=
 | 
			
		||||
# MAKEOVERRIDES= effectively "equalizes" GNU-ish and SysV-ish make flavors,
 | 
			
		||||
# which in turn eliminates ambiguities in variable treatment with -e.
 | 
			
		||||
@@ -256,30 +243,98 @@ BUILDENV=	LC_ALL=C PLATFORM='$(PLATFORM)' PROCESSOR='$(PROCESSOR)'\
 | 
			
		||||
# subdirectories defined in $(DIRS).  It requires that the target
 | 
			
		||||
# is given through the shell variable `target'.
 | 
			
		||||
BUILD_CMD=  if [ -d "$$dir" ]; then \
 | 
			
		||||
	    (	cd $$dir && echo "making $$target in $$dir..." && \
 | 
			
		||||
	    (	[ $$target != all -a -z "$(FIPSCANLIB)" ] && FIPSCANLIB=/dev/null; \
 | 
			
		||||
		cd $$dir && echo "making $$target in $$dir..." && \
 | 
			
		||||
		$(CLEARENV) && $(MAKE) -e $(BUILDENV) TOP=.. DIR=$$dir $$target \
 | 
			
		||||
	    ) || exit 1; \
 | 
			
		||||
	    fi
 | 
			
		||||
RECURSIVE_BUILD_CMD=for dir in $(DIRS); do $(BUILD_CMD); done
 | 
			
		||||
BUILD_ONE_CMD=\
 | 
			
		||||
	if expr " $(DIRS) " : ".* $$dir " >/dev/null 2>&1; then \
 | 
			
		||||
	if echo " $(DIRS) " | grep " $$dir " >/dev/null 2>/dev/null; then \
 | 
			
		||||
		$(BUILD_CMD); \
 | 
			
		||||
	fi
 | 
			
		||||
 | 
			
		||||
reflect:
 | 
			
		||||
	@[ -n "$(THIS)" ] && $(CLEARENV) && $(MAKE) $(THIS) -e $(BUILDENV)
 | 
			
		||||
 | 
			
		||||
sub_all: build_all
 | 
			
		||||
FIPS_EX_OBJ= ../crypto/aes/aes_cfb.o \
 | 
			
		||||
	../crypto/aes/aes_ecb.o \
 | 
			
		||||
	../crypto/aes/aes_ofb.o \
 | 
			
		||||
	../crypto/bn/bn_add.o \
 | 
			
		||||
	../crypto/bn/bn_blind.o \
 | 
			
		||||
	../crypto/bn/bn_ctx.o \
 | 
			
		||||
	../crypto/bn/bn_div.o \
 | 
			
		||||
	../crypto/bn/bn_exp2.o \
 | 
			
		||||
	../crypto/bn/bn_exp.o \
 | 
			
		||||
	../crypto/bn/bn_gcd.o \
 | 
			
		||||
	../crypto/bn/bn_lib.o \
 | 
			
		||||
	../crypto/bn/bn_mod.o \
 | 
			
		||||
	../crypto/bn/bn_mont.o \
 | 
			
		||||
	../crypto/bn/bn_mul.o \
 | 
			
		||||
	../crypto/bn/bn_prime.o \
 | 
			
		||||
	../crypto/bn/bn_rand.o \
 | 
			
		||||
	../crypto/bn/bn_recp.o \
 | 
			
		||||
	../crypto/bn/bn_shift.o \
 | 
			
		||||
	../crypto/bn/bn_sqr.o \
 | 
			
		||||
	../crypto/bn/bn_word.o \
 | 
			
		||||
	../crypto/bn/bn_x931p.o \
 | 
			
		||||
	../crypto/buffer/buf_str.o \
 | 
			
		||||
	../crypto/cryptlib.o \
 | 
			
		||||
	../crypto/des/cfb64ede.o \
 | 
			
		||||
	../crypto/des/cfb64enc.o \
 | 
			
		||||
	../crypto/des/cfb_enc.o \
 | 
			
		||||
	../crypto/des/ecb3_enc.o \
 | 
			
		||||
	../crypto/des/ecb_enc.o \
 | 
			
		||||
	../crypto/des/ofb64ede.o \
 | 
			
		||||
	../crypto/des/ofb64enc.o \
 | 
			
		||||
	../crypto/des/fcrypt.o \
 | 
			
		||||
	../crypto/des/set_key.o \
 | 
			
		||||
	../crypto/dsa/dsa_utl.o \
 | 
			
		||||
	../crypto/dsa/dsa_sign.o \
 | 
			
		||||
	../crypto/dsa/dsa_vrf.o \
 | 
			
		||||
	../crypto/err/err.o \
 | 
			
		||||
	../crypto/evp/digest.o \
 | 
			
		||||
	../crypto/evp/enc_min.o \
 | 
			
		||||
	../crypto/evp/e_aes.o \
 | 
			
		||||
	../crypto/evp/e_des3.o \
 | 
			
		||||
	../crypto/evp/p_sign.o \
 | 
			
		||||
	../crypto/evp/p_verify.o \
 | 
			
		||||
	../crypto/mem_clr.o \
 | 
			
		||||
	../crypto/mem.o \
 | 
			
		||||
	../crypto/rand/md_rand.o \
 | 
			
		||||
	../crypto/rand/rand_egd.o \
 | 
			
		||||
	../crypto/rand/randfile.o \
 | 
			
		||||
	../crypto/rand/rand_lib.o \
 | 
			
		||||
	../crypto/rand/rand_os2.o \
 | 
			
		||||
	../crypto/rand/rand_unix.o \
 | 
			
		||||
	../crypto/rand/rand_win.o \
 | 
			
		||||
	../crypto/rsa/rsa_lib.o \
 | 
			
		||||
	../crypto/rsa/rsa_none.o \
 | 
			
		||||
	../crypto/rsa/rsa_oaep.o \
 | 
			
		||||
	../crypto/rsa/rsa_pk1.o \
 | 
			
		||||
	../crypto/rsa/rsa_pss.o \
 | 
			
		||||
	../crypto/rsa/rsa_ssl.o \
 | 
			
		||||
	../crypto/rsa/rsa_x931.o \
 | 
			
		||||
	../crypto/sha/sha1dgst.o \
 | 
			
		||||
	../crypto/sha/sha256.o \
 | 
			
		||||
	../crypto/sha/sha512.o \
 | 
			
		||||
	../crypto/uid.o
 | 
			
		||||
 | 
			
		||||
sub_all: build_all
 | 
			
		||||
build_all: build_libs build_apps build_tests build_tools
 | 
			
		||||
 | 
			
		||||
build_libs: build_libcrypto build_libssl openssl.pc
 | 
			
		||||
 | 
			
		||||
build_libcrypto: build_crypto build_engines libcrypto.pc
 | 
			
		||||
build_libssl: build_ssl libssl.pc
 | 
			
		||||
build_libs: build_crypto build_fips build_ssl build_shared build_engines
 | 
			
		||||
 | 
			
		||||
build_crypto:
 | 
			
		||||
	@dir=crypto; target=all; $(BUILD_ONE_CMD)
 | 
			
		||||
	if [ -n "$(FIPSCANLIB)" ]; then \
 | 
			
		||||
		EXCL_OBJ='$(AES_ASM_OBJ) $(BN_ASM) $(DES_ENC) $(CPUID_OBJ) $(SHA1_ASM_OBJ) $(FIPS_EX_OBJ)' ; export EXCL_OBJ ; \
 | 
			
		||||
		ARX='$(PERL) $${TOP}/util/arx.pl $(AR)' ; \
 | 
			
		||||
	else \
 | 
			
		||||
		ARX='${AR}' ; \
 | 
			
		||||
	fi ; export ARX ; \
 | 
			
		||||
		dir=crypto; target=all; $(BUILD_ONE_CMD)
 | 
			
		||||
build_fips:
 | 
			
		||||
	@dir=fips; target=all; [ -z "$(FIPSCANLIB)" ] || $(BUILD_ONE_CMD)
 | 
			
		||||
build_ssl: build_crypto
 | 
			
		||||
	@dir=ssl; target=all; $(BUILD_ONE_CMD)
 | 
			
		||||
build_engines: build_crypto
 | 
			
		||||
@@ -295,21 +350,20 @@ all_testapps: build_libs build_testapps
 | 
			
		||||
build_testapps:
 | 
			
		||||
	@dir=crypto; target=testapps; $(BUILD_ONE_CMD)
 | 
			
		||||
 | 
			
		||||
fips_premain_dso$(EXE_EXT): libcrypto.a
 | 
			
		||||
	[ -z "$(FIPSCANLIB)" ] || $(CC) $(CFLAG) -Iinclude \
 | 
			
		||||
		-DFINGERPRINT_PREMAIN_DSO_LOAD -o $@  \
 | 
			
		||||
		$(FIPSLIBDIR)fips_premain.c $(FIPSLIBDIR)fipscanister.o \
 | 
			
		||||
		libcrypto.a $(EX_LIBS)
 | 
			
		||||
 | 
			
		||||
libcrypto$(SHLIB_EXT): libcrypto.a fips_premain_dso$(EXE_EXT)
 | 
			
		||||
build_shared:	$(SHARED_LIBS)
 | 
			
		||||
libcrypto$(SHLIB_EXT): libcrypto.a $(SHARED_FIPS)
 | 
			
		||||
	@if [ "$(SHLIB_TARGET)" != "" ]; then \
 | 
			
		||||
		if [ "$(FIPSCANLIB)" = "libcrypto" ]; then \
 | 
			
		||||
			FIPSLD_LIBCRYPTO=libcrypto.a ; \
 | 
			
		||||
			FIPSLD_CC="$(CC)"; CC=$(FIPSDIR)/bin/fipsld; \
 | 
			
		||||
			export CC FIPSLD_CC FIPSLD_LIBCRYPTO; \
 | 
			
		||||
		fi; \
 | 
			
		||||
		$(MAKE) -e SHLIBDIRS=crypto  CC="$${CC:-$(CC)}" build-shared && \
 | 
			
		||||
		(touch -c fips_premain_dso$(EXE_EXT) || :); \
 | 
			
		||||
		if [ "$(FIPSCANLIB)" = "libfips" ]; then \
 | 
			
		||||
			$(ARD) libcrypto.a fipscanister.o ; \
 | 
			
		||||
			$(MAKE) SHLIBDIRS='crypto' SHLIBDEPS='-lfips' build-shared; \
 | 
			
		||||
			$(AR) libcrypto.a fips/fipscanister.o ; \
 | 
			
		||||
		else \
 | 
			
		||||
			if [ "$(FIPSCANLIB)" = "libcrypto" ]; then \
 | 
			
		||||
				FIPSLD_CC="$(CC)"; CC=fips/fipsld; \
 | 
			
		||||
				export CC FIPSLD_CC; \
 | 
			
		||||
			fi; \
 | 
			
		||||
			$(MAKE) -e SHLIBDIRS='crypto' build-shared; \
 | 
			
		||||
		fi \
 | 
			
		||||
	else \
 | 
			
		||||
		echo "There's no support for shared libraries on this platform" >&2; \
 | 
			
		||||
		exit 1; \
 | 
			
		||||
@@ -317,12 +371,32 @@ libcrypto$(SHLIB_EXT): libcrypto.a fips_premain_dso$(EXE_EXT)
 | 
			
		||||
 | 
			
		||||
libssl$(SHLIB_EXT): libcrypto$(SHLIB_EXT) libssl.a
 | 
			
		||||
	@if [ "$(SHLIB_TARGET)" != "" ]; then \
 | 
			
		||||
		$(MAKE) SHLIBDIRS=ssl SHLIBDEPS='-lcrypto' build-shared; \
 | 
			
		||||
		shlibdeps=-lcrypto; \
 | 
			
		||||
		[ "$(FIPSCANLIB)" = "libfips" ] && shlibdeps="$$shlibdeps -lfips"; \
 | 
			
		||||
		$(MAKE) SHLIBDIRS=ssl SHLIBDEPS="$$shlibdeps" build-shared; \
 | 
			
		||||
	else \
 | 
			
		||||
		echo "There's no support for shared libraries on this platform" >&2 ; \
 | 
			
		||||
		exit 1; \
 | 
			
		||||
	fi
 | 
			
		||||
 | 
			
		||||
fips/fipscanister.o:	build_fips
 | 
			
		||||
libfips$(SHLIB_EXT):		fips/fipscanister.o
 | 
			
		||||
	@if [ "$(SHLIB_TARGET)" != "" ]; then \
 | 
			
		||||
		FIPSLD_CC="$(CC)"; CC=fips/fipsld; export CC FIPSLD_CC; \
 | 
			
		||||
		$(MAKE) -f Makefile.shared -e $(BUILDENV) \
 | 
			
		||||
			CC=$${CC} LIBNAME=fips THIS=$@ \
 | 
			
		||||
			LIBEXTRAS=fips/fipscanister.o \
 | 
			
		||||
			LIBDEPS="$(EX_LIBS)" \
 | 
			
		||||
			LIBVERSION=${SHLIB_MAJOR}.${SHLIB_MINOR} \
 | 
			
		||||
			link_o.$(SHLIB_TARGET) || { rm -f $@; exit 1; } \
 | 
			
		||||
	else \
 | 
			
		||||
		echo "There's no support for shared libraries on this platform" >&2; \
 | 
			
		||||
		exit 1; \
 | 
			
		||||
	fi
 | 
			
		||||
 | 
			
		||||
libfips.a:
 | 
			
		||||
	dir=fips; target=all; $(BUILD_ONE_CMD)
 | 
			
		||||
 | 
			
		||||
clean-shared:
 | 
			
		||||
	@set -e; for i in $(SHLIBDIRS); do \
 | 
			
		||||
		if [ -n "$(SHARED_LIBS_LINK_EXTS)" ]; then \
 | 
			
		||||
@@ -332,16 +406,16 @@ clean-shared:
 | 
			
		||||
			done; \
 | 
			
		||||
		fi; \
 | 
			
		||||
		( set -x; rm -f lib$$i$(SHLIB_EXT) ); \
 | 
			
		||||
		if expr "$(PLATFORM)" : "Cygwin" >/dev/null; then \
 | 
			
		||||
		if [ "$(PLATFORM)" = "Cygwin" ]; then \
 | 
			
		||||
			( set -x; rm -f cyg$$i$(SHLIB_EXT) lib$$i$(SHLIB_EXT).a ); \
 | 
			
		||||
		fi; \
 | 
			
		||||
	done
 | 
			
		||||
 | 
			
		||||
link-shared:
 | 
			
		||||
	@ set -e; for i in $(SHLIBDIRS); do \
 | 
			
		||||
	@ set -e; for i in ${SHLIBDIRS}; do \
 | 
			
		||||
		$(MAKE) -f $(HERE)/Makefile.shared -e $(BUILDENV) \
 | 
			
		||||
			LIBNAME=$$i LIBVERSION=$(SHLIB_MAJOR).$(SHLIB_MINOR) \
 | 
			
		||||
			LIBCOMPATVERSIONS=";$(SHLIB_VERSION_HISTORY)" \
 | 
			
		||||
			LIBNAME=$$i LIBVERSION=${SHLIB_MAJOR}.${SHLIB_MINOR} \
 | 
			
		||||
			LIBCOMPATVERSIONS=";${SHLIB_VERSION_HISTORY}" \
 | 
			
		||||
			symlink.$(SHLIB_TARGET); \
 | 
			
		||||
		libs="$$libs -l$$i"; \
 | 
			
		||||
	done
 | 
			
		||||
@@ -349,13 +423,13 @@ link-shared:
 | 
			
		||||
build-shared: do_$(SHLIB_TARGET) link-shared
 | 
			
		||||
 | 
			
		||||
do_$(SHLIB_TARGET):
 | 
			
		||||
	@ set -e; libs='-L. $(SHLIBDEPS)'; for i in $(SHLIBDIRS); do \
 | 
			
		||||
		if [ "$$i" = "ssl" -a -n "$(LIBKRB5)" ]; then \
 | 
			
		||||
	@ set -e; libs='-L. ${SHLIBDEPS}'; for i in ${SHLIBDIRS}; do \
 | 
			
		||||
		if [ "${SHLIBDIRS}" = "ssl" -a -n "$(LIBKRB5)" ]; then \
 | 
			
		||||
			libs="$(LIBKRB5) $$libs"; \
 | 
			
		||||
		fi; \
 | 
			
		||||
		$(CLEARENV) && $(MAKE) -f Makefile.shared -e $(BUILDENV) \
 | 
			
		||||
			LIBNAME=$$i LIBVERSION=$(SHLIB_MAJOR).$(SHLIB_MINOR) \
 | 
			
		||||
			LIBCOMPATVERSIONS=";$(SHLIB_VERSION_HISTORY)" \
 | 
			
		||||
			LIBNAME=$$i LIBVERSION=${SHLIB_MAJOR}.${SHLIB_MINOR} \
 | 
			
		||||
			LIBCOMPATVERSIONS=";${SHLIB_VERSION_HISTORY}" \
 | 
			
		||||
			LIBDEPS="$$libs $(EX_LIBS)" \
 | 
			
		||||
			link_a.$(SHLIB_TARGET); \
 | 
			
		||||
		libs="-l$$i $$libs"; \
 | 
			
		||||
@@ -371,8 +445,7 @@ libcrypto.pc: Makefile
 | 
			
		||||
	    echo 'Description: OpenSSL cryptography library'; \
 | 
			
		||||
	    echo 'Version: '$(VERSION); \
 | 
			
		||||
	    echo 'Requires: '; \
 | 
			
		||||
	    echo 'Libs: -L$${libdir} -lcrypto'; \
 | 
			
		||||
	    echo 'Libs.private: $(EX_LIBS)'; \
 | 
			
		||||
	    echo 'Libs: -L$${libdir} -lcrypto $(EX_LIBS)'; \
 | 
			
		||||
	    echo 'Cflags: -I$${includedir} $(KRB5_INCLUDES)' ) > libcrypto.pc
 | 
			
		||||
 | 
			
		||||
libssl.pc: Makefile
 | 
			
		||||
@@ -381,12 +454,11 @@ libssl.pc: Makefile
 | 
			
		||||
	    echo 'libdir=$${exec_prefix}/$(LIBDIR)'; \
 | 
			
		||||
	    echo 'includedir=$${prefix}/include'; \
 | 
			
		||||
	    echo ''; \
 | 
			
		||||
	    echo 'Name: OpenSSL-libssl'; \
 | 
			
		||||
	    echo 'Name: OpenSSL'; \
 | 
			
		||||
	    echo 'Description: Secure Sockets Layer and cryptography libraries'; \
 | 
			
		||||
	    echo 'Version: '$(VERSION); \
 | 
			
		||||
	    echo 'Requires.private: libcrypto'; \
 | 
			
		||||
	    echo 'Libs: -L$${libdir} -lssl'; \
 | 
			
		||||
	    echo 'Libs.private: $(EX_LIBS)'; \
 | 
			
		||||
	    echo 'Requires: '; \
 | 
			
		||||
	    echo 'Libs: -L$${libdir} -lssl -lcrypto $(EX_LIBS)'; \
 | 
			
		||||
	    echo 'Cflags: -I$${includedir} $(KRB5_INCLUDES)' ) > libssl.pc
 | 
			
		||||
 | 
			
		||||
openssl.pc: Makefile
 | 
			
		||||
@@ -398,7 +470,9 @@ openssl.pc: Makefile
 | 
			
		||||
	    echo 'Name: OpenSSL'; \
 | 
			
		||||
	    echo 'Description: Secure Sockets Layer and cryptography libraries and tools'; \
 | 
			
		||||
	    echo 'Version: '$(VERSION); \
 | 
			
		||||
	    echo 'Requires: libssl libcrypto' ) > openssl.pc
 | 
			
		||||
	    echo 'Requires: '; \
 | 
			
		||||
	    echo 'Libs: -L$${libdir} -lssl -lcrypto $(EX_LIBS)'; \
 | 
			
		||||
	    echo 'Cflags: -I$${includedir} $(KRB5_INCLUDES)' ) > openssl.pc
 | 
			
		||||
 | 
			
		||||
Makefile: Makefile.org Configure config
 | 
			
		||||
	@echo "Makefile is older than Makefile.org, Configure or config."
 | 
			
		||||
@@ -406,7 +480,7 @@ Makefile: Makefile.org Configure config
 | 
			
		||||
	@false
 | 
			
		||||
 | 
			
		||||
libclean:
 | 
			
		||||
	rm -f *.map *.so *.so.* *.dylib *.dll engines/*.so engines/*.dll engines/*.dylib *.a engines/*.a */lib */*/lib
 | 
			
		||||
	rm -f *.map *.so *.so.* *.dll engines/*.so engines/*.dll *.a engines/*.a */lib */*/lib
 | 
			
		||||
 | 
			
		||||
clean:	libclean
 | 
			
		||||
	rm -f shlib/*.o *.o core a.out fluff rehash.time testlog make.log cctest cctest.c
 | 
			
		||||
@@ -432,39 +506,38 @@ links:
 | 
			
		||||
	@$(PERL) $(TOP)/util/mkdir-p.pl include/openssl
 | 
			
		||||
	@$(PERL) $(TOP)/util/mklink.pl include/openssl $(EXHEADER)
 | 
			
		||||
	@set -e; target=links; $(RECURSIVE_BUILD_CMD)
 | 
			
		||||
	@if [ -z "$(FIPSCANLIB)" ]; then \
 | 
			
		||||
		set -e; target=links; dir=fips ; $(BUILD_CMD) ; \
 | 
			
		||||
	fi
 | 
			
		||||
 | 
			
		||||
gentests:
 | 
			
		||||
	@(cd test && echo "generating dummy tests (if needed)..." && \
 | 
			
		||||
	$(CLEARENV) && $(MAKE) -e $(BUILDENV) TESTS='$(TESTS)' OPENSSL_DEBUG_MEMORY=on generate );
 | 
			
		||||
	$(CLEARENV) && $(MAKE) -e $(BUILDENV) TESTS='${TESTS}' OPENSSL_DEBUG_MEMORY=on generate );
 | 
			
		||||
 | 
			
		||||
dclean:
 | 
			
		||||
	rm -rf *.bak include/openssl certs/.0
 | 
			
		||||
	rm -f *.bak
 | 
			
		||||
	@set -e; target=dclean; $(RECURSIVE_BUILD_CMD)
 | 
			
		||||
 | 
			
		||||
rehash: rehash.time
 | 
			
		||||
rehash.time: certs apps
 | 
			
		||||
	@if [ -z "$(CROSS_COMPILE)" ]; then \
 | 
			
		||||
		(OPENSSL="`pwd`/util/opensslwrap.sh"; \
 | 
			
		||||
		[ -x "apps/openssl.exe" ] && OPENSSL="apps/openssl.exe" || :; \
 | 
			
		||||
		OPENSSL_DEBUG_MEMORY=on; \
 | 
			
		||||
		export OPENSSL OPENSSL_DEBUG_MEMORY; \
 | 
			
		||||
		$(PERL) tools/c_rehash certs/demo) && \
 | 
			
		||||
		$(PERL) tools/c_rehash certs) && \
 | 
			
		||||
		touch rehash.time; \
 | 
			
		||||
	else :; fi
 | 
			
		||||
	fi
 | 
			
		||||
 | 
			
		||||
test:   tests
 | 
			
		||||
 | 
			
		||||
tests: rehash
 | 
			
		||||
	@(cd test && echo "testing..." && \
 | 
			
		||||
	$(CLEARENV) && $(MAKE) -e $(BUILDENV) TOP=.. TESTS='$(TESTS)' OPENSSL_DEBUG_MEMORY=on OPENSSL_CONF=../apps/openssl.cnf tests );
 | 
			
		||||
	OPENSSL_CONF=apps/openssl.cnf util/opensslwrap.sh version -a
 | 
			
		||||
	$(CLEARENV) && $(MAKE) -e $(BUILDENV) TOP=.. TESTS='${TESTS}' OPENSSL_DEBUG_MEMORY=on tests );
 | 
			
		||||
	util/opensslwrap.sh version -a
 | 
			
		||||
 | 
			
		||||
report:
 | 
			
		||||
	@$(PERL) util/selftest.pl
 | 
			
		||||
 | 
			
		||||
update: errors stacks util/libeay.num util/ssleay.num TABLE
 | 
			
		||||
	@set -e; target=update; $(RECURSIVE_BUILD_CMD)
 | 
			
		||||
 | 
			
		||||
depend:
 | 
			
		||||
	@set -e; target=depend; $(RECURSIVE_BUILD_CMD)
 | 
			
		||||
 | 
			
		||||
@@ -476,9 +549,9 @@ tags:
 | 
			
		||||
	find . -name '[^.]*.[ch]' | xargs etags -a
 | 
			
		||||
 | 
			
		||||
errors:
 | 
			
		||||
	$(PERL) util/ck_errf.pl -strict */*.c */*/*.c
 | 
			
		||||
	$(PERL) util/mkerr.pl -recurse -write
 | 
			
		||||
	(cd engines; $(MAKE) PERL=$(PERL) errors)
 | 
			
		||||
	$(PERL) util/ck_errf.pl */*.c */*/*.c
 | 
			
		||||
 | 
			
		||||
stacks:
 | 
			
		||||
	$(PERL) util/mkstack.pl -write
 | 
			
		||||
@@ -489,44 +562,58 @@ util/libeay.num::
 | 
			
		||||
util/ssleay.num::
 | 
			
		||||
	$(PERL) util/mkdef.pl ssl update
 | 
			
		||||
 | 
			
		||||
crypto/objects/obj_dat.h: crypto/objects/obj_dat.pl crypto/objects/obj_mac.h
 | 
			
		||||
	$(PERL) crypto/objects/obj_dat.pl crypto/objects/obj_mac.h crypto/objects/obj_dat.h
 | 
			
		||||
crypto/objects/obj_mac.h: crypto/objects/objects.pl crypto/objects/objects.txt crypto/objects/obj_mac.num
 | 
			
		||||
	$(PERL) crypto/objects/objects.pl crypto/objects/objects.txt crypto/objects/obj_mac.num crypto/objects/obj_mac.h
 | 
			
		||||
 | 
			
		||||
apps/openssl-vms.cnf: apps/openssl.cnf
 | 
			
		||||
	$(PERL) VMS/VMSify-conf.pl < apps/openssl.cnf > apps/openssl-vms.cnf
 | 
			
		||||
 | 
			
		||||
crypto/bn/bn_prime.h: crypto/bn/bn_prime.pl
 | 
			
		||||
	$(PERL) crypto/bn/bn_prime.pl >crypto/bn/bn_prime.h
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
TABLE: Configure
 | 
			
		||||
	(echo 'Output of `Configure TABLE'"':"; \
 | 
			
		||||
	$(PERL) Configure TABLE) > TABLE
 | 
			
		||||
 | 
			
		||||
update: errors stacks util/libeay.num util/ssleay.num crypto/objects/obj_dat.h apps/openssl-vms.cnf crypto/bn/bn_prime.h TABLE depend
 | 
			
		||||
 | 
			
		||||
# Build distribution tar-file. As the list of files returned by "find" is
 | 
			
		||||
# pretty long, on several platforms a "too many arguments" error or similar
 | 
			
		||||
# would occur. Therefore the list of files is temporarily stored into a file
 | 
			
		||||
# and read directly, requiring GNU-Tar. Call "make TAR=gtar dist" if the normal
 | 
			
		||||
# tar does not support the --files-from option.
 | 
			
		||||
TAR_COMMAND=$(TAR) $(TARFLAGS) --files-from $(TARFILE).list \
 | 
			
		||||
	                       --owner 0 --group 0 \
 | 
			
		||||
			       --transform 's|^|$(NAME)/|' \
 | 
			
		||||
			       -cvf -
 | 
			
		||||
 | 
			
		||||
$(TARFILE).list:
 | 
			
		||||
	find * \! -name STATUS \! -name TABLE \! -name '*.o' \! -name '*.a' \
 | 
			
		||||
	       \! -name '*.so' \! -name '*.so.*'  \! -name 'openssl' \
 | 
			
		||||
	       \( \! -name '*test' -o -name bctest -o -name pod2mantest \) \
 | 
			
		||||
	       \! -name '.#*' \! -name '*~' \! -type l \
 | 
			
		||||
	    | sort > $(TARFILE).list
 | 
			
		||||
 | 
			
		||||
tar: $(TARFILE).list
 | 
			
		||||
tar:
 | 
			
		||||
	find . -type d -print | xargs chmod 755
 | 
			
		||||
	find . -type f -print | xargs chmod a+r
 | 
			
		||||
	find . -type f -perm -0100 -print | xargs chmod a+x
 | 
			
		||||
	$(TAR_COMMAND) | gzip --best > $(TARFILE).gz
 | 
			
		||||
	rm -f $(TARFILE).list
 | 
			
		||||
	ls -l $(TARFILE).gz
 | 
			
		||||
	find * \! -path CVS/\* \! -path \*/CVS/\* \! -name CVS \! -name .cvsignore \! -name STATUS \! -name TABLE | sort > ../$(TARFILE).list; \
 | 
			
		||||
	$(TAR) $(TARFLAGS) --files-from ../$(TARFILE).list -cvf - | \
 | 
			
		||||
	tardy --user_number=0  --user_name=openssl \
 | 
			
		||||
	      --group_number=0 --group_name=openssl \
 | 
			
		||||
	      --prefix=openssl-$(VERSION) - |\
 | 
			
		||||
	gzip --best >../$(TARFILE).gz; \
 | 
			
		||||
	rm -f ../$(TARFILE).list; \
 | 
			
		||||
	ls -l ../$(TARFILE).gz
 | 
			
		||||
 | 
			
		||||
tar-snap: $(TARFILE).list
 | 
			
		||||
	$(TAR_COMMAND) > $(TARFILE)
 | 
			
		||||
	rm -f $(TARFILE).list
 | 
			
		||||
	ls -l $(TARFILE)
 | 
			
		||||
tar-snap:
 | 
			
		||||
	@$(TAR) $(TARFLAGS) -cvf - \
 | 
			
		||||
		`find * \! -path CVS/\* \! -path \*/CVS/\* \! -name CVS \! -name .cvsignore \! -name STATUS \! -name TABLE \! -name '*.o' \! -name '*.a' \! -name '*.so' \! -name '*.so.*'  \! -name 'openssl' \! -name '*test' \! -name '.#*' \! -name '*~' | sort` |\
 | 
			
		||||
	tardy --user_number=0  --user_name=openssl \
 | 
			
		||||
	      --group_number=0 --group_name=openssl \
 | 
			
		||||
	      --prefix=openssl-$(VERSION) - > ../$(TARFILE);\
 | 
			
		||||
	ls -l ../$(TARFILE)
 | 
			
		||||
 | 
			
		||||
dist:   
 | 
			
		||||
	$(PERL) Configure dist
 | 
			
		||||
	@$(MAKE) SDIRS='$(SDIRS)' clean
 | 
			
		||||
	@$(MAKE) TAR='$(TAR)' TARFLAGS='$(TARFLAGS)' $(DISTTARVARS) tar
 | 
			
		||||
	@$(MAKE) dist_pem_h
 | 
			
		||||
	@$(MAKE) SDIRS='${SDIRS}' clean
 | 
			
		||||
	@$(MAKE) TAR='${TAR}' TARFLAGS='${TARFLAGS}' tar
 | 
			
		||||
 | 
			
		||||
dist_pem_h:
 | 
			
		||||
	(cd crypto/pem; $(MAKE) -e $(BUILDENV) pem.h; $(MAKE) clean)
 | 
			
		||||
 | 
			
		||||
install: all install_docs install_sw
 | 
			
		||||
 | 
			
		||||
@@ -545,7 +632,7 @@ install_sw:
 | 
			
		||||
	chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl/$$i ); \
 | 
			
		||||
	done;
 | 
			
		||||
	@set -e; target=install; $(RECURSIVE_BUILD_CMD)
 | 
			
		||||
	@set -e; liblist="$(LIBS)"; for i in $$liblist ;\
 | 
			
		||||
	@set -e; for i in $(LIBS) ;\
 | 
			
		||||
	do \
 | 
			
		||||
		if [ -f "$$i" ]; then \
 | 
			
		||||
		(       echo installing $$i; \
 | 
			
		||||
@@ -561,7 +648,11 @@ install_sw:
 | 
			
		||||
		do \
 | 
			
		||||
			if [ -f "$$i" -o -f "$$i.a" ]; then \
 | 
			
		||||
			(       echo installing $$i; \
 | 
			
		||||
				if expr "$(PLATFORM)" : "Cygwin" >/dev/null; then \
 | 
			
		||||
				if [ "$(PLATFORM)" != "Cygwin" ]; then \
 | 
			
		||||
					cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i.new; \
 | 
			
		||||
					chmod 555 $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i.new; \
 | 
			
		||||
					mv -f $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i.new $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i; \
 | 
			
		||||
				else \
 | 
			
		||||
					c=`echo $$i | sed 's/^lib\(.*\)\.dll\.a/cyg\1-$(SHLIB_VERSION_NUMBER).dll/'`; \
 | 
			
		||||
					cp $$c $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$c.new; \
 | 
			
		||||
					chmod 755 $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$c.new; \
 | 
			
		||||
@@ -569,21 +660,7 @@ install_sw:
 | 
			
		||||
					cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i.new; \
 | 
			
		||||
					chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i.new; \
 | 
			
		||||
					mv -f $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i.new $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i; \
 | 
			
		||||
				else \
 | 
			
		||||
					cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i.new; \
 | 
			
		||||
					chmod 555 $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i.new; \
 | 
			
		||||
					mv -f $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i.new $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i; \
 | 
			
		||||
				fi ); \
 | 
			
		||||
				if expr $(PLATFORM) : 'mingw' > /dev/null; then \
 | 
			
		||||
				(	case $$i in \
 | 
			
		||||
						*crypto*) i=libeay32.dll;; \
 | 
			
		||||
						*ssl*)    i=ssleay32.dll;; \
 | 
			
		||||
					esac; \
 | 
			
		||||
					echo installing $$i; \
 | 
			
		||||
	 				cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$i.new; \
 | 
			
		||||
	 				chmod 755 $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$i.new; \
 | 
			
		||||
	 				mv -f $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$i.new $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$i ); \
 | 
			
		||||
				fi; \
 | 
			
		||||
			fi; \
 | 
			
		||||
		done; \
 | 
			
		||||
		(	here="`pwd`"; \
 | 
			
		||||
@@ -603,31 +680,6 @@ install_sw:
 | 
			
		||||
	cp openssl.pc $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/pkgconfig
 | 
			
		||||
	chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/pkgconfig/openssl.pc
 | 
			
		||||
 | 
			
		||||
install_html_docs:
 | 
			
		||||
	here="`pwd`"; \
 | 
			
		||||
	filecase=; \
 | 
			
		||||
	case "$(PLATFORM)" in DJGPP|Cygwin*|mingw*|darwin*-*-cc) \
 | 
			
		||||
		filecase=-i; \
 | 
			
		||||
	esac; \
 | 
			
		||||
	for subdir in apps crypto ssl; do \
 | 
			
		||||
		mkdir -p $(INSTALL_PREFIX)$(HTMLDIR)/$$subdir; \
 | 
			
		||||
		for i in doc/$$subdir/*.pod; do \
 | 
			
		||||
			fn=`basename $$i .pod`; \
 | 
			
		||||
			echo "installing html/$$fn.$(HTMLSUFFIX)"; \
 | 
			
		||||
			cat $$i \
 | 
			
		||||
			| sed -r 's/L<([^)]*)(\([0-9]\))?\|([^)]*)(\([0-9]\))?>/L<\1|\3>/g' \
 | 
			
		||||
			| pod2html --podroot=doc --htmlroot=.. --podpath=apps:crypto:ssl \
 | 
			
		||||
			| sed -r 's/<!DOCTYPE.*//g' \
 | 
			
		||||
			> $(INSTALL_PREFIX)$(HTMLDIR)/$$subdir/$$fn.$(HTMLSUFFIX); \
 | 
			
		||||
			$(PERL) util/extract-names.pl < $$i | \
 | 
			
		||||
				grep -v $$filecase "^$$fn\$$" | \
 | 
			
		||||
				(cd $(INSTALL_PREFIX)$(HTMLDIR)/$$subdir; \
 | 
			
		||||
				 while read n; do \
 | 
			
		||||
					PLATFORM=$(PLATFORM) $$here/util/point.sh $$fn.$(HTMLSUFFIX) "$$n".$(HTMLSUFFIX); \
 | 
			
		||||
				 done); \
 | 
			
		||||
		done; \
 | 
			
		||||
	done
 | 
			
		||||
 | 
			
		||||
install_docs:
 | 
			
		||||
	@$(PERL) $(TOP)/util/mkdir-p.pl \
 | 
			
		||||
		$(INSTALL_PREFIX)$(MANDIR)/man1 \
 | 
			
		||||
@@ -637,9 +689,9 @@ install_docs:
 | 
			
		||||
	@pod2man="`cd ./util; ./pod2mantest $(PERL)`"; \
 | 
			
		||||
	here="`pwd`"; \
 | 
			
		||||
	filecase=; \
 | 
			
		||||
	case "$(PLATFORM)" in DJGPP|Cygwin*|mingw*|darwin*-*-cc) \
 | 
			
		||||
	if [ "$(PLATFORM)" = "DJGPP" -o "$(PLATFORM)" = "Cygwin" -o "$(PLATFORM)" = "mingw" ]; then \
 | 
			
		||||
		filecase=-i; \
 | 
			
		||||
	esac; \
 | 
			
		||||
	fi; \
 | 
			
		||||
	set -e; for i in doc/apps/*.pod; do \
 | 
			
		||||
		fn=`basename $$i .pod`; \
 | 
			
		||||
		sec=`$(PERL) util/extract-section.pl 1 < $$i`; \
 | 
			
		||||
@@ -654,7 +706,7 @@ install_docs:
 | 
			
		||||
			(grep -v "[	]"; true) | \
 | 
			
		||||
			(cd $(INSTALL_PREFIX)$(MANDIR)/man$$sec/; \
 | 
			
		||||
			 while read n; do \
 | 
			
		||||
				PLATFORM=$(PLATFORM) $$here/util/point.sh $$fn.$${sec}$(MANSUFFIX) "$$n".$${sec}$(MANSUFFIX); \
 | 
			
		||||
				$$here/util/point.sh $$fn.$${sec}$(MANSUFFIX) "$$n".$${sec}$(MANSUFFIX); \
 | 
			
		||||
			 done); \
 | 
			
		||||
	done; \
 | 
			
		||||
	set -e; for i in doc/crypto/*.pod doc/ssl/*.pod; do \
 | 
			
		||||
@@ -671,7 +723,7 @@ install_docs:
 | 
			
		||||
			(grep -v "[	]"; true) | \
 | 
			
		||||
			(cd $(INSTALL_PREFIX)$(MANDIR)/man$$sec/; \
 | 
			
		||||
			 while read n; do \
 | 
			
		||||
				PLATFORM=$(PLATFORM) $$here/util/point.sh $$fn.$${sec}$(MANSUFFIX) "$$n".$${sec}$(MANSUFFIX); \
 | 
			
		||||
				$$here/util/point.sh $$fn.$${sec}$(MANSUFFIX) "$$n".$${sec}$(MANSUFFIX); \
 | 
			
		||||
			 done); \
 | 
			
		||||
	done
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										142
									
								
								Makefile.shared
									
									
									
									
									
								
							
							
						
						
									
										142
									
								
								Makefile.shared
									
									
									
									
									
								
							@@ -14,8 +14,6 @@ CFLAGS=$(CFLAG)
 | 
			
		||||
LDFLAGS=
 | 
			
		||||
SHARED_LDFLAGS=
 | 
			
		||||
 | 
			
		||||
NM=nm
 | 
			
		||||
 | 
			
		||||
# LIBNAME contains just the name of the library, without prefix ("lib"
 | 
			
		||||
# on Unix, "cyg" for certain forms under Cygwin...) or suffix (.a, .so,
 | 
			
		||||
# .dll, ...).  This one MUST have a value when using this makefile to
 | 
			
		||||
@@ -93,7 +91,7 @@ LINK_APP=	\
 | 
			
		||||
  ( $(SET_X);   \
 | 
			
		||||
    LIBDEPS="$${LIBDEPS:-$(LIBDEPS)}"; \
 | 
			
		||||
    LDCMD="$${LDCMD:-$(CC)}"; LDFLAGS="$${LDFLAGS:-$(CFLAGS)}"; \
 | 
			
		||||
    LIBPATH=`for x in $$LIBDEPS; do echo $$x; done | sed -e 's/^ *-L//;t' -e d | uniq`; \
 | 
			
		||||
    LIBPATH=`for x in $$LIBDEPS; do if echo $$x | grep '^ *-L' > /dev/null 2>&1; then echo $$x | sed -e 's/^ *-L//'; fi; done | uniq`; \
 | 
			
		||||
    LIBPATH=`echo $$LIBPATH | sed -e 's/ /:/g'`; \
 | 
			
		||||
    LD_LIBRARY_PATH=$$LIBPATH:$$LD_LIBRARY_PATH \
 | 
			
		||||
    $${LDCMD} $${LDFLAGS} -o $${APPNAME:=$(APPNAME)} $(OBJECTS) $${LIBDEPS} )
 | 
			
		||||
@@ -103,7 +101,7 @@ LINK_SO=	\
 | 
			
		||||
    LIBDEPS="$${LIBDEPS:-$(LIBDEPS)}"; \
 | 
			
		||||
    SHAREDCMD="$${SHAREDCMD:-$(CC)}"; \
 | 
			
		||||
    SHAREDFLAGS="$${SHAREDFLAGS:-$(CFLAGS) $(SHARED_LDFLAGS)}"; \
 | 
			
		||||
    LIBPATH=`for x in $$LIBDEPS; do echo $$x; done | sed -e 's/^ *-L//;t' -e d | uniq`; \
 | 
			
		||||
    LIBPATH=`for x in $$LIBDEPS; do if echo $$x | grep '^ *-L' > /dev/null 2>&1; then echo $$x | sed -e 's/^ *-L//'; fi; done | uniq`; \
 | 
			
		||||
    LIBPATH=`echo $$LIBPATH | sed -e 's/ /:/g'`; \
 | 
			
		||||
    LD_LIBRARY_PATH=$$LIBPATH:$$LD_LIBRARY_PATH \
 | 
			
		||||
    $${SHAREDCMD} $${SHAREDFLAGS} \
 | 
			
		||||
@@ -135,7 +133,7 @@ LINK_SO_A_VIA_O=	\
 | 
			
		||||
  ALL=$$ALLSYMSFLAGS; ALLSYMSFLAGS=; NOALLSYMSFLAGS=; \
 | 
			
		||||
  ( $(SET_X); \
 | 
			
		||||
    ld $(LDFLAGS) -r -o lib$(LIBNAME).o $$ALL lib$(LIBNAME).a $(LIBEXTRAS) ); \
 | 
			
		||||
  $(LINK_SO) && rm -f lib$(LIBNAME).o
 | 
			
		||||
  $(LINK_SO) && rm -f $(LIBNAME).o
 | 
			
		||||
 | 
			
		||||
LINK_SO_A_UNPACKED=	\
 | 
			
		||||
  UNPACKDIR=link_tmp.$$$$; rm -rf $$UNPACKDIR; mkdir $$UNPACKDIR; \
 | 
			
		||||
@@ -144,7 +142,7 @@ LINK_SO_A_UNPACKED=	\
 | 
			
		||||
  SHOBJECTS=$$UNPACKDIR/*.o; \
 | 
			
		||||
  $(LINK_SO) && rm -rf $$UNPACKDIR
 | 
			
		||||
 | 
			
		||||
DETECT_GNU_LD=($(CC) -Wl,-V /dev/null 2>&1 | grep '^GNU ld' )>/dev/null
 | 
			
		||||
DETECT_GNU_LD=(${CC} -Wl,-V /dev/null 2>&1 | grep '^GNU ld' )>/dev/null
 | 
			
		||||
 | 
			
		||||
DO_GNU_SO=$(CALC_VERSIONS); \
 | 
			
		||||
	SHLIB=lib$(LIBNAME).so; \
 | 
			
		||||
@@ -170,19 +168,8 @@ link_a.gnu:
 | 
			
		||||
link_app.gnu:
 | 
			
		||||
	@ $(DO_GNU_APP); $(LINK_APP)
 | 
			
		||||
 | 
			
		||||
DO_BEOS_SO=	SHLIB=lib$(LIBNAME).so; \
 | 
			
		||||
	SHLIB_SUFFIX=; \
 | 
			
		||||
	ALLSYMSFLAGS='-Wl,--whole-archive'; \
 | 
			
		||||
	NOALLSYMSFLAGS='-Wl,--no-whole-archive'; \
 | 
			
		||||
	SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared -Wl,-Bsymbolic -Wl,-soname=$$SHLIB$$SHLIB_SUFFIX"
 | 
			
		||||
 | 
			
		||||
link_o.beos:
 | 
			
		||||
	@ $(DO_BEOS_SO); $(LINK_SO_O)
 | 
			
		||||
link_a.beos:
 | 
			
		||||
	@ $(DO_BEOS_SO); $(LINK_SO_A)
 | 
			
		||||
 | 
			
		||||
link_o.bsd:
 | 
			
		||||
	@if $(DETECT_GNU_LD); then $(DO_GNU_SO); else \
 | 
			
		||||
	@if ${DETECT_GNU_LD}; then $(DO_GNU_SO); else \
 | 
			
		||||
	$(CALC_VERSIONS); \
 | 
			
		||||
	SHLIB=lib$(LIBNAME).so; \
 | 
			
		||||
	SHLIB_SUFFIX=; \
 | 
			
		||||
@@ -192,7 +179,7 @@ link_o.bsd:
 | 
			
		||||
	SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared -nostdlib"; \
 | 
			
		||||
	fi; $(LINK_SO_O)
 | 
			
		||||
link_a.bsd:
 | 
			
		||||
	@if $(DETECT_GNU_LD); then $(DO_GNU_SO); else \
 | 
			
		||||
	@if ${DETECT_GNU_LD}; then $(DO_GNU_SO); else \
 | 
			
		||||
	$(CALC_VERSIONS); \
 | 
			
		||||
	SHLIB=lib$(LIBNAME).so; \
 | 
			
		||||
	SHLIB_SUFFIX=; \
 | 
			
		||||
@@ -202,34 +189,24 @@ link_a.bsd:
 | 
			
		||||
	SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared -nostdlib"; \
 | 
			
		||||
	fi; $(LINK_SO_A)
 | 
			
		||||
link_app.bsd:
 | 
			
		||||
	@if $(DETECT_GNU_LD); then $(DO_GNU_APP); else \
 | 
			
		||||
	@if ${DETECT_GNU_LD}; then $(DO_GNU_APP); else \
 | 
			
		||||
	LDFLAGS="$(CFLAGS) -Wl,-rpath,$(LIBPATH)"; \
 | 
			
		||||
	fi; $(LINK_APP)
 | 
			
		||||
 | 
			
		||||
# For Darwin AKA Mac OS/X (dyld)
 | 
			
		||||
# Originally link_o.darwin produced .so, because it was hard-coded
 | 
			
		||||
# in dso_dlfcn module. At later point dso_dlfcn switched to .dylib
 | 
			
		||||
# extension in order to allow for run-time linking with vendor-
 | 
			
		||||
# supplied shared libraries such as libz, so that link_o.darwin had
 | 
			
		||||
# to be harmonized with it. This caused minor controversy, because
 | 
			
		||||
# it was believed that dlopen can't be used to dynamically load
 | 
			
		||||
# .dylib-s, only so called bundle modules (ones linked with -bundle
 | 
			
		||||
# flag). The belief seems to be originating from pre-10.4 release,
 | 
			
		||||
# where dlfcn functionality was emulated by dlcompat add-on. In
 | 
			
		||||
# 10.4 dlopen was rewritten as native part of dyld and is documented
 | 
			
		||||
# to be capable of loading both dynamic libraries and bundles. In
 | 
			
		||||
# order to provide compatibility with pre-10.4 dlopen, modules are
 | 
			
		||||
# linked with -bundle flag, which makes .dylib extension misleading.
 | 
			
		||||
# It works, because dlopen is [and always was] extension-agnostic.
 | 
			
		||||
# Alternative to this heuristic approach is to develop specific
 | 
			
		||||
# MacOS X dso module relying on whichever "native" dyld interface.
 | 
			
		||||
# link_o.darwin produces .so, because we let it use dso_dlfcn module,
 | 
			
		||||
# which has .so extension hard-coded. One can argue that one should
 | 
			
		||||
# develop special dso module for MacOS X. At least manual encourages
 | 
			
		||||
# to use native NSModule(3) API and refers to dlfcn as termporary hack.
 | 
			
		||||
link_o.darwin:
 | 
			
		||||
	@ $(CALC_VERSIONS); \
 | 
			
		||||
	SHLIB=lib$(LIBNAME); \
 | 
			
		||||
	SHLIB_SUFFIX=.dylib; \
 | 
			
		||||
	SHLIB=`expr "$$THIS" : '.*/\([^/\.]*\)\.'`; \
 | 
			
		||||
	SHLIB=$${SHLIB:-lib$(LIBNAME)}; \
 | 
			
		||||
	SHLIB_SUFFIX=`expr "$$THIS" : '.*\(\.[^\.]*\)$$'`; \
 | 
			
		||||
	SHLIB_SUFFIX=$${SHLIB_SUFFIX:-.so}; \
 | 
			
		||||
	ALLSYMSFLAGS='-all_load'; \
 | 
			
		||||
	NOALLSYMSFLAGS=''; \
 | 
			
		||||
	SHAREDFLAGS="$(CFLAGS) `echo $(SHARED_LDFLAGS) | sed s/dynamiclib/bundle/`"; \
 | 
			
		||||
	SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS)"; \
 | 
			
		||||
	if [ -n "$(LIBVERSION)" ]; then \
 | 
			
		||||
		SHAREDFLAGS="$$SHAREDFLAGS -current_version $(LIBVERSION)"; \
 | 
			
		||||
	fi; \
 | 
			
		||||
@@ -250,7 +227,7 @@ link_a.darwin:
 | 
			
		||||
	if [ -n "$$SHLIB_SOVER_NODOT" ]; then \
 | 
			
		||||
		SHAREDFLAGS="$$SHAREDFLAGS -compatibility_version $$SHLIB_SOVER_NODOT"; \
 | 
			
		||||
	fi; \
 | 
			
		||||
	SHAREDFLAGS="$$SHAREDFLAGS -install_name $(INSTALLTOP)/$(LIBDIR)/$$SHLIB$(SHLIB_EXT)"; \
 | 
			
		||||
	SHAREDFLAGS="$$SHAREDFLAGS -install_name ${INSTALLTOP}/lib/$$SHLIB${SHLIB_EXT}"; \
 | 
			
		||||
	$(LINK_SO_A)
 | 
			
		||||
link_app.darwin:	# is there run-path on darwin?
 | 
			
		||||
	$(LINK_APP)
 | 
			
		||||
@@ -260,59 +237,40 @@ link_o.cygwin:
 | 
			
		||||
	INHIBIT_SYMLINKS=yes; \
 | 
			
		||||
	SHLIB=cyg$(LIBNAME); \
 | 
			
		||||
	base=-Wl,--enable-auto-image-base; \
 | 
			
		||||
	deffile=; \
 | 
			
		||||
	if expr $(PLATFORM) : 'mingw' > /dev/null; then \
 | 
			
		||||
		SHLIB=$(LIBNAME)eay32; base=; \
 | 
			
		||||
		if test -f $(LIBNAME)eay32.def; then \
 | 
			
		||||
			deffile=$(LIBNAME)eay32.def; \
 | 
			
		||||
		fi; \
 | 
			
		||||
	fi; \
 | 
			
		||||
	SHLIB_SUFFIX=.dll; \
 | 
			
		||||
	LIBVERSION="$(LIBVERSION)"; \
 | 
			
		||||
	SHLIB_SOVER=${LIBVERSION:+"-$(LIBVERSION)"}; \
 | 
			
		||||
	ALLSYMSFLAGS='-Wl,--whole-archive'; \
 | 
			
		||||
	NOALLSYMSFLAGS='-Wl,--no-whole-archive'; \
 | 
			
		||||
	SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared $$base $$deffile -Wl,-Bsymbolic"; \
 | 
			
		||||
	SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared $$base -Wl,-Bsymbolic -Wl,--out-implib,lib$(LIBNAME).dll.a"; \
 | 
			
		||||
	$(LINK_SO_O)
 | 
			
		||||
#for mingw target if def-file is in use dll-name should match library-name
 | 
			
		||||
link_a.cygwin:
 | 
			
		||||
	@ $(CALC_VERSIONS); \
 | 
			
		||||
	INHIBIT_SYMLINKS=yes; \
 | 
			
		||||
	SHLIB=cyg$(LIBNAME); SHLIB_SOVER=-$(LIBVERSION); SHLIB_SUFFIX=.dll; \
 | 
			
		||||
	dll_name=$$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX; extras=; \
 | 
			
		||||
	SHLIB=cyg$(LIBNAME); \
 | 
			
		||||
	base=-Wl,--enable-auto-image-base; \
 | 
			
		||||
	if expr $(PLATFORM) : 'mingw' > /dev/null; then \
 | 
			
		||||
		case $(LIBNAME) in \
 | 
			
		||||
			crypto) SHLIB=libeay;; \
 | 
			
		||||
			ssl) SHLIB=ssleay;; \
 | 
			
		||||
		esac; \
 | 
			
		||||
		SHLIB_SOVER=32; \
 | 
			
		||||
		extras="$(LIBNAME).def"; \
 | 
			
		||||
		$(PERL) util/mkdef.pl 32 $$SHLIB > $$extras; \
 | 
			
		||||
		base=; [ $(LIBNAME) = "crypto" -a -n "$(FIPSCANLIB)" ] && base=-Wl,--image-base,0x63000000; \
 | 
			
		||||
		SHLIB=$(LIBNAME)eay32; \
 | 
			
		||||
		base=;  [ $(LIBNAME) = "crypto" ] && base=-Wl,--image-base,0x63000000; \
 | 
			
		||||
	fi; \
 | 
			
		||||
	dll_name=$$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX; \
 | 
			
		||||
	$(PERL) util/mkrc.pl $$dll_name | \
 | 
			
		||||
		$(CROSS_COMPILE)windres -o rc.o; \
 | 
			
		||||
	extras="$$extras rc.o"; \
 | 
			
		||||
	SHLIB_SUFFIX=.dll; \
 | 
			
		||||
	SHLIB_SOVER=-$(LIBVERSION); \
 | 
			
		||||
	ALLSYMSFLAGS='-Wl,--whole-archive'; \
 | 
			
		||||
	NOALLSYMSFLAGS='-Wl,--no-whole-archive'; \
 | 
			
		||||
	SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared $$base -Wl,-Bsymbolic -Wl,--out-implib,lib$(LIBNAME).dll.a $$extras"; \
 | 
			
		||||
	[ -f apps/$$dll_name ] && rm apps/$$dll_name; \
 | 
			
		||||
	[ -f test/$$dll_name ] && rm test/$$dll_name; \
 | 
			
		||||
	SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared $$base -Wl,-Bsymbolic -Wl,--out-implib,lib$(LIBNAME).dll.a"; \
 | 
			
		||||
	[ -f apps/$$SHLIB$$SHLIB_SUFFIX ] && rm apps/$$SHLIB$$SHLIB_SUFFIX; \
 | 
			
		||||
	[ -f test/$$SHLIB$$SHLIB_SUFFIX ] && rm test/$$SHLIB$$SHLIB_SUFFIX; \
 | 
			
		||||
	$(LINK_SO_A) || exit 1; \
 | 
			
		||||
	rm $$extras; \
 | 
			
		||||
	cp -p $$dll_name apps/; \
 | 
			
		||||
	cp -p $$dll_name test/
 | 
			
		||||
	cp -p $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX apps/; \
 | 
			
		||||
	cp -p $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX test/
 | 
			
		||||
link_app.cygwin:
 | 
			
		||||
	@if expr "$(CFLAGS)" : '.*OPENSSL_USE_APPLINK' > /dev/null; then \
 | 
			
		||||
		LIBDEPS="$(TOP)/crypto/applink.o $${LIBDEPS:-$(LIBDEPS)}"; \
 | 
			
		||||
		export LIBDEPS; \
 | 
			
		||||
	fi; \
 | 
			
		||||
	$(LINK_APP)
 | 
			
		||||
 | 
			
		||||
link_o.alpha-osf1:
 | 
			
		||||
	@ if $(DETECT_GNU_LD); then \
 | 
			
		||||
	@ if ${DETECT_GNU_LD}; then \
 | 
			
		||||
		$(DO_GNU_SO); \
 | 
			
		||||
	else \
 | 
			
		||||
		SHLIB=lib$(LIBNAME).so; \
 | 
			
		||||
@@ -333,7 +291,7 @@ link_o.alpha-osf1:
 | 
			
		||||
	fi; \
 | 
			
		||||
	$(LINK_SO_O)
 | 
			
		||||
link_a.alpha-osf1:
 | 
			
		||||
	@ if $(DETECT_GNU_LD); then \
 | 
			
		||||
	@ if ${DETECT_GNU_LD}; then \
 | 
			
		||||
		$(DO_GNU_SO); \
 | 
			
		||||
	else \
 | 
			
		||||
		SHLIB=lib$(LIBNAME).so; \
 | 
			
		||||
@@ -354,7 +312,7 @@ link_a.alpha-osf1:
 | 
			
		||||
	fi; \
 | 
			
		||||
	$(LINK_SO_A)
 | 
			
		||||
link_app.alpha-osf1:
 | 
			
		||||
	@if $(DETECT_GNU_LD); then \
 | 
			
		||||
	@if ${DETECT_GNU_LD}; then \
 | 
			
		||||
		$(DO_GNU_APP); \
 | 
			
		||||
	else \
 | 
			
		||||
		LDFLAGS="$(CFLAGS) -rpath $(LIBRPATH)"; \
 | 
			
		||||
@@ -362,7 +320,7 @@ link_app.alpha-osf1:
 | 
			
		||||
	$(LINK_APP)
 | 
			
		||||
 | 
			
		||||
link_o.solaris:
 | 
			
		||||
	@ if $(DETECT_GNU_LD); then \
 | 
			
		||||
	@ if ${DETECT_GNU_LD}; then \
 | 
			
		||||
		$(DO_GNU_SO); \
 | 
			
		||||
	else \
 | 
			
		||||
		$(CALC_VERSIONS); \
 | 
			
		||||
@@ -376,12 +334,12 @@ link_o.solaris:
 | 
			
		||||
	fi; \
 | 
			
		||||
	$(LINK_SO_O)
 | 
			
		||||
link_a.solaris:
 | 
			
		||||
	@ if $(DETECT_GNU_LD); then \
 | 
			
		||||
	@ if ${DETECT_GNU_LD}; then \
 | 
			
		||||
		$(DO_GNU_SO); \
 | 
			
		||||
	else \
 | 
			
		||||
		$(CALC_VERSIONS); \
 | 
			
		||||
		MINUSZ='-z '; \
 | 
			
		||||
		($(CC) -v 2>&1 | grep gcc) > /dev/null && MINUSZ='-Wl,-z,'; \
 | 
			
		||||
		(${CC} -v 2>&1 | grep gcc) > /dev/null && MINUSZ='-Wl,-z,'; \
 | 
			
		||||
		SHLIB=lib$(LIBNAME).so; \
 | 
			
		||||
		SHLIB_SUFFIX=;\
 | 
			
		||||
		ALLSYMSFLAGS="$${MINUSZ}allextract"; \
 | 
			
		||||
@@ -390,7 +348,7 @@ link_a.solaris:
 | 
			
		||||
	fi; \
 | 
			
		||||
	$(LINK_SO_A)
 | 
			
		||||
link_app.solaris:
 | 
			
		||||
	@ if $(DETECT_GNU_LD); then \
 | 
			
		||||
	@ if ${DETECT_GNU_LD}; then \
 | 
			
		||||
		$(DO_GNU_APP); \
 | 
			
		||||
	else \
 | 
			
		||||
		LDFLAGS="$(CFLAGS) -R $(LIBRPATH)"; \
 | 
			
		||||
@@ -399,7 +357,7 @@ link_app.solaris:
 | 
			
		||||
 | 
			
		||||
# OpenServer 5 native compilers used
 | 
			
		||||
link_o.svr3:
 | 
			
		||||
	@ if $(DETECT_GNU_LD); then \
 | 
			
		||||
	@ if ${DETECT_GNU_LD}; then \
 | 
			
		||||
		$(DO_GNU_SO); \
 | 
			
		||||
	else \
 | 
			
		||||
		$(CALC_VERSIONS); \
 | 
			
		||||
@@ -411,7 +369,7 @@ link_o.svr3:
 | 
			
		||||
	fi; \
 | 
			
		||||
	$(LINK_SO_O)
 | 
			
		||||
link_a.svr3:
 | 
			
		||||
	@ if $(DETECT_GNU_LD); then \
 | 
			
		||||
	@ if ${DETECT_GNU_LD}; then \
 | 
			
		||||
		$(DO_GNU_SO); \
 | 
			
		||||
	else \
 | 
			
		||||
		$(CALC_VERSIONS); \
 | 
			
		||||
@@ -423,12 +381,12 @@ link_a.svr3:
 | 
			
		||||
	fi; \
 | 
			
		||||
	$(LINK_SO_A_UNPACKED)
 | 
			
		||||
link_app.svr3:
 | 
			
		||||
	@$(DETECT_GNU_LD) && $(DO_GNU_APP); \
 | 
			
		||||
	@${DETECT_GNU_LD} && $(DO_GNU_APP); \
 | 
			
		||||
	$(LINK_APP)
 | 
			
		||||
 | 
			
		||||
# UnixWare 7 and OpenUNIX 8 native compilers used
 | 
			
		||||
link_o.svr5:
 | 
			
		||||
	@ if $(DETECT_GNU_LD); then \
 | 
			
		||||
	@ if ${DETECT_GNU_LD}; then \
 | 
			
		||||
		$(DO_GNU_SO); \
 | 
			
		||||
	else \
 | 
			
		||||
		$(CALC_VERSIONS); \
 | 
			
		||||
@@ -442,12 +400,12 @@ link_o.svr5:
 | 
			
		||||
	fi; \
 | 
			
		||||
	$(LINK_SO_O)
 | 
			
		||||
link_a.svr5:
 | 
			
		||||
	@ if $(DETECT_GNU_LD); then \
 | 
			
		||||
	@ if ${DETECT_GNU_LD}; then \
 | 
			
		||||
		$(DO_GNU_SO); \
 | 
			
		||||
	else \
 | 
			
		||||
		$(CALC_VERSIONS); \
 | 
			
		||||
		SHARE_FLAG='-G'; \
 | 
			
		||||
		($(CC) -v 2>&1 | grep gcc) > /dev/null && SHARE_FLAG='-shared'; \
 | 
			
		||||
		(${CC} -v 2>&1 | grep gcc) > /dev/null && SHARE_FLAG='-shared'; \
 | 
			
		||||
		SHLIB=lib$(LIBNAME).so; \
 | 
			
		||||
		SHLIB_SUFFIX=; \
 | 
			
		||||
		ALLSYMSFLAGS=''; \
 | 
			
		||||
@@ -456,11 +414,11 @@ link_a.svr5:
 | 
			
		||||
	fi; \
 | 
			
		||||
	$(LINK_SO_A_UNPACKED)
 | 
			
		||||
link_app.svr5:
 | 
			
		||||
	@$(DETECT_GNU_LD) && $(DO_GNU_APP); \
 | 
			
		||||
	@${DETECT_GNU_LD} && $(DO_GNU_APP); \
 | 
			
		||||
	$(LINK_APP)
 | 
			
		||||
 | 
			
		||||
link_o.irix:
 | 
			
		||||
	@ if $(DETECT_GNU_LD); then \
 | 
			
		||||
	@ if ${DETECT_GNU_LD}; then \
 | 
			
		||||
		$(DO_GNU_SO); \
 | 
			
		||||
	else \
 | 
			
		||||
		$(CALC_VERSIONS); \
 | 
			
		||||
@@ -474,7 +432,7 @@ link_o.irix:
 | 
			
		||||
	fi; \
 | 
			
		||||
	$(LINK_SO_O)
 | 
			
		||||
link_a.irix:
 | 
			
		||||
	@ if $(DETECT_GNU_LD); then \
 | 
			
		||||
	@ if ${DETECT_GNU_LD}; then \
 | 
			
		||||
		$(DO_GNU_SO); \
 | 
			
		||||
	else \
 | 
			
		||||
		$(CALC_VERSIONS); \
 | 
			
		||||
@@ -500,7 +458,7 @@ link_app.irix:
 | 
			
		||||
# ELFs by the way].
 | 
			
		||||
#
 | 
			
		||||
link_o.hpux:
 | 
			
		||||
	@if $(DETECT_GNU_LD); then $(DO_GNU_SO); else \
 | 
			
		||||
	@if ${DETECT_GNU_LD}; then $(DO_GNU_SO); else \
 | 
			
		||||
	$(CALC_VERSIONS); \
 | 
			
		||||
	SHLIB=lib$(LIBNAME).sl; \
 | 
			
		||||
	expr "$(CFLAGS)" : '.*DSO_DLFCN' > /dev/null && SHLIB=lib$(LIBNAME).so; \
 | 
			
		||||
@@ -513,7 +471,7 @@ link_o.hpux:
 | 
			
		||||
	rm -f $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX || :; \
 | 
			
		||||
	$(LINK_SO_O) && chmod a=rx $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX
 | 
			
		||||
link_a.hpux:
 | 
			
		||||
	@if $(DETECT_GNU_LD); then $(DO_GNU_SO); else \
 | 
			
		||||
	@if ${DETECT_GNU_LD}; then $(DO_GNU_SO); else \
 | 
			
		||||
	$(CALC_VERSIONS); \
 | 
			
		||||
	SHLIB=lib$(LIBNAME).sl; \
 | 
			
		||||
	expr $(PLATFORM) : '.*ia64' > /dev/null && SHLIB=lib$(LIBNAME).so; \
 | 
			
		||||
@@ -526,7 +484,7 @@ link_a.hpux:
 | 
			
		||||
	rm -f $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX || :; \
 | 
			
		||||
	$(LINK_SO_A) && chmod a=rx $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX
 | 
			
		||||
link_app.hpux:
 | 
			
		||||
	@if $(DETECT_GNU_LD); then $(DO_GNU_APP); else \
 | 
			
		||||
	@if ${DETECT_GNU_LD}; then $(DO_GNU_APP); else \
 | 
			
		||||
	LDFLAGS="$(CFLAGS) -Wl,+s,+cdp,../:,+cdp,./:,+b,$(LIBRPATH)"; \
 | 
			
		||||
	fi; \
 | 
			
		||||
	$(LINK_APP)
 | 
			
		||||
@@ -591,7 +549,7 @@ symlink.hpux:
 | 
			
		||||
	expr $(PLATFORM) : '.*ia64' > /dev/null && SHLIB=lib$(LIBNAME).so; \
 | 
			
		||||
	$(SYMLINK_SO)
 | 
			
		||||
# The following lines means those specific architectures do no symlinks
 | 
			
		||||
symlink.cygwin symlink.alpha-osf1 symlink.tru64 symlink.tru64-rpath symlink.beos:
 | 
			
		||||
symlink.cygwin symlink.alpha-osf1 symlink.tru64 symlink.tru64-rpath:
 | 
			
		||||
 | 
			
		||||
# Compatibility targets
 | 
			
		||||
link_o.bsd-gcc-shared link_o.linux-shared link_o.gnu-shared: link_o.gnu
 | 
			
		||||
@@ -649,7 +607,3 @@ link_o.reliantunix-shared: link_o.reliantunix
 | 
			
		||||
link_a.reliantunix-shared: link_a.reliantunix
 | 
			
		||||
link_app.reliantunix-shared: link_app.reliantunix
 | 
			
		||||
symlink.reliantunix-shared: symlink.reliantunix
 | 
			
		||||
link_o.beos-shared: link_o.beos
 | 
			
		||||
link_a.beos-shared: link_a.beos
 | 
			
		||||
link_app.beos-shared: link_app.gnu
 | 
			
		||||
symlink.beos-shared: symlink.beos
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										195
									
								
								NEWS
									
									
									
									
									
								
							
							
						
						
									
										195
									
								
								NEWS
									
									
									
									
									
								
							@@ -5,43 +5,7 @@
 | 
			
		||||
  This file gives a brief overview of the major changes between each OpenSSL
 | 
			
		||||
  release. For more details please read the CHANGES file.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.2f and OpenSSL 1.0.2g [1 Mar 2016]
 | 
			
		||||
 | 
			
		||||
      o Disable weak ciphers in SSLv3 and up in default builds of OpenSSL.
 | 
			
		||||
      o Disable SSLv2 default build, default negotiation and weak ciphers
 | 
			
		||||
        (CVE-2016-0800)
 | 
			
		||||
      o Fix a double-free in DSA code (CVE-2016-0705)
 | 
			
		||||
      o Disable SRP fake user seed to address a server memory leak
 | 
			
		||||
        (CVE-2016-0798)
 | 
			
		||||
      o Fix BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption
 | 
			
		||||
        (CVE-2016-0797)
 | 
			
		||||
      o Fix memory issues in BIO_*printf functions (CVE-2016-0799)
 | 
			
		||||
      o Fix side channel attack on modular exponentiation (CVE-2016-0702)
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.2e and OpenSSL 1.0.2f [28 Jan 2016]
 | 
			
		||||
 | 
			
		||||
      o DH small subgroups (CVE-2016-0701)
 | 
			
		||||
      o SSLv2 doesn't block disabled ciphers (CVE-2015-3197)
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.2d and OpenSSL 1.0.2e [3 Dec 2015]
 | 
			
		||||
 | 
			
		||||
      o BN_mod_exp may produce incorrect results on x86_64 (CVE-2015-3193)
 | 
			
		||||
      o Certificate verify crash with missing PSS parameter (CVE-2015-3194)
 | 
			
		||||
      o X509_ATTRIBUTE memory leak (CVE-2015-3195)
 | 
			
		||||
      o Rewrite EVP_DecodeUpdate (base64 decoding) to fix several bugs
 | 
			
		||||
      o In DSA_generate_parameters_ex, if the provided seed is too short,
 | 
			
		||||
        return an error
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.2c and OpenSSL 1.0.2d [9 Jul 2015]
 | 
			
		||||
 | 
			
		||||
      o Alternate chains certificate forgery (CVE-2015-1793)
 | 
			
		||||
      o Race condition handling PSK identify hint (CVE-2015-3196)
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.2b and OpenSSL 1.0.2c [12 Jun 2015]
 | 
			
		||||
 | 
			
		||||
      o Fix HMAC ABI incompatibility
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.2a and OpenSSL 1.0.2b [11 Jun 2015]
 | 
			
		||||
  Major changes between OpenSSL 0.9.8zf and OpenSSL 0.9.8zg [11 Jun 2015]
 | 
			
		||||
 | 
			
		||||
      o Malformed ECParameters causes infinite loop (CVE-2015-1788)
 | 
			
		||||
      o Exploitable out-of-bounds read in X509_cmp_time (CVE-2015-1789)
 | 
			
		||||
@@ -49,202 +13,117 @@
 | 
			
		||||
      o CMS verify infinite loop with unknown hash function (CVE-2015-1792)
 | 
			
		||||
      o Race condition handling NewSessionTicket (CVE-2015-1791)
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.2 and OpenSSL 1.0.2a [19 Mar 2015]
 | 
			
		||||
  Major changes between OpenSSL 0.9.8ze and OpenSSL 0.9.8zf [19 Mar 2015]
 | 
			
		||||
 | 
			
		||||
      o OpenSSL 1.0.2 ClientHello sigalgs DoS fix (CVE-2015-0291)
 | 
			
		||||
      o Multiblock corrupted pointer fix (CVE-2015-0290)
 | 
			
		||||
      o Segmentation fault in DTLSv1_listen fix (CVE-2015-0207)
 | 
			
		||||
      o Segmentation fault in ASN1_TYPE_cmp fix (CVE-2015-0286)
 | 
			
		||||
      o Segmentation fault for invalid PSS parameters fix (CVE-2015-0208)
 | 
			
		||||
      o ASN.1 structure reuse memory corruption fix (CVE-2015-0287)
 | 
			
		||||
      o PKCS7 NULL pointer dereferences fix (CVE-2015-0289)
 | 
			
		||||
      o DoS via reachable assert in SSLv2 servers fix (CVE-2015-0293)
 | 
			
		||||
      o Empty CKE with client auth and DHE fix (CVE-2015-1787)
 | 
			
		||||
      o Handshake with unseeded PRNG fix (CVE-2015-0285)
 | 
			
		||||
      o Use After Free following d2i_ECPrivatekey error fix (CVE-2015-0209)
 | 
			
		||||
      o X509_to_X509_REQ NULL pointer deref fix (CVE-2015-0288)
 | 
			
		||||
      o Removed the export ciphers from the DEFAULT ciphers
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.1l and OpenSSL 1.0.2 [22 Jan 2015]:
 | 
			
		||||
 | 
			
		||||
      o Suite B support for TLS 1.2 and DTLS 1.2
 | 
			
		||||
      o Support for DTLS 1.2
 | 
			
		||||
      o TLS automatic EC curve selection.
 | 
			
		||||
      o API to set TLS supported signature algorithms and curves
 | 
			
		||||
      o SSL_CONF configuration API.
 | 
			
		||||
      o TLS Brainpool support.
 | 
			
		||||
      o ALPN support.
 | 
			
		||||
      o CMS support for RSA-PSS, RSA-OAEP, ECDH and X9.42 DH.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.1k and OpenSSL 1.0.1l [15 Jan 2015]
 | 
			
		||||
  Major changes between OpenSSL 0.9.8zd and OpenSSL 0.9.8ze [15 Jan 2015]
 | 
			
		||||
 | 
			
		||||
      o Build fixes for the Windows and OpenVMS platforms
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.1j and OpenSSL 1.0.1k [8 Jan 2015]
 | 
			
		||||
  Major changes between OpenSSL 0.9.8zc and OpenSSL 0.9.8zd [8 Jan 2015]
 | 
			
		||||
 | 
			
		||||
      o Fix for CVE-2014-3571
 | 
			
		||||
      o Fix for CVE-2015-0206
 | 
			
		||||
      o Fix for CVE-2014-3569
 | 
			
		||||
      o Fix for CVE-2014-3572
 | 
			
		||||
      o Fix for CVE-2015-0204
 | 
			
		||||
      o Fix for CVE-2015-0205
 | 
			
		||||
      o Fix for CVE-2014-8275
 | 
			
		||||
      o Fix for CVE-2014-3570
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.1i and OpenSSL 1.0.1j [15 Oct 2014]
 | 
			
		||||
  Major changes between OpenSSL 0.9.8zb and OpenSSL 0.9.8zc [15 Oct 2014]:
 | 
			
		||||
 | 
			
		||||
      o Fix for CVE-2014-3513
 | 
			
		||||
      o Fix for CVE-2014-3567
 | 
			
		||||
      o Mitigation for CVE-2014-3566 (SSL protocol vulnerability)
 | 
			
		||||
      o Fix for CVE-2014-3568
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.1h and OpenSSL 1.0.1i [6 Aug 2014]
 | 
			
		||||
  Major changes between OpenSSL 0.9.8za and OpenSSL 0.9.8zb [6 Aug 2014]:
 | 
			
		||||
 | 
			
		||||
      o Fix for CVE-2014-3512
 | 
			
		||||
      o Fix for CVE-2014-3511
 | 
			
		||||
      o Fix for CVE-2014-3510
 | 
			
		||||
      o Fix for CVE-2014-3507
 | 
			
		||||
      o Fix for CVE-2014-3506
 | 
			
		||||
      o Fix for CVE-2014-3505
 | 
			
		||||
      o Fix for CVE-2014-3509
 | 
			
		||||
      o Fix for CVE-2014-5139
 | 
			
		||||
      o Fix for CVE-2014-3508
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.1g and OpenSSL 1.0.1h [5 Jun 2014]
 | 
			
		||||
  Known issues in OpenSSL 0.9.8za:
 | 
			
		||||
 | 
			
		||||
      o Compilation failure of s3_pkt.c on some platforms due to missing
 | 
			
		||||
        <limits.h> include. Fixed in 0.9.8zb-dev.
 | 
			
		||||
      o FIPS capable link failure with missing symbol BN_consttime_swap.
 | 
			
		||||
        Fixed in 0.9.8zb-dev. Workaround is to compile with no-ec: the EC
 | 
			
		||||
        algorithms are not FIPS approved in OpenSSL 0.9.8 anyway.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.8y and OpenSSL 0.9.8za [5 Jun 2014]:
 | 
			
		||||
 | 
			
		||||
      o Fix for CVE-2014-0224
 | 
			
		||||
      o Fix for CVE-2014-0221
 | 
			
		||||
      o Fix for CVE-2014-0198
 | 
			
		||||
      o Fix for CVE-2014-0195
 | 
			
		||||
      o Fix for CVE-2014-3470
 | 
			
		||||
      o Fix for CVE-2010-5298
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.1f and OpenSSL 1.0.1g [7 Apr 2014]
 | 
			
		||||
 | 
			
		||||
      o Fix for CVE-2014-0160
 | 
			
		||||
      o Add TLS padding extension workaround for broken servers.
 | 
			
		||||
      o Fix for CVE-2014-0076
 | 
			
		||||
      o Fix for CVE-2010-5298
 | 
			
		||||
      o Fix to TLS alert handling.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.1e and OpenSSL 1.0.1f [6 Jan 2014]
 | 
			
		||||
  Major changes between OpenSSL 0.9.8x and OpenSSL 0.9.8y [5 Feb 2013]:
 | 
			
		||||
 | 
			
		||||
      o Don't include gmt_unix_time in TLS server and client random values
 | 
			
		||||
      o Fix for TLS record tampering bug CVE-2013-4353
 | 
			
		||||
      o Fix for TLS version checking bug CVE-2013-6449
 | 
			
		||||
      o Fix for DTLS retransmission bug CVE-2013-6450
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.1d and OpenSSL 1.0.1e [11 Feb 2013]:
 | 
			
		||||
 | 
			
		||||
      o Corrected fix for CVE-2013-0169
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.1c and OpenSSL 1.0.1d [4 Feb 2013]:
 | 
			
		||||
 | 
			
		||||
      o Fix renegotiation in TLS 1.1, 1.2 by using the correct TLS version.
 | 
			
		||||
      o Include the fips configuration module.
 | 
			
		||||
      o Fix OCSP bad key DoS attack CVE-2013-0166
 | 
			
		||||
      o Fix for SSL/TLS/DTLS CBC plaintext recovery attack CVE-2013-0169
 | 
			
		||||
      o Fix for TLS AESNI record handling flaw CVE-2012-2686
 | 
			
		||||
      o Fix OCSP bad key DoS attack CVE-2013-0166
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.1b and OpenSSL 1.0.1c [10 May 2012]:
 | 
			
		||||
  Major changes between OpenSSL 0.9.8w and OpenSSL 0.9.8x [10 May 2012]:
 | 
			
		||||
 | 
			
		||||
      o Fix TLS/DTLS record length checking bug CVE-2012-2333
 | 
			
		||||
      o Don't attempt to use non-FIPS composite ciphers in FIPS mode.
 | 
			
		||||
      o Fix DTLS record length checking bug CVE-2012-2333
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.1a and OpenSSL 1.0.1b [26 Apr 2012]:
 | 
			
		||||
  Major changes between OpenSSL 0.9.8v and OpenSSL 0.9.8w [23 Apr 2012]:
 | 
			
		||||
 | 
			
		||||
      o Fix compilation error on non-x86 platforms.
 | 
			
		||||
      o Make FIPS capable OpenSSL ciphers work in non-FIPS mode.
 | 
			
		||||
      o Fix SSL_OP_NO_TLSv1_1 clash with SSL_OP_ALL in OpenSSL 1.0.0
 | 
			
		||||
      o Fix for CVE-2012-2131 (corrected fix for 0.9.8 and CVE-2012-2110)
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.1 and OpenSSL 1.0.1a [19 Apr 2012]:
 | 
			
		||||
  Major changes between OpenSSL 0.9.8u and OpenSSL 0.9.8v [19 Apr 2012]:
 | 
			
		||||
 | 
			
		||||
      o Fix for ASN1 overflow bug CVE-2012-2110
 | 
			
		||||
      o Workarounds for some servers that hang on long client hellos.
 | 
			
		||||
      o Fix SEGV in AES code.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.0h and OpenSSL 1.0.1 [14 Mar 2012]:
 | 
			
		||||
 | 
			
		||||
      o TLS/DTLS heartbeat support.
 | 
			
		||||
      o SCTP support.
 | 
			
		||||
      o RFC 5705 TLS key material exporter.
 | 
			
		||||
      o RFC 5764 DTLS-SRTP negotiation.
 | 
			
		||||
      o Next Protocol Negotiation.
 | 
			
		||||
      o PSS signatures in certificates, requests and CRLs.
 | 
			
		||||
      o Support for password based recipient info for CMS.
 | 
			
		||||
      o Support TLS v1.2 and TLS v1.1.
 | 
			
		||||
      o Preliminary FIPS capability for unvalidated 2.0 FIPS module.
 | 
			
		||||
      o SRP support.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.0g and OpenSSL 1.0.0h [12 Mar 2012]:
 | 
			
		||||
  Major changes between OpenSSL 0.9.8t and OpenSSL 0.9.8u [12 Mar 2012]:
 | 
			
		||||
 | 
			
		||||
      o Fix for CMS/PKCS#7 MMA CVE-2012-0884
 | 
			
		||||
      o Corrected fix for CVE-2011-4619
 | 
			
		||||
      o Various DTLS fixes.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.0f and OpenSSL 1.0.0g [18 Jan 2012]:
 | 
			
		||||
  Major changes between OpenSSL 0.9.8s and OpenSSL 0.9.8t [18 Jan 2012]:
 | 
			
		||||
 | 
			
		||||
      o Fix for DTLS DoS issue CVE-2012-0050
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.0e and OpenSSL 1.0.0f [4 Jan 2012]:
 | 
			
		||||
  Major changes between OpenSSL 0.9.8r and OpenSSL 0.9.8s [4 Jan 2012]:
 | 
			
		||||
 | 
			
		||||
      o Fix for DTLS plaintext recovery attack CVE-2011-4108
 | 
			
		||||
      o Fix policy check double free error CVE-2011-4109
 | 
			
		||||
      o Clear block padding bytes of SSL 3.0 records CVE-2011-4576
 | 
			
		||||
      o Only allow one SGC handshake restart for SSL/TLS CVE-2011-4619
 | 
			
		||||
      o Check parameters are not NULL in GOST ENGINE CVE-2012-0027
 | 
			
		||||
      o Check for malformed RFC3779 data CVE-2011-4577
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.0d and OpenSSL 1.0.0e [6 Sep 2011]:
 | 
			
		||||
 | 
			
		||||
      o Fix for CRL vulnerability issue CVE-2011-3207
 | 
			
		||||
      o Fix for ECDH crashes CVE-2011-3210
 | 
			
		||||
      o Protection against EC timing attacks.
 | 
			
		||||
      o Support ECDH ciphersuites for certificates using SHA2 algorithms.
 | 
			
		||||
      o Various DTLS fixes.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.0c and OpenSSL 1.0.0d [8 Feb 2011]:
 | 
			
		||||
  Major changes between OpenSSL 0.9.8q and OpenSSL 0.9.8r [8 Feb 2011]:
 | 
			
		||||
 | 
			
		||||
      o Fix for security issue CVE-2011-0014
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.0b and OpenSSL 1.0.0c [2 Dec 2010]:
 | 
			
		||||
  Major changes between OpenSSL 0.9.8p and OpenSSL 0.9.8q [2 Dec 2010]:
 | 
			
		||||
 | 
			
		||||
      o Fix for security issue CVE-2010-4180
 | 
			
		||||
      o Fix for CVE-2010-4252
 | 
			
		||||
      o Fix mishandling of absent EC point format extension.
 | 
			
		||||
      o Fix various platform compilation issues.
 | 
			
		||||
      o Corrected fix for security issue CVE-2010-3864.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.0a and OpenSSL 1.0.0b [16 Nov 2010]:
 | 
			
		||||
  Major changes between OpenSSL 0.9.8o and OpenSSL 0.9.8p [16 Nov 2010]:
 | 
			
		||||
 | 
			
		||||
      o Fix for security issue CVE-2010-3864.
 | 
			
		||||
      o Fix for CVE-2010-2939
 | 
			
		||||
      o Fix WIN32 build system for GOST ENGINE.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 1.0.0 and OpenSSL 1.0.0a [1 Jun 2010]:
 | 
			
		||||
  Major changes between OpenSSL 0.9.8n and OpenSSL 0.9.8o [1 Jun 2010]:
 | 
			
		||||
 | 
			
		||||
      o Fix for security issue CVE-2010-1633.
 | 
			
		||||
      o GOST MAC and CFB fixes.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.8n and OpenSSL 1.0.0 [29 Mar 2010]:
 | 
			
		||||
 | 
			
		||||
      o RFC3280 path validation: sufficient to process PKITS tests.
 | 
			
		||||
      o Integrated support for PVK files and keyblobs.
 | 
			
		||||
      o Change default private key format to PKCS#8.
 | 
			
		||||
      o CMS support: able to process all examples in RFC4134
 | 
			
		||||
      o Streaming ASN1 encode support for PKCS#7 and CMS.
 | 
			
		||||
      o Multiple signer and signer add support for PKCS#7 and CMS.
 | 
			
		||||
      o ASN1 printing support.
 | 
			
		||||
      o Whirlpool hash algorithm added.
 | 
			
		||||
      o RFC3161 time stamp support.
 | 
			
		||||
      o New generalised public key API supporting ENGINE based algorithms.
 | 
			
		||||
      o New generalised public key API utilities.
 | 
			
		||||
      o New ENGINE supporting GOST algorithms.
 | 
			
		||||
      o SSL/TLS GOST ciphersuite support.
 | 
			
		||||
      o PKCS#7 and CMS GOST support.
 | 
			
		||||
      o RFC4279 PSK ciphersuite support.
 | 
			
		||||
      o Supported points format extension for ECC ciphersuites.
 | 
			
		||||
      o ecdsa-with-SHA224/256/384/512 signature types.
 | 
			
		||||
      o dsa-with-SHA224 and dsa-with-SHA256 signature types.
 | 
			
		||||
      o Opaque PRF Input TLS extension support.
 | 
			
		||||
      o Updated time routines to avoid OS limitations.
 | 
			
		||||
      o Fix for security issue CVE-2010-0742.
 | 
			
		||||
      o Various DTLS fixes.
 | 
			
		||||
      o Recognise SHA2 certificates if only SSL algorithms added.
 | 
			
		||||
      o Fix for no-rc4 compilation.
 | 
			
		||||
      o Chil ENGINE unload workaround.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.8m and OpenSSL 0.9.8n [24 Mar 2010]:
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -159,8 +159,6 @@ cd ..\..\..
 | 
			
		||||
echo SHA1
 | 
			
		||||
cd crypto\sha\asm
 | 
			
		||||
perl sha1-586.pl %ASM_MODE% > s1-nw.asm
 | 
			
		||||
perl sha256-586.pl %ASM_MODE% > sha256-nw.asm
 | 
			
		||||
perl sha512-586.pl %ASM_MODE% > sha512-nw.asm
 | 
			
		||||
cd ..\..\..
 | 
			
		||||
 | 
			
		||||
echo RIPEMD160
 | 
			
		||||
@@ -173,11 +171,6 @@ cd crypto\rc5\asm
 | 
			
		||||
perl rc5-586.pl %ASM_MODE% > r5-nw.asm
 | 
			
		||||
cd ..\..\..
 | 
			
		||||
 | 
			
		||||
echo WHIRLPOOL
 | 
			
		||||
cd crypto\whrlpool\asm
 | 
			
		||||
perl wp-mmx.pl %ASM_MODE% > wp-nw.asm
 | 
			
		||||
cd ..\..\..
 | 
			
		||||
 | 
			
		||||
echo CPUID
 | 
			
		||||
cd crypto
 | 
			
		||||
perl x86cpuid.pl %ASM_MODE% > x86cpuid-nw.asm
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										14
									
								
								PROBLEMS
									
									
									
									
									
								
							
							
						
						
									
										14
									
								
								PROBLEMS
									
									
									
									
									
								
							@@ -197,17 +197,3 @@ reconfigure with additional no-sse2 [or 386] option passed to ./config.
 | 
			
		||||
We don't have framework to associate -ldl with no-dso, therefore the only
 | 
			
		||||
way is to edit Makefile right after ./config no-dso and remove -ldl from
 | 
			
		||||
EX_LIBS line.
 | 
			
		||||
 | 
			
		||||
* hpux-parisc2-cc no-asm build fails with SEGV in ECDSA/DH.
 | 
			
		||||
 | 
			
		||||
Compiler bug, presumably at particular patch level. Remaining
 | 
			
		||||
hpux*-parisc*-cc configurations can be affected too. Drop optimization
 | 
			
		||||
level to +O2 when compiling bn_nist.o.
 | 
			
		||||
 | 
			
		||||
* solaris64-sparcv9-cc link failure
 | 
			
		||||
 | 
			
		||||
Solaris 8 ar can fail to maintain symbol table in .a, which results in
 | 
			
		||||
link failures. Apply 109147-09 or later or modify Makefile generated
 | 
			
		||||
by ./Configure solaris64-sparcv9-cc and replace RANLIB assignment with
 | 
			
		||||
 | 
			
		||||
	RANLIB= /usr/ccs/bin/ar rs
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										205
									
								
								README
									
									
									
									
									
								
							
							
						
						
									
										205
									
								
								README
									
									
									
									
									
								
							@@ -1,7 +1,7 @@
 | 
			
		||||
 | 
			
		||||
 OpenSSL 1.0.2g 1 Mar 2016
 | 
			
		||||
 OpenSSL 0.9.8zg 11 Jun 2015
 | 
			
		||||
 | 
			
		||||
 Copyright (c) 1998-2015 The OpenSSL Project
 | 
			
		||||
 Copyright (c) 1998-2011 The OpenSSL Project
 | 
			
		||||
 Copyright (c) 1995-1998 Eric A. Young, Tim J. Hudson
 | 
			
		||||
 All rights reserved.
 | 
			
		||||
 | 
			
		||||
@@ -10,17 +10,17 @@
 | 
			
		||||
 | 
			
		||||
 The OpenSSL Project is a collaborative effort to develop a robust,
 | 
			
		||||
 commercial-grade, fully featured, and Open Source toolkit implementing the
 | 
			
		||||
 Secure Sockets Layer (SSLv3) and Transport Layer Security (TLS) protocols as
 | 
			
		||||
 well as a full-strength general purpose cryptograpic library. The project is
 | 
			
		||||
 managed by a worldwide community of volunteers that use the Internet to
 | 
			
		||||
 communicate, plan, and develop the OpenSSL toolkit and its related
 | 
			
		||||
 documentation.
 | 
			
		||||
 Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1)
 | 
			
		||||
 protocols as well as a full-strength general purpose cryptography library.
 | 
			
		||||
 The project is managed by a worldwide community of volunteers that use the
 | 
			
		||||
 Internet to communicate, plan, and develop the OpenSSL toolkit and its
 | 
			
		||||
 related documentation.
 | 
			
		||||
 | 
			
		||||
 OpenSSL is descended from the SSLeay library developed by Eric A. Young
 | 
			
		||||
 OpenSSL is based on the excellent SSLeay library developed from Eric A. Young
 | 
			
		||||
 and Tim J. Hudson.  The OpenSSL toolkit is licensed under a dual-license (the
 | 
			
		||||
 OpenSSL license plus the SSLeay license), which means that you are free to
 | 
			
		||||
 get and use it for commercial and non-commercial purposes as long as you
 | 
			
		||||
 fulfill the conditions of both licenses.
 | 
			
		||||
 OpenSSL license plus the SSLeay license) situation, which basically means
 | 
			
		||||
 that you are free to get and use it for commercial and non-commercial
 | 
			
		||||
 purposes as long as you fulfill the conditions of both licenses.
 | 
			
		||||
 | 
			
		||||
 OVERVIEW
 | 
			
		||||
 --------
 | 
			
		||||
@@ -28,39 +28,116 @@
 | 
			
		||||
 The OpenSSL toolkit includes:
 | 
			
		||||
 | 
			
		||||
 libssl.a:
 | 
			
		||||
     Provides the client and server-side implementations for SSLv3 and TLS.
 | 
			
		||||
     Implementation of SSLv2, SSLv3, TLSv1 and the required code to support
 | 
			
		||||
     both SSLv2, SSLv3 and TLSv1 in the one server and client.
 | 
			
		||||
 | 
			
		||||
 libcrypto.a:
 | 
			
		||||
     Provides general cryptographic and X.509 support needed by SSL/TLS but
 | 
			
		||||
     not logically part of it.
 | 
			
		||||
     General encryption and X.509 v1/v3 stuff needed by SSL/TLS but not
 | 
			
		||||
     actually logically part of it. It includes routines for the following:
 | 
			
		||||
 | 
			
		||||
     Ciphers
 | 
			
		||||
        libdes - EAY's libdes DES encryption package which was floating
 | 
			
		||||
                 around the net for a few years, and was then relicensed by
 | 
			
		||||
                 him as part of SSLeay.  It includes 15 'modes/variations'
 | 
			
		||||
                 of DES (1, 2 and 3 key versions of ecb, cbc, cfb and ofb;
 | 
			
		||||
                 pcbc and a more general form of cfb and ofb) including desx
 | 
			
		||||
                 in cbc mode, a fast crypt(3), and routines to read
 | 
			
		||||
                 passwords from the keyboard.
 | 
			
		||||
        RC4 encryption,
 | 
			
		||||
        RC2 encryption      - 4 different modes, ecb, cbc, cfb and ofb.
 | 
			
		||||
        Blowfish encryption - 4 different modes, ecb, cbc, cfb and ofb.
 | 
			
		||||
        IDEA encryption     - 4 different modes, ecb, cbc, cfb and ofb.
 | 
			
		||||
 | 
			
		||||
     Digests
 | 
			
		||||
        MD5 and MD2 message digest algorithms, fast implementations,
 | 
			
		||||
        SHA (SHA-0) and SHA-1 message digest algorithms,
 | 
			
		||||
        MDC2 message digest. A DES based hash that is popular on smart cards.
 | 
			
		||||
 | 
			
		||||
     Public Key
 | 
			
		||||
        RSA encryption/decryption/generation.
 | 
			
		||||
            There is no limit on the number of bits.
 | 
			
		||||
        DSA encryption/decryption/generation.
 | 
			
		||||
            There is no limit on the number of bits.
 | 
			
		||||
        Diffie-Hellman key-exchange/key generation.
 | 
			
		||||
            There is no limit on the number of bits.
 | 
			
		||||
 | 
			
		||||
     X.509v3 certificates
 | 
			
		||||
        X509 encoding/decoding into/from binary ASN1 and a PEM
 | 
			
		||||
             based ASCII-binary encoding which supports encryption with a
 | 
			
		||||
             private key.  Program to generate RSA and DSA certificate
 | 
			
		||||
             requests and to generate RSA and DSA certificates.
 | 
			
		||||
 | 
			
		||||
     Systems
 | 
			
		||||
        The normal digital envelope routines and base64 encoding.  Higher
 | 
			
		||||
        level access to ciphers and digests by name.  New ciphers can be
 | 
			
		||||
        loaded at run time.  The BIO io system which is a simple non-blocking
 | 
			
		||||
        IO abstraction.  Current methods supported are file descriptors,
 | 
			
		||||
        sockets, socket accept, socket connect, memory buffer, buffering, SSL
 | 
			
		||||
        client/server, file pointer, encryption, digest, non-blocking testing
 | 
			
		||||
        and null.
 | 
			
		||||
 | 
			
		||||
     Data structures
 | 
			
		||||
        A dynamically growing hashing system
 | 
			
		||||
        A simple stack.
 | 
			
		||||
        A Configuration loader that uses a format similar to MS .ini files.
 | 
			
		||||
 | 
			
		||||
 openssl:
 | 
			
		||||
     A command line tool that can be used for:
 | 
			
		||||
        Creation of key parameters
 | 
			
		||||
        Creation of RSA, DH and DSA key parameters
 | 
			
		||||
        Creation of X.509 certificates, CSRs and CRLs
 | 
			
		||||
        Calculation of message digests
 | 
			
		||||
        Encryption and decryption
 | 
			
		||||
        SSL/TLS client and server tests
 | 
			
		||||
        Calculation of Message Digests
 | 
			
		||||
        Encryption and Decryption with Ciphers
 | 
			
		||||
        SSL/TLS Client and Server Tests
 | 
			
		||||
        Handling of S/MIME signed or encrypted mail
 | 
			
		||||
        And more...
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
 PATENTS
 | 
			
		||||
 -------
 | 
			
		||||
 | 
			
		||||
 Various companies hold various patents for various algorithms in various
 | 
			
		||||
 locations around the world. _YOU_ are responsible for ensuring that your use
 | 
			
		||||
 of any algorithms is legal by checking if there are any patents in your
 | 
			
		||||
 country.  The file contains some of the patents that we know about or are
 | 
			
		||||
 rumored to exist. This is not a definitive list.
 | 
			
		||||
 | 
			
		||||
 RSA Security holds software patents on the RC5 algorithm.  If you
 | 
			
		||||
 intend to use this cipher, you must contact RSA Security for
 | 
			
		||||
 licensing conditions. Their web page is http://www.rsasecurity.com/.
 | 
			
		||||
 | 
			
		||||
 RC4 is a trademark of RSA Security, so use of this label should perhaps
 | 
			
		||||
 only be used with RSA Security's permission.
 | 
			
		||||
 | 
			
		||||
 The IDEA algorithm is patented by Ascom in Austria, France, Germany, Italy,
 | 
			
		||||
 Japan, the Netherlands, Spain, Sweden, Switzerland, UK and the USA.  They
 | 
			
		||||
 should be contacted if that algorithm is to be used; their web page is
 | 
			
		||||
 http://www.ascom.ch/.
 | 
			
		||||
 | 
			
		||||
 NTT and Mitsubishi have patents and pending patents on the Camellia
 | 
			
		||||
 algorithm, but allow use at no charge without requiring an explicit
 | 
			
		||||
 licensing agreement: http://info.isl.ntt.co.jp/crypt/eng/info/chiteki.html
 | 
			
		||||
 | 
			
		||||
 INSTALLATION
 | 
			
		||||
 ------------
 | 
			
		||||
 | 
			
		||||
 See the appropriate file:
 | 
			
		||||
        INSTALL         Linux, Unix, etc.
 | 
			
		||||
        INSTALL.DJGPP   DOS platform with DJGPP
 | 
			
		||||
        INSTALL.NW      Netware
 | 
			
		||||
        INSTALL.OS2     OS/2
 | 
			
		||||
        INSTALL.VMS     VMS
 | 
			
		||||
        INSTALL.W32     Windows (32bit)
 | 
			
		||||
        INSTALL.W64     Windows (64bit)
 | 
			
		||||
        INSTALL.WCE     Windows CE
 | 
			
		||||
 To install this package under a Unix derivative, read the INSTALL file.  For
 | 
			
		||||
 a Win32 platform, read the INSTALL.W32 file.  For OpenVMS systems, read
 | 
			
		||||
 INSTALL.VMS.
 | 
			
		||||
 | 
			
		||||
 Read the documentation in the doc/ directory.  It is quite rough, but it
 | 
			
		||||
 lists the functions; you will probably have to look at the code to work out
 | 
			
		||||
 how to use them. Look at the example programs.
 | 
			
		||||
 | 
			
		||||
 PROBLEMS
 | 
			
		||||
 --------
 | 
			
		||||
 | 
			
		||||
 For some platforms, there are some known problems that may affect the user
 | 
			
		||||
 or application author.  We try to collect those in doc/PROBLEMS, with current
 | 
			
		||||
 thoughts on how they should be solved in a future of OpenSSL.
 | 
			
		||||
 | 
			
		||||
 SUPPORT
 | 
			
		||||
 -------
 | 
			
		||||
 | 
			
		||||
 See the OpenSSL website www.openssl.org for details on how to obtain
 | 
			
		||||
 See the OpenSSL website www.openssl.org for details of how to obtain
 | 
			
		||||
 commercial technical support.
 | 
			
		||||
 | 
			
		||||
 If you have any problems with OpenSSL then please take the following steps
 | 
			
		||||
@@ -84,36 +161,58 @@
 | 
			
		||||
    - Problem Description (steps that will reproduce the problem, if known)
 | 
			
		||||
    - Stack Traceback (if the application dumps core)
 | 
			
		||||
 | 
			
		||||
 Email the report to:
 | 
			
		||||
 Report the bug to the OpenSSL project via the Request Tracker
 | 
			
		||||
 (http://www.openssl.org/support/rt.html) by mail to:
 | 
			
		||||
 | 
			
		||||
    rt@openssl.org
 | 
			
		||||
    openssl-bugs@openssl.org
 | 
			
		||||
 | 
			
		||||
 In order to avoid spam, this is a moderated mailing list, and it might
 | 
			
		||||
 take a day for the ticket to show up.  (We also scan posts to make sure
 | 
			
		||||
 that security disclosures aren't publically posted by mistake.) Mail
 | 
			
		||||
 to this address is recorded in the public RT (request tracker) database
 | 
			
		||||
 (see https://www.openssl.org/community/index.html#bugs for details) and
 | 
			
		||||
 also forwarded the public openssl-dev mailing list.  Confidential mail
 | 
			
		||||
 may be sent to openssl-security@openssl.org (PGP key available from the
 | 
			
		||||
 key servers).
 | 
			
		||||
 Note that the request tracker should NOT be used for general assistance
 | 
			
		||||
 or support queries. Just because something doesn't work the way you expect
 | 
			
		||||
 does not mean it is necessarily a bug in OpenSSL.
 | 
			
		||||
 | 
			
		||||
 Please do NOT use this for general assistance or support queries.
 | 
			
		||||
 Just because something doesn't work the way you expect does not mean it
 | 
			
		||||
 is necessarily a bug in OpenSSL.
 | 
			
		||||
 | 
			
		||||
 You can also make GitHub pull requests. If you do this, please also send
 | 
			
		||||
 mail to rt@openssl.org with a link to the PR so that we can more easily
 | 
			
		||||
 keep track of it.
 | 
			
		||||
 Note that mail to openssl-bugs@openssl.org is recorded in the publicly
 | 
			
		||||
 readable request tracker database and is forwarded to a public
 | 
			
		||||
 mailing list. Confidential mail may be sent to openssl-security@openssl.org
 | 
			
		||||
 (PGP key available from the key servers).
 | 
			
		||||
 | 
			
		||||
 HOW TO CONTRIBUTE TO OpenSSL
 | 
			
		||||
 ----------------------------
 | 
			
		||||
 | 
			
		||||
 See CONTRIBUTING
 | 
			
		||||
 Development is coordinated on the openssl-dev mailing list (see
 | 
			
		||||
 http://www.openssl.org for information on subscribing). If you
 | 
			
		||||
 would like to submit a patch, send it to openssl-bugs@openssl.org with
 | 
			
		||||
 the string "[PATCH]" in the subject. Please be sure to include a
 | 
			
		||||
 textual explanation of what your patch does.
 | 
			
		||||
 | 
			
		||||
 LEGALITIES
 | 
			
		||||
 ----------
 | 
			
		||||
 If you are unsure as to whether a feature will be useful for the general
 | 
			
		||||
 OpenSSL community please discuss it on the openssl-dev mailing list first.
 | 
			
		||||
 Someone may be already working on the same thing or there may be a good
 | 
			
		||||
 reason as to why that feature isn't implemented.
 | 
			
		||||
 | 
			
		||||
 Patches should be as up to date as possible, preferably relative to the
 | 
			
		||||
 current Git or the last snapshot. They should follow the coding style of
 | 
			
		||||
 OpenSSL and compile without warnings. Some of the core team developer targets
 | 
			
		||||
 can be used for testing purposes, (debug-steve64, debug-geoff etc). OpenSSL
 | 
			
		||||
 compiles on many varied platforms: try to ensure you only use portable
 | 
			
		||||
 features.
 | 
			
		||||
 | 
			
		||||
 Note: For legal reasons, contributions from the US can be accepted only
 | 
			
		||||
 if a TSU notification and a copy of the patch are sent to crypt@bis.doc.gov
 | 
			
		||||
 (formerly BXA) with a copy to the ENC Encryption Request Coordinator;
 | 
			
		||||
 please take some time to look at
 | 
			
		||||
    http://www.bis.doc.gov/Encryption/PubAvailEncSourceCodeNofify.html [sic]
 | 
			
		||||
 and
 | 
			
		||||
    http://w3.access.gpo.gov/bis/ear/pdf/740.pdf (EAR Section 740.13(e))
 | 
			
		||||
 for the details. If "your encryption source code is too large to serve as
 | 
			
		||||
 an email attachment", they are glad to receive it by fax instead; hope you
 | 
			
		||||
 have a cheap long-distance plan.
 | 
			
		||||
 | 
			
		||||
 Our preferred format for changes is "diff -u" output. You might
 | 
			
		||||
 generate it like this:
 | 
			
		||||
 | 
			
		||||
 # cd openssl-work
 | 
			
		||||
 # [your changes]
 | 
			
		||||
 # ./Configure dist; make clean
 | 
			
		||||
 # cd ..
 | 
			
		||||
 # diff -ur openssl-orig openssl-work > mydiffs.patch
 | 
			
		||||
 | 
			
		||||
 A number of nations, in particular the U.S., restrict the use or export
 | 
			
		||||
 of cryptography. If you are potentially subject to such restrictions
 | 
			
		||||
 you should seek competent professional legal advice before attempting to
 | 
			
		||||
 develop or distribute cryptographic code.
 | 
			
		||||
 
 | 
			
		||||
@@ -1,67 +0,0 @@
 | 
			
		||||
$! install-vms.com -- Installs the files in a given directory tree
 | 
			
		||||
$!
 | 
			
		||||
$! Author: Richard Levitte <richard@levitte.org>
 | 
			
		||||
$! Time of creation: 23-MAY-1998 19:22
 | 
			
		||||
$!
 | 
			
		||||
$! P1	root of the directory tree
 | 
			
		||||
$!
 | 
			
		||||
$!
 | 
			
		||||
$! Announce/identify.
 | 
			
		||||
$!
 | 
			
		||||
$ proc = f$environment( "procedure")
 | 
			
		||||
$ write sys$output "@@@ "+ -
 | 
			
		||||
   f$parse( proc, , , "name")+ f$parse( proc, , , "type")
 | 
			
		||||
$!
 | 
			
		||||
$ on error then goto tidy
 | 
			
		||||
$ on control_c then goto tidy
 | 
			
		||||
$!
 | 
			
		||||
$ if p1 .eqs. ""
 | 
			
		||||
$ then
 | 
			
		||||
$   write sys$output "First argument missing."
 | 
			
		||||
$   write sys$output -
 | 
			
		||||
     "Should be the directory where you want things installed."
 | 
			
		||||
$   exit
 | 
			
		||||
$ endif
 | 
			
		||||
$
 | 
			
		||||
$ if (f$getsyi( "cpu") .lt. 128)
 | 
			
		||||
$ then
 | 
			
		||||
$   arch = "VAX"
 | 
			
		||||
$ else
 | 
			
		||||
$   arch = f$edit( f$getsyi( "arch_name"), "upcase")
 | 
			
		||||
$   if (arch .eqs. "") then arch = "UNK"
 | 
			
		||||
$ endif
 | 
			
		||||
$
 | 
			
		||||
$ root = f$parse( P1, "[]A.;0", , , "SYNTAX_ONLY, NO_CONCEAL")- "A.;0"
 | 
			
		||||
$ root_dev = f$parse( root, , , "device", "syntax_only")
 | 
			
		||||
$ root_dir = f$parse( root, , , "directory", "syntax_only") - -
 | 
			
		||||
   "[000000." - "][" - "[" - "]"
 | 
			
		||||
$ root = root_dev + "[" + root_dir
 | 
			
		||||
$
 | 
			
		||||
$ define /nolog wrk_sslroot 'root'.] /translation_attributes = concealed
 | 
			
		||||
$ define /nolog wrk_sslinclude wrk_sslroot:[include]
 | 
			
		||||
$
 | 
			
		||||
$ if f$parse( "wrk_sslroot:[000000]") .eqs. "" then -
 | 
			
		||||
   create /directory /log wrk_sslroot:[000000]
 | 
			
		||||
$ if f$parse( "wrk_sslinclude:") .eqs. "" then -
 | 
			
		||||
   create /directory /log wrk_sslinclude:
 | 
			
		||||
$ if f$parse( "wrk_sslroot:[vms]") .eqs. "" then -
 | 
			
		||||
   create /directory /log wrk_sslroot:[vms]
 | 
			
		||||
$!
 | 
			
		||||
$ copy /log /protection = world:re openssl_startup.com wrk_sslroot:[vms]
 | 
			
		||||
$ copy /log /protection = world:re openssl_undo.com wrk_sslroot:[vms]
 | 
			
		||||
$ copy /log /protection = world:re openssl_utils.com wrk_sslroot:[vms]
 | 
			
		||||
$!
 | 
			
		||||
$ tidy:
 | 
			
		||||
$!
 | 
			
		||||
$ call deass wrk_sslroot
 | 
			
		||||
$ call deass wrk_sslinclude
 | 
			
		||||
$!
 | 
			
		||||
$ exit
 | 
			
		||||
$!
 | 
			
		||||
$ deass: subroutine
 | 
			
		||||
$ if (f$trnlnm( p1, "LNM$PROCESS") .nes. "")
 | 
			
		||||
$ then
 | 
			
		||||
$   deassign /process 'p1'
 | 
			
		||||
$ endif
 | 
			
		||||
$ endsubroutine
 | 
			
		||||
$!
 | 
			
		||||
							
								
								
									
										79
									
								
								VMS/install.com
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										79
									
								
								VMS/install.com
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,79 @@
 | 
			
		||||
$! INSTALL.COM -- Installs the files in a given directory tree
 | 
			
		||||
$!
 | 
			
		||||
$! Author: Richard Levitte <richard@levitte.org>
 | 
			
		||||
$! Time of creation: 23-MAY-1998 19:22
 | 
			
		||||
$!
 | 
			
		||||
$! P1	root of the directory tree
 | 
			
		||||
$!
 | 
			
		||||
$	IF P1 .EQS. ""
 | 
			
		||||
$	THEN
 | 
			
		||||
$	    WRITE SYS$OUTPUT "First argument missing."
 | 
			
		||||
$	    WRITE SYS$OUTPUT "Should be the directory where you want things installed."
 | 
			
		||||
$	    EXIT
 | 
			
		||||
$	ENDIF
 | 
			
		||||
$
 | 
			
		||||
$	IF (F$GETSYI("CPU").LT.128)
 | 
			
		||||
$	THEN
 | 
			
		||||
$	    ARCH := VAX
 | 
			
		||||
$	ELSE
 | 
			
		||||
$	    ARCH = F$EDIT( F$GETSYI( "ARCH_NAME"), "UPCASE")
 | 
			
		||||
$	    IF (ARCH .EQS. "") THEN ARCH = "UNK"
 | 
			
		||||
$	ENDIF
 | 
			
		||||
$
 | 
			
		||||
$	ROOT = F$PARSE(P1,"[]A.;0",,,"SYNTAX_ONLY,NO_CONCEAL") - "A.;0"
 | 
			
		||||
$	ROOT_DEV = F$PARSE(ROOT,,,"DEVICE","SYNTAX_ONLY")
 | 
			
		||||
$	ROOT_DIR = F$PARSE(ROOT,,,"DIRECTORY","SYNTAX_ONLY") -
 | 
			
		||||
		   - "[000000." - "][" - "[" - "]"
 | 
			
		||||
$	ROOT = ROOT_DEV + "[" + ROOT_DIR
 | 
			
		||||
$
 | 
			
		||||
$	DEFINE/NOLOG WRK_SSLROOT 'ROOT'.] /TRANS=CONC
 | 
			
		||||
$	DEFINE/NOLOG WRK_SSLINCLUDE WRK_SSLROOT:[INCLUDE]
 | 
			
		||||
$
 | 
			
		||||
$	IF F$PARSE("WRK_SSLROOT:[000000]") .EQS. "" THEN -
 | 
			
		||||
	   CREATE/DIR/LOG WRK_SSLROOT:[000000]
 | 
			
		||||
$	IF F$PARSE("WRK_SSLINCLUDE:") .EQS. "" THEN -
 | 
			
		||||
	   CREATE/DIR/LOG WRK_SSLINCLUDE:
 | 
			
		||||
$	IF F$PARSE("WRK_SSLROOT:[VMS]") .EQS. "" THEN -
 | 
			
		||||
	   CREATE/DIR/LOG WRK_SSLROOT:[VMS]
 | 
			
		||||
$
 | 
			
		||||
$	IF F$SEARCH("WRK_SSLINCLUDE:vms_idhacks.h") .NES. "" THEN -
 | 
			
		||||
	   DELETE WRK_SSLINCLUDE:vms_idhacks.h;*
 | 
			
		||||
$
 | 
			
		||||
$	OPEN/WRITE SF WRK_SSLROOT:[VMS]OPENSSL_STARTUP.COM
 | 
			
		||||
$	WRITE SYS$OUTPUT "%OPEN-I-CREATED,  ",F$SEARCH("WRK_SSLROOT:[VMS]OPENSSL_STARTUP.COM")," created."
 | 
			
		||||
$	WRITE SF "$! Startup file for Openssl"
 | 
			
		||||
$	WRITE SF "$!"
 | 
			
		||||
$	WRITE SF "$! Do not edit this file, as it will be regenerated during next installation."
 | 
			
		||||
$	WRITE SF "$! Instead, add or change SSLROOT:[VMS]OPENSSL_SYSTARTUP.COM"
 | 
			
		||||
$	WRITE SF "$!"
 | 
			
		||||
$	WRITE SF "$! P1	a qualifier to DEFINE.  For example ""/SYSTEM"" to get the logical names"
 | 
			
		||||
$	WRITE SF "$!	defined in the system logical name table."
 | 
			
		||||
$	WRITE SF "$!"
 | 
			
		||||
$	WRITE SF "$	IF (F$GETSYI(""CPU"").LT.128)"
 | 
			
		||||
$	WRITE SF "$	THEN"
 | 
			
		||||
$	WRITE SF "$	    ARCH := VAX"
 | 
			
		||||
$	WRITE SF "$	ELSE"
 | 
			
		||||
$	WRITE SF "$	    ARCH = F$EDIT( F$GETSYI( ""ARCH_NAME""), ""UPCASE"")"
 | 
			
		||||
$	WRITE SF "$	    IF (ARCH .EQS. """") THEN ARCH = ""UNK"""
 | 
			
		||||
$	WRITE SF "$	ENDIF"
 | 
			
		||||
$	WRITE SF "$	DEFINE/NOLOG'P1	SSLROOT		",ROOT,".] /TRANS=CONC"
 | 
			
		||||
$	WRITE SF "$	DEFINE/NOLOG'P1	SSLLIB		SSLROOT:['ARCH'_LIB]"
 | 
			
		||||
$	WRITE SF "$	DEFINE/NOLOG'P1	SSLINCLUDE	SSLROOT:[INCLUDE]"
 | 
			
		||||
$	WRITE SF "$	DEFINE/NOLOG'P1	SSLEXE		SSLROOT:['ARCH'_EXE]"
 | 
			
		||||
$	WRITE SF "$	DEFINE/NOLOG'P1	SSLCERTS	SSLROOT:[CERTS]"
 | 
			
		||||
$	WRITE SF "$	DEFINE/NOLOG'P1	SSLPRIVATE	SSLROOT:[PRIVATE]"
 | 
			
		||||
$	WRITE SF "$"
 | 
			
		||||
$	WRITE SF "$!	This is program can include <openssl/{foo}.h>"
 | 
			
		||||
$	WRITE SF "$	DEFINE/NOLOG'P1	OPENSSL		SSLINCLUDE:"
 | 
			
		||||
$	WRITE SF "$"
 | 
			
		||||
$	WRITE SF "$	IF F$SEARCH(""SSLROOT:[VMS]OPENSSL_SYSTARTUP.COM"") .NES."""" THEN -"
 | 
			
		||||
$	WRITE SF "	   @SSLROOT:[VMS]OPENSSL_SYSTARTUP.COM"
 | 
			
		||||
$	WRITE SF "$"
 | 
			
		||||
$	WRITE SF "$	EXIT"
 | 
			
		||||
$	CLOSE SF
 | 
			
		||||
$	SET FILE/PROT=WORLD:RE WRK_SSLROOT:[VMS]OPENSSL_STARTUP.COM
 | 
			
		||||
$
 | 
			
		||||
$	COPY OPENSSL_UTILS.COM WRK_SSLROOT:[VMS]/LOG
 | 
			
		||||
$	SET FILE/PROT=WORLD:RE WRK_SSLROOT:[VMS]OPENSSL_UTILS.COM
 | 
			
		||||
$
 | 
			
		||||
$	EXIT
 | 
			
		||||
							
								
								
									
										259
									
								
								VMS/mkshared.com
									
									
									
									
									
								
							
							
						
						
									
										259
									
								
								VMS/mkshared.com
									
									
									
									
									
								
							@@ -1,166 +1,85 @@
 | 
			
		||||
$! MKSHARED.COM -- Create shareable images.
 | 
			
		||||
$! MKSHARED.COM -- script to created shareable images on VMS
 | 
			
		||||
$!
 | 
			
		||||
$! P1: "64" for 64-bit pointers.
 | 
			
		||||
$! No command line parameters.  This should be run at the start of the source
 | 
			
		||||
$! tree (the same directory where one finds INSTALL.VMS).
 | 
			
		||||
$!
 | 
			
		||||
$! P2: Zlib object library path (optional).
 | 
			
		||||
$!
 | 
			
		||||
$! Input:	[.UTIL]LIBEAY.NUM,[.xxx.EXE.CRYPTO]SSL_LIBCRYPTO[32].OLB
 | 
			
		||||
$!		[.UTIL]SSLEAY.NUM,[.xxx.EXE.SSL]SSL_LIBSSL[32].OLB
 | 
			
		||||
$!		[.CRYPTO.xxx]OPENSSLCONF.H
 | 
			
		||||
$! Output:	[.xxx.EXE.CRYPTO]SSL_LIBCRYPTO_SHR[32].OPT,.MAP,.EXE
 | 
			
		||||
$!		[.xxx.EXE.SSL]SSL_LIBSSL_SRH[32].OPT,.MAP,.EXE
 | 
			
		||||
$! Input:	[.UTIL]LIBEAY.NUM,[.xxx.EXE.CRYPTO]LIBCRYPTO.OLB
 | 
			
		||||
$!		[.UTIL]SSLEAY.NUM,[.xxx.EXE.SSL]LIBSSL.OLB
 | 
			
		||||
$! Output:	[.xxx.EXE.CRYPTO]LIBCRYPTO.OPT,.MAP,.EXE
 | 
			
		||||
$!		[.xxx.EXE.SSL]LIBSSL.OPT,.MAP,.EXE
 | 
			
		||||
$!
 | 
			
		||||
$! So far, tests have only been made on VMS for Alpha.  VAX will come in time.
 | 
			
		||||
$! ===========================================================================
 | 
			
		||||
$!
 | 
			
		||||
$! Announce/identify.
 | 
			
		||||
$!
 | 
			
		||||
$ proc = f$environment( "procedure")
 | 
			
		||||
$ write sys$output "@@@ "+ -
 | 
			
		||||
   f$parse( proc, , , "name")+ f$parse( proc, , , "type")
 | 
			
		||||
$!
 | 
			
		||||
$! Save the original default device:[directory].
 | 
			
		||||
$!
 | 
			
		||||
$ def_orig = f$environment( "default")
 | 
			
		||||
$ on error then goto tidy
 | 
			
		||||
$ on control_c then goto tidy
 | 
			
		||||
$!
 | 
			
		||||
$! SET DEFAULT to the main kit directory.
 | 
			
		||||
$!
 | 
			
		||||
$ proc = f$environment("procedure")
 | 
			
		||||
$ proc = f$parse( "A.;", proc)- "A.;"
 | 
			
		||||
$ set default 'proc'
 | 
			
		||||
$ set default [-]
 | 
			
		||||
$!
 | 
			
		||||
$
 | 
			
		||||
$! ----- Prepare info for processing: version number and file info
 | 
			
		||||
$ gosub read_version_info
 | 
			
		||||
$ if libver .eqs. ""
 | 
			
		||||
$ then
 | 
			
		||||
$   write sys$error "ERROR: Couldn't find any library version info..."
 | 
			
		||||
$   go to tidy:
 | 
			
		||||
$   exit
 | 
			
		||||
$ endif
 | 
			
		||||
$
 | 
			
		||||
$ if (f$getsyi("cpu") .lt. 128)
 | 
			
		||||
$ if (f$getsyi("cpu").lt.128)
 | 
			
		||||
$ then
 | 
			
		||||
$   arch_vax = 1
 | 
			
		||||
$   arch = "VAX"
 | 
			
		||||
$     arch := VAX
 | 
			
		||||
$ else
 | 
			
		||||
$     arch = f$edit( f$getsyi( "ARCH_NAME"), "UPCASE")
 | 
			
		||||
$     if (arch .eqs. "") then arch = "UNK"
 | 
			
		||||
$ endif
 | 
			
		||||
$
 | 
			
		||||
$ if arch .nes. "VAX"
 | 
			
		||||
$ then
 | 
			
		||||
$   arch_vax = 0
 | 
			
		||||
$   arch = f$edit( f$getsyi( "ARCH_NAME"), "UPCASE")
 | 
			
		||||
$   if (arch .eqs. "") then arch = "UNK"
 | 
			
		||||
$ endif
 | 
			
		||||
$!
 | 
			
		||||
$ archd = arch
 | 
			
		||||
$ lib32 = "32"
 | 
			
		||||
$ shr = "SHR32"
 | 
			
		||||
$!
 | 
			
		||||
$ if (p1 .nes. "")
 | 
			
		||||
$ then
 | 
			
		||||
$   if (p1 .eqs. "64")
 | 
			
		||||
$   then
 | 
			
		||||
$     archd = arch+ "_64"
 | 
			
		||||
$     lib32 = ""
 | 
			
		||||
$     shr = "SHR"
 | 
			
		||||
$   else
 | 
			
		||||
$     if (p1 .nes. "32")
 | 
			
		||||
$     then
 | 
			
		||||
$       write sys$output "Second argument invalid."
 | 
			
		||||
$       write sys$output "It should be "32", "64", or nothing."
 | 
			
		||||
$       exit
 | 
			
		||||
$     endif
 | 
			
		||||
$   endif
 | 
			
		||||
$ endif
 | 
			
		||||
$!
 | 
			
		||||
$! ----- Prepare info for processing: disabled algorithms info
 | 
			
		||||
$ gosub read_disabled_algorithms_info
 | 
			
		||||
$!
 | 
			
		||||
$ ZLIB = p2
 | 
			
		||||
$ zlib_lib = ""
 | 
			
		||||
$ if (ZLIB .nes. "")
 | 
			
		||||
$ then
 | 
			
		||||
$   file2 = f$parse( ZLIB, "libz.olb", , , "syntax_only")
 | 
			
		||||
$   if (f$search( file2) .eqs. "")
 | 
			
		||||
$   then
 | 
			
		||||
$     write sys$output ""
 | 
			
		||||
$     write sys$output "The Option ", ZLIB, " Is Invalid."
 | 
			
		||||
$     write sys$output "    Can't find library: ''file2'"
 | 
			
		||||
$     write sys$output ""
 | 
			
		||||
$     goto tidy
 | 
			
		||||
$   endif
 | 
			
		||||
$   zlib_lib = ", ''file2' /library"
 | 
			
		||||
$ endif
 | 
			
		||||
$!
 | 
			
		||||
$ if (arch_vax)
 | 
			
		||||
$ then
 | 
			
		||||
$   libid  = "Crypto"
 | 
			
		||||
$   libnum = "[.UTIL]LIBEAY.NUM"
 | 
			
		||||
$   libdir = "[.''ARCH'.EXE.CRYPTO]"
 | 
			
		||||
$   libolb = "''libdir'LIBCRYPTO.OLB"
 | 
			
		||||
$   libopt = "''libdir'LIBCRYPTO.OPT"
 | 
			
		||||
$   libmap = "''libdir'LIBCRYPTO.MAP"
 | 
			
		||||
$   libgoal= "''libdir'LIBCRYPTO.EXE"
 | 
			
		||||
$   libref = ""
 | 
			
		||||
$   gosub create_nonvax_shr
 | 
			
		||||
$   libid  = "SSL"
 | 
			
		||||
$   libnum = "[.UTIL]SSLEAY.NUM"
 | 
			
		||||
$   libdir = "[.''ARCH'.EXE.SSL]"
 | 
			
		||||
$   libolb = "''libdir'LIBSSL.OLB"
 | 
			
		||||
$   libopt = "''libdir'LIBSSL.OPT"
 | 
			
		||||
$   libmap = "''libdir'LIBSSL.MAP"
 | 
			
		||||
$   libgoal= "''libdir'LIBSSL.EXE"
 | 
			
		||||
$   libref = "[.''ARCH'.EXE.CRYPTO]LIBCRYPTO.EXE"
 | 
			
		||||
$   gosub create_nonvax_shr
 | 
			
		||||
$ else
 | 
			
		||||
$   arch_vax = 1
 | 
			
		||||
$   libtit = "CRYPTO_TRANSFER_VECTOR"
 | 
			
		||||
$   libid  = "Crypto"
 | 
			
		||||
$   libnum = "[.UTIL]LIBEAY.NUM"
 | 
			
		||||
$   libdir = "[.''ARCHD'.EXE.CRYPTO]"
 | 
			
		||||
$   libmar = "''libdir'SSL_LIBCRYPTO_''shr'.MAR"
 | 
			
		||||
$   libolb = "''libdir'SSL_LIBCRYPTO''lib32'.OLB"
 | 
			
		||||
$   libopt = "''libdir'SSL_LIBCRYPTO_''shr'.OPT"
 | 
			
		||||
$   libobj = "''libdir'SSL_LIBCRYPTO_''shr'.OBJ"
 | 
			
		||||
$   libmap = "''libdir'SSL_LIBCRYPTO_''shr'.MAP"
 | 
			
		||||
$   libgoal= "''libdir'SSL_LIBCRYPTO_''shr'.EXE"
 | 
			
		||||
$   libdir = "[.''ARCH'.EXE.CRYPTO]"
 | 
			
		||||
$   libmar = "''libdir'LIBCRYPTO.MAR"
 | 
			
		||||
$   libolb = "''libdir'LIBCRYPTO.OLB"
 | 
			
		||||
$   libopt = "''libdir'LIBCRYPTO.OPT"
 | 
			
		||||
$   libobj = "''libdir'LIBCRYPTO.OBJ"
 | 
			
		||||
$   libmap = "''libdir'LIBCRYPTO.MAP"
 | 
			
		||||
$   libgoal= "''libdir'LIBCRYPTO.EXE"
 | 
			
		||||
$   libref = ""
 | 
			
		||||
$   libvec = "LIBCRYPTO"
 | 
			
		||||
$   if f$search( libolb) .nes. "" then gosub create_vax_shr
 | 
			
		||||
$   gosub create_vax_shr
 | 
			
		||||
$   libtit = "SSL_TRANSFER_VECTOR"
 | 
			
		||||
$   libid  = "SSL"
 | 
			
		||||
$   libnum = "[.UTIL]SSLEAY.NUM"
 | 
			
		||||
$   libdir = "[.''ARCHD'.EXE.SSL]"
 | 
			
		||||
$   libmar = "''libdir'SSL_LIBSSL_''shr'.MAR"
 | 
			
		||||
$   libolb = "''libdir'SSL_LIBSSL''lib32'.OLB"
 | 
			
		||||
$   libopt = "''libdir'SSL_LIBSSL_''shr'.OPT"
 | 
			
		||||
$   libobj = "''libdir'SSL_LIBSSL_''shr'.OBJ"
 | 
			
		||||
$   libmap = "''libdir'SSL_LIBSSL_''shr'.MAP"
 | 
			
		||||
$   libgoal= "''libdir'SSL_LIBSSL_''shr'.EXE"
 | 
			
		||||
$   libref = "[.''ARCHD'.EXE.CRYPTO]SSL_LIBCRYPTO_''shr'.EXE"
 | 
			
		||||
$   libdir = "[.''ARCH'.EXE.SSL]"
 | 
			
		||||
$   libmar = "''libdir'LIBSSL.MAR"
 | 
			
		||||
$   libolb = "''libdir'LIBSSL.OLB"
 | 
			
		||||
$   libopt = "''libdir'LIBSSL.OPT"
 | 
			
		||||
$   libobj = "''libdir'LIBSSL.OBJ"
 | 
			
		||||
$   libmap = "''libdir'LIBSSL.MAP"
 | 
			
		||||
$   libgoal= "''libdir'LIBSSL.EXE"
 | 
			
		||||
$   libref = "[.''ARCH'.EXE.CRYPTO]LIBCRYPTO.EXE"
 | 
			
		||||
$   libvec = "LIBSSL"
 | 
			
		||||
$   if f$search( libolb) .nes. "" then gosub create_vax_shr
 | 
			
		||||
$ else
 | 
			
		||||
$   libid  = "Crypto"
 | 
			
		||||
$   libnum = "[.UTIL]LIBEAY.NUM"
 | 
			
		||||
$   libdir = "[.''ARCHD'.EXE.CRYPTO]"
 | 
			
		||||
$   libolb = "''libdir'SSL_LIBCRYPTO''lib32'.OLB"
 | 
			
		||||
$   libopt = "''libdir'SSL_LIBCRYPTO_''shr'.OPT"
 | 
			
		||||
$   libmap = "''libdir'SSL_LIBCRYPTO_''shr'.MAP"
 | 
			
		||||
$   libgoal= "''libdir'SSL_LIBCRYPTO_''shr'.EXE"
 | 
			
		||||
$   libref = ""
 | 
			
		||||
$   if f$search( libolb) .nes. "" then gosub create_nonvax_shr
 | 
			
		||||
$   libid  = "SSL"
 | 
			
		||||
$   libnum = "[.UTIL]SSLEAY.NUM"
 | 
			
		||||
$   libdir = "[.''ARCHD'.EXE.SSL]"
 | 
			
		||||
$   libolb = "''libdir'SSL_LIBSSL''lib32'.OLB"
 | 
			
		||||
$   libopt = "''libdir'SSL_LIBSSL_''shr'.OPT"
 | 
			
		||||
$   libmap = "''libdir'SSL_LIBSSL_''shr'.MAP"
 | 
			
		||||
$   libgoal= "''libdir'SSL_LIBSSL_''shr'.EXE"
 | 
			
		||||
$   libref = "[.''ARCHD'.EXE.CRYPTO]SSL_LIBCRYPTO_''shr'.EXE"
 | 
			
		||||
$   if f$search( libolb) .nes. "" then gosub create_nonvax_shr
 | 
			
		||||
$   gosub create_vax_shr
 | 
			
		||||
$ endif
 | 
			
		||||
$!
 | 
			
		||||
$ tidy:
 | 
			
		||||
$!
 | 
			
		||||
$! Close any open files.
 | 
			
		||||
$!
 | 
			
		||||
$ if (f$trnlnm( "libnum", "LNM$PROCESS", 0, "SUPERVISOR") .nes. "") then -
 | 
			
		||||
   close libnum
 | 
			
		||||
$!
 | 
			
		||||
$ if (f$trnlnm( "mar", "LNM$PROCESS", 0, "SUPERVISOR") .nes. "") then -
 | 
			
		||||
   close mar
 | 
			
		||||
$!
 | 
			
		||||
$ if (f$trnlnm( "opt", "LNM$PROCESS", 0, "SUPERVISOR") .nes. "") then -
 | 
			
		||||
   close opt
 | 
			
		||||
$!
 | 
			
		||||
$ if (f$trnlnm( "vf", "LNM$PROCESS", 0, "SUPERVISOR") .nes. "") then -
 | 
			
		||||
   close vf
 | 
			
		||||
$!
 | 
			
		||||
$! Restore the original default device:[directory].
 | 
			
		||||
$!
 | 
			
		||||
$ set default 'def_orig'
 | 
			
		||||
$ exit
 | 
			
		||||
$
 | 
			
		||||
$! ----- Subroutines to build the shareable libraries
 | 
			
		||||
$! ----- Soubroutines to build the shareable libraries
 | 
			
		||||
$! For each supported architecture, there's a main shareable library
 | 
			
		||||
$! creator, which is called from the main code above.
 | 
			
		||||
$! The creator will define a number of variables to tell the next levels of
 | 
			
		||||
@@ -192,9 +111,9 @@ $! ----- Subroutines for non-VAX
 | 
			
		||||
$! -----
 | 
			
		||||
$! The creator routine
 | 
			
		||||
$ create_nonvax_shr:
 | 
			
		||||
$   open /write opt 'libopt'
 | 
			
		||||
$   open/write opt 'libopt'
 | 
			
		||||
$   write opt "identification=""",libid," ",libverstr,""""
 | 
			
		||||
$   write opt libolb, " /library"
 | 
			
		||||
$   write opt libolb,"/lib"
 | 
			
		||||
$   if libref .nes. "" then write opt libref,"/SHARE"
 | 
			
		||||
$   write opt "SYMBOL_VECTOR=(-"
 | 
			
		||||
$   libfirstentry := true
 | 
			
		||||
@@ -205,8 +124,7 @@ $   gosub read_func_num
 | 
			
		||||
$   write opt ")"
 | 
			
		||||
$   write opt "GSMATCH=",libvmatch,",",libver
 | 
			
		||||
$   close opt
 | 
			
		||||
$   link /map = 'libmap' /full /share = 'libgoal' 'libopt' /options -
 | 
			
		||||
     'zlib_lib'
 | 
			
		||||
$   link/map='libmap'/full/share='libgoal' 'libopt'/option
 | 
			
		||||
$   return
 | 
			
		||||
$
 | 
			
		||||
$! The record writer routine
 | 
			
		||||
@@ -240,7 +158,7 @@ $! ----- Subroutines for VAX
 | 
			
		||||
$! -----
 | 
			
		||||
$! The creator routine
 | 
			
		||||
$ create_vax_shr:
 | 
			
		||||
$   open /write mar 'libmar'
 | 
			
		||||
$   open/write mar 'libmar'
 | 
			
		||||
$   type sys$input:/out=mar:
 | 
			
		||||
;
 | 
			
		||||
; Transfer vector for VAX shareable image
 | 
			
		||||
@@ -275,10 +193,10 @@ $!   libwriter := write_vax_vtransfer_entry
 | 
			
		||||
$!   gosub read_func_num
 | 
			
		||||
$   write mar "	.END"
 | 
			
		||||
$   close mar
 | 
			
		||||
$   open /write opt 'libopt'
 | 
			
		||||
$   open/write opt 'libopt'
 | 
			
		||||
$   write opt "identification=""",libid," ",libverstr,""""
 | 
			
		||||
$   write opt libobj
 | 
			
		||||
$   write opt libolb, " /library"
 | 
			
		||||
$   write opt libolb,"/lib"
 | 
			
		||||
$   if libref .nes. "" then write opt libref,"/SHARE"
 | 
			
		||||
$   type sys$input:/out=opt:
 | 
			
		||||
!
 | 
			
		||||
@@ -297,8 +215,7 @@ $   libwriter := write_vax_psect_attr
 | 
			
		||||
$   gosub read_func_num
 | 
			
		||||
$   close opt
 | 
			
		||||
$   macro/obj='libobj' 'libmar'
 | 
			
		||||
$   link /map = 'libmap' /full /share = 'libgoal' 'libopt' /options -
 | 
			
		||||
     'zlib_lib'
 | 
			
		||||
$   link/map='libmap'/full/share='libgoal' 'libopt'/option
 | 
			
		||||
$   return
 | 
			
		||||
$
 | 
			
		||||
$! The record writer routine for VAX functions
 | 
			
		||||
@@ -320,9 +237,9 @@ $   return
 | 
			
		||||
$
 | 
			
		||||
$! ----- Common subroutines
 | 
			
		||||
$! -----
 | 
			
		||||
$! The .num file reader.  This one has great responsibility.
 | 
			
		||||
$! The .num file reader.  This one has great responsability.
 | 
			
		||||
$ read_func_num:
 | 
			
		||||
$   open /read libnum 'libnum'
 | 
			
		||||
$   open libnum 'libnum'
 | 
			
		||||
$   goto read_nums
 | 
			
		||||
$
 | 
			
		||||
$ read_nums:
 | 
			
		||||
@@ -330,30 +247,27 @@ $   libentrynum=0
 | 
			
		||||
$   liblastentry:=false
 | 
			
		||||
$   entrycount=0
 | 
			
		||||
$   loop:
 | 
			
		||||
$     read /end=loop_end /err=loop_end libnum line
 | 
			
		||||
$     lin = f$edit( line, "COMPRESS,TRIM")
 | 
			
		||||
$!    Skip a "#" comment line.
 | 
			
		||||
$     if (f$extract( 0, 1, lin) .eqs. "#") then goto loop
 | 
			
		||||
$     entrynum = f$int(f$element( 1, " ", lin))
 | 
			
		||||
$     entryinfo = f$element( 2, " ", lin)
 | 
			
		||||
$     curentry = f$element( 0, " ", lin)
 | 
			
		||||
$     info_exist = f$element( 0, ":", entryinfo)
 | 
			
		||||
$     info_platforms = ","+ f$element(1, ":", entryinfo)+ ","
 | 
			
		||||
$     info_kind = f$element( 2, ":", entryinfo)
 | 
			
		||||
$     info_algorithms = ","+ f$element( 3, ":", entryinfo)+ ","
 | 
			
		||||
$     read/end=loop_end/err=loop_end libnum line
 | 
			
		||||
$     entrynum=f$int(f$element(1," ",f$edit(line,"COMPRESS,TRIM")))
 | 
			
		||||
$     entryinfo=f$element(2," ",f$edit(line,"COMPRESS,TRIM"))
 | 
			
		||||
$     curentry=f$element(0," ",f$edit(line,"COMPRESS,TRIM"))
 | 
			
		||||
$     info_exist=f$element(0,":",entryinfo)
 | 
			
		||||
$     info_platforms=","+f$element(1,":",entryinfo)+","
 | 
			
		||||
$     info_kind=f$element(2,":",entryinfo)
 | 
			
		||||
$     info_algorithms=","+f$element(3,":",entryinfo)+","
 | 
			
		||||
$     if info_exist .eqs. "NOEXIST" then goto loop
 | 
			
		||||
$     truesum = 0
 | 
			
		||||
$     falsesum = 0
 | 
			
		||||
$     negatives = 1
 | 
			
		||||
$     plat_i = 0
 | 
			
		||||
$     loop1:
 | 
			
		||||
$       plat_entry = f$element( plat_i, ",", info_platforms)
 | 
			
		||||
$       plat_entry = f$element(plat_i,",",info_platforms)
 | 
			
		||||
$       plat_i = plat_i + 1
 | 
			
		||||
$       if plat_entry .eqs. "" then goto loop1
 | 
			
		||||
$       if plat_entry .nes. ","
 | 
			
		||||
$       then
 | 
			
		||||
$         if f$extract(0,1,plat_entry) .nes. "!" then negatives = 0
 | 
			
		||||
$         if (arch_vax)
 | 
			
		||||
$         if f$getsyi("CPU") .lt. 128
 | 
			
		||||
$         then
 | 
			
		||||
$           if plat_entry .eqs. "EXPORT_VAR_AS_FUNCTION" then -
 | 
			
		||||
$             truesum = truesum + 1
 | 
			
		||||
@@ -362,7 +276,6 @@ $             falsesum = falsesum + 1
 | 
			
		||||
$         endif
 | 
			
		||||
$!
 | 
			
		||||
$         if ((plat_entry .eqs. "VMS") .or. -
 | 
			
		||||
            ((plat_entry .eqs. "ZLIB") .and. (ZLIB .nes. "")) .or. -
 | 
			
		||||
            (arch_vax .and. (plat_entry .eqs. "VMSVAX"))) then -
 | 
			
		||||
            truesum = truesum + 1
 | 
			
		||||
$!
 | 
			
		||||
@@ -388,7 +301,8 @@ $	alg_i = alg_i + 1
 | 
			
		||||
$       if alg_entry .eqs. "" then goto loop2
 | 
			
		||||
$       if alg_entry .nes. ","
 | 
			
		||||
$       then
 | 
			
		||||
$	  if disabled_algorithms - ("," + alg_entry + ",") .nes disabled_algorithms then goto loop
 | 
			
		||||
$         if alg_entry .eqs. "KRB5" then goto loop ! Special for now
 | 
			
		||||
$	  if alg_entry .eqs. "STATIC_ENGINE" then goto loop ! Special for now
 | 
			
		||||
$         if f$trnlnm("OPENSSL_NO_"+alg_entry) .nes. "" then goto loop
 | 
			
		||||
$	  goto loop2
 | 
			
		||||
$       endif
 | 
			
		||||
@@ -431,7 +345,7 @@ $
 | 
			
		||||
$! The version number reader
 | 
			
		||||
$ read_version_info:
 | 
			
		||||
$   libver = ""
 | 
			
		||||
$   open /read vf [.CRYPTO]OPENSSLV.H
 | 
			
		||||
$   open/read vf [.CRYPTO]OPENSSLV.H
 | 
			
		||||
$   loop_rvi:
 | 
			
		||||
$     read/err=endloop_rvi/end=endloop_rvi vf rvi_line
 | 
			
		||||
$     if rvi_line - "SHLIB_VERSION_NUMBER """ .eqs. rvi_line then -
 | 
			
		||||
@@ -455,22 +369,3 @@ $     endif
 | 
			
		||||
$   endloop_rvi:
 | 
			
		||||
$   close vf
 | 
			
		||||
$   return
 | 
			
		||||
$
 | 
			
		||||
$! The disabled algorithms reader
 | 
			
		||||
$ read_disabled_algorithms_info:
 | 
			
		||||
$   disabled_algorithms = ","
 | 
			
		||||
$   open /read cf [.CRYPTO.'ARCH']OPENSSLCONF.H
 | 
			
		||||
$   loop_rci:
 | 
			
		||||
$     read/err=endloop_rci/end=endloop_rci cf rci_line
 | 
			
		||||
$     rci_line = f$edit(rci_line,"TRIM,COMPRESS")
 | 
			
		||||
$     rci_ei = 0
 | 
			
		||||
$     if f$extract(0,9,rci_line) .eqs. "# define " then rci_ei = 2
 | 
			
		||||
$     if f$extract(0,8,rci_line) .eqs. "#define " then rci_ei = 1
 | 
			
		||||
$     if rci_ei .eq. 0 then goto loop_rci
 | 
			
		||||
$     rci_e = f$element(rci_ei," ",rci_line)
 | 
			
		||||
$     if f$extract(0,11,rci_e) .nes. "OPENSSL_NO_" then goto loop_rci
 | 
			
		||||
$     disabled_algorithms = disabled_algorithms + f$extract(11,999,rci_e) + ","
 | 
			
		||||
$     goto loop_rci
 | 
			
		||||
$   endloop_rci:
 | 
			
		||||
$   close cf
 | 
			
		||||
$   return
 | 
			
		||||
 
 | 
			
		||||
@@ -1,108 +0,0 @@
 | 
			
		||||
$!
 | 
			
		||||
$! Startup file for OpenSSL 1.x.
 | 
			
		||||
$!
 | 
			
		||||
$! 2011-03-05 SMS.
 | 
			
		||||
$!
 | 
			
		||||
$! This procedure must reside in the OpenSSL installation directory.
 | 
			
		||||
$! It will fail if it is copied to a different location.
 | 
			
		||||
$!
 | 
			
		||||
$! P1  qualifier(s) for DEFINE.  For example, "/SYSTEM" to get the
 | 
			
		||||
$!     logical names defined in the system logical name table.
 | 
			
		||||
$!
 | 
			
		||||
$! P2  "64", to use executables which were built with 64-bit pointers.
 | 
			
		||||
$!
 | 
			
		||||
$! Good (default) and bad status values.
 | 
			
		||||
$!
 | 
			
		||||
$ status =    %x00010001 ! RMS$_NORMAL, normal successful completion.
 | 
			
		||||
$ rms_e_fnf = %x00018292 ! RMS$_FNF, file not found.
 | 
			
		||||
$!
 | 
			
		||||
$! Prepare for problems.
 | 
			
		||||
$!
 | 
			
		||||
$ orig_dev_dir = f$environment( "DEFAULT")
 | 
			
		||||
$ on control_y then goto clean_up
 | 
			
		||||
$ on error then goto clean_up
 | 
			
		||||
$!
 | 
			
		||||
$! Determine hardware architecture.
 | 
			
		||||
$!
 | 
			
		||||
$ if (f$getsyi( "cpu") .lt. 128)
 | 
			
		||||
$ then
 | 
			
		||||
$   arch_name = "VAX"
 | 
			
		||||
$ else
 | 
			
		||||
$   arch_name = f$edit( f$getsyi( "arch_name"), "upcase")
 | 
			
		||||
$   if (arch_name .eqs. "") then arch_name = "UNK"
 | 
			
		||||
$ endif
 | 
			
		||||
$!
 | 
			
		||||
$ if (p2 .eqs. "64")
 | 
			
		||||
$ then
 | 
			
		||||
$   arch_name_exe = arch_name+ "_64"
 | 
			
		||||
$ else
 | 
			
		||||
$   arch_name_exe = arch_name
 | 
			
		||||
$ endif
 | 
			
		||||
$!
 | 
			
		||||
$! Derive the OpenSSL installation device:[directory] from the location
 | 
			
		||||
$! of this command procedure.
 | 
			
		||||
$!
 | 
			
		||||
$ proc = f$environment( "procedure")
 | 
			
		||||
$ proc_dev_dir = f$parse( "A.;", proc, , , "no_conceal") - "A.;"
 | 
			
		||||
$ proc_dev = f$parse( proc_dev_dir, , , "device", "syntax_only")
 | 
			
		||||
$ proc_dir = f$parse( proc_dev_dir, , , "directory", "syntax_only") - -
 | 
			
		||||
   ".][000000"- "[000000."- "]["- "["- "]"
 | 
			
		||||
$ proc_dev_dir = proc_dev+ "["+ proc_dir+ "]"
 | 
			
		||||
$ set default 'proc_dev_dir'
 | 
			
		||||
$ set default [-]
 | 
			
		||||
$ ossl_dev_dir = f$environment( "default")
 | 
			
		||||
$!
 | 
			
		||||
$! Check existence of expected directories (to see if this procedure has
 | 
			
		||||
$! been moved away from its proper place).
 | 
			
		||||
$!
 | 
			
		||||
$ if ((f$search( "certs.dir;1") .eqs. "") .or. -
 | 
			
		||||
   (f$search( "include.dir;1") .eqs. "") .or. -
 | 
			
		||||
   (f$search( "private.dir;1") .eqs. "") .or. -
 | 
			
		||||
   (f$search( "vms.dir;1") .eqs. ""))
 | 
			
		||||
$ then
 | 
			
		||||
$    write sys$output -
 | 
			
		||||
      "   Can't find expected common OpenSSL directories in:"
 | 
			
		||||
$    write sys$output "   ''ossl_dev_dir'"
 | 
			
		||||
$    status = rms_e_fnf
 | 
			
		||||
$    goto clean_up
 | 
			
		||||
$ endif
 | 
			
		||||
$!
 | 
			
		||||
$ if ((f$search( "''arch_name_exe'_exe.dir;1") .eqs. "") .or. -
 | 
			
		||||
   (f$search( "''arch_name'_lib.dir;1") .eqs. ""))
 | 
			
		||||
$ then
 | 
			
		||||
$    write sys$output -
 | 
			
		||||
      "   Can't find expected architecture-specific OpenSSL directories in:"
 | 
			
		||||
$    write sys$output "   ''ossl_dev_dir'"
 | 
			
		||||
$    status = rms_e_fnf
 | 
			
		||||
$    goto clean_up
 | 
			
		||||
$ endif
 | 
			
		||||
$!
 | 
			
		||||
$! All seems well (enough).  Define the OpenSSL logical names.
 | 
			
		||||
$!
 | 
			
		||||
$ ossl_root = ossl_dev_dir- "]"+ ".]"
 | 
			
		||||
$ define /translation_attributes = concealed /nolog'p1 SSLROOT 'ossl_root'
 | 
			
		||||
$ define /nolog 'p1' SSLCERTS     sslroot:[certs]
 | 
			
		||||
$ define /nolog 'p1' SSLINCLUDE   sslroot:[include]
 | 
			
		||||
$ define /nolog 'p1' SSLPRIVATE   sslroot:[private]
 | 
			
		||||
$ define /nolog 'p1' SSLEXE       sslroot:['arch_name_exe'_exe]
 | 
			
		||||
$ define /nolog 'p1' SSLLIB       sslroot:['arch_name'_lib]
 | 
			
		||||
$!
 | 
			
		||||
$! Defining OPENSSL lets a C program use "#include <openssl/{foo}.h>":
 | 
			
		||||
$ define /nolog 'p1' OPENSSL      SSLINCLUDE:
 | 
			
		||||
$!
 | 
			
		||||
$! Run a site-specific procedure, if it exists.
 | 
			
		||||
$!
 | 
			
		||||
$ if f$search( "sslroot:[vms]openssl_systartup.com") .nes."" then -
 | 
			
		||||
   @ sslroot:[vms]openssl_systartup.com
 | 
			
		||||
$!
 | 
			
		||||
$! Restore the original default dev:[dir] (if known).
 | 
			
		||||
$!
 | 
			
		||||
$ clean_up:
 | 
			
		||||
$!
 | 
			
		||||
$ if (f$type( orig_dev_dir) .nes. "")
 | 
			
		||||
$ then
 | 
			
		||||
$    set default 'orig_dev_dir'
 | 
			
		||||
$ endif
 | 
			
		||||
$!
 | 
			
		||||
$ EXIT 'status'
 | 
			
		||||
$!
 | 
			
		||||
@@ -1,20 +0,0 @@
 | 
			
		||||
$!
 | 
			
		||||
$! Deassign OpenSSL logical names.
 | 
			
		||||
$!
 | 
			
		||||
$ call deass "OPENSSL" "''p1'"
 | 
			
		||||
$ call deass "SSLCERTS" "''p1'"
 | 
			
		||||
$ call deass "SSLEXE" "''p1'"
 | 
			
		||||
$ call deass "SSLINCLUDE" "''p1'"
 | 
			
		||||
$ call deass "SSLLIB" "''p1'"
 | 
			
		||||
$ call deass "SSLPRIVATE" "''p1'"
 | 
			
		||||
$ call deass "SSLROOT" "''p1'"
 | 
			
		||||
$!
 | 
			
		||||
$ exit
 | 
			
		||||
$!
 | 
			
		||||
$deass: subroutine
 | 
			
		||||
$ if (f$trnlnm( p1) .nes. "")
 | 
			
		||||
$ then
 | 
			
		||||
$    deassign 'p2' 'p1'
 | 
			
		||||
$ endif
 | 
			
		||||
$ endsubroutine
 | 
			
		||||
$!
 | 
			
		||||
							
								
								
									
										7
									
								
								apps/.cvsignore
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										7
									
								
								apps/.cvsignore
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,7 @@
 | 
			
		||||
openssl
 | 
			
		||||
Makefile.save
 | 
			
		||||
der_chop
 | 
			
		||||
der_chop.bak
 | 
			
		||||
CA.pl
 | 
			
		||||
*.flc
 | 
			
		||||
semantic.cache
 | 
			
		||||
							
								
								
									
										98
									
								
								apps/CA.com
									
									
									
									
									
								
							
							
						
						
									
										98
									
								
								apps/CA.com
									
									
									
									
									
								
							@@ -37,25 +37,14 @@ $ VERIFY = openssl + " verify"
 | 
			
		||||
$ X509   = openssl + " x509"
 | 
			
		||||
$ PKCS12 = openssl + " pkcs12"
 | 
			
		||||
$ echo   = "write sys$Output"
 | 
			
		||||
$ RET = 1
 | 
			
		||||
$!
 | 
			
		||||
$! 2010-12-20 SMS.
 | 
			
		||||
$! Use a concealed logical name to reduce command line lengths, to
 | 
			
		||||
$! avoid DCL errors on VAX:
 | 
			
		||||
$!     %DCL-W-TKNOVF, command element is too long - shorten
 | 
			
		||||
$! (Path segments like "openssl-1_0_1-stable-SNAP-20101217" accumulate
 | 
			
		||||
$! quickly.)
 | 
			
		||||
$!
 | 
			
		||||
$ CATOP = F$PARSE( F$ENVIRONMENT( "DEFAULT"), "[]")- "].;"+ ".demoCA.]"
 | 
			
		||||
$ define /translation_attributes = concealed CATOP 'CATOP'
 | 
			
		||||
$!
 | 
			
		||||
$ on error then goto clean_up
 | 
			
		||||
$ on control_y then goto clean_up
 | 
			
		||||
$!
 | 
			
		||||
$ CAKEY  = "CATOP:[private]cakey.pem"
 | 
			
		||||
$ CACERT = "CATOP:[000000]cacert.pem"
 | 
			
		||||
$ s = F$PARSE(F$ENVIRONMENT("DEFAULT"),"[]") - "].;"
 | 
			
		||||
$ CATOP  := 's'.demoCA
 | 
			
		||||
$ CAKEY  := ]cakey.pem
 | 
			
		||||
$ CACERT := ]cacert.pem
 | 
			
		||||
$
 | 
			
		||||
$ __INPUT := SYS$COMMAND
 | 
			
		||||
$ RET = 1
 | 
			
		||||
$!
 | 
			
		||||
$ i = 1
 | 
			
		||||
$opt_loop:
 | 
			
		||||
@@ -66,7 +55,7 @@ $
 | 
			
		||||
$ IF (prog_opt .EQS. "?" .OR. prog_opt .EQS. "-h" .OR. prog_opt .EQS. "-help") 
 | 
			
		||||
$ THEN
 | 
			
		||||
$   echo "usage: CA -newcert|-newreq|-newca|-sign|-verify" 
 | 
			
		||||
$   goto clean_up
 | 
			
		||||
$   exit
 | 
			
		||||
$ ENDIF
 | 
			
		||||
$!
 | 
			
		||||
$ IF (prog_opt .EQS. "-input")
 | 
			
		||||
@@ -80,7 +69,7 @@ $!
 | 
			
		||||
$ IF (prog_opt .EQS. "-newcert")
 | 
			
		||||
$ THEN
 | 
			
		||||
$   ! Create a certificate.
 | 
			
		||||
$   DEFINE /USER_MODE SYS$INPUT '__INPUT'
 | 
			
		||||
$   DEFINE/USER SYS$INPUT '__INPUT'
 | 
			
		||||
$   REQ -new -x509 -keyout newreq.pem -out newreq.pem 'DAYS'
 | 
			
		||||
$   RET=$STATUS
 | 
			
		||||
$   echo "Certificate (and private key) is in newreq.pem"
 | 
			
		||||
@@ -90,7 +79,7 @@ $!
 | 
			
		||||
$ IF (prog_opt .EQS. "-newreq")
 | 
			
		||||
$ THEN
 | 
			
		||||
$   ! Create a certificate request
 | 
			
		||||
$   DEFINE /USER_MODE SYS$INPUT '__INPUT'
 | 
			
		||||
$   DEFINE/USER SYS$INPUT '__INPUT'
 | 
			
		||||
$   REQ -new -keyout newreq.pem -out newreq.pem 'DAYS'
 | 
			
		||||
$   RET=$STATUS
 | 
			
		||||
$   echo "Request (and private key) is in newreq.pem"
 | 
			
		||||
@@ -101,40 +90,41 @@ $ IF (prog_opt .EQS. "-newca")
 | 
			
		||||
$ THEN
 | 
			
		||||
$   ! If explicitly asked for or it doesn't exist then setup the directory
 | 
			
		||||
$   ! structure that Eric likes to manage things.
 | 
			
		||||
$   IF F$SEARCH( "CATOP:[000000]serial.") .EQS. ""
 | 
			
		||||
$   IF F$SEARCH(CATOP+"]serial.") .EQS. ""
 | 
			
		||||
$   THEN
 | 
			
		||||
$     CREATE /DIRECTORY /PROTECTION=OWNER:RWED CATOP:[000000]
 | 
			
		||||
$     CREATE /DIRECTORY /PROTECTION=OWNER:RWED CATOP:[certs]
 | 
			
		||||
$     CREATE /DIRECTORY /PROTECTION=OWNER:RWED CATOP:[crl]
 | 
			
		||||
$     CREATE /DIRECTORY /PROTECTION=OWNER:RWED CATOP:[newcerts]
 | 
			
		||||
$     CREATE /DIRECTORY /PROTECTION=OWNER:RWED CATOP:[private]
 | 
			
		||||
$     CREATE /DIR /PROTECTION=OWNER:RWED 'CATOP']
 | 
			
		||||
$     CREATE /DIR /PROTECTION=OWNER:RWED 'CATOP'.certs]
 | 
			
		||||
$     CREATE /DIR /PROTECTION=OWNER:RWED 'CATOP'.crl]
 | 
			
		||||
$     CREATE /DIR /PROTECTION=OWNER:RWED 'CATOP'.newcerts]
 | 
			
		||||
$     CREATE /DIR /PROTECTION=OWNER:RWED 'CATOP'.private]
 | 
			
		||||
$
 | 
			
		||||
$     OPEN /WRITE ser_file CATOP:[000000]serial. 
 | 
			
		||||
$     OPEN   /WRITE ser_file 'CATOP']serial. 
 | 
			
		||||
$     WRITE ser_file "01"
 | 
			
		||||
$     CLOSE ser_file
 | 
			
		||||
$     APPEND /NEW_VERSION NL: CATOP:[000000]index.txt
 | 
			
		||||
$     APPEND/NEW NL: 'CATOP']index.txt
 | 
			
		||||
$
 | 
			
		||||
$     ! The following is to make sure access() doesn't get confused.  It
 | 
			
		||||
$     ! really needs one file in the directory to give correct answers...
 | 
			
		||||
$     COPY NLA0: CATOP:[certs].;
 | 
			
		||||
$     COPY NLA0: CATOP:[crl].;
 | 
			
		||||
$     COPY NLA0: CATOP:[newcerts].;
 | 
			
		||||
$     COPY NLA0: CATOP:[private].;
 | 
			
		||||
$     COPY NLA0: 'CATOP'.certs].;
 | 
			
		||||
$     COPY NLA0: 'CATOP'.crl].;
 | 
			
		||||
$     COPY NLA0: 'CATOP'.newcerts].;
 | 
			
		||||
$     COPY NLA0: 'CATOP'.private].;
 | 
			
		||||
$   ENDIF
 | 
			
		||||
$!
 | 
			
		||||
$   IF F$SEARCH( CAKEY) .EQS. ""
 | 
			
		||||
$   IF F$SEARCH(CATOP+".private"+CAKEY) .EQS. ""
 | 
			
		||||
$   THEN
 | 
			
		||||
$     READ '__INPUT' FILE -
 | 
			
		||||
       /PROMPT="CA certificate filename (or enter to create): "
 | 
			
		||||
	   /PROMPT="CA certificate filename (or enter to create): "
 | 
			
		||||
$     IF (FILE .NES. "") .AND. (F$SEARCH(FILE) .NES. "")
 | 
			
		||||
$     THEN
 | 
			
		||||
$       COPY 'FILE' 'CAKEY'
 | 
			
		||||
$       RET=$STATUS
 | 
			
		||||
$       COPY 'FILE' 'CATOP'.private'CAKEY'
 | 
			
		||||
$	RET=$STATUS
 | 
			
		||||
$     ELSE
 | 
			
		||||
$       echo "Making CA certificate ..."
 | 
			
		||||
$       DEFINE /USER_MODE SYS$INPUT '__INPUT'
 | 
			
		||||
$       REQ -new -x509 -keyout 'CAKEY' -out 'CACERT' 'DAYS'
 | 
			
		||||
$       RET=$STATUS
 | 
			
		||||
$       DEFINE/USER SYS$INPUT '__INPUT'
 | 
			
		||||
$       REQ -new -x509 -keyout 'CATOP'.private'CAKEY' -
 | 
			
		||||
		       -out 'CATOP''CACERT' 'DAYS'
 | 
			
		||||
$	RET=$STATUS
 | 
			
		||||
$     ENDIF
 | 
			
		||||
$   ENDIF
 | 
			
		||||
$   GOTO opt_loop_continue
 | 
			
		||||
@@ -145,16 +135,16 @@ $ THEN
 | 
			
		||||
$   i = i + 1
 | 
			
		||||
$   cname = P'i'
 | 
			
		||||
$   IF cname .EQS. "" THEN cname = "My certificate"
 | 
			
		||||
$   PKCS12 -in newcert.pem -inkey newreq.pem -certfile 'CACERT' -
 | 
			
		||||
     -out newcert.p12 -export -name "''cname'"
 | 
			
		||||
$   PKCS12 -in newcert.pem -inkey newreq.pem -certfile 'CATOP''CACERT -
 | 
			
		||||
	   -out newcert.p12 -export -name "''cname'"
 | 
			
		||||
$   RET=$STATUS
 | 
			
		||||
$   goto clean_up
 | 
			
		||||
$   exit RET
 | 
			
		||||
$ ENDIF
 | 
			
		||||
$!
 | 
			
		||||
$ IF (prog_opt .EQS. "-xsign")
 | 
			
		||||
$ THEN
 | 
			
		||||
$!
 | 
			
		||||
$   DEFINE /USER_MODE SYS$INPUT '__INPUT'
 | 
			
		||||
$   DEFINE/USER SYS$INPUT '__INPUT'
 | 
			
		||||
$   CA -policy policy_anything -infiles newreq.pem
 | 
			
		||||
$   RET=$STATUS
 | 
			
		||||
$   GOTO opt_loop_continue
 | 
			
		||||
@@ -163,7 +153,7 @@ $!
 | 
			
		||||
$ IF ((prog_opt .EQS. "-sign") .OR. (prog_opt .EQS. "-signreq"))
 | 
			
		||||
$ THEN
 | 
			
		||||
$!   
 | 
			
		||||
$   DEFINE /USER_MODE SYS$INPUT '__INPUT'
 | 
			
		||||
$   DEFINE/USER SYS$INPUT '__INPUT'
 | 
			
		||||
$   CA -policy policy_anything -out newcert.pem -infiles newreq.pem
 | 
			
		||||
$   RET=$STATUS
 | 
			
		||||
$   type newcert.pem
 | 
			
		||||
@@ -175,9 +165,9 @@ $ IF (prog_opt .EQS. "-signcert")
 | 
			
		||||
$  THEN
 | 
			
		||||
$!   
 | 
			
		||||
$   echo "Cert passphrase will be requested twice - bug?"
 | 
			
		||||
$   DEFINE /USER_MODE SYS$INPUT '__INPUT'
 | 
			
		||||
$   DEFINE/USER SYS$INPUT '__INPUT'
 | 
			
		||||
$   X509 -x509toreq -in newreq.pem -signkey newreq.pem -out tmp.pem
 | 
			
		||||
$   DEFINE /USER_MODE SYS$INPUT '__INPUT'
 | 
			
		||||
$   DEFINE/USER SYS$INPUT '__INPUT'
 | 
			
		||||
$   CA -policy policy_anything -out newcert.pem -infiles tmp.pem
 | 
			
		||||
y
 | 
			
		||||
y
 | 
			
		||||
@@ -192,17 +182,17 @@ $!
 | 
			
		||||
$   i = i + 1
 | 
			
		||||
$   IF (p'i' .EQS. "")
 | 
			
		||||
$   THEN
 | 
			
		||||
$     DEFINE /USER_MODE SYS$INPUT '__INPUT'
 | 
			
		||||
$     VERIFY "-CAfile" 'CACERT' newcert.pem
 | 
			
		||||
$     DEFINE/USER SYS$INPUT '__INPUT'
 | 
			
		||||
$     VERIFY "-CAfile" 'CATOP''CACERT' newcert.pem
 | 
			
		||||
$   ELSE
 | 
			
		||||
$     j = i
 | 
			
		||||
$    verify_opt_loop:
 | 
			
		||||
$     IF j .GT. 8 THEN GOTO verify_opt_loop_end
 | 
			
		||||
$     IF p'j' .NES. ""
 | 
			
		||||
$     THEN 
 | 
			
		||||
$       DEFINE /USER_MODE SYS$INPUT '__INPUT'
 | 
			
		||||
$       DEFINE/USER SYS$INPUT '__INPUT'
 | 
			
		||||
$       __tmp = p'j'
 | 
			
		||||
$       VERIFY "-CAfile" 'CACERT' '__tmp'
 | 
			
		||||
$       VERIFY "-CAfile" 'CATOP''CACERT' '__tmp'
 | 
			
		||||
$       tmp=$STATUS
 | 
			
		||||
$       IF tmp .NE. 0 THEN RET=tmp
 | 
			
		||||
$     ENDIF
 | 
			
		||||
@@ -218,8 +208,8 @@ $ IF (prog_opt .NES. "")
 | 
			
		||||
$ THEN
 | 
			
		||||
$!   
 | 
			
		||||
$   echo "Unknown argument ''prog_opt'"
 | 
			
		||||
$   RET = 3
 | 
			
		||||
$   goto clean_up
 | 
			
		||||
$   
 | 
			
		||||
$   EXIT 3
 | 
			
		||||
$ ENDIF
 | 
			
		||||
$
 | 
			
		||||
$opt_loop_continue:
 | 
			
		||||
@@ -227,10 +217,4 @@ $ i = i + 1
 | 
			
		||||
$ GOTO opt_loop
 | 
			
		||||
$
 | 
			
		||||
$opt_loop_end:
 | 
			
		||||
$!
 | 
			
		||||
$clean_up:
 | 
			
		||||
$!
 | 
			
		||||
$ if f$trnlnm( "CATOP", "LNM$PROCESS") .nes. "" then -
 | 
			
		||||
   deassign /process CATOP
 | 
			
		||||
$!
 | 
			
		||||
$ EXIT 'RET'
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										1020
									
								
								apps/Makefile
									
									
									
									
									
								
							
							
						
						
									
										1020
									
								
								apps/Makefile
									
									
									
									
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							@@ -124,7 +124,10 @@ int app_RAND_load_file(const char *file, BIO *bio_e, int dont_warn)
 | 
			
		||||
    char buffer[200];
 | 
			
		||||
 | 
			
		||||
#ifdef OPENSSL_SYS_WINDOWS
 | 
			
		||||
    BIO_printf(bio_e, "Loading 'screen' into random state -");
 | 
			
		||||
    BIO_flush(bio_e);
 | 
			
		||||
    RAND_screen();
 | 
			
		||||
    BIO_printf(bio_e, " done\n");
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
    if (file == NULL)
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										1223
									
								
								apps/apps.c
									
									
									
									
									
								
							
							
						
						
									
										1223
									
								
								apps/apps.c
									
									
									
									
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							
							
								
								
									
										123
									
								
								apps/apps.h
									
									
									
									
									
								
							
							
						
						
									
										123
									
								
								apps/apps.h
									
									
									
									
									
								
							@@ -138,6 +138,11 @@ long app_RAND_load_files(char *file); /* `file' is a list of files to read,
 | 
			
		||||
                                       * (see e_os.h).  The string is
 | 
			
		||||
                                       * destroyed! */
 | 
			
		||||
 | 
			
		||||
# ifdef OPENSSL_SYS_WIN32
 | 
			
		||||
#  define rename(from,to) WIN32_rename((from),(to))
 | 
			
		||||
int WIN32_rename(const char *oldname, const char *newname);
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
# ifndef MONOLITH
 | 
			
		||||
 | 
			
		||||
#  define MAIN(a,v)       main(a,v)
 | 
			
		||||
@@ -145,9 +150,11 @@ long app_RAND_load_files(char *file); /* `file' is a list of files to read,
 | 
			
		||||
#  ifndef NON_MAIN
 | 
			
		||||
CONF *config = NULL;
 | 
			
		||||
BIO *bio_err = NULL;
 | 
			
		||||
int in_FIPS_mode = 0;
 | 
			
		||||
#  else
 | 
			
		||||
extern CONF *config;
 | 
			
		||||
extern BIO *bio_err;
 | 
			
		||||
extern int in_FIPS_mode;
 | 
			
		||||
#  endif
 | 
			
		||||
 | 
			
		||||
# else
 | 
			
		||||
@@ -156,6 +163,7 @@ extern BIO *bio_err;
 | 
			
		||||
extern CONF *config;
 | 
			
		||||
extern char *default_config_file;
 | 
			
		||||
extern BIO *bio_err;
 | 
			
		||||
extern int in_FIPS_mode;
 | 
			
		||||
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
@@ -169,43 +177,65 @@ extern BIO *bio_err;
 | 
			
		||||
#  define do_pipe_sig()
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
# ifdef OPENSSL_NO_COMP
 | 
			
		||||
#  define zlib_cleanup()
 | 
			
		||||
# else
 | 
			
		||||
#  define zlib_cleanup() COMP_zlib_cleanup()
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
# if defined(MONOLITH) && !defined(OPENSSL_C)
 | 
			
		||||
#  define apps_startup() \
 | 
			
		||||
                do_pipe_sig()
 | 
			
		||||
#  define apps_shutdown()
 | 
			
		||||
# else
 | 
			
		||||
#  ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
#   define apps_startup() \
 | 
			
		||||
                        do { do_pipe_sig(); CRYPTO_malloc_init(); \
 | 
			
		||||
#   if defined(OPENSSL_SYS_MSDOS) || defined(OPENSSL_SYS_WIN16) || \
 | 
			
		||||
     defined(OPENSSL_SYS_WIN32)
 | 
			
		||||
#    ifdef _O_BINARY
 | 
			
		||||
#     define apps_startup() \
 | 
			
		||||
                        do { _fmode=_O_BINARY; do_pipe_sig(); CRYPTO_malloc_init(); \
 | 
			
		||||
                        ERR_load_crypto_strings(); OpenSSL_add_all_algorithms(); \
 | 
			
		||||
                        ENGINE_load_builtin_engines(); setup_ui_method(); } while(0)
 | 
			
		||||
#    else
 | 
			
		||||
#     define apps_startup() \
 | 
			
		||||
                        do { _fmode=O_BINARY; do_pipe_sig(); CRYPTO_malloc_init(); \
 | 
			
		||||
                        ERR_load_crypto_strings(); OpenSSL_add_all_algorithms(); \
 | 
			
		||||
                        ENGINE_load_builtin_engines(); setup_ui_method(); } while(0)
 | 
			
		||||
#    endif
 | 
			
		||||
#   else
 | 
			
		||||
#    define apps_startup() \
 | 
			
		||||
                        do { do_pipe_sig(); OpenSSL_add_all_algorithms(); \
 | 
			
		||||
                        ERR_load_crypto_strings(); ENGINE_load_builtin_engines(); \
 | 
			
		||||
                        setup_ui_method(); } while(0)
 | 
			
		||||
#   endif
 | 
			
		||||
#   define apps_shutdown() \
 | 
			
		||||
                        do { CONF_modules_unload(1); destroy_ui_method(); \
 | 
			
		||||
                        OBJ_cleanup(); EVP_cleanup(); ENGINE_cleanup(); \
 | 
			
		||||
                        CRYPTO_cleanup_all_ex_data(); ERR_remove_thread_state(NULL); \
 | 
			
		||||
                        RAND_cleanup(); \
 | 
			
		||||
                        ERR_free_strings(); zlib_cleanup();} while(0)
 | 
			
		||||
                        EVP_cleanup(); ENGINE_cleanup(); \
 | 
			
		||||
                        CRYPTO_cleanup_all_ex_data(); ERR_remove_state(0); \
 | 
			
		||||
                        ERR_free_strings(); } while(0)
 | 
			
		||||
#  else
 | 
			
		||||
#   define apps_startup() \
 | 
			
		||||
                        do { do_pipe_sig(); CRYPTO_malloc_init(); \
 | 
			
		||||
#   if defined(OPENSSL_SYS_MSDOS) || defined(OPENSSL_SYS_WIN16) || \
 | 
			
		||||
     defined(OPENSSL_SYS_WIN32)
 | 
			
		||||
#    ifdef _O_BINARY
 | 
			
		||||
#     define apps_startup() \
 | 
			
		||||
                        do { _fmode=_O_BINARY; do_pipe_sig(); CRYPTO_malloc_init(); \
 | 
			
		||||
                        ERR_load_crypto_strings(); OpenSSL_add_all_algorithms(); \
 | 
			
		||||
                        setup_ui_method(); } while(0)
 | 
			
		||||
#    else
 | 
			
		||||
#     define apps_startup() \
 | 
			
		||||
                        do { _fmode=O_BINARY; do_pipe_sig(); CRYPTO_malloc_init(); \
 | 
			
		||||
                        ERR_load_crypto_strings(); OpenSSL_add_all_algorithms(); \
 | 
			
		||||
                        setup_ui_method(); } while(0)
 | 
			
		||||
#    endif
 | 
			
		||||
#   else
 | 
			
		||||
#    define apps_startup() \
 | 
			
		||||
                        do { do_pipe_sig(); OpenSSL_add_all_algorithms(); \
 | 
			
		||||
                        ERR_load_crypto_strings(); \
 | 
			
		||||
                        setup_ui_method(); } while(0)
 | 
			
		||||
#   endif
 | 
			
		||||
#   define apps_shutdown() \
 | 
			
		||||
                        do { CONF_modules_unload(1); destroy_ui_method(); \
 | 
			
		||||
                        OBJ_cleanup(); EVP_cleanup(); \
 | 
			
		||||
                        CRYPTO_cleanup_all_ex_data(); ERR_remove_thread_state(NULL); \
 | 
			
		||||
                        RAND_cleanup(); \
 | 
			
		||||
                        ERR_free_strings(); zlib_cleanup(); } while(0)
 | 
			
		||||
                        EVP_cleanup(); \
 | 
			
		||||
                        CRYPTO_cleanup_all_ex_data(); ERR_remove_state(0); \
 | 
			
		||||
                        ERR_free_strings(); } while(0)
 | 
			
		||||
#  endif
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
# if defined(OPENSSL_SYSNAME_WIN32) || defined(OPENSSL_SYSNAME_WINCE)
 | 
			
		||||
# ifdef OPENSSL_SYSNAME_WIN32
 | 
			
		||||
#  define openssl_fdset(a,b) FD_SET((unsigned int)a, b)
 | 
			
		||||
# else
 | 
			
		||||
#  define openssl_fdset(a,b) FD_SET(a, b)
 | 
			
		||||
@@ -245,9 +275,6 @@ int app_passwd(BIO *err, char *arg1, char *arg2, char **pass1, char **pass2);
 | 
			
		||||
int add_oid_section(BIO *err, CONF *conf);
 | 
			
		||||
X509 *load_cert(BIO *err, const char *file, int format,
 | 
			
		||||
                const char *pass, ENGINE *e, const char *cert_descrip);
 | 
			
		||||
X509_CRL *load_crl(const char *infile, int format);
 | 
			
		||||
int load_cert_crl_http(const char *url, BIO *err,
 | 
			
		||||
                       X509 **pcert, X509_CRL **pcrl);
 | 
			
		||||
EVP_PKEY *load_key(BIO *err, const char *file, int format, int maybe_stdin,
 | 
			
		||||
                   const char *pass, ENGINE *e, const char *key_descrip);
 | 
			
		||||
EVP_PKEY *load_pubkey(BIO *err, const char *file, int format, int maybe_stdin,
 | 
			
		||||
@@ -255,9 +282,6 @@ EVP_PKEY *load_pubkey(BIO *err, const char *file, int format, int maybe_stdin,
 | 
			
		||||
STACK_OF(X509) *load_certs(BIO *err, const char *file, int format,
 | 
			
		||||
                           const char *pass, ENGINE *e,
 | 
			
		||||
                           const char *cert_descrip);
 | 
			
		||||
STACK_OF(X509_CRL) *load_crls(BIO *err, const char *file, int format,
 | 
			
		||||
                              const char *pass, ENGINE *e,
 | 
			
		||||
                              const char *cert_descrip);
 | 
			
		||||
X509_STORE *setup_verify(BIO *bp, char *CAfile, char *CApath);
 | 
			
		||||
# ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
ENGINE *setup_engine(BIO *err, const char *engine, int debug);
 | 
			
		||||
@@ -265,10 +289,8 @@ ENGINE *setup_engine(BIO *err, const char *engine, int debug);
 | 
			
		||||
 | 
			
		||||
# ifndef OPENSSL_NO_OCSP
 | 
			
		||||
OCSP_RESPONSE *process_responder(BIO *err, OCSP_REQUEST *req,
 | 
			
		||||
                                 const char *host, const char *path,
 | 
			
		||||
                                 const char *port, int use_ssl,
 | 
			
		||||
                                 const STACK_OF(CONF_VALUE) *headers,
 | 
			
		||||
                                 int req_timeout);
 | 
			
		||||
                                 char *host, char *path, char *port,
 | 
			
		||||
                                 int use_ssl, int req_timeout);
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
int load_config(BIO *err, CONF *cnf);
 | 
			
		||||
@@ -310,44 +332,18 @@ int save_index(const char *dbfile, const char *suffix, CA_DB *db);
 | 
			
		||||
int rotate_index(const char *dbfile, const char *new_suffix,
 | 
			
		||||
                 const char *old_suffix);
 | 
			
		||||
void free_index(CA_DB *db);
 | 
			
		||||
# define index_name_cmp_noconst(a, b) \
 | 
			
		||||
        index_name_cmp((const OPENSSL_CSTRING *)CHECKED_PTR_OF(OPENSSL_STRING, a), \
 | 
			
		||||
        (const OPENSSL_CSTRING *)CHECKED_PTR_OF(OPENSSL_STRING, b))
 | 
			
		||||
int index_name_cmp(const OPENSSL_CSTRING *a, const OPENSSL_CSTRING *b);
 | 
			
		||||
int index_name_cmp(const char **a, const char **b);
 | 
			
		||||
int parse_yesno(const char *str, int def);
 | 
			
		||||
 | 
			
		||||
X509_NAME *parse_name(char *str, long chtype, int multirdn);
 | 
			
		||||
int args_verify(char ***pargs, int *pargc,
 | 
			
		||||
                int *badarg, BIO *err, X509_VERIFY_PARAM **pm);
 | 
			
		||||
void policies_print(BIO *out, X509_STORE_CTX *ctx);
 | 
			
		||||
int bio_to_mem(unsigned char **out, int maxlen, BIO *in);
 | 
			
		||||
int pkey_ctrl_string(EVP_PKEY_CTX *ctx, const char *value);
 | 
			
		||||
int init_gen_str(BIO *err, EVP_PKEY_CTX **pctx,
 | 
			
		||||
                 const char *algname, ENGINE *e, int do_param);
 | 
			
		||||
int do_X509_sign(BIO *err, X509 *x, EVP_PKEY *pkey, const EVP_MD *md,
 | 
			
		||||
                 STACK_OF(OPENSSL_STRING) *sigopts);
 | 
			
		||||
int do_X509_REQ_sign(BIO *err, X509_REQ *x, EVP_PKEY *pkey, const EVP_MD *md,
 | 
			
		||||
                     STACK_OF(OPENSSL_STRING) *sigopts);
 | 
			
		||||
int do_X509_CRL_sign(BIO *err, X509_CRL *x, EVP_PKEY *pkey, const EVP_MD *md,
 | 
			
		||||
                     STACK_OF(OPENSSL_STRING) *sigopts);
 | 
			
		||||
# ifndef OPENSSL_NO_PSK
 | 
			
		||||
extern char *psk_key;
 | 
			
		||||
# endif
 | 
			
		||||
# ifndef OPENSSL_NO_JPAKE
 | 
			
		||||
void jpake_client_auth(BIO *out, BIO *conn, const char *secret);
 | 
			
		||||
void jpake_server_auth(BIO *out, BIO *conn, const char *secret);
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
# ifndef OPENSSL_NO_TLSEXT
 | 
			
		||||
unsigned char *next_protos_parse(unsigned short *outlen, const char *in);
 | 
			
		||||
# endif                         /* ndef OPENSSL_NO_TLSEXT */
 | 
			
		||||
 | 
			
		||||
void print_cert_checks(BIO *bio, X509 *x,
 | 
			
		||||
                       const char *checkhost,
 | 
			
		||||
                       const char *checkemail, const char *checkip);
 | 
			
		||||
 | 
			
		||||
void store_setup_crl_download(X509_STORE *st);
 | 
			
		||||
 | 
			
		||||
# define FORMAT_UNDEF    0
 | 
			
		||||
# define FORMAT_ASN1     1
 | 
			
		||||
# define FORMAT_TEXT     2
 | 
			
		||||
@@ -358,11 +354,6 @@ void store_setup_crl_download(X509_STORE *st);
 | 
			
		||||
# define FORMAT_ENGINE   7
 | 
			
		||||
# define FORMAT_IISSGC   8      /* XXX this stupid macro helps us to avoid
 | 
			
		||||
                                 * adding yet another param to load_*key() */
 | 
			
		||||
# define FORMAT_PEMRSA   9      /* PEM RSAPubicKey format */
 | 
			
		||||
# define FORMAT_ASN1RSA  10     /* DER RSAPubicKey format */
 | 
			
		||||
# define FORMAT_MSBLOB   11     /* MS Key blob format */
 | 
			
		||||
# define FORMAT_PVK      12     /* MS PVK file format */
 | 
			
		||||
# define FORMAT_HTTP     13     /* Download using HTTP */
 | 
			
		||||
 | 
			
		||||
# define EXT_COPY_NONE   0
 | 
			
		||||
# define EXT_COPY_ADD    1
 | 
			
		||||
@@ -374,14 +365,4 @@ void store_setup_crl_download(X509_STORE *st);
 | 
			
		||||
 | 
			
		||||
# define SERIAL_RAND_BITS        64
 | 
			
		||||
 | 
			
		||||
int app_isdir(const char *);
 | 
			
		||||
int raw_read_stdin(void *, int);
 | 
			
		||||
int raw_write_stdout(const void *, int);
 | 
			
		||||
 | 
			
		||||
# define TM_START        0
 | 
			
		||||
# define TM_STOP         1
 | 
			
		||||
double app_tminterval(int stop, int usertime);
 | 
			
		||||
 | 
			
		||||
# define OPENSSL_NO_SSL_INTERN
 | 
			
		||||
 | 
			
		||||
#endif
 | 
			
		||||
 
 | 
			
		||||
@@ -98,7 +98,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    unsigned char *tmpbuf;
 | 
			
		||||
    const unsigned char *ctmpbuf;
 | 
			
		||||
    BUF_MEM *buf = NULL;
 | 
			
		||||
    STACK_OF(OPENSSL_STRING) *osk = NULL;
 | 
			
		||||
    STACK *osk = NULL;
 | 
			
		||||
    ASN1_TYPE *at = NULL;
 | 
			
		||||
 | 
			
		||||
    informat = FORMAT_PEM;
 | 
			
		||||
@@ -115,7 +115,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    prog = argv[0];
 | 
			
		||||
    argc--;
 | 
			
		||||
    argv++;
 | 
			
		||||
    if ((osk = sk_OPENSSL_STRING_new_null()) == NULL) {
 | 
			
		||||
    if ((osk = sk_new_null()) == NULL) {
 | 
			
		||||
        BIO_printf(bio_err, "Memory allocation failure\n");
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
@@ -161,7 +161,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        } else if (strcmp(*argv, "-strparse") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            sk_OPENSSL_STRING_push(osk, *(++argv));
 | 
			
		||||
            sk_push(osk, *(++argv));
 | 
			
		||||
        } else if (strcmp(*argv, "-genstr") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
@@ -288,16 +288,16 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
 | 
			
		||||
    /* If any structs to parse go through in sequence */
 | 
			
		||||
 | 
			
		||||
    if (sk_OPENSSL_STRING_num(osk)) {
 | 
			
		||||
    if (sk_num(osk)) {
 | 
			
		||||
        tmpbuf = (unsigned char *)str;
 | 
			
		||||
        tmplen = num;
 | 
			
		||||
        for (i = 0; i < sk_OPENSSL_STRING_num(osk); i++) {
 | 
			
		||||
        for (i = 0; i < sk_num(osk); i++) {
 | 
			
		||||
            ASN1_TYPE *atmp;
 | 
			
		||||
            int typ;
 | 
			
		||||
            j = atoi(sk_OPENSSL_STRING_value(osk, i));
 | 
			
		||||
            j = atoi(sk_value(osk, i));
 | 
			
		||||
            if (j == 0) {
 | 
			
		||||
                BIO_printf(bio_err, "'%s' is an invalid number\n",
 | 
			
		||||
                           sk_OPENSSL_STRING_value(osk, i));
 | 
			
		||||
                           sk_value(osk, i));
 | 
			
		||||
                continue;
 | 
			
		||||
            }
 | 
			
		||||
            tmpbuf += j;
 | 
			
		||||
@@ -313,9 +313,9 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            }
 | 
			
		||||
            typ = ASN1_TYPE_get(at);
 | 
			
		||||
            if ((typ == V_ASN1_OBJECT)
 | 
			
		||||
                || (typ == V_ASN1_BOOLEAN)
 | 
			
		||||
                || (typ == V_ASN1_NULL)) {
 | 
			
		||||
                BIO_printf(bio_err, "Can't parse %s type\n", ASN1_tag2str(typ));
 | 
			
		||||
                BIO_printf(bio_err, "Can't parse %s type\n",
 | 
			
		||||
                           typ == V_ASN1_NULL ? "NULL" : "OBJECT");
 | 
			
		||||
                ERR_print_errors(bio_err);
 | 
			
		||||
                goto end;
 | 
			
		||||
            }
 | 
			
		||||
@@ -365,7 +365,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    if (at != NULL)
 | 
			
		||||
        ASN1_TYPE_free(at);
 | 
			
		||||
    if (osk != NULL)
 | 
			
		||||
        sk_OPENSSL_STRING_free(osk);
 | 
			
		||||
        sk_free(osk);
 | 
			
		||||
    OBJ_cleanup();
 | 
			
		||||
    apps_shutdown();
 | 
			
		||||
    OPENSSL_EXIT(ret);
 | 
			
		||||
@@ -375,7 +375,7 @@ static int do_generate(BIO *bio, char *genstr, char *genconf, BUF_MEM *buf)
 | 
			
		||||
{
 | 
			
		||||
    CONF *cnf = NULL;
 | 
			
		||||
    int len;
 | 
			
		||||
    long errline = 0;
 | 
			
		||||
    long errline;
 | 
			
		||||
    unsigned char *p;
 | 
			
		||||
    ASN1_TYPE *atyp = NULL;
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										339
									
								
								apps/ca.c
									
									
									
									
									
								
							
							
						
						
									
										339
									
								
								apps/ca.c
									
									
									
									
									
								
							@@ -63,6 +63,7 @@
 | 
			
		||||
#include <string.h>
 | 
			
		||||
#include <ctype.h>
 | 
			
		||||
#include <sys/types.h>
 | 
			
		||||
#include <sys/stat.h>
 | 
			
		||||
#include <openssl/conf.h>
 | 
			
		||||
#include <openssl/bio.h>
 | 
			
		||||
#include <openssl/err.h>
 | 
			
		||||
@@ -82,7 +83,7 @@
 | 
			
		||||
#  else
 | 
			
		||||
#   include <unixlib.h>
 | 
			
		||||
#  endif
 | 
			
		||||
# elif !defined(OPENSSL_SYS_VXWORKS) && !defined(OPENSSL_SYS_WINDOWS) && !defined(OPENSSL_SYS_NETWARE)
 | 
			
		||||
# elif !defined(OPENSSL_SYS_VXWORKS) && !defined(OPENSSL_SYS_WINDOWS) && !defined(OPENSSL_SYS_NETWARE) && !defined(__TANDEM)
 | 
			
		||||
#  include <sys/file.h>
 | 
			
		||||
# endif
 | 
			
		||||
#endif
 | 
			
		||||
@@ -99,19 +100,25 @@
 | 
			
		||||
#undef PROG
 | 
			
		||||
#define PROG ca_main
 | 
			
		||||
 | 
			
		||||
#define BASE_SECTION            "ca"
 | 
			
		||||
#define CONFIG_FILE             "openssl.cnf"
 | 
			
		||||
#define BASE_SECTION    "ca"
 | 
			
		||||
#define CONFIG_FILE "openssl.cnf"
 | 
			
		||||
 | 
			
		||||
#define ENV_DEFAULT_CA          "default_ca"
 | 
			
		||||
 | 
			
		||||
#define STRING_MASK             "string_mask"
 | 
			
		||||
#define STRING_MASK     "string_mask"
 | 
			
		||||
#define UTF8_IN                 "utf8"
 | 
			
		||||
 | 
			
		||||
#define ENV_DIR                 "dir"
 | 
			
		||||
#define ENV_CERTS               "certs"
 | 
			
		||||
#define ENV_CRL_DIR             "crl_dir"
 | 
			
		||||
#define ENV_CA_DB               "CA_DB"
 | 
			
		||||
#define ENV_NEW_CERTS_DIR       "new_certs_dir"
 | 
			
		||||
#define ENV_CERTIFICATE         "certificate"
 | 
			
		||||
#define ENV_SERIAL              "serial"
 | 
			
		||||
#define ENV_CRLNUMBER           "crlnumber"
 | 
			
		||||
#define ENV_CRL                 "crl"
 | 
			
		||||
#define ENV_PRIVATE_KEY         "private_key"
 | 
			
		||||
#define ENV_RANDFILE            "RANDFILE"
 | 
			
		||||
#define ENV_DEFAULT_DAYS        "default_days"
 | 
			
		||||
#define ENV_DEFAULT_STARTDATE   "default_startdate"
 | 
			
		||||
#define ENV_DEFAULT_ENDDATE     "default_enddate"
 | 
			
		||||
@@ -191,25 +198,23 @@ extern int EF_ALIGNMENT;
 | 
			
		||||
 | 
			
		||||
static void lookup_fail(const char *name, const char *tag);
 | 
			
		||||
static int certify(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
 | 
			
		||||
                   const EVP_MD *dgst, STACK_OF(OPENSSL_STRING) *sigopts,
 | 
			
		||||
                   STACK_OF(CONF_VALUE) *policy, CA_DB *db,
 | 
			
		||||
                   BIGNUM *serial, char *subj, unsigned long chtype,
 | 
			
		||||
                   int multirdn, int email_dn, char *startdate, char *enddate,
 | 
			
		||||
                   long days, int batch, char *ext_sect, CONF *conf,
 | 
			
		||||
                   int verbose, unsigned long certopt, unsigned long nameopt,
 | 
			
		||||
                   const EVP_MD *dgst, STACK_OF(CONF_VALUE) *policy,
 | 
			
		||||
                   CA_DB *db, BIGNUM *serial, char *subj,
 | 
			
		||||
                   unsigned long chtype, int multirdn, int email_dn,
 | 
			
		||||
                   char *startdate, char *enddate, long days, int batch,
 | 
			
		||||
                   char *ext_sect, CONF *conf, int verbose,
 | 
			
		||||
                   unsigned long certopt, unsigned long nameopt,
 | 
			
		||||
                   int default_op, int ext_copy, int selfsign);
 | 
			
		||||
static int certify_cert(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
 | 
			
		||||
                        const EVP_MD *dgst, STACK_OF(OPENSSL_STRING) *sigopts,
 | 
			
		||||
                        STACK_OF(CONF_VALUE) *policy, CA_DB *db,
 | 
			
		||||
                        BIGNUM *serial, char *subj, unsigned long chtype,
 | 
			
		||||
                        int multirdn, int email_dn, char *startdate,
 | 
			
		||||
                        char *enddate, long days, int batch, char *ext_sect,
 | 
			
		||||
                        CONF *conf, int verbose, unsigned long certopt,
 | 
			
		||||
                        unsigned long nameopt, int default_op, int ext_copy,
 | 
			
		||||
                        ENGINE *e);
 | 
			
		||||
                        const EVP_MD *dgst, STACK_OF(CONF_VALUE) *policy,
 | 
			
		||||
                        CA_DB *db, BIGNUM *serial, char *subj,
 | 
			
		||||
                        unsigned long chtype, int multirdn, int email_dn,
 | 
			
		||||
                        char *startdate, char *enddate, long days, int batch,
 | 
			
		||||
                        char *ext_sect, CONF *conf, int verbose,
 | 
			
		||||
                        unsigned long certopt, unsigned long nameopt,
 | 
			
		||||
                        int default_op, int ext_copy, ENGINE *e);
 | 
			
		||||
static int certify_spkac(X509 **xret, char *infile, EVP_PKEY *pkey,
 | 
			
		||||
                         X509 *x509, const EVP_MD *dgst,
 | 
			
		||||
                         STACK_OF(OPENSSL_STRING) *sigopts,
 | 
			
		||||
                         STACK_OF(CONF_VALUE) *policy, CA_DB *db,
 | 
			
		||||
                         BIGNUM *serial, char *subj, unsigned long chtype,
 | 
			
		||||
                         int multirdn, int email_dn, char *startdate,
 | 
			
		||||
@@ -219,12 +224,12 @@ static int certify_spkac(X509 **xret, char *infile, EVP_PKEY *pkey,
 | 
			
		||||
static void write_new_certificate(BIO *bp, X509 *x, int output_der,
 | 
			
		||||
                                  int notext);
 | 
			
		||||
static int do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509,
 | 
			
		||||
                   const EVP_MD *dgst, STACK_OF(OPENSSL_STRING) *sigopts,
 | 
			
		||||
                   STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial,
 | 
			
		||||
                   char *subj, unsigned long chtype, int multirdn,
 | 
			
		||||
                   int email_dn, char *startdate, char *enddate, long days,
 | 
			
		||||
                   int batch, int verbose, X509_REQ *req, char *ext_sect,
 | 
			
		||||
                   CONF *conf, unsigned long certopt, unsigned long nameopt,
 | 
			
		||||
                   const EVP_MD *dgst, STACK_OF(CONF_VALUE) *policy,
 | 
			
		||||
                   CA_DB *db, BIGNUM *serial, char *subj,
 | 
			
		||||
                   unsigned long chtype, int multirdn, int email_dn,
 | 
			
		||||
                   char *startdate, char *enddate, long days, int batch,
 | 
			
		||||
                   int verbose, X509_REQ *req, char *ext_sect, CONF *conf,
 | 
			
		||||
                   unsigned long certopt, unsigned long nameopt,
 | 
			
		||||
                   int default_op, int ext_copy, int selfsign);
 | 
			
		||||
static int do_revoke(X509 *x509, CA_DB *db, int ext, char *extval);
 | 
			
		||||
static int get_certificate_status(const char *ser_status, CA_DB *db);
 | 
			
		||||
@@ -260,7 +265,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    int doupdatedb = 0;
 | 
			
		||||
    long crldays = 0;
 | 
			
		||||
    long crlhours = 0;
 | 
			
		||||
    long crlsec = 0;
 | 
			
		||||
    long errorline = -1;
 | 
			
		||||
    char *configfile = NULL;
 | 
			
		||||
    char *md = NULL;
 | 
			
		||||
@@ -308,13 +312,11 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    ASN1_TIME *tmptm;
 | 
			
		||||
    ASN1_INTEGER *tmpser;
 | 
			
		||||
    char *f;
 | 
			
		||||
    const char *p;
 | 
			
		||||
    char *const *pp;
 | 
			
		||||
    const char *p, **pp;
 | 
			
		||||
    int i, j;
 | 
			
		||||
    const EVP_MD *dgst = NULL;
 | 
			
		||||
    STACK_OF(CONF_VALUE) *attribs = NULL;
 | 
			
		||||
    STACK_OF(X509) *cert_sk = NULL;
 | 
			
		||||
    STACK_OF(OPENSSL_STRING) *sigopts = NULL;
 | 
			
		||||
#undef BSIZE
 | 
			
		||||
#define BSIZE 256
 | 
			
		||||
    MS_STATIC char buf[3][BSIZE];
 | 
			
		||||
@@ -422,13 +424,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            outdir = *(++argv);
 | 
			
		||||
        } else if (strcmp(*argv, "-sigopt") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            if (!sigopts)
 | 
			
		||||
                sigopts = sk_OPENSSL_STRING_new_null();
 | 
			
		||||
            if (!sigopts || !sk_OPENSSL_STRING_push(sigopts, *(++argv)))
 | 
			
		||||
                goto bad;
 | 
			
		||||
        } else if (strcmp(*argv, "-notext") == 0)
 | 
			
		||||
            notext = 1;
 | 
			
		||||
        else if (strcmp(*argv, "-batch") == 0)
 | 
			
		||||
@@ -449,10 +444,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            crlhours = atol(*(++argv));
 | 
			
		||||
        } else if (strcmp(*argv, "-crlsec") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            crlsec = atol(*(++argv));
 | 
			
		||||
        } else if (strcmp(*argv, "-infiles") == 0) {
 | 
			
		||||
            argc--;
 | 
			
		||||
            argv++;
 | 
			
		||||
@@ -473,11 +464,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            infile = *(++argv);
 | 
			
		||||
            dorevoke = 1;
 | 
			
		||||
        } else if (strcmp(*argv, "-valid") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            infile = *(++argv);
 | 
			
		||||
            dorevoke = 2;
 | 
			
		||||
        } else if (strcmp(*argv, "-extensions") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
@@ -535,10 +521,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (badops) {
 | 
			
		||||
        const char **pp2;
 | 
			
		||||
 | 
			
		||||
        for (pp2 = ca_usage; (*pp2 != NULL); pp2++)
 | 
			
		||||
            BIO_printf(bio_err, "%s", *pp2);
 | 
			
		||||
        for (pp = ca_usage; (*pp != NULL); pp++)
 | 
			
		||||
            BIO_printf(bio_err, "%s", *pp);
 | 
			
		||||
        goto err;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
@@ -557,18 +541,10 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
        len = strlen(s) + sizeof(CONFIG_FILE);
 | 
			
		||||
        tofree = OPENSSL_malloc(len);
 | 
			
		||||
        if (!tofree) {
 | 
			
		||||
            BIO_printf(bio_err, "Out of memory\n");
 | 
			
		||||
            goto err;
 | 
			
		||||
        }
 | 
			
		||||
        strcpy(tofree, s);
 | 
			
		||||
#else
 | 
			
		||||
        len = strlen(s) + sizeof(CONFIG_FILE) + 1;
 | 
			
		||||
        tofree = OPENSSL_malloc(len);
 | 
			
		||||
        if (!tofree) {
 | 
			
		||||
            BIO_printf(bio_err, "Out of memory\n");
 | 
			
		||||
            goto err;
 | 
			
		||||
        }
 | 
			
		||||
        BUF_strlcpy(tofree, s, len);
 | 
			
		||||
        BUF_strlcat(tofree, "/", len);
 | 
			
		||||
#endif
 | 
			
		||||
@@ -666,7 +642,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        ERR_clear_error();
 | 
			
		||||
#ifdef RL_DEBUG
 | 
			
		||||
    if (!p)
 | 
			
		||||
        BIO_printf(bio_err, "DEBUG: unique_subject undefined\n");
 | 
			
		||||
        BIO_printf(bio_err, "DEBUG: unique_subject undefined\n", p);
 | 
			
		||||
#endif
 | 
			
		||||
#ifdef RL_DEBUG
 | 
			
		||||
    BIO_printf(bio_err, "DEBUG: configured unique_subject is %d\n",
 | 
			
		||||
@@ -796,6 +772,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        /*****************************************************************/
 | 
			
		||||
    /* lookup where to write new certificates */
 | 
			
		||||
    if ((outdir == NULL) && (req)) {
 | 
			
		||||
        struct stat sb;
 | 
			
		||||
 | 
			
		||||
        if ((outdir = NCONF_get_string(conf, section, ENV_NEW_CERTS_DIR))
 | 
			
		||||
            == NULL) {
 | 
			
		||||
@@ -814,23 +791,25 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
         * routines to convert the directory syntax to Unixly, and give that
 | 
			
		||||
         * to access().  However, time's too short to do that just now.
 | 
			
		||||
         */
 | 
			
		||||
# ifndef _WIN32
 | 
			
		||||
        if (access(outdir, R_OK | W_OK | X_OK) != 0)
 | 
			
		||||
# else
 | 
			
		||||
        if (_access(outdir, R_OK | W_OK | X_OK) != 0)
 | 
			
		||||
# endif
 | 
			
		||||
        {
 | 
			
		||||
        if (access(outdir, R_OK | W_OK | X_OK) != 0) {
 | 
			
		||||
            BIO_printf(bio_err, "I am unable to access the %s directory\n",
 | 
			
		||||
                       outdir);
 | 
			
		||||
            perror(outdir);
 | 
			
		||||
            goto err;
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        if (app_isdir(outdir) <= 0) {
 | 
			
		||||
        if (stat(outdir, &sb) != 0) {
 | 
			
		||||
            BIO_printf(bio_err, "unable to stat(%s)\n", outdir);
 | 
			
		||||
            perror(outdir);
 | 
			
		||||
            goto err;
 | 
			
		||||
        }
 | 
			
		||||
# ifdef S_ISDIR
 | 
			
		||||
        if (!S_ISDIR(sb.st_mode)) {
 | 
			
		||||
            BIO_printf(bio_err, "%s need to be a directory\n", outdir);
 | 
			
		||||
            perror(outdir);
 | 
			
		||||
            goto err;
 | 
			
		||||
        }
 | 
			
		||||
# endif
 | 
			
		||||
#endif
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
@@ -845,8 +824,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        goto err;
 | 
			
		||||
 | 
			
		||||
    /* Lets check some fields */
 | 
			
		||||
    for (i = 0; i < sk_OPENSSL_PSTRING_num(db->db->data); i++) {
 | 
			
		||||
        pp = sk_OPENSSL_PSTRING_value(db->db->data, i);
 | 
			
		||||
    for (i = 0; i < sk_num(db->db->data); i++) {
 | 
			
		||||
        pp = (const char **)sk_value(db->db->data, i);
 | 
			
		||||
        if ((pp[DB_type][0] != DB_TYPE_REV) && (pp[DB_rev_date][0] != '\0')) {
 | 
			
		||||
            BIO_printf(bio_err,
 | 
			
		||||
                       "entry %d: not revoked yet, but has a revocation date\n",
 | 
			
		||||
@@ -858,7 +837,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            BIO_printf(bio_err, " in entry %d\n", i + 1);
 | 
			
		||||
            goto err;
 | 
			
		||||
        }
 | 
			
		||||
        if (!check_time_format((char *)pp[DB_exp_date])) {
 | 
			
		||||
        if (!check_time_format(pp[DB_exp_date])) {
 | 
			
		||||
            BIO_printf(bio_err, "entry %d: invalid expiry date\n", i + 1);
 | 
			
		||||
            goto err;
 | 
			
		||||
        }
 | 
			
		||||
@@ -895,7 +874,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
#endif
 | 
			
		||||
        TXT_DB_write(out, db->db);
 | 
			
		||||
        BIO_printf(bio_err, "%d entries loaded from the database\n",
 | 
			
		||||
                   sk_OPENSSL_PSTRING_num(db->db->data));
 | 
			
		||||
                   db->db->data->num);
 | 
			
		||||
        BIO_printf(bio_err, "generating index\n");
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
@@ -980,15 +959,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        goto err;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (!strcmp(md, "default")) {
 | 
			
		||||
        int def_nid;
 | 
			
		||||
        if (EVP_PKEY_get_default_digest_nid(pkey, &def_nid) <= 0) {
 | 
			
		||||
            BIO_puts(bio_err, "no default digest\n");
 | 
			
		||||
            goto err;
 | 
			
		||||
        }
 | 
			
		||||
        md = (char *)OBJ_nid2sn(def_nid);
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if ((dgst = EVP_get_digestbyname(md)) == NULL) {
 | 
			
		||||
        BIO_printf(bio_err, "%s is an unsupported message digest type\n", md);
 | 
			
		||||
        goto err;
 | 
			
		||||
@@ -1052,9 +1022,9 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            if (startdate == NULL)
 | 
			
		||||
                ERR_clear_error();
 | 
			
		||||
        }
 | 
			
		||||
        if (startdate && !ASN1_TIME_set_string(NULL, startdate)) {
 | 
			
		||||
        if (startdate && !ASN1_UTCTIME_set_string(NULL, startdate)) {
 | 
			
		||||
            BIO_printf(bio_err,
 | 
			
		||||
                       "start date is invalid, it should be YYMMDDHHMMSSZ or YYYYMMDDHHMMSSZ\n");
 | 
			
		||||
                       "start date is invalid, it should be YYMMDDHHMMSSZ\n");
 | 
			
		||||
            goto err;
 | 
			
		||||
        }
 | 
			
		||||
        if (startdate == NULL)
 | 
			
		||||
@@ -1065,9 +1035,9 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            if (enddate == NULL)
 | 
			
		||||
                ERR_clear_error();
 | 
			
		||||
        }
 | 
			
		||||
        if (enddate && !ASN1_TIME_set_string(NULL, enddate)) {
 | 
			
		||||
        if (enddate && !ASN1_UTCTIME_set_string(NULL, enddate)) {
 | 
			
		||||
            BIO_printf(bio_err,
 | 
			
		||||
                       "end date is invalid, it should be YYMMDDHHMMSSZ or YYYYMMDDHHMMSSZ\n");
 | 
			
		||||
                       "end date is invalid, it should be YYMMDDHHMMSSZ\n");
 | 
			
		||||
            goto err;
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
@@ -1107,10 +1077,10 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        }
 | 
			
		||||
        if (spkac_file != NULL) {
 | 
			
		||||
            total++;
 | 
			
		||||
            j = certify_spkac(&x, spkac_file, pkey, x509, dgst, sigopts,
 | 
			
		||||
                              attribs, db, serial, subj, chtype, multirdn,
 | 
			
		||||
                              email_dn, startdate, enddate, days, extensions,
 | 
			
		||||
                              conf, verbose, certopt, nameopt, default_op,
 | 
			
		||||
            j = certify_spkac(&x, spkac_file, pkey, x509, dgst, attribs, db,
 | 
			
		||||
                              serial, subj, chtype, multirdn, email_dn,
 | 
			
		||||
                              startdate, enddate, days, extensions, conf,
 | 
			
		||||
                              verbose, certopt, nameopt, default_op,
 | 
			
		||||
                              ext_copy);
 | 
			
		||||
            if (j < 0)
 | 
			
		||||
                goto err;
 | 
			
		||||
@@ -1131,8 +1101,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        }
 | 
			
		||||
        if (ss_cert_file != NULL) {
 | 
			
		||||
            total++;
 | 
			
		||||
            j = certify_cert(&x, ss_cert_file, pkey, x509, dgst, sigopts,
 | 
			
		||||
                             attribs,
 | 
			
		||||
            j = certify_cert(&x, ss_cert_file, pkey, x509, dgst, attribs,
 | 
			
		||||
                             db, serial, subj, chtype, multirdn, email_dn,
 | 
			
		||||
                             startdate, enddate, days, batch, extensions,
 | 
			
		||||
                             conf, verbose, certopt, nameopt, default_op,
 | 
			
		||||
@@ -1152,7 +1121,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        }
 | 
			
		||||
        if (infile != NULL) {
 | 
			
		||||
            total++;
 | 
			
		||||
            j = certify(&x, infile, pkey, x509p, dgst, sigopts, attribs, db,
 | 
			
		||||
            j = certify(&x, infile, pkey, x509p, dgst, attribs, db,
 | 
			
		||||
                        serial, subj, chtype, multirdn, email_dn, startdate,
 | 
			
		||||
                        enddate, days, batch, extensions, conf, verbose,
 | 
			
		||||
                        certopt, nameopt, default_op, ext_copy, selfsign);
 | 
			
		||||
@@ -1171,7 +1140,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        }
 | 
			
		||||
        for (i = 0; i < argc; i++) {
 | 
			
		||||
            total++;
 | 
			
		||||
            j = certify(&x, argv[i], pkey, x509p, dgst, sigopts, attribs, db,
 | 
			
		||||
            j = certify(&x, argv[i], pkey, x509p, dgst, attribs, db,
 | 
			
		||||
                        serial, subj, chtype, multirdn, email_dn, startdate,
 | 
			
		||||
                        enddate, days, batch, extensions, conf, verbose,
 | 
			
		||||
                        certopt, nameopt, default_op, ext_copy, selfsign);
 | 
			
		||||
@@ -1316,16 +1285,15 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                goto err;
 | 
			
		||||
            }
 | 
			
		||||
 | 
			
		||||
        if (!crldays && !crlhours && !crlsec) {
 | 
			
		||||
        if (!crldays && !crlhours) {
 | 
			
		||||
            if (!NCONF_get_number(conf, section,
 | 
			
		||||
                                  ENV_DEFAULT_CRL_DAYS, &crldays))
 | 
			
		||||
                crldays = 0;
 | 
			
		||||
            if (!NCONF_get_number(conf, section,
 | 
			
		||||
                                  ENV_DEFAULT_CRL_HOURS, &crlhours))
 | 
			
		||||
                crlhours = 0;
 | 
			
		||||
            ERR_clear_error();
 | 
			
		||||
        }
 | 
			
		||||
        if ((crldays == 0) && (crlhours == 0) && (crlsec == 0)) {
 | 
			
		||||
        if ((crldays == 0) && (crlhours == 0)) {
 | 
			
		||||
            BIO_printf(bio_err,
 | 
			
		||||
                       "cannot lookup how long until the next CRL is issued\n");
 | 
			
		||||
            goto err;
 | 
			
		||||
@@ -1343,17 +1311,13 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            goto err;
 | 
			
		||||
        X509_gmtime_adj(tmptm, 0);
 | 
			
		||||
        X509_CRL_set_lastUpdate(crl, tmptm);
 | 
			
		||||
        if (!X509_time_adj_ex(tmptm, crldays, crlhours * 60 * 60 + crlsec,
 | 
			
		||||
                              NULL)) {
 | 
			
		||||
            BIO_puts(bio_err, "error setting CRL nextUpdate\n");
 | 
			
		||||
            goto err;
 | 
			
		||||
        }
 | 
			
		||||
        X509_gmtime_adj(tmptm, (crldays * 24 + crlhours) * 60 * 60);
 | 
			
		||||
        X509_CRL_set_nextUpdate(crl, tmptm);
 | 
			
		||||
 | 
			
		||||
        ASN1_TIME_free(tmptm);
 | 
			
		||||
 | 
			
		||||
        for (i = 0; i < sk_OPENSSL_PSTRING_num(db->db->data); i++) {
 | 
			
		||||
            pp = sk_OPENSSL_PSTRING_value(db->db->data, i);
 | 
			
		||||
        for (i = 0; i < sk_num(db->db->data); i++) {
 | 
			
		||||
            pp = (const char **)sk_value(db->db->data, i);
 | 
			
		||||
            if (pp[DB_type][0] == DB_TYPE_REV) {
 | 
			
		||||
                if ((r = X509_REVOKED_new()) == NULL)
 | 
			
		||||
                    goto err;
 | 
			
		||||
@@ -1383,6 +1347,15 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        /* we now have a CRL */
 | 
			
		||||
        if (verbose)
 | 
			
		||||
            BIO_printf(bio_err, "signing CRL\n");
 | 
			
		||||
#ifndef OPENSSL_NO_DSA
 | 
			
		||||
        if (pkey->type == EVP_PKEY_DSA)
 | 
			
		||||
            dgst = EVP_dss1();
 | 
			
		||||
        else
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_ECDSA
 | 
			
		||||
        if (pkey->type == EVP_PKEY_EC)
 | 
			
		||||
            dgst = EVP_ecdsa();
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
        /* Add any extensions asked for */
 | 
			
		||||
 | 
			
		||||
@@ -1415,12 +1388,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            if (!save_serial(crlnumberfile, "new", crlnumber, NULL))
 | 
			
		||||
                goto err;
 | 
			
		||||
 | 
			
		||||
        if (crlnumber) {
 | 
			
		||||
            BN_free(crlnumber);
 | 
			
		||||
            crlnumber = NULL;
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        if (!do_X509_CRL_sign(bio_err, crl, pkey, dgst, sigopts))
 | 
			
		||||
        if (!X509_CRL_sign(crl, pkey, dgst))
 | 
			
		||||
            goto err;
 | 
			
		||||
 | 
			
		||||
        PEM_write_bio_X509_CRL(Sout, crl);
 | 
			
		||||
@@ -1440,8 +1408,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            revcert = load_cert(bio_err, infile, FORMAT_PEM, NULL, e, infile);
 | 
			
		||||
            if (revcert == NULL)
 | 
			
		||||
                goto err;
 | 
			
		||||
            if (dorevoke == 2)
 | 
			
		||||
                rev_type = -1;
 | 
			
		||||
            j = do_revoke(revcert, db, rev_type, rev_arg);
 | 
			
		||||
            if (j <= 0)
 | 
			
		||||
                goto err;
 | 
			
		||||
@@ -1475,10 +1441,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    if (free_key && key)
 | 
			
		||||
        OPENSSL_free(key);
 | 
			
		||||
    BN_free(serial);
 | 
			
		||||
    BN_free(crlnumber);
 | 
			
		||||
    free_index(db);
 | 
			
		||||
    if (sigopts)
 | 
			
		||||
        sk_OPENSSL_STRING_free(sigopts);
 | 
			
		||||
    EVP_PKEY_free(pkey);
 | 
			
		||||
    if (x509)
 | 
			
		||||
        X509_free(x509);
 | 
			
		||||
@@ -1496,12 +1459,12 @@ static void lookup_fail(const char *name, const char *tag)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static int certify(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
 | 
			
		||||
                   const EVP_MD *dgst, STACK_OF(OPENSSL_STRING) *sigopts,
 | 
			
		||||
                   STACK_OF(CONF_VALUE) *policy, CA_DB *db,
 | 
			
		||||
                   BIGNUM *serial, char *subj, unsigned long chtype,
 | 
			
		||||
                   int multirdn, int email_dn, char *startdate, char *enddate,
 | 
			
		||||
                   long days, int batch, char *ext_sect, CONF *lconf,
 | 
			
		||||
                   int verbose, unsigned long certopt, unsigned long nameopt,
 | 
			
		||||
                   const EVP_MD *dgst, STACK_OF(CONF_VALUE) *policy,
 | 
			
		||||
                   CA_DB *db, BIGNUM *serial, char *subj,
 | 
			
		||||
                   unsigned long chtype, int multirdn, int email_dn,
 | 
			
		||||
                   char *startdate, char *enddate, long days, int batch,
 | 
			
		||||
                   char *ext_sect, CONF *lconf, int verbose,
 | 
			
		||||
                   unsigned long certopt, unsigned long nameopt,
 | 
			
		||||
                   int default_op, int ext_copy, int selfsign)
 | 
			
		||||
{
 | 
			
		||||
    X509_REQ *req = NULL;
 | 
			
		||||
@@ -1552,10 +1515,10 @@ static int certify(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
 | 
			
		||||
    } else
 | 
			
		||||
        BIO_printf(bio_err, "Signature ok\n");
 | 
			
		||||
 | 
			
		||||
    ok = do_body(xret, pkey, x509, dgst, sigopts, policy, db, serial, subj,
 | 
			
		||||
                 chtype, multirdn, email_dn, startdate, enddate, days, batch,
 | 
			
		||||
                 verbose, req, ext_sect, lconf, certopt, nameopt, default_op,
 | 
			
		||||
                 ext_copy, selfsign);
 | 
			
		||||
    ok = do_body(xret, pkey, x509, dgst, policy, db, serial, subj, chtype,
 | 
			
		||||
                 multirdn, email_dn, startdate, enddate, days, batch, verbose,
 | 
			
		||||
                 req, ext_sect, lconf, certopt, nameopt, default_op, ext_copy,
 | 
			
		||||
                 selfsign);
 | 
			
		||||
 | 
			
		||||
 err:
 | 
			
		||||
    if (req != NULL)
 | 
			
		||||
@@ -1566,14 +1529,13 @@ static int certify(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static int certify_cert(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
 | 
			
		||||
                        const EVP_MD *dgst, STACK_OF(OPENSSL_STRING) *sigopts,
 | 
			
		||||
                        STACK_OF(CONF_VALUE) *policy, CA_DB *db,
 | 
			
		||||
                        BIGNUM *serial, char *subj, unsigned long chtype,
 | 
			
		||||
                        int multirdn, int email_dn, char *startdate,
 | 
			
		||||
                        char *enddate, long days, int batch, char *ext_sect,
 | 
			
		||||
                        CONF *lconf, int verbose, unsigned long certopt,
 | 
			
		||||
                        unsigned long nameopt, int default_op, int ext_copy,
 | 
			
		||||
                        ENGINE *e)
 | 
			
		||||
                        const EVP_MD *dgst, STACK_OF(CONF_VALUE) *policy,
 | 
			
		||||
                        CA_DB *db, BIGNUM *serial, char *subj,
 | 
			
		||||
                        unsigned long chtype, int multirdn, int email_dn,
 | 
			
		||||
                        char *startdate, char *enddate, long days, int batch,
 | 
			
		||||
                        char *ext_sect, CONF *lconf, int verbose,
 | 
			
		||||
                        unsigned long certopt, unsigned long nameopt,
 | 
			
		||||
                        int default_op, int ext_copy, ENGINE *e)
 | 
			
		||||
{
 | 
			
		||||
    X509 *req = NULL;
 | 
			
		||||
    X509_REQ *rreq = NULL;
 | 
			
		||||
@@ -1609,9 +1571,9 @@ static int certify_cert(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
 | 
			
		||||
    if ((rreq = X509_to_X509_REQ(req, NULL, EVP_md5())) == NULL)
 | 
			
		||||
        goto err;
 | 
			
		||||
 | 
			
		||||
    ok = do_body(xret, pkey, x509, dgst, sigopts, policy, db, serial, subj,
 | 
			
		||||
                 chtype, multirdn, email_dn, startdate, enddate, days, batch,
 | 
			
		||||
                 verbose, rreq, ext_sect, lconf, certopt, nameopt, default_op,
 | 
			
		||||
    ok = do_body(xret, pkey, x509, dgst, policy, db, serial, subj, chtype,
 | 
			
		||||
                 multirdn, email_dn, startdate, enddate, days, batch, verbose,
 | 
			
		||||
                 rreq, ext_sect, lconf, certopt, nameopt, default_op,
 | 
			
		||||
                 ext_copy, 0);
 | 
			
		||||
 | 
			
		||||
 err:
 | 
			
		||||
@@ -1623,12 +1585,12 @@ static int certify_cert(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static int do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509,
 | 
			
		||||
                   const EVP_MD *dgst, STACK_OF(OPENSSL_STRING) *sigopts,
 | 
			
		||||
                   STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial,
 | 
			
		||||
                   char *subj, unsigned long chtype, int multirdn,
 | 
			
		||||
                   int email_dn, char *startdate, char *enddate, long days,
 | 
			
		||||
                   int batch, int verbose, X509_REQ *req, char *ext_sect,
 | 
			
		||||
                   CONF *lconf, unsigned long certopt, unsigned long nameopt,
 | 
			
		||||
                   const EVP_MD *dgst, STACK_OF(CONF_VALUE) *policy,
 | 
			
		||||
                   CA_DB *db, BIGNUM *serial, char *subj,
 | 
			
		||||
                   unsigned long chtype, int multirdn, int email_dn,
 | 
			
		||||
                   char *startdate, char *enddate, long days, int batch,
 | 
			
		||||
                   int verbose, X509_REQ *req, char *ext_sect, CONF *lconf,
 | 
			
		||||
                   unsigned long certopt, unsigned long nameopt,
 | 
			
		||||
                   int default_op, int ext_copy, int selfsign)
 | 
			
		||||
{
 | 
			
		||||
    X509_NAME *name = NULL, *CAname = NULL, *subject = NULL, *dn_subject =
 | 
			
		||||
@@ -1644,9 +1606,7 @@ static int do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509,
 | 
			
		||||
    int ok = -1, i, j, last, nid;
 | 
			
		||||
    const char *p;
 | 
			
		||||
    CONF_VALUE *cv;
 | 
			
		||||
    OPENSSL_STRING row[DB_NUMBER];
 | 
			
		||||
    OPENSSL_STRING *irow = NULL;
 | 
			
		||||
    OPENSSL_STRING *rrow = NULL;
 | 
			
		||||
    char *row[DB_NUMBER], **rrow = NULL, **irow = NULL;
 | 
			
		||||
    char buf[25];
 | 
			
		||||
 | 
			
		||||
    tmptm = ASN1_UTCTIME_new();
 | 
			
		||||
@@ -1880,9 +1840,7 @@ static int do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509,
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (db->attributes.unique_subject) {
 | 
			
		||||
        OPENSSL_STRING *crow = row;
 | 
			
		||||
 | 
			
		||||
        rrow = TXT_DB_get_by_index(db->db, DB_name, crow);
 | 
			
		||||
        rrow = TXT_DB_get_by_index(db->db, DB_name, row);
 | 
			
		||||
        if (rrow != NULL) {
 | 
			
		||||
            BIO_printf(bio_err,
 | 
			
		||||
                       "ERROR:There is already a certificate for %s\n",
 | 
			
		||||
@@ -1965,16 +1923,12 @@ static int do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509,
 | 
			
		||||
    if (strcmp(startdate, "today") == 0)
 | 
			
		||||
        X509_gmtime_adj(X509_get_notBefore(ret), 0);
 | 
			
		||||
    else
 | 
			
		||||
        ASN1_TIME_set_string(X509_get_notBefore(ret), startdate);
 | 
			
		||||
        ASN1_UTCTIME_set_string(X509_get_notBefore(ret), startdate);
 | 
			
		||||
 | 
			
		||||
    if (enddate == NULL)
 | 
			
		||||
        X509_time_adj_ex(X509_get_notAfter(ret), days, 0, NULL);
 | 
			
		||||
    else {
 | 
			
		||||
        int tdays;
 | 
			
		||||
        ASN1_TIME_set_string(X509_get_notAfter(ret), enddate);
 | 
			
		||||
        ASN1_TIME_diff(&tdays, NULL, NULL, X509_get_notAfter(ret));
 | 
			
		||||
        days = tdays;
 | 
			
		||||
    }
 | 
			
		||||
        X509_gmtime_adj(X509_get_notAfter(ret), (long)60 * 60 * 24 * days);
 | 
			
		||||
    else
 | 
			
		||||
        ASN1_UTCTIME_set_string(X509_get_notAfter(ret), enddate);
 | 
			
		||||
 | 
			
		||||
    if (!X509_set_subject_name(ret, subject))
 | 
			
		||||
        goto err;
 | 
			
		||||
@@ -2092,14 +2046,26 @@ static int do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509,
 | 
			
		||||
            goto err;
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_DSA
 | 
			
		||||
    if (pkey->type == EVP_PKEY_DSA)
 | 
			
		||||
        dgst = EVP_dss1();
 | 
			
		||||
    pktmp = X509_get_pubkey(ret);
 | 
			
		||||
    if (EVP_PKEY_missing_parameters(pktmp) &&
 | 
			
		||||
        !EVP_PKEY_missing_parameters(pkey))
 | 
			
		||||
        EVP_PKEY_copy_parameters(pktmp, pkey);
 | 
			
		||||
    EVP_PKEY_free(pktmp);
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_ECDSA
 | 
			
		||||
    if (pkey->type == EVP_PKEY_EC)
 | 
			
		||||
        dgst = EVP_ecdsa();
 | 
			
		||||
    pktmp = X509_get_pubkey(ret);
 | 
			
		||||
    if (EVP_PKEY_missing_parameters(pktmp) &&
 | 
			
		||||
        !EVP_PKEY_missing_parameters(pkey))
 | 
			
		||||
        EVP_PKEY_copy_parameters(pktmp, pkey);
 | 
			
		||||
    EVP_PKEY_free(pktmp);
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
    if (!do_X509_sign(bio_err, ret, pkey, dgst, sigopts))
 | 
			
		||||
    if (!X509_sign(ret, pkey, dgst))
 | 
			
		||||
        goto err;
 | 
			
		||||
 | 
			
		||||
    /* We now just add it to the database */
 | 
			
		||||
@@ -2192,7 +2158,6 @@ static void write_new_certificate(BIO *bp, X509 *x, int output_der,
 | 
			
		||||
 | 
			
		||||
static int certify_spkac(X509 **xret, char *infile, EVP_PKEY *pkey,
 | 
			
		||||
                         X509 *x509, const EVP_MD *dgst,
 | 
			
		||||
                         STACK_OF(OPENSSL_STRING) *sigopts,
 | 
			
		||||
                         STACK_OF(CONF_VALUE) *policy, CA_DB *db,
 | 
			
		||||
                         BIGNUM *serial, char *subj, unsigned long chtype,
 | 
			
		||||
                         int multirdn, int email_dn, char *startdate,
 | 
			
		||||
@@ -2201,7 +2166,7 @@ static int certify_spkac(X509 **xret, char *infile, EVP_PKEY *pkey,
 | 
			
		||||
                         unsigned long nameopt, int default_op, int ext_copy)
 | 
			
		||||
{
 | 
			
		||||
    STACK_OF(CONF_VALUE) *sk = NULL;
 | 
			
		||||
    LHASH_OF(CONF_VALUE) *parms = NULL;
 | 
			
		||||
    LHASH *parms = NULL;
 | 
			
		||||
    X509_REQ *req = NULL;
 | 
			
		||||
    CONF_VALUE *cv = NULL;
 | 
			
		||||
    NETSCAPE_SPKI *spki = NULL;
 | 
			
		||||
@@ -2315,10 +2280,10 @@ static int certify_spkac(X509 **xret, char *infile, EVP_PKEY *pkey,
 | 
			
		||||
 | 
			
		||||
    X509_REQ_set_pubkey(req, pktmp);
 | 
			
		||||
    EVP_PKEY_free(pktmp);
 | 
			
		||||
    ok = do_body(xret, pkey, x509, dgst, sigopts, policy, db, serial, subj,
 | 
			
		||||
                 chtype, multirdn, email_dn, startdate, enddate, days, 1,
 | 
			
		||||
                 verbose, req, ext_sect, lconf, certopt, nameopt, default_op,
 | 
			
		||||
                 ext_copy, 0);
 | 
			
		||||
    ok = do_body(xret, pkey, x509, dgst, policy, db, serial, subj, chtype,
 | 
			
		||||
                 multirdn, email_dn, startdate, enddate, days, 1, verbose,
 | 
			
		||||
                 req, ext_sect, lconf, certopt, nameopt, default_op, ext_copy,
 | 
			
		||||
                 0);
 | 
			
		||||
 err:
 | 
			
		||||
    if (req != NULL)
 | 
			
		||||
        X509_REQ_free(req);
 | 
			
		||||
@@ -2334,7 +2299,15 @@ static int certify_spkac(X509 **xret, char *infile, EVP_PKEY *pkey,
 | 
			
		||||
 | 
			
		||||
static int check_time_format(const char *str)
 | 
			
		||||
{
 | 
			
		||||
    return ASN1_TIME_set_string(NULL, str);
 | 
			
		||||
    ASN1_TIME tm;
 | 
			
		||||
 | 
			
		||||
    tm.data = (unsigned char *)str;
 | 
			
		||||
    tm.length = strlen(str);
 | 
			
		||||
    tm.type = V_ASN1_UTCTIME;
 | 
			
		||||
    if (ASN1_TIME_check(&tm))
 | 
			
		||||
        return 1;
 | 
			
		||||
    tm.type = V_ASN1_GENERALIZEDTIME;
 | 
			
		||||
    return ASN1_TIME_check(&tm);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static int do_revoke(X509 *x509, CA_DB *db, int type, char *value)
 | 
			
		||||
@@ -2349,8 +2322,6 @@ static int do_revoke(X509 *x509, CA_DB *db, int type, char *value)
 | 
			
		||||
        row[i] = NULL;
 | 
			
		||||
    row[DB_name] = X509_NAME_oneline(X509_get_subject_name(x509), NULL, 0);
 | 
			
		||||
    bn = ASN1_INTEGER_to_BN(X509_get_serialNumber(x509), NULL);
 | 
			
		||||
    if (!bn)
 | 
			
		||||
        goto err;
 | 
			
		||||
    if (BN_is_zero(bn))
 | 
			
		||||
        row[DB_serial] = BUF_strdup("00");
 | 
			
		||||
    else
 | 
			
		||||
@@ -2414,20 +2385,13 @@ static int do_revoke(X509 *x509, CA_DB *db, int type, char *value)
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        /* Revoke Certificate */
 | 
			
		||||
        if (type == -1)
 | 
			
		||||
            ok = 1;
 | 
			
		||||
        else
 | 
			
		||||
            ok = do_revoke(x509, db, type, value);
 | 
			
		||||
        ok = do_revoke(x509, db, type, value);
 | 
			
		||||
 | 
			
		||||
        goto err;
 | 
			
		||||
 | 
			
		||||
    } else if (index_name_cmp_noconst(row, rrow)) {
 | 
			
		||||
    } else if (index_name_cmp((const char **)row, (const char **)rrow)) {
 | 
			
		||||
        BIO_printf(bio_err, "ERROR:name does not match %s\n", row[DB_name]);
 | 
			
		||||
        goto err;
 | 
			
		||||
    } else if (type == -1) {
 | 
			
		||||
        BIO_printf(bio_err, "ERROR:Already present, serial number %s\n",
 | 
			
		||||
                   row[DB_serial]);
 | 
			
		||||
        goto err;
 | 
			
		||||
    } else if (rrow[DB_type][0] == 'R') {
 | 
			
		||||
        BIO_printf(bio_err, "ERROR:Already revoked, serial number %s\n",
 | 
			
		||||
                   row[DB_serial]);
 | 
			
		||||
@@ -2485,7 +2449,7 @@ static int get_certificate_status(const char *serial, CA_DB *db)
 | 
			
		||||
 | 
			
		||||
    /* Make it Upper Case */
 | 
			
		||||
    for (i = 0; row[DB_serial][i] != '\0'; i++)
 | 
			
		||||
        row[DB_serial][i] = toupper((unsigned char)row[DB_serial][i]);
 | 
			
		||||
        row[DB_serial][i] = toupper(row[DB_serial][i]);
 | 
			
		||||
 | 
			
		||||
    ok = 1;
 | 
			
		||||
 | 
			
		||||
@@ -2532,8 +2496,6 @@ static int do_updatedb(CA_DB *db)
 | 
			
		||||
    char **rrow, *a_tm_s;
 | 
			
		||||
 | 
			
		||||
    a_tm = ASN1_UTCTIME_new();
 | 
			
		||||
    if (a_tm == NULL)
 | 
			
		||||
        return -1;
 | 
			
		||||
 | 
			
		||||
    /* get actual time and make a string */
 | 
			
		||||
    a_tm = X509_gmtime_adj(a_tm, 0);
 | 
			
		||||
@@ -2551,8 +2513,8 @@ static int do_updatedb(CA_DB *db)
 | 
			
		||||
    else
 | 
			
		||||
        a_y2k = 0;
 | 
			
		||||
 | 
			
		||||
    for (i = 0; i < sk_OPENSSL_PSTRING_num(db->db->data); i++) {
 | 
			
		||||
        rrow = sk_OPENSSL_PSTRING_value(db->db->data, i);
 | 
			
		||||
    for (i = 0; i < sk_num(db->db->data); i++) {
 | 
			
		||||
        rrow = (char **)sk_value(db->db->data, i);
 | 
			
		||||
 | 
			
		||||
        if (rrow[DB_type][0] == 'V') {
 | 
			
		||||
            /* ignore entries that are not valid */
 | 
			
		||||
@@ -2791,14 +2753,24 @@ int old_entry_print(BIO *bp, ASN1_OBJECT *obj, ASN1_STRING *str)
 | 
			
		||||
 | 
			
		||||
    p = (char *)str->data;
 | 
			
		||||
    for (j = str->length; j > 0; j--) {
 | 
			
		||||
#ifdef CHARSET_EBCDIC
 | 
			
		||||
        if ((*p >= 0x20) && (*p <= 0x7e))
 | 
			
		||||
            BIO_printf(bp, "%c", os_toebcdic[*p]);
 | 
			
		||||
#else
 | 
			
		||||
        if ((*p >= ' ') && (*p <= '~'))
 | 
			
		||||
            BIO_printf(bp, "%c", *p);
 | 
			
		||||
#endif
 | 
			
		||||
        else if (*p & 0x80)
 | 
			
		||||
            BIO_printf(bp, "\\0x%02X", *p);
 | 
			
		||||
        else if ((unsigned char)*p == 0xf7)
 | 
			
		||||
            BIO_printf(bp, "^?");
 | 
			
		||||
#ifdef CHARSET_EBCDIC
 | 
			
		||||
        else
 | 
			
		||||
            BIO_printf(bp, "^%c", os_toebcdic[*p + 0x40]);
 | 
			
		||||
#else
 | 
			
		||||
        else
 | 
			
		||||
            BIO_printf(bp, "^%c", *p + '@');
 | 
			
		||||
#endif
 | 
			
		||||
        p++;
 | 
			
		||||
    }
 | 
			
		||||
    BIO_printf(bp, "'\n");
 | 
			
		||||
@@ -2817,11 +2789,6 @@ int unpack_revinfo(ASN1_TIME **prevtm, int *preason, ASN1_OBJECT **phold,
 | 
			
		||||
    ASN1_GENERALIZEDTIME *comp_time = NULL;
 | 
			
		||||
    tmp = BUF_strdup(str);
 | 
			
		||||
 | 
			
		||||
    if (!tmp) {
 | 
			
		||||
        BIO_printf(bio_err, "memory allocation failure\n");
 | 
			
		||||
        goto err;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    p = strchr(tmp, ',');
 | 
			
		||||
 | 
			
		||||
    rtime_str = tmp;
 | 
			
		||||
@@ -2839,10 +2806,6 @@ int unpack_revinfo(ASN1_TIME **prevtm, int *preason, ASN1_OBJECT **phold,
 | 
			
		||||
 | 
			
		||||
    if (prevtm) {
 | 
			
		||||
        *prevtm = ASN1_UTCTIME_new();
 | 
			
		||||
        if (!*prevtm) {
 | 
			
		||||
            BIO_printf(bio_err, "memory allocation failure\n");
 | 
			
		||||
            goto err;
 | 
			
		||||
        }
 | 
			
		||||
        if (!ASN1_UTCTIME_set_string(*prevtm, rtime_str)) {
 | 
			
		||||
            BIO_printf(bio_err, "invalid revocation date %s\n", rtime_str);
 | 
			
		||||
            goto err;
 | 
			
		||||
@@ -2883,10 +2846,6 @@ int unpack_revinfo(ASN1_TIME **prevtm, int *preason, ASN1_OBJECT **phold,
 | 
			
		||||
                goto err;
 | 
			
		||||
            }
 | 
			
		||||
            comp_time = ASN1_GENERALIZEDTIME_new();
 | 
			
		||||
            if (!comp_time) {
 | 
			
		||||
                BIO_printf(bio_err, "memory allocation failure\n");
 | 
			
		||||
                goto err;
 | 
			
		||||
            }
 | 
			
		||||
            if (!ASN1_GENERALIZEDTIME_set_string(comp_time, arg_str)) {
 | 
			
		||||
                BIO_printf(bio_err, "invalid compromised time %s\n", arg_str);
 | 
			
		||||
                goto err;
 | 
			
		||||
 
 | 
			
		||||
@@ -71,8 +71,7 @@
 | 
			
		||||
 | 
			
		||||
static const char *ciphers_usage[] = {
 | 
			
		||||
    "usage: ciphers args\n",
 | 
			
		||||
    " -v          - verbose mode, a textual listing of the SSL/TLS ciphers in OpenSSL\n",
 | 
			
		||||
    " -V          - even more verbose\n",
 | 
			
		||||
    " -v          - verbose mode, a textual listing of the ciphers in SSLeay\n",
 | 
			
		||||
    " -ssl2       - SSL2 mode\n",
 | 
			
		||||
    " -ssl3       - SSL3 mode\n",
 | 
			
		||||
    " -tls1       - TLS1 mode\n",
 | 
			
		||||
@@ -84,22 +83,25 @@ int MAIN(int, char **);
 | 
			
		||||
int MAIN(int argc, char **argv)
 | 
			
		||||
{
 | 
			
		||||
    int ret = 1, i;
 | 
			
		||||
    int verbose = 0, Verbose = 0;
 | 
			
		||||
#ifndef OPENSSL_NO_SSL_TRACE
 | 
			
		||||
    int stdname = 0;
 | 
			
		||||
#endif
 | 
			
		||||
    int verbose = 0;
 | 
			
		||||
    const char **pp;
 | 
			
		||||
    const char *p;
 | 
			
		||||
    int badops = 0;
 | 
			
		||||
    SSL_CTX *ctx = NULL;
 | 
			
		||||
    SSL *ssl = NULL;
 | 
			
		||||
    char *ciphers = NULL;
 | 
			
		||||
    const SSL_METHOD *meth = NULL;
 | 
			
		||||
    SSL_METHOD *meth = NULL;
 | 
			
		||||
    STACK_OF(SSL_CIPHER) *sk;
 | 
			
		||||
    char buf[512];
 | 
			
		||||
    BIO *STDout = NULL;
 | 
			
		||||
 | 
			
		||||
#if !defined(OPENSSL_NO_SSL2) && !defined(OPENSSL_NO_SSL3)
 | 
			
		||||
    meth = SSLv23_server_method();
 | 
			
		||||
#elif !defined(OPENSSL_NO_SSL3)
 | 
			
		||||
    meth = SSLv3_server_method();
 | 
			
		||||
#elif !defined(OPENSSL_NO_SSL2)
 | 
			
		||||
    meth = SSLv2_server_method();
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
    apps_startup();
 | 
			
		||||
 | 
			
		||||
@@ -112,20 +114,12 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        STDout = BIO_push(tmpbio, STDout);
 | 
			
		||||
    }
 | 
			
		||||
#endif
 | 
			
		||||
    if (!load_config(bio_err, NULL))
 | 
			
		||||
        goto end;
 | 
			
		||||
 | 
			
		||||
    argc--;
 | 
			
		||||
    argv++;
 | 
			
		||||
    while (argc >= 1) {
 | 
			
		||||
        if (strcmp(*argv, "-v") == 0)
 | 
			
		||||
            verbose = 1;
 | 
			
		||||
        else if (strcmp(*argv, "-V") == 0)
 | 
			
		||||
            verbose = Verbose = 1;
 | 
			
		||||
#ifndef OPENSSL_NO_SSL_TRACE
 | 
			
		||||
        else if (strcmp(*argv, "-stdname") == 0)
 | 
			
		||||
            stdname = verbose = 1;
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_SSL2
 | 
			
		||||
        else if (strcmp(*argv, "-ssl2") == 0)
 | 
			
		||||
            meth = SSLv2_client_method();
 | 
			
		||||
@@ -179,45 +173,13 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            BIO_printf(STDout, "%s", p);
 | 
			
		||||
        }
 | 
			
		||||
        BIO_printf(STDout, "\n");
 | 
			
		||||
    } else {                    /* verbose */
 | 
			
		||||
 | 
			
		||||
    } else {
 | 
			
		||||
        sk = SSL_get_ciphers(ssl);
 | 
			
		||||
 | 
			
		||||
        for (i = 0; i < sk_SSL_CIPHER_num(sk); i++) {
 | 
			
		||||
            SSL_CIPHER *c;
 | 
			
		||||
 | 
			
		||||
            c = sk_SSL_CIPHER_value(sk, i);
 | 
			
		||||
 | 
			
		||||
            if (Verbose) {
 | 
			
		||||
                unsigned long id = SSL_CIPHER_get_id(c);
 | 
			
		||||
                int id0 = (int)(id >> 24);
 | 
			
		||||
                int id1 = (int)((id >> 16) & 0xffL);
 | 
			
		||||
                int id2 = (int)((id >> 8) & 0xffL);
 | 
			
		||||
                int id3 = (int)(id & 0xffL);
 | 
			
		||||
 | 
			
		||||
                if ((id & 0xff000000L) == 0x02000000L) {
 | 
			
		||||
                    /* SSL2 cipher */
 | 
			
		||||
                    BIO_printf(STDout, "     0x%02X,0x%02X,0x%02X - ", id1,
 | 
			
		||||
                               id2, id3);
 | 
			
		||||
                } else if ((id & 0xff000000L) == 0x03000000L) {
 | 
			
		||||
                    /* SSL3 cipher */
 | 
			
		||||
                    BIO_printf(STDout, "          0x%02X,0x%02X - ", id2,
 | 
			
		||||
                               id3);
 | 
			
		||||
                } else {
 | 
			
		||||
                    /* whatever */
 | 
			
		||||
                    BIO_printf(STDout, "0x%02X,0x%02X,0x%02X,0x%02X - ", id0,
 | 
			
		||||
                               id1, id2, id3);
 | 
			
		||||
                }
 | 
			
		||||
            }
 | 
			
		||||
#ifndef OPENSSL_NO_SSL_TRACE
 | 
			
		||||
            if (stdname) {
 | 
			
		||||
                const char *nm = SSL_CIPHER_standard_name(c);
 | 
			
		||||
                if (nm == NULL)
 | 
			
		||||
                    nm = "UNKNOWN";
 | 
			
		||||
                BIO_printf(STDout, "%s - ", nm);
 | 
			
		||||
            }
 | 
			
		||||
#endif
 | 
			
		||||
            BIO_puts(STDout, SSL_CIPHER_description(c, buf, sizeof buf));
 | 
			
		||||
            BIO_puts(STDout,
 | 
			
		||||
                     SSL_CIPHER_description(sk_SSL_CIPHER_value(sk, i), buf,
 | 
			
		||||
                                            sizeof buf));
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -1,52 +1,24 @@
 | 
			
		||||
subject= C = UK, O = OpenSSL Group, OU = FOR TESTING PURPOSES ONLY, CN = Test Client Cert
 | 
			
		||||
issuer= C = UK, O = OpenSSL Group, OU = FOR TESTING PURPOSES ONLY, CN = OpenSSL Test Intermediate CA
 | 
			
		||||
issuer= /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test CA (1024 bit)
 | 
			
		||||
subject=/C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Client test cert (512 bit)
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIID5zCCAs+gAwIBAgIJALnu1NlVpZ6yMA0GCSqGSIb3DQEBBQUAMHAxCzAJBgNV
 | 
			
		||||
BAYTAlVLMRYwFAYDVQQKDA1PcGVuU1NMIEdyb3VwMSIwIAYDVQQLDBlGT1IgVEVT
 | 
			
		||||
VElORyBQVVJQT1NFUyBPTkxZMSUwIwYDVQQDDBxPcGVuU1NMIFRlc3QgSW50ZXJt
 | 
			
		||||
ZWRpYXRlIENBMB4XDTExMTIwODE0MDE0OFoXDTIxMTAxNjE0MDE0OFowZDELMAkG
 | 
			
		||||
A1UEBhMCVUsxFjAUBgNVBAoMDU9wZW5TU0wgR3JvdXAxIjAgBgNVBAsMGUZPUiBU
 | 
			
		||||
RVNUSU5HIFBVUlBPU0VTIE9OTFkxGTAXBgNVBAMMEFRlc3QgQ2xpZW50IENlcnQw
 | 
			
		||||
ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC0ranbHRLcLVqN+0BzcZpY
 | 
			
		||||
+yOLqxzDWT1LD9eW1stC4NzXX9/DCtSIVyN7YIHdGLrIPr64IDdXXaMRzgZ2rOKs
 | 
			
		||||
lmHCAiFpO/ja99gGCJRxH0xwQatqAULfJVHeUhs7OEGOZc2nWifjqKvGfNTilP7D
 | 
			
		||||
nwi69ipQFq9oS19FmhwVHk2wg7KZGHI1qDyG04UrfCZMRitvS9+UVhPpIPjuiBi2
 | 
			
		||||
x3/FZIpL5gXJvvFK6xHY63oq2asyzBATntBgnP4qJFWWcvRx24wF1PnZabxuVoL2
 | 
			
		||||
bPnQ/KvONDrw3IdqkKhYNTul7jEcu3OlcZIMw+7DiaKJLAzKb/bBF5gm/pwW6As9
 | 
			
		||||
AgMBAAGjgY8wgYwwDAYDVR0TAQH/BAIwADAOBgNVHQ8BAf8EBAMCBeAwLAYJYIZI
 | 
			
		||||
AYb4QgENBB8WHU9wZW5TU0wgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQW
 | 
			
		||||
BBSZHKyLoTh7Mb409Zn/mK1ceSDAjDAfBgNVHSMEGDAWgBQ2w2yI55X+sL3szj49
 | 
			
		||||
hqshgYfa2jANBgkqhkiG9w0BAQUFAAOCAQEAD0mL7PtPYgCEuDyOQSbLpeND5hVS
 | 
			
		||||
curxQdGnrJ6Acrhodb7E9ccATokeb0PLx6HBLQUicxhTZIQ9FbO43YkQcOU6C3BB
 | 
			
		||||
IlwskqmtN6+VmrQzNolHCDzvxNZs9lYL2VbGPGqVRyjZeHpoAlf9cQr8PgDb4d4b
 | 
			
		||||
vUx2KAhHQvV2nkmYvKyXcgnRuHggumF87mkxidriGAEFwH4qfOqetUg64WyxP7P2
 | 
			
		||||
QLipm04SyQa7ONtIApfVXgHcE42Py4/f4arzCzMjKe3VyhGkS7nsT55X/fWgTaRm
 | 
			
		||||
CQPkO+H94P958WTvQDt77bQ+D3IvYaVvfil8n6HJMOJfFT0LJuSUbpSXJg==
 | 
			
		||||
MIIB6TCCAVICAQIwDQYJKoZIhvcNAQEEBQAwWzELMAkGA1UEBhMCQVUxEzARBgNV
 | 
			
		||||
BAgTClF1ZWVuc2xhbmQxGjAYBgNVBAoTEUNyeXB0U29mdCBQdHkgTHRkMRswGQYD
 | 
			
		||||
VQQDExJUZXN0IENBICgxMDI0IGJpdCkwHhcNOTcwNjA5MTM1NzU2WhcNOTgwNjA5
 | 
			
		||||
MTM1NzU2WjBjMQswCQYDVQQGEwJBVTETMBEGA1UECBMKUXVlZW5zbGFuZDEaMBgG
 | 
			
		||||
A1UEChMRQ3J5cHRTb2Z0IFB0eSBMdGQxIzAhBgNVBAMTGkNsaWVudCB0ZXN0IGNl
 | 
			
		||||
cnQgKDUxMiBiaXQpMFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBALtv55QyzG6i2Plw
 | 
			
		||||
Z1pah7++Gv8L5j6Hnyr/uTZE1NLG0ABDDexmq/R4KedLjFEIYjocDui+IXs62NNt
 | 
			
		||||
XrT8odkCAwEAATANBgkqhkiG9w0BAQQFAAOBgQBwtMmI7oGUG8nKmftQssATViH5
 | 
			
		||||
NRRtoEw07DxJp/LfatHdrhqQB73eGdL5WILZJXk46Xz2e9WMSUjVCSYhdKxtflU3
 | 
			
		||||
UR2Ajv1Oo0sTNdfz0wDqJNirLNtzyhhsaq8qMTrLwXrCP31VxBiigFSQSUFnZyTE
 | 
			
		||||
9TKwhS4GlwbtCfxSKQ==
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
-----BEGIN RSA PRIVATE KEY-----
 | 
			
		||||
MIIEpQIBAAKCAQEAtK2p2x0S3C1ajftAc3GaWPsji6scw1k9Sw/XltbLQuDc11/f
 | 
			
		||||
wwrUiFcje2CB3Ri6yD6+uCA3V12jEc4GdqzirJZhwgIhaTv42vfYBgiUcR9McEGr
 | 
			
		||||
agFC3yVR3lIbOzhBjmXNp1on46irxnzU4pT+w58IuvYqUBavaEtfRZocFR5NsIOy
 | 
			
		||||
mRhyNag8htOFK3wmTEYrb0vflFYT6SD47ogYtsd/xWSKS+YFyb7xSusR2Ot6Ktmr
 | 
			
		||||
MswQE57QYJz+KiRVlnL0cduMBdT52Wm8blaC9mz50PyrzjQ68NyHapCoWDU7pe4x
 | 
			
		||||
HLtzpXGSDMPuw4miiSwMym/2wReYJv6cFugLPQIDAQABAoIBAAZOyc9MhIwLSU4L
 | 
			
		||||
p4RgQvM4UVVe8/Id+3XTZ8NsXExJbWxXfIhiqGjaIfL8u4vsgRjcl+v1s/jo2/iT
 | 
			
		||||
KMab4o4D8gXD7UavQVDjtjb/ta79WL3SjRl2Uc9YjjMkyq6WmDNQeo2NKDdafCTB
 | 
			
		||||
1uzSJtLNipB8Z53ELPuHJhxX9QMHrMnuha49riQgXZ7buP9iQrHJFhImBjSzbxJx
 | 
			
		||||
L+TI6rkyLSf9Wi0Pd3L27Ob3QWNfNRYNSeTE+08eSRChkur5W0RuXAcuAICdQlCl
 | 
			
		||||
LBvWO/LmmvbzCqiDcgy/TliSb6CGGwgiNG7LJZmlkYNj8laGwalNlYZs3UrVv6NO
 | 
			
		||||
Br2loAECgYEA2kvCvPGj0Dg/6g7WhXDvAkEbcaL1tSeCxBbNH+6HS2UWMWvyTtCn
 | 
			
		||||
/bbD519QIdkvayy1QjEf32GV/UjUVmlULMLBcDy0DGjtL3+XpIhLKWDNxN1v1/ai
 | 
			
		||||
1oz23ZJCOgnk6K4qtFtlRS1XtynjA+rBetvYvLP9SKeFrnpzCgaA2r0CgYEA0+KX
 | 
			
		||||
1ACXDTNH5ySX3kMjSS9xdINf+OOw4CvPHFwbtc9aqk2HePlEsBTz5I/W3rKwXva3
 | 
			
		||||
NqZ/bRqVVeZB/hHKFywgdUQk2Uc5z/S7Lw70/w1HubNTXGU06Ngb6zOFAo/o/TwZ
 | 
			
		||||
zTP1BMIKSOB6PAZPS3l+aLO4FRIRotfFhgRHOoECgYEAmiZbqt8cJaJDB/5YYDzC
 | 
			
		||||
mp3tSk6gIb936Q6M5VqkMYp9pIKsxhk0N8aDCnTU+kIK6SzWBpr3/d9Ecmqmfyq7
 | 
			
		||||
5SvWO3KyVf0WWK9KH0abhOm2BKm2HBQvI0DB5u8sUx2/hsvOnjPYDISbZ11t0MtK
 | 
			
		||||
u35Zy89yMYcSsIYJjG/ROCUCgYEAgI2P9G5PNxEP5OtMwOsW84Y3Xat/hPAQFlI+
 | 
			
		||||
HES+AzbFGWJkeT8zL2nm95tVkFP1sggZ7Kxjz3w7cpx7GX0NkbWSE9O+T51pNASV
 | 
			
		||||
tN1sQ3p5M+/a+cnlqgfEGJVvc7iAcXQPa3LEi5h2yPR49QYXAgG6cifn3dDSpmwn
 | 
			
		||||
SUI7PQECgYEApGCIIpSRPLAEHTGmP87RBL1smurhwmy2s/pghkvUkWehtxg0sGHh
 | 
			
		||||
kuaqDWcskogv+QC0sVdytiLSz8G0DwcEcsHK1Fkyb8A+ayiw6jWJDo2m9+IF4Fww
 | 
			
		||||
1Te6jFPYDESnbhq7+TLGgHGhtwcu5cnb4vSuYXGXKupZGzoLOBbv1Zw=
 | 
			
		||||
MIIBOwIBAAJBALtv55QyzG6i2PlwZ1pah7++Gv8L5j6Hnyr/uTZE1NLG0ABDDexm
 | 
			
		||||
q/R4KedLjFEIYjocDui+IXs62NNtXrT8odkCAwEAAQJAbwXq0vJ/+uyEvsNgxLko
 | 
			
		||||
/V86mGXQ/KrSkeKlL0r4ENxjcyeMAGoKu6J9yMY7+X9+Zm4nxShNfTsf/+Freoe1
 | 
			
		||||
HQIhAPOSm5Q1YI+KIsII2GeVJx1U69+wnd71OasIPakS1L1XAiEAxQAW+J3/JWE0
 | 
			
		||||
ftEYakbhUOKL8tD1OaFZS71/5GdG7E8CIQCefUMmySSvwd6kC0VlATSWbW+d+jp/
 | 
			
		||||
nWmM1KvqnAo5uQIhALqEADu5U1Wvt8UN8UDGBRPQulHWNycuNV45d3nnskWPAiAw
 | 
			
		||||
ueTyr6WsZ5+SD8g/Hy3xuvF3nPmJRH+rwvVihlcFOg==
 | 
			
		||||
-----END RSA PRIVATE KEY-----
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										288
									
								
								apps/cms.c
									
									
									
									
									
								
							
							
						
						
									
										288
									
								
								apps/cms.c
									
									
									
									
									
								
							@@ -72,11 +72,9 @@
 | 
			
		||||
static int save_certs(char *signerfile, STACK_OF(X509) *signers);
 | 
			
		||||
static int cms_cb(int ok, X509_STORE_CTX *ctx);
 | 
			
		||||
static void receipt_request_print(BIO *out, CMS_ContentInfo *cms);
 | 
			
		||||
static CMS_ReceiptRequest *make_receipt_request(STACK_OF(OPENSSL_STRING)
 | 
			
		||||
                                                *rr_to, int rr_allorfirst, STACK_OF(OPENSSL_STRING)
 | 
			
		||||
                                                *rr_from);
 | 
			
		||||
static int cms_set_pkey_param(EVP_PKEY_CTX *pctx,
 | 
			
		||||
                              STACK_OF(OPENSSL_STRING) *param);
 | 
			
		||||
static CMS_ReceiptRequest *make_receipt_request(STACK * rr_to,
 | 
			
		||||
                                                int rr_allorfirst,
 | 
			
		||||
                                                STACK * rr_from);
 | 
			
		||||
 | 
			
		||||
# define SMIME_OP        0x10
 | 
			
		||||
# define SMIME_IP        0x20
 | 
			
		||||
@@ -98,16 +96,6 @@ static int cms_set_pkey_param(EVP_PKEY_CTX *pctx,
 | 
			
		||||
# define SMIME_SIGN_RECEIPT      (15 | SMIME_IP | SMIME_OP)
 | 
			
		||||
# define SMIME_VERIFY_RECEIPT    (16 | SMIME_IP)
 | 
			
		||||
 | 
			
		||||
int verify_err = 0;
 | 
			
		||||
 | 
			
		||||
typedef struct cms_key_param_st cms_key_param;
 | 
			
		||||
 | 
			
		||||
struct cms_key_param_st {
 | 
			
		||||
    int idx;
 | 
			
		||||
    STACK_OF(OPENSSL_STRING) *param;
 | 
			
		||||
    cms_key_param *next;
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
int MAIN(int, char **);
 | 
			
		||||
 | 
			
		||||
int MAIN(int argc, char **argv)
 | 
			
		||||
@@ -119,10 +107,10 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    const char *inmode = "r", *outmode = "w";
 | 
			
		||||
    char *infile = NULL, *outfile = NULL, *rctfile = NULL;
 | 
			
		||||
    char *signerfile = NULL, *recipfile = NULL;
 | 
			
		||||
    STACK_OF(OPENSSL_STRING) *sksigners = NULL, *skkeys = NULL;
 | 
			
		||||
    STACK *sksigners = NULL, *skkeys = NULL;
 | 
			
		||||
    char *certfile = NULL, *keyfile = NULL, *contfile = NULL;
 | 
			
		||||
    char *certsoutfile = NULL;
 | 
			
		||||
    const EVP_CIPHER *cipher = NULL, *wrap_cipher = NULL;
 | 
			
		||||
    const EVP_CIPHER *cipher = NULL;
 | 
			
		||||
    CMS_ContentInfo *cms = NULL, *rcms = NULL;
 | 
			
		||||
    X509_STORE *store = NULL;
 | 
			
		||||
    X509 *cert = NULL, *recip = NULL, *signer = NULL;
 | 
			
		||||
@@ -130,10 +118,9 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    STACK_OF(X509) *encerts = NULL, *other = NULL;
 | 
			
		||||
    BIO *in = NULL, *out = NULL, *indata = NULL, *rctin = NULL;
 | 
			
		||||
    int badarg = 0;
 | 
			
		||||
    int flags = CMS_DETACHED, noout = 0, print = 0;
 | 
			
		||||
    int verify_retcode = 0;
 | 
			
		||||
    int flags = CMS_DETACHED;
 | 
			
		||||
    int rr_print = 0, rr_allorfirst = -1;
 | 
			
		||||
    STACK_OF(OPENSSL_STRING) *rr_to = NULL, *rr_from = NULL;
 | 
			
		||||
    STACK *rr_to = NULL, *rr_from = NULL;
 | 
			
		||||
    CMS_ReceiptRequest *rr = NULL;
 | 
			
		||||
    char *to = NULL, *from = NULL, *subject = NULL;
 | 
			
		||||
    char *CAfile = NULL, *CApath = NULL;
 | 
			
		||||
@@ -147,11 +134,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    char *engine = NULL;
 | 
			
		||||
# endif
 | 
			
		||||
    unsigned char *secret_key = NULL, *secret_keyid = NULL;
 | 
			
		||||
    unsigned char *pwri_pass = NULL, *pwri_tmp = NULL;
 | 
			
		||||
    size_t secret_keylen = 0, secret_keyidlen = 0;
 | 
			
		||||
 | 
			
		||||
    cms_key_param *key_first = NULL, *key_param = NULL;
 | 
			
		||||
 | 
			
		||||
    ASN1_OBJECT *econtent_type = NULL;
 | 
			
		||||
 | 
			
		||||
    X509_VERIFY_PARAM *vpm = NULL;
 | 
			
		||||
@@ -182,8 +166,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            operation = SMIME_RESIGN;
 | 
			
		||||
        else if (!strcmp(*args, "-verify"))
 | 
			
		||||
            operation = SMIME_VERIFY;
 | 
			
		||||
        else if (!strcmp(*args, "-verify_retcode"))
 | 
			
		||||
            verify_retcode = 1;
 | 
			
		||||
        else if (!strcmp(*args, "-verify_receipt")) {
 | 
			
		||||
            operation = SMIME_VERIFY_RECEIPT;
 | 
			
		||||
            if (!args[1])
 | 
			
		||||
@@ -213,8 +195,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            cipher = EVP_des_ede3_cbc();
 | 
			
		||||
        else if (!strcmp(*args, "-des"))
 | 
			
		||||
            cipher = EVP_des_cbc();
 | 
			
		||||
        else if (!strcmp(*args, "-des3-wrap"))
 | 
			
		||||
            wrap_cipher = EVP_des_ede3_wrap();
 | 
			
		||||
# endif
 | 
			
		||||
# ifndef OPENSSL_NO_SEED
 | 
			
		||||
        else if (!strcmp(*args, "-seed"))
 | 
			
		||||
@@ -235,12 +215,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            cipher = EVP_aes_192_cbc();
 | 
			
		||||
        else if (!strcmp(*args, "-aes256"))
 | 
			
		||||
            cipher = EVP_aes_256_cbc();
 | 
			
		||||
        else if (!strcmp(*args, "-aes128-wrap"))
 | 
			
		||||
            wrap_cipher = EVP_aes_128_wrap();
 | 
			
		||||
        else if (!strcmp(*args, "-aes192-wrap"))
 | 
			
		||||
            wrap_cipher = EVP_aes_192_wrap();
 | 
			
		||||
        else if (!strcmp(*args, "-aes256-wrap"))
 | 
			
		||||
            wrap_cipher = EVP_aes_256_wrap();
 | 
			
		||||
# endif
 | 
			
		||||
# ifndef OPENSSL_NO_CAMELLIA
 | 
			
		||||
        else if (!strcmp(*args, "-camellia128"))
 | 
			
		||||
@@ -277,18 +251,18 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            flags |= CMS_NO_CONTENT_VERIFY;
 | 
			
		||||
        else if (!strcmp(*args, "-no_attr_verify"))
 | 
			
		||||
            flags |= CMS_NO_ATTR_VERIFY;
 | 
			
		||||
        else if (!strcmp(*args, "-stream"))
 | 
			
		||||
            flags |= CMS_STREAM;
 | 
			
		||||
        else if (!strcmp(*args, "-indef"))
 | 
			
		||||
            flags |= CMS_STREAM;
 | 
			
		||||
        else if (!strcmp(*args, "-noindef"))
 | 
			
		||||
        else if (!strcmp(*args, "-stream")) {
 | 
			
		||||
            args++;
 | 
			
		||||
            continue;
 | 
			
		||||
        } else if (!strcmp(*args, "-indef")) {
 | 
			
		||||
            args++;
 | 
			
		||||
            continue;
 | 
			
		||||
        } else if (!strcmp(*args, "-noindef"))
 | 
			
		||||
            flags &= ~CMS_STREAM;
 | 
			
		||||
        else if (!strcmp(*args, "-nooldmime"))
 | 
			
		||||
            flags |= CMS_NOOLDMIMETYPE;
 | 
			
		||||
        else if (!strcmp(*args, "-crlfeol"))
 | 
			
		||||
            flags |= CMS_CRLFEOL;
 | 
			
		||||
        else if (!strcmp(*args, "-noout"))
 | 
			
		||||
            noout = 1;
 | 
			
		||||
        else if (!strcmp(*args, "-receipt_request_print"))
 | 
			
		||||
            rr_print = 1;
 | 
			
		||||
        else if (!strcmp(*args, "-receipt_request_all"))
 | 
			
		||||
@@ -300,18 +274,15 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                goto argerr;
 | 
			
		||||
            args++;
 | 
			
		||||
            if (!rr_from)
 | 
			
		||||
                rr_from = sk_OPENSSL_STRING_new_null();
 | 
			
		||||
            sk_OPENSSL_STRING_push(rr_from, *args);
 | 
			
		||||
                rr_from = sk_new_null();
 | 
			
		||||
            sk_push(rr_from, *args);
 | 
			
		||||
        } else if (!strcmp(*args, "-receipt_request_to")) {
 | 
			
		||||
            if (!args[1])
 | 
			
		||||
                goto argerr;
 | 
			
		||||
            args++;
 | 
			
		||||
            if (!rr_to)
 | 
			
		||||
                rr_to = sk_OPENSSL_STRING_new_null();
 | 
			
		||||
            sk_OPENSSL_STRING_push(rr_to, *args);
 | 
			
		||||
        } else if (!strcmp(*args, "-print")) {
 | 
			
		||||
            noout = 1;
 | 
			
		||||
            print = 1;
 | 
			
		||||
                rr_to = sk_new_null();
 | 
			
		||||
            sk_push(rr_to, *args);
 | 
			
		||||
        } else if (!strcmp(*args, "-secretkey")) {
 | 
			
		||||
            long ltmp;
 | 
			
		||||
            if (!args[1])
 | 
			
		||||
@@ -334,11 +305,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                goto argerr;
 | 
			
		||||
            }
 | 
			
		||||
            secret_keyidlen = (size_t)ltmp;
 | 
			
		||||
        } else if (!strcmp(*args, "-pwri_password")) {
 | 
			
		||||
            if (!args[1])
 | 
			
		||||
                goto argerr;
 | 
			
		||||
            args++;
 | 
			
		||||
            pwri_pass = (unsigned char *)*args;
 | 
			
		||||
        } else if (!strcmp(*args, "-econtent_type")) {
 | 
			
		||||
            if (!args[1])
 | 
			
		||||
                goto argerr;
 | 
			
		||||
@@ -385,30 +351,20 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
 | 
			
		||||
            if (signerfile) {
 | 
			
		||||
                if (!sksigners)
 | 
			
		||||
                    sksigners = sk_OPENSSL_STRING_new_null();
 | 
			
		||||
                sk_OPENSSL_STRING_push(sksigners, signerfile);
 | 
			
		||||
                    sksigners = sk_new_null();
 | 
			
		||||
                sk_push(sksigners, signerfile);
 | 
			
		||||
                if (!keyfile)
 | 
			
		||||
                    keyfile = signerfile;
 | 
			
		||||
                if (!skkeys)
 | 
			
		||||
                    skkeys = sk_OPENSSL_STRING_new_null();
 | 
			
		||||
                sk_OPENSSL_STRING_push(skkeys, keyfile);
 | 
			
		||||
                    skkeys = sk_new_null();
 | 
			
		||||
                sk_push(skkeys, keyfile);
 | 
			
		||||
                keyfile = NULL;
 | 
			
		||||
            }
 | 
			
		||||
            signerfile = *++args;
 | 
			
		||||
        } else if (!strcmp(*args, "-recip")) {
 | 
			
		||||
            if (!args[1])
 | 
			
		||||
                goto argerr;
 | 
			
		||||
            if (operation == SMIME_ENCRYPT) {
 | 
			
		||||
                if (!encerts)
 | 
			
		||||
                    encerts = sk_X509_new_null();
 | 
			
		||||
                cert = load_cert(bio_err, *++args, FORMAT_PEM,
 | 
			
		||||
                                 NULL, e, "recipient certificate file");
 | 
			
		||||
                if (!cert)
 | 
			
		||||
                    goto end;
 | 
			
		||||
                sk_X509_push(encerts, cert);
 | 
			
		||||
                cert = NULL;
 | 
			
		||||
            } else
 | 
			
		||||
                recipfile = *++args;
 | 
			
		||||
            recipfile = *++args;
 | 
			
		||||
        } else if (!strcmp(*args, "-certsout")) {
 | 
			
		||||
            if (!args[1])
 | 
			
		||||
                goto argerr;
 | 
			
		||||
@@ -431,52 +387,18 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                    goto argerr;
 | 
			
		||||
                }
 | 
			
		||||
                if (!sksigners)
 | 
			
		||||
                    sksigners = sk_OPENSSL_STRING_new_null();
 | 
			
		||||
                sk_OPENSSL_STRING_push(sksigners, signerfile);
 | 
			
		||||
                    sksigners = sk_new_null();
 | 
			
		||||
                sk_push(sksigners, signerfile);
 | 
			
		||||
                signerfile = NULL;
 | 
			
		||||
                if (!skkeys)
 | 
			
		||||
                    skkeys = sk_OPENSSL_STRING_new_null();
 | 
			
		||||
                sk_OPENSSL_STRING_push(skkeys, keyfile);
 | 
			
		||||
                    skkeys = sk_new_null();
 | 
			
		||||
                sk_push(skkeys, keyfile);
 | 
			
		||||
            }
 | 
			
		||||
            keyfile = *++args;
 | 
			
		||||
        } else if (!strcmp(*args, "-keyform")) {
 | 
			
		||||
            if (!args[1])
 | 
			
		||||
                goto argerr;
 | 
			
		||||
            keyform = str2fmt(*++args);
 | 
			
		||||
        } else if (!strcmp(*args, "-keyopt")) {
 | 
			
		||||
            int keyidx = -1;
 | 
			
		||||
            if (!args[1])
 | 
			
		||||
                goto argerr;
 | 
			
		||||
            if (operation == SMIME_ENCRYPT) {
 | 
			
		||||
                if (encerts)
 | 
			
		||||
                    keyidx += sk_X509_num(encerts);
 | 
			
		||||
            } else {
 | 
			
		||||
                if (keyfile || signerfile)
 | 
			
		||||
                    keyidx++;
 | 
			
		||||
                if (skkeys)
 | 
			
		||||
                    keyidx += sk_OPENSSL_STRING_num(skkeys);
 | 
			
		||||
            }
 | 
			
		||||
            if (keyidx < 0) {
 | 
			
		||||
                BIO_printf(bio_err, "No key specified\n");
 | 
			
		||||
                goto argerr;
 | 
			
		||||
            }
 | 
			
		||||
            if (key_param == NULL || key_param->idx != keyidx) {
 | 
			
		||||
                cms_key_param *nparam;
 | 
			
		||||
                nparam = OPENSSL_malloc(sizeof(cms_key_param));
 | 
			
		||||
                if (!nparam) {
 | 
			
		||||
                    BIO_printf(bio_err, "Out of memory\n");
 | 
			
		||||
                    goto argerr;
 | 
			
		||||
                }
 | 
			
		||||
                nparam->idx = keyidx;
 | 
			
		||||
                nparam->param = sk_OPENSSL_STRING_new_null();
 | 
			
		||||
                nparam->next = NULL;
 | 
			
		||||
                if (key_first == NULL)
 | 
			
		||||
                    key_first = nparam;
 | 
			
		||||
                else
 | 
			
		||||
                    key_param->next = nparam;
 | 
			
		||||
                key_param = nparam;
 | 
			
		||||
            }
 | 
			
		||||
            sk_OPENSSL_STRING_push(key_param->param, *++args);
 | 
			
		||||
        } else if (!strcmp(*args, "-rctform")) {
 | 
			
		||||
            if (!args[1])
 | 
			
		||||
                goto argerr;
 | 
			
		||||
@@ -542,13 +464,13 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        /* Check to see if any final signer needs to be appended */
 | 
			
		||||
        if (signerfile) {
 | 
			
		||||
            if (!sksigners)
 | 
			
		||||
                sksigners = sk_OPENSSL_STRING_new_null();
 | 
			
		||||
            sk_OPENSSL_STRING_push(sksigners, signerfile);
 | 
			
		||||
                sksigners = sk_new_null();
 | 
			
		||||
            sk_push(sksigners, signerfile);
 | 
			
		||||
            if (!skkeys)
 | 
			
		||||
                skkeys = sk_OPENSSL_STRING_new_null();
 | 
			
		||||
                skkeys = sk_new_null();
 | 
			
		||||
            if (!keyfile)
 | 
			
		||||
                keyfile = signerfile;
 | 
			
		||||
            sk_OPENSSL_STRING_push(skkeys, keyfile);
 | 
			
		||||
            sk_push(skkeys, keyfile);
 | 
			
		||||
        }
 | 
			
		||||
        if (!sksigners) {
 | 
			
		||||
            BIO_printf(bio_err, "No signer certificate specified\n");
 | 
			
		||||
@@ -560,13 +482,13 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    else if (operation == SMIME_DECRYPT) {
 | 
			
		||||
        if (!recipfile && !keyfile && !secret_key && !pwri_pass) {
 | 
			
		||||
        if (!recipfile && !keyfile && !secret_key) {
 | 
			
		||||
            BIO_printf(bio_err,
 | 
			
		||||
                       "No recipient certificate or key specified\n");
 | 
			
		||||
            badarg = 1;
 | 
			
		||||
        }
 | 
			
		||||
    } else if (operation == SMIME_ENCRYPT) {
 | 
			
		||||
        if (!*args && !secret_key && !pwri_pass && !encerts) {
 | 
			
		||||
        if (!*args && !secret_key) {
 | 
			
		||||
            BIO_printf(bio_err, "No recipient(s) certificate(s) specified\n");
 | 
			
		||||
            badarg = 1;
 | 
			
		||||
        }
 | 
			
		||||
@@ -631,7 +553,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                   "-inkey file    input private key (if not signer or recipient)\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-keyform arg   input private key format (PEM or ENGINE)\n");
 | 
			
		||||
        BIO_printf(bio_err, "-keyopt nm:v   set public key parameters\n");
 | 
			
		||||
        BIO_printf(bio_err, "-out file      output file\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-outform arg   output format SMIME (default), PEM or DER\n");
 | 
			
		||||
@@ -645,8 +566,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-CApath dir    trusted certificates directory\n");
 | 
			
		||||
        BIO_printf(bio_err, "-CAfile file   trusted certificates file\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-no_alt_chains only ever use the first certificate chain found\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-crl_check     check revocation status of signer's certificate using CRLs\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
@@ -713,11 +632,11 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        if (secret_key && !secret_keyid) {
 | 
			
		||||
            BIO_printf(bio_err, "No secret key id\n");
 | 
			
		||||
            BIO_printf(bio_err, "No sectre key id\n");
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        if (*args && !encerts)
 | 
			
		||||
        if (*args)
 | 
			
		||||
            encerts = sk_X509_new_null();
 | 
			
		||||
        while (*args) {
 | 
			
		||||
            if (!(cert = load_cert(bio_err, *args, FORMAT_PEM,
 | 
			
		||||
@@ -855,7 +774,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    if ((operation == SMIME_VERIFY) || (operation == SMIME_VERIFY_RECEIPT)) {
 | 
			
		||||
        if (!(store = setup_verify(bio_err, CAfile, CApath)))
 | 
			
		||||
            goto end;
 | 
			
		||||
        X509_STORE_set_verify_cb(store, cms_cb);
 | 
			
		||||
        X509_STORE_set_verify_cb_func(store, cms_cb);
 | 
			
		||||
        if (vpm)
 | 
			
		||||
            X509_STORE_set1_param(store, vpm);
 | 
			
		||||
    }
 | 
			
		||||
@@ -869,39 +788,10 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    } else if (operation == SMIME_COMPRESS) {
 | 
			
		||||
        cms = CMS_compress(in, -1, flags);
 | 
			
		||||
    } else if (operation == SMIME_ENCRYPT) {
 | 
			
		||||
        int i;
 | 
			
		||||
        flags |= CMS_PARTIAL;
 | 
			
		||||
        cms = CMS_encrypt(NULL, in, cipher, flags);
 | 
			
		||||
        cms = CMS_encrypt(encerts, in, cipher, flags);
 | 
			
		||||
        if (!cms)
 | 
			
		||||
            goto end;
 | 
			
		||||
        for (i = 0; i < sk_X509_num(encerts); i++) {
 | 
			
		||||
            CMS_RecipientInfo *ri;
 | 
			
		||||
            cms_key_param *kparam;
 | 
			
		||||
            int tflags = flags;
 | 
			
		||||
            X509 *x = sk_X509_value(encerts, i);
 | 
			
		||||
            for (kparam = key_first; kparam; kparam = kparam->next) {
 | 
			
		||||
                if (kparam->idx == i) {
 | 
			
		||||
                    tflags |= CMS_KEY_PARAM;
 | 
			
		||||
                    break;
 | 
			
		||||
                }
 | 
			
		||||
            }
 | 
			
		||||
            ri = CMS_add1_recipient_cert(cms, x, tflags);
 | 
			
		||||
            if (!ri)
 | 
			
		||||
                goto end;
 | 
			
		||||
            if (kparam) {
 | 
			
		||||
                EVP_PKEY_CTX *pctx;
 | 
			
		||||
                pctx = CMS_RecipientInfo_get0_pkey_ctx(ri);
 | 
			
		||||
                if (!cms_set_pkey_param(pctx, kparam->param))
 | 
			
		||||
                    goto end;
 | 
			
		||||
            }
 | 
			
		||||
            if (CMS_RecipientInfo_type(ri) == CMS_RECIPINFO_AGREE
 | 
			
		||||
                && wrap_cipher) {
 | 
			
		||||
                EVP_CIPHER_CTX *wctx;
 | 
			
		||||
                wctx = CMS_RecipientInfo_kari_get0_ctx(ri);
 | 
			
		||||
                EVP_EncryptInit_ex(wctx, wrap_cipher, NULL, NULL, NULL);
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        if (secret_key) {
 | 
			
		||||
            if (!CMS_add0_recipient_key(cms, NID_undef,
 | 
			
		||||
                                        secret_key, secret_keylen,
 | 
			
		||||
@@ -912,16 +802,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            secret_key = NULL;
 | 
			
		||||
            secret_keyid = NULL;
 | 
			
		||||
        }
 | 
			
		||||
        if (pwri_pass) {
 | 
			
		||||
            pwri_tmp = (unsigned char *)BUF_strdup((char *)pwri_pass);
 | 
			
		||||
            if (!pwri_tmp)
 | 
			
		||||
                goto end;
 | 
			
		||||
            if (!CMS_add0_recipient_password(cms,
 | 
			
		||||
                                             -1, NID_undef, NID_undef,
 | 
			
		||||
                                             pwri_tmp, -1, NULL))
 | 
			
		||||
                goto end;
 | 
			
		||||
            pwri_tmp = NULL;
 | 
			
		||||
        }
 | 
			
		||||
        if (!(flags & CMS_STREAM)) {
 | 
			
		||||
            if (!CMS_final(cms, in, NULL, flags))
 | 
			
		||||
                goto end;
 | 
			
		||||
@@ -972,13 +852,10 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            }
 | 
			
		||||
        } else
 | 
			
		||||
            flags |= CMS_REUSE_DIGEST;
 | 
			
		||||
        for (i = 0; i < sk_OPENSSL_STRING_num(sksigners); i++) {
 | 
			
		||||
        for (i = 0; i < sk_num(sksigners); i++) {
 | 
			
		||||
            CMS_SignerInfo *si;
 | 
			
		||||
            cms_key_param *kparam;
 | 
			
		||||
            int tflags = flags;
 | 
			
		||||
            signerfile = sk_OPENSSL_STRING_value(sksigners, i);
 | 
			
		||||
            keyfile = sk_OPENSSL_STRING_value(skkeys, i);
 | 
			
		||||
 | 
			
		||||
            signerfile = sk_value(sksigners, i);
 | 
			
		||||
            keyfile = sk_value(skkeys, i);
 | 
			
		||||
            signer = load_cert(bio_err, signerfile, FORMAT_PEM, NULL,
 | 
			
		||||
                               e, "signer certificate");
 | 
			
		||||
            if (!signer)
 | 
			
		||||
@@ -987,21 +864,9 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                           "signing key file");
 | 
			
		||||
            if (!key)
 | 
			
		||||
                goto end;
 | 
			
		||||
            for (kparam = key_first; kparam; kparam = kparam->next) {
 | 
			
		||||
                if (kparam->idx == i) {
 | 
			
		||||
                    tflags |= CMS_KEY_PARAM;
 | 
			
		||||
                    break;
 | 
			
		||||
                }
 | 
			
		||||
            }
 | 
			
		||||
            si = CMS_add1_signer(cms, signer, key, sign_md, tflags);
 | 
			
		||||
            si = CMS_add1_signer(cms, signer, key, sign_md, flags);
 | 
			
		||||
            if (!si)
 | 
			
		||||
                goto end;
 | 
			
		||||
            if (kparam) {
 | 
			
		||||
                EVP_PKEY_CTX *pctx;
 | 
			
		||||
                pctx = CMS_SignerInfo_get0_pkey_ctx(si);
 | 
			
		||||
                if (!cms_set_pkey_param(pctx, kparam->param))
 | 
			
		||||
                    goto end;
 | 
			
		||||
            }
 | 
			
		||||
            if (rr && !CMS_add1_ReceiptRequest(si, rr))
 | 
			
		||||
                goto end;
 | 
			
		||||
            X509_free(signer);
 | 
			
		||||
@@ -1042,13 +907,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        if (pwri_pass) {
 | 
			
		||||
            if (!CMS_decrypt_set1_password(cms, pwri_pass, -1)) {
 | 
			
		||||
                BIO_puts(bio_err, "Error decrypting CMS using password\n");
 | 
			
		||||
                goto end;
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        if (!CMS_decrypt(cms, NULL, NULL, indata, out, flags)) {
 | 
			
		||||
            BIO_printf(bio_err, "Error decrypting CMS structure\n");
 | 
			
		||||
            goto end;
 | 
			
		||||
@@ -1075,8 +933,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            BIO_printf(bio_err, "Verification successful\n");
 | 
			
		||||
        else {
 | 
			
		||||
            BIO_printf(bio_err, "Verification failure\n");
 | 
			
		||||
            if (verify_retcode)
 | 
			
		||||
                ret = verify_err + 32;
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
        if (signerfile) {
 | 
			
		||||
@@ -1101,10 +957,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
    } else {
 | 
			
		||||
        if (noout) {
 | 
			
		||||
            if (print)
 | 
			
		||||
                CMS_ContentInfo_print_ctx(out, cms, 0, NULL);
 | 
			
		||||
        } else if (outformat == FORMAT_SMIME) {
 | 
			
		||||
        if (outformat == FORMAT_SMIME) {
 | 
			
		||||
            if (to)
 | 
			
		||||
                BIO_printf(out, "To: %s\n", to);
 | 
			
		||||
            if (from)
 | 
			
		||||
@@ -1116,9 +969,9 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            else
 | 
			
		||||
                ret = SMIME_write_CMS(out, cms, in, flags);
 | 
			
		||||
        } else if (outformat == FORMAT_PEM)
 | 
			
		||||
            ret = PEM_write_bio_CMS_stream(out, cms, in, flags);
 | 
			
		||||
            ret = PEM_write_bio_CMS(out, cms);
 | 
			
		||||
        else if (outformat == FORMAT_ASN1)
 | 
			
		||||
            ret = i2d_CMS_bio_stream(out, cms, in, flags);
 | 
			
		||||
            ret = i2d_CMS_bio(out, cms);
 | 
			
		||||
        else {
 | 
			
		||||
            BIO_printf(bio_err, "Bad output format for CMS file\n");
 | 
			
		||||
            goto end;
 | 
			
		||||
@@ -1139,30 +992,21 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    if (vpm)
 | 
			
		||||
        X509_VERIFY_PARAM_free(vpm);
 | 
			
		||||
    if (sksigners)
 | 
			
		||||
        sk_OPENSSL_STRING_free(sksigners);
 | 
			
		||||
        sk_free(sksigners);
 | 
			
		||||
    if (skkeys)
 | 
			
		||||
        sk_OPENSSL_STRING_free(skkeys);
 | 
			
		||||
        sk_free(skkeys);
 | 
			
		||||
    if (secret_key)
 | 
			
		||||
        OPENSSL_free(secret_key);
 | 
			
		||||
    if (secret_keyid)
 | 
			
		||||
        OPENSSL_free(secret_keyid);
 | 
			
		||||
    if (pwri_tmp)
 | 
			
		||||
        OPENSSL_free(pwri_tmp);
 | 
			
		||||
    if (econtent_type)
 | 
			
		||||
        ASN1_OBJECT_free(econtent_type);
 | 
			
		||||
    if (rr)
 | 
			
		||||
        CMS_ReceiptRequest_free(rr);
 | 
			
		||||
    if (rr_to)
 | 
			
		||||
        sk_OPENSSL_STRING_free(rr_to);
 | 
			
		||||
        sk_free(rr_to);
 | 
			
		||||
    if (rr_from)
 | 
			
		||||
        sk_OPENSSL_STRING_free(rr_from);
 | 
			
		||||
    for (key_param = key_first; key_param;) {
 | 
			
		||||
        cms_key_param *tparam;
 | 
			
		||||
        sk_OPENSSL_STRING_free(key_param->param);
 | 
			
		||||
        tparam = key_param->next;
 | 
			
		||||
        OPENSSL_free(key_param);
 | 
			
		||||
        key_param = tparam;
 | 
			
		||||
    }
 | 
			
		||||
        sk_free(rr_from);
 | 
			
		||||
    X509_STORE_free(store);
 | 
			
		||||
    X509_free(cert);
 | 
			
		||||
    X509_free(recip);
 | 
			
		||||
@@ -1202,8 +1046,6 @@ static int cms_cb(int ok, X509_STORE_CTX *ctx)
 | 
			
		||||
 | 
			
		||||
    error = X509_STORE_CTX_get_error(ctx);
 | 
			
		||||
 | 
			
		||||
    verify_err = error;
 | 
			
		||||
 | 
			
		||||
    if ((error != X509_V_ERR_NO_EXPLICIT_POLICY)
 | 
			
		||||
        && ((error != X509_V_OK) || (ok != 2)))
 | 
			
		||||
        return ok;
 | 
			
		||||
@@ -1277,7 +1119,7 @@ static void receipt_request_print(BIO *out, CMS_ContentInfo *cms)
 | 
			
		||||
    }
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static STACK_OF(GENERAL_NAMES) *make_names_stack(STACK_OF(OPENSSL_STRING) *ns)
 | 
			
		||||
static STACK_OF(GENERAL_NAMES) *make_names_stack(STACK * ns)
 | 
			
		||||
{
 | 
			
		||||
    int i;
 | 
			
		||||
    STACK_OF(GENERAL_NAMES) *ret;
 | 
			
		||||
@@ -1286,9 +1128,11 @@ static STACK_OF(GENERAL_NAMES) *make_names_stack(STACK_OF(OPENSSL_STRING) *ns)
 | 
			
		||||
    ret = sk_GENERAL_NAMES_new_null();
 | 
			
		||||
    if (!ret)
 | 
			
		||||
        goto err;
 | 
			
		||||
    for (i = 0; i < sk_OPENSSL_STRING_num(ns); i++) {
 | 
			
		||||
        char *str = sk_OPENSSL_STRING_value(ns, i);
 | 
			
		||||
        gen = a2i_GENERAL_NAME(NULL, NULL, NULL, GEN_EMAIL, str, 0);
 | 
			
		||||
    for (i = 0; i < sk_num(ns); i++) {
 | 
			
		||||
        CONF_VALUE cnf;
 | 
			
		||||
        cnf.name = "email";
 | 
			
		||||
        cnf.value = sk_value(ns, i);
 | 
			
		||||
        gen = v2i_GENERAL_NAME(NULL, NULL, &cnf);
 | 
			
		||||
        if (!gen)
 | 
			
		||||
            goto err;
 | 
			
		||||
        gens = GENERAL_NAMES_new();
 | 
			
		||||
@@ -1314,9 +1158,9 @@ static STACK_OF(GENERAL_NAMES) *make_names_stack(STACK_OF(OPENSSL_STRING) *ns)
 | 
			
		||||
    return NULL;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static CMS_ReceiptRequest *make_receipt_request(STACK_OF(OPENSSL_STRING)
 | 
			
		||||
                                                *rr_to, int rr_allorfirst, STACK_OF(OPENSSL_STRING)
 | 
			
		||||
                                                *rr_from)
 | 
			
		||||
static CMS_ReceiptRequest *make_receipt_request(STACK * rr_to,
 | 
			
		||||
                                                int rr_allorfirst,
 | 
			
		||||
                                                STACK * rr_from)
 | 
			
		||||
{
 | 
			
		||||
    STACK_OF(GENERAL_NAMES) *rct_to, *rct_from;
 | 
			
		||||
    CMS_ReceiptRequest *rr;
 | 
			
		||||
@@ -1336,22 +1180,4 @@ static CMS_ReceiptRequest *make_receipt_request(STACK_OF(OPENSSL_STRING)
 | 
			
		||||
    return NULL;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static int cms_set_pkey_param(EVP_PKEY_CTX *pctx,
 | 
			
		||||
                              STACK_OF(OPENSSL_STRING) *param)
 | 
			
		||||
{
 | 
			
		||||
    char *keyopt;
 | 
			
		||||
    int i;
 | 
			
		||||
    if (sk_OPENSSL_STRING_num(param) <= 0)
 | 
			
		||||
        return 1;
 | 
			
		||||
    for (i = 0; i < sk_OPENSSL_STRING_num(param); i++) {
 | 
			
		||||
        keyopt = sk_OPENSSL_STRING_value(param, i);
 | 
			
		||||
        if (pkey_ctrl_string(pctx, keyopt) <= 0) {
 | 
			
		||||
            BIO_printf(bio_err, "parameter error \"%s\"\n", keyopt);
 | 
			
		||||
            ERR_print_errors(bio_err);
 | 
			
		||||
            return 0;
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
    return 1;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
#endif
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										108
									
								
								apps/crl.c
									
									
									
									
									
								
							
							
						
						
									
										108
									
								
								apps/crl.c
									
									
									
									
									
								
							@@ -81,9 +81,6 @@ static const char *crl_usage[] = {
 | 
			
		||||
    " -in arg         - input file - default stdin\n",
 | 
			
		||||
    " -out arg        - output file - default stdout\n",
 | 
			
		||||
    " -hash           - print hash value\n",
 | 
			
		||||
#ifndef OPENSSL_NO_MD5
 | 
			
		||||
    " -hash_old       - print old-style (MD5) hash value\n",
 | 
			
		||||
#endif
 | 
			
		||||
    " -fingerprint    - print the crl fingerprint\n",
 | 
			
		||||
    " -issuer         - print issuer DN\n",
 | 
			
		||||
    " -lastupdate     - lastUpdate field\n",
 | 
			
		||||
@@ -96,6 +93,7 @@ static const char *crl_usage[] = {
 | 
			
		||||
    NULL
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
static X509_CRL *load_crl(char *file, int format);
 | 
			
		||||
static BIO *bio_out = NULL;
 | 
			
		||||
 | 
			
		||||
int MAIN(int, char **);
 | 
			
		||||
@@ -105,15 +103,12 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    unsigned long nmflag = 0;
 | 
			
		||||
    X509_CRL *x = NULL;
 | 
			
		||||
    char *CAfile = NULL, *CApath = NULL;
 | 
			
		||||
    int ret = 1, i, num, badops = 0, badsig = 0;
 | 
			
		||||
    int ret = 1, i, num, badops = 0;
 | 
			
		||||
    BIO *out = NULL;
 | 
			
		||||
    int informat, outformat, keyformat;
 | 
			
		||||
    char *infile = NULL, *outfile = NULL, *crldiff = NULL, *keyfile = NULL;
 | 
			
		||||
    int informat, outformat;
 | 
			
		||||
    char *infile = NULL, *outfile = NULL;
 | 
			
		||||
    int hash = 0, issuer = 0, lastupdate = 0, nextupdate = 0, noout =
 | 
			
		||||
        0, text = 0;
 | 
			
		||||
#ifndef OPENSSL_NO_MD5
 | 
			
		||||
    int hash_old = 0;
 | 
			
		||||
#endif
 | 
			
		||||
    int fingerprint = 0, crlnumber = 0;
 | 
			
		||||
    const char **pp;
 | 
			
		||||
    X509_STORE *store = NULL;
 | 
			
		||||
@@ -146,7 +141,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
 | 
			
		||||
    informat = FORMAT_PEM;
 | 
			
		||||
    outformat = FORMAT_PEM;
 | 
			
		||||
    keyformat = FORMAT_PEM;
 | 
			
		||||
 | 
			
		||||
    argc--;
 | 
			
		||||
    argv++;
 | 
			
		||||
@@ -173,18 +167,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            infile = *(++argv);
 | 
			
		||||
        } else if (strcmp(*argv, "-gendelta") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            crldiff = *(++argv);
 | 
			
		||||
        } else if (strcmp(*argv, "-key") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            keyfile = *(++argv);
 | 
			
		||||
        } else if (strcmp(*argv, "-keyform") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            keyformat = str2fmt(*(++argv));
 | 
			
		||||
        } else if (strcmp(*argv, "-out") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
@@ -205,10 +187,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            text = 1;
 | 
			
		||||
        else if (strcmp(*argv, "-hash") == 0)
 | 
			
		||||
            hash = ++num;
 | 
			
		||||
#ifndef OPENSSL_NO_MD5
 | 
			
		||||
        else if (strcmp(*argv, "-hash_old") == 0)
 | 
			
		||||
            hash_old = ++num;
 | 
			
		||||
#endif
 | 
			
		||||
        else if (strcmp(*argv, "-nameopt") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
@@ -226,8 +204,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            fingerprint = ++num;
 | 
			
		||||
        else if (strcmp(*argv, "-crlnumber") == 0)
 | 
			
		||||
            crlnumber = ++num;
 | 
			
		||||
        else if (strcmp(*argv, "-badsig") == 0)
 | 
			
		||||
            badsig = 1;
 | 
			
		||||
        else if ((md_alg = EVP_get_digestbyname(*argv + 1))) {
 | 
			
		||||
            /* ok */
 | 
			
		||||
            digest = md_alg;
 | 
			
		||||
@@ -295,33 +271,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            BIO_printf(bio_err, "verify OK\n");
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (crldiff) {
 | 
			
		||||
        X509_CRL *newcrl, *delta;
 | 
			
		||||
        if (!keyfile) {
 | 
			
		||||
            BIO_puts(bio_err, "Missing CRL signing key\n");
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
        newcrl = load_crl(crldiff, informat);
 | 
			
		||||
        if (!newcrl)
 | 
			
		||||
            goto end;
 | 
			
		||||
        pkey = load_key(bio_err, keyfile, keyformat, 0, NULL, NULL,
 | 
			
		||||
                        "CRL signing key");
 | 
			
		||||
        if (!pkey) {
 | 
			
		||||
            X509_CRL_free(newcrl);
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
        delta = X509_CRL_diff(x, newcrl, pkey, digest, 0);
 | 
			
		||||
        X509_CRL_free(newcrl);
 | 
			
		||||
        EVP_PKEY_free(pkey);
 | 
			
		||||
        if (delta) {
 | 
			
		||||
            X509_CRL_free(x);
 | 
			
		||||
            x = delta;
 | 
			
		||||
        } else {
 | 
			
		||||
            BIO_puts(bio_err, "Error creating delta CRL\n");
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (num) {
 | 
			
		||||
        for (i = 1; i <= num; i++) {
 | 
			
		||||
            if (issuer == i) {
 | 
			
		||||
@@ -343,12 +292,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                BIO_printf(bio_out, "%08lx\n",
 | 
			
		||||
                           X509_NAME_hash(X509_CRL_get_issuer(x)));
 | 
			
		||||
            }
 | 
			
		||||
#ifndef OPENSSL_NO_MD5
 | 
			
		||||
            if (hash_old == i) {
 | 
			
		||||
                BIO_printf(bio_out, "%08lx\n",
 | 
			
		||||
                           X509_NAME_hash_old(X509_CRL_get_issuer(x)));
 | 
			
		||||
            }
 | 
			
		||||
#endif
 | 
			
		||||
            if (lastupdate == i) {
 | 
			
		||||
                BIO_printf(bio_out, "lastUpdate=");
 | 
			
		||||
                ASN1_TIME_print(bio_out, X509_CRL_get_lastUpdate(x));
 | 
			
		||||
@@ -410,9 +353,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (badsig)
 | 
			
		||||
        x->signature->data[x->signature->length - 1] ^= 0x1;
 | 
			
		||||
 | 
			
		||||
    if (outformat == FORMAT_ASN1)
 | 
			
		||||
        i = (int)i2d_X509_CRL_bio(out, x);
 | 
			
		||||
    else if (outformat == FORMAT_PEM)
 | 
			
		||||
@@ -427,8 +367,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    }
 | 
			
		||||
    ret = 0;
 | 
			
		||||
 end:
 | 
			
		||||
    if (ret != 0)
 | 
			
		||||
        ERR_print_errors(bio_err);
 | 
			
		||||
    BIO_free_all(out);
 | 
			
		||||
    BIO_free_all(bio_out);
 | 
			
		||||
    bio_out = NULL;
 | 
			
		||||
@@ -440,3 +378,41 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    apps_shutdown();
 | 
			
		||||
    OPENSSL_EXIT(ret);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static X509_CRL *load_crl(char *infile, int format)
 | 
			
		||||
{
 | 
			
		||||
    X509_CRL *x = NULL;
 | 
			
		||||
    BIO *in = NULL;
 | 
			
		||||
 | 
			
		||||
    in = BIO_new(BIO_s_file());
 | 
			
		||||
    if (in == NULL) {
 | 
			
		||||
        ERR_print_errors(bio_err);
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (infile == NULL)
 | 
			
		||||
        BIO_set_fp(in, stdin, BIO_NOCLOSE);
 | 
			
		||||
    else {
 | 
			
		||||
        if (BIO_read_filename(in, infile) <= 0) {
 | 
			
		||||
            perror(infile);
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
    if (format == FORMAT_ASN1)
 | 
			
		||||
        x = d2i_X509_CRL_bio(in, NULL);
 | 
			
		||||
    else if (format == FORMAT_PEM)
 | 
			
		||||
        x = PEM_read_bio_X509_CRL(in, NULL, NULL, NULL);
 | 
			
		||||
    else {
 | 
			
		||||
        BIO_printf(bio_err, "bad input format specified for input crl\n");
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
    if (x == NULL) {
 | 
			
		||||
        BIO_printf(bio_err, "unable to load CRL\n");
 | 
			
		||||
        ERR_print_errors(bio_err);
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
 end:
 | 
			
		||||
    BIO_free(in);
 | 
			
		||||
    return (x);
 | 
			
		||||
}
 | 
			
		||||
 
 | 
			
		||||
@@ -65,6 +65,7 @@
 | 
			
		||||
#include <stdio.h>
 | 
			
		||||
#include <string.h>
 | 
			
		||||
#include <sys/types.h>
 | 
			
		||||
#include <sys/stat.h>
 | 
			
		||||
#include "apps.h"
 | 
			
		||||
#include <openssl/err.h>
 | 
			
		||||
#include <openssl/evp.h>
 | 
			
		||||
@@ -95,7 +96,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    PKCS7 *p7 = NULL;
 | 
			
		||||
    PKCS7_SIGNED *p7s = NULL;
 | 
			
		||||
    X509_CRL *crl = NULL;
 | 
			
		||||
    STACK_OF(OPENSSL_STRING) *certflst = NULL;
 | 
			
		||||
    STACK *certflst = NULL;
 | 
			
		||||
    STACK_OF(X509_CRL) *crl_stack = NULL;
 | 
			
		||||
    STACK_OF(X509) *cert_stack = NULL;
 | 
			
		||||
    int ret = 1, nocrl = 0;
 | 
			
		||||
@@ -137,11 +138,11 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            if (!certflst)
 | 
			
		||||
                certflst = sk_OPENSSL_STRING_new_null();
 | 
			
		||||
                certflst = sk_new_null();
 | 
			
		||||
            if (!certflst)
 | 
			
		||||
                goto end;
 | 
			
		||||
            if (!sk_OPENSSL_STRING_push(certflst, *(++argv))) {
 | 
			
		||||
                sk_OPENSSL_STRING_free(certflst);
 | 
			
		||||
            if (!sk_push(certflst, *(++argv))) {
 | 
			
		||||
                sk_free(certflst);
 | 
			
		||||
                goto end;
 | 
			
		||||
            }
 | 
			
		||||
        } else {
 | 
			
		||||
@@ -227,8 +228,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    p7s->cert = cert_stack;
 | 
			
		||||
 | 
			
		||||
    if (certflst)
 | 
			
		||||
        for (i = 0; i < sk_OPENSSL_STRING_num(certflst); i++) {
 | 
			
		||||
            certfile = sk_OPENSSL_STRING_value(certflst, i);
 | 
			
		||||
        for (i = 0; i < sk_num(certflst); i++) {
 | 
			
		||||
            certfile = sk_value(certflst, i);
 | 
			
		||||
            if (add_certs_from_file(cert_stack, certfile) < 0) {
 | 
			
		||||
                BIO_printf(bio_err, "error loading certificates\n");
 | 
			
		||||
                ERR_print_errors(bio_err);
 | 
			
		||||
@@ -236,7 +237,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
    sk_OPENSSL_STRING_free(certflst);
 | 
			
		||||
    sk_free(certflst);
 | 
			
		||||
 | 
			
		||||
    if (outfile == NULL) {
 | 
			
		||||
        BIO_set_fp(out, stdout, BIO_NOCLOSE);
 | 
			
		||||
@@ -293,12 +294,18 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
 */
 | 
			
		||||
static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile)
 | 
			
		||||
{
 | 
			
		||||
    struct stat st;
 | 
			
		||||
    BIO *in = NULL;
 | 
			
		||||
    int count = 0;
 | 
			
		||||
    int ret = -1;
 | 
			
		||||
    STACK_OF(X509_INFO) *sk = NULL;
 | 
			
		||||
    X509_INFO *xi;
 | 
			
		||||
 | 
			
		||||
    if ((stat(certfile, &st) != 0)) {
 | 
			
		||||
        BIO_printf(bio_err, "unable to load the file, %s\n", certfile);
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    in = BIO_new(BIO_s_file());
 | 
			
		||||
    if ((in == NULL) || (BIO_read_filename(in, certfile) <= 0)) {
 | 
			
		||||
        BIO_printf(bio_err, "error opening the file, %s\n", certfile);
 | 
			
		||||
 
 | 
			
		||||
@@ -1,6 +0,0 @@
 | 
			
		||||
# This is a file that will be filled by the openssl srp routine.
 | 
			
		||||
# You can initialize the file with additional groups, these are
 | 
			
		||||
# records starting with a I followed by the g and N values and the id.
 | 
			
		||||
# The exact values ... you have to dig this out from the source of srp.c
 | 
			
		||||
# or srp_vfy.c
 | 
			
		||||
# The last value of an I is used as the default group for new users.  
 | 
			
		||||
@@ -1 +0,0 @@
 | 
			
		||||
unique_subject = yes
 | 
			
		||||
							
								
								
									
										352
									
								
								apps/dgst.c
									
									
									
									
									
								
							
							
						
						
									
										352
									
								
								apps/dgst.c
									
									
									
									
									
								
							@@ -75,41 +75,22 @@
 | 
			
		||||
#define PROG    dgst_main
 | 
			
		||||
 | 
			
		||||
int do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
 | 
			
		||||
          EVP_PKEY *key, unsigned char *sigin, int siglen,
 | 
			
		||||
          const char *sig_name, const char *md_name,
 | 
			
		||||
          const char *file, BIO *bmd);
 | 
			
		||||
 | 
			
		||||
static void list_md_fn(const EVP_MD *m,
 | 
			
		||||
                       const char *from, const char *to, void *arg)
 | 
			
		||||
{
 | 
			
		||||
    const char *mname;
 | 
			
		||||
    /* Skip aliases */
 | 
			
		||||
    if (!m)
 | 
			
		||||
        return;
 | 
			
		||||
    mname = OBJ_nid2ln(EVP_MD_type(m));
 | 
			
		||||
    /* Skip shortnames */
 | 
			
		||||
    if (strcmp(from, mname))
 | 
			
		||||
        return;
 | 
			
		||||
    /* Skip clones */
 | 
			
		||||
    if (EVP_MD_flags(m) & EVP_MD_FLAG_PKEY_DIGEST)
 | 
			
		||||
        return;
 | 
			
		||||
    if (strchr(mname, ' '))
 | 
			
		||||
        mname = EVP_MD_name(m);
 | 
			
		||||
    BIO_printf(arg, "-%-14s to use the %s message digest algorithm\n",
 | 
			
		||||
               mname, mname);
 | 
			
		||||
}
 | 
			
		||||
          EVP_PKEY *key, unsigned char *sigin, int siglen, const char *title,
 | 
			
		||||
          const char *file, BIO *bmd, const char *hmac_key,
 | 
			
		||||
          int non_fips_allow);
 | 
			
		||||
 | 
			
		||||
int MAIN(int, char **);
 | 
			
		||||
 | 
			
		||||
int MAIN(int argc, char **argv)
 | 
			
		||||
{
 | 
			
		||||
    ENGINE *e = NULL, *impl = NULL;
 | 
			
		||||
    ENGINE *e = NULL;
 | 
			
		||||
    unsigned char *buf = NULL;
 | 
			
		||||
    int i, err = 1;
 | 
			
		||||
    const EVP_MD *md = NULL, *m;
 | 
			
		||||
    BIO *in = NULL, *inp;
 | 
			
		||||
    BIO *bmd = NULL;
 | 
			
		||||
    BIO *out = NULL;
 | 
			
		||||
    const char *name;
 | 
			
		||||
#define PROG_NAME_SIZE  39
 | 
			
		||||
    char pname[PROG_NAME_SIZE + 1];
 | 
			
		||||
    int separator = 0;
 | 
			
		||||
@@ -121,18 +102,16 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    EVP_PKEY *sigkey = NULL;
 | 
			
		||||
    unsigned char *sigbuf = NULL;
 | 
			
		||||
    int siglen = 0;
 | 
			
		||||
    unsigned int sig_flags = 0;
 | 
			
		||||
    char *passargin = NULL, *passin = NULL;
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
    char *engine = NULL;
 | 
			
		||||
    int engine_impl = 0;
 | 
			
		||||
#endif
 | 
			
		||||
    char *hmac_key = NULL;
 | 
			
		||||
    char *mac_name = NULL;
 | 
			
		||||
    int non_fips_allow = 0;
 | 
			
		||||
    STACK_OF(OPENSSL_STRING) *sigopts = NULL, *macopts = NULL;
 | 
			
		||||
 | 
			
		||||
    apps_startup();
 | 
			
		||||
 | 
			
		||||
    ERR_load_crypto_strings();
 | 
			
		||||
    if ((buf = (unsigned char *)OPENSSL_malloc(BUFSIZE)) == NULL) {
 | 
			
		||||
        BIO_printf(bio_err, "out of memory\n");
 | 
			
		||||
        goto end;
 | 
			
		||||
@@ -156,8 +135,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            break;
 | 
			
		||||
        if (strcmp(*argv, "-c") == 0)
 | 
			
		||||
            separator = 1;
 | 
			
		||||
        else if (strcmp(*argv, "-r") == 0)
 | 
			
		||||
            separator = 2;
 | 
			
		||||
        else if (strcmp(*argv, "-rand") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                break;
 | 
			
		||||
@@ -185,6 +162,24 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                break;
 | 
			
		||||
            keyfile = *(++argv);
 | 
			
		||||
            do_verify = 1;
 | 
			
		||||
        } else if (strcmp(*argv, "-x931") == 0)
 | 
			
		||||
            sig_flags = EVP_MD_CTX_FLAG_PAD_X931;
 | 
			
		||||
        else if (strcmp(*argv, "-pss_saltlen") == 0) {
 | 
			
		||||
            int saltlen;
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                break;
 | 
			
		||||
            saltlen = atoi(*(++argv));
 | 
			
		||||
            if (saltlen == -1)
 | 
			
		||||
                sig_flags = EVP_MD_CTX_FLAG_PSS_MREC;
 | 
			
		||||
            else if (saltlen == -2)
 | 
			
		||||
                sig_flags = EVP_MD_CTX_FLAG_PSS_MDLEN;
 | 
			
		||||
            else if (saltlen < -2 || saltlen >= 0xFFFE) {
 | 
			
		||||
                BIO_printf(bio_err, "Invalid PSS salt length %d\n", saltlen);
 | 
			
		||||
                goto end;
 | 
			
		||||
            } else
 | 
			
		||||
                sig_flags = saltlen;
 | 
			
		||||
            sig_flags <<= 16;
 | 
			
		||||
            sig_flags |= EVP_MD_CTX_FLAG_PAD_PSS;
 | 
			
		||||
        } else if (strcmp(*argv, "-signature") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                break;
 | 
			
		||||
@@ -199,9 +194,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                break;
 | 
			
		||||
            engine = *(++argv);
 | 
			
		||||
            e = setup_engine(bio_err, engine, 0);
 | 
			
		||||
        } else if (strcmp(*argv, "-engine_impl") == 0)
 | 
			
		||||
            engine_impl = 1;
 | 
			
		||||
        }
 | 
			
		||||
#endif
 | 
			
		||||
        else if (strcmp(*argv, "-hex") == 0)
 | 
			
		||||
            out_bin = 0;
 | 
			
		||||
@@ -209,32 +202,14 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            out_bin = 1;
 | 
			
		||||
        else if (strcmp(*argv, "-d") == 0)
 | 
			
		||||
            debug = 1;
 | 
			
		||||
        else if (!strcmp(*argv, "-fips-fingerprint"))
 | 
			
		||||
            hmac_key = "etaonrishdlcupfm";
 | 
			
		||||
        else if (strcmp(*argv, "-non-fips-allow") == 0)
 | 
			
		||||
            non_fips_allow = 1;
 | 
			
		||||
        else if (!strcmp(*argv, "-fips-fingerprint"))
 | 
			
		||||
            hmac_key = "etaonrishdlcupfm";
 | 
			
		||||
        else if (!strcmp(*argv, "-hmac")) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                break;
 | 
			
		||||
            hmac_key = *++argv;
 | 
			
		||||
        } else if (!strcmp(*argv, "-mac")) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                break;
 | 
			
		||||
            mac_name = *++argv;
 | 
			
		||||
        } else if (strcmp(*argv, "-sigopt") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                break;
 | 
			
		||||
            if (!sigopts)
 | 
			
		||||
                sigopts = sk_OPENSSL_STRING_new_null();
 | 
			
		||||
            if (!sigopts || !sk_OPENSSL_STRING_push(sigopts, *(++argv)))
 | 
			
		||||
                break;
 | 
			
		||||
        } else if (strcmp(*argv, "-macopt") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                break;
 | 
			
		||||
            if (!macopts)
 | 
			
		||||
                macopts = sk_OPENSSL_STRING_new_null();
 | 
			
		||||
            if (!macopts || !sk_OPENSSL_STRING_push(macopts, *(++argv)))
 | 
			
		||||
                break;
 | 
			
		||||
        } else if ((m = EVP_get_digestbyname(&((*argv)[1]))) != NULL)
 | 
			
		||||
            md = m;
 | 
			
		||||
        else
 | 
			
		||||
@@ -243,9 +218,13 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        argv++;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (md == NULL)
 | 
			
		||||
        md = EVP_md5();
 | 
			
		||||
 | 
			
		||||
    if (do_verify && !sigfile) {
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "No signature to verify: use the -signature option\n");
 | 
			
		||||
        err = 1;
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
@@ -254,13 +233,9 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        BIO_printf(bio_err, "options are\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-c              to output the digest with separating colons\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-r              to output the digest in coreutils format\n");
 | 
			
		||||
        BIO_printf(bio_err, "-d              to output debug info\n");
 | 
			
		||||
        BIO_printf(bio_err, "-hex            output as hex dump\n");
 | 
			
		||||
        BIO_printf(bio_err, "-binary         output in binary form\n");
 | 
			
		||||
        BIO_printf(bio_err, "-hmac arg       set the HMAC key to arg\n");
 | 
			
		||||
        BIO_printf(bio_err, "-non-fips-allow allow use of non FIPS digest\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-sign   file    sign digest using private key in file\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
@@ -269,35 +244,52 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                   "-prverify file  verify a signature using private key in file\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-keyform arg    key file format (PEM or ENGINE)\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-out filename   output to filename rather than stdout\n");
 | 
			
		||||
        BIO_printf(bio_err, "-signature file signature to verify\n");
 | 
			
		||||
        BIO_printf(bio_err, "-sigopt nm:v    signature parameter\n");
 | 
			
		||||
        BIO_printf(bio_err, "-binary         output in binary form\n");
 | 
			
		||||
        BIO_printf(bio_err, "-hmac key       create hashed MAC with key\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-mac algorithm  create MAC (not neccessarily HMAC)\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-macopt nm:v    MAC algorithm parameters or key\n");
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-engine e       use engine e, possibly a hardware device.\n");
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
        EVP_MD_do_all_sorted(list_md_fn, bio_err);
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-%-14s to use the %s message digest algorithm (default)\n",
 | 
			
		||||
                   LN_md5, LN_md5);
 | 
			
		||||
        BIO_printf(bio_err, "-%-14s to use the %s message digest algorithm\n",
 | 
			
		||||
                   LN_md4, LN_md4);
 | 
			
		||||
        BIO_printf(bio_err, "-%-14s to use the %s message digest algorithm\n",
 | 
			
		||||
                   LN_md2, LN_md2);
 | 
			
		||||
#ifndef OPENSSL_NO_SHA
 | 
			
		||||
        BIO_printf(bio_err, "-%-14s to use the %s message digest algorithm\n",
 | 
			
		||||
                   LN_sha1, LN_sha1);
 | 
			
		||||
        BIO_printf(bio_err, "-%-14s to use the %s message digest algorithm\n",
 | 
			
		||||
                   LN_sha, LN_sha);
 | 
			
		||||
# ifndef OPENSSL_NO_SHA256
 | 
			
		||||
        BIO_printf(bio_err, "-%-14s to use the %s message digest algorithm\n",
 | 
			
		||||
                   LN_sha224, LN_sha224);
 | 
			
		||||
        BIO_printf(bio_err, "-%-14s to use the %s message digest algorithm\n",
 | 
			
		||||
                   LN_sha256, LN_sha256);
 | 
			
		||||
# endif
 | 
			
		||||
# ifndef OPENSSL_NO_SHA512
 | 
			
		||||
        BIO_printf(bio_err, "-%-14s to use the %s message digest algorithm\n",
 | 
			
		||||
                   LN_sha384, LN_sha384);
 | 
			
		||||
        BIO_printf(bio_err, "-%-14s to use the %s message digest algorithm\n",
 | 
			
		||||
                   LN_sha512, LN_sha512);
 | 
			
		||||
# endif
 | 
			
		||||
#endif
 | 
			
		||||
        BIO_printf(bio_err, "-%-14s to use the %s message digest algorithm\n",
 | 
			
		||||
                   LN_mdc2, LN_mdc2);
 | 
			
		||||
        BIO_printf(bio_err, "-%-14s to use the %s message digest algorithm\n",
 | 
			
		||||
                   LN_ripemd160, LN_ripemd160);
 | 
			
		||||
        err = 1;
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
    if (engine_impl)
 | 
			
		||||
        impl = e;
 | 
			
		||||
    e = setup_engine(bio_err, engine, 0);
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
    in = BIO_new(BIO_s_file());
 | 
			
		||||
    bmd = BIO_new(BIO_f_md());
 | 
			
		||||
    if ((in == NULL) || (bmd == NULL)) {
 | 
			
		||||
        ERR_print_errors(bio_err);
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (debug) {
 | 
			
		||||
        BIO_set_callback(in, BIO_debug_callback);
 | 
			
		||||
        /* needed for windows 3.1 */
 | 
			
		||||
@@ -309,6 +301,11 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if ((in == NULL) || (bmd == NULL)) {
 | 
			
		||||
        ERR_print_errors(bio_err);
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (out_bin == -1) {
 | 
			
		||||
        if (keyfile)
 | 
			
		||||
            out_bin = 1;
 | 
			
		||||
@@ -340,10 +337,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        ERR_print_errors(bio_err);
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
    if ((! !mac_name + ! !keyfile + ! !hmac_key) > 1) {
 | 
			
		||||
        BIO_printf(bio_err, "MAC and Signing key cannot both be specified\n");
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (keyfile) {
 | 
			
		||||
        if (want_pub)
 | 
			
		||||
@@ -360,96 +353,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (mac_name) {
 | 
			
		||||
        EVP_PKEY_CTX *mac_ctx = NULL;
 | 
			
		||||
        int r = 0;
 | 
			
		||||
        if (!init_gen_str(bio_err, &mac_ctx, mac_name, impl, 0))
 | 
			
		||||
            goto mac_end;
 | 
			
		||||
        if (macopts) {
 | 
			
		||||
            char *macopt;
 | 
			
		||||
            for (i = 0; i < sk_OPENSSL_STRING_num(macopts); i++) {
 | 
			
		||||
                macopt = sk_OPENSSL_STRING_value(macopts, i);
 | 
			
		||||
                if (pkey_ctrl_string(mac_ctx, macopt) <= 0) {
 | 
			
		||||
                    BIO_printf(bio_err,
 | 
			
		||||
                               "MAC parameter error \"%s\"\n", macopt);
 | 
			
		||||
                    ERR_print_errors(bio_err);
 | 
			
		||||
                    goto mac_end;
 | 
			
		||||
                }
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
        if (EVP_PKEY_keygen(mac_ctx, &sigkey) <= 0) {
 | 
			
		||||
            BIO_puts(bio_err, "Error generating key\n");
 | 
			
		||||
            ERR_print_errors(bio_err);
 | 
			
		||||
            goto mac_end;
 | 
			
		||||
        }
 | 
			
		||||
        r = 1;
 | 
			
		||||
 mac_end:
 | 
			
		||||
        if (mac_ctx)
 | 
			
		||||
            EVP_PKEY_CTX_free(mac_ctx);
 | 
			
		||||
        if (r == 0)
 | 
			
		||||
            goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (non_fips_allow) {
 | 
			
		||||
        EVP_MD_CTX *md_ctx;
 | 
			
		||||
        BIO_get_md_ctx(bmd, &md_ctx);
 | 
			
		||||
        EVP_MD_CTX_set_flags(md_ctx, EVP_MD_CTX_FLAG_NON_FIPS_ALLOW);
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (hmac_key) {
 | 
			
		||||
        sigkey = EVP_PKEY_new_mac_key(EVP_PKEY_HMAC, impl,
 | 
			
		||||
                                      (unsigned char *)hmac_key, -1);
 | 
			
		||||
        if (!sigkey)
 | 
			
		||||
            goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (sigkey) {
 | 
			
		||||
        EVP_MD_CTX *mctx = NULL;
 | 
			
		||||
        EVP_PKEY_CTX *pctx = NULL;
 | 
			
		||||
        int r;
 | 
			
		||||
        if (!BIO_get_md_ctx(bmd, &mctx)) {
 | 
			
		||||
            BIO_printf(bio_err, "Error getting context\n");
 | 
			
		||||
            ERR_print_errors(bio_err);
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
        if (do_verify)
 | 
			
		||||
            r = EVP_DigestVerifyInit(mctx, &pctx, md, impl, sigkey);
 | 
			
		||||
        else
 | 
			
		||||
            r = EVP_DigestSignInit(mctx, &pctx, md, impl, sigkey);
 | 
			
		||||
        if (!r) {
 | 
			
		||||
            BIO_printf(bio_err, "Error setting context\n");
 | 
			
		||||
            ERR_print_errors(bio_err);
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
        if (sigopts) {
 | 
			
		||||
            char *sigopt;
 | 
			
		||||
            for (i = 0; i < sk_OPENSSL_STRING_num(sigopts); i++) {
 | 
			
		||||
                sigopt = sk_OPENSSL_STRING_value(sigopts, i);
 | 
			
		||||
                if (pkey_ctrl_string(pctx, sigopt) <= 0) {
 | 
			
		||||
                    BIO_printf(bio_err, "parameter error \"%s\"\n", sigopt);
 | 
			
		||||
                    ERR_print_errors(bio_err);
 | 
			
		||||
                    goto end;
 | 
			
		||||
                }
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
    /* we use md as a filter, reading from 'in' */
 | 
			
		||||
    else {
 | 
			
		||||
        EVP_MD_CTX *mctx = NULL;
 | 
			
		||||
        if (!BIO_get_md_ctx(bmd, &mctx)) {
 | 
			
		||||
            BIO_printf(bio_err, "Error getting context\n");
 | 
			
		||||
            ERR_print_errors(bio_err);
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
        if (md == NULL)
 | 
			
		||||
            md = EVP_md5();
 | 
			
		||||
        if (!EVP_DigestInit_ex(mctx, md, impl)) {
 | 
			
		||||
            BIO_printf(bio_err, "Error setting digest %s\n", pname);
 | 
			
		||||
            ERR_print_errors(bio_err);
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (sigfile && sigkey) {
 | 
			
		||||
        BIO *sigbio;
 | 
			
		||||
        sigbio = BIO_new_file(sigfile, "rb");
 | 
			
		||||
@@ -460,11 +363,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            ERR_print_errors(bio_err);
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
        if (!sigbuf) {
 | 
			
		||||
            BIO_printf(bio_err, "Out of memory\n");
 | 
			
		||||
            ERR_print_errors(bio_err);
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
        siglen = BIO_read(sigbio, sigbuf, siglen);
 | 
			
		||||
        BIO_free(sigbio);
 | 
			
		||||
        if (siglen <= 0) {
 | 
			
		||||
@@ -473,43 +371,58 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
    inp = BIO_push(bmd, in);
 | 
			
		||||
 | 
			
		||||
    if (md == NULL) {
 | 
			
		||||
        EVP_MD_CTX *tctx;
 | 
			
		||||
        BIO_get_md_ctx(bmd, &tctx);
 | 
			
		||||
        md = EVP_MD_CTX_md(tctx);
 | 
			
		||||
    if (non_fips_allow) {
 | 
			
		||||
        EVP_MD_CTX *md_ctx;
 | 
			
		||||
        BIO_get_md_ctx(bmd, &md_ctx);
 | 
			
		||||
        EVP_MD_CTX_set_flags(md_ctx, EVP_MD_CTX_FLAG_NON_FIPS_ALLOW);
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (sig_flags) {
 | 
			
		||||
        EVP_MD_CTX *md_ctx;
 | 
			
		||||
        BIO_get_md_ctx(bmd, &md_ctx);
 | 
			
		||||
        EVP_MD_CTX_set_flags(md_ctx, sig_flags);
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    /* we use md as a filter, reading from 'in' */
 | 
			
		||||
    if (!BIO_set_md(bmd, md)) {
 | 
			
		||||
        BIO_printf(bio_err, "Error setting digest %s\n", pname);
 | 
			
		||||
        ERR_print_errors(bio_err);
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    inp = BIO_push(bmd, in);
 | 
			
		||||
 | 
			
		||||
    if (argc == 0) {
 | 
			
		||||
        BIO_set_fp(in, stdin, BIO_NOCLOSE);
 | 
			
		||||
        err = do_fp(out, buf, inp, separator, out_bin, sigkey, sigbuf,
 | 
			
		||||
                    siglen, NULL, NULL, "stdin", bmd);
 | 
			
		||||
                    siglen, "", "(stdin)", bmd, hmac_key, non_fips_allow);
 | 
			
		||||
    } else {
 | 
			
		||||
        const char *md_name = NULL, *sig_name = NULL;
 | 
			
		||||
        if (!out_bin) {
 | 
			
		||||
            if (sigkey) {
 | 
			
		||||
                const EVP_PKEY_ASN1_METHOD *ameth;
 | 
			
		||||
                ameth = EVP_PKEY_get0_asn1(sigkey);
 | 
			
		||||
                if (ameth)
 | 
			
		||||
                    EVP_PKEY_asn1_get0_info(NULL, NULL,
 | 
			
		||||
                                            NULL, NULL, &sig_name, ameth);
 | 
			
		||||
            }
 | 
			
		||||
            if (md)
 | 
			
		||||
                md_name = EVP_MD_name(md);
 | 
			
		||||
        }
 | 
			
		||||
        name = OBJ_nid2sn(md->type);
 | 
			
		||||
        err = 0;
 | 
			
		||||
        for (i = 0; i < argc; i++) {
 | 
			
		||||
            char *tmp, *tofree = NULL;
 | 
			
		||||
            int r;
 | 
			
		||||
 | 
			
		||||
            if (BIO_read_filename(in, argv[i]) <= 0) {
 | 
			
		||||
                perror(argv[i]);
 | 
			
		||||
                err++;
 | 
			
		||||
                continue;
 | 
			
		||||
            }
 | 
			
		||||
            if (!out_bin) {
 | 
			
		||||
                size_t len =
 | 
			
		||||
                    strlen(name) + strlen(argv[i]) + (hmac_key ? 5 : 0) + 5;
 | 
			
		||||
                tmp = tofree = OPENSSL_malloc(len);
 | 
			
		||||
                BIO_snprintf(tmp, len, "%s%s(%s)= ",
 | 
			
		||||
                             hmac_key ? "HMAC-" : "", name, argv[i]);
 | 
			
		||||
            } else
 | 
			
		||||
                r = do_fp(out, buf, inp, separator, out_bin, sigkey, sigbuf,
 | 
			
		||||
                          siglen, sig_name, md_name, argv[i], bmd);
 | 
			
		||||
                tmp = "";
 | 
			
		||||
            r = do_fp(out, buf, inp, separator, out_bin, sigkey, sigbuf,
 | 
			
		||||
                      siglen, tmp, argv[i], bmd, hmac_key, non_fips_allow);
 | 
			
		||||
            if (r)
 | 
			
		||||
                err = r;
 | 
			
		||||
            if (tofree)
 | 
			
		||||
                OPENSSL_free(tofree);
 | 
			
		||||
            (void)BIO_reset(bmd);
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
@@ -524,10 +437,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        OPENSSL_free(passin);
 | 
			
		||||
    BIO_free_all(out);
 | 
			
		||||
    EVP_PKEY_free(sigkey);
 | 
			
		||||
    if (sigopts)
 | 
			
		||||
        sk_OPENSSL_STRING_free(sigopts);
 | 
			
		||||
    if (macopts)
 | 
			
		||||
        sk_OPENSSL_STRING_free(macopts);
 | 
			
		||||
    if (sigbuf)
 | 
			
		||||
        OPENSSL_free(sigbuf);
 | 
			
		||||
    if (bmd != NULL)
 | 
			
		||||
@@ -537,13 +446,24 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
int do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
 | 
			
		||||
          EVP_PKEY *key, unsigned char *sigin, int siglen,
 | 
			
		||||
          const char *sig_name, const char *md_name,
 | 
			
		||||
          const char *file, BIO *bmd)
 | 
			
		||||
          EVP_PKEY *key, unsigned char *sigin, int siglen, const char *title,
 | 
			
		||||
          const char *file, BIO *bmd, const char *hmac_key,
 | 
			
		||||
          int non_fips_allow)
 | 
			
		||||
{
 | 
			
		||||
    size_t len;
 | 
			
		||||
    unsigned int len;
 | 
			
		||||
    int i;
 | 
			
		||||
    EVP_MD_CTX *md_ctx;
 | 
			
		||||
    HMAC_CTX hmac_ctx;
 | 
			
		||||
 | 
			
		||||
    if (hmac_key) {
 | 
			
		||||
        EVP_MD *md;
 | 
			
		||||
 | 
			
		||||
        BIO_get_md(bmd, &md);
 | 
			
		||||
        HMAC_CTX_init(&hmac_ctx);
 | 
			
		||||
        HMAC_Init_ex(&hmac_ctx, hmac_key, strlen(hmac_key), md, NULL);
 | 
			
		||||
        BIO_get_md_ctx(bmd, &md_ctx);
 | 
			
		||||
        BIO_set_md_ctx(bmd, &hmac_ctx.md_ctx);
 | 
			
		||||
    }
 | 
			
		||||
    for (;;) {
 | 
			
		||||
        i = BIO_read(bp, (char *)buf, BUFSIZE);
 | 
			
		||||
        if (i < 0) {
 | 
			
		||||
@@ -557,7 +477,7 @@ int do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
 | 
			
		||||
    if (sigin) {
 | 
			
		||||
        EVP_MD_CTX *ctx;
 | 
			
		||||
        BIO_get_md_ctx(bp, &ctx);
 | 
			
		||||
        i = EVP_DigestVerifyFinal(ctx, sigin, (unsigned int)siglen);
 | 
			
		||||
        i = EVP_VerifyFinal(ctx, sigin, (unsigned int)siglen, key);
 | 
			
		||||
        if (i > 0)
 | 
			
		||||
            BIO_printf(out, "Verified OK\n");
 | 
			
		||||
        else if (i == 0) {
 | 
			
		||||
@@ -573,36 +493,21 @@ int do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
 | 
			
		||||
    if (key) {
 | 
			
		||||
        EVP_MD_CTX *ctx;
 | 
			
		||||
        BIO_get_md_ctx(bp, &ctx);
 | 
			
		||||
        len = BUFSIZE;
 | 
			
		||||
        if (!EVP_DigestSignFinal(ctx, buf, &len)) {
 | 
			
		||||
        if (!EVP_SignFinal(ctx, buf, (unsigned int *)&len, key)) {
 | 
			
		||||
            BIO_printf(bio_err, "Error Signing Data\n");
 | 
			
		||||
            ERR_print_errors(bio_err);
 | 
			
		||||
            return 1;
 | 
			
		||||
        }
 | 
			
		||||
    } else {
 | 
			
		||||
    } else if (hmac_key) {
 | 
			
		||||
        HMAC_Final(&hmac_ctx, buf, &len);
 | 
			
		||||
        HMAC_CTX_cleanup(&hmac_ctx);
 | 
			
		||||
    } else
 | 
			
		||||
        len = BIO_gets(bp, (char *)buf, BUFSIZE);
 | 
			
		||||
        if ((int)len < 0) {
 | 
			
		||||
            ERR_print_errors(bio_err);
 | 
			
		||||
            return 1;
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (binout)
 | 
			
		||||
        BIO_write(out, buf, len);
 | 
			
		||||
    else if (sep == 2) {
 | 
			
		||||
        for (i = 0; i < (int)len; i++)
 | 
			
		||||
            BIO_printf(out, "%02x", buf[i]);
 | 
			
		||||
        BIO_printf(out, " *%s\n", file);
 | 
			
		||||
    } else {
 | 
			
		||||
        if (sig_name) {
 | 
			
		||||
            BIO_puts(out, sig_name);
 | 
			
		||||
            if (md_name)
 | 
			
		||||
                BIO_printf(out, "-%s", md_name);
 | 
			
		||||
            BIO_printf(out, "(%s)= ", file);
 | 
			
		||||
        } else if (md_name)
 | 
			
		||||
            BIO_printf(out, "%s(%s)= ", md_name, file);
 | 
			
		||||
        else
 | 
			
		||||
            BIO_printf(out, "(%s)= ", file);
 | 
			
		||||
    else {
 | 
			
		||||
        BIO_write(out, title, strlen(title));
 | 
			
		||||
        for (i = 0; i < (int)len; i++) {
 | 
			
		||||
            if (sep && (i != 0))
 | 
			
		||||
                BIO_printf(out, ":");
 | 
			
		||||
@@ -610,5 +515,8 @@ int do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
 | 
			
		||||
        }
 | 
			
		||||
        BIO_printf(out, "\n");
 | 
			
		||||
    }
 | 
			
		||||
    if (hmac_key) {
 | 
			
		||||
        BIO_set_md_ctx(bmd, md_ctx);
 | 
			
		||||
    }
 | 
			
		||||
    return 0;
 | 
			
		||||
}
 | 
			
		||||
 
 | 
			
		||||
@@ -328,10 +328,4 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    apps_shutdown();
 | 
			
		||||
    OPENSSL_EXIT(ret);
 | 
			
		||||
}
 | 
			
		||||
#else                           /* !OPENSSL_NO_DH */
 | 
			
		||||
 | 
			
		||||
# if PEDANTIC
 | 
			
		||||
static void *dummy = &dummy;
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
#endif
 | 
			
		||||
 
 | 
			
		||||
@@ -130,7 +130,7 @@
 | 
			
		||||
# undef PROG
 | 
			
		||||
# define PROG    dhparam_main
 | 
			
		||||
 | 
			
		||||
# define DEFBITS 2048
 | 
			
		||||
# define DEFBITS 512
 | 
			
		||||
 | 
			
		||||
/*-
 | 
			
		||||
 * -inform arg  - input format - default PEM (DER or PEM)
 | 
			
		||||
@@ -254,7 +254,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   " -5            generate parameters using  5 as the generator value\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   " numbits       number of bits in to generate (default 2048)\n");
 | 
			
		||||
                   " numbits       number of bits in to generate (default 512)\n");
 | 
			
		||||
# ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   " -engine e     use engine e, possibly a hardware device.\n");
 | 
			
		||||
@@ -489,12 +489,9 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    if (!noout) {
 | 
			
		||||
        if (outformat == FORMAT_ASN1)
 | 
			
		||||
            i = i2d_DHparams_bio(out, dh);
 | 
			
		||||
        else if (outformat == FORMAT_PEM) {
 | 
			
		||||
            if (dh->q)
 | 
			
		||||
                i = PEM_write_bio_DHxparams(out, dh);
 | 
			
		||||
            else
 | 
			
		||||
                i = PEM_write_bio_DHparams(out, dh);
 | 
			
		||||
        } else {
 | 
			
		||||
        else if (outformat == FORMAT_PEM)
 | 
			
		||||
            i = PEM_write_bio_DHparams(out, dh);
 | 
			
		||||
        else {
 | 
			
		||||
            BIO_printf(bio_err, "bad output format specified for outfile\n");
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
@@ -537,10 +534,4 @@ static int MS_CALLBACK dh_cb(int p, int n, BN_GENCB *cb)
 | 
			
		||||
    return 1;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
#else                           /* !OPENSSL_NO_DH */
 | 
			
		||||
 | 
			
		||||
# if PEDANTIC
 | 
			
		||||
static void *dummy = &dummy;
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
#endif
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										52
									
								
								apps/dsa.c
									
									
									
									
									
								
							
							
						
						
									
										52
									
								
								apps/dsa.c
									
									
									
									
									
								
							@@ -65,11 +65,11 @@
 | 
			
		||||
# include "apps.h"
 | 
			
		||||
# include <openssl/bio.h>
 | 
			
		||||
# include <openssl/err.h>
 | 
			
		||||
# include <openssl/dsa.h>
 | 
			
		||||
# include <openssl/evp.h>
 | 
			
		||||
# include <openssl/x509.h>
 | 
			
		||||
# include <openssl/pem.h>
 | 
			
		||||
# include <openssl/bn.h>
 | 
			
		||||
# include <openssl/dsa.h>
 | 
			
		||||
 | 
			
		||||
# undef PROG
 | 
			
		||||
# define PROG    dsa_main
 | 
			
		||||
@@ -113,8 +113,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    char *passin = NULL, *passout = NULL;
 | 
			
		||||
    int modulus = 0;
 | 
			
		||||
 | 
			
		||||
    int pvk_encr = 2;
 | 
			
		||||
 | 
			
		||||
    apps_startup();
 | 
			
		||||
 | 
			
		||||
    if (bio_err == NULL)
 | 
			
		||||
@@ -168,12 +166,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            engine = *(++argv);
 | 
			
		||||
        }
 | 
			
		||||
# endif
 | 
			
		||||
        else if (strcmp(*argv, "-pvk-strong") == 0)
 | 
			
		||||
            pvk_encr = 2;
 | 
			
		||||
        else if (strcmp(*argv, "-pvk-weak") == 0)
 | 
			
		||||
            pvk_encr = 1;
 | 
			
		||||
        else if (strcmp(*argv, "-pvk-none") == 0)
 | 
			
		||||
            pvk_encr = 0;
 | 
			
		||||
        else if (strcmp(*argv, "-noout") == 0)
 | 
			
		||||
            noout = 1;
 | 
			
		||||
        else if (strcmp(*argv, "-text") == 0)
 | 
			
		||||
@@ -248,27 +240,15 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    in = BIO_new(BIO_s_file());
 | 
			
		||||
    out = BIO_new(BIO_s_file());
 | 
			
		||||
    if ((in == NULL) || (out == NULL)) {
 | 
			
		||||
    if (out == NULL) {
 | 
			
		||||
        ERR_print_errors(bio_err);
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (infile == NULL)
 | 
			
		||||
        BIO_set_fp(in, stdin, BIO_NOCLOSE);
 | 
			
		||||
    else {
 | 
			
		||||
        if (BIO_read_filename(in, infile) <= 0) {
 | 
			
		||||
            perror(infile);
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    BIO_printf(bio_err, "read DSA key\n");
 | 
			
		||||
 | 
			
		||||
    {
 | 
			
		||||
        EVP_PKEY *pkey;
 | 
			
		||||
 | 
			
		||||
        if (pubin)
 | 
			
		||||
            pkey = load_pubkey(bio_err, infile, informat, 1,
 | 
			
		||||
                               passin, e, "Public Key");
 | 
			
		||||
@@ -276,10 +256,9 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            pkey = load_key(bio_err, infile, informat, 1,
 | 
			
		||||
                            passin, e, "Private Key");
 | 
			
		||||
 | 
			
		||||
        if (pkey) {
 | 
			
		||||
            dsa = EVP_PKEY_get1_DSA(pkey);
 | 
			
		||||
            EVP_PKEY_free(pkey);
 | 
			
		||||
        }
 | 
			
		||||
        if (pkey != NULL)
 | 
			
		||||
            dsa = pkey == NULL ? NULL : EVP_PKEY_get1_DSA(pkey);
 | 
			
		||||
        EVP_PKEY_free(pkey);
 | 
			
		||||
    }
 | 
			
		||||
    if (dsa == NULL) {
 | 
			
		||||
        BIO_printf(bio_err, "unable to load Key\n");
 | 
			
		||||
@@ -329,24 +308,11 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        else
 | 
			
		||||
            i = PEM_write_bio_DSAPrivateKey(out, dsa, enc,
 | 
			
		||||
                                            NULL, 0, NULL, passout);
 | 
			
		||||
# if !defined(OPENSSL_NO_RSA) && !defined(OPENSSL_NO_RC4)
 | 
			
		||||
    } else if (outformat == FORMAT_MSBLOB || outformat == FORMAT_PVK) {
 | 
			
		||||
        EVP_PKEY *pk;
 | 
			
		||||
        pk = EVP_PKEY_new();
 | 
			
		||||
        EVP_PKEY_set1_DSA(pk, dsa);
 | 
			
		||||
        if (outformat == FORMAT_PVK)
 | 
			
		||||
            i = i2b_PVK_bio(out, pk, pvk_encr, 0, passout);
 | 
			
		||||
        else if (pubin || pubout)
 | 
			
		||||
            i = i2b_PublicKey_bio(out, pk);
 | 
			
		||||
        else
 | 
			
		||||
            i = i2b_PrivateKey_bio(out, pk);
 | 
			
		||||
        EVP_PKEY_free(pk);
 | 
			
		||||
# endif
 | 
			
		||||
    } else {
 | 
			
		||||
        BIO_printf(bio_err, "bad output format specified for outfile\n");
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
    if (i <= 0) {
 | 
			
		||||
    if (!i) {
 | 
			
		||||
        BIO_printf(bio_err, "unable to write private key\n");
 | 
			
		||||
        ERR_print_errors(bio_err);
 | 
			
		||||
    } else
 | 
			
		||||
@@ -365,10 +331,4 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    apps_shutdown();
 | 
			
		||||
    OPENSSL_EXIT(ret);
 | 
			
		||||
}
 | 
			
		||||
#else                           /* !OPENSSL_NO_DSA */
 | 
			
		||||
 | 
			
		||||
# if PEDANTIC
 | 
			
		||||
static void *dummy = &dummy;
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
#endif
 | 
			
		||||
 
 | 
			
		||||
@@ -310,7 +310,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                goto end;
 | 
			
		||||
            }
 | 
			
		||||
# endif
 | 
			
		||||
            ERR_print_errors(bio_err);
 | 
			
		||||
            BIO_printf(bio_err, "Error, DSA key generation failed\n");
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
@@ -406,11 +405,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        assert(need_rand);
 | 
			
		||||
        if ((dsakey = DSAparams_dup(dsa)) == NULL)
 | 
			
		||||
            goto end;
 | 
			
		||||
        if (!DSA_generate_key(dsakey)) {
 | 
			
		||||
            ERR_print_errors(bio_err);
 | 
			
		||||
            DSA_free(dsakey);
 | 
			
		||||
        if (!DSA_generate_key(dsakey))
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
        if (outformat == FORMAT_ASN1)
 | 
			
		||||
            i = i2d_DSAPrivateKey_bio(out, dsakey);
 | 
			
		||||
        else if (outformat == FORMAT_PEM)
 | 
			
		||||
@@ -418,7 +414,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                                            NULL);
 | 
			
		||||
        else {
 | 
			
		||||
            BIO_printf(bio_err, "bad output format specified for outfile\n");
 | 
			
		||||
            DSA_free(dsakey);
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
        DSA_free(dsakey);
 | 
			
		||||
 
 | 
			
		||||
@@ -356,10 +356,4 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    apps_shutdown();
 | 
			
		||||
    OPENSSL_EXIT(ret);
 | 
			
		||||
}
 | 
			
		||||
#else                           /* !OPENSSL_NO_EC */
 | 
			
		||||
 | 
			
		||||
# if PEDANTIC
 | 
			
		||||
static void *dummy = &dummy;
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
#endif
 | 
			
		||||
 
 | 
			
		||||
@@ -106,7 +106,7 @@
 | 
			
		||||
 *                    in the asn1 der encoding
 | 
			
		||||
 *                    possible values: named_curve (default)
 | 
			
		||||
 *                                     explicit
 | 
			
		||||
 * -no_seed         - if 'explicit' parameters are chosen do not use the seed
 | 
			
		||||
 * -no_seed         - if 'explicit' parameters are choosen do not use the seed
 | 
			
		||||
 * -genkey          - generate ec key
 | 
			
		||||
 * -rand file       - files to use for random number input
 | 
			
		||||
 * -engine e        - use engine e, possibly a hardware device
 | 
			
		||||
@@ -270,7 +270,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        BIO_printf(bio_err, "                                   "
 | 
			
		||||
                   " explicit\n");
 | 
			
		||||
        BIO_printf(bio_err, " -no_seed          if 'explicit'"
 | 
			
		||||
                   " parameters are chosen do not" " use the seed\n");
 | 
			
		||||
                   " parameters are choosen do not" " use the seed\n");
 | 
			
		||||
        BIO_printf(bio_err, " -genkey           generate ec" " key\n");
 | 
			
		||||
        BIO_printf(bio_err, " -rand file        files to use for"
 | 
			
		||||
                   " random number input\n");
 | 
			
		||||
@@ -370,9 +370,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        } else
 | 
			
		||||
            nid = OBJ_sn2nid(curve_name);
 | 
			
		||||
 | 
			
		||||
        if (nid == 0)
 | 
			
		||||
            nid = EC_curve_nist2nid(curve_name);
 | 
			
		||||
 | 
			
		||||
        if (nid == 0) {
 | 
			
		||||
            BIO_printf(bio_err, "unknown curve name (%s)\n", curve_name);
 | 
			
		||||
            goto end;
 | 
			
		||||
@@ -416,13 +413,14 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (check) {
 | 
			
		||||
        if (group == NULL)
 | 
			
		||||
            BIO_printf(bio_err, "no elliptic curve parameters\n");
 | 
			
		||||
        BIO_printf(bio_err, "checking elliptic curve parameters: ");
 | 
			
		||||
        if (!EC_GROUP_check(group, NULL)) {
 | 
			
		||||
            BIO_printf(bio_err, "failed\n");
 | 
			
		||||
            ERR_print_errors(bio_err);
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
        BIO_printf(bio_err, "ok\n");
 | 
			
		||||
        } else
 | 
			
		||||
            BIO_printf(bio_err, "ok\n");
 | 
			
		||||
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
@@ -652,10 +650,4 @@ static int ecparam_print_var(BIO *out, BIGNUM *in, const char *var,
 | 
			
		||||
    BIO_printf(out, "\n\t};\n\n");
 | 
			
		||||
    return 1;
 | 
			
		||||
}
 | 
			
		||||
#else                           /* !OPENSSL_NO_EC */
 | 
			
		||||
 | 
			
		||||
# if PEDANTIC
 | 
			
		||||
static void *dummy = &dummy;
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
#endif
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										77
									
								
								apps/enc.c
									
									
									
									
									
								
							
							
						
						
									
										77
									
								
								apps/enc.c
									
									
									
									
									
								
							@@ -67,9 +67,6 @@
 | 
			
		||||
#include <openssl/x509.h>
 | 
			
		||||
#include <openssl/rand.h>
 | 
			
		||||
#include <openssl/pem.h>
 | 
			
		||||
#ifndef OPENSSL_NO_COMP
 | 
			
		||||
# include <openssl/comp.h>
 | 
			
		||||
#endif
 | 
			
		||||
#include <ctype.h>
 | 
			
		||||
 | 
			
		||||
int set_hex(char *in, unsigned char *out, int size);
 | 
			
		||||
@@ -114,10 +111,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    char *hkey = NULL, *hiv = NULL, *hsalt = NULL;
 | 
			
		||||
    char *md = NULL;
 | 
			
		||||
    int enc = 1, printkey = 0, i, base64 = 0;
 | 
			
		||||
#ifdef ZLIB
 | 
			
		||||
    int do_zlib = 0;
 | 
			
		||||
    BIO *bzl = NULL;
 | 
			
		||||
#endif
 | 
			
		||||
    int debug = 0, olb64 = 0, nosalt = 0;
 | 
			
		||||
    const EVP_CIPHER *cipher = NULL, *c;
 | 
			
		||||
    EVP_CIPHER_CTX *ctx = NULL;
 | 
			
		||||
@@ -145,19 +138,9 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    program_name(argv[0], pname, sizeof pname);
 | 
			
		||||
    if (strcmp(pname, "base64") == 0)
 | 
			
		||||
        base64 = 1;
 | 
			
		||||
#ifdef ZLIB
 | 
			
		||||
    if (strcmp(pname, "zlib") == 0)
 | 
			
		||||
        do_zlib = 1;
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
    cipher = EVP_get_cipherbyname(pname);
 | 
			
		||||
#ifdef ZLIB
 | 
			
		||||
    if (!do_zlib && !base64 && (cipher == NULL)
 | 
			
		||||
        && (strcmp(pname, "enc") != 0))
 | 
			
		||||
#else
 | 
			
		||||
    if (!base64 && (cipher == NULL) && (strcmp(pname, "enc") != 0))
 | 
			
		||||
#endif
 | 
			
		||||
    {
 | 
			
		||||
    if (!base64 && (cipher == NULL) && (strcmp(pname, "enc") != 0)) {
 | 
			
		||||
        BIO_printf(bio_err, "%s is an unknown cipher\n", pname);
 | 
			
		||||
        goto bad;
 | 
			
		||||
    }
 | 
			
		||||
@@ -209,10 +192,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            base64 = 1;
 | 
			
		||||
        else if (strcmp(*argv, "-base64") == 0)
 | 
			
		||||
            base64 = 1;
 | 
			
		||||
#ifdef ZLIB
 | 
			
		||||
        else if (strcmp(*argv, "-z") == 0)
 | 
			
		||||
            do_zlib = 1;
 | 
			
		||||
#endif
 | 
			
		||||
        else if (strcmp(*argv, "-bufsize") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
@@ -296,15 +275,11 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            BIO_printf(bio_err,
 | 
			
		||||
                       "%-14s   from a passphrase.  One of md2, md5, sha or sha1\n",
 | 
			
		||||
                       "");
 | 
			
		||||
            BIO_printf(bio_err, "%-14s salt in hex is the next argument\n",
 | 
			
		||||
                       "-S");
 | 
			
		||||
            BIO_printf(bio_err, "%-14s key/iv in hex is the next argument\n",
 | 
			
		||||
                       "-K/-iv");
 | 
			
		||||
            BIO_printf(bio_err, "%-14s print the iv/key (then exit if -P)\n",
 | 
			
		||||
                       "-[pP]");
 | 
			
		||||
            BIO_printf(bio_err, "%-14s buffer size\n", "-bufsize <n>");
 | 
			
		||||
            BIO_printf(bio_err, "%-14s disable standard block padding\n",
 | 
			
		||||
                       "-nopad");
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
            BIO_printf(bio_err,
 | 
			
		||||
                       "%-14s use engine e, possibly a hardware device.\n",
 | 
			
		||||
@@ -326,25 +301,16 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    setup_engine(bio_err, engine, 0);
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
    if (cipher && EVP_CIPHER_flags(cipher) & EVP_CIPH_FLAG_AEAD_CIPHER) {
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "AEAD ciphers not supported by the enc utility\n");
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (cipher && (EVP_CIPHER_mode(cipher) == EVP_CIPH_XTS_MODE)) {
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "Ciphers in XTS mode are not supported by the enc utility\n");
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (md && (dgst = EVP_get_digestbyname(md)) == NULL) {
 | 
			
		||||
        BIO_printf(bio_err, "%s is an unsupported message digest type\n", md);
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (dgst == NULL) {
 | 
			
		||||
        dgst = EVP_md5();
 | 
			
		||||
        if (in_FIPS_mode)
 | 
			
		||||
            dgst = EVP_sha1();
 | 
			
		||||
        else
 | 
			
		||||
            dgst = EVP_md5();
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (bufsize != NULL) {
 | 
			
		||||
@@ -396,10 +362,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (inf == NULL) {
 | 
			
		||||
#ifndef OPENSSL_NO_SETVBUF_IONBF
 | 
			
		||||
        if (bufsize != NULL)
 | 
			
		||||
            setvbuf(stdin, (char *)NULL, _IONBF, 0);
 | 
			
		||||
#endif                          /* ndef OPENSSL_NO_SETVBUF_IONBF */
 | 
			
		||||
        BIO_set_fp(in, stdin, BIO_NOCLOSE);
 | 
			
		||||
    } else {
 | 
			
		||||
        if (BIO_read_filename(in, inf) <= 0) {
 | 
			
		||||
@@ -442,10 +406,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
 | 
			
		||||
    if (outf == NULL) {
 | 
			
		||||
        BIO_set_fp(out, stdout, BIO_NOCLOSE);
 | 
			
		||||
#ifndef OPENSSL_NO_SETVBUF_IONBF
 | 
			
		||||
        if (bufsize != NULL)
 | 
			
		||||
            setvbuf(stdout, (char *)NULL, _IONBF, 0);
 | 
			
		||||
#endif                          /* ndef OPENSSL_NO_SETVBUF_IONBF */
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
        {
 | 
			
		||||
            BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
			
		||||
@@ -462,18 +424,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    rbio = in;
 | 
			
		||||
    wbio = out;
 | 
			
		||||
 | 
			
		||||
#ifdef ZLIB
 | 
			
		||||
 | 
			
		||||
    if (do_zlib) {
 | 
			
		||||
        if ((bzl = BIO_new(BIO_f_zlib())) == NULL)
 | 
			
		||||
            goto end;
 | 
			
		||||
        if (enc)
 | 
			
		||||
            wbio = BIO_push(bzl, wbio);
 | 
			
		||||
        else
 | 
			
		||||
            rbio = BIO_push(bzl, rbio);
 | 
			
		||||
    }
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
    if (base64) {
 | 
			
		||||
        if ((b64 = BIO_new(BIO_f_base64())) == NULL)
 | 
			
		||||
            goto end;
 | 
			
		||||
@@ -548,14 +498,9 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            else
 | 
			
		||||
                OPENSSL_cleanse(str, strlen(str));
 | 
			
		||||
        }
 | 
			
		||||
        if (hiv != NULL) {
 | 
			
		||||
            int siz = EVP_CIPHER_iv_length(cipher);
 | 
			
		||||
            if (siz == 0) {
 | 
			
		||||
                BIO_printf(bio_err, "warning: iv not use by this cipher\n");
 | 
			
		||||
            } else if (!set_hex(hiv, iv, sizeof iv)) {
 | 
			
		||||
                BIO_printf(bio_err, "invalid hex iv value\n");
 | 
			
		||||
                goto end;
 | 
			
		||||
            }
 | 
			
		||||
        if ((hiv != NULL) && !set_hex(hiv, iv, sizeof iv)) {
 | 
			
		||||
            BIO_printf(bio_err, "invalid hex iv value\n");
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
        if ((hiv == NULL) && (str == NULL)
 | 
			
		||||
            && EVP_CIPHER_iv_length(cipher) != 0) {
 | 
			
		||||
@@ -567,7 +512,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            BIO_printf(bio_err, "iv undefined\n");
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
        if ((hkey != NULL) && !set_hex(hkey, key, EVP_CIPHER_key_length(cipher))) {
 | 
			
		||||
        if ((hkey != NULL) && !set_hex(hkey, key, sizeof key)) {
 | 
			
		||||
            BIO_printf(bio_err, "invalid hex key value\n");
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
@@ -670,10 +615,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        BIO_free(benc);
 | 
			
		||||
    if (b64 != NULL)
 | 
			
		||||
        BIO_free(b64);
 | 
			
		||||
#ifdef ZLIB
 | 
			
		||||
    if (bzl != NULL)
 | 
			
		||||
        BIO_free(bzl);
 | 
			
		||||
#endif
 | 
			
		||||
    if (pass)
 | 
			
		||||
        OPENSSL_free(pass);
 | 
			
		||||
    apps_shutdown();
 | 
			
		||||
 
 | 
			
		||||
@@ -1,4 +1,4 @@
 | 
			
		||||
/* apps/engine.c */
 | 
			
		||||
/* apps/engine.c -*- mode: C; c-file-style: "eay" -*- */
 | 
			
		||||
/*
 | 
			
		||||
 * Written by Richard Levitte <richard@levitte.org> for the OpenSSL project
 | 
			
		||||
 * 2000.
 | 
			
		||||
@@ -92,13 +92,15 @@ static const char *engine_usage[] = {
 | 
			
		||||
    NULL
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
static void identity(char *ptr)
 | 
			
		||||
static void identity(void *ptr)
 | 
			
		||||
{
 | 
			
		||||
    return;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static int append_buf(char **buf, const char *s, int *size, int step)
 | 
			
		||||
{
 | 
			
		||||
    int l = strlen(s);
 | 
			
		||||
 | 
			
		||||
    if (*buf == NULL) {
 | 
			
		||||
        *size = step;
 | 
			
		||||
        *buf = OPENSSL_malloc(*size);
 | 
			
		||||
@@ -107,6 +109,9 @@ static int append_buf(char **buf, const char *s, int *size, int step)
 | 
			
		||||
        **buf = '\0';
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (**buf != '\0')
 | 
			
		||||
        l += 2;                 /* ", " */
 | 
			
		||||
 | 
			
		||||
    if (strlen(*buf) + strlen(s) >= (unsigned int)*size) {
 | 
			
		||||
        *size += step;
 | 
			
		||||
        *buf = OPENSSL_realloc(*buf, *size);
 | 
			
		||||
@@ -140,6 +145,10 @@ static int util_flags(BIO *bio_out, unsigned int flags, const char *indent)
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (flags & ENGINE_CMD_FLAG_NUMERIC) {
 | 
			
		||||
        if (started) {
 | 
			
		||||
            BIO_printf(bio_out, "|");
 | 
			
		||||
            err = 1;
 | 
			
		||||
        }
 | 
			
		||||
        BIO_printf(bio_out, "NUMERIC");
 | 
			
		||||
        started = 1;
 | 
			
		||||
    }
 | 
			
		||||
@@ -190,7 +199,7 @@ static int util_verbose(ENGINE *e, int verbose, BIO *bio_out,
 | 
			
		||||
    char *desc = NULL;
 | 
			
		||||
    int flags;
 | 
			
		||||
    int xpos = 0;
 | 
			
		||||
    STACK_OF(OPENSSL_STRING) *cmds = NULL;
 | 
			
		||||
    STACK *cmds = NULL;
 | 
			
		||||
    if (!ENGINE_ctrl(e, ENGINE_CTRL_HAS_CTRL_FUNCTION, 0, NULL, NULL) ||
 | 
			
		||||
        ((num = ENGINE_ctrl(e, ENGINE_CTRL_GET_FIRST_CMD_TYPE,
 | 
			
		||||
                            0, NULL, NULL)) <= 0)) {
 | 
			
		||||
@@ -200,7 +209,7 @@ static int util_verbose(ENGINE *e, int verbose, BIO *bio_out,
 | 
			
		||||
        return 1;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    cmds = sk_OPENSSL_STRING_new_null();
 | 
			
		||||
    cmds = sk_new_null();
 | 
			
		||||
 | 
			
		||||
    if (!cmds)
 | 
			
		||||
        goto err;
 | 
			
		||||
@@ -272,7 +281,7 @@ static int util_verbose(ENGINE *e, int verbose, BIO *bio_out,
 | 
			
		||||
    ret = 1;
 | 
			
		||||
 err:
 | 
			
		||||
    if (cmds)
 | 
			
		||||
        sk_OPENSSL_STRING_pop_free(cmds, identity);
 | 
			
		||||
        sk_pop_free(cmds, identity);
 | 
			
		||||
    if (name)
 | 
			
		||||
        OPENSSL_free(name);
 | 
			
		||||
    if (desc)
 | 
			
		||||
@@ -280,11 +289,10 @@ static int util_verbose(ENGINE *e, int verbose, BIO *bio_out,
 | 
			
		||||
    return ret;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static void util_do_cmds(ENGINE *e, STACK_OF(OPENSSL_STRING) *cmds,
 | 
			
		||||
                         BIO *bio_out, const char *indent)
 | 
			
		||||
static void util_do_cmds(ENGINE *e, STACK * cmds, BIO *bio_out,
 | 
			
		||||
                         const char *indent)
 | 
			
		||||
{
 | 
			
		||||
    int loop, res, num = sk_OPENSSL_STRING_num(cmds);
 | 
			
		||||
 | 
			
		||||
    int loop, res, num = sk_num(cmds);
 | 
			
		||||
    if (num < 0) {
 | 
			
		||||
        BIO_printf(bio_out, "[Error]: internal stack error\n");
 | 
			
		||||
        return;
 | 
			
		||||
@@ -292,7 +300,7 @@ static void util_do_cmds(ENGINE *e, STACK_OF(OPENSSL_STRING) *cmds,
 | 
			
		||||
    for (loop = 0; loop < num; loop++) {
 | 
			
		||||
        char buf[256];
 | 
			
		||||
        const char *cmd, *arg;
 | 
			
		||||
        cmd = sk_OPENSSL_STRING_value(cmds, loop);
 | 
			
		||||
        cmd = sk_value(cmds, loop);
 | 
			
		||||
        res = 1;                /* assume success */
 | 
			
		||||
        /* Check if this command has no ":arg" */
 | 
			
		||||
        if ((arg = strstr(cmd, ":")) == NULL) {
 | 
			
		||||
@@ -327,9 +335,9 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    const char **pp;
 | 
			
		||||
    int verbose = 0, list_cap = 0, test_avail = 0, test_avail_noise = 0;
 | 
			
		||||
    ENGINE *e;
 | 
			
		||||
    STACK_OF(OPENSSL_STRING) *engines = sk_OPENSSL_STRING_new_null();
 | 
			
		||||
    STACK_OF(OPENSSL_STRING) *pre_cmds = sk_OPENSSL_STRING_new_null();
 | 
			
		||||
    STACK_OF(OPENSSL_STRING) *post_cmds = sk_OPENSSL_STRING_new_null();
 | 
			
		||||
    STACK *engines = sk_new_null();
 | 
			
		||||
    STACK *pre_cmds = sk_new_null();
 | 
			
		||||
    STACK *post_cmds = sk_new_null();
 | 
			
		||||
    int badops = 1;
 | 
			
		||||
    BIO *bio_out = NULL;
 | 
			
		||||
    const char *indent = "     ";
 | 
			
		||||
@@ -371,18 +379,18 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            argv++;
 | 
			
		||||
            if (argc == 0)
 | 
			
		||||
                goto skip_arg_loop;
 | 
			
		||||
            sk_OPENSSL_STRING_push(pre_cmds, *argv);
 | 
			
		||||
            sk_push(pre_cmds, *argv);
 | 
			
		||||
        } else if (strcmp(*argv, "-post") == 0) {
 | 
			
		||||
            argc--;
 | 
			
		||||
            argv++;
 | 
			
		||||
            if (argc == 0)
 | 
			
		||||
                goto skip_arg_loop;
 | 
			
		||||
            sk_OPENSSL_STRING_push(post_cmds, *argv);
 | 
			
		||||
            sk_push(post_cmds, *argv);
 | 
			
		||||
        } else if ((strncmp(*argv, "-h", 2) == 0) ||
 | 
			
		||||
                   (strcmp(*argv, "-?") == 0))
 | 
			
		||||
            goto skip_arg_loop;
 | 
			
		||||
        else
 | 
			
		||||
            sk_OPENSSL_STRING_push(engines, *argv);
 | 
			
		||||
            sk_push(engines, *argv);
 | 
			
		||||
        argc--;
 | 
			
		||||
        argv++;
 | 
			
		||||
    }
 | 
			
		||||
@@ -396,14 +404,14 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (sk_OPENSSL_STRING_num(engines) == 0) {
 | 
			
		||||
    if (sk_num(engines) == 0) {
 | 
			
		||||
        for (e = ENGINE_get_first(); e != NULL; e = ENGINE_get_next(e)) {
 | 
			
		||||
            sk_OPENSSL_STRING_push(engines, (char *)ENGINE_get_id(e));
 | 
			
		||||
            sk_push(engines, (char *)ENGINE_get_id(e));
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    for (i = 0; i < sk_OPENSSL_STRING_num(engines); i++) {
 | 
			
		||||
        const char *id = sk_OPENSSL_STRING_value(engines, i);
 | 
			
		||||
    for (i = 0; i < sk_num(engines); i++) {
 | 
			
		||||
        const char *id = sk_value(engines, i);
 | 
			
		||||
        if ((e = ENGINE_by_id(id)) != NULL) {
 | 
			
		||||
            const char *name = ENGINE_get_name(e);
 | 
			
		||||
            /*
 | 
			
		||||
@@ -422,7 +430,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                const int *nids;
 | 
			
		||||
                ENGINE_CIPHERS_PTR fn_c;
 | 
			
		||||
                ENGINE_DIGESTS_PTR fn_d;
 | 
			
		||||
                ENGINE_PKEY_METHS_PTR fn_pk;
 | 
			
		||||
 | 
			
		||||
                if (ENGINE_get_RSA(e) != NULL
 | 
			
		||||
                    && !append_buf(&cap_buf, "RSA", &cap_size, 256))
 | 
			
		||||
@@ -457,15 +464,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                        goto end;
 | 
			
		||||
 | 
			
		||||
 skip_digests:
 | 
			
		||||
                fn_pk = ENGINE_get_pkey_meths(e);
 | 
			
		||||
                if (!fn_pk)
 | 
			
		||||
                    goto skip_pmeths;
 | 
			
		||||
                n = fn_pk(e, NULL, &nids, 0);
 | 
			
		||||
                for (k = 0; k < n; ++k)
 | 
			
		||||
                    if (!append_buf(&cap_buf,
 | 
			
		||||
                                    OBJ_nid2sn(nids[k]), &cap_size, 256))
 | 
			
		||||
                        goto end;
 | 
			
		||||
 skip_pmeths:
 | 
			
		||||
                if (cap_buf && (*cap_buf != '\0'))
 | 
			
		||||
                    BIO_printf(bio_out, " [%s]\n", cap_buf);
 | 
			
		||||
 | 
			
		||||
@@ -495,9 +493,9 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
 end:
 | 
			
		||||
 | 
			
		||||
    ERR_print_errors(bio_err);
 | 
			
		||||
    sk_OPENSSL_STRING_pop_free(engines, identity);
 | 
			
		||||
    sk_OPENSSL_STRING_pop_free(pre_cmds, identity);
 | 
			
		||||
    sk_OPENSSL_STRING_pop_free(post_cmds, identity);
 | 
			
		||||
    sk_pop_free(engines, identity);
 | 
			
		||||
    sk_pop_free(pre_cmds, identity);
 | 
			
		||||
    sk_pop_free(post_cmds, identity);
 | 
			
		||||
    if (bio_out != NULL)
 | 
			
		||||
        BIO_free_all(bio_out);
 | 
			
		||||
    apps_shutdown();
 | 
			
		||||
 
 | 
			
		||||
@@ -95,10 +95,10 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                out = BIO_push(tmpbio, out);
 | 
			
		||||
            }
 | 
			
		||||
#endif
 | 
			
		||||
            lh_ERR_STRING_DATA_node_stats_bio(ERR_get_string_table(), out);
 | 
			
		||||
            lh_ERR_STRING_DATA_stats_bio(ERR_get_string_table(), out);
 | 
			
		||||
            lh_ERR_STRING_DATA_node_usage_stats_bio(ERR_get_string_table(),
 | 
			
		||||
                                                    out);
 | 
			
		||||
            lh_node_stats_bio((LHASH *)ERR_get_string_table(), out);
 | 
			
		||||
            lh_stats_bio((LHASH *)ERR_get_string_table(), out);
 | 
			
		||||
            lh_node_usage_stats_bio((LHASH *)
 | 
			
		||||
                                    ERR_get_string_table(), out);
 | 
			
		||||
        }
 | 
			
		||||
        if (out != NULL)
 | 
			
		||||
            BIO_free_all(out);
 | 
			
		||||
 
 | 
			
		||||
@@ -80,7 +80,7 @@
 | 
			
		||||
# include <openssl/x509.h>
 | 
			
		||||
# include <openssl/pem.h>
 | 
			
		||||
 | 
			
		||||
# define DEFBITS 2048
 | 
			
		||||
# define DEFBITS 512
 | 
			
		||||
# undef PROG
 | 
			
		||||
# define PROG gendh_main
 | 
			
		||||
 | 
			
		||||
@@ -239,10 +239,4 @@ static int MS_CALLBACK dh_cb(int p, int n, BN_GENCB *cb)
 | 
			
		||||
# endif
 | 
			
		||||
    return 1;
 | 
			
		||||
}
 | 
			
		||||
#else                           /* !OPENSSL_NO_DH */
 | 
			
		||||
 | 
			
		||||
# if PEDANTIC
 | 
			
		||||
static void *dummy = &dummy;
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
#endif
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										405
									
								
								apps/genpkey.c
									
									
									
									
									
								
							
							
						
						
									
										405
									
								
								apps/genpkey.c
									
									
									
									
									
								
							@@ -1,405 +0,0 @@
 | 
			
		||||
/* apps/genpkey.c */
 | 
			
		||||
/*
 | 
			
		||||
 * Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL project
 | 
			
		||||
 * 2006
 | 
			
		||||
 */
 | 
			
		||||
/* ====================================================================
 | 
			
		||||
 * Copyright (c) 2006 The OpenSSL Project.  All rights reserved.
 | 
			
		||||
 *
 | 
			
		||||
 * Redistribution and use in source and binary forms, with or without
 | 
			
		||||
 * modification, are permitted provided that the following conditions
 | 
			
		||||
 * are met:
 | 
			
		||||
 *
 | 
			
		||||
 * 1. Redistributions of source code must retain the above copyright
 | 
			
		||||
 *    notice, this list of conditions and the following disclaimer.
 | 
			
		||||
 *
 | 
			
		||||
 * 2. Redistributions in binary form must reproduce the above copyright
 | 
			
		||||
 *    notice, this list of conditions and the following disclaimer in
 | 
			
		||||
 *    the documentation and/or other materials provided with the
 | 
			
		||||
 *    distribution.
 | 
			
		||||
 *
 | 
			
		||||
 * 3. All advertising materials mentioning features or use of this
 | 
			
		||||
 *    software must display the following acknowledgment:
 | 
			
		||||
 *    "This product includes software developed by the OpenSSL Project
 | 
			
		||||
 *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
 | 
			
		||||
 *
 | 
			
		||||
 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
 | 
			
		||||
 *    endorse or promote products derived from this software without
 | 
			
		||||
 *    prior written permission. For written permission, please contact
 | 
			
		||||
 *    licensing@OpenSSL.org.
 | 
			
		||||
 *
 | 
			
		||||
 * 5. Products derived from this software may not be called "OpenSSL"
 | 
			
		||||
 *    nor may "OpenSSL" appear in their names without prior written
 | 
			
		||||
 *    permission of the OpenSSL Project.
 | 
			
		||||
 *
 | 
			
		||||
 * 6. Redistributions of any form whatsoever must retain the following
 | 
			
		||||
 *    acknowledgment:
 | 
			
		||||
 *    "This product includes software developed by the OpenSSL Project
 | 
			
		||||
 *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
 | 
			
		||||
 *
 | 
			
		||||
 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
 | 
			
		||||
 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 | 
			
		||||
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
 | 
			
		||||
 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
 | 
			
		||||
 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 | 
			
		||||
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 | 
			
		||||
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
 | 
			
		||||
 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 | 
			
		||||
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
 | 
			
		||||
 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 | 
			
		||||
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
 | 
			
		||||
 * OF THE POSSIBILITY OF SUCH DAMAGE.
 | 
			
		||||
 * ====================================================================
 | 
			
		||||
 *
 | 
			
		||||
 * This product includes cryptographic software written by Eric Young
 | 
			
		||||
 * (eay@cryptsoft.com).  This product includes software written by Tim
 | 
			
		||||
 * Hudson (tjh@cryptsoft.com).
 | 
			
		||||
 *
 | 
			
		||||
 */
 | 
			
		||||
#include <stdio.h>
 | 
			
		||||
#include <string.h>
 | 
			
		||||
#include "apps.h"
 | 
			
		||||
#include <openssl/pem.h>
 | 
			
		||||
#include <openssl/err.h>
 | 
			
		||||
#include <openssl/evp.h>
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
# include <openssl/engine.h>
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
static int init_keygen_file(BIO *err, EVP_PKEY_CTX **pctx,
 | 
			
		||||
                            const char *file, ENGINE *e);
 | 
			
		||||
static int genpkey_cb(EVP_PKEY_CTX *ctx);
 | 
			
		||||
 | 
			
		||||
#define PROG genpkey_main
 | 
			
		||||
 | 
			
		||||
int MAIN(int, char **);
 | 
			
		||||
 | 
			
		||||
int MAIN(int argc, char **argv)
 | 
			
		||||
{
 | 
			
		||||
    ENGINE *e = NULL;
 | 
			
		||||
    char **args, *outfile = NULL;
 | 
			
		||||
    char *passarg = NULL;
 | 
			
		||||
    BIO *in = NULL, *out = NULL;
 | 
			
		||||
    const EVP_CIPHER *cipher = NULL;
 | 
			
		||||
    int outformat;
 | 
			
		||||
    int text = 0;
 | 
			
		||||
    EVP_PKEY *pkey = NULL;
 | 
			
		||||
    EVP_PKEY_CTX *ctx = NULL;
 | 
			
		||||
    char *pass = NULL;
 | 
			
		||||
    int badarg = 0;
 | 
			
		||||
    int ret = 1, rv;
 | 
			
		||||
 | 
			
		||||
    int do_param = 0;
 | 
			
		||||
 | 
			
		||||
    if (bio_err == NULL)
 | 
			
		||||
        bio_err = BIO_new_fp(stderr, BIO_NOCLOSE);
 | 
			
		||||
 | 
			
		||||
    if (!load_config(bio_err, NULL))
 | 
			
		||||
        goto end;
 | 
			
		||||
 | 
			
		||||
    outformat = FORMAT_PEM;
 | 
			
		||||
 | 
			
		||||
    ERR_load_crypto_strings();
 | 
			
		||||
    OpenSSL_add_all_algorithms();
 | 
			
		||||
    args = argv + 1;
 | 
			
		||||
    while (!badarg && *args && *args[0] == '-') {
 | 
			
		||||
        if (!strcmp(*args, "-outform")) {
 | 
			
		||||
            if (args[1]) {
 | 
			
		||||
                args++;
 | 
			
		||||
                outformat = str2fmt(*args);
 | 
			
		||||
            } else
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
        } else if (!strcmp(*args, "-pass")) {
 | 
			
		||||
            if (!args[1])
 | 
			
		||||
                goto bad;
 | 
			
		||||
            passarg = *(++args);
 | 
			
		||||
        }
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
        else if (strcmp(*args, "-engine") == 0) {
 | 
			
		||||
            if (!args[1])
 | 
			
		||||
                goto bad;
 | 
			
		||||
            e = setup_engine(bio_err, *(++args), 0);
 | 
			
		||||
        }
 | 
			
		||||
#endif
 | 
			
		||||
        else if (!strcmp(*args, "-paramfile")) {
 | 
			
		||||
            if (!args[1])
 | 
			
		||||
                goto bad;
 | 
			
		||||
            args++;
 | 
			
		||||
            if (do_param == 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            if (!init_keygen_file(bio_err, &ctx, *args, e))
 | 
			
		||||
                goto end;
 | 
			
		||||
        } else if (!strcmp(*args, "-out")) {
 | 
			
		||||
            if (args[1]) {
 | 
			
		||||
                args++;
 | 
			
		||||
                outfile = *args;
 | 
			
		||||
            } else
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
        } else if (strcmp(*args, "-algorithm") == 0) {
 | 
			
		||||
            if (!args[1])
 | 
			
		||||
                goto bad;
 | 
			
		||||
            if (!init_gen_str(bio_err, &ctx, *(++args), e, do_param))
 | 
			
		||||
                goto end;
 | 
			
		||||
        } else if (strcmp(*args, "-pkeyopt") == 0) {
 | 
			
		||||
            if (!args[1])
 | 
			
		||||
                goto bad;
 | 
			
		||||
            if (!ctx) {
 | 
			
		||||
                BIO_puts(bio_err, "No keytype specified\n");
 | 
			
		||||
                goto bad;
 | 
			
		||||
            } else if (pkey_ctrl_string(ctx, *(++args)) <= 0) {
 | 
			
		||||
                BIO_puts(bio_err, "parameter setting error\n");
 | 
			
		||||
                ERR_print_errors(bio_err);
 | 
			
		||||
                goto end;
 | 
			
		||||
            }
 | 
			
		||||
        } else if (strcmp(*args, "-genparam") == 0) {
 | 
			
		||||
            if (ctx)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            do_param = 1;
 | 
			
		||||
        } else if (strcmp(*args, "-text") == 0)
 | 
			
		||||
            text = 1;
 | 
			
		||||
        else {
 | 
			
		||||
            cipher = EVP_get_cipherbyname(*args + 1);
 | 
			
		||||
            if (!cipher) {
 | 
			
		||||
                BIO_printf(bio_err, "Unknown cipher %s\n", *args + 1);
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
            }
 | 
			
		||||
            if (do_param == 1)
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
        }
 | 
			
		||||
        args++;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (!ctx)
 | 
			
		||||
        badarg = 1;
 | 
			
		||||
 | 
			
		||||
    if (badarg) {
 | 
			
		||||
 bad:
 | 
			
		||||
        BIO_printf(bio_err, "Usage: genpkey [options]\n");
 | 
			
		||||
        BIO_printf(bio_err, "where options may be\n");
 | 
			
		||||
        BIO_printf(bio_err, "-out file          output file\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-outform X         output format (DER or PEM)\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-pass arg          output file pass phrase source\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-<cipher>          use cipher <cipher> to encrypt the key\n");
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-engine e          use engine e, possibly a hardware device.\n");
 | 
			
		||||
#endif
 | 
			
		||||
        BIO_printf(bio_err, "-paramfile file    parameters file\n");
 | 
			
		||||
        BIO_printf(bio_err, "-algorithm alg     the public key algorithm\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-pkeyopt opt:value set the public key algorithm option <opt>\n"
 | 
			
		||||
                   "                   to value <value>\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-genparam          generate parameters, not key\n");
 | 
			
		||||
        BIO_printf(bio_err, "-text              print the in text\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "NB: options order may be important!  See the manual page.\n");
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (!app_passwd(bio_err, passarg, NULL, &pass, NULL)) {
 | 
			
		||||
        BIO_puts(bio_err, "Error getting password\n");
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (outfile) {
 | 
			
		||||
        if (!(out = BIO_new_file(outfile, "wb"))) {
 | 
			
		||||
            BIO_printf(bio_err, "Can't open output file %s\n", outfile);
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
    } else {
 | 
			
		||||
        out = BIO_new_fp(stdout, BIO_NOCLOSE);
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
        {
 | 
			
		||||
            BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
			
		||||
            out = BIO_push(tmpbio, out);
 | 
			
		||||
        }
 | 
			
		||||
#endif
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    EVP_PKEY_CTX_set_cb(ctx, genpkey_cb);
 | 
			
		||||
    EVP_PKEY_CTX_set_app_data(ctx, bio_err);
 | 
			
		||||
 | 
			
		||||
    if (do_param) {
 | 
			
		||||
        if (EVP_PKEY_paramgen(ctx, &pkey) <= 0) {
 | 
			
		||||
            BIO_puts(bio_err, "Error generating parameters\n");
 | 
			
		||||
            ERR_print_errors(bio_err);
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
    } else {
 | 
			
		||||
        if (EVP_PKEY_keygen(ctx, &pkey) <= 0) {
 | 
			
		||||
            BIO_puts(bio_err, "Error generating key\n");
 | 
			
		||||
            ERR_print_errors(bio_err);
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (do_param)
 | 
			
		||||
        rv = PEM_write_bio_Parameters(out, pkey);
 | 
			
		||||
    else if (outformat == FORMAT_PEM)
 | 
			
		||||
        rv = PEM_write_bio_PrivateKey(out, pkey, cipher, NULL, 0, NULL, pass);
 | 
			
		||||
    else if (outformat == FORMAT_ASN1)
 | 
			
		||||
        rv = i2d_PrivateKey_bio(out, pkey);
 | 
			
		||||
    else {
 | 
			
		||||
        BIO_printf(bio_err, "Bad format specified for key\n");
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (rv <= 0) {
 | 
			
		||||
        BIO_puts(bio_err, "Error writing key\n");
 | 
			
		||||
        ERR_print_errors(bio_err);
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (text) {
 | 
			
		||||
        if (do_param)
 | 
			
		||||
            rv = EVP_PKEY_print_params(out, pkey, 0, NULL);
 | 
			
		||||
        else
 | 
			
		||||
            rv = EVP_PKEY_print_private(out, pkey, 0, NULL);
 | 
			
		||||
 | 
			
		||||
        if (rv <= 0) {
 | 
			
		||||
            BIO_puts(bio_err, "Error printing key\n");
 | 
			
		||||
            ERR_print_errors(bio_err);
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    ret = 0;
 | 
			
		||||
 | 
			
		||||
 end:
 | 
			
		||||
    if (pkey)
 | 
			
		||||
        EVP_PKEY_free(pkey);
 | 
			
		||||
    if (ctx)
 | 
			
		||||
        EVP_PKEY_CTX_free(ctx);
 | 
			
		||||
    if (out)
 | 
			
		||||
        BIO_free_all(out);
 | 
			
		||||
    BIO_free(in);
 | 
			
		||||
    if (pass)
 | 
			
		||||
        OPENSSL_free(pass);
 | 
			
		||||
 | 
			
		||||
    return ret;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static int init_keygen_file(BIO *err, EVP_PKEY_CTX **pctx,
 | 
			
		||||
                            const char *file, ENGINE *e)
 | 
			
		||||
{
 | 
			
		||||
    BIO *pbio;
 | 
			
		||||
    EVP_PKEY *pkey = NULL;
 | 
			
		||||
    EVP_PKEY_CTX *ctx = NULL;
 | 
			
		||||
    if (*pctx) {
 | 
			
		||||
        BIO_puts(err, "Parameters already set!\n");
 | 
			
		||||
        return 0;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    pbio = BIO_new_file(file, "r");
 | 
			
		||||
    if (!pbio) {
 | 
			
		||||
        BIO_printf(err, "Can't open parameter file %s\n", file);
 | 
			
		||||
        return 0;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    pkey = PEM_read_bio_Parameters(pbio, NULL);
 | 
			
		||||
    BIO_free(pbio);
 | 
			
		||||
 | 
			
		||||
    if (!pkey) {
 | 
			
		||||
        BIO_printf(bio_err, "Error reading parameter file %s\n", file);
 | 
			
		||||
        return 0;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    ctx = EVP_PKEY_CTX_new(pkey, e);
 | 
			
		||||
    if (!ctx)
 | 
			
		||||
        goto err;
 | 
			
		||||
    if (EVP_PKEY_keygen_init(ctx) <= 0)
 | 
			
		||||
        goto err;
 | 
			
		||||
    EVP_PKEY_free(pkey);
 | 
			
		||||
    *pctx = ctx;
 | 
			
		||||
    return 1;
 | 
			
		||||
 | 
			
		||||
 err:
 | 
			
		||||
    BIO_puts(err, "Error initializing context\n");
 | 
			
		||||
    ERR_print_errors(err);
 | 
			
		||||
    if (ctx)
 | 
			
		||||
        EVP_PKEY_CTX_free(ctx);
 | 
			
		||||
    if (pkey)
 | 
			
		||||
        EVP_PKEY_free(pkey);
 | 
			
		||||
    return 0;
 | 
			
		||||
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
int init_gen_str(BIO *err, EVP_PKEY_CTX **pctx,
 | 
			
		||||
                 const char *algname, ENGINE *e, int do_param)
 | 
			
		||||
{
 | 
			
		||||
    EVP_PKEY_CTX *ctx = NULL;
 | 
			
		||||
    const EVP_PKEY_ASN1_METHOD *ameth;
 | 
			
		||||
    ENGINE *tmpeng = NULL;
 | 
			
		||||
    int pkey_id;
 | 
			
		||||
 | 
			
		||||
    if (*pctx) {
 | 
			
		||||
        BIO_puts(err, "Algorithm already set!\n");
 | 
			
		||||
        return 0;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    ameth = EVP_PKEY_asn1_find_str(&tmpeng, algname, -1);
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
    if (!ameth && e)
 | 
			
		||||
        ameth = ENGINE_get_pkey_asn1_meth_str(e, algname, -1);
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
    if (!ameth) {
 | 
			
		||||
        BIO_printf(bio_err, "Algorithm %s not found\n", algname);
 | 
			
		||||
        return 0;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    ERR_clear_error();
 | 
			
		||||
 | 
			
		||||
    EVP_PKEY_asn1_get0_info(&pkey_id, NULL, NULL, NULL, NULL, ameth);
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
    if (tmpeng)
 | 
			
		||||
        ENGINE_finish(tmpeng);
 | 
			
		||||
#endif
 | 
			
		||||
    ctx = EVP_PKEY_CTX_new_id(pkey_id, e);
 | 
			
		||||
 | 
			
		||||
    if (!ctx)
 | 
			
		||||
        goto err;
 | 
			
		||||
    if (do_param) {
 | 
			
		||||
        if (EVP_PKEY_paramgen_init(ctx) <= 0)
 | 
			
		||||
            goto err;
 | 
			
		||||
    } else {
 | 
			
		||||
        if (EVP_PKEY_keygen_init(ctx) <= 0)
 | 
			
		||||
            goto err;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    *pctx = ctx;
 | 
			
		||||
    return 1;
 | 
			
		||||
 | 
			
		||||
 err:
 | 
			
		||||
    BIO_printf(err, "Error initializing %s context\n", algname);
 | 
			
		||||
    ERR_print_errors(err);
 | 
			
		||||
    if (ctx)
 | 
			
		||||
        EVP_PKEY_CTX_free(ctx);
 | 
			
		||||
    return 0;
 | 
			
		||||
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static int genpkey_cb(EVP_PKEY_CTX *ctx)
 | 
			
		||||
{
 | 
			
		||||
    char c = '*';
 | 
			
		||||
    BIO *b = EVP_PKEY_CTX_get_app_data(ctx);
 | 
			
		||||
    int p;
 | 
			
		||||
    p = EVP_PKEY_CTX_get_keygen_info(ctx, 0);
 | 
			
		||||
    if (p == 0)
 | 
			
		||||
        c = '.';
 | 
			
		||||
    if (p == 1)
 | 
			
		||||
        c = '+';
 | 
			
		||||
    if (p == 2)
 | 
			
		||||
        c = '*';
 | 
			
		||||
    if (p == 3)
 | 
			
		||||
        c = '\n';
 | 
			
		||||
    BIO_write(b, &c, 1);
 | 
			
		||||
    (void)BIO_flush(b);
 | 
			
		||||
#ifdef LINT
 | 
			
		||||
    p = n;
 | 
			
		||||
#endif
 | 
			
		||||
    return 1;
 | 
			
		||||
}
 | 
			
		||||
@@ -80,7 +80,7 @@
 | 
			
		||||
# include <openssl/pem.h>
 | 
			
		||||
# include <openssl/rand.h>
 | 
			
		||||
 | 
			
		||||
# define DEFBITS 2048
 | 
			
		||||
# define DEFBITS 512
 | 
			
		||||
# undef PROG
 | 
			
		||||
# define PROG genrsa_main
 | 
			
		||||
 | 
			
		||||
@@ -91,12 +91,10 @@ int MAIN(int, char **);
 | 
			
		||||
int MAIN(int argc, char **argv)
 | 
			
		||||
{
 | 
			
		||||
    BN_GENCB cb;
 | 
			
		||||
# ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
    ENGINE *e = NULL;
 | 
			
		||||
# endif
 | 
			
		||||
    int ret = 1;
 | 
			
		||||
    int i, num = DEFBITS;
 | 
			
		||||
    long l;
 | 
			
		||||
    int use_x931 = 0;
 | 
			
		||||
    const EVP_CIPHER *enc = NULL;
 | 
			
		||||
    unsigned long f4 = RSA_F4;
 | 
			
		||||
    char *outfile = NULL;
 | 
			
		||||
@@ -139,6 +137,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            f4 = 3;
 | 
			
		||||
        else if (strcmp(*argv, "-F4") == 0 || strcmp(*argv, "-f4") == 0)
 | 
			
		||||
            f4 = RSA_F4;
 | 
			
		||||
        else if (strcmp(*argv, "-x931") == 0)
 | 
			
		||||
            use_x931 = 1;
 | 
			
		||||
# ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
        else if (strcmp(*argv, "-engine") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
@@ -241,7 +241,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        goto err;
 | 
			
		||||
    }
 | 
			
		||||
# ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
    e = setup_engine(bio_err, engine, 0);
 | 
			
		||||
    setup_engine(bio_err, engine, 0);
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
    if (outfile == NULL) {
 | 
			
		||||
@@ -270,15 +270,21 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
 | 
			
		||||
    BIO_printf(bio_err, "Generating RSA private key, %d bit long modulus\n",
 | 
			
		||||
               num);
 | 
			
		||||
# ifdef OPENSSL_NO_ENGINE
 | 
			
		||||
 | 
			
		||||
    rsa = RSA_new();
 | 
			
		||||
# else
 | 
			
		||||
    rsa = RSA_new_method(e);
 | 
			
		||||
# endif
 | 
			
		||||
    if (!rsa)
 | 
			
		||||
        goto err;
 | 
			
		||||
 | 
			
		||||
    if (!BN_set_word(bn, f4) || !RSA_generate_key_ex(rsa, num, bn, &cb))
 | 
			
		||||
    if (use_x931) {
 | 
			
		||||
        BIGNUM *pubexp;
 | 
			
		||||
        pubexp = BN_new();
 | 
			
		||||
        if (!BN_set_word(pubexp, f4))
 | 
			
		||||
            goto err;
 | 
			
		||||
        if (!RSA_X931_generate_key_ex(rsa, num, pubexp, &cb))
 | 
			
		||||
            goto err;
 | 
			
		||||
        BN_free(pubexp);
 | 
			
		||||
    } else if (!BN_set_word(bn, f4)
 | 
			
		||||
               || !RSA_generate_key_ex(rsa, num, bn, &cb))
 | 
			
		||||
        goto err;
 | 
			
		||||
 | 
			
		||||
    app_RAND_write_file(NULL, bio_err);
 | 
			
		||||
 
 | 
			
		||||
@@ -1,107 +0,0 @@
 | 
			
		||||
$! INSTALL.COM -- Installs the files in a given directory tree
 | 
			
		||||
$!
 | 
			
		||||
$! Author: Richard Levitte <richard@levitte.org>
 | 
			
		||||
$! Time of creation: 22-MAY-1998 10:13
 | 
			
		||||
$!
 | 
			
		||||
$! P1  root of the directory tree
 | 
			
		||||
$! P2  "64" for 64-bit pointers.
 | 
			
		||||
$!
 | 
			
		||||
$!
 | 
			
		||||
$! Announce/identify.
 | 
			
		||||
$!
 | 
			
		||||
$ proc = f$environment( "procedure")
 | 
			
		||||
$ write sys$output "@@@ "+ -
 | 
			
		||||
   f$parse( proc, , , "name")+ f$parse( proc, , , "type")
 | 
			
		||||
$!
 | 
			
		||||
$ on error then goto tidy
 | 
			
		||||
$ on control_c then goto tidy
 | 
			
		||||
$!
 | 
			
		||||
$ if (p1 .eqs. "")
 | 
			
		||||
$ then
 | 
			
		||||
$   write sys$output "First argument missing."
 | 
			
		||||
$   write sys$output -
 | 
			
		||||
     "It should be the directory where you want things installed."
 | 
			
		||||
$   exit
 | 
			
		||||
$ endif
 | 
			
		||||
$!
 | 
			
		||||
$ if (f$getsyi("cpu") .lt. 128)
 | 
			
		||||
$ then
 | 
			
		||||
$   arch = "VAX"
 | 
			
		||||
$ else
 | 
			
		||||
$   arch = f$edit( f$getsyi( "arch_name"), "upcase")
 | 
			
		||||
$   if (arch .eqs. "") then arch = "UNK"
 | 
			
		||||
$ endif
 | 
			
		||||
$!
 | 
			
		||||
$ archd = arch
 | 
			
		||||
$!
 | 
			
		||||
$ if (p2 .nes. "")
 | 
			
		||||
$ then
 | 
			
		||||
$   if (p2 .eqs. "64")
 | 
			
		||||
$   then
 | 
			
		||||
$     archd = arch+ "_64"
 | 
			
		||||
$   else
 | 
			
		||||
$     if (p2 .nes. "32")
 | 
			
		||||
$     then
 | 
			
		||||
$       write sys$output "Second argument invalid."
 | 
			
		||||
$       write sys$output "It should be "32", "64", or nothing."
 | 
			
		||||
$       exit
 | 
			
		||||
$     endif
 | 
			
		||||
$   endif
 | 
			
		||||
$ endif
 | 
			
		||||
$!
 | 
			
		||||
$ root = f$parse( p1, "[]A.;0", , , "syntax_only, no_conceal") - "A.;0"
 | 
			
		||||
$ root_dev = f$parse(root,,,"device","syntax_only")
 | 
			
		||||
$ root_dir = f$parse(root,,,"directory","syntax_only") - -
 | 
			
		||||
   "[000000." - "][" - "[" - "]"
 | 
			
		||||
$ root = root_dev + "[" + root_dir
 | 
			
		||||
$!
 | 
			
		||||
$ define /nolog wrk_sslroot 'root'.] /trans=conc
 | 
			
		||||
$ define /nolog wrk_sslxexe wrk_sslroot:['archd'_exe]
 | 
			
		||||
$!
 | 
			
		||||
$ if f$parse("wrk_sslroot:[000000]") .eqs. "" then -
 | 
			
		||||
   create /directory /log wrk_sslroot:[000000]
 | 
			
		||||
$ if f$parse("wrk_sslxexe:") .eqs. "" then -
 | 
			
		||||
   create /directory /log wrk_sslxexe:
 | 
			
		||||
$!
 | 
			
		||||
$ exe := openssl
 | 
			
		||||
$!
 | 
			
		||||
$ exe_dir := [-.'archd'.exe.apps]
 | 
			
		||||
$!
 | 
			
		||||
$! Executables.
 | 
			
		||||
$!
 | 
			
		||||
$ i = 0
 | 
			
		||||
$ loop_exe:
 | 
			
		||||
$   e = f$edit(f$element( i, ",", exe), "trim")
 | 
			
		||||
$   i = i + 1
 | 
			
		||||
$   if e .eqs. "," then goto loop_exe_end
 | 
			
		||||
$   set noon
 | 
			
		||||
$   file = exe_dir+ e+ ".exe"
 | 
			
		||||
$   if f$search( file) .nes. ""
 | 
			
		||||
$   then
 | 
			
		||||
$     copy /protection = w:re 'file' wrk_sslxexe: /log
 | 
			
		||||
$   endif
 | 
			
		||||
$   set on
 | 
			
		||||
$ goto loop_exe
 | 
			
		||||
$ loop_exe_end:
 | 
			
		||||
$!
 | 
			
		||||
$! Miscellaneous.
 | 
			
		||||
$!
 | 
			
		||||
$ set noon
 | 
			
		||||
$ copy /protection = w:re ca.com wrk_sslxexe:ca.com /log
 | 
			
		||||
$ copy /protection = w:re openssl-vms.cnf wrk_sslroot:[000000]openssl.cnf /log
 | 
			
		||||
$ set on
 | 
			
		||||
$!
 | 
			
		||||
$ tidy:
 | 
			
		||||
$!
 | 
			
		||||
$ call deass wrk_sslroot
 | 
			
		||||
$ call deass wrk_sslxexe
 | 
			
		||||
$!
 | 
			
		||||
$ exit
 | 
			
		||||
$!
 | 
			
		||||
$ deass: subroutine
 | 
			
		||||
$ if (f$trnlnm( p1, "LNM$PROCESS") .nes. "")
 | 
			
		||||
$ then
 | 
			
		||||
$   deassign /process 'p1'
 | 
			
		||||
$ endif
 | 
			
		||||
$ endsubroutine
 | 
			
		||||
$!
 | 
			
		||||
							
								
								
									
										65
									
								
								apps/install.com
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										65
									
								
								apps/install.com
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,65 @@
 | 
			
		||||
$! INSTALL.COM -- Installs the files in a given directory tree
 | 
			
		||||
$!
 | 
			
		||||
$! Author: Richard Levitte <richard@levitte.org>
 | 
			
		||||
$! Time of creation: 22-MAY-1998 10:13
 | 
			
		||||
$!
 | 
			
		||||
$! P1	root of the directory tree
 | 
			
		||||
$!
 | 
			
		||||
$
 | 
			
		||||
$	IF P1 .EQS. ""
 | 
			
		||||
$	THEN
 | 
			
		||||
$	    WRITE SYS$OUTPUT "First argument missing."
 | 
			
		||||
$	    WRITE SYS$OUTPUT -
 | 
			
		||||
		  "Should be the directory where you want things installed."
 | 
			
		||||
$	    EXIT
 | 
			
		||||
$	ENDIF
 | 
			
		||||
$
 | 
			
		||||
$	IF (F$GETSYI("CPU").LT.128)
 | 
			
		||||
$	THEN
 | 
			
		||||
$	    ARCH := VAX
 | 
			
		||||
$	ELSE
 | 
			
		||||
$	    ARCH = F$EDIT( F$GETSYI( "ARCH_NAME"), "UPCASE")
 | 
			
		||||
$	    IF (ARCH .EQS. "") THEN ARCH = "UNK"
 | 
			
		||||
$	ENDIF
 | 
			
		||||
$
 | 
			
		||||
$	ROOT = F$PARSE(P1,"[]A.;0",,,"SYNTAX_ONLY,NO_CONCEAL") - "A.;0"
 | 
			
		||||
$	ROOT_DEV = F$PARSE(ROOT,,,"DEVICE","SYNTAX_ONLY")
 | 
			
		||||
$	ROOT_DIR = F$PARSE(ROOT,,,"DIRECTORY","SYNTAX_ONLY") -
 | 
			
		||||
		   - "[000000." - "][" - "[" - "]"
 | 
			
		||||
$	ROOT = ROOT_DEV + "[" + ROOT_DIR
 | 
			
		||||
$
 | 
			
		||||
$	DEFINE/NOLOG WRK_SSLROOT 'ROOT'.] /TRANS=CONC
 | 
			
		||||
$	DEFINE/NOLOG WRK_SSLEXE WRK_SSLROOT:['ARCH'_EXE]
 | 
			
		||||
$
 | 
			
		||||
$	IF F$PARSE("WRK_SSLROOT:[000000]") .EQS. "" THEN -
 | 
			
		||||
	   CREATE/DIR/LOG WRK_SSLROOT:[000000]
 | 
			
		||||
$	IF F$PARSE("WRK_SSLEXE:") .EQS. "" THEN -
 | 
			
		||||
	   CREATE/DIR/LOG WRK_SSLEXE:
 | 
			
		||||
$
 | 
			
		||||
$	EXE := openssl
 | 
			
		||||
$
 | 
			
		||||
$	EXE_DIR := [-.'ARCH'.EXE.APPS]
 | 
			
		||||
$
 | 
			
		||||
$	I = 0
 | 
			
		||||
$ LOOP_EXE: 
 | 
			
		||||
$	E = F$EDIT(F$ELEMENT(I, ",", EXE),"TRIM")
 | 
			
		||||
$	I = I + 1
 | 
			
		||||
$	IF E .EQS. "," THEN GOTO LOOP_EXE_END
 | 
			
		||||
$	SET NOON
 | 
			
		||||
$	IF F$SEARCH(EXE_DIR+E+".EXE") .NES. ""
 | 
			
		||||
$	THEN
 | 
			
		||||
$	  COPY 'EXE_DIR''E'.EXE WRK_SSLEXE:'E'.EXE/log
 | 
			
		||||
$	  SET FILE/PROT=W:RE WRK_SSLEXE:'E'.EXE
 | 
			
		||||
$	ENDIF
 | 
			
		||||
$	SET ON
 | 
			
		||||
$	GOTO LOOP_EXE
 | 
			
		||||
$ LOOP_EXE_END:
 | 
			
		||||
$
 | 
			
		||||
$	SET NOON
 | 
			
		||||
$	COPY CA.COM WRK_SSLEXE:CA.COM/LOG
 | 
			
		||||
$	SET FILE/PROT=W:RE WRK_SSLEXE:CA.COM
 | 
			
		||||
$	COPY OPENSSL-VMS.CNF WRK_SSLROOT:[000000]OPENSSL.CNF/LOG
 | 
			
		||||
$	SET FILE/PROT=W:R WRK_SSLROOT:[000000]OPENSSL.CNF
 | 
			
		||||
$	SET ON
 | 
			
		||||
$
 | 
			
		||||
$	EXIT
 | 
			
		||||
@@ -25,7 +25,7 @@ $!	   VAXC	 For VAX C.
 | 
			
		||||
$!	   DECC	 For DEC C.
 | 
			
		||||
$!	   GNUC	 For GNU C.
 | 
			
		||||
$!
 | 
			
		||||
$!  If you don't specify a compiler, it will try to determine which
 | 
			
		||||
$!  If you don't speficy a compiler, it will try to determine which
 | 
			
		||||
$!  "C" compiler to use.
 | 
			
		||||
$!
 | 
			
		||||
$!  P3, if defined, sets a TCP/IP library to use, through one of the following
 | 
			
		||||
@@ -39,35 +39,11 @@ $!  P4, if defined, sets a compiler thread NOT needed on OpenVMS 7.1 (and up)
 | 
			
		||||
$!
 | 
			
		||||
$!  P5, if defined, sets a choice of programs to compile.
 | 
			
		||||
$!
 | 
			
		||||
$!  P6, if defined, specifies the C pointer size.  Ignored on VAX.
 | 
			
		||||
$!      ("64=ARGV" gives more efficient code with HP C V7.3 or newer.)
 | 
			
		||||
$!      Supported values are:
 | 
			
		||||
$!
 | 
			
		||||
$!      ""       Compile with default (/NOPOINTER_SIZE)
 | 
			
		||||
$!      32       Compile with /POINTER_SIZE=32 (SHORT)
 | 
			
		||||
$!      64       Compile with /POINTER_SIZE=64[=ARGV] (LONG[=ARGV])
 | 
			
		||||
$!               (Automatically select ARGV if compiler supports it.)
 | 
			
		||||
$!      64=      Compile with /POINTER_SIZE=64 (LONG).
 | 
			
		||||
$!      64=ARGV  Compile with /POINTER_SIZE=64=ARGV (LONG=ARGV).
 | 
			
		||||
$!
 | 
			
		||||
$!  P7, if defined, specifies a directory where ZLIB files (zlib.h,
 | 
			
		||||
$!  libz.olb) may be found.  Optionally, a non-default object library
 | 
			
		||||
$!  name may be included ("dev:[dir]libz_64.olb", for example).
 | 
			
		||||
$!
 | 
			
		||||
$!
 | 
			
		||||
$! Announce/identify.
 | 
			
		||||
$!
 | 
			
		||||
$ proc = f$environment( "procedure")
 | 
			
		||||
$ write sys$output "@@@ "+ -
 | 
			
		||||
   f$parse( proc, , , "name")+ f$parse( proc, , , "type")
 | 
			
		||||
$!
 | 
			
		||||
$ on control_c then goto exit
 | 
			
		||||
$!
 | 
			
		||||
$! Define A TCP/IP Library That We Will Need To Link To.
 | 
			
		||||
$! (That Is, If We Need To Link To One.)
 | 
			
		||||
$!
 | 
			
		||||
$ TCPIP_LIB = ""
 | 
			
		||||
$ ZLIB_LIB = ""
 | 
			
		||||
$!
 | 
			
		||||
$! Check What Architecture We Are Using.
 | 
			
		||||
$!
 | 
			
		||||
@@ -76,7 +52,7 @@ $ THEN
 | 
			
		||||
$!
 | 
			
		||||
$!  The Architecture Is VAX.
 | 
			
		||||
$!
 | 
			
		||||
$   ARCH = "VAX"
 | 
			
		||||
$   ARCH := VAX
 | 
			
		||||
$!
 | 
			
		||||
$! Else...
 | 
			
		||||
$!
 | 
			
		||||
@@ -91,45 +67,29 @@ $! End The Architecture Check.
 | 
			
		||||
$!
 | 
			
		||||
$ ENDIF
 | 
			
		||||
$!
 | 
			
		||||
$ ARCHD = ARCH
 | 
			
		||||
$ LIB32 = "32"
 | 
			
		||||
$ OPT_FILE = ""
 | 
			
		||||
$ POINTER_SIZE = ""
 | 
			
		||||
$!
 | 
			
		||||
$! Define what programs should be compiled
 | 
			
		||||
$!
 | 
			
		||||
$ PROGRAMS := OPENSSL
 | 
			
		||||
$!
 | 
			
		||||
$! Check To Make Sure We Have Valid Command Line Parameters.
 | 
			
		||||
$!
 | 
			
		||||
$ GOSUB CHECK_OPTIONS
 | 
			
		||||
$!
 | 
			
		||||
$! Define The CRYPTO Library.
 | 
			
		||||
$!
 | 
			
		||||
$ CRYPTO_LIB := SYS$DISK:[-.'ARCHD'.EXE.CRYPTO]SSL_LIBCRYPTO'LIB32'.OLB
 | 
			
		||||
$ CRYPTO_LIB := SYS$DISK:[-.'ARCH'.EXE.CRYPTO]LIBCRYPTO.OLB
 | 
			
		||||
$!
 | 
			
		||||
$! Define The SSL Library.
 | 
			
		||||
$!
 | 
			
		||||
$ SSL_LIB := SYS$DISK:[-.'ARCHD'.EXE.SSL]SSL_LIBSSL'LIB32'.OLB
 | 
			
		||||
$ SSL_LIB := SYS$DISK:[-.'ARCH'.EXE.SSL]LIBSSL.OLB
 | 
			
		||||
$!
 | 
			
		||||
$! Define The OBJ and EXE Directories.
 | 
			
		||||
$! Define The OBJ Directory.
 | 
			
		||||
$!
 | 
			
		||||
$ OBJ_DIR := SYS$DISK:[-.'ARCHD'.OBJ.APPS]
 | 
			
		||||
$ EXE_DIR := SYS$DISK:[-.'ARCHD'.EXE.APPS]
 | 
			
		||||
$ OBJ_DIR := SYS$DISK:[-.'ARCH'.OBJ.APPS]
 | 
			
		||||
$!
 | 
			
		||||
$! Specify the destination directory in any /MAP option.
 | 
			
		||||
$! Define The EXE Directory.
 | 
			
		||||
$!
 | 
			
		||||
$ if (LINKMAP .eqs. "MAP")
 | 
			
		||||
$ then
 | 
			
		||||
$   LINKMAP = LINKMAP+ "=''EXE_DIR'"
 | 
			
		||||
$ endif
 | 
			
		||||
$ EXE_DIR := SYS$DISK:[-.'ARCH'.EXE.APPS]
 | 
			
		||||
$!
 | 
			
		||||
$! Add the location prefix to the linker options file name.
 | 
			
		||||
$! Check To Make Sure We Have Valid Command Line Parameters.
 | 
			
		||||
$!
 | 
			
		||||
$ if (OPT_FILE .nes. "")
 | 
			
		||||
$ then
 | 
			
		||||
$   OPT_FILE = EXE_DIR+ OPT_FILE
 | 
			
		||||
$ endif
 | 
			
		||||
$ GOSUB CHECK_OPTIONS
 | 
			
		||||
$!
 | 
			
		||||
$! Initialise logical names and such
 | 
			
		||||
$!
 | 
			
		||||
@@ -137,7 +97,7 @@ $ GOSUB INITIALISE
 | 
			
		||||
$!
 | 
			
		||||
$! Tell The User What Kind of Machine We Run On.
 | 
			
		||||
$!
 | 
			
		||||
$ WRITE SYS$OUTPUT "Host system architecture: ''ARCHD'"
 | 
			
		||||
$ WRITE SYS$OUTPUT "Compiling On A ",ARCH," Machine."
 | 
			
		||||
$!
 | 
			
		||||
$! Check To See If The OBJ Directory Exists.
 | 
			
		||||
$!
 | 
			
		||||
@@ -179,15 +139,12 @@ $! reflect the E_OBJ variable in Makefile as closely as possible, thereby
 | 
			
		||||
$! making it fairly easy to verify that the lists are the same.
 | 
			
		||||
$!
 | 
			
		||||
$ LIB_OPENSSL = "VERIFY,ASN1PARS,REQ,DGST,DH,DHPARAM,ENC,PASSWD,GENDH,ERRSTR,"+-
 | 
			
		||||
	     	"CA,PKCS7,CRL2P7,CRL,"+-
 | 
			
		||||
	      	"RSA,RSAUTL,DSA,DSAPARAM,EC,ECPARAM,"+-
 | 
			
		||||
	      	"X509,GENRSA,GENDSA,GENPKEY,S_SERVER,S_CLIENT,SPEED,"+-
 | 
			
		||||
	      	"S_TIME,APPS,S_CB,S_SOCKET,APP_RAND,VERSION,SESS_ID,"+-
 | 
			
		||||
	      	"CIPHERS,NSEQ,PKCS12,PKCS8,PKEY,PKEYPARAM,PKEYUTL,"+ -
 | 
			
		||||
	      	"SPKAC,SMIME,CMS,RAND,ENGINE,OCSP,PRIME,TS,SRP"
 | 
			
		||||
$!
 | 
			
		||||
$ LIB_OPENSSL = LIB_OPENSSL+ ",VMS_DECC_INIT"
 | 
			
		||||
$!
 | 
			
		||||
		"CA,PKCS7,CRL2P7,CRL,"+-
 | 
			
		||||
		"RSA,RSAUTL,DSA,DSAPARAM,EC,ECPARAM,"+-
 | 
			
		||||
		"X509,GENRSA,GENDSA,S_SERVER,S_CLIENT,SPEED,"+-
 | 
			
		||||
		"S_TIME,APPS,S_CB,S_SOCKET,APP_RAND,VERSION,SESS_ID,"+-
 | 
			
		||||
		"CIPHERS,NSEQ,PKCS12,PKCS8,SPKAC,SMIME,RAND,ENGINE,"+-
 | 
			
		||||
		"OCSP,PRIME,CMS"
 | 
			
		||||
$ TCPIP_PROGRAMS = ",,"
 | 
			
		||||
$ IF COMPILER .EQS. "VAXC" THEN -
 | 
			
		||||
     TCPIP_PROGRAMS = ",OPENSSL,"
 | 
			
		||||
@@ -245,7 +202,7 @@ $   LIB_COUNTER = -1
 | 
			
		||||
$!
 | 
			
		||||
$!  Create a .OPT file for the object files
 | 
			
		||||
$!
 | 
			
		||||
$   OPEN /WRITE OBJECTS 'EXE_DIR''CURRENT_APP'.OPT
 | 
			
		||||
$   OPEN/WRITE OBJECTS 'EXE_DIR''CURRENT_APP'.OPT
 | 
			
		||||
$!
 | 
			
		||||
$!  Top Of The File Loop.
 | 
			
		||||
$!
 | 
			
		||||
@@ -332,18 +289,34 @@ $   GOTO NEXT_APP
 | 
			
		||||
$ ENDIF
 | 
			
		||||
$!
 | 
			
		||||
$! Link The Program.
 | 
			
		||||
$! Check To See If We Are To Link With A Specific TCP/IP Library.
 | 
			
		||||
$!
 | 
			
		||||
$ ON WARNING THEN GOTO NEXT_APP
 | 
			
		||||
$!
 | 
			
		||||
$ IF (TCPIP_LIB.NES."")
 | 
			
		||||
$ THEN
 | 
			
		||||
$!
 | 
			
		||||
$! Don't Link With The RSAREF Routines And TCP/IP Library.
 | 
			
		||||
$!
 | 
			
		||||
$ LINK /'DEBUGGER' /'LINKMAP' /'TRACEBACK' /EXE='EXE_FILE' -
 | 
			
		||||
  'EXE_DIR''CURRENT_APP'.OPT /OPTIONS, -
 | 
			
		||||
  'SSL_LIB' /LIBRARY, -
 | 
			
		||||
  'CRYPTO_LIB' /LIBRARY -
 | 
			
		||||
  'TCPIP_LIB' -
 | 
			
		||||
  'ZLIB_LIB' -
 | 
			
		||||
  ,'OPT_FILE' /OPTIONS
 | 
			
		||||
$   LINK/'DEBUGGER'/'TRACEBACK' /EXE='EXE_FILE' -
 | 
			
		||||
	'EXE_DIR''CURRENT_APP'.OPT/OPTION, -
 | 
			
		||||
        'SSL_LIB'/LIBRARY,'CRYPTO_LIB'/LIBRARY, -
 | 
			
		||||
        'TCPIP_LIB','OPT_FILE'/OPTION
 | 
			
		||||
$!
 | 
			
		||||
$! Else...
 | 
			
		||||
$!
 | 
			
		||||
$ ELSE
 | 
			
		||||
$!
 | 
			
		||||
$! Don't Link With The RSAREF Routines And Link With A TCP/IP Library.
 | 
			
		||||
$!
 | 
			
		||||
$   LINK/'DEBUGGER'/'TRACEBACK' /EXE='EXE_FILE' -
 | 
			
		||||
	'EXE_DIR''CURRENT_APP'.OPT/OPTION, -
 | 
			
		||||
        'SSL_LIB'/LIBRARY,'CRYPTO_LIB'/LIBRARY, -
 | 
			
		||||
        'OPT_FILE'/OPTION
 | 
			
		||||
$!
 | 
			
		||||
$! End The TCP/IP Library Check.
 | 
			
		||||
$!
 | 
			
		||||
$ ENDIF
 | 
			
		||||
$!
 | 
			
		||||
$! Go Back And Do It Again.
 | 
			
		||||
$!
 | 
			
		||||
@@ -378,7 +351,7 @@ $!
 | 
			
		||||
$     CREATE 'OPT_FILE'
 | 
			
		||||
$DECK
 | 
			
		||||
!
 | 
			
		||||
! Default System Options File To Link Against 
 | 
			
		||||
! Default System Options File To Link Agianst 
 | 
			
		||||
! The Sharable VAX C Runtime Library.
 | 
			
		||||
!
 | 
			
		||||
SYS$SHARE:VAXCRTL.EXE/SHARE
 | 
			
		||||
@@ -407,7 +380,7 @@ $!
 | 
			
		||||
$     CREATE 'OPT_FILE'
 | 
			
		||||
$DECK
 | 
			
		||||
!
 | 
			
		||||
! Default System Options File To Link Against 
 | 
			
		||||
! Default System Options File To Link Agianst 
 | 
			
		||||
! The Sharable C Runtime Library.
 | 
			
		||||
!
 | 
			
		||||
GNU_CC:[000000]GCCLIB/LIBRARY
 | 
			
		||||
@@ -442,7 +415,7 @@ $!
 | 
			
		||||
$       CREATE 'OPT_FILE'
 | 
			
		||||
$DECK
 | 
			
		||||
!
 | 
			
		||||
! Default System Options File To Link Against 
 | 
			
		||||
! Default System Options File To Link Agianst 
 | 
			
		||||
! The Sharable DEC C Runtime Library.
 | 
			
		||||
!
 | 
			
		||||
SYS$SHARE:DECC$SHR.EXE/SHARE
 | 
			
		||||
@@ -457,7 +430,7 @@ $!
 | 
			
		||||
$       CREATE 'OPT_FILE'
 | 
			
		||||
$DECK
 | 
			
		||||
!
 | 
			
		||||
! Default System Options File For non-VAX To Link Against 
 | 
			
		||||
! Default System Options File For non-VAX To Link Agianst 
 | 
			
		||||
! The Sharable C Runtime Library.
 | 
			
		||||
!
 | 
			
		||||
SYS$SHARE:CMA$OPEN_LIB_SHR/SHARE
 | 
			
		||||
@@ -541,15 +514,14 @@ $!
 | 
			
		||||
$ IF (P1.EQS."NODEBUG")
 | 
			
		||||
$ THEN
 | 
			
		||||
$!
 | 
			
		||||
$!  P1 Is NODEBUG, So Compile Without Debugger Information.
 | 
			
		||||
$!   P1 Is NODEBUG, So Compile Without Debugger Information.
 | 
			
		||||
$!
 | 
			
		||||
$   DEBUGGER  = "NODEBUG"
 | 
			
		||||
$   LINKMAP = "NOMAP"
 | 
			
		||||
$   TRACEBACK = "NOTRACEBACK" 
 | 
			
		||||
$   GCC_OPTIMIZE = "OPTIMIZE"
 | 
			
		||||
$   CC_OPTIMIZE = "OPTIMIZE"
 | 
			
		||||
$   WRITE SYS$OUTPUT "No Debugger Information Will Be Produced During Compile."
 | 
			
		||||
$   WRITE SYS$OUTPUT "Compiling With Compiler Optimization."
 | 
			
		||||
$    DEBUGGER  = "NODEBUG"
 | 
			
		||||
$    TRACEBACK = "NOTRACEBACK" 
 | 
			
		||||
$    GCC_OPTIMIZE = "OPTIMIZE"
 | 
			
		||||
$    CC_OPTIMIZE = "OPTIMIZE"
 | 
			
		||||
$    WRITE SYS$OUTPUT "No Debugger Information Will Be Produced During Compile."
 | 
			
		||||
$    WRITE SYS$OUTPUT "Compiling With Compiler Optimization."
 | 
			
		||||
$!
 | 
			
		||||
$! Else...
 | 
			
		||||
$!
 | 
			
		||||
@@ -563,7 +535,6 @@ $!
 | 
			
		||||
$!    Compile With Debugger Information.
 | 
			
		||||
$!
 | 
			
		||||
$     DEBUGGER  = "DEBUG"
 | 
			
		||||
$     LINKMAP = "MAP"
 | 
			
		||||
$     TRACEBACK = "TRACEBACK"
 | 
			
		||||
$     GCC_OPTIMIZE = "NOOPTIMIZE"
 | 
			
		||||
$     CC_OPTIMIZE = "NOOPTIMIZE"
 | 
			
		||||
@@ -571,7 +542,7 @@ $     WRITE SYS$OUTPUT "Debugger Information Will Be Produced During Compile."
 | 
			
		||||
$     WRITE SYS$OUTPUT "Compiling Without Compiler Optimization."
 | 
			
		||||
$   ELSE
 | 
			
		||||
$!
 | 
			
		||||
$!    Tell The User Entered An Invalid Option.
 | 
			
		||||
$!    Tell The User Entered An Invalid Option..
 | 
			
		||||
$!
 | 
			
		||||
$     WRITE SYS$OUTPUT ""
 | 
			
		||||
$     WRITE SYS$OUTPUT "The Option ",P1," Is Invalid.  The Valid Options Are:"
 | 
			
		||||
@@ -584,7 +555,7 @@ $!    Time To EXIT.
 | 
			
		||||
$!
 | 
			
		||||
$     EXIT
 | 
			
		||||
$!
 | 
			
		||||
$!  End The Valid Argument Check.
 | 
			
		||||
$!  End The Valid Arguement Check.
 | 
			
		||||
$!
 | 
			
		||||
$   ENDIF
 | 
			
		||||
$!
 | 
			
		||||
@@ -592,87 +563,6 @@ $! End The P1 Check.
 | 
			
		||||
$!
 | 
			
		||||
$ ENDIF
 | 
			
		||||
$!
 | 
			
		||||
$! Check P6 (POINTER_SIZE).
 | 
			
		||||
$!
 | 
			
		||||
$ IF (P6 .NES. "") .AND. (ARCH .NES. "VAX")
 | 
			
		||||
$ THEN
 | 
			
		||||
$!
 | 
			
		||||
$   IF (P6 .EQS. "32")
 | 
			
		||||
$   THEN
 | 
			
		||||
$     POINTER_SIZE = " /POINTER_SIZE=32"
 | 
			
		||||
$   ELSE
 | 
			
		||||
$     POINTER_SIZE = F$EDIT( P6, "COLLAPSE, UPCASE")
 | 
			
		||||
$     IF ((POINTER_SIZE .EQS. "64") .OR. -
 | 
			
		||||
       (POINTER_SIZE .EQS. "64=") .OR. -
 | 
			
		||||
       (POINTER_SIZE .EQS. "64=ARGV"))
 | 
			
		||||
$     THEN
 | 
			
		||||
$       ARCHD = ARCH+ "_64"
 | 
			
		||||
$       LIB32 = ""
 | 
			
		||||
$       IF (F$EXTRACT( 2, 1, POINTER_SIZE) .EQS. "=")
 | 
			
		||||
$       THEN
 | 
			
		||||
$!        Explicit user choice: "64" or "64=ARGV".
 | 
			
		||||
$         IF (POINTER_SIZE .EQS. "64=") THEN POINTER_SIZE = "64"
 | 
			
		||||
$       ELSE
 | 
			
		||||
$         SET NOON
 | 
			
		||||
$         DEFINE /USER_MODE SYS$OUTPUT NL:
 | 
			
		||||
$         DEFINE /USER_MODE SYS$ERROR NL:
 | 
			
		||||
$         CC /NOLIST /NOOBJECT /POINTER_SIZE=64=ARGV NL:
 | 
			
		||||
$         IF ($STATUS .AND. %X0FFF0000) .EQ. %X00030000
 | 
			
		||||
$         THEN
 | 
			
		||||
$           ! If we got here, it means DCL complained like this:
 | 
			
		||||
$           ! %DCL-W-NOVALU, value not allowed - remove value specification
 | 
			
		||||
$           !  \64=\
 | 
			
		||||
$           !
 | 
			
		||||
$           ! If the compiler was run, logicals defined in /USER would
 | 
			
		||||
$           ! have been deassigned automatically.  However, when DCL
 | 
			
		||||
$           ! complains, they aren't, so we do it here (it might be
 | 
			
		||||
$           ! unnecessary, but just in case there will be another error
 | 
			
		||||
$           ! message further on that we don't want to miss)
 | 
			
		||||
$           DEASSIGN /USER_MODE SYS$ERROR
 | 
			
		||||
$           DEASSIGN /USER_MODE SYS$OUTPUT
 | 
			
		||||
$         ELSE
 | 
			
		||||
$           POINTER_SIZE = POINTER_SIZE + "=ARGV"
 | 
			
		||||
$         ENDIF
 | 
			
		||||
$         SET ON
 | 
			
		||||
$       ENDIF
 | 
			
		||||
$       POINTER_SIZE = " /POINTER_SIZE=''POINTER_SIZE'"
 | 
			
		||||
$!
 | 
			
		||||
$     ELSE
 | 
			
		||||
$!
 | 
			
		||||
$!      Tell The User Entered An Invalid Option.
 | 
			
		||||
$!
 | 
			
		||||
$       WRITE SYS$OUTPUT ""
 | 
			
		||||
$       WRITE SYS$OUTPUT "The Option ", P6, -
 | 
			
		||||
         " Is Invalid.  The Valid Options Are:"
 | 
			
		||||
$       WRITE SYS$OUTPUT ""
 | 
			
		||||
$       WRITE SYS$OUTPUT -
 | 
			
		||||
         "    """"  :  Compile with default (short) pointers."
 | 
			
		||||
$       WRITE SYS$OUTPUT -
 | 
			
		||||
         "    32  :  Compile with 32-bit (short) pointers."
 | 
			
		||||
$       WRITE SYS$OUTPUT -
 | 
			
		||||
         "    64       :  Compile with 64-bit (long) pointers (auto ARGV)."
 | 
			
		||||
$       WRITE SYS$OUTPUT -
 | 
			
		||||
         "    64=      :  Compile with 64-bit (long) pointers (no ARGV)."
 | 
			
		||||
$       WRITE SYS$OUTPUT -
 | 
			
		||||
         "    64=ARGV  :  Compile with 64-bit (long) pointers (ARGV)."
 | 
			
		||||
$       WRITE SYS$OUTPUT ""
 | 
			
		||||
$! 
 | 
			
		||||
$!      Time To EXIT.
 | 
			
		||||
$!
 | 
			
		||||
$       EXIT
 | 
			
		||||
$!
 | 
			
		||||
$     ENDIF
 | 
			
		||||
$!
 | 
			
		||||
$   ENDIF
 | 
			
		||||
$!
 | 
			
		||||
$! End The P6 (POINTER_SIZE) Check.
 | 
			
		||||
$!
 | 
			
		||||
$ ENDIF
 | 
			
		||||
$!
 | 
			
		||||
$! Set basic C compiler /INCLUDE directories.
 | 
			
		||||
$!
 | 
			
		||||
$ CC_INCLUDES = "SYS$DISK:[-],SYS$DISK:[-.CRYPTO]"
 | 
			
		||||
$!
 | 
			
		||||
$! Check To See If P2 Is Blank.
 | 
			
		||||
$!
 | 
			
		||||
$ IF (P2.EQS."")
 | 
			
		||||
@@ -773,67 +663,11 @@ $ CCDEFS = "MONOLITH"
 | 
			
		||||
$ IF F$TYPE(USER_CCDEFS) .NES. "" THEN CCDEFS = CCDEFS + "," + USER_CCDEFS
 | 
			
		||||
$ CCEXTRAFLAGS = ""
 | 
			
		||||
$ IF F$TYPE(USER_CCFLAGS) .NES. "" THEN CCEXTRAFLAGS = USER_CCFLAGS
 | 
			
		||||
$ CCDISABLEWARNINGS = "" !!! "MAYLOSEDATA3" !!! "LONGLONGTYPE,LONGLONGSUFX,FOUNDCR"
 | 
			
		||||
$ IF F$TYPE(USER_CCDISABLEWARNINGS) .NES. ""
 | 
			
		||||
$ THEN
 | 
			
		||||
$     IF CCDISABLEWARNINGS .NES. THEN CCDISABLEWARNINGS = CCDISABLEWARNINGS + ","
 | 
			
		||||
$     CCDISABLEWARNINGS = CCDISABLEWARNINGS + USER_CCDISABLEWARNINGS
 | 
			
		||||
$ ENDIF
 | 
			
		||||
$ CCDISABLEWARNINGS = "LONGLONGTYPE,LONGLONGSUFX,FOUNDCR"
 | 
			
		||||
$ IF F$TYPE(USER_CCDISABLEWARNINGS) .NES. "" THEN -
 | 
			
		||||
	CCDISABLEWARNINGS = CCDISABLEWARNINGS + "," + USER_CCDISABLEWARNINGS
 | 
			
		||||
$!
 | 
			
		||||
$! Check To See If We Have A ZLIB Option.
 | 
			
		||||
$!
 | 
			
		||||
$ ZLIB = P7
 | 
			
		||||
$ IF (ZLIB .NES. "")
 | 
			
		||||
$ THEN
 | 
			
		||||
$!
 | 
			
		||||
$!  Check for expected ZLIB files.
 | 
			
		||||
$!
 | 
			
		||||
$   err = 0
 | 
			
		||||
$   file1 = f$parse( "zlib.h", ZLIB, , , "SYNTAX_ONLY")
 | 
			
		||||
$   if (f$search( file1) .eqs. "")
 | 
			
		||||
$   then
 | 
			
		||||
$     WRITE SYS$OUTPUT ""
 | 
			
		||||
$     WRITE SYS$OUTPUT "The Option ", ZLIB, " Is Invalid."
 | 
			
		||||
$     WRITE SYS$OUTPUT "    Can't find header: ''file1'"
 | 
			
		||||
$     err = 1
 | 
			
		||||
$   endif
 | 
			
		||||
$   file1 = f$parse( "A.;", ZLIB)- "A.;"
 | 
			
		||||
$!
 | 
			
		||||
$   file2 = f$parse( ZLIB, "libz.olb", , , "SYNTAX_ONLY")
 | 
			
		||||
$   if (f$search( file2) .eqs. "")
 | 
			
		||||
$   then
 | 
			
		||||
$     if (err .eq. 0)
 | 
			
		||||
$     then
 | 
			
		||||
$       WRITE SYS$OUTPUT ""
 | 
			
		||||
$       WRITE SYS$OUTPUT "The Option ", ZLIB, " Is Invalid."
 | 
			
		||||
$     endif
 | 
			
		||||
$     WRITE SYS$OUTPUT "    Can't find library: ''file2'"
 | 
			
		||||
$     WRITE SYS$OUTPUT ""
 | 
			
		||||
$     err = err+ 2
 | 
			
		||||
$   endif
 | 
			
		||||
$   if (err .eq. 1)
 | 
			
		||||
$   then
 | 
			
		||||
$     WRITE SYS$OUTPUT ""
 | 
			
		||||
$   endif
 | 
			
		||||
$!
 | 
			
		||||
$   if (err .ne. 0)
 | 
			
		||||
$   then
 | 
			
		||||
$     EXIT
 | 
			
		||||
$   endif
 | 
			
		||||
$!
 | 
			
		||||
$   CCDEFS = """ZLIB=1"", "+ CCDEFS
 | 
			
		||||
$   CC_INCLUDES = CC_INCLUDES+ ", "+ file1
 | 
			
		||||
$   ZLIB_LIB = ", ''file2' /library"
 | 
			
		||||
$!
 | 
			
		||||
$!  Print info
 | 
			
		||||
$!
 | 
			
		||||
$   WRITE SYS$OUTPUT "ZLIB library spec: ", file2
 | 
			
		||||
$!
 | 
			
		||||
$! End The ZLIB Check.
 | 
			
		||||
$!
 | 
			
		||||
$ ENDIF
 | 
			
		||||
$!
 | 
			
		||||
$!  Check To See If The User Entered A Valid Parameter.
 | 
			
		||||
$!  Check To See If The User Entered A Valid Paramter.
 | 
			
		||||
$!
 | 
			
		||||
$ IF (P2.EQS."VAXC").OR.(P2.EQS."DECC").OR.(P2.EQS."GNUC")
 | 
			
		||||
$ THEN
 | 
			
		||||
@@ -856,13 +690,13 @@ $!
 | 
			
		||||
$     CC = "CC"
 | 
			
		||||
$     IF ARCH.EQS."VAX" .AND. F$TRNLNM("DECC$CC_DEFAULT").NES."/DECC" -
 | 
			
		||||
	 THEN CC = "CC/DECC"
 | 
			
		||||
$     CC = CC + " /''CC_OPTIMIZE' /''DEBUGGER' /STANDARD=RELAXED"+ -
 | 
			
		||||
       "''POINTER_SIZE' /NOLIST /PREFIX=ALL" + -
 | 
			
		||||
       " /INCLUDE=(''CC_INCLUDES') " + CCEXTRAFLAGS
 | 
			
		||||
$     CC = CC + "/''CC_OPTIMIZE'/''DEBUGGER'/STANDARD=ANSI89" + -
 | 
			
		||||
           "/NOLIST/PREFIX=ALL" + -
 | 
			
		||||
	   "/INCLUDE=(SYS$DISK:[-],SYS$DISK:[-.CRYPTO])" + CCEXTRAFLAGS
 | 
			
		||||
$!
 | 
			
		||||
$!    Define The Linker Options File Name.
 | 
			
		||||
$!
 | 
			
		||||
$     OPT_FILE = "VAX_DECC_OPTIONS.OPT"
 | 
			
		||||
$     OPT_FILE = "''EXE_DIR'VAX_DECC_OPTIONS.OPT"
 | 
			
		||||
$!
 | 
			
		||||
$!  End DECC Check.
 | 
			
		||||
$!
 | 
			
		||||
@@ -890,7 +724,7 @@ $	EXIT
 | 
			
		||||
$     ENDIF
 | 
			
		||||
$     IF F$TRNLNM("DECC$CC_DEFAULT").EQS."/DECC" THEN CC = "CC/VAXC"
 | 
			
		||||
$     CC = CC + "/''CC_OPTIMIZE'/''DEBUGGER'/NOLIST" + -
 | 
			
		||||
	   "/INCLUDE=(''CC_INCLUDES')" + CCEXTRAFLAGS
 | 
			
		||||
	   "/INCLUDE=(SYS$DISK:[-],SYS$DISK:[-.CRYPTO])" + CCEXTRAFLAGS
 | 
			
		||||
$     CCDEFS = CCDEFS + ",""VAXC"""
 | 
			
		||||
$!
 | 
			
		||||
$!    Define <sys> As SYS$COMMON:[SYSLIB]
 | 
			
		||||
@@ -899,7 +733,7 @@ $     DEFINE/NOLOG SYS SYS$COMMON:[SYSLIB]
 | 
			
		||||
$!
 | 
			
		||||
$!    Define The Linker Options File Name.
 | 
			
		||||
$!
 | 
			
		||||
$     OPT_FILE = "VAX_VAXC_OPTIONS.OPT"
 | 
			
		||||
$     OPT_FILE = "''EXE_DIR'VAX_VAXC_OPTIONS.OPT"
 | 
			
		||||
$!
 | 
			
		||||
$!  End VAXC Check
 | 
			
		||||
$!
 | 
			
		||||
@@ -922,11 +756,11 @@ $!    Use GNU C...
 | 
			
		||||
$!
 | 
			
		||||
$     IF F$TYPE(GCC) .EQS. "" THEN GCC := GCC
 | 
			
		||||
$     CC = GCC+"/NOCASE_HACK/''GCC_OPTIMIZE'/''DEBUGGER'/NOLIST" + -
 | 
			
		||||
	   "/INCLUDE=(''CC_INCLUDES')" + CCEXTRAFLAGS
 | 
			
		||||
	   "/INCLUDE=(SYS$DISK:[-],SYS$DISK:[-.CRYPTO])" + CCEXTRAFLAGS
 | 
			
		||||
$!
 | 
			
		||||
$!    Define The Linker Options File Name.
 | 
			
		||||
$!
 | 
			
		||||
$     OPT_FILE = "VAX_GNUC_OPTIONS.OPT"
 | 
			
		||||
$     OPT_FILE = "''EXE_DIR'VAX_GNUC_OPTIONS.OPT"
 | 
			
		||||
$!
 | 
			
		||||
$!  End The GNU C Check.
 | 
			
		||||
$!
 | 
			
		||||
@@ -936,7 +770,7 @@ $!  Set up default defines
 | 
			
		||||
$!
 | 
			
		||||
$   CCDEFS = """FLAT_INC=1""," + CCDEFS
 | 
			
		||||
$!
 | 
			
		||||
$!  Else The User Entered An Invalid Argument.
 | 
			
		||||
$!  Else The User Entered An Invalid Arguement.
 | 
			
		||||
$!
 | 
			
		||||
$ ELSE
 | 
			
		||||
$!
 | 
			
		||||
@@ -968,7 +802,7 @@ $   THEN
 | 
			
		||||
$!
 | 
			
		||||
$!    Set the library to use SOCKETSHR
 | 
			
		||||
$!
 | 
			
		||||
$     TCPIP_LIB = ",SYS$DISK:[-.VMS]SOCKETSHR_SHR.OPT /OPTIONS"
 | 
			
		||||
$     TCPIP_LIB = "SYS$DISK:[-.VMS]SOCKETSHR_SHR.OPT/OPT"
 | 
			
		||||
$!
 | 
			
		||||
$!    Done with SOCKETSHR
 | 
			
		||||
$!
 | 
			
		||||
@@ -994,13 +828,13 @@ $   THEN
 | 
			
		||||
$!
 | 
			
		||||
$!    Set the library to use UCX.
 | 
			
		||||
$!
 | 
			
		||||
$     TCPIP_LIB = ",SYS$DISK:[-.VMS]UCX_SHR_DECC.OPT /OPTIONS"
 | 
			
		||||
$     TCPIP_LIB = "SYS$DISK:[-.VMS]UCX_SHR_DECC.OPT/OPT"
 | 
			
		||||
$     IF F$TRNLNM("UCX$IPC_SHR") .NES. ""
 | 
			
		||||
$     THEN
 | 
			
		||||
$       TCPIP_LIB = ",SYS$DISK:[-.VMS]UCX_SHR_DECC_LOG.OPT /OPTIONS"
 | 
			
		||||
$       TCPIP_LIB = "SYS$DISK:[-.VMS]UCX_SHR_DECC_LOG.OPT/OPT"
 | 
			
		||||
$     ELSE
 | 
			
		||||
$       IF COMPILER .NES. "DECC" .AND. ARCH .EQS. "VAX" THEN -
 | 
			
		||||
	  TCPIP_LIB = ",SYS$DISK:[-.VMS]UCX_SHR_VAXC.OPT /OPTIONS"
 | 
			
		||||
	  TCPIP_LIB = "SYS$DISK:[-.VMS]UCX_SHR_VAXC.OPT/OPT"
 | 
			
		||||
$     ENDIF
 | 
			
		||||
$!
 | 
			
		||||
$!    Done with UCX
 | 
			
		||||
@@ -1014,7 +848,7 @@ $   THEN
 | 
			
		||||
$!
 | 
			
		||||
$!    Set the library to use TCPIP.
 | 
			
		||||
$!
 | 
			
		||||
$     TCPIP_LIB = ",SYS$DISK:[-.VMS]TCPIP_SHR_DECC.OPT /OPTIONS"
 | 
			
		||||
$     TCPIP_LIB = "SYS$DISK:[-.VMS]TCPIP_SHR_DECC.OPT/OPT"
 | 
			
		||||
$!
 | 
			
		||||
$!    Done with TCPIP
 | 
			
		||||
$!
 | 
			
		||||
@@ -1039,9 +873,9 @@ $   CCDEFS = CCDEFS + ",TCPIP_TYPE_''P3'"
 | 
			
		||||
$!
 | 
			
		||||
$!  Print info
 | 
			
		||||
$!
 | 
			
		||||
$   WRITE SYS$OUTPUT "TCP/IP library spec: ", TCPIP_LIB- ","
 | 
			
		||||
$   WRITE SYS$OUTPUT "TCP/IP library spec: ", TCPIP_LIB
 | 
			
		||||
$!
 | 
			
		||||
$!  Else The User Entered An Invalid Argument.
 | 
			
		||||
$!  Else The User Entered An Invalid Arguement.
 | 
			
		||||
$!
 | 
			
		||||
$ ELSE
 | 
			
		||||
$!
 | 
			
		||||
@@ -1067,27 +901,15 @@ $! Finish up the definition of CC.
 | 
			
		||||
$!
 | 
			
		||||
$ IF COMPILER .EQS. "DECC"
 | 
			
		||||
$ THEN
 | 
			
		||||
$!  Not all compiler versions support MAYLOSEDATA3.
 | 
			
		||||
$   OPT_TEST = "MAYLOSEDATA3"
 | 
			
		||||
$   DEFINE /USER_MODE SYS$ERROR NL:
 | 
			
		||||
$   DEFINE /USER_MODE SYS$OUTPUT NL:
 | 
			
		||||
$   'CC' /NOCROSS_REFERENCE /NOLIST /NOOBJECT -
 | 
			
		||||
      /WARNINGS = DISABLE = ('OPT_TEST', EMPTYFILE) NL:
 | 
			
		||||
$   IF ($SEVERITY)
 | 
			
		||||
$   THEN
 | 
			
		||||
$     IF CCDISABLEWARNINGS .NES. "" THEN -
 | 
			
		||||
        CCDISABLEWARNINGS = CCDISABLEWARNINGS+ ","
 | 
			
		||||
$     CCDISABLEWARNINGS = CCDISABLEWARNINGS+ OPT_TEST
 | 
			
		||||
$   ENDIF
 | 
			
		||||
$   IF CCDISABLEWARNINGS .NES. ""
 | 
			
		||||
$   THEN
 | 
			
		||||
$     CCDISABLEWARNINGS = " /WARNING=(DISABLE=(" + CCDISABLEWARNINGS + "))"
 | 
			
		||||
$     CCDISABLEWARNINGS = "/WARNING=(DISABLE=(" + CCDISABLEWARNINGS + "))"
 | 
			
		||||
$   ENDIF
 | 
			
		||||
$ ELSE
 | 
			
		||||
$   CCDISABLEWARNINGS = ""
 | 
			
		||||
$ ENDIF
 | 
			
		||||
$ CC2 = CC + " /DEFINE=(" + CCDEFS + ",_POSIX_C_SOURCE)" + CCDISABLEWARNINGS
 | 
			
		||||
$ CC = CC + " /DEFINE=(" + CCDEFS + ")" + CCDISABLEWARNINGS
 | 
			
		||||
$ CC2 = CC + "/DEFINE=(" + CCDEFS + ",_POSIX_C_SOURCE)" + CCDISABLEWARNINGS
 | 
			
		||||
$ CC = CC + "/DEFINE=(" + CCDEFS + ")" + CCDISABLEWARNINGS
 | 
			
		||||
$!
 | 
			
		||||
$! Show user the result
 | 
			
		||||
$!
 | 
			
		||||
@@ -1153,7 +975,7 @@ $ __INCLUDE = __TOP + "INCLUDE.OPENSSL]"
 | 
			
		||||
$!
 | 
			
		||||
$! Set up the logical name OPENSSL to point at the include directory
 | 
			
		||||
$!
 | 
			
		||||
$ DEFINE OPENSSL /NOLOG '__INCLUDE'
 | 
			
		||||
$ DEFINE OPENSSL/NOLOG '__INCLUDE'
 | 
			
		||||
$!
 | 
			
		||||
$! Done
 | 
			
		||||
$!
 | 
			
		||||
@@ -1161,24 +983,15 @@ $ RETURN
 | 
			
		||||
$!
 | 
			
		||||
$ CLEANUP:
 | 
			
		||||
$!
 | 
			
		||||
$! Restore the saved logical name OPENSSL, if it had a value.
 | 
			
		||||
$! Restore the logical name OPENSSL if it had a value
 | 
			
		||||
$!
 | 
			
		||||
$ if (f$type( __SAVE_OPENSSL) .nes. "")
 | 
			
		||||
$ then
 | 
			
		||||
$   IF __SAVE_OPENSSL .EQS. ""
 | 
			
		||||
$   THEN
 | 
			
		||||
$     DEASSIGN OPENSSL
 | 
			
		||||
$   ELSE
 | 
			
		||||
$     DEFINE /NOLOG OPENSSL '__SAVE_OPENSSL'
 | 
			
		||||
$   ENDIF
 | 
			
		||||
$ endif
 | 
			
		||||
$!
 | 
			
		||||
$! Close any open files.
 | 
			
		||||
$!
 | 
			
		||||
$ if (f$trnlnm( "objects", "LNM$PROCESS", 0, "SUPERVISOR") .nes. "") then -
 | 
			
		||||
   close objects
 | 
			
		||||
$ IF __SAVE_OPENSSL .EQS. ""
 | 
			
		||||
$ THEN
 | 
			
		||||
$   DEASSIGN OPENSSL
 | 
			
		||||
$ ELSE
 | 
			
		||||
$   DEFINE/NOLOG OPENSSL '__SAVE_OPENSSL'
 | 
			
		||||
$ ENDIF
 | 
			
		||||
$!
 | 
			
		||||
$! Done
 | 
			
		||||
$!
 | 
			
		||||
$ RETURN
 | 
			
		||||
$!
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										341
									
								
								apps/ocsp.c
									
									
									
									
									
								
							
							
						
						
									
										341
									
								
								apps/ocsp.c
									
									
									
									
									
								
							@@ -57,70 +57,38 @@
 | 
			
		||||
 *
 | 
			
		||||
 */
 | 
			
		||||
#ifndef OPENSSL_NO_OCSP
 | 
			
		||||
 | 
			
		||||
# ifdef OPENSSL_SYS_VMS
 | 
			
		||||
#  define _XOPEN_SOURCE_EXTENDED/* So fd_set and friends get properly defined
 | 
			
		||||
                                 * on OpenVMS */
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
# define USE_SOCKETS
 | 
			
		||||
 | 
			
		||||
# include <stdio.h>
 | 
			
		||||
# include <stdlib.h>
 | 
			
		||||
# include <string.h>
 | 
			
		||||
# include <time.h>
 | 
			
		||||
# include "apps.h"              /* needs to be included before the openssl
 | 
			
		||||
                                 * headers! */
 | 
			
		||||
# include <openssl/e_os2.h>
 | 
			
		||||
# include <openssl/crypto.h>
 | 
			
		||||
# include <openssl/err.h>
 | 
			
		||||
# include <openssl/ssl.h>
 | 
			
		||||
# include <openssl/evp.h>
 | 
			
		||||
# include <openssl/bn.h>
 | 
			
		||||
# include <openssl/x509v3.h>
 | 
			
		||||
 | 
			
		||||
# if defined(NETWARE_CLIB)
 | 
			
		||||
#  ifdef NETWARE_BSDSOCK
 | 
			
		||||
#   include <sys/socket.h>
 | 
			
		||||
#   include <sys/bsdskt.h>
 | 
			
		||||
#  else
 | 
			
		||||
#   include <novsock2.h>
 | 
			
		||||
#  endif
 | 
			
		||||
# elif defined(NETWARE_LIBC)
 | 
			
		||||
#  ifdef NETWARE_BSDSOCK
 | 
			
		||||
#   include <sys/select.h>
 | 
			
		||||
#  else
 | 
			
		||||
#   include <novsock2.h>
 | 
			
		||||
#  endif
 | 
			
		||||
# endif
 | 
			
		||||
# include <openssl/err.h>
 | 
			
		||||
 | 
			
		||||
/* Maximum leeway in validity period: default 5 minutes */
 | 
			
		||||
# define MAX_VALIDITY_PERIOD     (5 * 60)
 | 
			
		||||
 | 
			
		||||
static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert,
 | 
			
		||||
                         const EVP_MD *cert_id_md, X509 *issuer,
 | 
			
		||||
static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, X509 *issuer,
 | 
			
		||||
                         STACK_OF(OCSP_CERTID) *ids);
 | 
			
		||||
static int add_ocsp_serial(OCSP_REQUEST **req, char *serial,
 | 
			
		||||
                           const EVP_MD *cert_id_md, X509 *issuer,
 | 
			
		||||
static int add_ocsp_serial(OCSP_REQUEST **req, char *serial, X509 *issuer,
 | 
			
		||||
                           STACK_OF(OCSP_CERTID) *ids);
 | 
			
		||||
static int print_ocsp_summary(BIO *out, OCSP_BASICRESP *bs, OCSP_REQUEST *req,
 | 
			
		||||
                              STACK_OF(OPENSSL_STRING) *names,
 | 
			
		||||
                              STACK_OF(OCSP_CERTID) *ids, long nsec,
 | 
			
		||||
                              long maxage);
 | 
			
		||||
                              STACK * names, STACK_OF(OCSP_CERTID) *ids,
 | 
			
		||||
                              long nsec, long maxage);
 | 
			
		||||
 | 
			
		||||
static int make_ocsp_response(OCSP_RESPONSE **resp, OCSP_REQUEST *req,
 | 
			
		||||
                              CA_DB *db, X509 *ca, X509 *rcert,
 | 
			
		||||
                              EVP_PKEY *rkey, const EVP_MD *md,
 | 
			
		||||
                              STACK_OF(X509) *rother, unsigned long flags,
 | 
			
		||||
                              int nmin, int ndays, int badsig);
 | 
			
		||||
                              EVP_PKEY *rkey, STACK_OF(X509) *rother,
 | 
			
		||||
                              unsigned long flags, int nmin, int ndays);
 | 
			
		||||
 | 
			
		||||
static char **lookup_serial(CA_DB *db, ASN1_INTEGER *ser);
 | 
			
		||||
static BIO *init_responder(const char *port);
 | 
			
		||||
static BIO *init_responder(char *port);
 | 
			
		||||
static int do_responder(OCSP_REQUEST **preq, BIO **pcbio, BIO *acbio,
 | 
			
		||||
                        const char *port);
 | 
			
		||||
                        char *port);
 | 
			
		||||
static int send_ocsp_response(BIO *cbio, OCSP_RESPONSE *resp);
 | 
			
		||||
static OCSP_RESPONSE *query_responder(BIO *err, BIO *cbio, const char *path,
 | 
			
		||||
                                      const STACK_OF(CONF_VALUE) *headers,
 | 
			
		||||
static OCSP_RESPONSE *query_responder(BIO *err, BIO *cbio, char *path,
 | 
			
		||||
                                      OCSP_REQUEST *req, int req_timeout);
 | 
			
		||||
 | 
			
		||||
# undef PROG
 | 
			
		||||
@@ -140,7 +108,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    char *rsignfile = NULL, *rkeyfile = NULL;
 | 
			
		||||
    char *outfile = NULL;
 | 
			
		||||
    int add_nonce = 1, noverify = 0, use_ssl = -1;
 | 
			
		||||
    STACK_OF(CONF_VALUE) *headers = NULL;
 | 
			
		||||
    OCSP_REQUEST *req = NULL;
 | 
			
		||||
    OCSP_RESPONSE *resp = NULL;
 | 
			
		||||
    OCSP_BASICRESP *bs = NULL;
 | 
			
		||||
@@ -155,17 +122,15 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    long nsec = MAX_VALIDITY_PERIOD, maxage = -1;
 | 
			
		||||
    char *CAfile = NULL, *CApath = NULL;
 | 
			
		||||
    X509_STORE *store = NULL;
 | 
			
		||||
    X509_VERIFY_PARAM *vpm = NULL;
 | 
			
		||||
    STACK_OF(X509) *sign_other = NULL, *verify_other = NULL, *rother = NULL;
 | 
			
		||||
    char *sign_certfile = NULL, *verify_certfile = NULL, *rcertfile = NULL;
 | 
			
		||||
    unsigned long sign_flags = 0, verify_flags = 0, rflags = 0;
 | 
			
		||||
    int ret = 1;
 | 
			
		||||
    int accept_count = -1;
 | 
			
		||||
    int badarg = 0;
 | 
			
		||||
    int badsig = 0;
 | 
			
		||||
    int i;
 | 
			
		||||
    int ignore_err = 0;
 | 
			
		||||
    STACK_OF(OPENSSL_STRING) *reqnames = NULL;
 | 
			
		||||
    STACK *reqnames = NULL;
 | 
			
		||||
    STACK_OF(OCSP_CERTID) *ids = NULL;
 | 
			
		||||
 | 
			
		||||
    X509 *rca_cert = NULL;
 | 
			
		||||
@@ -173,7 +138,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    char *rca_filename = NULL;
 | 
			
		||||
    CA_DB *rdb = NULL;
 | 
			
		||||
    int nmin = 0, ndays = -1;
 | 
			
		||||
    const EVP_MD *cert_id_md = NULL, *rsign_md = NULL;
 | 
			
		||||
 | 
			
		||||
    if (bio_err == NULL)
 | 
			
		||||
        bio_err = BIO_new_fp(stderr, BIO_NOCLOSE);
 | 
			
		||||
@@ -183,7 +147,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    SSL_load_error_strings();
 | 
			
		||||
    OpenSSL_add_ssl_algorithms();
 | 
			
		||||
    args = argv + 1;
 | 
			
		||||
    reqnames = sk_OPENSSL_STRING_new_null();
 | 
			
		||||
    reqnames = sk_new_null();
 | 
			
		||||
    ids = sk_OCSP_CERTID_new_null();
 | 
			
		||||
    while (!badarg && *args && *args[0] == '-') {
 | 
			
		||||
        if (!strcmp(*args, "-out")) {
 | 
			
		||||
@@ -209,7 +173,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                OPENSSL_free(tport);
 | 
			
		||||
            if (tpath)
 | 
			
		||||
                OPENSSL_free(tpath);
 | 
			
		||||
            thost = tport = tpath = NULL;
 | 
			
		||||
            if (args[1]) {
 | 
			
		||||
                args++;
 | 
			
		||||
                if (!OCSP_parse_url(*args, &host, &port, &path, &use_ssl)) {
 | 
			
		||||
@@ -233,13 +196,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                port = *args;
 | 
			
		||||
            } else
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
        } else if (!strcmp(*args, "-header")) {
 | 
			
		||||
            if (args[1] && args[2]) {
 | 
			
		||||
                if (!X509V3_add_value(args[1], args[2], &headers))
 | 
			
		||||
                    goto end;
 | 
			
		||||
                args += 2;
 | 
			
		||||
            } else
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
        } else if (!strcmp(*args, "-ignore_err"))
 | 
			
		||||
            ignore_err = 1;
 | 
			
		||||
        else if (!strcmp(*args, "-noverify"))
 | 
			
		||||
@@ -268,8 +224,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            verify_flags |= OCSP_TRUSTOTHER;
 | 
			
		||||
        else if (!strcmp(*args, "-no_intern"))
 | 
			
		||||
            verify_flags |= OCSP_NOINTERN;
 | 
			
		||||
        else if (!strcmp(*args, "-badsig"))
 | 
			
		||||
            badsig = 1;
 | 
			
		||||
        else if (!strcmp(*args, "-text")) {
 | 
			
		||||
            req_text = 1;
 | 
			
		||||
            resp_text = 1;
 | 
			
		||||
@@ -326,10 +280,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                CApath = *args;
 | 
			
		||||
            } else
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
        } else if (args_verify(&args, NULL, &badarg, bio_err, &vpm)) {
 | 
			
		||||
            if (badarg)
 | 
			
		||||
                goto end;
 | 
			
		||||
            continue;
 | 
			
		||||
        } else if (!strcmp(*args, "-validity_period")) {
 | 
			
		||||
            if (args[1]) {
 | 
			
		||||
                args++;
 | 
			
		||||
@@ -393,22 +343,18 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                                 NULL, e, "certificate");
 | 
			
		||||
                if (!cert)
 | 
			
		||||
                    goto end;
 | 
			
		||||
                if (!cert_id_md)
 | 
			
		||||
                    cert_id_md = EVP_sha1();
 | 
			
		||||
                if (!add_ocsp_cert(&req, cert, cert_id_md, issuer, ids))
 | 
			
		||||
                if (!add_ocsp_cert(&req, cert, issuer, ids))
 | 
			
		||||
                    goto end;
 | 
			
		||||
                if (!sk_OPENSSL_STRING_push(reqnames, *args))
 | 
			
		||||
                if (!sk_push(reqnames, *args))
 | 
			
		||||
                    goto end;
 | 
			
		||||
            } else
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
        } else if (!strcmp(*args, "-serial")) {
 | 
			
		||||
            if (args[1]) {
 | 
			
		||||
                args++;
 | 
			
		||||
                if (!cert_id_md)
 | 
			
		||||
                    cert_id_md = EVP_sha1();
 | 
			
		||||
                if (!add_ocsp_serial(&req, *args, cert_id_md, issuer, ids))
 | 
			
		||||
                if (!add_ocsp_serial(&req, *args, issuer, ids))
 | 
			
		||||
                    goto end;
 | 
			
		||||
                if (!sk_OPENSSL_STRING_push(reqnames, *args))
 | 
			
		||||
                if (!sk_push(reqnames, *args))
 | 
			
		||||
                    goto end;
 | 
			
		||||
            } else
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
@@ -475,17 +421,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                rcertfile = *args;
 | 
			
		||||
            } else
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
        } else if (!strcmp(*args, "-rmd")) {
 | 
			
		||||
            if (args[1]) {
 | 
			
		||||
                args++;
 | 
			
		||||
                rsign_md = EVP_get_digestbyname(*args);
 | 
			
		||||
                if (!rsign_md)
 | 
			
		||||
                    badarg = 1;
 | 
			
		||||
            } else
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
        } else if ((cert_id_md = EVP_get_digestbyname((*args) + 1)) == NULL) {
 | 
			
		||||
        } else
 | 
			
		||||
            badarg = 1;
 | 
			
		||||
        }
 | 
			
		||||
        args++;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
@@ -497,94 +434,85 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        BIO_printf(bio_err, "OCSP utility\n");
 | 
			
		||||
        BIO_printf(bio_err, "Usage ocsp [options]\n");
 | 
			
		||||
        BIO_printf(bio_err, "where options are\n");
 | 
			
		||||
        BIO_printf(bio_err, "-out file            output filename\n");
 | 
			
		||||
        BIO_printf(bio_err, "-issuer file         issuer certificate\n");
 | 
			
		||||
        BIO_printf(bio_err, "-cert file           certificate to check\n");
 | 
			
		||||
        BIO_printf(bio_err, "-serial n            serial number to check\n");
 | 
			
		||||
        BIO_printf(bio_err, "-out file          output filename\n");
 | 
			
		||||
        BIO_printf(bio_err, "-issuer file       issuer certificate\n");
 | 
			
		||||
        BIO_printf(bio_err, "-cert file         certificate to check\n");
 | 
			
		||||
        BIO_printf(bio_err, "-serial n          serial number to check\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-signer file         certificate to sign OCSP request with\n");
 | 
			
		||||
                   "-signer file       certificate to sign OCSP request with\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-signkey file        private key to sign OCSP request with\n");
 | 
			
		||||
                   "-signkey file      private key to sign OCSP request with\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-sign_other file     additional certificates to include in signed request\n");
 | 
			
		||||
                   "-sign_other file   additional certificates to include in signed request\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-no_certs            don't include any certificates in signed request\n");
 | 
			
		||||
                   "-no_certs          don't include any certificates in signed request\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-req_text            print text form of request\n");
 | 
			
		||||
                   "-req_text          print text form of request\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-resp_text           print text form of response\n");
 | 
			
		||||
                   "-resp_text         print text form of response\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-text                print text form of request and response\n");
 | 
			
		||||
                   "-text              print text form of request and response\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-reqout file         write DER encoded OCSP request to \"file\"\n");
 | 
			
		||||
                   "-reqout file       write DER encoded OCSP request to \"file\"\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-respout file        write DER encoded OCSP reponse to \"file\"\n");
 | 
			
		||||
                   "-respout file      write DER encoded OCSP reponse to \"file\"\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-reqin file          read DER encoded OCSP request from \"file\"\n");
 | 
			
		||||
                   "-reqin file        read DER encoded OCSP request from \"file\"\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-respin file         read DER encoded OCSP reponse from \"file\"\n");
 | 
			
		||||
                   "-respin file       read DER encoded OCSP reponse from \"file\"\n");
 | 
			
		||||
        BIO_printf(bio_err, "-nonce             add OCSP nonce to request\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-nonce               add OCSP nonce to request\n");
 | 
			
		||||
                   "-no_nonce          don't add OCSP nonce to request\n");
 | 
			
		||||
        BIO_printf(bio_err, "-url URL           OCSP responder URL\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-no_nonce            don't add OCSP nonce to request\n");
 | 
			
		||||
        BIO_printf(bio_err, "-url URL             OCSP responder URL\n");
 | 
			
		||||
                   "-host host:n       send OCSP request to host on port n\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-host host:n         send OCSP request to host on port n\n");
 | 
			
		||||
                   "-path              path to use in OCSP request\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-path                path to use in OCSP request\n");
 | 
			
		||||
                   "-CApath dir        trusted certificates directory\n");
 | 
			
		||||
        BIO_printf(bio_err, "-CAfile file       trusted certificates file\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-CApath dir          trusted certificates directory\n");
 | 
			
		||||
                   "-VAfile file       validator certificates file\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-CAfile file         trusted certificates file\n");
 | 
			
		||||
                   "-validity_period n maximum validity discrepancy in seconds\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-no_alt_chains       only ever use the first certificate chain found\n");
 | 
			
		||||
                   "-status_age n      maximum status age in seconds\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-VAfile file         validator certificates file\n");
 | 
			
		||||
                   "-noverify          don't verify response at all\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-validity_period n   maximum validity discrepancy in seconds\n");
 | 
			
		||||
                   "-verify_other file additional certificates to search for signer\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-status_age n        maximum status age in seconds\n");
 | 
			
		||||
                   "-trust_other       don't verify additional certificates\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-noverify            don't verify response at all\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-verify_other file   additional certificates to search for signer\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-trust_other         don't verify additional certificates\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-no_intern           don't search certificates contained in response for signer\n");
 | 
			
		||||
                   "-no_intern         don't search certificates contained in response for signer\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-no_signature_verify don't check signature on response\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-no_cert_verify      don't check signing certificate\n");
 | 
			
		||||
                   "-no_cert_verify    don't check signing certificate\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-no_chain            don't chain verify response\n");
 | 
			
		||||
                   "-no_chain          don't chain verify response\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-no_cert_checks      don't do additional checks on signing certificate\n");
 | 
			
		||||
                   "-no_cert_checks    don't do additional checks on signing certificate\n");
 | 
			
		||||
        BIO_printf(bio_err, "-port num          port to run responder on\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-port num            port to run responder on\n");
 | 
			
		||||
                   "-index file        certificate status index file\n");
 | 
			
		||||
        BIO_printf(bio_err, "-CA file           CA certificate\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-index file          certificate status index file\n");
 | 
			
		||||
        BIO_printf(bio_err, "-CA file             CA certificate\n");
 | 
			
		||||
                   "-rsigner file      responder certificate to sign responses with\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-rsigner file        responder certificate to sign responses with\n");
 | 
			
		||||
                   "-rkey file         responder key to sign responses with\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-rkey file           responder key to sign responses with\n");
 | 
			
		||||
                   "-rother file       other certificates to include in response\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-rother file         other certificates to include in response\n");
 | 
			
		||||
                   "-resp_no_certs     don't include any certificates in response\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-resp_no_certs       don't include any certificates in response\n");
 | 
			
		||||
                   "-nmin n            number of minutes before next update\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-nmin n              number of minutes before next update\n");
 | 
			
		||||
                   "-ndays n           number of days before next update\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-ndays n             number of days before next update\n");
 | 
			
		||||
                   "-resp_key_id       identify reponse by signing certificate key ID\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-resp_key_id         identify reponse by signing certificate key ID\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-nrequest n          number of requests to accept (default unlimited)\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-<dgst alg>          use specified digest in the request\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-timeout n           timeout connection to OCSP responder after n seconds\n");
 | 
			
		||||
                   "-nrequest n        number of requests to accept (default unlimited)\n");
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
@@ -602,10 +530,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        add_nonce = 0;
 | 
			
		||||
 | 
			
		||||
    if (!req && reqin) {
 | 
			
		||||
        if (!strcmp(reqin, "-"))
 | 
			
		||||
            derbio = BIO_new_fp(stdin, BIO_NOCLOSE);
 | 
			
		||||
        else
 | 
			
		||||
            derbio = BIO_new_file(reqin, "rb");
 | 
			
		||||
        derbio = BIO_new_file(reqin, "rb");
 | 
			
		||||
        if (!derbio) {
 | 
			
		||||
            BIO_printf(bio_err, "Error Opening OCSP request file\n");
 | 
			
		||||
            goto end;
 | 
			
		||||
@@ -690,9 +615,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                       "signer private key");
 | 
			
		||||
        if (!key)
 | 
			
		||||
            goto end;
 | 
			
		||||
 | 
			
		||||
        if (!OCSP_request_sign
 | 
			
		||||
            (req, signer, key, NULL, sign_other, sign_flags)) {
 | 
			
		||||
            (req, signer, key, EVP_sha1(), sign_other, sign_flags)) {
 | 
			
		||||
            BIO_printf(bio_err, "Error signing OCSP request\n");
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
@@ -702,10 +626,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        OCSP_REQUEST_print(out, req, 0);
 | 
			
		||||
 | 
			
		||||
    if (reqout) {
 | 
			
		||||
        if (!strcmp(reqout, "-"))
 | 
			
		||||
            derbio = BIO_new_fp(stdout, BIO_NOCLOSE);
 | 
			
		||||
        else
 | 
			
		||||
            derbio = BIO_new_file(reqout, "wb");
 | 
			
		||||
        derbio = BIO_new_file(reqout, "wb");
 | 
			
		||||
        if (!derbio) {
 | 
			
		||||
            BIO_printf(bio_err, "Error opening file %s\n", reqout);
 | 
			
		||||
            goto end;
 | 
			
		||||
@@ -730,13 +651,13 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
 | 
			
		||||
    if (rdb) {
 | 
			
		||||
        i = make_ocsp_response(&resp, req, rdb, rca_cert, rsigner, rkey,
 | 
			
		||||
                               rsign_md, rother, rflags, nmin, ndays, badsig);
 | 
			
		||||
                               rother, rflags, nmin, ndays);
 | 
			
		||||
        if (cbio)
 | 
			
		||||
            send_ocsp_response(cbio, resp);
 | 
			
		||||
    } else if (host) {
 | 
			
		||||
# ifndef OPENSSL_NO_SOCK
 | 
			
		||||
        resp = process_responder(bio_err, req, host, path,
 | 
			
		||||
                                 port, use_ssl, headers, req_timeout);
 | 
			
		||||
                                 port, use_ssl, req_timeout);
 | 
			
		||||
        if (!resp)
 | 
			
		||||
            goto end;
 | 
			
		||||
# else
 | 
			
		||||
@@ -745,10 +666,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        goto end;
 | 
			
		||||
# endif
 | 
			
		||||
    } else if (respin) {
 | 
			
		||||
        if (!strcmp(respin, "-"))
 | 
			
		||||
            derbio = BIO_new_fp(stdin, BIO_NOCLOSE);
 | 
			
		||||
        else
 | 
			
		||||
            derbio = BIO_new_file(respin, "rb");
 | 
			
		||||
        derbio = BIO_new_file(respin, "rb");
 | 
			
		||||
        if (!derbio) {
 | 
			
		||||
            BIO_printf(bio_err, "Error Opening OCSP response file\n");
 | 
			
		||||
            goto end;
 | 
			
		||||
@@ -768,10 +686,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
 done_resp:
 | 
			
		||||
 | 
			
		||||
    if (respout) {
 | 
			
		||||
        if (!strcmp(respout, "-"))
 | 
			
		||||
            derbio = BIO_new_fp(stdout, BIO_NOCLOSE);
 | 
			
		||||
        else
 | 
			
		||||
            derbio = BIO_new_file(respout, "wb");
 | 
			
		||||
        derbio = BIO_new_file(respout, "wb");
 | 
			
		||||
        if (!derbio) {
 | 
			
		||||
            BIO_printf(bio_err, "Error opening file %s\n", respout);
 | 
			
		||||
            goto end;
 | 
			
		||||
@@ -808,10 +723,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            resp = NULL;
 | 
			
		||||
            goto redo_accept;
 | 
			
		||||
        }
 | 
			
		||||
        ret = 0;
 | 
			
		||||
        goto end;
 | 
			
		||||
    } else if (ridx_filename) {
 | 
			
		||||
        ret = 0;
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
@@ -819,8 +730,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        store = setup_verify(bio_err, CAfile, CApath);
 | 
			
		||||
    if (!store)
 | 
			
		||||
        goto end;
 | 
			
		||||
    if (vpm)
 | 
			
		||||
        X509_STORE_set1_param(store, vpm);
 | 
			
		||||
    if (verify_certfile) {
 | 
			
		||||
        verify_other = load_certs(bio_err, verify_certfile, FORMAT_PEM,
 | 
			
		||||
                                  NULL, e, "validator certificate");
 | 
			
		||||
@@ -835,38 +744,37 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    ret = 0;
 | 
			
		||||
 | 
			
		||||
    if (!noverify) {
 | 
			
		||||
        if (req && ((i = OCSP_check_nonce(req, bs)) <= 0)) {
 | 
			
		||||
            if (i == -1)
 | 
			
		||||
                BIO_printf(bio_err, "WARNING: no nonce in response\n");
 | 
			
		||||
            else {
 | 
			
		||||
                BIO_printf(bio_err, "Nonce Verify error\n");
 | 
			
		||||
                ret = 1;
 | 
			
		||||
                goto end;
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        i = OCSP_basic_verify(bs, verify_other, store, verify_flags);
 | 
			
		||||
        if (i < 0)
 | 
			
		||||
            i = OCSP_basic_verify(bs, NULL, store, 0);
 | 
			
		||||
 | 
			
		||||
        if (i <= 0) {
 | 
			
		||||
            BIO_printf(bio_err, "Response Verify Failure\n");
 | 
			
		||||
            ERR_print_errors(bio_err);
 | 
			
		||||
            ret = 1;
 | 
			
		||||
        } else
 | 
			
		||||
            BIO_printf(bio_err, "Response verify OK\n");
 | 
			
		||||
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (!print_ocsp_summary(out, bs, req, reqnames, ids, nsec, maxage))
 | 
			
		||||
        ret = 1;
 | 
			
		||||
        goto end;
 | 
			
		||||
 | 
			
		||||
    ret = 0;
 | 
			
		||||
 | 
			
		||||
 end:
 | 
			
		||||
    ERR_print_errors(bio_err);
 | 
			
		||||
    X509_free(signer);
 | 
			
		||||
    X509_STORE_free(store);
 | 
			
		||||
    if (vpm)
 | 
			
		||||
        X509_VERIFY_PARAM_free(vpm);
 | 
			
		||||
    EVP_PKEY_free(key);
 | 
			
		||||
    EVP_PKEY_free(rkey);
 | 
			
		||||
    X509_free(issuer);
 | 
			
		||||
@@ -880,11 +788,10 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    OCSP_REQUEST_free(req);
 | 
			
		||||
    OCSP_RESPONSE_free(resp);
 | 
			
		||||
    OCSP_BASICRESP_free(bs);
 | 
			
		||||
    sk_OPENSSL_STRING_free(reqnames);
 | 
			
		||||
    sk_free(reqnames);
 | 
			
		||||
    sk_OCSP_CERTID_free(ids);
 | 
			
		||||
    sk_X509_pop_free(sign_other, X509_free);
 | 
			
		||||
    sk_X509_pop_free(verify_other, X509_free);
 | 
			
		||||
    sk_CONF_VALUE_pop_free(headers, X509V3_conf_free);
 | 
			
		||||
 | 
			
		||||
    if (thost)
 | 
			
		||||
        OPENSSL_free(thost);
 | 
			
		||||
@@ -896,8 +803,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    OPENSSL_EXIT(ret);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert,
 | 
			
		||||
                         const EVP_MD *cert_id_md, X509 *issuer,
 | 
			
		||||
static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, X509 *issuer,
 | 
			
		||||
                         STACK_OF(OCSP_CERTID) *ids)
 | 
			
		||||
{
 | 
			
		||||
    OCSP_CERTID *id;
 | 
			
		||||
@@ -909,7 +815,7 @@ static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert,
 | 
			
		||||
        *req = OCSP_REQUEST_new();
 | 
			
		||||
    if (!*req)
 | 
			
		||||
        goto err;
 | 
			
		||||
    id = OCSP_cert_to_id(cert_id_md, cert, issuer);
 | 
			
		||||
    id = OCSP_cert_to_id(NULL, cert, issuer);
 | 
			
		||||
    if (!id || !sk_OCSP_CERTID_push(ids, id))
 | 
			
		||||
        goto err;
 | 
			
		||||
    if (!OCSP_request_add0_id(*req, id))
 | 
			
		||||
@@ -921,8 +827,7 @@ static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert,
 | 
			
		||||
    return 0;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static int add_ocsp_serial(OCSP_REQUEST **req, char *serial,
 | 
			
		||||
                           const EVP_MD *cert_id_md, X509 *issuer,
 | 
			
		||||
static int add_ocsp_serial(OCSP_REQUEST **req, char *serial, X509 *issuer,
 | 
			
		||||
                           STACK_OF(OCSP_CERTID) *ids)
 | 
			
		||||
{
 | 
			
		||||
    OCSP_CERTID *id;
 | 
			
		||||
@@ -944,7 +849,7 @@ static int add_ocsp_serial(OCSP_REQUEST **req, char *serial,
 | 
			
		||||
        BIO_printf(bio_err, "Error converting serial number %s\n", serial);
 | 
			
		||||
        return 0;
 | 
			
		||||
    }
 | 
			
		||||
    id = OCSP_cert_id_new(cert_id_md, iname, ikey, sno);
 | 
			
		||||
    id = OCSP_cert_id_new(EVP_sha1(), iname, ikey, sno);
 | 
			
		||||
    ASN1_INTEGER_free(sno);
 | 
			
		||||
    if (!id || !sk_OCSP_CERTID_push(ids, id))
 | 
			
		||||
        goto err;
 | 
			
		||||
@@ -958,9 +863,8 @@ static int add_ocsp_serial(OCSP_REQUEST **req, char *serial,
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static int print_ocsp_summary(BIO *out, OCSP_BASICRESP *bs, OCSP_REQUEST *req,
 | 
			
		||||
                              STACK_OF(OPENSSL_STRING) *names,
 | 
			
		||||
                              STACK_OF(OCSP_CERTID) *ids, long nsec,
 | 
			
		||||
                              long maxage)
 | 
			
		||||
                              STACK * names, STACK_OF(OCSP_CERTID) *ids,
 | 
			
		||||
                              long nsec, long maxage)
 | 
			
		||||
{
 | 
			
		||||
    OCSP_CERTID *id;
 | 
			
		||||
    char *name;
 | 
			
		||||
@@ -970,13 +874,12 @@ static int print_ocsp_summary(BIO *out, OCSP_BASICRESP *bs, OCSP_REQUEST *req,
 | 
			
		||||
 | 
			
		||||
    ASN1_GENERALIZEDTIME *rev, *thisupd, *nextupd;
 | 
			
		||||
 | 
			
		||||
    if (!bs || !req || !sk_OPENSSL_STRING_num(names)
 | 
			
		||||
        || !sk_OCSP_CERTID_num(ids))
 | 
			
		||||
    if (!bs || !req || !sk_num(names) || !sk_OCSP_CERTID_num(ids))
 | 
			
		||||
        return 1;
 | 
			
		||||
 | 
			
		||||
    for (i = 0; i < sk_OCSP_CERTID_num(ids); i++) {
 | 
			
		||||
        id = sk_OCSP_CERTID_value(ids, i);
 | 
			
		||||
        name = sk_OPENSSL_STRING_value(names, i);
 | 
			
		||||
        name = sk_value(names, i);
 | 
			
		||||
        BIO_printf(out, "%s: ", name);
 | 
			
		||||
 | 
			
		||||
        if (!OCSP_resp_find_status(bs, id, &status, &reason,
 | 
			
		||||
@@ -1021,9 +924,8 @@ static int print_ocsp_summary(BIO *out, OCSP_BASICRESP *bs, OCSP_REQUEST *req,
 | 
			
		||||
 | 
			
		||||
static int make_ocsp_response(OCSP_RESPONSE **resp, OCSP_REQUEST *req,
 | 
			
		||||
                              CA_DB *db, X509 *ca, X509 *rcert,
 | 
			
		||||
                              EVP_PKEY *rkey, const EVP_MD *rmd,
 | 
			
		||||
                              STACK_OF(X509) *rother, unsigned long flags,
 | 
			
		||||
                              int nmin, int ndays, int badsig)
 | 
			
		||||
                              EVP_PKEY *rkey, STACK_OF(X509) *rother,
 | 
			
		||||
                              unsigned long flags, int nmin, int ndays)
 | 
			
		||||
{
 | 
			
		||||
    ASN1_TIME *thisupd = NULL, *nextupd = NULL;
 | 
			
		||||
    OCSP_CERTID *cid, *ca_id = NULL;
 | 
			
		||||
@@ -1038,33 +940,20 @@ static int make_ocsp_response(OCSP_RESPONSE **resp, OCSP_REQUEST *req,
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    ca_id = OCSP_cert_to_id(EVP_sha1(), NULL, ca);
 | 
			
		||||
 | 
			
		||||
    bs = OCSP_BASICRESP_new();
 | 
			
		||||
    thisupd = X509_gmtime_adj(NULL, 0);
 | 
			
		||||
    if (ndays != -1)
 | 
			
		||||
        nextupd = X509_time_adj_ex(NULL, ndays, nmin * 60, NULL);
 | 
			
		||||
        nextupd = X509_gmtime_adj(NULL, nmin * 60 + ndays * 3600 * 24);
 | 
			
		||||
 | 
			
		||||
    /* Examine each certificate id in the request */
 | 
			
		||||
    for (i = 0; i < id_count; i++) {
 | 
			
		||||
        OCSP_ONEREQ *one;
 | 
			
		||||
        ASN1_INTEGER *serial;
 | 
			
		||||
        char **inf;
 | 
			
		||||
        ASN1_OBJECT *cert_id_md_oid;
 | 
			
		||||
        const EVP_MD *cert_id_md;
 | 
			
		||||
        one = OCSP_request_onereq_get0(req, i);
 | 
			
		||||
        cid = OCSP_onereq_get0_id(one);
 | 
			
		||||
 | 
			
		||||
        OCSP_id_get0_info(NULL, &cert_id_md_oid, NULL, NULL, cid);
 | 
			
		||||
 | 
			
		||||
        cert_id_md = EVP_get_digestbyobj(cert_id_md_oid);
 | 
			
		||||
        if (!cert_id_md) {
 | 
			
		||||
            *resp = OCSP_response_create(OCSP_RESPONSE_STATUS_INTERNALERROR,
 | 
			
		||||
                                         NULL);
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
        if (ca_id)
 | 
			
		||||
            OCSP_CERTID_free(ca_id);
 | 
			
		||||
        ca_id = OCSP_cert_to_id(cert_id_md, NULL, ca);
 | 
			
		||||
 | 
			
		||||
        /* Is this request about our CA? */
 | 
			
		||||
        if (OCSP_id_issuer_cmp(ca_id, cid)) {
 | 
			
		||||
            OCSP_basic_add1_status(bs, cid,
 | 
			
		||||
@@ -1107,10 +996,7 @@ static int make_ocsp_response(OCSP_RESPONSE **resp, OCSP_REQUEST *req,
 | 
			
		||||
 | 
			
		||||
    OCSP_copy_nonce(bs, req);
 | 
			
		||||
 | 
			
		||||
    OCSP_basic_sign(bs, rcert, rkey, rmd, rother, flags);
 | 
			
		||||
 | 
			
		||||
    if (badsig)
 | 
			
		||||
        bs->signature->data[bs->signature->length - 1] ^= 0x1;
 | 
			
		||||
    OCSP_basic_sign(bs, rcert, rkey, EVP_sha1(), rother, flags);
 | 
			
		||||
 | 
			
		||||
    *resp = OCSP_response_create(OCSP_RESPONSE_STATUS_SUCCESSFUL, bs);
 | 
			
		||||
 | 
			
		||||
@@ -1146,7 +1032,7 @@ static char **lookup_serial(CA_DB *db, ASN1_INTEGER *ser)
 | 
			
		||||
 | 
			
		||||
/* Quick and dirty OCSP server: read in and parse input request */
 | 
			
		||||
 | 
			
		||||
static BIO *init_responder(const char *port)
 | 
			
		||||
static BIO *init_responder(char *port)
 | 
			
		||||
{
 | 
			
		||||
    BIO *acbio = NULL, *bufbio = NULL;
 | 
			
		||||
    bufbio = BIO_new(BIO_f_buffer());
 | 
			
		||||
@@ -1178,7 +1064,7 @@ static BIO *init_responder(const char *port)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static int do_responder(OCSP_REQUEST **preq, BIO **pcbio, BIO *acbio,
 | 
			
		||||
                        const char *port)
 | 
			
		||||
                        char *port)
 | 
			
		||||
{
 | 
			
		||||
    int have_post = 0, len;
 | 
			
		||||
    OCSP_REQUEST *req = NULL;
 | 
			
		||||
@@ -1239,13 +1125,11 @@ static int send_ocsp_response(BIO *cbio, OCSP_RESPONSE *resp)
 | 
			
		||||
    return 1;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static OCSP_RESPONSE *query_responder(BIO *err, BIO *cbio, const char *path,
 | 
			
		||||
                                      const STACK_OF(CONF_VALUE) *headers,
 | 
			
		||||
static OCSP_RESPONSE *query_responder(BIO *err, BIO *cbio, char *path,
 | 
			
		||||
                                      OCSP_REQUEST *req, int req_timeout)
 | 
			
		||||
{
 | 
			
		||||
    int fd;
 | 
			
		||||
    int rv;
 | 
			
		||||
    int i;
 | 
			
		||||
    OCSP_REQ_CTX *ctx = NULL;
 | 
			
		||||
    OCSP_RESPONSE *rsp = NULL;
 | 
			
		||||
    fd_set confds;
 | 
			
		||||
@@ -1261,12 +1145,15 @@ static OCSP_RESPONSE *query_responder(BIO *err, BIO *cbio, const char *path,
 | 
			
		||||
        return NULL;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (BIO_get_fd(cbio, &fd) < 0) {
 | 
			
		||||
        BIO_puts(bio_err, "Can't get connection fd\n");
 | 
			
		||||
    if (req_timeout == -1)
 | 
			
		||||
        return OCSP_sendreq_bio(cbio, path, req);
 | 
			
		||||
 | 
			
		||||
    if (BIO_get_fd(cbio, &fd) <= 0) {
 | 
			
		||||
        BIO_puts(err, "Can't get connection fd\n");
 | 
			
		||||
        goto err;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (req_timeout != -1 && rv <= 0) {
 | 
			
		||||
    if (rv <= 0) {
 | 
			
		||||
        FD_ZERO(&confds);
 | 
			
		||||
        openssl_fdset(fd, &confds);
 | 
			
		||||
        tv.tv_usec = 0;
 | 
			
		||||
@@ -1278,25 +1165,14 @@ static OCSP_RESPONSE *query_responder(BIO *err, BIO *cbio, const char *path,
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    ctx = OCSP_sendreq_new(cbio, path, NULL, -1);
 | 
			
		||||
    ctx = OCSP_sendreq_new(cbio, path, req, -1);
 | 
			
		||||
    if (!ctx)
 | 
			
		||||
        return NULL;
 | 
			
		||||
 | 
			
		||||
    for (i = 0; i < sk_CONF_VALUE_num(headers); i++) {
 | 
			
		||||
        CONF_VALUE *hdr = sk_CONF_VALUE_value(headers, i);
 | 
			
		||||
        if (!OCSP_REQ_CTX_add1_header(ctx, hdr->name, hdr->value))
 | 
			
		||||
            goto err;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (!OCSP_REQ_CTX_set1_req(ctx, req))
 | 
			
		||||
        goto err;
 | 
			
		||||
 | 
			
		||||
    for (;;) {
 | 
			
		||||
        rv = OCSP_sendreq_nbio(&rsp, ctx);
 | 
			
		||||
        if (rv != -1)
 | 
			
		||||
            break;
 | 
			
		||||
        if (req_timeout == -1)
 | 
			
		||||
            continue;
 | 
			
		||||
        FD_ZERO(&confds);
 | 
			
		||||
        openssl_fdset(fd, &confds);
 | 
			
		||||
        tv.tv_usec = 0;
 | 
			
		||||
@@ -1327,10 +1203,8 @@ static OCSP_RESPONSE *query_responder(BIO *err, BIO *cbio, const char *path,
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
OCSP_RESPONSE *process_responder(BIO *err, OCSP_REQUEST *req,
 | 
			
		||||
                                 const char *host, const char *path,
 | 
			
		||||
                                 const char *port, int use_ssl,
 | 
			
		||||
                                 const STACK_OF(CONF_VALUE) *headers,
 | 
			
		||||
                                 int req_timeout)
 | 
			
		||||
                                 char *host, char *path, char *port,
 | 
			
		||||
                                 int use_ssl, int req_timeout)
 | 
			
		||||
{
 | 
			
		||||
    BIO *cbio = NULL;
 | 
			
		||||
    SSL_CTX *ctx = NULL;
 | 
			
		||||
@@ -1344,7 +1218,16 @@ OCSP_RESPONSE *process_responder(BIO *err, OCSP_REQUEST *req,
 | 
			
		||||
        BIO_set_conn_port(cbio, port);
 | 
			
		||||
    if (use_ssl == 1) {
 | 
			
		||||
        BIO *sbio;
 | 
			
		||||
# if !defined(OPENSSL_NO_SSL2) && !defined(OPENSSL_NO_SSL3)
 | 
			
		||||
        ctx = SSL_CTX_new(SSLv23_client_method());
 | 
			
		||||
# elif !defined(OPENSSL_NO_SSL3)
 | 
			
		||||
        ctx = SSL_CTX_new(SSLv3_client_method());
 | 
			
		||||
# elif !defined(OPENSSL_NO_SSL2)
 | 
			
		||||
        ctx = SSL_CTX_new(SSLv2_client_method());
 | 
			
		||||
# else
 | 
			
		||||
        BIO_printf(err, "SSL is disabled\n");
 | 
			
		||||
        goto end;
 | 
			
		||||
# endif
 | 
			
		||||
        if (ctx == NULL) {
 | 
			
		||||
            BIO_printf(err, "Error creating SSL context.\n");
 | 
			
		||||
            goto end;
 | 
			
		||||
@@ -1353,14 +1236,14 @@ OCSP_RESPONSE *process_responder(BIO *err, OCSP_REQUEST *req,
 | 
			
		||||
        sbio = BIO_new_ssl(ctx, 1);
 | 
			
		||||
        cbio = BIO_push(sbio, cbio);
 | 
			
		||||
    }
 | 
			
		||||
    resp = query_responder(err, cbio, path, headers, req, req_timeout);
 | 
			
		||||
    resp = query_responder(err, cbio, path, req, req_timeout);
 | 
			
		||||
    if (!resp)
 | 
			
		||||
        BIO_printf(bio_err, "Error querying OCSP responder\n");
 | 
			
		||||
 end:
 | 
			
		||||
    if (cbio)
 | 
			
		||||
        BIO_free_all(cbio);
 | 
			
		||||
    if (ctx)
 | 
			
		||||
        SSL_CTX_free(ctx);
 | 
			
		||||
    if (cbio)
 | 
			
		||||
        BIO_free_all(cbio);
 | 
			
		||||
    return resp;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -21,17 +21,12 @@ oid_section		= new_oids
 | 
			
		||||
 | 
			
		||||
[ new_oids ]
 | 
			
		||||
 | 
			
		||||
# We can add new OIDs in here for use by 'ca', 'req' and 'ts'.
 | 
			
		||||
# We can add new OIDs in here for use by 'ca' and 'req'.
 | 
			
		||||
# Add a simple OID like this:
 | 
			
		||||
# testoid1=1.2.3.4
 | 
			
		||||
# Or use config file substitution like this:
 | 
			
		||||
# testoid2=${testoid1}.5.6
 | 
			
		||||
 | 
			
		||||
# Policies used by the TSA examples.
 | 
			
		||||
tsa_policy1 = 1.2.3.4.1
 | 
			
		||||
tsa_policy2 = 1.2.3.4.5.6
 | 
			
		||||
tsa_policy3 = 1.2.3.4.5.7
 | 
			
		||||
 | 
			
		||||
####################################################################
 | 
			
		||||
[ ca ]
 | 
			
		||||
default_ca	= CA_default		# The default ca section
 | 
			
		||||
@@ -72,7 +67,7 @@ cert_opt 	= ca_default		# Certificate field options
 | 
			
		||||
 | 
			
		||||
default_days	= 365			# how long to certify for
 | 
			
		||||
default_crl_days= 30			# how long before next CRL
 | 
			
		||||
default_md	= default		# use public key default MD
 | 
			
		||||
default_md	= sha1			# which md to use.
 | 
			
		||||
preserve	= no			# keep passed DN ordering
 | 
			
		||||
 | 
			
		||||
# A few difference way of specifying how similar the request should look
 | 
			
		||||
@@ -103,7 +98,7 @@ emailAddress		= optional
 | 
			
		||||
 | 
			
		||||
####################################################################
 | 
			
		||||
[ req ]
 | 
			
		||||
default_bits		= 2048
 | 
			
		||||
default_bits		= 1024
 | 
			
		||||
default_keyfile 	= privkey.pem
 | 
			
		||||
distinguished_name	= req_distinguished_name
 | 
			
		||||
attributes		= req_attributes
 | 
			
		||||
@@ -115,12 +110,13 @@ x509_extensions	= v3_ca	# The extentions to add to the self signed cert
 | 
			
		||||
 | 
			
		||||
# This sets a mask for permitted string types. There are several options. 
 | 
			
		||||
# default: PrintableString, T61String, BMPString.
 | 
			
		||||
# pkix	 : PrintableString, BMPString (PKIX recommendation before 2004)
 | 
			
		||||
# utf8only: only UTF8Strings (PKIX recommendation after 2004).
 | 
			
		||||
# pkix	 : PrintableString, BMPString.
 | 
			
		||||
# utf8only: only UTF8Strings.
 | 
			
		||||
# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
 | 
			
		||||
# MASK:XXXX a literal mask value.
 | 
			
		||||
# WARNING: ancient versions of Netscape crash on BMPStrings or UTF8Strings.
 | 
			
		||||
string_mask = utf8only
 | 
			
		||||
# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings
 | 
			
		||||
# so use this option with caution!
 | 
			
		||||
string_mask = nombstr
 | 
			
		||||
 | 
			
		||||
# req_extensions = v3_req # The extensions to add to a certificate request
 | 
			
		||||
 | 
			
		||||
@@ -211,9 +207,6 @@ authorityKeyIdentifier=keyid,issuer
 | 
			
		||||
#nsCaPolicyUrl
 | 
			
		||||
#nsSslServerName
 | 
			
		||||
 | 
			
		||||
# This is required for TSA certificates.
 | 
			
		||||
# extendedKeyUsage = critical,timeStamping
 | 
			
		||||
 | 
			
		||||
[ v3_req ]
 | 
			
		||||
 | 
			
		||||
# Extensions to add to a certificate request
 | 
			
		||||
@@ -231,7 +224,7 @@ keyUsage = nonRepudiation, digitalSignature, keyEncipherment
 | 
			
		||||
 | 
			
		||||
subjectKeyIdentifier=hash
 | 
			
		||||
 | 
			
		||||
authorityKeyIdentifier=keyid:always,issuer
 | 
			
		||||
authorityKeyIdentifier=keyid:always,issuer:always
 | 
			
		||||
 | 
			
		||||
# This is what PKIX recommends but some broken software chokes on critical
 | 
			
		||||
# extensions.
 | 
			
		||||
@@ -264,7 +257,7 @@ basicConstraints = CA:true
 | 
			
		||||
# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
 | 
			
		||||
 | 
			
		||||
# issuerAltName=issuer:copy
 | 
			
		||||
authorityKeyIdentifier=keyid:always
 | 
			
		||||
authorityKeyIdentifier=keyid:always,issuer:always
 | 
			
		||||
 | 
			
		||||
[ proxy_cert_ext ]
 | 
			
		||||
# These extensions should be added when creating a proxy certificate
 | 
			
		||||
@@ -297,7 +290,7 @@ nsComment			= "OpenSSL Generated Certificate"
 | 
			
		||||
 | 
			
		||||
# PKIX recommendations harmless if included in all certificates.
 | 
			
		||||
subjectKeyIdentifier=hash
 | 
			
		||||
authorityKeyIdentifier=keyid,issuer
 | 
			
		||||
authorityKeyIdentifier=keyid,issuer:always
 | 
			
		||||
 | 
			
		||||
# This stuff is for subjectAltName and issuerAltname.
 | 
			
		||||
# Import the email address.
 | 
			
		||||
@@ -318,33 +311,3 @@ authorityKeyIdentifier=keyid,issuer
 | 
			
		||||
 | 
			
		||||
# This really needs to be in place for it to be a proxy certificate.
 | 
			
		||||
proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
 | 
			
		||||
 | 
			
		||||
####################################################################
 | 
			
		||||
[ tsa ]
 | 
			
		||||
 | 
			
		||||
default_tsa = tsa_config1	# the default TSA section
 | 
			
		||||
 | 
			
		||||
[ tsa_config1 ]
 | 
			
		||||
 | 
			
		||||
# These are used by the TSA reply generation only.
 | 
			
		||||
dir		= sys\$disk:[.demoCA		# TSA root directory
 | 
			
		||||
serial		= $dir]tsaserial.	# The current serial number (mandatory)
 | 
			
		||||
crypto_device	= builtin		# OpenSSL engine to use for signing
 | 
			
		||||
signer_cert	= $dir/tsacert.pem 	# The TSA signing certificate
 | 
			
		||||
					# (optional)
 | 
			
		||||
certs		= $dir.cacert.pem]	# Certificate chain to include in reply
 | 
			
		||||
					# (optional)
 | 
			
		||||
signer_key	= $dir/private/tsakey.pem # The TSA private key (optional)
 | 
			
		||||
 | 
			
		||||
default_policy	= tsa_policy1		# Policy if request did not specify it
 | 
			
		||||
					# (optional)
 | 
			
		||||
other_policies	= tsa_policy2, tsa_policy3	# acceptable policies (optional)
 | 
			
		||||
digests		= md5, sha1		# Acceptable message digests (mandatory)
 | 
			
		||||
accuracy	= secs:1, millisecs:500, microsecs:100	# (optional)
 | 
			
		||||
clock_precision_digits  = 0	# number of digits after dot. (optional)
 | 
			
		||||
ordering		= yes	# Is ordering defined for timestamps?
 | 
			
		||||
				# (optional, default: no)
 | 
			
		||||
tsa_name		= yes	# Must the TSA name be included in the reply?
 | 
			
		||||
				# (optional, default: no)
 | 
			
		||||
ess_cert_id_chain	= no	# Must the ESS cert id chain be included?
 | 
			
		||||
				# (optional, default: no)
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										281
									
								
								apps/openssl.c
									
									
									
									
									
								
							
							
						
						
									
										281
									
								
								apps/openssl.c
									
									
									
									
									
								
							@@ -117,7 +117,6 @@
 | 
			
		||||
#include "apps.h"
 | 
			
		||||
#include <openssl/bio.h>
 | 
			
		||||
#include <openssl/crypto.h>
 | 
			
		||||
#include <openssl/rand.h>
 | 
			
		||||
#include <openssl/lhash.h>
 | 
			
		||||
#include <openssl/conf.h>
 | 
			
		||||
#include <openssl/x509.h>
 | 
			
		||||
@@ -131,9 +130,6 @@
 | 
			
		||||
#include "progs.h"
 | 
			
		||||
#include "s_apps.h"
 | 
			
		||||
#include <openssl/err.h>
 | 
			
		||||
#ifdef OPENSSL_FIPS
 | 
			
		||||
# include <openssl/fips.h>
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
/*
 | 
			
		||||
 * The LHASH callbacks ("hash" & "cmp") have been replaced by functions with
 | 
			
		||||
@@ -142,17 +138,19 @@
 | 
			
		||||
 * macro-generated wrapper functions.
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
static LHASH_OF(FUNCTION) *prog_init(void);
 | 
			
		||||
static int do_cmd(LHASH_OF(FUNCTION) *prog, int argc, char *argv[]);
 | 
			
		||||
static void list_pkey(BIO *out);
 | 
			
		||||
static void list_cipher(BIO *out);
 | 
			
		||||
static void list_md(BIO *out);
 | 
			
		||||
/* static unsigned long MS_CALLBACK hash(FUNCTION *a); */
 | 
			
		||||
static unsigned long MS_CALLBACK hash(const void *a_void);
 | 
			
		||||
/* static int MS_CALLBACK cmp(FUNCTION *a,FUNCTION *b); */
 | 
			
		||||
static int MS_CALLBACK cmp(const void *a_void, const void *b_void);
 | 
			
		||||
static LHASH *prog_init(void);
 | 
			
		||||
static int do_cmd(LHASH *prog, int argc, char *argv[]);
 | 
			
		||||
char *default_config_file = NULL;
 | 
			
		||||
 | 
			
		||||
/* Make sure there is only one when MONOLITH is defined */
 | 
			
		||||
#ifdef MONOLITH
 | 
			
		||||
CONF *config = NULL;
 | 
			
		||||
BIO *bio_err = NULL;
 | 
			
		||||
int in_FIPS_mode = 0;
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
static void lock_dbg_cb(int mode, int type, const char *file, int line)
 | 
			
		||||
@@ -209,13 +207,7 @@ static void lock_dbg_cb(int mode, int type, const char *file, int line)
 | 
			
		||||
    }
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
#if defined( OPENSSL_SYS_VMS) && (__INITIAL_POINTER_SIZE == 64)
 | 
			
		||||
# define ARGV _Argv
 | 
			
		||||
#else
 | 
			
		||||
# define ARGV Argv
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
int main(int Argc, char *ARGV[])
 | 
			
		||||
int main(int Argc, char *Argv[])
 | 
			
		||||
{
 | 
			
		||||
    ARGS arg;
 | 
			
		||||
#define PROG_NAME_SIZE  39
 | 
			
		||||
@@ -227,63 +219,28 @@ int main(int Argc, char *ARGV[])
 | 
			
		||||
    int n, i, ret = 0;
 | 
			
		||||
    int argc;
 | 
			
		||||
    char **argv, *p;
 | 
			
		||||
    LHASH_OF(FUNCTION) *prog = NULL;
 | 
			
		||||
    LHASH *prog = NULL;
 | 
			
		||||
    long errline;
 | 
			
		||||
 | 
			
		||||
#if defined( OPENSSL_SYS_VMS) && (__INITIAL_POINTER_SIZE == 64)
 | 
			
		||||
    /*-
 | 
			
		||||
     * 2011-03-22 SMS.
 | 
			
		||||
     * If we have 32-bit pointers everywhere, then we're safe, and
 | 
			
		||||
     * we bypass this mess, as on non-VMS systems.  (See ARGV,
 | 
			
		||||
     * above.)
 | 
			
		||||
     * Problem 1: Compaq/HP C before V7.3 always used 32-bit
 | 
			
		||||
     * pointers for argv[].
 | 
			
		||||
     * Fix 1: For a 32-bit argv[], when we're using 64-bit pointers
 | 
			
		||||
     * everywhere else, we always allocate and use a 64-bit
 | 
			
		||||
     * duplicate of argv[].
 | 
			
		||||
     * Problem 2: Compaq/HP C V7.3 (Alpha, IA64) before ECO1 failed
 | 
			
		||||
     * to NULL-terminate a 64-bit argv[].  (As this was written, the
 | 
			
		||||
     * compiler ECO was available only on IA64.)
 | 
			
		||||
     * Fix 2: Unless advised not to (VMS_TRUST_ARGV), we test a
 | 
			
		||||
     * 64-bit argv[argc] for NULL, and, if necessary, use a
 | 
			
		||||
     * (properly) NULL-terminated (64-bit) duplicate of argv[].
 | 
			
		||||
     * The same code is used in either case to duplicate argv[].
 | 
			
		||||
     * Some of these decisions could be handled in preprocessing,
 | 
			
		||||
     * but the code tends to get even uglier, and the penalty for
 | 
			
		||||
     * deciding at compile- or run-time is tiny.
 | 
			
		||||
     */
 | 
			
		||||
    char **Argv = NULL;
 | 
			
		||||
    int free_Argv = 0;
 | 
			
		||||
 | 
			
		||||
    if ((sizeof(_Argv) < 8)     /* 32-bit argv[]. */
 | 
			
		||||
# if !defined( VMS_TRUST_ARGV)
 | 
			
		||||
        || (_Argv[Argc] != NULL) /* Untrusted argv[argc] not NULL. */
 | 
			
		||||
# endif
 | 
			
		||||
        ) {
 | 
			
		||||
        int i;
 | 
			
		||||
        Argv = OPENSSL_malloc((Argc + 1) * sizeof(char *));
 | 
			
		||||
        if (Argv == NULL) {
 | 
			
		||||
            ret = -1;
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
        for (i = 0; i < Argc; i++)
 | 
			
		||||
            Argv[i] = _Argv[i];
 | 
			
		||||
        Argv[Argc] = NULL;      /* Certain NULL termination. */
 | 
			
		||||
        free_Argv = 1;
 | 
			
		||||
    } else {
 | 
			
		||||
        /*
 | 
			
		||||
         * Use the known-good 32-bit argv[] (which needs the type cast to
 | 
			
		||||
         * satisfy the compiler), or the trusted or tested-good 64-bit argv[]
 | 
			
		||||
         * as-is.
 | 
			
		||||
         */
 | 
			
		||||
        Argv = (char **)_Argv;
 | 
			
		||||
    }
 | 
			
		||||
#endif                          /* defined( OPENSSL_SYS_VMS) &&
 | 
			
		||||
                                 * (__INITIAL_POINTER_SIZE == 64) */
 | 
			
		||||
 | 
			
		||||
    arg.data = NULL;
 | 
			
		||||
    arg.count = 0;
 | 
			
		||||
 | 
			
		||||
    in_FIPS_mode = 0;
 | 
			
		||||
 | 
			
		||||
    if (getenv("OPENSSL_FIPS")) {
 | 
			
		||||
#ifdef OPENSSL_FIPS
 | 
			
		||||
        if (!FIPS_mode_set(1)) {
 | 
			
		||||
            ERR_load_crypto_strings();
 | 
			
		||||
            ERR_print_errors(BIO_new_fp(stderr, BIO_NOCLOSE));
 | 
			
		||||
            EXIT(1);
 | 
			
		||||
        }
 | 
			
		||||
        in_FIPS_mode = 1;
 | 
			
		||||
#else
 | 
			
		||||
        fprintf(stderr, "FIPS mode not supported.\n");
 | 
			
		||||
        EXIT(1);
 | 
			
		||||
#endif
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (bio_err == NULL)
 | 
			
		||||
        if ((bio_err = BIO_new(BIO_s_file())) != NULL)
 | 
			
		||||
            BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
 | 
			
		||||
@@ -308,19 +265,6 @@ int main(int Argc, char *ARGV[])
 | 
			
		||||
        CRYPTO_set_locking_callback(lock_dbg_cb);
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (getenv("OPENSSL_FIPS")) {
 | 
			
		||||
#ifdef OPENSSL_FIPS
 | 
			
		||||
        if (!FIPS_mode_set(1)) {
 | 
			
		||||
            ERR_load_crypto_strings();
 | 
			
		||||
            ERR_print_errors(BIO_new_fp(stderr, BIO_NOCLOSE));
 | 
			
		||||
            EXIT(1);
 | 
			
		||||
        }
 | 
			
		||||
#else
 | 
			
		||||
        fprintf(stderr, "FIPS mode not supported.\n");
 | 
			
		||||
        EXIT(1);
 | 
			
		||||
#endif
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    apps_startup();
 | 
			
		||||
 | 
			
		||||
    /* Lets load up our environment a little */
 | 
			
		||||
@@ -335,17 +279,9 @@ int main(int Argc, char *ARGV[])
 | 
			
		||||
    config = NCONF_new(NULL);
 | 
			
		||||
    i = NCONF_load(config, p, &errline);
 | 
			
		||||
    if (i == 0) {
 | 
			
		||||
        if (ERR_GET_REASON(ERR_peek_last_error())
 | 
			
		||||
            == CONF_R_NO_SUCH_FILE) {
 | 
			
		||||
            BIO_printf(bio_err, "WARNING: can't open config file: %s\n", p);
 | 
			
		||||
            ERR_clear_error();
 | 
			
		||||
            NCONF_free(config);
 | 
			
		||||
            config = NULL;
 | 
			
		||||
        } else {
 | 
			
		||||
            ERR_print_errors(bio_err);
 | 
			
		||||
            NCONF_free(config);
 | 
			
		||||
            exit(1);
 | 
			
		||||
        }
 | 
			
		||||
        NCONF_free(config);
 | 
			
		||||
        config = NULL;
 | 
			
		||||
        ERR_clear_error();
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    prog = prog_init();
 | 
			
		||||
@@ -354,7 +290,7 @@ int main(int Argc, char *ARGV[])
 | 
			
		||||
    program_name(Argv[0], pname, sizeof pname);
 | 
			
		||||
 | 
			
		||||
    f.name = pname;
 | 
			
		||||
    fp = lh_FUNCTION_retrieve(prog, &f);
 | 
			
		||||
    fp = (FUNCTION *) lh_retrieve(prog, &f);
 | 
			
		||||
    if (fp != NULL) {
 | 
			
		||||
        Argv[0] = pname;
 | 
			
		||||
        ret = fp->func(Argc, Argv);
 | 
			
		||||
@@ -424,34 +360,25 @@ int main(int Argc, char *ARGV[])
 | 
			
		||||
        config = NULL;
 | 
			
		||||
    }
 | 
			
		||||
    if (prog != NULL)
 | 
			
		||||
        lh_FUNCTION_free(prog);
 | 
			
		||||
        lh_free(prog);
 | 
			
		||||
    if (arg.data != NULL)
 | 
			
		||||
        OPENSSL_free(arg.data);
 | 
			
		||||
 | 
			
		||||
#if defined( OPENSSL_SYS_VMS) && (__INITIAL_POINTER_SIZE == 64)
 | 
			
		||||
    /* Free any duplicate Argv[] storage. */
 | 
			
		||||
    if (free_Argv) {
 | 
			
		||||
        OPENSSL_free(Argv);
 | 
			
		||||
    }
 | 
			
		||||
#endif
 | 
			
		||||
    apps_shutdown();
 | 
			
		||||
 | 
			
		||||
    CRYPTO_mem_leaks(bio_err);
 | 
			
		||||
    if (bio_err != NULL) {
 | 
			
		||||
        BIO_free(bio_err);
 | 
			
		||||
        bio_err = NULL;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    OPENSSL_EXIT(ret);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
#define LIST_STANDARD_COMMANDS "list-standard-commands"
 | 
			
		||||
#define LIST_MESSAGE_DIGEST_COMMANDS "list-message-digest-commands"
 | 
			
		||||
#define LIST_MESSAGE_DIGEST_ALGORITHMS "list-message-digest-algorithms"
 | 
			
		||||
#define LIST_CIPHER_COMMANDS "list-cipher-commands"
 | 
			
		||||
#define LIST_CIPHER_ALGORITHMS "list-cipher-algorithms"
 | 
			
		||||
#define LIST_PUBLIC_KEY_ALGORITHMS "list-public-key-algorithms"
 | 
			
		||||
 | 
			
		||||
static int do_cmd(LHASH_OF(FUNCTION) *prog, int argc, char *argv[])
 | 
			
		||||
static int do_cmd(LHASH *prog, int argc, char *argv[])
 | 
			
		||||
{
 | 
			
		||||
    FUNCTION f, *fp;
 | 
			
		||||
    int i, ret = 1, tp, nl;
 | 
			
		||||
@@ -461,18 +388,7 @@ static int do_cmd(LHASH_OF(FUNCTION) *prog, int argc, char *argv[])
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
    f.name = argv[0];
 | 
			
		||||
    fp = lh_FUNCTION_retrieve(prog, &f);
 | 
			
		||||
    if (fp == NULL) {
 | 
			
		||||
        if (EVP_get_digestbyname(argv[0])) {
 | 
			
		||||
            f.type = FUNC_TYPE_MD;
 | 
			
		||||
            f.func = dgst_main;
 | 
			
		||||
            fp = &f;
 | 
			
		||||
        } else if (EVP_get_cipherbyname(argv[0])) {
 | 
			
		||||
            f.type = FUNC_TYPE_CIPHER;
 | 
			
		||||
            f.func = enc_main;
 | 
			
		||||
            fp = &f;
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
    fp = (FUNCTION *) lh_retrieve(prog, &f);
 | 
			
		||||
    if (fp != NULL) {
 | 
			
		||||
        ret = fp->func(argc, argv);
 | 
			
		||||
    } else if ((strncmp(argv[0], "no-", 3)) == 0) {
 | 
			
		||||
@@ -484,7 +400,7 @@ static int do_cmd(LHASH_OF(FUNCTION) *prog, int argc, char *argv[])
 | 
			
		||||
        }
 | 
			
		||||
#endif
 | 
			
		||||
        f.name = argv[0] + 3;
 | 
			
		||||
        ret = (lh_FUNCTION_retrieve(prog, &f) != NULL);
 | 
			
		||||
        ret = (lh_retrieve(prog, &f) != NULL);
 | 
			
		||||
        if (!ret)
 | 
			
		||||
            BIO_printf(bio_stdout, "%s\n", argv[0]);
 | 
			
		||||
        else
 | 
			
		||||
@@ -499,10 +415,7 @@ static int do_cmd(LHASH_OF(FUNCTION) *prog, int argc, char *argv[])
 | 
			
		||||
        goto end;
 | 
			
		||||
    } else if ((strcmp(argv[0], LIST_STANDARD_COMMANDS) == 0) ||
 | 
			
		||||
               (strcmp(argv[0], LIST_MESSAGE_DIGEST_COMMANDS) == 0) ||
 | 
			
		||||
               (strcmp(argv[0], LIST_MESSAGE_DIGEST_ALGORITHMS) == 0) ||
 | 
			
		||||
               (strcmp(argv[0], LIST_CIPHER_COMMANDS) == 0) ||
 | 
			
		||||
               (strcmp(argv[0], LIST_CIPHER_ALGORITHMS) == 0) ||
 | 
			
		||||
               (strcmp(argv[0], LIST_PUBLIC_KEY_ALGORITHMS) == 0)) {
 | 
			
		||||
               (strcmp(argv[0], LIST_CIPHER_COMMANDS) == 0)) {
 | 
			
		||||
        int list_type;
 | 
			
		||||
        BIO *bio_stdout;
 | 
			
		||||
 | 
			
		||||
@@ -510,12 +423,6 @@ static int do_cmd(LHASH_OF(FUNCTION) *prog, int argc, char *argv[])
 | 
			
		||||
            list_type = FUNC_TYPE_GENERAL;
 | 
			
		||||
        else if (strcmp(argv[0], LIST_MESSAGE_DIGEST_COMMANDS) == 0)
 | 
			
		||||
            list_type = FUNC_TYPE_MD;
 | 
			
		||||
        else if (strcmp(argv[0], LIST_MESSAGE_DIGEST_ALGORITHMS) == 0)
 | 
			
		||||
            list_type = FUNC_TYPE_MD_ALG;
 | 
			
		||||
        else if (strcmp(argv[0], LIST_PUBLIC_KEY_ALGORITHMS) == 0)
 | 
			
		||||
            list_type = FUNC_TYPE_PKEY;
 | 
			
		||||
        else if (strcmp(argv[0], LIST_CIPHER_ALGORITHMS) == 0)
 | 
			
		||||
            list_type = FUNC_TYPE_CIPHER_ALG;
 | 
			
		||||
        else                    /* strcmp(argv[0],LIST_CIPHER_COMMANDS) == 0 */
 | 
			
		||||
            list_type = FUNC_TYPE_CIPHER;
 | 
			
		||||
        bio_stdout = BIO_new_fp(stdout, BIO_NOCLOSE);
 | 
			
		||||
@@ -526,20 +433,9 @@ static int do_cmd(LHASH_OF(FUNCTION) *prog, int argc, char *argv[])
 | 
			
		||||
        }
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
        if (!load_config(bio_err, NULL))
 | 
			
		||||
            goto end;
 | 
			
		||||
 | 
			
		||||
        if (list_type == FUNC_TYPE_PKEY)
 | 
			
		||||
            list_pkey(bio_stdout);
 | 
			
		||||
        if (list_type == FUNC_TYPE_MD_ALG)
 | 
			
		||||
            list_md(bio_stdout);
 | 
			
		||||
        if (list_type == FUNC_TYPE_CIPHER_ALG)
 | 
			
		||||
            list_cipher(bio_stdout);
 | 
			
		||||
        else {
 | 
			
		||||
            for (fp = functions; fp->name != NULL; fp++)
 | 
			
		||||
                if (fp->type == list_type)
 | 
			
		||||
                    BIO_printf(bio_stdout, "%s\n", fp->name);
 | 
			
		||||
        }
 | 
			
		||||
        for (fp = functions; fp->name != NULL; fp++)
 | 
			
		||||
            if (fp->type == list_type)
 | 
			
		||||
                BIO_printf(bio_stdout, "%s\n", fp->name);
 | 
			
		||||
        BIO_free_all(bio_stdout);
 | 
			
		||||
        ret = 0;
 | 
			
		||||
        goto end;
 | 
			
		||||
@@ -597,89 +493,9 @@ static int SortFnByName(const void *_f1, const void *_f2)
 | 
			
		||||
    return strcmp(f1->name, f2->name);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static void list_pkey(BIO *out)
 | 
			
		||||
static LHASH *prog_init(void)
 | 
			
		||||
{
 | 
			
		||||
    int i;
 | 
			
		||||
    for (i = 0; i < EVP_PKEY_asn1_get_count(); i++) {
 | 
			
		||||
        const EVP_PKEY_ASN1_METHOD *ameth;
 | 
			
		||||
        int pkey_id, pkey_base_id, pkey_flags;
 | 
			
		||||
        const char *pinfo, *pem_str;
 | 
			
		||||
        ameth = EVP_PKEY_asn1_get0(i);
 | 
			
		||||
        EVP_PKEY_asn1_get0_info(&pkey_id, &pkey_base_id, &pkey_flags,
 | 
			
		||||
                                &pinfo, &pem_str, ameth);
 | 
			
		||||
        if (pkey_flags & ASN1_PKEY_ALIAS) {
 | 
			
		||||
            BIO_printf(out, "Name: %s\n", OBJ_nid2ln(pkey_id));
 | 
			
		||||
            BIO_printf(out, "\tType: Alias to %s\n",
 | 
			
		||||
                       OBJ_nid2ln(pkey_base_id));
 | 
			
		||||
        } else {
 | 
			
		||||
            BIO_printf(out, "Name: %s\n", pinfo);
 | 
			
		||||
            BIO_printf(out, "\tType: %s Algorithm\n",
 | 
			
		||||
                       pkey_flags & ASN1_PKEY_DYNAMIC ?
 | 
			
		||||
                       "External" : "Builtin");
 | 
			
		||||
            BIO_printf(out, "\tOID: %s\n", OBJ_nid2ln(pkey_id));
 | 
			
		||||
            if (pem_str == NULL)
 | 
			
		||||
                pem_str = "(none)";
 | 
			
		||||
            BIO_printf(out, "\tPEM string: %s\n", pem_str);
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
    }
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static void list_cipher_fn(const EVP_CIPHER *c,
 | 
			
		||||
                           const char *from, const char *to, void *arg)
 | 
			
		||||
{
 | 
			
		||||
    if (c)
 | 
			
		||||
        BIO_printf(arg, "%s\n", EVP_CIPHER_name(c));
 | 
			
		||||
    else {
 | 
			
		||||
        if (!from)
 | 
			
		||||
            from = "<undefined>";
 | 
			
		||||
        if (!to)
 | 
			
		||||
            to = "<undefined>";
 | 
			
		||||
        BIO_printf(arg, "%s => %s\n", from, to);
 | 
			
		||||
    }
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static void list_cipher(BIO *out)
 | 
			
		||||
{
 | 
			
		||||
    EVP_CIPHER_do_all_sorted(list_cipher_fn, out);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static void list_md_fn(const EVP_MD *m,
 | 
			
		||||
                       const char *from, const char *to, void *arg)
 | 
			
		||||
{
 | 
			
		||||
    if (m)
 | 
			
		||||
        BIO_printf(arg, "%s\n", EVP_MD_name(m));
 | 
			
		||||
    else {
 | 
			
		||||
        if (!from)
 | 
			
		||||
            from = "<undefined>";
 | 
			
		||||
        if (!to)
 | 
			
		||||
            to = "<undefined>";
 | 
			
		||||
        BIO_printf(arg, "%s => %s\n", from, to);
 | 
			
		||||
    }
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static void list_md(BIO *out)
 | 
			
		||||
{
 | 
			
		||||
    EVP_MD_do_all_sorted(list_md_fn, out);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static int MS_CALLBACK function_cmp(const FUNCTION * a, const FUNCTION * b)
 | 
			
		||||
{
 | 
			
		||||
    return strncmp(a->name, b->name, 8);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static IMPLEMENT_LHASH_COMP_FN(function, FUNCTION)
 | 
			
		||||
 | 
			
		||||
static unsigned long MS_CALLBACK function_hash(const FUNCTION * a)
 | 
			
		||||
{
 | 
			
		||||
    return lh_strhash(a->name);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static IMPLEMENT_LHASH_HASH_FN(function, FUNCTION)
 | 
			
		||||
 | 
			
		||||
static LHASH_OF(FUNCTION) *prog_init(void)
 | 
			
		||||
{
 | 
			
		||||
    LHASH_OF(FUNCTION) *ret;
 | 
			
		||||
    LHASH *ret;
 | 
			
		||||
    FUNCTION *f;
 | 
			
		||||
    size_t i;
 | 
			
		||||
 | 
			
		||||
@@ -687,10 +503,23 @@ static LHASH_OF(FUNCTION) *prog_init(void)
 | 
			
		||||
    for (i = 0, f = functions; f->name != NULL; ++f, ++i) ;
 | 
			
		||||
    qsort(functions, i, sizeof *functions, SortFnByName);
 | 
			
		||||
 | 
			
		||||
    if ((ret = lh_FUNCTION_new()) == NULL)
 | 
			
		||||
    if ((ret = lh_new(hash, cmp)) == NULL)
 | 
			
		||||
        return (NULL);
 | 
			
		||||
 | 
			
		||||
    for (f = functions; f->name != NULL; f++)
 | 
			
		||||
        (void)lh_FUNCTION_insert(ret, f);
 | 
			
		||||
        lh_insert(ret, f);
 | 
			
		||||
    return (ret);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
/* static int MS_CALLBACK cmp(FUNCTION *a, FUNCTION *b) */
 | 
			
		||||
static int MS_CALLBACK cmp(const void *a_void, const void *b_void)
 | 
			
		||||
{
 | 
			
		||||
    return (strncmp(((const FUNCTION *)a_void)->name,
 | 
			
		||||
                    ((const FUNCTION *)b_void)->name, 8));
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
/* static unsigned long MS_CALLBACK hash(FUNCTION *a) */
 | 
			
		||||
static unsigned long MS_CALLBACK hash(const void *a_void)
 | 
			
		||||
{
 | 
			
		||||
    return (lh_strhash(((const FUNCTION *)a_void)->name));
 | 
			
		||||
}
 | 
			
		||||
 
 | 
			
		||||
@@ -21,17 +21,12 @@ oid_section		= new_oids
 | 
			
		||||
 | 
			
		||||
[ new_oids ]
 | 
			
		||||
 | 
			
		||||
# We can add new OIDs in here for use by 'ca', 'req' and 'ts'.
 | 
			
		||||
# We can add new OIDs in here for use by 'ca' and 'req'.
 | 
			
		||||
# Add a simple OID like this:
 | 
			
		||||
# testoid1=1.2.3.4
 | 
			
		||||
# Or use config file substitution like this:
 | 
			
		||||
# testoid2=${testoid1}.5.6
 | 
			
		||||
 | 
			
		||||
# Policies used by the TSA examples.
 | 
			
		||||
tsa_policy1 = 1.2.3.4.1
 | 
			
		||||
tsa_policy2 = 1.2.3.4.5.6
 | 
			
		||||
tsa_policy3 = 1.2.3.4.5.7
 | 
			
		||||
 | 
			
		||||
####################################################################
 | 
			
		||||
[ ca ]
 | 
			
		||||
default_ca	= CA_default		# The default ca section
 | 
			
		||||
@@ -72,7 +67,7 @@ cert_opt 	= ca_default		# Certificate field options
 | 
			
		||||
 | 
			
		||||
default_days	= 365			# how long to certify for
 | 
			
		||||
default_crl_days= 30			# how long before next CRL
 | 
			
		||||
default_md	= default		# use public key default MD
 | 
			
		||||
default_md	= sha1			# which md to use.
 | 
			
		||||
preserve	= no			# keep passed DN ordering
 | 
			
		||||
 | 
			
		||||
# A few difference way of specifying how similar the request should look
 | 
			
		||||
@@ -103,7 +98,7 @@ emailAddress		= optional
 | 
			
		||||
 | 
			
		||||
####################################################################
 | 
			
		||||
[ req ]
 | 
			
		||||
default_bits		= 2048
 | 
			
		||||
default_bits		= 1024
 | 
			
		||||
default_keyfile 	= privkey.pem
 | 
			
		||||
distinguished_name	= req_distinguished_name
 | 
			
		||||
attributes		= req_attributes
 | 
			
		||||
@@ -115,12 +110,13 @@ x509_extensions	= v3_ca	# The extentions to add to the self signed cert
 | 
			
		||||
 | 
			
		||||
# This sets a mask for permitted string types. There are several options. 
 | 
			
		||||
# default: PrintableString, T61String, BMPString.
 | 
			
		||||
# pkix	 : PrintableString, BMPString (PKIX recommendation before 2004)
 | 
			
		||||
# utf8only: only UTF8Strings (PKIX recommendation after 2004).
 | 
			
		||||
# pkix	 : PrintableString, BMPString.
 | 
			
		||||
# utf8only: only UTF8Strings.
 | 
			
		||||
# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
 | 
			
		||||
# MASK:XXXX a literal mask value.
 | 
			
		||||
# WARNING: ancient versions of Netscape crash on BMPStrings or UTF8Strings.
 | 
			
		||||
string_mask = utf8only
 | 
			
		||||
# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings
 | 
			
		||||
# so use this option with caution!
 | 
			
		||||
string_mask = nombstr
 | 
			
		||||
 | 
			
		||||
# req_extensions = v3_req # The extensions to add to a certificate request
 | 
			
		||||
 | 
			
		||||
@@ -211,9 +207,6 @@ authorityKeyIdentifier=keyid,issuer
 | 
			
		||||
#nsCaPolicyUrl
 | 
			
		||||
#nsSslServerName
 | 
			
		||||
 | 
			
		||||
# This is required for TSA certificates.
 | 
			
		||||
# extendedKeyUsage = critical,timeStamping
 | 
			
		||||
 | 
			
		||||
[ v3_req ]
 | 
			
		||||
 | 
			
		||||
# Extensions to add to a certificate request
 | 
			
		||||
@@ -231,7 +224,7 @@ keyUsage = nonRepudiation, digitalSignature, keyEncipherment
 | 
			
		||||
 | 
			
		||||
subjectKeyIdentifier=hash
 | 
			
		||||
 | 
			
		||||
authorityKeyIdentifier=keyid:always,issuer
 | 
			
		||||
authorityKeyIdentifier=keyid:always,issuer:always
 | 
			
		||||
 | 
			
		||||
# This is what PKIX recommends but some broken software chokes on critical
 | 
			
		||||
# extensions.
 | 
			
		||||
@@ -264,7 +257,7 @@ basicConstraints = CA:true
 | 
			
		||||
# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
 | 
			
		||||
 | 
			
		||||
# issuerAltName=issuer:copy
 | 
			
		||||
authorityKeyIdentifier=keyid:always
 | 
			
		||||
authorityKeyIdentifier=keyid:always,issuer:always
 | 
			
		||||
 | 
			
		||||
[ proxy_cert_ext ]
 | 
			
		||||
# These extensions should be added when creating a proxy certificate
 | 
			
		||||
@@ -297,7 +290,7 @@ nsComment			= "OpenSSL Generated Certificate"
 | 
			
		||||
 | 
			
		||||
# PKIX recommendations harmless if included in all certificates.
 | 
			
		||||
subjectKeyIdentifier=hash
 | 
			
		||||
authorityKeyIdentifier=keyid,issuer
 | 
			
		||||
authorityKeyIdentifier=keyid,issuer:always
 | 
			
		||||
 | 
			
		||||
# This stuff is for subjectAltName and issuerAltname.
 | 
			
		||||
# Import the email address.
 | 
			
		||||
@@ -318,33 +311,3 @@ authorityKeyIdentifier=keyid,issuer
 | 
			
		||||
 | 
			
		||||
# This really needs to be in place for it to be a proxy certificate.
 | 
			
		||||
proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
 | 
			
		||||
 | 
			
		||||
####################################################################
 | 
			
		||||
[ tsa ]
 | 
			
		||||
 | 
			
		||||
default_tsa = tsa_config1	# the default TSA section
 | 
			
		||||
 | 
			
		||||
[ tsa_config1 ]
 | 
			
		||||
 | 
			
		||||
# These are used by the TSA reply generation only.
 | 
			
		||||
dir		= ./demoCA		# TSA root directory
 | 
			
		||||
serial		= $dir/tsaserial	# The current serial number (mandatory)
 | 
			
		||||
crypto_device	= builtin		# OpenSSL engine to use for signing
 | 
			
		||||
signer_cert	= $dir/tsacert.pem 	# The TSA signing certificate
 | 
			
		||||
					# (optional)
 | 
			
		||||
certs		= $dir/cacert.pem	# Certificate chain to include in reply
 | 
			
		||||
					# (optional)
 | 
			
		||||
signer_key	= $dir/private/tsakey.pem # The TSA private key (optional)
 | 
			
		||||
 | 
			
		||||
default_policy	= tsa_policy1		# Policy if request did not specify it
 | 
			
		||||
					# (optional)
 | 
			
		||||
other_policies	= tsa_policy2, tsa_policy3	# acceptable policies (optional)
 | 
			
		||||
digests		= md5, sha1		# Acceptable message digests (mandatory)
 | 
			
		||||
accuracy	= secs:1, millisecs:500, microsecs:100	# (optional)
 | 
			
		||||
clock_precision_digits  = 0	# number of digits after dot. (optional)
 | 
			
		||||
ordering		= yes	# Is ordering defined for timestamps?
 | 
			
		||||
				# (optional, default: no)
 | 
			
		||||
tsa_name		= yes	# Must the TSA name be included in the reply?
 | 
			
		||||
				# (optional, default: no)
 | 
			
		||||
ess_cert_id_chain	= no	# Must the ESS cert id chain be included?
 | 
			
		||||
				# (optional, default: no)
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										142
									
								
								apps/pkcs12.c
									
									
									
									
									
								
							
							
						
						
									
										142
									
								
								apps/pkcs12.c
									
									
									
									
									
								
							@@ -69,6 +69,12 @@
 | 
			
		||||
# include <openssl/pem.h>
 | 
			
		||||
# include <openssl/pkcs12.h>
 | 
			
		||||
 | 
			
		||||
# ifdef OPENSSL_SYS_NETWARE
 | 
			
		||||
/* Rename these functions to avoid name clashes on NetWare OS */
 | 
			
		||||
#  define uni2asc OPENSSL_uni2asc
 | 
			
		||||
#  define asc2uni OPENSSL_asc2uni
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
# define PROG pkcs12_main
 | 
			
		||||
 | 
			
		||||
const EVP_CIPHER *enc;
 | 
			
		||||
@@ -79,8 +85,7 @@ const EVP_CIPHER *enc;
 | 
			
		||||
# define CLCERTS         0x8
 | 
			
		||||
# define CACERTS         0x10
 | 
			
		||||
 | 
			
		||||
static int get_cert_chain(X509 *cert, X509_STORE *store,
 | 
			
		||||
                          STACK_OF(X509) **chain);
 | 
			
		||||
int get_cert_chain(X509 *cert, X509_STORE *store, STACK_OF(X509) **chain);
 | 
			
		||||
int dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen,
 | 
			
		||||
                        int options, char *pempass);
 | 
			
		||||
int dump_certs_pkeys_bags(BIO *out, STACK_OF(PKCS12_SAFEBAG) *bags,
 | 
			
		||||
@@ -93,7 +98,6 @@ int print_attribs(BIO *out, STACK_OF(X509_ATTRIBUTE) *attrlst,
 | 
			
		||||
void hex_prin(BIO *out, unsigned char *buf, int len);
 | 
			
		||||
int alg_print(BIO *x, X509_ALGOR *alg);
 | 
			
		||||
int cert_load(BIO *in, STACK_OF(X509) *sk);
 | 
			
		||||
static int set_pbe(BIO *err, int *ppbe, const char *str);
 | 
			
		||||
 | 
			
		||||
int MAIN(int, char **);
 | 
			
		||||
 | 
			
		||||
@@ -122,12 +126,11 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    int ret = 1;
 | 
			
		||||
    int macver = 1;
 | 
			
		||||
    int noprompt = 0;
 | 
			
		||||
    STACK_OF(OPENSSL_STRING) *canames = NULL;
 | 
			
		||||
    STACK *canames = NULL;
 | 
			
		||||
    char *cpass = NULL, *mpass = NULL;
 | 
			
		||||
    char *passargin = NULL, *passargout = NULL, *passarg = NULL;
 | 
			
		||||
    char *passin = NULL, *passout = NULL;
 | 
			
		||||
    char *inrand = NULL;
 | 
			
		||||
    char *macalg = NULL;
 | 
			
		||||
    char *CApath = NULL, *CAfile = NULL;
 | 
			
		||||
# ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
    char *engine = NULL;
 | 
			
		||||
@@ -135,13 +138,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
 | 
			
		||||
    apps_startup();
 | 
			
		||||
 | 
			
		||||
    enc = EVP_des_ede3_cbc();
 | 
			
		||||
    if (bio_err == NULL)
 | 
			
		||||
        bio_err = BIO_new_fp(stderr, BIO_NOCLOSE);
 | 
			
		||||
 | 
			
		||||
    if (!load_config(bio_err, NULL))
 | 
			
		||||
        goto end;
 | 
			
		||||
 | 
			
		||||
# ifdef OPENSSL_FIPS
 | 
			
		||||
    if (FIPS_mode())
 | 
			
		||||
        cert_pbe = NID_pbe_WithSHA1And3_Key_TripleDES_CBC;
 | 
			
		||||
@@ -149,6 +145,13 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
# endif
 | 
			
		||||
        cert_pbe = NID_pbe_WithSHA1And40BitRC2_CBC;
 | 
			
		||||
 | 
			
		||||
    enc = EVP_des_ede3_cbc();
 | 
			
		||||
    if (bio_err == NULL)
 | 
			
		||||
        bio_err = BIO_new_fp(stderr, BIO_NOCLOSE);
 | 
			
		||||
 | 
			
		||||
    if (!load_config(bio_err, NULL))
 | 
			
		||||
        goto end;
 | 
			
		||||
 | 
			
		||||
    args = argv + 1;
 | 
			
		||||
 | 
			
		||||
    while (*args) {
 | 
			
		||||
@@ -215,19 +218,35 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                maciter = 1;
 | 
			
		||||
            else if (!strcmp(*args, "-nomac"))
 | 
			
		||||
                maciter = -1;
 | 
			
		||||
            else if (!strcmp(*args, "-macalg"))
 | 
			
		||||
                if (args[1]) {
 | 
			
		||||
                    args++;
 | 
			
		||||
                    macalg = *args;
 | 
			
		||||
                } else
 | 
			
		||||
                    badarg = 1;
 | 
			
		||||
            else if (!strcmp(*args, "-nodes"))
 | 
			
		||||
                enc = NULL;
 | 
			
		||||
            else if (!strcmp(*args, "-certpbe")) {
 | 
			
		||||
                if (!set_pbe(bio_err, &cert_pbe, *++args))
 | 
			
		||||
                if (args[1]) {
 | 
			
		||||
                    args++;
 | 
			
		||||
                    if (!strcmp(*args, "NONE"))
 | 
			
		||||
                        cert_pbe = -1;
 | 
			
		||||
                    else
 | 
			
		||||
                        cert_pbe = OBJ_txt2nid(*args);
 | 
			
		||||
                    if (cert_pbe == NID_undef) {
 | 
			
		||||
                        BIO_printf(bio_err,
 | 
			
		||||
                                   "Unknown PBE algorithm %s\n", *args);
 | 
			
		||||
                        badarg = 1;
 | 
			
		||||
                    }
 | 
			
		||||
                } else
 | 
			
		||||
                    badarg = 1;
 | 
			
		||||
            } else if (!strcmp(*args, "-keypbe")) {
 | 
			
		||||
                if (!set_pbe(bio_err, &key_pbe, *++args))
 | 
			
		||||
                if (args[1]) {
 | 
			
		||||
                    args++;
 | 
			
		||||
                    if (!strcmp(*args, "NONE"))
 | 
			
		||||
                        key_pbe = -1;
 | 
			
		||||
                    else
 | 
			
		||||
                        key_pbe = OBJ_txt2nid(*args);
 | 
			
		||||
                    if (key_pbe == NID_undef) {
 | 
			
		||||
                        BIO_printf(bio_err,
 | 
			
		||||
                                   "Unknown PBE algorithm %s\n", *args);
 | 
			
		||||
                        badarg = 1;
 | 
			
		||||
                    }
 | 
			
		||||
                } else
 | 
			
		||||
                    badarg = 1;
 | 
			
		||||
            } else if (!strcmp(*args, "-rand")) {
 | 
			
		||||
                if (args[1]) {
 | 
			
		||||
@@ -265,8 +284,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                if (args[1]) {
 | 
			
		||||
                    args++;
 | 
			
		||||
                    if (!canames)
 | 
			
		||||
                        canames = sk_OPENSSL_STRING_new_null();
 | 
			
		||||
                    sk_OPENSSL_STRING_push(canames, *args);
 | 
			
		||||
                        canames = sk_new_null();
 | 
			
		||||
                    sk_push(canames, *args);
 | 
			
		||||
                } else
 | 
			
		||||
                    badarg = 1;
 | 
			
		||||
            } else if (!strcmp(*args, "-in")) {
 | 
			
		||||
@@ -373,9 +392,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
# endif
 | 
			
		||||
        BIO_printf(bio_err, "-nodes        don't encrypt private keys\n");
 | 
			
		||||
        BIO_printf(bio_err, "-noiter       don't use encryption iteration\n");
 | 
			
		||||
        BIO_printf(bio_err, "-nomaciter    don't use MAC iteration\n");
 | 
			
		||||
        BIO_printf(bio_err, "-maciter      use MAC iteration\n");
 | 
			
		||||
        BIO_printf(bio_err, "-nomac        don't generate MAC\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-twopass      separate MAC, encryption passwords\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
@@ -384,8 +401,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                   "-certpbe alg  specify certificate PBE algorithm (default RC2-40)\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-keypbe alg   specify private key PBE algorithm (default 3DES)\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-macalg alg   digest algorithm used in MAC (default SHA1)\n");
 | 
			
		||||
        BIO_printf(bio_err, "-keyex        set MS key exchange type\n");
 | 
			
		||||
        BIO_printf(bio_err, "-keysig       set MS key signature type\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
@@ -498,7 +513,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        EVP_PKEY *key = NULL;
 | 
			
		||||
        X509 *ucert = NULL, *x = NULL;
 | 
			
		||||
        STACK_OF(X509) *certs = NULL;
 | 
			
		||||
        const EVP_MD *macmd = NULL;
 | 
			
		||||
        unsigned char *catmp = NULL;
 | 
			
		||||
        int i;
 | 
			
		||||
 | 
			
		||||
@@ -595,7 +609,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            vret = get_cert_chain(ucert, store, &chain2);
 | 
			
		||||
            X509_STORE_free(store);
 | 
			
		||||
 | 
			
		||||
            if (vret == X509_V_OK) {
 | 
			
		||||
            if (!vret) {
 | 
			
		||||
                /* Exclude verified certificate */
 | 
			
		||||
                for (i = 1; i < sk_X509_num(chain2); i++)
 | 
			
		||||
                    sk_X509_push(certs, sk_X509_value(chain2, i));
 | 
			
		||||
@@ -603,7 +617,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                X509_free(sk_X509_value(chain2, 0));
 | 
			
		||||
                sk_X509_free(chain2);
 | 
			
		||||
            } else {
 | 
			
		||||
                if (vret != X509_V_ERR_UNSPECIFIED)
 | 
			
		||||
                if (vret >= 0)
 | 
			
		||||
                    BIO_printf(bio_err, "Error %s getting chain.\n",
 | 
			
		||||
                               X509_verify_cert_error_string(vret));
 | 
			
		||||
                else
 | 
			
		||||
@@ -614,8 +628,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
 | 
			
		||||
        /* Add any CA names */
 | 
			
		||||
 | 
			
		||||
        for (i = 0; i < sk_OPENSSL_STRING_num(canames); i++) {
 | 
			
		||||
            catmp = (unsigned char *)sk_OPENSSL_STRING_value(canames, i);
 | 
			
		||||
        for (i = 0; i < sk_num(canames); i++) {
 | 
			
		||||
            catmp = (unsigned char *)sk_value(canames, i);
 | 
			
		||||
            X509_alias_set1(sk_X509_value(certs, i), catmp, -1);
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
@@ -654,15 +668,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            goto export_end;
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        if (macalg) {
 | 
			
		||||
            macmd = EVP_get_digestbyname(macalg);
 | 
			
		||||
            if (!macmd) {
 | 
			
		||||
                BIO_printf(bio_err, "Unknown digest algorithm %s\n", macalg);
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        if (maciter != -1)
 | 
			
		||||
            PKCS12_set_mac(p12, mpass, -1, NULL, 0, maciter, macmd);
 | 
			
		||||
            PKCS12_set_mac(p12, mpass, -1, NULL, 0, maciter, NULL);
 | 
			
		||||
 | 
			
		||||
# ifdef CRYPTO_MDEBUG
 | 
			
		||||
        CRYPTO_pop_info();
 | 
			
		||||
@@ -759,7 +766,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    BIO_free(in);
 | 
			
		||||
    BIO_free_all(out);
 | 
			
		||||
    if (canames)
 | 
			
		||||
        sk_OPENSSL_STRING_free(canames);
 | 
			
		||||
        sk_free(canames);
 | 
			
		||||
    if (passin)
 | 
			
		||||
        OPENSSL_free(passin);
 | 
			
		||||
    if (passout)
 | 
			
		||||
@@ -907,25 +914,36 @@ int dump_certs_pkeys_bag(BIO *out, PKCS12_SAFEBAG *bag, char *pass,
 | 
			
		||||
 | 
			
		||||
/* Given a single certificate return a verified chain or NULL if error */
 | 
			
		||||
 | 
			
		||||
static int get_cert_chain(X509 *cert, X509_STORE *store,
 | 
			
		||||
                          STACK_OF(X509) **chain)
 | 
			
		||||
/* Hope this is OK .... */
 | 
			
		||||
 | 
			
		||||
int get_cert_chain(X509 *cert, X509_STORE *store, STACK_OF(X509) **chain)
 | 
			
		||||
{
 | 
			
		||||
    X509_STORE_CTX store_ctx;
 | 
			
		||||
    STACK_OF(X509) *chn = NULL;
 | 
			
		||||
    STACK_OF(X509) *chn;
 | 
			
		||||
    int i = 0;
 | 
			
		||||
 | 
			
		||||
    if (!X509_STORE_CTX_init(&store_ctx, store, cert, NULL)) {
 | 
			
		||||
        *chain = NULL;
 | 
			
		||||
        return X509_V_ERR_UNSPECIFIED;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (X509_verify_cert(&store_ctx) > 0)
 | 
			
		||||
    /*
 | 
			
		||||
     * FIXME: Should really check the return status of X509_STORE_CTX_init
 | 
			
		||||
     * for an error, but how that fits into the return value of this function
 | 
			
		||||
     * is less obvious.
 | 
			
		||||
     */
 | 
			
		||||
    X509_STORE_CTX_init(&store_ctx, store, cert, NULL);
 | 
			
		||||
    if (X509_verify_cert(&store_ctx) <= 0) {
 | 
			
		||||
        i = X509_STORE_CTX_get_error(&store_ctx);
 | 
			
		||||
        if (i == 0)
 | 
			
		||||
            /*
 | 
			
		||||
             * avoid returning 0 if X509_verify_cert() did not set an
 | 
			
		||||
             * appropriate error value in the context
 | 
			
		||||
             */
 | 
			
		||||
            i = -1;
 | 
			
		||||
        chn = NULL;
 | 
			
		||||
        goto err;
 | 
			
		||||
    } else
 | 
			
		||||
        chn = X509_STORE_CTX_get1_chain(&store_ctx);
 | 
			
		||||
    else if ((i = X509_STORE_CTX_get_error(&store_ctx)) == 0)
 | 
			
		||||
        i = X509_V_ERR_UNSPECIFIED;
 | 
			
		||||
 | 
			
		||||
 err:
 | 
			
		||||
    X509_STORE_CTX_cleanup(&store_ctx);
 | 
			
		||||
    *chain = chn;
 | 
			
		||||
 | 
			
		||||
    return i;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
@@ -1004,8 +1022,8 @@ int print_attribs(BIO *out, STACK_OF(X509_ATTRIBUTE) *attrlst,
 | 
			
		||||
            av = sk_ASN1_TYPE_value(attr->value.set, 0);
 | 
			
		||||
            switch (av->type) {
 | 
			
		||||
            case V_ASN1_BMPSTRING:
 | 
			
		||||
                value = OPENSSL_uni2asc(av->value.bmpstring->data,
 | 
			
		||||
                                        av->value.bmpstring->length);
 | 
			
		||||
                value = uni2asc(av->value.bmpstring->data,
 | 
			
		||||
                                av->value.bmpstring->length);
 | 
			
		||||
                BIO_printf(out, "%s\n", value);
 | 
			
		||||
                OPENSSL_free(value);
 | 
			
		||||
                break;
 | 
			
		||||
@@ -1039,20 +1057,4 @@ void hex_prin(BIO *out, unsigned char *buf, int len)
 | 
			
		||||
        BIO_printf(out, "%02X ", buf[i]);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static int set_pbe(BIO *err, int *ppbe, const char *str)
 | 
			
		||||
{
 | 
			
		||||
    if (!str)
 | 
			
		||||
        return 0;
 | 
			
		||||
    if (!strcmp(str, "NONE")) {
 | 
			
		||||
        *ppbe = -1;
 | 
			
		||||
        return 1;
 | 
			
		||||
    }
 | 
			
		||||
    *ppbe = OBJ_txt2nid(str);
 | 
			
		||||
    if (*ppbe == NID_undef) {
 | 
			
		||||
        BIO_printf(bio_err, "Unknown PBE algorithm %s\n", str);
 | 
			
		||||
        return 0;
 | 
			
		||||
    }
 | 
			
		||||
    return 1;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
#endif
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										17
									
								
								apps/pkcs7.c
									
									
									
									
									
								
							
							
						
						
									
										17
									
								
								apps/pkcs7.c
									
									
									
									
									
								
							@@ -88,7 +88,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    BIO *in = NULL, *out = NULL;
 | 
			
		||||
    int informat, outformat;
 | 
			
		||||
    char *infile, *outfile, *prog;
 | 
			
		||||
    int print_certs = 0, text = 0, noout = 0, p7_print = 0;
 | 
			
		||||
    int print_certs = 0, text = 0, noout = 0;
 | 
			
		||||
    int ret = 1;
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
    char *engine = NULL;
 | 
			
		||||
@@ -132,8 +132,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            noout = 1;
 | 
			
		||||
        else if (strcmp(*argv, "-text") == 0)
 | 
			
		||||
            text = 1;
 | 
			
		||||
        else if (strcmp(*argv, "-print") == 0)
 | 
			
		||||
            p7_print = 1;
 | 
			
		||||
        else if (strcmp(*argv, "-print_certs") == 0)
 | 
			
		||||
            print_certs = 1;
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
@@ -189,11 +187,11 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    if (infile == NULL)
 | 
			
		||||
        BIO_set_fp(in, stdin, BIO_NOCLOSE);
 | 
			
		||||
    else {
 | 
			
		||||
        if (BIO_read_filename(in, infile) <= 0) {
 | 
			
		||||
            BIO_printf(bio_err, "unable to load input file\n");
 | 
			
		||||
            ERR_print_errors(bio_err);
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
        if (BIO_read_filename(in, infile) <= 0)
 | 
			
		||||
            if (in == NULL) {
 | 
			
		||||
                perror(infile);
 | 
			
		||||
                goto end;
 | 
			
		||||
            }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (informat == FORMAT_ASN1)
 | 
			
		||||
@@ -225,9 +223,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (p7_print)
 | 
			
		||||
        PKCS7_print_ctx(out, p7, 0, NULL);
 | 
			
		||||
 | 
			
		||||
    if (print_certs) {
 | 
			
		||||
        STACK_OF(X509) *certs = NULL;
 | 
			
		||||
        STACK_OF(X509_CRL) *crls = NULL;
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										91
									
								
								apps/pkcs8.c
									
									
									
									
									
								
							
							
						
						
									
										91
									
								
								apps/pkcs8.c
									
									
									
									
									
								
							@@ -81,12 +81,11 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    int informat, outformat;
 | 
			
		||||
    int p8_broken = PKCS8_OK;
 | 
			
		||||
    int nocrypt = 0;
 | 
			
		||||
    X509_SIG *p8 = NULL;
 | 
			
		||||
    PKCS8_PRIV_KEY_INFO *p8inf = NULL;
 | 
			
		||||
    X509_SIG *p8;
 | 
			
		||||
    PKCS8_PRIV_KEY_INFO *p8inf;
 | 
			
		||||
    EVP_PKEY *pkey = NULL;
 | 
			
		||||
    char pass[50], *passin = NULL, *passout = NULL, *p8pass = NULL;
 | 
			
		||||
    int badarg = 0;
 | 
			
		||||
    int ret = 1;
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
    char *engine = NULL;
 | 
			
		||||
#endif
 | 
			
		||||
@@ -124,16 +123,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                }
 | 
			
		||||
            } else
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
        } else if (!strcmp(*args, "-v2prf")) {
 | 
			
		||||
            if (args[1]) {
 | 
			
		||||
                args++;
 | 
			
		||||
                pbe_nid = OBJ_txt2nid(*args);
 | 
			
		||||
                if (!EVP_PBE_find(EVP_PBE_TYPE_PRF, pbe_nid, NULL, NULL, 0)) {
 | 
			
		||||
                    BIO_printf(bio_err, "Unknown PRF algorithm %s\n", *args);
 | 
			
		||||
                    badarg = 1;
 | 
			
		||||
                }
 | 
			
		||||
            } else
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
        } else if (!strcmp(*args, "-inform")) {
 | 
			
		||||
            if (args[1]) {
 | 
			
		||||
                args++;
 | 
			
		||||
@@ -221,7 +210,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   " -engine e       use engine e, possibly a hardware device.\n");
 | 
			
		||||
#endif
 | 
			
		||||
        goto end;
 | 
			
		||||
        return 1;
 | 
			
		||||
    }
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
    e = setup_engine(bio_err, engine, 0);
 | 
			
		||||
@@ -229,7 +218,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
 | 
			
		||||
    if (!app_passwd(bio_err, passargin, passargout, &passin, &passout)) {
 | 
			
		||||
        BIO_printf(bio_err, "Error getting passwords\n");
 | 
			
		||||
        goto end;
 | 
			
		||||
        return 1;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if ((pbe_nid == -1) && !cipher)
 | 
			
		||||
@@ -238,7 +227,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    if (infile) {
 | 
			
		||||
        if (!(in = BIO_new_file(infile, "rb"))) {
 | 
			
		||||
            BIO_printf(bio_err, "Can't open input file %s\n", infile);
 | 
			
		||||
            goto end;
 | 
			
		||||
            return (1);
 | 
			
		||||
        }
 | 
			
		||||
    } else
 | 
			
		||||
        in = BIO_new_fp(stdin, BIO_NOCLOSE);
 | 
			
		||||
@@ -246,7 +235,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    if (outfile) {
 | 
			
		||||
        if (!(out = BIO_new_file(outfile, "wb"))) {
 | 
			
		||||
            BIO_printf(bio_err, "Can't open output file %s\n", outfile);
 | 
			
		||||
            goto end;
 | 
			
		||||
            return (1);
 | 
			
		||||
        }
 | 
			
		||||
    } else {
 | 
			
		||||
        out = BIO_new_fp(stdout, BIO_NOCLOSE);
 | 
			
		||||
@@ -258,13 +247,18 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
#endif
 | 
			
		||||
    }
 | 
			
		||||
    if (topk8) {
 | 
			
		||||
        BIO_free(in);           /* Not needed in this section */
 | 
			
		||||
        pkey = load_key(bio_err, infile, informat, 1, passin, e, "key");
 | 
			
		||||
        if (!pkey)
 | 
			
		||||
            goto end;
 | 
			
		||||
        if (!pkey) {
 | 
			
		||||
            BIO_free_all(out);
 | 
			
		||||
            return 1;
 | 
			
		||||
        }
 | 
			
		||||
        if (!(p8inf = EVP_PKEY2PKCS8_broken(pkey, p8_broken))) {
 | 
			
		||||
            BIO_printf(bio_err, "Error converting key\n");
 | 
			
		||||
            ERR_print_errors(bio_err);
 | 
			
		||||
            goto end;
 | 
			
		||||
            EVP_PKEY_free(pkey);
 | 
			
		||||
            BIO_free_all(out);
 | 
			
		||||
            return 1;
 | 
			
		||||
        }
 | 
			
		||||
        if (nocrypt) {
 | 
			
		||||
            if (outformat == FORMAT_PEM)
 | 
			
		||||
@@ -273,7 +267,10 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                i2d_PKCS8_PRIV_KEY_INFO_bio(out, p8inf);
 | 
			
		||||
            else {
 | 
			
		||||
                BIO_printf(bio_err, "Bad format specified for key\n");
 | 
			
		||||
                goto end;
 | 
			
		||||
                PKCS8_PRIV_KEY_INFO_free(p8inf);
 | 
			
		||||
                EVP_PKEY_free(pkey);
 | 
			
		||||
                BIO_free_all(out);
 | 
			
		||||
                return (1);
 | 
			
		||||
            }
 | 
			
		||||
        } else {
 | 
			
		||||
            if (passout)
 | 
			
		||||
@@ -281,8 +278,12 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            else {
 | 
			
		||||
                p8pass = pass;
 | 
			
		||||
                if (EVP_read_pw_string
 | 
			
		||||
                    (pass, sizeof pass, "Enter Encryption Password:", 1))
 | 
			
		||||
                    goto end;
 | 
			
		||||
                    (pass, sizeof pass, "Enter Encryption Password:", 1)) {
 | 
			
		||||
                    PKCS8_PRIV_KEY_INFO_free(p8inf);
 | 
			
		||||
                    EVP_PKEY_free(pkey);
 | 
			
		||||
                    BIO_free_all(out);
 | 
			
		||||
                    return (1);
 | 
			
		||||
                }
 | 
			
		||||
            }
 | 
			
		||||
            app_RAND_load_file(NULL, bio_err, 0);
 | 
			
		||||
            if (!(p8 = PKCS8_encrypt(pbe_nid, cipher,
 | 
			
		||||
@@ -290,7 +291,10 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                                     NULL, 0, iter, p8inf))) {
 | 
			
		||||
                BIO_printf(bio_err, "Error encrypting key\n");
 | 
			
		||||
                ERR_print_errors(bio_err);
 | 
			
		||||
                goto end;
 | 
			
		||||
                PKCS8_PRIV_KEY_INFO_free(p8inf);
 | 
			
		||||
                EVP_PKEY_free(pkey);
 | 
			
		||||
                BIO_free_all(out);
 | 
			
		||||
                return (1);
 | 
			
		||||
            }
 | 
			
		||||
            app_RAND_write_file(NULL, bio_err);
 | 
			
		||||
            if (outformat == FORMAT_PEM)
 | 
			
		||||
@@ -299,12 +303,22 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                i2d_PKCS8_bio(out, p8);
 | 
			
		||||
            else {
 | 
			
		||||
                BIO_printf(bio_err, "Bad format specified for key\n");
 | 
			
		||||
                goto end;
 | 
			
		||||
                PKCS8_PRIV_KEY_INFO_free(p8inf);
 | 
			
		||||
                EVP_PKEY_free(pkey);
 | 
			
		||||
                BIO_free_all(out);
 | 
			
		||||
                return (1);
 | 
			
		||||
            }
 | 
			
		||||
            X509_SIG_free(p8);
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        ret = 0;
 | 
			
		||||
        goto end;
 | 
			
		||||
        PKCS8_PRIV_KEY_INFO_free(p8inf);
 | 
			
		||||
        EVP_PKEY_free(pkey);
 | 
			
		||||
        BIO_free_all(out);
 | 
			
		||||
        if (passin)
 | 
			
		||||
            OPENSSL_free(passin);
 | 
			
		||||
        if (passout)
 | 
			
		||||
            OPENSSL_free(passout);
 | 
			
		||||
        return (0);
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (nocrypt) {
 | 
			
		||||
@@ -314,7 +328,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            p8inf = d2i_PKCS8_PRIV_KEY_INFO_bio(in, NULL);
 | 
			
		||||
        else {
 | 
			
		||||
            BIO_printf(bio_err, "Bad format specified for key\n");
 | 
			
		||||
            goto end;
 | 
			
		||||
            return (1);
 | 
			
		||||
        }
 | 
			
		||||
    } else {
 | 
			
		||||
        if (informat == FORMAT_PEM)
 | 
			
		||||
@@ -323,13 +337,13 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            p8 = d2i_PKCS8_bio(in, NULL);
 | 
			
		||||
        else {
 | 
			
		||||
            BIO_printf(bio_err, "Bad format specified for key\n");
 | 
			
		||||
            goto end;
 | 
			
		||||
            return (1);
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        if (!p8) {
 | 
			
		||||
            BIO_printf(bio_err, "Error reading key\n");
 | 
			
		||||
            ERR_print_errors(bio_err);
 | 
			
		||||
            goto end;
 | 
			
		||||
            return (1);
 | 
			
		||||
        }
 | 
			
		||||
        if (passin)
 | 
			
		||||
            p8pass = passin;
 | 
			
		||||
@@ -338,18 +352,19 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            EVP_read_pw_string(pass, sizeof pass, "Enter Password:", 0);
 | 
			
		||||
        }
 | 
			
		||||
        p8inf = PKCS8_decrypt(p8, p8pass, strlen(p8pass));
 | 
			
		||||
        X509_SIG_free(p8);
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (!p8inf) {
 | 
			
		||||
        BIO_printf(bio_err, "Error decrypting key\n");
 | 
			
		||||
        ERR_print_errors(bio_err);
 | 
			
		||||
        goto end;
 | 
			
		||||
        return (1);
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (!(pkey = EVP_PKCS82PKEY(p8inf))) {
 | 
			
		||||
        BIO_printf(bio_err, "Error converting key\n");
 | 
			
		||||
        ERR_print_errors(bio_err);
 | 
			
		||||
        goto end;
 | 
			
		||||
        return (1);
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (p8inf->broken) {
 | 
			
		||||
@@ -367,29 +382,23 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            BIO_printf(bio_err, "DSA public key include in PrivateKey\n");
 | 
			
		||||
            break;
 | 
			
		||||
 | 
			
		||||
        case PKCS8_NEG_PRIVKEY:
 | 
			
		||||
            BIO_printf(bio_err, "DSA private key value is negative\n");
 | 
			
		||||
            break;
 | 
			
		||||
 | 
			
		||||
        default:
 | 
			
		||||
            BIO_printf(bio_err, "Unknown broken type\n");
 | 
			
		||||
            break;
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    PKCS8_PRIV_KEY_INFO_free(p8inf);
 | 
			
		||||
    if (outformat == FORMAT_PEM)
 | 
			
		||||
        PEM_write_bio_PrivateKey(out, pkey, NULL, NULL, 0, NULL, passout);
 | 
			
		||||
    else if (outformat == FORMAT_ASN1)
 | 
			
		||||
        i2d_PrivateKey_bio(out, pkey);
 | 
			
		||||
    else {
 | 
			
		||||
        BIO_printf(bio_err, "Bad format specified for key\n");
 | 
			
		||||
        goto end;
 | 
			
		||||
        return (1);
 | 
			
		||||
    }
 | 
			
		||||
    ret = 0;
 | 
			
		||||
 | 
			
		||||
 end:
 | 
			
		||||
    X509_SIG_free(p8);
 | 
			
		||||
    PKCS8_PRIV_KEY_INFO_free(p8inf);
 | 
			
		||||
    EVP_PKEY_free(pkey);
 | 
			
		||||
    BIO_free_all(out);
 | 
			
		||||
    BIO_free(in);
 | 
			
		||||
@@ -398,5 +407,5 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    if (passout)
 | 
			
		||||
        OPENSSL_free(passout);
 | 
			
		||||
 | 
			
		||||
    return ret;
 | 
			
		||||
    return (0);
 | 
			
		||||
}
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										251
									
								
								apps/pkey.c
									
									
									
									
									
								
							
							
						
						
									
										251
									
								
								apps/pkey.c
									
									
									
									
									
								
							@@ -1,251 +0,0 @@
 | 
			
		||||
/* apps/pkey.c */
 | 
			
		||||
/*
 | 
			
		||||
 * Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL project
 | 
			
		||||
 * 2006
 | 
			
		||||
 */
 | 
			
		||||
/* ====================================================================
 | 
			
		||||
 * Copyright (c) 2006 The OpenSSL Project.  All rights reserved.
 | 
			
		||||
 *
 | 
			
		||||
 * Redistribution and use in source and binary forms, with or without
 | 
			
		||||
 * modification, are permitted provided that the following conditions
 | 
			
		||||
 * are met:
 | 
			
		||||
 *
 | 
			
		||||
 * 1. Redistributions of source code must retain the above copyright
 | 
			
		||||
 *    notice, this list of conditions and the following disclaimer.
 | 
			
		||||
 *
 | 
			
		||||
 * 2. Redistributions in binary form must reproduce the above copyright
 | 
			
		||||
 *    notice, this list of conditions and the following disclaimer in
 | 
			
		||||
 *    the documentation and/or other materials provided with the
 | 
			
		||||
 *    distribution.
 | 
			
		||||
 *
 | 
			
		||||
 * 3. All advertising materials mentioning features or use of this
 | 
			
		||||
 *    software must display the following acknowledgment:
 | 
			
		||||
 *    "This product includes software developed by the OpenSSL Project
 | 
			
		||||
 *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
 | 
			
		||||
 *
 | 
			
		||||
 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
 | 
			
		||||
 *    endorse or promote products derived from this software without
 | 
			
		||||
 *    prior written permission. For written permission, please contact
 | 
			
		||||
 *    licensing@OpenSSL.org.
 | 
			
		||||
 *
 | 
			
		||||
 * 5. Products derived from this software may not be called "OpenSSL"
 | 
			
		||||
 *    nor may "OpenSSL" appear in their names without prior written
 | 
			
		||||
 *    permission of the OpenSSL Project.
 | 
			
		||||
 *
 | 
			
		||||
 * 6. Redistributions of any form whatsoever must retain the following
 | 
			
		||||
 *    acknowledgment:
 | 
			
		||||
 *    "This product includes software developed by the OpenSSL Project
 | 
			
		||||
 *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
 | 
			
		||||
 *
 | 
			
		||||
 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
 | 
			
		||||
 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 | 
			
		||||
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
 | 
			
		||||
 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
 | 
			
		||||
 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 | 
			
		||||
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 | 
			
		||||
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
 | 
			
		||||
 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 | 
			
		||||
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
 | 
			
		||||
 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 | 
			
		||||
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
 | 
			
		||||
 * OF THE POSSIBILITY OF SUCH DAMAGE.
 | 
			
		||||
 * ====================================================================
 | 
			
		||||
 *
 | 
			
		||||
 * This product includes cryptographic software written by Eric Young
 | 
			
		||||
 * (eay@cryptsoft.com).  This product includes software written by Tim
 | 
			
		||||
 * Hudson (tjh@cryptsoft.com).
 | 
			
		||||
 *
 | 
			
		||||
 */
 | 
			
		||||
#include <stdio.h>
 | 
			
		||||
#include <string.h>
 | 
			
		||||
#include "apps.h"
 | 
			
		||||
#include <openssl/pem.h>
 | 
			
		||||
#include <openssl/err.h>
 | 
			
		||||
#include <openssl/evp.h>
 | 
			
		||||
 | 
			
		||||
#define PROG pkey_main
 | 
			
		||||
 | 
			
		||||
int MAIN(int, char **);
 | 
			
		||||
 | 
			
		||||
int MAIN(int argc, char **argv)
 | 
			
		||||
{
 | 
			
		||||
    ENGINE *e = NULL;
 | 
			
		||||
    char **args, *infile = NULL, *outfile = NULL;
 | 
			
		||||
    char *passargin = NULL, *passargout = NULL;
 | 
			
		||||
    BIO *in = NULL, *out = NULL;
 | 
			
		||||
    const EVP_CIPHER *cipher = NULL;
 | 
			
		||||
    int informat, outformat;
 | 
			
		||||
    int pubin = 0, pubout = 0, pubtext = 0, text = 0, noout = 0;
 | 
			
		||||
    EVP_PKEY *pkey = NULL;
 | 
			
		||||
    char *passin = NULL, *passout = NULL;
 | 
			
		||||
    int badarg = 0;
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
    char *engine = NULL;
 | 
			
		||||
#endif
 | 
			
		||||
    int ret = 1;
 | 
			
		||||
 | 
			
		||||
    if (bio_err == NULL)
 | 
			
		||||
        bio_err = BIO_new_fp(stderr, BIO_NOCLOSE);
 | 
			
		||||
 | 
			
		||||
    if (!load_config(bio_err, NULL))
 | 
			
		||||
        goto end;
 | 
			
		||||
 | 
			
		||||
    informat = FORMAT_PEM;
 | 
			
		||||
    outformat = FORMAT_PEM;
 | 
			
		||||
 | 
			
		||||
    ERR_load_crypto_strings();
 | 
			
		||||
    OpenSSL_add_all_algorithms();
 | 
			
		||||
    args = argv + 1;
 | 
			
		||||
    while (!badarg && *args && *args[0] == '-') {
 | 
			
		||||
        if (!strcmp(*args, "-inform")) {
 | 
			
		||||
            if (args[1]) {
 | 
			
		||||
                args++;
 | 
			
		||||
                informat = str2fmt(*args);
 | 
			
		||||
            } else
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
        } else if (!strcmp(*args, "-outform")) {
 | 
			
		||||
            if (args[1]) {
 | 
			
		||||
                args++;
 | 
			
		||||
                outformat = str2fmt(*args);
 | 
			
		||||
            } else
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
        } else if (!strcmp(*args, "-passin")) {
 | 
			
		||||
            if (!args[1])
 | 
			
		||||
                goto bad;
 | 
			
		||||
            passargin = *(++args);
 | 
			
		||||
        } else if (!strcmp(*args, "-passout")) {
 | 
			
		||||
            if (!args[1])
 | 
			
		||||
                goto bad;
 | 
			
		||||
            passargout = *(++args);
 | 
			
		||||
        }
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
        else if (strcmp(*args, "-engine") == 0) {
 | 
			
		||||
            if (!args[1])
 | 
			
		||||
                goto bad;
 | 
			
		||||
            engine = *(++args);
 | 
			
		||||
        }
 | 
			
		||||
#endif
 | 
			
		||||
        else if (!strcmp(*args, "-in")) {
 | 
			
		||||
            if (args[1]) {
 | 
			
		||||
                args++;
 | 
			
		||||
                infile = *args;
 | 
			
		||||
            } else
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
        } else if (!strcmp(*args, "-out")) {
 | 
			
		||||
            if (args[1]) {
 | 
			
		||||
                args++;
 | 
			
		||||
                outfile = *args;
 | 
			
		||||
            } else
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
        } else if (strcmp(*args, "-pubin") == 0) {
 | 
			
		||||
            pubin = 1;
 | 
			
		||||
            pubout = 1;
 | 
			
		||||
            pubtext = 1;
 | 
			
		||||
        } else if (strcmp(*args, "-pubout") == 0)
 | 
			
		||||
            pubout = 1;
 | 
			
		||||
        else if (strcmp(*args, "-text_pub") == 0) {
 | 
			
		||||
            pubtext = 1;
 | 
			
		||||
            text = 1;
 | 
			
		||||
        } else if (strcmp(*args, "-text") == 0)
 | 
			
		||||
            text = 1;
 | 
			
		||||
        else if (strcmp(*args, "-noout") == 0)
 | 
			
		||||
            noout = 1;
 | 
			
		||||
        else {
 | 
			
		||||
            cipher = EVP_get_cipherbyname(*args + 1);
 | 
			
		||||
            if (!cipher) {
 | 
			
		||||
                BIO_printf(bio_err, "Unknown cipher %s\n", *args + 1);
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
        args++;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (badarg) {
 | 
			
		||||
 bad:
 | 
			
		||||
        BIO_printf(bio_err, "Usage pkey [options]\n");
 | 
			
		||||
        BIO_printf(bio_err, "where options are\n");
 | 
			
		||||
        BIO_printf(bio_err, "-in file        input file\n");
 | 
			
		||||
        BIO_printf(bio_err, "-inform X       input format (DER or PEM)\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-passin arg     input file pass phrase source\n");
 | 
			
		||||
        BIO_printf(bio_err, "-outform X      output format (DER or PEM)\n");
 | 
			
		||||
        BIO_printf(bio_err, "-out file       output file\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-passout arg    output file pass phrase source\n");
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-engine e       use engine e, possibly a hardware device.\n");
 | 
			
		||||
#endif
 | 
			
		||||
        return 1;
 | 
			
		||||
    }
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
    e = setup_engine(bio_err, engine, 0);
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
    if (!app_passwd(bio_err, passargin, passargout, &passin, &passout)) {
 | 
			
		||||
        BIO_printf(bio_err, "Error getting passwords\n");
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (outfile) {
 | 
			
		||||
        if (!(out = BIO_new_file(outfile, "wb"))) {
 | 
			
		||||
            BIO_printf(bio_err, "Can't open output file %s\n", outfile);
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
    } else {
 | 
			
		||||
        out = BIO_new_fp(stdout, BIO_NOCLOSE);
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
        {
 | 
			
		||||
            BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
			
		||||
            out = BIO_push(tmpbio, out);
 | 
			
		||||
        }
 | 
			
		||||
#endif
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (pubin)
 | 
			
		||||
        pkey = load_pubkey(bio_err, infile, informat, 1,
 | 
			
		||||
                           passin, e, "Public Key");
 | 
			
		||||
    else
 | 
			
		||||
        pkey = load_key(bio_err, infile, informat, 1, passin, e, "key");
 | 
			
		||||
    if (!pkey)
 | 
			
		||||
        goto end;
 | 
			
		||||
 | 
			
		||||
    if (!noout) {
 | 
			
		||||
        if (outformat == FORMAT_PEM) {
 | 
			
		||||
            if (pubout)
 | 
			
		||||
                PEM_write_bio_PUBKEY(out, pkey);
 | 
			
		||||
            else
 | 
			
		||||
                PEM_write_bio_PrivateKey(out, pkey, cipher,
 | 
			
		||||
                                         NULL, 0, NULL, passout);
 | 
			
		||||
        } else if (outformat == FORMAT_ASN1) {
 | 
			
		||||
            if (pubout)
 | 
			
		||||
                i2d_PUBKEY_bio(out, pkey);
 | 
			
		||||
            else
 | 
			
		||||
                i2d_PrivateKey_bio(out, pkey);
 | 
			
		||||
        } else {
 | 
			
		||||
            BIO_printf(bio_err, "Bad format specified for key\n");
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (text) {
 | 
			
		||||
        if (pubtext)
 | 
			
		||||
            EVP_PKEY_print_public(out, pkey, 0, NULL);
 | 
			
		||||
        else
 | 
			
		||||
            EVP_PKEY_print_private(out, pkey, 0, NULL);
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    ret = 0;
 | 
			
		||||
 | 
			
		||||
 end:
 | 
			
		||||
    EVP_PKEY_free(pkey);
 | 
			
		||||
    BIO_free_all(out);
 | 
			
		||||
    BIO_free(in);
 | 
			
		||||
    if (passin)
 | 
			
		||||
        OPENSSL_free(passin);
 | 
			
		||||
    if (passout)
 | 
			
		||||
        OPENSSL_free(passout);
 | 
			
		||||
 | 
			
		||||
    return ret;
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										185
									
								
								apps/pkeyparam.c
									
									
									
									
									
								
							
							
						
						
									
										185
									
								
								apps/pkeyparam.c
									
									
									
									
									
								
							@@ -1,185 +0,0 @@
 | 
			
		||||
/* apps/pkeyparam.c */
 | 
			
		||||
/*
 | 
			
		||||
 * Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL project
 | 
			
		||||
 * 2006
 | 
			
		||||
 */
 | 
			
		||||
/* ====================================================================
 | 
			
		||||
 * Copyright (c) 2006 The OpenSSL Project.  All rights reserved.
 | 
			
		||||
 *
 | 
			
		||||
 * Redistribution and use in source and binary forms, with or without
 | 
			
		||||
 * modification, are permitted provided that the following conditions
 | 
			
		||||
 * are met:
 | 
			
		||||
 *
 | 
			
		||||
 * 1. Redistributions of source code must retain the above copyright
 | 
			
		||||
 *    notice, this list of conditions and the following disclaimer.
 | 
			
		||||
 *
 | 
			
		||||
 * 2. Redistributions in binary form must reproduce the above copyright
 | 
			
		||||
 *    notice, this list of conditions and the following disclaimer in
 | 
			
		||||
 *    the documentation and/or other materials provided with the
 | 
			
		||||
 *    distribution.
 | 
			
		||||
 *
 | 
			
		||||
 * 3. All advertising materials mentioning features or use of this
 | 
			
		||||
 *    software must display the following acknowledgment:
 | 
			
		||||
 *    "This product includes software developed by the OpenSSL Project
 | 
			
		||||
 *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
 | 
			
		||||
 *
 | 
			
		||||
 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
 | 
			
		||||
 *    endorse or promote products derived from this software without
 | 
			
		||||
 *    prior written permission. For written permission, please contact
 | 
			
		||||
 *    licensing@OpenSSL.org.
 | 
			
		||||
 *
 | 
			
		||||
 * 5. Products derived from this software may not be called "OpenSSL"
 | 
			
		||||
 *    nor may "OpenSSL" appear in their names without prior written
 | 
			
		||||
 *    permission of the OpenSSL Project.
 | 
			
		||||
 *
 | 
			
		||||
 * 6. Redistributions of any form whatsoever must retain the following
 | 
			
		||||
 *    acknowledgment:
 | 
			
		||||
 *    "This product includes software developed by the OpenSSL Project
 | 
			
		||||
 *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
 | 
			
		||||
 *
 | 
			
		||||
 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
 | 
			
		||||
 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 | 
			
		||||
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
 | 
			
		||||
 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
 | 
			
		||||
 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 | 
			
		||||
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 | 
			
		||||
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
 | 
			
		||||
 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 | 
			
		||||
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
 | 
			
		||||
 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 | 
			
		||||
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
 | 
			
		||||
 * OF THE POSSIBILITY OF SUCH DAMAGE.
 | 
			
		||||
 * ====================================================================
 | 
			
		||||
 *
 | 
			
		||||
 * This product includes cryptographic software written by Eric Young
 | 
			
		||||
 * (eay@cryptsoft.com).  This product includes software written by Tim
 | 
			
		||||
 * Hudson (tjh@cryptsoft.com).
 | 
			
		||||
 *
 | 
			
		||||
 */
 | 
			
		||||
#include <stdio.h>
 | 
			
		||||
#include <string.h>
 | 
			
		||||
#include "apps.h"
 | 
			
		||||
#include <openssl/pem.h>
 | 
			
		||||
#include <openssl/err.h>
 | 
			
		||||
#include <openssl/evp.h>
 | 
			
		||||
 | 
			
		||||
#define PROG pkeyparam_main
 | 
			
		||||
 | 
			
		||||
int MAIN(int, char **);
 | 
			
		||||
 | 
			
		||||
int MAIN(int argc, char **argv)
 | 
			
		||||
{
 | 
			
		||||
    char **args, *infile = NULL, *outfile = NULL;
 | 
			
		||||
    BIO *in = NULL, *out = NULL;
 | 
			
		||||
    int text = 0, noout = 0;
 | 
			
		||||
    EVP_PKEY *pkey = NULL;
 | 
			
		||||
    int badarg = 0;
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
    char *engine = NULL;
 | 
			
		||||
#endif
 | 
			
		||||
    int ret = 1;
 | 
			
		||||
 | 
			
		||||
    if (bio_err == NULL)
 | 
			
		||||
        bio_err = BIO_new_fp(stderr, BIO_NOCLOSE);
 | 
			
		||||
 | 
			
		||||
    if (!load_config(bio_err, NULL))
 | 
			
		||||
        goto end;
 | 
			
		||||
 | 
			
		||||
    ERR_load_crypto_strings();
 | 
			
		||||
    OpenSSL_add_all_algorithms();
 | 
			
		||||
    args = argv + 1;
 | 
			
		||||
    while (!badarg && *args && *args[0] == '-') {
 | 
			
		||||
        if (!strcmp(*args, "-in")) {
 | 
			
		||||
            if (args[1]) {
 | 
			
		||||
                args++;
 | 
			
		||||
                infile = *args;
 | 
			
		||||
            } else
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
        } else if (!strcmp(*args, "-out")) {
 | 
			
		||||
            if (args[1]) {
 | 
			
		||||
                args++;
 | 
			
		||||
                outfile = *args;
 | 
			
		||||
            } else
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
        }
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
        else if (strcmp(*args, "-engine") == 0) {
 | 
			
		||||
            if (!args[1])
 | 
			
		||||
                goto bad;
 | 
			
		||||
            engine = *(++args);
 | 
			
		||||
        }
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
        else if (strcmp(*args, "-text") == 0)
 | 
			
		||||
            text = 1;
 | 
			
		||||
        else if (strcmp(*args, "-noout") == 0)
 | 
			
		||||
            noout = 1;
 | 
			
		||||
        args++;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (badarg) {
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
 bad:
 | 
			
		||||
#endif
 | 
			
		||||
        BIO_printf(bio_err, "Usage pkeyparam [options]\n");
 | 
			
		||||
        BIO_printf(bio_err, "where options are\n");
 | 
			
		||||
        BIO_printf(bio_err, "-in file        input file\n");
 | 
			
		||||
        BIO_printf(bio_err, "-out file       output file\n");
 | 
			
		||||
        BIO_printf(bio_err, "-text           print parameters as text\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-noout          don't output encoded parameters\n");
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-engine e       use engine e, possibly a hardware device.\n");
 | 
			
		||||
#endif
 | 
			
		||||
        return 1;
 | 
			
		||||
    }
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
    setup_engine(bio_err, engine, 0);
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
    if (infile) {
 | 
			
		||||
        if (!(in = BIO_new_file(infile, "r"))) {
 | 
			
		||||
            BIO_printf(bio_err, "Can't open input file %s\n", infile);
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
    } else
 | 
			
		||||
        in = BIO_new_fp(stdin, BIO_NOCLOSE);
 | 
			
		||||
 | 
			
		||||
    if (outfile) {
 | 
			
		||||
        if (!(out = BIO_new_file(outfile, "w"))) {
 | 
			
		||||
            BIO_printf(bio_err, "Can't open output file %s\n", outfile);
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
    } else {
 | 
			
		||||
        out = BIO_new_fp(stdout, BIO_NOCLOSE);
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
        {
 | 
			
		||||
            BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
			
		||||
            out = BIO_push(tmpbio, out);
 | 
			
		||||
        }
 | 
			
		||||
#endif
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    pkey = PEM_read_bio_Parameters(in, NULL);
 | 
			
		||||
    if (!pkey) {
 | 
			
		||||
        BIO_printf(bio_err, "Error reading parameters\n");
 | 
			
		||||
        ERR_print_errors(bio_err);
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (!noout)
 | 
			
		||||
        PEM_write_bio_Parameters(out, pkey);
 | 
			
		||||
 | 
			
		||||
    if (text)
 | 
			
		||||
        EVP_PKEY_print_params(out, pkey, 0, NULL);
 | 
			
		||||
 | 
			
		||||
    ret = 0;
 | 
			
		||||
 | 
			
		||||
 end:
 | 
			
		||||
    EVP_PKEY_free(pkey);
 | 
			
		||||
    BIO_free_all(out);
 | 
			
		||||
    BIO_free(in);
 | 
			
		||||
 | 
			
		||||
    return ret;
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										555
									
								
								apps/pkeyutl.c
									
									
									
									
									
								
							
							
						
						
									
										555
									
								
								apps/pkeyutl.c
									
									
									
									
									
								
							@@ -1,555 +0,0 @@
 | 
			
		||||
/*
 | 
			
		||||
 * Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL project
 | 
			
		||||
 * 2006.
 | 
			
		||||
 */
 | 
			
		||||
/* ====================================================================
 | 
			
		||||
 * Copyright (c) 2006 The OpenSSL Project.  All rights reserved.
 | 
			
		||||
 *
 | 
			
		||||
 * Redistribution and use in source and binary forms, with or without
 | 
			
		||||
 * modification, are permitted provided that the following conditions
 | 
			
		||||
 * are met:
 | 
			
		||||
 *
 | 
			
		||||
 * 1. Redistributions of source code must retain the above copyright
 | 
			
		||||
 *    notice, this list of conditions and the following disclaimer.
 | 
			
		||||
 *
 | 
			
		||||
 * 2. Redistributions in binary form must reproduce the above copyright
 | 
			
		||||
 *    notice, this list of conditions and the following disclaimer in
 | 
			
		||||
 *    the documentation and/or other materials provided with the
 | 
			
		||||
 *    distribution.
 | 
			
		||||
 *
 | 
			
		||||
 * 3. All advertising materials mentioning features or use of this
 | 
			
		||||
 *    software must display the following acknowledgment:
 | 
			
		||||
 *    "This product includes software developed by the OpenSSL Project
 | 
			
		||||
 *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
 | 
			
		||||
 *
 | 
			
		||||
 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
 | 
			
		||||
 *    endorse or promote products derived from this software without
 | 
			
		||||
 *    prior written permission. For written permission, please contact
 | 
			
		||||
 *    licensing@OpenSSL.org.
 | 
			
		||||
 *
 | 
			
		||||
 * 5. Products derived from this software may not be called "OpenSSL"
 | 
			
		||||
 *    nor may "OpenSSL" appear in their names without prior written
 | 
			
		||||
 *    permission of the OpenSSL Project.
 | 
			
		||||
 *
 | 
			
		||||
 * 6. Redistributions of any form whatsoever must retain the following
 | 
			
		||||
 *    acknowledgment:
 | 
			
		||||
 *    "This product includes software developed by the OpenSSL Project
 | 
			
		||||
 *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
 | 
			
		||||
 *
 | 
			
		||||
 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
 | 
			
		||||
 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 | 
			
		||||
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
 | 
			
		||||
 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
 | 
			
		||||
 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 | 
			
		||||
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 | 
			
		||||
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
 | 
			
		||||
 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 | 
			
		||||
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
 | 
			
		||||
 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 | 
			
		||||
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
 | 
			
		||||
 * OF THE POSSIBILITY OF SUCH DAMAGE.
 | 
			
		||||
 * ====================================================================
 | 
			
		||||
 *
 | 
			
		||||
 * This product includes cryptographic software written by Eric Young
 | 
			
		||||
 * (eay@cryptsoft.com).  This product includes software written by Tim
 | 
			
		||||
 * Hudson (tjh@cryptsoft.com).
 | 
			
		||||
 *
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
#include "apps.h"
 | 
			
		||||
#include <string.h>
 | 
			
		||||
#include <openssl/err.h>
 | 
			
		||||
#include <openssl/pem.h>
 | 
			
		||||
#include <openssl/evp.h>
 | 
			
		||||
 | 
			
		||||
#define KEY_PRIVKEY     1
 | 
			
		||||
#define KEY_PUBKEY      2
 | 
			
		||||
#define KEY_CERT        3
 | 
			
		||||
 | 
			
		||||
static void usage(void);
 | 
			
		||||
 | 
			
		||||
#undef PROG
 | 
			
		||||
 | 
			
		||||
#define PROG pkeyutl_main
 | 
			
		||||
 | 
			
		||||
static EVP_PKEY_CTX *init_ctx(int *pkeysize,
 | 
			
		||||
                              const char *keyfile, int keyform, int key_type,
 | 
			
		||||
                              char *passargin, int pkey_op, ENGINE *e,
 | 
			
		||||
                              int   impl);
 | 
			
		||||
 | 
			
		||||
static int setup_peer(BIO *err, EVP_PKEY_CTX *ctx, int peerform,
 | 
			
		||||
                      const char *file, ENGINE* e);
 | 
			
		||||
 | 
			
		||||
static int do_keyop(EVP_PKEY_CTX *ctx, int pkey_op,
 | 
			
		||||
                    unsigned char *out, size_t *poutlen,
 | 
			
		||||
                    unsigned char *in, size_t inlen);
 | 
			
		||||
 | 
			
		||||
int MAIN(int argc, char **);
 | 
			
		||||
 | 
			
		||||
int MAIN(int argc, char **argv)
 | 
			
		||||
{
 | 
			
		||||
    BIO *in = NULL, *out = NULL;
 | 
			
		||||
    char *infile = NULL, *outfile = NULL, *sigfile = NULL;
 | 
			
		||||
    ENGINE *e = NULL;
 | 
			
		||||
    int pkey_op = EVP_PKEY_OP_SIGN, key_type = KEY_PRIVKEY;
 | 
			
		||||
    int keyform = FORMAT_PEM, peerform = FORMAT_PEM;
 | 
			
		||||
    char badarg = 0, rev = 0;
 | 
			
		||||
    char hexdump = 0, asn1parse = 0;
 | 
			
		||||
    EVP_PKEY_CTX *ctx = NULL;
 | 
			
		||||
    char *passargin = NULL;
 | 
			
		||||
    int keysize = -1;
 | 
			
		||||
    int engine_impl = 0;
 | 
			
		||||
    unsigned char *buf_in = NULL, *buf_out = NULL, *sig = NULL;
 | 
			
		||||
    size_t buf_outlen = 0;
 | 
			
		||||
    int buf_inlen = 0, siglen = -1;
 | 
			
		||||
    const char *inkey = NULL;
 | 
			
		||||
    const char *peerkey = NULL;
 | 
			
		||||
    STACK_OF(OPENSSL_STRING) *pkeyopts = NULL;
 | 
			
		||||
 | 
			
		||||
    int ret = 1, rv = -1;
 | 
			
		||||
 | 
			
		||||
    argc--;
 | 
			
		||||
    argv++;
 | 
			
		||||
 | 
			
		||||
    if (!bio_err)
 | 
			
		||||
        bio_err = BIO_new_fp(stderr, BIO_NOCLOSE);
 | 
			
		||||
 | 
			
		||||
    if (!load_config(bio_err, NULL))
 | 
			
		||||
        goto end;
 | 
			
		||||
    ERR_load_crypto_strings();
 | 
			
		||||
    OpenSSL_add_all_algorithms();
 | 
			
		||||
 | 
			
		||||
    while (argc >= 1) {
 | 
			
		||||
        if (!strcmp(*argv, "-in")) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
            else
 | 
			
		||||
                infile = *(++argv);
 | 
			
		||||
        } else if (!strcmp(*argv, "-out")) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
            else
 | 
			
		||||
                outfile = *(++argv);
 | 
			
		||||
        } else if (!strcmp(*argv, "-sigfile")) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
            else
 | 
			
		||||
                sigfile = *(++argv);
 | 
			
		||||
        } else if (!strcmp(*argv, "-inkey")) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
            else
 | 
			
		||||
                inkey = *++argv;
 | 
			
		||||
        } else if (!strcmp(*argv, "-peerkey")) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
            else
 | 
			
		||||
                peerkey = *++argv;
 | 
			
		||||
        } else if (!strcmp(*argv, "-passin")) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
            else
 | 
			
		||||
                passargin = *(++argv);
 | 
			
		||||
        } else if (strcmp(*argv, "-peerform") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
            else
 | 
			
		||||
                peerform = str2fmt(*(++argv));
 | 
			
		||||
        } else if (strcmp(*argv, "-keyform") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
            else
 | 
			
		||||
                keyform = str2fmt(*(++argv));
 | 
			
		||||
        }
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
        else if (!strcmp(*argv, "-engine")) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
            else
 | 
			
		||||
                e = setup_engine(bio_err, *(++argv), 0);
 | 
			
		||||
        } else if (!strcmp(*argv, "-engine_impl")) {
 | 
			
		||||
                engine_impl = 1;
 | 
			
		||||
        }
 | 
			
		||||
#endif
 | 
			
		||||
        else if (!strcmp(*argv, "-pubin"))
 | 
			
		||||
            key_type = KEY_PUBKEY;
 | 
			
		||||
        else if (!strcmp(*argv, "-certin"))
 | 
			
		||||
            key_type = KEY_CERT;
 | 
			
		||||
        else if (!strcmp(*argv, "-asn1parse"))
 | 
			
		||||
            asn1parse = 1;
 | 
			
		||||
        else if (!strcmp(*argv, "-hexdump"))
 | 
			
		||||
            hexdump = 1;
 | 
			
		||||
        else if (!strcmp(*argv, "-sign"))
 | 
			
		||||
            pkey_op = EVP_PKEY_OP_SIGN;
 | 
			
		||||
        else if (!strcmp(*argv, "-verify"))
 | 
			
		||||
            pkey_op = EVP_PKEY_OP_VERIFY;
 | 
			
		||||
        else if (!strcmp(*argv, "-verifyrecover"))
 | 
			
		||||
            pkey_op = EVP_PKEY_OP_VERIFYRECOVER;
 | 
			
		||||
        else if (!strcmp(*argv, "-encrypt"))
 | 
			
		||||
            pkey_op = EVP_PKEY_OP_ENCRYPT;
 | 
			
		||||
        else if (!strcmp(*argv, "-decrypt"))
 | 
			
		||||
            pkey_op = EVP_PKEY_OP_DECRYPT;
 | 
			
		||||
        else if (!strcmp(*argv, "-derive"))
 | 
			
		||||
            pkey_op = EVP_PKEY_OP_DERIVE;
 | 
			
		||||
        else if (!strcmp(*argv, "-rev"))
 | 
			
		||||
            rev = 1;
 | 
			
		||||
        else if (strcmp(*argv, "-pkeyopt") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
            else if ((pkeyopts == NULL &&
 | 
			
		||||
                     (pkeyopts = sk_OPENSSL_STRING_new_null()) == NULL) ||
 | 
			
		||||
                    sk_OPENSSL_STRING_push(pkeyopts, *++argv) == 0) {
 | 
			
		||||
                BIO_puts(bio_err, "out of memory\n");
 | 
			
		||||
                goto end;
 | 
			
		||||
            }
 | 
			
		||||
        } else
 | 
			
		||||
            badarg = 1;
 | 
			
		||||
        if (badarg) {
 | 
			
		||||
            usage();
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
        argc--;
 | 
			
		||||
        argv++;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (inkey == NULL ||
 | 
			
		||||
        (peerkey != NULL && pkey_op != EVP_PKEY_OP_DERIVE)) {
 | 
			
		||||
        usage();
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
    ctx = init_ctx(&keysize, inkey, keyform, key_type,
 | 
			
		||||
                   passargin, pkey_op, e, engine_impl);
 | 
			
		||||
    if (!ctx) {
 | 
			
		||||
        BIO_puts(bio_err, "Error initializing context\n");
 | 
			
		||||
        ERR_print_errors(bio_err);
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
    if (peerkey != NULL && !setup_peer(bio_err, ctx, peerform, peerkey, e)) {
 | 
			
		||||
        BIO_puts(bio_err, "Error setting up peer key\n");
 | 
			
		||||
        ERR_print_errors(bio_err);
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
    if (pkeyopts != NULL) {
 | 
			
		||||
        int num = sk_OPENSSL_STRING_num(pkeyopts);
 | 
			
		||||
        int i;
 | 
			
		||||
 | 
			
		||||
        for (i = 0; i < num; ++i) {
 | 
			
		||||
            const char *opt = sk_OPENSSL_STRING_value(pkeyopts, i);
 | 
			
		||||
 | 
			
		||||
            if (pkey_ctrl_string(ctx, opt) <= 0) {
 | 
			
		||||
                BIO_puts(bio_err, "parameter setting error\n");
 | 
			
		||||
                ERR_print_errors(bio_err);
 | 
			
		||||
                goto end;
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (sigfile && (pkey_op != EVP_PKEY_OP_VERIFY)) {
 | 
			
		||||
        BIO_puts(bio_err, "Signature file specified for non verify\n");
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (!sigfile && (pkey_op == EVP_PKEY_OP_VERIFY)) {
 | 
			
		||||
        BIO_puts(bio_err, "No signature file specified for verify\n");
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
/* FIXME: seed PRNG only if needed */
 | 
			
		||||
    app_RAND_load_file(NULL, bio_err, 0);
 | 
			
		||||
 | 
			
		||||
    if (pkey_op != EVP_PKEY_OP_DERIVE) {
 | 
			
		||||
        if (infile) {
 | 
			
		||||
            if (!(in = BIO_new_file(infile, "rb"))) {
 | 
			
		||||
                BIO_puts(bio_err, "Error Opening Input File\n");
 | 
			
		||||
                ERR_print_errors(bio_err);
 | 
			
		||||
                goto end;
 | 
			
		||||
            }
 | 
			
		||||
        } else
 | 
			
		||||
            in = BIO_new_fp(stdin, BIO_NOCLOSE);
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (outfile) {
 | 
			
		||||
        if (!(out = BIO_new_file(outfile, "wb"))) {
 | 
			
		||||
            BIO_printf(bio_err, "Error Creating Output File\n");
 | 
			
		||||
            ERR_print_errors(bio_err);
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
    } else {
 | 
			
		||||
        out = BIO_new_fp(stdout, BIO_NOCLOSE);
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
        {
 | 
			
		||||
            BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
			
		||||
            out = BIO_push(tmpbio, out);
 | 
			
		||||
        }
 | 
			
		||||
#endif
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (sigfile) {
 | 
			
		||||
        BIO *sigbio = BIO_new_file(sigfile, "rb");
 | 
			
		||||
        if (!sigbio) {
 | 
			
		||||
            BIO_printf(bio_err, "Can't open signature file %s\n", sigfile);
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
        siglen = bio_to_mem(&sig, keysize * 10, sigbio);
 | 
			
		||||
        BIO_free(sigbio);
 | 
			
		||||
        if (siglen < 0) {
 | 
			
		||||
            BIO_printf(bio_err, "Error reading signature data\n");
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (in) {
 | 
			
		||||
        /* Read the input data */
 | 
			
		||||
        buf_inlen = bio_to_mem(&buf_in, keysize * 10, in);
 | 
			
		||||
        if (buf_inlen < 0) {
 | 
			
		||||
            BIO_printf(bio_err, "Error reading input Data\n");
 | 
			
		||||
            exit(1);
 | 
			
		||||
        }
 | 
			
		||||
        if (rev) {
 | 
			
		||||
            size_t i;
 | 
			
		||||
            unsigned char ctmp;
 | 
			
		||||
            size_t l = (size_t)buf_inlen;
 | 
			
		||||
            for (i = 0; i < l / 2; i++) {
 | 
			
		||||
                ctmp = buf_in[i];
 | 
			
		||||
                buf_in[i] = buf_in[l - 1 - i];
 | 
			
		||||
                buf_in[l - 1 - i] = ctmp;
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (pkey_op == EVP_PKEY_OP_VERIFY) {
 | 
			
		||||
        rv = EVP_PKEY_verify(ctx, sig, (size_t)siglen,
 | 
			
		||||
                             buf_in, (size_t)buf_inlen);
 | 
			
		||||
        if (rv == 0)
 | 
			
		||||
            BIO_puts(out, "Signature Verification Failure\n");
 | 
			
		||||
        else if (rv == 1)
 | 
			
		||||
            BIO_puts(out, "Signature Verified Successfully\n");
 | 
			
		||||
        if (rv >= 0)
 | 
			
		||||
            goto end;
 | 
			
		||||
    } else {
 | 
			
		||||
        rv = do_keyop(ctx, pkey_op, NULL, (size_t *)&buf_outlen,
 | 
			
		||||
                      buf_in, (size_t)buf_inlen);
 | 
			
		||||
        if (rv > 0 && buf_outlen != 0) {
 | 
			
		||||
            buf_out = OPENSSL_malloc(buf_outlen);
 | 
			
		||||
            if (!buf_out)
 | 
			
		||||
                rv = -1;
 | 
			
		||||
            else
 | 
			
		||||
                rv = do_keyop(ctx, pkey_op,
 | 
			
		||||
                              buf_out, (size_t *)&buf_outlen,
 | 
			
		||||
                              buf_in, (size_t)buf_inlen);
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (rv <= 0) {
 | 
			
		||||
        BIO_printf(bio_err, "Public Key operation error\n");
 | 
			
		||||
        ERR_print_errors(bio_err);
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
    ret = 0;
 | 
			
		||||
    if (asn1parse) {
 | 
			
		||||
        if (!ASN1_parse_dump(out, buf_out, buf_outlen, 1, -1))
 | 
			
		||||
            ERR_print_errors(bio_err);
 | 
			
		||||
    } else if (hexdump)
 | 
			
		||||
        BIO_dump(out, (char *)buf_out, buf_outlen);
 | 
			
		||||
    else
 | 
			
		||||
        BIO_write(out, buf_out, buf_outlen);
 | 
			
		||||
 | 
			
		||||
 end:
 | 
			
		||||
    if (ctx)
 | 
			
		||||
        EVP_PKEY_CTX_free(ctx);
 | 
			
		||||
    BIO_free(in);
 | 
			
		||||
    BIO_free_all(out);
 | 
			
		||||
    if (buf_in != NULL)
 | 
			
		||||
        OPENSSL_free(buf_in);
 | 
			
		||||
    if (buf_out != NULL)
 | 
			
		||||
        OPENSSL_free(buf_out);
 | 
			
		||||
    if (sig != NULL)
 | 
			
		||||
        OPENSSL_free(sig);
 | 
			
		||||
    if (pkeyopts != NULL)
 | 
			
		||||
        sk_OPENSSL_STRING_free(pkeyopts);
 | 
			
		||||
    return ret;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static void usage()
 | 
			
		||||
{
 | 
			
		||||
    BIO_printf(bio_err, "Usage: pkeyutl [options]\n");
 | 
			
		||||
    BIO_printf(bio_err, "-in file        input file\n");
 | 
			
		||||
    BIO_printf(bio_err, "-out file       output file\n");
 | 
			
		||||
    BIO_printf(bio_err,
 | 
			
		||||
               "-sigfile file signature file (verify operation only)\n");
 | 
			
		||||
    BIO_printf(bio_err, "-inkey file     input key\n");
 | 
			
		||||
    BIO_printf(bio_err, "-keyform arg    private key format - default PEM\n");
 | 
			
		||||
    BIO_printf(bio_err, "-pubin          input is a public key\n");
 | 
			
		||||
    BIO_printf(bio_err,
 | 
			
		||||
               "-certin         input is a certificate carrying a public key\n");
 | 
			
		||||
    BIO_printf(bio_err, "-pkeyopt X:Y    public key options\n");
 | 
			
		||||
    BIO_printf(bio_err, "-sign           sign with private key\n");
 | 
			
		||||
    BIO_printf(bio_err, "-verify         verify with public key\n");
 | 
			
		||||
    BIO_printf(bio_err,
 | 
			
		||||
               "-verifyrecover  verify with public key, recover original data\n");
 | 
			
		||||
    BIO_printf(bio_err, "-encrypt        encrypt with public key\n");
 | 
			
		||||
    BIO_printf(bio_err, "-decrypt        decrypt with private key\n");
 | 
			
		||||
    BIO_printf(bio_err, "-derive         derive shared secret\n");
 | 
			
		||||
    BIO_printf(bio_err, "-hexdump        hex dump output\n");
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
    BIO_printf(bio_err,
 | 
			
		||||
               "-engine e       use engine e, maybe a hardware device, for loading keys.\n");
 | 
			
		||||
    BIO_printf(bio_err, "-engine_impl    also use engine given by -engine for crypto operations\n");
 | 
			
		||||
#endif
 | 
			
		||||
    BIO_printf(bio_err, "-passin arg     pass phrase source\n");
 | 
			
		||||
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static EVP_PKEY_CTX *init_ctx(int *pkeysize,
 | 
			
		||||
                              const char *keyfile, int keyform, int key_type,
 | 
			
		||||
                              char *passargin, int pkey_op, ENGINE *e,
 | 
			
		||||
                              int   engine_impl)
 | 
			
		||||
{
 | 
			
		||||
    EVP_PKEY *pkey = NULL;
 | 
			
		||||
    EVP_PKEY_CTX *ctx = NULL;
 | 
			
		||||
    ENGINE *impl = NULL;
 | 
			
		||||
    char *passin = NULL;
 | 
			
		||||
    int rv = -1;
 | 
			
		||||
    X509 *x;
 | 
			
		||||
    if (((pkey_op == EVP_PKEY_OP_SIGN) || (pkey_op == EVP_PKEY_OP_DECRYPT)
 | 
			
		||||
         || (pkey_op == EVP_PKEY_OP_DERIVE))
 | 
			
		||||
        && (key_type != KEY_PRIVKEY)) {
 | 
			
		||||
        BIO_printf(bio_err, "A private key is needed for this operation\n");
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
    if (!app_passwd(bio_err, passargin, NULL, &passin, NULL)) {
 | 
			
		||||
        BIO_printf(bio_err, "Error getting password\n");
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
    switch (key_type) {
 | 
			
		||||
    case KEY_PRIVKEY:
 | 
			
		||||
        pkey = load_key(bio_err, keyfile, keyform, 0,
 | 
			
		||||
                        passin, e, "Private Key");
 | 
			
		||||
        break;
 | 
			
		||||
 | 
			
		||||
    case KEY_PUBKEY:
 | 
			
		||||
        pkey = load_pubkey(bio_err, keyfile, keyform, 0,
 | 
			
		||||
                           NULL, e, "Public Key");
 | 
			
		||||
        break;
 | 
			
		||||
 | 
			
		||||
    case KEY_CERT:
 | 
			
		||||
        x = load_cert(bio_err, keyfile, keyform, NULL, e, "Certificate");
 | 
			
		||||
        if (x) {
 | 
			
		||||
            pkey = X509_get_pubkey(x);
 | 
			
		||||
            X509_free(x);
 | 
			
		||||
        }
 | 
			
		||||
        break;
 | 
			
		||||
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    *pkeysize = EVP_PKEY_size(pkey);
 | 
			
		||||
 | 
			
		||||
    if (!pkey)
 | 
			
		||||
        goto end;
 | 
			
		||||
        
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
    if (engine_impl)
 | 
			
		||||
	impl = e;
 | 
			
		||||
#endif
 | 
			
		||||
            
 | 
			
		||||
    ctx = EVP_PKEY_CTX_new(pkey, impl);
 | 
			
		||||
    
 | 
			
		||||
    EVP_PKEY_free(pkey);
 | 
			
		||||
 | 
			
		||||
    if (!ctx)
 | 
			
		||||
        goto end;
 | 
			
		||||
 | 
			
		||||
    switch (pkey_op) {
 | 
			
		||||
    case EVP_PKEY_OP_SIGN:
 | 
			
		||||
        rv = EVP_PKEY_sign_init(ctx);
 | 
			
		||||
        break;
 | 
			
		||||
 | 
			
		||||
    case EVP_PKEY_OP_VERIFY:
 | 
			
		||||
        rv = EVP_PKEY_verify_init(ctx);
 | 
			
		||||
        break;
 | 
			
		||||
 | 
			
		||||
    case EVP_PKEY_OP_VERIFYRECOVER:
 | 
			
		||||
        rv = EVP_PKEY_verify_recover_init(ctx);
 | 
			
		||||
        break;
 | 
			
		||||
 | 
			
		||||
    case EVP_PKEY_OP_ENCRYPT:
 | 
			
		||||
        rv = EVP_PKEY_encrypt_init(ctx);
 | 
			
		||||
        break;
 | 
			
		||||
 | 
			
		||||
    case EVP_PKEY_OP_DECRYPT:
 | 
			
		||||
        rv = EVP_PKEY_decrypt_init(ctx);
 | 
			
		||||
        break;
 | 
			
		||||
 | 
			
		||||
    case EVP_PKEY_OP_DERIVE:
 | 
			
		||||
        rv = EVP_PKEY_derive_init(ctx);
 | 
			
		||||
        break;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (rv <= 0) {
 | 
			
		||||
        EVP_PKEY_CTX_free(ctx);
 | 
			
		||||
        ctx = NULL;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
 end:
 | 
			
		||||
 | 
			
		||||
    if (passin)
 | 
			
		||||
        OPENSSL_free(passin);
 | 
			
		||||
 | 
			
		||||
    return ctx;
 | 
			
		||||
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static int setup_peer(BIO *err, EVP_PKEY_CTX *ctx, int peerform,
 | 
			
		||||
                      const char *file, ENGINE* e)
 | 
			
		||||
{
 | 
			
		||||
    EVP_PKEY *peer = NULL;
 | 
			
		||||
    ENGINE* engine = NULL;
 | 
			
		||||
    int ret;
 | 
			
		||||
 | 
			
		||||
    if (peerform == FORMAT_ENGINE)
 | 
			
		||||
        engine = e;
 | 
			
		||||
    peer = load_pubkey(bio_err, file, peerform, 0, NULL, engine, "Peer Key");
 | 
			
		||||
 | 
			
		||||
    if (!peer) {
 | 
			
		||||
        BIO_printf(bio_err, "Error reading peer key %s\n", file);
 | 
			
		||||
        ERR_print_errors(err);
 | 
			
		||||
        return 0;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    ret = EVP_PKEY_derive_set_peer(ctx, peer);
 | 
			
		||||
 | 
			
		||||
    EVP_PKEY_free(peer);
 | 
			
		||||
    if (ret <= 0)
 | 
			
		||||
        ERR_print_errors(err);
 | 
			
		||||
    return ret;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static int do_keyop(EVP_PKEY_CTX *ctx, int pkey_op,
 | 
			
		||||
                    unsigned char *out, size_t *poutlen,
 | 
			
		||||
                    unsigned char *in, size_t inlen)
 | 
			
		||||
{
 | 
			
		||||
    int rv = 0;
 | 
			
		||||
    switch (pkey_op) {
 | 
			
		||||
    case EVP_PKEY_OP_VERIFYRECOVER:
 | 
			
		||||
        rv = EVP_PKEY_verify_recover(ctx, out, poutlen, in, inlen);
 | 
			
		||||
        break;
 | 
			
		||||
 | 
			
		||||
    case EVP_PKEY_OP_SIGN:
 | 
			
		||||
        rv = EVP_PKEY_sign(ctx, out, poutlen, in, inlen);
 | 
			
		||||
        break;
 | 
			
		||||
 | 
			
		||||
    case EVP_PKEY_OP_ENCRYPT:
 | 
			
		||||
        rv = EVP_PKEY_encrypt(ctx, out, poutlen, in, inlen);
 | 
			
		||||
        break;
 | 
			
		||||
 | 
			
		||||
    case EVP_PKEY_OP_DECRYPT:
 | 
			
		||||
        rv = EVP_PKEY_decrypt(ctx, out, poutlen, in, inlen);
 | 
			
		||||
        break;
 | 
			
		||||
 | 
			
		||||
    case EVP_PKEY_OP_DERIVE:
 | 
			
		||||
        rv = EVP_PKEY_derive(ctx, out, poutlen);
 | 
			
		||||
        break;
 | 
			
		||||
 | 
			
		||||
    }
 | 
			
		||||
    return rv;
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										42
									
								
								apps/prime.c
									
									
									
									
									
								
							
							
						
						
									
										42
									
								
								apps/prime.c
									
									
									
									
									
								
							@@ -61,9 +61,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
{
 | 
			
		||||
    int hex = 0;
 | 
			
		||||
    int checks = 20;
 | 
			
		||||
    int generate = 0;
 | 
			
		||||
    int bits = 0;
 | 
			
		||||
    int safe = 0;
 | 
			
		||||
    BIGNUM *bn = NULL;
 | 
			
		||||
    BIO *bio_out;
 | 
			
		||||
 | 
			
		||||
@@ -78,15 +75,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    while (argc >= 1 && **argv == '-') {
 | 
			
		||||
        if (!strcmp(*argv, "-hex"))
 | 
			
		||||
            hex = 1;
 | 
			
		||||
        else if (!strcmp(*argv, "-generate"))
 | 
			
		||||
            generate = 1;
 | 
			
		||||
        else if (!strcmp(*argv, "-bits"))
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            else
 | 
			
		||||
                bits = atoi(*++argv);
 | 
			
		||||
        else if (!strcmp(*argv, "-safe"))
 | 
			
		||||
            safe = 1;
 | 
			
		||||
        else if (!strcmp(*argv, "-checks"))
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
@@ -100,7 +88,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        ++argv;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (argv[0] == NULL && !generate) {
 | 
			
		||||
    if (argv[0] == NULL) {
 | 
			
		||||
        BIO_printf(bio_err, "No prime specified\n");
 | 
			
		||||
        goto bad;
 | 
			
		||||
    }
 | 
			
		||||
@@ -115,28 +103,14 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
#endif
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (generate) {
 | 
			
		||||
        char *s;
 | 
			
		||||
    if (hex)
 | 
			
		||||
        BN_hex2bn(&bn, argv[0]);
 | 
			
		||||
    else
 | 
			
		||||
        BN_dec2bn(&bn, argv[0]);
 | 
			
		||||
 | 
			
		||||
        if (!bits) {
 | 
			
		||||
            BIO_printf(bio_err, "Specifiy the number of bits.\n");
 | 
			
		||||
            return 1;
 | 
			
		||||
        }
 | 
			
		||||
        bn = BN_new();
 | 
			
		||||
        BN_generate_prime_ex(bn, bits, safe, NULL, NULL, NULL);
 | 
			
		||||
        s = hex ? BN_bn2hex(bn) : BN_bn2dec(bn);
 | 
			
		||||
        BIO_printf(bio_out, "%s\n", s);
 | 
			
		||||
        OPENSSL_free(s);
 | 
			
		||||
    } else {
 | 
			
		||||
        if (hex)
 | 
			
		||||
            BN_hex2bn(&bn, argv[0]);
 | 
			
		||||
        else
 | 
			
		||||
            BN_dec2bn(&bn, argv[0]);
 | 
			
		||||
 | 
			
		||||
        BN_print(bio_out, bn);
 | 
			
		||||
        BIO_printf(bio_out, " is %sprime\n",
 | 
			
		||||
                   BN_is_prime_ex(bn, checks, NULL, NULL) ? "" : "not ");
 | 
			
		||||
    }
 | 
			
		||||
    BN_print(bio_out, bn);
 | 
			
		||||
    BIO_printf(bio_out, " is %sprime\n",
 | 
			
		||||
               BN_is_prime_ex(bn, checks, NULL, NULL) ? "" : "not ");
 | 
			
		||||
 | 
			
		||||
    BN_free(bn);
 | 
			
		||||
    BIO_free_all(bio_out);
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										31
									
								
								apps/progs.h
									
									
									
									
									
								
							
							
						
						
									
										31
									
								
								apps/progs.h
									
									
									
									
									
								
							@@ -22,7 +22,6 @@ extern int ecparam_main(int argc, char *argv[]);
 | 
			
		||||
extern int x509_main(int argc, char *argv[]);
 | 
			
		||||
extern int genrsa_main(int argc, char *argv[]);
 | 
			
		||||
extern int gendsa_main(int argc, char *argv[]);
 | 
			
		||||
extern int genpkey_main(int argc, char *argv[]);
 | 
			
		||||
extern int s_server_main(int argc, char *argv[]);
 | 
			
		||||
extern int s_client_main(int argc, char *argv[]);
 | 
			
		||||
extern int speed_main(int argc, char *argv[]);
 | 
			
		||||
@@ -36,31 +35,22 @@ extern int ciphers_main(int argc, char *argv[]);
 | 
			
		||||
extern int nseq_main(int argc, char *argv[]);
 | 
			
		||||
extern int pkcs12_main(int argc, char *argv[]);
 | 
			
		||||
extern int pkcs8_main(int argc, char *argv[]);
 | 
			
		||||
extern int pkey_main(int argc, char *argv[]);
 | 
			
		||||
extern int pkeyparam_main(int argc, char *argv[]);
 | 
			
		||||
extern int pkeyutl_main(int argc, char *argv[]);
 | 
			
		||||
extern int spkac_main(int argc, char *argv[]);
 | 
			
		||||
extern int smime_main(int argc, char *argv[]);
 | 
			
		||||
extern int rand_main(int argc, char *argv[]);
 | 
			
		||||
extern int engine_main(int argc, char *argv[]);
 | 
			
		||||
extern int ocsp_main(int argc, char *argv[]);
 | 
			
		||||
extern int prime_main(int argc, char *argv[]);
 | 
			
		||||
extern int ts_main(int argc, char *argv[]);
 | 
			
		||||
extern int srp_main(int argc, char *argv[]);
 | 
			
		||||
 | 
			
		||||
#define FUNC_TYPE_GENERAL       1
 | 
			
		||||
#define FUNC_TYPE_MD            2
 | 
			
		||||
#define FUNC_TYPE_CIPHER        3
 | 
			
		||||
#define FUNC_TYPE_PKEY          4
 | 
			
		||||
#define FUNC_TYPE_MD_ALG        5
 | 
			
		||||
#define FUNC_TYPE_CIPHER_ALG    6
 | 
			
		||||
 | 
			
		||||
typedef struct {
 | 
			
		||||
    int type;
 | 
			
		||||
    const char *name;
 | 
			
		||||
    int (*func) (int argc, char *argv[]);
 | 
			
		||||
} FUNCTION;
 | 
			
		||||
DECLARE_LHASH_OF(FUNCTION);
 | 
			
		||||
 | 
			
		||||
FUNCTION functions[] = {
 | 
			
		||||
    {FUNC_TYPE_GENERAL, "verify", verify_main},
 | 
			
		||||
@@ -106,17 +96,16 @@ FUNCTION functions[] = {
 | 
			
		||||
#ifndef OPENSSL_NO_DSA
 | 
			
		||||
    {FUNC_TYPE_GENERAL, "gendsa", gendsa_main},
 | 
			
		||||
#endif
 | 
			
		||||
    {FUNC_TYPE_GENERAL, "genpkey", genpkey_main},
 | 
			
		||||
#if !defined(OPENSSL_NO_SOCK)
 | 
			
		||||
#if !defined(OPENSSL_NO_SOCK) && !(defined(OPENSSL_NO_SSL2) && defined(OPENSSL_NO_SSL3))
 | 
			
		||||
    {FUNC_TYPE_GENERAL, "s_server", s_server_main},
 | 
			
		||||
#endif
 | 
			
		||||
#if !defined(OPENSSL_NO_SOCK)
 | 
			
		||||
#if !defined(OPENSSL_NO_SOCK) && !(defined(OPENSSL_NO_SSL2) && defined(OPENSSL_NO_SSL3))
 | 
			
		||||
    {FUNC_TYPE_GENERAL, "s_client", s_client_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_SPEED
 | 
			
		||||
    {FUNC_TYPE_GENERAL, "speed", speed_main},
 | 
			
		||||
#endif
 | 
			
		||||
#if !defined(OPENSSL_NO_SOCK)
 | 
			
		||||
#if !defined(OPENSSL_NO_SOCK) && !(defined(OPENSSL_NO_SSL2) && defined(OPENSSL_NO_SSL3))
 | 
			
		||||
    {FUNC_TYPE_GENERAL, "s_time", s_time_main},
 | 
			
		||||
#endif
 | 
			
		||||
    {FUNC_TYPE_GENERAL, "version", version_main},
 | 
			
		||||
@@ -126,7 +115,7 @@ FUNCTION functions[] = {
 | 
			
		||||
#endif
 | 
			
		||||
    {FUNC_TYPE_GENERAL, "crl2pkcs7", crl2pkcs7_main},
 | 
			
		||||
    {FUNC_TYPE_GENERAL, "sess_id", sess_id_main},
 | 
			
		||||
#if !defined(OPENSSL_NO_SOCK)
 | 
			
		||||
#if !defined(OPENSSL_NO_SOCK) && !(defined(OPENSSL_NO_SSL2) && defined(OPENSSL_NO_SSL3))
 | 
			
		||||
    {FUNC_TYPE_GENERAL, "ciphers", ciphers_main},
 | 
			
		||||
#endif
 | 
			
		||||
    {FUNC_TYPE_GENERAL, "nseq", nseq_main},
 | 
			
		||||
@@ -134,23 +123,14 @@ FUNCTION functions[] = {
 | 
			
		||||
    {FUNC_TYPE_GENERAL, "pkcs12", pkcs12_main},
 | 
			
		||||
#endif
 | 
			
		||||
    {FUNC_TYPE_GENERAL, "pkcs8", pkcs8_main},
 | 
			
		||||
    {FUNC_TYPE_GENERAL, "pkey", pkey_main},
 | 
			
		||||
    {FUNC_TYPE_GENERAL, "pkeyparam", pkeyparam_main},
 | 
			
		||||
    {FUNC_TYPE_GENERAL, "pkeyutl", pkeyutl_main},
 | 
			
		||||
    {FUNC_TYPE_GENERAL, "spkac", spkac_main},
 | 
			
		||||
    {FUNC_TYPE_GENERAL, "smime", smime_main},
 | 
			
		||||
    {FUNC_TYPE_GENERAL, "rand", rand_main},
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
    {FUNC_TYPE_GENERAL, "engine", engine_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_OCSP
 | 
			
		||||
    {FUNC_TYPE_GENERAL, "ocsp", ocsp_main},
 | 
			
		||||
#endif
 | 
			
		||||
    {FUNC_TYPE_GENERAL, "prime", prime_main},
 | 
			
		||||
    {FUNC_TYPE_GENERAL, "ts", ts_main},
 | 
			
		||||
#ifndef OPENSSL_NO_SRP
 | 
			
		||||
    {FUNC_TYPE_GENERAL, "srp", srp_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_MD2
 | 
			
		||||
    {FUNC_TYPE_MD, "md2", dgst_main},
 | 
			
		||||
#endif
 | 
			
		||||
@@ -209,9 +189,6 @@ FUNCTION functions[] = {
 | 
			
		||||
    {FUNC_TYPE_CIPHER, "camellia-256-ecb", enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
    {FUNC_TYPE_CIPHER, "base64", enc_main},
 | 
			
		||||
#ifdef ZLIB
 | 
			
		||||
    {FUNC_TYPE_CIPHER, "zlib", enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_DES
 | 
			
		||||
    {FUNC_TYPE_CIPHER, "des", enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
 
 | 
			
		||||
@@ -13,16 +13,12 @@ print <<'EOF';
 | 
			
		||||
#define FUNC_TYPE_GENERAL	1
 | 
			
		||||
#define FUNC_TYPE_MD		2
 | 
			
		||||
#define FUNC_TYPE_CIPHER	3
 | 
			
		||||
#define FUNC_TYPE_PKEY		4
 | 
			
		||||
#define FUNC_TYPE_MD_ALG	5
 | 
			
		||||
#define FUNC_TYPE_CIPHER_ALG	6
 | 
			
		||||
 | 
			
		||||
typedef struct {
 | 
			
		||||
	int type;
 | 
			
		||||
	const char *name;
 | 
			
		||||
	int (*func)(int argc,char *argv[]);
 | 
			
		||||
	} FUNCTION;
 | 
			
		||||
DECLARE_LHASH_OF(FUNCTION);
 | 
			
		||||
 | 
			
		||||
FUNCTION functions[] = {
 | 
			
		||||
EOF
 | 
			
		||||
@@ -32,7 +28,7 @@ foreach (@ARGV)
 | 
			
		||||
	push(@files,$_);
 | 
			
		||||
	$str="\t{FUNC_TYPE_GENERAL,\"$_\",${_}_main},\n";
 | 
			
		||||
	if (($_ =~ /^s_/) || ($_ =~ /^ciphers$/))
 | 
			
		||||
		{ print "#if !defined(OPENSSL_NO_SOCK)\n${str}#endif\n"; } 
 | 
			
		||||
		{ print "#if !defined(OPENSSL_NO_SOCK) && !(defined(OPENSSL_NO_SSL2) && defined(OPENSSL_NO_SSL3))\n${str}#endif\n"; } 
 | 
			
		||||
	elsif ( ($_ =~ /^speed$/))
 | 
			
		||||
		{ print "#ifndef OPENSSL_NO_SPEED\n${str}#endif\n"; }
 | 
			
		||||
	elsif ( ($_ =~ /^engine$/))
 | 
			
		||||
@@ -49,10 +45,6 @@ foreach (@ARGV)
 | 
			
		||||
		{ print "#if !defined(OPENSSL_NO_DES) && !defined(OPENSSL_NO_SHA1)\n${str}#endif\n"; }
 | 
			
		||||
	elsif ( ($_ =~ /^cms$/))
 | 
			
		||||
		{ print "#ifndef OPENSSL_NO_CMS\n${str}#endif\n"; }
 | 
			
		||||
	elsif ( ($_ =~ /^ocsp$/))
 | 
			
		||||
		{ print "#ifndef OPENSSL_NO_OCSP\n${str}#endif\n"; }
 | 
			
		||||
	elsif ( ($_ =~ /^srp$/))
 | 
			
		||||
		{ print "#ifndef OPENSSL_NO_SRP\n${str}#endif\n"; }
 | 
			
		||||
	else
 | 
			
		||||
		{ print $str; }
 | 
			
		||||
	}
 | 
			
		||||
@@ -70,7 +62,7 @@ foreach (
 | 
			
		||||
	"camellia-128-cbc", "camellia-128-ecb",
 | 
			
		||||
	"camellia-192-cbc", "camellia-192-ecb",
 | 
			
		||||
	"camellia-256-cbc", "camellia-256-ecb",
 | 
			
		||||
	"base64", "zlib",
 | 
			
		||||
	"base64",
 | 
			
		||||
	"des", "des3", "desx", "idea", "seed", "rc4", "rc4-40",
 | 
			
		||||
	"rc2", "bf", "cast", "rc5",
 | 
			
		||||
	"des-ecb", "des-ede",    "des-ede3",
 | 
			
		||||
@@ -97,7 +89,6 @@ foreach (
 | 
			
		||||
	elsif ($_ =~ /bf/)   { $t="#ifndef OPENSSL_NO_BF\n${t}#endif\n"; }
 | 
			
		||||
	elsif ($_ =~ /cast/) { $t="#ifndef OPENSSL_NO_CAST\n${t}#endif\n"; }
 | 
			
		||||
	elsif ($_ =~ /rc5/)  { $t="#ifndef OPENSSL_NO_RC5\n${t}#endif\n"; }
 | 
			
		||||
	elsif ($_ =~ /zlib/)  { $t="#ifdef ZLIB\n${t}#endif\n"; }
 | 
			
		||||
	print $t;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										539
									
								
								apps/req.c
									
									
									
									
									
								
							
							
						
						
									
										539
									
								
								apps/req.c
									
									
									
									
									
								
							@@ -101,8 +101,8 @@
 | 
			
		||||
#define STRING_MASK     "string_mask"
 | 
			
		||||
#define UTF8_IN         "utf8"
 | 
			
		||||
 | 
			
		||||
#define DEFAULT_KEY_LENGTH      2048
 | 
			
		||||
#define MIN_KEY_LENGTH          512
 | 
			
		||||
#define DEFAULT_KEY_LENGTH      512
 | 
			
		||||
#define MIN_KEY_LENGTH          384
 | 
			
		||||
 | 
			
		||||
#undef PROG
 | 
			
		||||
#define PROG    req_main
 | 
			
		||||
@@ -145,33 +145,39 @@ static int add_attribute_object(X509_REQ *req, char *text, const char *def,
 | 
			
		||||
static int add_DN_object(X509_NAME *n, char *text, const char *def,
 | 
			
		||||
                         char *value, int nid, int n_min, int n_max,
 | 
			
		||||
                         unsigned long chtype, int mval);
 | 
			
		||||
static int genpkey_cb(EVP_PKEY_CTX *ctx);
 | 
			
		||||
#ifndef OPENSSL_NO_RSA
 | 
			
		||||
static int MS_CALLBACK req_cb(int p, int n, BN_GENCB *cb);
 | 
			
		||||
#endif
 | 
			
		||||
static int req_check_len(int len, int n_min, int n_max);
 | 
			
		||||
static int check_end(const char *str, const char *end);
 | 
			
		||||
static EVP_PKEY_CTX *set_keygen_ctx(BIO *err, const char *gstr,
 | 
			
		||||
                                    int *pkey_type, long *pkeylen,
 | 
			
		||||
                                    char **palgnam, ENGINE *keygen_engine);
 | 
			
		||||
#ifndef MONOLITH
 | 
			
		||||
static char *default_config_file = NULL;
 | 
			
		||||
#endif
 | 
			
		||||
static CONF *req_conf = NULL;
 | 
			
		||||
static int batch = 0;
 | 
			
		||||
 | 
			
		||||
#define TYPE_RSA        1
 | 
			
		||||
#define TYPE_DSA        2
 | 
			
		||||
#define TYPE_DH         3
 | 
			
		||||
#define TYPE_EC         4
 | 
			
		||||
 | 
			
		||||
int MAIN(int, char **);
 | 
			
		||||
 | 
			
		||||
int MAIN(int argc, char **argv)
 | 
			
		||||
{
 | 
			
		||||
    ENGINE *e = NULL, *gen_eng = NULL;
 | 
			
		||||
    ENGINE *e = NULL;
 | 
			
		||||
#ifndef OPENSSL_NO_DSA
 | 
			
		||||
    DSA *dsa_params = NULL;
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_ECDSA
 | 
			
		||||
    EC_KEY *ec_params = NULL;
 | 
			
		||||
#endif
 | 
			
		||||
    unsigned long nmflag = 0, reqflag = 0;
 | 
			
		||||
    int ex = 1, x509 = 0, days = 30;
 | 
			
		||||
    X509 *x509ss = NULL;
 | 
			
		||||
    X509_REQ *req = NULL;
 | 
			
		||||
    EVP_PKEY_CTX *genctx = NULL;
 | 
			
		||||
    const char *keyalg = NULL;
 | 
			
		||||
    char *keyalgstr = NULL;
 | 
			
		||||
    STACK_OF(OPENSSL_STRING) *pkeyopts = NULL, *sigopts = NULL;
 | 
			
		||||
    EVP_PKEY *pkey = NULL;
 | 
			
		||||
    int i = 0, badops = 0, newreq = 0, verbose = 0, pkey_type = -1;
 | 
			
		||||
    int i = 0, badops = 0, newreq = 0, verbose = 0, pkey_type = TYPE_RSA;
 | 
			
		||||
    long newkey = -1;
 | 
			
		||||
    BIO *in = NULL, *out = NULL;
 | 
			
		||||
    int informat, outformat, verify = 0, noout = 0, text = 0, keyform =
 | 
			
		||||
@@ -193,7 +199,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    char *p;
 | 
			
		||||
    char *subj = NULL;
 | 
			
		||||
    int multirdn = 0;
 | 
			
		||||
    const EVP_MD *md_alg = NULL, *digest = NULL;
 | 
			
		||||
    const EVP_MD *md_alg = NULL, *digest = EVP_sha1();
 | 
			
		||||
    unsigned long chtype = MBSTRING_ASC;
 | 
			
		||||
#ifndef MONOLITH
 | 
			
		||||
    char *to_free;
 | 
			
		||||
@@ -233,14 +239,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            engine = *(++argv);
 | 
			
		||||
        } else if (strcmp(*argv, "-keygen_engine") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            gen_eng = ENGINE_by_id(*(++argv));
 | 
			
		||||
            if (gen_eng == NULL) {
 | 
			
		||||
                BIO_printf(bio_err, "Can't find keygen engine %s\n", *argv);
 | 
			
		||||
                goto end;
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
#endif
 | 
			
		||||
        else if (strcmp(*argv, "-key") == 0) {
 | 
			
		||||
@@ -284,24 +282,116 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            inrand = *(++argv);
 | 
			
		||||
        } else if (strcmp(*argv, "-newkey") == 0) {
 | 
			
		||||
            int is_numeric;
 | 
			
		||||
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            keyalg = *(++argv);
 | 
			
		||||
            p = *(++argv);
 | 
			
		||||
            is_numeric = p[0] >= '0' && p[0] <= '9';
 | 
			
		||||
            if (strncmp("rsa:", p, 4) == 0 || is_numeric) {
 | 
			
		||||
                pkey_type = TYPE_RSA;
 | 
			
		||||
                if (!is_numeric)
 | 
			
		||||
                    p += 4;
 | 
			
		||||
                newkey = atoi(p);
 | 
			
		||||
            } else
 | 
			
		||||
#ifndef OPENSSL_NO_DSA
 | 
			
		||||
            if (strncmp("dsa:", p, 4) == 0) {
 | 
			
		||||
                X509 *xtmp = NULL;
 | 
			
		||||
                EVP_PKEY *dtmp;
 | 
			
		||||
 | 
			
		||||
                pkey_type = TYPE_DSA;
 | 
			
		||||
                p += 4;
 | 
			
		||||
                if ((in = BIO_new_file(p, "r")) == NULL) {
 | 
			
		||||
                    perror(p);
 | 
			
		||||
                    goto end;
 | 
			
		||||
                }
 | 
			
		||||
                if ((dsa_params =
 | 
			
		||||
                     PEM_read_bio_DSAparams(in, NULL, NULL, NULL)) == NULL) {
 | 
			
		||||
                    ERR_clear_error();
 | 
			
		||||
                    (void)BIO_reset(in);
 | 
			
		||||
                    if ((xtmp =
 | 
			
		||||
                         PEM_read_bio_X509(in, NULL, NULL, NULL)) == NULL) {
 | 
			
		||||
                        BIO_printf(bio_err,
 | 
			
		||||
                                   "unable to load DSA parameters from file\n");
 | 
			
		||||
                        goto end;
 | 
			
		||||
                    }
 | 
			
		||||
 | 
			
		||||
                    if ((dtmp = X509_get_pubkey(xtmp)) == NULL)
 | 
			
		||||
                        goto end;
 | 
			
		||||
                    if (dtmp->type == EVP_PKEY_DSA)
 | 
			
		||||
                        dsa_params = DSAparams_dup(dtmp->pkey.dsa);
 | 
			
		||||
                    EVP_PKEY_free(dtmp);
 | 
			
		||||
                    X509_free(xtmp);
 | 
			
		||||
                    if (dsa_params == NULL) {
 | 
			
		||||
                        BIO_printf(bio_err,
 | 
			
		||||
                                   "Certificate does not contain DSA parameters\n");
 | 
			
		||||
                        goto end;
 | 
			
		||||
                    }
 | 
			
		||||
                }
 | 
			
		||||
                BIO_free(in);
 | 
			
		||||
                in = NULL;
 | 
			
		||||
                newkey = BN_num_bits(dsa_params->p);
 | 
			
		||||
            } else
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_ECDSA
 | 
			
		||||
            if (strncmp("ec:", p, 3) == 0) {
 | 
			
		||||
                X509 *xtmp = NULL;
 | 
			
		||||
                EVP_PKEY *dtmp;
 | 
			
		||||
                EC_GROUP *group;
 | 
			
		||||
 | 
			
		||||
                pkey_type = TYPE_EC;
 | 
			
		||||
                p += 3;
 | 
			
		||||
                if ((in = BIO_new_file(p, "r")) == NULL) {
 | 
			
		||||
                    perror(p);
 | 
			
		||||
                    goto end;
 | 
			
		||||
                }
 | 
			
		||||
                if ((ec_params = EC_KEY_new()) == NULL)
 | 
			
		||||
                    goto end;
 | 
			
		||||
                group = PEM_read_bio_ECPKParameters(in, NULL, NULL, NULL);
 | 
			
		||||
                if (group == NULL) {
 | 
			
		||||
                    EC_KEY_free(ec_params);
 | 
			
		||||
                    ERR_clear_error();
 | 
			
		||||
                    (void)BIO_reset(in);
 | 
			
		||||
                    if ((xtmp =
 | 
			
		||||
                         PEM_read_bio_X509(in, NULL, NULL, NULL)) == NULL) {
 | 
			
		||||
                        BIO_printf(bio_err,
 | 
			
		||||
                                   "unable to load EC parameters from file\n");
 | 
			
		||||
                        goto end;
 | 
			
		||||
                    }
 | 
			
		||||
 | 
			
		||||
                    if ((dtmp = X509_get_pubkey(xtmp)) == NULL)
 | 
			
		||||
                        goto end;
 | 
			
		||||
                    if (dtmp->type == EVP_PKEY_EC)
 | 
			
		||||
                        ec_params = EC_KEY_dup(dtmp->pkey.ec);
 | 
			
		||||
                    EVP_PKEY_free(dtmp);
 | 
			
		||||
                    X509_free(xtmp);
 | 
			
		||||
                    if (ec_params == NULL) {
 | 
			
		||||
                        BIO_printf(bio_err,
 | 
			
		||||
                                   "Certificate does not contain EC parameters\n");
 | 
			
		||||
                        goto end;
 | 
			
		||||
                    }
 | 
			
		||||
                } else {
 | 
			
		||||
                    if (EC_KEY_set_group(ec_params, group) == 0)
 | 
			
		||||
                        goto end;
 | 
			
		||||
                    EC_GROUP_free(group);
 | 
			
		||||
                }
 | 
			
		||||
 | 
			
		||||
                BIO_free(in);
 | 
			
		||||
                in = NULL;
 | 
			
		||||
                newkey = EC_GROUP_get_degree(EC_KEY_get0_group(ec_params));
 | 
			
		||||
            } else
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_DH
 | 
			
		||||
            if (strncmp("dh:", p, 4) == 0) {
 | 
			
		||||
                pkey_type = TYPE_DH;
 | 
			
		||||
                p += 3;
 | 
			
		||||
            } else
 | 
			
		||||
#endif
 | 
			
		||||
            {
 | 
			
		||||
                goto bad;
 | 
			
		||||
            }
 | 
			
		||||
 | 
			
		||||
            newreq = 1;
 | 
			
		||||
        } else if (strcmp(*argv, "-pkeyopt") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            if (!pkeyopts)
 | 
			
		||||
                pkeyopts = sk_OPENSSL_STRING_new_null();
 | 
			
		||||
            if (!pkeyopts || !sk_OPENSSL_STRING_push(pkeyopts, *(++argv)))
 | 
			
		||||
                goto bad;
 | 
			
		||||
        } else if (strcmp(*argv, "-sigopt") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            if (!sigopts)
 | 
			
		||||
                sigopts = sk_OPENSSL_STRING_new_null();
 | 
			
		||||
            if (!sigopts || !sk_OPENSSL_STRING_push(sigopts, *(++argv)))
 | 
			
		||||
                goto bad;
 | 
			
		||||
        } else if (strcmp(*argv, "-batch") == 0)
 | 
			
		||||
            batch = 1;
 | 
			
		||||
        else if (strcmp(*argv, "-newhdr") == 0)
 | 
			
		||||
@@ -356,6 +446,9 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            serial = s2i_ASN1_INTEGER(NULL, *(++argv));
 | 
			
		||||
            if (!serial)
 | 
			
		||||
                goto bad;
 | 
			
		||||
        } else if ((md_alg = EVP_get_digestbyname(&((*argv)[1]))) != NULL) {
 | 
			
		||||
            /* ok */
 | 
			
		||||
            digest = md_alg;
 | 
			
		||||
        } else if (strcmp(*argv, "-extensions") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
@@ -364,9 +457,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            req_exts = *(++argv);
 | 
			
		||||
        } else if ((md_alg = EVP_get_digestbyname(&((*argv)[1]))) != NULL) {
 | 
			
		||||
            /* ok */
 | 
			
		||||
            digest = md_alg;
 | 
			
		||||
        } else {
 | 
			
		||||
            BIO_printf(bio_err, "unknown option %s\n", *argv);
 | 
			
		||||
            badops = 1;
 | 
			
		||||
@@ -615,6 +705,9 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (newreq && (pkey == NULL)) {
 | 
			
		||||
#ifndef OPENSSL_NO_RSA
 | 
			
		||||
        BN_GENCB cb;
 | 
			
		||||
#endif
 | 
			
		||||
        char *randfile = NCONF_get_string(req_conf, SECTION, "RANDFILE");
 | 
			
		||||
        if (randfile == NULL)
 | 
			
		||||
            ERR_clear_error();
 | 
			
		||||
@@ -622,60 +715,66 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        if (inrand)
 | 
			
		||||
            app_RAND_load_files(inrand);
 | 
			
		||||
 | 
			
		||||
        if (!NCONF_get_number(req_conf, SECTION, BITS, &newkey)) {
 | 
			
		||||
            newkey = DEFAULT_KEY_LENGTH;
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        if (keyalg) {
 | 
			
		||||
            genctx = set_keygen_ctx(bio_err, keyalg, &pkey_type, &newkey,
 | 
			
		||||
                                    &keyalgstr, gen_eng);
 | 
			
		||||
            if (!genctx)
 | 
			
		||||
                goto end;
 | 
			
		||||
        if (newkey <= 0) {
 | 
			
		||||
            if (!NCONF_get_number(req_conf, SECTION, BITS, &newkey))
 | 
			
		||||
                newkey = DEFAULT_KEY_LENGTH;
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        if (newkey < MIN_KEY_LENGTH
 | 
			
		||||
            && (pkey_type == EVP_PKEY_RSA || pkey_type == EVP_PKEY_DSA)) {
 | 
			
		||||
            && (pkey_type == TYPE_RSA || pkey_type == TYPE_DSA)) {
 | 
			
		||||
            BIO_printf(bio_err, "private key length is too short,\n");
 | 
			
		||||
            BIO_printf(bio_err, "it needs to be at least %d bits, not %ld\n",
 | 
			
		||||
                       MIN_KEY_LENGTH, newkey);
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        if (!genctx) {
 | 
			
		||||
            genctx = set_keygen_ctx(bio_err, NULL, &pkey_type, &newkey,
 | 
			
		||||
                                    &keyalgstr, gen_eng);
 | 
			
		||||
            if (!genctx)
 | 
			
		||||
                goto end;
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        if (pkeyopts) {
 | 
			
		||||
            char *genopt;
 | 
			
		||||
            for (i = 0; i < sk_OPENSSL_STRING_num(pkeyopts); i++) {
 | 
			
		||||
                genopt = sk_OPENSSL_STRING_value(pkeyopts, i);
 | 
			
		||||
                if (pkey_ctrl_string(genctx, genopt) <= 0) {
 | 
			
		||||
                    BIO_printf(bio_err, "parameter error \"%s\"\n", genopt);
 | 
			
		||||
                    ERR_print_errors(bio_err);
 | 
			
		||||
                    goto end;
 | 
			
		||||
                }
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        BIO_printf(bio_err, "Generating a %ld bit %s private key\n",
 | 
			
		||||
                   newkey, keyalgstr);
 | 
			
		||||
                   newkey, (pkey_type == TYPE_RSA) ? "RSA" :
 | 
			
		||||
                   (pkey_type == TYPE_DSA) ? "DSA" : "EC");
 | 
			
		||||
 | 
			
		||||
        EVP_PKEY_CTX_set_cb(genctx, genpkey_cb);
 | 
			
		||||
        EVP_PKEY_CTX_set_app_data(genctx, bio_err);
 | 
			
		||||
 | 
			
		||||
        if (EVP_PKEY_keygen(genctx, &pkey) <= 0) {
 | 
			
		||||
            BIO_puts(bio_err, "Error Generating Key\n");
 | 
			
		||||
        if ((pkey = EVP_PKEY_new()) == NULL)
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        EVP_PKEY_CTX_free(genctx);
 | 
			
		||||
        genctx = NULL;
 | 
			
		||||
#ifndef OPENSSL_NO_RSA
 | 
			
		||||
        BN_GENCB_set(&cb, req_cb, bio_err);
 | 
			
		||||
        if (pkey_type == TYPE_RSA) {
 | 
			
		||||
            RSA *rsa = RSA_new();
 | 
			
		||||
            BIGNUM *bn = BN_new();
 | 
			
		||||
            if (!bn || !rsa || !BN_set_word(bn, 0x10001) ||
 | 
			
		||||
                !RSA_generate_key_ex(rsa, newkey, bn, &cb) ||
 | 
			
		||||
                !EVP_PKEY_assign_RSA(pkey, rsa)) {
 | 
			
		||||
                if (bn)
 | 
			
		||||
                    BN_free(bn);
 | 
			
		||||
                if (rsa)
 | 
			
		||||
                    RSA_free(rsa);
 | 
			
		||||
                goto end;
 | 
			
		||||
            }
 | 
			
		||||
            BN_free(bn);
 | 
			
		||||
        } else
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_DSA
 | 
			
		||||
        if (pkey_type == TYPE_DSA) {
 | 
			
		||||
            if (!DSA_generate_key(dsa_params))
 | 
			
		||||
                goto end;
 | 
			
		||||
            if (!EVP_PKEY_assign_DSA(pkey, dsa_params))
 | 
			
		||||
                goto end;
 | 
			
		||||
            dsa_params = NULL;
 | 
			
		||||
        }
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_ECDSA
 | 
			
		||||
        if (pkey_type == TYPE_EC) {
 | 
			
		||||
            if (!EC_KEY_generate_key(ec_params))
 | 
			
		||||
                goto end;
 | 
			
		||||
            if (!EVP_PKEY_assign_EC_KEY(pkey, ec_params))
 | 
			
		||||
                goto end;
 | 
			
		||||
            ec_params = NULL;
 | 
			
		||||
        }
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
        app_RAND_write_file(randfile, bio_err);
 | 
			
		||||
 | 
			
		||||
        if (pkey == NULL)
 | 
			
		||||
            goto end;
 | 
			
		||||
 | 
			
		||||
        if (keyout == NULL) {
 | 
			
		||||
            keyout = NCONF_get_string(req_conf, SECTION, KEYFILE);
 | 
			
		||||
            if (keyout == NULL)
 | 
			
		||||
@@ -761,7 +860,14 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            BIO_printf(bio_err, "you need to specify a private key\n");
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_DSA
 | 
			
		||||
        if (pkey->type == EVP_PKEY_DSA)
 | 
			
		||||
            digest = EVP_dss1();
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_ECDSA
 | 
			
		||||
        if (pkey->type == EVP_PKEY_EC)
 | 
			
		||||
            digest = EVP_ecdsa();
 | 
			
		||||
#endif
 | 
			
		||||
        if (req == NULL) {
 | 
			
		||||
            req = X509_REQ_new();
 | 
			
		||||
            if (req == NULL) {
 | 
			
		||||
@@ -801,7 +907,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                goto end;
 | 
			
		||||
            if (!X509_gmtime_adj(X509_get_notBefore(x509ss), 0))
 | 
			
		||||
                goto end;
 | 
			
		||||
            if (!X509_time_adj_ex(X509_get_notAfter(x509ss), days, 0, NULL))
 | 
			
		||||
            if (!X509_gmtime_adj
 | 
			
		||||
                (X509_get_notAfter(x509ss), (long)60 * 60 * 24 * days))
 | 
			
		||||
                goto end;
 | 
			
		||||
            if (!X509_set_subject_name
 | 
			
		||||
                (x509ss, X509_REQ_get_subject_name(req)))
 | 
			
		||||
@@ -825,11 +932,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                goto end;
 | 
			
		||||
            }
 | 
			
		||||
 | 
			
		||||
            i = do_X509_sign(bio_err, x509ss, pkey, digest, sigopts);
 | 
			
		||||
            if (!i) {
 | 
			
		||||
                ERR_print_errors(bio_err);
 | 
			
		||||
            if (!(i = X509_sign(x509ss, pkey, digest)))
 | 
			
		||||
                goto end;
 | 
			
		||||
            }
 | 
			
		||||
        } else {
 | 
			
		||||
            X509V3_CTX ext_ctx;
 | 
			
		||||
 | 
			
		||||
@@ -846,11 +950,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                           req_exts);
 | 
			
		||||
                goto end;
 | 
			
		||||
            }
 | 
			
		||||
            i = do_X509_REQ_sign(bio_err, req, pkey, digest, sigopts);
 | 
			
		||||
            if (!i) {
 | 
			
		||||
                ERR_print_errors(bio_err);
 | 
			
		||||
            if (!(i = X509_REQ_sign(req, pkey, digest)))
 | 
			
		||||
                goto end;
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
@@ -970,7 +1071,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        }
 | 
			
		||||
        fprintf(stdout, "Modulus=");
 | 
			
		||||
#ifndef OPENSSL_NO_RSA
 | 
			
		||||
        if (EVP_PKEY_base_id(tpubkey) == EVP_PKEY_RSA)
 | 
			
		||||
        if (tpubkey->type == EVP_PKEY_RSA)
 | 
			
		||||
            BN_print(out, tpubkey->pkey.rsa->n);
 | 
			
		||||
        else
 | 
			
		||||
#endif
 | 
			
		||||
@@ -1024,18 +1125,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    BIO_free(in);
 | 
			
		||||
    BIO_free_all(out);
 | 
			
		||||
    EVP_PKEY_free(pkey);
 | 
			
		||||
    if (genctx)
 | 
			
		||||
        EVP_PKEY_CTX_free(genctx);
 | 
			
		||||
    if (pkeyopts)
 | 
			
		||||
        sk_OPENSSL_STRING_free(pkeyopts);
 | 
			
		||||
    if (sigopts)
 | 
			
		||||
        sk_OPENSSL_STRING_free(sigopts);
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
    if (gen_eng)
 | 
			
		||||
        ENGINE_free(gen_eng);
 | 
			
		||||
#endif
 | 
			
		||||
    if (keyalgstr)
 | 
			
		||||
        OPENSSL_free(keyalgstr);
 | 
			
		||||
    X509_REQ_free(req);
 | 
			
		||||
    X509_free(x509ss);
 | 
			
		||||
    ASN1_INTEGER_free(serial);
 | 
			
		||||
@@ -1044,6 +1133,14 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    if (passargout && passout)
 | 
			
		||||
        OPENSSL_free(passout);
 | 
			
		||||
    OBJ_cleanup();
 | 
			
		||||
#ifndef OPENSSL_NO_DSA
 | 
			
		||||
    if (dsa_params != NULL)
 | 
			
		||||
        DSA_free(dsa_params);
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_ECDSA
 | 
			
		||||
    if (ec_params != NULL)
 | 
			
		||||
        EC_KEY_free(ec_params);
 | 
			
		||||
#endif
 | 
			
		||||
    apps_shutdown();
 | 
			
		||||
    OPENSSL_EXIT(ex);
 | 
			
		||||
}
 | 
			
		||||
@@ -1483,6 +1580,28 @@ static int add_attribute_object(X509_REQ *req, char *text, const char *def,
 | 
			
		||||
    return (0);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_RSA
 | 
			
		||||
static int MS_CALLBACK req_cb(int p, int n, BN_GENCB *cb)
 | 
			
		||||
{
 | 
			
		||||
    char c = '*';
 | 
			
		||||
 | 
			
		||||
    if (p == 0)
 | 
			
		||||
        c = '.';
 | 
			
		||||
    if (p == 1)
 | 
			
		||||
        c = '+';
 | 
			
		||||
    if (p == 2)
 | 
			
		||||
        c = '*';
 | 
			
		||||
    if (p == 3)
 | 
			
		||||
        c = '\n';
 | 
			
		||||
    BIO_write(cb->arg, &c, 1);
 | 
			
		||||
    (void)BIO_flush(cb->arg);
 | 
			
		||||
# ifdef LINT
 | 
			
		||||
    p = n;
 | 
			
		||||
# endif
 | 
			
		||||
    return 1;
 | 
			
		||||
}
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
static int req_check_len(int len, int n_min, int n_max)
 | 
			
		||||
{
 | 
			
		||||
    if ((n_min > 0) && (len < n_min)) {
 | 
			
		||||
@@ -1512,221 +1631,3 @@ static int check_end(const char *str, const char *end)
 | 
			
		||||
    tmp = str + slen - elen;
 | 
			
		||||
    return strcmp(tmp, end);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static EVP_PKEY_CTX *set_keygen_ctx(BIO *err, const char *gstr,
 | 
			
		||||
                                    int *pkey_type, long *pkeylen,
 | 
			
		||||
                                    char **palgnam, ENGINE *keygen_engine)
 | 
			
		||||
{
 | 
			
		||||
    EVP_PKEY_CTX *gctx = NULL;
 | 
			
		||||
    EVP_PKEY *param = NULL;
 | 
			
		||||
    long keylen = -1;
 | 
			
		||||
    BIO *pbio = NULL;
 | 
			
		||||
    const char *paramfile = NULL;
 | 
			
		||||
 | 
			
		||||
    if (gstr == NULL) {
 | 
			
		||||
        *pkey_type = EVP_PKEY_RSA;
 | 
			
		||||
        keylen = *pkeylen;
 | 
			
		||||
    } else if (gstr[0] >= '0' && gstr[0] <= '9') {
 | 
			
		||||
        *pkey_type = EVP_PKEY_RSA;
 | 
			
		||||
        keylen = atol(gstr);
 | 
			
		||||
        *pkeylen = keylen;
 | 
			
		||||
    } else if (!strncmp(gstr, "param:", 6))
 | 
			
		||||
        paramfile = gstr + 6;
 | 
			
		||||
    else {
 | 
			
		||||
        const char *p = strchr(gstr, ':');
 | 
			
		||||
        int len;
 | 
			
		||||
        ENGINE *tmpeng;
 | 
			
		||||
        const EVP_PKEY_ASN1_METHOD *ameth;
 | 
			
		||||
 | 
			
		||||
        if (p)
 | 
			
		||||
            len = p - gstr;
 | 
			
		||||
        else
 | 
			
		||||
            len = strlen(gstr);
 | 
			
		||||
        /*
 | 
			
		||||
         * The lookup of a the string will cover all engines so keep a note
 | 
			
		||||
         * of the implementation.
 | 
			
		||||
         */
 | 
			
		||||
 | 
			
		||||
        ameth = EVP_PKEY_asn1_find_str(&tmpeng, gstr, len);
 | 
			
		||||
 | 
			
		||||
        if (!ameth) {
 | 
			
		||||
            BIO_printf(err, "Unknown algorithm %.*s\n", len, gstr);
 | 
			
		||||
            return NULL;
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        EVP_PKEY_asn1_get0_info(NULL, pkey_type, NULL, NULL, NULL, ameth);
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
        if (tmpeng)
 | 
			
		||||
            ENGINE_finish(tmpeng);
 | 
			
		||||
#endif
 | 
			
		||||
        if (*pkey_type == EVP_PKEY_RSA) {
 | 
			
		||||
            if (p) {
 | 
			
		||||
                keylen = atol(p + 1);
 | 
			
		||||
                *pkeylen = keylen;
 | 
			
		||||
            } else
 | 
			
		||||
                keylen = *pkeylen;
 | 
			
		||||
        } else if (p)
 | 
			
		||||
            paramfile = p + 1;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (paramfile) {
 | 
			
		||||
        pbio = BIO_new_file(paramfile, "r");
 | 
			
		||||
        if (!pbio) {
 | 
			
		||||
            BIO_printf(err, "Can't open parameter file %s\n", paramfile);
 | 
			
		||||
            return NULL;
 | 
			
		||||
        }
 | 
			
		||||
        param = PEM_read_bio_Parameters(pbio, NULL);
 | 
			
		||||
 | 
			
		||||
        if (!param) {
 | 
			
		||||
            X509 *x;
 | 
			
		||||
            (void)BIO_reset(pbio);
 | 
			
		||||
            x = PEM_read_bio_X509(pbio, NULL, NULL, NULL);
 | 
			
		||||
            if (x) {
 | 
			
		||||
                param = X509_get_pubkey(x);
 | 
			
		||||
                X509_free(x);
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        BIO_free(pbio);
 | 
			
		||||
 | 
			
		||||
        if (!param) {
 | 
			
		||||
            BIO_printf(err, "Error reading parameter file %s\n", paramfile);
 | 
			
		||||
            return NULL;
 | 
			
		||||
        }
 | 
			
		||||
        if (*pkey_type == -1)
 | 
			
		||||
            *pkey_type = EVP_PKEY_id(param);
 | 
			
		||||
        else if (*pkey_type != EVP_PKEY_base_id(param)) {
 | 
			
		||||
            BIO_printf(err, "Key Type does not match parameters\n");
 | 
			
		||||
            EVP_PKEY_free(param);
 | 
			
		||||
            return NULL;
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (palgnam) {
 | 
			
		||||
        const EVP_PKEY_ASN1_METHOD *ameth;
 | 
			
		||||
        ENGINE *tmpeng;
 | 
			
		||||
        const char *anam;
 | 
			
		||||
        ameth = EVP_PKEY_asn1_find(&tmpeng, *pkey_type);
 | 
			
		||||
        if (!ameth) {
 | 
			
		||||
            BIO_puts(err, "Internal error: can't find key algorithm\n");
 | 
			
		||||
            return NULL;
 | 
			
		||||
        }
 | 
			
		||||
        EVP_PKEY_asn1_get0_info(NULL, NULL, NULL, NULL, &anam, ameth);
 | 
			
		||||
        *palgnam = BUF_strdup(anam);
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
        if (tmpeng)
 | 
			
		||||
            ENGINE_finish(tmpeng);
 | 
			
		||||
#endif
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (param) {
 | 
			
		||||
        gctx = EVP_PKEY_CTX_new(param, keygen_engine);
 | 
			
		||||
        *pkeylen = EVP_PKEY_bits(param);
 | 
			
		||||
        EVP_PKEY_free(param);
 | 
			
		||||
    } else
 | 
			
		||||
        gctx = EVP_PKEY_CTX_new_id(*pkey_type, keygen_engine);
 | 
			
		||||
 | 
			
		||||
    if (!gctx) {
 | 
			
		||||
        BIO_puts(err, "Error allocating keygen context\n");
 | 
			
		||||
        ERR_print_errors(err);
 | 
			
		||||
        return NULL;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (EVP_PKEY_keygen_init(gctx) <= 0) {
 | 
			
		||||
        BIO_puts(err, "Error initializing keygen context\n");
 | 
			
		||||
        ERR_print_errors(err);
 | 
			
		||||
        return NULL;
 | 
			
		||||
    }
 | 
			
		||||
#ifndef OPENSSL_NO_RSA
 | 
			
		||||
    if ((*pkey_type == EVP_PKEY_RSA) && (keylen != -1)) {
 | 
			
		||||
        if (EVP_PKEY_CTX_set_rsa_keygen_bits(gctx, keylen) <= 0) {
 | 
			
		||||
            BIO_puts(err, "Error setting RSA keysize\n");
 | 
			
		||||
            ERR_print_errors(err);
 | 
			
		||||
            EVP_PKEY_CTX_free(gctx);
 | 
			
		||||
            return NULL;
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
    return gctx;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static int genpkey_cb(EVP_PKEY_CTX *ctx)
 | 
			
		||||
{
 | 
			
		||||
    char c = '*';
 | 
			
		||||
    BIO *b = EVP_PKEY_CTX_get_app_data(ctx);
 | 
			
		||||
    int p;
 | 
			
		||||
    p = EVP_PKEY_CTX_get_keygen_info(ctx, 0);
 | 
			
		||||
    if (p == 0)
 | 
			
		||||
        c = '.';
 | 
			
		||||
    if (p == 1)
 | 
			
		||||
        c = '+';
 | 
			
		||||
    if (p == 2)
 | 
			
		||||
        c = '*';
 | 
			
		||||
    if (p == 3)
 | 
			
		||||
        c = '\n';
 | 
			
		||||
    BIO_write(b, &c, 1);
 | 
			
		||||
    (void)BIO_flush(b);
 | 
			
		||||
#ifdef LINT
 | 
			
		||||
    p = n;
 | 
			
		||||
#endif
 | 
			
		||||
    return 1;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static int do_sign_init(BIO *err, EVP_MD_CTX *ctx, EVP_PKEY *pkey,
 | 
			
		||||
                        const EVP_MD *md, STACK_OF(OPENSSL_STRING) *sigopts)
 | 
			
		||||
{
 | 
			
		||||
    EVP_PKEY_CTX *pkctx = NULL;
 | 
			
		||||
    int i;
 | 
			
		||||
    EVP_MD_CTX_init(ctx);
 | 
			
		||||
    if (!EVP_DigestSignInit(ctx, &pkctx, md, NULL, pkey))
 | 
			
		||||
        return 0;
 | 
			
		||||
    for (i = 0; i < sk_OPENSSL_STRING_num(sigopts); i++) {
 | 
			
		||||
        char *sigopt = sk_OPENSSL_STRING_value(sigopts, i);
 | 
			
		||||
        if (pkey_ctrl_string(pkctx, sigopt) <= 0) {
 | 
			
		||||
            BIO_printf(err, "parameter error \"%s\"\n", sigopt);
 | 
			
		||||
            ERR_print_errors(bio_err);
 | 
			
		||||
            return 0;
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
    return 1;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
int do_X509_sign(BIO *err, X509 *x, EVP_PKEY *pkey, const EVP_MD *md,
 | 
			
		||||
                 STACK_OF(OPENSSL_STRING) *sigopts)
 | 
			
		||||
{
 | 
			
		||||
    int rv;
 | 
			
		||||
    EVP_MD_CTX mctx;
 | 
			
		||||
    EVP_MD_CTX_init(&mctx);
 | 
			
		||||
    rv = do_sign_init(err, &mctx, pkey, md, sigopts);
 | 
			
		||||
    if (rv > 0)
 | 
			
		||||
        rv = X509_sign_ctx(x, &mctx);
 | 
			
		||||
    EVP_MD_CTX_cleanup(&mctx);
 | 
			
		||||
    return rv > 0 ? 1 : 0;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
int do_X509_REQ_sign(BIO *err, X509_REQ *x, EVP_PKEY *pkey, const EVP_MD *md,
 | 
			
		||||
                     STACK_OF(OPENSSL_STRING) *sigopts)
 | 
			
		||||
{
 | 
			
		||||
    int rv;
 | 
			
		||||
    EVP_MD_CTX mctx;
 | 
			
		||||
    EVP_MD_CTX_init(&mctx);
 | 
			
		||||
    rv = do_sign_init(err, &mctx, pkey, md, sigopts);
 | 
			
		||||
    if (rv > 0)
 | 
			
		||||
        rv = X509_REQ_sign_ctx(x, &mctx);
 | 
			
		||||
    EVP_MD_CTX_cleanup(&mctx);
 | 
			
		||||
    return rv > 0 ? 1 : 0;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
int do_X509_CRL_sign(BIO *err, X509_CRL *x, EVP_PKEY *pkey, const EVP_MD *md,
 | 
			
		||||
                     STACK_OF(OPENSSL_STRING) *sigopts)
 | 
			
		||||
{
 | 
			
		||||
    int rv;
 | 
			
		||||
    EVP_MD_CTX mctx;
 | 
			
		||||
    EVP_MD_CTX_init(&mctx);
 | 
			
		||||
    rv = do_sign_init(err, &mctx, pkey, md, sigopts);
 | 
			
		||||
    if (rv > 0)
 | 
			
		||||
        rv = X509_CRL_sign_ctx(x, &mctx);
 | 
			
		||||
    EVP_MD_CTX_cleanup(&mctx);
 | 
			
		||||
    return rv > 0 ? 1 : 0;
 | 
			
		||||
}
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										66
									
								
								apps/rsa.c
									
									
									
									
									
								
							
							
						
						
									
										66
									
								
								apps/rsa.c
									
									
									
									
									
								
							@@ -116,8 +116,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
# endif
 | 
			
		||||
    int modulus = 0;
 | 
			
		||||
 | 
			
		||||
    int pvk_encr = 2;
 | 
			
		||||
 | 
			
		||||
    apps_startup();
 | 
			
		||||
 | 
			
		||||
    if (bio_err == NULL)
 | 
			
		||||
@@ -174,16 +172,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            pubin = 1;
 | 
			
		||||
        else if (strcmp(*argv, "-pubout") == 0)
 | 
			
		||||
            pubout = 1;
 | 
			
		||||
        else if (strcmp(*argv, "-RSAPublicKey_in") == 0)
 | 
			
		||||
            pubin = 2;
 | 
			
		||||
        else if (strcmp(*argv, "-RSAPublicKey_out") == 0)
 | 
			
		||||
            pubout = 2;
 | 
			
		||||
        else if (strcmp(*argv, "-pvk-strong") == 0)
 | 
			
		||||
            pvk_encr = 2;
 | 
			
		||||
        else if (strcmp(*argv, "-pvk-weak") == 0)
 | 
			
		||||
            pvk_encr = 1;
 | 
			
		||||
        else if (strcmp(*argv, "-pvk-none") == 0)
 | 
			
		||||
            pvk_encr = 0;
 | 
			
		||||
        else if (strcmp(*argv, "-noout") == 0)
 | 
			
		||||
            noout = 1;
 | 
			
		||||
        else if (strcmp(*argv, "-text") == 0)
 | 
			
		||||
@@ -273,28 +261,19 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    {
 | 
			
		||||
        EVP_PKEY *pkey;
 | 
			
		||||
 | 
			
		||||
        if (pubin) {
 | 
			
		||||
            int tmpformat = -1;
 | 
			
		||||
            if (pubin == 2) {
 | 
			
		||||
                if (informat == FORMAT_PEM)
 | 
			
		||||
                    tmpformat = FORMAT_PEMRSA;
 | 
			
		||||
                else if (informat == FORMAT_ASN1)
 | 
			
		||||
                    tmpformat = FORMAT_ASN1RSA;
 | 
			
		||||
            } else if (informat == FORMAT_NETSCAPE && sgckey)
 | 
			
		||||
                tmpformat = FORMAT_IISSGC;
 | 
			
		||||
            else
 | 
			
		||||
                tmpformat = informat;
 | 
			
		||||
 | 
			
		||||
            pkey = load_pubkey(bio_err, infile, tmpformat, 1,
 | 
			
		||||
        if (pubin)
 | 
			
		||||
            pkey = load_pubkey(bio_err, infile,
 | 
			
		||||
                               (informat == FORMAT_NETSCAPE && sgckey ?
 | 
			
		||||
                                FORMAT_IISSGC : informat), 1,
 | 
			
		||||
                               passin, e, "Public Key");
 | 
			
		||||
        } else
 | 
			
		||||
        else
 | 
			
		||||
            pkey = load_key(bio_err, infile,
 | 
			
		||||
                            (informat == FORMAT_NETSCAPE && sgckey ?
 | 
			
		||||
                             FORMAT_IISSGC : informat), 1,
 | 
			
		||||
                            passin, e, "Private Key");
 | 
			
		||||
 | 
			
		||||
        if (pkey != NULL)
 | 
			
		||||
            rsa = EVP_PKEY_get1_RSA(pkey);
 | 
			
		||||
            rsa = pkey == NULL ? NULL : EVP_PKEY_get1_RSA(pkey);
 | 
			
		||||
        EVP_PKEY_free(pkey);
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
@@ -362,12 +341,9 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    }
 | 
			
		||||
    BIO_printf(bio_err, "writing RSA key\n");
 | 
			
		||||
    if (outformat == FORMAT_ASN1) {
 | 
			
		||||
        if (pubout || pubin) {
 | 
			
		||||
            if (pubout == 2)
 | 
			
		||||
                i = i2d_RSAPublicKey_bio(out, rsa);
 | 
			
		||||
            else
 | 
			
		||||
                i = i2d_RSA_PUBKEY_bio(out, rsa);
 | 
			
		||||
        } else
 | 
			
		||||
        if (pubout || pubin)
 | 
			
		||||
            i = i2d_RSA_PUBKEY_bio(out, rsa);
 | 
			
		||||
        else
 | 
			
		||||
            i = i2d_RSAPrivateKey_bio(out, rsa);
 | 
			
		||||
    }
 | 
			
		||||
# ifndef OPENSSL_NO_RC4
 | 
			
		||||
@@ -388,32 +364,16 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    }
 | 
			
		||||
# endif
 | 
			
		||||
    else if (outformat == FORMAT_PEM) {
 | 
			
		||||
        if (pubout || pubin) {
 | 
			
		||||
            if (pubout == 2)
 | 
			
		||||
                i = PEM_write_bio_RSAPublicKey(out, rsa);
 | 
			
		||||
            else
 | 
			
		||||
                i = PEM_write_bio_RSA_PUBKEY(out, rsa);
 | 
			
		||||
        } else
 | 
			
		||||
        if (pubout || pubin)
 | 
			
		||||
            i = PEM_write_bio_RSA_PUBKEY(out, rsa);
 | 
			
		||||
        else
 | 
			
		||||
            i = PEM_write_bio_RSAPrivateKey(out, rsa,
 | 
			
		||||
                                            enc, NULL, 0, NULL, passout);
 | 
			
		||||
# if !defined(OPENSSL_NO_DSA) && !defined(OPENSSL_NO_RC4)
 | 
			
		||||
    } else if (outformat == FORMAT_MSBLOB || outformat == FORMAT_PVK) {
 | 
			
		||||
        EVP_PKEY *pk;
 | 
			
		||||
        pk = EVP_PKEY_new();
 | 
			
		||||
        EVP_PKEY_set1_RSA(pk, rsa);
 | 
			
		||||
        if (outformat == FORMAT_PVK)
 | 
			
		||||
            i = i2b_PVK_bio(out, pk, pvk_encr, 0, passout);
 | 
			
		||||
        else if (pubin || pubout)
 | 
			
		||||
            i = i2b_PublicKey_bio(out, pk);
 | 
			
		||||
        else
 | 
			
		||||
            i = i2b_PrivateKey_bio(out, pk);
 | 
			
		||||
        EVP_PKEY_free(pk);
 | 
			
		||||
# endif
 | 
			
		||||
    } else {
 | 
			
		||||
        BIO_printf(bio_err, "bad output format specified for outfile\n");
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
    if (i <= 0) {
 | 
			
		||||
    if (!i) {
 | 
			
		||||
        BIO_printf(bio_err, "unable to write key\n");
 | 
			
		||||
        ERR_print_errors(bio_err);
 | 
			
		||||
    } else
 | 
			
		||||
 
 | 
			
		||||
@@ -250,7 +250,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
 | 
			
		||||
    if (outfile) {
 | 
			
		||||
        if (!(out = BIO_new_file(outfile, "wb"))) {
 | 
			
		||||
            BIO_printf(bio_err, "Error Writing Output File\n");
 | 
			
		||||
            BIO_printf(bio_err, "Error Reading Output File\n");
 | 
			
		||||
            ERR_print_errors(bio_err);
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
@@ -268,15 +268,10 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
 | 
			
		||||
    rsa_in = OPENSSL_malloc(keysize * 2);
 | 
			
		||||
    rsa_out = OPENSSL_malloc(keysize);
 | 
			
		||||
    if (!rsa_in || !rsa_out) {
 | 
			
		||||
        BIO_printf(bio_err, "Out of memory\n");
 | 
			
		||||
        ERR_print_errors(bio_err);
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    /* Read the input data */
 | 
			
		||||
    rsa_inlen = BIO_read(in, rsa_in, keysize * 2);
 | 
			
		||||
    if (rsa_inlen < 0) {
 | 
			
		||||
    if (rsa_inlen <= 0) {
 | 
			
		||||
        BIO_printf(bio_err, "Error reading input Data\n");
 | 
			
		||||
        exit(1);
 | 
			
		||||
    }
 | 
			
		||||
@@ -311,7 +306,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (rsa_outlen < 0) {
 | 
			
		||||
    if (rsa_outlen <= 0) {
 | 
			
		||||
        BIO_printf(bio_err, "RSA operation error\n");
 | 
			
		||||
        ERR_print_errors(bio_err);
 | 
			
		||||
        goto end;
 | 
			
		||||
@@ -366,10 +361,4 @@ static void usage()
 | 
			
		||||
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
#else                           /* !OPENSSL_NO_RSA */
 | 
			
		||||
 | 
			
		||||
# if PEDANTIC
 | 
			
		||||
static void *dummy = &dummy;
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
#endif
 | 
			
		||||
 
 | 
			
		||||
@@ -118,7 +118,7 @@
 | 
			
		||||
# include <conio.h>
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#if defined(OPENSSL_SYS_MSDOS) && !defined(_WIN32)
 | 
			
		||||
#ifdef OPENSSL_SYS_MSDOS
 | 
			
		||||
# define _kbhit kbhit
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
@@ -152,21 +152,15 @@ typedef fd_mask fd_set;
 | 
			
		||||
#define PROTOCOL        "tcp"
 | 
			
		||||
 | 
			
		||||
int do_server(int port, int type, int *ret,
 | 
			
		||||
              int (*cb) (char *hostname, int s, int stype,
 | 
			
		||||
                         unsigned char *context), unsigned char *context,
 | 
			
		||||
              int naccept);
 | 
			
		||||
              int (*cb) (char *hostname, int s, unsigned char *context),
 | 
			
		||||
              unsigned char *context);
 | 
			
		||||
#ifdef HEADER_X509_H
 | 
			
		||||
int MS_CALLBACK verify_callback(int ok, X509_STORE_CTX *ctx);
 | 
			
		||||
#endif
 | 
			
		||||
#ifdef HEADER_SSL_H
 | 
			
		||||
int set_cert_stuff(SSL_CTX *ctx, char *cert_file, char *key_file);
 | 
			
		||||
int set_cert_key_stuff(SSL_CTX *ctx, X509 *cert, EVP_PKEY *key,
 | 
			
		||||
                       STACK_OF(X509) *chain, int build_chain);
 | 
			
		||||
int ssl_print_sigalgs(BIO *out, SSL *s);
 | 
			
		||||
int ssl_print_point_formats(BIO *out, SSL *s);
 | 
			
		||||
int ssl_print_curves(BIO *out, SSL *s, int noshared);
 | 
			
		||||
int set_cert_key_stuff(SSL_CTX *ctx, X509 *cert, EVP_PKEY *key);
 | 
			
		||||
#endif
 | 
			
		||||
int ssl_print_tmp_key(BIO *out, SSL *s);
 | 
			
		||||
int init_client(int *sock, char *server, int port, int type);
 | 
			
		||||
int should_retry(int i);
 | 
			
		||||
int extract_port(char *str, short *port_ptr);
 | 
			
		||||
@@ -188,24 +182,3 @@ int MS_CALLBACK generate_cookie_callback(SSL *ssl, unsigned char *cookie,
 | 
			
		||||
                                         unsigned int *cookie_len);
 | 
			
		||||
int MS_CALLBACK verify_cookie_callback(SSL *ssl, unsigned char *cookie,
 | 
			
		||||
                                       unsigned int cookie_len);
 | 
			
		||||
 | 
			
		||||
typedef struct ssl_excert_st SSL_EXCERT;
 | 
			
		||||
 | 
			
		||||
void ssl_ctx_set_excert(SSL_CTX *ctx, SSL_EXCERT *exc);
 | 
			
		||||
void ssl_excert_free(SSL_EXCERT *exc);
 | 
			
		||||
int args_excert(char ***pargs, int *pargc,
 | 
			
		||||
                int *badarg, BIO *err, SSL_EXCERT **pexc);
 | 
			
		||||
int load_excert(SSL_EXCERT **pexc, BIO *err);
 | 
			
		||||
void print_ssl_summary(BIO *bio, SSL *s);
 | 
			
		||||
#ifdef HEADER_SSL_H
 | 
			
		||||
int args_ssl(char ***pargs, int *pargc, SSL_CONF_CTX *cctx,
 | 
			
		||||
             int *badarg, BIO *err, STACK_OF(OPENSSL_STRING) **pstr);
 | 
			
		||||
int args_ssl_call(SSL_CTX *ctx, BIO *err, SSL_CONF_CTX *cctx,
 | 
			
		||||
                  STACK_OF(OPENSSL_STRING) *str, int no_ecdhe, int no_jpake);
 | 
			
		||||
int ssl_ctx_add_crls(SSL_CTX *ctx, STACK_OF(X509_CRL) *crls,
 | 
			
		||||
                     int crl_download);
 | 
			
		||||
int ssl_load_stores(SSL_CTX *ctx, const char *vfyCApath,
 | 
			
		||||
                    const char *vfyCAfile, const char *chCApath,
 | 
			
		||||
                    const char *chCAfile, STACK_OF(X509_CRL) *crls,
 | 
			
		||||
                    int crl_download);
 | 
			
		||||
#endif
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										1000
									
								
								apps/s_cb.c
									
									
									
									
									
								
							
							
						
						
									
										1000
									
								
								apps/s_cb.c
									
									
									
									
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							
							
								
								
									
										1066
									
								
								apps/s_client.c
									
									
									
									
									
								
							
							
						
						
									
										1066
									
								
								apps/s_client.c
									
									
									
									
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							
							
								
								
									
										1565
									
								
								apps/s_server.c
									
									
									
									
									
								
							
							
						
						
									
										1565
									
								
								apps/s_server.c
									
									
									
									
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							@@ -234,11 +234,14 @@ static int ssl_sock_init(void)
 | 
			
		||||
int init_client(int *sock, char *host, int port, int type)
 | 
			
		||||
{
 | 
			
		||||
    unsigned char ip[4];
 | 
			
		||||
    short p = 0;
 | 
			
		||||
 | 
			
		||||
    memset(ip, '\0', sizeof ip);
 | 
			
		||||
    if (!host_ip(host, &(ip[0])))
 | 
			
		||||
        return 0;
 | 
			
		||||
    return init_client_ip(sock, ip, port, type);
 | 
			
		||||
    if (!host_ip(host, &(ip[0]))) {
 | 
			
		||||
        return (0);
 | 
			
		||||
    }
 | 
			
		||||
    if (p != 0)
 | 
			
		||||
        port = p;
 | 
			
		||||
    return (init_client_ip(sock, ip, port, type));
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static int init_client_ip(int *sock, unsigned char ip[4], int port, int type)
 | 
			
		||||
@@ -268,12 +271,11 @@ static int init_client_ip(int *sock, unsigned char ip[4], int port, int type)
 | 
			
		||||
        perror("socket");
 | 
			
		||||
        return (0);
 | 
			
		||||
    }
 | 
			
		||||
# if defined(SO_KEEPALIVE) && !defined(OPENSSL_SYS_MPE)
 | 
			
		||||
# ifndef OPENSSL_SYS_MPE
 | 
			
		||||
    if (type == SOCK_STREAM) {
 | 
			
		||||
        i = 0;
 | 
			
		||||
        i = setsockopt(s, SOL_SOCKET, SO_KEEPALIVE, (char *)&i, sizeof(i));
 | 
			
		||||
        if (i < 0) {
 | 
			
		||||
            closesocket(s);
 | 
			
		||||
            perror("keepalive");
 | 
			
		||||
            return (0);
 | 
			
		||||
        }
 | 
			
		||||
@@ -281,7 +283,7 @@ static int init_client_ip(int *sock, unsigned char ip[4], int port, int type)
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
    if (connect(s, (struct sockaddr *)&them, sizeof(them)) == -1) {
 | 
			
		||||
        closesocket(s);
 | 
			
		||||
        close(s);
 | 
			
		||||
        perror("connect");
 | 
			
		||||
        return (0);
 | 
			
		||||
    }
 | 
			
		||||
@@ -290,13 +292,12 @@ static int init_client_ip(int *sock, unsigned char ip[4], int port, int type)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
int do_server(int port, int type, int *ret,
 | 
			
		||||
              int (*cb) (char *hostname, int s, int stype,
 | 
			
		||||
                         unsigned char *context), unsigned char *context,
 | 
			
		||||
              int naccept)
 | 
			
		||||
              int (*cb) (char *hostname, int s, unsigned char *context),
 | 
			
		||||
              unsigned char *context)
 | 
			
		||||
{
 | 
			
		||||
    int sock;
 | 
			
		||||
    char *name = NULL;
 | 
			
		||||
    int accept_socket = 0;
 | 
			
		||||
    int accept_socket;
 | 
			
		||||
    int i;
 | 
			
		||||
 | 
			
		||||
    if (!init_server(&accept_socket, port, type))
 | 
			
		||||
@@ -314,14 +315,12 @@ int do_server(int port, int type, int *ret,
 | 
			
		||||
            }
 | 
			
		||||
        } else
 | 
			
		||||
            sock = accept_socket;
 | 
			
		||||
        i = (*cb) (name, sock, type, context);
 | 
			
		||||
        i = (*cb) (name, sock, context);
 | 
			
		||||
        if (name != NULL)
 | 
			
		||||
            OPENSSL_free(name);
 | 
			
		||||
        if (type == SOCK_STREAM)
 | 
			
		||||
            SHUTDOWN2(sock);
 | 
			
		||||
        if (naccept != -1)
 | 
			
		||||
            naccept--;
 | 
			
		||||
        if (i < 0 || naccept == 0) {
 | 
			
		||||
        if (i < 0) {
 | 
			
		||||
            SHUTDOWN2(accept_socket);
 | 
			
		||||
            return (i);
 | 
			
		||||
        }
 | 
			
		||||
@@ -455,7 +454,6 @@ static int do_accept(int acc_sock, int *sock, char **host)
 | 
			
		||||
    } else {
 | 
			
		||||
        if ((*host = (char *)OPENSSL_malloc(strlen(h1->h_name) + 1)) == NULL) {
 | 
			
		||||
            perror("OPENSSL_malloc");
 | 
			
		||||
            closesocket(ret);
 | 
			
		||||
            return (0);
 | 
			
		||||
        }
 | 
			
		||||
        BUF_strlcpy(*host, h1->h_name, strlen(h1->h_name) + 1);
 | 
			
		||||
@@ -463,12 +461,10 @@ static int do_accept(int acc_sock, int *sock, char **host)
 | 
			
		||||
        h2 = GetHostByName(*host);
 | 
			
		||||
        if (h2 == NULL) {
 | 
			
		||||
            BIO_printf(bio_err, "gethostbyname failure\n");
 | 
			
		||||
            closesocket(ret);
 | 
			
		||||
            return (0);
 | 
			
		||||
        }
 | 
			
		||||
        if (h2->h_addrtype != AF_INET) {
 | 
			
		||||
            BIO_printf(bio_err, "gethostbyname addr is not AF_INET\n");
 | 
			
		||||
            closesocket(ret);
 | 
			
		||||
            return (0);
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										119
									
								
								apps/s_time.c
									
									
									
									
									
								
							
							
						
						
									
										119
									
								
								apps/s_time.c
									
									
									
									
									
								
							@@ -85,6 +85,57 @@
 | 
			
		||||
# include OPENSSL_UNISTD
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#if !defined(OPENSSL_SYS_NETWARE) && !defined(OPENSSL_SYS_MSDOS) && !defined(OPENSSL_SYS_VXWORKS) && (!defined(OPENSSL_SYS_VMS) || defined(__DECC))
 | 
			
		||||
# define TIMES
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#ifndef _IRIX
 | 
			
		||||
# include <time.h>
 | 
			
		||||
#endif
 | 
			
		||||
#ifdef TIMES
 | 
			
		||||
# include <sys/types.h>
 | 
			
		||||
# include <sys/times.h>
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
/*
 | 
			
		||||
 * Depending on the VMS version, the tms structure is perhaps defined. The
 | 
			
		||||
 * __TMS macro will show if it was.  If it wasn't defined, we should undefine
 | 
			
		||||
 * TIMES, since that tells the rest of the program how things should be
 | 
			
		||||
 * handled.  -- Richard Levitte
 | 
			
		||||
 */
 | 
			
		||||
#if defined(OPENSSL_SYS_VMS_DECC) && !defined(__TMS)
 | 
			
		||||
# undef TIMES
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#if !defined(TIMES) && !defined(OPENSSL_SYS_VXWORKS) && !defined(OPENSSL_SYS_NETWARE)
 | 
			
		||||
# include <sys/timeb.h>
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#if defined(sun) || defined(__ultrix)
 | 
			
		||||
# define _POSIX_SOURCE
 | 
			
		||||
# include <limits.h>
 | 
			
		||||
# include <sys/param.h>
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
/*
 | 
			
		||||
 * The following if from times(3) man page.  It may need to be changed
 | 
			
		||||
 */
 | 
			
		||||
#ifndef HZ
 | 
			
		||||
# ifdef _SC_CLK_TCK
 | 
			
		||||
#  define HZ ((double)sysconf(_SC_CLK_TCK))
 | 
			
		||||
# else
 | 
			
		||||
#  ifndef CLK_TCK
 | 
			
		||||
#   ifndef _BSD_CLK_TCK_        /* FreeBSD hack */
 | 
			
		||||
#    define HZ  100.0
 | 
			
		||||
#   else                        /* _BSD_CLK_TCK_ */
 | 
			
		||||
#    define HZ ((double)_BSD_CLK_TCK_)
 | 
			
		||||
#   endif
 | 
			
		||||
#  else                         /* CLK_TCK */
 | 
			
		||||
#   define HZ ((double)CLK_TCK)
 | 
			
		||||
#  endif
 | 
			
		||||
# endif
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#undef PROG
 | 
			
		||||
#define PROG s_time_main
 | 
			
		||||
 | 
			
		||||
@@ -132,7 +183,7 @@ static char *tm_cipher = NULL;
 | 
			
		||||
static int tm_verify = SSL_VERIFY_NONE;
 | 
			
		||||
static int maxTime = SECONDS;
 | 
			
		||||
static SSL_CTX *tm_ctx = NULL;
 | 
			
		||||
static const SSL_METHOD *s_time_meth = NULL;
 | 
			
		||||
static SSL_METHOD *s_time_meth = NULL;
 | 
			
		||||
static char *s_www_path = NULL;
 | 
			
		||||
static long bytes_read = 0;
 | 
			
		||||
static int st_bugs = 0;
 | 
			
		||||
@@ -302,10 +353,6 @@ static int parseArgs(int argc, char **argv)
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            maxTime = atoi(*(++argv));
 | 
			
		||||
            if (maxTime <= 0) {
 | 
			
		||||
                BIO_printf(bio_err, "time must be > 0\n");
 | 
			
		||||
                badop = 1;
 | 
			
		||||
            }
 | 
			
		||||
        } else {
 | 
			
		||||
            BIO_printf(bio_err, "unknown option %s\n", *argv);
 | 
			
		||||
            badop = 1;
 | 
			
		||||
@@ -336,7 +383,56 @@ static int parseArgs(int argc, char **argv)
 | 
			
		||||
 | 
			
		||||
static double tm_Time_F(int s)
 | 
			
		||||
{
 | 
			
		||||
    return app_tminterval(s, 1);
 | 
			
		||||
    static double ret;
 | 
			
		||||
#ifdef TIMES
 | 
			
		||||
    static struct tms tstart, tend;
 | 
			
		||||
 | 
			
		||||
    if (s == START) {
 | 
			
		||||
        times(&tstart);
 | 
			
		||||
        return (0);
 | 
			
		||||
    } else {
 | 
			
		||||
        times(&tend);
 | 
			
		||||
        ret = ((double)(tend.tms_utime - tstart.tms_utime)) / HZ;
 | 
			
		||||
        return ((ret == 0.0) ? 1e-6 : ret);
 | 
			
		||||
    }
 | 
			
		||||
#elif defined(OPENSSL_SYS_NETWARE)
 | 
			
		||||
    static clock_t tstart, tend;
 | 
			
		||||
 | 
			
		||||
    if (s == START) {
 | 
			
		||||
        tstart = clock();
 | 
			
		||||
        return (0);
 | 
			
		||||
    } else {
 | 
			
		||||
        tend = clock();
 | 
			
		||||
        ret = (double)((double)(tend) - (double)(tstart));
 | 
			
		||||
        return ((ret < 0.001) ? 0.001 : ret);
 | 
			
		||||
    }
 | 
			
		||||
#elif defined(OPENSSL_SYS_VXWORKS)
 | 
			
		||||
    {
 | 
			
		||||
        static unsigned long tick_start, tick_end;
 | 
			
		||||
 | 
			
		||||
        if (s == START) {
 | 
			
		||||
            tick_start = tickGet();
 | 
			
		||||
            return 0;
 | 
			
		||||
        } else {
 | 
			
		||||
            tick_end = tickGet();
 | 
			
		||||
            ret = (double)(tick_end - tick_start) / (double)sysClkRateGet();
 | 
			
		||||
            return ((ret == 0.0) ? 1e-6 : ret);
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
#else                           /* !times() */
 | 
			
		||||
    static struct timeb tstart, tend;
 | 
			
		||||
    long i;
 | 
			
		||||
 | 
			
		||||
    if (s == START) {
 | 
			
		||||
        ftime(&tstart);
 | 
			
		||||
        return (0);
 | 
			
		||||
    } else {
 | 
			
		||||
        ftime(&tend);
 | 
			
		||||
        i = (long)tend.millitm - (long)tstart.millitm;
 | 
			
		||||
        ret = ((double)(tend.time - tstart.time)) + ((double)i) / 1000.0;
 | 
			
		||||
        return ((ret == 0.0) ? 1e-6 : ret);
 | 
			
		||||
    }
 | 
			
		||||
#endif
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
/***********************************************************************
 | 
			
		||||
@@ -361,7 +457,13 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    if (bio_err == NULL)
 | 
			
		||||
        bio_err = BIO_new_fp(stderr, BIO_NOCLOSE);
 | 
			
		||||
 | 
			
		||||
#if !defined(OPENSSL_NO_SSL2) && !defined(OPENSSL_NO_SSL3)
 | 
			
		||||
    s_time_meth = SSLv23_client_method();
 | 
			
		||||
#elif !defined(OPENSSL_NO_SSL3)
 | 
			
		||||
    s_time_meth = SSLv3_client_method();
 | 
			
		||||
#elif !defined(OPENSSL_NO_SSL2)
 | 
			
		||||
    s_time_meth = SSLv2_client_method();
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
    /* parse the command line arguments */
 | 
			
		||||
    if (parseArgs(argc, argv) < 0)
 | 
			
		||||
@@ -554,8 +656,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
         nConn, totalTime, ((double)nConn / totalTime), bytes_read);
 | 
			
		||||
    printf
 | 
			
		||||
        ("%d connections in %ld real seconds, %ld bytes read per connection\n",
 | 
			
		||||
         nConn, (long)time(NULL) - finishtime + maxTime,
 | 
			
		||||
         bytes_read / (nConn?nConn:1));
 | 
			
		||||
         nConn, (long)time(NULL) - finishtime + maxTime, bytes_read / nConn);
 | 
			
		||||
 | 
			
		||||
    ret = 0;
 | 
			
		||||
 end:
 | 
			
		||||
@@ -613,7 +714,7 @@ static SSL *doConnection(SSL *scon)
 | 
			
		||||
            i = SSL_get_fd(serverCon);
 | 
			
		||||
            width = i + 1;
 | 
			
		||||
            FD_ZERO(&readfds);
 | 
			
		||||
            openssl_fdset(i, &readfds);
 | 
			
		||||
            FD_SET(i, &readfds);
 | 
			
		||||
            /*
 | 
			
		||||
             * Note: under VMS with SOCKETSHR the 2nd parameter is currently
 | 
			
		||||
             * of type (int *) whereas under other systems it is (void *) if
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										413
									
								
								apps/server.pem
									
									
									
									
									
								
							
							
						
						
									
										413
									
								
								apps/server.pem
									
									
									
									
									
								
							@@ -1,52 +1,369 @@
 | 
			
		||||
subject= C = UK, O = OpenSSL Group, OU = FOR TESTING PURPOSES ONLY, CN = Test Server Cert
 | 
			
		||||
issuer= C = UK, O = OpenSSL Group, OU = FOR TESTING PURPOSES ONLY, CN = OpenSSL Test Intermediate CA
 | 
			
		||||
issuer= /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test CA (1024 bit)
 | 
			
		||||
subject= /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Server test cert (512 bit)
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIID5zCCAs+gAwIBAgIJALnu1NlVpZ6zMA0GCSqGSIb3DQEBBQUAMHAxCzAJBgNV
 | 
			
		||||
BAYTAlVLMRYwFAYDVQQKDA1PcGVuU1NMIEdyb3VwMSIwIAYDVQQLDBlGT1IgVEVT
 | 
			
		||||
VElORyBQVVJQT1NFUyBPTkxZMSUwIwYDVQQDDBxPcGVuU1NMIFRlc3QgSW50ZXJt
 | 
			
		||||
ZWRpYXRlIENBMB4XDTExMTIwODE0MDE0OFoXDTIxMTAxNjE0MDE0OFowZDELMAkG
 | 
			
		||||
A1UEBhMCVUsxFjAUBgNVBAoMDU9wZW5TU0wgR3JvdXAxIjAgBgNVBAsMGUZPUiBU
 | 
			
		||||
RVNUSU5HIFBVUlBPU0VTIE9OTFkxGTAXBgNVBAMMEFRlc3QgU2VydmVyIENlcnQw
 | 
			
		||||
ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDzhPOSNtyyRspmeuUpxfNJ
 | 
			
		||||
KCLTuf7g3uQ4zu4iHOmRO5TQci+HhVlLZrHF9XqFXcIP0y4pWDbMSGuiorUmzmfi
 | 
			
		||||
R7bfSdI/+qIQt8KXRH6HNG1t8ou0VSvWId5TS5Dq/er5ODUr9OaaDva7EquHIcMv
 | 
			
		||||
vPQGuI+OEAcnleVCy9HVEIySrO4P3CNIicnGkwwiAud05yUAq/gPXBC1hTtmlPD7
 | 
			
		||||
TVcGVSEiJdvzqqlgv02qedGrkki6GY4S7GjZxrrf7Foc2EP+51LJzwLQx3/JfrCU
 | 
			
		||||
41NEWAsu/Sl0tQabXESN+zJ1pDqoZ3uHMgpQjeGiE0olr+YcsSW/tJmiU9OiAr8R
 | 
			
		||||
AgMBAAGjgY8wgYwwDAYDVR0TAQH/BAIwADAOBgNVHQ8BAf8EBAMCBeAwLAYJYIZI
 | 
			
		||||
AYb4QgENBB8WHU9wZW5TU0wgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQW
 | 
			
		||||
BBSCvM8AABPR9zklmifnr9LvIBturDAfBgNVHSMEGDAWgBQ2w2yI55X+sL3szj49
 | 
			
		||||
hqshgYfa2jANBgkqhkiG9w0BAQUFAAOCAQEAqb1NV0B0/pbpK9Z4/bNjzPQLTRLK
 | 
			
		||||
WnSNm/Jh5v0GEUOE/Beg7GNjNrmeNmqxAlpqWz9qoeoFZax+QBpIZYjROU3TS3fp
 | 
			
		||||
yLsrnlr0CDQ5R7kCCDGa8dkXxemmpZZLbUCpW2Uoy8sAA4JjN9OtsZY7dvUXFgJ7
 | 
			
		||||
vVNTRnI01ghknbtD+2SxSQd3CWF6QhcRMAzZJ1z1cbbwGDDzfvGFPzJ+Sq+zEPds
 | 
			
		||||
xoVLLSetCiBc+40ZcDS5dV98h9XD7JMTQfxzA7mNGv73JoZJA6nFgj+ADSlJsY/t
 | 
			
		||||
JBv+z1iQRueoh9Qeee+ZbRifPouCB8FDx+AltvHTANdAq0t/K3o+pplMVA==
 | 
			
		||||
MIIB6TCCAVICAQYwDQYJKoZIhvcNAQEEBQAwWzELMAkGA1UEBhMCQVUxEzARBgNV
 | 
			
		||||
BAgTClF1ZWVuc2xhbmQxGjAYBgNVBAoTEUNyeXB0U29mdCBQdHkgTHRkMRswGQYD
 | 
			
		||||
VQQDExJUZXN0IENBICgxMDI0IGJpdCkwHhcNMDAxMDE2MjIzMTAzWhcNMDMwMTE0
 | 
			
		||||
MjIzMTAzWjBjMQswCQYDVQQGEwJBVTETMBEGA1UECBMKUXVlZW5zbGFuZDEaMBgG
 | 
			
		||||
A1UEChMRQ3J5cHRTb2Z0IFB0eSBMdGQxIzAhBgNVBAMTGlNlcnZlciB0ZXN0IGNl
 | 
			
		||||
cnQgKDUxMiBiaXQpMFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBAJ+zw4Qnlf8SMVIP
 | 
			
		||||
Fe9GEcStgOY2Ww/dgNdhjeD8ckUJNP5VZkVDTGiXav6ooKXfX3j/7tdkuD8Ey2//
 | 
			
		||||
Kv7+ue0CAwEAATANBgkqhkiG9w0BAQQFAAOBgQCT0grFQeZaqYb5EYfk20XixZV4
 | 
			
		||||
GmyAbXMftG1Eo7qGiMhYzRwGNWxEYojf5PZkYZXvSqZ/ZXHXa4g59jK/rJNnaVGM
 | 
			
		||||
k+xIX8mxQvlV0n5O9PIha5BX5teZnkHKgL8aKKLKW1BK7YTngsfSzzaeame5iKfz
 | 
			
		||||
itAE+OjGF+PFKbwX8Q==
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
-----BEGIN RSA PRIVATE KEY-----
 | 
			
		||||
MIIEpAIBAAKCAQEA84TzkjbcskbKZnrlKcXzSSgi07n+4N7kOM7uIhzpkTuU0HIv
 | 
			
		||||
h4VZS2axxfV6hV3CD9MuKVg2zEhroqK1Js5n4ke230nSP/qiELfCl0R+hzRtbfKL
 | 
			
		||||
tFUr1iHeU0uQ6v3q+Tg1K/Tmmg72uxKrhyHDL7z0BriPjhAHJ5XlQsvR1RCMkqzu
 | 
			
		||||
D9wjSInJxpMMIgLndOclAKv4D1wQtYU7ZpTw+01XBlUhIiXb86qpYL9NqnnRq5JI
 | 
			
		||||
uhmOEuxo2ca63+xaHNhD/udSyc8C0Md/yX6wlONTRFgLLv0pdLUGm1xEjfsydaQ6
 | 
			
		||||
qGd7hzIKUI3hohNKJa/mHLElv7SZolPTogK/EQIDAQABAoIBAADq9FwNtuE5IRQn
 | 
			
		||||
zGtO4q7Y5uCzZ8GDNYr9RKp+P2cbuWDbvVAecYq2NV9QoIiWJOAYZKklOvekIju3
 | 
			
		||||
r0UZLA0PRiIrTg6NrESx3JrjWDK8QNlUO7CPTZ39/K+FrmMkV9lem9yxjJjyC34D
 | 
			
		||||
AQB+YRTx+l14HppjdxNwHjAVQpIx/uO2F5xAMuk32+3K+pq9CZUtrofe1q4Agj9R
 | 
			
		||||
5s8mSy9pbRo9kW9wl5xdEotz1LivFOEiqPUJTUq5J5PeMKao3vdK726XI4Z455Nm
 | 
			
		||||
W2/MA0YV0ug2FYinHcZdvKM6dimH8GLfa3X8xKRfzjGjTiMSwsdjgMa4awY3tEHH
 | 
			
		||||
674jhAECgYEA/zqMrc0zsbNk83sjgaYIug5kzEpN4ic020rSZsmQxSCerJTgNhmg
 | 
			
		||||
utKSCt0Re09Jt3LqG48msahX8ycqDsHNvlEGPQSbMu9IYeO3Wr3fAm75GEtFWePY
 | 
			
		||||
BhM73I7gkRt4s8bUiUepMG/wY45c5tRF23xi8foReHFFe9MDzh8fJFECgYEA9EFX
 | 
			
		||||
4qAik1pOJGNei9BMwmx0I0gfVEIgu0tzeVqT45vcxbxr7RkTEaDoAG6PlbWP6D9a
 | 
			
		||||
WQNLp4gsgRM90ZXOJ4up5DsAWDluvaF4/omabMA+MJJ5kGZ0gCj5rbZbKqUws7x8
 | 
			
		||||
bp+6iBfUPJUbcqNqFmi/08Yt7vrDnMnyMw2A/sECgYEAiiuRMxnuzVm34hQcsbhH
 | 
			
		||||
6ymVqf7j0PW2qK0F4H1ocT9qhzWFd+RB3kHWrCjnqODQoI6GbGr/4JepHUpre1ex
 | 
			
		||||
4UEN5oSS3G0ru0rC3U4C59dZ5KwDHFm7ffZ1pr52ljfQDUsrjjIMRtuiwNK2OoRa
 | 
			
		||||
WSsqiaL+SDzSB+nBmpnAizECgYBdt/y6rerWUx4MhDwwtTnel7JwHyo2MDFS6/5g
 | 
			
		||||
n8qC2Lj6/fMDRE22w+CA2esp7EJNQJGv+b27iFpbJEDh+/Lf5YzIT4MwVskQ5bYB
 | 
			
		||||
JFcmRxUVmf4e09D7o705U/DjCgMH09iCsbLmqQ38ONIRSHZaJtMDtNTHD1yi+jF+
 | 
			
		||||
OT43gQKBgQC/2OHZoko6iRlNOAQ/tMVFNq7fL81GivoQ9F1U0Qr+DH3ZfaH8eIkX
 | 
			
		||||
xT0ToMPJUzWAn8pZv0snA0um6SIgvkCuxO84OkANCVbttzXImIsL7pFzfcwV/ERK
 | 
			
		||||
UM6j0ZuSMFOCr/lGPAoOQU0fskidGEHi1/kW+suSr28TqsyYZpwBDQ==
 | 
			
		||||
MIIBPAIBAAJBAJ+zw4Qnlf8SMVIPFe9GEcStgOY2Ww/dgNdhjeD8ckUJNP5VZkVD
 | 
			
		||||
TGiXav6ooKXfX3j/7tdkuD8Ey2//Kv7+ue0CAwEAAQJAN6W31vDEP2DjdqhzCDDu
 | 
			
		||||
OA4NACqoiFqyblo7yc2tM4h4xMbC3Yx5UKMN9ZkCtX0gzrz6DyF47bdKcWBzNWCj
 | 
			
		||||
gQIhANEoojVt7hq+SQ6MCN6FTAysGgQf56Q3TYoJMoWvdiXVAiEAw3e3rc+VJpOz
 | 
			
		||||
rHuDo6bgpjUAAXM+v3fcpsfZSNO6V7kCIQCtbVjanpUwvZkMI9by02oUk9taki3b
 | 
			
		||||
PzPfAfNPYAbCJQIhAJXNQDWyqwn/lGmR11cqY2y9nZ1+5w3yHGatLrcDnQHxAiEA
 | 
			
		||||
vnlEGo8K85u+KwIOimM48ZG8oTk7iFdkqLJR1utT3aU=
 | 
			
		||||
-----END RSA PRIVATE KEY-----
 | 
			
		||||
subject=/C=US/O=AT&T Bell Laboratories/OU=Prototype Research CA
 | 
			
		||||
issuer= /C=US/O=AT&T Bell Laboratories/OU=Prototype Research CA
 | 
			
		||||
notBefore=950413210656Z
 | 
			
		||||
notAfter =970412210656Z
 | 
			
		||||
-----BEGIN X509 CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
MIICCDCCAXECAQAwDQYJKoZIhvcNAQEEBQAwTjELMAkGA1UEBhMCVVMxHzAdBgNV
 | 
			
		||||
BAoUFkFUJlQgQmVsbCBMYWJvcmF0b3JpZXMxHjAcBgNVBAsUFVByb3RvdHlwZSBS
 | 
			
		||||
ZXNlYXJjaCBDQTAeFw05NTA0MTMyMTA2NTZaFw05NzA0MTIyMTA2NTZaME4xCzAJ
 | 
			
		||||
BgNVBAYTAlVTMR8wHQYDVQQKFBZBVCZUIEJlbGwgTGFib3JhdG9yaWVzMR4wHAYD
 | 
			
		||||
VQQLFBVQcm90b3R5cGUgUmVzZWFyY2ggQ0EwgZwwDQYJKoZIhvcNAQEBBQADgYoA
 | 
			
		||||
MIGGAoGAebOmgtSCl+wCYZc86UGYeTLY8cjmW2P0FN8ToT/u2pECCoFdrlycX0OR
 | 
			
		||||
3wt0ZhpFXLVNeDnHwEE9veNUih7pCL2ZBFqoIoQkB1lZmXRiVtjGonz8BLm/qrFM
 | 
			
		||||
YHb0lme/Ol+s118mwKVxnn6bSAeI/OXKhLaVdYZWk+aEaxEDkVkCAQ8wDQYJKoZI
 | 
			
		||||
hvcNAQEEBQADgYEAAZMG14lZmZ8bahkaHaTV9dQf4p2FZiQTFwHP9ZyGsXPC+LT5
 | 
			
		||||
dG5iTaRmyjNIJdPWohZDl97kAci79aBndvuEvRKOjLHs3WRGBIwERnAcnY9Mz8u/
 | 
			
		||||
zIHK23PjYVxGGaZd669OJwD0CYyqH22HH9nFUGaoJdsv39ChW0NRdLE9+y8=
 | 
			
		||||
-----END X509 CERTIFICATE-----
 | 
			
		||||
issuer= /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test PCA (1024 bit)
 | 
			
		||||
subject=/C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test CA (1024 bit)
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICJjCCAY8CAQAwDQYJKoZIhvcNAQEEBQAwXDELMAkGA1UEBhMCQVUxEzARBgNV
 | 
			
		||||
BAgTClF1ZWVuc2xhbmQxGjAYBgNVBAoTEUNyeXB0U29mdCBQdHkgTHRkMRwwGgYD
 | 
			
		||||
VQQDExNUZXN0IFBDQSAoMTAyNCBiaXQpMB4XDTk3MDYwOTEzNTc0M1oXDTAxMDYw
 | 
			
		||||
OTEzNTc0M1owWzELMAkGA1UEBhMCQVUxEzARBgNVBAgTClF1ZWVuc2xhbmQxGjAY
 | 
			
		||||
BgNVBAoTEUNyeXB0U29mdCBQdHkgTHRkMRswGQYDVQQDExJUZXN0IENBICgxMDI0
 | 
			
		||||
IGJpdCkwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAKO7o8t116VP6cgybTsZ
 | 
			
		||||
DCZhr95nYlZuya3aCi1IKoztqwWnjbmDFIriOqGFPrZQ+moMETC9D59iRW/dFXSv
 | 
			
		||||
1F65ka/XY2hLh9exCCo7XuUcDs53Qp3bI3AmMqHjgzE8oO3ajyJAzJkTTOUecQU2
 | 
			
		||||
mw/gI4tMM0LqWMQS7luTy4+xAgMBAAEwDQYJKoZIhvcNAQEEBQADgYEAM7achv3v
 | 
			
		||||
hLQJcv/65eGEpBXM40ZDVoFQFFJWaY5p883HTqLB1x4FdzsXHH0QKBTcKpWwqyu4
 | 
			
		||||
YDm3fb8oDugw72bCzfyZK/zVZPR/hVlqI/fvU109Qoc+7oPvIXWky71HfcK6ZBCA
 | 
			
		||||
q30KIqGM/uoM60INq97qjDmCJapagcNBGQs=
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
-----BEGIN RSA PRIVATE KEY-----
 | 
			
		||||
MIICXQIBAAKBgQCju6PLddelT+nIMm07GQwmYa/eZ2JWbsmt2gotSCqM7asFp425
 | 
			
		||||
gxSK4jqhhT62UPpqDBEwvQ+fYkVv3RV0r9ReuZGv12NoS4fXsQgqO17lHA7Od0Kd
 | 
			
		||||
2yNwJjKh44MxPKDt2o8iQMyZE0zlHnEFNpsP4COLTDNC6ljEEu5bk8uPsQIDAQAB
 | 
			
		||||
AoGAVZmpFZsDZfr0l2S9tLLwpjRWNOlKATQkno6q2WesT0eGLQufTciY+c8ypfU6
 | 
			
		||||
hyio8r5iUl/VhhdjhAtKx1mRpiotftHo/eYf8rtsrnprOnWG0bWjLjtIoMbcxGn2
 | 
			
		||||
J3bN6LJmbJMjDs0eJ3KnTu646F3nDUw2oGAwmpzKXA1KAP0CQQDRvQhxk2D3Pehs
 | 
			
		||||
HvG665u2pB5ipYQngEFlZO7RHJZzJOZEWSLuuMqaF/7pTfA5jiBvWqCgJeCRRInL
 | 
			
		||||
21ru4dlPAkEAx9jj7BgKn5TYnMoBSSe0afjsV9oApVpN1Nacb1YDtCwy+scp3++s
 | 
			
		||||
nFxlv98wxIlSdpwMUn+AUWfjiWR7Tu/G/wJBAJ/KjwZIrFVxewP0x2ILYsTRYLzz
 | 
			
		||||
MS4PDsO7FB+I0i7DbBOifXS2oNSpd3I0CNMwrxFnUHzynpbOStVfN3ZL5w0CQQCa
 | 
			
		||||
pwFahxBRhkJKsxhjoFJBX9yl75JoY4Wvm5Tbo9ih6UJaRx3kqfkN14L2BKYcsZgb
 | 
			
		||||
KY9vmDOYy6iNfjDeWTfJAkBkfPUb8oTJ/nSP5zN6sqGxSY4krc4xLxpRmxoJ8HL2
 | 
			
		||||
XfhqXkTzbU13RX9JJ/NZ8vQN9Vm2NhxRGJocQkmcdVtJ
 | 
			
		||||
-----END RSA PRIVATE KEY-----
 | 
			
		||||
-----BEGIN X509 CERTIFICATE-----
 | 
			
		||||
MIICYDCCAiACAgEoMAkGBSsOAwINBQAwfDELMAkGA1UEBhMCVVMxNjA0BgNVBAoT
 | 
			
		||||
LU5hdGlvbmFsIEFlcm9uYXV0aWNzIGFuZCBTcGFjZSBBZG1pbmlzdHJhdGlvbjEZ
 | 
			
		||||
MBcGA1UECxMQVGVzdCBFbnZpcm9ubWVudDEaMBgGA1UECxMRRFNTLU5BU0EtUGls
 | 
			
		||||
b3QtQ0EwHhcNOTYwMjI2MTYzMjQ1WhcNOTcwMjI1MTYzMjQ1WjB8MQswCQYDVQQG
 | 
			
		||||
EwJVUzE2MDQGA1UEChMtTmF0aW9uYWwgQWVyb25hdXRpY3MgYW5kIFNwYWNlIEFk
 | 
			
		||||
bWluaXN0cmF0aW9uMRkwFwYDVQQLExBUZXN0IEVudmlyb25tZW50MRowGAYDVQQL
 | 
			
		||||
ExFEU1MtTkFTQS1QaWxvdC1DQTCB8jAJBgUrDgMCDAUAA4HkADCB4AJBAMA/ssKb
 | 
			
		||||
hPNUG7ZlASfVwEJU21O5OyF/iyBzgHI1O8eOhJGUYO8cc8wDMjR508Mr9cp6Uhl/
 | 
			
		||||
ZB7FV5GkLNEnRHYCQQDUEaSg45P2qrDwixTRhFhmWz5Nvc4lRFQ/42XPcchiJBLb
 | 
			
		||||
bn3QK74T2IxY1yY+kCNq8XrIqf5fJJzIH0J/xUP3AhUAsg2wsQHfDGYk/BOSulX3
 | 
			
		||||
fVd0geUCQQCzCFUQAh+ZkEmp5804cs6ZWBhrUAfnra8lJItYo9xPcXgdIfLfibcX
 | 
			
		||||
R71UsyO77MRD7B0+Ag2tq794IleCVcEEMAkGBSsOAwINBQADLwAwLAIUUayDfreR
 | 
			
		||||
Yh2WeU86/pHNdkUC1IgCFEfxe1f0oMpxJyrJ5XIxTi7vGdoK
 | 
			
		||||
-----END X509 CERTIFICATE-----
 | 
			
		||||
-----BEGIN X509 CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
MIICGTCCAdgCAwCqTDAJBgUrDgMCDQUAMHwxCzAJBgNVBAYTAlVTMTYwNAYDVQQK
 | 
			
		||||
Ey1OYXRpb25hbCBBZXJvbmF1dGljcyBhbmQgU3BhY2UgQWRtaW5pc3RyYXRpb24x
 | 
			
		||||
GTAXBgNVBAsTEFRlc3QgRW52aXJvbm1lbnQxGjAYBgNVBAsTEURTUy1OQVNBLVBp
 | 
			
		||||
bG90LUNBMB4XDTk2MDUxNDE3MDE0MVoXDTk3MDUxNDE3MDE0MVowMzELMAkGA1UE
 | 
			
		||||
BhMCQVUxDzANBgNVBAoTBk1pbmNvbTETMBEGA1UEAxMKRXJpYyBZb3VuZzCB8jAJ
 | 
			
		||||
BgUrDgMCDAUAA4HkADCB4AJBAKbfHz6vE6pXXMTpswtGUec2tvnfLJUsoxE9qs4+
 | 
			
		||||
ObZX7LmLvragNPUeiTJx7UOWZ5DfBj6bXLc8eYne0lP1g3ACQQDUEaSg45P2qrDw
 | 
			
		||||
ixTRhFhmWz5Nvc4lRFQ/42XPcchiJBLbbn3QK74T2IxY1yY+kCNq8XrIqf5fJJzI
 | 
			
		||||
H0J/xUP3AhUAsg2wsQHfDGYk/BOSulX3fVd0geUCQQCzCFUQAh+ZkEmp5804cs6Z
 | 
			
		||||
WBhrUAfnra8lJItYo9xPcXgdIfLfibcXR71UsyO77MRD7B0+Ag2tq794IleCVcEE
 | 
			
		||||
MAkGBSsOAwINBQADMAAwLQIUWsuuJRE3VT4ueWkWMAJMJaZjj1ECFQCYY0zX4bzM
 | 
			
		||||
LC7obsrHD8XAHG+ZRG==
 | 
			
		||||
-----END X509 CERTIFICATE-----
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICTTCCAbagAwIBAgIBADANBgkqhkiG9w0BAQQFADBMMQswCQYDVQQGEwJHQjEM
 | 
			
		||||
MAoGA1UEChMDVUNMMRgwFgYDVQQLEw9JQ0UtVEVMIFByb2plY3QxFTATBgNVBAMT
 | 
			
		||||
DFRydXN0RmFjdG9yeTAeFw05NzA0MjIxNDM5MTRaFw05ODA0MjIxNDM5MTRaMEwx
 | 
			
		||||
CzAJBgNVBAYTAkdCMQwwCgYDVQQKEwNVQ0wxGDAWBgNVBAsTD0lDRS1URUwgUHJv
 | 
			
		||||
amVjdDEVMBMGA1UEAxMMVHJ1c3RGYWN0b3J5MIGcMAoGBFUIAQECAgQAA4GNADCB
 | 
			
		||||
iQKBgQCEieR8NcXkUW1f0G6aC6u0i8q/98JqS6RxK5YmHIGKCkuTWAUjzLfUa4dt
 | 
			
		||||
U9igGCjTuxaDqlzEim+t/02pmiBZT9HaX++35MjQPUWmsChcYU5WyzGErXi+rQaw
 | 
			
		||||
zlwS73zM8qiPj/97lXYycWhgL0VaiDSPxRXEUdWoaGruom4mNQIDAQABo0IwQDAd
 | 
			
		||||
BgNVHQ4EFgQUHal1LZr7oVg5z6lYzrhTgZRCmcUwDgYDVR0PAQH/BAQDAgH2MA8G
 | 
			
		||||
A1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEEBQADgYEAfaggfl6FZoioecjv0dq8
 | 
			
		||||
/DXo/u11iMZvXn08gjX/zl2b4wtPbShOSY5FhkSm8GeySasz+/Nwb/uzfnIhokWi
 | 
			
		||||
lfPZHtlCWtXbIy/TN51eJyq04ceDCQDWvLC2enVg9KB+GJ34b5c5VaPRzq8MBxsA
 | 
			
		||||
S7ELuYGtmYgYm9NZOIr7yU0=
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIIB6jCCAZQCAgEtMA0GCSqGSIb3DQEBBAUAMIGAMQswCQYDVQQGEwJVUzE2MDQG
 | 
			
		||||
A1UEChMtTmF0aW9uYWwgQWVyb25hdXRpY3MgYW5kIFNwYWNlIEFkbWluaXN0cmF0
 | 
			
		||||
aW9uMRkwFwYDVQQLExBUZXN0IEVudmlyb25tZW50MR4wHAYDVQQLExVNRDUtUlNB
 | 
			
		||||
LU5BU0EtUGlsb3QtQ0EwHhcNOTYwNDMwMjIwNTAwWhcNOTcwNDMwMjIwNTAwWjCB
 | 
			
		||||
gDELMAkGA1UEBhMCVVMxNjA0BgNVBAoTLU5hdGlvbmFsIEFlcm9uYXV0aWNzIGFu
 | 
			
		||||
ZCBTcGFjZSBBZG1pbmlzdHJhdGlvbjEZMBcGA1UECxMQVGVzdCBFbnZpcm9ubWVu
 | 
			
		||||
dDEeMBwGA1UECxMVTUQ1LVJTQS1OQVNBLVBpbG90LUNBMFkwCgYEVQgBAQICAgAD
 | 
			
		||||
SwAwSAJBALmmX5+GqAvcrWK13rfDrNX9UfeA7f+ijyBgeFQjYUoDpFqapw4nzQBL
 | 
			
		||||
bAXug8pKkRwa2Zh8YODhXsRWu2F/UckCAwEAATANBgkqhkiG9w0BAQQFAANBAH9a
 | 
			
		||||
OBA+QCsjxXgnSqHx04gcU8S49DVUb1f2XVoLnHlIb8RnX0k5O6mpHT5eti9bLkiW
 | 
			
		||||
GJNMJ4L0AJ/ac+SmHZc=
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICajCCAdMCBDGA0QUwDQYJKoZIhvcNAQEEBQAwfTELMAkGA1UEBhMCQ2ExDzAN
 | 
			
		||||
BgNVBAcTBk5lcGVhbjEeMBwGA1UECxMVTm8gTGlhYmlsaXR5IEFjY2VwdGVkMR8w
 | 
			
		||||
HQYDVQQKExZGb3IgRGVtbyBQdXJwb3NlcyBPbmx5MRwwGgYDVQQDExNFbnRydXN0
 | 
			
		||||
IERlbW8gV2ViIENBMB4XDTk2MDQyNjEzMzUwMVoXDTA2MDQyNjEzMzUwMVowfTEL
 | 
			
		||||
MAkGA1UEBhMCQ2ExDzANBgNVBAcTBk5lcGVhbjEeMBwGA1UECxMVTm8gTGlhYmls
 | 
			
		||||
aXR5IEFjY2VwdGVkMR8wHQYDVQQKExZGb3IgRGVtbyBQdXJwb3NlcyBPbmx5MRww
 | 
			
		||||
GgYDVQQDExNFbnRydXN0IERlbW8gV2ViIENBMIGdMA0GCSqGSIb3DQEBAQUAA4GL
 | 
			
		||||
ADCBhwKBgQCaroS7O1DA0hm4IefNYU1cx/nqOmzEnk291d1XqznDeF4wEgakbkCc
 | 
			
		||||
zTKxK791yNpXG5RmngqH7cygDRTHZJ6mfCRn0wGC+AI00F2vYTGqPGRQL1N3lZT0
 | 
			
		||||
YDKFC0SQeMMjFIZ1aeQigroFQnHo0VB3zWIMpNkka8PY9lxHZAmWwQIBAzANBgkq
 | 
			
		||||
hkiG9w0BAQQFAAOBgQBAx0UMVA1s54lMQyXjMX5kj99FJN5itb8bK1Rk+cegPQPF
 | 
			
		||||
cWO9SEWyEjjBjIkjjzAwBkaEszFsNGxemxtXvwjIm1xEUMTVlPEWTs2qnDvAUA9W
 | 
			
		||||
YqhWbhH0toGT36236QAsqCZ76rbTRVSSX2BHyJwJMG2tCRv7kRJ//NIgxj3H4w==
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
issuer= /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test PCA (1024 bit)
 | 
			
		||||
subject=/C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test PCA (1024 bit)
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICJzCCAZACAQAwDQYJKoZIhvcNAQEEBQAwXDELMAkGA1UEBhMCQVUxEzARBgNV
 | 
			
		||||
BAgTClF1ZWVuc2xhbmQxGjAYBgNVBAoTEUNyeXB0U29mdCBQdHkgTHRkMRwwGgYD
 | 
			
		||||
VQQDExNUZXN0IFBDQSAoMTAyNCBiaXQpMB4XDTk3MDYwOTEzNTczN1oXDTAxMDYw
 | 
			
		||||
OTEzNTczN1owXDELMAkGA1UEBhMCQVUxEzARBgNVBAgTClF1ZWVuc2xhbmQxGjAY
 | 
			
		||||
BgNVBAoTEUNyeXB0U29mdCBQdHkgTHRkMRwwGgYDVQQDExNUZXN0IFBDQSAoMTAy
 | 
			
		||||
NCBiaXQpMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCdoWk/3+WcMlfjIrkg
 | 
			
		||||
40ketmnQaEogQe1LLcuOJV6rKfUSAsPgwgsabJ/wn8TxA1yy3eKJbFl3OiUXMRsp
 | 
			
		||||
22Jp85PmemiDzyUIStwk72qhp1imbANZvlmlCFKiQrjUyuDfu4TABmn+kkt3vR1Y
 | 
			
		||||
BEOGt+IFye1UBVSATVdRJ2UVhwIDAQABMA0GCSqGSIb3DQEBBAUAA4GBABNA1u/S
 | 
			
		||||
Cg/LJZWb7GliiKJsvuhxlE4E5JxQF2zMub/CSNbF97//tYSyj96sxeFQxZXbcjm9
 | 
			
		||||
xt6mr/xNLA4szNQMJ4P+L7b5e/jC5DSqlwS+CUYJgaFs/SP+qJoCSu1bR3IM9XWO
 | 
			
		||||
cRBpDmcBbYLkSyB92WURvsZ1LtjEcn+cdQVI
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
-----BEGIN RSA PRIVATE KEY-----
 | 
			
		||||
MIICXAIBAAKBgQCdoWk/3+WcMlfjIrkg40ketmnQaEogQe1LLcuOJV6rKfUSAsPg
 | 
			
		||||
wgsabJ/wn8TxA1yy3eKJbFl3OiUXMRsp22Jp85PmemiDzyUIStwk72qhp1imbANZ
 | 
			
		||||
vlmlCFKiQrjUyuDfu4TABmn+kkt3vR1YBEOGt+IFye1UBVSATVdRJ2UVhwIDAQAB
 | 
			
		||||
AoGAba4fTtuap5l7/8ZsbE7Z1O32KJY4ZcOZukLOLUUhXxXduT+FTgGWujc0/rgc
 | 
			
		||||
z9qYCLlNZHOouMYTgtSfYvuMuLZ11VIt0GYH+nRioLShE59Yy+zCRyC+gPigS1kz
 | 
			
		||||
xvo14AsOIPYV14Tk/SsHyq6E0eTk7VzaIE197giiINUERPECQQDSKmtPTh/lRKw7
 | 
			
		||||
HSZSM0I1mFWn/1zqrAbontRQY5w98QWIOe5qmzYyFbPXYT3d9BzlsMyhgiRNoBbD
 | 
			
		||||
yvohSHXJAkEAwAHx6ezAZeWWzD5yXD36nyjpkVCw7Tk7TSmOceLJMWt1QcrCfqlS
 | 
			
		||||
xA5jjpQ6Z8suU5DdtWAryM2sAir1WisYzwJAd6Zcx56jvAQ3xcPXsE6scBTVFzrj
 | 
			
		||||
7FqZ6E+cclPzfLQ+QQsyOBE7bpI6e/FJppY26XGZXo3YGzV8IGXrt40oOQJALETG
 | 
			
		||||
h86EFXo3qGOFbmsDy4pdP5nBERCu8X1xUCSfintiD4c2DInxgS5oGclnJeMcjTvL
 | 
			
		||||
QjQoJCX3UJCi/OUO1QJBAKgcDHWjMvt+l1pjJBsSEZ0HX9AAIIVx0RQmbFGS+F2Q
 | 
			
		||||
hhu5l77WnnZOQ9vvhV5u7NPCUF9nhU3jh60qWWO8mkc=
 | 
			
		||||
-----END RSA PRIVATE KEY-----
 | 
			
		||||
subject=/C=US/O=RSA Data Security, Inc./OU=Commercial Certification Authority
 | 
			
		||||
issuer= /C=US/O=RSA Data Security, Inc./OU=Commercial Certification Authority
 | 
			
		||||
notBefore=941104185834Z
 | 
			
		||||
notAfter =991103185834Z
 | 
			
		||||
-----BEGIN X509 CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
MIICIzCCAZACBQJBAAAWMA0GCSqGSIb3DQEBAgUAMFwxCzAJBgNVBAYTAlVTMSAw
 | 
			
		||||
HgYDVQQKExdSU0EgRGF0YSBTZWN1cml0eSwgSW5jLjErMCkGA1UECxMiQ29tbWVy
 | 
			
		||||
Y2lhbCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw05NDExMDQxODU4MzRaFw05
 | 
			
		||||
OTExMDMxODU4MzRaMFwxCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdSU0EgRGF0YSBT
 | 
			
		||||
ZWN1cml0eSwgSW5jLjErMCkGA1UECxMiQ29tbWVyY2lhbCBDZXJ0aWZpY2F0aW9u
 | 
			
		||||
IEF1dGhvcml0eTCBmzANBgkqhkiG9w0BAQEFAAOBiQAwgYUCfgCk+4Fie84QJ93o
 | 
			
		||||
975sbsZwmdu41QUDaSiCnHJ/lj+O7Kwpkj+KFPhCdr69XQO5kNTQvAayUTNfxMK/
 | 
			
		||||
touPmbZiImDd298ggrTKoi8tUO2UMt7gVY3UaOLgTNLNBRYulWZcYVI4HlGogqHE
 | 
			
		||||
7yXpCuaLK44xZtn42f29O2nZ6wIDAQABMA0GCSqGSIb3DQEBAgUAA34AdrW2EP4j
 | 
			
		||||
9/dZYkuwX5zBaLxJu7NJbyFHXSudVMQAKD+YufKKg5tgf+tQx6sFEC097TgCwaVI
 | 
			
		||||
0v5loMC86qYjFmZsGySp8+x5NRhPJsjjr1BKx6cxa9B8GJ1Qv6km+iYrRpwUqbtb
 | 
			
		||||
MJhCKLVLU7tDCZJAuqiqWqTGtotXTcU=
 | 
			
		||||
-----END X509 CERTIFICATE-----
 | 
			
		||||
subject=/C=US/O=RSA Data Security, Inc./OU=Secure Server Certification Authority
 | 
			
		||||
issuer= /C=US/O=RSA Data Security, Inc./OU=Secure Server Certification Authority
 | 
			
		||||
notBefore=941109235417Z
 | 
			
		||||
notAfter =991231235417Z
 | 
			
		||||
-----BEGIN X509 CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
MIICKTCCAZYCBQJBAAABMA0GCSqGSIb3DQEBAgUAMF8xCzAJBgNVBAYTAlVTMSAw
 | 
			
		||||
HgYDVQQKExdSU0EgRGF0YSBTZWN1cml0eSwgSW5jLjEuMCwGA1UECxMlU2VjdXJl
 | 
			
		||||
IFNlcnZlciBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw05NDExMDkyMzU0MTda
 | 
			
		||||
Fw05OTEyMzEyMzU0MTdaMF8xCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdSU0EgRGF0
 | 
			
		||||
YSBTZWN1cml0eSwgSW5jLjEuMCwGA1UECxMlU2VjdXJlIFNlcnZlciBDZXJ0aWZp
 | 
			
		||||
Y2F0aW9uIEF1dGhvcml0eTCBmzANBgkqhkiG9w0BAQEFAAOBiQAwgYUCfgCSznrB
 | 
			
		||||
roM+WqqJg1esJQF2DK2ujiw3zus1eGRUA+WEQFHJv48I4oqCCNIWhjdV6bEhAq12
 | 
			
		||||
aIGaBaJLyUslZiJWbIgHj/eBWW2EB2VwE3F2Ppt3TONQiVaYSLkdpykaEy5KEVmc
 | 
			
		||||
HhXVSVQsczppgrGXOZxtcGdI5d0t1sgeewIDAQABMA0GCSqGSIb3DQEBAgUAA34A
 | 
			
		||||
iNHReSHO4ovo+MF9NFM/YYPZtgs4F7boviGNjwC4i1N+RGceIr2XJ+CchcxK9oU7
 | 
			
		||||
suK+ktPlDemvXA4MRpX/oRxePug2WHpzpgr4IhFrwwk4fia7c+8AvQKk8xQNMD9h
 | 
			
		||||
cHsg/jKjn7P0Z1LctO6EjJY2IN6BCINxIYoPnqk=
 | 
			
		||||
-----END X509 CERTIFICATE-----
 | 
			
		||||
subject=/C=ZA/SP=Western Cape/L=Cape Town/O=Thawte Consulting cc
 | 
			
		||||
	/OU=Certification Services Division/CN=Thawte Server CA
 | 
			
		||||
	/Email=server-certs@thawte.com
 | 
			
		||||
issuer= /C=ZA/SP=Western Cape/L=Cape Town/O=Thawte Consulting cc
 | 
			
		||||
	/OU=Certification Services Division/CN=Thawte Server CA
 | 
			
		||||
	/Email=server-certs@thawte.com
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIIC+TCCAmICAQAwDQYJKoZIhvcNAQEEBQAwgcQxCzAJBgNVBAYTAlpBMRUwEwYD
 | 
			
		||||
VQQIEwxXZXN0ZXJuIENhcGUxEjAQBgNVBAcTCUNhcGUgVG93bjEdMBsGA1UEChMU
 | 
			
		||||
VGhhd3RlIENvbnN1bHRpbmcgY2MxKDAmBgNVBAsTH0NlcnRpZmljYXRpb24gU2Vy
 | 
			
		||||
dmljZXMgRGl2aXNpb24xGTAXBgNVBAMTEFRoYXd0ZSBTZXJ2ZXIgQ0ExJjAkBgkq
 | 
			
		||||
hkiG9w0BCQEWF3NlcnZlci1jZXJ0c0B0aGF3dGUuY29tMB4XDTk2MDcyNzE4MDc1
 | 
			
		||||
N1oXDTk4MDcyNzE4MDc1N1owgcQxCzAJBgNVBAYTAlpBMRUwEwYDVQQIEwxXZXN0
 | 
			
		||||
ZXJuIENhcGUxEjAQBgNVBAcTCUNhcGUgVG93bjEdMBsGA1UEChMUVGhhd3RlIENv
 | 
			
		||||
bnN1bHRpbmcgY2MxKDAmBgNVBAsTH0NlcnRpZmljYXRpb24gU2VydmljZXMgRGl2
 | 
			
		||||
aXNpb24xGTAXBgNVBAMTEFRoYXd0ZSBTZXJ2ZXIgQ0ExJjAkBgkqhkiG9w0BCQEW
 | 
			
		||||
F3NlcnZlci1jZXJ0c0B0aGF3dGUuY29tMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCB
 | 
			
		||||
iQKBgQDTpFBuyP9Wa+bPXbbqDGh1R6KqwtqEJfyo9EdR2oW1IHSUhh4PdcnpCGH1
 | 
			
		||||
Bm0wbhUZAulSwGLbTZme4moMRDjN/r7jZAlwxf6xaym2L0nIO9QnBCUQly/nkG3A
 | 
			
		||||
KEKZ10xD3sP1IW1Un13DWOHA5NlbsLjctHvfNjrCtWYiEtaHDQIDAQABMA0GCSqG
 | 
			
		||||
SIb3DQEBBAUAA4GBAIsvn7ifX3RUIrvYXtpI4DOfARkTogwm6o7OwVdl93yFhDcX
 | 
			
		||||
7h5t0XZ11MUAMziKdde3rmTvzUYIUCYoY5b032IwGMTvdiclK+STN6NP2m5nvFAM
 | 
			
		||||
qJT5gC5O+j/jBuZRQ4i0AMYQr5F4lT8oBJnhgafw6PL8aDY2vMHGSPl9+7uf
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIIDDTCCAnYCAQAwDQYJKoZIhvcNAQEEBQAwgc4xCzAJBgNVBAYTAlpBMRUwEwYD
 | 
			
		||||
VQQIEwxXZXN0ZXJuIENhcGUxEjAQBgNVBAcTCUNhcGUgVG93bjEdMBsGA1UEChMU
 | 
			
		||||
VGhhd3RlIENvbnN1bHRpbmcgY2MxKDAmBgNVBAsTH0NlcnRpZmljYXRpb24gU2Vy
 | 
			
		||||
dmljZXMgRGl2aXNpb24xITAfBgNVBAMTGFRoYXd0ZSBQcmVtaXVtIFNlcnZlciBD
 | 
			
		||||
QTEoMCYGCSqGSIb3DQEJARYZcHJlbWl1bS1zZXJ2ZXJAdGhhd3RlLmNvbTAeFw05
 | 
			
		||||
NjA3MjcxODA3MTRaFw05ODA3MjcxODA3MTRaMIHOMQswCQYDVQQGEwJaQTEVMBMG
 | 
			
		||||
A1UECBMMV2VzdGVybiBDYXBlMRIwEAYDVQQHEwlDYXBlIFRvd24xHTAbBgNVBAoT
 | 
			
		||||
FFRoYXd0ZSBDb25zdWx0aW5nIGNjMSgwJgYDVQQLEx9DZXJ0aWZpY2F0aW9uIFNl
 | 
			
		||||
cnZpY2VzIERpdmlzaW9uMSEwHwYDVQQDExhUaGF3dGUgUHJlbWl1bSBTZXJ2ZXIg
 | 
			
		||||
Q0ExKDAmBgkqhkiG9w0BCQEWGXByZW1pdW0tc2VydmVyQHRoYXd0ZS5jb20wgZ8w
 | 
			
		||||
DQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBANI2NmqL18JbntqBQWKPOO5JBFXW0O8c
 | 
			
		||||
G5UWR+8YSDU6UvQragaPOy/qVuOvho2eF/eetGV1Ak3vywmiIVHYm9Bn0LoNkgYU
 | 
			
		||||
c9STy5cqAJxcTgy8+hVS/PJEbtoRSm4Iny8t4/mqOoZztkZTWMiJBb2DEbhzP6oH
 | 
			
		||||
jfRCTedAnRw3AgMBAAEwDQYJKoZIhvcNAQEEBQADgYEAutFIgTRZVYerIZfL9lvR
 | 
			
		||||
w9Eifvvo5KTZ3h+Bj+VzNnyw4Qc/IyXkPOu6SIiH9LQ3sCmWBdxpe+qr4l77rLj2
 | 
			
		||||
GYuMtESFfn1XVALzkYgC7JcPuTOjMfIiMByt+uFf8AV8x0IW/Qkuv+hEQcyM9vxK
 | 
			
		||||
3VZdLbCVIhNoEsysrxCpxcI=
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
Tims test GCI CA
 | 
			
		||||
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIIB8DCCAZoCAQAwDQYJKoZIhvcNAQEEBQAwgYIxCzAJBgNVBAYTAkFVMRMwEQYD
 | 
			
		||||
VQQIEwpRdWVlbnNsYW5kMREwDwYDVQQHEwhCcmlzYmFuZTEaMBgGA1UEChMRQ3J5
 | 
			
		||||
cHRTb2Z0IFB0eSBMdGQxFDASBgNVBAsTC2RldmVsb3BtZW50MRkwFwYDVQQDExBD
 | 
			
		||||
cnlwdFNvZnQgRGV2IENBMB4XDTk3MDMyMjEzMzQwNFoXDTk4MDMyMjEzMzQwNFow
 | 
			
		||||
gYIxCzAJBgNVBAYTAkFVMRMwEQYDVQQIEwpRdWVlbnNsYW5kMREwDwYDVQQHEwhC
 | 
			
		||||
cmlzYmFuZTEaMBgGA1UEChMRQ3J5cHRTb2Z0IFB0eSBMdGQxFDASBgNVBAsTC2Rl
 | 
			
		||||
dmVsb3BtZW50MRkwFwYDVQQDExBDcnlwdFNvZnQgRGV2IENBMFwwDQYJKoZIhvcN
 | 
			
		||||
AQEBBQADSwAwSAJBAOAOAqogG5QwAmLhzyO4CoRnx/wVy4NZP4dxJy83O1EnL0rw
 | 
			
		||||
OdsamJKvPOLHgSXo3gDu9uVyvCf/QJmZAmC5ml8CAwEAATANBgkqhkiG9w0BAQQF
 | 
			
		||||
AANBADRRS/GVdd7rAqRW6SdmgLJduOU2yq3avBu99kRqbp9A/dLu6r6jU+eP4oOA
 | 
			
		||||
TfdbFZtAAD2Hx9jUtY3tfdrJOb8= 
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICVjCCAgACAQAwDQYJKoZIhvcNAQEEBQAwgbUxCzAJBgNVBAYTAkFVMRMwEQYD
 | 
			
		||||
VQQIEwpRdWVlbnNsYW5kMREwDwYDVQQHEwhCcmlzYmFuZTEaMBgGA1UEChMRQ3J5
 | 
			
		||||
cHRTb2Z0IFB0eSBMdGQxLDAqBgNVBAsTI1dPUlRITEVTUyBDRVJUSUZJQ0FUSU9O
 | 
			
		||||
IEFVVEhPUklUSUVTMTQwMgYDVQQDEytaRVJPIFZBTFVFIENBIC0gREVNT05TVFJB
 | 
			
		||||
VElPTiBQVVJQT1NFUyBPTkxZMB4XDTk3MDQwMzEzMjI1NFoXDTk4MDQwMzEzMjI1
 | 
			
		||||
NFowgbUxCzAJBgNVBAYTAkFVMRMwEQYDVQQIEwpRdWVlbnNsYW5kMREwDwYDVQQH
 | 
			
		||||
EwhCcmlzYmFuZTEaMBgGA1UEChMRQ3J5cHRTb2Z0IFB0eSBMdGQxLDAqBgNVBAsT
 | 
			
		||||
I1dPUlRITEVTUyBDRVJUSUZJQ0FUSU9OIEFVVEhPUklUSUVTMTQwMgYDVQQDEyta
 | 
			
		||||
RVJPIFZBTFVFIENBIC0gREVNT05TVFJBVElPTiBQVVJQT1NFUyBPTkxZMFwwDQYJ
 | 
			
		||||
KoZIhvcNAQEBBQADSwAwSAJBAOZ7T7yqP/tyspcko3yPY1y0Cm2EmwNvzW4QgVXR
 | 
			
		||||
Fjs3HmJ4xtSpXdo6mwcGezL3Abt/aQXaxv9PU8xt+Jr0OFUCAwEAATANBgkqhkiG
 | 
			
		||||
9w0BAQQFAANBAOQpYmGgyCqCy1OljgJhCqQOu627oVlHzK1L+t9vBaMfn40AVUR4
 | 
			
		||||
WzQVWO31KTgi5vTK1U+3h46fgUWqQ0h+6rU=
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIAwgKADAgECAgEAMA0GCSqGSIb3DQEBBAUAMGIxETAPBgNVBAcTCEludGVybmV0
 | 
			
		||||
MRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjE0MDIGA1UECxMrVmVyaVNpZ24gQ2xh
 | 
			
		||||
c3MgMSBDQSAtIEluZGl2aWR1YWwgU3Vic2NyaWJlcjAeFw05NjA0MDgxMDIwMjda
 | 
			
		||||
Fw05NzA0MDgxMDIwMjdaMGIxETAPBgNVBAcTCEludGVybmV0MRcwFQYDVQQKEw5W
 | 
			
		||||
ZXJpU2lnbiwgSW5jLjE0MDIGA1UECxMrVmVyaVNpZ24gQ2xhc3MgMSBDQSAtIElu
 | 
			
		||||
ZGl2aWR1YWwgU3Vic2NyaWJlcjCAMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC2
 | 
			
		||||
FKbPTdAFDdjKI9BvqrQpkmOOLPhvltcunXZLEbE2jVfJw/0cxrr+Hgi6M8qV6r7j
 | 
			
		||||
W80GqLd5HUQq7XPysVKDaBBwZJHXPmv5912dFEObbpdFmIFH0S3L3bty10w/cari
 | 
			
		||||
QPJUObwW7s987LrbP2wqsxaxhhKdrpM01bjV0Pc+qQIDAQABAAAAADANBgkqhkiG
 | 
			
		||||
9w0BAQQFAAOBgQA+1nJryNt8VBRjRr07ArDAV/3jAH7GjDc9jsrxZS68ost9v06C
 | 
			
		||||
TvTNKGL+LISNmFLXl+JXhgGB0JZ9fvyYzNgHQ46HBUng1H6voalfJgS2KdEo50wW
 | 
			
		||||
8EFZYMDkT1k4uynwJqkVN2QJK/2q4/A/VCov5h6SlM8Affg2W+1TLqvqkwAA
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
 subject=/L=Internet/O=VeriSign, Inc./OU=VeriSign Class 2 CA - Individual Subscriber
 | 
			
		||||
 issuer= /L=Internet/O=VeriSign, Inc./OU=VeriSign Class 2 CA - Individual Subscriber
 | 
			
		||||
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIIEkzCCA/ygAwIBAgIRANDTUpSRL3nTFeMrMayFSPAwDQYJKoZIhvcNAQECBQAw
 | 
			
		||||
YjERMA8GA1UEBxMISW50ZXJuZXQxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMTQw
 | 
			
		||||
MgYDVQQLEytWZXJpU2lnbiBDbGFzcyAyIENBIC0gSW5kaXZpZHVhbCBTdWJzY3Jp
 | 
			
		||||
YmVyMB4XDTk2MDYwNDAwMDAwMFoXDTk4MDYwNDIzNTk1OVowYjERMA8GA1UEBxMI
 | 
			
		||||
SW50ZXJuZXQxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMTQwMgYDVQQLEytWZXJp
 | 
			
		||||
U2lnbiBDbGFzcyAyIENBIC0gSW5kaXZpZHVhbCBTdWJzY3JpYmVyMIGfMA0GCSqG
 | 
			
		||||
SIb3DQEBAQUAA4GNADCBiQKBgQC6A+2czKGRcYMfm8gdnk+0de99TDDzsqo0v5nb
 | 
			
		||||
RsbUmMcdRQ7nsMbRWe0SAb/9QoLTZ/cJ0iOBqdrkz7UpqqKarVoTSdlSMVM92tWp
 | 
			
		||||
3bJncZHQD1t4xd6lQVdI1/T6R+5J0T1ukOdsI9Jmf+F28S6g3R3L1SFwiHKeZKZv
 | 
			
		||||
z+793wIDAQABo4ICRzCCAkMwggIpBgNVHQMBAf8EggIdMIICGTCCAhUwggIRBgtg
 | 
			
		||||
hkgBhvhFAQcBATCCAgAWggGrVGhpcyBjZXJ0aWZpY2F0ZSBpbmNvcnBvcmF0ZXMg
 | 
			
		||||
YnkgcmVmZXJlbmNlLCBhbmQgaXRzIHVzZSBpcyBzdHJpY3RseSBzdWJqZWN0IHRv
 | 
			
		||||
LCB0aGUgVmVyaVNpZ24gQ2VydGlmaWNhdGlvbiBQcmFjdGljZSBTdGF0ZW1lbnQg
 | 
			
		||||
KENQUyksIGF2YWlsYWJsZSBhdDogaHR0cHM6Ly93d3cudmVyaXNpZ24uY29tL0NQ
 | 
			
		||||
Uy0xLjA7IGJ5IEUtbWFpbCBhdCBDUFMtcmVxdWVzdHNAdmVyaXNpZ24uY29tOyBv
 | 
			
		||||
ciBieSBtYWlsIGF0IFZlcmlTaWduLCBJbmMuLCAyNTkzIENvYXN0IEF2ZS4sIE1v
 | 
			
		||||
dW50YWluIFZpZXcsIENBIDk0MDQzIFVTQSBUZWwuICsxICg0MTUpIDk2MS04ODMw
 | 
			
		||||
IENvcHlyaWdodCAoYykgMTk5NiBWZXJpU2lnbiwgSW5jLiAgQWxsIFJpZ2h0cyBS
 | 
			
		||||
ZXNlcnZlZC4gQ0VSVEFJTiBXQVJSQU5USUVTIERJU0NMQUlNRUQgYW5kIExJQUJJ
 | 
			
		||||
TElUWSBMSU1JVEVELqAOBgxghkgBhvhFAQcBAQGhDgYMYIZIAYb4RQEHAQECMC8w
 | 
			
		||||
LRYraHR0cHM6Ly93d3cudmVyaXNpZ24uY29tL3JlcG9zaXRvcnkvQ1BTLTEuMDAU
 | 
			
		||||
BglghkgBhvhCAQEBAf8EBAMCAgQwDQYJKoZIhvcNAQECBQADgYEApRJRkNBqLLgs
 | 
			
		||||
53IR/d18ODdLOWMTZ+QOOxBrq460iBEdUwgF8vmPRX1ku7UiDeNzaLlurE6eFqHq
 | 
			
		||||
2zPyK5j60zfTLVJMWKcQWwTJLjHtXrW8pxhNtFc6Fdvy5ZkHnC/9NIl7/t4U6WqB
 | 
			
		||||
p4y+p7SdMIkEwIZfds0VbnQyX5MRUJY=
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
 subject=/C=US/O=VeriSign, Inc./OU=Class 3 Public Primary Certification Authority
 | 
			
		||||
 issuer= /C=US/O=VeriSign, Inc./OU=Class 3 Public Primary Certification Authority
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICMTCCAZoCBQKhAAABMA0GCSqGSIb3DQEBAgUAMF8xCzAJBgNVBAYTAlVTMRcw
 | 
			
		||||
FQYDVQQKEw5WZXJpU2lnbiwgSW5jLjE3MDUGA1UECxMuQ2xhc3MgMyBQdWJsaWMg
 | 
			
		||||
UHJpbWFyeSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw05NjAxMjkwMDAwMDBa
 | 
			
		||||
Fw05OTEyMzEyMzU5NTlaMF8xCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2ln
 | 
			
		||||
biwgSW5jLjE3MDUGA1UECxMuQ2xhc3MgMyBQdWJsaWMgUHJpbWFyeSBDZXJ0aWZp
 | 
			
		||||
Y2F0aW9uIEF1dGhvcml0eTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAyVxZ
 | 
			
		||||
nvIbigEUtBDfBEDb41evakVAj4QMC9Ez2dkRz+4CWB8l9yqoRAWq7AMfeH+ek7ma
 | 
			
		||||
AKojfdashaJjRcdyJ8z0TMZ1cdI5709C8HXfCpDGjiBvmA/4rCNfcCk2pMmG57Ga
 | 
			
		||||
IMtTpYXnPb59mv4kRTPcdhXtD6JxZExlLoFoRacCAwEAATANBgkqhkiG9w0BAQIF
 | 
			
		||||
AAOBgQB1Zmw+0c2B27X4LzZRtvdCvM1Cr9wO+hVs+GeTVzrrtpLotgHKjLeOQ7RJ
 | 
			
		||||
Zfk+7r11Ri7J/CVdqMcvi5uPaM+0nJcYwE3vH9mvgrPmZLiEXIqaB1JDYft0nls6
 | 
			
		||||
NvxMsvwaPxUupVs8G5DsiCnkWRb5zget7Ond2tIxik/W2O8XjQ==
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
 subject=/C=US/O=VeriSign, Inc./OU=Class 4 Public Primary Certification Authority
 | 
			
		||||
 issuer= /C=US/O=VeriSign, Inc./OU=Class 4 Public Primary Certification Authority
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICMTCCAZoCBQKmAAABMA0GCSqGSIb3DQEBAgUAMF8xCzAJBgNVBAYTAlVTMRcw
 | 
			
		||||
FQYDVQQKEw5WZXJpU2lnbiwgSW5jLjE3MDUGA1UECxMuQ2xhc3MgNCBQdWJsaWMg
 | 
			
		||||
UHJpbWFyeSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw05NjAxMjkwMDAwMDBa
 | 
			
		||||
Fw05OTEyMzEyMzU5NTlaMF8xCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2ln
 | 
			
		||||
biwgSW5jLjE3MDUGA1UECxMuQ2xhc3MgNCBQdWJsaWMgUHJpbWFyeSBDZXJ0aWZp
 | 
			
		||||
Y2F0aW9uIEF1dGhvcml0eTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA0LJ1
 | 
			
		||||
9njQrlpQ9OlQqZ+M1++RlHDo0iSQdomF1t+s5gEXMoDwnZNHvJplnR+Xrr/phnVj
 | 
			
		||||
IIm9gFidBAydqMEk6QvlMXi9/C0MN2qeeIDpRnX57aP7E3vIwUzSo+/1PLBij0pd
 | 
			
		||||
O92VZ48TucE81qcmm+zDO3rZTbxtm+gVAePwR6kCAwEAATANBgkqhkiG9w0BAQIF
 | 
			
		||||
AAOBgQBT3dPwnCR+QKri/AAa19oM/DJhuBUNlvP6Vxt/M3yv6ZiaYch6s7f/sdyZ
 | 
			
		||||
g9ysEvxwyR84Qu1E9oAuW2szaayc01znX1oYx7EteQSWQZGZQbE8DbqEOcY7l/Am
 | 
			
		||||
yY7uvcxClf8exwI/VAx49byqYHwCaejcrOICdmHEPgPq0ook0Q==
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										420
									
								
								apps/server2.pem
									
									
									
									
									
								
							
							
						
						
									
										420
									
								
								apps/server2.pem
									
									
									
									
									
								
							@@ -1,52 +1,376 @@
 | 
			
		||||
subject= C = UK, O = OpenSSL Group, OU = FOR TESTING PURPOSES ONLY, CN = Test Server Cert #2
 | 
			
		||||
issuer= C = UK, O = OpenSSL Group, OU = FOR TESTING PURPOSES ONLY, CN = OpenSSL Test Intermediate CA
 | 
			
		||||
issuer= /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test CA (1024 bit)
 | 
			
		||||
subject=/C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Server test cert (1024 bit)
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIID6jCCAtKgAwIBAgIJALnu1NlVpZ60MA0GCSqGSIb3DQEBBQUAMHAxCzAJBgNV
 | 
			
		||||
BAYTAlVLMRYwFAYDVQQKDA1PcGVuU1NMIEdyb3VwMSIwIAYDVQQLDBlGT1IgVEVT
 | 
			
		||||
VElORyBQVVJQT1NFUyBPTkxZMSUwIwYDVQQDDBxPcGVuU1NMIFRlc3QgSW50ZXJt
 | 
			
		||||
ZWRpYXRlIENBMB4XDTExMTIwODE0MDE0OFoXDTIxMTAxNjE0MDE0OFowZzELMAkG
 | 
			
		||||
A1UEBhMCVUsxFjAUBgNVBAoMDU9wZW5TU0wgR3JvdXAxIjAgBgNVBAsMGUZPUiBU
 | 
			
		||||
RVNUSU5HIFBVUlBPU0VTIE9OTFkxHDAaBgNVBAMME1Rlc3QgU2VydmVyIENlcnQg
 | 
			
		||||
IzIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDrdi7j9yctG+L4EjBy
 | 
			
		||||
gjPmEqZzOJEQba26MoQGzglU7e5Xf59Rb/hgVQuKAoiZe7/R8rK4zJ4W7iXdXw0L
 | 
			
		||||
qBpyG8B5aGKeI32w+A9TcBApoXXL2CrYQEQjZwUIpLlYBIi2NkJj3nVkq5dgl1gO
 | 
			
		||||
ALiQ+W8jg3kzg5Ec9rimp9r93N8wsSL3awsafurmYCvOf7leHaMP1WJ/zDRGUNHG
 | 
			
		||||
/WtDjXc8ZUG1+6EXU9Jc2Fs+2Omf7fcN0l00AK/wPg8OaNS0rKyGq9JdIT9FRGV1
 | 
			
		||||
bXe/rx58FaE5CItdwCSYhJvF/O95LWQoxJXye5bCFLmvDTEyVq9FMSCptfsmbXjE
 | 
			
		||||
ZGsXAgMBAAGjgY8wgYwwDAYDVR0TAQH/BAIwADAOBgNVHQ8BAf8EBAMCBeAwLAYJ
 | 
			
		||||
YIZIAYb4QgENBB8WHU9wZW5TU0wgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1Ud
 | 
			
		||||
DgQWBBR52UaWWTKzZGDH/X4mWNcuqeQVazAfBgNVHSMEGDAWgBQ2w2yI55X+sL3s
 | 
			
		||||
zj49hqshgYfa2jANBgkqhkiG9w0BAQUFAAOCAQEANBW+XYLlHBqVY/31ie+3gRlS
 | 
			
		||||
LPfy4SIqn0t3RJjagT29MXprblBO2cbMO8VGjkQdKGpmMXjxbht2arOOUXRHX4n/
 | 
			
		||||
XTyn/QHEf0bcwIITMReO3DZUPAEw8hSjn9xEOM0IRVOCP+mH5fi74QzzQaZVCyYg
 | 
			
		||||
5VtLKdww/+sc0nCbKl2KWgDluriH0nfVx95qgW3mg9dhXRr0zmf1w2zkBHYpARYL
 | 
			
		||||
Dew6Z8EE4tS3HJu8/qM6meWzNtrfonQ3eiiMxjZBxzV46jchBwa2z9XYhP6AmpPb
 | 
			
		||||
oeTSzcQNbWsxaGYzWo46oLDUZmJOwSBawbS31bZNMCoPIY6ukoesCzFSsUKZww==
 | 
			
		||||
MIICLjCCAZcCAQEwDQYJKoZIhvcNAQEEBQAwWzELMAkGA1UEBhMCQVUxEzARBgNV
 | 
			
		||||
BAgTClF1ZWVuc2xhbmQxGjAYBgNVBAoTEUNyeXB0U29mdCBQdHkgTHRkMRswGQYD
 | 
			
		||||
VQQDExJUZXN0IENBICgxMDI0IGJpdCkwHhcNOTcwNjA5MTM1NzU0WhcNOTgwNjA5
 | 
			
		||||
MTM1NzU0WjBkMQswCQYDVQQGEwJBVTETMBEGA1UECBMKUXVlZW5zbGFuZDEaMBgG
 | 
			
		||||
A1UEChMRQ3J5cHRTb2Z0IFB0eSBMdGQxJDAiBgNVBAMTG1NlcnZlciB0ZXN0IGNl
 | 
			
		||||
cnQgKDEwMjQgYml0KTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAsxH1PBPm
 | 
			
		||||
RkxrR11eV4bzNi4N9n11CI8nV29+ARlT1+qDe/mjVUvXlmsr1v/vf71G9GgqopSa
 | 
			
		||||
6RXrICLVdk/FYYYzhPvl1M+OrjaXDFO8BzBAF1Lnz6c7aRZvGRJNrRSr2nZEkqDf
 | 
			
		||||
JW9dY7r2VZEpD5QeuaRYUnuECkqeieB65GMCAwEAATANBgkqhkiG9w0BAQQFAAOB
 | 
			
		||||
gQCWsOta6C0wiVzXz8wPmJKyTrurMlgUss2iSuW9366iwofZddsNg7FXniMzkIf6
 | 
			
		||||
dp7jnmWZwKZ9cXsNUS2o4OL07qOk2HOywC0YsNZQsOBu1CBTYYkIefDiKFL1zQHh
 | 
			
		||||
8lwwNd4NP+OE3NzUNkCfh4DnFfg9WHkXUlD5UpxNRJ4gJA==
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
-----BEGIN RSA PRIVATE KEY-----
 | 
			
		||||
MIIEowIBAAKCAQEA63Yu4/cnLRvi+BIwcoIz5hKmcziREG2tujKEBs4JVO3uV3+f
 | 
			
		||||
UW/4YFULigKImXu/0fKyuMyeFu4l3V8NC6gachvAeWhiniN9sPgPU3AQKaF1y9gq
 | 
			
		||||
2EBEI2cFCKS5WASItjZCY951ZKuXYJdYDgC4kPlvI4N5M4ORHPa4pqfa/dzfMLEi
 | 
			
		||||
92sLGn7q5mArzn+5Xh2jD9Vif8w0RlDRxv1rQ413PGVBtfuhF1PSXNhbPtjpn+33
 | 
			
		||||
DdJdNACv8D4PDmjUtKyshqvSXSE/RURldW13v68efBWhOQiLXcAkmISbxfzveS1k
 | 
			
		||||
KMSV8nuWwhS5rw0xMlavRTEgqbX7Jm14xGRrFwIDAQABAoIBAHLsTPihIfLnYIE5
 | 
			
		||||
x4GsQQ5zXeBw5ITDM37ktwHnQDC+rIzyUl1aLD1AZRBoKinXd4lOTqLZ4/NHKx4A
 | 
			
		||||
DYr58mZtWyUmqLOMmQVuHXTZBlp7XtYuXMMNovQwjQlp9LicBeoBU6gQ5PVMtubD
 | 
			
		||||
F4xGF89Sn0cTHW3iMkqTtQ5KcR1j57OcJO0FEb1vPvk2MXI5ZyAatUYE7YacbEzd
 | 
			
		||||
rg02uIwx3FqNSkuSI79uz4hMdV5TPtuhxx9nTwj9aLUhXFeZ0mn2PVgVzEnnMoJb
 | 
			
		||||
+znlsZDgzDlJqdaD744YGWh8Z3OEssB35KfzFcdOeO6yH8lmv2Zfznk7pNPT7LTb
 | 
			
		||||
Lae9VgkCgYEA92p1qnAB3NtJtNcaW53i0S5WJgS1hxWKvUDx3lTB9s8X9fHpqL1a
 | 
			
		||||
E94fDfWzp/hax6FefUKIvBOukPLQ6bYjTMiFoOHzVirghAIuIUoMI5VtLhwD1hKs
 | 
			
		||||
Lr7l/dptMgKb1nZHyXoKHRBthsy3K4+udsPi8TzMvYElgEqyQIe/Rk0CgYEA86GL
 | 
			
		||||
8HC6zLszzKERDPBxrboRmoFvVUCTQDhsfj1M8aR3nQ8V5LkdIJc7Wqm/Ggfk9QRf
 | 
			
		||||
rJ8M2WUMlU5CNnCn/KCrKzCNZIReze3fV+HnKdbcXGLvgbHPrhnz8yYehUFG+RGq
 | 
			
		||||
bVyDWRU94T38izy2s5qMYrMJWZEYyXncSPbfcPMCgYAtaXfxcZ+V5xYPQFARMtiX
 | 
			
		||||
5nZfggvDoJuXgx0h3tK/N2HBfcaSdzbaYLG4gTmZggc/jwnl2dl5E++9oSPhUdIG
 | 
			
		||||
3ONSFUbxsOsGr9PBvnKd8WZZyUCXAVRjPBzAzF+whzQNWCZy/5htnz9LN7YDI9s0
 | 
			
		||||
5113Q96cheDZPFydZY0hHQKBgQDVbEhNukM5xCiNcu+f2SaMnLp9EjQ4h5g3IvaP
 | 
			
		||||
5B16daw/Dw8LzcohWboqIxeAsze0GD/D1ZUJAEd0qBjC3g+a9BjefervCjKOzXng
 | 
			
		||||
38mEUm+6EwVjJSQcjSmycEs+Sr/kwr/8i5WYvU32+jk4tFgMoC+o6tQe/Uesf68k
 | 
			
		||||
z/dPVwKBgGbF7Vv1/3SmhlOy+zYyvJ0CrWtKxH9QP6tLIEgEpd8x7YTSuCH94yok
 | 
			
		||||
kToMXYA3sWNPt22GbRDZ+rcp4c7HkDx6I6vpdP9aQEwJTp0EPy0sgWr2XwYmreIQ
 | 
			
		||||
NFmkk8Itn9EY2R9VBaP7GLv5kvwxDdLAnmwGmzVtbmaVdxCaBwUk
 | 
			
		||||
MIICXgIBAAKBgQCzEfU8E+ZGTGtHXV5XhvM2Lg32fXUIjydXb34BGVPX6oN7+aNV
 | 
			
		||||
S9eWayvW/+9/vUb0aCqilJrpFesgItV2T8VhhjOE++XUz46uNpcMU7wHMEAXUufP
 | 
			
		||||
pztpFm8ZEk2tFKvadkSSoN8lb11juvZVkSkPlB65pFhSe4QKSp6J4HrkYwIDAQAB
 | 
			
		||||
AoGBAKy8jvb0Lzby8q11yNLf7+78wCVdYi7ugMHcYA1JVFK8+zb1WfSm44FLQo/0
 | 
			
		||||
dSChAjgz36TTexeLODPYxleJndjVcOMVzsLJjSM8dLpXsTS4FCeMbhw2s2u+xqKY
 | 
			
		||||
bbPWfk+HOTyJjfnkcC5Nbg44eOmruq0gSmBeUXVM5UntlTnxAkEA7TGCA3h7kx5E
 | 
			
		||||
Bl4zl2pc3gPAGt+dyfk5Po9mGJUUXhF5p2zueGmYWW74TmOWB1kzt4QRdYMzFePq
 | 
			
		||||
zfDNXEa1CwJBAMFErdY0xp0UJ13WwBbUTk8rujqQdHtjw0klhpbuKkjxu2hN0wwM
 | 
			
		||||
6p0D9qxF7JHaghqVRI0fAW/EE0OzdHMR9QkCQQDNR26dMFXKsoPu+vItljj/UEGf
 | 
			
		||||
QG7gERiQ4yxaFBPHgdpGo0kT31eh9x9hQGDkxTe0GNG/YSgCRvm8+C3TMcKXAkBD
 | 
			
		||||
dhGn36wkUFCddMSAM4NSJ1VN8/Z0y5HzCmI8dM3VwGtGMUQlxKxwOl30LEQzdS5M
 | 
			
		||||
0SWojNYXiT2gOBfBwtbhAkEAhafl5QEOIgUz+XazS/IlZ8goNKdDVfYgK3mHHjvv
 | 
			
		||||
nY5G+AuGebdNkXJr4KSWxDcN+C2i47zuj4QXA16MAOandA==
 | 
			
		||||
-----END RSA PRIVATE KEY-----
 | 
			
		||||
subject=/C=US/O=AT&T Bell Laboratories/OU=Prototype Research CA
 | 
			
		||||
issuer= /C=US/O=AT&T Bell Laboratories/OU=Prototype Research CA
 | 
			
		||||
notBefore=950413210656Z
 | 
			
		||||
notAfter =970412210656Z
 | 
			
		||||
-----BEGIN X509 CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
MIICCDCCAXECAQAwDQYJKoZIhvcNAQEEBQAwTjELMAkGA1UEBhMCVVMxHzAdBgNV
 | 
			
		||||
BAoUFkFUJlQgQmVsbCBMYWJvcmF0b3JpZXMxHjAcBgNVBAsUFVByb3RvdHlwZSBS
 | 
			
		||||
ZXNlYXJjaCBDQTAeFw05NTA0MTMyMTA2NTZaFw05NzA0MTIyMTA2NTZaME4xCzAJ
 | 
			
		||||
BgNVBAYTAlVTMR8wHQYDVQQKFBZBVCZUIEJlbGwgTGFib3JhdG9yaWVzMR4wHAYD
 | 
			
		||||
VQQLFBVQcm90b3R5cGUgUmVzZWFyY2ggQ0EwgZwwDQYJKoZIhvcNAQEBBQADgYoA
 | 
			
		||||
MIGGAoGAebOmgtSCl+wCYZc86UGYeTLY8cjmW2P0FN8ToT/u2pECCoFdrlycX0OR
 | 
			
		||||
3wt0ZhpFXLVNeDnHwEE9veNUih7pCL2ZBFqoIoQkB1lZmXRiVtjGonz8BLm/qrFM
 | 
			
		||||
YHb0lme/Ol+s118mwKVxnn6bSAeI/OXKhLaVdYZWk+aEaxEDkVkCAQ8wDQYJKoZI
 | 
			
		||||
hvcNAQEEBQADgYEAAZMG14lZmZ8bahkaHaTV9dQf4p2FZiQTFwHP9ZyGsXPC+LT5
 | 
			
		||||
dG5iTaRmyjNIJdPWohZDl97kAci79aBndvuEvRKOjLHs3WRGBIwERnAcnY9Mz8u/
 | 
			
		||||
zIHK23PjYVxGGaZd669OJwD0CYyqH22HH9nFUGaoJdsv39ChW0NRdLE9+y8=
 | 
			
		||||
-----END X509 CERTIFICATE-----
 | 
			
		||||
issuer= /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test PCA (1024 bit)
 | 
			
		||||
subject=/C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test CA (1024 bit)
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICJjCCAY8CAQAwDQYJKoZIhvcNAQEEBQAwXDELMAkGA1UEBhMCQVUxEzARBgNV
 | 
			
		||||
BAgTClF1ZWVuc2xhbmQxGjAYBgNVBAoTEUNyeXB0U29mdCBQdHkgTHRkMRwwGgYD
 | 
			
		||||
VQQDExNUZXN0IFBDQSAoMTAyNCBiaXQpMB4XDTk3MDYwOTEzNTc0M1oXDTAxMDYw
 | 
			
		||||
OTEzNTc0M1owWzELMAkGA1UEBhMCQVUxEzARBgNVBAgTClF1ZWVuc2xhbmQxGjAY
 | 
			
		||||
BgNVBAoTEUNyeXB0U29mdCBQdHkgTHRkMRswGQYDVQQDExJUZXN0IENBICgxMDI0
 | 
			
		||||
IGJpdCkwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAKO7o8t116VP6cgybTsZ
 | 
			
		||||
DCZhr95nYlZuya3aCi1IKoztqwWnjbmDFIriOqGFPrZQ+moMETC9D59iRW/dFXSv
 | 
			
		||||
1F65ka/XY2hLh9exCCo7XuUcDs53Qp3bI3AmMqHjgzE8oO3ajyJAzJkTTOUecQU2
 | 
			
		||||
mw/gI4tMM0LqWMQS7luTy4+xAgMBAAEwDQYJKoZIhvcNAQEEBQADgYEAM7achv3v
 | 
			
		||||
hLQJcv/65eGEpBXM40ZDVoFQFFJWaY5p883HTqLB1x4FdzsXHH0QKBTcKpWwqyu4
 | 
			
		||||
YDm3fb8oDugw72bCzfyZK/zVZPR/hVlqI/fvU109Qoc+7oPvIXWky71HfcK6ZBCA
 | 
			
		||||
q30KIqGM/uoM60INq97qjDmCJapagcNBGQs=
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
-----BEGIN RSA PRIVATE KEY-----
 | 
			
		||||
MIICXQIBAAKBgQCju6PLddelT+nIMm07GQwmYa/eZ2JWbsmt2gotSCqM7asFp425
 | 
			
		||||
gxSK4jqhhT62UPpqDBEwvQ+fYkVv3RV0r9ReuZGv12NoS4fXsQgqO17lHA7Od0Kd
 | 
			
		||||
2yNwJjKh44MxPKDt2o8iQMyZE0zlHnEFNpsP4COLTDNC6ljEEu5bk8uPsQIDAQAB
 | 
			
		||||
AoGAVZmpFZsDZfr0l2S9tLLwpjRWNOlKATQkno6q2WesT0eGLQufTciY+c8ypfU6
 | 
			
		||||
hyio8r5iUl/VhhdjhAtKx1mRpiotftHo/eYf8rtsrnprOnWG0bWjLjtIoMbcxGn2
 | 
			
		||||
J3bN6LJmbJMjDs0eJ3KnTu646F3nDUw2oGAwmpzKXA1KAP0CQQDRvQhxk2D3Pehs
 | 
			
		||||
HvG665u2pB5ipYQngEFlZO7RHJZzJOZEWSLuuMqaF/7pTfA5jiBvWqCgJeCRRInL
 | 
			
		||||
21ru4dlPAkEAx9jj7BgKn5TYnMoBSSe0afjsV9oApVpN1Nacb1YDtCwy+scp3++s
 | 
			
		||||
nFxlv98wxIlSdpwMUn+AUWfjiWR7Tu/G/wJBAJ/KjwZIrFVxewP0x2ILYsTRYLzz
 | 
			
		||||
MS4PDsO7FB+I0i7DbBOifXS2oNSpd3I0CNMwrxFnUHzynpbOStVfN3ZL5w0CQQCa
 | 
			
		||||
pwFahxBRhkJKsxhjoFJBX9yl75JoY4Wvm5Tbo9ih6UJaRx3kqfkN14L2BKYcsZgb
 | 
			
		||||
KY9vmDOYy6iNfjDeWTfJAkBkfPUb8oTJ/nSP5zN6sqGxSY4krc4xLxpRmxoJ8HL2
 | 
			
		||||
XfhqXkTzbU13RX9JJ/NZ8vQN9Vm2NhxRGJocQkmcdVtJ
 | 
			
		||||
-----END RSA PRIVATE KEY-----
 | 
			
		||||
-----BEGIN X509 CERTIFICATE-----
 | 
			
		||||
MIICYDCCAiACAgEoMAkGBSsOAwINBQAwfDELMAkGA1UEBhMCVVMxNjA0BgNVBAoT
 | 
			
		||||
LU5hdGlvbmFsIEFlcm9uYXV0aWNzIGFuZCBTcGFjZSBBZG1pbmlzdHJhdGlvbjEZ
 | 
			
		||||
MBcGA1UECxMQVGVzdCBFbnZpcm9ubWVudDEaMBgGA1UECxMRRFNTLU5BU0EtUGls
 | 
			
		||||
b3QtQ0EwHhcNOTYwMjI2MTYzMjQ1WhcNOTcwMjI1MTYzMjQ1WjB8MQswCQYDVQQG
 | 
			
		||||
EwJVUzE2MDQGA1UEChMtTmF0aW9uYWwgQWVyb25hdXRpY3MgYW5kIFNwYWNlIEFk
 | 
			
		||||
bWluaXN0cmF0aW9uMRkwFwYDVQQLExBUZXN0IEVudmlyb25tZW50MRowGAYDVQQL
 | 
			
		||||
ExFEU1MtTkFTQS1QaWxvdC1DQTCB8jAJBgUrDgMCDAUAA4HkADCB4AJBAMA/ssKb
 | 
			
		||||
hPNUG7ZlASfVwEJU21O5OyF/iyBzgHI1O8eOhJGUYO8cc8wDMjR508Mr9cp6Uhl/
 | 
			
		||||
ZB7FV5GkLNEnRHYCQQDUEaSg45P2qrDwixTRhFhmWz5Nvc4lRFQ/42XPcchiJBLb
 | 
			
		||||
bn3QK74T2IxY1yY+kCNq8XrIqf5fJJzIH0J/xUP3AhUAsg2wsQHfDGYk/BOSulX3
 | 
			
		||||
fVd0geUCQQCzCFUQAh+ZkEmp5804cs6ZWBhrUAfnra8lJItYo9xPcXgdIfLfibcX
 | 
			
		||||
R71UsyO77MRD7B0+Ag2tq794IleCVcEEMAkGBSsOAwINBQADLwAwLAIUUayDfreR
 | 
			
		||||
Yh2WeU86/pHNdkUC1IgCFEfxe1f0oMpxJyrJ5XIxTi7vGdoK
 | 
			
		||||
-----END X509 CERTIFICATE-----
 | 
			
		||||
-----BEGIN X509 CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
MIICGTCCAdgCAwCqTDAJBgUrDgMCDQUAMHwxCzAJBgNVBAYTAlVTMTYwNAYDVQQK
 | 
			
		||||
Ey1OYXRpb25hbCBBZXJvbmF1dGljcyBhbmQgU3BhY2UgQWRtaW5pc3RyYXRpb24x
 | 
			
		||||
GTAXBgNVBAsTEFRlc3QgRW52aXJvbm1lbnQxGjAYBgNVBAsTEURTUy1OQVNBLVBp
 | 
			
		||||
bG90LUNBMB4XDTk2MDUxNDE3MDE0MVoXDTk3MDUxNDE3MDE0MVowMzELMAkGA1UE
 | 
			
		||||
BhMCQVUxDzANBgNVBAoTBk1pbmNvbTETMBEGA1UEAxMKRXJpYyBZb3VuZzCB8jAJ
 | 
			
		||||
BgUrDgMCDAUAA4HkADCB4AJBAKbfHz6vE6pXXMTpswtGUec2tvnfLJUsoxE9qs4+
 | 
			
		||||
ObZX7LmLvragNPUeiTJx7UOWZ5DfBj6bXLc8eYne0lP1g3ACQQDUEaSg45P2qrDw
 | 
			
		||||
ixTRhFhmWz5Nvc4lRFQ/42XPcchiJBLbbn3QK74T2IxY1yY+kCNq8XrIqf5fJJzI
 | 
			
		||||
H0J/xUP3AhUAsg2wsQHfDGYk/BOSulX3fVd0geUCQQCzCFUQAh+ZkEmp5804cs6Z
 | 
			
		||||
WBhrUAfnra8lJItYo9xPcXgdIfLfibcXR71UsyO77MRD7B0+Ag2tq794IleCVcEE
 | 
			
		||||
MAkGBSsOAwINBQADMAAwLQIUWsuuJRE3VT4ueWkWMAJMJaZjj1ECFQCYY0zX4bzM
 | 
			
		||||
LC7obsrHD8XAHG+ZRG==
 | 
			
		||||
-----END X509 CERTIFICATE-----
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICTTCCAbagAwIBAgIBADANBgkqhkiG9w0BAQQFADBMMQswCQYDVQQGEwJHQjEM
 | 
			
		||||
MAoGA1UEChMDVUNMMRgwFgYDVQQLEw9JQ0UtVEVMIFByb2plY3QxFTATBgNVBAMT
 | 
			
		||||
DFRydXN0RmFjdG9yeTAeFw05NzA0MjIxNDM5MTRaFw05ODA0MjIxNDM5MTRaMEwx
 | 
			
		||||
CzAJBgNVBAYTAkdCMQwwCgYDVQQKEwNVQ0wxGDAWBgNVBAsTD0lDRS1URUwgUHJv
 | 
			
		||||
amVjdDEVMBMGA1UEAxMMVHJ1c3RGYWN0b3J5MIGcMAoGBFUIAQECAgQAA4GNADCB
 | 
			
		||||
iQKBgQCEieR8NcXkUW1f0G6aC6u0i8q/98JqS6RxK5YmHIGKCkuTWAUjzLfUa4dt
 | 
			
		||||
U9igGCjTuxaDqlzEim+t/02pmiBZT9HaX++35MjQPUWmsChcYU5WyzGErXi+rQaw
 | 
			
		||||
zlwS73zM8qiPj/97lXYycWhgL0VaiDSPxRXEUdWoaGruom4mNQIDAQABo0IwQDAd
 | 
			
		||||
BgNVHQ4EFgQUHal1LZr7oVg5z6lYzrhTgZRCmcUwDgYDVR0PAQH/BAQDAgH2MA8G
 | 
			
		||||
A1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEEBQADgYEAfaggfl6FZoioecjv0dq8
 | 
			
		||||
/DXo/u11iMZvXn08gjX/zl2b4wtPbShOSY5FhkSm8GeySasz+/Nwb/uzfnIhokWi
 | 
			
		||||
lfPZHtlCWtXbIy/TN51eJyq04ceDCQDWvLC2enVg9KB+GJ34b5c5VaPRzq8MBxsA
 | 
			
		||||
S7ELuYGtmYgYm9NZOIr7yU0=
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIIB6jCCAZQCAgEtMA0GCSqGSIb3DQEBBAUAMIGAMQswCQYDVQQGEwJVUzE2MDQG
 | 
			
		||||
A1UEChMtTmF0aW9uYWwgQWVyb25hdXRpY3MgYW5kIFNwYWNlIEFkbWluaXN0cmF0
 | 
			
		||||
aW9uMRkwFwYDVQQLExBUZXN0IEVudmlyb25tZW50MR4wHAYDVQQLExVNRDUtUlNB
 | 
			
		||||
LU5BU0EtUGlsb3QtQ0EwHhcNOTYwNDMwMjIwNTAwWhcNOTcwNDMwMjIwNTAwWjCB
 | 
			
		||||
gDELMAkGA1UEBhMCVVMxNjA0BgNVBAoTLU5hdGlvbmFsIEFlcm9uYXV0aWNzIGFu
 | 
			
		||||
ZCBTcGFjZSBBZG1pbmlzdHJhdGlvbjEZMBcGA1UECxMQVGVzdCBFbnZpcm9ubWVu
 | 
			
		||||
dDEeMBwGA1UECxMVTUQ1LVJTQS1OQVNBLVBpbG90LUNBMFkwCgYEVQgBAQICAgAD
 | 
			
		||||
SwAwSAJBALmmX5+GqAvcrWK13rfDrNX9UfeA7f+ijyBgeFQjYUoDpFqapw4nzQBL
 | 
			
		||||
bAXug8pKkRwa2Zh8YODhXsRWu2F/UckCAwEAATANBgkqhkiG9w0BAQQFAANBAH9a
 | 
			
		||||
OBA+QCsjxXgnSqHx04gcU8S49DVUb1f2XVoLnHlIb8RnX0k5O6mpHT5eti9bLkiW
 | 
			
		||||
GJNMJ4L0AJ/ac+SmHZc=
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICajCCAdMCBDGA0QUwDQYJKoZIhvcNAQEEBQAwfTELMAkGA1UEBhMCQ2ExDzAN
 | 
			
		||||
BgNVBAcTBk5lcGVhbjEeMBwGA1UECxMVTm8gTGlhYmlsaXR5IEFjY2VwdGVkMR8w
 | 
			
		||||
HQYDVQQKExZGb3IgRGVtbyBQdXJwb3NlcyBPbmx5MRwwGgYDVQQDExNFbnRydXN0
 | 
			
		||||
IERlbW8gV2ViIENBMB4XDTk2MDQyNjEzMzUwMVoXDTA2MDQyNjEzMzUwMVowfTEL
 | 
			
		||||
MAkGA1UEBhMCQ2ExDzANBgNVBAcTBk5lcGVhbjEeMBwGA1UECxMVTm8gTGlhYmls
 | 
			
		||||
aXR5IEFjY2VwdGVkMR8wHQYDVQQKExZGb3IgRGVtbyBQdXJwb3NlcyBPbmx5MRww
 | 
			
		||||
GgYDVQQDExNFbnRydXN0IERlbW8gV2ViIENBMIGdMA0GCSqGSIb3DQEBAQUAA4GL
 | 
			
		||||
ADCBhwKBgQCaroS7O1DA0hm4IefNYU1cx/nqOmzEnk291d1XqznDeF4wEgakbkCc
 | 
			
		||||
zTKxK791yNpXG5RmngqH7cygDRTHZJ6mfCRn0wGC+AI00F2vYTGqPGRQL1N3lZT0
 | 
			
		||||
YDKFC0SQeMMjFIZ1aeQigroFQnHo0VB3zWIMpNkka8PY9lxHZAmWwQIBAzANBgkq
 | 
			
		||||
hkiG9w0BAQQFAAOBgQBAx0UMVA1s54lMQyXjMX5kj99FJN5itb8bK1Rk+cegPQPF
 | 
			
		||||
cWO9SEWyEjjBjIkjjzAwBkaEszFsNGxemxtXvwjIm1xEUMTVlPEWTs2qnDvAUA9W
 | 
			
		||||
YqhWbhH0toGT36236QAsqCZ76rbTRVSSX2BHyJwJMG2tCRv7kRJ//NIgxj3H4w==
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
issuer= /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test PCA (1024 bit)
 | 
			
		||||
subject=/C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test PCA (1024 bit)
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICJzCCAZACAQAwDQYJKoZIhvcNAQEEBQAwXDELMAkGA1UEBhMCQVUxEzARBgNV
 | 
			
		||||
BAgTClF1ZWVuc2xhbmQxGjAYBgNVBAoTEUNyeXB0U29mdCBQdHkgTHRkMRwwGgYD
 | 
			
		||||
VQQDExNUZXN0IFBDQSAoMTAyNCBiaXQpMB4XDTk3MDYwOTEzNTczN1oXDTAxMDYw
 | 
			
		||||
OTEzNTczN1owXDELMAkGA1UEBhMCQVUxEzARBgNVBAgTClF1ZWVuc2xhbmQxGjAY
 | 
			
		||||
BgNVBAoTEUNyeXB0U29mdCBQdHkgTHRkMRwwGgYDVQQDExNUZXN0IFBDQSAoMTAy
 | 
			
		||||
NCBiaXQpMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCdoWk/3+WcMlfjIrkg
 | 
			
		||||
40ketmnQaEogQe1LLcuOJV6rKfUSAsPgwgsabJ/wn8TxA1yy3eKJbFl3OiUXMRsp
 | 
			
		||||
22Jp85PmemiDzyUIStwk72qhp1imbANZvlmlCFKiQrjUyuDfu4TABmn+kkt3vR1Y
 | 
			
		||||
BEOGt+IFye1UBVSATVdRJ2UVhwIDAQABMA0GCSqGSIb3DQEBBAUAA4GBABNA1u/S
 | 
			
		||||
Cg/LJZWb7GliiKJsvuhxlE4E5JxQF2zMub/CSNbF97//tYSyj96sxeFQxZXbcjm9
 | 
			
		||||
xt6mr/xNLA4szNQMJ4P+L7b5e/jC5DSqlwS+CUYJgaFs/SP+qJoCSu1bR3IM9XWO
 | 
			
		||||
cRBpDmcBbYLkSyB92WURvsZ1LtjEcn+cdQVI
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
-----BEGIN RSA PRIVATE KEY-----
 | 
			
		||||
MIICXAIBAAKBgQCdoWk/3+WcMlfjIrkg40ketmnQaEogQe1LLcuOJV6rKfUSAsPg
 | 
			
		||||
wgsabJ/wn8TxA1yy3eKJbFl3OiUXMRsp22Jp85PmemiDzyUIStwk72qhp1imbANZ
 | 
			
		||||
vlmlCFKiQrjUyuDfu4TABmn+kkt3vR1YBEOGt+IFye1UBVSATVdRJ2UVhwIDAQAB
 | 
			
		||||
AoGAba4fTtuap5l7/8ZsbE7Z1O32KJY4ZcOZukLOLUUhXxXduT+FTgGWujc0/rgc
 | 
			
		||||
z9qYCLlNZHOouMYTgtSfYvuMuLZ11VIt0GYH+nRioLShE59Yy+zCRyC+gPigS1kz
 | 
			
		||||
xvo14AsOIPYV14Tk/SsHyq6E0eTk7VzaIE197giiINUERPECQQDSKmtPTh/lRKw7
 | 
			
		||||
HSZSM0I1mFWn/1zqrAbontRQY5w98QWIOe5qmzYyFbPXYT3d9BzlsMyhgiRNoBbD
 | 
			
		||||
yvohSHXJAkEAwAHx6ezAZeWWzD5yXD36nyjpkVCw7Tk7TSmOceLJMWt1QcrCfqlS
 | 
			
		||||
xA5jjpQ6Z8suU5DdtWAryM2sAir1WisYzwJAd6Zcx56jvAQ3xcPXsE6scBTVFzrj
 | 
			
		||||
7FqZ6E+cclPzfLQ+QQsyOBE7bpI6e/FJppY26XGZXo3YGzV8IGXrt40oOQJALETG
 | 
			
		||||
h86EFXo3qGOFbmsDy4pdP5nBERCu8X1xUCSfintiD4c2DInxgS5oGclnJeMcjTvL
 | 
			
		||||
QjQoJCX3UJCi/OUO1QJBAKgcDHWjMvt+l1pjJBsSEZ0HX9AAIIVx0RQmbFGS+F2Q
 | 
			
		||||
hhu5l77WnnZOQ9vvhV5u7NPCUF9nhU3jh60qWWO8mkc=
 | 
			
		||||
-----END RSA PRIVATE KEY-----
 | 
			
		||||
subject=/C=US/O=RSA Data Security, Inc./OU=Commercial Certification Authority
 | 
			
		||||
issuer= /C=US/O=RSA Data Security, Inc./OU=Commercial Certification Authority
 | 
			
		||||
notBefore=941104185834Z
 | 
			
		||||
notAfter =991103185834Z
 | 
			
		||||
-----BEGIN X509 CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
MIICIzCCAZACBQJBAAAWMA0GCSqGSIb3DQEBAgUAMFwxCzAJBgNVBAYTAlVTMSAw
 | 
			
		||||
HgYDVQQKExdSU0EgRGF0YSBTZWN1cml0eSwgSW5jLjErMCkGA1UECxMiQ29tbWVy
 | 
			
		||||
Y2lhbCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw05NDExMDQxODU4MzRaFw05
 | 
			
		||||
OTExMDMxODU4MzRaMFwxCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdSU0EgRGF0YSBT
 | 
			
		||||
ZWN1cml0eSwgSW5jLjErMCkGA1UECxMiQ29tbWVyY2lhbCBDZXJ0aWZpY2F0aW9u
 | 
			
		||||
IEF1dGhvcml0eTCBmzANBgkqhkiG9w0BAQEFAAOBiQAwgYUCfgCk+4Fie84QJ93o
 | 
			
		||||
975sbsZwmdu41QUDaSiCnHJ/lj+O7Kwpkj+KFPhCdr69XQO5kNTQvAayUTNfxMK/
 | 
			
		||||
touPmbZiImDd298ggrTKoi8tUO2UMt7gVY3UaOLgTNLNBRYulWZcYVI4HlGogqHE
 | 
			
		||||
7yXpCuaLK44xZtn42f29O2nZ6wIDAQABMA0GCSqGSIb3DQEBAgUAA34AdrW2EP4j
 | 
			
		||||
9/dZYkuwX5zBaLxJu7NJbyFHXSudVMQAKD+YufKKg5tgf+tQx6sFEC097TgCwaVI
 | 
			
		||||
0v5loMC86qYjFmZsGySp8+x5NRhPJsjjr1BKx6cxa9B8GJ1Qv6km+iYrRpwUqbtb
 | 
			
		||||
MJhCKLVLU7tDCZJAuqiqWqTGtotXTcU=
 | 
			
		||||
-----END X509 CERTIFICATE-----
 | 
			
		||||
subject=/C=US/O=RSA Data Security, Inc./OU=Secure Server Certification Authority
 | 
			
		||||
issuer= /C=US/O=RSA Data Security, Inc./OU=Secure Server Certification Authority
 | 
			
		||||
notBefore=941109235417Z
 | 
			
		||||
notAfter =991231235417Z
 | 
			
		||||
-----BEGIN X509 CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
MIICKTCCAZYCBQJBAAABMA0GCSqGSIb3DQEBAgUAMF8xCzAJBgNVBAYTAlVTMSAw
 | 
			
		||||
HgYDVQQKExdSU0EgRGF0YSBTZWN1cml0eSwgSW5jLjEuMCwGA1UECxMlU2VjdXJl
 | 
			
		||||
IFNlcnZlciBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw05NDExMDkyMzU0MTda
 | 
			
		||||
Fw05OTEyMzEyMzU0MTdaMF8xCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdSU0EgRGF0
 | 
			
		||||
YSBTZWN1cml0eSwgSW5jLjEuMCwGA1UECxMlU2VjdXJlIFNlcnZlciBDZXJ0aWZp
 | 
			
		||||
Y2F0aW9uIEF1dGhvcml0eTCBmzANBgkqhkiG9w0BAQEFAAOBiQAwgYUCfgCSznrB
 | 
			
		||||
roM+WqqJg1esJQF2DK2ujiw3zus1eGRUA+WEQFHJv48I4oqCCNIWhjdV6bEhAq12
 | 
			
		||||
aIGaBaJLyUslZiJWbIgHj/eBWW2EB2VwE3F2Ppt3TONQiVaYSLkdpykaEy5KEVmc
 | 
			
		||||
HhXVSVQsczppgrGXOZxtcGdI5d0t1sgeewIDAQABMA0GCSqGSIb3DQEBAgUAA34A
 | 
			
		||||
iNHReSHO4ovo+MF9NFM/YYPZtgs4F7boviGNjwC4i1N+RGceIr2XJ+CchcxK9oU7
 | 
			
		||||
suK+ktPlDemvXA4MRpX/oRxePug2WHpzpgr4IhFrwwk4fia7c+8AvQKk8xQNMD9h
 | 
			
		||||
cHsg/jKjn7P0Z1LctO6EjJY2IN6BCINxIYoPnqk=
 | 
			
		||||
-----END X509 CERTIFICATE-----
 | 
			
		||||
subject=/C=ZA/SP=Western Cape/L=Cape Town/O=Thawte Consulting cc
 | 
			
		||||
	/OU=Certification Services Division/CN=Thawte Server CA
 | 
			
		||||
	/Email=server-certs@thawte.com
 | 
			
		||||
issuer= /C=ZA/SP=Western Cape/L=Cape Town/O=Thawte Consulting cc
 | 
			
		||||
	/OU=Certification Services Division/CN=Thawte Server CA
 | 
			
		||||
	/Email=server-certs@thawte.com
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIIC+TCCAmICAQAwDQYJKoZIhvcNAQEEBQAwgcQxCzAJBgNVBAYTAlpBMRUwEwYD
 | 
			
		||||
VQQIEwxXZXN0ZXJuIENhcGUxEjAQBgNVBAcTCUNhcGUgVG93bjEdMBsGA1UEChMU
 | 
			
		||||
VGhhd3RlIENvbnN1bHRpbmcgY2MxKDAmBgNVBAsTH0NlcnRpZmljYXRpb24gU2Vy
 | 
			
		||||
dmljZXMgRGl2aXNpb24xGTAXBgNVBAMTEFRoYXd0ZSBTZXJ2ZXIgQ0ExJjAkBgkq
 | 
			
		||||
hkiG9w0BCQEWF3NlcnZlci1jZXJ0c0B0aGF3dGUuY29tMB4XDTk2MDcyNzE4MDc1
 | 
			
		||||
N1oXDTk4MDcyNzE4MDc1N1owgcQxCzAJBgNVBAYTAlpBMRUwEwYDVQQIEwxXZXN0
 | 
			
		||||
ZXJuIENhcGUxEjAQBgNVBAcTCUNhcGUgVG93bjEdMBsGA1UEChMUVGhhd3RlIENv
 | 
			
		||||
bnN1bHRpbmcgY2MxKDAmBgNVBAsTH0NlcnRpZmljYXRpb24gU2VydmljZXMgRGl2
 | 
			
		||||
aXNpb24xGTAXBgNVBAMTEFRoYXd0ZSBTZXJ2ZXIgQ0ExJjAkBgkqhkiG9w0BCQEW
 | 
			
		||||
F3NlcnZlci1jZXJ0c0B0aGF3dGUuY29tMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCB
 | 
			
		||||
iQKBgQDTpFBuyP9Wa+bPXbbqDGh1R6KqwtqEJfyo9EdR2oW1IHSUhh4PdcnpCGH1
 | 
			
		||||
Bm0wbhUZAulSwGLbTZme4moMRDjN/r7jZAlwxf6xaym2L0nIO9QnBCUQly/nkG3A
 | 
			
		||||
KEKZ10xD3sP1IW1Un13DWOHA5NlbsLjctHvfNjrCtWYiEtaHDQIDAQABMA0GCSqG
 | 
			
		||||
SIb3DQEBBAUAA4GBAIsvn7ifX3RUIrvYXtpI4DOfARkTogwm6o7OwVdl93yFhDcX
 | 
			
		||||
7h5t0XZ11MUAMziKdde3rmTvzUYIUCYoY5b032IwGMTvdiclK+STN6NP2m5nvFAM
 | 
			
		||||
qJT5gC5O+j/jBuZRQ4i0AMYQr5F4lT8oBJnhgafw6PL8aDY2vMHGSPl9+7uf
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIIDDTCCAnYCAQAwDQYJKoZIhvcNAQEEBQAwgc4xCzAJBgNVBAYTAlpBMRUwEwYD
 | 
			
		||||
VQQIEwxXZXN0ZXJuIENhcGUxEjAQBgNVBAcTCUNhcGUgVG93bjEdMBsGA1UEChMU
 | 
			
		||||
VGhhd3RlIENvbnN1bHRpbmcgY2MxKDAmBgNVBAsTH0NlcnRpZmljYXRpb24gU2Vy
 | 
			
		||||
dmljZXMgRGl2aXNpb24xITAfBgNVBAMTGFRoYXd0ZSBQcmVtaXVtIFNlcnZlciBD
 | 
			
		||||
QTEoMCYGCSqGSIb3DQEJARYZcHJlbWl1bS1zZXJ2ZXJAdGhhd3RlLmNvbTAeFw05
 | 
			
		||||
NjA3MjcxODA3MTRaFw05ODA3MjcxODA3MTRaMIHOMQswCQYDVQQGEwJaQTEVMBMG
 | 
			
		||||
A1UECBMMV2VzdGVybiBDYXBlMRIwEAYDVQQHEwlDYXBlIFRvd24xHTAbBgNVBAoT
 | 
			
		||||
FFRoYXd0ZSBDb25zdWx0aW5nIGNjMSgwJgYDVQQLEx9DZXJ0aWZpY2F0aW9uIFNl
 | 
			
		||||
cnZpY2VzIERpdmlzaW9uMSEwHwYDVQQDExhUaGF3dGUgUHJlbWl1bSBTZXJ2ZXIg
 | 
			
		||||
Q0ExKDAmBgkqhkiG9w0BCQEWGXByZW1pdW0tc2VydmVyQHRoYXd0ZS5jb20wgZ8w
 | 
			
		||||
DQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBANI2NmqL18JbntqBQWKPOO5JBFXW0O8c
 | 
			
		||||
G5UWR+8YSDU6UvQragaPOy/qVuOvho2eF/eetGV1Ak3vywmiIVHYm9Bn0LoNkgYU
 | 
			
		||||
c9STy5cqAJxcTgy8+hVS/PJEbtoRSm4Iny8t4/mqOoZztkZTWMiJBb2DEbhzP6oH
 | 
			
		||||
jfRCTedAnRw3AgMBAAEwDQYJKoZIhvcNAQEEBQADgYEAutFIgTRZVYerIZfL9lvR
 | 
			
		||||
w9Eifvvo5KTZ3h+Bj+VzNnyw4Qc/IyXkPOu6SIiH9LQ3sCmWBdxpe+qr4l77rLj2
 | 
			
		||||
GYuMtESFfn1XVALzkYgC7JcPuTOjMfIiMByt+uFf8AV8x0IW/Qkuv+hEQcyM9vxK
 | 
			
		||||
3VZdLbCVIhNoEsysrxCpxcI=
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
Tims test GCI CA
 | 
			
		||||
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIIB8DCCAZoCAQAwDQYJKoZIhvcNAQEEBQAwgYIxCzAJBgNVBAYTAkFVMRMwEQYD
 | 
			
		||||
VQQIEwpRdWVlbnNsYW5kMREwDwYDVQQHEwhCcmlzYmFuZTEaMBgGA1UEChMRQ3J5
 | 
			
		||||
cHRTb2Z0IFB0eSBMdGQxFDASBgNVBAsTC2RldmVsb3BtZW50MRkwFwYDVQQDExBD
 | 
			
		||||
cnlwdFNvZnQgRGV2IENBMB4XDTk3MDMyMjEzMzQwNFoXDTk4MDMyMjEzMzQwNFow
 | 
			
		||||
gYIxCzAJBgNVBAYTAkFVMRMwEQYDVQQIEwpRdWVlbnNsYW5kMREwDwYDVQQHEwhC
 | 
			
		||||
cmlzYmFuZTEaMBgGA1UEChMRQ3J5cHRTb2Z0IFB0eSBMdGQxFDASBgNVBAsTC2Rl
 | 
			
		||||
dmVsb3BtZW50MRkwFwYDVQQDExBDcnlwdFNvZnQgRGV2IENBMFwwDQYJKoZIhvcN
 | 
			
		||||
AQEBBQADSwAwSAJBAOAOAqogG5QwAmLhzyO4CoRnx/wVy4NZP4dxJy83O1EnL0rw
 | 
			
		||||
OdsamJKvPOLHgSXo3gDu9uVyvCf/QJmZAmC5ml8CAwEAATANBgkqhkiG9w0BAQQF
 | 
			
		||||
AANBADRRS/GVdd7rAqRW6SdmgLJduOU2yq3avBu99kRqbp9A/dLu6r6jU+eP4oOA
 | 
			
		||||
TfdbFZtAAD2Hx9jUtY3tfdrJOb8= 
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICVjCCAgACAQAwDQYJKoZIhvcNAQEEBQAwgbUxCzAJBgNVBAYTAkFVMRMwEQYD
 | 
			
		||||
VQQIEwpRdWVlbnNsYW5kMREwDwYDVQQHEwhCcmlzYmFuZTEaMBgGA1UEChMRQ3J5
 | 
			
		||||
cHRTb2Z0IFB0eSBMdGQxLDAqBgNVBAsTI1dPUlRITEVTUyBDRVJUSUZJQ0FUSU9O
 | 
			
		||||
IEFVVEhPUklUSUVTMTQwMgYDVQQDEytaRVJPIFZBTFVFIENBIC0gREVNT05TVFJB
 | 
			
		||||
VElPTiBQVVJQT1NFUyBPTkxZMB4XDTk3MDQwMzEzMjI1NFoXDTk4MDQwMzEzMjI1
 | 
			
		||||
NFowgbUxCzAJBgNVBAYTAkFVMRMwEQYDVQQIEwpRdWVlbnNsYW5kMREwDwYDVQQH
 | 
			
		||||
EwhCcmlzYmFuZTEaMBgGA1UEChMRQ3J5cHRTb2Z0IFB0eSBMdGQxLDAqBgNVBAsT
 | 
			
		||||
I1dPUlRITEVTUyBDRVJUSUZJQ0FUSU9OIEFVVEhPUklUSUVTMTQwMgYDVQQDEyta
 | 
			
		||||
RVJPIFZBTFVFIENBIC0gREVNT05TVFJBVElPTiBQVVJQT1NFUyBPTkxZMFwwDQYJ
 | 
			
		||||
KoZIhvcNAQEBBQADSwAwSAJBAOZ7T7yqP/tyspcko3yPY1y0Cm2EmwNvzW4QgVXR
 | 
			
		||||
Fjs3HmJ4xtSpXdo6mwcGezL3Abt/aQXaxv9PU8xt+Jr0OFUCAwEAATANBgkqhkiG
 | 
			
		||||
9w0BAQQFAANBAOQpYmGgyCqCy1OljgJhCqQOu627oVlHzK1L+t9vBaMfn40AVUR4
 | 
			
		||||
WzQVWO31KTgi5vTK1U+3h46fgUWqQ0h+6rU=
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIAwgKADAgECAgEAMA0GCSqGSIb3DQEBBAUAMGIxETAPBgNVBAcTCEludGVybmV0
 | 
			
		||||
MRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjE0MDIGA1UECxMrVmVyaVNpZ24gQ2xh
 | 
			
		||||
c3MgMSBDQSAtIEluZGl2aWR1YWwgU3Vic2NyaWJlcjAeFw05NjA0MDgxMDIwMjda
 | 
			
		||||
Fw05NzA0MDgxMDIwMjdaMGIxETAPBgNVBAcTCEludGVybmV0MRcwFQYDVQQKEw5W
 | 
			
		||||
ZXJpU2lnbiwgSW5jLjE0MDIGA1UECxMrVmVyaVNpZ24gQ2xhc3MgMSBDQSAtIElu
 | 
			
		||||
ZGl2aWR1YWwgU3Vic2NyaWJlcjCAMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC2
 | 
			
		||||
FKbPTdAFDdjKI9BvqrQpkmOOLPhvltcunXZLEbE2jVfJw/0cxrr+Hgi6M8qV6r7j
 | 
			
		||||
W80GqLd5HUQq7XPysVKDaBBwZJHXPmv5912dFEObbpdFmIFH0S3L3bty10w/cari
 | 
			
		||||
QPJUObwW7s987LrbP2wqsxaxhhKdrpM01bjV0Pc+qQIDAQABAAAAADANBgkqhkiG
 | 
			
		||||
9w0BAQQFAAOBgQA+1nJryNt8VBRjRr07ArDAV/3jAH7GjDc9jsrxZS68ost9v06C
 | 
			
		||||
TvTNKGL+LISNmFLXl+JXhgGB0JZ9fvyYzNgHQ46HBUng1H6voalfJgS2KdEo50wW
 | 
			
		||||
8EFZYMDkT1k4uynwJqkVN2QJK/2q4/A/VCov5h6SlM8Affg2W+1TLqvqkwAA
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
 subject=/L=Internet/O=VeriSign, Inc./OU=VeriSign Class 2 CA - Individual Subscriber
 | 
			
		||||
 issuer= /L=Internet/O=VeriSign, Inc./OU=VeriSign Class 2 CA - Individual Subscriber
 | 
			
		||||
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIIEkzCCA/ygAwIBAgIRANDTUpSRL3nTFeMrMayFSPAwDQYJKoZIhvcNAQECBQAw
 | 
			
		||||
YjERMA8GA1UEBxMISW50ZXJuZXQxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMTQw
 | 
			
		||||
MgYDVQQLEytWZXJpU2lnbiBDbGFzcyAyIENBIC0gSW5kaXZpZHVhbCBTdWJzY3Jp
 | 
			
		||||
YmVyMB4XDTk2MDYwNDAwMDAwMFoXDTk4MDYwNDIzNTk1OVowYjERMA8GA1UEBxMI
 | 
			
		||||
SW50ZXJuZXQxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMTQwMgYDVQQLEytWZXJp
 | 
			
		||||
U2lnbiBDbGFzcyAyIENBIC0gSW5kaXZpZHVhbCBTdWJzY3JpYmVyMIGfMA0GCSqG
 | 
			
		||||
SIb3DQEBAQUAA4GNADCBiQKBgQC6A+2czKGRcYMfm8gdnk+0de99TDDzsqo0v5nb
 | 
			
		||||
RsbUmMcdRQ7nsMbRWe0SAb/9QoLTZ/cJ0iOBqdrkz7UpqqKarVoTSdlSMVM92tWp
 | 
			
		||||
3bJncZHQD1t4xd6lQVdI1/T6R+5J0T1ukOdsI9Jmf+F28S6g3R3L1SFwiHKeZKZv
 | 
			
		||||
z+793wIDAQABo4ICRzCCAkMwggIpBgNVHQMBAf8EggIdMIICGTCCAhUwggIRBgtg
 | 
			
		||||
hkgBhvhFAQcBATCCAgAWggGrVGhpcyBjZXJ0aWZpY2F0ZSBpbmNvcnBvcmF0ZXMg
 | 
			
		||||
YnkgcmVmZXJlbmNlLCBhbmQgaXRzIHVzZSBpcyBzdHJpY3RseSBzdWJqZWN0IHRv
 | 
			
		||||
LCB0aGUgVmVyaVNpZ24gQ2VydGlmaWNhdGlvbiBQcmFjdGljZSBTdGF0ZW1lbnQg
 | 
			
		||||
KENQUyksIGF2YWlsYWJsZSBhdDogaHR0cHM6Ly93d3cudmVyaXNpZ24uY29tL0NQ
 | 
			
		||||
Uy0xLjA7IGJ5IEUtbWFpbCBhdCBDUFMtcmVxdWVzdHNAdmVyaXNpZ24uY29tOyBv
 | 
			
		||||
ciBieSBtYWlsIGF0IFZlcmlTaWduLCBJbmMuLCAyNTkzIENvYXN0IEF2ZS4sIE1v
 | 
			
		||||
dW50YWluIFZpZXcsIENBIDk0MDQzIFVTQSBUZWwuICsxICg0MTUpIDk2MS04ODMw
 | 
			
		||||
IENvcHlyaWdodCAoYykgMTk5NiBWZXJpU2lnbiwgSW5jLiAgQWxsIFJpZ2h0cyBS
 | 
			
		||||
ZXNlcnZlZC4gQ0VSVEFJTiBXQVJSQU5USUVTIERJU0NMQUlNRUQgYW5kIExJQUJJ
 | 
			
		||||
TElUWSBMSU1JVEVELqAOBgxghkgBhvhFAQcBAQGhDgYMYIZIAYb4RQEHAQECMC8w
 | 
			
		||||
LRYraHR0cHM6Ly93d3cudmVyaXNpZ24uY29tL3JlcG9zaXRvcnkvQ1BTLTEuMDAU
 | 
			
		||||
BglghkgBhvhCAQEBAf8EBAMCAgQwDQYJKoZIhvcNAQECBQADgYEApRJRkNBqLLgs
 | 
			
		||||
53IR/d18ODdLOWMTZ+QOOxBrq460iBEdUwgF8vmPRX1ku7UiDeNzaLlurE6eFqHq
 | 
			
		||||
2zPyK5j60zfTLVJMWKcQWwTJLjHtXrW8pxhNtFc6Fdvy5ZkHnC/9NIl7/t4U6WqB
 | 
			
		||||
p4y+p7SdMIkEwIZfds0VbnQyX5MRUJY=
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
 | 
			
		||||
 subject=/C=US/O=VeriSign, Inc./OU=Class 3 Public Primary Certification Authority
 | 
			
		||||
 issuer= /C=US/O=VeriSign, Inc./OU=Class 3 Public Primary Certification Authority
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICMTCCAZoCBQKhAAABMA0GCSqGSIb3DQEBAgUAMF8xCzAJBgNVBAYTAlVTMRcw
 | 
			
		||||
FQYDVQQKEw5WZXJpU2lnbiwgSW5jLjE3MDUGA1UECxMuQ2xhc3MgMyBQdWJsaWMg
 | 
			
		||||
UHJpbWFyeSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw05NjAxMjkwMDAwMDBa
 | 
			
		||||
Fw05OTEyMzEyMzU5NTlaMF8xCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2ln
 | 
			
		||||
biwgSW5jLjE3MDUGA1UECxMuQ2xhc3MgMyBQdWJsaWMgUHJpbWFyeSBDZXJ0aWZp
 | 
			
		||||
Y2F0aW9uIEF1dGhvcml0eTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAyVxZ
 | 
			
		||||
nvIbigEUtBDfBEDb41evakVAj4QMC9Ez2dkRz+4CWB8l9yqoRAWq7AMfeH+ek7ma
 | 
			
		||||
AKojfdashaJjRcdyJ8z0TMZ1cdI5709C8HXfCpDGjiBvmA/4rCNfcCk2pMmG57Ga
 | 
			
		||||
IMtTpYXnPb59mv4kRTPcdhXtD6JxZExlLoFoRacCAwEAATANBgkqhkiG9w0BAQIF
 | 
			
		||||
AAOBgQB1Zmw+0c2B27X4LzZRtvdCvM1Cr9wO+hVs+GeTVzrrtpLotgHKjLeOQ7RJ
 | 
			
		||||
Zfk+7r11Ri7J/CVdqMcvi5uPaM+0nJcYwE3vH9mvgrPmZLiEXIqaB1JDYft0nls6
 | 
			
		||||
NvxMsvwaPxUupVs8G5DsiCnkWRb5zget7Ond2tIxik/W2O8XjQ==
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
 subject=/C=US/O=VeriSign, Inc./OU=Class 4 Public Primary Certification Authority
 | 
			
		||||
 issuer= /C=US/O=VeriSign, Inc./OU=Class 4 Public Primary Certification Authority
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICMTCCAZoCBQKmAAABMA0GCSqGSIb3DQEBAgUAMF8xCzAJBgNVBAYTAlVTMRcw
 | 
			
		||||
FQYDVQQKEw5WZXJpU2lnbiwgSW5jLjE3MDUGA1UECxMuQ2xhc3MgNCBQdWJsaWMg
 | 
			
		||||
UHJpbWFyeSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw05NjAxMjkwMDAwMDBa
 | 
			
		||||
Fw05OTEyMzEyMzU5NTlaMF8xCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2ln
 | 
			
		||||
biwgSW5jLjE3MDUGA1UECxMuQ2xhc3MgNCBQdWJsaWMgUHJpbWFyeSBDZXJ0aWZp
 | 
			
		||||
Y2F0aW9uIEF1dGhvcml0eTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA0LJ1
 | 
			
		||||
9njQrlpQ9OlQqZ+M1++RlHDo0iSQdomF1t+s5gEXMoDwnZNHvJplnR+Xrr/phnVj
 | 
			
		||||
IIm9gFidBAydqMEk6QvlMXi9/C0MN2qeeIDpRnX57aP7E3vIwUzSo+/1PLBij0pd
 | 
			
		||||
O92VZ48TucE81qcmm+zDO3rZTbxtm+gVAePwR6kCAwEAATANBgkqhkiG9w0BAQIF
 | 
			
		||||
AAOBgQBT3dPwnCR+QKri/AAa19oM/DJhuBUNlvP6Vxt/M3yv6ZiaYch6s7f/sdyZ
 | 
			
		||||
g9ysEvxwyR84Qu1E9oAuW2szaayc01znX1oYx7EteQSWQZGZQbE8DbqEOcY7l/Am
 | 
			
		||||
yY7uvcxClf8exwI/VAx49byqYHwCaejcrOICdmHEPgPq0ook0Q==
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
 
 | 
			
		||||
@@ -90,7 +90,6 @@ int MAIN(int, char **);
 | 
			
		||||
int MAIN(int argc, char **argv)
 | 
			
		||||
{
 | 
			
		||||
    SSL_SESSION *x = NULL;
 | 
			
		||||
    X509 *peer = NULL;
 | 
			
		||||
    int ret = 1, i, num, badops = 0;
 | 
			
		||||
    BIO *out = NULL;
 | 
			
		||||
    int informat, outformat;
 | 
			
		||||
@@ -158,15 +157,14 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    if (x == NULL) {
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
    peer = SSL_SESSION_get0_peer(x);
 | 
			
		||||
 | 
			
		||||
    if (context) {
 | 
			
		||||
        size_t ctx_len = strlen(context);
 | 
			
		||||
        if (ctx_len > SSL_MAX_SID_CTX_LENGTH) {
 | 
			
		||||
        x->sid_ctx_length = strlen(context);
 | 
			
		||||
        if (x->sid_ctx_length > SSL_MAX_SID_CTX_LENGTH) {
 | 
			
		||||
            BIO_printf(bio_err, "Context too long\n");
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
        SSL_SESSION_set1_id_context(x, (unsigned char *)context, ctx_len);
 | 
			
		||||
        memcpy(x->sid_ctx, context, x->sid_ctx_length);
 | 
			
		||||
    }
 | 
			
		||||
#ifdef undef
 | 
			
		||||
    /* just testing for memory leaks :-) */
 | 
			
		||||
@@ -216,10 +214,10 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        SSL_SESSION_print(out, x);
 | 
			
		||||
 | 
			
		||||
        if (cert) {
 | 
			
		||||
            if (peer == NULL)
 | 
			
		||||
            if (x->peer == NULL)
 | 
			
		||||
                BIO_puts(out, "No certificate present\n");
 | 
			
		||||
            else
 | 
			
		||||
                X509_print(out, peer);
 | 
			
		||||
                X509_print(out, x->peer);
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
@@ -236,11 +234,11 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            BIO_printf(bio_err, "unable to write SSL_SESSION\n");
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
    } else if (!noout && (peer != NULL)) { /* just print the certificate */
 | 
			
		||||
    } else if (!noout && (x->peer != NULL)) { /* just print the certificate */
 | 
			
		||||
        if (outformat == FORMAT_ASN1)
 | 
			
		||||
            i = (int)i2d_X509_bio(out, peer);
 | 
			
		||||
            i = (int)i2d_X509_bio(out, x->peer);
 | 
			
		||||
        else if (outformat == FORMAT_PEM)
 | 
			
		||||
            i = PEM_write_bio_X509(out, peer);
 | 
			
		||||
            i = PEM_write_bio_X509(out, x->peer);
 | 
			
		||||
        else {
 | 
			
		||||
            BIO_printf(bio_err, "bad output format specified for outfile\n");
 | 
			
		||||
            goto end;
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										395
									
								
								apps/smime.c
									
									
									
									
									
								
							
							
						
						
									
										395
									
								
								apps/smime.c
									
									
									
									
									
								
							@@ -74,14 +74,11 @@ static int save_certs(char *signerfile, STACK_OF(X509) *signers);
 | 
			
		||||
static int smime_cb(int ok, X509_STORE_CTX *ctx);
 | 
			
		||||
 | 
			
		||||
#define SMIME_OP        0x10
 | 
			
		||||
#define SMIME_IP        0x20
 | 
			
		||||
#define SMIME_SIGNERS   0x40
 | 
			
		||||
#define SMIME_ENCRYPT   (1 | SMIME_OP)
 | 
			
		||||
#define SMIME_DECRYPT   (2 | SMIME_IP)
 | 
			
		||||
#define SMIME_SIGN      (3 | SMIME_OP | SMIME_SIGNERS)
 | 
			
		||||
#define SMIME_VERIFY    (4 | SMIME_IP)
 | 
			
		||||
#define SMIME_PK7OUT    (5 | SMIME_IP | SMIME_OP)
 | 
			
		||||
#define SMIME_RESIGN    (6 | SMIME_IP | SMIME_OP | SMIME_SIGNERS)
 | 
			
		||||
#define SMIME_DECRYPT   2
 | 
			
		||||
#define SMIME_SIGN      (3 | SMIME_OP)
 | 
			
		||||
#define SMIME_VERIFY    4
 | 
			
		||||
#define SMIME_PK7OUT    5
 | 
			
		||||
 | 
			
		||||
int MAIN(int, char **);
 | 
			
		||||
 | 
			
		||||
@@ -94,7 +91,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    const char *inmode = "r", *outmode = "w";
 | 
			
		||||
    char *infile = NULL, *outfile = NULL;
 | 
			
		||||
    char *signerfile = NULL, *recipfile = NULL;
 | 
			
		||||
    STACK_OF(OPENSSL_STRING) *sksigners = NULL, *skkeys = NULL;
 | 
			
		||||
    char *certfile = NULL, *keyfile = NULL, *contfile = NULL;
 | 
			
		||||
    const EVP_CIPHER *cipher = NULL;
 | 
			
		||||
    PKCS7 *p7 = NULL;
 | 
			
		||||
@@ -110,8 +106,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    char *passargin = NULL, *passin = NULL;
 | 
			
		||||
    char *inrand = NULL;
 | 
			
		||||
    int need_rand = 0;
 | 
			
		||||
    int indef = 0;
 | 
			
		||||
    const EVP_MD *sign_md = NULL;
 | 
			
		||||
    int informat = FORMAT_SMIME, outformat = FORMAT_SMIME;
 | 
			
		||||
    int keyform = FORMAT_PEM;
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
@@ -140,8 +134,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            operation = SMIME_DECRYPT;
 | 
			
		||||
        else if (!strcmp(*args, "-sign"))
 | 
			
		||||
            operation = SMIME_SIGN;
 | 
			
		||||
        else if (!strcmp(*args, "-resign"))
 | 
			
		||||
            operation = SMIME_RESIGN;
 | 
			
		||||
        else if (!strcmp(*args, "-verify"))
 | 
			
		||||
            operation = SMIME_VERIFY;
 | 
			
		||||
        else if (!strcmp(*args, "-pk7out"))
 | 
			
		||||
@@ -200,163 +192,135 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            flags |= PKCS7_BINARY;
 | 
			
		||||
        else if (!strcmp(*args, "-nosigs"))
 | 
			
		||||
            flags |= PKCS7_NOSIGS;
 | 
			
		||||
        else if (!strcmp(*args, "-stream"))
 | 
			
		||||
            indef = 1;
 | 
			
		||||
        else if (!strcmp(*args, "-indef"))
 | 
			
		||||
            indef = 1;
 | 
			
		||||
        else if (!strcmp(*args, "-noindef"))
 | 
			
		||||
            indef = 0;
 | 
			
		||||
        else if (!strcmp(*args, "-nooldmime"))
 | 
			
		||||
            flags |= PKCS7_NOOLDMIMETYPE;
 | 
			
		||||
        else if (!strcmp(*args, "-crlfeol"))
 | 
			
		||||
            flags |= PKCS7_CRLFEOL;
 | 
			
		||||
        else if (!strcmp(*args, "-rand")) {
 | 
			
		||||
            if (!args[1])
 | 
			
		||||
                goto argerr;
 | 
			
		||||
            args++;
 | 
			
		||||
            inrand = *args;
 | 
			
		||||
            if (args[1]) {
 | 
			
		||||
                args++;
 | 
			
		||||
                inrand = *args;
 | 
			
		||||
            } else
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
            need_rand = 1;
 | 
			
		||||
        }
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
        else if (!strcmp(*args, "-engine")) {
 | 
			
		||||
            if (!args[1])
 | 
			
		||||
                goto argerr;
 | 
			
		||||
            engine = *++args;
 | 
			
		||||
            if (args[1]) {
 | 
			
		||||
                args++;
 | 
			
		||||
                engine = *args;
 | 
			
		||||
            } else
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
        }
 | 
			
		||||
#endif
 | 
			
		||||
        else if (!strcmp(*args, "-passin")) {
 | 
			
		||||
            if (!args[1])
 | 
			
		||||
                goto argerr;
 | 
			
		||||
            passargin = *++args;
 | 
			
		||||
            if (args[1]) {
 | 
			
		||||
                args++;
 | 
			
		||||
                passargin = *args;
 | 
			
		||||
            } else
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
        } else if (!strcmp(*args, "-to")) {
 | 
			
		||||
            if (!args[1])
 | 
			
		||||
                goto argerr;
 | 
			
		||||
            to = *++args;
 | 
			
		||||
            if (args[1]) {
 | 
			
		||||
                args++;
 | 
			
		||||
                to = *args;
 | 
			
		||||
            } else
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
        } else if (!strcmp(*args, "-from")) {
 | 
			
		||||
            if (!args[1])
 | 
			
		||||
                goto argerr;
 | 
			
		||||
            from = *++args;
 | 
			
		||||
            if (args[1]) {
 | 
			
		||||
                args++;
 | 
			
		||||
                from = *args;
 | 
			
		||||
            } else
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
        } else if (!strcmp(*args, "-subject")) {
 | 
			
		||||
            if (!args[1])
 | 
			
		||||
                goto argerr;
 | 
			
		||||
            subject = *++args;
 | 
			
		||||
            if (args[1]) {
 | 
			
		||||
                args++;
 | 
			
		||||
                subject = *args;
 | 
			
		||||
            } else
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
        } else if (!strcmp(*args, "-signer")) {
 | 
			
		||||
            if (!args[1])
 | 
			
		||||
                goto argerr;
 | 
			
		||||
            /* If previous -signer argument add signer to list */
 | 
			
		||||
 | 
			
		||||
            if (signerfile) {
 | 
			
		||||
                if (!sksigners)
 | 
			
		||||
                    sksigners = sk_OPENSSL_STRING_new_null();
 | 
			
		||||
                sk_OPENSSL_STRING_push(sksigners, signerfile);
 | 
			
		||||
                if (!keyfile)
 | 
			
		||||
                    keyfile = signerfile;
 | 
			
		||||
                if (!skkeys)
 | 
			
		||||
                    skkeys = sk_OPENSSL_STRING_new_null();
 | 
			
		||||
                sk_OPENSSL_STRING_push(skkeys, keyfile);
 | 
			
		||||
                keyfile = NULL;
 | 
			
		||||
            }
 | 
			
		||||
            signerfile = *++args;
 | 
			
		||||
            if (args[1]) {
 | 
			
		||||
                args++;
 | 
			
		||||
                signerfile = *args;
 | 
			
		||||
            } else
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
        } else if (!strcmp(*args, "-recip")) {
 | 
			
		||||
            if (!args[1])
 | 
			
		||||
                goto argerr;
 | 
			
		||||
            recipfile = *++args;
 | 
			
		||||
        } else if (!strcmp(*args, "-md")) {
 | 
			
		||||
            if (!args[1])
 | 
			
		||||
                goto argerr;
 | 
			
		||||
            sign_md = EVP_get_digestbyname(*++args);
 | 
			
		||||
            if (sign_md == NULL) {
 | 
			
		||||
                BIO_printf(bio_err, "Unknown digest %s\n", *args);
 | 
			
		||||
                goto argerr;
 | 
			
		||||
            }
 | 
			
		||||
            if (args[1]) {
 | 
			
		||||
                args++;
 | 
			
		||||
                recipfile = *args;
 | 
			
		||||
            } else
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
        } else if (!strcmp(*args, "-inkey")) {
 | 
			
		||||
            if (!args[1])
 | 
			
		||||
                goto argerr;
 | 
			
		||||
            /* If previous -inkey arument add signer to list */
 | 
			
		||||
            if (keyfile) {
 | 
			
		||||
                if (!signerfile) {
 | 
			
		||||
                    BIO_puts(bio_err, "Illegal -inkey without -signer\n");
 | 
			
		||||
                    goto argerr;
 | 
			
		||||
                }
 | 
			
		||||
                if (!sksigners)
 | 
			
		||||
                    sksigners = sk_OPENSSL_STRING_new_null();
 | 
			
		||||
                sk_OPENSSL_STRING_push(sksigners, signerfile);
 | 
			
		||||
                signerfile = NULL;
 | 
			
		||||
                if (!skkeys)
 | 
			
		||||
                    skkeys = sk_OPENSSL_STRING_new_null();
 | 
			
		||||
                sk_OPENSSL_STRING_push(skkeys, keyfile);
 | 
			
		||||
            }
 | 
			
		||||
            keyfile = *++args;
 | 
			
		||||
            if (args[1]) {
 | 
			
		||||
                args++;
 | 
			
		||||
                keyfile = *args;
 | 
			
		||||
            } else
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
        } else if (!strcmp(*args, "-keyform")) {
 | 
			
		||||
            if (!args[1])
 | 
			
		||||
                goto argerr;
 | 
			
		||||
            keyform = str2fmt(*++args);
 | 
			
		||||
            if (args[1]) {
 | 
			
		||||
                args++;
 | 
			
		||||
                keyform = str2fmt(*args);
 | 
			
		||||
            } else
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
        } else if (!strcmp(*args, "-certfile")) {
 | 
			
		||||
            if (!args[1])
 | 
			
		||||
                goto argerr;
 | 
			
		||||
            certfile = *++args;
 | 
			
		||||
            if (args[1]) {
 | 
			
		||||
                args++;
 | 
			
		||||
                certfile = *args;
 | 
			
		||||
            } else
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
        } else if (!strcmp(*args, "-CAfile")) {
 | 
			
		||||
            if (!args[1])
 | 
			
		||||
                goto argerr;
 | 
			
		||||
            CAfile = *++args;
 | 
			
		||||
            if (args[1]) {
 | 
			
		||||
                args++;
 | 
			
		||||
                CAfile = *args;
 | 
			
		||||
            } else
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
        } else if (!strcmp(*args, "-CApath")) {
 | 
			
		||||
            if (!args[1])
 | 
			
		||||
                goto argerr;
 | 
			
		||||
            CApath = *++args;
 | 
			
		||||
            if (args[1]) {
 | 
			
		||||
                args++;
 | 
			
		||||
                CApath = *args;
 | 
			
		||||
            } else
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
        } else if (!strcmp(*args, "-in")) {
 | 
			
		||||
            if (!args[1])
 | 
			
		||||
                goto argerr;
 | 
			
		||||
            infile = *++args;
 | 
			
		||||
            if (args[1]) {
 | 
			
		||||
                args++;
 | 
			
		||||
                infile = *args;
 | 
			
		||||
            } else
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
        } else if (!strcmp(*args, "-inform")) {
 | 
			
		||||
            if (!args[1])
 | 
			
		||||
                goto argerr;
 | 
			
		||||
            informat = str2fmt(*++args);
 | 
			
		||||
            if (args[1]) {
 | 
			
		||||
                args++;
 | 
			
		||||
                informat = str2fmt(*args);
 | 
			
		||||
            } else
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
        } else if (!strcmp(*args, "-outform")) {
 | 
			
		||||
            if (!args[1])
 | 
			
		||||
                goto argerr;
 | 
			
		||||
            outformat = str2fmt(*++args);
 | 
			
		||||
            if (args[1]) {
 | 
			
		||||
                args++;
 | 
			
		||||
                outformat = str2fmt(*args);
 | 
			
		||||
            } else
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
        } else if (!strcmp(*args, "-out")) {
 | 
			
		||||
            if (!args[1])
 | 
			
		||||
                goto argerr;
 | 
			
		||||
            outfile = *++args;
 | 
			
		||||
            if (args[1]) {
 | 
			
		||||
                args++;
 | 
			
		||||
                outfile = *args;
 | 
			
		||||
            } else
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
        } else if (!strcmp(*args, "-content")) {
 | 
			
		||||
            if (!args[1])
 | 
			
		||||
                goto argerr;
 | 
			
		||||
            contfile = *++args;
 | 
			
		||||
            if (args[1]) {
 | 
			
		||||
                args++;
 | 
			
		||||
                contfile = *args;
 | 
			
		||||
            } else
 | 
			
		||||
                badarg = 1;
 | 
			
		||||
        } else if (args_verify(&args, NULL, &badarg, bio_err, &vpm))
 | 
			
		||||
            continue;
 | 
			
		||||
        else if ((cipher = EVP_get_cipherbyname(*args + 1)) == NULL)
 | 
			
		||||
        else
 | 
			
		||||
            badarg = 1;
 | 
			
		||||
        args++;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (!(operation & SMIME_SIGNERS) && (skkeys || sksigners)) {
 | 
			
		||||
        BIO_puts(bio_err, "Multiple signers or keys not allowed\n");
 | 
			
		||||
        goto argerr;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (operation & SMIME_SIGNERS) {
 | 
			
		||||
        /* Check to see if any final signer needs to be appended */
 | 
			
		||||
        if (keyfile && !signerfile) {
 | 
			
		||||
            BIO_puts(bio_err, "Illegal -inkey without -signer\n");
 | 
			
		||||
            goto argerr;
 | 
			
		||||
        }
 | 
			
		||||
        if (signerfile) {
 | 
			
		||||
            if (!sksigners)
 | 
			
		||||
                sksigners = sk_OPENSSL_STRING_new_null();
 | 
			
		||||
            sk_OPENSSL_STRING_push(sksigners, signerfile);
 | 
			
		||||
            if (!skkeys)
 | 
			
		||||
                skkeys = sk_OPENSSL_STRING_new_null();
 | 
			
		||||
            if (!keyfile)
 | 
			
		||||
                keyfile = signerfile;
 | 
			
		||||
            sk_OPENSSL_STRING_push(skkeys, keyfile);
 | 
			
		||||
        }
 | 
			
		||||
        if (!sksigners) {
 | 
			
		||||
    if (operation == SMIME_SIGN) {
 | 
			
		||||
        if (!signerfile) {
 | 
			
		||||
            BIO_printf(bio_err, "No signer certificate specified\n");
 | 
			
		||||
            badarg = 1;
 | 
			
		||||
        }
 | 
			
		||||
        signerfile = NULL;
 | 
			
		||||
        keyfile = NULL;
 | 
			
		||||
        need_rand = 1;
 | 
			
		||||
    } else if (operation == SMIME_DECRYPT) {
 | 
			
		||||
        if (!recipfile && !keyfile) {
 | 
			
		||||
@@ -374,7 +338,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        badarg = 1;
 | 
			
		||||
 | 
			
		||||
    if (badarg) {
 | 
			
		||||
 argerr:
 | 
			
		||||
        BIO_printf(bio_err, "Usage smime [options] cert.pem ...\n");
 | 
			
		||||
        BIO_printf(bio_err, "where options are\n");
 | 
			
		||||
        BIO_printf(bio_err, "-encrypt       encrypt message\n");
 | 
			
		||||
@@ -441,8 +404,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-CApath dir    trusted certificates directory\n");
 | 
			
		||||
        BIO_printf(bio_err, "-CAfile file   trusted certificates file\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-no_alt_chains only ever use the first certificate chain found\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-crl_check     check revocation status of signer's certificate using CRLs\n");
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
@@ -479,23 +440,19 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
 | 
			
		||||
    ret = 2;
 | 
			
		||||
 | 
			
		||||
    if (!(operation & SMIME_SIGNERS))
 | 
			
		||||
    if (operation != SMIME_SIGN)
 | 
			
		||||
        flags &= ~PKCS7_DETACHED;
 | 
			
		||||
 | 
			
		||||
    if (operation & SMIME_OP) {
 | 
			
		||||
        if (flags & PKCS7_BINARY)
 | 
			
		||||
            inmode = "rb";
 | 
			
		||||
        if (outformat == FORMAT_ASN1)
 | 
			
		||||
            outmode = "wb";
 | 
			
		||||
    } else {
 | 
			
		||||
        if (flags & PKCS7_BINARY)
 | 
			
		||||
            outmode = "wb";
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (operation & SMIME_IP) {
 | 
			
		||||
        if (informat == FORMAT_ASN1)
 | 
			
		||||
            inmode = "rb";
 | 
			
		||||
    } else {
 | 
			
		||||
        if (flags & PKCS7_BINARY)
 | 
			
		||||
            inmode = "rb";
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (operation == SMIME_ENCRYPT) {
 | 
			
		||||
@@ -524,9 +481,25 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (signerfile && (operation == SMIME_SIGN)) {
 | 
			
		||||
        if (!(signer = load_cert(bio_err, signerfile, FORMAT_PEM, NULL,
 | 
			
		||||
                                 e, "signer certificate"))) {
 | 
			
		||||
#if 0                           /* An appropri message has already been
 | 
			
		||||
                                 * printed */
 | 
			
		||||
            BIO_printf(bio_err, "Can't read signer certificate file %s\n",
 | 
			
		||||
                       signerfile);
 | 
			
		||||
#endif
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (certfile) {
 | 
			
		||||
        if (!(other = load_certs(bio_err, certfile, FORMAT_PEM, NULL,
 | 
			
		||||
                                 e, "certificate file"))) {
 | 
			
		||||
#if 0                           /* An appropriate message has already been
 | 
			
		||||
                                 * printed */
 | 
			
		||||
            BIO_printf(bio_err, "Can't read certificate file %s\n", certfile);
 | 
			
		||||
#endif
 | 
			
		||||
            ERR_print_errors(bio_err);
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
@@ -535,6 +508,11 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    if (recipfile && (operation == SMIME_DECRYPT)) {
 | 
			
		||||
        if (!(recip = load_cert(bio_err, recipfile, FORMAT_PEM, NULL,
 | 
			
		||||
                                e, "recipient certificate file"))) {
 | 
			
		||||
#if 0                           /* An appropriate message has alrady been
 | 
			
		||||
                                 * printed */
 | 
			
		||||
            BIO_printf(bio_err, "Can't read recipient certificate file %s\n",
 | 
			
		||||
                       recipfile);
 | 
			
		||||
#endif
 | 
			
		||||
            ERR_print_errors(bio_err);
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
@@ -564,7 +542,41 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    } else
 | 
			
		||||
        in = BIO_new_fp(stdin, BIO_NOCLOSE);
 | 
			
		||||
 | 
			
		||||
    if (operation & SMIME_IP) {
 | 
			
		||||
    if (outfile) {
 | 
			
		||||
        if (!(out = BIO_new_file(outfile, outmode))) {
 | 
			
		||||
            BIO_printf(bio_err, "Can't open output file %s\n", outfile);
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
    } else {
 | 
			
		||||
        out = BIO_new_fp(stdout, BIO_NOCLOSE);
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
        {
 | 
			
		||||
            BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
			
		||||
            out = BIO_push(tmpbio, out);
 | 
			
		||||
        }
 | 
			
		||||
#endif
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (operation == SMIME_VERIFY) {
 | 
			
		||||
        if (!(store = setup_verify(bio_err, CAfile, CApath)))
 | 
			
		||||
            goto end;
 | 
			
		||||
        X509_STORE_set_verify_cb_func(store, smime_cb);
 | 
			
		||||
        if (vpm)
 | 
			
		||||
            X509_STORE_set1_param(store, vpm);
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    ret = 3;
 | 
			
		||||
 | 
			
		||||
    if (operation == SMIME_ENCRYPT)
 | 
			
		||||
        p7 = PKCS7_encrypt(encerts, in, cipher, flags);
 | 
			
		||||
    else if (operation == SMIME_SIGN) {
 | 
			
		||||
        /*
 | 
			
		||||
         * If detached data and SMIME output enable partial signing.
 | 
			
		||||
         */
 | 
			
		||||
        if ((flags & PKCS7_DETACHED) && (outformat == FORMAT_SMIME))
 | 
			
		||||
            flags |= PKCS7_STREAM;
 | 
			
		||||
        p7 = PKCS7_sign(signer, key, other, in, flags);
 | 
			
		||||
    } else {
 | 
			
		||||
        if (informat == FORMAT_SMIME)
 | 
			
		||||
            p7 = SMIME_read_PKCS7(in, &indata);
 | 
			
		||||
        else if (informat == FORMAT_PEM)
 | 
			
		||||
@@ -589,84 +601,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (outfile) {
 | 
			
		||||
        if (!(out = BIO_new_file(outfile, outmode))) {
 | 
			
		||||
            BIO_printf(bio_err, "Can't open output file %s\n", outfile);
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
    } else {
 | 
			
		||||
        out = BIO_new_fp(stdout, BIO_NOCLOSE);
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
        {
 | 
			
		||||
            BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
			
		||||
            out = BIO_push(tmpbio, out);
 | 
			
		||||
        }
 | 
			
		||||
#endif
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (operation == SMIME_VERIFY) {
 | 
			
		||||
        if (!(store = setup_verify(bio_err, CAfile, CApath)))
 | 
			
		||||
            goto end;
 | 
			
		||||
        X509_STORE_set_verify_cb(store, smime_cb);
 | 
			
		||||
        if (vpm)
 | 
			
		||||
            X509_STORE_set1_param(store, vpm);
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    ret = 3;
 | 
			
		||||
 | 
			
		||||
    if (operation == SMIME_ENCRYPT) {
 | 
			
		||||
        if (indef)
 | 
			
		||||
            flags |= PKCS7_STREAM;
 | 
			
		||||
        p7 = PKCS7_encrypt(encerts, in, cipher, flags);
 | 
			
		||||
    } else if (operation & SMIME_SIGNERS) {
 | 
			
		||||
        int i;
 | 
			
		||||
        /*
 | 
			
		||||
         * If detached data content we only enable streaming if S/MIME output
 | 
			
		||||
         * format.
 | 
			
		||||
         */
 | 
			
		||||
        if (operation == SMIME_SIGN) {
 | 
			
		||||
            if (flags & PKCS7_DETACHED) {
 | 
			
		||||
                if (outformat == FORMAT_SMIME)
 | 
			
		||||
                    flags |= PKCS7_STREAM;
 | 
			
		||||
            } else if (indef)
 | 
			
		||||
                flags |= PKCS7_STREAM;
 | 
			
		||||
            flags |= PKCS7_PARTIAL;
 | 
			
		||||
            p7 = PKCS7_sign(NULL, NULL, other, in, flags);
 | 
			
		||||
            if (!p7)
 | 
			
		||||
                goto end;
 | 
			
		||||
            if (flags & PKCS7_NOCERTS) {
 | 
			
		||||
                for (i = 0; i < sk_X509_num(other); i++) {
 | 
			
		||||
                    X509 *x = sk_X509_value(other, i);
 | 
			
		||||
                    PKCS7_add_certificate(p7, x);
 | 
			
		||||
                }
 | 
			
		||||
            }
 | 
			
		||||
        } else
 | 
			
		||||
            flags |= PKCS7_REUSE_DIGEST;
 | 
			
		||||
        for (i = 0; i < sk_OPENSSL_STRING_num(sksigners); i++) {
 | 
			
		||||
            signerfile = sk_OPENSSL_STRING_value(sksigners, i);
 | 
			
		||||
            keyfile = sk_OPENSSL_STRING_value(skkeys, i);
 | 
			
		||||
            signer = load_cert(bio_err, signerfile, FORMAT_PEM, NULL,
 | 
			
		||||
                               e, "signer certificate");
 | 
			
		||||
            if (!signer)
 | 
			
		||||
                goto end;
 | 
			
		||||
            key = load_key(bio_err, keyfile, keyform, 0, passin, e,
 | 
			
		||||
                           "signing key file");
 | 
			
		||||
            if (!key)
 | 
			
		||||
                goto end;
 | 
			
		||||
            if (!PKCS7_sign_add_signer(p7, signer, key, sign_md, flags))
 | 
			
		||||
                goto end;
 | 
			
		||||
            X509_free(signer);
 | 
			
		||||
            signer = NULL;
 | 
			
		||||
            EVP_PKEY_free(key);
 | 
			
		||||
            key = NULL;
 | 
			
		||||
        }
 | 
			
		||||
        /* If not streaming or resigning finalize structure */
 | 
			
		||||
        if ((operation == SMIME_SIGN) && !(flags & PKCS7_STREAM)) {
 | 
			
		||||
            if (!PKCS7_final(p7, in, flags))
 | 
			
		||||
                goto end;
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (!p7) {
 | 
			
		||||
        BIO_printf(bio_err, "Error creating PKCS#7 structure\n");
 | 
			
		||||
        goto end;
 | 
			
		||||
@@ -702,15 +636,12 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            BIO_printf(out, "From: %s\n", from);
 | 
			
		||||
        if (subject)
 | 
			
		||||
            BIO_printf(out, "Subject: %s\n", subject);
 | 
			
		||||
        if (outformat == FORMAT_SMIME) {
 | 
			
		||||
            if (operation == SMIME_RESIGN)
 | 
			
		||||
                SMIME_write_PKCS7(out, p7, indata, flags);
 | 
			
		||||
            else
 | 
			
		||||
                SMIME_write_PKCS7(out, p7, in, flags);
 | 
			
		||||
        } else if (outformat == FORMAT_PEM)
 | 
			
		||||
            PEM_write_bio_PKCS7_stream(out, p7, in, flags);
 | 
			
		||||
        if (outformat == FORMAT_SMIME)
 | 
			
		||||
            SMIME_write_PKCS7(out, p7, in, flags);
 | 
			
		||||
        else if (outformat == FORMAT_PEM)
 | 
			
		||||
            PEM_write_bio_PKCS7(out, p7);
 | 
			
		||||
        else if (outformat == FORMAT_ASN1)
 | 
			
		||||
            i2d_PKCS7_bio_stream(out, p7, in, flags);
 | 
			
		||||
            i2d_PKCS7_bio(out, p7);
 | 
			
		||||
        else {
 | 
			
		||||
            BIO_printf(bio_err, "Bad output format for PKCS#7 file\n");
 | 
			
		||||
            goto end;
 | 
			
		||||
@@ -726,10 +657,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    sk_X509_pop_free(other, X509_free);
 | 
			
		||||
    if (vpm)
 | 
			
		||||
        X509_VERIFY_PARAM_free(vpm);
 | 
			
		||||
    if (sksigners)
 | 
			
		||||
        sk_OPENSSL_STRING_free(sksigners);
 | 
			
		||||
    if (skkeys)
 | 
			
		||||
        sk_OPENSSL_STRING_free(skkeys);
 | 
			
		||||
    X509_STORE_free(store);
 | 
			
		||||
    X509_free(cert);
 | 
			
		||||
    X509_free(recip);
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										519
									
								
								apps/speed.c
									
									
									
									
									
								
							
							
						
						
									
										519
									
								
								apps/speed.c
									
									
									
									
									
								
							@@ -1,4 +1,4 @@
 | 
			
		||||
/* apps/speed.c */
 | 
			
		||||
/* apps/speed.c -*- mode:C; c-file-style: "eay" -*- */
 | 
			
		||||
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
 | 
			
		||||
 * All rights reserved.
 | 
			
		||||
 *
 | 
			
		||||
@@ -108,16 +108,56 @@
 | 
			
		||||
#  include <signal.h>
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
# if defined(_WIN32) || defined(__CYGWIN__)
 | 
			
		||||
#  include <windows.h>
 | 
			
		||||
#  if defined(__CYGWIN__) && !defined(_WIN32)
 | 
			
		||||
  /*
 | 
			
		||||
   * <windows.h> should define _WIN32, which normally is mutually exclusive
 | 
			
		||||
   * with __CYGWIN__, but if it didn't...
 | 
			
		||||
   */
 | 
			
		||||
#   define _WIN32
 | 
			
		||||
  /* this is done because Cygwin alarm() fails sometimes. */
 | 
			
		||||
#  endif
 | 
			
		||||
# if defined(__FreeBSD__) || defined(__NetBSD__) || defined(__OpenBSD__) || defined(OPENSSL_SYS_MACOSX)
 | 
			
		||||
#  define USE_TOD
 | 
			
		||||
# elif !defined(OPENSSL_SYS_MSDOS) && !defined(OPENSSL_SYS_VXWORKS) && (!defined(OPENSSL_SYS_VMS) || defined(__DECC))
 | 
			
		||||
#  define TIMES
 | 
			
		||||
# endif
 | 
			
		||||
/* FIXME */
 | 
			
		||||
# if !defined(_UNICOS) && !defined(__OpenBSD__) && !defined(sgi) && !defined(__FreeBSD__) && !(defined(__bsdi) || defined(__bsdi__)) && !defined(_AIX) && !defined(OPENSSL_SYS_MPE) && !defined(__NetBSD__) && !defined(OPENSSL_SYS_VXWORKS)
 | 
			
		||||
#  define TIMEB
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
# if defined(OPENSSL_SYS_NETWARE)
 | 
			
		||||
#  undef TIMES
 | 
			
		||||
#  undef TIMEB
 | 
			
		||||
#  include <time.h>
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
# ifndef _IRIX
 | 
			
		||||
#  include <time.h>
 | 
			
		||||
# endif
 | 
			
		||||
# ifdef TIMES
 | 
			
		||||
#  include <sys/types.h>
 | 
			
		||||
#  include <sys/times.h>
 | 
			
		||||
# endif
 | 
			
		||||
# ifdef USE_TOD
 | 
			
		||||
#  include <sys/time.h>
 | 
			
		||||
#  include <sys/resource.h>
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
/*
 | 
			
		||||
 * Depending on the VMS version, the tms structure is perhaps defined. The
 | 
			
		||||
 * __TMS macro will show if it was.  If it wasn't defined, we should undefine
 | 
			
		||||
 * TIMES, since that tells the rest of the program how things should be
 | 
			
		||||
 * handled.  -- Richard Levitte
 | 
			
		||||
 */
 | 
			
		||||
# if defined(OPENSSL_SYS_VMS_DECC) && !defined(__TMS)
 | 
			
		||||
#  undef TIMES
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
# ifdef TIMEB
 | 
			
		||||
#  include <sys/timeb.h>
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
# if !defined(TIMES) && !defined(TIMEB) && !defined(USE_TOD) && !defined(OPENSSL_SYS_VXWORKS) && !defined(OPENSSL_SYS_NETWARE)
 | 
			
		||||
#  error "It seems neither struct tms nor struct timeb is supported in this platform!"
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
# if defined(sun) || defined(__ultrix)
 | 
			
		||||
#  define _POSIX_SOURCE
 | 
			
		||||
#  include <limits.h>
 | 
			
		||||
#  include <sys/param.h>
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
# include <openssl/bn.h>
 | 
			
		||||
@@ -152,9 +192,6 @@
 | 
			
		||||
# ifndef OPENSSL_NO_RIPEMD
 | 
			
		||||
#  include <openssl/ripemd.h>
 | 
			
		||||
# endif
 | 
			
		||||
# ifndef OPENSSL_NO_WHIRLPOOL
 | 
			
		||||
#  include <openssl/whrlpool.h>
 | 
			
		||||
# endif
 | 
			
		||||
# ifndef OPENSSL_NO_RC4
 | 
			
		||||
#  include <openssl/rc4.h>
 | 
			
		||||
# endif
 | 
			
		||||
@@ -191,24 +228,33 @@
 | 
			
		||||
# ifndef OPENSSL_NO_ECDH
 | 
			
		||||
#  include <openssl/ecdh.h>
 | 
			
		||||
# endif
 | 
			
		||||
# include <openssl/modes.h>
 | 
			
		||||
 | 
			
		||||
# ifdef OPENSSL_FIPS
 | 
			
		||||
#  ifdef OPENSSL_DOING_MAKEDEPEND
 | 
			
		||||
#   undef AES_set_encrypt_key
 | 
			
		||||
#   undef AES_set_decrypt_key
 | 
			
		||||
#   undef DES_set_key_unchecked
 | 
			
		||||
/*
 | 
			
		||||
 * The following "HZ" timing stuff should be sync'd up with the code in
 | 
			
		||||
 * crypto/tmdiff.[ch]. That appears to try to do the same job, though I think
 | 
			
		||||
 * this code is more up to date than libcrypto's so there may be features to
 | 
			
		||||
 * migrate over first. This is used in two places further down AFAICS.
 | 
			
		||||
 * The point is that nothing in openssl actually *uses* that tmdiff stuff, so
 | 
			
		||||
 * either speed.c should be using it or it should go because it's obviously not
 | 
			
		||||
 * useful enough. Anyone want to do a janitorial job on this?
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
/* The following if from times(3) man page.  It may need to be changed */
 | 
			
		||||
# ifndef HZ
 | 
			
		||||
#  if defined(_SC_CLK_TCK) \
 | 
			
		||||
     && (!defined(OPENSSL_SYS_VMS) || __CTRL_VER >= 70000000)
 | 
			
		||||
#   define HZ sysconf(_SC_CLK_TCK)
 | 
			
		||||
#  else
 | 
			
		||||
#   ifndef CLK_TCK
 | 
			
		||||
#    ifndef _BSD_CLK_TCK_       /* FreeBSD hack */
 | 
			
		||||
#     define HZ  100.0
 | 
			
		||||
#    else                       /* _BSD_CLK_TCK_ */
 | 
			
		||||
#     define HZ ((double)_BSD_CLK_TCK_)
 | 
			
		||||
#    endif
 | 
			
		||||
#   else                        /* CLK_TCK */
 | 
			
		||||
#    define HZ ((double)CLK_TCK)
 | 
			
		||||
#   endif
 | 
			
		||||
#  endif
 | 
			
		||||
#  define BF_set_key      private_BF_set_key
 | 
			
		||||
#  define CAST_set_key    private_CAST_set_key
 | 
			
		||||
#  define idea_set_encrypt_key    private_idea_set_encrypt_key
 | 
			
		||||
#  define SEED_set_key    private_SEED_set_key
 | 
			
		||||
#  define RC2_set_key     private_RC2_set_key
 | 
			
		||||
#  define RC4_set_key     private_RC4_set_key
 | 
			
		||||
#  define DES_set_key_unchecked   private_DES_set_key_unchecked
 | 
			
		||||
#  define AES_set_encrypt_key     private_AES_set_encrypt_key
 | 
			
		||||
#  define AES_set_decrypt_key     private_AES_set_decrypt_key
 | 
			
		||||
#  define Camellia_set_key        private_Camellia_set_key
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
# ifndef HAVE_FORK
 | 
			
		||||
@@ -227,8 +273,10 @@
 | 
			
		||||
 | 
			
		||||
# undef BUFSIZE
 | 
			
		||||
# define BUFSIZE ((long)1024*8+1)
 | 
			
		||||
static volatile int run = 0;
 | 
			
		||||
int run = 0;
 | 
			
		||||
 | 
			
		||||
static char ftime_used = 0, times_used = 0, gettimeofday_used =
 | 
			
		||||
    0, getrusage_used = 0;
 | 
			
		||||
static int mr = 0;
 | 
			
		||||
static int usertime = 1;
 | 
			
		||||
 | 
			
		||||
@@ -241,7 +289,7 @@ static void print_result(int alg, int run_no, int count, double time_used);
 | 
			
		||||
static int do_multi(int multi);
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
# define ALGOR_NUM       30
 | 
			
		||||
# define ALGOR_NUM       28
 | 
			
		||||
# define SIZE_NUM        5
 | 
			
		||||
# define RSA_NUM         4
 | 
			
		||||
# define DSA_NUM         3
 | 
			
		||||
@@ -255,8 +303,8 @@ static const char *names[ALGOR_NUM] = {
 | 
			
		||||
    "rc2 cbc", "rc5-32/12 cbc", "blowfish cbc", "cast cbc",
 | 
			
		||||
    "aes-128 cbc", "aes-192 cbc", "aes-256 cbc",
 | 
			
		||||
    "camellia-128 cbc", "camellia-192 cbc", "camellia-256 cbc",
 | 
			
		||||
    "evp", "sha256", "sha512", "whirlpool",
 | 
			
		||||
    "aes-128 ige", "aes-192 ige", "aes-256 ige", "ghash"
 | 
			
		||||
    "evp", "sha256", "sha512",
 | 
			
		||||
    "aes-128 ige", "aes-192 ige", "aes-256 ige"
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
static double results[ALGOR_NUM][SIZE_NUM];
 | 
			
		||||
@@ -302,52 +350,122 @@ static SIGRETTYPE sig_done(int sig)
 | 
			
		||||
# define START   0
 | 
			
		||||
# define STOP    1
 | 
			
		||||
 | 
			
		||||
# if defined(_WIN32)
 | 
			
		||||
 | 
			
		||||
#  if !defined(SIGALRM)
 | 
			
		||||
#   define SIGALRM
 | 
			
		||||
#  endif
 | 
			
		||||
static unsigned int lapse, schlock;
 | 
			
		||||
static void alarm_win32(unsigned int secs)
 | 
			
		||||
{
 | 
			
		||||
    lapse = secs * 1000;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
#  define alarm alarm_win32
 | 
			
		||||
 | 
			
		||||
static DWORD WINAPI sleepy(VOID * arg)
 | 
			
		||||
{
 | 
			
		||||
    schlock = 1;
 | 
			
		||||
    Sleep(lapse);
 | 
			
		||||
    run = 0;
 | 
			
		||||
    return 0;
 | 
			
		||||
}
 | 
			
		||||
# if defined(OPENSSL_SYS_NETWARE)
 | 
			
		||||
 | 
			
		||||
   /*
 | 
			
		||||
    * for NetWare the best we can do is use clock() which returns the time,
 | 
			
		||||
    * in hundredths of a second, since the NLM began executing
 | 
			
		||||
    */
 | 
			
		||||
static double Time_F(int s)
 | 
			
		||||
{
 | 
			
		||||
    if (s == START) {
 | 
			
		||||
        HANDLE thr;
 | 
			
		||||
        schlock = 0;
 | 
			
		||||
        thr = CreateThread(NULL, 4096, sleepy, NULL, 0, NULL);
 | 
			
		||||
        if (thr == NULL) {
 | 
			
		||||
            DWORD ret = GetLastError();
 | 
			
		||||
            BIO_printf(bio_err, "unable to CreateThread (%d)", ret);
 | 
			
		||||
            ExitProcess(ret);
 | 
			
		||||
        }
 | 
			
		||||
        CloseHandle(thr);       /* detach the thread */
 | 
			
		||||
        while (!schlock)
 | 
			
		||||
            Sleep(0);           /* scheduler spinlock */
 | 
			
		||||
    }
 | 
			
		||||
    double ret;
 | 
			
		||||
 | 
			
		||||
    return app_tminterval(s, usertime);
 | 
			
		||||
    static clock_t tstart, tend;
 | 
			
		||||
 | 
			
		||||
    if (s == START) {
 | 
			
		||||
        tstart = clock();
 | 
			
		||||
        return (0);
 | 
			
		||||
    } else {
 | 
			
		||||
        tend = clock();
 | 
			
		||||
        ret = (double)((double)(tend) - (double)(tstart));
 | 
			
		||||
        return ((ret < 0.001) ? 0.001 : ret);
 | 
			
		||||
    }
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# else
 | 
			
		||||
 | 
			
		||||
static double Time_F(int s)
 | 
			
		||||
{
 | 
			
		||||
    return app_tminterval(s, usertime);
 | 
			
		||||
    double ret;
 | 
			
		||||
 | 
			
		||||
#  ifdef USE_TOD
 | 
			
		||||
    if (usertime) {
 | 
			
		||||
        static struct rusage tstart, tend;
 | 
			
		||||
 | 
			
		||||
        getrusage_used = 1;
 | 
			
		||||
        if (s == START) {
 | 
			
		||||
            getrusage(RUSAGE_SELF, &tstart);
 | 
			
		||||
            return (0);
 | 
			
		||||
        } else {
 | 
			
		||||
            long i;
 | 
			
		||||
 | 
			
		||||
            getrusage(RUSAGE_SELF, &tend);
 | 
			
		||||
            i = (long)tend.ru_utime.tv_usec - (long)tstart.ru_utime.tv_usec;
 | 
			
		||||
            ret = ((double)(tend.ru_utime.tv_sec - tstart.ru_utime.tv_sec))
 | 
			
		||||
                + ((double)i) / 1000000.0;
 | 
			
		||||
            return ((ret < 0.001) ? 0.001 : ret);
 | 
			
		||||
        }
 | 
			
		||||
    } else {
 | 
			
		||||
        static struct timeval tstart, tend;
 | 
			
		||||
        long i;
 | 
			
		||||
 | 
			
		||||
        gettimeofday_used = 1;
 | 
			
		||||
        if (s == START) {
 | 
			
		||||
            gettimeofday(&tstart, NULL);
 | 
			
		||||
            return (0);
 | 
			
		||||
        } else {
 | 
			
		||||
            gettimeofday(&tend, NULL);
 | 
			
		||||
            i = (long)tend.tv_usec - (long)tstart.tv_usec;
 | 
			
		||||
            ret =
 | 
			
		||||
                ((double)(tend.tv_sec - tstart.tv_sec)) +
 | 
			
		||||
                ((double)i) / 1000000.0;
 | 
			
		||||
            return ((ret < 0.001) ? 0.001 : ret);
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
#  else                         /* ndef USE_TOD */
 | 
			
		||||
 | 
			
		||||
#   ifdef TIMES
 | 
			
		||||
    if (usertime) {
 | 
			
		||||
        static struct tms tstart, tend;
 | 
			
		||||
 | 
			
		||||
        times_used = 1;
 | 
			
		||||
        if (s == START) {
 | 
			
		||||
            times(&tstart);
 | 
			
		||||
            return (0);
 | 
			
		||||
        } else {
 | 
			
		||||
            times(&tend);
 | 
			
		||||
            ret = HZ;
 | 
			
		||||
            ret = (double)(tend.tms_utime - tstart.tms_utime) / ret;
 | 
			
		||||
            return ((ret < 1e-3) ? 1e-3 : ret);
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
#   endif                       /* times() */
 | 
			
		||||
#   if defined(TIMES) && defined(TIMEB)
 | 
			
		||||
    else
 | 
			
		||||
#   endif
 | 
			
		||||
#   ifdef OPENSSL_SYS_VXWORKS
 | 
			
		||||
    {
 | 
			
		||||
        static unsigned long tick_start, tick_end;
 | 
			
		||||
 | 
			
		||||
        if (s == START) {
 | 
			
		||||
            tick_start = tickGet();
 | 
			
		||||
            return 0;
 | 
			
		||||
        } else {
 | 
			
		||||
            tick_end = tickGet();
 | 
			
		||||
            ret = (double)(tick_end - tick_start) / (double)sysClkRateGet();
 | 
			
		||||
            return ((ret < 0.001) ? 0.001 : ret);
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
#   elif defined(TIMEB)
 | 
			
		||||
    {
 | 
			
		||||
        static struct timeb tstart, tend;
 | 
			
		||||
        long i;
 | 
			
		||||
 | 
			
		||||
        ftime_used = 1;
 | 
			
		||||
        if (s == START) {
 | 
			
		||||
            ftime(&tstart);
 | 
			
		||||
            return (0);
 | 
			
		||||
        } else {
 | 
			
		||||
            ftime(&tend);
 | 
			
		||||
            i = (long)tend.millitm - (long)tstart.millitm;
 | 
			
		||||
            ret = ((double)(tend.time - tstart.time)) + ((double)i) / 1000.0;
 | 
			
		||||
            return ((ret < 0.001) ? 0.001 : ret);
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
#   endif
 | 
			
		||||
#  endif
 | 
			
		||||
}
 | 
			
		||||
# endif
 | 
			
		||||
# endif                         /* if defined(OPENSSL_SYS_NETWARE) */
 | 
			
		||||
 | 
			
		||||
# ifndef OPENSSL_NO_ECDH
 | 
			
		||||
static const int KDF1_SHA1_len = 20;
 | 
			
		||||
@@ -366,8 +484,6 @@ static void *KDF1_SHA1(const void *in, size_t inlen, void *out,
 | 
			
		||||
}
 | 
			
		||||
# endif                         /* OPENSSL_NO_ECDH */
 | 
			
		||||
 | 
			
		||||
static void multiblock_speed(const EVP_CIPHER *evp_cipher);
 | 
			
		||||
 | 
			
		||||
int MAIN(int, char **);
 | 
			
		||||
 | 
			
		||||
int MAIN(int argc, char **argv)
 | 
			
		||||
@@ -405,9 +521,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    unsigned char sha512[SHA512_DIGEST_LENGTH];
 | 
			
		||||
#  endif
 | 
			
		||||
# endif
 | 
			
		||||
# ifndef OPENSSL_NO_WHIRLPOOL
 | 
			
		||||
    unsigned char whirlpool[WHIRLPOOL_DIGEST_LENGTH];
 | 
			
		||||
# endif
 | 
			
		||||
# ifndef OPENSSL_NO_RIPEMD
 | 
			
		||||
    unsigned char rmd160[RIPEMD160_DIGEST_LENGTH];
 | 
			
		||||
# endif
 | 
			
		||||
@@ -511,11 +624,9 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
# define D_EVP           22
 | 
			
		||||
# define D_SHA256        23
 | 
			
		||||
# define D_SHA512        24
 | 
			
		||||
# define D_WHIRLPOOL     25
 | 
			
		||||
# define D_IGE_128_AES   26
 | 
			
		||||
# define D_IGE_192_AES   27
 | 
			
		||||
# define D_IGE_256_AES   28
 | 
			
		||||
# define D_GHASH         29
 | 
			
		||||
# define D_IGE_128_AES   25
 | 
			
		||||
# define D_IGE_192_AES   26
 | 
			
		||||
# define D_IGE_256_AES   27
 | 
			
		||||
    double d = 0.0;
 | 
			
		||||
    long c[ALGOR_NUM][SIZE_NUM];
 | 
			
		||||
# define R_DSA_512       0
 | 
			
		||||
@@ -648,7 +759,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
# ifndef NO_FORK
 | 
			
		||||
    int multi = 0;
 | 
			
		||||
# endif
 | 
			
		||||
    int multiblock = 0;
 | 
			
		||||
 | 
			
		||||
# ifndef TIMES
 | 
			
		||||
    usertime = -1;
 | 
			
		||||
@@ -779,9 +889,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            mr = 1;
 | 
			
		||||
            j--;                /* Otherwise, -mr gets confused with an
 | 
			
		||||
                                 * algorithm. */
 | 
			
		||||
        } else if (argc > 0 && !strcmp(*argv, "-mb")) {
 | 
			
		||||
            multiblock = 1;
 | 
			
		||||
            j--;
 | 
			
		||||
        } else
 | 
			
		||||
# ifndef OPENSSL_NO_MD2
 | 
			
		||||
        if (strcmp(*argv, "md2") == 0)
 | 
			
		||||
@@ -825,11 +932,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        else
 | 
			
		||||
#  endif
 | 
			
		||||
# endif
 | 
			
		||||
# ifndef OPENSSL_NO_WHIRLPOOL
 | 
			
		||||
        if (strcmp(*argv, "whirlpool") == 0)
 | 
			
		||||
            doit[D_WHIRLPOOL] = 1;
 | 
			
		||||
        else
 | 
			
		||||
# endif
 | 
			
		||||
# ifndef OPENSSL_NO_RIPEMD
 | 
			
		||||
        if (strcmp(*argv, "ripemd") == 0)
 | 
			
		||||
            doit[D_RMD160] = 1;
 | 
			
		||||
@@ -961,8 +1063,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            doit[D_CBC_128_AES] = 1;
 | 
			
		||||
            doit[D_CBC_192_AES] = 1;
 | 
			
		||||
            doit[D_CBC_256_AES] = 1;
 | 
			
		||||
        } else if (strcmp(*argv, "ghash") == 0) {
 | 
			
		||||
            doit[D_GHASH] = 1;
 | 
			
		||||
        } else
 | 
			
		||||
# endif
 | 
			
		||||
# ifndef OPENSSL_NO_CAMELLIA
 | 
			
		||||
@@ -1091,16 +1191,12 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
# ifndef OPENSSL_NO_SHA512
 | 
			
		||||
            BIO_printf(bio_err, "sha512   ");
 | 
			
		||||
# endif
 | 
			
		||||
# ifndef OPENSSL_NO_WHIRLPOOL
 | 
			
		||||
            BIO_printf(bio_err, "whirlpool");
 | 
			
		||||
# endif
 | 
			
		||||
# ifndef OPENSSL_NO_RIPEMD160
 | 
			
		||||
            BIO_printf(bio_err, "rmd160");
 | 
			
		||||
# endif
 | 
			
		||||
# if !defined(OPENSSL_NO_MD2) || !defined(OPENSSL_NO_MDC2) || \
 | 
			
		||||
    !defined(OPENSSL_NO_MD4) || !defined(OPENSSL_NO_MD5) || \
 | 
			
		||||
    !defined(OPENSSL_NO_SHA1) || !defined(OPENSSL_NO_RIPEMD160) || \
 | 
			
		||||
    !defined(OPENSSL_NO_WHIRLPOOL)
 | 
			
		||||
    !defined(OPENSSL_NO_SHA1) || !defined(OPENSSL_NO_RIPEMD160)
 | 
			
		||||
            BIO_printf(bio_err, "\n");
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
@@ -1240,14 +1336,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            rsa_doit[i] = 1;
 | 
			
		||||
        for (i = 0; i < DSA_NUM; i++)
 | 
			
		||||
            dsa_doit[i] = 1;
 | 
			
		||||
# ifndef OPENSSL_NO_ECDSA
 | 
			
		||||
        for (i = 0; i < EC_NUM; i++)
 | 
			
		||||
            ecdsa_doit[i] = 1;
 | 
			
		||||
# endif
 | 
			
		||||
# ifndef OPENSSL_NO_ECDH
 | 
			
		||||
        for (i = 0; i < EC_NUM; i++)
 | 
			
		||||
            ecdh_doit[i] = 1;
 | 
			
		||||
# endif
 | 
			
		||||
    }
 | 
			
		||||
    for (i = 0; i < ALGOR_NUM; i++)
 | 
			
		||||
        if (doit[i])
 | 
			
		||||
@@ -1257,7 +1345,11 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "You have chosen to measure elapsed time "
 | 
			
		||||
                   "instead of user CPU time.\n");
 | 
			
		||||
 | 
			
		||||
    if (usertime <= 0 && !mr) {
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "To get the most accurate results, try to run this\n");
 | 
			
		||||
        BIO_printf(bio_err, "program when this computer is idle.\n");
 | 
			
		||||
    }
 | 
			
		||||
# ifndef OPENSSL_NO_RSA
 | 
			
		||||
    for (i = 0; i < RSA_NUM; i++) {
 | 
			
		||||
        const unsigned char *p;
 | 
			
		||||
@@ -1365,11 +1457,9 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    c[D_CBC_256_CML][0] = count;
 | 
			
		||||
    c[D_SHA256][0] = count;
 | 
			
		||||
    c[D_SHA512][0] = count;
 | 
			
		||||
    c[D_WHIRLPOOL][0] = count;
 | 
			
		||||
    c[D_IGE_128_AES][0] = count;
 | 
			
		||||
    c[D_IGE_192_AES][0] = count;
 | 
			
		||||
    c[D_IGE_256_AES][0] = count;
 | 
			
		||||
    c[D_GHASH][0] = count;
 | 
			
		||||
 | 
			
		||||
    for (i = 1; i < SIZE_NUM; i++) {
 | 
			
		||||
        c[D_MD2][i] = c[D_MD2][0] * 4 * lengths[0] / lengths[i];
 | 
			
		||||
@@ -1381,7 +1471,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        c[D_RMD160][i] = c[D_RMD160][0] * 4 * lengths[0] / lengths[i];
 | 
			
		||||
        c[D_SHA256][i] = c[D_SHA256][0] * 4 * lengths[0] / lengths[i];
 | 
			
		||||
        c[D_SHA512][i] = c[D_SHA512][0] * 4 * lengths[0] / lengths[i];
 | 
			
		||||
        c[D_WHIRLPOOL][i] = c[D_WHIRLPOOL][0] * 4 * lengths[0] / lengths[i];
 | 
			
		||||
    }
 | 
			
		||||
    for (i = 1; i < SIZE_NUM; i++) {
 | 
			
		||||
        long l0, l1;
 | 
			
		||||
@@ -1538,11 +1627,9 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
#   error "You cannot disable DES on systems without SIGALRM."
 | 
			
		||||
#  endif                        /* OPENSSL_NO_DES */
 | 
			
		||||
# else
 | 
			
		||||
#  define COND(c) (run && count<0x7fffffff)
 | 
			
		||||
#  define COND(c) (run)
 | 
			
		||||
#  define COUNT(d) (count)
 | 
			
		||||
#  ifndef _WIN32
 | 
			
		||||
    signal(SIGALRM, sig_done);
 | 
			
		||||
#  endif
 | 
			
		||||
# endif                         /* SIGALRM */
 | 
			
		||||
 | 
			
		||||
# ifndef OPENSSL_NO_MD2
 | 
			
		||||
@@ -1659,21 +1746,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
#  endif
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
# ifndef OPENSSL_NO_WHIRLPOOL
 | 
			
		||||
    if (doit[D_WHIRLPOOL]) {
 | 
			
		||||
        for (j = 0; j < SIZE_NUM; j++) {
 | 
			
		||||
            print_message(names[D_WHIRLPOOL], c[D_WHIRLPOOL][j], lengths[j]);
 | 
			
		||||
            Time_F(START);
 | 
			
		||||
            for (count = 0, run = 1; COND(c[D_WHIRLPOOL][j]); count++)
 | 
			
		||||
                WHIRLPOOL(buf, lengths[j], whirlpool);
 | 
			
		||||
            d = Time_F(STOP);
 | 
			
		||||
            print_result(D_WHIRLPOOL, j, count, d);
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
# ifndef OPENSSL_NO_RIPEMD
 | 
			
		||||
    if (doit[D_RMD160]) {
 | 
			
		||||
        for (j = 0; j < SIZE_NUM; j++) {
 | 
			
		||||
@@ -1805,21 +1879,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            print_result(D_IGE_256_AES, j, count, d);
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
    if (doit[D_GHASH]) {
 | 
			
		||||
        GCM128_CONTEXT *ctx =
 | 
			
		||||
            CRYPTO_gcm128_new(&aes_ks1, (block128_f) AES_encrypt);
 | 
			
		||||
        CRYPTO_gcm128_setiv(ctx, (unsigned char *)"0123456789ab", 12);
 | 
			
		||||
 | 
			
		||||
        for (j = 0; j < SIZE_NUM; j++) {
 | 
			
		||||
            print_message(names[D_GHASH], c[D_GHASH][j], lengths[j]);
 | 
			
		||||
            Time_F(START);
 | 
			
		||||
            for (count = 0, run = 1; COND(c[D_GHASH][j]); count++)
 | 
			
		||||
                CRYPTO_gcm128_aad(ctx, buf, lengths[j]);
 | 
			
		||||
            d = Time_F(STOP);
 | 
			
		||||
            print_result(D_GHASH, j, count, d);
 | 
			
		||||
        }
 | 
			
		||||
        CRYPTO_gcm128_release(ctx);
 | 
			
		||||
    }
 | 
			
		||||
# endif
 | 
			
		||||
# ifndef OPENSSL_NO_CAMELLIA
 | 
			
		||||
    if (doit[D_CBC_128_CML]) {
 | 
			
		||||
@@ -1947,20 +2006,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
    if (doit[D_EVP]) {
 | 
			
		||||
# ifdef EVP_CIPH_FLAG_TLS1_1_MULTIBLOCK
 | 
			
		||||
        if (multiblock && evp_cipher) {
 | 
			
		||||
            if (!
 | 
			
		||||
                (EVP_CIPHER_flags(evp_cipher) &
 | 
			
		||||
                 EVP_CIPH_FLAG_TLS1_1_MULTIBLOCK)) {
 | 
			
		||||
                fprintf(stderr, "%s is not multi-block capable\n",
 | 
			
		||||
                        OBJ_nid2ln(evp_cipher->nid));
 | 
			
		||||
                goto end;
 | 
			
		||||
            }
 | 
			
		||||
            multiblock_speed(evp_cipher);
 | 
			
		||||
            mret = 0;
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
# endif
 | 
			
		||||
        for (j = 0; j < SIZE_NUM; j++) {
 | 
			
		||||
            if (evp_cipher) {
 | 
			
		||||
                EVP_CIPHER_CTX ctx;
 | 
			
		||||
@@ -2381,6 +2426,35 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        printf("%s ", BF_options());
 | 
			
		||||
# endif
 | 
			
		||||
        fprintf(stdout, "\n%s\n", SSLeay_version(SSLEAY_CFLAGS));
 | 
			
		||||
        printf("available timing options: ");
 | 
			
		||||
# ifdef TIMES
 | 
			
		||||
        printf("TIMES ");
 | 
			
		||||
# endif
 | 
			
		||||
# ifdef TIMEB
 | 
			
		||||
        printf("TIMEB ");
 | 
			
		||||
# endif
 | 
			
		||||
# ifdef USE_TOD
 | 
			
		||||
        printf("USE_TOD ");
 | 
			
		||||
# endif
 | 
			
		||||
# ifdef HZ
 | 
			
		||||
#  define as_string(s) (#s)
 | 
			
		||||
        {
 | 
			
		||||
            double dbl = HZ;
 | 
			
		||||
            printf("HZ=%g", dbl);
 | 
			
		||||
        }
 | 
			
		||||
#  ifdef _SC_CLK_TCK
 | 
			
		||||
        printf(" [sysconf value]");
 | 
			
		||||
#  endif
 | 
			
		||||
# endif
 | 
			
		||||
        printf("\n");
 | 
			
		||||
        printf("timing function used: %s%s%s%s%s%s%s\n",
 | 
			
		||||
               (ftime_used ? "ftime" : ""),
 | 
			
		||||
               (ftime_used + times_used > 1 ? "," : ""),
 | 
			
		||||
               (times_used ? "times" : ""),
 | 
			
		||||
               (ftime_used + times_used + gettimeofday_used > 1 ? "," : ""),
 | 
			
		||||
               (gettimeofday_used ? "gettimeofday" : ""),
 | 
			
		||||
               (ftime_used + times_used + gettimeofday_used + getrusage_used >
 | 
			
		||||
                1 ? "," : ""), (getrusage_used ? "getrusage" : ""));
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (pr_header) {
 | 
			
		||||
@@ -2557,7 +2631,7 @@ static void pkey_print_message(const char *str, const char *str2, long num,
 | 
			
		||||
               mr ? "+DTP:%d:%s:%s:%d\n"
 | 
			
		||||
               : "Doing %d bit %s %s's for %ds: ", bits, str, str2, tm);
 | 
			
		||||
    (void)BIO_flush(bio_err);
 | 
			
		||||
    alarm(tm);
 | 
			
		||||
    alarm(RSA_SECONDS);
 | 
			
		||||
# else
 | 
			
		||||
    BIO_printf(bio_err,
 | 
			
		||||
               mr ? "+DNP:%ld:%d:%s:%s\n"
 | 
			
		||||
@@ -2634,7 +2708,6 @@ static int do_multi(int multi)
 | 
			
		||||
            close(fd[1]);
 | 
			
		||||
            mr = 1;
 | 
			
		||||
            usertime = 0;
 | 
			
		||||
            free(fds);
 | 
			
		||||
            return 0;
 | 
			
		||||
        }
 | 
			
		||||
        printf("Forked child %d\n", n);
 | 
			
		||||
@@ -2685,9 +2758,26 @@ static int do_multi(int multi)
 | 
			
		||||
                    rsa_results[k][1] = 1 / (1 / rsa_results[k][1] + 1 / d);
 | 
			
		||||
                else
 | 
			
		||||
                    rsa_results[k][1] = d;
 | 
			
		||||
            }
 | 
			
		||||
#  ifndef OPENSSL_NO_DSA
 | 
			
		||||
            else if (!strncmp(buf, "+F3:", 4)) {
 | 
			
		||||
            } else if (!strncmp(buf, "+F2:", 4)) {
 | 
			
		||||
                int k;
 | 
			
		||||
                double d;
 | 
			
		||||
 | 
			
		||||
                p = buf + 4;
 | 
			
		||||
                k = atoi(sstrsep(&p, sep));
 | 
			
		||||
                sstrsep(&p, sep);
 | 
			
		||||
 | 
			
		||||
                d = atof(sstrsep(&p, sep));
 | 
			
		||||
                if (n)
 | 
			
		||||
                    rsa_results[k][0] = 1 / (1 / rsa_results[k][0] + 1 / d);
 | 
			
		||||
                else
 | 
			
		||||
                    rsa_results[k][0] = d;
 | 
			
		||||
 | 
			
		||||
                d = atof(sstrsep(&p, sep));
 | 
			
		||||
                if (n)
 | 
			
		||||
                    rsa_results[k][1] = 1 / (1 / rsa_results[k][1] + 1 / d);
 | 
			
		||||
                else
 | 
			
		||||
                    rsa_results[k][1] = d;
 | 
			
		||||
            } else if (!strncmp(buf, "+F3:", 4)) {
 | 
			
		||||
                int k;
 | 
			
		||||
                double d;
 | 
			
		||||
 | 
			
		||||
@@ -2707,7 +2797,6 @@ static int do_multi(int multi)
 | 
			
		||||
                else
 | 
			
		||||
                    dsa_results[k][1] = d;
 | 
			
		||||
            }
 | 
			
		||||
#  endif
 | 
			
		||||
#  ifndef OPENSSL_NO_ECDSA
 | 
			
		||||
            else if (!strncmp(buf, "+F4:", 4)) {
 | 
			
		||||
                int k;
 | 
			
		||||
@@ -2755,120 +2844,8 @@ static int do_multi(int multi)
 | 
			
		||||
            } else
 | 
			
		||||
                fprintf(stderr, "Unknown type '%s' from child %d\n", buf, n);
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        fclose(f);
 | 
			
		||||
    }
 | 
			
		||||
    free(fds);
 | 
			
		||||
    return 1;
 | 
			
		||||
}
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
static void multiblock_speed(const EVP_CIPHER *evp_cipher)
 | 
			
		||||
{
 | 
			
		||||
    static int mblengths[] =
 | 
			
		||||
        { 8 * 1024, 2 * 8 * 1024, 4 * 8 * 1024, 8 * 8 * 1024, 8 * 16 * 1024 };
 | 
			
		||||
    int j, count, num = sizeof(lengths) / sizeof(lengths[0]);
 | 
			
		||||
    const char *alg_name;
 | 
			
		||||
    unsigned char *inp, *out, no_key[32], no_iv[16];
 | 
			
		||||
    EVP_CIPHER_CTX ctx;
 | 
			
		||||
    double d = 0.0;
 | 
			
		||||
 | 
			
		||||
    inp = OPENSSL_malloc(mblengths[num - 1]);
 | 
			
		||||
    out = OPENSSL_malloc(mblengths[num - 1] + 1024);
 | 
			
		||||
    if (!inp || !out) {
 | 
			
		||||
        BIO_printf(bio_err,"Out of memory\n");
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
    EVP_CIPHER_CTX_init(&ctx);
 | 
			
		||||
    EVP_EncryptInit_ex(&ctx, evp_cipher, NULL, no_key, no_iv);
 | 
			
		||||
    EVP_CIPHER_CTX_ctrl(&ctx, EVP_CTRL_AEAD_SET_MAC_KEY, sizeof(no_key),
 | 
			
		||||
                        no_key);
 | 
			
		||||
    alg_name = OBJ_nid2ln(evp_cipher->nid);
 | 
			
		||||
 | 
			
		||||
    for (j = 0; j < num; j++) {
 | 
			
		||||
        print_message(alg_name, 0, mblengths[j]);
 | 
			
		||||
        Time_F(START);
 | 
			
		||||
        for (count = 0, run = 1; run && count < 0x7fffffff; count++) {
 | 
			
		||||
            unsigned char aad[EVP_AEAD_TLS1_AAD_LEN];
 | 
			
		||||
            EVP_CTRL_TLS1_1_MULTIBLOCK_PARAM mb_param;
 | 
			
		||||
            size_t len = mblengths[j];
 | 
			
		||||
            int packlen;
 | 
			
		||||
 | 
			
		||||
            memset(aad, 0, 8);  /* avoid uninitialized values */
 | 
			
		||||
            aad[8] = 23;        /* SSL3_RT_APPLICATION_DATA */
 | 
			
		||||
            aad[9] = 3;         /* version */
 | 
			
		||||
            aad[10] = 2;
 | 
			
		||||
            aad[11] = 0;        /* length */
 | 
			
		||||
            aad[12] = 0;
 | 
			
		||||
            mb_param.out = NULL;
 | 
			
		||||
            mb_param.inp = aad;
 | 
			
		||||
            mb_param.len = len;
 | 
			
		||||
            mb_param.interleave = 8;
 | 
			
		||||
 | 
			
		||||
            packlen = EVP_CIPHER_CTX_ctrl(&ctx,
 | 
			
		||||
                                          EVP_CTRL_TLS1_1_MULTIBLOCK_AAD,
 | 
			
		||||
                                          sizeof(mb_param), &mb_param);
 | 
			
		||||
 | 
			
		||||
            if (packlen > 0) {
 | 
			
		||||
                mb_param.out = out;
 | 
			
		||||
                mb_param.inp = inp;
 | 
			
		||||
                mb_param.len = len;
 | 
			
		||||
                EVP_CIPHER_CTX_ctrl(&ctx,
 | 
			
		||||
                                    EVP_CTRL_TLS1_1_MULTIBLOCK_ENCRYPT,
 | 
			
		||||
                                    sizeof(mb_param), &mb_param);
 | 
			
		||||
            } else {
 | 
			
		||||
                int pad;
 | 
			
		||||
 | 
			
		||||
                RAND_bytes(out, 16);
 | 
			
		||||
                len += 16;
 | 
			
		||||
                aad[11] = len >> 8;
 | 
			
		||||
                aad[12] = len;
 | 
			
		||||
                pad = EVP_CIPHER_CTX_ctrl(&ctx,
 | 
			
		||||
                                          EVP_CTRL_AEAD_TLS1_AAD,
 | 
			
		||||
                                          EVP_AEAD_TLS1_AAD_LEN, aad);
 | 
			
		||||
                EVP_Cipher(&ctx, out, inp, len + pad);
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
        d = Time_F(STOP);
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   mr ? "+R:%d:%s:%f\n"
 | 
			
		||||
                   : "%d %s's in %.2fs\n", count, "evp", d);
 | 
			
		||||
        results[D_EVP][j] = ((double)count) / d * mblengths[j];
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (mr) {
 | 
			
		||||
        fprintf(stdout, "+H");
 | 
			
		||||
        for (j = 0; j < num; j++)
 | 
			
		||||
            fprintf(stdout, ":%d", mblengths[j]);
 | 
			
		||||
        fprintf(stdout, "\n");
 | 
			
		||||
        fprintf(stdout, "+F:%d:%s", D_EVP, alg_name);
 | 
			
		||||
        for (j = 0; j < num; j++)
 | 
			
		||||
            fprintf(stdout, ":%.2f", results[D_EVP][j]);
 | 
			
		||||
        fprintf(stdout, "\n");
 | 
			
		||||
    } else {
 | 
			
		||||
        fprintf(stdout,
 | 
			
		||||
                "The 'numbers' are in 1000s of bytes per second processed.\n");
 | 
			
		||||
        fprintf(stdout, "type                    ");
 | 
			
		||||
        for (j = 0; j < num; j++)
 | 
			
		||||
            fprintf(stdout, "%7d bytes", mblengths[j]);
 | 
			
		||||
        fprintf(stdout, "\n");
 | 
			
		||||
        fprintf(stdout, "%-24s", alg_name);
 | 
			
		||||
 | 
			
		||||
        for (j = 0; j < num; j++) {
 | 
			
		||||
            if (results[D_EVP][j] > 10000)
 | 
			
		||||
                fprintf(stdout, " %11.2fk", results[D_EVP][j] / 1e3);
 | 
			
		||||
            else
 | 
			
		||||
                fprintf(stdout, " %11.2f ", results[D_EVP][j]);
 | 
			
		||||
        }
 | 
			
		||||
        fprintf(stdout, "\n");
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
end:
 | 
			
		||||
    if (inp)
 | 
			
		||||
        OPENSSL_free(inp);
 | 
			
		||||
    if (out)
 | 
			
		||||
        OPENSSL_free(out);
 | 
			
		||||
}
 | 
			
		||||
#endif
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										768
									
								
								apps/srp.c
									
									
									
									
									
								
							
							
						
						
									
										768
									
								
								apps/srp.c
									
									
									
									
									
								
							@@ -1,768 +0,0 @@
 | 
			
		||||
/* apps/srp.c */
 | 
			
		||||
/*
 | 
			
		||||
 * Written by Peter Sylvester (peter.sylvester@edelweb.fr) for the EdelKey
 | 
			
		||||
 * project and contributed to the OpenSSL project 2004.
 | 
			
		||||
 */
 | 
			
		||||
/* ====================================================================
 | 
			
		||||
 * Copyright (c) 2004 The OpenSSL Project.  All rights reserved.
 | 
			
		||||
 *
 | 
			
		||||
 * Redistribution and use in source and binary forms, with or without
 | 
			
		||||
 * modification, are permitted provided that the following conditions
 | 
			
		||||
 * are met:
 | 
			
		||||
 *
 | 
			
		||||
 * 1. Redistributions of source code must retain the above copyright
 | 
			
		||||
 *    notice, this list of conditions and the following disclaimer.
 | 
			
		||||
 *
 | 
			
		||||
 * 2. Redistributions in binary form must reproduce the above copyright
 | 
			
		||||
 *    notice, this list of conditions and the following disclaimer in
 | 
			
		||||
 *    the documentation and/or other materials provided with the
 | 
			
		||||
 *    distribution.
 | 
			
		||||
 *
 | 
			
		||||
 * 3. All advertising materials mentioning features or use of this
 | 
			
		||||
 *    software must display the following acknowledgment:
 | 
			
		||||
 *    "This product includes software developed by the OpenSSL Project
 | 
			
		||||
 *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
 | 
			
		||||
 *
 | 
			
		||||
 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
 | 
			
		||||
 *    endorse or promote products derived from this software without
 | 
			
		||||
 *    prior written permission. For written permission, please contact
 | 
			
		||||
 *    licensing@OpenSSL.org.
 | 
			
		||||
 *
 | 
			
		||||
 * 5. Products derived from this software may not be called "OpenSSL"
 | 
			
		||||
 *    nor may "OpenSSL" appear in their names without prior written
 | 
			
		||||
 *    permission of the OpenSSL Project.
 | 
			
		||||
 *
 | 
			
		||||
 * 6. Redistributions of any form whatsoever must retain the following
 | 
			
		||||
 *    acknowledgment:
 | 
			
		||||
 *    "This product includes software developed by the OpenSSL Project
 | 
			
		||||
 *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
 | 
			
		||||
 *
 | 
			
		||||
 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
 | 
			
		||||
 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 | 
			
		||||
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
 | 
			
		||||
 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
 | 
			
		||||
 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 | 
			
		||||
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 | 
			
		||||
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
 | 
			
		||||
 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 | 
			
		||||
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
 | 
			
		||||
 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 | 
			
		||||
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
 | 
			
		||||
 * OF THE POSSIBILITY OF SUCH DAMAGE.
 | 
			
		||||
 * ====================================================================
 | 
			
		||||
 *
 | 
			
		||||
 * This product includes cryptographic software written by Eric Young
 | 
			
		||||
 * (eay@cryptsoft.com).  This product includes software written by Tim
 | 
			
		||||
 * Hudson (tjh@cryptsoft.com).
 | 
			
		||||
 *
 | 
			
		||||
 */
 | 
			
		||||
#include <openssl/opensslconf.h>
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_SRP
 | 
			
		||||
# include <stdio.h>
 | 
			
		||||
# include <stdlib.h>
 | 
			
		||||
# include <string.h>
 | 
			
		||||
# include <openssl/conf.h>
 | 
			
		||||
# include <openssl/bio.h>
 | 
			
		||||
# include <openssl/err.h>
 | 
			
		||||
# include <openssl/txt_db.h>
 | 
			
		||||
# include <openssl/buffer.h>
 | 
			
		||||
# include <openssl/srp.h>
 | 
			
		||||
 | 
			
		||||
# include "apps.h"
 | 
			
		||||
 | 
			
		||||
# undef PROG
 | 
			
		||||
# define PROG srp_main
 | 
			
		||||
 | 
			
		||||
# define BASE_SECTION    "srp"
 | 
			
		||||
# define CONFIG_FILE "openssl.cnf"
 | 
			
		||||
 | 
			
		||||
# define ENV_RANDFILE            "RANDFILE"
 | 
			
		||||
 | 
			
		||||
# define ENV_DATABASE            "srpvfile"
 | 
			
		||||
# define ENV_DEFAULT_SRP         "default_srp"
 | 
			
		||||
 | 
			
		||||
static char *srp_usage[] = {
 | 
			
		||||
    "usage: srp [args] [user] \n",
 | 
			
		||||
    "\n",
 | 
			
		||||
    " -verbose        Talk alot while doing things\n",
 | 
			
		||||
    " -config file    A config file\n",
 | 
			
		||||
    " -name arg       The particular srp definition to use\n",
 | 
			
		||||
    " -srpvfile arg   The srp verifier file name\n",
 | 
			
		||||
    " -add            add an user and srp verifier\n",
 | 
			
		||||
    " -modify         modify the srp verifier of an existing user\n",
 | 
			
		||||
    " -delete         delete user from verifier file\n",
 | 
			
		||||
    " -list           list user\n",
 | 
			
		||||
    " -gn arg         g and N values to be used for new verifier\n",
 | 
			
		||||
    " -userinfo arg   additional info to be set for user\n",
 | 
			
		||||
    " -passin arg     input file pass phrase source\n",
 | 
			
		||||
    " -passout arg    output file pass phrase source\n",
 | 
			
		||||
# ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
    " -engine e         - use engine e, possibly a hardware device.\n",
 | 
			
		||||
# endif
 | 
			
		||||
    NULL
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
# ifdef EFENCE
 | 
			
		||||
extern int EF_PROTECT_FREE;
 | 
			
		||||
extern int EF_PROTECT_BELOW;
 | 
			
		||||
extern int EF_ALIGNMENT;
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
static CONF *conf = NULL;
 | 
			
		||||
static char *section = NULL;
 | 
			
		||||
 | 
			
		||||
# define VERBOSE if (verbose)
 | 
			
		||||
# define VVERBOSE if (verbose>1)
 | 
			
		||||
 | 
			
		||||
int MAIN(int, char **);
 | 
			
		||||
 | 
			
		||||
static int get_index(CA_DB *db, char *id, char type)
 | 
			
		||||
{
 | 
			
		||||
    char **pp;
 | 
			
		||||
    int i;
 | 
			
		||||
    if (id == NULL)
 | 
			
		||||
        return -1;
 | 
			
		||||
    if (type == DB_SRP_INDEX)
 | 
			
		||||
        for (i = 0; i < sk_OPENSSL_PSTRING_num(db->db->data); i++) {
 | 
			
		||||
            pp = sk_OPENSSL_PSTRING_value(db->db->data, i);
 | 
			
		||||
            if (pp[DB_srptype][0] == DB_SRP_INDEX
 | 
			
		||||
                && !strcmp(id, pp[DB_srpid]))
 | 
			
		||||
                return i;
 | 
			
		||||
    } else
 | 
			
		||||
        for (i = 0; i < sk_OPENSSL_PSTRING_num(db->db->data); i++) {
 | 
			
		||||
            pp = sk_OPENSSL_PSTRING_value(db->db->data, i);
 | 
			
		||||
 | 
			
		||||
            if (pp[DB_srptype][0] != DB_SRP_INDEX
 | 
			
		||||
                && !strcmp(id, pp[DB_srpid]))
 | 
			
		||||
                return i;
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
    return -1;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static void print_entry(CA_DB *db, BIO *bio, int indx, int verbose, char *s)
 | 
			
		||||
{
 | 
			
		||||
    if (indx >= 0 && verbose) {
 | 
			
		||||
        int j;
 | 
			
		||||
        char **pp = sk_OPENSSL_PSTRING_value(db->db->data, indx);
 | 
			
		||||
        BIO_printf(bio, "%s \"%s\"\n", s, pp[DB_srpid]);
 | 
			
		||||
        for (j = 0; j < DB_NUMBER; j++) {
 | 
			
		||||
            BIO_printf(bio_err, "  %d = \"%s\"\n", j, pp[j]);
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static void print_index(CA_DB *db, BIO *bio, int indexindex, int verbose)
 | 
			
		||||
{
 | 
			
		||||
    print_entry(db, bio, indexindex, verbose, "g N entry");
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static void print_user(CA_DB *db, BIO *bio, int userindex, int verbose)
 | 
			
		||||
{
 | 
			
		||||
    if (verbose > 0) {
 | 
			
		||||
        char **pp = sk_OPENSSL_PSTRING_value(db->db->data, userindex);
 | 
			
		||||
 | 
			
		||||
        if (pp[DB_srptype][0] != 'I') {
 | 
			
		||||
            print_entry(db, bio, userindex, verbose, "User entry");
 | 
			
		||||
            print_entry(db, bio, get_index(db, pp[DB_srpgN], 'I'), verbose,
 | 
			
		||||
                        "g N entry");
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
    }
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static int update_index(CA_DB *db, BIO *bio, char **row)
 | 
			
		||||
{
 | 
			
		||||
    char **irow;
 | 
			
		||||
    int i;
 | 
			
		||||
 | 
			
		||||
    if ((irow =
 | 
			
		||||
         (char **)OPENSSL_malloc(sizeof(char *) * (DB_NUMBER + 1))) == NULL) {
 | 
			
		||||
        BIO_printf(bio_err, "Memory allocation failure\n");
 | 
			
		||||
        return 0;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    for (i = 0; i < DB_NUMBER; i++) {
 | 
			
		||||
        irow[i] = row[i];
 | 
			
		||||
        row[i] = NULL;
 | 
			
		||||
    }
 | 
			
		||||
    irow[DB_NUMBER] = NULL;
 | 
			
		||||
 | 
			
		||||
    if (!TXT_DB_insert(db->db, irow)) {
 | 
			
		||||
        BIO_printf(bio, "failed to update srpvfile\n");
 | 
			
		||||
        BIO_printf(bio, "TXT_DB error number %ld\n", db->db->error);
 | 
			
		||||
        OPENSSL_free(irow);
 | 
			
		||||
        return 0;
 | 
			
		||||
    }
 | 
			
		||||
    return 1;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static void lookup_fail(const char *name, char *tag)
 | 
			
		||||
{
 | 
			
		||||
    BIO_printf(bio_err, "variable lookup failed for %s::%s\n", name, tag);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static char *srp_verify_user(const char *user, const char *srp_verifier,
 | 
			
		||||
                             char *srp_usersalt, const char *g, const char *N,
 | 
			
		||||
                             const char *passin, BIO *bio, int verbose)
 | 
			
		||||
{
 | 
			
		||||
    char password[1024];
 | 
			
		||||
    PW_CB_DATA cb_tmp;
 | 
			
		||||
    char *verifier = NULL;
 | 
			
		||||
    char *gNid = NULL;
 | 
			
		||||
 | 
			
		||||
    cb_tmp.prompt_info = user;
 | 
			
		||||
    cb_tmp.password = passin;
 | 
			
		||||
 | 
			
		||||
    if (password_callback(password, 1024, 0, &cb_tmp) > 0) {
 | 
			
		||||
        VERBOSE BIO_printf(bio,
 | 
			
		||||
                           "Validating\n   user=\"%s\"\n srp_verifier=\"%s\"\n srp_usersalt=\"%s\"\n g=\"%s\"\n N=\"%s\"\n",
 | 
			
		||||
                           user, srp_verifier, srp_usersalt, g, N);
 | 
			
		||||
        BIO_printf(bio, "Pass %s\n", password);
 | 
			
		||||
 | 
			
		||||
        if (!
 | 
			
		||||
            (gNid =
 | 
			
		||||
             SRP_create_verifier(user, password, &srp_usersalt, &verifier, N,
 | 
			
		||||
                                 g))) {
 | 
			
		||||
            BIO_printf(bio, "Internal error validating SRP verifier\n");
 | 
			
		||||
        } else {
 | 
			
		||||
            if (strcmp(verifier, srp_verifier))
 | 
			
		||||
                gNid = NULL;
 | 
			
		||||
            OPENSSL_free(verifier);
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
    return gNid;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static char *srp_create_user(char *user, char **srp_verifier,
 | 
			
		||||
                             char **srp_usersalt, char *g, char *N,
 | 
			
		||||
                             char *passout, BIO *bio, int verbose)
 | 
			
		||||
{
 | 
			
		||||
    char password[1024];
 | 
			
		||||
    PW_CB_DATA cb_tmp;
 | 
			
		||||
    char *gNid = NULL;
 | 
			
		||||
    char *salt = NULL;
 | 
			
		||||
    cb_tmp.prompt_info = user;
 | 
			
		||||
    cb_tmp.password = passout;
 | 
			
		||||
 | 
			
		||||
    if (password_callback(password, 1024, 1, &cb_tmp) > 0) {
 | 
			
		||||
        VERBOSE BIO_printf(bio,
 | 
			
		||||
                           "Creating\n user=\"%s\"\n g=\"%s\"\n N=\"%s\"\n",
 | 
			
		||||
                           user, g, N);
 | 
			
		||||
        if (!
 | 
			
		||||
            (gNid =
 | 
			
		||||
             SRP_create_verifier(user, password, &salt, srp_verifier, N,
 | 
			
		||||
                                 g))) {
 | 
			
		||||
            BIO_printf(bio, "Internal error creating SRP verifier\n");
 | 
			
		||||
        } else
 | 
			
		||||
            *srp_usersalt = salt;
 | 
			
		||||
        VVERBOSE BIO_printf(bio, "gNid=%s salt =\"%s\"\n verifier =\"%s\"\n",
 | 
			
		||||
                            gNid, salt, *srp_verifier);
 | 
			
		||||
 | 
			
		||||
    }
 | 
			
		||||
    return gNid;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
int MAIN(int argc, char **argv)
 | 
			
		||||
{
 | 
			
		||||
    int add_user = 0;
 | 
			
		||||
    int list_user = 0;
 | 
			
		||||
    int delete_user = 0;
 | 
			
		||||
    int modify_user = 0;
 | 
			
		||||
    char *user = NULL;
 | 
			
		||||
 | 
			
		||||
    char *passargin = NULL, *passargout = NULL;
 | 
			
		||||
    char *passin = NULL, *passout = NULL;
 | 
			
		||||
    char *gN = NULL;
 | 
			
		||||
    int gNindex = -1;
 | 
			
		||||
    char **gNrow = NULL;
 | 
			
		||||
    int maxgN = -1;
 | 
			
		||||
 | 
			
		||||
    char *userinfo = NULL;
 | 
			
		||||
 | 
			
		||||
    int badops = 0;
 | 
			
		||||
    int ret = 1;
 | 
			
		||||
    int errors = 0;
 | 
			
		||||
    int verbose = 0;
 | 
			
		||||
    int doupdatedb = 0;
 | 
			
		||||
    char *configfile = NULL;
 | 
			
		||||
    char *dbfile = NULL;
 | 
			
		||||
    CA_DB *db = NULL;
 | 
			
		||||
    char **pp;
 | 
			
		||||
    int i;
 | 
			
		||||
    long errorline = -1;
 | 
			
		||||
    char *randfile = NULL;
 | 
			
		||||
# ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
    char *engine = NULL;
 | 
			
		||||
# endif
 | 
			
		||||
    char *tofree = NULL;
 | 
			
		||||
    DB_ATTR db_attr;
 | 
			
		||||
 | 
			
		||||
# ifdef EFENCE
 | 
			
		||||
    EF_PROTECT_FREE = 1;
 | 
			
		||||
    EF_PROTECT_BELOW = 1;
 | 
			
		||||
    EF_ALIGNMENT = 0;
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
    apps_startup();
 | 
			
		||||
 | 
			
		||||
    conf = NULL;
 | 
			
		||||
    section = NULL;
 | 
			
		||||
 | 
			
		||||
    if (bio_err == NULL)
 | 
			
		||||
        if ((bio_err = BIO_new(BIO_s_file())) != NULL)
 | 
			
		||||
            BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
 | 
			
		||||
 | 
			
		||||
    argc--;
 | 
			
		||||
    argv++;
 | 
			
		||||
    while (argc >= 1 && badops == 0) {
 | 
			
		||||
        if (strcmp(*argv, "-verbose") == 0)
 | 
			
		||||
            verbose++;
 | 
			
		||||
        else if (strcmp(*argv, "-config") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            configfile = *(++argv);
 | 
			
		||||
        } else if (strcmp(*argv, "-name") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            section = *(++argv);
 | 
			
		||||
        } else if (strcmp(*argv, "-srpvfile") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            dbfile = *(++argv);
 | 
			
		||||
        } else if (strcmp(*argv, "-add") == 0)
 | 
			
		||||
            add_user = 1;
 | 
			
		||||
        else if (strcmp(*argv, "-delete") == 0)
 | 
			
		||||
            delete_user = 1;
 | 
			
		||||
        else if (strcmp(*argv, "-modify") == 0)
 | 
			
		||||
            modify_user = 1;
 | 
			
		||||
        else if (strcmp(*argv, "-list") == 0)
 | 
			
		||||
            list_user = 1;
 | 
			
		||||
        else if (strcmp(*argv, "-gn") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            gN = *(++argv);
 | 
			
		||||
        } else if (strcmp(*argv, "-userinfo") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            userinfo = *(++argv);
 | 
			
		||||
        } else if (strcmp(*argv, "-passin") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            passargin = *(++argv);
 | 
			
		||||
        } else if (strcmp(*argv, "-passout") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            passargout = *(++argv);
 | 
			
		||||
        }
 | 
			
		||||
# ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
        else if (strcmp(*argv, "-engine") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            engine = *(++argv);
 | 
			
		||||
        }
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
        else if (**argv == '-') {
 | 
			
		||||
 bad:
 | 
			
		||||
            BIO_printf(bio_err, "unknown option %s\n", *argv);
 | 
			
		||||
            badops = 1;
 | 
			
		||||
            break;
 | 
			
		||||
        } else
 | 
			
		||||
            break;
 | 
			
		||||
 | 
			
		||||
        argc--;
 | 
			
		||||
        argv++;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (dbfile && configfile) {
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-dbfile and -configfile cannot be specified together.\n");
 | 
			
		||||
        badops = 1;
 | 
			
		||||
    }
 | 
			
		||||
    if (add_user + delete_user + modify_user + list_user != 1) {
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "Exactly one of the options -add, -delete, -modify -list must be specified.\n");
 | 
			
		||||
        badops = 1;
 | 
			
		||||
    }
 | 
			
		||||
    if (delete_user + modify_user + delete_user == 1 && argc <= 0) {
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "Need at least one user for options -add, -delete, -modify. \n");
 | 
			
		||||
        badops = 1;
 | 
			
		||||
    }
 | 
			
		||||
    if ((passin || passout) && argc != 1) {
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "-passin, -passout arguments only valid with one user.\n");
 | 
			
		||||
        badops = 1;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (badops) {
 | 
			
		||||
        for (pp = srp_usage; (*pp != NULL); pp++)
 | 
			
		||||
            BIO_printf(bio_err, "%s", *pp);
 | 
			
		||||
 | 
			
		||||
        BIO_printf(bio_err, " -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR,
 | 
			
		||||
                   LIST_SEPARATOR_CHAR);
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "                 load the file (or the files in the directory) into\n");
 | 
			
		||||
        BIO_printf(bio_err, "                 the random number generator\n");
 | 
			
		||||
        goto err;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    ERR_load_crypto_strings();
 | 
			
		||||
 | 
			
		||||
# ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
    setup_engine(bio_err, engine, 0);
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
    if (!app_passwd(bio_err, passargin, passargout, &passin, &passout)) {
 | 
			
		||||
        BIO_printf(bio_err, "Error getting passwords\n");
 | 
			
		||||
        goto err;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (!dbfile) {
 | 
			
		||||
 | 
			
		||||
        /*****************************************************************/
 | 
			
		||||
        tofree = NULL;
 | 
			
		||||
        if (configfile == NULL)
 | 
			
		||||
            configfile = getenv("OPENSSL_CONF");
 | 
			
		||||
        if (configfile == NULL)
 | 
			
		||||
            configfile = getenv("SSLEAY_CONF");
 | 
			
		||||
        if (configfile == NULL) {
 | 
			
		||||
            const char *s = X509_get_default_cert_area();
 | 
			
		||||
            size_t len;
 | 
			
		||||
 | 
			
		||||
# ifdef OPENSSL_SYS_VMS
 | 
			
		||||
            len = strlen(s) + sizeof(CONFIG_FILE);
 | 
			
		||||
            tofree = OPENSSL_malloc(len);
 | 
			
		||||
            if (!tofree) {
 | 
			
		||||
                BIO_printf(bio_err, "Out of memory\n");
 | 
			
		||||
                goto err;
 | 
			
		||||
            }
 | 
			
		||||
            strcpy(tofree, s);
 | 
			
		||||
# else
 | 
			
		||||
            len = strlen(s) + sizeof(CONFIG_FILE) + 1;
 | 
			
		||||
            tofree = OPENSSL_malloc(len);
 | 
			
		||||
            if (!tofree) {
 | 
			
		||||
                BIO_printf(bio_err, "Out of memory\n");
 | 
			
		||||
                goto err;
 | 
			
		||||
            }
 | 
			
		||||
            BUF_strlcpy(tofree, s, len);
 | 
			
		||||
            BUF_strlcat(tofree, "/", len);
 | 
			
		||||
# endif
 | 
			
		||||
            BUF_strlcat(tofree, CONFIG_FILE, len);
 | 
			
		||||
            configfile = tofree;
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        VERBOSE BIO_printf(bio_err, "Using configuration from %s\n",
 | 
			
		||||
                           configfile);
 | 
			
		||||
        conf = NCONF_new(NULL);
 | 
			
		||||
        if (NCONF_load(conf, configfile, &errorline) <= 0) {
 | 
			
		||||
            if (errorline <= 0)
 | 
			
		||||
                BIO_printf(bio_err, "error loading the config file '%s'\n",
 | 
			
		||||
                           configfile);
 | 
			
		||||
            else
 | 
			
		||||
                BIO_printf(bio_err, "error on line %ld of config file '%s'\n",
 | 
			
		||||
                           errorline, configfile);
 | 
			
		||||
            goto err;
 | 
			
		||||
        }
 | 
			
		||||
        if (tofree) {
 | 
			
		||||
            OPENSSL_free(tofree);
 | 
			
		||||
            tofree = NULL;
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        if (!load_config(bio_err, conf))
 | 
			
		||||
            goto err;
 | 
			
		||||
 | 
			
		||||
        /* Lets get the config section we are using */
 | 
			
		||||
        if (section == NULL) {
 | 
			
		||||
            VERBOSE BIO_printf(bio_err,
 | 
			
		||||
                               "trying to read " ENV_DEFAULT_SRP
 | 
			
		||||
                               " in \" BASE_SECTION \"\n");
 | 
			
		||||
 | 
			
		||||
            section = NCONF_get_string(conf, BASE_SECTION, ENV_DEFAULT_SRP);
 | 
			
		||||
            if (section == NULL) {
 | 
			
		||||
                lookup_fail(BASE_SECTION, ENV_DEFAULT_SRP);
 | 
			
		||||
                goto err;
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        if (randfile == NULL && conf)
 | 
			
		||||
            randfile = NCONF_get_string(conf, BASE_SECTION, "RANDFILE");
 | 
			
		||||
 | 
			
		||||
        VERBOSE BIO_printf(bio_err,
 | 
			
		||||
                           "trying to read " ENV_DATABASE
 | 
			
		||||
                           " in section \"%s\"\n", section);
 | 
			
		||||
 | 
			
		||||
        if ((dbfile = NCONF_get_string(conf, section, ENV_DATABASE)) == NULL) {
 | 
			
		||||
            lookup_fail(section, ENV_DATABASE);
 | 
			
		||||
            goto err;
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
    }
 | 
			
		||||
    if (randfile == NULL)
 | 
			
		||||
        ERR_clear_error();
 | 
			
		||||
    else
 | 
			
		||||
        app_RAND_load_file(randfile, bio_err, 0);
 | 
			
		||||
 | 
			
		||||
    VERBOSE BIO_printf(bio_err, "Trying to read SRP verifier file \"%s\"\n",
 | 
			
		||||
                       dbfile);
 | 
			
		||||
 | 
			
		||||
    db = load_index(dbfile, &db_attr);
 | 
			
		||||
    if (db == NULL)
 | 
			
		||||
        goto err;
 | 
			
		||||
 | 
			
		||||
    /* Lets check some fields */
 | 
			
		||||
    for (i = 0; i < sk_OPENSSL_PSTRING_num(db->db->data); i++) {
 | 
			
		||||
        pp = sk_OPENSSL_PSTRING_value(db->db->data, i);
 | 
			
		||||
 | 
			
		||||
        if (pp[DB_srptype][0] == DB_SRP_INDEX) {
 | 
			
		||||
            maxgN = i;
 | 
			
		||||
            if (gNindex < 0 && gN != NULL && !strcmp(gN, pp[DB_srpid]))
 | 
			
		||||
                gNindex = i;
 | 
			
		||||
 | 
			
		||||
            print_index(db, bio_err, i, verbose > 1);
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    VERBOSE BIO_printf(bio_err, "Database initialised\n");
 | 
			
		||||
 | 
			
		||||
    if (gNindex >= 0) {
 | 
			
		||||
        gNrow = sk_OPENSSL_PSTRING_value(db->db->data, gNindex);
 | 
			
		||||
        print_entry(db, bio_err, gNindex, verbose > 1, "Default g and N");
 | 
			
		||||
    } else if (maxgN > 0 && !SRP_get_default_gN(gN)) {
 | 
			
		||||
        BIO_printf(bio_err, "No g and N value for index \"%s\"\n", gN);
 | 
			
		||||
        goto err;
 | 
			
		||||
    } else {
 | 
			
		||||
        VERBOSE BIO_printf(bio_err, "Database has no g N information.\n");
 | 
			
		||||
        gNrow = NULL;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    VVERBOSE BIO_printf(bio_err, "Starting user processing\n");
 | 
			
		||||
 | 
			
		||||
    if (argc > 0)
 | 
			
		||||
        user = *(argv++);
 | 
			
		||||
 | 
			
		||||
    while (list_user || user) {
 | 
			
		||||
        int userindex = -1;
 | 
			
		||||
        if (user)
 | 
			
		||||
            VVERBOSE BIO_printf(bio_err, "Processing user \"%s\"\n", user);
 | 
			
		||||
        if ((userindex = get_index(db, user, 'U')) >= 0) {
 | 
			
		||||
            print_user(db, bio_err, userindex, (verbose > 0) || list_user);
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        if (list_user) {
 | 
			
		||||
            if (user == NULL) {
 | 
			
		||||
                BIO_printf(bio_err, "List all users\n");
 | 
			
		||||
 | 
			
		||||
                for (i = 0; i < sk_OPENSSL_PSTRING_num(db->db->data); i++) {
 | 
			
		||||
                    print_user(db, bio_err, i, 1);
 | 
			
		||||
                }
 | 
			
		||||
                list_user = 0;
 | 
			
		||||
            } else if (userindex < 0) {
 | 
			
		||||
                BIO_printf(bio_err,
 | 
			
		||||
                           "user \"%s\" does not exist, ignored. t\n", user);
 | 
			
		||||
                errors++;
 | 
			
		||||
            }
 | 
			
		||||
        } else if (add_user) {
 | 
			
		||||
            if (userindex >= 0) {
 | 
			
		||||
                /* reactivation of a new user */
 | 
			
		||||
                char **row =
 | 
			
		||||
                    sk_OPENSSL_PSTRING_value(db->db->data, userindex);
 | 
			
		||||
                BIO_printf(bio_err, "user \"%s\" reactivated.\n", user);
 | 
			
		||||
                row[DB_srptype][0] = 'V';
 | 
			
		||||
 | 
			
		||||
                doupdatedb = 1;
 | 
			
		||||
            } else {
 | 
			
		||||
                char *row[DB_NUMBER];
 | 
			
		||||
                char *gNid;
 | 
			
		||||
                row[DB_srpverifier] = NULL;
 | 
			
		||||
                row[DB_srpsalt] = NULL;
 | 
			
		||||
                row[DB_srpinfo] = NULL;
 | 
			
		||||
                if (!
 | 
			
		||||
                    (gNid =
 | 
			
		||||
                     srp_create_user(user, &(row[DB_srpverifier]),
 | 
			
		||||
                                     &(row[DB_srpsalt]),
 | 
			
		||||
                                     gNrow ? gNrow[DB_srpsalt] : gN,
 | 
			
		||||
                                     gNrow ? gNrow[DB_srpverifier] : NULL,
 | 
			
		||||
                                     passout, bio_err, verbose))) {
 | 
			
		||||
                    BIO_printf(bio_err,
 | 
			
		||||
                               "Cannot create srp verifier for user \"%s\", operation abandoned .\n",
 | 
			
		||||
                               user);
 | 
			
		||||
                    errors++;
 | 
			
		||||
                    goto err;
 | 
			
		||||
                }
 | 
			
		||||
                row[DB_srpid] = BUF_strdup(user);
 | 
			
		||||
                row[DB_srptype] = BUF_strdup("v");
 | 
			
		||||
                row[DB_srpgN] = BUF_strdup(gNid);
 | 
			
		||||
 | 
			
		||||
                if (!row[DB_srpid] || !row[DB_srpgN] || !row[DB_srptype]
 | 
			
		||||
                    || !row[DB_srpverifier] || !row[DB_srpsalt] || (userinfo
 | 
			
		||||
                                                                    &&
 | 
			
		||||
                                                                    (!(row
 | 
			
		||||
                                                                       [DB_srpinfo]
 | 
			
		||||
                                                                       =
 | 
			
		||||
                                                                       BUF_strdup
 | 
			
		||||
                                                                       (userinfo))))
 | 
			
		||||
                    || !update_index(db, bio_err, row)) {
 | 
			
		||||
                    if (row[DB_srpid])
 | 
			
		||||
                        OPENSSL_free(row[DB_srpid]);
 | 
			
		||||
                    if (row[DB_srpgN])
 | 
			
		||||
                        OPENSSL_free(row[DB_srpgN]);
 | 
			
		||||
                    if (row[DB_srpinfo])
 | 
			
		||||
                        OPENSSL_free(row[DB_srpinfo]);
 | 
			
		||||
                    if (row[DB_srptype])
 | 
			
		||||
                        OPENSSL_free(row[DB_srptype]);
 | 
			
		||||
                    if (row[DB_srpverifier])
 | 
			
		||||
                        OPENSSL_free(row[DB_srpverifier]);
 | 
			
		||||
                    if (row[DB_srpsalt])
 | 
			
		||||
                        OPENSSL_free(row[DB_srpsalt]);
 | 
			
		||||
                    goto err;
 | 
			
		||||
                }
 | 
			
		||||
                doupdatedb = 1;
 | 
			
		||||
            }
 | 
			
		||||
        } else if (modify_user) {
 | 
			
		||||
            if (userindex < 0) {
 | 
			
		||||
                BIO_printf(bio_err,
 | 
			
		||||
                           "user \"%s\" does not exist, operation ignored.\n",
 | 
			
		||||
                           user);
 | 
			
		||||
                errors++;
 | 
			
		||||
            } else {
 | 
			
		||||
 | 
			
		||||
                char **row =
 | 
			
		||||
                    sk_OPENSSL_PSTRING_value(db->db->data, userindex);
 | 
			
		||||
                char type = row[DB_srptype][0];
 | 
			
		||||
                if (type == 'v') {
 | 
			
		||||
                    BIO_printf(bio_err,
 | 
			
		||||
                               "user \"%s\" already updated, operation ignored.\n",
 | 
			
		||||
                               user);
 | 
			
		||||
                    errors++;
 | 
			
		||||
                } else {
 | 
			
		||||
                    char *gNid;
 | 
			
		||||
 | 
			
		||||
                    if (row[DB_srptype][0] == 'V') {
 | 
			
		||||
                        int user_gN;
 | 
			
		||||
                        char **irow = NULL;
 | 
			
		||||
                        VERBOSE BIO_printf(bio_err,
 | 
			
		||||
                                           "Verifying password for user \"%s\"\n",
 | 
			
		||||
                                           user);
 | 
			
		||||
                        if ((user_gN =
 | 
			
		||||
                             get_index(db, row[DB_srpgN], DB_SRP_INDEX)) >= 0)
 | 
			
		||||
                            irow =
 | 
			
		||||
                                (char **)sk_OPENSSL_PSTRING_value(db->
 | 
			
		||||
                                                                  db->data,
 | 
			
		||||
                                                                  userindex);
 | 
			
		||||
 | 
			
		||||
                        if (!srp_verify_user
 | 
			
		||||
                            (user, row[DB_srpverifier], row[DB_srpsalt],
 | 
			
		||||
                             irow ? irow[DB_srpsalt] : row[DB_srpgN],
 | 
			
		||||
                             irow ? irow[DB_srpverifier] : NULL, passin,
 | 
			
		||||
                             bio_err, verbose)) {
 | 
			
		||||
                            BIO_printf(bio_err,
 | 
			
		||||
                                       "Invalid password for user \"%s\", operation abandoned.\n",
 | 
			
		||||
                                       user);
 | 
			
		||||
                            errors++;
 | 
			
		||||
                            goto err;
 | 
			
		||||
                        }
 | 
			
		||||
                    }
 | 
			
		||||
                    VERBOSE BIO_printf(bio_err,
 | 
			
		||||
                                       "Password for user \"%s\" ok.\n",
 | 
			
		||||
                                       user);
 | 
			
		||||
 | 
			
		||||
                    if (!
 | 
			
		||||
                        (gNid =
 | 
			
		||||
                         srp_create_user(user, &(row[DB_srpverifier]),
 | 
			
		||||
                                         &(row[DB_srpsalt]),
 | 
			
		||||
                                         gNrow ? gNrow[DB_srpsalt] : NULL,
 | 
			
		||||
                                         gNrow ? gNrow[DB_srpverifier] : NULL,
 | 
			
		||||
                                         passout, bio_err, verbose))) {
 | 
			
		||||
                        BIO_printf(bio_err,
 | 
			
		||||
                                   "Cannot create srp verifier for user \"%s\", operation abandoned.\n",
 | 
			
		||||
                                   user);
 | 
			
		||||
                        errors++;
 | 
			
		||||
                        goto err;
 | 
			
		||||
                    }
 | 
			
		||||
 | 
			
		||||
                    row[DB_srptype][0] = 'v';
 | 
			
		||||
                    row[DB_srpgN] = BUF_strdup(gNid);
 | 
			
		||||
 | 
			
		||||
                    if (!row[DB_srpid] || !row[DB_srpgN] || !row[DB_srptype]
 | 
			
		||||
                        || !row[DB_srpverifier] || !row[DB_srpsalt]
 | 
			
		||||
                        || (userinfo
 | 
			
		||||
                            && (!(row[DB_srpinfo] = BUF_strdup(userinfo)))))
 | 
			
		||||
                        goto err;
 | 
			
		||||
 | 
			
		||||
                    doupdatedb = 1;
 | 
			
		||||
                }
 | 
			
		||||
            }
 | 
			
		||||
        } else if (delete_user) {
 | 
			
		||||
            if (userindex < 0) {
 | 
			
		||||
                BIO_printf(bio_err,
 | 
			
		||||
                           "user \"%s\" does not exist, operation ignored. t\n",
 | 
			
		||||
                           user);
 | 
			
		||||
                errors++;
 | 
			
		||||
            } else {
 | 
			
		||||
                char **xpp =
 | 
			
		||||
                    sk_OPENSSL_PSTRING_value(db->db->data, userindex);
 | 
			
		||||
                BIO_printf(bio_err, "user \"%s\" revoked. t\n", user);
 | 
			
		||||
 | 
			
		||||
                xpp[DB_srptype][0] = 'R';
 | 
			
		||||
 | 
			
		||||
                doupdatedb = 1;
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
        if (--argc > 0)
 | 
			
		||||
            user = *(argv++);
 | 
			
		||||
        else {
 | 
			
		||||
            user = NULL;
 | 
			
		||||
            list_user = 0;
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    VERBOSE BIO_printf(bio_err, "User procession done.\n");
 | 
			
		||||
 | 
			
		||||
    if (doupdatedb) {
 | 
			
		||||
        /* Lets check some fields */
 | 
			
		||||
        for (i = 0; i < sk_OPENSSL_PSTRING_num(db->db->data); i++) {
 | 
			
		||||
            pp = sk_OPENSSL_PSTRING_value(db->db->data, i);
 | 
			
		||||
 | 
			
		||||
            if (pp[DB_srptype][0] == 'v') {
 | 
			
		||||
                pp[DB_srptype][0] = 'V';
 | 
			
		||||
                print_user(db, bio_err, i, verbose);
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        VERBOSE BIO_printf(bio_err, "Trying to update srpvfile.\n");
 | 
			
		||||
        if (!save_index(dbfile, "new", db))
 | 
			
		||||
            goto err;
 | 
			
		||||
 | 
			
		||||
        VERBOSE BIO_printf(bio_err, "Temporary srpvfile created.\n");
 | 
			
		||||
        if (!rotate_index(dbfile, "new", "old"))
 | 
			
		||||
            goto err;
 | 
			
		||||
 | 
			
		||||
        VERBOSE BIO_printf(bio_err, "srpvfile updated.\n");
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    ret = (errors != 0);
 | 
			
		||||
 err:
 | 
			
		||||
    if (errors != 0)
 | 
			
		||||
        VERBOSE BIO_printf(bio_err, "User errors %d.\n", errors);
 | 
			
		||||
 | 
			
		||||
    VERBOSE BIO_printf(bio_err, "SRP terminating with code %d.\n", ret);
 | 
			
		||||
    if (tofree)
 | 
			
		||||
        OPENSSL_free(tofree);
 | 
			
		||||
    if (ret)
 | 
			
		||||
        ERR_print_errors(bio_err);
 | 
			
		||||
    if (randfile)
 | 
			
		||||
        app_RAND_write_file(randfile, bio_err);
 | 
			
		||||
    if (conf)
 | 
			
		||||
        NCONF_free(conf);
 | 
			
		||||
    if (db)
 | 
			
		||||
        free_index(db);
 | 
			
		||||
 | 
			
		||||
    OBJ_cleanup();
 | 
			
		||||
    apps_shutdown();
 | 
			
		||||
    OPENSSL_EXIT(ret);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
#endif
 | 
			
		||||
							
								
								
									
										196
									
								
								apps/tsget
									
									
									
									
									
								
							
							
						
						
									
										196
									
								
								apps/tsget
									
									
									
									
									
								
							@@ -1,196 +0,0 @@
 | 
			
		||||
#!/usr/bin/perl -w
 | 
			
		||||
# Written by Zoltan Glozik <zglozik@stones.com>.
 | 
			
		||||
# Copyright (c) 2002 The OpenTSA Project.  All rights reserved.
 | 
			
		||||
$::version = '$Id: tsget,v 1.1.2.2 2009/09/07 17:57:02 steve Exp $';
 | 
			
		||||
 | 
			
		||||
use strict;
 | 
			
		||||
use IO::Handle;
 | 
			
		||||
use Getopt::Std;
 | 
			
		||||
use File::Basename;
 | 
			
		||||
use WWW::Curl::Easy;
 | 
			
		||||
 | 
			
		||||
use vars qw(%options);
 | 
			
		||||
 | 
			
		||||
# Callback for reading the body.
 | 
			
		||||
sub read_body {
 | 
			
		||||
    my ($maxlength, $state) = @_;
 | 
			
		||||
    my $return_data = "";
 | 
			
		||||
    my $data_len = length ${$state->{data}};
 | 
			
		||||
    if ($state->{bytes} < $data_len) {
 | 
			
		||||
	$data_len = $data_len - $state->{bytes};
 | 
			
		||||
	$data_len = $maxlength if $data_len > $maxlength;
 | 
			
		||||
	$return_data = substr ${$state->{data}}, $state->{bytes}, $data_len;
 | 
			
		||||
	$state->{bytes} += $data_len;
 | 
			
		||||
    }
 | 
			
		||||
    return $return_data;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# Callback for writing the body into a variable.
 | 
			
		||||
sub write_body {
 | 
			
		||||
    my ($data, $pointer) = @_;
 | 
			
		||||
    ${$pointer} .= $data;
 | 
			
		||||
    return length($data);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# Initialise a new Curl object.
 | 
			
		||||
sub create_curl {
 | 
			
		||||
    my $url = shift;
 | 
			
		||||
 | 
			
		||||
    # Create Curl object.
 | 
			
		||||
    my $curl = WWW::Curl::Easy::new();
 | 
			
		||||
 | 
			
		||||
    # Error-handling related options.
 | 
			
		||||
    $curl->setopt(CURLOPT_VERBOSE, 1) if $options{d};
 | 
			
		||||
    $curl->setopt(CURLOPT_FAILONERROR, 1);
 | 
			
		||||
    $curl->setopt(CURLOPT_USERAGENT, "OpenTSA tsget.pl/" . (split / /, $::version)[2]);
 | 
			
		||||
 | 
			
		||||
    # Options for POST method.
 | 
			
		||||
    $curl->setopt(CURLOPT_UPLOAD, 1);
 | 
			
		||||
    $curl->setopt(CURLOPT_CUSTOMREQUEST, "POST");
 | 
			
		||||
    $curl->setopt(CURLOPT_HTTPHEADER,
 | 
			
		||||
		["Content-Type: application/timestamp-query",
 | 
			
		||||
		"Accept: application/timestamp-reply,application/timestamp-response"]);
 | 
			
		||||
    $curl->setopt(CURLOPT_READFUNCTION, \&read_body);
 | 
			
		||||
    $curl->setopt(CURLOPT_HEADERFUNCTION, sub { return length($_[0]); });
 | 
			
		||||
 | 
			
		||||
    # Options for getting the result.
 | 
			
		||||
    $curl->setopt(CURLOPT_WRITEFUNCTION, \&write_body);
 | 
			
		||||
 | 
			
		||||
    # SSL related options.
 | 
			
		||||
    $curl->setopt(CURLOPT_SSLKEYTYPE, "PEM");
 | 
			
		||||
    $curl->setopt(CURLOPT_SSL_VERIFYPEER, 1);	# Verify server's certificate.
 | 
			
		||||
    $curl->setopt(CURLOPT_SSL_VERIFYHOST, 2);	# Check server's CN.
 | 
			
		||||
    $curl->setopt(CURLOPT_SSLKEY, $options{k}) if defined($options{k});
 | 
			
		||||
    $curl->setopt(CURLOPT_SSLKEYPASSWD, $options{p}) if defined($options{p});
 | 
			
		||||
    $curl->setopt(CURLOPT_SSLCERT, $options{c}) if defined($options{c});
 | 
			
		||||
    $curl->setopt(CURLOPT_CAINFO, $options{C}) if defined($options{C});
 | 
			
		||||
    $curl->setopt(CURLOPT_CAPATH, $options{P}) if defined($options{P});
 | 
			
		||||
    $curl->setopt(CURLOPT_RANDOM_FILE, $options{r}) if defined($options{r});
 | 
			
		||||
    $curl->setopt(CURLOPT_EGDSOCKET, $options{g}) if defined($options{g});
 | 
			
		||||
 | 
			
		||||
    # Setting destination.
 | 
			
		||||
    $curl->setopt(CURLOPT_URL, $url);
 | 
			
		||||
 | 
			
		||||
    return $curl;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# Send a request and returns the body back.
 | 
			
		||||
sub get_timestamp {
 | 
			
		||||
    my $curl = shift;
 | 
			
		||||
    my $body = shift;
 | 
			
		||||
    my $ts_body;
 | 
			
		||||
    local $::error_buf;
 | 
			
		||||
 | 
			
		||||
    # Error-handling related options.
 | 
			
		||||
    $curl->setopt(CURLOPT_ERRORBUFFER, "::error_buf");
 | 
			
		||||
 | 
			
		||||
    # Options for POST method.
 | 
			
		||||
    $curl->setopt(CURLOPT_INFILE, {data => $body, bytes => 0});
 | 
			
		||||
    $curl->setopt(CURLOPT_INFILESIZE, length(${$body}));
 | 
			
		||||
 | 
			
		||||
    # Options for getting the result.
 | 
			
		||||
    $curl->setopt(CURLOPT_FILE, \$ts_body);
 | 
			
		||||
 | 
			
		||||
    # Send the request...
 | 
			
		||||
    my $error_code = $curl->perform();
 | 
			
		||||
    my $error_string;
 | 
			
		||||
    if ($error_code != 0) {
 | 
			
		||||
        my $http_code = $curl->getinfo(CURLINFO_HTTP_CODE);
 | 
			
		||||
	$error_string = "could not get timestamp";
 | 
			
		||||
	$error_string .= ", http code: $http_code" unless $http_code == 0;
 | 
			
		||||
	$error_string .= ", curl code: $error_code";
 | 
			
		||||
	$error_string .= " ($::error_buf)" if defined($::error_buf);
 | 
			
		||||
    } else {
 | 
			
		||||
        my $ct = $curl->getinfo(CURLINFO_CONTENT_TYPE);
 | 
			
		||||
	if (lc($ct) ne "application/timestamp-reply"
 | 
			
		||||
	    && lc($ct) ne "application/timestamp-response") {
 | 
			
		||||
	    $error_string = "unexpected content type returned: $ct";
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
    return ($ts_body, $error_string);
 | 
			
		||||
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# Print usage information and exists.
 | 
			
		||||
sub usage {
 | 
			
		||||
 | 
			
		||||
    print STDERR "usage: $0 -h <server_url> [-e <extension>] [-o <output>] ";
 | 
			
		||||
    print STDERR "[-v] [-d] [-k <private_key.pem>] [-p <key_password>] ";
 | 
			
		||||
    print STDERR "[-c <client_cert.pem>] [-C <CA_certs.pem>] [-P <CA_path>] ";
 | 
			
		||||
    print STDERR "[-r <file:file...>] [-g <EGD_socket>] [<request>]...\n";
 | 
			
		||||
    exit 1;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# ----------------------------------------------------------------------
 | 
			
		||||
#   Main program
 | 
			
		||||
# ----------------------------------------------------------------------
 | 
			
		||||
 | 
			
		||||
# Getting command-line options (default comes from TSGET environment variable).
 | 
			
		||||
my $getopt_arg =  "h:e:o:vdk:p:c:C:P:r:g:";
 | 
			
		||||
if (exists $ENV{TSGET}) {
 | 
			
		||||
    my @old_argv = @ARGV;
 | 
			
		||||
    @ARGV = split /\s+/, $ENV{TSGET};
 | 
			
		||||
    getopts($getopt_arg, \%options) or usage;
 | 
			
		||||
    @ARGV = @old_argv;
 | 
			
		||||
}
 | 
			
		||||
getopts($getopt_arg, \%options) or usage;
 | 
			
		||||
 | 
			
		||||
# Checking argument consistency.
 | 
			
		||||
if (!exists($options{h}) || (@ARGV == 0 && !exists($options{o}))
 | 
			
		||||
    || (@ARGV > 1 && exists($options{o}))) {
 | 
			
		||||
    print STDERR "Inconsistent command line options.\n";
 | 
			
		||||
    usage;
 | 
			
		||||
}
 | 
			
		||||
# Setting defaults.
 | 
			
		||||
@ARGV = ("-") unless @ARGV != 0;
 | 
			
		||||
$options{e} = ".tsr" unless defined($options{e});
 | 
			
		||||
 | 
			
		||||
# Processing requests.
 | 
			
		||||
my $curl = create_curl $options{h};
 | 
			
		||||
undef $/;   # For reading whole files.
 | 
			
		||||
REQUEST: foreach (@ARGV) {
 | 
			
		||||
    my $input = $_;
 | 
			
		||||
    my ($base, $path) = fileparse($input, '\.[^.]*');
 | 
			
		||||
    my $output_base = $base . $options{e};
 | 
			
		||||
    my $output = defined($options{o}) ? $options{o} : $path . $output_base;
 | 
			
		||||
 | 
			
		||||
    STDERR->printflush("$input: ") if $options{v};
 | 
			
		||||
    # Read request.
 | 
			
		||||
    my $body;
 | 
			
		||||
    if ($input eq "-") {
 | 
			
		||||
	# Read the request from STDIN;
 | 
			
		||||
	$body = <STDIN>;
 | 
			
		||||
    } else {
 | 
			
		||||
	# Read the request from file.
 | 
			
		||||
        open INPUT, "<" . $input
 | 
			
		||||
	    or warn("$input: could not open input file: $!\n"), next REQUEST;
 | 
			
		||||
        $body = <INPUT>;
 | 
			
		||||
        close INPUT
 | 
			
		||||
	    or warn("$input: could not close input file: $!\n"), next REQUEST;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    # Send request.
 | 
			
		||||
    STDERR->printflush("sending request") if $options{v};
 | 
			
		||||
 | 
			
		||||
    my ($ts_body, $error) = get_timestamp $curl, \$body;
 | 
			
		||||
    if (defined($error)) {
 | 
			
		||||
	die "$input: fatal error: $error\n";
 | 
			
		||||
    }
 | 
			
		||||
    STDERR->printflush(", reply received") if $options{v};
 | 
			
		||||
 | 
			
		||||
    # Write response.
 | 
			
		||||
    if ($output eq "-") {
 | 
			
		||||
	# Write to STDOUT.
 | 
			
		||||
        print $ts_body;
 | 
			
		||||
    } else {
 | 
			
		||||
	# Write to file.
 | 
			
		||||
        open OUTPUT, ">", $output
 | 
			
		||||
	    or warn("$output: could not open output file: $!\n"), next REQUEST;
 | 
			
		||||
        print OUTPUT $ts_body;
 | 
			
		||||
        close OUTPUT
 | 
			
		||||
	    or warn("$output: could not close output file: $!\n"), next REQUEST;
 | 
			
		||||
    }
 | 
			
		||||
    STDERR->printflush(", $output written.\n") if $options{v};
 | 
			
		||||
}
 | 
			
		||||
$curl->cleanup();
 | 
			
		||||
WWW::Curl::Easy::global_cleanup();
 | 
			
		||||
							
								
								
									
										184
									
								
								apps/verify.c
									
									
									
									
									
								
							
							
						
						
									
										184
									
								
								apps/verify.c
									
									
									
									
									
								
							@@ -70,9 +70,9 @@
 | 
			
		||||
#define PROG    verify_main
 | 
			
		||||
 | 
			
		||||
static int MS_CALLBACK cb(int ok, X509_STORE_CTX *ctx);
 | 
			
		||||
static int check(X509_STORE *ctx, char *file,
 | 
			
		||||
                 STACK_OF(X509) *uchain, STACK_OF(X509) *tchain,
 | 
			
		||||
                 STACK_OF(X509_CRL) *crls, ENGINE *e);
 | 
			
		||||
static int check(X509_STORE *ctx, char *file, STACK_OF(X509) *uchain,
 | 
			
		||||
                 STACK_OF(X509) *tchain, int purpose, ENGINE *e);
 | 
			
		||||
static STACK_OF(X509) *load_untrusted(char *file);
 | 
			
		||||
static int v_verbose = 0, vflags = 0;
 | 
			
		||||
 | 
			
		||||
int MAIN(int, char **);
 | 
			
		||||
@@ -81,14 +81,13 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
{
 | 
			
		||||
    ENGINE *e = NULL;
 | 
			
		||||
    int i, ret = 1, badarg = 0;
 | 
			
		||||
    int purpose = -1;
 | 
			
		||||
    char *CApath = NULL, *CAfile = NULL;
 | 
			
		||||
    char *untfile = NULL, *trustfile = NULL, *crlfile = NULL;
 | 
			
		||||
    char *untfile = NULL, *trustfile = NULL;
 | 
			
		||||
    STACK_OF(X509) *untrusted = NULL, *trusted = NULL;
 | 
			
		||||
    STACK_OF(X509_CRL) *crls = NULL;
 | 
			
		||||
    X509_STORE *cert_ctx = NULL;
 | 
			
		||||
    X509_LOOKUP *lookup = NULL;
 | 
			
		||||
    X509_VERIFY_PARAM *vpm = NULL;
 | 
			
		||||
    int crl_download = 0;
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
    char *engine = NULL;
 | 
			
		||||
#endif
 | 
			
		||||
@@ -96,7 +95,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    cert_ctx = X509_STORE_new();
 | 
			
		||||
    if (cert_ctx == NULL)
 | 
			
		||||
        goto end;
 | 
			
		||||
    X509_STORE_set_verify_cb(cert_ctx, cb);
 | 
			
		||||
    X509_STORE_set_verify_cb_func(cert_ctx, cb);
 | 
			
		||||
 | 
			
		||||
    ERR_load_crypto_strings();
 | 
			
		||||
 | 
			
		||||
@@ -133,12 +132,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                if (argc-- < 1)
 | 
			
		||||
                    goto end;
 | 
			
		||||
                trustfile = *(++argv);
 | 
			
		||||
            } else if (strcmp(*argv, "-CRLfile") == 0) {
 | 
			
		||||
                if (argc-- < 1)
 | 
			
		||||
                    goto end;
 | 
			
		||||
                crlfile = *(++argv);
 | 
			
		||||
            } else if (strcmp(*argv, "-crl_download") == 0)
 | 
			
		||||
                crl_download = 1;
 | 
			
		||||
            }
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
            else if (strcmp(*argv, "-engine") == 0) {
 | 
			
		||||
                if (--argc < 1)
 | 
			
		||||
@@ -196,48 +190,36 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    ERR_clear_error();
 | 
			
		||||
 | 
			
		||||
    if (untfile) {
 | 
			
		||||
        untrusted = load_certs(bio_err, untfile, FORMAT_PEM,
 | 
			
		||||
                               NULL, e, "untrusted certificates");
 | 
			
		||||
        if (!untrusted)
 | 
			
		||||
        if (!(untrusted = load_untrusted(untfile))) {
 | 
			
		||||
            BIO_printf(bio_err, "Error loading untrusted file %s\n", untfile);
 | 
			
		||||
            ERR_print_errors(bio_err);
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (trustfile) {
 | 
			
		||||
        trusted = load_certs(bio_err, trustfile, FORMAT_PEM,
 | 
			
		||||
                             NULL, e, "trusted certificates");
 | 
			
		||||
        if (!trusted)
 | 
			
		||||
        if (!(trusted = load_untrusted(trustfile))) {
 | 
			
		||||
            BIO_printf(bio_err, "Error loading untrusted file %s\n",
 | 
			
		||||
                       trustfile);
 | 
			
		||||
            ERR_print_errors(bio_err);
 | 
			
		||||
            goto end;
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (crlfile) {
 | 
			
		||||
        crls = load_crls(bio_err, crlfile, FORMAT_PEM, NULL, e, "other CRLs");
 | 
			
		||||
        if (!crls)
 | 
			
		||||
            goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    ret = 0;
 | 
			
		||||
 | 
			
		||||
    if (crl_download)
 | 
			
		||||
        store_setup_crl_download(cert_ctx);
 | 
			
		||||
    if (argc < 1) {
 | 
			
		||||
        if (1 != check(cert_ctx, NULL, untrusted, trusted, crls, e))
 | 
			
		||||
            ret = -1;
 | 
			
		||||
    } else {
 | 
			
		||||
    if (argc < 1)
 | 
			
		||||
        check(cert_ctx, NULL, untrusted, trusted, purpose, e);
 | 
			
		||||
    else
 | 
			
		||||
        for (i = 0; i < argc; i++)
 | 
			
		||||
            if (1 != check(cert_ctx, argv[i], untrusted, trusted, crls, e))
 | 
			
		||||
                ret = -1;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
            check(cert_ctx, argv[i], untrusted, trusted, purpose, e);
 | 
			
		||||
    ret = 0;
 | 
			
		||||
 end:
 | 
			
		||||
    if (ret == 1) {
 | 
			
		||||
        BIO_printf(bio_err,
 | 
			
		||||
                   "usage: verify [-verbose] [-CApath path] [-CAfile file] [-purpose purpose] [-crl_check]");
 | 
			
		||||
        BIO_printf(bio_err, " [-no_alt_chains] [-attime timestamp]");
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
        BIO_printf(bio_err, " [-engine e]");
 | 
			
		||||
#endif
 | 
			
		||||
        BIO_printf(bio_err, " cert1 cert2 ...\n");
 | 
			
		||||
 | 
			
		||||
        BIO_printf(bio_err, "recognized usages:\n");
 | 
			
		||||
        for (i = 0; i < X509_PURPOSE_get_count(); i++) {
 | 
			
		||||
            X509_PURPOSE *ptmp;
 | 
			
		||||
@@ -253,14 +235,12 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        X509_STORE_free(cert_ctx);
 | 
			
		||||
    sk_X509_pop_free(untrusted, X509_free);
 | 
			
		||||
    sk_X509_pop_free(trusted, X509_free);
 | 
			
		||||
    sk_X509_CRL_pop_free(crls, X509_CRL_free);
 | 
			
		||||
    apps_shutdown();
 | 
			
		||||
    OPENSSL_EXIT(ret < 0 ? 2 : ret);
 | 
			
		||||
    OPENSSL_EXIT(ret);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static int check(X509_STORE *ctx, char *file,
 | 
			
		||||
                 STACK_OF(X509) *uchain, STACK_OF(X509) *tchain,
 | 
			
		||||
                 STACK_OF(X509_CRL) *crls, ENGINE *e)
 | 
			
		||||
static int check(X509_STORE *ctx, char *file, STACK_OF(X509) *uchain,
 | 
			
		||||
                 STACK_OF(X509) *tchain, int purpose, ENGINE *e)
 | 
			
		||||
{
 | 
			
		||||
    X509 *x = NULL;
 | 
			
		||||
    int i = 0, ret = 0;
 | 
			
		||||
@@ -283,8 +263,8 @@ static int check(X509_STORE *ctx, char *file,
 | 
			
		||||
    }
 | 
			
		||||
    if (tchain)
 | 
			
		||||
        X509_STORE_CTX_trusted_stack(csc, tchain);
 | 
			
		||||
    if (crls)
 | 
			
		||||
        X509_STORE_CTX_set0_crls(csc, crls);
 | 
			
		||||
    if (purpose >= 0)
 | 
			
		||||
        X509_STORE_CTX_set_purpose(csc, purpose);
 | 
			
		||||
    i = X509_verify_cert(csc);
 | 
			
		||||
    X509_STORE_CTX_free(csc);
 | 
			
		||||
 | 
			
		||||
@@ -301,50 +281,94 @@ static int check(X509_STORE *ctx, char *file,
 | 
			
		||||
    return (ret);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static STACK_OF(X509) *load_untrusted(char *certfile)
 | 
			
		||||
{
 | 
			
		||||
    STACK_OF(X509_INFO) *sk = NULL;
 | 
			
		||||
    STACK_OF(X509) *stack = NULL, *ret = NULL;
 | 
			
		||||
    BIO *in = NULL;
 | 
			
		||||
    X509_INFO *xi;
 | 
			
		||||
 | 
			
		||||
    if (!(stack = sk_X509_new_null())) {
 | 
			
		||||
        BIO_printf(bio_err, "memory allocation failure\n");
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (!(in = BIO_new_file(certfile, "r"))) {
 | 
			
		||||
        BIO_printf(bio_err, "error opening the file, %s\n", certfile);
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    /* This loads from a file, a stack of x509/crl/pkey sets */
 | 
			
		||||
    if (!(sk = PEM_X509_INFO_read_bio(in, NULL, NULL, NULL))) {
 | 
			
		||||
        BIO_printf(bio_err, "error reading the file, %s\n", certfile);
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    /* scan over it and pull out the certs */
 | 
			
		||||
    while (sk_X509_INFO_num(sk)) {
 | 
			
		||||
        xi = sk_X509_INFO_shift(sk);
 | 
			
		||||
        if (xi->x509 != NULL) {
 | 
			
		||||
            sk_X509_push(stack, xi->x509);
 | 
			
		||||
            xi->x509 = NULL;
 | 
			
		||||
        }
 | 
			
		||||
        X509_INFO_free(xi);
 | 
			
		||||
    }
 | 
			
		||||
    if (!sk_X509_num(stack)) {
 | 
			
		||||
        BIO_printf(bio_err, "no certificates in file, %s\n", certfile);
 | 
			
		||||
        sk_X509_free(stack);
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
    ret = stack;
 | 
			
		||||
 end:
 | 
			
		||||
    BIO_free(in);
 | 
			
		||||
    sk_X509_INFO_free(sk);
 | 
			
		||||
    return (ret);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static int MS_CALLBACK cb(int ok, X509_STORE_CTX *ctx)
 | 
			
		||||
{
 | 
			
		||||
    int cert_error = X509_STORE_CTX_get_error(ctx);
 | 
			
		||||
    X509 *current_cert = X509_STORE_CTX_get_current_cert(ctx);
 | 
			
		||||
    char buf[256];
 | 
			
		||||
 | 
			
		||||
    if (!ok) {
 | 
			
		||||
        if (current_cert) {
 | 
			
		||||
            X509_NAME_print_ex_fp(stdout,
 | 
			
		||||
                                  X509_get_subject_name(current_cert),
 | 
			
		||||
                                  0, XN_FLAG_ONELINE);
 | 
			
		||||
            printf("\n");
 | 
			
		||||
        if (ctx->current_cert) {
 | 
			
		||||
            X509_NAME_oneline(X509_get_subject_name(ctx->current_cert), buf,
 | 
			
		||||
                              sizeof buf);
 | 
			
		||||
            printf("%s\n", buf);
 | 
			
		||||
        }
 | 
			
		||||
        printf("%serror %d at %d depth lookup:%s\n",
 | 
			
		||||
               X509_STORE_CTX_get0_parent_ctx(ctx) ? "[CRL path]" : "",
 | 
			
		||||
               cert_error,
 | 
			
		||||
               X509_STORE_CTX_get_error_depth(ctx),
 | 
			
		||||
               X509_verify_cert_error_string(cert_error));
 | 
			
		||||
        switch (cert_error) {
 | 
			
		||||
        case X509_V_ERR_NO_EXPLICIT_POLICY:
 | 
			
		||||
            policies_print(NULL, ctx);
 | 
			
		||||
        case X509_V_ERR_CERT_HAS_EXPIRED:
 | 
			
		||||
 | 
			
		||||
            /*
 | 
			
		||||
             * since we are just checking the certificates, it is ok if they
 | 
			
		||||
             * are self signed. But we should still warn the user.
 | 
			
		||||
             */
 | 
			
		||||
 | 
			
		||||
        case X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT:
 | 
			
		||||
            /* Continue after extension errors too */
 | 
			
		||||
        case X509_V_ERR_INVALID_CA:
 | 
			
		||||
        case X509_V_ERR_INVALID_NON_CA:
 | 
			
		||||
        case X509_V_ERR_PATH_LENGTH_EXCEEDED:
 | 
			
		||||
        case X509_V_ERR_INVALID_PURPOSE:
 | 
			
		||||
        case X509_V_ERR_CRL_HAS_EXPIRED:
 | 
			
		||||
        case X509_V_ERR_CRL_NOT_YET_VALID:
 | 
			
		||||
        case X509_V_ERR_UNHANDLED_CRITICAL_EXTENSION:
 | 
			
		||||
        printf("error %d at %d depth lookup:%s\n", ctx->error,
 | 
			
		||||
               ctx->error_depth, X509_verify_cert_error_string(ctx->error));
 | 
			
		||||
        if (ctx->error == X509_V_ERR_CERT_HAS_EXPIRED)
 | 
			
		||||
            ok = 1;
 | 
			
		||||
        /*
 | 
			
		||||
         * since we are just checking the certificates, it is ok if they are
 | 
			
		||||
         * self signed. But we should still warn the user.
 | 
			
		||||
         */
 | 
			
		||||
        if (ctx->error == X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT)
 | 
			
		||||
            ok = 1;
 | 
			
		||||
        /* Continue after extension errors too */
 | 
			
		||||
        if (ctx->error == X509_V_ERR_INVALID_CA)
 | 
			
		||||
            ok = 1;
 | 
			
		||||
        if (ctx->error == X509_V_ERR_INVALID_NON_CA)
 | 
			
		||||
            ok = 1;
 | 
			
		||||
        if (ctx->error == X509_V_ERR_PATH_LENGTH_EXCEEDED)
 | 
			
		||||
            ok = 1;
 | 
			
		||||
        if (ctx->error == X509_V_ERR_INVALID_PURPOSE)
 | 
			
		||||
            ok = 1;
 | 
			
		||||
        if (ctx->error == X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT)
 | 
			
		||||
            ok = 1;
 | 
			
		||||
        if (ctx->error == X509_V_ERR_CRL_HAS_EXPIRED)
 | 
			
		||||
            ok = 1;
 | 
			
		||||
        if (ctx->error == X509_V_ERR_CRL_NOT_YET_VALID)
 | 
			
		||||
            ok = 1;
 | 
			
		||||
        if (ctx->error == X509_V_ERR_UNHANDLED_CRITICAL_EXTENSION)
 | 
			
		||||
            ok = 1;
 | 
			
		||||
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        if (ctx->error == X509_V_ERR_NO_EXPLICIT_POLICY)
 | 
			
		||||
            policies_print(NULL, ctx);
 | 
			
		||||
        return ok;
 | 
			
		||||
 | 
			
		||||
    }
 | 
			
		||||
    if (cert_error == X509_V_OK && ok == 2)
 | 
			
		||||
    if ((ctx->error == X509_V_OK) && (ok == 2))
 | 
			
		||||
        policies_print(NULL, ctx);
 | 
			
		||||
    if (!v_verbose)
 | 
			
		||||
        ERR_clear_error();
 | 
			
		||||
 
 | 
			
		||||
@@ -1,172 +0,0 @@
 | 
			
		||||
#if defined( __VMS) && !defined( OPENSSL_NO_DECC_INIT) && \
 | 
			
		||||
 defined( __DECC) && !defined( __VAX) && (__CRTL_VER >= 70301000)
 | 
			
		||||
# define USE_DECC_INIT 1
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#ifdef USE_DECC_INIT
 | 
			
		||||
 | 
			
		||||
/*-
 | 
			
		||||
 * 2010-04-26 SMS.
 | 
			
		||||
 *
 | 
			
		||||
 *----------------------------------------------------------------------
 | 
			
		||||
 *
 | 
			
		||||
 *       decc_init()
 | 
			
		||||
 *
 | 
			
		||||
 *    On non-VAX systems, uses LIB$INITIALIZE to set a collection of C
 | 
			
		||||
 *    RTL features without using the DECC$* logical name method.
 | 
			
		||||
 *
 | 
			
		||||
 *----------------------------------------------------------------------
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
# include <stdio.h>
 | 
			
		||||
# include <stdlib.h>
 | 
			
		||||
# include <unixlib.h>
 | 
			
		||||
 | 
			
		||||
/* Global storage. */
 | 
			
		||||
 | 
			
		||||
/* Flag to sense if decc_init() was called. */
 | 
			
		||||
 | 
			
		||||
int decc_init_done = -1;
 | 
			
		||||
 | 
			
		||||
/* Structure to hold a DECC$* feature name and its desired value. */
 | 
			
		||||
 | 
			
		||||
typedef struct {
 | 
			
		||||
    char *name;
 | 
			
		||||
    int value;
 | 
			
		||||
} decc_feat_t;
 | 
			
		||||
 | 
			
		||||
/*
 | 
			
		||||
 * Array of DECC$* feature names and their desired values. Note:
 | 
			
		||||
 * DECC$ARGV_PARSE_STYLE is the urgent one.
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
decc_feat_t decc_feat_array[] = {
 | 
			
		||||
    /* Preserve command-line case with SET PROCESS/PARSE_STYLE=EXTENDED */
 | 
			
		||||
    {"DECC$ARGV_PARSE_STYLE", 1},
 | 
			
		||||
 | 
			
		||||
    /* Preserve case for file names on ODS5 disks. */
 | 
			
		||||
    {"DECC$EFS_CASE_PRESERVE", 1},
 | 
			
		||||
 | 
			
		||||
    /*
 | 
			
		||||
     * Enable multiple dots (and most characters) in ODS5 file names, while
 | 
			
		||||
     * preserving VMS-ness of ";version".
 | 
			
		||||
     */
 | 
			
		||||
    {"DECC$EFS_CHARSET", 1},
 | 
			
		||||
 | 
			
		||||
    /* List terminator. */
 | 
			
		||||
    {(char *)NULL, 0}
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
/* LIB$INITIALIZE initialization function. */
 | 
			
		||||
 | 
			
		||||
static void decc_init(void)
 | 
			
		||||
{
 | 
			
		||||
    char *openssl_debug_decc_init;
 | 
			
		||||
    int verbose = 0;
 | 
			
		||||
    int feat_index;
 | 
			
		||||
    int feat_value;
 | 
			
		||||
    int feat_value_max;
 | 
			
		||||
    int feat_value_min;
 | 
			
		||||
    int i;
 | 
			
		||||
    int sts;
 | 
			
		||||
 | 
			
		||||
    /* Get debug option. */
 | 
			
		||||
    openssl_debug_decc_init = getenv("OPENSSL_DEBUG_DECC_INIT");
 | 
			
		||||
    if (openssl_debug_decc_init != NULL) {
 | 
			
		||||
        verbose = strtol(openssl_debug_decc_init, NULL, 10);
 | 
			
		||||
        if (verbose <= 0) {
 | 
			
		||||
            verbose = 1;
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    /* Set the global flag to indicate that LIB$INITIALIZE worked. */
 | 
			
		||||
    decc_init_done = 1;
 | 
			
		||||
 | 
			
		||||
    /* Loop through all items in the decc_feat_array[]. */
 | 
			
		||||
 | 
			
		||||
    for (i = 0; decc_feat_array[i].name != NULL; i++) {
 | 
			
		||||
        /* Get the feature index. */
 | 
			
		||||
        feat_index = decc$feature_get_index(decc_feat_array[i].name);
 | 
			
		||||
        if (feat_index >= 0) {
 | 
			
		||||
            /* Valid item.  Collect its properties. */
 | 
			
		||||
            feat_value = decc$feature_get_value(feat_index, 1);
 | 
			
		||||
            feat_value_min = decc$feature_get_value(feat_index, 2);
 | 
			
		||||
            feat_value_max = decc$feature_get_value(feat_index, 3);
 | 
			
		||||
 | 
			
		||||
            /* Check the validity of our desired value. */
 | 
			
		||||
            if ((decc_feat_array[i].value >= feat_value_min) &&
 | 
			
		||||
                (decc_feat_array[i].value <= feat_value_max)) {
 | 
			
		||||
                /* Valid value.  Set it if necessary. */
 | 
			
		||||
                if (feat_value != decc_feat_array[i].value) {
 | 
			
		||||
                    sts = decc$feature_set_value(feat_index,
 | 
			
		||||
                                                 1, decc_feat_array[i].value);
 | 
			
		||||
 | 
			
		||||
                    if (verbose > 1) {
 | 
			
		||||
                        fprintf(stderr, " %s = %d, sts = %d.\n",
 | 
			
		||||
                                decc_feat_array[i].name,
 | 
			
		||||
                                decc_feat_array[i].value, sts);
 | 
			
		||||
                    }
 | 
			
		||||
                }
 | 
			
		||||
            } else {
 | 
			
		||||
                /* Invalid DECC feature value. */
 | 
			
		||||
                fprintf(stderr,
 | 
			
		||||
                        " INVALID DECC$FEATURE VALUE, %d: %d <= %s <= %d.\n",
 | 
			
		||||
                        feat_value,
 | 
			
		||||
                        feat_value_min, decc_feat_array[i].name,
 | 
			
		||||
                        feat_value_max);
 | 
			
		||||
            }
 | 
			
		||||
        } else {
 | 
			
		||||
            /* Invalid DECC feature name. */
 | 
			
		||||
            fprintf(stderr,
 | 
			
		||||
                    " UNKNOWN DECC$FEATURE: %s.\n", decc_feat_array[i].name);
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (verbose > 0) {
 | 
			
		||||
        fprintf(stderr, " DECC_INIT complete.\n");
 | 
			
		||||
    }
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
/* Get "decc_init()" into a valid, loaded LIB$INITIALIZE PSECT. */
 | 
			
		||||
 | 
			
		||||
# pragma nostandard
 | 
			
		||||
 | 
			
		||||
/*
 | 
			
		||||
 * Establish the LIB$INITIALIZE PSECTs, with proper alignment and other
 | 
			
		||||
 * attributes.  Note that "nopic" is significant only on VAX.
 | 
			
		||||
 */
 | 
			
		||||
# pragma extern_model save
 | 
			
		||||
 | 
			
		||||
# if __INITIAL_POINTER_SIZE == 64
 | 
			
		||||
#  define PSECT_ALIGN 3
 | 
			
		||||
# else
 | 
			
		||||
#  define PSECT_ALIGN 2
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
# pragma extern_model strict_refdef "LIB$INITIALIZ" PSECT_ALIGN, nopic, nowrt
 | 
			
		||||
const int spare[8] = { 0 };
 | 
			
		||||
 | 
			
		||||
# pragma extern_model strict_refdef "LIB$INITIALIZE" PSECT_ALIGN, nopic, nowrt
 | 
			
		||||
void (*const x_decc_init) () = decc_init;
 | 
			
		||||
 | 
			
		||||
# pragma extern_model restore
 | 
			
		||||
 | 
			
		||||
/* Fake reference to ensure loading the LIB$INITIALIZE PSECT. */
 | 
			
		||||
 | 
			
		||||
# pragma extern_model save
 | 
			
		||||
 | 
			
		||||
int LIB$INITIALIZE(void);
 | 
			
		||||
 | 
			
		||||
# pragma extern_model strict_refdef
 | 
			
		||||
int dmy_lib$initialize = (int)LIB$INITIALIZE;
 | 
			
		||||
 | 
			
		||||
# pragma extern_model restore
 | 
			
		||||
 | 
			
		||||
# pragma standard
 | 
			
		||||
 | 
			
		||||
#else                           /* def USE_DECC_INIT */
 | 
			
		||||
 | 
			
		||||
/* Dummy code to avoid a %CC-W-EMPTYFILE complaint. */
 | 
			
		||||
int decc_init_dummy(void);
 | 
			
		||||
 | 
			
		||||
#endif                          /* def USE_DECC_INIT */
 | 
			
		||||
							
								
								
									
										215
									
								
								apps/x509.c
									
									
									
									
									
								
							
							
						
						
									
										215
									
								
								apps/x509.c
									
									
									
									
									
								
							@@ -99,13 +99,7 @@ static const char *x509_usage[] = {
 | 
			
		||||
    " -passin arg     - private key password source\n",
 | 
			
		||||
    " -serial         - print serial number value\n",
 | 
			
		||||
    " -subject_hash   - print subject hash value\n",
 | 
			
		||||
#ifndef OPENSSL_NO_MD5
 | 
			
		||||
    " -subject_hash_old   - print old-style (MD5) subject hash value\n",
 | 
			
		||||
#endif
 | 
			
		||||
    " -issuer_hash    - print issuer hash value\n",
 | 
			
		||||
#ifndef OPENSSL_NO_MD5
 | 
			
		||||
    " -issuer_hash_old    - print old-style (MD5) issuer hash value\n",
 | 
			
		||||
#endif
 | 
			
		||||
    " -hash           - synonym for -subject_hash\n",
 | 
			
		||||
    " -subject        - print subject DN\n",
 | 
			
		||||
    " -issuer         - print issuer DN\n",
 | 
			
		||||
@@ -150,9 +144,6 @@ static const char *x509_usage[] = {
 | 
			
		||||
    " -engine e       - use engine e, possibly a hardware device.\n",
 | 
			
		||||
#endif
 | 
			
		||||
    " -certopt arg    - various certificate text options\n",
 | 
			
		||||
    " -checkhost host - check certificate matches \"host\"\n",
 | 
			
		||||
    " -checkemail email - check certificate matches \"email\"\n",
 | 
			
		||||
    " -checkip ipaddr - check certificate matches \"ipaddr\"\n",
 | 
			
		||||
    NULL
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
@@ -160,15 +151,11 @@ static int MS_CALLBACK callb(int ok, X509_STORE_CTX *ctx);
 | 
			
		||||
static int sign(X509 *x, EVP_PKEY *pkey, int days, int clrext,
 | 
			
		||||
                const EVP_MD *digest, CONF *conf, char *section);
 | 
			
		||||
static int x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest,
 | 
			
		||||
                        X509 *x, X509 *xca, EVP_PKEY *pkey,
 | 
			
		||||
                        STACK_OF(OPENSSL_STRING) *sigopts, char *serial,
 | 
			
		||||
                        X509 *x, X509 *xca, EVP_PKEY *pkey, char *serial,
 | 
			
		||||
                        int create, int days, int clrext, CONF *conf,
 | 
			
		||||
                        char *section, ASN1_INTEGER *sno);
 | 
			
		||||
static int purpose_print(BIO *bio, X509 *cert, X509_PURPOSE *pt);
 | 
			
		||||
static int reqfile = 0;
 | 
			
		||||
#ifdef OPENSSL_SSL_DEBUG_BROKEN_PROTOCOL
 | 
			
		||||
static int force_version = 2;
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
int MAIN(int, char **);
 | 
			
		||||
 | 
			
		||||
@@ -179,25 +166,20 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    X509_REQ *req = NULL;
 | 
			
		||||
    X509 *x = NULL, *xca = NULL;
 | 
			
		||||
    ASN1_OBJECT *objtmp;
 | 
			
		||||
    STACK_OF(OPENSSL_STRING) *sigopts = NULL;
 | 
			
		||||
    EVP_PKEY *Upkey = NULL, *CApkey = NULL, *fkey = NULL;
 | 
			
		||||
    EVP_PKEY *Upkey = NULL, *CApkey = NULL;
 | 
			
		||||
    ASN1_INTEGER *sno = NULL;
 | 
			
		||||
    int i, num, badops = 0, badsig = 0;
 | 
			
		||||
    int i, num, badops = 0;
 | 
			
		||||
    BIO *out = NULL;
 | 
			
		||||
    BIO *STDout = NULL;
 | 
			
		||||
    STACK_OF(ASN1_OBJECT) *trust = NULL, *reject = NULL;
 | 
			
		||||
    int informat, outformat, keyformat, CAformat, CAkeyformat;
 | 
			
		||||
    char *infile = NULL, *outfile = NULL, *keyfile = NULL, *CAfile = NULL;
 | 
			
		||||
    char *CAkeyfile = NULL, *CAserial = NULL;
 | 
			
		||||
    char *fkeyfile = NULL;
 | 
			
		||||
    char *alias = NULL;
 | 
			
		||||
    int text = 0, serial = 0, subject = 0, issuer = 0, startdate =
 | 
			
		||||
        0, enddate = 0;
 | 
			
		||||
    int next_serial = 0;
 | 
			
		||||
    int subject_hash = 0, issuer_hash = 0, ocspid = 0;
 | 
			
		||||
#ifndef OPENSSL_NO_MD5
 | 
			
		||||
    int subject_hash_old = 0, issuer_hash_old = 0;
 | 
			
		||||
#endif
 | 
			
		||||
    int noout = 0, sign_flag = 0, CA_flag = 0, CA_createserial = 0, email = 0;
 | 
			
		||||
    int ocsp_uri = 0;
 | 
			
		||||
    int trustout = 0, clrtrust = 0, clrreject = 0, aliasout = 0, clrext = 0;
 | 
			
		||||
@@ -209,15 +191,12 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    X509_REQ *rq = NULL;
 | 
			
		||||
    int fingerprint = 0;
 | 
			
		||||
    char buf[256];
 | 
			
		||||
    const EVP_MD *md_alg, *digest = NULL;
 | 
			
		||||
    const EVP_MD *md_alg, *digest = EVP_sha1();
 | 
			
		||||
    CONF *extconf = NULL;
 | 
			
		||||
    char *extsect = NULL, *extfile = NULL, *passin = NULL, *passargin = NULL;
 | 
			
		||||
    int need_rand = 0;
 | 
			
		||||
    int checkend = 0, checkoffset = 0;
 | 
			
		||||
    unsigned long nmflag = 0, certflag = 0;
 | 
			
		||||
    char *checkhost = NULL;
 | 
			
		||||
    char *checkemail = NULL;
 | 
			
		||||
    char *checkip = NULL;
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
    char *engine = NULL;
 | 
			
		||||
#endif
 | 
			
		||||
@@ -248,7 +227,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    ctx = X509_STORE_new();
 | 
			
		||||
    if (ctx == NULL)
 | 
			
		||||
        goto end;
 | 
			
		||||
    X509_STORE_set_verify_cb(ctx, callb);
 | 
			
		||||
    X509_STORE_set_verify_cb_func(ctx, callb);
 | 
			
		||||
 | 
			
		||||
    argc--;
 | 
			
		||||
    argv++;
 | 
			
		||||
@@ -277,27 +256,12 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            CAkeyformat = str2fmt(*(++argv));
 | 
			
		||||
        } else if (strcmp(*argv, "-sigopt") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            if (!sigopts)
 | 
			
		||||
                sigopts = sk_OPENSSL_STRING_new_null();
 | 
			
		||||
            if (!sigopts || !sk_OPENSSL_STRING_push(sigopts, *(++argv)))
 | 
			
		||||
                goto bad;
 | 
			
		||||
        }
 | 
			
		||||
#ifdef OPENSSL_SSL_DEBUG_BROKEN_PROTOCOL
 | 
			
		||||
        else if (strcmp(*argv, "-force_version") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            force_version = atoi(*(++argv)) - 1;
 | 
			
		||||
        }
 | 
			
		||||
#endif
 | 
			
		||||
        else if (strcmp(*argv, "-days") == 0) {
 | 
			
		||||
        } else if (strcmp(*argv, "-days") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            days = atoi(*(++argv));
 | 
			
		||||
            if (days == 0) {
 | 
			
		||||
                BIO_printf(bio_err, "bad number of days\n");
 | 
			
		||||
                BIO_printf(STDout, "bad number of days\n");
 | 
			
		||||
                goto bad;
 | 
			
		||||
            }
 | 
			
		||||
        } else if (strcmp(*argv, "-passin") == 0) {
 | 
			
		||||
@@ -345,10 +309,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            if (!(sno = s2i_ASN1_INTEGER(NULL, *(++argv))))
 | 
			
		||||
                goto bad;
 | 
			
		||||
        } else if (strcmp(*argv, "-force_pubkey") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            fkeyfile = *(++argv);
 | 
			
		||||
        } else if (strcmp(*argv, "-addtrust") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
@@ -416,16 +376,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        else if (strcmp(*argv, "-hash") == 0
 | 
			
		||||
                 || strcmp(*argv, "-subject_hash") == 0)
 | 
			
		||||
            subject_hash = ++num;
 | 
			
		||||
#ifndef OPENSSL_NO_MD5
 | 
			
		||||
        else if (strcmp(*argv, "-subject_hash_old") == 0)
 | 
			
		||||
            subject_hash_old = ++num;
 | 
			
		||||
#endif
 | 
			
		||||
        else if (strcmp(*argv, "-issuer_hash") == 0)
 | 
			
		||||
            issuer_hash = ++num;
 | 
			
		||||
#ifndef OPENSSL_NO_MD5
 | 
			
		||||
        else if (strcmp(*argv, "-issuer_hash_old") == 0)
 | 
			
		||||
            issuer_hash_old = ++num;
 | 
			
		||||
#endif
 | 
			
		||||
        else if (strcmp(*argv, "-subject") == 0)
 | 
			
		||||
            subject = ++num;
 | 
			
		||||
        else if (strcmp(*argv, "-issuer") == 0)
 | 
			
		||||
@@ -446,18 +398,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            checkoffset = atoi(*(++argv));
 | 
			
		||||
            checkend = 1;
 | 
			
		||||
        } else if (strcmp(*argv, "-checkhost") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            checkhost = *(++argv);
 | 
			
		||||
        } else if (strcmp(*argv, "-checkemail") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            checkemail = *(++argv);
 | 
			
		||||
        } else if (strcmp(*argv, "-checkip") == 0) {
 | 
			
		||||
            if (--argc < 1)
 | 
			
		||||
                goto bad;
 | 
			
		||||
            checkip = *(++argv);
 | 
			
		||||
        } else if (strcmp(*argv, "-noout") == 0)
 | 
			
		||||
            noout = ++num;
 | 
			
		||||
        else if (strcmp(*argv, "-trustout") == 0)
 | 
			
		||||
@@ -481,8 +421,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
#endif
 | 
			
		||||
        else if (strcmp(*argv, "-ocspid") == 0)
 | 
			
		||||
            ocspid = ++num;
 | 
			
		||||
        else if (strcmp(*argv, "-badsig") == 0)
 | 
			
		||||
            badsig = 1;
 | 
			
		||||
        else if ((md_alg = EVP_get_digestbyname(*argv + 1))) {
 | 
			
		||||
            /* ok */
 | 
			
		||||
            digest = md_alg;
 | 
			
		||||
@@ -520,13 +458,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (fkeyfile) {
 | 
			
		||||
        fkey = load_pubkey(bio_err, fkeyfile, keyformat, 0,
 | 
			
		||||
                           NULL, e, "Forced key");
 | 
			
		||||
        if (fkey == NULL)
 | 
			
		||||
            goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if ((CAkeyfile == NULL) && (CA_flag) && (CAformat == FORMAT_PEM)) {
 | 
			
		||||
        CAkeyfile = CAfile;
 | 
			
		||||
    } else if ((CA_flag) && (CAkeyfile == NULL)) {
 | 
			
		||||
@@ -647,14 +578,11 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
            goto end;
 | 
			
		||||
 | 
			
		||||
        X509_gmtime_adj(X509_get_notBefore(x), 0);
 | 
			
		||||
        X509_time_adj_ex(X509_get_notAfter(x), days, 0, NULL);
 | 
			
		||||
        if (fkey)
 | 
			
		||||
            X509_set_pubkey(x, fkey);
 | 
			
		||||
        else {
 | 
			
		||||
            pkey = X509_REQ_get_pubkey(req);
 | 
			
		||||
            X509_set_pubkey(x, pkey);
 | 
			
		||||
            EVP_PKEY_free(pkey);
 | 
			
		||||
        }
 | 
			
		||||
        X509_gmtime_adj(X509_get_notAfter(x), (long)60 * 60 * 24 * days);
 | 
			
		||||
 | 
			
		||||
        pkey = X509_REQ_get_pubkey(req);
 | 
			
		||||
        X509_set_pubkey(x, pkey);
 | 
			
		||||
        EVP_PKEY_free(pkey);
 | 
			
		||||
    } else
 | 
			
		||||
        x = load_cert(bio_err, infile, informat, NULL, e, "Certificate");
 | 
			
		||||
 | 
			
		||||
@@ -742,14 +670,13 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                BIO_puts(out, "\n");
 | 
			
		||||
            } else if ((email == i) || (ocsp_uri == i)) {
 | 
			
		||||
                int j;
 | 
			
		||||
                STACK_OF(OPENSSL_STRING) *emlst;
 | 
			
		||||
                STACK *emlst;
 | 
			
		||||
                if (email == i)
 | 
			
		||||
                    emlst = X509_get1_email(x);
 | 
			
		||||
                else
 | 
			
		||||
                    emlst = X509_get1_ocsp(x);
 | 
			
		||||
                for (j = 0; j < sk_OPENSSL_STRING_num(emlst); j++)
 | 
			
		||||
                    BIO_printf(STDout, "%s\n",
 | 
			
		||||
                               sk_OPENSSL_STRING_value(emlst, j));
 | 
			
		||||
                for (j = 0; j < sk_num(emlst); j++)
 | 
			
		||||
                    BIO_printf(STDout, "%s\n", sk_value(emlst, j));
 | 
			
		||||
                X509_email_free(emlst);
 | 
			
		||||
            } else if (aliasout == i) {
 | 
			
		||||
                unsigned char *alstr;
 | 
			
		||||
@@ -760,21 +687,9 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                    BIO_puts(STDout, "<No Alias>\n");
 | 
			
		||||
            } else if (subject_hash == i) {
 | 
			
		||||
                BIO_printf(STDout, "%08lx\n", X509_subject_name_hash(x));
 | 
			
		||||
            }
 | 
			
		||||
#ifndef OPENSSL_NO_MD5
 | 
			
		||||
            else if (subject_hash_old == i) {
 | 
			
		||||
                BIO_printf(STDout, "%08lx\n", X509_subject_name_hash_old(x));
 | 
			
		||||
            }
 | 
			
		||||
#endif
 | 
			
		||||
            else if (issuer_hash == i) {
 | 
			
		||||
            } else if (issuer_hash == i) {
 | 
			
		||||
                BIO_printf(STDout, "%08lx\n", X509_issuer_name_hash(x));
 | 
			
		||||
            }
 | 
			
		||||
#ifndef OPENSSL_NO_MD5
 | 
			
		||||
            else if (issuer_hash_old == i) {
 | 
			
		||||
                BIO_printf(STDout, "%08lx\n", X509_issuer_name_hash_old(x));
 | 
			
		||||
            }
 | 
			
		||||
#endif
 | 
			
		||||
            else if (pprint == i) {
 | 
			
		||||
            } else if (pprint == i) {
 | 
			
		||||
                X509_PURPOSE *ptmp;
 | 
			
		||||
                int j;
 | 
			
		||||
                BIO_printf(STDout, "Certificate purposes:\n");
 | 
			
		||||
@@ -829,11 +744,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
 | 
			
		||||
                z = i2d_X509(x, NULL);
 | 
			
		||||
                m = OPENSSL_malloc(z);
 | 
			
		||||
                if (!m) {
 | 
			
		||||
                    BIO_printf(bio_err, "Out of memory\n");
 | 
			
		||||
                    ERR_print_errors(bio_err);
 | 
			
		||||
                    goto end;
 | 
			
		||||
                }
 | 
			
		||||
 | 
			
		||||
                d = (unsigned char *)m;
 | 
			
		||||
                z = i2d_X509_NAME(X509_get_subject_name(x), &d);
 | 
			
		||||
@@ -876,7 +786,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
 | 
			
		||||
                OPENSSL_free(m);
 | 
			
		||||
            } else if (text == i) {
 | 
			
		||||
                X509_print_ex(STDout, x, nmflag, certflag);
 | 
			
		||||
                X509_print_ex(out, x, nmflag, certflag);
 | 
			
		||||
            } else if (startdate == i) {
 | 
			
		||||
                BIO_puts(STDout, "notBefore=");
 | 
			
		||||
                ASN1_TIME_print(STDout, X509_get_notBefore(x));
 | 
			
		||||
@@ -889,17 +799,13 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                int j;
 | 
			
		||||
                unsigned int n;
 | 
			
		||||
                unsigned char md[EVP_MAX_MD_SIZE];
 | 
			
		||||
                const EVP_MD *fdig = digest;
 | 
			
		||||
 | 
			
		||||
                if (!fdig)
 | 
			
		||||
                    fdig = EVP_sha1();
 | 
			
		||||
 | 
			
		||||
                if (!X509_digest(x, fdig, md, &n)) {
 | 
			
		||||
                if (!X509_digest(x, digest, md, &n)) {
 | 
			
		||||
                    BIO_printf(bio_err, "out of memory\n");
 | 
			
		||||
                    goto end;
 | 
			
		||||
                }
 | 
			
		||||
                BIO_printf(STDout, "%s Fingerprint=",
 | 
			
		||||
                           OBJ_nid2sn(EVP_MD_type(fdig)));
 | 
			
		||||
                           OBJ_nid2sn(EVP_MD_type(digest)));
 | 
			
		||||
                for (j = 0; j < (int)n; j++) {
 | 
			
		||||
                    BIO_printf(STDout, "%02X%c", md[j], (j + 1 == (int)n)
 | 
			
		||||
                               ? '\n' : ':');
 | 
			
		||||
@@ -916,6 +822,14 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                    if (Upkey == NULL)
 | 
			
		||||
                        goto end;
 | 
			
		||||
                }
 | 
			
		||||
#ifndef OPENSSL_NO_DSA
 | 
			
		||||
                if (Upkey->type == EVP_PKEY_DSA)
 | 
			
		||||
                    digest = EVP_dss1();
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_ECDSA
 | 
			
		||||
                if (Upkey->type == EVP_PKEY_EC)
 | 
			
		||||
                    digest = EVP_ecdsa();
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
                assert(need_rand);
 | 
			
		||||
                if (!sign(x, Upkey, days, clrext, digest, extconf, extsect))
 | 
			
		||||
@@ -929,12 +843,19 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
                    if (CApkey == NULL)
 | 
			
		||||
                        goto end;
 | 
			
		||||
                }
 | 
			
		||||
#ifndef OPENSSL_NO_DSA
 | 
			
		||||
                if (CApkey->type == EVP_PKEY_DSA)
 | 
			
		||||
                    digest = EVP_dss1();
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_ECDSA
 | 
			
		||||
                if (CApkey->type == EVP_PKEY_EC)
 | 
			
		||||
                    digest = EVP_ecdsa();
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
                assert(need_rand);
 | 
			
		||||
                if (!x509_certify(ctx, CAfile, digest, x, xca,
 | 
			
		||||
                                  CApkey, sigopts,
 | 
			
		||||
                                  CAserial, CA_createserial, days, clrext,
 | 
			
		||||
                                  extconf, extsect, sno))
 | 
			
		||||
                                  CApkey, CAserial, CA_createserial, days,
 | 
			
		||||
                                  clrext, extconf, extsect, sno))
 | 
			
		||||
                    goto end;
 | 
			
		||||
            } else if (x509req == i) {
 | 
			
		||||
                EVP_PKEY *pk;
 | 
			
		||||
@@ -953,6 +874,15 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
 | 
			
		||||
                BIO_printf(bio_err, "Generating certificate request\n");
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_DSA
 | 
			
		||||
                if (pk->type == EVP_PKEY_DSA)
 | 
			
		||||
                    digest = EVP_dss1();
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_ECDSA
 | 
			
		||||
                if (pk->type == EVP_PKEY_EC)
 | 
			
		||||
                    digest = EVP_ecdsa();
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
                rq = X509_to_X509_REQ(x, pk, digest);
 | 
			
		||||
                EVP_PKEY_free(pk);
 | 
			
		||||
                if (rq == NULL) {
 | 
			
		||||
@@ -983,16 +913,11 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    print_cert_checks(STDout, x, checkhost, checkemail, checkip);
 | 
			
		||||
 | 
			
		||||
    if (noout) {
 | 
			
		||||
        ret = 0;
 | 
			
		||||
        goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (badsig)
 | 
			
		||||
        x->signature->data[x->signature->length - 1] ^= 0x1;
 | 
			
		||||
 | 
			
		||||
    if (outformat == FORMAT_ASN1)
 | 
			
		||||
        i = i2d_X509_bio(out, x);
 | 
			
		||||
    else if (outformat == FORMAT_PEM) {
 | 
			
		||||
@@ -1001,15 +926,16 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
        else
 | 
			
		||||
            i = PEM_write_bio_X509(out, x);
 | 
			
		||||
    } else if (outformat == FORMAT_NETSCAPE) {
 | 
			
		||||
        NETSCAPE_X509 nx;
 | 
			
		||||
        ASN1_OCTET_STRING hdr;
 | 
			
		||||
        ASN1_HEADER ah;
 | 
			
		||||
        ASN1_OCTET_STRING os;
 | 
			
		||||
 | 
			
		||||
        hdr.data = (unsigned char *)NETSCAPE_CERT_HDR;
 | 
			
		||||
        hdr.length = strlen(NETSCAPE_CERT_HDR);
 | 
			
		||||
        nx.header = &hdr;
 | 
			
		||||
        nx.cert = x;
 | 
			
		||||
        os.data = (unsigned char *)NETSCAPE_CERT_HDR;
 | 
			
		||||
        os.length = strlen(NETSCAPE_CERT_HDR);
 | 
			
		||||
        ah.header = &os;
 | 
			
		||||
        ah.data = (char *)x;
 | 
			
		||||
        ah.meth = X509_asn1_meth();
 | 
			
		||||
 | 
			
		||||
        i = ASN1_item_i2d_bio(ASN1_ITEM_rptr(NETSCAPE_X509), out, &nx);
 | 
			
		||||
        i = ASN1_i2d_bio_of(ASN1_HEADER, i2d_ASN1_HEADER, out, &ah);
 | 
			
		||||
    } else {
 | 
			
		||||
        BIO_printf(bio_err, "bad output format specified for outfile\n");
 | 
			
		||||
        goto end;
 | 
			
		||||
@@ -1033,9 +959,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    X509_free(xca);
 | 
			
		||||
    EVP_PKEY_free(Upkey);
 | 
			
		||||
    EVP_PKEY_free(CApkey);
 | 
			
		||||
    EVP_PKEY_free(fkey);
 | 
			
		||||
    if (sigopts)
 | 
			
		||||
        sk_OPENSSL_STRING_free(sigopts);
 | 
			
		||||
    X509_REQ_free(rq);
 | 
			
		||||
    ASN1_INTEGER_free(sno);
 | 
			
		||||
    sk_ASN1_OBJECT_pop_free(trust, ASN1_OBJECT_free);
 | 
			
		||||
@@ -1093,11 +1016,9 @@ static ASN1_INTEGER *x509_load_serial(char *CAfile, char *serialfile,
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static int x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest,
 | 
			
		||||
                        X509 *x, X509 *xca, EVP_PKEY *pkey,
 | 
			
		||||
                        STACK_OF(OPENSSL_STRING) *sigopts,
 | 
			
		||||
                        char *serialfile, int create,
 | 
			
		||||
                        int days, int clrext, CONF *conf, char *section,
 | 
			
		||||
                        ASN1_INTEGER *sno)
 | 
			
		||||
                        X509 *x, X509 *xca, EVP_PKEY *pkey, char *serialfile,
 | 
			
		||||
                        int create, int days, int clrext, CONF *conf,
 | 
			
		||||
                        char *section, ASN1_INTEGER *sno)
 | 
			
		||||
{
 | 
			
		||||
    int ret = 0;
 | 
			
		||||
    ASN1_INTEGER *bs = NULL;
 | 
			
		||||
@@ -1143,7 +1064,8 @@ static int x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest,
 | 
			
		||||
        goto end;
 | 
			
		||||
 | 
			
		||||
    /* hardwired expired */
 | 
			
		||||
    if (X509_time_adj_ex(X509_get_notAfter(x), days, 0, NULL) == NULL)
 | 
			
		||||
    if (X509_gmtime_adj(X509_get_notAfter(x), (long)60 * 60 * 24 * days) ==
 | 
			
		||||
        NULL)
 | 
			
		||||
        goto end;
 | 
			
		||||
 | 
			
		||||
    if (clrext) {
 | 
			
		||||
@@ -1153,18 +1075,14 @@ static int x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest,
 | 
			
		||||
 | 
			
		||||
    if (conf) {
 | 
			
		||||
        X509V3_CTX ctx2;
 | 
			
		||||
#ifdef OPENSSL_SSL_DEBUG_BROKEN_PROTOCOL
 | 
			
		||||
        X509_set_version(x, force_version);
 | 
			
		||||
#else
 | 
			
		||||
        X509_set_version(x, 2); /* version 3 certificate */
 | 
			
		||||
#endif
 | 
			
		||||
        X509V3_set_ctx(&ctx2, xca, x, NULL, NULL, 0);
 | 
			
		||||
        X509V3_set_nconf(&ctx2, conf);
 | 
			
		||||
        if (!X509V3_EXT_add_nconf(conf, &ctx2, section, x))
 | 
			
		||||
            goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (!do_X509_sign(bio_err, x, pkey, digest, sigopts))
 | 
			
		||||
    if (!X509_sign(x, pkey, digest))
 | 
			
		||||
        goto end;
 | 
			
		||||
    ret = 1;
 | 
			
		||||
 end:
 | 
			
		||||
@@ -1226,7 +1144,12 @@ static int sign(X509 *x, EVP_PKEY *pkey, int days, int clrext,
 | 
			
		||||
    if (X509_gmtime_adj(X509_get_notBefore(x), 0) == NULL)
 | 
			
		||||
        goto err;
 | 
			
		||||
 | 
			
		||||
    if (X509_time_adj_ex(X509_get_notAfter(x), days, 0, NULL) == NULL)
 | 
			
		||||
    /* Lets just make it 12:00am GMT, Jan 1 1970 */
 | 
			
		||||
    /* memcpy(x->cert_info->validity->notBefore,"700101120000Z",13); */
 | 
			
		||||
    /* 28 days to be certified */
 | 
			
		||||
 | 
			
		||||
    if (X509_gmtime_adj(X509_get_notAfter(x), (long)60 * 60 * 24 * days) ==
 | 
			
		||||
        NULL)
 | 
			
		||||
        goto err;
 | 
			
		||||
 | 
			
		||||
    if (!X509_set_pubkey(x, pkey))
 | 
			
		||||
@@ -1237,11 +1160,7 @@ static int sign(X509 *x, EVP_PKEY *pkey, int days, int clrext,
 | 
			
		||||
    }
 | 
			
		||||
    if (conf) {
 | 
			
		||||
        X509V3_CTX ctx;
 | 
			
		||||
#ifdef OPENSSL_SSL_DEBUG_BROKEN_PROTOCOL
 | 
			
		||||
        X509_set_version(x, force_version);
 | 
			
		||||
#else
 | 
			
		||||
        X509_set_version(x, 2); /* version 3 certificate */
 | 
			
		||||
#endif
 | 
			
		||||
        X509V3_set_ctx(&ctx, x, x, NULL, NULL, 0);
 | 
			
		||||
        X509V3_set_nconf(&ctx, conf);
 | 
			
		||||
        if (!X509V3_EXT_add_nconf(conf, &ctx, section, x))
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										60
									
								
								appveyor.yml
									
									
									
									
									
								
							
							
						
						
									
										60
									
								
								appveyor.yml
									
									
									
									
									
								
							@@ -1,60 +0,0 @@
 | 
			
		||||
platform:
 | 
			
		||||
    - x86
 | 
			
		||||
    - x64
 | 
			
		||||
 | 
			
		||||
environment:
 | 
			
		||||
    matrix:
 | 
			
		||||
        - VSVER: 9
 | 
			
		||||
        - VSVER: 10
 | 
			
		||||
        - VSVER: 11
 | 
			
		||||
        - VSVER: 12
 | 
			
		||||
        - VSVER: 14
 | 
			
		||||
 | 
			
		||||
configuration:
 | 
			
		||||
    - plain
 | 
			
		||||
    - shared
 | 
			
		||||
 | 
			
		||||
matrix:
 | 
			
		||||
    allow_failures:
 | 
			
		||||
        - platform: x64
 | 
			
		||||
          VSVER: 9
 | 
			
		||||
        - platform: x64
 | 
			
		||||
          VSVER: 10
 | 
			
		||||
        - platform: x64
 | 
			
		||||
          VSVER: 11
 | 
			
		||||
 | 
			
		||||
before_build:
 | 
			
		||||
    - ps: >-
 | 
			
		||||
        If ($env:Platform -Match "x86") {
 | 
			
		||||
            $env:VCVARS_PLATFORM="x86"
 | 
			
		||||
            $env:TARGET="VC-WIN32"
 | 
			
		||||
            $env:DO="do_ms"
 | 
			
		||||
        } Else {
 | 
			
		||||
            $env:VCVARS_PLATFORM="amd64"
 | 
			
		||||
            $env:TARGET="VC-WIN64A"
 | 
			
		||||
            $env:DO="do_win64a"
 | 
			
		||||
        }
 | 
			
		||||
    - ps: >-
 | 
			
		||||
        If ($env:Configuration -Like "*shared*") {
 | 
			
		||||
            $env:MAK="ntdll.mak"
 | 
			
		||||
        } Else {
 | 
			
		||||
            $env:MAK="nt.mak"
 | 
			
		||||
        }
 | 
			
		||||
    - ps: $env:VSCOMNTOOLS=(Get-Content ("env:VS" + "$env:VSVER" + "0COMNTOOLS"))
 | 
			
		||||
    - call "%VSCOMNTOOLS%\..\..\VC\vcvarsall.bat" %VCVARS_PLATFORM%
 | 
			
		||||
    - perl Configure %TARGET% no-asm
 | 
			
		||||
    - call ms\%DO%
 | 
			
		||||
 | 
			
		||||
build_script:
 | 
			
		||||
    - nmake /f ms\%MAK%
 | 
			
		||||
 | 
			
		||||
test_script:
 | 
			
		||||
    - nmake /f ms\%MAK% test
 | 
			
		||||
 | 
			
		||||
notifications:
 | 
			
		||||
    - provider: Email
 | 
			
		||||
      to:
 | 
			
		||||
          - openssl-commits@openssl.org
 | 
			
		||||
      on_build_success: false
 | 
			
		||||
      on_build_failure: true
 | 
			
		||||
      on_build_status_changed: true
 | 
			
		||||
							
								
								
									
										173
									
								
								config
									
									
									
									
									
								
							
							
						
						
									
										173
									
								
								config
									
									
									
									
									
								
							@@ -29,7 +29,7 @@ EXE=""
 | 
			
		||||
for i
 | 
			
		||||
do
 | 
			
		||||
case "$i" in 
 | 
			
		||||
-d*) PREFIX="debug-";;
 | 
			
		||||
-d) PREFIX="debug-";;
 | 
			
		||||
-t*) TEST="true";;
 | 
			
		||||
-h*) TEST="true"; cat <<EOF
 | 
			
		||||
Usage: config [options]
 | 
			
		||||
@@ -122,14 +122,6 @@ case "${SYSTEM}:${RELEASE}:${VERSION}:${MACHINE}" in
 | 
			
		||||
	echo "${MACHINE}-ibm-aix3"; exit 0
 | 
			
		||||
	;;
 | 
			
		||||
 | 
			
		||||
    BeOS:*:BePC)
 | 
			
		||||
    if [ -e /boot/develop/headers/be/bone ]; then
 | 
			
		||||
		echo "beos-x86-bone"; exit 0
 | 
			
		||||
	else
 | 
			
		||||
		echo "beos-x86-r5"; exit 0
 | 
			
		||||
	fi
 | 
			
		||||
	;;
 | 
			
		||||
 | 
			
		||||
    dgux:*)
 | 
			
		||||
	echo "${MACHINE}-dg-dgux"; exit 0
 | 
			
		||||
	;;
 | 
			
		||||
@@ -278,7 +270,7 @@ case "${SYSTEM}:${RELEASE}:${VERSION}:${MACHINE}" in
 | 
			
		||||
		echo "ppc-apple-darwin${VERSION}"
 | 
			
		||||
		;;
 | 
			
		||||
	    *)
 | 
			
		||||
		echo "i686-apple-darwin${VERSION}"
 | 
			
		||||
		echo "i386-apple-darwin${VERSION}"
 | 
			
		||||
		;;
 | 
			
		||||
	esac
 | 
			
		||||
	exit 0
 | 
			
		||||
@@ -370,10 +362,6 @@ case "${SYSTEM}:${RELEASE}:${VERSION}:${MACHINE}" in
 | 
			
		||||
    NONSTOP_KERNEL*)
 | 
			
		||||
       echo "nsr-tandem-nsk"; exit 0;
 | 
			
		||||
       ;;
 | 
			
		||||
 | 
			
		||||
    vxworks*)
 | 
			
		||||
       echo "${MACHINE}-whatever-vxworks"; exit 0;
 | 
			
		||||
       ;;
 | 
			
		||||
esac
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
@@ -411,18 +399,23 @@ exit 0
 | 
			
		||||
# this is where the translation occurs into SSLeay terms
 | 
			
		||||
# ---------------------------------------------------------------------------
 | 
			
		||||
 | 
			
		||||
GCCVER=`(gcc -dumpversion) 2>/dev/null`
 | 
			
		||||
if [ "$GCCVER" != "" ]; then
 | 
			
		||||
  # then strip off whatever prefix egcs prepends the number with...
 | 
			
		||||
  # Hopefully, this will work for any future prefixes as well.
 | 
			
		||||
  GCCVER=`echo $GCCVER | LC_ALL=C sed 's/^[a-zA-Z]*\-//'`
 | 
			
		||||
  # Since gcc 3.1 gcc --version behaviour has changed.  gcc -dumpversion
 | 
			
		||||
  # does give us what we want though, so we use that.  We just just the
 | 
			
		||||
  # major and minor version numbers.
 | 
			
		||||
  # peak single digit before and after first dot, e.g. 2.95.1 gives 29
 | 
			
		||||
  GCCVER=`echo $GCCVER | sed 's/\([0-9]\)\.\([0-9]\).*/\1\2/'`
 | 
			
		||||
fi
 | 
			
		||||
 | 
			
		||||
# Only set CC if not supplied already
 | 
			
		||||
if [ -z "$CROSS_COMPILE$CC" ]; then
 | 
			
		||||
  GCCVER=`sh -c "gcc -dumpversion" 2>/dev/null`
 | 
			
		||||
if [ -z "$CC" ]; then
 | 
			
		||||
# figure out if gcc is available and if so we use it otherwise
 | 
			
		||||
# we fallback to whatever cc does on the system
 | 
			
		||||
  if [ "$GCCVER" != "" ]; then
 | 
			
		||||
    # then strip off whatever prefix egcs prepends the number with...
 | 
			
		||||
    # Hopefully, this will work for any future prefixes as well.
 | 
			
		||||
    GCCVER=`echo $GCCVER | LC_ALL=C sed 's/^[a-zA-Z]*\-//'`
 | 
			
		||||
    # Since gcc 3.1 gcc --version behaviour has changed.  gcc -dumpversion
 | 
			
		||||
    # does give us what we want though, so we use that.  We just just the
 | 
			
		||||
    # major and minor version numbers.
 | 
			
		||||
    # peak single digit before and after first dot, e.g. 2.95.1 gives 29
 | 
			
		||||
    GCCVER=`echo $GCCVER | sed 's/\([0-9]\)\.\([0-9]\).*/\1\2/'`
 | 
			
		||||
    CC=gcc
 | 
			
		||||
  else
 | 
			
		||||
    CC=cc
 | 
			
		||||
@@ -495,12 +488,6 @@ echo Operating system: $GUESSOS
 | 
			
		||||
# script above so we end up with values in vars but that would take
 | 
			
		||||
# more time that I want to waste at the moment
 | 
			
		||||
case "$GUESSOS" in
 | 
			
		||||
  uClinux*64*)
 | 
			
		||||
    OUT=uClinux-dist64
 | 
			
		||||
	;;
 | 
			
		||||
  uClinux*)
 | 
			
		||||
    OUT=uClinux-dist
 | 
			
		||||
	;;
 | 
			
		||||
  mips2-sgi-irix)
 | 
			
		||||
	CPU=`(hinv -t cpu) 2>/dev/null | head -1 | sed 's/^CPU:[^R]*R\([0-9]*\).*/\1/'`
 | 
			
		||||
	CPU=${CPU:-0}
 | 
			
		||||
@@ -536,42 +523,8 @@ case "$GUESSOS" in
 | 
			
		||||
	OUT="irix-mips3-$CC"
 | 
			
		||||
	;;
 | 
			
		||||
  ppc-apple-rhapsody) OUT="rhapsody-ppc-cc" ;;
 | 
			
		||||
  ppc-apple-darwin*)
 | 
			
		||||
	ISA64=`(sysctl -n hw.optional.64bitops) 2>/dev/null`
 | 
			
		||||
	if [ "$ISA64" = "1" -a -z "$KERNEL_BITS" ]; then
 | 
			
		||||
	    echo "WARNING! If you wish to build 64-bit library, then you have to"
 | 
			
		||||
	    echo "         invoke './Configure darwin64-ppc-cc' *manually*."
 | 
			
		||||
	    if [ "$TEST" = "false" -a -t 1 ]; then
 | 
			
		||||
	      echo "         You have about 5 seconds to press Ctrl-C to abort."
 | 
			
		||||
	      (trap "stty `stty -g`" 2 0; stty -icanon min 0 time 50; read waste) <&1
 | 
			
		||||
	    fi
 | 
			
		||||
	fi
 | 
			
		||||
	if [ "$ISA64" = "1" -a "$KERNEL_BITS" = "64" ]; then
 | 
			
		||||
	    OUT="darwin64-ppc-cc"
 | 
			
		||||
	else
 | 
			
		||||
	    OUT="darwin-ppc-cc"
 | 
			
		||||
	fi ;;
 | 
			
		||||
  i?86-apple-darwin*)
 | 
			
		||||
	ISA64=`(sysctl -n hw.optional.x86_64) 2>/dev/null`
 | 
			
		||||
	if [ "$ISA64" = "1" -a -z "$KERNEL_BITS" ]; then
 | 
			
		||||
	    echo "WARNING! If you wish to build 64-bit library, then you have to"
 | 
			
		||||
	    echo "         invoke './Configure darwin64-x86_64-cc' *manually*."
 | 
			
		||||
	    if [ "$TEST" = "false" -a -t 1 ]; then
 | 
			
		||||
	      echo "         You have about 5 seconds to press Ctrl-C to abort."
 | 
			
		||||
	      (trap "stty `stty -g`" 2 0; stty -icanon min 0 time 50; read waste) <&1
 | 
			
		||||
	    fi
 | 
			
		||||
	fi
 | 
			
		||||
	if [ "$ISA64" = "1" -a "$KERNEL_BITS" = "64" ]; then
 | 
			
		||||
	    OUT="darwin64-x86_64-cc"
 | 
			
		||||
	else
 | 
			
		||||
	    OUT="darwin-i386-cc"
 | 
			
		||||
	fi ;;
 | 
			
		||||
  armv6+7-*-iphoneos)
 | 
			
		||||
	options="$options -arch%20armv6 -arch%20armv7"
 | 
			
		||||
	OUT="iphoneos-cross" ;;
 | 
			
		||||
  *-*-iphoneos)
 | 
			
		||||
	options="$options -arch%20${MACHINE}"
 | 
			
		||||
	OUT="iphoneos-cross" ;;
 | 
			
		||||
  ppc-apple-darwin*) OUT="darwin-ppc-cc" ;;
 | 
			
		||||
  i386-apple-darwin*) OUT="darwin-i386-cc" ;;
 | 
			
		||||
  alpha-*-linux2)
 | 
			
		||||
        ISA=`awk '/cpu model/{print$4;exit(0);}' /proc/cpuinfo`
 | 
			
		||||
	case ${ISA:-generic} in
 | 
			
		||||
@@ -587,38 +540,15 @@ case "$GUESSOS" in
 | 
			
		||||
	fi
 | 
			
		||||
	;;
 | 
			
		||||
  ppc64-*-linux2)
 | 
			
		||||
	if [ -z "$KERNEL_BITS" ]; then
 | 
			
		||||
	    echo "WARNING! If you wish to build 64-bit library, then you have to"
 | 
			
		||||
	    echo "         invoke './Configure linux-ppc64' *manually*."
 | 
			
		||||
	    if [ "$TEST" = "false" -a -t 1 ]; then
 | 
			
		||||
		echo "         You have about 5 seconds to press Ctrl-C to abort."
 | 
			
		||||
		(trap "stty `stty -g`" 2 0; stty -icanon min 0 time 50; read waste) <&1
 | 
			
		||||
	    fi
 | 
			
		||||
	fi
 | 
			
		||||
	if [ "$KERNEL_BITS" = "64" ]; then
 | 
			
		||||
	    OUT="linux-ppc64"
 | 
			
		||||
	else
 | 
			
		||||
	    OUT="linux-ppc"
 | 
			
		||||
	    (echo "__LP64__" | gcc -E -x c - 2>/dev/null | grep "^__LP64__" 2>&1 > /dev/null) || options="$options -m32"
 | 
			
		||||
	fi
 | 
			
		||||
	;;
 | 
			
		||||
  ppc64le-*-linux2) OUT="linux-ppc64le" ;;
 | 
			
		||||
  ppc-*-linux2) OUT="linux-ppc" ;;
 | 
			
		||||
  mips64*-*-linux2)
 | 
			
		||||
	echo "WARNING! If you wish to build 64-bit library, then you have to"
 | 
			
		||||
	echo "         invoke './Configure linux64-mips64' *manually*."
 | 
			
		||||
	echo "         invoke './Configure linux-ppc64' *manually*."
 | 
			
		||||
	if [ "$TEST" = "false" -a -t 1 ]; then
 | 
			
		||||
	    echo "         You have about 5 seconds to press Ctrl-C to abort."
 | 
			
		||||
	    (trap "stty `stty -g`" 2 0; stty -icanon min 0 time 50; read waste) <&1
 | 
			
		||||
	fi
 | 
			
		||||
	OUT="linux-mips64"
 | 
			
		||||
	OUT="linux-ppc"
 | 
			
		||||
	;;
 | 
			
		||||
  mips*-*-linux2) OUT="linux-mips32" ;;
 | 
			
		||||
  ppc60x-*-vxworks*) OUT="vxworks-ppc60x" ;;
 | 
			
		||||
  ppcgen-*-vxworks*) OUT="vxworks-ppcgen" ;;
 | 
			
		||||
  pentium-*-vxworks*) OUT="vxworks-pentium" ;;
 | 
			
		||||
  simlinux-*-vxworks*) OUT="vxworks-simlinux" ;;
 | 
			
		||||
  mips-*-vxworks*) OUT="vxworks-mips";;
 | 
			
		||||
  ppc-*-linux2) OUT="linux-ppc" ;;
 | 
			
		||||
  ia64-*-linux?) OUT="linux-ia64" ;;
 | 
			
		||||
  sparc64-*-linux2)
 | 
			
		||||
	echo "WARNING! If you *know* that your GNU C supports 64-bit/V9 ABI"
 | 
			
		||||
@@ -659,26 +589,13 @@ case "$GUESSOS" in
 | 
			
		||||
 | 
			
		||||
	options="$options -DB_ENDIAN -mschedule=$CPUSCHEDULE -march=$CPUARCH"
 | 
			
		||||
	OUT="linux-generic32" ;;
 | 
			
		||||
  armv[1-3]*-*-linux2) OUT="linux-generic32" ;;
 | 
			
		||||
  armv[7-9]*-*-linux2) OUT="linux-armv4"; options="$options -march=armv7-a" ;;
 | 
			
		||||
  arm*-*-linux2) OUT="linux-armv4" ;;
 | 
			
		||||
  aarch64-*-linux2) OUT="linux-aarch64" ;;
 | 
			
		||||
  arm*b-*-linux2) OUT="linux-generic32"; options="$options -DB_ENDIAN" ;;
 | 
			
		||||
  arm*l-*-linux2) OUT="linux-generic32"; options="$options -DL_ENDIAN" ;;
 | 
			
		||||
  sh*b-*-linux2) OUT="linux-generic32"; options="$options -DB_ENDIAN" ;;
 | 
			
		||||
  sh*-*-linux2)  OUT="linux-generic32"; options="$options -DL_ENDIAN" ;;
 | 
			
		||||
  m68k*-*-linux2) OUT="linux-generic32"; options="$options -DB_ENDIAN" ;;
 | 
			
		||||
  s390-*-linux2) OUT="linux-generic32"; options="$options -DB_ENDIAN" ;;
 | 
			
		||||
  s390x-*-linux2)
 | 
			
		||||
	# To be uncommented when glibc bug is fixed, see Configure...
 | 
			
		||||
	#if egrep -e '^features.* highgprs' /proc/cpuinfo >/dev/null ; then
 | 
			
		||||
	#  echo "WARNING! If you wish to build \"highgprs\" 32-bit library, then you"
 | 
			
		||||
	#  echo "         have to invoke './Configure linux32-s390x' *manually*."
 | 
			
		||||
	#  if [ "$TEST" = "false" -a -t -1 ]; then
 | 
			
		||||
	#    echo "         You have about 5 seconds to press Ctrl-C to abort."
 | 
			
		||||
	#    (trap "stty `stty -g`" 2 0; stty -icanon min 0 time 50; read waste) <&1
 | 
			
		||||
	#  fi
 | 
			
		||||
	#fi
 | 
			
		||||
	OUT="linux64-s390x"
 | 
			
		||||
	;;
 | 
			
		||||
  s390-*-linux2) OUT="linux-generic32"; options="$options -DB_ENDIAN -DNO_ASM" ;;
 | 
			
		||||
  s390x-*-linux2) OUT="linux-generic64"; options="$options -DB_ENDIAN" ;;
 | 
			
		||||
  x86_64-*-linux?) OUT="linux-x86_64" ;;
 | 
			
		||||
  *86-*-linux2) OUT="linux-elf"
 | 
			
		||||
	if [ "$GCCVER" -gt 28 ]; then
 | 
			
		||||
@@ -697,7 +614,7 @@ case "$GUESSOS" in
 | 
			
		||||
  sun4[uv]*-*-solaris2)
 | 
			
		||||
	OUT="solaris-sparcv9-$CC"
 | 
			
		||||
	ISA64=`(isalist) 2>/dev/null | grep sparcv9`
 | 
			
		||||
	if [ "$ISA64" != "" -a "$KERNEL_BITS" = "" ]; then
 | 
			
		||||
	if [ "$ISA64" != "" ]; then
 | 
			
		||||
	    if [ "$CC" = "cc" -a $CCVER -ge 50 ]; then
 | 
			
		||||
		echo "WARNING! If you wish to build 64-bit library, then you have to"
 | 
			
		||||
		echo "         invoke './Configure solaris64-sparcv9-cc' *manually*."
 | 
			
		||||
@@ -727,16 +644,13 @@ case "$GUESSOS" in
 | 
			
		||||
		fi
 | 
			
		||||
	    fi
 | 
			
		||||
	fi
 | 
			
		||||
	if [ "$ISA64" != "" -a "$KERNEL_BITS" = "64" ]; then
 | 
			
		||||
	    OUT="solaris64-sparcv9-$CC"
 | 
			
		||||
	fi
 | 
			
		||||
	;;
 | 
			
		||||
  sun4m-*-solaris2)	OUT="solaris-sparcv8-$CC" ;;
 | 
			
		||||
  sun4d-*-solaris2)	OUT="solaris-sparcv8-$CC" ;;
 | 
			
		||||
  sun4*-*-solaris2)	OUT="solaris-sparcv7-$CC" ;;
 | 
			
		||||
  *86*-*-solaris2)
 | 
			
		||||
	ISA64=`(isalist) 2>/dev/null | grep amd64`
 | 
			
		||||
	if [ "$ISA64" != "" -a ${KERNEL_BITS:-64} -eq 64 ]; then
 | 
			
		||||
	if [ "$ISA64" != "" ]; then
 | 
			
		||||
	    OUT="solaris64-x86_64-$CC"
 | 
			
		||||
	else
 | 
			
		||||
	    OUT="solaris-x86-$CC"
 | 
			
		||||
@@ -758,7 +672,7 @@ case "$GUESSOS" in
 | 
			
		||||
			    libc=/usr/lib/libc.so
 | 
			
		||||
			else					# OpenBSD
 | 
			
		||||
			    # ld searches for highest libc.so.* and so do we
 | 
			
		||||
			    libc=`(ls /usr/lib/libc.so.* /lib/libc.so.* | tail -1) 2>/dev/null`
 | 
			
		||||
			    libc=`(ls /usr/lib/libc.so.* | tail -1) 2>/dev/null`
 | 
			
		||||
			fi
 | 
			
		||||
			case "`(file -L $libc) 2>/dev/null`" in
 | 
			
		||||
			*ELF*)	OUT="BSD-x86-elf" ;;
 | 
			
		||||
@@ -788,17 +702,20 @@ case "$GUESSOS" in
 | 
			
		||||
	if [ $CC = "gcc" -a $GCC_BITS = "64" ]; then
 | 
			
		||||
	    OUT="hpux64-parisc2-gcc"
 | 
			
		||||
	fi
 | 
			
		||||
	[ "$KERNEL_BITS" ] || KERNEL_BITS=`(getconf KERNEL_BITS) 2>/dev/null`
 | 
			
		||||
	KERNEL_BITS=`(getconf KERNEL_BITS) 2>/dev/null`
 | 
			
		||||
	KERNEL_BITS=${KERNEL_BITS:-32}
 | 
			
		||||
	CPU_VERSION=`(getconf CPU_VERSION) 2>/dev/null`
 | 
			
		||||
	CPU_VERSION=${CPU_VERSION:-0}
 | 
			
		||||
	# See <sys/unistd.h> for further info on CPU_VERSION.
 | 
			
		||||
	if   [ $CPU_VERSION -ge 768 ]; then	# IA-64 CPU
 | 
			
		||||
	     if [ $KERNEL_BITS -eq 64 -a "$CC" = "cc" ]; then
 | 
			
		||||
	        OUT="hpux64-ia64-cc"
 | 
			
		||||
             else
 | 
			
		||||
	        OUT="hpux-ia64-cc"
 | 
			
		||||
             fi
 | 
			
		||||
	     echo "WARNING! 64-bit ABI is the default configured ABI on HP-UXi."
 | 
			
		||||
	     echo "         If you wish to build 32-bit library, the you have to"
 | 
			
		||||
	     echo "         invoke './Configure hpux-ia64-cc' *manually*."
 | 
			
		||||
	     if [ "$TEST" = "false" -a -t 1 ]; then
 | 
			
		||||
		echo "         You have about 5 seconds to press Ctrl-C to abort."
 | 
			
		||||
		(trap "stty `stty -g`" 2 0; stty -icanon min 0 time 50; read waste) <&1
 | 
			
		||||
	     fi
 | 
			
		||||
	     OUT="hpux64-ia64-cc"
 | 
			
		||||
	elif [ $CPU_VERSION -ge 532 ]; then	# PA-RISC 2.x CPU
 | 
			
		||||
	     OUT=${OUT:-"hpux-parisc2-${CC}"}
 | 
			
		||||
	     if [ $KERNEL_BITS -eq 64 -a "$CC" = "cc" ]; then
 | 
			
		||||
@@ -819,7 +736,7 @@ case "$GUESSOS" in
 | 
			
		||||
	options="$options -D_REENTRANT" ;;
 | 
			
		||||
  *-hpux)	OUT="hpux-parisc-$CC" ;;
 | 
			
		||||
  *-aix)
 | 
			
		||||
	[ "$KERNEL_BITS" ] || KERNEL_BITS=`(getconf KERNEL_BITMODE) 2>/dev/null`
 | 
			
		||||
	KERNEL_BITS=`(getconf KERNEL_BITMODE) 2>/dev/null`
 | 
			
		||||
	KERNEL_BITS=${KERNEL_BITS:-32}
 | 
			
		||||
	OBJECT_MODE=${OBJECT_MODE:-32}
 | 
			
		||||
	if [ "$CC" = "gcc" ]; then
 | 
			
		||||
@@ -852,16 +769,12 @@ case "$GUESSOS" in
 | 
			
		||||
  # *-dgux) OUT="dgux" ;;
 | 
			
		||||
  mips-sony-newsos4) OUT="newsos4-gcc" ;;
 | 
			
		||||
  *-*-cygwin_pre1.3) OUT="Cygwin-pre1.3" ;;
 | 
			
		||||
  i[3456]86-*-cygwin) OUT="Cygwin" ;;
 | 
			
		||||
  *-*-cygwin) OUT="Cygwin-${MACHINE}" ;;
 | 
			
		||||
  *-*-cygwin) OUT="Cygwin" ;;
 | 
			
		||||
  t3e-cray-unicosmk) OUT="cray-t3e" ;;
 | 
			
		||||
  j90-cray-unicos) OUT="cray-j90" ;;
 | 
			
		||||
  nsr-tandem-nsk) OUT="tandem-c89" ;;
 | 
			
		||||
  beos-*) OUT="$GUESSOS" ;;
 | 
			
		||||
  x86pc-*-qnx6) OUT="QNX6-i386" ;;
 | 
			
		||||
  *-*-qnx6) OUT="QNX6" ;;
 | 
			
		||||
  x86-*-android|i?86-*-android) OUT="android-x86" ;;
 | 
			
		||||
  armv[7-9]*-*-android) OUT="android-armv7" ;;
 | 
			
		||||
  *) OUT=`echo $GUESSOS | awk -F- '{print $3}'`;;
 | 
			
		||||
esac
 | 
			
		||||
 | 
			
		||||
@@ -877,11 +790,9 @@ esac
 | 
			
		||||
#  options="$options -DATALLA"
 | 
			
		||||
#fi
 | 
			
		||||
 | 
			
		||||
if expr "$options" : '.*no\-asm' > /dev/null; then :; else
 | 
			
		||||
  sh -c "$CROSS_COMPILE${CC:-gcc} -Wa,--help -c -o /tmp/null.$$.o -x assembler /dev/null && rm /tmp/null.$$.o" 2>&1 | \
 | 
			
		||||
  grep \\--noexecstack >/dev/null && \
 | 
			
		||||
($CC -Wa,--help -c -o /dev/null -x assembler /dev/null 2>&1 | \
 | 
			
		||||
 grep \\--noexecstack) 2>&1 > /dev/null && \
 | 
			
		||||
  options="$options -Wa,--noexecstack"
 | 
			
		||||
fi
 | 
			
		||||
 | 
			
		||||
# gcc < 2.8 does not support -march=ultrasparc
 | 
			
		||||
if [ "$OUT" = solaris-sparcv9-gcc -a $GCCVER -lt 28 ]
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										6
									
								
								crypto/.cvsignore
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										6
									
								
								crypto/.cvsignore
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,6 @@
 | 
			
		||||
lib
 | 
			
		||||
buildinf.h
 | 
			
		||||
opensslconf.h
 | 
			
		||||
Makefile.save
 | 
			
		||||
*.flc
 | 
			
		||||
semantic.cache
 | 
			
		||||
@@ -39,17 +39,21 @@
 | 
			
		||||
#ifndef LPDIR_H
 | 
			
		||||
# include "LPdir.h"
 | 
			
		||||
#endif
 | 
			
		||||
#include "vms_rms.h"
 | 
			
		||||
 | 
			
		||||
/* Some compiler options hide EVMSERR. */
 | 
			
		||||
/* Because some compiler options hide this macor */
 | 
			
		||||
#ifndef EVMSERR
 | 
			
		||||
# define EVMSERR        65535   /* error for non-translatable VMS errors */
 | 
			
		||||
# define EVMSERR         65535  /* error for non-translatable VMS errors */
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
struct LP_dir_context_st {
 | 
			
		||||
    unsigned long VMS_context;
 | 
			
		||||
    char filespec[NAMX_MAXRSS + 1];
 | 
			
		||||
    char result[NAMX_MAXRSS + 1];
 | 
			
		||||
#ifdef NAML$C_MAXRSS
 | 
			
		||||
    char filespec[NAML$C_MAXRSS + 1];
 | 
			
		||||
    char result[NAML$C_MAXRSS + 1];
 | 
			
		||||
#else
 | 
			
		||||
    char filespec[256];
 | 
			
		||||
    char result[256];
 | 
			
		||||
#endif
 | 
			
		||||
    struct dsc$descriptor_d filespec_dsc;
 | 
			
		||||
    struct dsc$descriptor_d result_dsc;
 | 
			
		||||
};
 | 
			
		||||
@@ -60,16 +64,6 @@ const char *LP_find_file(LP_DIR_CTX **ctx, const char *directory)
 | 
			
		||||
    char *p, *r;
 | 
			
		||||
    size_t l;
 | 
			
		||||
    unsigned long flags = 0;
 | 
			
		||||
 | 
			
		||||
/* Arrange 32-bit pointer to (copied) string storage, if needed. */
 | 
			
		||||
#if __INITIAL_POINTER_SIZE == 64
 | 
			
		||||
# pragma pointer_size save
 | 
			
		||||
# pragma pointer_size 32
 | 
			
		||||
    char *ctx_filespec_32p;
 | 
			
		||||
# pragma pointer_size restore
 | 
			
		||||
    char ctx_filespec_32[NAMX_MAXRSS + 1];
 | 
			
		||||
#endif                          /* __INITIAL_POINTER_SIZE == 64 */
 | 
			
		||||
 | 
			
		||||
#ifdef NAML$C_MAXRSS
 | 
			
		||||
    flags |= LIB$M_FIL_LONG_NAMES;
 | 
			
		||||
#endif
 | 
			
		||||
@@ -99,7 +93,13 @@ const char *LP_find_file(LP_DIR_CTX **ctx, const char *directory)
 | 
			
		||||
 | 
			
		||||
        filespeclen += 4;       /* "*.*;" */
 | 
			
		||||
 | 
			
		||||
        if (filespeclen > NAMX_MAXRSS) {
 | 
			
		||||
        if (filespeclen >
 | 
			
		||||
#ifdef NAML$C_MAXRSS
 | 
			
		||||
            NAML$C_MAXRSS
 | 
			
		||||
#else
 | 
			
		||||
            255
 | 
			
		||||
#endif
 | 
			
		||||
            ) {
 | 
			
		||||
            errno = ENAMETOOLONG;
 | 
			
		||||
            return 0;
 | 
			
		||||
        }
 | 
			
		||||
@@ -113,21 +113,14 @@ const char *LP_find_file(LP_DIR_CTX **ctx, const char *directory)
 | 
			
		||||
 | 
			
		||||
        strcpy((*ctx)->filespec, directory);
 | 
			
		||||
        strcat((*ctx)->filespec, "*.*;");
 | 
			
		||||
 | 
			
		||||
/* Arrange 32-bit pointer to (copied) string storage, if needed. */
 | 
			
		||||
#if __INITIAL_POINTER_SIZE == 64
 | 
			
		||||
# define CTX_FILESPEC ctx_filespec_32p
 | 
			
		||||
        /* Copy the file name to storage with a 32-bit pointer. */
 | 
			
		||||
        ctx_filespec_32p = ctx_filespec_32;
 | 
			
		||||
        strcpy(ctx_filespec_32p, (*ctx)->filespec);
 | 
			
		||||
#else                           /* __INITIAL_POINTER_SIZE == 64 */
 | 
			
		||||
# define CTX_FILESPEC (*ctx)->filespec
 | 
			
		||||
#endif                          /* __INITIAL_POINTER_SIZE == 64 [else] */
 | 
			
		||||
 | 
			
		||||
        (*ctx)->filespec_dsc.dsc$w_length = filespeclen;
 | 
			
		||||
        (*ctx)->filespec_dsc.dsc$b_dtype = DSC$K_DTYPE_T;
 | 
			
		||||
        (*ctx)->filespec_dsc.dsc$b_class = DSC$K_CLASS_S;
 | 
			
		||||
        (*ctx)->filespec_dsc.dsc$a_pointer = CTX_FILESPEC;
 | 
			
		||||
        (*ctx)->filespec_dsc.dsc$a_pointer = (*ctx)->filespec;
 | 
			
		||||
        (*ctx)->result_dsc.dsc$w_length = 0;
 | 
			
		||||
        (*ctx)->result_dsc.dsc$b_dtype = DSC$K_DTYPE_T;
 | 
			
		||||
        (*ctx)->result_dsc.dsc$b_class = DSC$K_CLASS_D;
 | 
			
		||||
        (*ctx)->result_dsc.dsc$a_pointer = 0;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    (*ctx)->result_dsc.dsc$w_length = 0;
 | 
			
		||||
 
 | 
			
		||||
@@ -37,7 +37,7 @@
 | 
			
		||||
#if defined(LP_SYS_WINCE) && !defined(FindFirstFile)
 | 
			
		||||
# define FindFirstFile FindFirstFileW
 | 
			
		||||
#endif
 | 
			
		||||
#if defined(LP_SYS_WINCE) && !defined(FindNextFile)
 | 
			
		||||
#if defined(LP_SYS_WINCE) && !defined(FindFirstFile)
 | 
			
		||||
# define FindNextFile FindNextFileW
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
@@ -53,6 +53,8 @@ struct LP_dir_context_st {
 | 
			
		||||
 | 
			
		||||
const char *LP_find_file(LP_DIR_CTX **ctx, const char *directory)
 | 
			
		||||
{
 | 
			
		||||
    struct dirent *direntry = NULL;
 | 
			
		||||
 | 
			
		||||
    if (ctx == NULL || directory == NULL) {
 | 
			
		||||
        errno = EINVAL;
 | 
			
		||||
        return 0;
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										107
									
								
								crypto/Makefile
									
									
									
									
									
								
							
							
						
						
									
										107
									
								
								crypto/Makefile
									
									
									
									
									
								
							@@ -5,9 +5,9 @@
 | 
			
		||||
DIR=		crypto
 | 
			
		||||
TOP=		..
 | 
			
		||||
CC=		cc
 | 
			
		||||
INCLUDE=	-I. -I$(TOP) -I../include $(ZLIB_INCLUDE)
 | 
			
		||||
INCLUDE=	-I. -I$(TOP) -I../include
 | 
			
		||||
# INCLUDES targets sudbirs!
 | 
			
		||||
INCLUDES=	-I.. -I../.. -I../modes -I../asn1 -I../evp -I../../include $(ZLIB_INCLUDE)
 | 
			
		||||
INCLUDES=	-I.. -I../.. -I../../include
 | 
			
		||||
CFLAG=		-g
 | 
			
		||||
MAKEDEPPROG=	makedepend
 | 
			
		||||
MAKEDEPEND=	$(TOP)/util/domd $(TOP) -MD $(MAKEDEPPROG)
 | 
			
		||||
@@ -17,7 +17,7 @@ AR=		ar r
 | 
			
		||||
 | 
			
		||||
RECURSIVE_MAKE=	[ -n "$(SDIRS)" ] && for i in $(SDIRS) ; do \
 | 
			
		||||
		    (cd $$i && echo "making $$target in $(DIR)/$$i..." && \
 | 
			
		||||
		    $(MAKE) -e TOP=../.. DIR=$$i INCLUDES='$(INCLUDES)' $$target ) || exit 1; \
 | 
			
		||||
		    $(MAKE) -e TOP=../.. DIR=$$i INCLUDES='${INCLUDES}' $$target ) || exit 1; \
 | 
			
		||||
		done;
 | 
			
		||||
 | 
			
		||||
PEX_LIBS=
 | 
			
		||||
@@ -26,7 +26,6 @@ EX_LIBS=
 | 
			
		||||
CFLAGS= $(INCLUDE) $(CFLAG)
 | 
			
		||||
ASFLAGS= $(INCLUDE) $(ASFLAG)
 | 
			
		||||
AFLAGS=$(ASFLAGS)
 | 
			
		||||
CPUID_OBJ=mem_clr.o
 | 
			
		||||
 | 
			
		||||
LIBS=
 | 
			
		||||
 | 
			
		||||
@@ -35,14 +34,12 @@ TEST=constant_time_test.c
 | 
			
		||||
 | 
			
		||||
LIB= $(TOP)/libcrypto.a
 | 
			
		||||
SHARED_LIB= libcrypto$(SHLIB_EXT)
 | 
			
		||||
LIBSRC=	cryptlib.c mem.c mem_clr.c mem_dbg.c cversion.c ex_data.c cpt_err.c \
 | 
			
		||||
	ebcdic.c uid.c o_time.c o_str.c o_dir.c o_fips.c o_init.c fips_ers.c
 | 
			
		||||
LIBOBJ= cryptlib.o mem.o mem_dbg.o cversion.o ex_data.o cpt_err.o ebcdic.o \
 | 
			
		||||
	uid.o o_time.o o_str.o o_dir.o o_fips.o o_init.o fips_ers.o $(CPUID_OBJ)
 | 
			
		||||
LIBSRC=	cryptlib.c dyn_lck.c mem.c mem_clr.c mem_dbg.c cversion.c ex_data.c tmdiff.c cpt_err.c ebcdic.c uid.c o_time.c o_str.c o_dir.c o_init.c fips_err.c
 | 
			
		||||
LIBOBJ= cryptlib.o dyn_lck.o mem.o mem_clr.o mem_dbg.o cversion.o ex_data.o tmdiff.o cpt_err.o ebcdic.o uid.o o_time.o o_str.o o_dir.o o_init.o fips_err.o $(CPUID_OBJ)
 | 
			
		||||
 | 
			
		||||
SRC= $(LIBSRC)
 | 
			
		||||
 | 
			
		||||
EXHEADER= crypto.h opensslv.h opensslconf.h ebcdic.h symhacks.h \
 | 
			
		||||
EXHEADER= crypto.h tmdiff.h opensslv.h opensslconf.h ebcdic.h symhacks.h \
 | 
			
		||||
	ossl_typ.h
 | 
			
		||||
HEADER=	cryptlib.h buildinf.h md32_common.h o_time.h o_str.h o_dir.h \
 | 
			
		||||
	constant_time_locl.h $(EXHEADER)
 | 
			
		||||
@@ -52,34 +49,36 @@ ALL=    $(GENERAL) $(SRC) $(HEADER)
 | 
			
		||||
top:
 | 
			
		||||
	@(cd ..; $(MAKE) DIRS=$(DIR) all)
 | 
			
		||||
 | 
			
		||||
all: shared
 | 
			
		||||
all: lib
 | 
			
		||||
 | 
			
		||||
buildinf.h: ../Makefile
 | 
			
		||||
	$(PERL) $(TOP)/util/mkbuildinf.pl "$(CC) $(CFLAGS)" "$(PLATFORM)" >buildinf.h
 | 
			
		||||
	( echo "#ifndef MK1MF_BUILD"; \
 | 
			
		||||
	echo '  /* auto-generated by crypto/Makefile for crypto/cversion.c */'; \
 | 
			
		||||
	echo '  #define CFLAGS "$(CC) $(CFLAG)"'; \
 | 
			
		||||
	echo '  #define PLATFORM "$(PLATFORM)"'; \
 | 
			
		||||
	echo "  #define DATE \"`LC_ALL=C LC_TIME=C date`\""; \
 | 
			
		||||
	echo '#endif' ) >buildinf.h
 | 
			
		||||
 | 
			
		||||
x86cpuid.s:	x86cpuid.pl perlasm/x86asm.pl
 | 
			
		||||
	$(PERL) x86cpuid.pl $(PERLASM_SCHEME) $(CFLAGS) $(PROCESSOR) > $@
 | 
			
		||||
x86cpuid-elf.s:	x86cpuid.pl perlasm/x86asm.pl
 | 
			
		||||
	$(PERL) x86cpuid.pl elf $(CFLAGS) $(PROCESSOR) > $@
 | 
			
		||||
x86cpuid-cof.s: x86cpuid.pl perlasm/x86asm.pl
 | 
			
		||||
	$(PERL) x86cpuid.pl coff $(CFLAGS) $(PROCESSOR) > $@
 | 
			
		||||
x86cpuid-out.s: x86cpuid.pl perlasm/x86asm.pl
 | 
			
		||||
	$(PERL) x86cpuid.pl a.out $(CFLAGS) $(PROCESSOR) > $@
 | 
			
		||||
 | 
			
		||||
applink.o:	$(TOP)/ms/applink.c
 | 
			
		||||
	$(CC) $(CFLAGS) -c -o $@ $(TOP)/ms/applink.c
 | 
			
		||||
uplink.o:	../ms/uplink.c
 | 
			
		||||
	$(CC) $(CFLAGS) -c -o $@ ../ms/uplink.c
 | 
			
		||||
 | 
			
		||||
uplink.o:	$(TOP)/ms/uplink.c applink.o
 | 
			
		||||
	$(CC) $(CFLAGS) -c -o $@ $(TOP)/ms/uplink.c
 | 
			
		||||
uplink-cof.s:	../ms/uplink.pl
 | 
			
		||||
	$(PERL) ../ms/uplink.pl coff > $@
 | 
			
		||||
 | 
			
		||||
uplink-x86.s:	$(TOP)/ms/uplink-x86.pl
 | 
			
		||||
	$(PERL) $(TOP)/ms/uplink-x86.pl $(PERLASM_SCHEME) > $@
 | 
			
		||||
 | 
			
		||||
x86_64cpuid.s: x86_64cpuid.pl;	$(PERL) x86_64cpuid.pl $(PERLASM_SCHEME) > $@
 | 
			
		||||
ia64cpuid.s: ia64cpuid.S;	$(CC) $(CFLAGS) -E ia64cpuid.S > $@
 | 
			
		||||
ppccpuid.s:	ppccpuid.pl;	$(PERL) ppccpuid.pl $(PERLASM_SCHEME) $@
 | 
			
		||||
pariscid.s:	pariscid.pl;	$(PERL) pariscid.pl $(PERLASM_SCHEME) $@
 | 
			
		||||
alphacpuid.s:	alphacpuid.pl
 | 
			
		||||
	(preproc=$$$$.$@.S; trap "rm $$preproc" INT; \
 | 
			
		||||
	$(PERL) alphacpuid.pl > $$preproc && \
 | 
			
		||||
	$(CC) -E -P $$preproc > $@ && rm $$preproc)
 | 
			
		||||
x86_64cpuid.s: x86_64cpuid.pl
 | 
			
		||||
	$(PERL) x86_64cpuid.pl $@
 | 
			
		||||
ia64cpuid.s: ia64cpuid.S
 | 
			
		||||
	$(CC) $(CFLAGS) -E ia64cpuid.S > $@
 | 
			
		||||
 | 
			
		||||
testapps:
 | 
			
		||||
	[ -z "$(THIS)" ] || (	if echo $(SDIRS) | fgrep ' des '; \
 | 
			
		||||
	[ -z "$(THIS)" ] || (	if echo ${SDIRS} | fgrep ' des '; \
 | 
			
		||||
				then cd des && $(MAKE) -e des; fi )
 | 
			
		||||
	[ -z "$(THIS)" ] || ( cd pkcs7 && $(MAKE) -e testapps );
 | 
			
		||||
	@if [ -z "$(THIS)" ]; then $(MAKE) -f $(TOP)/Makefile reflect THIS=$@; fi
 | 
			
		||||
@@ -88,7 +87,7 @@ subdirs:
 | 
			
		||||
	@target=all; $(RECURSIVE_MAKE)
 | 
			
		||||
 | 
			
		||||
files:
 | 
			
		||||
	$(PERL) $(TOP)/util/files.pl "CPUID_OBJ=$(CPUID_OBJ)" Makefile >> $(TOP)/MINFO
 | 
			
		||||
	$(PERL) $(TOP)/util/files.pl Makefile >> $(TOP)/MINFO
 | 
			
		||||
	@target=files; $(RECURSIVE_MAKE)
 | 
			
		||||
 | 
			
		||||
links:
 | 
			
		||||
@@ -97,12 +96,11 @@ links:
 | 
			
		||||
	@$(PERL) $(TOP)/util/mklink.pl ../apps $(APPS)
 | 
			
		||||
	@target=links; $(RECURSIVE_MAKE)
 | 
			
		||||
 | 
			
		||||
# lib: $(LIB): are splitted to avoid end-less loop
 | 
			
		||||
lib:	$(LIB)
 | 
			
		||||
# lib: and $(LIB): are splitted to avoid end-less loop
 | 
			
		||||
lib:	buildinf.h $(LIB) subdirs
 | 
			
		||||
	@touch lib
 | 
			
		||||
$(LIB):	$(LIBOBJ)
 | 
			
		||||
	$(AR) $(LIB) $(LIBOBJ)
 | 
			
		||||
	test -z "$(FIPSLIBDIR)" || $(AR) $(LIB) $(FIPSLIBDIR)fipscanister.o
 | 
			
		||||
	$(ARX) $(LIB) $(LIBOBJ)
 | 
			
		||||
	$(RANLIB) $(LIB) || echo Never mind.
 | 
			
		||||
 | 
			
		||||
shared: buildinf.h lib subdirs
 | 
			
		||||
@@ -125,17 +123,12 @@ install:
 | 
			
		||||
lint:
 | 
			
		||||
	@target=lint; $(RECURSIVE_MAKE)
 | 
			
		||||
 | 
			
		||||
update: local_depend
 | 
			
		||||
	@[ -z "$(THIS)" ] || (set -e; target=update; $(RECURSIVE_MAKE) )
 | 
			
		||||
	@if [ -z "$(THIS)" ]; then $(MAKE) -f $(TOP)/Makefile reflect THIS=$@; fi
 | 
			
		||||
 | 
			
		||||
depend: local_depend
 | 
			
		||||
	@[ -z "$(THIS)" ] || (set -e; target=depend; $(RECURSIVE_MAKE) )
 | 
			
		||||
	@if [ -z "$(THIS)" ]; then $(MAKE) -f $(TOP)/Makefile reflect THIS=$@; fi
 | 
			
		||||
local_depend:
 | 
			
		||||
depend:
 | 
			
		||||
	@[ -z "$(THIS)" -o -f buildinf.h ] || touch buildinf.h # fake buildinf.h if it does not exist
 | 
			
		||||
	@[ -z "$(THIS)" ] || $(MAKEDEPEND) -- $(CFLAG) $(INCLUDE) $(DEPFLAG) -- $(PROGS) $(LIBSRC)
 | 
			
		||||
	@[ -z "$(THIS)" -o -s buildinf.h ] || rm buildinf.h
 | 
			
		||||
	@[ -z "$(THIS)" ] || (set -e; target=depend; $(RECURSIVE_MAKE) )
 | 
			
		||||
	@if [ -z "$(THIS)" ]; then $(MAKE) -f $(TOP)/Makefile reflect THIS=$@; fi
 | 
			
		||||
 | 
			
		||||
clean:
 | 
			
		||||
	rm -f buildinf.h *.s *.o */*.o *.obj lib tags core .pure .nfs* *.old *.bak fluff
 | 
			
		||||
@@ -144,7 +137,6 @@ clean:
 | 
			
		||||
dclean:
 | 
			
		||||
	$(PERL) -pe 'if (/^# DO NOT DELETE THIS LINE/) {print; exit(0);}' $(MAKEFILE) >Makefile.new
 | 
			
		||||
	mv -f Makefile.new $(MAKEFILE)
 | 
			
		||||
	rm -f opensslconf.h
 | 
			
		||||
	@target=dclean; $(RECURSIVE_MAKE)
 | 
			
		||||
 | 
			
		||||
# DO NOT DELETE THIS LINE -- make depend depends on it.
 | 
			
		||||
@@ -169,6 +161,13 @@ cversion.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
 | 
			
		||||
cversion.o: ../include/openssl/ossl_typ.h ../include/openssl/safestack.h
 | 
			
		||||
cversion.o: ../include/openssl/stack.h ../include/openssl/symhacks.h buildinf.h
 | 
			
		||||
cversion.o: cryptlib.h cversion.c
 | 
			
		||||
dyn_lck.o: ../e_os.h ../include/openssl/bio.h ../include/openssl/buffer.h
 | 
			
		||||
dyn_lck.o: ../include/openssl/crypto.h ../include/openssl/e_os2.h
 | 
			
		||||
dyn_lck.o: ../include/openssl/err.h ../include/openssl/lhash.h
 | 
			
		||||
dyn_lck.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
 | 
			
		||||
dyn_lck.o: ../include/openssl/ossl_typ.h ../include/openssl/safestack.h
 | 
			
		||||
dyn_lck.o: ../include/openssl/stack.h ../include/openssl/symhacks.h cryptlib.h
 | 
			
		||||
dyn_lck.o: dyn_lck.c
 | 
			
		||||
ebcdic.o: ../include/openssl/e_os2.h ../include/openssl/opensslconf.h ebcdic.c
 | 
			
		||||
ex_data.o: ../e_os.h ../include/openssl/bio.h ../include/openssl/buffer.h
 | 
			
		||||
ex_data.o: ../include/openssl/crypto.h ../include/openssl/e_os2.h
 | 
			
		||||
@@ -177,7 +176,13 @@ ex_data.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
 | 
			
		||||
ex_data.o: ../include/openssl/ossl_typ.h ../include/openssl/safestack.h
 | 
			
		||||
ex_data.o: ../include/openssl/stack.h ../include/openssl/symhacks.h cryptlib.h
 | 
			
		||||
ex_data.o: ex_data.c
 | 
			
		||||
fips_ers.o: ../include/openssl/opensslconf.h fips_ers.c
 | 
			
		||||
fips_err.o: ../include/openssl/bio.h ../include/openssl/crypto.h
 | 
			
		||||
fips_err.o: ../include/openssl/e_os2.h ../include/openssl/err.h
 | 
			
		||||
fips_err.o: ../include/openssl/fips.h ../include/openssl/lhash.h
 | 
			
		||||
fips_err.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
 | 
			
		||||
fips_err.o: ../include/openssl/ossl_typ.h ../include/openssl/safestack.h
 | 
			
		||||
fips_err.o: ../include/openssl/stack.h ../include/openssl/symhacks.h fips_err.c
 | 
			
		||||
fips_err.o: fips_err.h
 | 
			
		||||
mem.o: ../e_os.h ../include/openssl/bio.h ../include/openssl/buffer.h
 | 
			
		||||
mem.o: ../include/openssl/crypto.h ../include/openssl/e_os2.h
 | 
			
		||||
mem.o: ../include/openssl/err.h ../include/openssl/lhash.h
 | 
			
		||||
@@ -198,13 +203,6 @@ mem_dbg.o: ../include/openssl/stack.h ../include/openssl/symhacks.h cryptlib.h
 | 
			
		||||
mem_dbg.o: mem_dbg.c
 | 
			
		||||
o_dir.o: ../e_os.h ../include/openssl/e_os2.h ../include/openssl/opensslconf.h
 | 
			
		||||
o_dir.o: LPdir_unix.c o_dir.c o_dir.h
 | 
			
		||||
o_fips.o: ../e_os.h ../include/openssl/bio.h ../include/openssl/buffer.h
 | 
			
		||||
o_fips.o: ../include/openssl/crypto.h ../include/openssl/e_os2.h
 | 
			
		||||
o_fips.o: ../include/openssl/err.h ../include/openssl/lhash.h
 | 
			
		||||
o_fips.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
 | 
			
		||||
o_fips.o: ../include/openssl/ossl_typ.h ../include/openssl/safestack.h
 | 
			
		||||
o_fips.o: ../include/openssl/stack.h ../include/openssl/symhacks.h cryptlib.h
 | 
			
		||||
o_fips.o: o_fips.c
 | 
			
		||||
o_init.o: ../e_os.h ../include/openssl/bio.h ../include/openssl/crypto.h
 | 
			
		||||
o_init.o: ../include/openssl/e_os2.h ../include/openssl/err.h
 | 
			
		||||
o_init.o: ../include/openssl/lhash.h ../include/openssl/opensslconf.h
 | 
			
		||||
@@ -215,6 +213,13 @@ o_str.o: ../e_os.h ../include/openssl/e_os2.h ../include/openssl/opensslconf.h
 | 
			
		||||
o_str.o: o_str.c o_str.h
 | 
			
		||||
o_time.o: ../include/openssl/e_os2.h ../include/openssl/opensslconf.h o_time.c
 | 
			
		||||
o_time.o: o_time.h
 | 
			
		||||
tmdiff.o: ../e_os.h ../include/openssl/bio.h ../include/openssl/buffer.h
 | 
			
		||||
tmdiff.o: ../include/openssl/crypto.h ../include/openssl/e_os2.h
 | 
			
		||||
tmdiff.o: ../include/openssl/err.h ../include/openssl/lhash.h
 | 
			
		||||
tmdiff.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
 | 
			
		||||
tmdiff.o: ../include/openssl/ossl_typ.h ../include/openssl/safestack.h
 | 
			
		||||
tmdiff.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
 | 
			
		||||
tmdiff.o: ../include/openssl/tmdiff.h cryptlib.h tmdiff.c
 | 
			
		||||
uid.o: ../include/openssl/crypto.h ../include/openssl/e_os2.h
 | 
			
		||||
uid.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
 | 
			
		||||
uid.o: ../include/openssl/ossl_typ.h ../include/openssl/safestack.h
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										5
									
								
								crypto/aes/.cvsignore
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										5
									
								
								crypto/aes/.cvsignore
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,5 @@
 | 
			
		||||
lib
 | 
			
		||||
Makefile.save
 | 
			
		||||
*.flc
 | 
			
		||||
semantic.cache
 | 
			
		||||
ax86-elf.s
 | 
			
		||||
Some files were not shown because too many files have changed in this diff Show More
		Reference in New Issue
	
	Block a user