Compare commits
5790 Commits
STATE_afte
...
OpenSSL_1_
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
517899e6c8 | ||
|
|
f61bbf8da5 | ||
|
|
1f31458a77 | ||
|
|
5fbc59cac6 | ||
|
|
370ac32030 | ||
|
|
dd90a91d87 | ||
|
|
176b59d157 | ||
|
|
907f04a303 | ||
|
|
f3b355fec3 | ||
|
|
c4ce10773f | ||
|
|
d46de4ce48 | ||
|
|
418df5ea23 | ||
|
|
d163a2cc46 | ||
|
|
72df35acf2 | ||
|
|
f92b196723 | ||
|
|
e94118ae2a | ||
|
|
106a9a5d7e | ||
|
|
cb972a4fe7 | ||
|
|
ee2d14be94 | ||
|
|
3d2c3fa5fc | ||
|
|
ba5693686e | ||
|
|
59b5ab4aa7 | ||
|
|
c22ed559bb | ||
|
|
4b6f33a5c2 | ||
|
|
c36d3840ff | ||
|
|
05bdebb6e0 | ||
|
|
32b2ad7e07 | ||
|
|
1977240204 | ||
|
|
939b496027 | ||
|
|
cce3e4adb7 | ||
|
|
f3e85f4359 | ||
|
|
cc74177e71 | ||
|
|
e2cf18c635 | ||
|
|
df00b6eb5e | ||
|
|
1ee85aab75 | ||
|
|
029e8f3ac9 | ||
|
|
28ea6ad612 | ||
|
|
4ae1c7771d | ||
|
|
dbcf8e3319 | ||
|
|
5fcfef49d9 | ||
|
|
8af1319270 | ||
|
|
38b7073328 | ||
|
|
75077a2277 | ||
|
|
c62592e52f | ||
|
|
f460f050c2 | ||
|
|
eb797fde3f | ||
|
|
b484b040e3 | ||
|
|
726b5e7132 | ||
|
|
0a9f8e0621 | ||
|
|
1c687ff4dd | ||
|
|
c6a39046f5 | ||
|
|
cf1bf3f032 | ||
|
|
f7bf8e02df | ||
|
|
3b509e8cdc | ||
|
|
63830384e9 | ||
|
|
ff4de7dde9 | ||
|
|
3372aeed2c | ||
|
|
8568170d77 | ||
|
|
f1612746ec | ||
|
|
5a1f055d91 | ||
|
|
e96de9822e | ||
|
|
2df0ba9b4f | ||
|
|
76b49a8ad7 | ||
|
|
5e0ec9012b | ||
|
|
5c122908ab | ||
|
|
1c70c783af | ||
|
|
9dff24e43a | ||
|
|
6865dea2d6 | ||
|
|
76d0c6d48e | ||
|
|
a329ae2268 | ||
|
|
f3c4abb377 | ||
|
|
189e20c68c | ||
|
|
4b771121f2 | ||
|
|
ee827adf04 | ||
|
|
cd258a84db | ||
|
|
017f695f2c | ||
|
|
ee900ed1f7 | ||
|
|
39b36cb438 | ||
|
|
26800340db | ||
|
|
592ac25342 | ||
|
|
d889682208 | ||
|
|
951ede2a06 | ||
|
|
974d4d675c | ||
|
|
3be5df2272 | ||
|
|
80a06268ae | ||
|
|
e3dd33c25c | ||
|
|
d695a02254 | ||
|
|
a209623fbb | ||
|
|
92caee08d3 | ||
|
|
0725acd071 | ||
|
|
5fa7c10bc4 | ||
|
|
96d9674646 | ||
|
|
32d3b0f52f | ||
|
|
31d085ca74 | ||
|
|
c70908d247 | ||
|
|
e963109fcd | ||
|
|
da23637e8e | ||
|
|
5c3fbbc875 | ||
|
|
40f26ac782 | ||
|
|
89c2720298 | ||
|
|
047cdde7a5 | ||
|
|
10473a5a2c | ||
|
|
bd41063b11 | ||
|
|
0186f7bf87 | ||
|
|
10a612a9e4 | ||
|
|
a20db08e77 | ||
|
|
9da34ad6cb | ||
|
|
a63d3ac012 | ||
|
|
8a46e51ed8 | ||
|
|
fe9b85c3cb | ||
|
|
42c9c7103c | ||
|
|
4ebc70cc51 | ||
|
|
2674af2f79 | ||
|
|
bae9b9915a | ||
|
|
750190567a | ||
|
|
23a9b24aa1 | ||
|
|
5d74b4b4b3 | ||
|
|
d635f4bb36 | ||
|
|
117476ba30 | ||
|
|
a6a704f448 | ||
|
|
506c106880 | ||
|
|
686d82a7a2 | ||
|
|
8ca79fcbf4 | ||
|
|
a4517be9e3 | ||
|
|
6e24e1cdd2 | ||
|
|
ffc69bd942 | ||
|
|
82123b5e94 | ||
|
|
cd56a08d4e | ||
|
|
e2acb69c76 | ||
|
|
c982285ab6 | ||
|
|
b485d97634 | ||
|
|
636c42d747 | ||
|
|
28e4f659c5 | ||
|
|
6a43243d1d | ||
|
|
f08731cd82 | ||
|
|
f4b8760056 | ||
|
|
d3554bff69 | ||
|
|
3f9117e161 | ||
|
|
eadc81e7dd | ||
|
|
a2fcab9978 | ||
|
|
1a09816435 | ||
|
|
0e978b9a5d | ||
|
|
f06249f112 | ||
|
|
2407241fb2 | ||
|
|
3942e7d9eb | ||
|
|
2679485e69 | ||
|
|
e6dcb08984 | ||
|
|
0c8f422999 | ||
|
|
cc27bec2b4 | ||
|
|
f5ee521307 | ||
|
|
58d8a271ab | ||
|
|
8b7e469d06 | ||
|
|
93cb447df2 | ||
|
|
521246e608 | ||
|
|
ef6d3485ec | ||
|
|
a67303954c | ||
|
|
cb9d5b7b53 | ||
|
|
876ed10574 | ||
|
|
bc2e18a3c8 | ||
|
|
0440d4ebe4 | ||
|
|
183db9af80 | ||
|
|
9f11421950 | ||
|
|
51527f1e35 | ||
|
|
1810b04728 | ||
|
|
5c921f14cb | ||
|
|
d58a852fbd | ||
|
|
323a7e76e6 | ||
|
|
059907771b | ||
|
|
ea65e92b22 | ||
|
|
f3cc3da447 | ||
|
|
1aff39de76 | ||
|
|
eafdbd8ec3 | ||
|
|
1159e24d56 | ||
|
|
b91058d222 | ||
|
|
89117535f1 | ||
|
|
08a2df480d | ||
|
|
9cd061725b | ||
|
|
e347d80287 | ||
|
|
9e7a5464d7 | ||
|
|
e224c45317 | ||
|
|
e961fa4479 | ||
|
|
aafdbbc469 | ||
|
|
a9ea906654 | ||
|
|
bb14c2c9ca | ||
|
|
a1331af032 | ||
|
|
e48e86232e | ||
|
|
66aacf3872 | ||
|
|
97ac0d8564 | ||
|
|
f8e662e71c | ||
|
|
468e04bf1f | ||
|
|
ac7d33deec | ||
|
|
6b7c68e038 | ||
|
|
81ce20e6ac | ||
|
|
324a977492 | ||
|
|
69aeb99f32 | ||
|
|
53e652ae44 | ||
|
|
131d3fdfe2 | ||
|
|
1895583835 | ||
|
|
5226c62b76 | ||
|
|
491f3e4e8e | ||
|
|
184693f4af | ||
|
|
925bfca5d3 | ||
|
|
90a5adffc7 | ||
|
|
73f8982017 | ||
|
|
cda8845ded | ||
|
|
47050853f1 | ||
|
|
10621efd32 | ||
|
|
e498b83fed | ||
|
|
2e4d15fd04 | ||
|
|
3b0e0d1231 | ||
|
|
f7b36402d6 | ||
|
|
0f6c965823 | ||
|
|
4651718410 | ||
|
|
fbfad23f0c | ||
|
|
68085a73af | ||
|
|
bc974f8b36 | ||
|
|
72d7ed66e2 | ||
|
|
2655f5644d | ||
|
|
3af30a7b8b | ||
|
|
e060570e62 | ||
|
|
1ac02e4b89 | ||
|
|
7116341e18 | ||
|
|
92fe1dbc0e | ||
|
|
d9bd6d1f3d | ||
|
|
c44bad6b38 | ||
|
|
2e989d80ce | ||
|
|
2cef4e6c29 | ||
|
|
064198a817 | ||
|
|
4017726f72 | ||
|
|
1d7c823ab5 | ||
|
|
3cf9f81b09 | ||
|
|
5a098aeb9d | ||
|
|
c197906261 | ||
|
|
87309e2fc1 | ||
|
|
9fb77b8e0d | ||
|
|
3bb069d808 | ||
|
|
7962ea7aa6 | ||
|
|
cbb5afdc34 | ||
|
|
f9189b79bf | ||
|
|
d68e7df7ab | ||
|
|
1c246f6bef | ||
|
|
802e6cfc05 | ||
|
|
b2aec696f2 | ||
|
|
18d3333cfd | ||
|
|
196767e08b | ||
|
|
2e7341ec5a | ||
|
|
3aac5918b1 | ||
|
|
ed4260b4a0 | ||
|
|
4cf7ba6cce | ||
|
|
0ddec4259d | ||
|
|
1566497495 | ||
|
|
712548231e | ||
|
|
ac84cb4cfe | ||
|
|
3e9a08ecb1 | ||
|
|
3a9a032163 | ||
|
|
b83ceba7d5 | ||
|
|
d9738d5f07 | ||
|
|
583f0bc402 | ||
|
|
e8e878bec7 | ||
|
|
6099e629f5 | ||
|
|
3570086760 | ||
|
|
acb341eb6e | ||
|
|
8fb2c9922a | ||
|
|
a97c208c5a | ||
|
|
cc6e9f9abb | ||
|
|
56cd740449 | ||
|
|
8437225d34 | ||
|
|
b4a57c4c41 | ||
|
|
faa8038edd | ||
|
|
e02863b5ac | ||
|
|
04685bc949 | ||
|
|
98a0f9660d | ||
|
|
45fe66b8ba | ||
|
|
8d7aab986b | ||
|
|
e078642dde | ||
|
|
ffd14272c4 | ||
|
|
f16f3ac559 | ||
|
|
4fb433d221 | ||
|
|
293c1e2235 | ||
|
|
d5e16a711e | ||
|
|
178c562a46 | ||
|
|
61052e891e | ||
|
|
cb951e336b | ||
|
|
37580f43b5 | ||
|
|
ef28c6d676 | ||
|
|
2175744952 | ||
|
|
2357cd2e20 | ||
|
|
5951cc004b | ||
|
|
a8565530e2 | ||
|
|
9e9ee7e37f | ||
|
|
500d67f15a | ||
|
|
40fb8587ed | ||
|
|
c14a808c51 | ||
|
|
cdf42d7b43 | ||
|
|
7858d304bc | ||
|
|
f14a6bf515 | ||
|
|
5dad57536f | ||
|
|
a5fad4d6bc | ||
|
|
d6c2e3e621 | ||
|
|
8c46748bcb | ||
|
|
86edf13b1c | ||
|
|
fcd9b1073a | ||
|
|
036df29387 | ||
|
|
60b7d3bbb5 | ||
|
|
7e9d42ce97 | ||
|
|
b3147fcbe6 | ||
|
|
feefb73ad9 | ||
|
|
8932b82f7d | ||
|
|
a4a759acec | ||
|
|
6e5a554533 | ||
|
|
2164a17a7d | ||
|
|
dc1e493808 | ||
|
|
1fe8304db0 | ||
|
|
bfd19df6d0 | ||
|
|
7f9edfd23a | ||
|
|
9673056c25 | ||
|
|
f50730d361 | ||
|
|
9beb948c0d | ||
|
|
ce5ddefc43 | ||
|
|
458f23f610 | ||
|
|
c983a77887 | ||
|
|
7516eaf492 | ||
|
|
c6a84ff351 | ||
|
|
b8b9bcb458 | ||
|
|
be617fbaf8 | ||
|
|
321ba85899 | ||
|
|
fcabfc66ae | ||
|
|
9844573039 | ||
|
|
6579603874 | ||
|
|
d68aade28a | ||
|
|
3242e5938b | ||
|
|
35384e8e5b | ||
|
|
4c21e004a3 | ||
|
|
59ee70e386 | ||
|
|
43e569921e | ||
|
|
8aaeec9f9a | ||
|
|
8454d3f924 | ||
|
|
5004c22c25 | ||
|
|
e96872f4c0 | ||
|
|
14e9a78d47 | ||
|
|
2aca9b272e | ||
|
|
26d7cb400e | ||
|
|
2db95e094d | ||
|
|
5fc8bb6ab7 | ||
|
|
244d0955ad | ||
|
|
061e68c554 | ||
|
|
3f1d582f70 | ||
|
|
8a2e5bf6b7 | ||
|
|
6c3d948723 | ||
|
|
51c5ab5d3a | ||
|
|
ff60f33811 | ||
|
|
2cfa5edb26 | ||
|
|
291a3e9629 | ||
|
|
2184a14b62 | ||
|
|
2e84084fbc | ||
|
|
26f9cfbdca | ||
|
|
7fc5f4f117 | ||
|
|
249a3e362f | ||
|
|
15d717f574 | ||
|
|
b8712b2b9a | ||
|
|
1eaccbef57 | ||
|
|
e2f69f5ce7 | ||
|
|
821bee4333 | ||
|
|
8b6205c484 | ||
|
|
e5cf62b04d | ||
|
|
b1edca2a4c | ||
|
|
e7768ebbd2 | ||
|
|
329a76c085 | ||
|
|
bbb76be9b5 | ||
|
|
b726b8a60c | ||
|
|
e298409c34 | ||
|
|
25012d5e79 | ||
|
|
09b7de77b3 | ||
|
|
9bdedec0cf | ||
|
|
f63fa8b10a | ||
|
|
d47aebbb47 | ||
|
|
08931f1cd6 | ||
|
|
6ce9687b5a | ||
|
|
20e610580e | ||
|
|
4fa17211bb | ||
|
|
d8d40fc676 | ||
|
|
3c7fcdfdd4 | ||
|
|
e356ac5c06 | ||
|
|
872e681c00 | ||
|
|
38b71ba8ff | ||
|
|
f8cf36c298 | ||
|
|
26a59d9b46 | ||
|
|
7fd4ce6a99 | ||
|
|
d9d09a8d0f | ||
|
|
2b0532f398 | ||
|
|
7d07c75c5b | ||
|
|
f34297db80 | ||
|
|
e2e5326e5b | ||
|
|
592c6e1191 | ||
|
|
8202802fad | ||
|
|
f79bb32926 | ||
|
|
7a3809fd97 | ||
|
|
f13a149088 | ||
|
|
fc586d2955 | ||
|
|
17d45dec4d | ||
|
|
6bfe55380a | ||
|
|
4e05aedbca | ||
|
|
bf3e200eb4 | ||
|
|
55614f89f0 | ||
|
|
b1620443f3 | ||
|
|
4ed98b6e25 | ||
|
|
3a33923515 | ||
|
|
f2df488a1c | ||
|
|
8d507aee7c | ||
|
|
133145686e | ||
|
|
0f04b004ac | ||
|
|
81e3a6055c | ||
|
|
bea9a17726 | ||
|
|
b537ea9ce4 | ||
|
|
13ce52be1b | ||
|
|
11853c50ec | ||
|
|
a60aa7e008 | ||
|
|
a49256a349 | ||
|
|
e517dfd3d1 | ||
|
|
74687f5979 | ||
|
|
8dc6617ad5 | ||
|
|
c2119214c2 | ||
|
|
22387f00b6 | ||
|
|
4d16915381 | ||
|
|
e7169a5835 | ||
|
|
abc2dfbcc3 | ||
|
|
23ea9f6f03 | ||
|
|
3e5df37861 | ||
|
|
4e5f9f8a9a | ||
|
|
9446ecfb3a | ||
|
|
48ecdec7a0 | ||
|
|
8f5f782253 | ||
|
|
228a77a4ad | ||
|
|
03b17a5789 | ||
|
|
391f3b5708 | ||
|
|
fe9b9a880f | ||
|
|
9f96ea4c2b | ||
|
|
41a765182f | ||
|
|
bcdd904c6c | ||
|
|
a90b1e32d2 | ||
|
|
0ed8e95c4b | ||
|
|
6b5b85f4f6 | ||
|
|
03ebf85f77 | ||
|
|
30fbe92c78 | ||
|
|
1241e77f15 | ||
|
|
1433cac53c | ||
|
|
204fb36a0e | ||
|
|
2b45603445 | ||
|
|
d70c0be4c1 | ||
|
|
9b649d9a73 | ||
|
|
abbd58559e | ||
|
|
d15d17bb64 | ||
|
|
966fe81f9b | ||
|
|
83764a989d | ||
|
|
86788e1ee6 | ||
|
|
03b04ddac1 | ||
|
|
88ae012c80 | ||
|
|
fc4f4cdb8b | ||
|
|
4e0fbdc4ec | ||
|
|
0c37aed3f3 | ||
|
|
099ccdb808 | ||
|
|
9871417fb7 | ||
|
|
fc7804ec39 | ||
|
|
e7b9d9be48 | ||
|
|
2172d4f63c | ||
|
|
c34091d47e | ||
|
|
a9f4ebd753 | ||
|
|
604c9948a8 | ||
|
|
281720c2a3 | ||
|
|
2a9023f7b4 | ||
|
|
36e8c39899 | ||
|
|
e3f009c595 | ||
|
|
fbe3baa773 | ||
|
|
690998f904 | ||
|
|
3221da845f | ||
|
|
9aeb410419 | ||
|
|
bf4519cde5 | ||
|
|
e967b94356 | ||
|
|
2316286c0e | ||
|
|
67bde7d465 | ||
|
|
cd63f94d4d | ||
|
|
2054eb771e | ||
|
|
ea0ceb11a0 | ||
|
|
00579b98c4 | ||
|
|
ee5a8d3e31 | ||
|
|
72370164c3 | ||
|
|
704422ce1e | ||
|
|
8e8d7e1b26 | ||
|
|
3ed6327571 | ||
|
|
efd4f1dfd3 | ||
|
|
00032b0ba1 | ||
|
|
a07f514fc0 | ||
|
|
b197c770a6 | ||
|
|
b7c9762598 | ||
|
|
a414bc8c3e | ||
|
|
98a3c3c514 | ||
|
|
157fd05aad | ||
|
|
9f510ceb5d | ||
|
|
675b1c2fce | ||
|
|
c923132e9d | ||
|
|
1864e3bed3 | ||
|
|
af7bcd7daa | ||
|
|
3fa2fff86f | ||
|
|
b372a64e10 | ||
|
|
e432336433 | ||
|
|
f3b0e0215c | ||
|
|
a6cc0e0a0d | ||
|
|
b2cb6dc1ef | ||
|
|
f87f88a69f | ||
|
|
6d87cd2f03 | ||
|
|
2db3ea2929 | ||
|
|
c28b055a0c | ||
|
|
02e8d46119 | ||
|
|
105a3db56e | ||
|
|
295befec25 | ||
|
|
cb34cb1f23 | ||
|
|
86f393ceb7 | ||
|
|
d6d324374e | ||
|
|
14999bcc59 | ||
|
|
046e288edf | ||
|
|
d8b11e75cb | ||
|
|
0df7959d43 | ||
|
|
5894eb1f33 | ||
|
|
6daba1dc6a | ||
|
|
69b8f2895b | ||
|
|
0ace876730 | ||
|
|
e9daf8a9ce | ||
|
|
cf0156622a | ||
|
|
86cac6d3b2 | ||
|
|
f46ea1d8e2 | ||
|
|
0980992d44 | ||
|
|
38a503fb8a | ||
|
|
fef58ce79e | ||
|
|
da0d5e78bc | ||
|
|
ad212c1ed1 | ||
|
|
e1bce59fd3 | ||
|
|
9beb75d3c4 | ||
|
|
042ef467ee | ||
|
|
01736e6c41 | ||
|
|
29411a0c7a | ||
|
|
b66f59adfa | ||
|
|
9ab788aa23 | ||
|
|
87887a7a65 | ||
|
|
5a0d057e49 | ||
|
|
aa59369b4c | ||
|
|
18c7f2fce8 | ||
|
|
6a8d6f039a | ||
|
|
5ff9c21f72 | ||
|
|
5c52c04650 | ||
|
|
6c86bf7a1e | ||
|
|
0d4d2e02eb | ||
|
|
151399a944 | ||
|
|
049615e35d | ||
|
|
6b72417a00 | ||
|
|
aabbe99fcb | ||
|
|
8011cd56e3 | ||
|
|
d3152655d5 | ||
|
|
006cd7083f | ||
|
|
bc8923b1ec | ||
|
|
1632ef7448 | ||
|
|
f1f4fbde2a | ||
|
|
1854c48005 | ||
|
|
ebda73f867 | ||
|
|
bcc311668e | ||
|
|
1dd26414df | ||
|
|
056389eb1c | ||
|
|
a07856a08d | ||
|
|
19ce768c6b | ||
|
|
aaed77c55e | ||
|
|
49270d0431 | ||
|
|
673c42b238 | ||
|
|
5541b18ba8 | ||
|
|
28e117f49f | ||
|
|
46bfc05480 | ||
|
|
427a37ca3f | ||
|
|
39ae3b338f | ||
|
|
48f5b3efce | ||
|
|
f8dc000699 | ||
|
|
bf8d6f9ab8 | ||
|
|
17e844a450 | ||
|
|
8ca7d12430 | ||
|
|
67b9c82ea2 | ||
|
|
a6f5b991eb | ||
|
|
756587dcb9 | ||
|
|
0a084f7b3a | ||
|
|
da0a95b23a | ||
|
|
599fe418a1 | ||
|
|
4519e7b839 | ||
|
|
4659b53e7d | ||
|
|
dc22495d35 | ||
|
|
ab0d964259 | ||
|
|
dac3654e2d | ||
|
|
989d87cb1a | ||
|
|
d6934a02b5 | ||
|
|
f9986e9abf | ||
|
|
1f5e321ec1 | ||
|
|
b6adb6ef58 | ||
|
|
bfdaf45141 | ||
|
|
69526a354d | ||
|
|
778f2b648c | ||
|
|
2223317bef | ||
|
|
b107586c0c | ||
|
|
d544755389 | ||
|
|
88398e9ba3 | ||
|
|
15c1ac03c8 | ||
|
|
c3c6fc7855 | ||
|
|
4d8cca8a7e | ||
|
|
d61be85581 | ||
|
|
9e456a8537 | ||
|
|
f179e2b899 | ||
|
|
6a60b41431 | ||
|
|
c6a47f988c | ||
|
|
d0666f289a | ||
|
|
d8afda60a9 | ||
|
|
804ab36df6 | ||
|
|
a41d5174e2 | ||
|
|
9c5d953a07 | ||
|
|
7b7b18c57e | ||
|
|
8eb094b946 | ||
|
|
7fa18a63cb | ||
|
|
90600a5e3b | ||
|
|
23f5908ac7 | ||
|
|
e622237d12 | ||
|
|
f0816174d2 | ||
|
|
057444f844 | ||
|
|
725c5f1ad3 | ||
|
|
9c8dc84ac1 | ||
|
|
e3899ababb | ||
|
|
3fc880ac5d | ||
|
|
602b2790ca | ||
|
|
b05a3ad765 | ||
|
|
3d8f4f23af | ||
|
|
a74bee5fc7 | ||
|
|
55c9e24875 | ||
|
|
ebe221948d | ||
|
|
b2d951e423 | ||
|
|
c5993d10a8 | ||
|
|
5be1ae28ef | ||
|
|
96db9023b8 | ||
|
|
0d7717fc9c | ||
|
|
aba7600029 | ||
|
|
00acdfbf98 | ||
|
|
51624dbdae | ||
|
|
9e29df0027 | ||
|
|
f54167d1dc | ||
|
|
6042582b62 | ||
|
|
50522642a0 | ||
|
|
bfc3424d1f | ||
|
|
1c65936882 | ||
|
|
40acdb192e | ||
|
|
4b7a4ba29c | ||
|
|
e0660c6257 | ||
|
|
b4ada742d1 | ||
|
|
a93d952cd4 | ||
|
|
5b56fec6f5 | ||
|
|
32171e4e07 | ||
|
|
48e6edabed | ||
|
|
069607124d | ||
|
|
caf55bfacf | ||
|
|
ce3631015e | ||
|
|
3ae1b53496 | ||
|
|
79bb00534d | ||
|
|
c4b16ddc8f | ||
|
|
deb3b08ff2 | ||
|
|
b45b3efd5d | ||
|
|
e420060ac9 | ||
|
|
d8ec8a4a65 | ||
|
|
040ed7b4d0 | ||
|
|
c76e5b08a1 | ||
|
|
0071215832 | ||
|
|
4a55631e4d | ||
|
|
19a68574a9 | ||
|
|
f21e6b6ecb | ||
|
|
e1549a01c7 | ||
|
|
765be74d24 | ||
|
|
9614d2c676 | ||
|
|
ad03c71ea1 | ||
|
|
4eedf86a16 | ||
|
|
eb85ee9a88 | ||
|
|
fa2026dc88 | ||
|
|
fe08007399 | ||
|
|
e3ebdcff12 | ||
|
|
cb10cf1224 | ||
|
|
c0dd71c97c | ||
|
|
51478be956 | ||
|
|
a7304e4b98 | ||
|
|
0d8776344c | ||
|
|
197e0ea817 | ||
|
|
c776a3f398 | ||
|
|
25c9fa6026 | ||
|
|
d2dc33d57c | ||
|
|
f3dcc8411e | ||
|
|
1c2c5e402a | ||
|
|
34628967f1 | ||
|
|
a6c62f0c25 | ||
|
|
ca989269a2 | ||
|
|
2ec4181ba9 | ||
|
|
0294b2be5f | ||
|
|
f1068a1ab7 | ||
|
|
cadde467a8 | ||
|
|
c2bdcba347 | ||
|
|
60df657b3a | ||
|
|
17a2d0801f | ||
|
|
accb3007ac | ||
|
|
b13dff6141 | ||
|
|
4ade6a8ca4 | ||
|
|
00fadef414 | ||
|
|
7ed244a0b3 | ||
|
|
e94a23876c | ||
|
|
041f681943 | ||
|
|
afec9f57da | ||
|
|
0ec1a77891 | ||
|
|
62c2b6d944 | ||
|
|
5b98979712 | ||
|
|
9abbf5cce7 | ||
|
|
ddfe486e4c | ||
|
|
834d30bc63 | ||
|
|
e26faa9e0c | ||
|
|
025f7dbdd1 | ||
|
|
44f4934bde | ||
|
|
453ca706cc | ||
|
|
5e1ff664f9 | ||
|
|
833a896681 | ||
|
|
34e43b909f | ||
|
|
62036c6fc3 | ||
|
|
68dd8512b7 | ||
|
|
bbf9f3c654 | ||
|
|
2583270191 | ||
|
|
3da721dac9 | ||
|
|
eb22b7ec75 | ||
|
|
b93916149d | ||
|
|
82f42a1d2e | ||
|
|
a4870de5aa | ||
|
|
39aabe59c8 | ||
|
|
f4c93b46ed | ||
|
|
4af793036f | ||
|
|
13bca90ac5 | ||
|
|
c9a6ddafc5 | ||
|
|
f4a51970d2 | ||
|
|
937f125efc | ||
|
|
4b61f6d2a6 | ||
|
|
d5bff72615 | ||
|
|
3b4be0018b | ||
|
|
125c2ed8a3 | ||
|
|
09da95542a | ||
|
|
cc53b38574 | ||
|
|
0aeeae0c9c | ||
|
|
00c991f028 | ||
|
|
55856a7b74 | ||
|
|
83a3af9f4e | ||
|
|
76bf0cf27c | ||
|
|
7cf0529b52 | ||
|
|
6c03af135b | ||
|
|
5cd1aa4f15 | ||
|
|
04b80f4003 | ||
|
|
591c55a981 | ||
|
|
cd2693862b | ||
|
|
25370e93c6 | ||
|
|
cdb6c48445 | ||
|
|
04b727b4dd | ||
|
|
cbd93a0636 | ||
|
|
b9e84f007f | ||
|
|
29a546720b | ||
|
|
0e9dd387ea | ||
|
|
79dabcc137 | ||
|
|
944bc29f90 | ||
|
|
03e1b3a153 | ||
|
|
9c95ff968a | ||
|
|
96b680f210 | ||
|
|
9ab3ce1246 | ||
|
|
3972dbe462 | ||
|
|
85615e33e5 | ||
|
|
f4cfc3444a | ||
|
|
24f599af21 | ||
|
|
bca0d7fdb5 | ||
|
|
bc4ae2cb0b | ||
|
|
ef4b9f001a | ||
|
|
08f8933fa3 | ||
|
|
41958376b5 | ||
|
|
9fe4603b82 | ||
|
|
147dbb2fe3 | ||
|
|
cbf9b4aed3 | ||
|
|
625a55324f | ||
|
|
3151e328e0 | ||
|
|
46ebd9e3bb | ||
|
|
f66db68e1f | ||
|
|
0c4b72e9c0 | ||
|
|
f88dbb8385 | ||
|
|
1113fc31ba | ||
|
|
0898147090 | ||
|
|
4d8da30fc1 | ||
|
|
579f3a631e | ||
|
|
47061af106 | ||
|
|
13e225300f | ||
|
|
26bc56d014 | ||
|
|
496681cd51 | ||
|
|
746c6f3a53 | ||
|
|
8545f73b89 | ||
|
|
32cc2479b4 | ||
|
|
f306b87d76 | ||
|
|
41cf07f0ec | ||
|
|
62f4033381 | ||
|
|
f9f6a8f96c | ||
|
|
df0d93564e | ||
|
|
0d589ac150 | ||
|
|
35d732fc2e | ||
|
|
896ddb9851 | ||
|
|
e630b3c218 | ||
|
|
f1ca56a69f | ||
|
|
529d27ea47 | ||
|
|
b2226c6c83 | ||
|
|
024de2174b | ||
|
|
125093b59f | ||
|
|
f3e99ea072 | ||
|
|
8bfd4c659f | ||
|
|
ec07246a08 | ||
|
|
04e45b52ee | ||
|
|
d5371324d9 | ||
|
|
36260233e7 | ||
|
|
cab13fc847 | ||
|
|
34ab3c8c71 | ||
|
|
25c93fd240 | ||
|
|
428c1064c3 | ||
|
|
81ce0e14e7 | ||
|
|
b908e88ec1 | ||
|
|
62e4506a7d | ||
|
|
014265eb02 | ||
|
|
9f27de170d | ||
|
|
6cb19b7681 | ||
|
|
e130841bcc | ||
|
|
2ee798880a | ||
|
|
ffcf4c6164 | ||
|
|
b286a96811 | ||
|
|
2a2df2e9f2 | ||
|
|
15481c5e42 | ||
|
|
366b60b9da | ||
|
|
4782444a35 | ||
|
|
8a17e161d1 | ||
|
|
72f27cd2df | ||
|
|
3b3674ae58 | ||
|
|
9d75e765bc | ||
|
|
bf07bd4d61 | ||
|
|
296cc7f4b8 | ||
|
|
3d92984689 | ||
|
|
51447d5db5 | ||
|
|
1dcf520fe2 | ||
|
|
fca84dabe6 | ||
|
|
3ea1e13569 | ||
|
|
dd6639bd3a | ||
|
|
bee0550397 | ||
|
|
fc57c58c81 | ||
|
|
5bb6d96558 | ||
|
|
28e1bd35bd | ||
|
|
dd83cc298d | ||
|
|
ea00598596 | ||
|
|
a650314f72 | ||
|
|
54fdc39a08 | ||
|
|
7dc98a62b2 | ||
|
|
f20ba1c9bb | ||
|
|
7c3562947a | ||
|
|
eb3a3911fc | ||
|
|
540f7c75ef | ||
|
|
d6342aab08 | ||
|
|
e7b85bc402 | ||
|
|
07eaaab2f6 | ||
|
|
96f7fafa24 | ||
|
|
487a0df700 | ||
|
|
09ef5f6258 | ||
|
|
bcc0e4ca7c | ||
|
|
caac8fefdc | ||
|
|
353e845120 | ||
|
|
d1451f18d9 | ||
|
|
c3a5b7b82a | ||
|
|
70d91d60bc | ||
|
|
bc78883017 | ||
|
|
f929f201fb | ||
|
|
554cf97f03 | ||
|
|
48ccbeefda | ||
|
|
7a217076d9 | ||
|
|
0720bf7df1 | ||
|
|
9d6727781d | ||
|
|
12c1621523 | ||
|
|
f9b48d60f2 | ||
|
|
5c29127666 | ||
|
|
78d767f5ec | ||
|
|
c8b979e929 | ||
|
|
2beaa91ca7 | ||
|
|
efa288ceac | ||
|
|
ad3bbd4a16 | ||
|
|
73913443a5 | ||
|
|
e133ff7190 | ||
|
|
25da47c3c8 | ||
|
|
4dc40f5eec | ||
|
|
a1a37575f0 | ||
|
|
c64c0e03d3 | ||
|
|
e1e882a368 | ||
|
|
36b0719793 | ||
|
|
7655044dd3 | ||
|
|
58fdd30664 | ||
|
|
7175dbaeba | ||
|
|
af454b5bb0 | ||
|
|
5b2bbf37fa | ||
|
|
6321ac9e15 | ||
|
|
eeca72f71e | ||
|
|
6e164e5c3d | ||
|
|
1b452133ae | ||
|
|
d9c34505e5 | ||
|
|
f9885acc8c | ||
|
|
fa9df48401 | ||
|
|
d414a5a0f0 | ||
|
|
9eb4460e68 | ||
|
|
6984d16671 | ||
|
|
5b9d0995a1 | ||
|
|
7ad8e1fc4e | ||
|
|
c9b31189a9 | ||
|
|
c76b7a1a82 | ||
|
|
c940e07014 | ||
|
|
88be4ebfbc | ||
|
|
effa47b80a | ||
|
|
067400b16e | ||
|
|
748628ced0 | ||
|
|
6791060eae | ||
|
|
502dfeb8de | ||
|
|
5bbed29518 | ||
|
|
2f2d33f470 | ||
|
|
be60a3feaa | ||
|
|
e504a829a0 | ||
|
|
0d829f6681 | ||
|
|
d9540579c5 | ||
|
|
ecf963b80d | ||
|
|
7fc6d35be0 | ||
|
|
e7d2a37158 | ||
|
|
531c6fc8f3 | ||
|
|
e011d0a3c4 | ||
|
|
8d5505d099 | ||
|
|
d36e0ee460 | ||
|
|
143619ccf6 | ||
|
|
9f339d75b5 | ||
|
|
28583660fb | ||
|
|
dedfe959dd | ||
|
|
4d936ace08 | ||
|
|
89bd25eb26 | ||
|
|
4a1cf50187 | ||
|
|
32e12316e5 | ||
|
|
ad7b24f145 | ||
|
|
c2770c0e0e | ||
|
|
371056f2b9 | ||
|
|
2d613908e8 | ||
|
|
18fb1fae08 | ||
|
|
39ef161c72 | ||
|
|
a7612c5066 | ||
|
|
6cbae10b5e | ||
|
|
ebe81134c0 | ||
|
|
a1d573e282 | ||
|
|
e959e24b47 | ||
|
|
3f98d7c0b5 | ||
|
|
d2f950c984 | ||
|
|
63e8f16737 | ||
|
|
9bf5fd894f | ||
|
|
6296729fae | ||
|
|
67d216801b | ||
|
|
0a5575f3f6 | ||
|
|
418044cbab | ||
|
|
8c67b13407 | ||
|
|
2a477ccf0b | ||
|
|
c34137bef9 | ||
|
|
914d91c5b3 | ||
|
|
e733dea3ce | ||
|
|
78c5d2a9bb | ||
|
|
3bf4e14cc3 | ||
|
|
d68d160cb7 | ||
|
|
202cb42fbb | ||
|
|
49f6cb968f | ||
|
|
07e120b7da | ||
|
|
f3dcae15ac | ||
|
|
25ec498dc7 | ||
|
|
9cc42cb091 | ||
|
|
bcf9cf89e7 | ||
|
|
f0729fc3e0 | ||
|
|
8186c00ef3 | ||
|
|
c0b31ccb87 | ||
|
|
267c950c5f | ||
|
|
ce1605b508 | ||
|
|
66fdb1c0d4 | ||
|
|
25bfdca16a | ||
|
|
9c284f9651 | ||
|
|
6d78c381f6 | ||
|
|
784e2080df | ||
|
|
70505bc334 | ||
|
|
8e8b247341 | ||
|
|
a8595879ec | ||
|
|
33a688e806 | ||
|
|
5c2bfad9b4 | ||
|
|
250f979237 | ||
|
|
b527b6e8ff | ||
|
|
a54ce007e6 | ||
|
|
4ed1f3490e | ||
|
|
0a082e9b37 | ||
|
|
236a99a409 | ||
|
|
04b4363ec8 | ||
|
|
37ebc20093 | ||
|
|
cef781cc87 | ||
|
|
08e4c7a967 | ||
|
|
697e4edcad | ||
|
|
b26297ca51 | ||
|
|
6ca7dba0cf | ||
|
|
f1fa05b407 | ||
|
|
02e22c35fe | ||
|
|
b935714237 | ||
|
|
a8314df902 | ||
|
|
0cd7a0325f | ||
|
|
16b7c81d55 | ||
|
|
424ba8b588 | ||
|
|
bf493e8d62 | ||
|
|
c714e43c8d | ||
|
|
cdf9d6f6ed | ||
|
|
cc4b48c27c | ||
|
|
cac9c92cc0 | ||
|
|
d40abf1689 | ||
|
|
69e9c69e70 | ||
|
|
c489ea7d01 | ||
|
|
26c6857a59 | ||
|
|
508bd3d1aa | ||
|
|
8705846710 | ||
|
|
c944a9696e | ||
|
|
943cc09d8a | ||
|
|
fc6800d19f | ||
|
|
d06f047b04 | ||
|
|
ddc899bada | ||
|
|
bd479e25c7 | ||
|
|
eaf5bd168e | ||
|
|
d7ecc206ba | ||
|
|
11ea212e8c | ||
|
|
cb29d8c11f | ||
|
|
adcea5a043 | ||
|
|
f02f7c2c4a | ||
|
|
a1e44cc14f | ||
|
|
d2d09bf68c | ||
|
|
e2dfb655f7 | ||
|
|
463e76b63c | ||
|
|
2dc4b0dbe8 | ||
|
|
7b23c126e6 | ||
|
|
25e3d2225a | ||
|
|
c8e0b5d7b6 | ||
|
|
4fb7e2b445 | ||
|
|
9138e3c061 | ||
|
|
9b2a29660b | ||
|
|
b7b4a9fa57 | ||
|
|
1fb07a7de8 | ||
|
|
b9cbcaad58 | ||
|
|
c6706a6f6c | ||
|
|
958e6a75a1 | ||
|
|
397977726c | ||
|
|
285d9189c7 | ||
|
|
767d3e0054 | ||
|
|
409d2a1b71 | ||
|
|
e0b9678d7f | ||
|
|
166dea6ac8 | ||
|
|
52bef4d677 | ||
|
|
801e5ef840 | ||
|
|
0044739ae5 | ||
|
|
4e44bd3650 | ||
|
|
0cffb0cd3e | ||
|
|
aaa3850ccd | ||
|
|
a17b5d5a4f | ||
|
|
2f97765bc3 | ||
|
|
3205ca8deb | ||
|
|
1cb4d65b87 | ||
|
|
7b2dd292bc | ||
|
|
ab585551c0 | ||
|
|
6cf0d7b999 | ||
|
|
9d972207f0 | ||
|
|
d9834ff24b | ||
|
|
d9c3ba05e7 | ||
|
|
03467ce6bd | ||
|
|
6e750fcb1e | ||
|
|
bd6941cfaa | ||
|
|
578519edd0 | ||
|
|
5c05f69450 | ||
|
|
f529dca488 | ||
|
|
296aca9dcf | ||
|
|
b170703128 | ||
|
|
b300fb7734 | ||
|
|
f89af47438 | ||
|
|
7bb4f8ff12 | ||
|
|
7dd6407a4c | ||
|
|
53de315b78 | ||
|
|
e065e6cda2 | ||
|
|
60553cc209 | ||
|
|
2d4c9ab518 | ||
|
|
50771f7ce3 | ||
|
|
242f8d644c | ||
|
|
f5575cd167 | ||
|
|
dd0ddc3e78 | ||
|
|
62308f3f4a | ||
|
|
cecafcce94 | ||
|
|
ca0efb7594 | ||
|
|
1d05ff2779 | ||
|
|
941811ccb9 | ||
|
|
700384be8e | ||
|
|
b8a22c40e0 | ||
|
|
3918de9ad1 | ||
|
|
96fe35e7d4 | ||
|
|
e87afb1518 | ||
|
|
7b467c6b81 | ||
|
|
eb8ebafe87 | ||
|
|
e559febaf1 | ||
|
|
6bcc6d38c7 | ||
|
|
8173960305 | ||
|
|
f2e590942e | ||
|
|
6a4b87eb9d | ||
|
|
edcba19c23 | ||
|
|
b140ae9137 | ||
|
|
8ee0591f28 | ||
|
|
97d0c596a1 | ||
|
|
7454cba4fa | ||
|
|
5713411893 | ||
|
|
a0cf79e841 | ||
|
|
825e1a7c56 | ||
|
|
9f2b453338 | ||
|
|
a0dce9be76 | ||
|
|
cf2b938529 | ||
|
|
62f685a9cd | ||
|
|
2c7d978c2d | ||
|
|
8cd897a42c | ||
|
|
1dc44d3130 | ||
|
|
2a6e3ef37e | ||
|
|
115d528c23 | ||
|
|
a310428527 | ||
|
|
7e0fd45ce3 | ||
|
|
b138ea54ee | ||
|
|
d7125d8d85 | ||
|
|
9c115a4acc | ||
|
|
43716567f5 | ||
|
|
0a8f00af34 | ||
|
|
b1d7429186 | ||
|
|
060a38a2c0 | ||
|
|
58402976b4 | ||
|
|
cd7b854bbb | ||
|
|
aecc0756e8 | ||
|
|
e6ccc6ed70 | ||
|
|
e959a01fac | ||
|
|
17674bfdf7 | ||
|
|
d807d4c21f | ||
|
|
b4690d2eab | ||
|
|
886657a641 | ||
|
|
db896db5a7 | ||
|
|
2357ae17e7 | ||
|
|
9f1c5491d2 | ||
|
|
70b52222f5 | ||
|
|
88cb59727c | ||
|
|
781bfdc314 | ||
|
|
b66723b23e | ||
|
|
cf96d71c22 | ||
|
|
1a111921da | ||
|
|
5d9bb428bb | ||
|
|
9833757b5d | ||
|
|
4195343c0d | ||
|
|
042bee4e5c | ||
|
|
4afba1f3d9 | ||
|
|
5999d45a5d | ||
|
|
f69e5d6a19 | ||
|
|
3517637702 | ||
|
|
e2809bfb42 | ||
|
|
68b33cc5c7 | ||
|
|
4c02cf8ecc | ||
|
|
271daaf768 | ||
|
|
efbb7ee432 | ||
|
|
6471ec71aa | ||
|
|
cb45708061 | ||
|
|
02597f2885 | ||
|
|
8c6a514edf | ||
|
|
7f3fdab793 | ||
|
|
5372f5f989 | ||
|
|
6d24c09a69 | ||
|
|
a8d72c79db | ||
|
|
1f713e0106 | ||
|
|
03f84c8260 | ||
|
|
6d5eb464c9 | ||
|
|
67f8de9ab8 | ||
|
|
2d95ceedc5 | ||
|
|
6526d765fc | ||
|
|
3d520f7c2d | ||
|
|
9c37519b55 | ||
|
|
7e9cfcd0dc | ||
|
|
a99ce1f5b1 | ||
|
|
42660b3cf1 | ||
|
|
f30258c439 | ||
|
|
93ff4c69f7 | ||
|
|
79571bb1ca | ||
|
|
f72c1a58cb | ||
|
|
2461396f69 | ||
|
|
81a071df2f | ||
|
|
6841abe842 | ||
|
|
cb70355d87 | ||
|
|
b17442bb04 | ||
|
|
4874e235fb | ||
|
|
06afa6eb94 | ||
|
|
58e4205d6c | ||
|
|
733394d6dd | ||
|
|
2de9558dea | ||
|
|
6bd173fced | ||
|
|
6b00cd746a | ||
|
|
9309ea6617 | ||
|
|
05c9e3aea5 | ||
|
|
88bac3e664 | ||
|
|
5473b6bc2f | ||
|
|
38e408076e | ||
|
|
dc100d87b5 | ||
|
|
6f6b31dadc | ||
|
|
b08b158b44 | ||
|
|
177f27d71e | ||
|
|
928bd9a149 | ||
|
|
e53113b8ac | ||
|
|
1fe83b4afe | ||
|
|
e8f31f80d1 | ||
|
|
56f5ab43c2 | ||
|
|
370385571c | ||
|
|
e34a303ce1 | ||
|
|
36f120cd20 | ||
|
|
0ae7c43fa5 | ||
|
|
c0d2943952 | ||
|
|
7d453a3b49 | ||
|
|
cd447875e6 | ||
|
|
692a94293c | ||
|
|
efebb10829 | ||
|
|
3c3f025923 | ||
|
|
5ff6e2dfbb | ||
|
|
61ac68f9f6 | ||
|
|
7f1022a8b1 | ||
|
|
edf6b025b1 | ||
|
|
d799df36b3 | ||
|
|
9e96812934 | ||
|
|
91e97cbe4c | ||
|
|
63ee3b32fe | ||
|
|
4ff1a2da10 | ||
|
|
4c3c975066 | ||
|
|
ec5d74f868 | ||
|
|
be0853358c | ||
|
|
fea15b553d | ||
|
|
88ef78745e | ||
|
|
be79342515 | ||
|
|
064a6176ac | ||
|
|
84e7485bfb | ||
|
|
f56f72f219 | ||
|
|
2bfb23f102 | ||
|
|
cf199fec52 | ||
|
|
165c20c2c4 | ||
|
|
625c6ba4c7 | ||
|
|
a32bede701 | ||
|
|
8ff5c8874f | ||
|
|
c5d38fc262 | ||
|
|
6b71970520 | ||
|
|
0209e111f6 | ||
|
|
dc01af7723 | ||
|
|
5435d0412f | ||
|
|
922ac25f64 | ||
|
|
aed53d6c5a | ||
|
|
61cdb9f36a | ||
|
|
1acd042c85 | ||
|
|
572712d82a | ||
|
|
d1697a7556 | ||
|
|
c8c6e9ecd9 | ||
|
|
90f3e4cf05 | ||
|
|
7bd8bf58bb | ||
|
|
1190d3f442 | ||
|
|
0e4f5cfbab | ||
|
|
f1c8db9f8c | ||
|
|
2c9abbd554 | ||
|
|
2305ae5d8c | ||
|
|
dec54bd0ba | ||
|
|
aade369737 | ||
|
|
2a5e042c70 | ||
|
|
1dc4c8c727 | ||
|
|
7ca035db88 | ||
|
|
a460c42f94 | ||
|
|
d16743e728 | ||
|
|
4a29fa8caf | ||
|
|
250bb54dba | ||
|
|
847d05d0b4 | ||
|
|
8315aa03fc | ||
|
|
b7a4c480d6 | ||
|
|
9a35faaa29 | ||
|
|
fbe2e28911 | ||
|
|
84968e25f3 | ||
|
|
10fd0b7b55 | ||
|
|
4a46dc6e5c | ||
|
|
0ec55604c0 | ||
|
|
500007c9ed | ||
|
|
f75abba013 | ||
|
|
dea113b428 | ||
|
|
6abc406a69 | ||
|
|
dcbe723bc5 | ||
|
|
33c98a28ac | ||
|
|
b2ddddfb20 | ||
|
|
c24367ebb9 | ||
|
|
7397b35379 | ||
|
|
baee44c3de | ||
|
|
1f2e4ecc30 | ||
|
|
955e28006d | ||
|
|
bf0736eb1f | ||
|
|
3a5b97b7f1 | ||
|
|
45bf825066 | ||
|
|
4a18d5c89b | ||
|
|
174b26c497 | ||
|
|
5cacc82f61 | ||
|
|
29a90816ff | ||
|
|
4bea454021 | ||
|
|
8bfd0ae4c4 | ||
|
|
378943ce67 | ||
|
|
c65d409afd | ||
|
|
ed1bbe2cad | ||
|
|
b0b3d09063 | ||
|
|
0ede2af7a0 | ||
|
|
e8d23f7811 | ||
|
|
907cd7217e | ||
|
|
7c402e5af3 | ||
|
|
b8d78a5520 | ||
|
|
dfa5862960 | ||
|
|
4276908f51 | ||
|
|
be23b71e87 | ||
|
|
f851acbfff | ||
|
|
78ef9b0205 | ||
|
|
ed9b0e5cba | ||
|
|
752c1a0ce9 | ||
|
|
cc30415d0c | ||
|
|
03e16611a3 | ||
|
|
8e2f3c1c83 | ||
|
|
b6d63b2516 | ||
|
|
e6b88d02bd | ||
|
|
125060ca63 | ||
|
|
b4baca9261 | ||
|
|
6342b6e332 | ||
|
|
a6dc77822b | ||
|
|
59bc67052b | ||
|
|
c090562828 | ||
|
|
69e2ec63c5 | ||
|
|
f610a516a0 | ||
|
|
2e51a4caa3 | ||
|
|
c6fa97a6d6 | ||
|
|
24d7159abd | ||
|
|
7978dc989d | ||
|
|
d99e6b5014 | ||
|
|
2cf40fc2b8 | ||
|
|
260d08b814 | ||
|
|
53dd05d8f6 | ||
|
|
fbe7055370 | ||
|
|
a5b386205f | ||
|
|
916bcab28e | ||
|
|
c7373c3dee | ||
|
|
9f2c8eb2a1 | ||
|
|
65300dcfb0 | ||
|
|
9ddc574f9a | ||
|
|
2dd9e67874 | ||
|
|
f93b03a5e6 | ||
|
|
55a47cd30f | ||
|
|
5792219d1d | ||
|
|
293c58c1e7 | ||
|
|
9f375a752e | ||
|
|
04dc5a9ca6 | ||
|
|
ae6cb5483e | ||
|
|
a168ec1d27 | ||
|
|
2a35144327 | ||
|
|
7207eca1ee | ||
|
|
9c34782478 | ||
|
|
20e6d22709 | ||
|
|
24dd0c61ef | ||
|
|
565c15363c | ||
|
|
ed67f7b7a7 | ||
|
|
6ea8d138d3 | ||
|
|
4159ac43aa | ||
|
|
419b09b053 | ||
|
|
88530f6b76 | ||
|
|
a8cb8177f6 | ||
|
|
277f8a34f4 | ||
|
|
4dde470865 | ||
|
|
ab08405984 | ||
|
|
b81fde02aa | ||
|
|
57dd2ea808 | ||
|
|
7043fa702f | ||
|
|
f98d2e5cc1 | ||
|
|
1a5538251f | ||
|
|
f4ddbb5ad1 | ||
|
|
74bf705ea8 | ||
|
|
676cd3a283 | ||
|
|
c6ead3cdd3 | ||
|
|
2d53648ce7 | ||
|
|
64ca6ac26b | ||
|
|
4fe4c00eca | ||
|
|
376838a606 | ||
|
|
d768a816aa | ||
|
|
766e0cb7d1 | ||
|
|
6a6b0c8b51 | ||
|
|
e24b01cc6f | ||
|
|
7f9ef5621a | ||
|
|
d7fc9ffc51 | ||
|
|
39348038df | ||
|
|
9472baae0d | ||
|
|
ae17b9ecd5 | ||
|
|
74096890ba | ||
|
|
889c2282a5 | ||
|
|
dca30c44f5 | ||
|
|
f2c358c6ce | ||
|
|
2ab42de1ec | ||
|
|
ac2024ccbf | ||
|
|
93164a7d64 | ||
|
|
ecff2e5ce1 | ||
|
|
c9d630dab6 | ||
|
|
d135906dbc | ||
|
|
9f427a52cb | ||
|
|
5a39d3a838 | ||
|
|
013f3d999f | ||
|
|
64d30d7adc | ||
|
|
7062cb56a9 | ||
|
|
9d57828d66 | ||
|
|
9ed8dee71b | ||
|
|
4692b3345d | ||
|
|
e59fb00735 | ||
|
|
9275853084 | ||
|
|
0c81aa29f9 | ||
|
|
01d2e27a2b | ||
|
|
dd7aadf7b2 | ||
|
|
b2fdf501c5 | ||
|
|
345e515735 | ||
|
|
945982b0b2 | ||
|
|
18ad9cbd10 | ||
|
|
f433a75569 | ||
|
|
b05389c825 | ||
|
|
68875fdf32 | ||
|
|
3393e0c02c | ||
|
|
a149b2466e | ||
|
|
13e230d505 | ||
|
|
80b3d7a3c9 | ||
|
|
4bd48de60c | ||
|
|
2eab92f8e3 | ||
|
|
2bbd82cf24 | ||
|
|
1bfd3d7f58 | ||
|
|
cd77b3e88b | ||
|
|
8c93c4dd42 | ||
|
|
45d63a5408 | ||
|
|
decef971f4 | ||
|
|
a288aaefc4 | ||
|
|
eed56c77b4 | ||
|
|
346601bc32 | ||
|
|
5080fbbef0 | ||
|
|
b5b724348d | ||
|
|
c3ee90d8ca | ||
|
|
e1435034ae | ||
|
|
bf35c5dc7f | ||
|
|
c42d223ac2 | ||
|
|
d5654d2b20 | ||
|
|
a7508fec1a | ||
|
|
c31945e682 | ||
|
|
d3203b931e | ||
|
|
947f4e90c3 | ||
|
|
d184c7b271 | ||
|
|
913488c066 | ||
|
|
7fa27d9ac6 | ||
|
|
c341b9cce5 | ||
|
|
bbbf0d45ba | ||
|
|
114c402d9e | ||
|
|
d51519eba4 | ||
|
|
e650f9988b | ||
|
|
8ed8454115 | ||
|
|
6e101bebb1 | ||
|
|
4577b38d22 | ||
|
|
a8515e2d28 | ||
|
|
964e91052e | ||
|
|
4e55e69bff | ||
|
|
e501dbb658 | ||
|
|
20e505e4b7 | ||
|
|
291a26e6e3 | ||
|
|
0383911887 | ||
|
|
a5c5eb77b5 | ||
|
|
90d02be7c5 | ||
|
|
04221983ac | ||
|
|
dfda027ae8 | ||
|
|
21b5a79121 | ||
|
|
411a388c62 | ||
|
|
61c10d42f6 | ||
|
|
68ecfb69a5 | ||
|
|
e62fee8eb3 | ||
|
|
5566d49103 | ||
|
|
48337a4a35 | ||
|
|
2c5c4fca14 | ||
|
|
4fab95ed20 | ||
|
|
6c36ca4628 | ||
|
|
9c61c57896 | ||
|
|
a618011ca1 | ||
|
|
95eef4df79 | ||
|
|
ec1e714ac1 | ||
|
|
736d658080 | ||
|
|
aa2920584e | ||
|
|
9d13bfc258 | ||
|
|
e43633011c | ||
|
|
97027f7fb3 | ||
|
|
bf5adc9be4 | ||
|
|
7665b436f0 | ||
|
|
ffca7b85c2 | ||
|
|
eef2fa00d9 | ||
|
|
c55551ad7c | ||
|
|
c91b521111 | ||
|
|
deb35e3e2c | ||
|
|
5e2d3c9ec1 | ||
|
|
dda454434b | ||
|
|
b97d371ce0 | ||
|
|
a25c98ac73 | ||
|
|
fd47013111 | ||
|
|
b3aa469c21 | ||
|
|
981c0de27a | ||
|
|
1bfe9acbbf | ||
|
|
2d1e9ce753 | ||
|
|
19043426b9 | ||
|
|
6e21ce592e | ||
|
|
975c6efbe4 | ||
|
|
972491aece | ||
|
|
1a8ecda3ee | ||
|
|
d36c7b618d | ||
|
|
251431ff4f | ||
|
|
1a3052793e | ||
|
|
84fbc56fd0 | ||
|
|
4444ff7632 | ||
|
|
7770da4b41 | ||
|
|
7202a4d42b | ||
|
|
3fa29765fd | ||
|
|
b9e468c163 | ||
|
|
0172ad2902 | ||
|
|
d9aa352ff0 | ||
|
|
945ba0300d | ||
|
|
9e15cc606e | ||
|
|
e011160f3c | ||
|
|
9447da5065 | ||
|
|
387ed39f6d | ||
|
|
e50e5f9336 | ||
|
|
6f0d9950f3 | ||
|
|
4705ff7d6d | ||
|
|
36778eb231 | ||
|
|
c6dd154b3e | ||
|
|
74b5feea7b | ||
|
|
35cae95032 | ||
|
|
11a36aa96f | ||
|
|
9b0e97ae10 | ||
|
|
02ba02604c | ||
|
|
42ecf418f5 | ||
|
|
48ce525d16 | ||
|
|
3081e2ca73 | ||
|
|
48ae85b6ff | ||
|
|
82281ce47d | ||
|
|
4ecd2bafbb | ||
|
|
308b9ad8f0 | ||
|
|
73b408c242 | ||
|
|
51c9eb321a | ||
|
|
1657fca2f4 | ||
|
|
0d25aad90d | ||
|
|
b8c1cb1c2c | ||
|
|
6e1d44fd56 | ||
|
|
528ff4b451 | ||
|
|
f6c29ba3dc | ||
|
|
160f9b5bf6 | ||
|
|
53e7985c8d | ||
|
|
9102342795 | ||
|
|
c4488936b2 | ||
|
|
4e2b990734 | ||
|
|
6ca1418587 | ||
|
|
30dd06812e | ||
|
|
b29b89ef21 | ||
|
|
81ae27d56a | ||
|
|
f90bf72280 | ||
|
|
abcf7aa591 | ||
|
|
40b6d49387 | ||
|
|
497b4f92d2 | ||
|
|
28566b4966 | ||
|
|
b4b15f68c0 | ||
|
|
1eb1cf452b | ||
|
|
c549810def | ||
|
|
0d0ed9187a | ||
|
|
dfa81d9efb | ||
|
|
1dba06e7b0 | ||
|
|
daac87be95 | ||
|
|
e97359435e | ||
|
|
afce9bcca1 | ||
|
|
9c7baca820 | ||
|
|
618265e645 | ||
|
|
9728978b75 | ||
|
|
938c0bbae1 | ||
|
|
a0cd818831 | ||
|
|
31c4ab5401 | ||
|
|
1f65529824 | ||
|
|
5b3a6eedd1 | ||
|
|
6938440d68 | ||
|
|
57ec6c9bad | ||
|
|
7a09bc4068 | ||
|
|
deb15645a8 | ||
|
|
f0b358e8b9 | ||
|
|
dce2b5a8fc | ||
|
|
59d100d959 | ||
|
|
d497b5362b | ||
|
|
369b0abdc2 | ||
|
|
72240ab31a | ||
|
|
dc4e1ddc9f | ||
|
|
ff656346fa | ||
|
|
ca91057d50 | ||
|
|
8c1e7de6cb | ||
|
|
207886cd3a | ||
|
|
336d1ee733 | ||
|
|
bed2b769f5 | ||
|
|
26029d9c4c | ||
|
|
c64c888929 | ||
|
|
8d9db41880 | ||
|
|
4fae54a8e0 | ||
|
|
9f35928719 | ||
|
|
c5af032df5 | ||
|
|
8a898a6fcc | ||
|
|
9f827ded1c | ||
|
|
5daa9411a0 | ||
|
|
094d4019b8 | ||
|
|
1507f3abba | ||
|
|
30e8defe52 | ||
|
|
9f4dd3e3e3 | ||
|
|
8c00014d7e | ||
|
|
1cf12a6350 | ||
|
|
dc9461e23f | ||
|
|
72d57050df | ||
|
|
49d1f665a4 | ||
|
|
2c25edc4c1 | ||
|
|
d2f098b33d | ||
|
|
6f4f7f35f3 | ||
|
|
0a4fe6c8db | ||
|
|
7bba401d5d | ||
|
|
c73cff12f1 | ||
|
|
b32d93840e | ||
|
|
cb457849fd | ||
|
|
cb3c30059a | ||
|
|
20dc93e49e | ||
|
|
b620447dcc | ||
|
|
4ffd2ad1d3 | ||
|
|
acc9938ba5 | ||
|
|
f6d13ac8cf | ||
|
|
24cb653c6b | ||
|
|
6dfd3cf68e | ||
|
|
073775cbbb | ||
|
|
e995d5044e | ||
|
|
5b0a79a27a | ||
|
|
6747de655e | ||
|
|
91bad2b09e | ||
|
|
1244d5b713 | ||
|
|
c0ed5cd47b | ||
|
|
c8281fd38e | ||
|
|
fe8e6bff9b | ||
|
|
9caf25d144 | ||
|
|
348620c7ac | ||
|
|
30fc2ab92b | ||
|
|
5b5464d525 | ||
|
|
cd15a0528f | ||
|
|
7b52778eff | ||
|
|
162de2f2b5 | ||
|
|
f6e4af6fd7 | ||
|
|
32b76dcdac | ||
|
|
bcfd252052 | ||
|
|
32c452779e | ||
|
|
118b90c59e | ||
|
|
f6a61b140e | ||
|
|
75ece4b5cf | ||
|
|
724cca4178 | ||
|
|
5b3fdb0181 | ||
|
|
fcc3d0265d | ||
|
|
5356ea7cde | ||
|
|
06226df1a9 | ||
|
|
bf638ef026 | ||
|
|
07973d5db8 | ||
|
|
3b3f71121b | ||
|
|
47333a34d5 | ||
|
|
d92138f703 | ||
|
|
b2bf335327 | ||
|
|
33bec62a20 | ||
|
|
2e630b1847 | ||
|
|
002d3fe863 | ||
|
|
fb24311e7c | ||
|
|
90278430d9 | ||
|
|
bcd9d12a8d | ||
|
|
79363339b7 | ||
|
|
fbe2c6b33e | ||
|
|
fc11f47229 | ||
|
|
2b23d89d14 | ||
|
|
9cfa3cff54 | ||
|
|
6507653e72 | ||
|
|
7fe747d1eb | ||
|
|
32567c9f3b | ||
|
|
4f3d52fedc | ||
|
|
8321bab39c | ||
|
|
989238802a | ||
|
|
9051fc538f | ||
|
|
03fd7f27db | ||
|
|
45d6a15ae9 | ||
|
|
6c6ca18664 | ||
|
|
97fe2b40c1 | ||
|
|
f689ab5017 | ||
|
|
edb7cac271 | ||
|
|
81d87a2a28 | ||
|
|
7366f0b304 | ||
|
|
1d8fa09c80 | ||
|
|
e085e6c84c | ||
|
|
008fa4584d | ||
|
|
c8c49133d9 | ||
|
|
961f1dea06 | ||
|
|
1700426256 | ||
|
|
aa7f5baad2 | ||
|
|
45acdd6f6d | ||
|
|
8b354e776b | ||
|
|
868f5e44ca | ||
|
|
4e5fdd11ea | ||
|
|
d552a3391a | ||
|
|
d023b4e2dd | ||
|
|
fa79cc9c23 | ||
|
|
06daa75fb9 | ||
|
|
ffa304c838 | ||
|
|
df21765a3e | ||
|
|
5a6ae115f8 | ||
|
|
5e5df40b9b | ||
|
|
6d4943e81f | ||
|
|
57cffe901f | ||
|
|
a758f61793 | ||
|
|
b3b35df2a2 | ||
|
|
5ad50246fc | ||
|
|
d89b895cfd | ||
|
|
d793c292cb | ||
|
|
57749b1b9f | ||
|
|
1cdb7854a5 | ||
|
|
704d33b347 | ||
|
|
b2a7515ee8 | ||
|
|
f4f2b52995 | ||
|
|
c7d5edbf5e | ||
|
|
d8f07f1674 | ||
|
|
78bfb45b07 | ||
|
|
6ad4d60555 | ||
|
|
2fad8aa209 | ||
|
|
74397d45b2 | ||
|
|
c8ca769d3b | ||
|
|
25d42c17e3 | ||
|
|
a377811f15 | ||
|
|
ef1b6b2cf2 | ||
|
|
1699389a46 | ||
|
|
ad8ee3d7d1 | ||
|
|
39f0a4d8e9 | ||
|
|
15a9821cc2 | ||
|
|
53e97e7433 | ||
|
|
bc0ecd202a | ||
|
|
b307daa23f | ||
|
|
4c95b1bfda | ||
|
|
9359fc5ff2 | ||
|
|
a238d7d1eb | ||
|
|
0e92313331 | ||
|
|
3e719c99f5 | ||
|
|
2a4d0dcb89 | ||
|
|
2e155fde39 | ||
|
|
9a8c8cb22e | ||
|
|
04aa7441ab | ||
|
|
28dc54f6d9 | ||
|
|
a1e1165200 | ||
|
|
ddba003d5e | ||
|
|
e59d9a34c9 | ||
|
|
9e198c4bd0 | ||
|
|
7eceffbfef | ||
|
|
8043f01b13 | ||
|
|
41c0f68630 | ||
|
|
2c627637c5 | ||
|
|
58f4b3511e | ||
|
|
93fac08ec3 | ||
|
|
23c3bee970 | ||
|
|
73ff97ad76 | ||
|
|
0d8ffc2007 | ||
|
|
a32f7fb832 | ||
|
|
496cf69e40 | ||
|
|
eb17330837 | ||
|
|
2708603bb4 | ||
|
|
e4f1cda7de | ||
|
|
4359b88bbe | ||
|
|
c079fde3f7 | ||
|
|
6e94156199 | ||
|
|
1f67a3a985 | ||
|
|
4cba294d79 | ||
|
|
e642fd7a1c | ||
|
|
5448e6739c | ||
|
|
f0389d8d37 | ||
|
|
a5313cf360 | ||
|
|
b26c45b033 | ||
|
|
986093affa | ||
|
|
f88e0acb0e | ||
|
|
aed461b431 | ||
|
|
8bbd0e826c | ||
|
|
40c45f86d4 | ||
|
|
a0b7277724 | ||
|
|
54bc369ad7 | ||
|
|
2d3855fc6e | ||
|
|
1cd47f5f6e | ||
|
|
675564835c | ||
|
|
2456cd58c4 | ||
|
|
43a107026d | ||
|
|
ef0498a00b | ||
|
|
f1784f2fd2 | ||
|
|
730f5752ff | ||
|
|
a88c73b43a | ||
|
|
a6d204e241 | ||
|
|
941baf6641 | ||
|
|
b41a614686 | ||
|
|
aac751832a | ||
|
|
52a08e90d1 | ||
|
|
6b5f0458fe | ||
|
|
b52a2738d4 | ||
|
|
10f99d7b77 | ||
|
|
593222afe1 | ||
|
|
7b1856e5a1 | ||
|
|
3d5d81bf39 | ||
|
|
50f06b46f4 | ||
|
|
be6076c0ad | ||
|
|
6125e07d79 | ||
|
|
d5b8c46499 | ||
|
|
7805e23588 | ||
|
|
9117b9d17a | ||
|
|
e274c8fb72 | ||
|
|
e8dbd66e2b | ||
|
|
8b9b23603f | ||
|
|
aefb9dc5e5 | ||
|
|
a8c1b19a31 | ||
|
|
29c8d2a54a | ||
|
|
87827be0c2 | ||
|
|
e4572e5210 | ||
|
|
3e8e12a6b6 | ||
|
|
5ddbb8f41a | ||
|
|
3c44e92bcb | ||
|
|
5e8d95f590 | ||
|
|
2156704924 | ||
|
|
4e49aa0ca3 | ||
|
|
d5d1c53735 | ||
|
|
1aac5c0ee8 | ||
|
|
4434328b0a | ||
|
|
9b2cfb890c | ||
|
|
b2f364ec62 | ||
|
|
b7aeb4c9b5 | ||
|
|
370f48da2a | ||
|
|
32def77ace | ||
|
|
531c81ece8 | ||
|
|
73582b8117 | ||
|
|
5c33091cfa | ||
|
|
56327ebe6a | ||
|
|
e0031b1c78 | ||
|
|
b2ac5cb2d0 | ||
|
|
6757ef89b3 | ||
|
|
bf6eea6536 | ||
|
|
ec4346f6f9 | ||
|
|
e42ff486a8 | ||
|
|
bc9058d041 | ||
|
|
4a276f3039 | ||
|
|
acf47d8f24 | ||
|
|
f62d1ea3d5 | ||
|
|
f923bba73c | ||
|
|
e3738c49b8 | ||
|
|
41746da8c2 | ||
|
|
23b97c6bb5 | ||
|
|
4a7f7171f5 | ||
|
|
961092281f | ||
|
|
036b3f331b | ||
|
|
9ac5c355a2 | ||
|
|
3d0b604c14 | ||
|
|
257b2bfb6c | ||
|
|
90528846e8 | ||
|
|
32509c9731 | ||
|
|
d3f940833d | ||
|
|
b335e351d4 | ||
|
|
67bcde9ba8 | ||
|
|
169bfde4d4 | ||
|
|
0a7f291268 | ||
|
|
0c2c2e71a6 | ||
|
|
d1d746afb4 | ||
|
|
db6e41f0ed | ||
|
|
5b2b60ae98 | ||
|
|
c90a1ae0c9 | ||
|
|
c679fb298e | ||
|
|
17c7cad545 | ||
|
|
164c263b5c | ||
|
|
a9bb9d0eb4 | ||
|
|
cc6688d796 | ||
|
|
9b1f24df3d | ||
|
|
595e804ae3 | ||
|
|
b381e9b952 | ||
|
|
28418076b2 | ||
|
|
abdfdb029e | ||
|
|
8465b81d50 | ||
|
|
ed65b6e512 | ||
|
|
d793544518 | ||
|
|
53480a673b | ||
|
|
ad187f8905 | ||
|
|
2280f82fc6 | ||
|
|
e6714faffb | ||
|
|
af8f2bb174 | ||
|
|
d7501c16bf | ||
|
|
804196a418 | ||
|
|
50d70c01d6 | ||
|
|
9fc601cfbb | ||
|
|
fed5333248 | ||
|
|
3d1dab4404 | ||
|
|
29c2fd46d2 | ||
|
|
a3d5cdb07c | ||
|
|
d99c0f6b4a | ||
|
|
43f21e62aa | ||
|
|
50425bc137 | ||
|
|
0c690586e0 | ||
|
|
bc8c5fe58d | ||
|
|
0cc0db32e3 | ||
|
|
d68f7641a3 | ||
|
|
4fcbaa3dd9 | ||
|
|
5e56584285 | ||
|
|
ca26ccb083 | ||
|
|
3e8b713b06 | ||
|
|
13eca7d782 | ||
|
|
af3d4e1b02 | ||
|
|
80afb40ae3 | ||
|
|
3333428b44 | ||
|
|
a131de9bb2 | ||
|
|
0ddd002f60 | ||
|
|
e7209103e6 | ||
|
|
53f062d050 | ||
|
|
b5b65403a4 | ||
|
|
1a3914fe0c | ||
|
|
b7e3cb31a5 | ||
|
|
9769137a43 | ||
|
|
c0688f1aef | ||
|
|
6c29853bf2 | ||
|
|
2e9802b7a7 | ||
|
|
7483896e15 | ||
|
|
4b4f249e0d | ||
|
|
196dcf93bc | ||
|
|
2c11ec308b | ||
|
|
e5eb96c83a | ||
|
|
54ed003ace | ||
|
|
f18e10253d | ||
|
|
c9add317a9 | ||
|
|
6d1741030b | ||
|
|
b8dc932c05 | ||
|
|
17f8d8db61 | ||
|
|
38437fa135 | ||
|
|
82f35daaaf | ||
|
|
b529bba4bf | ||
|
|
dde33ea9c3 | ||
|
|
cb0d89705b | ||
|
|
f49353b42f | ||
|
|
573c61dcde | ||
|
|
51f38e6c2d | ||
|
|
2de213732a | ||
|
|
3798c36686 | ||
|
|
209abea1db | ||
|
|
250705e7b5 | ||
|
|
5a96822f2c | ||
|
|
23b34259e0 | ||
|
|
11b6cb8aae | ||
|
|
a4bade7aac | ||
|
|
e322b5d167 | ||
|
|
01af4edcfe | ||
|
|
ff0945cbdc | ||
|
|
d5ec7d66a8 | ||
|
|
dc0aebabe6 | ||
|
|
52828ca214 | ||
|
|
757e9886a0 | ||
|
|
f45e8c7bdd | ||
|
|
ea904b4074 | ||
|
|
ec6158d029 | ||
|
|
4386445c18 | ||
|
|
a585aa6750 | ||
|
|
2475a52061 | ||
|
|
001dfac061 | ||
|
|
1b37c55e26 | ||
|
|
3442781798 | ||
|
|
c9d3f123a6 | ||
|
|
d069a4d15d | ||
|
|
f1ad8fb627 | ||
|
|
d7406b1528 | ||
|
|
02ce897e80 | ||
|
|
0bd9d3a60e | ||
|
|
b4c81fb6db | ||
|
|
0f566bda2b | ||
|
|
f97a8149cd | ||
|
|
f4b6a3e9c0 | ||
|
|
7dfae89768 | ||
|
|
d41ca3f0e2 | ||
|
|
65fc4c55be | ||
|
|
5135d6b985 | ||
|
|
2202edeff0 | ||
|
|
c8f759ec74 | ||
|
|
5fda10c6f1 | ||
|
|
11ba084e1b | ||
|
|
cddd00166c | ||
|
|
0190aa7353 | ||
|
|
1546de87f0 | ||
|
|
affffaed3d | ||
|
|
0c644f1462 | ||
|
|
a2da5c7daa | ||
|
|
c155d83f5b | ||
|
|
5a03e3ac3f | ||
|
|
08b2097967 | ||
|
|
15401859b5 | ||
|
|
6f24165170 | ||
|
|
a8afd9382c | ||
|
|
caddf00d78 | ||
|
|
e105098b3f | ||
|
|
9852e7e4d7 | ||
|
|
b855560192 | ||
|
|
f2f50efea3 | ||
|
|
2b3cd246e5 | ||
|
|
7171ade2c2 | ||
|
|
76ec9151d1 | ||
|
|
6c24dd9005 | ||
|
|
e323afb0ce | ||
|
|
1fd43fd86e | ||
|
|
3e70c81ed9 | ||
|
|
6e07229564 | ||
|
|
859d5eb2d7 | ||
|
|
29b0c4a01c | ||
|
|
b824f0f458 | ||
|
|
43ea53a04a | ||
|
|
fa07f00aaf | ||
|
|
dbb834ffeb | ||
|
|
8549a8a5dc | ||
|
|
887c250852 | ||
|
|
710c1c34d1 | ||
|
|
e16818108f | ||
|
|
0cb76e79df | ||
|
|
6cb419673e | ||
|
|
72d668c332 | ||
|
|
5ce4799a38 | ||
|
|
6178da0142 | ||
|
|
27713e3fc2 | ||
|
|
3492c47b18 | ||
|
|
43dc001b62 | ||
|
|
8280b43a62 | ||
|
|
85d9b02d16 | ||
|
|
bfd502f027 | ||
|
|
f1ed5fa827 | ||
|
|
5bb9e1b4d4 | ||
|
|
7de819237d | ||
|
|
6cfab29b71 | ||
|
|
55708796af | ||
|
|
7074f1df07 | ||
|
|
67d8ab07e6 | ||
|
|
4e63da0669 | ||
|
|
15b0a5651c | ||
|
|
4e66723517 | ||
|
|
3e53c86001 | ||
|
|
524e5b844b | ||
|
|
e1f09dfd84 | ||
|
|
f16411ccfd | ||
|
|
2bbcd45b05 | ||
|
|
fdc6c6ef08 | ||
|
|
6e87cc8da6 | ||
|
|
2d0b6c72b8 | ||
|
|
3e84046f90 | ||
|
|
cc1cb996f1 | ||
|
|
32fbeacdfb | ||
|
|
431aad3c15 | ||
|
|
0454f2c490 | ||
|
|
5f911774bf | ||
|
|
66b7e42790 | ||
|
|
6a419388fc | ||
|
|
abda7c1147 | ||
|
|
88b48dc680 | ||
|
|
661d35dfb2 | ||
|
|
f99c9daa39 | ||
|
|
019b3f3e5a | ||
|
|
d6584eba8c | ||
|
|
a379c433a3 | ||
|
|
006c7c6bb1 | ||
|
|
bd4a902a15 | ||
|
|
17ae5e9f13 | ||
|
|
baa5f52422 | ||
|
|
b3620451b2 | ||
|
|
d2f17d9615 | ||
|
|
561cbe5678 | ||
|
|
756d2074b8 | ||
|
|
c65db618bb | ||
|
|
8355647403 | ||
|
|
b839d73411 | ||
|
|
4563c1e043 | ||
|
|
11f35a036d | ||
|
|
d8646dab14 | ||
|
|
47b3cd98f2 | ||
|
|
27c7e53882 | ||
|
|
b2b28803fb | ||
|
|
8e92b1b9ce | ||
|
|
0f41ccf370 | ||
|
|
c44544a1d7 | ||
|
|
4e50f02638 | ||
|
|
174ea15647 | ||
|
|
18f8258a87 | ||
|
|
376bbb5887 | ||
|
|
2c8275409e | ||
|
|
892582b541 | ||
|
|
57b53c1b0a | ||
|
|
004c3ca521 | ||
|
|
f0f00f9272 | ||
|
|
a243c68736 | ||
|
|
467d9f2a34 | ||
|
|
226a94963a | ||
|
|
d7f0d147b1 | ||
|
|
26902b9aad | ||
|
|
3c69d6bec4 | ||
|
|
4f44677a41 | ||
|
|
88d9f669c5 | ||
|
|
22e1421672 | ||
|
|
5409414eff | ||
|
|
7134507de0 | ||
|
|
fe41d9853c | ||
|
|
d07692cd96 | ||
|
|
82ae57136b | ||
|
|
30baeaaeab | ||
|
|
87a0f4b92e | ||
|
|
1b08bcbfe3 | ||
|
|
346b1001eb | ||
|
|
b61a84c8e6 | ||
|
|
a543ea44bc | ||
|
|
b0dd3d1b94 | ||
|
|
461be68b75 | ||
|
|
21fb688d26 | ||
|
|
d8faad27b7 | ||
|
|
dab7075946 | ||
|
|
dfc8e96daa | ||
|
|
71d3eaf358 | ||
|
|
ef6b25be63 | ||
|
|
b452f43322 | ||
|
|
52891f832f | ||
|
|
9990cb75c1 | ||
|
|
a5cc69c7ae | ||
|
|
0b4b8ba64e | ||
|
|
268e78c305 | ||
|
|
c900a78c99 | ||
|
|
46ffb2dc97 | ||
|
|
10acacb3bf | ||
|
|
aab790a656 | ||
|
|
1319aad994 | ||
|
|
3c0ce01cea | ||
|
|
9fcbefebdb | ||
|
|
017d2a887f | ||
|
|
0416482605 | ||
|
|
0f17424918 | ||
|
|
55ed10db21 | ||
|
|
3877b6bfe9 | ||
|
|
a0f32454b6 | ||
|
|
6fda4d7e5d | ||
|
|
36a252ea46 | ||
|
|
a31a195246 | ||
|
|
5f590d2218 | ||
|
|
791b7bc715 | ||
|
|
19ae090787 | ||
|
|
db3076621b | ||
|
|
9ae5743515 | ||
|
|
c184b140df | ||
|
|
9d80aa7e3f | ||
|
|
15671a90a9 | ||
|
|
0048464449 | ||
|
|
b422166ce0 | ||
|
|
81be661ae2 | ||
|
|
8681c66eec | ||
|
|
69a0034e50 | ||
|
|
c9a1778134 | ||
|
|
326794e9c6 | ||
|
|
2dd5ca1fbc | ||
|
|
3042945ac8 | ||
|
|
da29b0d335 | ||
|
|
6abbc68188 | ||
|
|
25f6c7fd8b | ||
|
|
1cf3571ea4 | ||
|
|
d769e7a58c | ||
|
|
fa3619f233 | ||
|
|
a414cbcad3 | ||
|
|
c6196da587 | ||
|
|
5d48762647 | ||
|
|
77e749405d | ||
|
|
9ccd4e224f | ||
|
|
1dad4f3672 | ||
|
|
59745556b4 | ||
|
|
fab4447179 | ||
|
|
417b8d4705 | ||
|
|
e614ec4769 | ||
|
|
a6b03f4138 | ||
|
|
809fa4cc59 | ||
|
|
463f448595 | ||
|
|
5cd0cf8cce | ||
|
|
49cb959494 | ||
|
|
783a73c47f | ||
|
|
99bf516908 | ||
|
|
a26c372cfc | ||
|
|
ed5ac22e5b | ||
|
|
3d11b8f896 | ||
|
|
70b2186e24 | ||
|
|
64ecdaeca9 | ||
|
|
4e74239df1 | ||
|
|
aaf35f11d7 | ||
|
|
093f5d2c15 | ||
|
|
7f1c086b21 | ||
|
|
77ea8c3002 | ||
|
|
ddcfc25a6d | ||
|
|
4d7b7c62c3 | ||
|
|
dd009fe655 | ||
|
|
73ba116e96 | ||
|
|
80b2ff978d | ||
|
|
7ce8c95d58 | ||
|
|
38b6e6c07b | ||
|
|
e4e949192b | ||
|
|
4e52b9845e | ||
|
|
e22b864846 | ||
|
|
b6af2c7e3e | ||
|
|
57db09906b | ||
|
|
4c78bc05c4 | ||
|
|
ef8e772805 | ||
|
|
54571ba004 | ||
|
|
237d7b6cae | ||
|
|
854a225a27 | ||
|
|
e39acc1c90 | ||
|
|
a0b76569b2 | ||
|
|
78625cac82 | ||
|
|
c28a9165f2 | ||
|
|
617298dca3 | ||
|
|
33ab2e31f3 | ||
|
|
bb7ccdfbe2 | ||
|
|
c836f8ef73 | ||
|
|
4df100935f | ||
|
|
2a0ff7ad20 | ||
|
|
c2a548a884 | ||
|
|
77202a85a0 | ||
|
|
73bfcf2226 | ||
|
|
2121f15daf | ||
|
|
b2cf7c6452 | ||
|
|
7587347bc4 | ||
|
|
ae3b4f2336 | ||
|
|
605b04f661 | ||
|
|
97132a0f8e | ||
|
|
30e5e39a3d | ||
|
|
2c618ab993 | ||
|
|
b5d5c0a21f | ||
|
|
f8ea4757cc | ||
|
|
0ed6b52687 | ||
|
|
a63bf2c53c | ||
|
|
b3f3407850 | ||
|
|
477fd4596f | ||
|
|
30b1b28aff | ||
|
|
46400c97a9 | ||
|
|
c558c99fd8 | ||
|
|
13c3a1defa | ||
|
|
aaa29f9e83 | ||
|
|
ede6ef5e08 | ||
|
|
0f529cbdc3 | ||
|
|
eb55b9fc19 | ||
|
|
7012d2a8fa | ||
|
|
8626230a02 | ||
|
|
c23632d3f1 | ||
|
|
3859d7ee78 | ||
|
|
d615bceb2d | ||
|
|
7ca1cfbac3 | ||
|
|
d8e8fc4803 | ||
|
|
57f39cc826 | ||
|
|
6489573224 | ||
|
|
079e00e646 | ||
|
|
5871ddb016 | ||
|
|
c7ba21493a | ||
|
|
8bf5001612 | ||
|
|
6ed9dfb23a | ||
|
|
7f62532030 | ||
|
|
c2c99e2860 | ||
|
|
8125d9f99c | ||
|
|
8e6925b0cd | ||
|
|
d7ecd42255 | ||
|
|
41b7619596 | ||
|
|
211655fcdd | ||
|
|
363bd0b48e | ||
|
|
60aee6ce15 | ||
|
|
bab534057b | ||
|
|
cec2af7510 | ||
|
|
6de3683908 | ||
|
|
fceac0bc74 | ||
|
|
792bbc2374 | ||
|
|
4a94003a51 | ||
|
|
ab4d689832 | ||
|
|
23b973e600 | ||
|
|
b3b201b6f7 | ||
|
|
d41c785d69 | ||
|
|
a370537bde | ||
|
|
2bd45dc94c | ||
|
|
121f9e743c | ||
|
|
0eab41fb78 | ||
|
|
8aa02e97a7 | ||
|
|
a68c7b9171 | ||
|
|
5cabcf96e7 | ||
|
|
85e878f224 | ||
|
|
fe1c7fecf1 | ||
|
|
0e941da6fa | ||
|
|
2d1cbc85c8 | ||
|
|
d195d60a5f | ||
|
|
e81695205e | ||
|
|
fe150ac25d | ||
|
|
bec45a35bb | ||
|
|
3b0ee0d2bf | ||
|
|
dde5b979d2 | ||
|
|
57a6ac7c4f | ||
|
|
9b9cb004f7 | ||
|
|
6ba71a7173 | ||
|
|
4ded7b44a8 | ||
|
|
1457619e13 | ||
|
|
ccf529928f | ||
|
|
5ceb595dfa | ||
|
|
44390fadc0 | ||
|
|
974d05a323 | ||
|
|
0f76640fba | ||
|
|
a11974180f | ||
|
|
5d48a66a6a | ||
|
|
63fc7f848d | ||
|
|
830457ce4f | ||
|
|
ea4d5005d9 | ||
|
|
9f03d0fc04 | ||
|
|
2140659b00 | ||
|
|
e527201f6b | ||
|
|
70531c147c | ||
|
|
75bbf6e14c | ||
|
|
702e742515 | ||
|
|
be01f79d3d | ||
|
|
bf785c9849 | ||
|
|
4db4882402 | ||
|
|
6786f52ada | ||
|
|
2e6a7b3efc | ||
|
|
63461b8db1 | ||
|
|
e77228ba11 | ||
|
|
5c60b1637a | ||
|
|
26397d2e8c | ||
|
|
85b2c0ce7f | ||
|
|
f826bf7798 | ||
|
|
3ebbe8853f | ||
|
|
ac71d81e84 | ||
|
|
a9dbe71ee0 | ||
|
|
ecd3370ba0 | ||
|
|
19d300d07c | ||
|
|
071920d9f6 | ||
|
|
1f6e9bce21 | ||
|
|
434ba03ca9 | ||
|
|
d88d941c87 | ||
|
|
9d44cd1642 | ||
|
|
1d4e879106 | ||
|
|
ae381fef5c | ||
|
|
48114ec952 | ||
|
|
7a76219774 | ||
|
|
2900fc8ae1 | ||
|
|
e9afa08cd1 | ||
|
|
bcaa36fd11 | ||
|
|
71702f7ed0 | ||
|
|
fd252de312 | ||
|
|
349e78e2e8 | ||
|
|
79bd20fd17 | ||
|
|
d0c3628834 | ||
|
|
31636a3ed1 | ||
|
|
f3b7bdadbc | ||
|
|
ad7159ea84 | ||
|
|
0b0dbb2cac | ||
|
|
12bf56c017 | ||
|
|
93c4ba07d7 | ||
|
|
36d46234c7 | ||
|
|
774b2fe700 | ||
|
|
6c901ae8c1 | ||
|
|
90c65a9838 | ||
|
|
5eba1ab346 | ||
|
|
4e50072d56 | ||
|
|
dd9557a8ba | ||
|
|
ed551cddf7 | ||
|
|
5aca224ecd | ||
|
|
dab6293482 | ||
|
|
1416aec60d | ||
|
|
aa8f38e49b | ||
|
|
8525377265 | ||
|
|
2fbc8a2aad | ||
|
|
6343829a39 | ||
|
|
2401debe83 | ||
|
|
5c61111bff | ||
|
|
bc645199c0 | ||
|
|
0a8c9f7de1 | ||
|
|
7b808412c9 | ||
|
|
706c5a4d35 | ||
|
|
0afc9f5bc0 | ||
|
|
2e5975285e | ||
|
|
5947ca0409 | ||
|
|
d40a1b865f | ||
|
|
f80921b6a6 | ||
|
|
9be5481297 | ||
|
|
8fe8bae15a | ||
|
|
f2c0230518 | ||
|
|
e6e0c9018c | ||
|
|
9619b730b4 | ||
|
|
2766515fca | ||
|
|
87d52468aa | ||
|
|
70d71f6185 | ||
|
|
5ee92a5ec1 | ||
|
|
c76fd290be | ||
|
|
d0a20cafa1 | ||
|
|
8da07655ee | ||
|
|
befe1fbc29 | ||
|
|
5e4430e70d | ||
|
|
4d6e1e4f29 | ||
|
|
122396f2db | ||
|
|
09a60c9833 | ||
|
|
b444ac3e6f | ||
|
|
f768be81d8 | ||
|
|
91173829db | ||
|
|
bfaead2b12 | ||
|
|
e6b4578540 | ||
|
|
0dd4850ee0 | ||
|
|
c650168a4f | ||
|
|
ea71ec1b11 | ||
|
|
f1455b3063 | ||
|
|
b764f82c64 | ||
|
|
436bdcff4e | ||
|
|
27f864e8ac | ||
|
|
80aa9cc985 | ||
|
|
ab7e09f59b | ||
|
|
e9eda23ae6 | ||
|
|
6caa4edd3e | ||
|
|
ac786241a2 | ||
|
|
df0681e554 | ||
|
|
e19106f5fb | ||
|
|
ae7ec4c71d | ||
|
|
020d67fb89 | ||
|
|
3fdc6c11aa | ||
|
|
dcf6b3e9b6 | ||
|
|
606f6c477a | ||
|
|
1581f82243 | ||
|
|
0d6f9c7181 | ||
|
|
640b86cb24 | ||
|
|
111a6e2a23 | ||
|
|
d764e7edb8 | ||
|
|
aff8259510 | ||
|
|
256b3e9c5f | ||
|
|
762a2e3cab | ||
|
|
28b6d5020e | ||
|
|
d5bbead449 | ||
|
|
0f7efbc859 | ||
|
|
a7ae4abfd9 | ||
|
|
30661b1b01 | ||
|
|
1ea6472e60 | ||
|
|
b8dfde2a36 | ||
|
|
570006f3a2 | ||
|
|
babb379849 | ||
|
|
6665ef303e | ||
|
|
7e7af0bc51 | ||
|
|
87d3a0cd90 | ||
|
|
1e369b375e | ||
|
|
6bf24568bc | ||
|
|
837f2fc7a4 | ||
|
|
1a489c9af1 | ||
|
|
8c864e5466 | ||
|
|
be5707c820 | ||
|
|
4a4f3071ec | ||
|
|
d7235a9d68 | ||
|
|
fa0f834c20 | ||
|
|
96562f2fb3 | ||
|
|
b9790c1cd4 | ||
|
|
fcbdde0dfe | ||
|
|
51ec776b7d | ||
|
|
e65bcbcef0 | ||
|
|
e710de12ce | ||
|
|
db99c52509 | ||
|
|
f8d6be3f81 | ||
|
|
d493899579 | ||
|
|
492279f6f3 | ||
|
|
3ad74edce8 | ||
|
|
2b7b1cad10 | ||
|
|
43048d13c8 | ||
|
|
e8da6a1d0f | ||
|
|
305514000c | ||
|
|
0702150f53 | ||
|
|
a0ee081515 | ||
|
|
d43c4497ce | ||
|
|
4b96839f06 | ||
|
|
249a77f5fb | ||
|
|
d0fff69dc9 | ||
|
|
8c9bd89338 | ||
|
|
2e415778f2 | ||
|
|
1cbf663a6c | ||
|
|
9be8035b11 | ||
|
|
2ecd2edede | ||
|
|
9d84d4ed5e | ||
|
|
2e0c7db950 | ||
|
|
002e66c0e8 | ||
|
|
e9746e03ee | ||
|
|
ab9c689ad3 | ||
|
|
4c3296960d | ||
|
|
96826bfc84 | ||
|
|
eb1aa135d8 | ||
|
|
99649b5990 | ||
|
|
6d6c47980e | ||
|
|
474b3b1cc8 | ||
|
|
3e727a3b37 | ||
|
|
a9ff742e42 | ||
|
|
787287af40 | ||
|
|
5cbd203302 | ||
|
|
592a207b94 | ||
|
|
6bcbac0abb | ||
|
|
4c048211f1 | ||
|
|
b94551e823 | ||
|
|
9b634c9b37 | ||
|
|
5b331ab77a | ||
|
|
dd6f479ea8 | ||
|
|
87facba376 | ||
|
|
e4662fdb62 | ||
|
|
efa73a77e4 | ||
|
|
89778b7f3f | ||
|
|
c79c5a256b | ||
|
|
9960bdc6fa | ||
|
|
23dcb447ff | ||
|
|
39c63e162c | ||
|
|
34d05a4023 | ||
|
|
dcc0c29876 | ||
|
|
db50661fce | ||
|
|
f9afd9f861 | ||
|
|
d4cdbab99b | ||
|
|
5f834ab123 | ||
|
|
8528128b2a | ||
|
|
a0f3679b52 | ||
|
|
8228fd89fc | ||
|
|
869eb9e767 | ||
|
|
6c2878344f | ||
|
|
2836cb3816 | ||
|
|
46d4782888 | ||
|
|
a01a351cc2 | ||
|
|
adb92d56eb | ||
|
|
ce04f91951 | ||
|
|
6cb9fca70d | ||
|
|
ec0bfca7e7 | ||
|
|
1cd504e7be | ||
|
|
11f3cee93b | ||
|
|
6bf79e30ea | ||
|
|
7555c9337f | ||
|
|
ffc2b3e927 | ||
|
|
9ab89286a2 | ||
|
|
5329130333 | ||
|
|
e1451bb51d | ||
|
|
0b44c26d78 | ||
|
|
4db9677bac | ||
|
|
1381bf90f4 | ||
|
|
e0f7b87227 | ||
|
|
985de86340 | ||
|
|
b814c01a76 | ||
|
|
c07a126fb2 | ||
|
|
09a6e19431 | ||
|
|
863d447e0b | ||
|
|
5ce278a77b | ||
|
|
37cf49a3df | ||
|
|
f79262e94b | ||
|
|
7d537d4fc7 | ||
|
|
ca89fc1fb4 | ||
|
|
59d2d48f64 | ||
|
|
b3c8dd4eab | ||
|
|
45d3767d28 | ||
|
|
8671b89860 | ||
|
|
4f7f411719 | ||
|
|
eac442ddd3 | ||
|
|
55bef26d8a | ||
|
|
2aa2a5775f | ||
|
|
c451bd828f | ||
|
|
8ecfbedd85 | ||
|
|
c173fce4e2 | ||
|
|
953174f46e | ||
|
|
c621c7e432 | ||
|
|
2bbe8f9129 | ||
|
|
4be0a5d429 | ||
|
|
bdfe932dca | ||
|
|
3fc59c8406 | ||
|
|
c61915c659 | ||
|
|
368888bcb6 | ||
|
|
eafd6e5110 | ||
|
|
05935c47b2 | ||
|
|
d8bd55a364 | ||
|
|
841c91d6e4 | ||
|
|
a4792168ec | ||
|
|
90b96776cd | ||
|
|
408f906592 | ||
|
|
7a18ecb2df | ||
|
|
174c86a216 | ||
|
|
c6ddacf7f8 | ||
|
|
ab3eafd5b5 | ||
|
|
dd043cd501 | ||
|
|
a75c662fd1 | ||
|
|
83574cf808 | ||
|
|
2cd81830ef | ||
|
|
e194fe8f47 | ||
|
|
40a706286f | ||
|
|
c6f6c380c7 | ||
|
|
8f395e0f4d | ||
|
|
595852f3b5 | ||
|
|
0a56761f19 | ||
|
|
220903f92e | ||
|
|
3c1d6bbc92 | ||
|
|
cab14b9803 | ||
|
|
17a4a4dff8 | ||
|
|
c2c2e7a438 | ||
|
|
d18ef847f4 | ||
|
|
5c0d90a699 | ||
|
|
f434730524 | ||
|
|
65fd877515 | ||
|
|
64ddafc6b6 | ||
|
|
781f0a9bb5 | ||
|
|
3de5a7745f | ||
|
|
94fd382f8b | ||
|
|
4bd4afa34e | ||
|
|
148bb9515c | ||
|
|
51e00db226 | ||
|
|
a92ebf2290 | ||
|
|
f49c687507 | ||
|
|
8b99c79fae | ||
|
|
718f8f7a9e | ||
|
|
e718520cc5 | ||
|
|
4f46934269 | ||
|
|
fabe640f5e | ||
|
|
19048b5c8d | ||
|
|
156ee88285 | ||
|
|
c386f8ac38 | ||
|
|
4a954b56c9 | ||
|
|
d05a474556 | ||
|
|
8a2062fefe | ||
|
|
2f63ad5b35 | ||
|
|
c78bba2343 | ||
|
|
d26c905c67 | ||
|
|
8fcc9caecc | ||
|
|
e7b097f558 | ||
|
|
5ee6f96cea | ||
|
|
dc634aff25 | ||
|
|
8e3b2dbb31 | ||
|
|
ba6f95e81b | ||
|
|
281066cb03 | ||
|
|
830b8877ba | ||
|
|
9912ab6770 | ||
|
|
299ab428ce | ||
|
|
e6ef05d5f3 | ||
|
|
0f401ff08b | ||
|
|
5558128541 | ||
|
|
e33c72dfc6 | ||
|
|
44a877aa88 | ||
|
|
6b6fe3d8e4 | ||
|
|
4c1a6e004a | ||
|
|
6e6ada18c6 | ||
|
|
b35a131069 | ||
|
|
1728756255 | ||
|
|
a12a6b9962 | ||
|
|
852bd35065 | ||
|
|
a5db50d005 | ||
|
|
f3eba36c4c | ||
|
|
529d329ce1 | ||
|
|
47a6d388c7 | ||
|
|
c02b6b6b21 | ||
|
|
3b28bc9910 | ||
|
|
fc003bcecb | ||
|
|
38d3a73808 | ||
|
|
73b3c2d861 | ||
|
|
4670e00ff5 | ||
|
|
287df2fe49 | ||
|
|
e0fbd07309 | ||
|
|
eaee098e1f | ||
|
|
43d9e9d07f | ||
|
|
c420fab52b | ||
|
|
6469a1fda3 | ||
|
|
7f50d9a4b0 | ||
|
|
da6ea110b5 | ||
|
|
fb777e1f79 | ||
|
|
360bb61d86 | ||
|
|
847e551f39 | ||
|
|
d4122504a2 | ||
|
|
2c4226c42b | ||
|
|
86173db853 | ||
|
|
9034c56c6c | ||
|
|
e33ffaca12 | ||
|
|
853eae51e0 | ||
|
|
b4be380889 | ||
|
|
ff80280b01 | ||
|
|
e45641bd17 | ||
|
|
d5a37b0293 | ||
|
|
6819050722 | ||
|
|
88db4e6b9e | ||
|
|
be86dd85e4 | ||
|
|
3df9357103 | ||
|
|
992e92a46e | ||
|
|
3247812e34 | ||
|
|
a5cdb7d5bd | ||
|
|
4a6bb116c4 | ||
|
|
2819ffb520 | ||
|
|
964c7e8f6d | ||
|
|
f6a45ac5ac | ||
|
|
2e86f0d8d7 | ||
|
|
e2a29d49ca | ||
|
|
b99674103d | ||
|
|
41f81a0143 | ||
|
|
36309aa2be | ||
|
|
eb9d8d8cd4 | ||
|
|
f7ccba3edf | ||
|
|
eb77ebe26c | ||
|
|
f5e2354c9d | ||
|
|
f4cc56f494 | ||
|
|
be86c7fc87 | ||
|
|
6205171362 | ||
|
|
ab568a17cf | ||
|
|
fe591284be | ||
|
|
7122aafce5 | ||
|
|
5ffba305c8 | ||
|
|
ceee538af5 | ||
|
|
054307e7ed | ||
|
|
8cd358bef8 | ||
|
|
eeb9cdfc94 | ||
|
|
16fe5f8b50 | ||
|
|
041e7f2eee | ||
|
|
ab12438030 | ||
|
|
c220e58f9e | ||
|
|
6bd05ad472 | ||
|
|
90ec4c0af0 | ||
|
|
52e9196d7e | ||
|
|
f7e85c371e | ||
|
|
f5cbf8fbe1 | ||
|
|
7d7e640e0b | ||
|
|
e4f0e40eac | ||
|
|
6e3bc4f073 | ||
|
|
c36e936b60 | ||
|
|
761ffa729f | ||
|
|
1e26a8baed | ||
|
|
7c337e00d2 | ||
|
|
7e8481afd1 | ||
|
|
1266cec2fe | ||
|
|
3667a6f5b3 | ||
|
|
deb21fbae9 | ||
|
|
057039f782 | ||
|
|
d7c738a09a | ||
|
|
a981e2adbc | ||
|
|
88fce8539f | ||
|
|
4f1aa191b3 | ||
|
|
e540d1cd77 | ||
|
|
fd47c36136 | ||
|
|
d9f5f07e28 | ||
|
|
b31db9ee96 | ||
|
|
1021f9aa5e | ||
|
|
320bfc1be7 | ||
|
|
b820455c6e | ||
|
|
5c4436c977 | ||
|
|
a78a03744d | ||
|
|
a329fdde51 | ||
|
|
31d3c84422 | ||
|
|
afff52a3ba | ||
|
|
8931b30d84 | ||
|
|
27dc105f51 | ||
|
|
3964038fe6 | ||
|
|
b510d77535 | ||
|
|
56c7754cab | ||
|
|
92e2c81aff | ||
|
|
a70a49a018 | ||
|
|
61b05a0025 | ||
|
|
7c9882eb24 | ||
|
|
0d7f6fc76a | ||
|
|
a9e96d724d | ||
|
|
d9e427f09c | ||
|
|
a23e3dbee1 | ||
|
|
400ca0e467 | ||
|
|
9536b85c07 | ||
|
|
4d318c79b2 | ||
|
|
1ad90a916b | ||
|
|
8ab9025e31 | ||
|
|
9e5df8e448 | ||
|
|
96d13fe62b | ||
|
|
089458b096 | ||
|
|
7c1722c60d | ||
|
|
c020c3213e | ||
|
|
930875ef77 | ||
|
|
3b979c5450 | ||
|
|
339ad7ce73 | ||
|
|
676517e08e | ||
|
|
52108cecc0 | ||
|
|
addd641f3a | ||
|
|
f63e4be392 | ||
|
|
ca55d11f84 | ||
|
|
abe7f8b457 | ||
|
|
a078befcbe | ||
|
|
f12797a447 | ||
|
|
fa8e921f66 | ||
|
|
4287ade5b4 | ||
|
|
7398053149 | ||
|
|
4d1f3f7a6c | ||
|
|
aff686df91 | ||
|
|
637f90621d | ||
|
|
6d0624aca3 | ||
|
|
085ea80371 | ||
|
|
ab0ff06205 | ||
|
|
79eeb47031 | ||
|
|
9911b7496f | ||
|
|
3dbd453f41 | ||
|
|
731339627f | ||
|
|
26e71a1850 | ||
|
|
db01bad30f | ||
|
|
6ff28e017d | ||
|
|
4664eb5230 | ||
|
|
744ecaa5b6 | ||
|
|
76d761ccd3 | ||
|
|
eef0c1f34c | ||
|
|
82a2431327 | ||
|
|
96fc37f145 | ||
|
|
3a87756fed | ||
|
|
c8ec4a1b0b | ||
|
|
699e1a3a82 | ||
|
|
64214a2183 | ||
|
|
0fcb905b0d | ||
|
|
4be63cfb55 | ||
|
|
ca64056836 | ||
|
|
df77428443 | ||
|
|
3e583572b3 | ||
|
|
43d8f27dca | ||
|
|
b045299113 | ||
|
|
13baedc55b | ||
|
|
9400d9ac83 | ||
|
|
341e18b497 | ||
|
|
339a1820fd | ||
|
|
cec2538ca9 | ||
|
|
28f7e60d47 | ||
|
|
544b82e493 | ||
|
|
8789af8db8 | ||
|
|
1ad6a1b5e9 | ||
|
|
6e150083bb | ||
|
|
98d8baabbd | ||
|
|
c1d2e00ec5 | ||
|
|
ad8bd4ece8 | ||
|
|
2f0550c4c1 | ||
|
|
98057eba77 | ||
|
|
097f9d8c52 | ||
|
|
60447e59ef | ||
|
|
94e6ae7a69 | ||
|
|
f670738987 | ||
|
|
b6a338cb29 | ||
|
|
4726fcfc25 | ||
|
|
15bd07e923 | ||
|
|
fdf355878c | ||
|
|
da989402f2 | ||
|
|
10f0c85cfc | ||
|
|
70ba4ee5d5 | ||
|
|
31f528b15d | ||
|
|
86140095b5 | ||
|
|
8e1d3ba50e | ||
|
|
37210fe7e2 | ||
|
|
0e1dba934f | ||
|
|
11d01d371f | ||
|
|
76c3ef7446 | ||
|
|
659f7f3168 | ||
|
|
3d3bf9c730 | ||
|
|
4017e8706c | ||
|
|
3ce54f35b3 | ||
|
|
ebc06fba67 | ||
|
|
e979c039f9 | ||
|
|
90acf770b5 | ||
|
|
0d89e45690 | ||
|
|
1948c7e6dd | ||
|
|
a6db6a0070 | ||
|
|
fdb2fe6dc2 | ||
|
|
a2115c5d17 | ||
|
|
4fe55663df | ||
|
|
ae1552ee99 | ||
|
|
debf380122 | ||
|
|
ddb038d349 | ||
|
|
b7cc9dffac | ||
|
|
e1b81fed33 | ||
|
|
5d58f1bbfe | ||
|
|
fcd1cb666c | ||
|
|
4f19a9cb9f | ||
|
|
0023adb47a | ||
|
|
81fe8dcfe1 | ||
|
|
d527834a1d | ||
|
|
89c333e3e5 | ||
|
|
0d97d00b6c | ||
|
|
e7adda52b3 | ||
|
|
7432d073af | ||
|
|
04e2ab2c02 | ||
|
|
b7fcc08976 | ||
|
|
7722e53f12 | ||
|
|
2c3ee16272 | ||
|
|
19112771d6 | ||
|
|
4c7c5ff667 | ||
|
|
d7e915616d | ||
|
|
67c8e7f414 | ||
|
|
74eb3e0914 | ||
|
|
79fe664f19 | ||
|
|
5f0477f47b | ||
|
|
7bbce69721 | ||
|
|
870d6541f2 | ||
|
|
02c27b113c | ||
|
|
86d4bc3aea | ||
|
|
761772d7e1 | ||
|
|
54ef01b54b | ||
|
|
9311c4421a | ||
|
|
aaa4f448cf | ||
|
|
5f8b524619 | ||
|
|
08111768a2 | ||
|
|
1b827d7b6f | ||
|
|
a005fb019f | ||
|
|
b5e5760d01 | ||
|
|
cf2bc94e5c | ||
|
|
26f0cf69d3 | ||
|
|
61836c1b70 | ||
|
|
2a1b0c8d65 | ||
|
|
75a8e30f4f | ||
|
|
716b87a026 | ||
|
|
08b229e13f | ||
|
|
a529a80108 | ||
|
|
c81898cbc4 | ||
|
|
330591fdfc | ||
|
|
c7503f5240 | ||
|
|
eff371c866 | ||
|
|
8dc899dee4 | ||
|
|
cc3d7bd0fc | ||
|
|
7df4c86bdd | ||
|
|
c313e32a8b | ||
|
|
77519b51db | ||
|
|
1a01868e35 | ||
|
|
563d3e5948 | ||
|
|
1187ee7dad | ||
|
|
7c5921e736 | ||
|
|
399f94bfb4 | ||
|
|
1fa29843fa | ||
|
|
ee0449b17c | ||
|
|
e28eddc51f | ||
|
|
d82a612a90 | ||
|
|
e7e8f4b333 | ||
|
|
a6fbcb4220 | ||
|
|
8164032a2e | ||
|
|
a5804a750b | ||
|
|
81025661a9 | ||
|
|
4ece7eb6f4 | ||
|
|
0bb01b7df0 | ||
|
|
1c56e95e28 | ||
|
|
446124a258 | ||
|
|
583b0b67ab | ||
|
|
584502d4a0 | ||
|
|
d8803d5ae6 | ||
|
|
acfb4b5b9f | ||
|
|
0ddd3ea217 | ||
|
|
6a8517f274 | ||
|
|
94d511cdbd | ||
|
|
ec5d747328 | ||
|
|
c6880b2533 | ||
|
|
eb6eb3e630 | ||
|
|
ae4eb3c9ac | ||
|
|
ba0e826d83 | ||
|
|
f3fef74b09 | ||
|
|
014f62b649 | ||
|
|
55eab3b74b | ||
|
|
dc0fcb98df | ||
|
|
d24a9c8f5a | ||
|
|
42fe218b9f | ||
|
|
956006b741 | ||
|
|
167066fed4 | ||
|
|
525de5d335 | ||
|
|
367eb1f125 | ||
|
|
3444961787 | ||
|
|
710069c19e | ||
|
|
ddd3a617ca | ||
|
|
6434abbfc6 | ||
|
|
e45c100762 | ||
|
|
5a22a8e7f9 | ||
|
|
d6c764573c | ||
|
|
9d35d08ab6 | ||
|
|
f7b61702a0 | ||
|
|
983180bb8b | ||
|
|
cdb0392159 | ||
|
|
1891f5b395 | ||
|
|
a3963619f6 | ||
|
|
34994068a4 | ||
|
|
afaad0ada6 | ||
|
|
05f9cb3b77 | ||
|
|
1988a456a7 | ||
|
|
69216cc5a5 | ||
|
|
2cf6fa4c8b | ||
|
|
a61710b868 | ||
|
|
20f7563f3d | ||
|
|
3df2eff4bd | ||
|
|
a415ebd026 | ||
|
|
52ee3d01ae | ||
|
|
e59f992be6 | ||
|
|
8bae7722a2 | ||
|
|
0d7dba92c8 | ||
|
|
ce1390aedc | ||
|
|
287a9ee76e | ||
|
|
96b0f6c16d | ||
|
|
e1612ea59d | ||
|
|
71f4ea44eb | ||
|
|
35295bdbee | ||
|
|
aa8d6f3e86 | ||
|
|
62aa5dd415 | ||
|
|
673c55a2fe | ||
|
|
949ce10e88 | ||
|
|
8dee823e61 | ||
|
|
5d86336746 | ||
|
|
5b89f78a89 | ||
|
|
85a5668dba | ||
|
|
c943ca5404 | ||
|
|
1c7f8707fd | ||
|
|
a21c46e70b | ||
|
|
f3c26535ad | ||
|
|
2329694222 | ||
|
|
206a975752 | ||
|
|
9677bf0f30 | ||
|
|
6d6496ed52 | ||
|
|
7d9cf7c0bb | ||
|
|
55525742f4 | ||
|
|
c693b5a55c | ||
|
|
6b6443dead | ||
|
|
54b5fd537f | ||
|
|
0b99d4f1d1 | ||
|
|
3c07d3a3d3 | ||
|
|
1d1a64653c | ||
|
|
297e6f1917 | ||
|
|
b948e2c59e | ||
|
|
18096abb29 | ||
|
|
0aa08a2e34 | ||
|
|
f20af72312 | ||
|
|
7ef643360d | ||
|
|
76c828c627 | ||
|
|
281cfff026 | ||
|
|
64a5c5d1be | ||
|
|
7b8b797375 | ||
|
|
a1a382dbc9 | ||
|
|
19f6c524bf | ||
|
|
8dbdf6314c | ||
|
|
9c54e18bf0 | ||
|
|
9aba74e55a | ||
|
|
e4317d2031 | ||
|
|
61775daf00 | ||
|
|
86d8f3ee19 | ||
|
|
cb1fbf9f63 | ||
|
|
3005764c18 | ||
|
|
b1e8b4e65d | ||
|
|
c6149e2f02 | ||
|
|
aa5c99fa01 | ||
|
|
9c200f5471 | ||
|
|
ec06417d52 | ||
|
|
a4346646f1 | ||
|
|
a70c09e2a2 | ||
|
|
0f9e0abbee | ||
|
|
e77dbf325f | ||
|
|
f03620ea15 | ||
|
|
47b2e238e5 | ||
|
|
ad35cdac74 | ||
|
|
4eba5d8c86 | ||
|
|
e69adea539 | ||
|
|
9660cbcd6b | ||
|
|
9c9c83ccb9 | ||
|
|
1d42fb5f4a | ||
|
|
e119769480 | ||
|
|
b2dba9bf1f | ||
|
|
932cc129ee | ||
|
|
1a42839ba7 | ||
|
|
232a938c75 | ||
|
|
69ab085290 | ||
|
|
5f09d0ecc2 | ||
|
|
76b46e7707 | ||
|
|
6217896145 | ||
|
|
ee7ca0941a | ||
|
|
f8492ffeaa | ||
|
|
308595638a | ||
|
|
0bd8d6e2e1 | ||
|
|
160065c5bb | ||
|
|
ae0d6e3e36 | ||
|
|
6fa8a01c72 | ||
|
|
3f6916cf29 | ||
|
|
a4470ae7b2 | ||
|
|
251718e4c1 | ||
|
|
c504a5e783 | ||
|
|
f6fb2c95ef | ||
|
|
708311267a | ||
|
|
cdd1d7a618 | ||
|
|
2f324768b2 | ||
|
|
6ef18c21c9 | ||
|
|
b38c0add30 | ||
|
|
b900df5258 | ||
|
|
a2a54ffc5f | ||
|
|
20c04a13e6 | ||
|
|
a291745eeb | ||
|
|
0862caf27e | ||
|
|
cb1bab1a04 | ||
|
|
96afc1cfd5 | ||
|
|
24a8c25ab5 | ||
|
|
d1e7d1d96c | ||
|
|
18f547734e | ||
|
|
be3b365a34 | ||
|
|
b2b2dafc28 | ||
|
|
14ab6cdd69 | ||
|
|
eeec060df0 | ||
|
|
0efb7b1eea | ||
|
|
f000f705ea | ||
|
|
2749cc1ede | ||
|
|
a44e4f2cf8 | ||
|
|
30b10f947a | ||
|
|
731c6802d7 | ||
|
|
4cfb986f27 | ||
|
|
9cfc8a9d5c | ||
|
|
18327cd0e4 | ||
|
|
2022cfe07e | ||
|
|
47b71e6ee9 | ||
|
|
74633553a9 | ||
|
|
376bf1d4aa | ||
|
|
d318fb79d2 | ||
|
|
2840dcd2a6 | ||
|
|
0cc361f3e7 | ||
|
|
baecb96e8a | ||
|
|
6181f5e404 | ||
|
|
d952c79a7b | ||
|
|
3dfb6b3353 | ||
|
|
48bd505c0b | ||
|
|
ab2d91bd6b | ||
|
|
3b2eead381 | ||
|
|
f3d2a9db09 | ||
|
|
8bbf6ac010 | ||
|
|
38e952e8ae | ||
|
|
fa9fed1c3a | ||
|
|
f6301f6888 | ||
|
|
44907e6064 | ||
|
|
907e99623c | ||
|
|
231671b9ff | ||
|
|
4f1a0b2c21 | ||
|
|
260c497cdd | ||
|
|
313fce7b61 | ||
|
|
2f877235a3 | ||
|
|
309fa55bbb | ||
|
|
4b8747e440 | ||
|
|
2ff7a0edef | ||
|
|
442cbb062d | ||
|
|
c971ca4c86 | ||
|
|
9babf3929b | ||
|
|
2ec0be9e77 | ||
|
|
c2d1c2d319 | ||
|
|
162f677def | ||
|
|
2875462425 | ||
|
|
a1d915990b | ||
|
|
b002265ee3 | ||
|
|
bd31fb2145 | ||
|
|
b506821d43 | ||
|
|
4bfb49b3cf | ||
|
|
9981a51e42 | ||
|
|
ebb326afe6 | ||
|
|
0d1aa74d6f | ||
|
|
a9c5de8654 | ||
|
|
0f32c841a6 | ||
|
|
41a8d5167f | ||
|
|
8f41e4fa4d | ||
|
|
de50494505 | ||
|
|
3d1def0132 | ||
|
|
0a29f5110d | ||
|
|
8b71d35458 | ||
|
|
760e353528 | ||
|
|
3627fedbea | ||
|
|
bbb5cf05db | ||
|
|
ebb01b84b8 | ||
|
|
a0d48e7e7e | ||
|
|
1fcfa22222 | ||
|
|
c9fb4e2c8d | ||
|
|
6e7ca5e1eb | ||
|
|
954b274789 | ||
|
|
0d5ac5a738 | ||
|
|
c209a35820 | ||
|
|
dd2b6750db | ||
|
|
4bb89bca9e | ||
|
|
ac63b8370e | ||
|
|
882d29dd87 | ||
|
|
ee373e7f19 | ||
|
|
8d72476e2b | ||
|
|
02756aa8ba | ||
|
|
072dfb9e4e | ||
|
|
0636c39bb1 | ||
|
|
a2e623c011 | ||
|
|
aa79dd6895 | ||
|
|
60cad2caed | ||
|
|
114c9c36b1 | ||
|
|
fd5bc65cc8 | ||
|
|
e041863905 | ||
|
|
0a05123a6c | ||
|
|
2afe316721 | ||
|
|
7e69565fe6 | ||
|
|
ccae144d62 | ||
|
|
5d5ca32fa1 | ||
|
|
52b8dad8ec | ||
|
|
cc684e330b | ||
|
|
85c6749216 | ||
|
|
30e5e8aca5 | ||
|
|
b900a6b42f | ||
|
|
15780a1ea0 | ||
|
|
92ada7cc52 | ||
|
|
53ca4761cc | ||
|
|
52cfa39716 | ||
|
|
b3bad17d1a | ||
|
|
feaaf1dbea | ||
|
|
82bf227e91 | ||
|
|
8807a2dfc4 | ||
|
|
bcb38217c4 | ||
|
|
af32f9fdda | ||
|
|
357d5de5b9 | ||
|
|
0501f02b06 | ||
|
|
689f9faba4 | ||
|
|
82686bdcaa | ||
|
|
14b1d089b6 | ||
|
|
a296239bdd | ||
|
|
0b0896cdd2 | ||
|
|
2d3e956ae0 | ||
|
|
36b7c06975 | ||
|
|
42182852f5 | ||
|
|
560b79cbff | ||
|
|
a6d799d705 | ||
|
|
64aecc6720 | ||
|
|
8ac40b4dea | ||
|
|
43b8fe1cd0 | ||
|
|
39d764ed58 | ||
|
|
a6ebe229e3 | ||
|
|
5c914f204a | ||
|
|
8876e58f34 | ||
|
|
7321a84d4c | ||
|
|
bb11c28246 | ||
|
|
8d9f136d06 | ||
|
|
00b4e083fd | ||
|
|
4cfe3df1f5 | ||
|
|
8f2d60ec26 | ||
|
|
123b23fa95 | ||
|
|
423a5d54a1 | ||
|
|
8bbf6bcf17 | ||
|
|
ea46f5e0e5 | ||
|
|
7f6c848242 | ||
|
|
559d50138f | ||
|
|
11d8cdc6ad | ||
|
|
e49978dafe | ||
|
|
e1d9e533b5 | ||
|
|
f946dd7198 | ||
|
|
1702c8c4bf | ||
|
|
afda1385bd | ||
|
|
fec38ca4ed | ||
|
|
ec1edeb5fa | ||
|
|
b0ec114685 | ||
|
|
c92da5a605 | ||
|
|
06e2dd037e | ||
|
|
34f0a19309 | ||
|
|
772e3c07b4 | ||
|
|
360ff3cf58 | ||
|
|
5dfe910023 | ||
|
|
91b73acb19 | ||
|
|
87d3af6475 | ||
|
|
98c1509f34 | ||
|
|
98939a05b6 | ||
|
|
d28134b8f3 | ||
|
|
8583eba015 | ||
|
|
5894b98f99 | ||
|
|
5de3a0ff3d | ||
|
|
10ca15f3fa | ||
|
|
da736b31b2 | ||
|
|
fa9ac569b8 | ||
|
|
10a10fb834 | ||
|
|
0f997d0dc3 | ||
|
|
b0eedd77f6 | ||
|
|
502aef5aaf | ||
|
|
9f8cfb1c62 | ||
|
|
c163b5f7a0 | ||
|
|
20da8b8f90 | ||
|
|
ae93dc13ab | ||
|
|
77e87e6148 | ||
|
|
a6e700e665 | ||
|
|
4d7aff707e | ||
|
|
d137b56a5b | ||
|
|
7806f3dd4b | ||
|
|
1e24b3a09e | ||
|
|
73b979e601 | ||
|
|
ebae8092cb | ||
|
|
2e21922eb6 | ||
|
|
1c3d2b94be | ||
|
|
48d2335d73 | ||
|
|
96ea4ae91c | ||
|
|
7af5726108 | ||
|
|
69d4646f4e | ||
|
|
8bd11f3ec2 | ||
|
|
47a9d527ab | ||
|
|
d9907c972b | ||
|
|
1444bfb2c8 | ||
|
|
14975faa60 | ||
|
|
3f12464861 | ||
|
|
de12116417 | ||
|
|
28b987aec9 | ||
|
|
fb596f3bb7 | ||
|
|
84948b39df | ||
|
|
cf32ad7fe3 | ||
|
|
ad0e439604 | ||
|
|
5456583294 | ||
|
|
f1845cbee8 | ||
|
|
51cc37b69d | ||
|
|
ff1b10dca1 | ||
|
|
ebeb17e2e0 | ||
|
|
137de5b157 | ||
|
|
224328e404 | ||
|
|
1611b9ed80 | ||
|
|
8a4af56fc6 | ||
|
|
05cfe06607 | ||
|
|
b37a68cc8f | ||
|
|
a2688c872d | ||
|
|
5b50f99e1e | ||
|
|
b8994b6130 | ||
|
|
d7917c584a | ||
|
|
544d845585 | ||
|
|
a6efc2d1b8 | ||
|
|
3189772e07 | ||
|
|
08a638237d | ||
|
|
d8cdd1567f | ||
|
|
cbfb39d1be | ||
|
|
a4d64c7f49 | ||
|
|
1e7b6c029c | ||
|
|
3634d7e97a | ||
|
|
53d7efea76 | ||
|
|
002684d693 | ||
|
|
c038b8aa56 | ||
|
|
c5f17d45c1 | ||
|
|
31439046e0 | ||
|
|
11d0ebc841 | ||
|
|
cecfdbf72d | ||
|
|
f0f61f6d0d | ||
|
|
d68ff71004 | ||
|
|
591e85e928 | ||
|
|
c69ed6ea39 | ||
|
|
55a08fac68 | ||
|
|
2fc281d01f | ||
|
|
d326582cab | ||
|
|
f4c630abb3 | ||
|
|
c2cccfc585 | ||
|
|
3c5406b35c | ||
|
|
5e3225cc44 | ||
|
|
61118caa86 | ||
|
|
348be7ec60 | ||
|
|
3ff55e9680 | ||
|
|
cbb92dfaf0 | ||
|
|
019bfef899 | ||
|
|
0709249f4c | ||
|
|
89c9c66736 | ||
|
|
347ed3b93c | ||
|
|
5b73c3609b | ||
|
|
eebeb52b29 | ||
|
|
6ec6cfc767 | ||
|
|
44181ea836 | ||
|
|
c80c7bf999 | ||
|
|
ffa5ebf3f4 | ||
|
|
926c41bd29 | ||
|
|
1182301ca7 | ||
|
|
010fa0b331 | ||
|
|
4ca7d975af | ||
|
|
b774111020 | ||
|
|
78260d890b | ||
|
|
4b67fefe5a | ||
|
|
3a8012cbf2 | ||
|
|
a53cdc5b08 | ||
|
|
5d20c4fb35 | ||
|
|
a04549cc75 | ||
|
|
bc7535bc7f | ||
|
|
83357f047d | ||
|
|
b6699c3f07 | ||
|
|
016bc5ceb3 | ||
|
|
ed65f7dc34 | ||
|
|
4d50a2b4d6 | ||
|
|
7f4301668f | ||
|
|
29a1bb07e5 | ||
|
|
99e9a90081 | ||
|
|
715020e334 | ||
|
|
2952886010 | ||
|
|
613e7d2a65 | ||
|
|
6a2c471077 | ||
|
|
b79aa05e3b | ||
|
|
500b5a181d | ||
|
|
2b8a5406f9 | ||
|
|
2f35ae90fe | ||
|
|
0fca32a7aa | ||
|
|
02c9b66a6c | ||
|
|
539d4c1030 | ||
|
|
aa6d1a0c19 | ||
|
|
777c47acbe | ||
|
|
5776c3c4c6 | ||
|
|
0c3d346cb7 | ||
|
|
1c23bc5670 | ||
|
|
8ea975d070 | ||
|
|
6c69aa532e | ||
|
|
6264c9b2a9 | ||
|
|
fc92414273 | ||
|
|
53154d71c3 | ||
|
|
8cebec9802 | ||
|
|
0209d1605d | ||
|
|
c8a0d0aaf9 | ||
|
|
0cc46efa09 | ||
|
|
22c268e6c9 | ||
|
|
dd0514e2cc | ||
|
|
f6e7d01450 | ||
|
|
edc540211c | ||
|
|
2eed3a3cc8 | ||
|
|
1aa44cc797 | ||
|
|
37c8fd0eba | ||
|
|
786aa98da1 | ||
|
|
413e0853d7 | ||
|
|
8e4560c42f | ||
|
|
450ea83495 | ||
|
|
af8c1d81a3 | ||
|
|
b589427941 | ||
|
|
f0fa285f75 | ||
|
|
a0b5b07010 | ||
|
|
5c95c2ac23 | ||
|
|
454dbbc593 | ||
|
|
c1c6c0bf45 | ||
|
|
dff2922aa7 | ||
|
|
f253a058d3 | ||
|
|
b3c6a33185 | ||
|
|
31780d0e26 | ||
|
|
f489ab3147 | ||
|
|
29cf84c692 | ||
|
|
e454929558 | ||
|
|
105f6a6323 | ||
|
|
8845701719 | ||
|
|
b7683e3a5d | ||
|
|
0ee2166cc5 | ||
|
|
067707e367 | ||
|
|
8211a33c7f | ||
|
|
7441052be6 | ||
|
|
90ccf05f82 | ||
|
|
112161bd33 | ||
|
|
5ba4bf35c5 | ||
|
|
aa93b18c2c | ||
|
|
ba702545fc | ||
|
|
436369100d | ||
|
|
6535bd42e6 | ||
|
|
64cee65ebc | ||
|
|
ba544377fb | ||
|
|
5165148f72 | ||
|
|
8d970ca70b | ||
|
|
383b8b8ca9 | ||
|
|
5ce60a20f2 | ||
|
|
49131a7d94 | ||
|
|
d884c5bad1 | ||
|
|
86bdc0a3ee | ||
|
|
1a4e245f3e | ||
|
|
975efcbaee | ||
|
|
90e1b1fd7d | ||
|
|
86207c1960 | ||
|
|
9c62bca11a | ||
|
|
75d61b33bc | ||
|
|
3df760b83a | ||
|
|
e34aa5a3b3 | ||
|
|
985e4c4154 | ||
|
|
9598fa8759 | ||
|
|
ac8173515a | ||
|
|
944f858021 | ||
|
|
27a3d9f9aa | ||
|
|
48fc582f66 | ||
|
|
81de1028bc | ||
|
|
850815cb6e | ||
|
|
c4e7870ac1 | ||
|
|
4584eccea0 | ||
|
|
ed3ecd801e | ||
|
|
b166f13eb5 | ||
|
|
076944d920 | ||
|
|
09e20e0bd8 | ||
|
|
a717831da4 | ||
|
|
4dfc8f1f0b | ||
|
|
5b57fe0a1e | ||
|
|
89bbe14c50 | ||
|
|
6635b48cd1 | ||
|
|
675f605d44 | ||
|
|
6a983d4287 | ||
|
|
1a159e08af | ||
|
|
dd030860c4 | ||
|
|
2d09372434 | ||
|
|
67912e0032 | ||
|
|
f3dea9a595 | ||
|
|
fb7b393278 | ||
|
|
61e5ec4b1e | ||
|
|
6f344eab03 | ||
|
|
41eacc84a0 | ||
|
|
01b8b3c7d2 | ||
|
|
8fecd4b4f1 | ||
|
|
41fc5f2dbe | ||
|
|
bcfd3d68f5 | ||
|
|
d3a6461d71 | ||
|
|
17478fdede | ||
|
|
4dca00cec8 | ||
|
|
061d774b99 | ||
|
|
20469da285 | ||
|
|
e18e3eba76 | ||
|
|
de9fcfe348 | ||
|
|
7e5b06813d | ||
|
|
1892c8bf97 | ||
|
|
5e428e7d0d | ||
|
|
c9777d2659 | ||
|
|
3aedd213a9 | ||
|
|
e0c1ea9038 | ||
|
|
6f88c6a634 | ||
|
|
58aa573ac2 | ||
|
|
0ed110b969 | ||
|
|
b28dea4e10 | ||
|
|
21f0db692d | ||
|
|
4d4e08ec1c | ||
|
|
25074d6c22 | ||
|
|
0cfc80c4c3 | ||
|
|
b8bb15fb51 | ||
|
|
994df5a248 | ||
|
|
6657b9c73a | ||
|
|
ba0d04a986 | ||
|
|
3cb9eb30d3 | ||
|
|
e0b624e20e | ||
|
|
c27309edcb | ||
|
|
3207e61222 | ||
|
|
3671233089 | ||
|
|
3a828611e9 | ||
|
|
8bdcef40e4 | ||
|
|
91c9e62123 | ||
|
|
0e3453536e | ||
|
|
eaff5a1412 | ||
|
|
216e0d5b91 | ||
|
|
0965991600 | ||
|
|
74aa1a4378 | ||
|
|
5531192151 | ||
|
|
a620626a33 | ||
|
|
f13a71c66b | ||
|
|
3ef3e07a49 | ||
|
|
76fa8f1838 | ||
|
|
f2b139ed1f | ||
|
|
a6e7fcd140 | ||
|
|
76cf3fcb43 | ||
|
|
121dd39f9f | ||
|
|
a263253545 | ||
|
|
76d6ac4b06 | ||
|
|
60f20632e2 | ||
|
|
ae519a247f | ||
|
|
8de916bcee | ||
|
|
1631d5f9b9 | ||
|
|
98c82b899e | ||
|
|
6d3a1eac3b | ||
|
|
b8f702a0af | ||
|
|
43c9825c2a | ||
|
|
fbf6643607 | ||
|
|
3f36baa9f4 | ||
|
|
b0e69a0500 | ||
|
|
856640b54f | ||
|
|
76240b3a39 | ||
|
|
34b3c72e4e | ||
|
|
c264592d69 | ||
|
|
1bd06bd0c4 | ||
|
|
9540ccdf1f | ||
|
|
98bf13c36b | ||
|
|
7e76e56387 | ||
|
|
759d8ac6ee | ||
|
|
959e8dfe06 | ||
|
|
7f57b076a6 | ||
|
|
7144c4212a | ||
|
|
399a6f0bd1 | ||
|
|
3d47929968 | ||
|
|
03919683f9 | ||
|
|
5cda6c4582 | ||
|
|
83ed49149c | ||
|
|
67d990904e | ||
|
|
f3df90b2bb | ||
|
|
11e46bd7ae | ||
|
|
c09a0318b7 | ||
|
|
fe716ba686 | ||
|
|
9a97800813 | ||
|
|
e881f6175a | ||
|
|
36e77b1059 | ||
|
|
a9c32ace06 | ||
|
|
2c5d4daac5 | ||
|
|
b46343583c | ||
|
|
816c2b5a79 | ||
|
|
a78568b7e9 | ||
|
|
ee5b2a1e51 | ||
|
|
e4b21c74fc | ||
|
|
4edcb93dca | ||
|
|
15f80eea31 | ||
|
|
81cebb8b79 | ||
|
|
a4e75b3dfd | ||
|
|
cddaba8ede | ||
|
|
49c5f38d3d | ||
|
|
f8296228f1 | ||
|
|
930b0c4b8a | ||
|
|
3d153f7985 | ||
|
|
ee1d9ec019 | ||
|
|
614b448a67 | ||
|
|
a19c9f179d | ||
|
|
a784b943c1 | ||
|
|
d202709808 | ||
|
|
51ff0abb05 | ||
|
|
492a9e2415 | ||
|
|
7bf7333d68 | ||
|
|
c20276e4ae | ||
|
|
9ca7047d71 | ||
|
|
ba3b2f1538 | ||
|
|
b010b7c434 | ||
|
|
9dc17a2536 | ||
|
|
5950bf7943 | ||
|
|
4141c803d8 | ||
|
|
ba1ba5f0fb | ||
|
|
51aa7bd321 | ||
|
|
09b88a4a55 | ||
|
|
f3481ca28f | ||
|
|
ba30bad57b | ||
|
|
ffb1ac674c | ||
|
|
3be34589e8 | ||
|
|
d87e615209 | ||
|
|
92511cff48 | ||
|
|
7b82159865 | ||
|
|
52c11dce31 | ||
|
|
3ba0885a3e | ||
|
|
023c9d8dd5 | ||
|
|
4c97a04e2e | ||
|
|
fb05e1cdf6 | ||
|
|
ceb4678956 | ||
|
|
0cb8499b73 | ||
|
|
4d62ec32e0 | ||
|
|
75ef718820 | ||
|
|
c927df3fa1 | ||
|
|
4700aea951 | ||
|
|
60cdb821db | ||
|
|
0ef888cd3e | ||
|
|
26c777d516 | ||
|
|
9555339007 | ||
|
|
2fbe371f53 | ||
|
|
15181d7811 | ||
|
|
1edba2110f | ||
|
|
54d853ebc3 | ||
|
|
f5cda4cbb1 | ||
|
|
f9a6348a53 | ||
|
|
a7ffd9d19c | ||
|
|
29db322e8f | ||
|
|
25dc89eb9b | ||
|
|
716630c0eb | ||
|
|
4f59b6587f | ||
|
|
9befdf1d20 | ||
|
|
75d44c0452 | ||
|
|
a58a636838 | ||
|
|
9fdab72dd7 | ||
|
|
b2a97be7f4 | ||
|
|
6471c9f478 | ||
|
|
4a3dc3c0e3 | ||
|
|
a2318e86bd | ||
|
|
a9164153d1 | ||
|
|
8795d38906 | ||
|
|
8cd44e3630 | ||
|
|
07e970c7e6 | ||
|
|
d1aa0d38c5 | ||
|
|
9e4d0f0be2 | ||
|
|
cd7638980a | ||
|
|
f733a5ef0e | ||
|
|
5da98aa687 | ||
|
|
0b6f3c66cd | ||
|
|
a01d9ac558 | ||
|
|
e46691a0bc | ||
|
|
732a40e107 | ||
|
|
29da3ade3c | ||
|
|
de908d6319 | ||
|
|
9c9c98ad2e | ||
|
|
5e0e9fce5d | ||
|
|
53ec8809cf | ||
|
|
863779065e | ||
|
|
0b33dac310 | ||
|
|
e2bce37720 | ||
|
|
228b4e426b | ||
|
|
a4974de937 | ||
|
|
22f41c9b99 | ||
|
|
a123c552cd | ||
|
|
b2172f4f8e | ||
|
|
dc1d1b6934 | ||
|
|
67475a7ed7 | ||
|
|
362ab3e4f9 | ||
|
|
2aed84d16b | ||
|
|
5deea1c015 | ||
|
|
99516f81b1 | ||
|
|
d6091d5a39 | ||
|
|
5a47825ece | ||
|
|
16f66ae794 | ||
|
|
7ce1d9e9a6 | ||
|
|
a70183bc80 | ||
|
|
332737217a | ||
|
|
bcbe37b716 | ||
|
|
f393b7449d | ||
|
|
531308d929 | ||
|
|
74e564cd46 | ||
|
|
42eae426df | ||
|
|
246e09319c | ||
|
|
f7a3296d8c | ||
|
|
3e4585c8fd | ||
|
|
3e84b6e15f | ||
|
|
d505d1ef4a | ||
|
|
70b2ae3edf | ||
|
|
9e5dba197c | ||
|
|
a61114c38b | ||
|
|
db98bbc114 | ||
|
|
e42633140e | ||
|
|
bd50e31325 | ||
|
|
b2c0518e6a | ||
|
|
d82e2718e2 | ||
|
|
18e377b4ff | ||
|
|
043b2e9c2e | ||
|
|
1b593194be | ||
|
|
35208f368c | ||
|
|
c788e59365 | ||
|
|
cb08f4a6a3 | ||
|
|
adbc603d24 | ||
|
|
6f81892e6b | ||
|
|
448be74335 | ||
|
|
1a5a1a93f6 | ||
|
|
d917188a46 | ||
|
|
b4e88ccb28 | ||
|
|
d916ba1ba1 | ||
|
|
33af4421f2 | ||
|
|
95e362c6da | ||
|
|
c58d983e3b | ||
|
|
a84c9d1ed9 | ||
|
|
c6a27f0178 | ||
|
|
67b6f1ca88 | ||
|
|
a4ff392503 | ||
|
|
40f51f506c | ||
|
|
eeb821f707 | ||
|
|
47d5566646 | ||
|
|
90bdfd97a6 | ||
|
|
b9865f110e | ||
|
|
07ef612968 | ||
|
|
019fdc7850 | ||
|
|
7c382796be | ||
|
|
b6acb8d0de | ||
|
|
6adbcb9755 | ||
|
|
e968089485 | ||
|
|
c2cd422ac6 | ||
|
|
36ca4ba63d | ||
|
|
ed4a1d12b9 | ||
|
|
a0aa8b4b61 | ||
|
|
2c059d58d9 | ||
|
|
cd346d3e22 | ||
|
|
561d93aa00 | ||
|
|
ddac197404 | ||
|
|
0e8e6f19b2 | ||
|
|
c03e4f9bf0 | ||
|
|
c3bb1f8166 | ||
|
|
959a7201b8 | ||
|
|
6c73d01142 | ||
|
|
2932ad5677 | ||
|
|
036bbcc53f | ||
|
|
6384e46da3 | ||
|
|
6e2fcc44bd | ||
|
|
8721fc2d0b | ||
|
|
c1facbb681 | ||
|
|
f2c33fa6fd | ||
|
|
5aae935038 | ||
|
|
11503177d1 | ||
|
|
9ab899a660 | ||
|
|
8937a13e0c | ||
|
|
19017d4061 | ||
|
|
f53ac639c6 | ||
|
|
f71165b556 | ||
|
|
350a404cb8 | ||
|
|
827c55741b | ||
|
|
e0c8c08936 | ||
|
|
4e397d07ea | ||
|
|
9eb8794149 | ||
|
|
dc24110311 | ||
|
|
b3e72fc37f | ||
|
|
90076b96df | ||
|
|
9c339a7227 | ||
|
|
e7a8b47f1a | ||
|
|
7ac7a4bc37 | ||
|
|
a628901dda | ||
|
|
2ab75dee27 | ||
|
|
a3f586cdab | ||
|
|
fcfd87168a | ||
|
|
95a0e8ab31 | ||
|
|
0c9caf04de | ||
|
|
21e8bbf290 | ||
|
|
3b408d83fe | ||
|
|
8573552e8c | ||
|
|
c7235be6e3 | ||
|
|
1c17d91c53 | ||
|
|
a070f0dac5 | ||
|
|
b480283c56 | ||
|
|
f5ce5e1465 | ||
|
|
d7db77a0cb | ||
|
|
346ac30120 | ||
|
|
07bb51b6b4 | ||
|
|
bbab9b61dd | ||
|
|
82e8372f17 | ||
|
|
e67ed82877 | ||
|
|
15ac971681 | ||
|
|
0c21e13012 | ||
|
|
d5fd72fd0d | ||
|
|
c7474d077b | ||
|
|
826b52d26f | ||
|
|
8c5a2bd6bb | ||
|
|
25a58453ff | ||
|
|
00fe865dbe | ||
|
|
9e9bececa9 | ||
|
|
90890074b0 | ||
|
|
31676a3540 | ||
|
|
6b9e941ee3 | ||
|
|
802d7fa6d5 | ||
|
|
3798cb8182 | ||
|
|
2c5fadbce3 | ||
|
|
58ece83395 | ||
|
|
c75c096aa8 | ||
|
|
ab961dc8b0 | ||
|
|
6ad47e83b4 | ||
|
|
241520e66d | ||
|
|
a13c20f603 | ||
|
|
db6251ad54 | ||
|
|
51eb1b81f6 | ||
|
|
2adc42e43e | ||
|
|
52cc46a237 | ||
|
|
a07b4dc038 | ||
|
|
739a543ea8 | ||
|
|
01c76c6606 | ||
|
|
d32f888db1 | ||
|
|
f7914dbf9a | ||
|
|
3ff94a009b | ||
|
|
1aeb3da83f | ||
|
|
e8e5b46e2b | ||
|
|
c9d67d4ddf | ||
|
|
8de5b7f548 | ||
|
|
9ee0f7b7e0 | ||
|
|
f1fd4544a3 | ||
|
|
349eb12fd5 | ||
|
|
6a8f17de1e | ||
|
|
b1277b9902 | ||
|
|
ed3883d21b | ||
|
|
ea558241e0 | ||
|
|
61aa2134a4 | ||
|
|
4eb76e2397 | ||
|
|
68e575362f | ||
|
|
aab3bb04cf | ||
|
|
481d81cb76 | ||
|
|
c6cb42e4fb | ||
|
|
2d43a89488 | ||
|
|
302ea8c260 | ||
|
|
a1f3462bc0 | ||
|
|
7476f3ac3b | ||
|
|
68b64fb610 | ||
|
|
34b537ee66 | ||
|
|
7a5dbeb782 | ||
|
|
6c06918ede | ||
|
|
ee8f293701 | ||
|
|
3b4a0225e2 | ||
|
|
c8e1edaae5 | ||
|
|
63d3fc9106 | ||
|
|
5d7324e42d | ||
|
|
be7b4458f2 | ||
|
|
7304956e39 | ||
|
|
c510eec090 | ||
|
|
1b167a4343 | ||
|
|
9ab5170197 | ||
|
|
a00e414faf | ||
|
|
4c5e19b6c6 | ||
|
|
ed26604a71 | ||
|
|
0fbd4bf044 | ||
|
|
d719e60cb4 | ||
|
|
0cb9d93d0c | ||
|
|
f5826b8014 | ||
|
|
4a47f55639 | ||
|
|
b884556ed8 | ||
|
|
c06b0f3d5e | ||
|
|
68ea60683a | ||
|
|
6df8c74d5b | ||
|
|
877e8e970c | ||
|
|
d56349a2aa | ||
|
|
67c03ff185 | ||
|
|
35e00cc2d8 | ||
|
|
064f6cb6f2 | ||
|
|
20ab8b4b41 | ||
|
|
7395d852c3 | ||
|
|
3ebf898e88 | ||
|
|
a4c886e4c8 | ||
|
|
1291dfdead | ||
|
|
df278aff3e | ||
|
|
7c510d6f43 | ||
|
|
7bbcb2f690 | ||
|
|
ad2695b1b7 | ||
|
|
9cbf062a70 | ||
|
|
ec645d9017 | ||
|
|
0d894c9dbe | ||
|
|
c6709b89c4 | ||
|
|
061bebc0d8 | ||
|
|
802e1d692b | ||
|
|
dbf33b344c | ||
|
|
b40228a61d | ||
|
|
da5a0e8722 | ||
|
|
200fc02848 | ||
|
|
7096217d39 | ||
|
|
f1eb83a013 | ||
|
|
fec82dbc86 | ||
|
|
7b1b47a8e6 | ||
|
|
8b9afce53a | ||
|
|
137db78b46 | ||
|
|
a3344c8e5e | ||
|
|
c173d09c56 | ||
|
|
cb49a3cfa1 | ||
|
|
adab80053d | ||
|
|
f106fb85d4 | ||
|
|
5fa6d850a2 | ||
|
|
4adfe93cc5 | ||
|
|
d1593e6b15 | ||
|
|
a53cb070e3 | ||
|
|
452ae49db5 | ||
|
|
8c5c5b6517 | ||
|
|
6f44d4d247 | ||
|
|
d804f86b88 | ||
|
|
8dee9f844f | ||
|
|
963ba10012 | ||
|
|
07645deeb8 | ||
|
|
c52c82ffc1 | ||
|
|
d6a03a23a8 | ||
|
|
e347b0da2b | ||
|
|
52b1fbbd99 | ||
|
|
65613f23ba | ||
|
|
4f92a764f1 | ||
|
|
6a3a7f3076 | ||
|
|
63d3a9c5ea | ||
|
|
2c730f6fc2 | ||
|
|
df8dae1df4 | ||
|
|
2e9f1bf0e1 | ||
|
|
b1e0ccbaa8 | ||
|
|
bd2abcae37 | ||
|
|
f1fbd4c7d1 | ||
|
|
eed22ac4ac | ||
|
|
176a614899 | ||
|
|
f858d222f2 | ||
|
|
16094305bc | ||
|
|
fbf002bb88 | ||
|
|
9135fddb0e | ||
|
|
d88fcf73f1 | ||
|
|
a950f28762 | ||
|
|
c629204688 | ||
|
|
e22f63f231 | ||
|
|
d256b95768 | ||
|
|
f530138876 | ||
|
|
0a39d8f207 | ||
|
|
6852d1d8c3 | ||
|
|
a1ad253f17 | ||
|
|
ffa101872f | ||
|
|
4d24b4c466 | ||
|
|
474b8a9716 | ||
|
|
53261831f1 | ||
|
|
49e3c9d8e6 | ||
|
|
1715e4885a | ||
|
|
eff7cb41d1 | ||
|
|
7a6f825f0f | ||
|
|
29afd31dd1 | ||
|
|
d86b0f1f5f | ||
|
|
998ac55e19 | ||
|
|
d6f25d70f1 | ||
|
|
b02da8eb50 | ||
|
|
2f52a41054 | ||
|
|
99c675b2f7 | ||
|
|
72dce7685e | ||
|
|
ee8836c442 | ||
|
|
a1006c373d | ||
|
|
755c5b3330 | ||
|
|
ce6aa1e496 | ||
|
|
6c1fc273f3 | ||
|
|
aa8b03b415 | ||
|
|
96ec4abd07 | ||
|
|
70532b7d6b | ||
|
|
a4d729f31d | ||
|
|
fcbc5a3fdd | ||
|
|
8c0ceb17a2 | ||
|
|
c2012f9b82 | ||
|
|
aa2be094ae | ||
|
|
4d524040bc | ||
|
|
0fe120ba25 | ||
|
|
2e7aa150f7 | ||
|
|
04fac37311 | ||
|
|
bcb43bb358 | ||
|
|
89ec4332ec | ||
|
|
34736de4c0 | ||
|
|
5f50d597f2 | ||
|
|
df94f187b9 | ||
|
|
b92c0df834 | ||
|
|
d357be38b9 | ||
|
|
912e296070 | ||
|
|
35593b33f4 | ||
|
|
54f3d200d3 | ||
|
|
3f67e11fab | ||
|
|
c1de1a190d | ||
|
|
566dda07ba | ||
|
|
7a2f4cbfe8 | ||
|
|
5ac7bde7c9 | ||
|
|
9b4eab501a | ||
|
|
ca04d7a208 | ||
|
|
40a3c12305 | ||
|
|
3001a770ed | ||
|
|
2608383c5e | ||
|
|
3d6312e807 | ||
|
|
22cd982566 | ||
|
|
682b112abc | ||
|
|
e738280547 | ||
|
|
8265328def | ||
|
|
231b98a5e1 | ||
|
|
13e4670c29 | ||
|
|
d08b6b44ba | ||
|
|
09b6c2ef15 | ||
|
|
cc29c1204b | ||
|
|
94c00f3d4d | ||
|
|
3c2b73672e | ||
|
|
23acb0eeb2 | ||
|
|
bfa4b8c5ab | ||
|
|
ce75ca04b1 | ||
|
|
9dba0554a5 | ||
|
|
59947880f4 | ||
|
|
61094cf3dc | ||
|
|
6d00101e9d | ||
|
|
7a06050cd3 | ||
|
|
6f9afa68cd | ||
|
|
c038b90619 | ||
|
|
9c4fe78260 | ||
|
|
60dd08573d | ||
|
|
f5204c61fb | ||
|
|
9ddeefe39d | ||
|
|
0293371a1b | ||
|
|
dd31c6fcb0 | ||
|
|
6708df7bf0 | ||
|
|
6d9c46b811 | ||
|
|
af2c2823a7 | ||
|
|
b17ecb642b | ||
|
|
ba12070f7e | ||
|
|
29b9763d9f | ||
|
|
270da80bfa | ||
|
|
701d35d12f | ||
|
|
2238e8e477 | ||
|
|
4b08da5538 | ||
|
|
8a616a5a5f | ||
|
|
9455d430cb | ||
|
|
137023dd0c | ||
|
|
2a45408c4a | ||
|
|
9e201014f8 | ||
|
|
0c072a0b46 | ||
|
|
c11c64fbe0 | ||
|
|
f022c177db | ||
|
|
5f10073c95 | ||
|
|
33ac8b3139 | ||
|
|
244847591f | ||
|
|
5abe32d861 | ||
|
|
9194296de8 | ||
|
|
6273a91cb7 | ||
|
|
1ef7acfe92 | ||
|
|
a0156a926f | ||
|
|
96998822b5 | ||
|
|
8215e7a938 | ||
|
|
f7622f86d9 | ||
|
|
337e368239 | ||
|
|
64b6840d8d | ||
|
|
6e119bb02e | ||
|
|
2c2e46dbf5 | ||
|
|
770bc596e1 | ||
|
|
7534d131d6 | ||
|
|
7f3c9036ea | ||
|
|
725111f7cb | ||
|
|
bf3d6c0c9b | ||
|
|
b8e8ccdc79 | ||
|
|
6b80c20bdb | ||
|
|
eea374fd19 | ||
|
|
2e8879fa6e | ||
|
|
f5a07779dd | ||
|
|
c51f2d4238 | ||
|
|
45e2738585 | ||
|
|
b173acfc96 | ||
|
|
4ebb342fcd | ||
|
|
8e5ef8538a | ||
|
|
ff82bf3b07 | ||
|
|
5147c3c914 | ||
|
|
fbbbffc5a8 | ||
|
|
7cfe2a5e65 | ||
|
|
df2a346b30 | ||
|
|
270512ab12 | ||
|
|
eba63ef58b | ||
|
|
01a9792f05 | ||
|
|
0491e05833 | ||
|
|
9a1a5b8785 | ||
|
|
f3b656b246 | ||
|
|
53b38d37a9 | ||
|
|
8f2e4fdf86 | ||
|
|
11de71b04c | ||
|
|
19bd66fe74 | ||
|
|
45771abbd6 | ||
|
|
573969cd53 | ||
|
|
34be0bb1a5 | ||
|
|
2031eca588 | ||
|
|
6321c3a034 | ||
|
|
1fda6c4f8c | ||
|
|
11a4e58fc1 | ||
|
|
8a35fb3bea | ||
|
|
e85d67af9f | ||
|
|
b37fb16dcb | ||
|
|
1e1c5047f2 | ||
|
|
b2be099d16 | ||
|
|
28d8362934 | ||
|
|
01039d0bff | ||
|
|
c755c5fd8b | ||
|
|
5c8e9139d1 | ||
|
|
56defd9a98 | ||
|
|
8eb7217580 | ||
|
|
b2a9d36a7f | ||
|
|
04f15edb91 | ||
|
|
4e98a44593 | ||
|
|
1385ddbb14 | ||
|
|
7f0c65703a | ||
|
|
3a6dec8a05 | ||
|
|
209b12814f | ||
|
|
f920c5b590 | ||
|
|
05fc7018f8 | ||
|
|
a384002724 | ||
|
|
0260405c68 | ||
|
|
0537f9689c | ||
|
|
0c010a1517 | ||
|
|
0745d0892d | ||
|
|
5e64f8c44c | ||
|
|
4a5b8a5bee | ||
|
|
b3836ed3cb | ||
|
|
47738cbad7 | ||
|
|
0a882b6394 | ||
|
|
612a91110f | ||
|
|
2337eb5823 | ||
|
|
9aa9d70ddb | ||
|
|
231493c93c | ||
|
|
20a90e3a76 | ||
|
|
17a2994dbd | ||
|
|
b554eef43b | ||
|
|
0066590f98 | ||
|
|
165a28abae | ||
|
|
63999e5299 | ||
|
|
2802ec65c2 | ||
|
|
b3f56e8b38 | ||
|
|
5826e4f481 | ||
|
|
66ee67be03 | ||
|
|
a7ad2afa5e | ||
|
|
0f04379d9c | ||
|
|
7e4d335943 | ||
|
|
26c07054a1 | ||
|
|
843d9d0b39 | ||
|
|
4ac210c16a | ||
|
|
02703c74a4 | ||
|
|
ef428d5681 | ||
|
|
afbe674edb | ||
|
|
f42e6d24f2 | ||
|
|
449bd384ed | ||
|
|
3eeaab4bed | ||
|
|
57eb1d3250 | ||
|
|
b4f5e5c959 | ||
|
|
0d2848b3ba | ||
|
|
e84b663a93 | ||
|
|
d85185217b | ||
|
|
8f3bdc72d0 | ||
|
|
7d368fcbd8 | ||
|
|
2bd2cd9b78 | ||
|
|
c83101248a | ||
|
|
8d3509b937 | ||
|
|
1875e6db29 | ||
|
|
0962fbbf98 | ||
|
|
cbdac46d58 | ||
|
|
d2e0c81720 | ||
|
|
109080ae48 | ||
|
|
31efffbdba | ||
|
|
aaa5dc614f | ||
|
|
8be97c01d1 | ||
|
|
9e1a112336 | ||
|
|
4e28f13209 | ||
|
|
53a20bfd94 | ||
|
|
a28062338c | ||
|
|
1c2f1fe505 | ||
|
|
14365bd820 | ||
|
|
a51a97262d | ||
|
|
45d8574b93 | ||
|
|
417f8973ff | ||
|
|
b3b72cd92c | ||
|
|
bb00084863 | ||
|
|
db22e5faa6 | ||
|
|
55d03c3179 | ||
|
|
7e0a494f13 | ||
|
|
83e68987b3 | ||
|
|
53bb3bee34 | ||
|
|
c9edf6fe98 | ||
|
|
14cc0aaf7b | ||
|
|
2f3c39bc62 | ||
|
|
c5de8b2a27 | ||
|
|
a4022932ee | ||
|
|
0e3b6b70df | ||
|
|
c49a0aa08d | ||
|
|
5503b6a352 | ||
|
|
60021d9165 | ||
|
|
97b708910a | ||
|
|
2f6ebed1dc | ||
|
|
156f657209 | ||
|
|
816f74d1c7 | ||
|
|
ec14c80c7c | ||
|
|
543b4ecc13 | ||
|
|
1110cea007 | ||
|
|
0ed64ce310 | ||
|
|
0e441bc2be | ||
|
|
d996a9af2b | ||
|
|
ab6cf1b8a2 | ||
|
|
c25f2f1cbf | ||
|
|
62526671e9 | ||
|
|
88ebf53577 | ||
|
|
a41b0aade2 | ||
|
|
02c31fa461 | ||
|
|
5df70a9e21 | ||
|
|
cbe52c3166 | ||
|
|
7858cc03da | ||
|
|
bbada33271 | ||
|
|
f5d51a9362 | ||
|
|
0fc6b2c9e2 | ||
|
|
7a5ad5d5a1 | ||
|
|
44eff497e8 | ||
|
|
8b452002e8 | ||
|
|
e442c36252 | ||
|
|
50ec3951dc | ||
|
|
11cd239707 | ||
|
|
f6098f2dda | ||
|
|
857c6092b6 | ||
|
|
eef468e330 | ||
|
|
4bd46774bb | ||
|
|
283c3e2437 | ||
|
|
306aae6cee | ||
|
|
edb0600583 | ||
|
|
ac86d923fc | ||
|
|
fbd63d0784 | ||
|
|
78ebeee2c4 | ||
|
|
55805fd2d0 | ||
|
|
7ebd220a8f | ||
|
|
e8a1f6d190 | ||
|
|
034bae10fc | ||
|
|
a7c924c041 | ||
|
|
27b762af60 | ||
|
|
b764ab9537 | ||
|
|
a761b89d2f | ||
|
|
a136862afe | ||
|
|
f0747cd950 | ||
|
|
21ac2b964b | ||
|
|
79e1dd65ab | ||
|
|
13e393607b | ||
|
|
052ec89927 | ||
|
|
2073d95fb4 | ||
|
|
cbed917fee | ||
|
|
dffdb56b7f | ||
|
|
a78c0632ed | ||
|
|
8fa6a40be2 | ||
|
|
4b5598682a | ||
|
|
e9f5428d3a | ||
|
|
34f0b26424 | ||
|
|
cd27b13b1d | ||
|
|
3ecbd099eb | ||
|
|
e43d03e30e | ||
|
|
d1acb9b44f | ||
|
|
acd1c4b5af | ||
|
|
40808cedc1 | ||
|
|
51054a1b39 | ||
|
|
e774a3299e | ||
|
|
99febc8b9a | ||
|
|
1ce8efbdda | ||
|
|
0b0a60d861 | ||
|
|
9e5b378081 | ||
|
|
7ed876533a | ||
|
|
b2d91a6913 | ||
|
|
ce074604c4 | ||
|
|
19ac190252 | ||
|
|
02c5ddf91e | ||
|
|
1aaeaf8a3d | ||
|
|
5d6c4985d1 | ||
|
|
b615ad90c8 | ||
|
|
c7aaf3918d | ||
|
|
d51204f1b1 | ||
|
|
b3f6325988 | ||
|
|
3129acbd83 | ||
|
|
12f89d32b5 | ||
|
|
1d42741a19 | ||
|
|
88737991d2 | ||
|
|
75c00536ba | ||
|
|
63d740752f | ||
|
|
6e04afb8c5 | ||
|
|
165fca51e0 | ||
|
|
db6b4e3791 | ||
|
|
20a85e9f69 | ||
|
|
2a6144a1b6 | ||
|
|
f8bc3e1bd8 | ||
|
|
5b737a0731 | ||
|
|
6e0ef10915 | ||
|
|
7017605dce | ||
|
|
b29228836a | ||
|
|
188b05792f | ||
|
|
575901e537 | ||
|
|
2333d65880 | ||
|
|
ffd1df0579 | ||
|
|
a2c32e2d7f | ||
|
|
80b168a5a9 | ||
|
|
9426364be9 | ||
|
|
429168e7ee | ||
|
|
499fca2db3 | ||
|
|
a28a5d9c62 | ||
|
|
3f791ca818 | ||
|
|
0ebfcc8f92 | ||
|
|
c61f571ce0 | ||
|
|
60192e96b8 | ||
|
|
85991994df | ||
|
|
b325518f45 | ||
|
|
b172dec864 | ||
|
|
61391e2314 | ||
|
|
4b23506594 | ||
|
|
82d3dda8a1 | ||
|
|
fe8bf9560d | ||
|
|
e4c9b85e65 | ||
|
|
447aa49007 | ||
|
|
fe977f7512 | ||
|
|
e476f94212 | ||
|
|
bbbd67108f | ||
|
|
7f246621b5 | ||
|
|
b67d988915 | ||
|
|
851e31ff07 | ||
|
|
decc9ffc18 | ||
|
|
3f4657d131 | ||
|
|
67ffa18cce | ||
|
|
788e67e227 | ||
|
|
c50226594d | ||
|
|
51ff6bde38 | ||
|
|
28e4fe34e4 | ||
|
|
c800a070b5 | ||
|
|
53d8996764 | ||
|
|
32b1843ec6 | ||
|
|
8712009778 | ||
|
|
b8994f44e7 | ||
|
|
f468e3824a | ||
|
|
ea1b02db6a | ||
|
|
2c4b354d32 | ||
|
|
25a66ee3cb | ||
|
|
0978dec131 | ||
|
|
91b17fbad4 | ||
|
|
ce92b6eb9c | ||
|
|
7abbffc3fb | ||
|
|
9dd8405341 | ||
|
|
46a643763d | ||
|
|
92c4468572 | ||
|
|
10cde5010d | ||
|
|
c4cd925cc0 | ||
|
|
f210eb7b89 | ||
|
|
734540f887 | ||
|
|
804515425a | ||
|
|
81a86fcf17 | ||
|
|
a534bb09d3 | ||
|
|
b6995add5c | ||
|
|
8ccd06c66c | ||
|
|
fe86616c72 | ||
|
|
ba2ba27008 | ||
|
|
f795123c4a | ||
|
|
c596c795bf | ||
|
|
3f19bbf4e3 | ||
|
|
b874ce4dc2 | ||
|
|
c6c2e3135d | ||
|
|
4b26fe30de | ||
|
|
4a8224b598 | ||
|
|
8afca8d9c6 | ||
|
|
35e8510e60 | ||
|
|
8b15c74018 | ||
|
|
3afa6cf866 | ||
|
|
e19e549041 | ||
|
|
d7561ac576 | ||
|
|
fbeaa3c47d | ||
|
|
ee2262b8d7 | ||
|
|
b0ac0a8ef8 | ||
|
|
0f4499360e | ||
|
|
7dc17a6cf0 | ||
|
|
b6223d2f70 | ||
|
|
256b5d5877 | ||
|
|
5d0d60e2f5 | ||
|
|
57ee007035 | ||
|
|
82e8cb403a | ||
|
|
abee01c6f8 | ||
|
|
2c288b2a7e | ||
|
|
831721ef49 | ||
|
|
0ee883650d | ||
|
|
70cf309517 | ||
|
|
8b5bf52ac2 | ||
|
|
73a9485081 | ||
|
|
d37a65bc81 | ||
|
|
34c7ff6dc9 | ||
|
|
647907918d | ||
|
|
cee73df3bd | ||
|
|
07481951f9 | ||
|
|
f15c448a72 | ||
|
|
fcb41c0ee8 | ||
|
|
9b62318311 | ||
|
|
5f1841cdca | ||
|
|
4b45051902 | ||
|
|
9e5790ce21 | ||
|
|
fce8c6cc53 | ||
|
|
0ff469d38d | ||
|
|
05338b58ce | ||
|
|
081057c3ff | ||
|
|
94c1672ef0 | ||
|
|
405d9761a5 | ||
|
|
4c3a2d64e4 | ||
|
|
98a2fd32a0 | ||
|
|
7bdeeb64ac | ||
|
|
43b45a42fd | ||
|
|
9af1bfb3d5 | ||
|
|
aed14edd12 | ||
|
|
14a948e6ad | ||
|
|
af2fcf3a65 | ||
|
|
4a676ac4f8 | ||
|
|
37e27219f2 | ||
|
|
d2284ab5d1 | ||
|
|
78e91e7574 | ||
|
|
e1cc0671ac | ||
|
|
c1a8a5de13 | ||
|
|
e3d0e0a792 | ||
|
|
7c7667b86b | ||
|
|
38be5db93b | ||
|
|
6a50d0a422 | ||
|
|
7ab2d30349 | ||
|
|
d753c3f582 | ||
|
|
1897c89302 | ||
|
|
3cc54008eb | ||
|
|
ff8bcccdd4 | ||
|
|
a93b01be57 | ||
|
|
04b304d346 | ||
|
|
6c61726b2a | ||
|
|
cd202fe2f9 | ||
|
|
69af4faec1 | ||
|
|
df9e0bf507 | ||
|
|
879b19801a | ||
|
|
6ec8e63af6 | ||
|
|
465b9f6b26 | ||
|
|
0c9c87a76e | ||
|
|
a7a90b2f00 | ||
|
|
4d6e7733fa | ||
|
|
2deadf1672 | ||
|
|
9ea862e0b3 | ||
|
|
11c9b7cfeb | ||
|
|
b08868c48a | ||
|
|
9ca46ff609 | ||
|
|
800e400de5 | ||
|
|
05886a6f77 | ||
|
|
667aef4c6a | ||
|
|
49e179cc52 | ||
|
|
aa4ce7315f | ||
|
|
c741b83762 | ||
|
|
64387788a9 | ||
|
|
480506bd49 | ||
|
|
0d5ea7613e | ||
|
|
beb056b303 | ||
|
|
4e321ffaff | ||
|
|
6ededa42db | ||
|
|
36d16f8ee0 | ||
|
|
ab781a0cb6 | ||
|
|
19c2987eb6 | ||
|
|
b09af97686 | ||
|
|
a7b1c7732f | ||
|
|
abc64463af | ||
|
|
2e7245f5a3 | ||
|
|
f76b062e16 | ||
|
|
cc1717eaa4 | ||
|
|
c5156d952e | ||
|
|
0b2d0d7d13 | ||
|
|
b732a8cf5f | ||
|
|
a7dc451ebe | ||
|
|
87357fc0b8 | ||
|
|
a2c96d888d | ||
|
|
9a6c6b99bf | ||
|
|
033c79dff1 | ||
|
|
b362536275 | ||
|
|
aa16a28631 | ||
|
|
2757c67da2 | ||
|
|
3d5fd31280 | ||
|
|
c7199e62f1 | ||
|
|
0b3fc6e63b | ||
|
|
c2db9cfb52 | ||
|
|
6bc8e6b898 | ||
|
|
9edf4e8157 | ||
|
|
965a1cb92e | ||
|
|
e9ad6665a5 | ||
|
|
b5855b2f32 | ||
|
|
a0bee97e55 | ||
|
|
e7076c5a80 | ||
|
|
ff22e913a3 | ||
|
|
04d0d0accf | ||
|
|
00df894701 | ||
|
|
630e4a6e59 | ||
|
|
bf2336f478 | ||
|
|
384dba6edb | ||
|
|
2c45bf2bc9 | ||
|
|
836ec0c764 | ||
|
|
5e72fb063a | ||
|
|
2dc08d5f5d | ||
|
|
00b8abee61 | ||
|
|
7efebab9fd | ||
|
|
a74286d636 | ||
|
|
254cfe878e | ||
|
|
ed824195a1 | ||
|
|
22c3600e4c | ||
|
|
49f386578e | ||
|
|
7c671508bd | ||
|
|
d3fdc27aa8 | ||
|
|
40e950aed6 | ||
|
|
987bebaf8c | ||
|
|
65f0efe198 | ||
|
|
e77d8f2ecd | ||
|
|
f68854b4c3 | ||
|
|
1cfd258ed6 | ||
|
|
04d7d51ea2 | ||
|
|
2906dc8601 | ||
|
|
c8d5c71af5 | ||
|
|
ff990440ee | ||
|
|
0e304b7f41 | ||
|
|
fbe6ba81e9 | ||
|
|
2b85e23d2e | ||
|
|
026bb0b96a | ||
|
|
6424498226 | ||
|
|
3ed449e94a | ||
|
|
4f1c33b430 | ||
|
|
1334462ab3 | ||
|
|
e62991a07c | ||
|
|
52272327f3 | ||
|
|
1bf955920a | ||
|
|
51d28013db | ||
|
|
8861ba355d | ||
|
|
9e88c82703 | ||
|
|
9d2f51c086 | ||
|
|
ad0db060b1 | ||
|
|
3547478fc8 | ||
|
|
29dc350813 | ||
|
|
bc3cae7e7d | ||
|
|
37942fab51 | ||
|
|
36521f0150 | ||
|
|
4bb61becbb | ||
|
|
b392e52050 | ||
|
|
0858b71b41 | ||
|
|
d9bfe4f97c | ||
|
|
dc0ed30cfe | ||
|
|
e248596bac | ||
|
|
6049399baf | ||
|
|
f763e0b5ae | ||
|
|
eb3eab20a8 | ||
|
|
4848cbf1cf | ||
|
|
9f2027e56d | ||
|
|
e1d51de41f | ||
|
|
81ee80ab88 | ||
|
|
7d727231b7 | ||
|
|
69740c2b3f | ||
|
|
119d1a1dd4 | ||
|
|
70f34a5841 | ||
|
|
c2e40d0f9a | ||
|
|
0abfd60604 | ||
|
|
e5dbccc182 | ||
|
|
f8fa22d826 | ||
|
|
c393222280 | ||
|
|
60fd574cdf | ||
|
|
73705abc34 | ||
|
|
12bdb64375 | ||
|
|
7bdf8eed69 | ||
|
|
48c832b6b7 | ||
|
|
f3e427f6f9 | ||
|
|
8bb826ee53 | ||
|
|
5d1430f390 | ||
|
|
45d10efc35 | ||
|
|
db3cb0e97a | ||
|
|
41a15c4f0f | ||
|
|
fea4280a8b | ||
|
|
e852b8533f | ||
|
|
20a3439ea9 | ||
|
|
a273a2824c | ||
|
|
24c97c819d | ||
|
|
42ba5d2329 | ||
|
|
c3e6402857 | ||
|
|
0821bcd4de | ||
|
|
4a6a2032ed | ||
|
|
c01d2b974e | ||
|
|
b0ef321cc8 | ||
|
|
7a8c728860 | ||
|
|
6141b86a49 | ||
|
|
23fadaa084 | ||
|
|
e27a259696 | ||
|
|
41e455bfc4 | ||
|
|
59b6836ab2 | ||
|
|
9fc9b55237 | ||
|
|
689c6f2542 | ||
|
|
f4bfd357e5 | ||
|
|
130db968b8 | ||
|
|
8d274837e5 | ||
|
|
5855038049 | ||
|
|
d18685d959 | ||
|
|
9f6715d4bb | ||
|
|
ab185b6038 | ||
|
|
1642000707 | ||
|
|
f7f2125522 | ||
|
|
2b61034b0b | ||
|
|
80c808b90b | ||
|
|
af1048c25c | ||
|
|
ecc5ef8793 | ||
|
|
c9a112f540 | ||
|
|
5286db697f | ||
|
|
f69a8aebab | ||
|
|
9d10b15ef9 | ||
|
|
da30c74a27 | ||
|
|
67ea999d4a | ||
|
|
e1892f2370 | ||
|
|
fe28866d71 | ||
|
|
de4ab1e629 | ||
|
|
216ddfaf6b | ||
|
|
8aa36bcac9 | ||
|
|
485e30dbe1 | ||
|
|
877dbcb8a0 | ||
|
|
62d27939c2 | ||
|
|
8c3c570134 | ||
|
|
97a1630e81 | ||
|
|
bf746f0f46 | ||
|
|
a229e3038e | ||
|
|
4aca9297dc | ||
|
|
b2c5960935 | ||
|
|
fbdce13e5a | ||
|
|
e532a6c449 | ||
|
|
14bcdb087f | ||
|
|
b7efa56a4a | ||
|
|
8359421d90 | ||
|
|
efde5230f1 | ||
|
|
f5ffad9d1d | ||
|
|
57a68b2129 | ||
|
|
bac252a5e3 | ||
|
|
a963395a7b | ||
|
|
d8863f0bdb | ||
|
|
addb6e16a8 | ||
|
|
4d27c4c960 | ||
|
|
ed65fab910 | ||
|
|
90cc40911b | ||
|
|
a7201e9a1b | ||
|
|
fcd5cca418 | ||
|
|
9222bc6b4e | ||
|
|
e6d27baf52 | ||
|
|
e7e1150706 | ||
|
|
5d727078ac | ||
|
|
108159ffcc | ||
|
|
c4d423511a | ||
|
|
b15a93a9c5 | ||
|
|
d9248e5780 | ||
|
|
0b52f89b81 | ||
|
|
7de4b5b060 | ||
|
|
02a00bb054 | ||
|
|
3b4de6e4cc | ||
|
|
bdbc9b4d1a | ||
|
|
09ef94d2c9 | ||
|
|
3ffb8d42bc | ||
|
|
25866e3982 | ||
|
|
3b3df98ca6 | ||
|
|
2e4a99f38b | ||
|
|
e90faddaf8 | ||
|
|
f1ce306f30 | ||
|
|
37b11ca78e | ||
|
|
a17af9e277 | ||
|
|
6951c23afd | ||
|
|
de421076a5 | ||
|
|
bd16cd6bcc | ||
|
|
0c51600203 | ||
|
|
9850f7f6b2 | ||
|
|
131e064e4a | ||
|
|
556b8f3f77 | ||
|
|
045d3285e2 | ||
|
|
d1df5b4339 | ||
|
|
25558bf743 | ||
|
|
713147109c | ||
|
|
76ef6ac956 | ||
|
|
a842df6659 | ||
|
|
c05a7f5dfd | ||
|
|
627bd6709c | ||
|
|
fbf218b8c3 | ||
|
|
3c97bd833b | ||
|
|
abbc186bd2 | ||
|
|
de6859e442 | ||
|
|
5e8904f289 | ||
|
|
0c0788ba0a | ||
|
|
905fd45b36 | ||
|
|
c162b132eb | ||
|
|
b4e0ce5165 | ||
|
|
17f0e916db | ||
|
|
3dfa23cbc4 | ||
|
|
a37e22d866 | ||
|
|
41c70d47d7 | ||
|
|
a0e7c8eede | ||
|
|
a8e00b17ce | ||
|
|
3e66ee9f01 | ||
|
|
5b40d7dd97 | ||
|
|
8f284faaec | ||
|
|
f774accdbf | ||
|
|
8544a80776 | ||
|
|
7c69478064 | ||
|
|
1862dae862 | ||
|
|
b7b46c9a87 | ||
|
|
e6e1f4cb5e | ||
|
|
5073ff0346 | ||
|
|
fc7fc5678f | ||
|
|
7a3240e319 | ||
|
|
5022e4ecdf | ||
|
|
30b415b076 | ||
|
|
914c2a28c0 | ||
|
|
ea681ba872 | ||
|
|
bc3e7fabe7 | ||
|
|
d675c74d14 | ||
|
|
59c7029862 | ||
|
|
1582a4073e | ||
|
|
401ee37a3e | ||
|
|
cb26a20cb1 | ||
|
|
82c4674e47 | ||
|
|
9d2996b82f | ||
|
|
3fee255102 | ||
|
|
16df5f066a | ||
|
|
959f9b1158 | ||
|
|
376729e130 | ||
|
|
00dd8f6d6e | ||
|
|
5dd87981bf | ||
|
|
37dccd8ff2 | ||
|
|
826a42a088 | ||
|
|
19f39703f7 | ||
|
|
151368ccba | ||
|
|
4451c2558e | ||
|
|
4a64f3d665 | ||
|
|
5fee606442 | ||
|
|
521aaafc6a | ||
|
|
78df5a2f1e | ||
|
|
6c9f57d629 | ||
|
|
382342ce1d | ||
|
|
69c922f5d2 | ||
|
|
10c8505734 | ||
|
|
10f92aac33 | ||
|
|
68d9e764cb | ||
|
|
8de69cf2c6 | ||
|
|
a2ac429da2 | ||
|
|
ffd0f93f14 | ||
|
|
1a4b8e7cee | ||
|
|
03386677ed | ||
|
|
559f90ff60 | ||
|
|
c284f20f00 | ||
|
|
58ae65cd1a | ||
|
|
5b0f1f7d13 | ||
|
|
785e827323 | ||
|
|
2f605e8d24 | ||
|
|
5e2216bfa1 | ||
|
|
175ac6811a | ||
|
|
07d488daf6 | ||
|
|
d1360f6ecc | ||
|
|
c38ff58b6b | ||
|
|
c29ef588dc | ||
|
|
968c31bd84 | ||
|
|
c743966156 | ||
|
|
bb09fd2bb6 | ||
|
|
280eb33b59 | ||
|
|
f79110c633 | ||
|
|
6ef2ff62fc | ||
|
|
980aea7860 | ||
|
|
bd9327baa9 | ||
|
|
6f9bafafa3 | ||
|
|
422a4a33a5 | ||
|
|
58606421ae | ||
|
|
d813ff2ac1 | ||
|
|
36734b2bab | ||
|
|
c85c5c408a | ||
|
|
2c1677d703 | ||
|
|
72348cbb8d | ||
|
|
c431798e82 | ||
|
|
fb80794568 | ||
|
|
4ec3d785e5 | ||
|
|
5d7c222db8 | ||
|
|
d993addbed | ||
|
|
476b6ab541 | ||
|
|
16760a3089 | ||
|
|
2b247cf81f | ||
|
|
746fc2526f | ||
|
|
a8c65b400c | ||
|
|
526975906b | ||
|
|
14fa6ad9f9 | ||
|
|
e544b0dc2a | ||
|
|
2549564009 | ||
|
|
bb1a915c24 | ||
|
|
b94f886b22 | ||
|
|
6ef7b78e7c | ||
|
|
e08aad1d14 | ||
|
|
b5a93e2250 | ||
|
|
c128bb0fa2 | ||
|
|
30fe028f07 | ||
|
|
b88606c28e | ||
|
|
2ea6abf6e5 | ||
|
|
f8c469de73 | ||
|
|
42096e05f7 | ||
|
|
7d15a556f8 | ||
|
|
5b17246324 | ||
|
|
c77094415f | ||
|
|
34413fca84 | ||
|
|
ec38ddc765 | ||
|
|
8aae01e223 | ||
|
|
00555c2f2f | ||
|
|
07d80f6f35 | ||
|
|
4591850561 | ||
|
|
a25aca2943 | ||
|
|
48c524827b | ||
|
|
ebaec63e3e | ||
|
|
14e21f863a | ||
|
|
f10725a6e1 | ||
|
|
0f71b77d5c | ||
|
|
d6bb6a88be | ||
|
|
3205db2bfe | ||
|
|
6f86850eec | ||
|
|
16ab8a93bc | ||
|
|
c88f8f76b5 | ||
|
|
fbf96849e9 | ||
|
|
d70e2507f8 | ||
|
|
2fcf435d73 | ||
|
|
da2ee71de5 | ||
|
|
8611934352 | ||
|
|
01e94efd46 | ||
|
|
33c3ecf741 | ||
|
|
5bd4c26057 | ||
|
|
4aa5889e1a | ||
|
|
bafcc7e060 | ||
|
|
afe67fb28e | ||
|
|
f744f92adb | ||
|
|
75f134c077 | ||
|
|
d8d25c9603 | ||
|
|
f1bdf1d518 | ||
|
|
d58caee734 | ||
|
|
e39c2548f5 | ||
|
|
8169dd73f9 | ||
|
|
765e231a7c | ||
|
|
89c53672c2 | ||
|
|
64ba6cf222 | ||
|
|
210a4f78ae | ||
|
|
334ef04949 | ||
|
|
859ceeeb51 | ||
|
|
22edcae7fa | ||
|
|
d0590fe6b2 | ||
|
|
2232b10f5a | ||
|
|
e34794dd1b | ||
|
|
0210065bbd | ||
|
|
7f5b4dd1e8 | ||
|
|
5906e8d5fe | ||
|
|
5545607c4f | ||
|
|
6ac1571296 | ||
|
|
ca74b76f3e | ||
|
|
2b6174c478 | ||
|
|
2b002273f3 | ||
|
|
15d155e45a | ||
|
|
b0841348b6 | ||
|
|
090e81d4aa | ||
|
|
e4528e48e3 | ||
|
|
235dee1421 | ||
|
|
d28f7bc74d | ||
|
|
4083a229b4 | ||
|
|
a2400fcab8 | ||
|
|
dc56eb5079 | ||
|
|
637ff35ef6 | ||
|
|
ace3ebd661 | ||
|
|
eea674567c | ||
|
|
c39c32dd65 | ||
|
|
0efea28dcb | ||
|
|
4bab9b763d | ||
|
|
70696f4525 | ||
|
|
80bbc9ceaf | ||
|
|
51ce5230cd | ||
|
|
b6d8ba11e9 | ||
|
|
e2f2a9af2c | ||
|
|
28a8003467 | ||
|
|
563cd0f2b0 | ||
|
|
3ac0f28837 | ||
|
|
47c1735acd | ||
|
|
7d3932e8cf | ||
|
|
8a60547896 | ||
|
|
d459e39012 | ||
|
|
340f5856ec | ||
|
|
df11e1e921 | ||
|
|
6a6592962c | ||
|
|
1275c4569e | ||
|
|
afbe74d386 | ||
|
|
f18ea6cae9 | ||
|
|
c9ff40cecd | ||
|
|
9088d5f24f | ||
|
|
cf9056cfda | ||
|
|
f7fc4ca1dd | ||
|
|
132fc53223 | ||
|
|
b3b6720944 | ||
|
|
9f6ea7163b | ||
|
|
385c8e89f4 | ||
|
|
263e3151e2 | ||
|
|
9081980565 | ||
|
|
393b704d28 | ||
|
|
bef26f1158 | ||
|
|
bc1ca8605c | ||
|
|
ad5003409d | ||
|
|
057cfaf2f8 | ||
|
|
914d36ba19 | ||
|
|
31c2ac1cdc | ||
|
|
6bca8e3886 | ||
|
|
63ba7e293f | ||
|
|
31e9b9b2e9 | ||
|
|
7997b13aa3 | ||
|
|
a2eb9688a4 | ||
|
|
af2bf07404 | ||
|
|
8c5dfa4c99 | ||
|
|
8d9fb0f04a | ||
|
|
15fd2de37c | ||
|
|
1a83c37294 | ||
|
|
674ee8b72d | ||
|
|
1809e858bb | ||
|
|
2bbc970e10 | ||
|
|
da8348e938 | ||
|
|
ef16f45081 | ||
|
|
4d692e1ba0 | ||
|
|
6577e16920 | ||
|
|
3fc378aa0b | ||
|
|
f2bfbcef76 | ||
|
|
6713a4835f | ||
|
|
46ceb15c39 | ||
|
|
109d3123c3 | ||
|
|
63077bd40c | ||
|
|
df364f1b00 | ||
|
|
bc767216d9 | ||
|
|
cacd830f02 | ||
|
|
eda52e175a | ||
|
|
665560e9a4 | ||
|
|
c4fc8b5bf4 | ||
|
|
9c52d2cc75 | ||
|
|
0f814687b9 | ||
|
|
f0eae953e2 | ||
|
|
298a2f9e58 | ||
|
|
ac0d0a5ecd | ||
|
|
f15390bdb4 | ||
|
|
d095b68d63 | ||
|
|
508999fa7d | ||
|
|
210a21bc8d | ||
|
|
678c1e025b | ||
|
|
1ab61a9179 | ||
|
|
d6dda126b7 | ||
|
|
7771b6c5b5 | ||
|
|
4843acc868 | ||
|
|
9e0aad9fd6 | ||
|
|
1c7a0e2856 | ||
|
|
abd23881c1 | ||
|
|
d1739eb2d6 | ||
|
|
2faa930bb0 | ||
|
|
e14f4aab0a | ||
|
|
c842261b1b | ||
|
|
df368ecce4 | ||
|
|
1e6bccc240 | ||
|
|
d3adc3d3ed | ||
|
|
10e7d6d526 | ||
|
|
8d472bdd84 | ||
|
|
430d7afd80 | ||
|
|
ca982e4870 | ||
|
|
d5f686d808 | ||
|
|
08e1cbc62c | ||
|
|
b6b4fdc9e2 | ||
|
|
dd55880644 | ||
|
|
bd1640bb01 | ||
|
|
081991ac01 | ||
|
|
8a85c341fe | ||
|
|
bcfea9fb25 | ||
|
|
f3f52d7f45 | ||
|
|
8845420f4e | ||
|
|
d735c64905 | ||
|
|
955d465c2c | ||
|
|
8c521c7a34 | ||
|
|
77475142ec | ||
|
|
90fac84066 | ||
|
|
64674bcc8c | ||
|
|
1dc2d655ad | ||
|
|
863d2b196f | ||
|
|
c57bc2dc51 | ||
|
|
6c0dcdc211 | ||
|
|
28ded31b97 | ||
|
|
0fc07a0f9c | ||
|
|
823a67b0a9 | ||
|
|
60a938c6bc | ||
|
|
3a87a9b9db | ||
|
|
ae44fc1ec4 | ||
|
|
28722cf212 | ||
|
|
2749276b95 | ||
|
|
b6a5fdb8a7 | ||
|
|
bf5773fa2d | ||
|
|
ecf139917d | ||
|
|
ab23d5ffda | ||
|
|
1a979201d5 | ||
|
|
216659eb87 | ||
|
|
5d6383c83f | ||
|
|
e07d3a021d | ||
|
|
e1a27eb34a | ||
|
|
6446e0c3c8 | ||
|
|
beedea2fef | ||
|
|
34be34fdd0 | ||
|
|
0020502a07 | ||
|
|
d530017c00 | ||
|
|
fd9fa844e2 | ||
|
|
c2dc3ee8d9 | ||
|
|
482c2acf02 | ||
|
|
a481b4b52c | ||
|
|
a87228031f | ||
|
|
b79c82eaab | ||
|
|
69d1d5e6ce | ||
|
|
c86f2054f3 | ||
|
|
5c98b2caf5 | ||
|
|
5148710994 | ||
|
|
ea77fc3380 | ||
|
|
46ef873f0b | ||
|
|
2d2a5ba32a | ||
|
|
2bd4e3379f | ||
|
|
032c3ecb18 | ||
|
|
e703b46598 | ||
|
|
0fa793bc7b | ||
|
|
ba5477eb1a | ||
|
|
5c42f62e48 | ||
|
|
a08e05d1be | ||
|
|
d342ec3335 | ||
|
|
3d8b8860cf | ||
|
|
a0b5ebeac6 | ||
|
|
8ee18dd520 | ||
|
|
f46e76ef50 | ||
|
|
e725a9660b | ||
|
|
d7eed1929b | ||
|
|
4acc3e907d | ||
|
|
9449e38504 | ||
|
|
b8b0b5d856 | ||
|
|
ec5d8a54e9 | ||
|
|
18a6333180 | ||
|
|
7f663ce430 | ||
|
|
e042540f6b | ||
|
|
4e8172d6da | ||
|
|
875a644a90 | ||
|
|
ec37635c94 | ||
|
|
fd836aeee0 | ||
|
|
560f7abb7e | ||
|
|
b6358c89a1 | ||
|
|
5d735465d1 | ||
|
|
9e051bac13 | ||
|
|
30fbcaa213 | ||
|
|
93825dddad | ||
|
|
a8aa764d3c | ||
|
|
e7716b7a19 | ||
|
|
a4e3150f00 | ||
|
|
edec614efd | ||
|
|
2457c19df1 | ||
|
|
5fa5eb71a4 | ||
|
|
3f39976da3 | ||
|
|
216ad9ef58 | ||
|
|
bc50157010 | ||
|
|
91180d45f9 | ||
|
|
d9f40bbe55 | ||
|
|
ec7c9ee8b8 | ||
|
|
f82bb9cb9c | ||
|
|
5a8922aed5 | ||
|
|
f2c1812560 | ||
|
|
4cfa4ae820 | ||
|
|
a30af36c77 | ||
|
|
5075521e75 | ||
|
|
ee3a47a994 | ||
|
|
f727266ae8 | ||
|
|
8bb0c8522a | ||
|
|
c6700d2746 | ||
|
|
1b06804491 | ||
|
|
dc90f64d56 | ||
|
|
6c43032121 | ||
|
|
37ead9be0b | ||
|
|
1751034669 | ||
|
|
d4575825f1 | ||
|
|
d04b1b4656 | ||
|
|
1247092776 | ||
|
|
7e22a1df55 | ||
|
|
bb5810d21d | ||
|
|
61a88c31c0 | ||
|
|
b86ed8d18f | ||
|
|
e5886a2388 | ||
|
|
8d1ebe0bd1 | ||
|
|
1fb724449d | ||
|
|
721a5e83f9 | ||
|
|
6df617a59d | ||
|
|
8c6336b0aa | ||
|
|
87203dc99a | ||
|
|
4de65cbc06 | ||
|
|
27b2b78f90 | ||
|
|
3a160f1dc6 | ||
|
|
7f24b1c3e9 | ||
|
|
a5e8bcfb7b | ||
|
|
9d5c3c1939 | ||
|
|
815d7057be | ||
|
|
30cb9ec715 | ||
|
|
af6dab9b00 | ||
|
|
cdb42bcf0c | ||
|
|
fc56b52924 | ||
|
|
a32fc687de | ||
|
|
c0017a5a65 | ||
|
|
344e86645d | ||
|
|
075521725d | ||
|
|
5fdf06666c | ||
|
|
f28e8bd300 | ||
|
|
de02ec2767 | ||
|
|
112341031b | ||
|
|
7cf803230b | ||
|
|
79b42e7654 | ||
|
|
f0c5db92f7 | ||
|
|
d420ac2c7d | ||
|
|
b79aa47a0c | ||
|
|
e88c577738 | ||
|
|
a2b0de98af | ||
|
|
4775944f81 | ||
|
|
2abd5b7aa0 | ||
|
|
380e145daf | ||
|
|
a9f2330f43 | ||
|
|
ce38bb1a8c | ||
|
|
919f8bcd21 | ||
|
|
2bfd2c74d2 | ||
|
|
82b2f57e30 | ||
|
|
2ae1ea3788 | ||
|
|
34066d741a | ||
|
|
b74cc0776b | ||
|
|
e7e5fe4705 | ||
|
|
998ae048e7 | ||
|
|
e65c2b9872 | ||
|
|
2fe9ab8e20 | ||
|
|
1145e03870 | ||
|
|
6781efb92f | ||
|
|
0bf1c1d80d | ||
|
|
6ed474ca66 | ||
|
|
46cb8d3689 | ||
|
|
23fc5ac646 | ||
|
|
5734bebe05 | ||
|
|
657a919598 | ||
|
|
6859bb1a22 | ||
|
|
3822740ce3 | ||
|
|
0d78bc3356 | ||
|
|
d87b79bf31 | ||
|
|
70ef9c5a3d | ||
|
|
b727907ae8 | ||
|
|
444c3a8492 | ||
|
|
0b352c58db | ||
|
|
03ddbdd9b9 | ||
|
|
5ebdb39084 | ||
|
|
d45a098472 | ||
|
|
6d5ffb591b | ||
|
|
7ce9e425bc | ||
|
|
4d8743f490 | ||
|
|
4c8b4f9d03 | ||
|
|
81ba5f6713 | ||
|
|
6defae04f3 | ||
|
|
e1064adfd3 | ||
|
|
d7559f16cd | ||
|
|
9e989810ba | ||
|
|
ec2179cf81 | ||
|
|
a8287a90ea | ||
|
|
ad5f0ed509 | ||
|
|
0a4c8baf5e | ||
|
|
95de3d204f | ||
|
|
31182ad39b | ||
|
|
f35232e6f3 | ||
|
|
fda5e38551 | ||
|
|
ac9c6e10a4 | ||
|
|
1a01733047 | ||
|
|
d2cd46127c | ||
|
|
9dde17e8b4 | ||
|
|
37af03d311 | ||
|
|
f7a397cc8d | ||
|
|
cd2e8a6f2d | ||
|
|
d18b993c43 | ||
|
|
e6e81c5894 | ||
|
|
f75abcefed | ||
|
|
18f62d4b82 | ||
|
|
5c0c22803e | ||
|
|
0ef85c7f45 | ||
|
|
078dd1a0f9 | ||
|
|
2b96c95197 | ||
|
|
c5f1c7b4d8 | ||
|
|
d870740cd7 | ||
|
|
d8ec0dcf45 | ||
|
|
c465e7941e | ||
|
|
933398f110 | ||
|
|
cfd06a6223 | ||
|
|
a9fd78f9da | ||
|
|
5f747c7f4b | ||
|
|
c4db1a8b5c | ||
|
|
f7939fcd9a | ||
|
|
d531c9014d | ||
|
|
aca95e0b2f | ||
|
|
bc3c578208 | ||
|
|
06e4024d98 | ||
|
|
8087d8f7ea | ||
|
|
31166ec8f3 | ||
|
|
2754597013 | ||
|
|
2ce90b9b74 | ||
|
|
4e952ae4fc | ||
|
|
db59141467 | ||
|
|
8a66d17899 | ||
|
|
2eeaa0261e | ||
|
|
8dc344ccbf | ||
|
|
6bcd3f903a | ||
|
|
40f935f5b4 | ||
|
|
0991f07034 | ||
|
|
2aaec9cced | ||
|
|
9d473aa2e4 | ||
|
|
6145b0b183 | ||
|
|
2a85f77146 | ||
|
|
66b82f5aad | ||
|
|
12bdceac8a | ||
|
|
aea293e3bc | ||
|
|
8ad7e3ad2a | ||
|
|
0b6956b474 | ||
|
|
0bb6187e71 | ||
|
|
c5a5546389 | ||
|
|
77fe058c10 | ||
|
|
8d9086dfa2 | ||
|
|
0602abf5bd | ||
|
|
caf044cb3e | ||
|
|
a08ced78c8 | ||
|
|
83eb412da8 | ||
|
|
4d1c443123 | ||
|
|
f44e184ec6 | ||
|
|
377dcdba44 | ||
|
|
8242354952 | ||
|
|
c40b9bdefb | ||
|
|
6895cca89d | ||
|
|
f82ab534c6 | ||
|
|
f6e8c19ed1 | ||
|
|
cf89b40584 | ||
|
|
c076599c18 | ||
|
|
4d8148fa98 | ||
|
|
aed29ce5ea | ||
|
|
9ad82c123a | ||
|
|
eeff6bb6b3 | ||
|
|
d90e74c50c | ||
|
|
2990244980 | ||
|
|
c798868d96 | ||
|
|
057a04398d | ||
|
|
7f3ba9428f | ||
|
|
3c02e24bb3 | ||
|
|
1be02dd842 | ||
|
|
3d7c4a5a6d | ||
|
|
11171f3c74 | ||
|
|
ba9f80c5d5 | ||
|
|
e59659dc41 | ||
|
|
253e893c2b | ||
|
|
0ad2c4f85b | ||
|
|
0e6c20da46 | ||
|
|
f6b659cba4 | ||
|
|
6bd27f8644 | ||
|
|
dfe399e7d9 | ||
|
|
7068c8b1a6 | ||
|
|
837685c522 | ||
|
|
82384690e2 | ||
|
|
e6fa67fa93 | ||
|
|
9ea72d3705 | ||
|
|
a907751350 | ||
|
|
560dfd2a02 | ||
|
|
14f3d7c5cc | ||
|
|
510dc1ecd0 | ||
|
|
563c05e2dc | ||
|
|
643ecd2ed6 | ||
|
|
88401ed449 | ||
|
|
3aa8d3a7f1 | ||
|
|
5b6e7c8c65 | ||
|
|
f96d1af449 | ||
|
|
968766cad8 | ||
|
|
652ae06bad | ||
|
|
ddc38679ce | ||
|
|
02e0559477 | ||
|
|
ada0e717fa | ||
|
|
2c789c82be | ||
|
|
d143dce03c | ||
|
|
f9d183c209 | ||
|
|
182cd19dea | ||
|
|
61f00386ab | ||
|
|
2ae0352b0f | ||
|
|
94805c84d1 | ||
|
|
6f2f534b58 | ||
|
|
da6c44fc97 | ||
|
|
da0d33560f | ||
|
|
9d19fbc4fc | ||
|
|
aa5ae4841e | ||
|
|
eb3d68c454 | ||
|
|
c89f31def0 | ||
|
|
ed5fae580e | ||
|
|
d55141ed7a | ||
|
|
a99ce1a574 | ||
|
|
c687a3d5d5 | ||
|
|
dfc3151925 | ||
|
|
0fbffe7a71 | ||
|
|
037f6e73f1 | ||
|
|
cf82439de8 | ||
|
|
37fcd48f86 | ||
|
|
cf9a88cad7 | ||
|
|
4f1cd8324c | ||
|
|
ed7f1d0bc6 | ||
|
|
f6b9cd7f82 | ||
|
|
8fbb2af392 | ||
|
|
c5aba56c5b | ||
|
|
fd4ef69913 | ||
|
|
834ac33a37 | ||
|
|
4e9023f4d2 | ||
|
|
d3a28e8b8d | ||
|
|
0bd71d3b7e | ||
|
|
d97322f0e6 | ||
|
|
b52d512dfa | ||
|
|
a3a2ff4cd9 | ||
|
|
5a1fd87ec1 | ||
|
|
8645c415cf | ||
|
|
700d86ea18 | ||
|
|
54bbde3c3f | ||
|
|
c14b337570 | ||
|
|
e666c4599f | ||
|
|
98cec7fc7b | ||
|
|
fadd2246a0 | ||
|
|
c78b4f1d3d | ||
|
|
33862b90bb | ||
|
|
36bad5cdfd | ||
|
|
54f6451670 | ||
|
|
490967195a | ||
|
|
606c8048a0 | ||
|
|
e66d863cd0 | ||
|
|
a069460015 | ||
|
|
55b12f8641 | ||
|
|
40e5b9abeb | ||
|
|
dcfb57c736 | ||
|
|
2ee67f1dad | ||
|
|
4af3184662 | ||
|
|
e31047744a | ||
|
|
f6eba601b0 | ||
|
|
f796dc5c06 | ||
|
|
50078051bd | ||
|
|
db01746978 | ||
|
|
63b815583b | ||
|
|
ca82ac1fee | ||
|
|
aff0542844 | ||
|
|
beab098d53 | ||
|
|
02b95b7499 | ||
|
|
c4d471552f | ||
|
|
01fc834bc9 | ||
|
|
f7f8d82aaa | ||
|
|
4f17dfcd75 | ||
|
|
83b4f49c0a | ||
|
|
60790aff6f | ||
|
|
e19d0ef068 | ||
|
|
f5f7dffdd1 | ||
|
|
edd55d08f5 | ||
|
|
83743ad039 | ||
|
|
163f5b236c | ||
|
|
513c01a591 | ||
|
|
d9a2a89a17 | ||
|
|
31939f1544 | ||
|
|
11ce33a71d | ||
|
|
9acef3bbd7 | ||
|
|
164bc7dae8 | ||
|
|
f59c941950 | ||
|
|
0239876511 | ||
|
|
93c929e411 | ||
|
|
c2dac35a02 | ||
|
|
727ef76ebd | ||
|
|
bca52f7d4e | ||
|
|
48c36fdb2a | ||
|
|
9b2042fac3 | ||
|
|
816d785721 | ||
|
|
742b139f54 | ||
|
|
3b30121bd9 | ||
|
|
9ee789e6c3 | ||
|
|
b9d2d20086 | ||
|
|
b9d7ca9748 | ||
|
|
5b194dfbd5 | ||
|
|
7f6af7d9db | ||
|
|
42b2b6a2d5 | ||
|
|
d1465bac90 | ||
|
|
3bbb0212f3 | ||
|
|
a5db6fa576 | ||
|
|
9236b5b013 | ||
|
|
535fba4907 | ||
|
|
7e4140f73f | ||
|
|
1ae0a83bdd | ||
|
|
7ae46c6761 | ||
|
|
d584fd6b66 | ||
|
|
54dbdd9837 | ||
|
|
9d6c32d6d1 | ||
|
|
26851b6b42 | ||
|
|
ea5240a5ed | ||
|
|
eec7968f18 | ||
|
|
1cc087fe4f | ||
|
|
040c687ce4 | ||
|
|
cd1226bc6a | ||
|
|
7a04fdd87f | ||
|
|
138f970e6e | ||
|
|
1a0c1f9052 | ||
|
|
1774e22d6f | ||
|
|
26abc8f01a | ||
|
|
5924c21608 | ||
|
|
c93fbfaebc | ||
|
|
0b1c00abeb | ||
|
|
721688c2f8 | ||
|
|
a109220107 | ||
|
|
4a4a04622e | ||
|
|
d6fd88fffd | ||
|
|
e96133e4cf | ||
|
|
f65a75786b | ||
|
|
0b55368306 | ||
|
|
43eb3b0130 | ||
|
|
0a861ab7f3 | ||
|
|
7b36590b17 | ||
|
|
a8b728445c | ||
|
|
af0f0f3e8f | ||
|
|
8d570498a2 | ||
|
|
4c771796d5 | ||
|
|
d6df2b281f | ||
|
|
6fcf735497 | ||
|
|
b5f96e8818 | ||
|
|
3ae70939ba | ||
|
|
c433d72593 | ||
|
|
68b42986cb | ||
|
|
57544ee224 | ||
|
|
83b23ed967 | ||
|
|
4342c5c1a0 | ||
|
|
16b1b03543 | ||
|
|
e6526fbf4d | ||
|
|
8152d88799 | ||
|
|
4ce4884a5b | ||
|
|
db598fbce2 | ||
|
|
8382ec5d37 | ||
|
|
0998cfaadd | ||
|
|
c4448f60d6 | ||
|
|
63b6fe2bf6 | ||
|
|
f85b68cd49 | ||
|
|
5679bcce07 | ||
|
|
24692fc5d7 | ||
|
|
4390d66179 | ||
|
|
d678cc07ed | ||
|
|
6dd6da6005 | ||
|
|
03eeb07152 | ||
|
|
1a15c89988 | ||
|
|
d0a4bd00b6 | ||
|
|
423b1a840c | ||
|
|
a47789e849 | ||
|
|
e5b0508a14 | ||
|
|
c4d00669a0 | ||
|
|
d6cab100fa | ||
|
|
81bd0446a9 | ||
|
|
520b76ffd9 | ||
|
|
1c2d141238 | ||
|
|
32e75dd3f0 | ||
|
|
abfc6a3a9b | ||
|
|
5cc5ec1bba | ||
|
|
f80153e20b | ||
|
|
33b34a9d8f | ||
|
|
9b94f215b1 | ||
|
|
8b5bcef798 | ||
|
|
ea17e1f00f | ||
|
|
543105ac17 | ||
|
|
3789284807 | ||
|
|
be9bec9bc7 | ||
|
|
9c35452842 | ||
|
|
69104cdf34 | ||
|
|
dfefdb41f7 | ||
|
|
cd6ab56da0 | ||
|
|
c988c9b839 | ||
|
|
bff8e1dddb | ||
|
|
641e6ef2cb | ||
|
|
9e9e8cb6a8 | ||
|
|
f118514501 | ||
|
|
39c4b7092c | ||
|
|
c7e7fc3ee4 | ||
|
|
786b0075d5 | ||
|
|
fb10590910 | ||
|
|
abf21308d2 | ||
|
|
8c84b677e2 | ||
|
|
d5ef144222 | ||
|
|
741dae576f | ||
|
|
59ade20500 | ||
|
|
c11b9af75e | ||
|
|
08a54f6e6a | ||
|
|
8305477157 | ||
|
|
e8cc7de4f4 | ||
|
|
3b6aa36c77 | ||
|
|
03829b2b47 | ||
|
|
87c9c659de | ||
|
|
751ff1d376 | ||
|
|
d3ae5b1c8a | ||
|
|
0f3879455b | ||
|
|
0c7d61ee0e | ||
|
|
78951e7711 | ||
|
|
9ba4cc007b | ||
|
|
7b5a6c7a62 | ||
|
|
44deca977d | ||
|
|
536b73e78e | ||
|
|
940767b03f | ||
|
|
d4a47a5778 | ||
|
|
b24668626e | ||
|
|
ea3675b5b6 | ||
|
|
c554155b58 | ||
|
|
a1d12daed2 | ||
|
|
6f528cac5a | ||
|
|
10a66ad389 | ||
|
|
e986704d24 | ||
|
|
ce06265a37 | ||
|
|
439909a068 | ||
|
|
d177e6180d | ||
|
|
48f1fa7482 | ||
|
|
aa9d896b0d | ||
|
|
42a559163d | ||
|
|
3285eb336c | ||
|
|
02da5bcd83 | ||
|
|
9ed1fa4813 | ||
|
|
500df82a96 | ||
|
|
e8e0e3716a | ||
|
|
bc441b739b | ||
|
|
e6539fe22d | ||
|
|
ba5df66a8b | ||
|
|
12d4e7b8c8 | ||
|
|
bba2cb3ada | ||
|
|
52c4c51f02 | ||
|
|
767712fa62 | ||
|
|
90e8a3102b | ||
|
|
879650b866 | ||
|
|
176f31ddec | ||
|
|
fe14ee96db | ||
|
|
57376542a0 | ||
|
|
b8dc9693a7 | ||
|
|
6ac26a5ce5 | ||
|
|
155bd1137e | ||
|
|
f0dc08e656 | ||
|
|
e9ec63961b | ||
|
|
0185803cc2 | ||
|
|
5c9a9c9c33 | ||
|
|
63ff3e83fc | ||
|
|
b4f43344d5 | ||
|
|
c8c5cec1f9 | ||
|
|
66ecdf3bfb | ||
|
|
7841edc9c1 | ||
|
|
132eaa59da | ||
|
|
5562cfaca4 | ||
|
|
c8252b71b5 | ||
|
|
94949a50aa | ||
|
|
0214893e6a | ||
|
|
5be4a42e99 | ||
|
|
f2aa055ec6 | ||
|
|
62e3163b1b | ||
|
|
8214e74f76 | ||
|
|
542a1b1a2e | ||
|
|
5672e3a321 | ||
|
|
fbbfd86b67 | ||
|
|
d8cbc93585 | ||
|
|
5b0b0e98ce | ||
|
|
d5234c7b3a | ||
|
|
77e270d10e | ||
|
|
c893bffae7 | ||
|
|
988e8458ad | ||
|
|
758f942b88 | ||
|
|
26e9724458 | ||
|
|
4879ec7bf3 | ||
|
|
b653327d47 | ||
|
|
4cadedef57 | ||
|
|
27068df7e0 | ||
|
|
b12753dffc | ||
|
|
79221bc265 | ||
|
|
ffa49dc3d9 | ||
|
|
b7bbac72c4 | ||
|
|
c1269c81fd | ||
|
|
794a386af3 | ||
|
|
e270cf9c5e | ||
|
|
7e38616d1f | ||
|
|
85d686e723 | ||
|
|
2d3de726c5 | ||
|
|
4989f0599f | ||
|
|
e4b52ac353 | ||
|
|
abd22c9c46 | ||
|
|
ba729265a8 | ||
|
|
9ec1d35f29 | ||
|
|
cf56663fb7 | ||
|
|
ea513641d0 | ||
|
|
8537943e8b | ||
|
|
a8f5b2ed50 | ||
|
|
33075f229e | ||
|
|
28f573a28d | ||
|
|
e2c9c91b5b | ||
|
|
d42d2d1ab6 | ||
|
|
65b254e8c0 | ||
|
|
82871eaa17 | ||
|
|
24893ca999 | ||
|
|
27a9bf17c7 | ||
|
|
37c660ff9b | ||
|
|
772ec4135c | ||
|
|
0e9035ac98 | ||
|
|
4e5d3a7f98 | ||
|
|
379e568950 | ||
|
|
c09a297892 | ||
|
|
2619676256 | ||
|
|
33cc07f79a | ||
|
|
c029841e36 | ||
|
|
bfa3555081 | ||
|
|
5d780babe3 | ||
|
|
5cd48abf9f | ||
|
|
db5006df04 | ||
|
|
3d6a84c42a | ||
|
|
5fe11c7533 | ||
|
|
a1d57849b3 | ||
|
|
0b13e9f055 | ||
|
|
96f7065f63 | ||
|
|
f3c22ef10d | ||
|
|
a85bef1899 | ||
|
|
bb3e67f315 | ||
|
|
c0a93e31ab | ||
|
|
2e60ea7634 | ||
|
|
4e78074b39 | ||
|
|
b637670f03 | ||
|
|
bd1217a176 | ||
|
|
da45180de4 | ||
|
|
82516e3baf | ||
|
|
c1862f9136 | ||
|
|
9048c7245b | ||
|
|
02bf9a151a | ||
|
|
d3b5cb5343 | ||
|
|
97e6bf6b22 | ||
|
|
04da4558dd | ||
|
|
0c3426da86 | ||
|
|
9b3f03d5a2 | ||
|
|
9abff96b2f | ||
|
|
722d17cbac | ||
|
|
59b846c515 | ||
|
|
42bf2a5cdc | ||
|
|
80bcbaa02f | ||
|
|
7c4e24af38 | ||
|
|
726c223143 | ||
|
|
59ae8c9419 | ||
|
|
0bdd2da5d2 | ||
|
|
2f09524501 | ||
|
|
06492aef01 | ||
|
|
c00cee00fd | ||
|
|
8228f302dd | ||
|
|
018c56fdca | ||
|
|
d745af4b0c | ||
|
|
44ea41cfff | ||
|
|
acad5755a2 | ||
|
|
28b958f732 | ||
|
|
4e59cd3bb6 | ||
|
|
a74333f905 | ||
|
|
365e14622a | ||
|
|
8ec16ce711 | ||
|
|
0e4aa0d2d2 | ||
|
|
08cb96bba2 | ||
|
|
cdc5b4a41e | ||
|
|
52e5e5c2ba | ||
|
|
c653b56937 | ||
|
|
04aff67de4 | ||
|
|
1a6356b2ca | ||
|
|
b05645902a | ||
|
|
54d4f8c320 | ||
|
|
c76153f31d | ||
|
|
8cbb91c857 | ||
|
|
aaae0aa48b | ||
|
|
0535d3b25f | ||
|
|
62be003150 | ||
|
|
364c7cd621 | ||
|
|
9d5390a049 | ||
|
|
bda2fa364d | ||
|
|
caa7b2ad4f | ||
|
|
c14b4d6b38 | ||
|
|
0382c95e4d | ||
|
|
fda20f08d0 | ||
|
|
afd41c9fc7 | ||
|
|
2964ba8c6a | ||
|
|
c0cc5c3059 | ||
|
|
e68cb95d84 | ||
|
|
448666239c | ||
|
|
c0ac323360 | ||
|
|
a0cd3ca62b | ||
|
|
4a9476dd8d | ||
|
|
8d2511688d | ||
|
|
969511d2cb | ||
|
|
989f48d8c1 | ||
|
|
f8ea5cb579 | ||
|
|
360e506710 | ||
|
|
09ad2458b8 | ||
|
|
ad200a864e | ||
|
|
9d1b5614f9 | ||
|
|
416b19c6fc | ||
|
|
5b7249f302 | ||
|
|
699543e4a2 | ||
|
|
4309c4ad46 | ||
|
|
4ebb5293fc | ||
|
|
2814c62915 | ||
|
|
876e96fdbf | ||
|
|
f68843e3d7 | ||
|
|
19a97a1df0 | ||
|
|
72997517b0 | ||
|
|
2a9fca82d2 | ||
|
|
55b1516770 | ||
|
|
3cc9a89dda | ||
|
|
46a0d4fbcb | ||
|
|
04945fda66 | ||
|
|
97e2e71ef9 | ||
|
|
c8a647846c | ||
|
|
90ce14cd84 | ||
|
|
28e276f139 | ||
|
|
f22e1e4dd2 | ||
|
|
e0d769caa2 | ||
|
|
4a37c48789 | ||
|
|
ad492c3601 | ||
|
|
0c055b201e | ||
|
|
7eed0fc041 | ||
|
|
7a1c6aa2a3 | ||
|
|
948dcdb81b | ||
|
|
08101d72ce | ||
|
|
75c4028585 | ||
|
|
85f258d1c2 | ||
|
|
49be7042dc | ||
|
|
44fcd3ef3e | ||
|
|
21cde7a41c | ||
|
|
8598289936 | ||
|
|
35dde7480f | ||
|
|
5e42f9ab46 | ||
|
|
7acf00a633 | ||
|
|
69339d254b | ||
|
|
ec517d25e8 | ||
|
|
ce9b1b0573 | ||
|
|
0a2407a851 | ||
|
|
76a03d568e | ||
|
|
7c03f26393 | ||
|
|
9ff9e406ea | ||
|
|
b5beb13abb | ||
|
|
ceb12d3074 | ||
|
|
59c0dd56ab | ||
|
|
dcf19c173c | ||
|
|
e235000169 | ||
|
|
821951b851 | ||
|
|
35ba1f17dc | ||
|
|
ea8e0cc7c2 | ||
|
|
cb661c56b0 | ||
|
|
e904bd0ddc | ||
|
|
e9883d285d | ||
|
|
8d6ad9e39d | ||
|
|
aa18245f7e | ||
|
|
316bfb77b5 | ||
|
|
9b58214e4a | ||
|
|
3c801fa460 | ||
|
|
1c9202004b | ||
|
|
1004c99c29 | ||
|
|
c9ecb1edd8 | ||
|
|
8baf5fdca0 | ||
|
|
aafafa314d | ||
|
|
49e42a1f60 | ||
|
|
9cd16b1dea | ||
|
|
12cd28258d | ||
|
|
9564997222 | ||
|
|
f968059c67 | ||
|
|
0b900a5e93 | ||
|
|
09867a47a4 | ||
|
|
9d5c42b61b | ||
|
|
8e7a8b68d2 | ||
|
|
4d625031a5 | ||
|
|
26a60b2eb0 | ||
|
|
07d09fdb66 | ||
|
|
4553ed276b | ||
|
|
62966f3829 | ||
|
|
c445142505 | ||
|
|
f70ddce761 | ||
|
|
e29246cb17 | ||
|
|
146e6776f5 | ||
|
|
a45051fbfc | ||
|
|
ec9f67f610 | ||
|
|
30c08f2e3d | ||
|
|
9f100cf344 | ||
|
|
a5a01e9051 | ||
|
|
6be4688bdc | ||
|
|
717c5cdcc7 | ||
|
|
0654bba39f | ||
|
|
4d77d5b316 | ||
|
|
2f98abbcb6 | ||
|
|
270fa8aeda | ||
|
|
4329db3726 | ||
|
|
6f7ac8e1b0 | ||
|
|
a1457874c6 | ||
|
|
18be6c4116 | ||
|
|
dad1535f7a | ||
|
|
f60e6604b8 | ||
|
|
0d3f2ccb62 | ||
|
|
14676ffcd6 | ||
|
|
e5a08ce44d | ||
|
|
b9b6e14b4a | ||
|
|
442d42300b | ||
|
|
75e1c74724 | ||
|
|
5db2b5e573 | ||
|
|
005ef84c5d | ||
|
|
f92570f00a | ||
|
|
9314e366c8 | ||
|
|
b22c7a1cfb | ||
|
|
99efc0f50f | ||
|
|
d979d09ccc | ||
|
|
c17810b087 | ||
|
|
e0b2073fd4 | ||
|
|
123e5dfc3a | ||
|
|
0edad88a31 | ||
|
|
4ccfe5f49b | ||
|
|
e189872486 |
12
.cvsignore
12
.cvsignore
@@ -1,5 +1,6 @@
|
|||||||
openssl.pc
|
openssl.pc
|
||||||
Makefile.ssl
|
libcrypto.pc
|
||||||
|
libssl.pc
|
||||||
MINFO
|
MINFO
|
||||||
makefile.one
|
makefile.one
|
||||||
tmp
|
tmp
|
||||||
@@ -12,5 +13,10 @@ maketest.log
|
|||||||
cctest
|
cctest
|
||||||
cctest.c
|
cctest.c
|
||||||
cctest.a
|
cctest.a
|
||||||
libcrypto.so.*
|
*.flc
|
||||||
libssl.so.*
|
semantic.cache
|
||||||
|
Makefile
|
||||||
|
*.dll*
|
||||||
|
*.so*
|
||||||
|
*.sl*
|
||||||
|
*.dylib*
|
||||||
|
|||||||
113
.gitignore
vendored
Normal file
113
.gitignore
vendored
Normal file
@@ -0,0 +1,113 @@
|
|||||||
|
# Object files
|
||||||
|
*.o
|
||||||
|
*.obj
|
||||||
|
|
||||||
|
# editor artefacts
|
||||||
|
*.swp
|
||||||
|
.#*
|
||||||
|
#*#
|
||||||
|
*~
|
||||||
|
|
||||||
|
# Top level excludes
|
||||||
|
/Makefile.bak
|
||||||
|
/Makefile
|
||||||
|
/*.a
|
||||||
|
/include
|
||||||
|
/*.pc
|
||||||
|
/rehash.time
|
||||||
|
|
||||||
|
# Most *.c files under test/ are symlinks
|
||||||
|
/test/*.c
|
||||||
|
# Apart from these
|
||||||
|
!/test/asn1test.c
|
||||||
|
!/test/methtest.c
|
||||||
|
!/test/dummytest.c
|
||||||
|
!/test/igetest.c
|
||||||
|
!/test/r160test.c
|
||||||
|
!/test/fips_algvs.c
|
||||||
|
|
||||||
|
/test/*.ss
|
||||||
|
/test/*.srl
|
||||||
|
/test/.rnd
|
||||||
|
/test/test*.pem
|
||||||
|
/test/newkey.pem
|
||||||
|
|
||||||
|
# Certificate symbolic links
|
||||||
|
*.0
|
||||||
|
|
||||||
|
# Links under apps
|
||||||
|
/apps/CA.pl
|
||||||
|
/apps/md4.c
|
||||||
|
|
||||||
|
|
||||||
|
# Auto generated headers
|
||||||
|
/crypto/buildinf.h
|
||||||
|
/crypto/opensslconf.h
|
||||||
|
|
||||||
|
# Auto generated assembly language source files
|
||||||
|
*.s
|
||||||
|
!/crypto/bn/asm/pa-risc2.s
|
||||||
|
!/crypto/bn/asm/pa-risc2W.s
|
||||||
|
crypto/aes/asm/a_win32.asm
|
||||||
|
crypto/bf/asm/b_win32.asm
|
||||||
|
crypto/bn/asm/bn_win32.asm
|
||||||
|
crypto/bn/asm/co_win32.asm
|
||||||
|
crypto/bn/asm/mt_win32.asm
|
||||||
|
crypto/cast/asm/c_win32.asm
|
||||||
|
crypto/cpu_win32.asm
|
||||||
|
crypto/des/asm/d_win32.asm
|
||||||
|
crypto/des/asm/y_win32.asm
|
||||||
|
crypto/md5/asm/m5_win32.asm
|
||||||
|
crypto/rc4/asm/r4_win32.asm
|
||||||
|
crypto/rc5/asm/r5_win32.asm
|
||||||
|
crypto/ripemd/asm/rm_win32.asm
|
||||||
|
crypto/sha/asm/s1_win32.asm
|
||||||
|
crypto/sha/asm/sha512-sse2.asm
|
||||||
|
|
||||||
|
# Executables
|
||||||
|
/apps/openssl
|
||||||
|
/test/sha256t
|
||||||
|
/test/sha512t
|
||||||
|
/test/*test
|
||||||
|
/test/fips_aesavs
|
||||||
|
/test/fips_desmovs
|
||||||
|
/test/fips_dhvs
|
||||||
|
/test/fips_drbgvs
|
||||||
|
/test/fips_dssvs
|
||||||
|
/test/fips_ecdhvs
|
||||||
|
/test/fips_ecdsavs
|
||||||
|
/test/fips_rngvs
|
||||||
|
/test/fips_test_suite
|
||||||
|
*.so*
|
||||||
|
*.dylib*
|
||||||
|
*.dll*
|
||||||
|
# Exceptions
|
||||||
|
!/test/bctest
|
||||||
|
!/crypto/des/times/486-50.sol
|
||||||
|
|
||||||
|
# Misc auto generated files
|
||||||
|
/tools/c_rehash
|
||||||
|
/test/evptests.txt
|
||||||
|
lib
|
||||||
|
Makefile.save
|
||||||
|
*.bak
|
||||||
|
tags
|
||||||
|
TAGS
|
||||||
|
|
||||||
|
# Windows
|
||||||
|
/tmp32
|
||||||
|
/tmp32.dbg
|
||||||
|
/tmp32dll
|
||||||
|
/tmp32dll.dbg
|
||||||
|
/out32
|
||||||
|
/out32.dbg
|
||||||
|
/out32dll
|
||||||
|
/out32dll.dbg
|
||||||
|
/inc32
|
||||||
|
/MINFO
|
||||||
|
ms/bcb.mak
|
||||||
|
ms/libeay32.def
|
||||||
|
ms/nt.mak
|
||||||
|
ms/ntdll.mak
|
||||||
|
ms/ssleay32.def
|
||||||
|
ms/version32.rc
|
||||||
30
ACKNOWLEDGMENTS
Normal file
30
ACKNOWLEDGMENTS
Normal file
@@ -0,0 +1,30 @@
|
|||||||
|
The OpenSSL project depends on volunteer efforts and financial support from
|
||||||
|
the end user community. That support comes in the form of donations and paid
|
||||||
|
sponsorships, software support contracts, paid consulting services
|
||||||
|
and commissioned software development.
|
||||||
|
|
||||||
|
Since all these activities support the continued development and improvement
|
||||||
|
of OpenSSL we consider all these clients and customers as sponsors of the
|
||||||
|
OpenSSL project.
|
||||||
|
|
||||||
|
We would like to identify and thank the following such sponsors for their past
|
||||||
|
or current significant support of the OpenSSL project:
|
||||||
|
|
||||||
|
Major support:
|
||||||
|
|
||||||
|
Qualys http://www.qualys.com/
|
||||||
|
|
||||||
|
Very significant support:
|
||||||
|
|
||||||
|
OpenGear: http://www.opengear.com/
|
||||||
|
|
||||||
|
Significant support:
|
||||||
|
|
||||||
|
PSW Group: http://www.psw.net/
|
||||||
|
Acano Ltd. http://acano.com/
|
||||||
|
|
||||||
|
Please note that we ask permission to identify sponsors and that some sponsors
|
||||||
|
we consider eligible for inclusion here have requested to remain anonymous.
|
||||||
|
|
||||||
|
Additional sponsorship or financial support is always welcome: for more
|
||||||
|
information please contact the OpenSSL Software Foundation.
|
||||||
@@ -148,7 +148,7 @@ eric (about to go bushwalking for the 4 day easter break :-)
|
|||||||
This would tend to cause memory overwrites since SSLv3 has
|
This would tend to cause memory overwrites since SSLv3 has
|
||||||
a maximum packet size of 16k. If your program uses
|
a maximum packet size of 16k. If your program uses
|
||||||
buffers <= 16k, you would probably never see this problem.
|
buffers <= 16k, you would probably never see this problem.
|
||||||
- Fixed a new errors that were cause by malloc() not returning
|
- Fixed a few errors that were cause by malloc() not returning
|
||||||
0 initialised memory..
|
0 initialised memory..
|
||||||
- SSL_OP_NETSCAPE_CA_DN_BUG was being switched on when using
|
- SSL_OP_NETSCAPE_CA_DN_BUG was being switched on when using
|
||||||
SSL_CTX_set_options(ssl_ctx,SSL_OP_ALL); which was a bad thing
|
SSL_CTX_set_options(ssl_ctx,SSL_OP_ALL); which was a bad thing
|
||||||
|
|||||||
448
FAQ
448
FAQ
@@ -10,6 +10,7 @@ OpenSSL - Frequently Asked Questions
|
|||||||
* Why aren't tools like 'autoconf' and 'libtool' used?
|
* Why aren't tools like 'autoconf' and 'libtool' used?
|
||||||
* What is an 'engine' version?
|
* What is an 'engine' version?
|
||||||
* How do I check the authenticity of the OpenSSL distribution?
|
* How do I check the authenticity of the OpenSSL distribution?
|
||||||
|
* How does the versioning scheme work?
|
||||||
|
|
||||||
[LEGAL] Legal questions
|
[LEGAL] Legal questions
|
||||||
|
|
||||||
@@ -31,6 +32,9 @@ OpenSSL - Frequently Asked Questions
|
|||||||
* Why does my browser give a warning about a mismatched hostname?
|
* Why does my browser give a warning about a mismatched hostname?
|
||||||
* How do I install a CA certificate into a browser?
|
* How do I install a CA certificate into a browser?
|
||||||
* Why is OpenSSL x509 DN output not conformant to RFC2253?
|
* Why is OpenSSL x509 DN output not conformant to RFC2253?
|
||||||
|
* What is a "128 bit certificate"? Can I create one with OpenSSL?
|
||||||
|
* Why does OpenSSL set the authority key identifier extension incorrectly?
|
||||||
|
* How can I set up a bundle of commercial root CA certificates?
|
||||||
|
|
||||||
[BUILD] Questions about building and testing OpenSSL
|
[BUILD] Questions about building and testing OpenSSL
|
||||||
|
|
||||||
@@ -44,12 +48,21 @@ OpenSSL - Frequently Asked Questions
|
|||||||
* What is special about OpenSSL on Redhat?
|
* What is special about OpenSSL on Redhat?
|
||||||
* Why does the OpenSSL compilation fail on MacOS X?
|
* Why does the OpenSSL compilation fail on MacOS X?
|
||||||
* Why does the OpenSSL test suite fail on MacOS X?
|
* Why does the OpenSSL test suite fail on MacOS X?
|
||||||
|
* Why does the OpenSSL test suite fail in BN_sqr test [on a 64-bit platform]?
|
||||||
|
* Why does OpenBSD-i386 build fail on des-586.s with "Unimplemented segment type"?
|
||||||
|
* Why does the OpenSSL test suite fail in sha512t on x86 CPU?
|
||||||
|
* Why does compiler fail to compile sha512.c?
|
||||||
|
* Test suite still fails, what to do?
|
||||||
|
* I think I've found a bug, what should I do?
|
||||||
|
* I'm SURE I've found a bug, how do I report it?
|
||||||
|
* I've found a security issue, how do I report it?
|
||||||
|
|
||||||
[PROG] Questions about programming with OpenSSL
|
[PROG] Questions about programming with OpenSSL
|
||||||
|
|
||||||
* Is OpenSSL thread-safe?
|
* Is OpenSSL thread-safe?
|
||||||
* I've compiled a program under Windows and it crashes: why?
|
* I've compiled a program under Windows and it crashes: why?
|
||||||
* How do I read or write a DER encoded buffer using the ASN1 functions?
|
* How do I read or write a DER encoded buffer using the ASN1 functions?
|
||||||
|
* OpenSSL uses DER but I need BER format: does OpenSSL support BER?
|
||||||
* I've tried using <M_some_evil_pkcs12_macro> and I get errors why?
|
* I've tried using <M_some_evil_pkcs12_macro> and I get errors why?
|
||||||
* I've called <some function> and it fails, why?
|
* I've called <some function> and it fails, why?
|
||||||
* I just get a load of numbers for the error output, what do they mean?
|
* I just get a load of numbers for the error output, what do they mean?
|
||||||
@@ -58,6 +71,10 @@ OpenSSL - Frequently Asked Questions
|
|||||||
* Can I use OpenSSL's SSL library with non-blocking I/O?
|
* Can I use OpenSSL's SSL library with non-blocking I/O?
|
||||||
* Why doesn't my server application receive a client certificate?
|
* Why doesn't my server application receive a client certificate?
|
||||||
* Why does compilation fail due to an undefined symbol NID_uniqueIdentifier?
|
* Why does compilation fail due to an undefined symbol NID_uniqueIdentifier?
|
||||||
|
* I think I've detected a memory leak, is this a bug?
|
||||||
|
* Why does Valgrind complain about the use of uninitialized data?
|
||||||
|
* Why doesn't a memory BIO work when a file does?
|
||||||
|
* Where are the declarations and implementations of d2i_X509() etc?
|
||||||
|
|
||||||
===============================================================================
|
===============================================================================
|
||||||
|
|
||||||
@@ -66,11 +83,11 @@ OpenSSL - Frequently Asked Questions
|
|||||||
* Which is the current version of OpenSSL?
|
* Which is the current version of OpenSSL?
|
||||||
|
|
||||||
The current version is available from <URL: http://www.openssl.org>.
|
The current version is available from <URL: http://www.openssl.org>.
|
||||||
OpenSSL 0.9.6h was released on December 5, 2002.
|
OpenSSL 1.0.1e was released on Feb 11th, 2013.
|
||||||
|
|
||||||
In addition to the current stable release, you can also access daily
|
In addition to the current stable release, you can also access daily
|
||||||
snapshots of the OpenSSL development version at <URL:
|
snapshots of the OpenSSL development version at <URL:
|
||||||
ftp://ftp.openssl.org/snapshot/>, or get it by anonymous CVS access.
|
ftp://ftp.openssl.org/snapshot/>, or get it by anonymous Git access.
|
||||||
|
|
||||||
|
|
||||||
* Where is the documentation?
|
* Where is the documentation?
|
||||||
@@ -82,19 +99,19 @@ explains how to install this library.
|
|||||||
|
|
||||||
OpenSSL includes a command line utility that can be used to perform a
|
OpenSSL includes a command line utility that can be used to perform a
|
||||||
variety of cryptographic functions. It is described in the openssl(1)
|
variety of cryptographic functions. It is described in the openssl(1)
|
||||||
manpage. Documentation for developers is currently being written. A
|
manpage. Documentation for developers is currently being written. Many
|
||||||
few manual pages already are available; overviews over libcrypto and
|
manual pages are available; overviews over libcrypto and
|
||||||
libssl are given in the crypto(3) and ssl(3) manpages.
|
libssl are given in the crypto(3) and ssl(3) manpages.
|
||||||
|
|
||||||
The OpenSSL manpages are installed in /usr/local/ssl/man/ (or a
|
The OpenSSL manpages are installed in /usr/local/ssl/man/ (or a
|
||||||
different directory if you specified one as described in INSTALL).
|
different directory if you specified one as described in INSTALL).
|
||||||
In addition, you can read the most current versions at
|
In addition, you can read the most current versions at
|
||||||
<URL: http://www.openssl.org/docs/>.
|
<URL: http://www.openssl.org/docs/>. Note that the online documents refer
|
||||||
|
to the very latest development versions of OpenSSL and may include features
|
||||||
For information on parts of libcrypto that are not yet documented, you
|
not present in released versions. If in doubt refer to the documentation
|
||||||
might want to read Ariel Glenn's documentation on SSLeay 0.9, OpenSSL's
|
that came with the version of OpenSSL you are using. The pod format
|
||||||
predecessor, at <URL: http://www.columbia.edu/~ariel/ssleay/>. Much
|
documentation is included in each OpenSSL distribution under the docs
|
||||||
of this still applies to OpenSSL.
|
directory.
|
||||||
|
|
||||||
There is some documentation about certificate extensions and PKCS#12
|
There is some documentation about certificate extensions and PKCS#12
|
||||||
in doc/openssl.txt
|
in doc/openssl.txt
|
||||||
@@ -114,11 +131,14 @@ OpenSSL. Information on the OpenSSL mailing lists is available from
|
|||||||
|
|
||||||
* Where can I get a compiled version of OpenSSL?
|
* Where can I get a compiled version of OpenSSL?
|
||||||
|
|
||||||
|
You can finder pointers to binary distributions in
|
||||||
|
<URL: http://www.openssl.org/related/binaries.html> .
|
||||||
|
|
||||||
Some applications that use OpenSSL are distributed in binary form.
|
Some applications that use OpenSSL are distributed in binary form.
|
||||||
When using such an application, you don't need to install OpenSSL
|
When using such an application, you don't need to install OpenSSL
|
||||||
yourself; the application will include the required parts (e.g. DLLs).
|
yourself; the application will include the required parts (e.g. DLLs).
|
||||||
|
|
||||||
If you want to install OpenSSL on a Windows system and you don't have
|
If you want to build OpenSSL on a Windows system and you don't have
|
||||||
a C compiler, read the "Mingw32" section of INSTALL.W32 for information
|
a C compiler, read the "Mingw32" section of INSTALL.W32 for information
|
||||||
on how to obtain and install the free GNU C compiler.
|
on how to obtain and install the free GNU C compiler.
|
||||||
|
|
||||||
@@ -134,8 +154,8 @@ less Unix-centric, it might have been used much earlier.
|
|||||||
|
|
||||||
With version 0.9.6 OpenSSL was extended to interface to external crypto
|
With version 0.9.6 OpenSSL was extended to interface to external crypto
|
||||||
hardware. This was realized in a special release '0.9.6-engine'. With
|
hardware. This was realized in a special release '0.9.6-engine'. With
|
||||||
version 0.9.7 (not yet released) the changes were merged into the main
|
version 0.9.7 the changes were merged into the main development line,
|
||||||
development line, so that the special release is no longer necessary.
|
so that the special release is no longer necessary.
|
||||||
|
|
||||||
* How do I check the authenticity of the OpenSSL distribution?
|
* How do I check the authenticity of the OpenSSL distribution?
|
||||||
|
|
||||||
@@ -145,11 +165,25 @@ Use MD5 to check that a tarball from a mirror site is identical:
|
|||||||
md5sum TARBALL | awk '{print $1;}' | cmp - TARBALL.md5
|
md5sum TARBALL | awk '{print $1;}' | cmp - TARBALL.md5
|
||||||
|
|
||||||
You can check authenticity using pgp or gpg. You need the OpenSSL team
|
You can check authenticity using pgp or gpg. You need the OpenSSL team
|
||||||
member public key used to sign it (download it from a key server). Then
|
member public key used to sign it (download it from a key server, see a
|
||||||
|
list of keys at <URL: http://www.openssl.org/about/>). Then
|
||||||
just do:
|
just do:
|
||||||
|
|
||||||
pgp TARBALL.asc
|
pgp TARBALL.asc
|
||||||
|
|
||||||
|
* How does the versioning scheme work?
|
||||||
|
|
||||||
|
After the release of OpenSSL 1.0.0 the versioning scheme changed. Letter
|
||||||
|
releases (e.g. 1.0.1a) can only contain bug and security fixes and no
|
||||||
|
new features. Minor releases change the last number (e.g. 1.0.2) and
|
||||||
|
can contain new features that retain binary compatibility. Changes to
|
||||||
|
the middle number are considered major releases and neither source nor
|
||||||
|
binary compatibility is guaranteed.
|
||||||
|
|
||||||
|
Therefore the answer to the common question "when will feature X be
|
||||||
|
backported to OpenSSL 1.0.0/0.9.8?" is "never" but it could appear
|
||||||
|
in the next minor release.
|
||||||
|
|
||||||
[LEGAL] =======================================================================
|
[LEGAL] =======================================================================
|
||||||
|
|
||||||
* Do I need patent licenses to use OpenSSL?
|
* Do I need patent licenses to use OpenSSL?
|
||||||
@@ -159,8 +193,8 @@ you if you want to use OpenSSL. For information on intellectual
|
|||||||
property rights, please consult a lawyer. The OpenSSL team does not
|
property rights, please consult a lawyer. The OpenSSL team does not
|
||||||
offer legal advice.
|
offer legal advice.
|
||||||
|
|
||||||
You can configure OpenSSL so as not to use RC5 and IDEA by using
|
You can configure OpenSSL so as not to use IDEA, MDC2 and RC5 by using
|
||||||
./config no-rc5 no-idea
|
./config no-idea no-mdc2 no-rc5
|
||||||
|
|
||||||
|
|
||||||
* Can I use OpenSSL with GPL software?
|
* Can I use OpenSSL with GPL software?
|
||||||
@@ -187,18 +221,30 @@ for permission to use their software with OpenSSL.
|
|||||||
|
|
||||||
Cryptographic software needs a source of unpredictable data to work
|
Cryptographic software needs a source of unpredictable data to work
|
||||||
correctly. Many open source operating systems provide a "randomness
|
correctly. Many open source operating systems provide a "randomness
|
||||||
device" that serves this purpose. On other systems, applications have
|
device" (/dev/urandom or /dev/random) that serves this purpose.
|
||||||
to call the RAND_add() or RAND_seed() function with appropriate data
|
All OpenSSL versions try to use /dev/urandom by default; starting with
|
||||||
before generating keys or performing public key encryption.
|
version 0.9.7, OpenSSL also tries /dev/random if /dev/urandom is not
|
||||||
(These functions initialize the pseudo-random number generator, PRNG.)
|
available.
|
||||||
|
|
||||||
Some broken applications do not do this. As of version 0.9.5, the
|
On other systems, applications have to call the RAND_add() or
|
||||||
OpenSSL functions that need randomness report an error if the random
|
RAND_seed() function with appropriate data before generating keys or
|
||||||
number generator has not been seeded with at least 128 bits of
|
performing public key encryption. (These functions initialize the
|
||||||
randomness. If this error occurs, please contact the author of the
|
pseudo-random number generator, PRNG.) Some broken applications do
|
||||||
application you are using. It is likely that it never worked
|
not do this. As of version 0.9.5, the OpenSSL functions that need
|
||||||
correctly. OpenSSL 0.9.5 and later make the error visible by refusing
|
randomness report an error if the random number generator has not been
|
||||||
to perform potentially insecure encryption.
|
seeded with at least 128 bits of randomness. If this error occurs and
|
||||||
|
is not discussed in the documentation of the application you are
|
||||||
|
using, please contact the author of that application; it is likely
|
||||||
|
that it never worked correctly. OpenSSL 0.9.5 and later make the
|
||||||
|
error visible by refusing to perform potentially insecure encryption.
|
||||||
|
|
||||||
|
If you are using Solaris 8, you can add /dev/urandom and /dev/random
|
||||||
|
devices by installing patch 112438 (Sparc) or 112439 (x86), which are
|
||||||
|
available via the Patchfinder at <URL: http://sunsolve.sun.com>
|
||||||
|
(Solaris 9 includes these devices by default). For /dev/random support
|
||||||
|
for earlier Solaris versions, see Sun's statement at
|
||||||
|
<URL: http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsrdb/27606&zone_32=SUNWski>
|
||||||
|
(the SUNWski package is available in patch 105710).
|
||||||
|
|
||||||
On systems without /dev/urandom and /dev/random, it is a good idea to
|
On systems without /dev/urandom and /dev/random, it is a good idea to
|
||||||
use the Entropy Gathering Demon (EGD); see the RAND_egd() manpage for
|
use the Entropy Gathering Demon (EGD); see the RAND_egd() manpage for
|
||||||
@@ -231,18 +277,6 @@ OpenSSL command line tools. Applications using the OpenSSL library
|
|||||||
provide their own configuration options to specify the entropy source,
|
provide their own configuration options to specify the entropy source,
|
||||||
please check out the documentation coming the with application.
|
please check out the documentation coming the with application.
|
||||||
|
|
||||||
For Solaris 2.6, Tim Nibbe <tnibbe@sprint.net> and others have suggested
|
|
||||||
installing the SUNski package from Sun patch 105710-01 (Sparc) which
|
|
||||||
adds a /dev/random device and make sure it gets used, usually through
|
|
||||||
$RANDFILE. There are probably similar patches for the other Solaris
|
|
||||||
versions. An official statement from Sun with respect to /dev/random
|
|
||||||
support can be found at
|
|
||||||
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsrdb/27606&zone_32=SUNWski
|
|
||||||
However, be warned that /dev/random is usually a blocking device, which
|
|
||||||
may have some effects on OpenSSL.
|
|
||||||
A third party /dev/random solution for Solaris is available at
|
|
||||||
http://www.cosy.sbg.ac.at/~andi/
|
|
||||||
|
|
||||||
|
|
||||||
* Why do I get an "unable to write 'random state'" error message?
|
* Why do I get an "unable to write 'random state'" error message?
|
||||||
|
|
||||||
@@ -261,7 +295,7 @@ current directory in this case, but this has changed with 0.9.6a.)
|
|||||||
Check out the CA.pl(1) manual page. This provides a simple wrapper round
|
Check out the CA.pl(1) manual page. This provides a simple wrapper round
|
||||||
the 'req', 'verify', 'ca' and 'pkcs12' utilities. For finer control check
|
the 'req', 'verify', 'ca' and 'pkcs12' utilities. For finer control check
|
||||||
out the manual pages for the individual utilities and the certificate
|
out the manual pages for the individual utilities and the certificate
|
||||||
extensions documentation (currently in doc/openssl.txt).
|
extensions documentation (in ca(1), req(1), x509v3_config(5) )
|
||||||
|
|
||||||
|
|
||||||
* Why can't I create certificate requests?
|
* Why can't I create certificate requests?
|
||||||
@@ -376,6 +410,76 @@ interface, the "-nameopt" option could be introduded. See the manual
|
|||||||
page of the "openssl x509" commandline tool for details. The old behaviour
|
page of the "openssl x509" commandline tool for details. The old behaviour
|
||||||
has however been left as default for the sake of compatibility.
|
has however been left as default for the sake of compatibility.
|
||||||
|
|
||||||
|
* What is a "128 bit certificate"? Can I create one with OpenSSL?
|
||||||
|
|
||||||
|
The term "128 bit certificate" is a highly misleading marketing term. It does
|
||||||
|
*not* refer to the size of the public key in the certificate! A certificate
|
||||||
|
containing a 128 bit RSA key would have negligible security.
|
||||||
|
|
||||||
|
There were various other names such as "magic certificates", "SGC
|
||||||
|
certificates", "step up certificates" etc.
|
||||||
|
|
||||||
|
You can't generally create such a certificate using OpenSSL but there is no
|
||||||
|
need to any more. Nowadays web browsers using unrestricted strong encryption
|
||||||
|
are generally available.
|
||||||
|
|
||||||
|
When there were tight restrictions on the export of strong encryption
|
||||||
|
software from the US only weak encryption algorithms could be freely exported
|
||||||
|
(initially 40 bit and then 56 bit). It was widely recognised that this was
|
||||||
|
inadequate. A relaxation of the rules allowed the use of strong encryption but
|
||||||
|
only to an authorised server.
|
||||||
|
|
||||||
|
Two slighly different techniques were developed to support this, one used by
|
||||||
|
Netscape was called "step up", the other used by MSIE was called "Server Gated
|
||||||
|
Cryptography" (SGC). When a browser initially connected to a server it would
|
||||||
|
check to see if the certificate contained certain extensions and was issued by
|
||||||
|
an authorised authority. If these test succeeded it would reconnect using
|
||||||
|
strong encryption.
|
||||||
|
|
||||||
|
Only certain (initially one) certificate authorities could issue the
|
||||||
|
certificates and they generally cost more than ordinary certificates.
|
||||||
|
|
||||||
|
Although OpenSSL can create certificates containing the appropriate extensions
|
||||||
|
the certificate would not come from a permitted authority and so would not
|
||||||
|
be recognized.
|
||||||
|
|
||||||
|
The export laws were later changed to allow almost unrestricted use of strong
|
||||||
|
encryption so these certificates are now obsolete.
|
||||||
|
|
||||||
|
|
||||||
|
* Why does OpenSSL set the authority key identifier (AKID) extension incorrectly?
|
||||||
|
|
||||||
|
It doesn't: this extension is often the cause of confusion.
|
||||||
|
|
||||||
|
Consider a certificate chain A->B->C so that A signs B and B signs C. Suppose
|
||||||
|
certificate C contains AKID.
|
||||||
|
|
||||||
|
The purpose of this extension is to identify the authority certificate B. This
|
||||||
|
can be done either by including the subject key identifier of B or its issuer
|
||||||
|
name and serial number.
|
||||||
|
|
||||||
|
In this latter case because it is identifying certifcate B it must contain the
|
||||||
|
issuer name and serial number of B.
|
||||||
|
|
||||||
|
It is often wrongly assumed that it should contain the subject name of B. If it
|
||||||
|
did this would be redundant information because it would duplicate the issuer
|
||||||
|
name of C.
|
||||||
|
|
||||||
|
|
||||||
|
* How can I set up a bundle of commercial root CA certificates?
|
||||||
|
|
||||||
|
The OpenSSL software is shipped without any root CA certificate as the
|
||||||
|
OpenSSL project does not have any policy on including or excluding
|
||||||
|
any specific CA and does not intend to set up such a policy. Deciding
|
||||||
|
about which CAs to support is up to application developers or
|
||||||
|
administrators.
|
||||||
|
|
||||||
|
Other projects do have other policies so you can for example extract the CA
|
||||||
|
bundle used by Mozilla and/or modssl as described in this article:
|
||||||
|
|
||||||
|
<URL: http://www.mail-archive.com/modssl-users@modssl.org/msg16980.html>
|
||||||
|
|
||||||
|
|
||||||
[BUILD] =======================================================================
|
[BUILD] =======================================================================
|
||||||
|
|
||||||
* Why does the linker complain about undefined symbols?
|
* Why does the linker complain about undefined symbols?
|
||||||
@@ -415,7 +519,7 @@ when you run the test suite (using "make test"). The message returned is
|
|||||||
"bc: 1 not implemented".
|
"bc: 1 not implemented".
|
||||||
|
|
||||||
The best way to deal with this is to find another implementation of bc
|
The best way to deal with this is to find another implementation of bc
|
||||||
and compile/install it. GNU bc (see http://www.gnu.org/software/software.html
|
and compile/install it. GNU bc (see <URL: http://www.gnu.org/software/software.html>
|
||||||
for download instructions) can be safely used, for example.
|
for download instructions) can be safely used, for example.
|
||||||
|
|
||||||
|
|
||||||
@@ -426,7 +530,7 @@ that the OpenSSL bntest throws at it. This gets triggered when you run the
|
|||||||
test suite (using "make test"). The message returned is "bc: stack empty".
|
test suite (using "make test"). The message returned is "bc: stack empty".
|
||||||
|
|
||||||
The best way to deal with this is to find another implementation of bc
|
The best way to deal with this is to find another implementation of bc
|
||||||
and compile/install it. GNU bc (see http://www.gnu.org/software/software.html
|
and compile/install it. GNU bc (see <URL: http://www.gnu.org/software/software.html>
|
||||||
for download instructions) can be safely used, for example.
|
for download instructions) can be safely used, for example.
|
||||||
|
|
||||||
|
|
||||||
@@ -465,6 +569,10 @@ This will only compile sha_dgst.c with -O0, the rest with the optimization
|
|||||||
level chosen by the configuration process. When the above is done, do the
|
level chosen by the configuration process. When the above is done, do the
|
||||||
test and installation and you're set.
|
test and installation and you're set.
|
||||||
|
|
||||||
|
3. Reconfigure the toolkit with no-sha0 option to leave out SHA0. It
|
||||||
|
should not be used and is not used in SSL/TLS nor any other recognized
|
||||||
|
protocol in either case.
|
||||||
|
|
||||||
|
|
||||||
* Why does the OpenSSL compilation fail with "ar: command not found"?
|
* Why does the OpenSSL compilation fail with "ar: command not found"?
|
||||||
|
|
||||||
@@ -488,10 +596,13 @@ and then redo the compilation. What you should really do is make sure
|
|||||||
Sometimes, you may get reports from VC++ command line (cl) that it
|
Sometimes, you may get reports from VC++ command line (cl) that it
|
||||||
can't find standard include files like stdio.h and other weirdnesses.
|
can't find standard include files like stdio.h and other weirdnesses.
|
||||||
One possible cause is that the environment isn't correctly set up.
|
One possible cause is that the environment isn't correctly set up.
|
||||||
To solve that problem, one should run VCVARS32.BAT which is found in
|
To solve that problem for VC++ versions up to 6, one should run
|
||||||
the 'bin' subdirectory of the VC++ installation directory (somewhere
|
VCVARS32.BAT which is found in the 'bin' subdirectory of the VC++
|
||||||
under 'Program Files'). This needs to be done prior to running NMAKE,
|
installation directory (somewhere under 'Program Files'). For VC++
|
||||||
and the changes are only valid for the current DOS session.
|
version 7 (and up?), which is also called VS.NET, the file is called
|
||||||
|
VSVARS32.BAT instead.
|
||||||
|
This needs to be done prior to running NMAKE, and the changes are only
|
||||||
|
valid for the current DOS session.
|
||||||
|
|
||||||
|
|
||||||
* What is special about OpenSSL on Redhat?
|
* What is special about OpenSSL on Redhat?
|
||||||
@@ -552,6 +663,109 @@ libraries you just built.
|
|||||||
Look in the file PROBLEMS for a more detailed explanation and for possible
|
Look in the file PROBLEMS for a more detailed explanation and for possible
|
||||||
solutions.
|
solutions.
|
||||||
|
|
||||||
|
* Why does the OpenSSL test suite fail in BN_sqr test [on a 64-bit platform]?
|
||||||
|
|
||||||
|
Failure in BN_sqr test is most likely caused by a failure to configure the
|
||||||
|
toolkit for current platform or lack of support for the platform in question.
|
||||||
|
Run './config -t' and './apps/openssl version -p'. Do these platform
|
||||||
|
identifiers match? If they don't, then you most likely failed to run
|
||||||
|
./config and you're hereby advised to do so before filing a bug report.
|
||||||
|
If ./config itself fails to run, then it's most likely problem with your
|
||||||
|
local environment and you should turn to your system administrator (or
|
||||||
|
similar). If identifiers match (and/or no alternative identifier is
|
||||||
|
suggested by ./config script), then the platform is unsupported. There might
|
||||||
|
or might not be a workaround. Most notably on SPARC64 platforms with GNU
|
||||||
|
C compiler you should be able to produce a working build by running
|
||||||
|
'./config -m32'. I understand that -m32 might not be what you want/need,
|
||||||
|
but the build should be operational. For further details turn to
|
||||||
|
<openssl-dev@openssl.org>.
|
||||||
|
|
||||||
|
* Why does OpenBSD-i386 build fail on des-586.s with "Unimplemented segment type"?
|
||||||
|
|
||||||
|
As of 0.9.7 assembler routines were overhauled for position independence
|
||||||
|
of the machine code, which is essential for shared library support. For
|
||||||
|
some reason OpenBSD is equipped with an out-of-date GNU assembler which
|
||||||
|
finds the new code offensive. To work around the problem, configure with
|
||||||
|
no-asm (and sacrifice a great deal of performance) or patch your assembler
|
||||||
|
according to <URL: http://www.openssl.org/~appro/gas-1.92.3.OpenBSD.patch>.
|
||||||
|
For your convenience a pre-compiled replacement binary is provided at
|
||||||
|
<URL: http://www.openssl.org/~appro/gas-1.92.3.static.aout.bin>.
|
||||||
|
Reportedly elder *BSD a.out platforms also suffer from this problem and
|
||||||
|
remedy should be same. Provided binary is statically linked and should be
|
||||||
|
working across wider range of *BSD branches, not just OpenBSD.
|
||||||
|
|
||||||
|
* Why does the OpenSSL test suite fail in sha512t on x86 CPU?
|
||||||
|
|
||||||
|
If the test program in question fails withs SIGILL, Illegal Instruction
|
||||||
|
exception, then you more than likely to run SSE2-capable CPU, such as
|
||||||
|
Intel P4, under control of kernel which does not support SSE2
|
||||||
|
instruction extentions. See accompanying INSTALL file and
|
||||||
|
OPENSSL_ia32cap(3) documentation page for further information.
|
||||||
|
|
||||||
|
* Why does compiler fail to compile sha512.c?
|
||||||
|
|
||||||
|
OpenSSL SHA-512 implementation depends on compiler support for 64-bit
|
||||||
|
integer type. Few elder compilers [ULTRIX cc, SCO compiler to mention a
|
||||||
|
couple] lack support for this and therefore are incapable of compiling
|
||||||
|
the module in question. The recommendation is to disable SHA-512 by
|
||||||
|
adding no-sha512 to ./config [or ./Configure] command line. Another
|
||||||
|
possible alternative might be to switch to GCC.
|
||||||
|
|
||||||
|
* Test suite still fails, what to do?
|
||||||
|
|
||||||
|
Another common reason for failure to complete some particular test is
|
||||||
|
simply bad code generated by a buggy component in toolchain or deficiency
|
||||||
|
in run-time environment. There are few cases documented in PROBLEMS file,
|
||||||
|
consult it for possible workaround before you beat the drum. Even if you
|
||||||
|
don't find solution or even mention there, do reserve for possibility of
|
||||||
|
a compiler bug. Compiler bugs might appear in rather bizarre ways, they
|
||||||
|
never make sense, and tend to emerge when you least expect them. In order
|
||||||
|
to identify one, drop optimization level, e.g. by editing CFLAG line in
|
||||||
|
top-level Makefile, recompile and re-run the test.
|
||||||
|
|
||||||
|
* I think I've found a bug, what should I do?
|
||||||
|
|
||||||
|
If you are a new user then it is quite likely you haven't found a bug and
|
||||||
|
something is happening you aren't familiar with. Check this FAQ, the associated
|
||||||
|
documentation and the mailing lists for similar queries. If you are still
|
||||||
|
unsure whether it is a bug or not submit a query to the openssl-users mailing
|
||||||
|
list.
|
||||||
|
|
||||||
|
|
||||||
|
* I'm SURE I've found a bug, how do I report it?
|
||||||
|
|
||||||
|
Bug reports with no security implications should be sent to the request
|
||||||
|
tracker. This can be done by mailing the report to <rt@openssl.org> (or its
|
||||||
|
alias <openssl-bugs@openssl.org>), please note that messages sent to the
|
||||||
|
request tracker also appear in the public openssl-dev mailing list.
|
||||||
|
|
||||||
|
The report should be in plain text. Any patches should be sent as
|
||||||
|
plain text attachments because some mailers corrupt patches sent inline.
|
||||||
|
If your issue affects multiple versions of OpenSSL check any patches apply
|
||||||
|
cleanly and, if possible include patches to each affected version.
|
||||||
|
|
||||||
|
The report should be given a meaningful subject line briefly summarising the
|
||||||
|
issue. Just "bug in OpenSSL" or "bug in OpenSSL 0.9.8n" is not very helpful.
|
||||||
|
|
||||||
|
By sending reports to the request tracker the bug can then be given a priority
|
||||||
|
and assigned to the appropriate maintainer. The history of discussions can be
|
||||||
|
accessed and if the issue has been addressed or a reason why not. If patches
|
||||||
|
are only sent to openssl-dev they can be mislaid if a team member has to
|
||||||
|
wade through months of old messages to review the discussion.
|
||||||
|
|
||||||
|
See also <URL: http://www.openssl.org/support/rt.html>
|
||||||
|
|
||||||
|
|
||||||
|
* I've found a security issue, how do I report it?
|
||||||
|
|
||||||
|
If you think your bug has security implications then please send it to
|
||||||
|
openssl-security@openssl.org if you don't get a prompt reply at least
|
||||||
|
acknowledging receipt then resend or mail it directly to one of the
|
||||||
|
more active team members (e.g. Steve).
|
||||||
|
|
||||||
|
Note that bugs only present in the openssl utility are not in general
|
||||||
|
considered to be security issues.
|
||||||
|
|
||||||
[PROG] ========================================================================
|
[PROG] ========================================================================
|
||||||
|
|
||||||
* Is OpenSSL thread-safe?
|
* Is OpenSSL thread-safe?
|
||||||
@@ -563,8 +777,11 @@ libraries. If your platform is not one of these, consult the INSTALL
|
|||||||
file.
|
file.
|
||||||
|
|
||||||
Multi-threaded applications must provide two callback functions to
|
Multi-threaded applications must provide two callback functions to
|
||||||
OpenSSL. This is described in the threads(3) manpage.
|
OpenSSL by calling CRYPTO_set_locking_callback() and
|
||||||
|
CRYPTO_set_id_callback(), for all versions of OpenSSL up to and
|
||||||
|
including 0.9.8[abc...]. As of version 1.0.0, CRYPTO_set_id_callback()
|
||||||
|
and associated APIs are deprecated by CRYPTO_THREADID_set_callback()
|
||||||
|
and friends. This is described in the threads(3) manpage.
|
||||||
|
|
||||||
* I've compiled a program under Windows and it crashes: why?
|
* I've compiled a program under Windows and it crashes: why?
|
||||||
|
|
||||||
@@ -584,10 +801,10 @@ your application must link against the same by which OpenSSL was
|
|||||||
built. If you are using MS Visual C++ (Studio) this can be changed
|
built. If you are using MS Visual C++ (Studio) this can be changed
|
||||||
by:
|
by:
|
||||||
|
|
||||||
1. Select Settings... from the Project Menu.
|
1. Select Settings... from the Project Menu.
|
||||||
2. Select the C/C++ Tab.
|
2. Select the C/C++ Tab.
|
||||||
3. Select "Code Generation from the "Category" drop down list box
|
3. Select "Code Generation from the "Category" drop down list box
|
||||||
4. Select the Appropriate library (see table below) from the "Use
|
4. Select the Appropriate library (see table below) from the "Use
|
||||||
run-time library" drop down list box. Perform this step for both
|
run-time library" drop down list box. Perform this step for both
|
||||||
your debug and release versions of your application (look at the
|
your debug and release versions of your application (look at the
|
||||||
top left of the settings panel to change between the two)
|
top left of the settings panel to change between the two)
|
||||||
@@ -606,30 +823,44 @@ by:
|
|||||||
Note that debug and release libraries are NOT interchangeable. If you
|
Note that debug and release libraries are NOT interchangeable. If you
|
||||||
built OpenSSL with /MD your application must use /MD and cannot use /MDd.
|
built OpenSSL with /MD your application must use /MD and cannot use /MDd.
|
||||||
|
|
||||||
|
As per 0.9.8 the above limitation is eliminated for .DLLs. OpenSSL
|
||||||
|
.DLLs compiled with some specific run-time option [we insist on the
|
||||||
|
default /MD] can be deployed with application compiled with different
|
||||||
|
option or even different compiler. But there is a catch! Instead of
|
||||||
|
re-compiling OpenSSL toolkit, as you would have to with prior versions,
|
||||||
|
you have to compile small C snippet with compiler and/or options of
|
||||||
|
your choice. The snippet gets installed as
|
||||||
|
<install-root>/include/openssl/applink.c and should be either added to
|
||||||
|
your application project or simply #include-d in one [and only one]
|
||||||
|
of your application source files. Failure to link this shim module
|
||||||
|
into your application manifests itself as fatal "no OPENSSL_Applink"
|
||||||
|
run-time error. An explicit reminder is due that in this situation
|
||||||
|
[mixing compiler options] it is as important to add CRYPTO_malloc_init
|
||||||
|
prior first call to OpenSSL.
|
||||||
|
|
||||||
* How do I read or write a DER encoded buffer using the ASN1 functions?
|
* How do I read or write a DER encoded buffer using the ASN1 functions?
|
||||||
|
|
||||||
You have two options. You can either use a memory BIO in conjunction
|
You have two options. You can either use a memory BIO in conjunction
|
||||||
with the i2d_XXX_bio() or d2i_XXX_bio() functions or you can use the
|
with the i2d_*_bio() or d2i_*_bio() functions or you can use the
|
||||||
i2d_XXX(), d2i_XXX() functions directly. Since these are often the
|
i2d_*(), d2i_*() functions directly. Since these are often the
|
||||||
cause of grief here are some code fragments using PKCS7 as an example:
|
cause of grief here are some code fragments using PKCS7 as an example:
|
||||||
|
|
||||||
unsigned char *buf, *p;
|
unsigned char *buf, *p;
|
||||||
int len;
|
int len;
|
||||||
|
|
||||||
len = i2d_PKCS7(p7, NULL);
|
len = i2d_PKCS7(p7, NULL);
|
||||||
buf = OPENSSL_malloc(len); /* or Malloc, error checking omitted */
|
buf = OPENSSL_malloc(len); /* or Malloc, error checking omitted */
|
||||||
p = buf;
|
p = buf;
|
||||||
i2d_PKCS7(p7, &p);
|
i2d_PKCS7(p7, &p);
|
||||||
|
|
||||||
At this point buf contains the len bytes of the DER encoding of
|
At this point buf contains the len bytes of the DER encoding of
|
||||||
p7.
|
p7.
|
||||||
|
|
||||||
The opposite assumes we already have len bytes in buf:
|
The opposite assumes we already have len bytes in buf:
|
||||||
|
|
||||||
unsigned char *p;
|
unsigned char *p;
|
||||||
p = buf;
|
p = buf;
|
||||||
p7 = d2i_PKCS7(NULL, &p, len);
|
p7 = d2i_PKCS7(NULL, &p, len);
|
||||||
|
|
||||||
At this point p7 contains a valid PKCS7 structure of NULL if an error
|
At this point p7 contains a valid PKCS7 structure of NULL if an error
|
||||||
occurred. If an error occurred ERR_print_errors(bio) should give more
|
occurred. If an error occurred ERR_print_errors(bio) should give more
|
||||||
@@ -644,6 +875,20 @@ and attempts to free the buffer will have unpredictable results
|
|||||||
because it no longer points to the same address.
|
because it no longer points to the same address.
|
||||||
|
|
||||||
|
|
||||||
|
* OpenSSL uses DER but I need BER format: does OpenSSL support BER?
|
||||||
|
|
||||||
|
The short answer is yes, because DER is a special case of BER and OpenSSL
|
||||||
|
ASN1 decoders can process BER.
|
||||||
|
|
||||||
|
The longer answer is that ASN1 structures can be encoded in a number of
|
||||||
|
different ways. One set of ways is the Basic Encoding Rules (BER) with various
|
||||||
|
permissible encodings. A restriction of BER is the Distinguished Encoding
|
||||||
|
Rules (DER): these uniquely specify how a given structure is encoded.
|
||||||
|
|
||||||
|
Therefore, because DER is a special case of BER, DER is an acceptable encoding
|
||||||
|
for BER.
|
||||||
|
|
||||||
|
|
||||||
* I've tried using <M_some_evil_pkcs12_macro> and I get errors why?
|
* I've tried using <M_some_evil_pkcs12_macro> and I get errors why?
|
||||||
|
|
||||||
This usually happens when you try compiling something using the PKCS#12
|
This usually happens when you try compiling something using the PKCS#12
|
||||||
@@ -677,11 +922,11 @@ code itself (the hex digits after the second colon).
|
|||||||
|
|
||||||
* Why do I get errors about unknown algorithms?
|
* Why do I get errors about unknown algorithms?
|
||||||
|
|
||||||
This can happen under several circumstances such as reading in an
|
The cause is forgetting to load OpenSSL's table of algorithms with
|
||||||
encrypted private key or attempting to decrypt a PKCS#12 file. The cause
|
OpenSSL_add_all_algorithms(). See the manual page for more information. This
|
||||||
is forgetting to load OpenSSL's table of algorithms with
|
can cause several problems such as being unable to read in an encrypted
|
||||||
OpenSSL_add_all_algorithms(). See the manual page for more information.
|
PEM file, unable to decrypt a PKCS#12 file or signature failure when
|
||||||
|
verifying certificates.
|
||||||
|
|
||||||
* Why can't the OpenSSH configure script detect OpenSSL?
|
* Why can't the OpenSSH configure script detect OpenSSL?
|
||||||
|
|
||||||
@@ -696,6 +941,7 @@ The general answer is to check the config.log file generated when running
|
|||||||
the OpenSSH configure script. It should contain the detailed information
|
the OpenSSH configure script. It should contain the detailed information
|
||||||
on why the OpenSSL library was not detected or considered incompatible.
|
on why the OpenSSL library was not detected or considered incompatible.
|
||||||
|
|
||||||
|
|
||||||
* Can I use OpenSSL's SSL library with non-blocking I/O?
|
* Can I use OpenSSL's SSL library with non-blocking I/O?
|
||||||
|
|
||||||
Yes; make sure to read the SSL_get_error(3) manual page!
|
Yes; make sure to read the SSL_get_error(3) manual page!
|
||||||
@@ -725,5 +971,69 @@ The correct name according to RFC2256 (LDAP) is x500UniqueIdentifier.
|
|||||||
Change your code to use the new name when compiling against OpenSSL 0.9.7.
|
Change your code to use the new name when compiling against OpenSSL 0.9.7.
|
||||||
|
|
||||||
|
|
||||||
===============================================================================
|
* I think I've detected a memory leak, is this a bug?
|
||||||
|
|
||||||
|
In most cases the cause of an apparent memory leak is an OpenSSL internal table
|
||||||
|
that is allocated when an application starts up. Since such tables do not grow
|
||||||
|
in size over time they are harmless.
|
||||||
|
|
||||||
|
These internal tables can be freed up when an application closes using various
|
||||||
|
functions. Currently these include following:
|
||||||
|
|
||||||
|
Thread-local cleanup functions:
|
||||||
|
|
||||||
|
ERR_remove_state()
|
||||||
|
|
||||||
|
Application-global cleanup functions that are aware of usage (and therefore
|
||||||
|
thread-safe):
|
||||||
|
|
||||||
|
ENGINE_cleanup() and CONF_modules_unload()
|
||||||
|
|
||||||
|
"Brutal" (thread-unsafe) Application-global cleanup functions:
|
||||||
|
|
||||||
|
ERR_free_strings(), EVP_cleanup() and CRYPTO_cleanup_all_ex_data().
|
||||||
|
|
||||||
|
|
||||||
|
* Why does Valgrind complain about the use of uninitialized data?
|
||||||
|
|
||||||
|
When OpenSSL's PRNG routines are called to generate random numbers the supplied
|
||||||
|
buffer contents are mixed into the entropy pool: so it technically does not
|
||||||
|
matter whether the buffer is initialized at this point or not. Valgrind (and
|
||||||
|
other test tools) will complain about this. When using Valgrind, make sure the
|
||||||
|
OpenSSL library has been compiled with the PURIFY macro defined (-DPURIFY)
|
||||||
|
to get rid of these warnings.
|
||||||
|
|
||||||
|
|
||||||
|
* Why doesn't a memory BIO work when a file does?
|
||||||
|
|
||||||
|
This can occur in several cases for example reading an S/MIME email message.
|
||||||
|
The reason is that a memory BIO can do one of two things when all the data
|
||||||
|
has been read from it.
|
||||||
|
|
||||||
|
The default behaviour is to indicate that no more data is available and that
|
||||||
|
the call should be retried, this is to allow the application to fill up the BIO
|
||||||
|
again if necessary.
|
||||||
|
|
||||||
|
Alternatively it can indicate that no more data is available and that EOF has
|
||||||
|
been reached.
|
||||||
|
|
||||||
|
If a memory BIO is to behave in the same way as a file this second behaviour
|
||||||
|
is needed. This must be done by calling:
|
||||||
|
|
||||||
|
BIO_set_mem_eof_return(bio, 0);
|
||||||
|
|
||||||
|
See the manual pages for more details.
|
||||||
|
|
||||||
|
|
||||||
|
* Where are the declarations and implementations of d2i_X509() etc?
|
||||||
|
|
||||||
|
These are defined and implemented by macros of the form:
|
||||||
|
|
||||||
|
|
||||||
|
DECLARE_ASN1_FUNCTIONS(X509) and IMPLEMENT_ASN1_FUNCTIONS(X509)
|
||||||
|
|
||||||
|
The implementation passes an ASN1 "template" defining the structure into an
|
||||||
|
ASN1 interpreter using generalised functions such as ASN1_item_d2i().
|
||||||
|
|
||||||
|
|
||||||
|
===============================================================================
|
||||||
|
|||||||
74
INSTALL
74
INSTALL
@@ -2,8 +2,10 @@
|
|||||||
INSTALLATION ON THE UNIX PLATFORM
|
INSTALLATION ON THE UNIX PLATFORM
|
||||||
---------------------------------
|
---------------------------------
|
||||||
|
|
||||||
[Installation on DOS (with djgpp), Windows, OpenVMS and MacOS (before MacOS X)
|
[Installation on DOS (with djgpp), Windows, OpenVMS, MacOS (before MacOS X)
|
||||||
is described in INSTALL.DJGPP, INSTALL.W32, INSTALL.VMS and INSTALL.MacOS.
|
and NetWare is described in INSTALL.DJGPP, INSTALL.W32, INSTALL.VMS,
|
||||||
|
INSTALL.MacOS and INSTALL.NW.
|
||||||
|
|
||||||
This document describes installation on operating systems in the Unix
|
This document describes installation on operating systems in the Unix
|
||||||
family.]
|
family.]
|
||||||
|
|
||||||
@@ -73,18 +75,40 @@
|
|||||||
no-asm Do not use assembler code.
|
no-asm Do not use assembler code.
|
||||||
|
|
||||||
386 Use the 80386 instruction set only (the default x86 code is
|
386 Use the 80386 instruction set only (the default x86 code is
|
||||||
more efficient, but requires at least a 486).
|
more efficient, but requires at least a 486). Note: Use
|
||||||
|
compiler flags for any other CPU specific configuration,
|
||||||
|
e.g. "-m32" to build x86 code on an x64 system.
|
||||||
|
|
||||||
|
no-sse2 Exclude SSE2 code pathes. Normally SSE2 extention is
|
||||||
|
detected at run-time, but the decision whether or not the
|
||||||
|
machine code will be executed is taken solely on CPU
|
||||||
|
capability vector. This means that if you happen to run OS
|
||||||
|
kernel which does not support SSE2 extension on Intel P4
|
||||||
|
processor, then your application might be exposed to
|
||||||
|
"illegal instruction" exception. There might be a way
|
||||||
|
to enable support in kernel, e.g. FreeBSD kernel can be
|
||||||
|
compiled with CPU_ENABLE_SSE, and there is a way to
|
||||||
|
disengage SSE2 code pathes upon application start-up,
|
||||||
|
but if you aim for wider "audience" running such kernel,
|
||||||
|
consider no-sse2. Both 386 and no-asm options above imply
|
||||||
|
no-sse2.
|
||||||
|
|
||||||
no-<cipher> Build without the specified cipher (bf, cast, des, dh, dsa,
|
no-<cipher> Build without the specified cipher (bf, cast, des, dh, dsa,
|
||||||
hmac, md2, md5, mdc2, rc2, rc4, rc5, rsa, sha).
|
hmac, md2, md5, mdc2, rc2, rc4, rc5, rsa, sha).
|
||||||
The crypto/<cipher> directory can be removed after running
|
The crypto/<cipher> directory can be removed after running
|
||||||
"make depend".
|
"make depend".
|
||||||
|
|
||||||
-Dxxx, -lxxx, -Lxxx, -fxxx, -Kxxx These system specific options will
|
-Dxxx, -lxxx, -Lxxx, -fxxx, -mXXX, -Kxxx These system specific options will
|
||||||
be passed through to the compiler to allow you to
|
be passed through to the compiler to allow you to
|
||||||
define preprocessor symbols, specify additional libraries,
|
define preprocessor symbols, specify additional libraries,
|
||||||
library directories or other compiler options.
|
library directories or other compiler options.
|
||||||
|
|
||||||
|
-DHAVE_CRYPTODEV Enable the BSD cryptodev engine even if we are not using
|
||||||
|
BSD. Useful if you are running ocf-linux or something
|
||||||
|
similar. Once enabled you can also enable the use of
|
||||||
|
cryptodev digests, which is usually slower unless you have
|
||||||
|
large amounts data. Use -DUSE_CRYPTODEV_DIGESTS to force
|
||||||
|
it.
|
||||||
|
|
||||||
Installation in Detail
|
Installation in Detail
|
||||||
----------------------
|
----------------------
|
||||||
@@ -140,8 +164,8 @@
|
|||||||
standard headers). If it is a problem with OpenSSL itself, please
|
standard headers). If it is a problem with OpenSSL itself, please
|
||||||
report the problem to <openssl-bugs@openssl.org> (note that your
|
report the problem to <openssl-bugs@openssl.org> (note that your
|
||||||
message will be recorded in the request tracker publicly readable
|
message will be recorded in the request tracker publicly readable
|
||||||
via http://www.openssl.org/rt2.html and will be forwarded to a public
|
via http://www.openssl.org/support/rt.html and will be forwarded to a
|
||||||
mailing list). Include the output of "make report" in your message.
|
public mailing list). Include the output of "make report" in your message.
|
||||||
Please check out the request tracker. Maybe the bug was already
|
Please check out the request tracker. Maybe the bug was already
|
||||||
reported or has already been fixed.
|
reported or has already been fixed.
|
||||||
|
|
||||||
@@ -158,11 +182,11 @@
|
|||||||
If a test fails, look at the output. There may be reasons for
|
If a test fails, look at the output. There may be reasons for
|
||||||
the failure that isn't a problem in OpenSSL itself (like a missing
|
the failure that isn't a problem in OpenSSL itself (like a missing
|
||||||
or malfunctioning bc). If it is a problem with OpenSSL itself,
|
or malfunctioning bc). If it is a problem with OpenSSL itself,
|
||||||
try removing any compiler optimization flags from the CFLAGS line
|
try removing any compiler optimization flags from the CFLAG line
|
||||||
in Makefile.ssl and run "make clean; make". Please send a bug
|
in Makefile.ssl and run "make clean; make". Please send a bug
|
||||||
report to <openssl-bugs@openssl.org>, including the output of
|
report to <openssl-bugs@openssl.org>, including the output of
|
||||||
"make report" in order to be added to the request tracker at
|
"make report" in order to be added to the request tracker at
|
||||||
http://www.openssl.org/rt2.html.
|
http://www.openssl.org/support/rt.html.
|
||||||
|
|
||||||
4. If everything tests ok, install OpenSSL with
|
4. If everything tests ok, install OpenSSL with
|
||||||
|
|
||||||
@@ -188,6 +212,10 @@
|
|||||||
compile programs with libcrypto or libssl.
|
compile programs with libcrypto or libssl.
|
||||||
lib Contains the OpenSSL library files themselves.
|
lib Contains the OpenSSL library files themselves.
|
||||||
|
|
||||||
|
Use "make install_sw" to install the software without documentation,
|
||||||
|
and "install_docs_html" to install HTML renditions of the manual
|
||||||
|
pages.
|
||||||
|
|
||||||
Package builders who want to configure the library for standard
|
Package builders who want to configure the library for standard
|
||||||
locations, but have the package installed somewhere else so that
|
locations, but have the package installed somewhere else so that
|
||||||
it can easily be packaged, can use
|
it can easily be packaged, can use
|
||||||
@@ -284,10 +312,10 @@
|
|||||||
Note on shared libraries
|
Note on shared libraries
|
||||||
------------------------
|
------------------------
|
||||||
|
|
||||||
Shared library is currently an experimental feature. The only reason to
|
Shared libraries have certain caveats. Binary backward compatibility
|
||||||
have them would be to conserve memory on systems where several program
|
can't be guaranteed before OpenSSL version 1.0. The only reason to
|
||||||
are using OpenSSL. Binary backward compatibility can't be guaranteed
|
use them would be to conserve memory on systems where several programs
|
||||||
before OpenSSL version 1.0.
|
are using OpenSSL.
|
||||||
|
|
||||||
For some systems, the OpenSSL Configure script knows what is needed to
|
For some systems, the OpenSSL Configure script knows what is needed to
|
||||||
build shared libraries for libcrypto and libssl. On these systems,
|
build shared libraries for libcrypto and libssl. On these systems,
|
||||||
@@ -308,3 +336,25 @@
|
|||||||
to install additional support software to obtain random seed.
|
to install additional support software to obtain random seed.
|
||||||
Please check out the manual pages for RAND_add(), RAND_bytes(), RAND_egd(),
|
Please check out the manual pages for RAND_add(), RAND_bytes(), RAND_egd(),
|
||||||
and the FAQ for more information.
|
and the FAQ for more information.
|
||||||
|
|
||||||
|
Note on support for multiple builds
|
||||||
|
-----------------------------------
|
||||||
|
|
||||||
|
OpenSSL is usually built in its source tree. Unfortunately, this doesn't
|
||||||
|
support building for multiple platforms from the same source tree very well.
|
||||||
|
It is however possible to build in a separate tree through the use of lots
|
||||||
|
of symbolic links, which should be prepared like this:
|
||||||
|
|
||||||
|
mkdir -p objtree/"`uname -s`-`uname -r`-`uname -m`"
|
||||||
|
cd objtree/"`uname -s`-`uname -r`-`uname -m`"
|
||||||
|
(cd $OPENSSL_SOURCE; find . -type f) | while read F; do
|
||||||
|
mkdir -p `dirname $F`
|
||||||
|
rm -f $F; ln -s $OPENSSL_SOURCE/$F $F
|
||||||
|
echo $F '->' $OPENSSL_SOURCE/$F
|
||||||
|
done
|
||||||
|
make -f Makefile.org clean
|
||||||
|
|
||||||
|
OPENSSL_SOURCE is an environment variable that contains the absolute (this
|
||||||
|
is important!) path to the OpenSSL source tree.
|
||||||
|
|
||||||
|
Also, operations like 'make update' should still be made in the source tree.
|
||||||
|
|||||||
@@ -3,32 +3,45 @@
|
|||||||
INSTALLATION ON THE DOS PLATFORM WITH DJGPP
|
INSTALLATION ON THE DOS PLATFORM WITH DJGPP
|
||||||
-------------------------------------------
|
-------------------------------------------
|
||||||
|
|
||||||
Openssl has been ported to DOS, but only with long filename support. If
|
OpenSSL has been ported to DJGPP, a Unix look-alike 32-bit run-time
|
||||||
you wish to compile on native DOS with 8+3 filenames, you will have to
|
environment for 16-bit DOS, but only with long filename support.
|
||||||
tweak the installation yourself, including renaming files with illegal
|
If you wish to compile on native DOS with 8+3 filenames, you will
|
||||||
or duplicate names.
|
have to tweak the installation yourself, including renaming files
|
||||||
|
with illegal or duplicate names.
|
||||||
|
|
||||||
You should have a full DJGPP environment installed, including the
|
You should have a full DJGPP environment installed, including the
|
||||||
latest versions of DJGPP, GCC, BINUTILS, BASH, etc. This package
|
latest versions of DJGPP, GCC, BINUTILS, BASH, etc. This package
|
||||||
requires that PERL and BC also be installed.
|
requires that PERL and BC also be installed.
|
||||||
|
|
||||||
All of these can be obtained from the usual DJGPP mirror sites, such
|
All of these can be obtained from the usual DJGPP mirror sites or
|
||||||
as "ftp://ftp.simtel.net/pub/simtelnet/gnu/djgpp". You also need to
|
directly at "http://www.delorie.com/pub/djgpp". For help on which
|
||||||
have the WATT-32 networking package installed before you try to compile
|
files to download, see the DJGPP "ZIP PICKER" page at
|
||||||
openssl. This can be obtained from "http://www.bgnett.no/~giva/".
|
"http://www.delorie.com/djgpp/zip-picker.html". You also need to have
|
||||||
|
the WATT-32 networking package installed before you try to compile
|
||||||
|
OpenSSL. This can be obtained from "http://www.bgnett.no/~giva/".
|
||||||
The Makefile assumes that the WATT-32 code is in the directory
|
The Makefile assumes that the WATT-32 code is in the directory
|
||||||
specified by the environment variable WATT_ROOT. If you have watt-32
|
specified by the environment variable WATT_ROOT. If you have watt-32
|
||||||
in directory "watt32" under your main DJGPP directory, specify
|
in directory "watt32" under your main DJGPP directory, specify
|
||||||
WATT_ROOT="/dev/env/DJDIR/watt32".
|
WATT_ROOT="/dev/env/DJDIR/watt32".
|
||||||
|
|
||||||
To compile openssl, start your BASH shell. Then configure for DOS by
|
To compile OpenSSL, start your BASH shell, then configure for DJGPP by
|
||||||
running "./Configure" with appropriate arguments. The basic syntax for
|
running "./Configure" with appropriate arguments:
|
||||||
DOS is:
|
|
||||||
./Configure no-threads --prefix=/dev/env/DJDIR DJGPP
|
|
||||||
|
|
||||||
You may run out of DPMI selectors when running in a DOS box under
|
./Configure no-threads --prefix=/dev/env/DJDIR DJGPP
|
||||||
Windows. If so, just close the BASH shell, go back to Windows, and
|
|
||||||
restart BASH. Then run "make" again.
|
|
||||||
|
|
||||||
Building openssl under DJGPP has been tested with DJGPP 2.03,
|
And finally fire up "make". You may run out of DPMI selectors when
|
||||||
GCC 2.952, GCC 2.953, perl 5.005_02 and perl 5.006_01.
|
running in a DOS box under Windows. If so, just close the BASH
|
||||||
|
shell, go back to Windows, and restart BASH. Then run "make" again.
|
||||||
|
|
||||||
|
RUN-TIME CAVEAT LECTOR
|
||||||
|
--------------
|
||||||
|
|
||||||
|
Quoting FAQ:
|
||||||
|
|
||||||
|
"Cryptographic software needs a source of unpredictable data to work
|
||||||
|
correctly. Many open source operating systems provide a "randomness
|
||||||
|
device" (/dev/urandom or /dev/random) that serves this purpose."
|
||||||
|
|
||||||
|
As of version 0.9.7f DJGPP port checks upon /dev/urandom$ for a 3rd
|
||||||
|
party "randomness" DOS driver. One such driver, NOISE.SYS, can be
|
||||||
|
obtained from "http://www.rahul.net/dkaufman/index.html".
|
||||||
|
|||||||
454
INSTALL.NW
Normal file
454
INSTALL.NW
Normal file
@@ -0,0 +1,454 @@
|
|||||||
|
|
||||||
|
INSTALLATION ON THE NETWARE PLATFORM
|
||||||
|
------------------------------------
|
||||||
|
|
||||||
|
Notes about building OpenSSL for NetWare.
|
||||||
|
|
||||||
|
|
||||||
|
BUILD PLATFORM:
|
||||||
|
---------------
|
||||||
|
The build scripts (batch files, perl scripts, etc) have been developed and
|
||||||
|
tested on W2K. The scripts should run fine on other Windows platforms
|
||||||
|
(NT, Win9x, WinXP) but they have not been tested. They may require some
|
||||||
|
modifications.
|
||||||
|
|
||||||
|
|
||||||
|
Supported NetWare Platforms - NetWare 5.x, NetWare 6.x:
|
||||||
|
-------------------------------------------------------
|
||||||
|
OpenSSL can either use the WinSock interfaces introduced in NetWare 5,
|
||||||
|
or the BSD socket interface. Previous versions of NetWare, 4.x and 3.x,
|
||||||
|
are only supported if OpenSSL is build for CLIB and BSD sockets;
|
||||||
|
WinSock builds only support NetWare 5 and up.
|
||||||
|
|
||||||
|
On NetWare there are two c-runtime libraries. There is the legacy CLIB
|
||||||
|
interfaces and the newer LIBC interfaces. Being ANSI-C libraries, the
|
||||||
|
functionality in CLIB and LIBC is similar but the LIBC interfaces are built
|
||||||
|
using Novell Kernal Services (NKS) which is designed to leverage
|
||||||
|
multi-processor environments.
|
||||||
|
|
||||||
|
The NetWare port of OpenSSL can be configured to build using CLIB or LIBC.
|
||||||
|
The CLIB build was developed and tested using NetWare 5.0 sp6.0a. The LIBC
|
||||||
|
build was developed and tested using the NetWare 6.0 FCS.
|
||||||
|
|
||||||
|
The necessary LIBC functionality ships with NetWare 6. However, earlier
|
||||||
|
NetWare 5.x versions will require updates in order to run the OpenSSL LIBC
|
||||||
|
build (NetWare 5.1 SP8 is known to work).
|
||||||
|
|
||||||
|
As of June 2005, the LIBC build can be configured to use BSD sockets instead
|
||||||
|
of WinSock sockets. Call Configure (usually through netware\build.bat) using
|
||||||
|
a target of "netware-libc-bsdsock" instead of "netware-libc".
|
||||||
|
|
||||||
|
As of June 2007, support for CLIB and BSD sockets is also now available
|
||||||
|
using a target of "netware-clib-bsdsock" instead of "netware-clib";
|
||||||
|
also gcc builds are now supported on both Linux and Win32 (post 0.9.8e).
|
||||||
|
|
||||||
|
REQUIRED TOOLS:
|
||||||
|
---------------
|
||||||
|
Based upon the configuration and build options used, some or all of the
|
||||||
|
following tools may be required:
|
||||||
|
|
||||||
|
* Perl for Win32 - required (http://www.activestate.com/ActivePerl)
|
||||||
|
Used to run the various perl scripts on the build platform.
|
||||||
|
|
||||||
|
* Perl 5.8.0 for NetWare v3.20 (or later) - required
|
||||||
|
(http://developer.novell.com) Used to run the test script on NetWare
|
||||||
|
after building.
|
||||||
|
|
||||||
|
* Compiler / Linker - required:
|
||||||
|
Metrowerks CodeWarrior PDK 2.1 (or later) for NetWare (commercial):
|
||||||
|
Provides command line tools used for building.
|
||||||
|
Tools:
|
||||||
|
mwccnlm.exe - C/C++ Compiler for NetWare
|
||||||
|
mwldnlm.exe - Linker for NetWare
|
||||||
|
mwasmnlm.exe - x86 assembler for NetWare (if using assembly option)
|
||||||
|
|
||||||
|
gcc / nlmconv Cross-Compiler, available from Novell Forge (free):
|
||||||
|
http://forge.novell.com/modules/xfmod/project/?aunixnw
|
||||||
|
|
||||||
|
* Assemblers - optional:
|
||||||
|
If you intend to build using the assembly options you will need an
|
||||||
|
assembler. Work has been completed to support two assemblers, Metrowerks
|
||||||
|
and NASM. However, during development, a bug was found in the Metrowerks
|
||||||
|
assembler which generates incorrect code. Until this problem is fixed,
|
||||||
|
the Metrowerks assembler cannot be used.
|
||||||
|
|
||||||
|
mwasmnlm.exe - Metrowerks x86 assembler - part of CodeWarrior tools.
|
||||||
|
(version 2.2 Built Aug 23, 1999 - not useable due to code
|
||||||
|
generation bug)
|
||||||
|
|
||||||
|
nasmw.exe - Netwide Assembler NASM
|
||||||
|
version 0.98 was used in development and testing
|
||||||
|
|
||||||
|
* Make Tool - required:
|
||||||
|
In order to build you will need a make tool. Two make tools are
|
||||||
|
supported, GNU make (gmake.exe) or Microsoft nmake.exe.
|
||||||
|
|
||||||
|
make.exe - GNU make for Windows (version 3.75 used for development)
|
||||||
|
http://gnuwin32.sourceforge.net/packages/make.htm
|
||||||
|
|
||||||
|
nmake.exe - Microsoft make (Version 6.00.8168.0 used for development)
|
||||||
|
http://support.microsoft.com/kb/132084/EN-US/
|
||||||
|
|
||||||
|
* Novell Developer Kit (NDK) - required: (http://developer.novell.com)
|
||||||
|
|
||||||
|
CLIB - BUILDS:
|
||||||
|
|
||||||
|
WinSock2 Developer Components for NetWare:
|
||||||
|
For initial development, the October 27, 2000 version was used.
|
||||||
|
However, future versions should also work.
|
||||||
|
|
||||||
|
NOTE: The WinSock2 components include headers & import files for
|
||||||
|
NetWare, but you will also need the winsock2.h and supporting
|
||||||
|
headers (pshpack4.h, poppack.h, qos.h) delivered in the
|
||||||
|
Microsoft SDK. Note: The winsock2.h support headers may change
|
||||||
|
with various versions of winsock2.h. Check the dependencies
|
||||||
|
section on the NDK WinSock2 download page for the latest
|
||||||
|
information on dependencies. These components are unsupported by
|
||||||
|
Novell. They are provided as a courtesy, but it is strongly
|
||||||
|
suggested that all development be done using LIBC, not CLIB.
|
||||||
|
|
||||||
|
As of June 2005, the WinSock2 components are available at:
|
||||||
|
http://forgeftp.novell.com//ws2comp/
|
||||||
|
|
||||||
|
|
||||||
|
NLM and NetWare libraries for C (including CLIB and XPlat):
|
||||||
|
If you are going to build a CLIB version of OpenSSL, you will
|
||||||
|
need the CLIB headers and imports. The March, 2001 NDK release or
|
||||||
|
later is recommended.
|
||||||
|
|
||||||
|
Earlier versions should work but haven't been tested. In recent
|
||||||
|
versions the import files have been consolidated and function
|
||||||
|
names moved. This means you may run into link problems
|
||||||
|
(undefined symbols) when using earlier versions. The functions
|
||||||
|
are available in earlier versions, but you will have to modifiy
|
||||||
|
the make files to include additional import files (see
|
||||||
|
openssl\util\pl\netware.pl).
|
||||||
|
|
||||||
|
|
||||||
|
LIBC - BUILDS:
|
||||||
|
|
||||||
|
Libraries for C (LIBC) - LIBC headers and import files
|
||||||
|
If you are going to build a LIBC version of OpenSSL, you will
|
||||||
|
need the LIBC headers and imports. The March 14, 2002 NDK release or
|
||||||
|
later is required.
|
||||||
|
|
||||||
|
NOTE: The LIBC SDK includes the necessary WinSock2 support.
|
||||||
|
It is not necessary to download the WinSock2 NDK when building for
|
||||||
|
LIBC. The LIBC SDK also includes the appropriate BSD socket support
|
||||||
|
if configuring to use BSD sockets.
|
||||||
|
|
||||||
|
|
||||||
|
BUILDING:
|
||||||
|
---------
|
||||||
|
Before building, you will need to set a few environment variables. You can
|
||||||
|
set them manually or you can modify the "netware\set_env.bat" file.
|
||||||
|
|
||||||
|
The set_env.bat file is a template you can use to set up the path
|
||||||
|
and environment variables you will need to build. Modify the
|
||||||
|
various lines to point to YOUR tools and run set_env.bat.
|
||||||
|
|
||||||
|
netware\set_env.bat <target> [compiler]
|
||||||
|
|
||||||
|
target - "netware-clib" - CLIB NetWare build
|
||||||
|
- "netware-libc" - LIBC NetWare build
|
||||||
|
|
||||||
|
compiler - "gnuc" - GNU GCC Compiler
|
||||||
|
- "codewarrior" - MetroWerks CodeWarrior (default)
|
||||||
|
|
||||||
|
If you don't use set_env.bat, you will need to set up the following
|
||||||
|
environment variables:
|
||||||
|
|
||||||
|
PATH - Set PATH to point to the tools you will use.
|
||||||
|
|
||||||
|
INCLUDE - The location of the NDK include files.
|
||||||
|
|
||||||
|
CLIB ex: set INCLUDE=c:\ndk\nwsdk\include\nlm
|
||||||
|
LIBC ex: set INCLUDE=c:\ndk\libc\include
|
||||||
|
|
||||||
|
PRELUDE - The absolute path of the prelude object to link with. For
|
||||||
|
a CLIB build it is recommended you use the "clibpre.o" files shipped
|
||||||
|
with the Metrowerks PDK for NetWare. For a LIBC build you should
|
||||||
|
use the "libcpre.o" file delivered with the LIBC NDK components.
|
||||||
|
|
||||||
|
CLIB ex: set PRELUDE=c:\ndk\nwsdk\imports\clibpre.o
|
||||||
|
LIBC ex: set PRELUDE=c:\ndk\libc\imports\libcpre.o
|
||||||
|
|
||||||
|
IMPORTS - The locaton of the NDK import files.
|
||||||
|
|
||||||
|
CLIB ex: set IMPORTS=c:\ndk\nwsdk\imports
|
||||||
|
LIBC ex: set IMPORTS=c:\ndk\libc\imports
|
||||||
|
|
||||||
|
|
||||||
|
In order to build, you need to run the Perl scripts to configure the build
|
||||||
|
process and generate a make file. There is a batch file,
|
||||||
|
"netware\build.bat", to automate the process.
|
||||||
|
|
||||||
|
Build.bat runs the build configuration scripts and generates a make file.
|
||||||
|
If an assembly option is specified, it also runs the scripts to generate
|
||||||
|
the assembly code. Always run build.bat from the "openssl" directory.
|
||||||
|
|
||||||
|
netware\build [target] [debug opts] [assembly opts] [configure opts]
|
||||||
|
|
||||||
|
target - "netware-clib" - CLIB NetWare build (WinSock Sockets)
|
||||||
|
- "netware-clib-bsdsock" - CLIB NetWare build (BSD Sockets)
|
||||||
|
- "netware-libc" - LIBC NetWare build (WinSock Sockets)
|
||||||
|
- "netware-libc-bsdsock" - LIBC NetWare build (BSD Sockets)
|
||||||
|
|
||||||
|
debug opts - "debug" - build debug
|
||||||
|
|
||||||
|
assembly opts - "nw-mwasm" - use Metrowerks assembler
|
||||||
|
"nw-nasm" - use NASM assembler
|
||||||
|
"no-asm" - don't use assembly
|
||||||
|
|
||||||
|
configure opts- all unrecognized arguments are passed to the
|
||||||
|
perl 'configure' script. See that script for
|
||||||
|
internal documentation regarding options that
|
||||||
|
are available.
|
||||||
|
|
||||||
|
examples:
|
||||||
|
|
||||||
|
CLIB build, debug, without assembly:
|
||||||
|
netware\build.bat netware-clib debug no-asm
|
||||||
|
|
||||||
|
LIBC build, non-debug, using NASM assembly, add mdc2 support:
|
||||||
|
netware\build.bat netware-libc nw-nasm enable-mdc2
|
||||||
|
|
||||||
|
LIBC build, BSD sockets, non-debug, without assembly:
|
||||||
|
netware\build.bat netware-libc-bsdsock no-asm
|
||||||
|
|
||||||
|
Running build.bat generates a make file to be processed by your make
|
||||||
|
tool (gmake or nmake):
|
||||||
|
|
||||||
|
CLIB ex: gmake -f netware\nlm_clib_dbg.mak
|
||||||
|
LIBC ex: gmake -f netware\nlm_libc.mak
|
||||||
|
LIBC ex: gmake -f netware\nlm_libc_bsdsock.mak
|
||||||
|
|
||||||
|
|
||||||
|
You can also run the build scripts manually if you do not want to use the
|
||||||
|
build.bat file. Run the following scripts in the "\openssl"
|
||||||
|
subdirectory (in the order listed below):
|
||||||
|
|
||||||
|
perl configure no-asm [other config opts] [netware-clib|netware-libc|netware-libc-bsdsock]
|
||||||
|
configures no assembly build for specified netware environment
|
||||||
|
(CLIB or LIBC).
|
||||||
|
|
||||||
|
perl util\mkfiles.pl >MINFO
|
||||||
|
generates a listing of source files (used by mk1mf)
|
||||||
|
|
||||||
|
perl util\mk1mf.pl no-asm [other config opts] [netware-clib|netware-libc|netware-libc-bsdsock >netware\nlm.mak
|
||||||
|
generates the makefile for NetWare
|
||||||
|
|
||||||
|
gmake -f netware\nlm.mak
|
||||||
|
build with the make tool (nmake.exe also works)
|
||||||
|
|
||||||
|
NOTE: If you are building using the assembly option, you must also run the
|
||||||
|
various Perl scripts to generate the assembly files. See build.bat
|
||||||
|
for an example of running the various assembly scripts. You must use the
|
||||||
|
"no-asm" option to build without assembly. The configure and mk1mf scripts
|
||||||
|
also have various other options. See the scripts for more information.
|
||||||
|
|
||||||
|
|
||||||
|
The output from the build is placed in the following directories:
|
||||||
|
|
||||||
|
CLIB Debug build:
|
||||||
|
out_nw_clib.dbg - static libs & test nlm(s)
|
||||||
|
tmp_nw_clib.dbg - temporary build files
|
||||||
|
outinc_nw_clib - necessary include files
|
||||||
|
|
||||||
|
CLIB Non-debug build:
|
||||||
|
out_nw_clib - static libs & test nlm(s)
|
||||||
|
tmp_nw_clib - temporary build files
|
||||||
|
outinc_nw_clib - necesary include files
|
||||||
|
|
||||||
|
LIBC Debug build:
|
||||||
|
out_nw_libc.dbg - static libs & test nlm(s)
|
||||||
|
tmp_nw_libc.dbg - temporary build files
|
||||||
|
outinc_nw_libc - necessary include files
|
||||||
|
|
||||||
|
LIBC Non-debug build:
|
||||||
|
out_nw_libc - static libs & test nlm(s)
|
||||||
|
tmp_nw_libc - temporary build files
|
||||||
|
outinc_nw_libc - necesary include files
|
||||||
|
|
||||||
|
|
||||||
|
TESTING:
|
||||||
|
--------
|
||||||
|
The build process creates the OpenSSL static libs ( crypto.lib, ssl.lib,
|
||||||
|
rsaglue.lib ) and several test programs. You should copy the test programs
|
||||||
|
to your NetWare server and run the tests.
|
||||||
|
|
||||||
|
The batch file "netware\cpy_tests.bat" will copy all the necessary files
|
||||||
|
to your server for testing. In order to run the batch file, you need a
|
||||||
|
drive mapped to your target server. It will create an "OpenSSL" directory
|
||||||
|
on the drive and copy the test files to it. CAUTION: If a directory with the
|
||||||
|
name of "OpenSSL" already exists, it will be deleted.
|
||||||
|
|
||||||
|
To run cpy_tests.bat:
|
||||||
|
|
||||||
|
netware\cpy_tests [output directory] [NetWare drive]
|
||||||
|
|
||||||
|
output directory - "out_nw_clib.dbg", "out_nw_libc", etc.
|
||||||
|
NetWare drive - drive letter of mapped drive
|
||||||
|
|
||||||
|
CLIB ex: netware\cpy_tests out_nw_clib m:
|
||||||
|
LIBC ex: netware\cpy_tests out_nw_libc m:
|
||||||
|
|
||||||
|
|
||||||
|
The Perl script, "do_tests.pl", in the "OpenSSL" directory on the server
|
||||||
|
should be used to execute the tests. Before running the script, make sure
|
||||||
|
your SEARCH PATH includes the "OpenSSL" directory. For example, if you
|
||||||
|
copied the files to the "sys:" volume you use the command:
|
||||||
|
|
||||||
|
SEARCH ADD SYS:\OPENSSL
|
||||||
|
|
||||||
|
|
||||||
|
To run do_tests.pl type (at the console prompt):
|
||||||
|
|
||||||
|
perl \openssl\do_tests.pl [options]
|
||||||
|
|
||||||
|
options:
|
||||||
|
-p - pause after executing each test
|
||||||
|
|
||||||
|
The do_tests.pl script generates a log file "\openssl\test_out\tests.log"
|
||||||
|
which should be reviewed for errors. Any errors will be denoted by the word
|
||||||
|
"ERROR" in the log.
|
||||||
|
|
||||||
|
DEVELOPING WITH THE OPENSSL SDK:
|
||||||
|
--------------------------------
|
||||||
|
Now that everything is built and tested, you are ready to use the OpenSSL
|
||||||
|
libraries in your development.
|
||||||
|
|
||||||
|
There is no real installation procedure, just copy the static libs and
|
||||||
|
headers to your build location. The libs (crypto.lib & ssl.lib) are
|
||||||
|
located in the appropriate "out_nw_XXXX" directory
|
||||||
|
(out_nw_clib, out_nw_libc, etc).
|
||||||
|
|
||||||
|
The headers are located in the appropriate "outinc_nw_XXX" directory
|
||||||
|
(outinc_nw_clib, outinc_nw_libc).
|
||||||
|
|
||||||
|
One suggestion is to create the following directory
|
||||||
|
structure for the OpenSSL SDK:
|
||||||
|
|
||||||
|
\openssl
|
||||||
|
|- bin
|
||||||
|
| |- openssl.nlm
|
||||||
|
| |- (other tests you want)
|
||||||
|
|
|
||||||
|
|- lib
|
||||||
|
| | - crypto.lib
|
||||||
|
| | - ssl.lib
|
||||||
|
|
|
||||||
|
|- include
|
||||||
|
| | - openssl
|
||||||
|
| | | - (all the headers in "outinc_nw\openssl")
|
||||||
|
|
||||||
|
|
||||||
|
The program "openssl.nlm" can be very useful. It has dozens of
|
||||||
|
options and you may want to keep it handy for debugging, testing, etc.
|
||||||
|
|
||||||
|
When building your apps using OpenSSL, define "NETWARE". It is needed by
|
||||||
|
some of the OpenSSL headers. One way to do this is with a compile option,
|
||||||
|
for example "-DNETWARE".
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
NOTES:
|
||||||
|
------
|
||||||
|
|
||||||
|
Resource leaks in Tests
|
||||||
|
------------------------
|
||||||
|
Some OpenSSL tests do not clean up resources and NetWare reports
|
||||||
|
the resource leaks when the tests unload. If this really bugs you,
|
||||||
|
you can stop the messages by setting the developer option off at the console
|
||||||
|
prompt (set developer option = off). Or better yet, fix the tests to
|
||||||
|
clean up the resources!
|
||||||
|
|
||||||
|
|
||||||
|
Multi-threaded Development
|
||||||
|
---------------------------
|
||||||
|
The NetWare version of OpenSSL is thread-safe, however multi-threaded
|
||||||
|
applications must provide the necessary locking function callbacks. This
|
||||||
|
is described in doc\threads.doc. The file "openssl-x.x.x\crypto\threads\mttest.c"
|
||||||
|
is a multi-threaded test program and demonstrates the locking functions.
|
||||||
|
|
||||||
|
|
||||||
|
What is openssl2.nlm?
|
||||||
|
---------------------
|
||||||
|
The openssl program has numerous options and can be used for many different
|
||||||
|
things. Many of the options operate in an interactive mode requiring the
|
||||||
|
user to enter data. Because of this, a default screen is created for the
|
||||||
|
program. However, when running the test script it is not desirable to
|
||||||
|
have a seperate screen. Therefore, the build also creates openssl2.nlm.
|
||||||
|
Openssl2.nlm is functionally identical but uses the console screen.
|
||||||
|
Openssl2 can be used when a non-interactive mode is desired.
|
||||||
|
|
||||||
|
NOTE: There are may other possibilities (command line options, etc)
|
||||||
|
which could have been used to address the screen issue. The openssl2.nlm
|
||||||
|
option was chosen because it impacted only the build not the code.
|
||||||
|
|
||||||
|
|
||||||
|
Why only static libraries?
|
||||||
|
--------------------------
|
||||||
|
Globals, globals, and more globals. The OpenSSL code uses many global
|
||||||
|
variables that are allocated and initialized when used for the first time.
|
||||||
|
|
||||||
|
On NetWare, most applications (at least historically) run in the kernel.
|
||||||
|
When running in the kernel, there is one instance of global variables.
|
||||||
|
For regular application type NLM(s) this isn't a problem because they are
|
||||||
|
the only ones using the globals. However, for a library NLM (an NLM which
|
||||||
|
exposes functions and has no threads of execution), the globals cause
|
||||||
|
problems. Applications could inadvertently step on each other if they
|
||||||
|
change some globals. Even worse, the first application that triggers a
|
||||||
|
global to be allocated and initialized has the allocated memory charged to
|
||||||
|
itself. Now when that application unloads, NetWare will clean up all the
|
||||||
|
applicaton's memory. The global pointer variables inside OpenSSL now
|
||||||
|
point to freed memory. An abend waiting to happen!
|
||||||
|
|
||||||
|
To work correctly in the kernel, library NLM(s) that use globals need to
|
||||||
|
provide a set of globals (instance data) for each application. Another
|
||||||
|
option is to require the library only be loaded in a protected address
|
||||||
|
space along with the application using it.
|
||||||
|
|
||||||
|
Modifying the OpenSSL code to provide a set of globals (instance data) for
|
||||||
|
each application isn't technically difficult, but due to the large number
|
||||||
|
globals it would require substantial code changes and it wasn't done. Hence,
|
||||||
|
the build currently only builds static libraries which are then linked
|
||||||
|
into each application.
|
||||||
|
|
||||||
|
NOTE: If you are building a library NLM that uses the OpenSSL static
|
||||||
|
libraries, you will still have to deal with the global variable issue.
|
||||||
|
This is because when you link in the OpenSSL code you bring in all the
|
||||||
|
globals. One possible solution for the global pointer variables is to
|
||||||
|
register memory functions with OpenSSL which allocate memory and charge it
|
||||||
|
to your library NLM (see the function CRYPTO_set_mem_functions). However,
|
||||||
|
be aware that now all memory allocated by OpenSSL is charged to your NLM.
|
||||||
|
|
||||||
|
|
||||||
|
CodeWarrior Tools and W2K
|
||||||
|
---------------------------
|
||||||
|
There have been problems reported with the CodeWarrior Linker
|
||||||
|
(mwldnlm.exe) in the PDK 2.1 for NetWare when running on Windows 2000. The
|
||||||
|
problems cause the link step to fail. The only work around is to obtain an
|
||||||
|
updated linker from Metrowerks. It is expected Metrowerks will release
|
||||||
|
PDK 3.0 (in beta testing at this time - May, 2001) in the near future which
|
||||||
|
will fix these problems.
|
||||||
|
|
||||||
|
|
||||||
|
Makefile "vclean"
|
||||||
|
------------------
|
||||||
|
The generated makefile has a "vclean" target which cleans up the build
|
||||||
|
directories. If you have been building successfully and suddenly
|
||||||
|
experience problems, use "vclean" (gmake -f netware\nlm_xxxx.mak vclean) and retry.
|
||||||
|
|
||||||
|
|
||||||
|
"Undefined Symbol" Linker errors
|
||||||
|
--------------------------------
|
||||||
|
There have been linker errors reported when doing a CLIB build. The problems
|
||||||
|
occur because some versions of the CLIB SDK import files inadvertently
|
||||||
|
left out some symbols. One symbol in particular is "_lrotl". The missing
|
||||||
|
functions are actually delivered in the binaries, but they were left out of
|
||||||
|
the import files. The issues should be fixed in the September 2001 release
|
||||||
|
of the NDK. If you experience the problems you can temporarily
|
||||||
|
work around it by manually adding the missing symbols to your version of
|
||||||
|
"clib.imp".
|
||||||
|
|
||||||
52
INSTALL.VMS
52
INSTALL.VMS
@@ -71,7 +71,7 @@ the top to understand how to use them. However, if you want to
|
|||||||
compile all you can get, the simplest is to use MAKEVMS.COM in the top
|
compile all you can get, the simplest is to use MAKEVMS.COM in the top
|
||||||
directory. The syntax is the following:
|
directory. The syntax is the following:
|
||||||
|
|
||||||
@MAKEVMS <option> <rsaref-p> <debug-p> [<compiler>]
|
@MAKEVMS <option> <bits> <debug-p> [<compiler>]
|
||||||
|
|
||||||
<option> must be one of the following:
|
<option> must be one of the following:
|
||||||
|
|
||||||
@@ -87,24 +87,11 @@ directory. The syntax is the following:
|
|||||||
TEST Just build the "[.xxx.EXE.TEST]" test programs for OpenSSL.
|
TEST Just build the "[.xxx.EXE.TEST]" test programs for OpenSSL.
|
||||||
APPS Just build the "[.xxx.EXE.APPS]" application programs for OpenSSL.
|
APPS Just build the "[.xxx.EXE.APPS]" application programs for OpenSSL.
|
||||||
|
|
||||||
<rsaref-p> must be one of the following:
|
<bits> must be one of the following:
|
||||||
|
|
||||||
RSAREF compile using the RSAREF Library
|
"" compile using default pointer size
|
||||||
NORSAREF compile without using RSAREF
|
32 compile using 32 bit pointer size
|
||||||
|
64 compile using 64 bit pointer size
|
||||||
Note 0: The RSAREF library IS NO LONGER NEEDED. The RSA patent
|
|
||||||
expires September 20, 2000, and RSA Security chose to make
|
|
||||||
the algorithm public domain two weeks before that.
|
|
||||||
|
|
||||||
Note 1: If you still want to use RSAREF, the library is NOT INCLUDED
|
|
||||||
and you have to download it. RSA Security doesn't carry it
|
|
||||||
any more, but there are a number of places where you can find
|
|
||||||
it. You have to get the ".tar-Z" file as the ".zip" file
|
|
||||||
doesn't have the directory structure stored. You have to
|
|
||||||
extract the file into the [.RSAREF] directory as that is where
|
|
||||||
the scripts will look for the files.
|
|
||||||
|
|
||||||
Note 2: I have never done this, so I've no idea if it works or not.
|
|
||||||
|
|
||||||
<debug-p> must be one of the following:
|
<debug-p> must be one of the following:
|
||||||
|
|
||||||
@@ -117,12 +104,13 @@ Note 2: I have never done this, so I've no idea if it works or not.
|
|||||||
GNUC For GNU C.
|
GNUC For GNU C.
|
||||||
|
|
||||||
|
|
||||||
You will find the crypto library in [.xxx.EXE.CRYPTO], called LIBCRYPTO.OLB,
|
You will find the crypto library in [.xxx.EXE.CRYPTO] (where xxx is VAX,
|
||||||
where xxx is VAX or AXP. You will find the SSL library in [.xxx.EXE.SSL],
|
ALPHA or IA64), called SSL_LIBCRYPTO32.OLB or SSL_LIBCRYPTO.OLB depending
|
||||||
named LIBSSL.OLB, and you will find a bunch of useful programs in
|
on how it was built. You will find the SSL library in [.xxx.EXE.SSL],
|
||||||
[.xxx.EXE.APPS]. However, these shouldn't be used right off unless it's
|
named SSL_LIBSSL32.OLB or SSL_LIBSSL.OLB, and you will find a bunch of
|
||||||
just to test them. For production use, make sure you install first, see
|
useful programs in [.xxx.EXE.APPS]. However, these shouldn't be used
|
||||||
Installation below.
|
right off unless it's just to test them. For production use, make sure
|
||||||
|
you install first, see Installation below.
|
||||||
|
|
||||||
Note 1: Some programs in this package require a TCP/IP library.
|
Note 1: Some programs in this package require a TCP/IP library.
|
||||||
|
|
||||||
@@ -170,12 +158,14 @@ Installation:
|
|||||||
|
|
||||||
Installation is easy, just do the following:
|
Installation is easy, just do the following:
|
||||||
|
|
||||||
@INSTALL <root>
|
@INSTALL <root> <bits>
|
||||||
|
|
||||||
<root> is the directory in which everything will be installed,
|
<root> is the directory in which everything will be installed,
|
||||||
subdirectories, libraries, header files, programs and startup command
|
subdirectories, libraries, header files, programs and startup command
|
||||||
procedures.
|
procedures.
|
||||||
|
|
||||||
|
<bits> works the same way as for MAKEVMS.COM
|
||||||
|
|
||||||
N.B.: INSTALL.COM builds a new directory structure, different from
|
N.B.: INSTALL.COM builds a new directory structure, different from
|
||||||
the directory tree where you have now build OpenSSL.
|
the directory tree where you have now build OpenSSL.
|
||||||
|
|
||||||
@@ -196,6 +186,10 @@ following command procedures:
|
|||||||
sets up the symbols to the applications. Should be called
|
sets up the symbols to the applications. Should be called
|
||||||
from for example SYS$MANAGER:SYLOGIN.COM
|
from for example SYS$MANAGER:SYLOGIN.COM
|
||||||
|
|
||||||
|
OPENSSL_UNDO.COM
|
||||||
|
|
||||||
|
deassigns the logical names created with OPENSSL_STARTUP.COM.
|
||||||
|
|
||||||
The logical names that are set up are the following:
|
The logical names that are set up are the following:
|
||||||
|
|
||||||
SSLROOT a dotted concealed logical name pointing at the
|
SSLROOT a dotted concealed logical name pointing at the
|
||||||
@@ -203,7 +197,6 @@ The logical names that are set up are the following:
|
|||||||
|
|
||||||
SSLCERTS Initially an empty directory, this is the default
|
SSLCERTS Initially an empty directory, this is the default
|
||||||
location for certificate files.
|
location for certificate files.
|
||||||
SSLMISC Various scripts.
|
|
||||||
SSLPRIVATE Initially an empty directory, this is the default
|
SSLPRIVATE Initially an empty directory, this is the default
|
||||||
location for private key files.
|
location for private key files.
|
||||||
|
|
||||||
@@ -211,8 +204,9 @@ The logical names that are set up are the following:
|
|||||||
programs.
|
programs.
|
||||||
SSLINCLUDE Contains the header files needed if you want to
|
SSLINCLUDE Contains the header files needed if you want to
|
||||||
compile programs with libcrypto or libssl.
|
compile programs with libcrypto or libssl.
|
||||||
SSLLIB Contains the OpenSSL library files (LIBCRYPTO.OLB
|
SSLLIB Contains the OpenSSL library files themselves:
|
||||||
and LIBSSL.OLB) themselves.
|
- SSL_LIBCRYPTO32.OLB and SSL_LIBSSL32.OLB or
|
||||||
|
- SSL_LIBCRYPTO.OLB and SSL_LIBSSL.OLB
|
||||||
|
|
||||||
OPENSSL Same as SSLINCLUDE. This is because the standard
|
OPENSSL Same as SSLINCLUDE. This is because the standard
|
||||||
way to include OpenSSL header files from version
|
way to include OpenSSL header files from version
|
||||||
@@ -296,4 +290,4 @@ have any ideas.
|
|||||||
|
|
||||||
--
|
--
|
||||||
Richard Levitte <richard@levitte.org>
|
Richard Levitte <richard@levitte.org>
|
||||||
2000-02-27
|
2000-02-27, 2011-03-18
|
||||||
|
|||||||
232
INSTALL.W32
232
INSTALL.W32
@@ -3,42 +3,33 @@
|
|||||||
----------------------------------
|
----------------------------------
|
||||||
|
|
||||||
[Instructions for building for Windows CE can be found in INSTALL.WCE]
|
[Instructions for building for Windows CE can be found in INSTALL.WCE]
|
||||||
|
[Instructions for building for Win64 can be found in INSTALL.W64]
|
||||||
|
|
||||||
Heres a few comments about building OpenSSL in Windows environments. Most
|
Here are a few comments about building OpenSSL for Win32 environments,
|
||||||
of this is tested on Win32 but it may also work in Win 3.1 with some
|
such as Windows NT and Windows 9x. It should be noted though that
|
||||||
modification.
|
Windows 9x are not ordinarily tested. Its mention merely means that we
|
||||||
|
attempt to maintain certain programming discipline and pay attention
|
||||||
|
to backward compatibility issues, in other words it's kind of expected
|
||||||
|
to work on Windows 9x, but no regression tests are actually performed.
|
||||||
|
|
||||||
You need Perl for Win32. Unless you will build on Cygwin, you will need
|
On additional note newer OpenSSL versions are compiled and linked with
|
||||||
ActiveState Perl, available from http://www.activestate.com/ActivePerl.
|
Winsock 2. This means that minimum OS requirement was elevated to NT 4
|
||||||
For Cygwin users, there's more info in the Cygwin section.
|
and Windows 98 [there is Winsock 2 update for Windows 95 though].
|
||||||
|
|
||||||
and one of the following C compilers:
|
- you need Perl for Win32. Unless you will build on Cygwin, you will need
|
||||||
|
ActiveState Perl, available from http://www.activestate.com/ActivePerl.
|
||||||
|
|
||||||
|
- one of the following C compilers:
|
||||||
|
|
||||||
* Visual C++
|
* Visual C++
|
||||||
* Borland C
|
* Borland C
|
||||||
* GNU C (Mingw32 or Cygwin)
|
* GNU C (Cygwin or MinGW)
|
||||||
|
|
||||||
If you want to compile in the assembly language routines with Visual C++ then
|
- Netwide Assembler, a.k.a. NASM, available from http://nasm.sourceforge.net/
|
||||||
you will need an assembler. This is worth doing because it will result in
|
is required if you intend to utilize assembler modules. Note that NASM
|
||||||
faster code: for example it will typically result in a 2 times speedup in the
|
is now the only supported assembler.
|
||||||
RSA routines. Currently the following assemblers are supported:
|
|
||||||
|
|
||||||
* Microsoft MASM (aka "ml")
|
If you are compiling from a tarball or a Git snapshot then the Win32 files
|
||||||
* Free Netwide Assembler NASM.
|
|
||||||
|
|
||||||
MASM was at one point distributed with VC++. It is now distributed with some
|
|
||||||
Microsoft DDKs, for example the Windows NT 4.0 DDK and the Windows 98 DDK. If
|
|
||||||
you do not have either of these DDKs then you can just download the binaries
|
|
||||||
for the Windows 98 DDK and extract and rename the two files XXXXXml.exe and
|
|
||||||
XXXXXml.err, to ml.exe and ml.err and install somewhere on your PATH. Both
|
|
||||||
DDKs can be downloaded from the Microsoft developers site www.msdn.com.
|
|
||||||
|
|
||||||
NASM is freely available. Version 0.98 was used during testing: other versions
|
|
||||||
may also work. It is available from many places, see for example:
|
|
||||||
http://www.kernel.org/pub/software/devel/nasm/binaries/win32/
|
|
||||||
The NASM binary nasmw.exe needs to be installed anywhere on your PATH.
|
|
||||||
|
|
||||||
If you are compiling from a tarball or a CVS snapshot then the Win32 files
|
|
||||||
may well be not up to date. This may mean that some "tweaking" is required to
|
may well be not up to date. This may mean that some "tweaking" is required to
|
||||||
get it all to work. See the trouble shooting section later on for if (when?)
|
get it all to work. See the trouble shooting section later on for if (when?)
|
||||||
it goes wrong.
|
it goes wrong.
|
||||||
@@ -46,16 +37,18 @@
|
|||||||
Visual C++
|
Visual C++
|
||||||
----------
|
----------
|
||||||
|
|
||||||
Firstly you should run Configure:
|
If you want to compile in the assembly language routines with Visual
|
||||||
|
C++, then you will need already mentioned Netwide Assembler binary,
|
||||||
|
nasmw.exe or nasm.exe, to be available on your %PATH%.
|
||||||
|
|
||||||
> perl Configure VC-WIN32
|
Firstly you should run Configure with platform VC-WIN32:
|
||||||
|
|
||||||
Next you need to build the Makefiles and optionally the assembly language
|
> perl Configure VC-WIN32 --prefix=c:\some\openssl\dir
|
||||||
files:
|
|
||||||
|
|
||||||
- If you are using MASM then run:
|
Where the prefix argument specifies where OpenSSL will be installed to.
|
||||||
|
|
||||||
> ms\do_masm
|
Next you need to build the Makefiles and optionally the assembly
|
||||||
|
language files:
|
||||||
|
|
||||||
- If you are using NASM then run:
|
- If you are using NASM then run:
|
||||||
|
|
||||||
@@ -63,6 +56,7 @@
|
|||||||
|
|
||||||
- If you don't want to use the assembly language files at all then run:
|
- If you don't want to use the assembly language files at all then run:
|
||||||
|
|
||||||
|
> perl Configure VC-WIN32 no-asm --prefix=c:/some/openssl/dir
|
||||||
> ms\do_ms
|
> ms\do_ms
|
||||||
|
|
||||||
If you get errors about things not having numbers assigned then check the
|
If you get errors about things not having numbers assigned then check the
|
||||||
@@ -73,30 +67,39 @@
|
|||||||
|
|
||||||
> nmake -f ms\ntdll.mak
|
> nmake -f ms\ntdll.mak
|
||||||
|
|
||||||
If all is well it should compile and you will have some DLLs and executables
|
If all is well it should compile and you will have some DLLs and
|
||||||
in out32dll. If you want to try the tests then do:
|
executables in out32dll. If you want to try the tests then do:
|
||||||
|
|
||||||
> cd out32dll
|
> nmake -f ms\ntdll.mak test
|
||||||
> ..\ms\test
|
|
||||||
|
|
||||||
|
To install OpenSSL to the specified location do:
|
||||||
|
|
||||||
|
> nmake -f ms\ntdll.mak install
|
||||||
|
|
||||||
Tweaks:
|
Tweaks:
|
||||||
|
|
||||||
There are various changes you can make to the Win32 compile environment. By
|
There are various changes you can make to the Win32 compile
|
||||||
default the library is not compiled with debugging symbols. If you add 'debug'
|
environment. By default the library is not compiled with debugging
|
||||||
to the mk1mf.pl lines in the do_* batch file then debugging symbols will be
|
symbols. If you use the platform debug-VC-WIN32 instead of VC-WIN32
|
||||||
compiled in. Note that mk1mf.pl expects the platform to be the last argument
|
then debugging symbols will be compiled in.
|
||||||
on the command line, so 'debug' must appear before that, as all other options.
|
|
||||||
|
By default in 1.0.0 OpenSSL will compile builtin ENGINES into the
|
||||||
|
separate shared librariesy. If you specify the "enable-static-engine"
|
||||||
|
option on the command line to Configure the shared library build
|
||||||
|
(ms\ntdll.mak) will compile the engines into libeay32.dll instead.
|
||||||
|
|
||||||
The default Win32 environment is to leave out any Windows NT specific
|
The default Win32 environment is to leave out any Windows NT specific
|
||||||
features.
|
features.
|
||||||
|
|
||||||
If you want to enable the NT specific features of OpenSSL (currently only the
|
If you want to enable the NT specific features of OpenSSL (currently
|
||||||
logging BIO) follow the instructions above but call the batch file do_nt.bat
|
only the logging BIO) follow the instructions above but call the batch
|
||||||
instead of do_ms.bat.
|
file do_nt.bat instead of do_ms.bat.
|
||||||
|
|
||||||
You can also build a static version of the library using the Makefile
|
You can also build a static version of the library using the Makefile
|
||||||
ms\nt.mak
|
ms\nt.mak
|
||||||
|
|
||||||
|
|
||||||
Borland C++ builder 5
|
Borland C++ builder 5
|
||||||
---------------------
|
---------------------
|
||||||
|
|
||||||
@@ -119,62 +122,31 @@
|
|||||||
* Run make:
|
* Run make:
|
||||||
> make -f bcb.mak
|
> make -f bcb.mak
|
||||||
|
|
||||||
GNU C (Mingw32)
|
|
||||||
---------------
|
|
||||||
|
|
||||||
To build OpenSSL, you need the Mingw32 package and GNU make.
|
|
||||||
|
|
||||||
* Compiler installation:
|
|
||||||
|
|
||||||
Mingw32 is available from <ftp://ftp.xraylith.wisc.edu/pub/khan/
|
|
||||||
gnu-win32/mingw32/gcc-2.95.2/gcc-2.95.2-msvcrt.exe>. Extract it
|
|
||||||
to a directory such as C:\gcc-2.95.2 and add c:\gcc-2.95.2\bin to
|
|
||||||
the PATH environment variable in "System Properties"; or edit and
|
|
||||||
run C:\gcc-2.95.2\mingw32.bat to set the PATH.
|
|
||||||
|
|
||||||
* Compile OpenSSL:
|
|
||||||
|
|
||||||
> ms\mingw32
|
|
||||||
|
|
||||||
This will create the library and binaries in out. In case any problems
|
|
||||||
occur, try
|
|
||||||
> ms\mingw32 no-asm
|
|
||||||
instead.
|
|
||||||
|
|
||||||
libcrypto.a and libssl.a are the static libraries. To use the DLLs,
|
|
||||||
link with libeay32.a and libssl32.a instead.
|
|
||||||
|
|
||||||
See troubleshooting if you get error messages about functions not having
|
|
||||||
a number assigned.
|
|
||||||
|
|
||||||
* You can now try the tests:
|
|
||||||
|
|
||||||
> cd out
|
|
||||||
> ..\ms\test
|
|
||||||
|
|
||||||
GNU C (Cygwin)
|
GNU C (Cygwin)
|
||||||
--------------
|
--------------
|
||||||
|
|
||||||
Cygwin provides a bash shell and GNU tools environment running
|
Cygwin implements a Posix/Unix runtime system (cygwin1.dll) on top of
|
||||||
on NT 4.0, Windows 9x, Windows ME, Windows 2000, and Windows XP.
|
Win32 subsystem and provides a bash shell and GNU tools environment.
|
||||||
Consequently, a make of OpenSSL with Cygwin is closer to a GNU
|
Consequently, a make of OpenSSL with Cygwin is virtually identical to
|
||||||
bash environment such as Linux than to other W32 makes which are
|
Unix procedure. It is also possible to create Win32 binaries that only
|
||||||
based on a single makefile approach. Cygwin implements Posix/Unix
|
use the Microsoft C runtime system (msvcrt.dll or crtdll.dll) using
|
||||||
calls through cygwin1.dll, and is contrasted to Mingw32 which links
|
MinGW. MinGW can be used in the Cygwin development environment or in a
|
||||||
dynamically to msvcrt.dll or crtdll.dll.
|
standalone setup as described in the following section.
|
||||||
|
|
||||||
To build OpenSSL using Cygwin:
|
To build OpenSSL using Cygwin:
|
||||||
|
|
||||||
* Install Cygwin (see http://cygwin.com/)
|
* Install Cygwin (see http://cygwin.com/)
|
||||||
|
|
||||||
* Install Perl and ensure it is in the path (recent Cygwin perl
|
* Install Perl and ensure it is in the path. Both Cygwin perl
|
||||||
(version 5.6.1-2 of the latter has been reported to work) or
|
(5.6.1-2 or newer) and ActivePerl work.
|
||||||
ActivePerl)
|
|
||||||
|
|
||||||
* Run the Cygwin bash shell
|
* Run the Cygwin bash shell
|
||||||
|
|
||||||
* $ tar zxvf openssl-x.x.x.tar.gz
|
* $ tar zxvf openssl-x.x.x.tar.gz
|
||||||
$ cd openssl-x.x.x
|
$ cd openssl-x.x.x
|
||||||
|
|
||||||
|
To build the Cygwin version of OpenSSL:
|
||||||
|
|
||||||
$ ./config
|
$ ./config
|
||||||
[...]
|
[...]
|
||||||
$ make
|
$ make
|
||||||
@@ -182,7 +154,16 @@
|
|||||||
$ make test
|
$ make test
|
||||||
$ make install
|
$ make install
|
||||||
|
|
||||||
This will create a default install in /usr/local/ssl.
|
This will create a default install in /usr/local/ssl.
|
||||||
|
|
||||||
|
To build the MinGW version (native Windows) in Cygwin:
|
||||||
|
|
||||||
|
$ ./Configure mingw
|
||||||
|
[...]
|
||||||
|
$ make
|
||||||
|
[...]
|
||||||
|
$ make test
|
||||||
|
$ make install
|
||||||
|
|
||||||
Cygwin Notes:
|
Cygwin Notes:
|
||||||
|
|
||||||
@@ -195,6 +176,44 @@
|
|||||||
non-fatal error in "make test" but is otherwise harmless. If
|
non-fatal error in "make test" but is otherwise harmless. If
|
||||||
desired and needed, GNU bc can be built with Cygwin without change.
|
desired and needed, GNU bc can be built with Cygwin without change.
|
||||||
|
|
||||||
|
GNU C (MinGW/MSYS)
|
||||||
|
-------------
|
||||||
|
|
||||||
|
* Compiler and shell environment installation:
|
||||||
|
|
||||||
|
MinGW and MSYS are available from http://www.mingw.org/, both are
|
||||||
|
required. Run the installers and do whatever magic they say it takes
|
||||||
|
to start MSYS bash shell with GNU tools on its PATH.
|
||||||
|
|
||||||
|
N.B. Since source tar-ball can contain symbolic links, it's essential
|
||||||
|
that you use accompanying MSYS tar to unpack the source. It will
|
||||||
|
either handle them in one way or another or fail to extract them,
|
||||||
|
which does the trick too. Latter means that you may safely ignore all
|
||||||
|
"cannot create symlink" messages, as they will be "re-created" at
|
||||||
|
configure stage by copying corresponding files. Alternative programs
|
||||||
|
were observed to create empty files instead, which results in build
|
||||||
|
failure.
|
||||||
|
|
||||||
|
* Compile OpenSSL:
|
||||||
|
|
||||||
|
$ ./config
|
||||||
|
[...]
|
||||||
|
$ make
|
||||||
|
[...]
|
||||||
|
$ make test
|
||||||
|
|
||||||
|
This will create the library and binaries in root source directory
|
||||||
|
and openssl.exe application in apps directory.
|
||||||
|
|
||||||
|
It is also possible to cross-compile it on Linux by configuring
|
||||||
|
with './Configure --cross-compile-prefix=i386-mingw32- mingw ...'.
|
||||||
|
'make test' is naturally not applicable then.
|
||||||
|
|
||||||
|
libcrypto.a and libssl.a are the static libraries. To use the DLLs,
|
||||||
|
link with libeay32.a and libssl32.a instead.
|
||||||
|
|
||||||
|
See troubleshooting if you get error messages about functions not
|
||||||
|
having a number assigned.
|
||||||
|
|
||||||
Installation
|
Installation
|
||||||
------------
|
------------
|
||||||
@@ -214,7 +233,7 @@
|
|||||||
$ md c:\openssl\lib
|
$ md c:\openssl\lib
|
||||||
$ md c:\openssl\include
|
$ md c:\openssl\include
|
||||||
$ md c:\openssl\include\openssl
|
$ md c:\openssl\include\openssl
|
||||||
$ copy /b inc32\* c:\openssl\include\openssl
|
$ copy /b inc32\openssl\* c:\openssl\include\openssl
|
||||||
$ copy /b out32dll\ssleay32.lib c:\openssl\lib
|
$ copy /b out32dll\ssleay32.lib c:\openssl\lib
|
||||||
$ copy /b out32dll\libeay32.lib c:\openssl\lib
|
$ copy /b out32dll\libeay32.lib c:\openssl\lib
|
||||||
$ copy /b out32dll\ssleay32.dll c:\openssl\bin
|
$ copy /b out32dll\ssleay32.dll c:\openssl\bin
|
||||||
@@ -238,7 +257,7 @@
|
|||||||
|
|
||||||
then ms\do_XXX should not give a warning any more. However the numbers that
|
then ms\do_XXX should not give a warning any more. However the numbers that
|
||||||
get assigned by this technique may not match those that eventually get
|
get assigned by this technique may not match those that eventually get
|
||||||
assigned in the CVS tree: so anything linked against this version of the
|
assigned in the Git tree: so anything linked against this version of the
|
||||||
library may need to be recompiled.
|
library may need to be recompiled.
|
||||||
|
|
||||||
If you get errors about unresolved symbols there are several possible
|
If you get errors about unresolved symbols there are several possible
|
||||||
@@ -275,3 +294,32 @@
|
|||||||
(e.g. fopen()), and OpenSSL cannot change these; so in general you cannot
|
(e.g. fopen()), and OpenSSL cannot change these; so in general you cannot
|
||||||
rely on CRYPTO_malloc_init() solving your problem, and you should
|
rely on CRYPTO_malloc_init() solving your problem, and you should
|
||||||
consistently use the multithreaded library.
|
consistently use the multithreaded library.
|
||||||
|
|
||||||
|
Linking your application
|
||||||
|
------------------------
|
||||||
|
|
||||||
|
If you link with static OpenSSL libraries [those built with ms/nt.mak],
|
||||||
|
then you're expected to additionally link your application with
|
||||||
|
WS2_32.LIB, ADVAPI32.LIB, GDI32.LIB and USER32.LIB. Those developing
|
||||||
|
non-interactive service applications might feel concerned about linking
|
||||||
|
with the latter two, as they are justly associated with interactive
|
||||||
|
desktop, which is not available to service processes. The toolkit is
|
||||||
|
designed to detect in which context it's currently executed, GUI,
|
||||||
|
console app or service, and act accordingly, namely whether or not to
|
||||||
|
actually make GUI calls. Additionally those who wish to
|
||||||
|
/DELAYLOAD:GDI32.DLL and /DELAYLOAD:USER32.DLL and actually keep them
|
||||||
|
off service process should consider implementing and exporting from
|
||||||
|
.exe image in question own _OPENSSL_isservice not relying on USER32.DLL.
|
||||||
|
E.g., on Windows Vista and later you could:
|
||||||
|
|
||||||
|
__declspec(dllexport) __cdecl BOOL _OPENSSL_isservice(void)
|
||||||
|
{ DWORD sess;
|
||||||
|
if (ProcessIdToSessionId(GetCurrentProcessId(),&sess))
|
||||||
|
return sess==0;
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
|
|
||||||
|
If you link with OpenSSL .DLLs, then you're expected to include into
|
||||||
|
your application code small "shim" snippet, which provides glue between
|
||||||
|
OpenSSL BIO layer and your compiler run-time. Look up OPENSSL_Applink
|
||||||
|
reference page for further details.
|
||||||
|
|||||||
66
INSTALL.W64
Normal file
66
INSTALL.W64
Normal file
@@ -0,0 +1,66 @@
|
|||||||
|
|
||||||
|
INSTALLATION ON THE WIN64 PLATFORM
|
||||||
|
----------------------------------
|
||||||
|
|
||||||
|
Caveat lector
|
||||||
|
-------------
|
||||||
|
|
||||||
|
As of moment of this writing Win64 support is classified "initial"
|
||||||
|
for the following reasons.
|
||||||
|
|
||||||
|
- No assembler modules are engaged upon initial 0.9.8 release.
|
||||||
|
- API might change within 0.9.8 life-span, *but* in a manner which
|
||||||
|
doesn't break backward binary compatibility. Or in other words,
|
||||||
|
application programs compiled with initial 0.9.8 headers will
|
||||||
|
be expected to work with future minor release .DLL without need
|
||||||
|
to re-compile, even if future minor release features modified API.
|
||||||
|
- Above mentioned API modifications have everything to do with
|
||||||
|
elimination of a number of limitations, which are normally
|
||||||
|
considered inherent to 32-bit platforms. Which in turn is why they
|
||||||
|
are treated as limitations on 64-bit platform such as Win64:-)
|
||||||
|
The current list comprises [but not necessarily limited to]:
|
||||||
|
|
||||||
|
- null-terminated strings may not be longer than 2G-1 bytes,
|
||||||
|
longer strings are treated as zero-length;
|
||||||
|
- dynamically and *internally* allocated chunks can't be larger
|
||||||
|
than 2G-1 bytes;
|
||||||
|
- inability to encrypt/decrypt chunks of data larger than 4GB
|
||||||
|
[it's possibly to *hash* chunks of arbitrary size through];
|
||||||
|
|
||||||
|
Neither of these is actually big deal and hardly encountered
|
||||||
|
in real-life applications.
|
||||||
|
|
||||||
|
Compiling procedure
|
||||||
|
-------------------
|
||||||
|
|
||||||
|
You will need Perl. You can run under Cygwin or you can download
|
||||||
|
ActiveState Perl from http://www.activestate.com/ActivePerl.
|
||||||
|
|
||||||
|
You will need Microsoft Platform SDK, available for download at
|
||||||
|
http://www.microsoft.com/msdownload/platformsdk/sdkupdate/. As per
|
||||||
|
April 2005 Platform SDK is equipped with Win64 compilers, as well
|
||||||
|
as assemblers, but it might change in the future.
|
||||||
|
|
||||||
|
To build for Win64/x64:
|
||||||
|
|
||||||
|
> perl Configure VC-WIN64A
|
||||||
|
> ms\do_win64a
|
||||||
|
> nmake -f ms\ntdll.mak
|
||||||
|
> cd out32dll
|
||||||
|
> ..\ms\test
|
||||||
|
|
||||||
|
To build for Win64/IA64:
|
||||||
|
|
||||||
|
> perl Configure VC-WIN64I
|
||||||
|
> ms\do_win64i
|
||||||
|
> nmake -f ms\ntdll.mak
|
||||||
|
> cd out32dll
|
||||||
|
> ..\ms\test
|
||||||
|
|
||||||
|
Naturally test-suite itself has to be executed on the target platform.
|
||||||
|
|
||||||
|
Installation
|
||||||
|
------------
|
||||||
|
|
||||||
|
TBD, for now see INSTALL.W32.
|
||||||
|
|
||||||
74
INSTALL.WCE
74
INSTALL.WCE
@@ -4,24 +4,36 @@
|
|||||||
|
|
||||||
Building OpenSSL for Windows CE requires the following external tools:
|
Building OpenSSL for Windows CE requires the following external tools:
|
||||||
|
|
||||||
* Microsoft eMbedded Visual C++ 3.0
|
* Microsoft eMbedded Visual C++ 3.0 or later
|
||||||
* wcecompat compatibility library (www.essemer.com.au)
|
* Appropriate SDK might be required
|
||||||
* Optionally ceutils for running automated tests (www.essemer.com.au)
|
* Perl for Win32 [commonly recommended ActiveState Perl is available
|
||||||
|
from http://www.activestate.com/Products/ActivePerl/]
|
||||||
|
|
||||||
You also need Perl for Win32. You will need ActiveState Perl, available
|
* wcecompat compatibility library available at
|
||||||
from http://www.activestate.com/ActivePerl.
|
http://www.essemer.com.au/windowsce/
|
||||||
|
* Optionally ceutils for running automated tests (same location)
|
||||||
|
|
||||||
Windows CE support in OpenSSL relies on wcecompat. All Windows CE specific
|
_or_
|
||||||
issues should be directed to www.essemer.com.au.
|
|
||||||
|
|
||||||
The C Runtime Library implementation for Windows CE that is included with
|
* PocketConsole driver and PortSDK available at
|
||||||
Microsoft eMbedded Visual C++ 3.0 is incomplete and in some places
|
http://www.symbolictools.de/public/pocketconsole/
|
||||||
incorrect. wcecompat plugs the holes and tries to bring the Windows CE
|
* CMD command interpreter (same location)
|
||||||
CRT to a level that is more compatible with ANSI C. wcecompat goes further
|
|
||||||
and provides low-level IO and stream IO support for stdin/stdout/stderr
|
As Windows CE support in OpenSSL relies on 3rd party compatibility
|
||||||
(which Windows CE does not provide). This IO functionality is not needed
|
library, it's appropriate to check corresponding URL for updates. For
|
||||||
by the OpenSSL library itself but is used for the tests and openssl.exe.
|
example if you choose wcecompat, note that as for the moment of this
|
||||||
More information is available at www.essemer.com.au.
|
writing version 1.2 is available and actually required for WCE 4.2
|
||||||
|
and newer platforms. All wcecompat issues should be directed to
|
||||||
|
www.essemer.com.au.
|
||||||
|
|
||||||
|
Why compatibility library at all? The C Runtime Library implementation
|
||||||
|
for Windows CE that is included with Microsoft eMbedded Visual C++ is
|
||||||
|
incomplete and in some places incorrect. Compatibility library plugs
|
||||||
|
the holes and tries to bring the Windows CE CRT to [more] usable level.
|
||||||
|
Most gaping hole in CRT is support for stdin/stdout/stderr IO, which
|
||||||
|
proposed compatibility libraries solve in two different ways: wcecompat
|
||||||
|
redirects IO to active sync link, while PortSDK - to NT-like console
|
||||||
|
driver on the handheld itself.
|
||||||
|
|
||||||
Building
|
Building
|
||||||
--------
|
--------
|
||||||
@@ -31,9 +43,21 @@
|
|||||||
|
|
||||||
> "C:\Program Files\Microsoft eMbedded Tools\EVC\WCE300\BIN\WCEARM.BAT"
|
> "C:\Program Files\Microsoft eMbedded Tools\EVC\WCE300\BIN\WCEARM.BAT"
|
||||||
|
|
||||||
Next indicate where wcecompat is located:
|
Next pick compatibility library according to your preferences.
|
||||||
|
|
||||||
> set WCECOMPAT=C:\wcecompat
|
1. To choose wcecompat set up WCECOMPAT environment variable pointing
|
||||||
|
at the location of wcecompat tree "root":
|
||||||
|
|
||||||
|
> set WCECOMPAT=C:\wcecompat
|
||||||
|
> set PORTSDK_LIBPATH=
|
||||||
|
|
||||||
|
2. To choose PortSDK set up PORTSDK_LIBPATH to point at hardware-
|
||||||
|
specific location where your portlib.lib is installed:
|
||||||
|
|
||||||
|
> set PORTSDK_LIBPATH=C:\PortSDK\lib\ARM
|
||||||
|
> set WCECOMPAT=
|
||||||
|
|
||||||
|
Note that you may not set both variables.
|
||||||
|
|
||||||
Next you should run Configure:
|
Next you should run Configure:
|
||||||
|
|
||||||
@@ -49,16 +73,16 @@
|
|||||||
|
|
||||||
Then from the VC++ environment at a prompt do:
|
Then from the VC++ environment at a prompt do:
|
||||||
|
|
||||||
- to build static libraries:
|
|
||||||
|
|
||||||
> nmake -f ms\ce.mak
|
|
||||||
|
|
||||||
- or to build DLLs:
|
|
||||||
|
|
||||||
> nmake -f ms\cedll.mak
|
> nmake -f ms\cedll.mak
|
||||||
|
|
||||||
If all is well it should compile and you will have some static libraries and
|
[note that static builds are not supported under CE]
|
||||||
executables in out32, or some DLLs and executables in out32dll. If you want
|
|
||||||
|
If all is well it should compile and you will have some DLLs and executables
|
||||||
|
in out32dll*.
|
||||||
|
|
||||||
|
<<< everyting below needs revision in respect to wcecompat vs. PortSDK >>>
|
||||||
|
|
||||||
|
If you want
|
||||||
to try the tests then make sure the ceutils are in the path and do:
|
to try the tests then make sure the ceutils are in the path and do:
|
||||||
|
|
||||||
> cd out32
|
> cd out32
|
||||||
|
|||||||
2
LICENSE
2
LICENSE
@@ -12,7 +12,7 @@
|
|||||||
---------------
|
---------------
|
||||||
|
|
||||||
/* ====================================================================
|
/* ====================================================================
|
||||||
* Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved.
|
* Copyright (c) 1998-2011 The OpenSSL Project. All rights reserved.
|
||||||
*
|
*
|
||||||
* Redistribution and use in source and binary forms, with or without
|
* Redistribution and use in source and binary forms, with or without
|
||||||
* modification, are permitted provided that the following conditions
|
* modification, are permitted provided that the following conditions
|
||||||
|
|||||||
@@ -29,7 +29,7 @@ OSErr AppendErrorMessageToHandle(Handle inoutHandle);
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
// A bunch of evil macros that would be uneccessary if I were always using C++ !
|
// A bunch of evil macros that would be unnecessary if I were always using C++ !
|
||||||
|
|
||||||
#define SetErrorMessageAndBailIfNil(theArg,theMessage) \
|
#define SetErrorMessageAndBailIfNil(theArg,theMessage) \
|
||||||
{ \
|
{ \
|
||||||
|
|||||||
@@ -5,97 +5,98 @@
|
|||||||
extern "C" {
|
extern "C" {
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
enum {
|
||||||
|
kMacSocket_TimeoutErr = -2
|
||||||
enum
|
|
||||||
{
|
|
||||||
kMacSocket_TimeoutErr = -2
|
|
||||||
};
|
};
|
||||||
|
|
||||||
|
// Since MacSocket does busy waiting, I do a callback while waiting
|
||||||
|
|
||||||
// Since MacSocket does busy waiting, I do a callback while waiting
|
typedef OSErr(*MacSocket_IdleWaitCallback) (void *);
|
||||||
|
|
||||||
typedef OSErr (*MacSocket_IdleWaitCallback)(void *);
|
// Call this before anything else!
|
||||||
|
|
||||||
|
|
||||||
// Call this before anything else!
|
|
||||||
|
|
||||||
OSErr MacSocket_Startup(void);
|
OSErr MacSocket_Startup(void);
|
||||||
|
|
||||||
|
// Call this to cleanup before quitting
|
||||||
// Call this to cleanup before quitting
|
|
||||||
|
|
||||||
OSErr MacSocket_Shutdown(void);
|
OSErr MacSocket_Shutdown(void);
|
||||||
|
|
||||||
|
// Call this to allocate a "socket" (reference number is returned in
|
||||||
|
// outSocketNum)
|
||||||
|
// Note that inDoThreadSwitching is pretty much irrelevant right now, since I
|
||||||
|
// ignore it
|
||||||
|
// The inTimeoutTicks parameter is applied during reads/writes of data
|
||||||
|
// The inIdleWaitCallback parameter specifies a callback which is called
|
||||||
|
// during busy-waiting periods
|
||||||
|
// The inUserRefPtr parameter is passed back to the idle-wait callback
|
||||||
|
|
||||||
// Call this to allocate a "socket" (reference number is returned in outSocketNum)
|
OSErr MacSocket_socket(int *outSocketNum, const Boolean inDoThreadSwitching,
|
||||||
// Note that inDoThreadSwitching is pretty much irrelevant right now, since I ignore it
|
const long inTimeoutTicks,
|
||||||
// The inTimeoutTicks parameter is applied during reads/writes of data
|
MacSocket_IdleWaitCallback inIdleWaitCallback,
|
||||||
// The inIdleWaitCallback parameter specifies a callback which is called during busy-waiting periods
|
void *inUserRefPtr);
|
||||||
// The inUserRefPtr parameter is passed back to the idle-wait callback
|
|
||||||
|
|
||||||
OSErr MacSocket_socket(int *outSocketNum,const Boolean inDoThreadSwitching,const long inTimeoutTicks,MacSocket_IdleWaitCallback inIdleWaitCallback,void *inUserRefPtr);
|
// Call this to connect to an IP/DNS address
|
||||||
|
// Note that inTargetAddressAndPort is in "IP:port" format-- e.g.
|
||||||
|
// 10.1.1.1:123
|
||||||
|
|
||||||
|
OSErr MacSocket_connect(const int inSocketNum, char *inTargetAddressAndPort);
|
||||||
|
|
||||||
// Call this to connect to an IP/DNS address
|
// Call this to listen on a port
|
||||||
// Note that inTargetAddressAndPort is in "IP:port" format-- e.g. 10.1.1.1:123
|
// Since this a low-performance implementation, I allow a maximum of 1 (one!)
|
||||||
|
// incoming request when I listen
|
||||||
|
|
||||||
OSErr MacSocket_connect(const int inSocketNum,char *inTargetAddressAndPort);
|
OSErr MacSocket_listen(const int inSocketNum, const int inPortNum);
|
||||||
|
|
||||||
|
// Call this to close a socket
|
||||||
// Call this to listen on a port
|
|
||||||
// Since this a low-performance implementation, I allow a maximum of 1 (one!) incoming request when I listen
|
|
||||||
|
|
||||||
OSErr MacSocket_listen(const int inSocketNum,const int inPortNum);
|
|
||||||
|
|
||||||
|
|
||||||
// Call this to close a socket
|
|
||||||
|
|
||||||
OSErr MacSocket_close(const int inSocketNum);
|
OSErr MacSocket_close(const int inSocketNum);
|
||||||
|
|
||||||
|
// Call this to receive data on a socket
|
||||||
|
// Most parameters' purpose are obvious-- except maybe "inBlock" which
|
||||||
|
// controls whether I wait for data or return immediately
|
||||||
|
|
||||||
// Call this to receive data on a socket
|
int MacSocket_recv(const int inSocketNum, void *outBuff, int outBuffLength,
|
||||||
// Most parameters' purpose are obvious-- except maybe "inBlock" which controls whether I wait for data or return immediately
|
const Boolean inBlock);
|
||||||
|
|
||||||
int MacSocket_recv(const int inSocketNum,void *outBuff,int outBuffLength,const Boolean inBlock);
|
// Call this to send data on a socket
|
||||||
|
|
||||||
|
int MacSocket_send(const int inSocketNum, const void *inBuff,
|
||||||
|
int inBuffLength);
|
||||||
|
|
||||||
// Call this to send data on a socket
|
// If zero bytes were read in a call to MacSocket_recv(), it may be that the
|
||||||
|
// remote end has done a half-close
|
||||||
int MacSocket_send(const int inSocketNum,const void *inBuff,int inBuffLength);
|
// This function will let you check whether that's true or not
|
||||||
|
|
||||||
|
|
||||||
// If zero bytes were read in a call to MacSocket_recv(), it may be that the remote end has done a half-close
|
|
||||||
// This function will let you check whether that's true or not
|
|
||||||
|
|
||||||
Boolean MacSocket_RemoteEndIsClosing(const int inSocketNum);
|
Boolean MacSocket_RemoteEndIsClosing(const int inSocketNum);
|
||||||
|
|
||||||
|
// Call this to see if the listen has completed after a call to
|
||||||
// Call this to see if the listen has completed after a call to MacSocket_listen()
|
// MacSocket_listen()
|
||||||
|
|
||||||
Boolean MacSocket_ListenCompleted(const int inSocketNum);
|
Boolean MacSocket_ListenCompleted(const int inSocketNum);
|
||||||
|
|
||||||
|
// These really aren't very useful anymore
|
||||||
// These really aren't very useful anymore
|
|
||||||
|
|
||||||
Boolean MacSocket_LocalEndIsOpen(const int inSocketNum);
|
Boolean MacSocket_LocalEndIsOpen(const int inSocketNum);
|
||||||
Boolean MacSocket_RemoteEndIsOpen(const int inSocketNum);
|
Boolean MacSocket_RemoteEndIsOpen(const int inSocketNum);
|
||||||
|
|
||||||
|
// You may wish to change the userRefPtr for a socket callback-- use this to
|
||||||
|
// do it
|
||||||
|
|
||||||
// You may wish to change the userRefPtr for a socket callback-- use this to do it
|
void MacSocket_SetUserRefPtr(const int inSocketNum, void *inNewRefPtr);
|
||||||
|
|
||||||
void MacSocket_SetUserRefPtr(const int inSocketNum,void *inNewRefPtr);
|
// Call these to get the socket's IP:port descriptor
|
||||||
|
|
||||||
|
void MacSocket_GetLocalIPAndPort(const int inSocketNum, char *outIPAndPort,
|
||||||
|
const int inIPAndPortLength);
|
||||||
|
void MacSocket_GetRemoteIPAndPort(const int inSocketNum, char *outIPAndPort,
|
||||||
|
const int inIPAndPortLength);
|
||||||
|
|
||||||
// Call these to get the socket's IP:port descriptor
|
// Call this to get error info from a socket
|
||||||
|
|
||||||
void MacSocket_GetLocalIPAndPort(const int inSocketNum,char *outIPAndPort,const int inIPAndPortLength);
|
void MacSocket_GetSocketErrorInfo(const int inSocketNum,
|
||||||
void MacSocket_GetRemoteIPAndPort(const int inSocketNum,char *outIPAndPort,const int inIPAndPortLength);
|
int *outSocketErrCode,
|
||||||
|
char *outSocketErrString,
|
||||||
|
const int inSocketErrStringMaxLength);
|
||||||
// Call this to get error info from a socket
|
|
||||||
|
|
||||||
void MacSocket_GetSocketErrorInfo(const int inSocketNum,int *outSocketErrCode,char *outSocketErrString,const int inSocketErrStringMaxLength);
|
|
||||||
|
|
||||||
|
|
||||||
#ifdef __cplusplus
|
#ifdef __cplusplus
|
||||||
|
|||||||
@@ -1,43 +1,42 @@
|
|||||||
|
|
||||||
// Gathers unpredictable system data to be used for generating
|
// Gathers unpredictable system data to be used for generating
|
||||||
// random bits
|
// random bits
|
||||||
|
|
||||||
#include <MacTypes.h>
|
#include <MacTypes.h>
|
||||||
|
|
||||||
class CRandomizer
|
class CRandomizer {
|
||||||
{
|
public:
|
||||||
public:
|
CRandomizer(void);
|
||||||
CRandomizer (void);
|
void PeriodicAction(void);
|
||||||
void PeriodicAction (void);
|
|
||||||
|
|
||||||
private:
|
private:
|
||||||
|
|
||||||
// Private calls
|
// Private calls
|
||||||
|
|
||||||
void AddTimeSinceMachineStartup (void);
|
void AddTimeSinceMachineStartup(void);
|
||||||
void AddAbsoluteSystemStartupTime (void);
|
void AddAbsoluteSystemStartupTime(void);
|
||||||
void AddAppRunningTime (void);
|
void AddAppRunningTime(void);
|
||||||
void AddStartupVolumeInfo (void);
|
void AddStartupVolumeInfo(void);
|
||||||
void AddFiller (void);
|
void AddFiller(void);
|
||||||
|
|
||||||
void AddCurrentMouse (void);
|
void AddCurrentMouse(void);
|
||||||
void AddNow (double millisecondUncertainty);
|
void AddNow(double millisecondUncertainty);
|
||||||
void AddBytes (void *data, long size, double entropy);
|
void AddBytes(void *data, long size, double entropy);
|
||||||
|
|
||||||
void GetTimeBaseResolution (void);
|
void GetTimeBaseResolution(void);
|
||||||
unsigned long SysTimer (void);
|
unsigned long SysTimer(void);
|
||||||
|
|
||||||
// System Info
|
// System Info
|
||||||
bool mSupportsLargeVolumes;
|
bool mSupportsLargeVolumes;
|
||||||
bool mIsPowerPC;
|
bool mIsPowerPC;
|
||||||
bool mIs601;
|
bool mIs601;
|
||||||
|
|
||||||
// Time info
|
// Time info
|
||||||
double mTimebaseTicksPerMillisec;
|
double mTimebaseTicksPerMillisec;
|
||||||
unsigned long mLastPeriodicTicks;
|
unsigned long mLastPeriodicTicks;
|
||||||
|
|
||||||
// Mouse info
|
// Mouse info
|
||||||
long mSamplePeriod;
|
long mSamplePeriod;
|
||||||
Point mLastMouse;
|
Point mLastMouse;
|
||||||
long mMouseStill;
|
long mMouseStill;
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -1,9 +1,9 @@
|
|||||||
#include <MacHeaders.h>
|
#include <MacHeaders.h>
|
||||||
#define B_ENDIAN
|
#define B_ENDIAN
|
||||||
#ifdef __POWERPC__
|
#ifdef __POWERPC__
|
||||||
#pragma longlong on
|
# pragma longlong on
|
||||||
#endif
|
#endif
|
||||||
#if 1
|
#if 1
|
||||||
#define MAC_OS_GUSI_SOURCE
|
# define MAC_OS_GUSI_SOURCE
|
||||||
#endif
|
#endif
|
||||||
#define MONOLITH
|
#define MONOLITH
|
||||||
|
|||||||
@@ -1,9 +1,9 @@
|
|||||||
#include <MacHeaders.h>
|
#include <MacHeaders.h>
|
||||||
#define B_ENDIAN
|
#define B_ENDIAN
|
||||||
#ifdef __POWERPC__
|
#ifdef __POWERPC__
|
||||||
#pragma longlong on
|
# pragma longlong on
|
||||||
#endif
|
#endif
|
||||||
#if 0
|
#if 0
|
||||||
#define MAC_OS_GUSI_SOURCE
|
# define MAC_OS_GUSI_SOURCE
|
||||||
#endif
|
#endif
|
||||||
#define MONOLITH
|
#define MONOLITH
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
#ifndef MK1MF_BUILD
|
#ifndef MK1MF_BUILD
|
||||||
# define CFLAGS "-DB_ENDIAN"
|
# define CFLAGS "-DB_ENDIAN"
|
||||||
# define PLATFORM "macos"
|
# define PLATFORM "macos"
|
||||||
# define DATE "Sun Feb 27 19:44:16 MET 2000"
|
# define DATE "Sun Feb 27 19:44:16 MET 2000"
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
@@ -1,116 +1,126 @@
|
|||||||
/* MacOS/opensslconf.h */
|
/* MacOS/opensslconf.h */
|
||||||
|
|
||||||
#if !(defined(VMS) || defined(__VMS)) /* VMS uses logical names instead */
|
#if !(defined(VMS) || defined(__VMS)) /* VMS uses logical names instead */
|
||||||
#if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR)
|
# if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR)
|
||||||
#define OPENSSLDIR "/usr/local/ssl"
|
# define OPENSSLDIR "/usr/local/ssl"
|
||||||
#endif
|
# endif
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if defined(HEADER_IDEA_H) && !defined(IDEA_INT)
|
#if defined(HEADER_IDEA_H) && !defined(IDEA_INT)
|
||||||
#define IDEA_INT unsigned int
|
# define IDEA_INT unsigned int
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if defined(HEADER_MD2_H) && !defined(MD2_INT)
|
#if defined(HEADER_MD2_H) && !defined(MD2_INT)
|
||||||
#define MD2_INT unsigned int
|
# define MD2_INT unsigned int
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if defined(HEADER_RC2_H) && !defined(RC2_INT)
|
#if defined(HEADER_RC2_H) && !defined(RC2_INT)
|
||||||
/* I need to put in a mod for the alpha - eay */
|
/* I need to put in a mod for the alpha - eay */
|
||||||
#define RC2_INT unsigned int
|
# define RC2_INT unsigned int
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if defined(HEADER_RC4_H)
|
#if defined(HEADER_RC4_H)
|
||||||
#if !defined(RC4_INT)
|
# if !defined(RC4_INT)
|
||||||
/* using int types make the structure larger but make the code faster
|
|
||||||
* on most boxes I have tested - up to %20 faster. */
|
|
||||||
/*
|
/*
|
||||||
|
* using int types make the structure larger but make the code faster on most
|
||||||
|
* boxes I have tested - up to %20 faster.
|
||||||
|
*/
|
||||||
|
/*-
|
||||||
* I don't know what does "most" mean, but declaring "int" is a must on:
|
* I don't know what does "most" mean, but declaring "int" is a must on:
|
||||||
* - Intel P6 because partial register stalls are very expensive;
|
* - Intel P6 because partial register stalls are very expensive;
|
||||||
* - elder Alpha because it lacks byte load/store instructions;
|
* - elder Alpha because it lacks byte load/store instructions;
|
||||||
*/
|
*/
|
||||||
#define RC4_INT unsigned char
|
# define RC4_INT unsigned char
|
||||||
#endif
|
# endif
|
||||||
#if !defined(RC4_CHUNK)
|
# if !defined(RC4_CHUNK)
|
||||||
/*
|
/*
|
||||||
* This enables code handling data aligned at natural CPU word
|
* This enables code handling data aligned at natural CPU word
|
||||||
* boundary. See crypto/rc4/rc4_enc.c for further details.
|
* boundary. See crypto/rc4/rc4_enc.c for further details.
|
||||||
*/
|
*/
|
||||||
#define RC4_CHUNK unsigned long
|
# define RC4_CHUNK unsigned long
|
||||||
#endif
|
# endif
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if defined(HEADER_DES_H) && !defined(DES_LONG)
|
#if defined(HEADER_DES_H) && !defined(DES_LONG)
|
||||||
/* If this is set to 'unsigned int' on a DEC Alpha, this gives about a
|
/*
|
||||||
* %20 speed up (longs are 8 bytes, int's are 4). */
|
* If this is set to 'unsigned int' on a DEC Alpha, this gives about a %20
|
||||||
#ifndef DES_LONG
|
* speed up (longs are 8 bytes, int's are 4).
|
||||||
#define DES_LONG unsigned long
|
*/
|
||||||
#endif
|
# ifndef DES_LONG
|
||||||
|
# define DES_LONG unsigned long
|
||||||
|
# endif
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if defined(HEADER_BN_H) && !defined(CONFIG_HEADER_BN_H)
|
#if defined(HEADER_BN_H) && !defined(CONFIG_HEADER_BN_H)
|
||||||
#define CONFIG_HEADER_BN_H
|
# define CONFIG_HEADER_BN_H
|
||||||
#if __option(longlong)
|
# if __option(longlong)
|
||||||
# define BN_LLONG
|
# define BN_LLONG
|
||||||
#else
|
# else
|
||||||
# undef BN_LLONG
|
# undef BN_LLONG
|
||||||
#endif
|
# endif
|
||||||
|
|
||||||
/* Should we define BN_DIV2W here? */
|
/* Should we define BN_DIV2W here? */
|
||||||
|
|
||||||
/* Only one for the following should be defined */
|
/* Only one for the following should be defined */
|
||||||
/* The prime number generation stuff may not work when
|
/*
|
||||||
* EIGHT_BIT but I don't care since I've only used this mode
|
* The prime number generation stuff may not work when EIGHT_BIT but I don't
|
||||||
* for debuging the bignum libraries */
|
* care since I've only used this mode for debuging the bignum libraries
|
||||||
#undef SIXTY_FOUR_BIT_LONG
|
*/
|
||||||
#undef SIXTY_FOUR_BIT
|
# undef SIXTY_FOUR_BIT_LONG
|
||||||
#define THIRTY_TWO_BIT
|
# undef SIXTY_FOUR_BIT
|
||||||
#undef SIXTEEN_BIT
|
# define THIRTY_TWO_BIT
|
||||||
#undef EIGHT_BIT
|
# undef SIXTEEN_BIT
|
||||||
|
# undef EIGHT_BIT
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if defined(HEADER_RC4_LOCL_H) && !defined(CONFIG_HEADER_RC4_LOCL_H)
|
#if defined(HEADER_RC4_LOCL_H) && !defined(CONFIG_HEADER_RC4_LOCL_H)
|
||||||
#define CONFIG_HEADER_RC4_LOCL_H
|
# define CONFIG_HEADER_RC4_LOCL_H
|
||||||
/* if this is defined data[i] is used instead of *data, this is a %20
|
/*
|
||||||
* speedup on x86 */
|
* if this is defined data[i] is used instead of *data, this is a %20 speedup
|
||||||
#undef RC4_INDEX
|
* on x86
|
||||||
|
*/
|
||||||
|
# undef RC4_INDEX
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if defined(HEADER_BF_LOCL_H) && !defined(CONFIG_HEADER_BF_LOCL_H)
|
#if defined(HEADER_BF_LOCL_H) && !defined(CONFIG_HEADER_BF_LOCL_H)
|
||||||
#define CONFIG_HEADER_BF_LOCL_H
|
# define CONFIG_HEADER_BF_LOCL_H
|
||||||
#define BF_PTR
|
# define BF_PTR
|
||||||
#endif /* HEADER_BF_LOCL_H */
|
#endif /* HEADER_BF_LOCL_H */
|
||||||
|
|
||||||
#if defined(HEADER_DES_LOCL_H) && !defined(CONFIG_HEADER_DES_LOCL_H)
|
#if defined(HEADER_DES_LOCL_H) && !defined(CONFIG_HEADER_DES_LOCL_H)
|
||||||
#define CONFIG_HEADER_DES_LOCL_H
|
# define CONFIG_HEADER_DES_LOCL_H
|
||||||
/* the following is tweaked from a config script, that is why it is a
|
/*
|
||||||
* protected undef/define */
|
* the following is tweaked from a config script, that is why it is a
|
||||||
#ifndef DES_PTR
|
* protected undef/define
|
||||||
#define DES_PTR
|
*/
|
||||||
#endif
|
# ifndef DES_PTR
|
||||||
|
# define DES_PTR
|
||||||
|
# endif
|
||||||
|
|
||||||
/* This helps C compiler generate the correct code for multiple functional
|
/*
|
||||||
|
* This helps C compiler generate the correct code for multiple functional
|
||||||
* units. It reduces register dependancies at the expense of 2 more
|
* units. It reduces register dependancies at the expense of 2 more
|
||||||
* registers */
|
* registers
|
||||||
#ifndef DES_RISC1
|
*/
|
||||||
#define DES_RISC1
|
# ifndef DES_RISC1
|
||||||
#endif
|
# define DES_RISC1
|
||||||
|
# endif
|
||||||
|
|
||||||
#ifndef DES_RISC2
|
# ifndef DES_RISC2
|
||||||
#undef DES_RISC2
|
# undef DES_RISC2
|
||||||
#endif
|
# endif
|
||||||
|
|
||||||
#if defined(DES_RISC1) && defined(DES_RISC2)
|
|
||||||
YOU SHOULD NOT HAVE BOTH DES_RISC1 AND DES_RISC2 DEFINED!!!!!
|
|
||||||
#endif
|
|
||||||
|
|
||||||
/* Unroll the inner loop, this sometimes helps, sometimes hinders.
|
|
||||||
* Very mucy CPU dependant */
|
|
||||||
#ifndef DES_UNROLL
|
|
||||||
#define DES_UNROLL
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#endif /* HEADER_DES_LOCL_H */
|
|
||||||
|
|
||||||
|
# if defined(DES_RISC1) && defined(DES_RISC2)
|
||||||
|
YOU SHOULD NOT HAVE BOTH DES_RISC1 AND DES_RISC2 DEFINED ! !!!!
|
||||||
|
# endif
|
||||||
|
/*
|
||||||
|
* Unroll the inner loop, this sometimes helps, sometimes hinders. Very mucy
|
||||||
|
* CPU dependant
|
||||||
|
*/
|
||||||
|
# ifndef DES_UNROLL
|
||||||
|
# define DES_UNROLL
|
||||||
|
# endif
|
||||||
|
#endif /* HEADER_DES_LOCL_H */
|
||||||
#ifndef __POWERPC__
|
#ifndef __POWERPC__
|
||||||
#define MD32_XARRAY
|
# define MD32_XARRAY
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
623
Makefile.org
623
Makefile.org
@@ -15,6 +15,11 @@ OPTIONS=
|
|||||||
CONFIGURE_ARGS=
|
CONFIGURE_ARGS=
|
||||||
SHLIB_TARGET=
|
SHLIB_TARGET=
|
||||||
|
|
||||||
|
# HERE indicates where this Makefile lives. This can be used to indicate
|
||||||
|
# where sub-Makefiles are expected to be. Currently has very limited usage,
|
||||||
|
# and should probably not be bothered with at all.
|
||||||
|
HERE=.
|
||||||
|
|
||||||
# INSTALL_PREFIX is for package builders so that they can configure
|
# INSTALL_PREFIX is for package builders so that they can configure
|
||||||
# for, say, /usr/ and yet have everything installed to /tmp/somedir/usr/.
|
# for, say, /usr/ and yet have everything installed to /tmp/somedir/usr/.
|
||||||
# Normally it is left empty.
|
# Normally it is left empty.
|
||||||
@@ -52,9 +57,8 @@ OPENSSLDIR=/usr/local/ssl
|
|||||||
# equal 4.
|
# equal 4.
|
||||||
# PKCS1_CHECK - pkcs1 tests.
|
# PKCS1_CHECK - pkcs1 tests.
|
||||||
|
|
||||||
CC= gcc
|
CC= cc
|
||||||
#CFLAG= -DL_ENDIAN -DTERMIO -O3 -fomit-frame-pointer -m486 -Wall -Wuninitialized -DSHA1_ASM -DMD5_ASM -DRMD160_ASM
|
CFLAG= -O
|
||||||
CFLAG= -DTERMIOS -DL_ENDIAN -fomit-frame-pointer -O3 -m486 -Wall -DSHA1_ASM -DMD5_ASM -DRMD160_ASM
|
|
||||||
DEPFLAG=
|
DEPFLAG=
|
||||||
PEX_LIBS=
|
PEX_LIBS=
|
||||||
EX_LIBS=
|
EX_LIBS=
|
||||||
@@ -62,122 +66,103 @@ EXE_EXT=
|
|||||||
ARFLAGS=
|
ARFLAGS=
|
||||||
AR=ar $(ARFLAGS) r
|
AR=ar $(ARFLAGS) r
|
||||||
RANLIB= ranlib
|
RANLIB= ranlib
|
||||||
|
NM= nm
|
||||||
PERL= perl
|
PERL= perl
|
||||||
TAR= tar
|
TAR= tar
|
||||||
TARFLAGS= --no-recursion
|
TARFLAGS= --no-recursion --record-size=10240
|
||||||
MAKEDEPPROG=makedepend
|
MAKEDEPPROG=makedepend
|
||||||
|
LIBDIR=lib
|
||||||
|
|
||||||
# Set BN_ASM to bn_asm.o if you want to use the C version
|
# We let the C compiler driver to take care of .s files. This is done in
|
||||||
BN_ASM= bn_asm.o
|
# order to be excused from maintaining a separate set of architecture
|
||||||
#BN_ASM= bn_asm.o
|
# dependent assembler flags. E.g. if you throw -mcpu=ultrasparc at SPARC
|
||||||
#BN_ASM= asm/bn86-elf.o # elf, linux-elf
|
# gcc, then the driver will automatically translate it to -xarch=v8plus
|
||||||
#BN_ASM= asm/bn86-sol.o # solaris
|
# and pass it down to assembler.
|
||||||
#BN_ASM= asm/bn86-out.o # a.out, FreeBSD
|
AS=$(CC) -c
|
||||||
#BN_ASM= asm/bn86bsdi.o # bsdi
|
ASFLAG=$(CFLAG)
|
||||||
#BN_ASM= asm/alpha.o # DEC Alpha
|
|
||||||
#BN_ASM= asm/pa-risc2.o # HP-UX PA-RISC
|
|
||||||
#BN_ASM= asm/r3000.o # SGI MIPS cpu
|
|
||||||
#BN_ASM= asm/sparc.o # Sun solaris/SunOS
|
|
||||||
#BN_ASM= asm/bn-win32.o # Windows 95/NT
|
|
||||||
#BN_ASM= asm/x86w16.o # 16 bit code for Windows 3.1/DOS
|
|
||||||
#BN_ASM= asm/x86w32.o # 32 bit code for Windows 3.1
|
|
||||||
|
|
||||||
# For x86 assembler: Set PROCESSOR to 386 if you want to support
|
# For x86 assembler: Set PROCESSOR to 386 if you want to support
|
||||||
# the 80386.
|
# the 80386.
|
||||||
PROCESSOR=
|
PROCESSOR=
|
||||||
|
|
||||||
# Set DES_ENC to des_enc.o if you want to use the C version
|
# CPUID module collects small commonly used assembler snippets
|
||||||
#There are 4 x86 assember options.
|
CPUID_OBJ=
|
||||||
DES_ENC= asm/dx86-out.o asm/yx86-out.o
|
BN_ASM= bn_asm.o
|
||||||
#DES_ENC= des_enc.o fcrypt_b.o # C
|
DES_ENC= des_enc.o fcrypt_b.o
|
||||||
#DES_ENC= asm/dx86-elf.o asm/yx86-elf.o # elf
|
AES_ENC= aes_core.o aes_cbc.o
|
||||||
#DES_ENC= asm/dx86-sol.o asm/yx86-sol.o # solaris
|
BF_ENC= bf_enc.o
|
||||||
#DES_ENC= asm/dx86-out.o asm/yx86-out.o # a.out, FreeBSD
|
CAST_ENC= c_enc.o
|
||||||
#DES_ENC= asm/dx86bsdi.o asm/yx86bsdi.o # bsdi
|
RC4_ENC= rc4_enc.o
|
||||||
|
RC5_ENC= rc5_enc.o
|
||||||
# Set BF_ENC to bf_enc.o if you want to use the C version
|
MD5_ASM_OBJ=
|
||||||
#There are 4 x86 assember options.
|
SHA1_ASM_OBJ=
|
||||||
BF_ENC= asm/bx86-out.o
|
RMD160_ASM_OBJ=
|
||||||
#BF_ENC= bf_enc.o
|
WP_ASM_OBJ=
|
||||||
#BF_ENC= asm/bx86-elf.o # elf
|
CMLL_ENC=
|
||||||
#BF_ENC= asm/bx86-sol.o # solaris
|
MODES_ASM_OBJ=
|
||||||
#BF_ENC= asm/bx86-out.o # a.out, FreeBSD
|
ENGINES_ASM_OBJ=
|
||||||
#BF_ENC= asm/bx86bsdi.o # bsdi
|
PERLASM_SCHEME=
|
||||||
|
|
||||||
# Set CAST_ENC to c_enc.o if you want to use the C version
|
|
||||||
#There are 4 x86 assember options.
|
|
||||||
CAST_ENC= asm/cx86-out.o
|
|
||||||
#CAST_ENC= c_enc.o
|
|
||||||
#CAST_ENC= asm/cx86-elf.o # elf
|
|
||||||
#CAST_ENC= asm/cx86-sol.o # solaris
|
|
||||||
#CAST_ENC= asm/cx86-out.o # a.out, FreeBSD
|
|
||||||
#CAST_ENC= asm/cx86bsdi.o # bsdi
|
|
||||||
|
|
||||||
# Set RC4_ENC to rc4_enc.o if you want to use the C version
|
|
||||||
#There are 4 x86 assember options.
|
|
||||||
RC4_ENC= asm/rx86-out.o
|
|
||||||
#RC4_ENC= rc4_enc.o
|
|
||||||
#RC4_ENC= asm/rx86-elf.o # elf
|
|
||||||
#RC4_ENC= asm/rx86-sol.o # solaris
|
|
||||||
#RC4_ENC= asm/rx86-out.o # a.out, FreeBSD
|
|
||||||
#RC4_ENC= asm/rx86bsdi.o # bsdi
|
|
||||||
|
|
||||||
# Set RC5_ENC to rc5_enc.o if you want to use the C version
|
|
||||||
#There are 4 x86 assember options.
|
|
||||||
RC5_ENC= asm/r586-out.o
|
|
||||||
#RC5_ENC= rc5_enc.o
|
|
||||||
#RC5_ENC= asm/r586-elf.o # elf
|
|
||||||
#RC5_ENC= asm/r586-sol.o # solaris
|
|
||||||
#RC5_ENC= asm/r586-out.o # a.out, FreeBSD
|
|
||||||
#RC5_ENC= asm/r586bsdi.o # bsdi
|
|
||||||
|
|
||||||
# Also need MD5_ASM defined
|
|
||||||
MD5_ASM_OBJ= asm/mx86-out.o
|
|
||||||
#MD5_ASM_OBJ= asm/mx86-elf.o # elf
|
|
||||||
#MD5_ASM_OBJ= asm/mx86-sol.o # solaris
|
|
||||||
#MD5_ASM_OBJ= asm/mx86-out.o # a.out, FreeBSD
|
|
||||||
#MD5_ASM_OBJ= asm/mx86bsdi.o # bsdi
|
|
||||||
|
|
||||||
# Also need SHA1_ASM defined
|
|
||||||
SHA1_ASM_OBJ= asm/sx86-out.o
|
|
||||||
#SHA1_ASM_OBJ= asm/sx86-elf.o # elf
|
|
||||||
#SHA1_ASM_OBJ= asm/sx86-sol.o # solaris
|
|
||||||
#SHA1_ASM_OBJ= asm/sx86-out.o # a.out, FreeBSD
|
|
||||||
#SHA1_ASM_OBJ= asm/sx86bsdi.o # bsdi
|
|
||||||
|
|
||||||
# Also need RMD160_ASM defined
|
|
||||||
RMD160_ASM_OBJ= asm/rm86-out.o
|
|
||||||
#RMD160_ASM_OBJ= asm/rm86-elf.o # elf
|
|
||||||
#RMD160_ASM_OBJ= asm/rm86-sol.o # solaris
|
|
||||||
#RMD160_ASM_OBJ= asm/rm86-out.o # a.out, FreeBSD
|
|
||||||
#RMD160_ASM_OBJ= asm/rm86bsdi.o # bsdi
|
|
||||||
|
|
||||||
# KRB5 stuff
|
# KRB5 stuff
|
||||||
KRB5_INCLUDES=
|
KRB5_INCLUDES=
|
||||||
LIBKRB5=
|
LIBKRB5=
|
||||||
|
|
||||||
|
# Zlib stuff
|
||||||
|
ZLIB_INCLUDE=
|
||||||
|
LIBZLIB=
|
||||||
|
|
||||||
|
# TOP level FIPS install directory.
|
||||||
|
FIPSDIR=
|
||||||
|
|
||||||
|
# This is the location of fipscanister.o and friends.
|
||||||
|
# The FIPS module build will place it $(INSTALLTOP)/lib
|
||||||
|
# but since $(INSTALLTOP) can only take the default value
|
||||||
|
# when the module is built it will be in /usr/local/ssl/lib
|
||||||
|
# $(INSTALLTOP) for this build may be different so hard
|
||||||
|
# code the path.
|
||||||
|
|
||||||
|
FIPSLIBDIR=
|
||||||
|
|
||||||
|
# The location of the library which contains fipscanister.o
|
||||||
|
# normally it will be libcrypto unless fipsdso is set in which
|
||||||
|
# case it will be libfips. If not compiling in FIPS mode at all
|
||||||
|
# this is empty making it a useful test for a FIPS compile.
|
||||||
|
|
||||||
|
FIPSCANLIB=
|
||||||
|
|
||||||
|
# Shared library base address. Currently only used on Windows.
|
||||||
|
#
|
||||||
|
|
||||||
|
BASEADDR=
|
||||||
|
|
||||||
DIRS= crypto ssl engines apps test tools
|
DIRS= crypto ssl engines apps test tools
|
||||||
|
ENGDIRS= ccgost
|
||||||
SHLIBDIRS= crypto ssl
|
SHLIBDIRS= crypto ssl
|
||||||
|
|
||||||
# dirs in crypto to build
|
# dirs in crypto to build
|
||||||
SDIRS= \
|
SDIRS= \
|
||||||
md2 md4 md5 sha mdc2 hmac ripemd \
|
objects \
|
||||||
des rc2 rc4 rc5 idea bf cast \
|
md2 md4 md5 sha mdc2 hmac ripemd whrlpool \
|
||||||
bn ec rsa dsa ecdsa dh ecdh dso engine aes \
|
des aes rc2 rc4 rc5 idea bf cast camellia seed modes \
|
||||||
buffer bio stack lhash rand err objects \
|
bn ec rsa dsa ecdsa dh ecdh dso engine \
|
||||||
evp asn1 pem x509 x509v3 conf txt_db pkcs7 pkcs12 comp ocsp ui krb5
|
buffer bio stack lhash rand err \
|
||||||
|
evp asn1 pem x509 x509v3 conf txt_db pkcs7 pkcs12 comp ocsp ui krb5 \
|
||||||
|
cms pqueue ts jpake srp store cmac
|
||||||
|
# keep in mind that the above list is adjusted by ./Configure
|
||||||
|
# according to no-xxx arguments...
|
||||||
|
|
||||||
# tests to perform. "alltests" is a special word indicating that all tests
|
# tests to perform. "alltests" is a special word indicating that all tests
|
||||||
# should be performed.
|
# should be performed.
|
||||||
TESTS = alltests
|
TESTS = alltests
|
||||||
|
|
||||||
MAKEFILE= Makefile.ssl
|
MAKEFILE= Makefile
|
||||||
NEWMAKE= make
|
|
||||||
MAKE= $(NEWMAKE) -f Makefile.ssl
|
|
||||||
|
|
||||||
MANDIR=$(OPENSSLDIR)/man
|
MANDIR=$(OPENSSLDIR)/man
|
||||||
MAN1=1
|
MAN1=1
|
||||||
MAN3=3
|
MAN3=3
|
||||||
|
MANSUFFIX=
|
||||||
|
HTMLSUFFIX=html
|
||||||
|
HTMLDIR=$(OPENSSLDIR)/html
|
||||||
SHELL=/bin/sh
|
SHELL=/bin/sh
|
||||||
|
|
||||||
TOP= .
|
TOP= .
|
||||||
@@ -199,39 +184,132 @@ WTARFILE= $(NAME)-win.tar
|
|||||||
EXHEADER= e_os2.h
|
EXHEADER= e_os2.h
|
||||||
HEADER= e_os.h
|
HEADER= e_os.h
|
||||||
|
|
||||||
all: Makefile.ssl build_all openssl.pc
|
all: Makefile build_all
|
||||||
|
|
||||||
BUILD_CMD=if echo " $(DIRS) " | grep " $$i " >/dev/null 2>/dev/null; then \
|
# as we stick to -e, CLEARENV ensures that local variables in lower
|
||||||
if [ -d "$$i" ]; then \
|
# Makefiles remain local and variable. $${VAR+VAR} is tribute to Korn
|
||||||
(cd $$i && echo "making all in $$i..." && \
|
# shell, which [annoyingly enough] terminates unset with error if VAR
|
||||||
$(MAKE) CC='${CC}' PLATFORM='${PLATFORM}' CFLAG='${CFLAG}' SDIRS='$(SDIRS)' INSTALLTOP='${INSTALLTOP}' PEX_LIBS='${PEX_LIBS}' EX_LIBS='${EX_LIBS}' BN_ASM='${BN_ASM}' DES_ENC='${DES_ENC}' BF_ENC='${BF_ENC}' CAST_ENC='${CAST_ENC}' RC4_ENC='${RC4_ENC}' RC5_ENC='${RC5_ENC}' SHA1_ASM_OBJ='${SHA1_ASM_OBJ}' MD5_ASM_OBJ='${MD5_ASM_OBJ}' RMD160_ASM_OBJ='${RMD160_ASM_OBJ}' AR='${AR}' PROCESSOR='${PROCESSOR}' PERL='${PERL}' RANLIB='${RANLIB}' KRB5_INCLUDES='${KRB5_INCLUDES}' LIBKRB5='${LIBKRB5}' EXE_EXT='${EXE_EXT}' SHARED_LIBS='${SHARED_LIBS}' SHLIB_EXT='${SHLIB_EXT}' SHLIB_TARGET='${SHLIB_TARGET}' all ) || exit 1; \
|
# is not present:-( TOP= && unset TOP is tribute to HP-UX /bin/sh,
|
||||||
else \
|
# which terminates unset with error if no variable was present:-(
|
||||||
$(MAKE) $$i; \
|
CLEARENV= TOP= && unset TOP $${LIB+LIB} $${LIBS+LIBS} \
|
||||||
fi; fi
|
$${INCLUDE+INCLUDE} $${INCLUDES+INCLUDES} \
|
||||||
|
$${DIR+DIR} $${DIRS+DIRS} $${SRC+SRC} \
|
||||||
|
$${LIBSRC+LIBSRC} $${LIBOBJ+LIBOBJ} $${ALL+ALL} \
|
||||||
|
$${EXHEADER+EXHEADER} $${HEADER+HEADER} \
|
||||||
|
$${GENERAL+GENERAL} $${CFLAGS+CFLAGS} \
|
||||||
|
$${ASFLAGS+ASFLAGS} $${AFLAGS+AFLAGS} \
|
||||||
|
$${LDCMD+LDCMD} $${LDFLAGS+LDFLAGS} $${SCRIPTS+SCRIPTS} \
|
||||||
|
$${SHAREDCMD+SHAREDCMD} $${SHAREDFLAGS+SHAREDFLAGS} \
|
||||||
|
$${SHARED_LIB+SHARED_LIB} $${LIBEXTRAS+LIBEXTRAS}
|
||||||
|
|
||||||
|
BUILDENV= PLATFORM='$(PLATFORM)' PROCESSOR='$(PROCESSOR)' \
|
||||||
|
CC='$(CC)' CFLAG='$(CFLAG)' \
|
||||||
|
AS='$(CC)' ASFLAG='$(CFLAG) -c' \
|
||||||
|
AR='$(AR)' NM='$(NM)' RANLIB='$(RANLIB)' \
|
||||||
|
CROSS_COMPILE='$(CROSS_COMPILE)' \
|
||||||
|
PERL='$(PERL)' ENGDIRS='$(ENGDIRS)' \
|
||||||
|
SDIRS='$(SDIRS)' LIBRPATH='$(INSTALLTOP)/$(LIBDIR)' \
|
||||||
|
INSTALL_PREFIX='$(INSTALL_PREFIX)' \
|
||||||
|
INSTALLTOP='$(INSTALLTOP)' OPENSSLDIR='$(OPENSSLDIR)' \
|
||||||
|
LIBDIR='$(LIBDIR)' \
|
||||||
|
MAKEDEPEND='$$$${TOP}/util/domd $$$${TOP} -MD $(MAKEDEPPROG)' \
|
||||||
|
DEPFLAG='-DOPENSSL_NO_DEPRECATED $(DEPFLAG)' \
|
||||||
|
MAKEDEPPROG='$(MAKEDEPPROG)' \
|
||||||
|
SHARED_LDFLAGS='$(SHARED_LDFLAGS)' \
|
||||||
|
KRB5_INCLUDES='$(KRB5_INCLUDES)' LIBKRB5='$(LIBKRB5)' \
|
||||||
|
ZLIB_INCLUDE='$(ZLIB_INCLUDE)' LIBZLIB='$(LIBZLIB)' \
|
||||||
|
EXE_EXT='$(EXE_EXT)' SHARED_LIBS='$(SHARED_LIBS)' \
|
||||||
|
SHLIB_EXT='$(SHLIB_EXT)' SHLIB_TARGET='$(SHLIB_TARGET)' \
|
||||||
|
PEX_LIBS='$(PEX_LIBS)' EX_LIBS='$(EX_LIBS)' \
|
||||||
|
CPUID_OBJ='$(CPUID_OBJ)' \
|
||||||
|
BN_ASM='$(BN_ASM)' DES_ENC='$(DES_ENC)' \
|
||||||
|
AES_ENC='$(AES_ENC)' CMLL_ENC='$(CMLL_ENC)' \
|
||||||
|
BF_ENC='$(BF_ENC)' CAST_ENC='$(CAST_ENC)' \
|
||||||
|
RC4_ENC='$(RC4_ENC)' RC5_ENC='$(RC5_ENC)' \
|
||||||
|
SHA1_ASM_OBJ='$(SHA1_ASM_OBJ)' \
|
||||||
|
MD5_ASM_OBJ='$(MD5_ASM_OBJ)' \
|
||||||
|
RMD160_ASM_OBJ='$(RMD160_ASM_OBJ)' \
|
||||||
|
WP_ASM_OBJ='$(WP_ASM_OBJ)' \
|
||||||
|
MODES_ASM_OBJ='$(MODES_ASM_OBJ)' \
|
||||||
|
ENGINES_ASM_OBJ='$(ENGINES_ASM_OBJ)' \
|
||||||
|
PERLASM_SCHEME='$(PERLASM_SCHEME)' \
|
||||||
|
FIPSLIBDIR='${FIPSLIBDIR}' \
|
||||||
|
FIPSDIR='${FIPSDIR}' \
|
||||||
|
FIPSCANLIB="$${FIPSCANLIB:-$(FIPSCANLIB)}" \
|
||||||
|
THIS=$${THIS:-$@} MAKEFILE=Makefile MAKEOVERRIDES=
|
||||||
|
# MAKEOVERRIDES= effectively "equalizes" GNU-ish and SysV-ish make flavors,
|
||||||
|
# which in turn eliminates ambiguities in variable treatment with -e.
|
||||||
|
|
||||||
|
# BUILD_CMD is a generic macro to build a given target in a given
|
||||||
|
# subdirectory. The target must be given through the shell variable
|
||||||
|
# `target' and the subdirectory to build in must be given through `dir'.
|
||||||
|
# This macro shouldn't be used directly, use RECURSIVE_BUILD_CMD or
|
||||||
|
# BUILD_ONE_CMD instead.
|
||||||
|
#
|
||||||
|
# BUILD_ONE_CMD is a macro to build a given target in a given
|
||||||
|
# subdirectory if that subdirectory is part of $(DIRS). It requires
|
||||||
|
# exactly the same shell variables as BUILD_CMD.
|
||||||
|
#
|
||||||
|
# RECURSIVE_BUILD_CMD is a macro to build a given target in all
|
||||||
|
# subdirectories defined in $(DIRS). It requires that the target
|
||||||
|
# is given through the shell variable `target'.
|
||||||
|
BUILD_CMD= if [ -d "$$dir" ]; then \
|
||||||
|
( cd $$dir && echo "making $$target in $$dir..." && \
|
||||||
|
$(CLEARENV) && $(MAKE) -e $(BUILDENV) TOP=.. DIR=$$dir $$target \
|
||||||
|
) || exit 1; \
|
||||||
|
fi
|
||||||
|
RECURSIVE_BUILD_CMD=for dir in $(DIRS); do $(BUILD_CMD); done
|
||||||
|
BUILD_ONE_CMD=\
|
||||||
|
if expr " $(DIRS) " : ".* $$dir " >/dev/null 2>&1; then \
|
||||||
|
$(BUILD_CMD); \
|
||||||
|
fi
|
||||||
|
|
||||||
|
reflect:
|
||||||
|
@[ -n "$(THIS)" ] && $(CLEARENV) && $(MAKE) $(THIS) -e $(BUILDENV)
|
||||||
|
|
||||||
sub_all: build_all
|
sub_all: build_all
|
||||||
build_all: build_libs build_apps build_tests build_tools
|
build_all: build_libs build_apps build_tests build_tools
|
||||||
|
|
||||||
build_libs: build_crypto build_ssl build_engines
|
build_libs: build_libcrypto build_libssl openssl.pc
|
||||||
|
|
||||||
|
build_libcrypto: build_crypto build_engines libcrypto.pc
|
||||||
|
build_libssl: build_ssl libssl.pc
|
||||||
|
|
||||||
build_crypto:
|
build_crypto:
|
||||||
@i=crypto; $(BUILD_CMD)
|
@dir=crypto; target=all; $(BUILD_ONE_CMD)
|
||||||
build_ssl:
|
build_ssl:
|
||||||
@i=ssl; $(BUILD_CMD)
|
@dir=ssl; target=all; $(BUILD_ONE_CMD)
|
||||||
build_engines:
|
build_engines:
|
||||||
@i=engines; $(BUILD_CMD)
|
@dir=engines; target=all; $(BUILD_ONE_CMD)
|
||||||
build_apps:
|
build_apps:
|
||||||
@i=apps; $(BUILD_CMD)
|
@dir=apps; target=all; $(BUILD_ONE_CMD)
|
||||||
build_tests:
|
build_tests:
|
||||||
@i=test; $(BUILD_CMD)
|
@dir=test; target=all; $(BUILD_ONE_CMD)
|
||||||
build_tools:
|
build_tools:
|
||||||
@i=tools; $(BUILD_CMD)
|
@dir=tools; target=all; $(BUILD_ONE_CMD)
|
||||||
|
|
||||||
libcrypto$(SHLIB_EXT): libcrypto.a
|
all_testapps: build_libs build_testapps
|
||||||
|
build_testapps:
|
||||||
|
@dir=crypto; target=testapps; $(BUILD_ONE_CMD)
|
||||||
|
|
||||||
|
fips_premain_dso$(EXE_EXT): libcrypto.a
|
||||||
|
[ -z "$(FIPSCANLIB)" ] || $(CC) $(CFLAG) -Iinclude \
|
||||||
|
-DFINGERPRINT_PREMAIN_DSO_LOAD -o $@ \
|
||||||
|
$(FIPSLIBDIR)fips_premain.c $(FIPSLIBDIR)fipscanister.o \
|
||||||
|
libcrypto.a $(EX_LIBS)
|
||||||
|
|
||||||
|
libcrypto$(SHLIB_EXT): libcrypto.a fips_premain_dso$(EXE_EXT)
|
||||||
@if [ "$(SHLIB_TARGET)" != "" ]; then \
|
@if [ "$(SHLIB_TARGET)" != "" ]; then \
|
||||||
$(MAKE) SHLIBDIRS=crypto build-shared; \
|
if [ "$(FIPSCANLIB)" = "libcrypto" ]; then \
|
||||||
|
FIPSLD_LIBCRYPTO=libcrypto.a ; \
|
||||||
|
FIPSLD_CC="$(CC)"; CC=$(FIPSDIR)/bin/fipsld; \
|
||||||
|
export CC FIPSLD_CC FIPSLD_LIBCRYPTO; \
|
||||||
|
fi; \
|
||||||
|
$(MAKE) -e SHLIBDIRS=crypto CC="$${CC:-$(CC)}" build-shared && \
|
||||||
|
(touch -c fips_premain_dso$(EXE_EXT) || :); \
|
||||||
else \
|
else \
|
||||||
echo "There's no support for shared libraries on this platform" >&2; \
|
echo "There's no support for shared libraries on this platform" >&2; \
|
||||||
|
exit 1; \
|
||||||
fi
|
fi
|
||||||
|
|
||||||
libssl$(SHLIB_EXT): libcrypto$(SHLIB_EXT) libssl.a
|
libssl$(SHLIB_EXT): libcrypto$(SHLIB_EXT) libssl.a
|
||||||
@@ -239,10 +317,11 @@ libssl$(SHLIB_EXT): libcrypto$(SHLIB_EXT) libssl.a
|
|||||||
$(MAKE) SHLIBDIRS=ssl SHLIBDEPS='-lcrypto' build-shared; \
|
$(MAKE) SHLIBDIRS=ssl SHLIBDEPS='-lcrypto' build-shared; \
|
||||||
else \
|
else \
|
||||||
echo "There's no support for shared libraries on this platform" >&2; \
|
echo "There's no support for shared libraries on this platform" >&2; \
|
||||||
|
exit 1; \
|
||||||
fi
|
fi
|
||||||
|
|
||||||
clean-shared:
|
clean-shared:
|
||||||
@for i in $(SHLIBDIRS); do \
|
@set -e; for i in $(SHLIBDIRS); do \
|
||||||
if [ -n "$(SHARED_LIBS_LINK_EXTS)" ]; then \
|
if [ -n "$(SHARED_LIBS_LINK_EXTS)" ]; then \
|
||||||
tmp="$(SHARED_LIBS_LINK_EXTS)"; \
|
tmp="$(SHARED_LIBS_LINK_EXTS)"; \
|
||||||
for j in $${tmp:-x}; do \
|
for j in $${tmp:-x}; do \
|
||||||
@@ -256,10 +335,10 @@ clean-shared:
|
|||||||
done
|
done
|
||||||
|
|
||||||
link-shared:
|
link-shared:
|
||||||
@ for i in ${SHLIBDIRS}; do \
|
@ set -e; for i in $(SHLIBDIRS); do \
|
||||||
$(NEWMAKE) -f Makefile.shared \
|
$(MAKE) -f $(HERE)/Makefile.shared -e $(BUILDENV) \
|
||||||
LIBNAME=$$i LIBVERSION=${SHLIB_MAJOR}.${SHLIB_MINOR} \
|
LIBNAME=$$i LIBVERSION=$(SHLIB_MAJOR).$(SHLIB_MINOR) \
|
||||||
LIBCOMPATVERSIONS=";${SHLIB_VERSION_HISTORY}" \
|
LIBCOMPATVERSIONS=";$(SHLIB_VERSION_HISTORY)" \
|
||||||
symlink.$(SHLIB_TARGET); \
|
symlink.$(SHLIB_TARGET); \
|
||||||
libs="$$libs -l$$i"; \
|
libs="$$libs -l$$i"; \
|
||||||
done
|
done
|
||||||
@@ -267,52 +346,76 @@ link-shared:
|
|||||||
build-shared: do_$(SHLIB_TARGET) link-shared
|
build-shared: do_$(SHLIB_TARGET) link-shared
|
||||||
|
|
||||||
do_$(SHLIB_TARGET):
|
do_$(SHLIB_TARGET):
|
||||||
@ libs='-L. ${SHLIBDEPS}'; for i in ${SHLIBDIRS}; do \
|
@ set -e; libs='-L. $(SHLIBDEPS)'; for i in $(SHLIBDIRS); do \
|
||||||
$(NEWMAKE) -f Makefile.shared \
|
if [ "$$i" = "ssl" -a -n "$(LIBKRB5)" ]; then \
|
||||||
CC="$(CC)" LDFLAGS="$(LDFLAGS)" \
|
libs="$(LIBKRB5) $$libs"; \
|
||||||
SHARED_LDFLAGS="$(SHARED_LDFLAGS)" \
|
fi; \
|
||||||
LIBNAME=$$i LIBVERSION=${SHLIB_MAJOR}.${SHLIB_MINOR} \
|
$(CLEARENV) && $(MAKE) -f Makefile.shared -e $(BUILDENV) \
|
||||||
LIBCOMPATVERSIONS=";${SHLIB_VERSION_HISTORY}" \
|
LIBNAME=$$i LIBVERSION=$(SHLIB_MAJOR).$(SHLIB_MINOR) \
|
||||||
|
LIBCOMPATVERSIONS=";$(SHLIB_VERSION_HISTORY)" \
|
||||||
LIBDEPS="$$libs $(EX_LIBS)" \
|
LIBDEPS="$$libs $(EX_LIBS)" \
|
||||||
link_a.$(SHLIB_TARGET); \
|
link_a.$(SHLIB_TARGET); \
|
||||||
libs="$$libs -l$$i"; \
|
libs="-l$$i $$libs"; \
|
||||||
done
|
done
|
||||||
|
|
||||||
openssl.pc:
|
libcrypto.pc: Makefile
|
||||||
@ ( echo 'prefix=$(INSTALLTOP)'; \
|
@ ( echo 'prefix=$(INSTALLTOP)'; \
|
||||||
echo 'exec_prefix=$${prefix}'; \
|
echo 'exec_prefix=$${prefix}'; \
|
||||||
echo 'libdir=$${exec_prefix}/lib'; \
|
echo 'libdir=$${exec_prefix}/$(LIBDIR)'; \
|
||||||
|
echo 'includedir=$${prefix}/include'; \
|
||||||
|
echo ''; \
|
||||||
|
echo 'Name: OpenSSL-libcrypto'; \
|
||||||
|
echo 'Description: OpenSSL cryptography library'; \
|
||||||
|
echo 'Version: '$(VERSION); \
|
||||||
|
echo 'Requires: '; \
|
||||||
|
echo 'Libs: -L$${libdir} -lcrypto'; \
|
||||||
|
echo 'Libs.private: $(EX_LIBS)'; \
|
||||||
|
echo 'Cflags: -I$${includedir} $(KRB5_INCLUDES)' ) > libcrypto.pc
|
||||||
|
|
||||||
|
libssl.pc: Makefile
|
||||||
|
@ ( echo 'prefix=$(INSTALLTOP)'; \
|
||||||
|
echo 'exec_prefix=$${prefix}'; \
|
||||||
|
echo 'libdir=$${exec_prefix}/$(LIBDIR)'; \
|
||||||
|
echo 'includedir=$${prefix}/include'; \
|
||||||
|
echo ''; \
|
||||||
|
echo 'Name: OpenSSL'; \
|
||||||
|
echo 'Description: Secure Sockets Layer and cryptography libraries'; \
|
||||||
|
echo 'Version: '$(VERSION); \
|
||||||
|
echo 'Requires: '; \
|
||||||
|
echo 'Libs: -L$${libdir} -lssl -lcrypto'; \
|
||||||
|
echo 'Libs.private: $(EX_LIBS)'; \
|
||||||
|
echo 'Cflags: -I$${includedir} $(KRB5_INCLUDES)' ) > libssl.pc
|
||||||
|
|
||||||
|
openssl.pc: Makefile
|
||||||
|
@ ( echo 'prefix=$(INSTALLTOP)'; \
|
||||||
|
echo 'exec_prefix=$${prefix}'; \
|
||||||
|
echo 'libdir=$${exec_prefix}/$(LIBDIR)'; \
|
||||||
echo 'includedir=$${prefix}/include'; \
|
echo 'includedir=$${prefix}/include'; \
|
||||||
echo ''; \
|
echo ''; \
|
||||||
echo 'Name: OpenSSL'; \
|
echo 'Name: OpenSSL'; \
|
||||||
echo 'Description: Secure Sockets Layer and cryptography libraries and tools'; \
|
echo 'Description: Secure Sockets Layer and cryptography libraries and tools'; \
|
||||||
echo 'Version: '$(VERSION); \
|
echo 'Version: '$(VERSION); \
|
||||||
echo 'Requires: '; \
|
echo 'Requires: '; \
|
||||||
echo 'Libs: -L$${libdir} -lssl -lcrypto $(EX_LIBS)'; \
|
echo 'Libs: -L$${libdir} -lssl -lcrypto'; \
|
||||||
echo 'Cflags: -I$${includedir}' ) > openssl.pc
|
echo 'Libs.private: $(EX_LIBS)'; \
|
||||||
|
echo 'Cflags: -I$${includedir} $(KRB5_INCLUDES)' ) > openssl.pc
|
||||||
|
|
||||||
Makefile.ssl: Makefile.org
|
Makefile: Makefile.org Configure config
|
||||||
@echo "Makefile.ssl is older than Makefile.org."
|
@echo "Makefile is older than Makefile.org, Configure or config."
|
||||||
@echo "Reconfigure the source tree (via './config' or 'perl Configure'), please."
|
@echo "Reconfigure the source tree (via './config' or 'perl Configure'), please."
|
||||||
@false
|
@false
|
||||||
|
|
||||||
libclean:
|
libclean:
|
||||||
rm -f *.so *.so.* engines/*.so *.a */lib */*/lib
|
rm -f *.map *.so *.so.* *.dylib *.dll engines/*.so engines/*.dll engines/*.dylib *.a engines/*.a */lib */*/lib
|
||||||
|
|
||||||
clean:
|
clean: libclean
|
||||||
rm -f shlib/*.o *.o core a.out fluff *.map rehash.time testlog make.log cctest cctest.c
|
rm -f shlib/*.o *.o core a.out fluff rehash.time testlog make.log cctest cctest.c
|
||||||
@for i in $(DIRS) ;\
|
@set -e; target=clean; $(RECURSIVE_BUILD_CMD)
|
||||||
do \
|
rm -f $(LIBS)
|
||||||
if [ -d "$$i" ]; then \
|
rm -f openssl.pc libssl.pc libcrypto.pc
|
||||||
(cd $$i && echo "making clean in $$i..." && \
|
rm -f speed.* .pure
|
||||||
$(MAKE) SDIRS='${SDIRS}' clean ) || exit 1; \
|
|
||||||
rm -f $(LIBS); \
|
|
||||||
fi; \
|
|
||||||
done;
|
|
||||||
rm -f openssl.pc
|
|
||||||
rm -f *.a *.o speed.* *.map *.so .pure core
|
|
||||||
rm -f $(TARFILE)
|
rm -f $(TARFILE)
|
||||||
@for i in $(ONEDIRS) ;\
|
@set -e; for i in $(ONEDIRS) ;\
|
||||||
do \
|
do \
|
||||||
rm -fr $$i/*; \
|
rm -fr $$i/*; \
|
||||||
done
|
done
|
||||||
@@ -322,93 +425,58 @@ makefile.one: files
|
|||||||
sh util/do_ms.sh
|
sh util/do_ms.sh
|
||||||
|
|
||||||
files:
|
files:
|
||||||
$(PERL) $(TOP)/util/files.pl Makefile.ssl > $(TOP)/MINFO
|
$(PERL) $(TOP)/util/files.pl Makefile > $(TOP)/MINFO
|
||||||
@for i in $(DIRS) ;\
|
@set -e; target=files; $(RECURSIVE_BUILD_CMD)
|
||||||
do \
|
|
||||||
if [ -d "$$i" ]; then \
|
|
||||||
(cd $$i && echo "making 'files' in $$i..." && \
|
|
||||||
$(MAKE) SDIRS='${SDIRS}' PERL='${PERL}' files ) || exit 1; \
|
|
||||||
fi; \
|
|
||||||
done;
|
|
||||||
|
|
||||||
links:
|
links:
|
||||||
@$(TOP)/util/point.sh Makefile.ssl Makefile
|
|
||||||
@$(PERL) $(TOP)/util/mkdir-p.pl include/openssl
|
@$(PERL) $(TOP)/util/mkdir-p.pl include/openssl
|
||||||
@$(PERL) $(TOP)/util/mklink.pl include/openssl $(EXHEADER)
|
@$(PERL) $(TOP)/util/mklink.pl include/openssl $(EXHEADER)
|
||||||
@for i in $(DIRS); do \
|
@set -e; target=links; $(RECURSIVE_BUILD_CMD)
|
||||||
if [ -d "$$i" ]; then \
|
|
||||||
(cd $$i && echo "making links in $$i..." && \
|
|
||||||
$(MAKE) CC='${CC}' PLATFORM='${PLATFORM}' CFLAG='${CFLAG}' SDIRS='$(SDIRS)' INSTALLTOP='${INSTALLTOP}' PEX_LIBS='${PEX_LIBS}' EX_LIBS='${EX_LIBS}' BN_ASM='${BN_ASM}' DES_ENC='${DES_ENC}' BF_ENC='${BF_ENC}' CAST_ENC='${CAST_ENC}' RC4_ENC='${RC4_ENC}' RC5_ENC='${RC5_ENC}' SHA1_ASM_OBJ='${SHA1_ASM_OBJ}' MD5_ASM_OBJ='${MD5_ASM_OBJ}' RMD160_ASM_OBJ='${RMD160_ASM_OBJ}' AR='${AR}' PERL='${PERL}' KRB5_INCLUDES='${KRB5_INCLUDES}' LIBKRB5='${LIBKRB5}' links ) || exit 1; \
|
|
||||||
fi; \
|
|
||||||
done;
|
|
||||||
|
|
||||||
gentests:
|
gentests:
|
||||||
@(cd test && echo "generating dummy tests (if needed)..." && \
|
@(cd test && echo "generating dummy tests (if needed)..." && \
|
||||||
$(MAKE) CC='${CC}' PLATFORM='${PLATFORM}' CFLAG='${CFLAG}' SDIRS='$(SDIRS)' INSTALLTOP='${INSTALLTOP}' PEX_LIBS='${PEX_LIBS}' EX_LIBS='${EX_LIBS}' BN_ASM='${BN_ASM}' DES_ENC='${DES_ENC}' BF_ENC='${BF_ENC}' CAST_ENC='${CAST_ENC}' RC4_ENC='${RC4_ENC}' RC5_ENC='${RC5_ENC}' SHA1_ASM_OBJ='${SHA1_ASM_OBJ}' MD5_ASM_OBJ='${MD5_ASM_OBJ}' RMD160_ASM_OBJ='${RMD160_ASM_OBJ}' AR='${AR}' PROCESSOR='${PROCESSOR}' PERL='${PERL}' RANLIB='${RANLIB}' TESTS='${TESTS}' KRB5_INCLUDES='${KRB5_INCLUDES}' LIBKRB5='${LIBKRB5}' EXE_EXT='${EXE_EXT}' SHARED_LIBS='${SHARED_LIBS}' SHLIB_EXT='${SHLIB_EXT}' SHLIB_TARGET='${SHLIB_TARGET}' TESTS='${TESTS}' OPENSSL_DEBUG_MEMORY=on generate );
|
$(CLEARENV) && $(MAKE) -e $(BUILDENV) TESTS='$(TESTS)' OPENSSL_DEBUG_MEMORY=on generate );
|
||||||
|
|
||||||
dclean:
|
dclean:
|
||||||
rm -f *.bak
|
rm -rf *.bak include/openssl certs/.0
|
||||||
@for i in $(DIRS) ;\
|
@set -e; target=dclean; $(RECURSIVE_BUILD_CMD)
|
||||||
do \
|
|
||||||
if [ -d "$$i" ]; then \
|
|
||||||
(cd $$i && echo "making dclean in $$i..." && \
|
|
||||||
$(MAKE) SDIRS='${SDIRS}' PERL='${PERL}' dclean ) || exit 1; \
|
|
||||||
fi; \
|
|
||||||
done;
|
|
||||||
|
|
||||||
rehash: rehash.time
|
rehash: rehash.time
|
||||||
rehash.time: certs
|
rehash.time: certs apps
|
||||||
@(OPENSSL="`pwd`/apps/openssl"; OPENSSL_DEBUG_MEMORY=on; \
|
@if [ -z "$(CROSS_COMPILE)" ]; then \
|
||||||
|
(OPENSSL="`pwd`/util/opensslwrap.sh"; \
|
||||||
|
[ -x "apps/openssl.exe" ] && OPENSSL="apps/openssl.exe" || :; \
|
||||||
|
OPENSSL_DEBUG_MEMORY=on; \
|
||||||
export OPENSSL OPENSSL_DEBUG_MEMORY; \
|
export OPENSSL OPENSSL_DEBUG_MEMORY; \
|
||||||
LD_LIBRARY_PATH="`pwd`"; DYLD_LIBRARY_PATH="`pwd`"; SHLIB_PATH="`pwd`"; LIBPATH="`pwd`"; \
|
$(PERL) tools/c_rehash certs/demo) && \
|
||||||
if [ "$(PLATFORM)" = "DJGPP" ]; then PATH="`pwd`\;$$PATH"; \
|
touch rehash.time; \
|
||||||
elif [ "$(PLATFORM)" != "Cygwin" ]; then PATH="`pwd`:$$PATH"; fi; \
|
else :; fi
|
||||||
export LD_LIBRARY_PATH DYLD_LIBRARY_PATH SHLIB_PATH LIBPATH PATH; \
|
|
||||||
$(PERL) tools/c_rehash certs)
|
|
||||||
touch rehash.time
|
|
||||||
|
|
||||||
test: tests
|
test: tests
|
||||||
|
|
||||||
tests: rehash
|
tests: rehash
|
||||||
@(cd test && echo "testing..." && \
|
@(cd test && echo "testing..." && \
|
||||||
$(MAKE) CC='${CC}' PLATFORM='${PLATFORM}' CFLAG='${CFLAG}' SDIRS='$(SDIRS)' INSTALLTOP='${INSTALLTOP}' PEX_LIBS='${PEX_LIBS}' EX_LIBS='${EX_LIBS}' BN_ASM='${BN_ASM}' DES_ENC='${DES_ENC}' BF_ENC='${BF_ENC}' CAST_ENC='${CAST_ENC}' RC4_ENC='${RC4_ENC}' RC5_ENC='${RC5_ENC}' SHA1_ASM_OBJ='${SHA1_ASM_OBJ}' MD5_ASM_OBJ='${MD5_ASM_OBJ}' RMD160_ASM_OBJ='${RMD160_ASM_OBJ}' AR='${AR}' PROCESSOR='${PROCESSOR}' PERL='${PERL}' RANLIB='${RANLIB}' TESTS='${TESTS}' KRB5_INCLUDES='${KRB5_INCLUDES}' LIBKRB5='${LIBKRB5}' EXE_EXT='${EXE_EXT}' SHARED_LIBS='${SHARED_LIBS}' SHLIB_EXT='${SHLIB_EXT}' SHLIB_TARGET='${SHLIB_TARGET}' TESTS='${TESTS}' OPENSSL_DEBUG_MEMORY=on tests );
|
$(CLEARENV) && $(MAKE) -e $(BUILDENV) TOP=.. TESTS='$(TESTS)' OPENSSL_DEBUG_MEMORY=on OPENSSL_CONF=../apps/openssl.cnf tests );
|
||||||
@LD_LIBRARY_PATH="`pwd`"; DYLD_LIBRARY_PATH="`pwd`"; SHLIB_PATH="`pwd`"; LIBPATH="`pwd`"; \
|
OPENSSL_CONF=apps/openssl.cnf util/opensslwrap.sh version -a
|
||||||
if [ "$(PLATFORM)" = "DJGPP" ]; then PATH="`pwd`\;$$PATH"; \
|
|
||||||
elif [ "$(PLATFORM)" != "Cygwin" ]; then PATH="`pwd`:$$PATH"; fi; \
|
|
||||||
export LD_LIBRARY_PATH DYLD_LIBRARY_PATH SHLIB_PATH LIBPATH PATH; \
|
|
||||||
apps/openssl version -a
|
|
||||||
|
|
||||||
report:
|
report:
|
||||||
@$(PERL) util/selftest.pl
|
@$(PERL) util/selftest.pl
|
||||||
|
|
||||||
|
update: errors stacks util/libeay.num util/ssleay.num TABLE
|
||||||
|
@set -e; target=update; $(RECURSIVE_BUILD_CMD)
|
||||||
|
|
||||||
depend:
|
depend:
|
||||||
@for i in $(DIRS) ;\
|
@set -e; target=depend; $(RECURSIVE_BUILD_CMD)
|
||||||
do \
|
|
||||||
if [ -d "$$i" ]; then \
|
|
||||||
(cd $$i && echo "making dependencies $$i..." && \
|
|
||||||
$(MAKE) SDIRS='${SDIRS}' CFLAG='${CFLAG}' DEPFLAG='${DEPFLAG}' MAKEDEPPROG='${MAKEDEPPROG}' KRB5_INCLUDES='${KRB5_INCLUDES}' PERL='${PERL}' depend ) || exit 1; \
|
|
||||||
fi; \
|
|
||||||
done;
|
|
||||||
|
|
||||||
lint:
|
lint:
|
||||||
@for i in $(DIRS) ;\
|
@set -e; target=lint; $(RECURSIVE_BUILD_CMD)
|
||||||
do \
|
|
||||||
if [ -d "$$i" ]; then \
|
|
||||||
(cd $$i && echo "making lint $$i..." && \
|
|
||||||
$(MAKE) SDIRS='${SDIRS}' lint ) || exit 1; \
|
|
||||||
fi; \
|
|
||||||
done;
|
|
||||||
|
|
||||||
tags:
|
tags:
|
||||||
@for i in $(DIRS) ;\
|
rm -f TAGS
|
||||||
do \
|
find . -name '[^.]*.[ch]' | xargs etags -a
|
||||||
if [ -d "$$i" ]; then \
|
|
||||||
(cd $$i && echo "making tags $$i..." && \
|
|
||||||
$(MAKE) SDIRS='${SDIRS}' tags ) || exit 1; \
|
|
||||||
fi; \
|
|
||||||
done;
|
|
||||||
|
|
||||||
errors:
|
errors:
|
||||||
|
$(PERL) util/ck_errf.pl -strict */*.c */*/*.c
|
||||||
$(PERL) util/mkerr.pl -recurse -write
|
$(PERL) util/mkerr.pl -recurse -write
|
||||||
(cd engines; $(MAKE) PERL=$(PERL) errors)
|
(cd engines; $(MAKE) PERL=$(PERL) errors)
|
||||||
|
|
||||||
@@ -421,17 +489,10 @@ util/libeay.num::
|
|||||||
util/ssleay.num::
|
util/ssleay.num::
|
||||||
$(PERL) util/mkdef.pl ssl update
|
$(PERL) util/mkdef.pl ssl update
|
||||||
|
|
||||||
crypto/objects/obj_dat.h: crypto/objects/obj_dat.pl crypto/objects/obj_mac.h
|
|
||||||
$(PERL) crypto/objects/obj_dat.pl crypto/objects/obj_mac.h crypto/objects/obj_dat.h
|
|
||||||
crypto/objects/obj_mac.h: crypto/objects/objects.pl crypto/objects/objects.txt crypto/objects/obj_mac.num
|
|
||||||
$(PERL) crypto/objects/objects.pl crypto/objects/objects.txt crypto/objects/obj_mac.num crypto/objects/obj_mac.h
|
|
||||||
|
|
||||||
TABLE: Configure
|
TABLE: Configure
|
||||||
(echo 'Output of `Configure TABLE'"':"; \
|
(echo 'Output of `Configure TABLE'"':"; \
|
||||||
$(PERL) Configure TABLE) > TABLE
|
$(PERL) Configure TABLE) > TABLE
|
||||||
|
|
||||||
update: depend errors stacks util/libeay.num util/ssleay.num crypto/objects/obj_dat.h TABLE
|
|
||||||
|
|
||||||
# Build distribution tar-file. As the list of files returned by "find" is
|
# Build distribution tar-file. As the list of files returned by "find" is
|
||||||
# pretty long, on several platforms a "too many arguments" error or similar
|
# pretty long, on several platforms a "too many arguments" error or similar
|
||||||
# would occur. Therefore the list of files is temporarily stored into a file
|
# would occur. Therefore the list of files is temporarily stored into a file
|
||||||
@@ -461,70 +522,107 @@ tar-snap:
|
|||||||
dist:
|
dist:
|
||||||
$(PERL) Configure dist
|
$(PERL) Configure dist
|
||||||
@$(MAKE) dist_pem_h
|
@$(MAKE) dist_pem_h
|
||||||
@$(MAKE) SDIRS='${SDIRS}' clean
|
@$(MAKE) SDIRS='$(SDIRS)' clean
|
||||||
@$(MAKE) TAR='${TAR}' TARFLAGS='${TARFLAGS}' tar
|
@$(MAKE) TAR='$(TAR)' TARFLAGS='$(TARFLAGS)' tar
|
||||||
|
|
||||||
dist_pem_h:
|
dist_pem_h:
|
||||||
(cd crypto/pem; $(MAKE) CC='${CC}' SDIRS='${SDIRS}' CFLAG='${CFLAG}' pem.h; $(MAKE) clean)
|
(cd crypto/pem; $(MAKE) -e $(BUILDENV) pem.h; $(MAKE) clean)
|
||||||
|
|
||||||
install: all install_docs
|
install: all install_docs install_sw
|
||||||
|
|
||||||
|
install_sw:
|
||||||
@$(PERL) $(TOP)/util/mkdir-p.pl $(INSTALL_PREFIX)$(INSTALLTOP)/bin \
|
@$(PERL) $(TOP)/util/mkdir-p.pl $(INSTALL_PREFIX)$(INSTALLTOP)/bin \
|
||||||
$(INSTALL_PREFIX)$(INSTALLTOP)/lib \
|
$(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR) \
|
||||||
$(INSTALL_PREFIX)$(INSTALLTOP)/lib/pkginfo \
|
$(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/engines \
|
||||||
|
$(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/pkgconfig \
|
||||||
$(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl \
|
$(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl \
|
||||||
$(INSTALL_PREFIX)$(OPENSSLDIR)/engines \
|
|
||||||
$(INSTALL_PREFIX)$(OPENSSLDIR)/misc \
|
$(INSTALL_PREFIX)$(OPENSSLDIR)/misc \
|
||||||
$(INSTALL_PREFIX)$(OPENSSLDIR)/certs \
|
$(INSTALL_PREFIX)$(OPENSSLDIR)/certs \
|
||||||
$(INSTALL_PREFIX)$(OPENSSLDIR)/private \
|
$(INSTALL_PREFIX)$(OPENSSLDIR)/private
|
||||||
$(INSTALL_PREFIX)$(OPENSSLDIR)/lib
|
@set -e; headerlist="$(EXHEADER)"; for i in $$headerlist;\
|
||||||
@for i in $(EXHEADER) ;\
|
|
||||||
do \
|
do \
|
||||||
(cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl/$$i; \
|
(cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl/$$i; \
|
||||||
chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl/$$i ); \
|
chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl/$$i ); \
|
||||||
done;
|
done;
|
||||||
@for i in $(DIRS) ;\
|
@set -e; target=install; $(RECURSIVE_BUILD_CMD)
|
||||||
do \
|
@set -e; liblist="$(LIBS)"; for i in $$liblist ;\
|
||||||
if [ -d "$$i" ]; then \
|
|
||||||
(cd $$i; echo "installing $$i..."; \
|
|
||||||
$(MAKE) CC='${CC}' CFLAG='${CFLAG}' INSTALL_PREFIX='${INSTALL_PREFIX}' INSTALLTOP='${INSTALLTOP}' OPENSSLDIR='${OPENSSLDIR}' EX_LIBS='${EX_LIBS}' SDIRS='${SDIRS}' RANLIB='${RANLIB}' EXE_EXT='${EXE_EXT}' SHARED_LIBS='${SHARED_LIBS}' install ); \
|
|
||||||
fi; \
|
|
||||||
done
|
|
||||||
@for i in $(LIBS) ;\
|
|
||||||
do \
|
do \
|
||||||
if [ -f "$$i" ]; then \
|
if [ -f "$$i" ]; then \
|
||||||
( echo installing $$i; \
|
( echo installing $$i; \
|
||||||
cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i.new; \
|
cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i.new; \
|
||||||
$(RANLIB) $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i.new; \
|
$(RANLIB) $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i.new; \
|
||||||
chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i.new; \
|
chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i.new; \
|
||||||
mv $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i.new $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i ); \
|
mv -f $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i.new $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i ); \
|
||||||
fi; \
|
fi; \
|
||||||
done;
|
done;
|
||||||
@if [ -n "$(SHARED_LIBS)" ]; then \
|
@set -e; if [ -n "$(SHARED_LIBS)" ]; then \
|
||||||
tmp="$(SHARED_LIBS)"; \
|
tmp="$(SHARED_LIBS)"; \
|
||||||
for i in $${tmp:-x}; \
|
for i in $${tmp:-x}; \
|
||||||
do \
|
do \
|
||||||
if [ -f "$$i" -o -f "$$i.a" ]; then \
|
if [ -f "$$i" -o -f "$$i.a" ]; then \
|
||||||
( echo installing $$i; \
|
( echo installing $$i; \
|
||||||
if [ "$(PLATFORM)" != "Cygwin" ]; then \
|
if [ "$(PLATFORM)" != "Cygwin" ]; then \
|
||||||
cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i.new; \
|
cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i.new; \
|
||||||
chmod 555 $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i.new; \
|
chmod 555 $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i.new; \
|
||||||
mv $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i.new $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i; \
|
mv -f $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i.new $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i; \
|
||||||
else \
|
else \
|
||||||
c=`echo $$i | sed 's/^lib/cyg/'`; \
|
c=`echo $$i | sed 's/^lib\(.*\)\.dll\.a/cyg\1-$(SHLIB_VERSION_NUMBER).dll/'`; \
|
||||||
cp $$c $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$c.new; \
|
cp $$c $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$c.new; \
|
||||||
chmod 755 $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$c.new; \
|
chmod 755 $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$c.new; \
|
||||||
mv $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$c.new $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$c; \
|
mv -f $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$c.new $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$c; \
|
||||||
cp $$i.a $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i.a.new; \
|
cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i.new; \
|
||||||
chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i.a.new; \
|
chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i.new; \
|
||||||
mv $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i.a.new $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i.a; \
|
mv -f $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i.new $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i; \
|
||||||
fi ); \
|
fi ); \
|
||||||
|
if expr $(PLATFORM) : 'mingw' > /dev/null; then \
|
||||||
|
( case $$i in \
|
||||||
|
*crypto*) i=libeay32.dll;; \
|
||||||
|
*ssl*) i=ssleay32.dll;; \
|
||||||
|
esac; \
|
||||||
|
echo installing $$i; \
|
||||||
|
cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$i.new; \
|
||||||
|
chmod 755 $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$i.new; \
|
||||||
|
mv -f $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$i.new $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$i ); \
|
||||||
|
fi; \
|
||||||
fi; \
|
fi; \
|
||||||
done; \
|
done; \
|
||||||
( here="`pwd`"; \
|
( here="`pwd`"; \
|
||||||
cd $(INSTALL_PREFIX)$(INSTALLTOP)/lib; \
|
cd $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR); \
|
||||||
$(NEWMAKE) -f $$here/Makefile link-shared ); \
|
$(MAKE) -f $$here/Makefile HERE="$$here" link-shared ); \
|
||||||
|
if [ "$(INSTALLTOP)" != "/usr" ]; then \
|
||||||
|
echo 'OpenSSL shared libraries have been installed in:'; \
|
||||||
|
echo ' $(INSTALLTOP)'; \
|
||||||
|
echo ''; \
|
||||||
|
sed -e '1,/^$$/d' doc/openssl-shared.txt; \
|
||||||
|
fi; \
|
||||||
fi
|
fi
|
||||||
cp openssl.pc $(INSTALL_PREFIX)$(INSTALLTOP)/lib/pkginfo
|
cp libcrypto.pc $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/pkgconfig
|
||||||
|
chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/pkgconfig/libcrypto.pc
|
||||||
|
cp libssl.pc $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/pkgconfig
|
||||||
|
chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/pkgconfig/libssl.pc
|
||||||
|
cp openssl.pc $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/pkgconfig
|
||||||
|
chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/pkgconfig/openssl.pc
|
||||||
|
|
||||||
|
install_html_docs:
|
||||||
|
here="`pwd`"; \
|
||||||
|
for subdir in apps crypto ssl; do \
|
||||||
|
mkdir -p $(INSTALL_PREFIX)$(HTMLDIR)/$$subdir; \
|
||||||
|
for i in doc/$$subdir/*.pod; do \
|
||||||
|
fn=`basename $$i .pod`; \
|
||||||
|
echo "installing html/$$fn.$(HTMLSUFFIX)"; \
|
||||||
|
cat $$i \
|
||||||
|
| sed -r 's/L<([^)]*)(\([0-9]\))?\|([^)]*)(\([0-9]\))?>/L<\1|\3>/g' \
|
||||||
|
| pod2html --podroot=doc --htmlroot=.. --podpath=apps:crypto:ssl \
|
||||||
|
| sed -r 's/<!DOCTYPE.*//g' \
|
||||||
|
> $(INSTALL_PREFIX)$(HTMLDIR)/$$subdir/$$fn.$(HTMLSUFFIX); \
|
||||||
|
$(PERL) util/extract-names.pl < $$i | \
|
||||||
|
grep -v $$filecase "^$$fn\$$" | \
|
||||||
|
(cd $(INSTALL_PREFIX)$(HTMLDIR)/$$subdir; \
|
||||||
|
while read n; do \
|
||||||
|
PLATFORM=$(PLATFORM) $$here/util/point.sh $$fn.$(HTMLSUFFIX) "$$n".$(HTMLSUFFIX); \
|
||||||
|
done); \
|
||||||
|
done; \
|
||||||
|
done
|
||||||
|
|
||||||
install_docs:
|
install_docs:
|
||||||
@$(PERL) $(TOP)/util/mkdir-p.pl \
|
@$(PERL) $(TOP)/util/mkdir-p.pl \
|
||||||
@@ -532,34 +630,45 @@ install_docs:
|
|||||||
$(INSTALL_PREFIX)$(MANDIR)/man3 \
|
$(INSTALL_PREFIX)$(MANDIR)/man3 \
|
||||||
$(INSTALL_PREFIX)$(MANDIR)/man5 \
|
$(INSTALL_PREFIX)$(MANDIR)/man5 \
|
||||||
$(INSTALL_PREFIX)$(MANDIR)/man7
|
$(INSTALL_PREFIX)$(MANDIR)/man7
|
||||||
@pod2man="`cd util; ./pod2mantest $(PERL)`"; \
|
@pod2man="`cd ./util; ./pod2mantest $(PERL)`"; \
|
||||||
for i in doc/apps/*.pod; do \
|
here="`pwd`"; \
|
||||||
|
filecase=; \
|
||||||
|
if [ "$(PLATFORM)" = "DJGPP" -o "$(PLATFORM)" = "Cygwin" -o "$(PLATFORM)" = "mingw" ]; then \
|
||||||
|
filecase=-i; \
|
||||||
|
fi; \
|
||||||
|
set -e; for i in doc/apps/*.pod; do \
|
||||||
fn=`basename $$i .pod`; \
|
fn=`basename $$i .pod`; \
|
||||||
if [ "$$fn" = "config" ]; then sec=5; else sec=1; fi; \
|
sec=`$(PERL) util/extract-section.pl 1 < $$i`; \
|
||||||
echo "installing man$$sec/$$fn.$$sec"; \
|
echo "installing man$$sec/$$fn.$${sec}$(MANSUFFIX)"; \
|
||||||
(cd `$(PERL) util/dirname.pl $$i`; \
|
(cd `$(PERL) util/dirname.pl $$i`; \
|
||||||
sh -c "$$pod2man \
|
sh -c "$$pod2man \
|
||||||
--section=$$sec --center=OpenSSL \
|
--section=$$sec --center=OpenSSL \
|
||||||
--release=$(VERSION) `basename $$i`") \
|
--release=$(VERSION) `basename $$i`") \
|
||||||
> $(INSTALL_PREFIX)$(MANDIR)/man$$sec/$$fn.$$sec; \
|
> $(INSTALL_PREFIX)$(MANDIR)/man$$sec/$$fn.$${sec}$(MANSUFFIX); \
|
||||||
$(PERL) util/extract-names.pl < $$i | grep -v "^$$fn" | \
|
$(PERL) util/extract-names.pl < $$i | \
|
||||||
while read n; do \
|
(grep -v $$filecase "^$$fn\$$"; true) | \
|
||||||
util/point.sh $$fn.$$sec $(INSTALL_PREFIX)$(MANDIR)/man$$sec/$$n.$$sec; \
|
(grep -v "[ ]"; true) | \
|
||||||
done; \
|
(cd $(INSTALL_PREFIX)$(MANDIR)/man$$sec/; \
|
||||||
|
while read n; do \
|
||||||
|
PLATFORM=$(PLATFORM) $$here/util/point.sh $$fn.$${sec}$(MANSUFFIX) "$$n".$${sec}$(MANSUFFIX); \
|
||||||
|
done); \
|
||||||
done; \
|
done; \
|
||||||
for i in doc/crypto/*.pod doc/ssl/*.pod; do \
|
set -e; for i in doc/crypto/*.pod doc/ssl/*.pod; do \
|
||||||
fn=`basename $$i .pod`; \
|
fn=`basename $$i .pod`; \
|
||||||
if [ "$$fn" = "des_modes" ]; then sec=7; else sec=3; fi; \
|
sec=`$(PERL) util/extract-section.pl 3 < $$i`; \
|
||||||
echo "installing man$$sec/$$fn.$$sec"; \
|
echo "installing man$$sec/$$fn.$${sec}$(MANSUFFIX)"; \
|
||||||
(cd `$(PERL) util/dirname.pl $$i`; \
|
(cd `$(PERL) util/dirname.pl $$i`; \
|
||||||
sh -c "$$pod2man \
|
sh -c "$$pod2man \
|
||||||
--section=$$sec --center=OpenSSL \
|
--section=$$sec --center=OpenSSL \
|
||||||
--release=$(VERSION) `basename $$i`") \
|
--release=$(VERSION) `basename $$i`") \
|
||||||
> $(INSTALL_PREFIX)$(MANDIR)/man$$sec/$$fn.$$sec; \
|
> $(INSTALL_PREFIX)$(MANDIR)/man$$sec/$$fn.$${sec}$(MANSUFFIX); \
|
||||||
$(PERL) util/extract-names.pl < $$i | grep -v "^$$fn" | \
|
$(PERL) util/extract-names.pl < $$i | \
|
||||||
while read n; do \
|
(grep -v $$filecase "^$$fn\$$"; true) | \
|
||||||
util/point.sh $$fn.$$sec $(INSTALL_PREFIX)$(MANDIR)/man$$sec/$$n.$$sec; \
|
(grep -v "[ ]"; true) | \
|
||||||
done; \
|
(cd $(INSTALL_PREFIX)$(MANDIR)/man$$sec/; \
|
||||||
|
while read n; do \
|
||||||
|
PLATFORM=$(PLATFORM) $$here/util/point.sh $$fn.$${sec}$(MANSUFFIX) "$$n".$${sec}$(MANSUFFIX); \
|
||||||
|
done); \
|
||||||
done
|
done
|
||||||
|
|
||||||
# DO NOT DELETE THIS LINE -- make depend depends on it.
|
# DO NOT DELETE THIS LINE -- make depend depends on it.
|
||||||
|
|||||||
757
Makefile.shared
757
Makefile.shared
@@ -7,19 +7,35 @@
|
|||||||
|
|
||||||
# CC contains the current compiler. This one MUST be defined
|
# CC contains the current compiler. This one MUST be defined
|
||||||
CC=cc
|
CC=cc
|
||||||
# LDFLAGS contains flags to be used when the temporary object file is
|
CFLAGS=$(CFLAG)
|
||||||
# created. SHARED_LDFLAGS contains flags to be used when the shared
|
# LDFLAGS contains flags to be used when temporary object files (when building
|
||||||
# library is created.
|
# shared libraries) are created, or when an application is linked.
|
||||||
|
# SHARED_LDFLAGS contains flags to be used when the shared library is created.
|
||||||
LDFLAGS=
|
LDFLAGS=
|
||||||
SHARED_LDFLAGS=
|
SHARED_LDFLAGS=
|
||||||
|
|
||||||
# LIBNAME contains just the name of thhe library, without prefix ("lib"
|
NM=nm
|
||||||
|
|
||||||
|
# LIBNAME contains just the name of the library, without prefix ("lib"
|
||||||
# on Unix, "cyg" for certain forms under Cygwin...) or suffix (.a, .so,
|
# on Unix, "cyg" for certain forms under Cygwin...) or suffix (.a, .so,
|
||||||
# .dll, ...). This one MUST have a value when using this makefile.
|
# .dll, ...). This one MUST have a value when using this makefile to
|
||||||
|
# build shared libraries.
|
||||||
# For example, to build libfoo.so, you need to do the following:
|
# For example, to build libfoo.so, you need to do the following:
|
||||||
#LIBNAME=foo
|
#LIBNAME=foo
|
||||||
LIBNAME=
|
LIBNAME=
|
||||||
|
|
||||||
|
# APPNAME contains just the name of the application, without suffix (""
|
||||||
|
# on Unix, ".exe" on Windows, ...). This one MUST have a value when using
|
||||||
|
# this makefile to build applications.
|
||||||
|
# For example, to build foo, you need to do the following:
|
||||||
|
#APPNAME=foo
|
||||||
|
APPNAME=
|
||||||
|
|
||||||
|
# OBJECTS contains all the object files to link together into the application.
|
||||||
|
# This must contain at least one object file.
|
||||||
|
#OBJECTS=foo.o
|
||||||
|
OBJECTS=
|
||||||
|
|
||||||
# LIBEXTRAS contains extra modules to link together with the library.
|
# LIBEXTRAS contains extra modules to link together with the library.
|
||||||
# For example, if a second library, say libbar.a needs to be linked into
|
# For example, if a second library, say libbar.a needs to be linked into
|
||||||
# libfoo.so, you need to do the following:
|
# libfoo.so, you need to do the following:
|
||||||
@@ -53,8 +69,8 @@ LIBDEPS=
|
|||||||
#------------------------------------------------------------------------------
|
#------------------------------------------------------------------------------
|
||||||
# The rest is private to this makefile.
|
# The rest is private to this makefile.
|
||||||
|
|
||||||
#DEBUG=:
|
SET_X=:
|
||||||
DEBUG=set -x
|
#SET_X=set -x
|
||||||
|
|
||||||
top:
|
top:
|
||||||
echo "Trying to use this makefile interactively? Don't."
|
echo "Trying to use this makefile interactively? Don't."
|
||||||
@@ -64,7 +80,7 @@ CALC_VERSIONS= \
|
|||||||
if [ -n "$(LIBVERSION)$(LIBCOMPATVERSIONS)" ]; then \
|
if [ -n "$(LIBVERSION)$(LIBCOMPATVERSIONS)" ]; then \
|
||||||
prev=""; \
|
prev=""; \
|
||||||
for v in `echo "$(LIBVERSION) $(LIBCOMPATVERSIONS)" | cut -d';' -f1`; do \
|
for v in `echo "$(LIBVERSION) $(LIBCOMPATVERSIONS)" | cut -d';' -f1`; do \
|
||||||
SHLIB_SOVER_NODOT=$$v \
|
SHLIB_SOVER_NODOT=$$v; \
|
||||||
SHLIB_SOVER=.$$v; \
|
SHLIB_SOVER=.$$v; \
|
||||||
if [ -n "$$prev" ]; then \
|
if [ -n "$$prev" ]; then \
|
||||||
SHLIB_COMPAT="$$SHLIB_COMPAT .$$prev"; \
|
SHLIB_COMPAT="$$SHLIB_COMPAT .$$prev"; \
|
||||||
@@ -73,512 +89,567 @@ CALC_VERSIONS= \
|
|||||||
done; \
|
done; \
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
LINK_APP= \
|
||||||
|
( $(SET_X); \
|
||||||
|
LIBDEPS="$${LIBDEPS:-$(LIBDEPS)}"; \
|
||||||
|
LDCMD="$${LDCMD:-$(CC)}"; LDFLAGS="$${LDFLAGS:-$(CFLAGS)}"; \
|
||||||
|
LIBPATH=`for x in $$LIBDEPS; do echo $$x; done | sed -e 's/^ *-L//;t' -e d | uniq`; \
|
||||||
|
LIBPATH=`echo $$LIBPATH | sed -e 's/ /:/g'`; \
|
||||||
|
LD_LIBRARY_PATH=$$LIBPATH:$$LD_LIBRARY_PATH \
|
||||||
|
$${LDCMD} $${LDFLAGS} -o $${APPNAME:=$(APPNAME)} $(OBJECTS) $${LIBDEPS} )
|
||||||
|
|
||||||
LINK_SO= \
|
LINK_SO= \
|
||||||
( $(DEBUG); \
|
( $(SET_X); \
|
||||||
nm -Pg $$SHOBJECTS | grep ' [BDT] ' | cut -f1 -d' ' > lib$(LIBNAME).exp; \
|
LIBDEPS="$${LIBDEPS:-$(LIBDEPS)}"; \
|
||||||
$$SHAREDCMD $(SHARED_LDFLAGS) $$SHAREDFLAGS -o $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX \
|
SHAREDCMD="$${SHAREDCMD:-$(CC)}"; \
|
||||||
$$ALLSYMSFLAGS $$SHOBJECTS $$NOALLSYMSFLAGS $$LIBDEPS ) && \
|
SHAREDFLAGS="$${SHAREDFLAGS:-$(CFLAGS) $(SHARED_LDFLAGS)}"; \
|
||||||
$(SYMLINK_SO); ( $(DEBUG); rm -f lib$(LIBNAME).exp )
|
LIBPATH=`for x in $$LIBDEPS; do echo $$x; done | sed -e 's/^ *-L//;t' -e d | uniq`; \
|
||||||
|
LIBPATH=`echo $$LIBPATH | sed -e 's/ /:/g'`; \
|
||||||
|
LD_LIBRARY_PATH=$$LIBPATH:$$LD_LIBRARY_PATH \
|
||||||
|
$${SHAREDCMD} $${SHAREDFLAGS} \
|
||||||
|
-o $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX \
|
||||||
|
$$ALLSYMSFLAGS $$SHOBJECTS $$NOALLSYMSFLAGS $$LIBDEPS \
|
||||||
|
) && $(SYMLINK_SO)
|
||||||
|
|
||||||
SYMLINK_SO= \
|
SYMLINK_SO= \
|
||||||
if [ -n "$$INHIBIT_SYMLINKS" ]; then :; else \
|
if [ -n "$$INHIBIT_SYMLINKS" ]; then :; else \
|
||||||
prev=$$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX; \
|
prev=$$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX; \
|
||||||
if [ -n "$$SHLIB_COMPAT" ]; then \
|
if [ -n "$$SHLIB_COMPAT" ]; then \
|
||||||
for x in $$SHLIB_COMPAT; do \
|
for x in $$SHLIB_COMPAT; do \
|
||||||
( $(DEBUG); rm -f $$SHLIB$$x$$SHLIB_SUFFIX; \
|
( $(SET_X); rm -f $$SHLIB$$x$$SHLIB_SUFFIX; \
|
||||||
ln -s $$prev $$SHLIB$$x$$SHLIB_SUFFIX ); \
|
ln -s $$prev $$SHLIB$$x$$SHLIB_SUFFIX ); \
|
||||||
prev=$$SHLIB$$x$$SHLIB_SUFFIX; \
|
prev=$$SHLIB$$x$$SHLIB_SUFFIX; \
|
||||||
done; \
|
done; \
|
||||||
fi; \
|
fi; \
|
||||||
if [ -n "$$SHLIB_SOVER" ]; then \
|
if [ -n "$$SHLIB_SOVER" ]; then \
|
||||||
( $(DEBUG); rm -f $$SHLIB$$SHLIB_SUFFIX; \
|
( $(SET_X); rm -f $$SHLIB$$SHLIB_SUFFIX; \
|
||||||
ln -s $$prev $$SHLIB$$SHLIB_SUFFIX ); \
|
ln -s $$prev $$SHLIB$$SHLIB_SUFFIX ); \
|
||||||
fi; \
|
fi; \
|
||||||
fi
|
fi
|
||||||
|
|
||||||
LINK_SO_A= SHOBJECTS="lib$(LIBNAME).a $(LIBEXTRAS)"; $(LINK_SO)
|
LINK_SO_A= SHOBJECTS="lib$(LIBNAME).a $(LIBEXTRAS)"; $(LINK_SO)
|
||||||
LINK_SO_O= SHOBJECTS="$(LIBEXTRAS)"; $(LINK_SO)
|
LINK_SO_O= SHOBJECTS="$(LIBEXTRAS)"; $(LINK_SO)
|
||||||
|
|
||||||
LINK_SO_A_VIA_O= \
|
LINK_SO_A_VIA_O= \
|
||||||
SHOBJECTS=lib$(LIBNAME).o ALL=$$ALLSYMSFLAGS ALLSYMSFLAGS= NOALLSYMSFLAGS=; \
|
SHOBJECTS=lib$(LIBNAME).o; \
|
||||||
( $(DEBUG); \
|
ALL=$$ALLSYMSFLAGS; ALLSYMSFLAGS=; NOALLSYMSFLAGS=; \
|
||||||
|
( $(SET_X); \
|
||||||
ld $(LDFLAGS) -r -o lib$(LIBNAME).o $$ALL lib$(LIBNAME).a $(LIBEXTRAS) ); \
|
ld $(LDFLAGS) -r -o lib$(LIBNAME).o $$ALL lib$(LIBNAME).a $(LIBEXTRAS) ); \
|
||||||
$(LINK_SO) && rm -f $(LIBNAME).o
|
$(LINK_SO) && rm -f lib$(LIBNAME).o
|
||||||
|
|
||||||
LINK_SO_A_UNPACKED= \
|
LINK_SO_A_UNPACKED= \
|
||||||
UNPACKDIR=link_tmp.$$$$; rm -rf $$UNPACKDIR; mkdir $$UNPACKDIR; \
|
UNPACKDIR=link_tmp.$$$$; rm -rf $$UNPACKDIR; mkdir $$UNPACKDIR; \
|
||||||
(cd $$UNPACKDIR; ar x ../lib$(LIBNAME).a) && cp $(LIBEXTRAS) $$UNPACKDIR && \
|
(cd $$UNPACKDIR; ar x ../lib$(LIBNAME).a) && \
|
||||||
|
([ -z "$(LIBEXTRAS)" ] || cp $(LIBEXTRAS) $$UNPACKDIR) && \
|
||||||
SHOBJECTS=$$UNPACKDIR/*.o; \
|
SHOBJECTS=$$UNPACKDIR/*.o; \
|
||||||
$(LINK_SO) && rm -rf $$UNPACKDIR
|
$(LINK_SO) && rm -rf $$UNPACKDIR
|
||||||
|
|
||||||
DETECT_GNU_LD=${CC} -v 2>&1 | grep '^gcc' >/dev/null 2>&1 && \
|
DETECT_GNU_LD=($(CC) -Wl,-V /dev/null 2>&1 | grep '^GNU ld' )>/dev/null
|
||||||
my_ld=`${CC} -print-prog-name=ld 2>&1` && \
|
|
||||||
[ -n "$$my_ld" ] && \
|
DO_GNU_SO=$(CALC_VERSIONS); \
|
||||||
$$my_ld -v 2>&1 | grep 'GNU ld' >/dev/null 2>&1
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
DO_GNU=$(CALC_VERSIONS); \
|
SHLIB_SUFFIX=; \
|
||||||
SHLIB=lib$(LIBNAME).so \
|
ALLSYMSFLAGS='-Wl,--whole-archive'; \
|
||||||
SHLIB_SUFFIX= \
|
NOALLSYMSFLAGS='-Wl,--no-whole-archive'; \
|
||||||
LIBDEPS="$(LIBDEPS) -lc" \
|
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared -Wl,-Bsymbolic -Wl,-soname=$$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX"
|
||||||
ALLSYMSFLAGS='-Wl,--whole-archive' \
|
|
||||||
NOALLSYMSFLAGS='-Wl,--no-whole-archive' \
|
DO_GNU_APP=LDFLAGS="$(CFLAGS) -Wl,-rpath,$(LIBRPATH)"
|
||||||
SHAREDFLAGS="-shared -Wl,-Bsymbolic -Wl,-soname=$$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX" \
|
|
||||||
SHAREDCMD='$(CC)'
|
#This is rather special. It's a special target with which one can link
|
||||||
|
#applications without bothering with any features that have anything to
|
||||||
|
#do with shared libraries, for example when linking against static
|
||||||
|
#libraries. It's mostly here to avoid a lot of conditionals everywhere
|
||||||
|
#else...
|
||||||
|
link_app.:
|
||||||
|
$(LINK_APP)
|
||||||
|
|
||||||
link_o.gnu:
|
link_o.gnu:
|
||||||
@ $(DO_GNU); $(LINK_SO_O)
|
@ $(DO_GNU_SO); $(LINK_SO_O)
|
||||||
link_a.gnu:
|
link_a.gnu:
|
||||||
@ $(DO_GNU); $(LINK_SO_A)
|
@ $(DO_GNU_SO); $(LINK_SO_A)
|
||||||
|
link_app.gnu:
|
||||||
|
@ $(DO_GNU_APP); $(LINK_APP)
|
||||||
|
|
||||||
|
DO_BEOS_SO= SHLIB=lib$(LIBNAME).so; \
|
||||||
|
SHLIB_SUFFIX=; \
|
||||||
|
ALLSYMSFLAGS='-Wl,--whole-archive'; \
|
||||||
|
NOALLSYMSFLAGS='-Wl,--no-whole-archive'; \
|
||||||
|
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared -Wl,-Bsymbolic -Wl,-soname=$$SHLIB$$SHLIB_SUFFIX"
|
||||||
|
|
||||||
|
link_o.beos:
|
||||||
|
@ $(DO_BEOS_SO); $(LINK_SO_O)
|
||||||
|
link_a.beos:
|
||||||
|
@ $(DO_BEOS_SO); $(LINK_SO_A)
|
||||||
|
|
||||||
|
link_o.bsd:
|
||||||
|
@if $(DETECT_GNU_LD); then $(DO_GNU_SO); else \
|
||||||
|
$(CALC_VERSIONS); \
|
||||||
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
|
SHLIB_SUFFIX=; \
|
||||||
|
LIBDEPS=" "; \
|
||||||
|
ALLSYMSFLAGS="-Wl,-Bforcearchive"; \
|
||||||
|
NOALLSYMSFLAGS=; \
|
||||||
|
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared -nostdlib"; \
|
||||||
|
fi; $(LINK_SO_O)
|
||||||
|
link_a.bsd:
|
||||||
|
@if $(DETECT_GNU_LD); then $(DO_GNU_SO); else \
|
||||||
|
$(CALC_VERSIONS); \
|
||||||
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
|
SHLIB_SUFFIX=; \
|
||||||
|
LIBDEPS=" "; \
|
||||||
|
ALLSYMSFLAGS="-Wl,-Bforcearchive"; \
|
||||||
|
NOALLSYMSFLAGS=; \
|
||||||
|
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared -nostdlib"; \
|
||||||
|
fi; $(LINK_SO_A)
|
||||||
|
link_app.bsd:
|
||||||
|
@if $(DETECT_GNU_LD); then $(DO_GNU_APP); else \
|
||||||
|
LDFLAGS="$(CFLAGS) -Wl,-rpath,$(LIBPATH)"; \
|
||||||
|
fi; $(LINK_APP)
|
||||||
|
|
||||||
# For Darwin AKA Mac OS/X (dyld)
|
# For Darwin AKA Mac OS/X (dyld)
|
||||||
|
# Originally link_o.darwin produced .so, because it was hard-coded
|
||||||
|
# in dso_dlfcn module. At later point dso_dlfcn switched to .dylib
|
||||||
|
# extension in order to allow for run-time linking with vendor-
|
||||||
|
# supplied shared libraries such as libz, so that link_o.darwin had
|
||||||
|
# to be harmonized with it. This caused minor controversy, because
|
||||||
|
# it was believed that dlopen can't be used to dynamically load
|
||||||
|
# .dylib-s, only so called bundle modules (ones linked with -bundle
|
||||||
|
# flag). The belief seems to be originating from pre-10.4 release,
|
||||||
|
# where dlfcn functionality was emulated by dlcompat add-on. In
|
||||||
|
# 10.4 dlopen was rewritten as native part of dyld and is documented
|
||||||
|
# to be capable of loading both dynamic libraries and bundles. In
|
||||||
|
# order to provide compatibility with pre-10.4 dlopen, modules are
|
||||||
|
# linked with -bundle flag, which makes .dylib extension misleading.
|
||||||
|
# It works, because dlopen is [and always was] extension-agnostic.
|
||||||
|
# Alternative to this heuristic approach is to develop specific
|
||||||
|
# MacOS X dso module relying on whichever "native" dyld interface.
|
||||||
link_o.darwin:
|
link_o.darwin:
|
||||||
@ $(CALC_VERSIONS); \
|
@ $(CALC_VERSIONS); \
|
||||||
SHLIB=lib$(LIBNAME) \
|
SHLIB=lib$(LIBNAME); \
|
||||||
SHLIB_SUFFIX=.dylib \
|
SHLIB_SUFFIX=.dylib; \
|
||||||
LIBDEPS="$(LIBDEPS) -lc" \
|
ALLSYMSFLAGS='-all_load'; \
|
||||||
ALLSYMSFLAGS='-all_load' \
|
NOALLSYMSFLAGS=''; \
|
||||||
NOALLSYMSFLAGS='' \
|
SHAREDFLAGS="$(CFLAGS) `echo $(SHARED_LDFLAGS) | sed s/dynamiclib/bundle/`"; \
|
||||||
SHAREDFLAGS="-dynamiclib" \
|
|
||||||
SHAREDCMD='$(CC)'; \
|
|
||||||
if [ -n "$(LIBVERSION)" ]; then \
|
if [ -n "$(LIBVERSION)" ]; then \
|
||||||
SHAREDFLAGS="$SHAREDFLAGS -current_version $(LIBVERSION)"; \
|
SHAREDFLAGS="$$SHAREDFLAGS -current_version $(LIBVERSION)"; \
|
||||||
fi; \
|
fi; \
|
||||||
if [ -n "$$SHLIB_SOVER_NODOT" ]; then \
|
if [ -n "$$SHLIB_SOVER_NODOT" ]; then \
|
||||||
SHAREDFLAGS="$SHAREDFLAGS -compatibility_version $$SHLIB_SOVER_NODOT"; \
|
SHAREDFLAGS="$$SHAREDFLAGS -compatibility_version $$SHLIB_SOVER_NODOT"; \
|
||||||
fi; \
|
fi; \
|
||||||
$(LINK_SO_O)
|
$(LINK_SO_O)
|
||||||
link_a.darwin:
|
link_a.darwin:
|
||||||
@ $(CALC_VERSIONS); \
|
@ $(CALC_VERSIONS); \
|
||||||
SHLIB=lib$(LIBNAME) \
|
SHLIB=lib$(LIBNAME); \
|
||||||
SHLIB_SUFFIX=.dylib \
|
SHLIB_SUFFIX=.dylib; \
|
||||||
LIBDEPS="$(LIBDEPS) -lc" \
|
ALLSYMSFLAGS='-all_load'; \
|
||||||
ALLSYMSFLAGS='-all_load' \
|
NOALLSYMSFLAGS=''; \
|
||||||
NOALLSYMSFLAGS='' \
|
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS)"; \
|
||||||
SHAREDFLAGS="-dynamiclib" \
|
|
||||||
SHAREDCMD='$(CC)'; \
|
|
||||||
if [ -n "$(LIBVERSION)" ]; then \
|
if [ -n "$(LIBVERSION)" ]; then \
|
||||||
SHAREDFLAGS="$SHAREDFLAGS -current_version $(LIBVERSION)"; \
|
SHAREDFLAGS="$$SHAREDFLAGS -current_version $(LIBVERSION)"; \
|
||||||
fi; \
|
fi; \
|
||||||
if [ -n "$$SHLIB_SOVER_NODOT" ]; then \
|
if [ -n "$$SHLIB_SOVER_NODOT" ]; then \
|
||||||
SHAREDFLAGS="$SHAREDFLAGS -compatibility_version $$SHLIB_SOVER_NODOT"; \
|
SHAREDFLAGS="$$SHAREDFLAGS -compatibility_version $$SHLIB_SOVER_NODOT"; \
|
||||||
fi; \
|
fi; \
|
||||||
|
SHAREDFLAGS="$$SHAREDFLAGS -install_name $(INSTALLTOP)/$(LIBDIR)/$$SHLIB$(SHLIB_EXT)"; \
|
||||||
$(LINK_SO_A)
|
$(LINK_SO_A)
|
||||||
|
link_app.darwin: # is there run-path on darwin?
|
||||||
|
$(LINK_APP)
|
||||||
|
|
||||||
link_o.cygwin:
|
link_o.cygwin:
|
||||||
@ $(CALC_VERSIONS); \
|
@ $(CALC_VERSIONS); \
|
||||||
INHIBIT_SYMLINKS=yes; \
|
INHIBIT_SYMLINKS=yes; \
|
||||||
SHLIB=cyg$(LIBNAME) \
|
SHLIB=cyg$(LIBNAME); \
|
||||||
SHLIB_SUFFIX=.dll \
|
base=-Wl,--enable-auto-image-base; \
|
||||||
LIBDEPS="$(LIBDEPS) -lc" \
|
deffile=; \
|
||||||
SHLIB_SOVER=-$(LIBVERSION) \
|
if expr $(PLATFORM) : 'mingw' > /dev/null; then \
|
||||||
ALLSYMSFLAGS='-Wl,--whole-archive' \
|
SHLIB=$(LIBNAME)eay32; base=; \
|
||||||
NOALLSYMSFLAGS='-Wl,--no-whole-archive' \
|
if test -f $(LIBNAME)eay32.def; then \
|
||||||
SHAREDFLAGS="-shared -Wl,-Bsymbolic -Wl,--out-implib,lib$(LIBNAME).dll.a" \
|
deffile=$(LIBNAME)eay32.def; \
|
||||||
SHAREDCMD='${CC}'; \
|
fi; \
|
||||||
|
fi; \
|
||||||
|
SHLIB_SUFFIX=.dll; \
|
||||||
|
LIBVERSION="$(LIBVERSION)"; \
|
||||||
|
SHLIB_SOVER=${LIBVERSION:+"-$(LIBVERSION)"}; \
|
||||||
|
ALLSYMSFLAGS='-Wl,--whole-archive'; \
|
||||||
|
NOALLSYMSFLAGS='-Wl,--no-whole-archive'; \
|
||||||
|
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared $$base $$deffile -Wl,-s,-Bsymbolic"; \
|
||||||
$(LINK_SO_O)
|
$(LINK_SO_O)
|
||||||
|
#for mingw target if def-file is in use dll-name should match library-name
|
||||||
link_a.cygwin:
|
link_a.cygwin:
|
||||||
@ $(CALC_VERSIONS); \
|
@ $(CALC_VERSIONS); \
|
||||||
INHIBIT_SYMLINKS=yes; \
|
INHIBIT_SYMLINKS=yes; \
|
||||||
SHLIB=cyg$(LIBNAME) \
|
SHLIB=cyg$(LIBNAME); SHLIB_SOVER=-$(LIBVERSION); SHLIB_SUFFIX=.dll; \
|
||||||
SHLIB_SUFFIX=.dll \
|
dll_name=$$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX; extras=; \
|
||||||
LIBDEPS="$(LIBDEPS) -lc" \
|
base=-Wl,--enable-auto-image-base; \
|
||||||
SHLIB_SOVER= \
|
if expr $(PLATFORM) : 'mingw' > /dev/null; then \
|
||||||
ALLSYMSFLAGS='-Wl,--whole-archive' \
|
case $(LIBNAME) in \
|
||||||
NOALLSYMSFLAGS='-Wl,--no-whole-archive' \
|
crypto) SHLIB=libeay;; \
|
||||||
SHAREDFLAGS="-shared -Wl,-Bsymbolic -Wl,--out-implib,lib$(LIBNAME).dll.a" \
|
ssl) SHLIB=ssleay;; \
|
||||||
SHAREDCMD='${CC}'; \
|
esac; \
|
||||||
$(LINK_SO_A)
|
SHLIB_SOVER=32; \
|
||||||
|
extras="$(LIBNAME).def"; \
|
||||||
|
$(PERL) util/mkdef.pl 32 $$SHLIB > $$extras; \
|
||||||
|
base=; [ $(LIBNAME) = "crypto" ] && base=-Wl,--image-base,0x63000000; \
|
||||||
|
fi; \
|
||||||
|
dll_name=$$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX; \
|
||||||
|
$(PERL) util/mkrc.pl $$dll_name | \
|
||||||
|
$(CROSS_COMPILE)windres -o rc.o; \
|
||||||
|
extras="$$extras rc.o"; \
|
||||||
|
ALLSYMSFLAGS='-Wl,--whole-archive'; \
|
||||||
|
NOALLSYMSFLAGS='-Wl,--no-whole-archive'; \
|
||||||
|
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared $$base -Wl,-s,-Bsymbolic -Wl,--out-implib,lib$(LIBNAME).dll.a $$extras"; \
|
||||||
|
[ -f apps/$$dll_name ] && rm apps/$$dll_name; \
|
||||||
|
[ -f test/$$dll_name ] && rm test/$$dll_name; \
|
||||||
|
$(LINK_SO_A) || exit 1; \
|
||||||
|
rm $$extras; \
|
||||||
|
cp -p $$dll_name apps/; \
|
||||||
|
cp -p $$dll_name test/
|
||||||
|
link_app.cygwin:
|
||||||
|
@if expr "$(CFLAGS)" : '.*OPENSSL_USE_APPLINK' > /dev/null; then \
|
||||||
|
LIBDEPS="$(TOP)/crypto/applink.o $${LIBDEPS:-$(LIBDEPS)}"; \
|
||||||
|
export LIBDEPS; \
|
||||||
|
fi; \
|
||||||
|
$(LINK_APP)
|
||||||
|
|
||||||
link_o.alpha-osf1:
|
link_o.alpha-osf1:
|
||||||
@ if ${DETECT_GNU_LD}; then \
|
@ if $(DETECT_GNU_LD); then \
|
||||||
$(DO_GNU); \
|
$(DO_GNU_SO); \
|
||||||
else \
|
else \
|
||||||
SHLIB=lib$(LIBNAME).so \
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
SHLIB_SUFFIX= \
|
SHLIB_SUFFIX=; \
|
||||||
LIBDEPS="$(LIBDEPS) -lc" \
|
|
||||||
SHLIB_HIST=`echo "$(LIBCOMPATVERSIONS)" | cut -d';' -f2 | sed -e 's/ */:/'`; \
|
SHLIB_HIST=`echo "$(LIBCOMPATVERSIONS)" | cut -d';' -f2 | sed -e 's/ */:/'`; \
|
||||||
if [ -n "$$SHLIB_HIST" ]; then \
|
if [ -n "$$SHLIB_HIST" ]; then \
|
||||||
SHLIB_HIST="$${SHLIB_HIST}:$(LIBVERSION)"; \
|
SHLIB_HIST="$${SHLIB_HIST}:$(LIBVERSION)"; \
|
||||||
else \
|
else \
|
||||||
SHLIB_HIST="$(LIBVERSION)"; \
|
SHLIB_HIST="$(LIBVERSION)"; \
|
||||||
fi
|
fi; \
|
||||||
SHLIB_SOVER= \
|
SHLIB_SOVER=; \
|
||||||
ALLSYMSFLAGS='-all' \
|
ALLSYMSFLAGS='-all'; \
|
||||||
NOALLSYMSFLAGS='-none' \
|
NOALLSYMSFLAGS='-none'; \
|
||||||
SHAREDFLAGS="-shared" \
|
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared -Wl,-B,symbolic"; \
|
||||||
SHAREDCMD='$(CC)'; \
|
|
||||||
if [ -n "$$SHLIB_HIST" ]; then \
|
if [ -n "$$SHLIB_HIST" ]; then \
|
||||||
SHAREDFLAGS="$SHAREDFLAGS -set_version \"$$SHLIB_HIST\""; \
|
SHAREDFLAGS="$$SHAREDFLAGS -set_version $$SHLIB_HIST"; \
|
||||||
fi; \
|
fi; \
|
||||||
fi; \
|
fi; \
|
||||||
$(LINK_SO_O)
|
$(LINK_SO_O)
|
||||||
link_a.alpha-osf1:
|
link_a.alpha-osf1:
|
||||||
@ if ${DETECT_GNU_LD}; then \
|
@ if $(DETECT_GNU_LD); then \
|
||||||
$(DO_GNU); \
|
$(DO_GNU_SO); \
|
||||||
else \
|
else \
|
||||||
SHLIB=lib$(LIBNAME).so \
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
SHLIB_SUFFIX= \
|
SHLIB_SUFFIX=; \
|
||||||
LIBDEPS="$(LIBDEPS) -lc" \
|
|
||||||
SHLIB_HIST=`echo "$(LIBCOMPATVERSIONS)" | cut -d';' -f2 | sed -e 's/ */:/'`; \
|
SHLIB_HIST=`echo "$(LIBCOMPATVERSIONS)" | cut -d';' -f2 | sed -e 's/ */:/'`; \
|
||||||
if [ -n "$$SHLIB_HIST" ]; then \
|
if [ -n "$$SHLIB_HIST" ]; then \
|
||||||
SHLIB_HIST="$${SHLIB_HIST}:$(LIBVERSION)"; \
|
SHLIB_HIST="$${SHLIB_HIST}:$(LIBVERSION)"; \
|
||||||
else \
|
else \
|
||||||
SHLIB_HIST="$(LIBVERSION)"; \
|
SHLIB_HIST="$(LIBVERSION)"; \
|
||||||
fi
|
fi; \
|
||||||
SHLIB_SOVER= \
|
SHLIB_SOVER=; \
|
||||||
ALLSYMSFLAGS='-all' \
|
ALLSYMSFLAGS='-all'; \
|
||||||
NOALLSYMSFLAGS='-none' \
|
NOALLSYMSFLAGS='-none'; \
|
||||||
SHAREDFLAGS="-shared" \
|
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared -Wl,-B,symbolic"; \
|
||||||
SHAREDCMD='$(CC)'; \
|
|
||||||
if [ -n "$$SHLIB_HIST" ]; then \
|
if [ -n "$$SHLIB_HIST" ]; then \
|
||||||
SHAREDFLAGS="$SHAREDFLAGS -set_version \"$$SHLIB_HIST\""; \
|
SHAREDFLAGS="$$SHAREDFLAGS -set_version $$SHLIB_HIST"; \
|
||||||
fi; \
|
fi; \
|
||||||
fi; \
|
fi; \
|
||||||
$(LINK_SO_A)
|
$(LINK_SO_A)
|
||||||
|
link_app.alpha-osf1:
|
||||||
# The difference between alpha-osf1-shared and tru64-shared is the `-msym'
|
@if $(DETECT_GNU_LD); then \
|
||||||
# option passed to the linker.
|
$(DO_GNU_APP); \
|
||||||
link_o.tru64:
|
|
||||||
@ if ${DETECT_GNU_LD}; then \
|
|
||||||
$(DO_GNU); \
|
|
||||||
else \
|
else \
|
||||||
SHLIB=lib$(LIBNAME).so \
|
LDFLAGS="$(CFLAGS) -rpath $(LIBRPATH)"; \
|
||||||
SHLIB_SUFFIX= \
|
|
||||||
LIBDEPS="$(LIBDEPS) -lc" \
|
|
||||||
SHLIB_HIST=`echo "$(LIBCOMPATVERSIONS)" | cut -d';' -f2 | sed -e 's/ */:/'`; \
|
|
||||||
if [ -n "$$SHLIB_HIST" ]; then \
|
|
||||||
SHLIB_HIST="$${SHLIB_HIST}:$(LIBVERSION)"; \
|
|
||||||
else \
|
|
||||||
SHLIB_HIST="$(LIBVERSION)"; \
|
|
||||||
fi
|
|
||||||
SHLIB_SOVER= \
|
|
||||||
ALLSYMSFLAGS='-all' \
|
|
||||||
NOALLSYMSFLAGS='-none' \
|
|
||||||
SHAREDFLAGS="-shared -msym" \
|
|
||||||
SHAREDCMD='$(CC)'; \
|
|
||||||
if [ -n "$$SHLIB_HIST" ]; then \
|
|
||||||
SHAREDFLAGS="$SHAREDFLAGS -set_version \"$$SHLIB_HIST\""; \
|
|
||||||
fi; \
|
|
||||||
fi; \
|
fi; \
|
||||||
$(LINK_SO_O)
|
$(LINK_APP)
|
||||||
link_a.tru64:
|
|
||||||
@ if ${DETECT_GNU_LD}; then \
|
|
||||||
$(DO_GNU); \
|
|
||||||
else \
|
|
||||||
SHLIB=lib$(LIBNAME).so \
|
|
||||||
SHLIB_SUFFIX= \
|
|
||||||
LIBDEPS="$(LIBDEPS) -lc" \
|
|
||||||
SHLIB_HIST=`echo "$(LIBCOMPATVERSIONS)" | cut -d';' -f2 | sed -e 's/ */:/'`; \
|
|
||||||
if [ -n "$$SHLIB_HIST" ]; then \
|
|
||||||
SHLIB_HIST="$${SHLIB_HIST}:$(LIBVERSION)"; \
|
|
||||||
else \
|
|
||||||
SHLIB_HIST="$(LIBVERSION)"; \
|
|
||||||
fi
|
|
||||||
SHLIB_SOVER= \
|
|
||||||
ALLSYMSFLAGS='-all' \
|
|
||||||
NOALLSYMSFLAGS='-none' \
|
|
||||||
SHAREDFLAGS="-shared -msym" \
|
|
||||||
SHAREDCMD='$(CC)'; \
|
|
||||||
if [ -n "$$SHLIB_HIST" ]; then \
|
|
||||||
SHAREDFLAGS="$SHAREDFLAGS -set_version \"$$SHLIB_HIST\""; \
|
|
||||||
fi; \
|
|
||||||
fi; \
|
|
||||||
$(LINK_SO_A)
|
|
||||||
|
|
||||||
# The difference between tru64-shared and tru64-shared-rpath is the
|
|
||||||
# -rpath ${LIBRPATH} passed to the linker.
|
|
||||||
link_o.tru64-rpath:
|
|
||||||
@ if ${DETECT_GNU_LD}; then \
|
|
||||||
$(DO_GNU); \
|
|
||||||
else \
|
|
||||||
SHLIB=lib$(LIBNAME).so \
|
|
||||||
SHLIB_SUFFIX= \
|
|
||||||
LIBDEPS="$(LIBDEPS) -lc" \
|
|
||||||
SHLIB_HIST=`echo "$(LIBCOMPATVERSIONS)" | cut -d';' -f2 | sed -e 's/ */:/'`; \
|
|
||||||
if [ -n "$$SHLIB_HIST" ]; then \
|
|
||||||
SHLIB_HIST="$${SHLIB_HIST}:$(LIBVERSION)"; \
|
|
||||||
else \
|
|
||||||
SHLIB_HIST="$(LIBVERSION)"; \
|
|
||||||
fi
|
|
||||||
SHLIB_SOVER= \
|
|
||||||
ALLSYMSFLAGS='-all' \
|
|
||||||
NOALLSYMSFLAGS='-none' \
|
|
||||||
SHAREDFLAGS="-shared -msym -rpath $(LIBRPATH)" \
|
|
||||||
SHAREDCMD='$(CC)'; \
|
|
||||||
if [ -n "$$SHLIB_HIST" ]; then \
|
|
||||||
SHAREDFLAGS="$SHAREDFLAGS -set_version \"$$SHLIB_HIST\""; \
|
|
||||||
fi; \
|
|
||||||
fi; \
|
|
||||||
$(LINK_SO_O)
|
|
||||||
link_a.tru64-rpath:
|
|
||||||
@ if ${DETECT_GNU_LD}; then \
|
|
||||||
$(DO_GNU); \
|
|
||||||
else \
|
|
||||||
SHLIB=lib$(LIBNAME).so \
|
|
||||||
SHLIB_SUFFIX= \
|
|
||||||
LIBDEPS="$(LIBDEPS) -lc" \
|
|
||||||
SHLIB_HIST=`echo "$(LIBCOMPATVERSIONS)" | cut -d';' -f2 | sed -e 's/ */:/'`; \
|
|
||||||
if [ -n "$$SHLIB_HIST" ]; then \
|
|
||||||
SHLIB_HIST="$${SHLIB_HIST}:$(LIBVERSION)"; \
|
|
||||||
else \
|
|
||||||
SHLIB_HIST="$(LIBVERSION)"; \
|
|
||||||
fi
|
|
||||||
SHLIB_SOVER= \
|
|
||||||
ALLSYMSFLAGS='-all' \
|
|
||||||
NOALLSYMSFLAGS='-none' \
|
|
||||||
SHAREDFLAGS="-shared -msym -rpath $(LIBRPATH)" \
|
|
||||||
SHAREDCMD='$(CC)'; \
|
|
||||||
if [ -n "$$SHLIB_HIST" ]; then \
|
|
||||||
SHAREDFLAGS="$SHAREDFLAGS -set_version \"$$SHLIB_HIST\""; \
|
|
||||||
fi; \
|
|
||||||
fi; \
|
|
||||||
$(LINK_SO_A)
|
|
||||||
|
|
||||||
link_o.solaris:
|
link_o.solaris:
|
||||||
@ if ${DETECT_GNU_LD}; then \
|
@ if $(DETECT_GNU_LD); then \
|
||||||
$(DO_GNU); \
|
$(DO_GNU_SO); \
|
||||||
else \
|
else \
|
||||||
$(CALC_VERSIONS); \
|
$(CALC_VERSIONS); \
|
||||||
SHLIB=lib$(LIBNAME).so \
|
MINUSZ='-z '; \
|
||||||
SHLIB_SUFFIX= \
|
($(CC) -v 2>&1 | grep gcc) > /dev/null && MINUSZ='-Wl,-z,'; \
|
||||||
LIBDEPS="$(LIBDEPS) -lc" \
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
ALLSYMSFLAGS='-z allextract' \
|
SHLIB_SUFFIX=; \
|
||||||
NOALLSYMSFLAGS='' \
|
ALLSYMSFLAGS="$${MINUSZ}allextract"; \
|
||||||
SHAREDFLAGS='-G -h $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX' \
|
NOALLSYMSFLAGS="$${MINUSZ}defaultextract"; \
|
||||||
SHAREDCMD='$(CC)'; \
|
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -h $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX -Wl,-Bsymbolic"; \
|
||||||
fi; \
|
fi; \
|
||||||
$(LINK_SO_O)
|
$(LINK_SO_O)
|
||||||
link_a.solaris:
|
link_a.solaris:
|
||||||
@ if ${DETECT_GNU_LD}; then \
|
@ if $(DETECT_GNU_LD); then \
|
||||||
$(DO_GNU); \
|
$(DO_GNU_SO); \
|
||||||
else \
|
else \
|
||||||
$(CALC_VERSIONS); \
|
$(CALC_VERSIONS); \
|
||||||
SHLIB=lib$(LIBNAME).so \
|
MINUSZ='-z '; \
|
||||||
SHLIB_SUFFIX= \
|
($(CC) -v 2>&1 | grep gcc) > /dev/null && MINUSZ='-Wl,-z,'; \
|
||||||
LIBDEPS="$(LIBDEPS) -lc" \
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
ALLSYMSFLAGS='-z allextract' \
|
SHLIB_SUFFIX=;\
|
||||||
NOALLSYMSFLAGS='' \
|
ALLSYMSFLAGS="$${MINUSZ}allextract"; \
|
||||||
SHAREDFLAGS='-G -h $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX' \
|
NOALLSYMSFLAGS="$${MINUSZ}defaultextract"; \
|
||||||
SHAREDCMD='$(CC)'; \
|
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -h $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX -Wl,-Bsymbolic"; \
|
||||||
fi; \
|
fi; \
|
||||||
$(LINK_SO_A)
|
$(LINK_SO_A)
|
||||||
|
link_app.solaris:
|
||||||
|
@ if $(DETECT_GNU_LD); then \
|
||||||
|
$(DO_GNU_APP); \
|
||||||
|
else \
|
||||||
|
LDFLAGS="$(CFLAGS) -R $(LIBRPATH)"; \
|
||||||
|
fi; \
|
||||||
|
$(LINK_APP)
|
||||||
|
|
||||||
# OpenServer 5 native compilers used
|
# OpenServer 5 native compilers used
|
||||||
# UnixWare 7 and OpenUNIX 8 native compilers used
|
|
||||||
link_o.svr3:
|
link_o.svr3:
|
||||||
@ if ${DETECT_GNU_LD}; then \
|
@ if $(DETECT_GNU_LD); then \
|
||||||
$(DO_GNU); \
|
$(DO_GNU_SO); \
|
||||||
else \
|
else \
|
||||||
$(CALC_VERSIONS); \
|
$(CALC_VERSIONS); \
|
||||||
SHLIB=lib$(LIBNAME).so \
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
SHLIB_SUFFIX= \
|
SHLIB_SUFFIX=; \
|
||||||
LIBDEPS="$(LIBDEPS) -lc" \
|
ALLSYMSFLAGS=''; \
|
||||||
ALLSYMSFLAGS='-z allextract' \
|
NOALLSYMSFLAGS=''; \
|
||||||
NOALLSYMSFLAGS='' \
|
SHAREDFLAGS="$(CFLAGS) -G -h $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX"; \
|
||||||
SHAREDFLAGS='-G -h $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX' \
|
|
||||||
SHAREDCMD='$(CC)'; \
|
|
||||||
fi; \
|
fi; \
|
||||||
$(LINK_SO_O)
|
$(LINK_SO_O)
|
||||||
link_a.svr3:
|
link_a.svr3:
|
||||||
@ if ${DETECT_GNU_LD}; then \
|
@ if $(DETECT_GNU_LD); then \
|
||||||
$(DO_GNU); \
|
$(DO_GNU_SO); \
|
||||||
else \
|
else \
|
||||||
$(CALC_VERSIONS); \
|
$(CALC_VERSIONS); \
|
||||||
SHLIB=lib$(LIBNAME).so \
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
SHLIB_SUFFIX= \
|
SHLIB_SUFFIX=; \
|
||||||
LIBDEPS="$(LIBDEPS) -lc" \
|
ALLSYMSFLAGS=''; \
|
||||||
ALLSYMSFLAGS='-z allextract' \
|
NOALLSYMSFLAGS=''; \
|
||||||
NOALLSYMSFLAGS='' \
|
SHAREDFLAGS="$(CFLAGS) -G -h $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX"; \
|
||||||
SHAREDFLAGS='-G -h $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX' \
|
|
||||||
SHAREDCMD='$(CC)'; \
|
|
||||||
fi; \
|
fi; \
|
||||||
$(LINK_SO_A_UNPACKED)
|
$(LINK_SO_A_UNPACKED)
|
||||||
|
link_app.svr3:
|
||||||
|
@$(DETECT_GNU_LD) && $(DO_GNU_APP); \
|
||||||
|
$(LINK_APP)
|
||||||
|
|
||||||
link_o.irix:
|
# UnixWare 7 and OpenUNIX 8 native compilers used
|
||||||
@ if ${DETECT_GNU_LD}; then \
|
link_o.svr5:
|
||||||
$(DO_GNU); \
|
@ if $(DETECT_GNU_LD); then \
|
||||||
|
$(DO_GNU_SO); \
|
||||||
else \
|
else \
|
||||||
$(CALC_VERSIONS); \
|
$(CALC_VERSIONS); \
|
||||||
SHLIB=lib$(LIBNAME).so \
|
SHARE_FLAG='-G'; \
|
||||||
SHLIB_SUFFIX= \
|
($(CC) -v 2>&1 | grep gcc) > /dev/null && SHARE_FLAG='-shared'; \
|
||||||
LIBDEPS="$(LIBDEPS) -lc" \
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
ALLSYMSFLAGS='-all' \
|
SHLIB_SUFFIX=; \
|
||||||
NOALLSYMSFLAGS='' \
|
ALLSYMSFLAGS=''; \
|
||||||
SHAREDFLAGS='-shared -Wl,-soname,$$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX' \
|
NOALLSYMSFLAGS=''; \
|
||||||
SHAREDCMD='$(CC)'; \
|
SHAREDFLAGS="$(CFLAGS) $${SHARE_FLAG} -h $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX"; \
|
||||||
|
fi; \
|
||||||
|
$(LINK_SO_O)
|
||||||
|
link_a.svr5:
|
||||||
|
@ if $(DETECT_GNU_LD); then \
|
||||||
|
$(DO_GNU_SO); \
|
||||||
|
else \
|
||||||
|
$(CALC_VERSIONS); \
|
||||||
|
SHARE_FLAG='-G'; \
|
||||||
|
($(CC) -v 2>&1 | grep gcc) > /dev/null && SHARE_FLAG='-shared'; \
|
||||||
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
|
SHLIB_SUFFIX=; \
|
||||||
|
ALLSYMSFLAGS=''; \
|
||||||
|
NOALLSYMSFLAGS=''; \
|
||||||
|
SHAREDFLAGS="$(CFLAGS) $${SHARE_FLAG} -h $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX"; \
|
||||||
|
fi; \
|
||||||
|
$(LINK_SO_A_UNPACKED)
|
||||||
|
link_app.svr5:
|
||||||
|
@$(DETECT_GNU_LD) && $(DO_GNU_APP); \
|
||||||
|
$(LINK_APP)
|
||||||
|
|
||||||
|
link_o.irix:
|
||||||
|
@ if $(DETECT_GNU_LD); then \
|
||||||
|
$(DO_GNU_SO); \
|
||||||
|
else \
|
||||||
|
$(CALC_VERSIONS); \
|
||||||
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
|
SHLIB_SUFFIX=; \
|
||||||
|
MINUSWL=""; \
|
||||||
|
($(CC) -v 2>&1 | grep gcc) > /dev/null && MINUSWL="-Wl,"; \
|
||||||
|
ALLSYMSFLAGS="$${MINUSWL}-all"; \
|
||||||
|
NOALLSYMSFLAGS="$${MINUSWL}-none"; \
|
||||||
|
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared -Wl,-soname,$$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX,-B,symbolic"; \
|
||||||
fi; \
|
fi; \
|
||||||
$(LINK_SO_O)
|
$(LINK_SO_O)
|
||||||
link_a.irix:
|
link_a.irix:
|
||||||
@ if ${DETECT_GNU_LD}; then \
|
@ if $(DETECT_GNU_LD); then \
|
||||||
$(DO_GNU); \
|
$(DO_GNU_SO); \
|
||||||
else \
|
else \
|
||||||
$(CALC_VERSIONS); \
|
$(CALC_VERSIONS); \
|
||||||
SHLIB=lib$(LIBNAME).so \
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
SHLIB_SUFFIX= \
|
SHLIB_SUFFIX=; \
|
||||||
LIBDEPS="$(LIBDEPS) -lc" \
|
MINUSWL=""; \
|
||||||
ALLSYMSFLAGS='-all' \
|
($(CC) -v 2>&1 | grep gcc) > /dev/null && MINUSWL="-Wl,"; \
|
||||||
NOALLSYMSFLAGS='' \
|
ALLSYMSFLAGS="$${MINUSWL}-all"; \
|
||||||
SHAREDFLAGS='-shared -Wl,-soname,$$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX' \
|
NOALLSYMSFLAGS="$${MINUSWL}-none"; \
|
||||||
SHAREDCMD='$(CC)'; \
|
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared -Wl,-soname,$$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX,-B,symbolic"; \
|
||||||
fi; \
|
fi; \
|
||||||
$(LINK_SO_A)
|
$(LINK_SO_A)
|
||||||
|
link_app.irix:
|
||||||
|
@LDFLAGS="$(CFLAGS) -Wl,-rpath,$(LIBRPATH)"; \
|
||||||
|
$(LINK_APP)
|
||||||
|
|
||||||
# HP-UX includes the full pathname of libs we depend on, so we would get
|
# 32-bit PA-RISC HP-UX embeds the -L pathname of libs we link with, so
|
||||||
# ./libcrypto (with ./ as path information) compiled into libssl, hence
|
# we compensate for it with +cdp ../: and +cdp ./:. Yes, these rewrite
|
||||||
# we omit the SHLIBDEPS. Applications must be linked with -lssl -lcrypto
|
# rules imply that we can only link one level down in catalog structure,
|
||||||
# anyway.
|
# but that's what takes place for the moment of this writing. +cdp option
|
||||||
# The object modules are loaded from lib$i.a using the undocumented -Fl
|
# was introduced in HP-UX 11.x and applies in 32-bit PA-RISC link
|
||||||
# option.
|
# editor context only [it's simply ignored in other cases, which are all
|
||||||
|
# ELFs by the way].
|
||||||
#
|
#
|
||||||
# WARNING: Until DSO is fixed to support a search path, we support SHLIB_PATH
|
link_o.hpux:
|
||||||
# by temporarily specifying "+s"!
|
@if $(DETECT_GNU_LD); then $(DO_GNU_SO); else \
|
||||||
#
|
$(CALC_VERSIONS); \
|
||||||
link_o.hpux32:
|
SHLIB=lib$(LIBNAME).sl; \
|
||||||
@ $(CALC_VERSIONS); \
|
expr "$(CFLAGS)" : '.*DSO_DLFCN' > /dev/null && SHLIB=lib$(LIBNAME).so; \
|
||||||
SHLIB=lib$(LIBNAME).sl \
|
SHLIB_SUFFIX=; \
|
||||||
SHLIB_SUFFIX= \
|
ALLSYMSFLAGS='-Wl,-Fl'; \
|
||||||
LIBDEPS="$(LIBDEPS) -lc" \
|
NOALLSYMSFLAGS=''; \
|
||||||
ALLSYMSFLAGS='-Fl' \
|
expr $(PLATFORM) : 'hpux64' > /dev/null && ALLSYMSFLAGS='-Wl,+forceload'; \
|
||||||
NOALLSYMSFLAGS='' \
|
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -Wl,-B,symbolic,+vnocompatwarnings,-z,+s,+h,$$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX,+cdp,../:,+cdp,./:"; \
|
||||||
SHAREDFLAGS='+vnocompatwarnings -b -z +s +h $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX' \
|
fi; \
|
||||||
SHAREDCMD='/usr/ccs/bin/ld'; \
|
rm -f $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX || :; \
|
||||||
$(LINK_SO_O) && chmod a=rx $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX
|
$(LINK_SO_O) && chmod a=rx $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX
|
||||||
link_a.hpux32:
|
link_a.hpux:
|
||||||
@ $(CALC_VERSIONS); \
|
@if $(DETECT_GNU_LD); then $(DO_GNU_SO); else \
|
||||||
SHLIB=lib$(LIBNAME).sl \
|
$(CALC_VERSIONS); \
|
||||||
SHLIB_SUFFIX= \
|
SHLIB=lib$(LIBNAME).sl; \
|
||||||
LIBDEPS="$(LIBDEPS) -lc" \
|
expr $(PLATFORM) : '.*ia64' > /dev/null && SHLIB=lib$(LIBNAME).so; \
|
||||||
ALLSYMSFLAGS='-Fl' \
|
SHLIB_SUFFIX=; \
|
||||||
NOALLSYMSFLAGS='' \
|
ALLSYMSFLAGS='-Wl,-Fl'; \
|
||||||
SHAREDFLAGS='+vnocompatwarnings -b -z +s +h $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX' \
|
NOALLSYMSFLAGS=''; \
|
||||||
SHAREDCMD='/usr/ccs/bin/ld'; \
|
expr $(PLATFORM) : 'hpux64' > /dev/null && ALLSYMSFLAGS='-Wl,+forceload'; \
|
||||||
$(LINK_SO_A) && chmod a=rx $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX
|
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -Wl,-B,symbolic,+vnocompatwarnings,-z,+s,+h,$$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX,+cdp,../:,+cdp,./:"; \
|
||||||
|
fi; \
|
||||||
# HP-UX includes the full pathname of libs we depend on, so we would get
|
rm -f $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX || :; \
|
||||||
# ./libcrypto (with ./ as path information) compiled into libssl, hence
|
|
||||||
# we omit the SHLIBDEPS. Applications must be linked with -lssl -lcrypto
|
|
||||||
# anyway.
|
|
||||||
#
|
|
||||||
# HP-UX in 64bit mode has "+s" enabled by default; it will search for
|
|
||||||
# shared libraries along LD_LIBRARY_PATH _and_ SHLIB_PATH.
|
|
||||||
#
|
|
||||||
link_o.hpux64:
|
|
||||||
@ $(CALC_VERSIONS); \
|
|
||||||
SHLIB=lib$(LIBNAME).sl \
|
|
||||||
SHLIB_SUFFIX= \
|
|
||||||
LIBDEPS="$(LIBDEPS) -lc" \
|
|
||||||
ALLSYMSFLAGS='+forceload' \
|
|
||||||
NOALLSYMSFLAGS='' \
|
|
||||||
SHAREDFLAGS='-b -z +h $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX' \
|
|
||||||
SHAREDCMD='/usr/ccs/bin/ld'; \
|
|
||||||
$(LINK_SO_O) && chmod a=rx $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX
|
|
||||||
link_a.hpux64:
|
|
||||||
@ $(CALC_VERSIONS); \
|
|
||||||
SHLIB=lib$(LIBNAME).sl \
|
|
||||||
SHLIB_SUFFIX= \
|
|
||||||
LIBDEPS="$(LIBDEPS) -lc" \
|
|
||||||
ALLSYMSFLAGS='+forceload' \
|
|
||||||
NOALLSYMSFLAGS='' \
|
|
||||||
SHAREDFLAGS='-b -z +h $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX' \
|
|
||||||
SHAREDCMD='/usr/ccs/bin/ld'; \
|
|
||||||
$(LINK_SO_A) && chmod a=rx $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX
|
$(LINK_SO_A) && chmod a=rx $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX
|
||||||
|
link_app.hpux:
|
||||||
|
@if $(DETECT_GNU_LD); then $(DO_GNU_APP); else \
|
||||||
|
LDFLAGS="$(CFLAGS) -Wl,+s,+cdp,../:,+cdp,./:,+b,$(LIBRPATH)"; \
|
||||||
|
fi; \
|
||||||
|
$(LINK_APP)
|
||||||
|
|
||||||
link_o.aix:
|
link_o.aix:
|
||||||
@ $(CALC_VERSIONS); \
|
@ $(CALC_VERSIONS); \
|
||||||
SHLIB=lib$(LIBNAME).so \
|
OBJECT_MODE=`expr "x$(SHARED_LDFLAGS)" : 'x\-[a-z]*\(64\)'` || :; \
|
||||||
SHLIB_SUFFIX= \
|
OBJECT_MODE=$${OBJECT_MODE:-32}; export OBJECT_MODE; \
|
||||||
LIBDEPS="$(LIBDEPS) -lc" \
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
ALLSYMSFLAGS='-bnogc' \
|
SHLIB_SUFFIX=; \
|
||||||
NOALLSYMSFLAGS='' \
|
ALLSYMSFLAGS=''; \
|
||||||
SHAREDFLAGS='-G -bE:lib$(LIBNAME).exp -bM:SRE' \
|
NOALLSYMSFLAGS=''; \
|
||||||
SHAREDCMD='$(CC)'; \
|
SHAREDFLAGS='$(CFLAGS) $(SHARED_LDFLAGS) -Wl,-bexpall,-bnolibpath,-bM:SRE'; \
|
||||||
$(LINK_SO_O)
|
$(LINK_SO_O);
|
||||||
link_a.aix:
|
link_a.aix:
|
||||||
@ $(CALC_VERSIONS); \
|
@ $(CALC_VERSIONS); \
|
||||||
SHLIB=lib$(LIBNAME).so \
|
OBJECT_MODE=`expr "x$(SHARED_LDFLAGS)" : 'x\-[a-z]*\(64\)'` || : ; \
|
||||||
SHLIB_SUFFIX= \
|
OBJECT_MODE=$${OBJECT_MODE:-32}; export OBJECT_MODE; \
|
||||||
LIBDEPS="$(LIBDEPS) -lc" \
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
ALLSYMSFLAGS='-bnogc' \
|
SHLIB_SUFFIX=; \
|
||||||
NOALLSYMSFLAGS='' \
|
ALLSYMSFLAGS='-bnogc'; \
|
||||||
SHAREDFLAGS='-G -bE:lib$(LIBNAME).exp -bM:SRE' \
|
NOALLSYMSFLAGS=''; \
|
||||||
SHAREDCMD='$(CC)'; \
|
SHAREDFLAGS='$(CFLAGS) $(SHARED_LDFLAGS) -Wl,-bexpall,-bnolibpath,-bM:SRE'; \
|
||||||
$(LINK_SO_A_VIA_O)
|
$(LINK_SO_A_VIA_O)
|
||||||
|
link_app.aix:
|
||||||
|
LDFLAGS="$(CFLAGS) -Wl,-brtl,-blibpath:$(LIBRPATH):$${LIBPATH:-/usr/lib:/lib}"; \
|
||||||
|
$(LINK_APP)
|
||||||
|
|
||||||
link_o.reliantunix:
|
link_o.reliantunix:
|
||||||
@ $(CALC_VERSIONS); \
|
@ $(CALC_VERSIONS); \
|
||||||
SHLIB=lib$(LIBNAME).so \
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
SHLIB_SUFFIX= \
|
SHLIB_SUFFIX=; \
|
||||||
LIBDEPS="$(LIBDEPS) -lc" \
|
ALLSYMSFLAGS=; \
|
||||||
ALLSYMSFLAGS= \
|
NOALLSYMSFLAGS=''; \
|
||||||
NOALLSYMSFLAGS='' \
|
SHAREDFLAGS='$(CFLAGS) -G'; \
|
||||||
SHAREDFLAGS='-G' \
|
|
||||||
SHAREDCMD='$(CC)'; \
|
|
||||||
$(LINK_SO_O)
|
$(LINK_SO_O)
|
||||||
link_a.reliantunix:
|
link_a.reliantunix:
|
||||||
@ $(CALC_VERSIONS); \
|
@ $(CALC_VERSIONS); \
|
||||||
SHLIB=lib$(LIBNAME).so \
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
SHLIB_SUFFIX= \
|
SHLIB_SUFFIX=; \
|
||||||
LIBDEPS="$(LIBDEPS) -lc" \
|
ALLSYMSFLAGS=; \
|
||||||
ALLSYMSFLAGS= \
|
NOALLSYMSFLAGS=''; \
|
||||||
NOALLSYMSFLAGS='' \
|
SHAREDFLAGS='$(CFLAGS) -G'; \
|
||||||
SHAREDFLAGS='-G' \
|
|
||||||
SHAREDCMD='$(CC)'; \
|
|
||||||
$(LINK_SO_A_UNPACKED)
|
$(LINK_SO_A_UNPACKED)
|
||||||
|
link_app.reliantunix:
|
||||||
|
$(LINK_APP)
|
||||||
|
|
||||||
# Targets to build symbolic links when needed
|
# Targets to build symbolic links when needed
|
||||||
symlink.gnu symlink.solaris symlink.svr3 symlink.irix \
|
symlink.gnu symlink.solaris symlink.svr3 symlink.svr5 symlink.irix \
|
||||||
symlink.aix symlink.reliantunix:
|
symlink.aix symlink.reliantunix:
|
||||||
@ $(CALC_VERSIONS); \
|
@ $(CALC_VERSIONS); \
|
||||||
SHLIB=lib$(LIBNAME).so; \
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
$(SYMLINK_SO)
|
$(SYMLINK_SO)
|
||||||
symlink.darwin:
|
symlink.darwin:
|
||||||
@ $(CALC_VERSIONS); \
|
@ $(CALC_VERSIONS); \
|
||||||
SHLIB=lib$(LIBNAME) \
|
SHLIB=lib$(LIBNAME); \
|
||||||
SHLIB_SUFFIX=.dylib; \
|
SHLIB_SUFFIX=.dylib; \
|
||||||
$(SYMLINK_SO)
|
$(SYMLINK_SO)
|
||||||
symlink.hpux32 symlink.hpux64:
|
symlink.hpux:
|
||||||
@ $(CALC_VERSIONS); \
|
@ $(CALC_VERSIONS); \
|
||||||
SHLIB=lib$(LIBNAME).sl; \
|
SHLIB=lib$(LIBNAME).sl; \
|
||||||
|
expr $(PLATFORM) : '.*ia64' > /dev/null && SHLIB=lib$(LIBNAME).so; \
|
||||||
$(SYMLINK_SO)
|
$(SYMLINK_SO)
|
||||||
# The following lines means those specific architectures do no symlinks
|
# The following lines means those specific architectures do no symlinks
|
||||||
symlink.cygwin symlib.alpha-osf1 symlink.tru64 symlink.tru64-rpath:
|
symlink.cygwin symlink.alpha-osf1 symlink.tru64 symlink.tru64-rpath symlink.beos:
|
||||||
|
|
||||||
# Compatibility targets
|
# Compatibility targets
|
||||||
link_o.bsd-gcc-shared link_o.linux-shared link_o.gnu-shared: link_o.gnu
|
link_o.bsd-gcc-shared link_o.linux-shared link_o.gnu-shared: link_o.gnu
|
||||||
link_a.bsd-gcc-shared link_a.linux-shared link_a.gnu-shared: link_a.gnu
|
link_a.bsd-gcc-shared link_a.linux-shared link_a.gnu-shared: link_a.gnu
|
||||||
symlink.bsd-gcc-shared symlink.linux-shared symlink.gnu-shared: symlink.gnu
|
link_app.bsd-gcc-shared link_app.linux-shared link_app.gnu-shared: link_app.gnu
|
||||||
|
symlink.bsd-gcc-shared symlink.bsd-shared symlink.linux-shared symlink.gnu-shared: symlink.gnu
|
||||||
|
link_o.bsd-shared: link_o.bsd
|
||||||
|
link_a.bsd-shared: link_a.bsd
|
||||||
|
link_app.bsd-shared: link_app.bsd
|
||||||
link_o.darwin-shared: link_o.darwin
|
link_o.darwin-shared: link_o.darwin
|
||||||
link_a.darwin-shared: link_a.darwin
|
link_a.darwin-shared: link_a.darwin
|
||||||
|
link_app.darwin-shared: link_app.darwin
|
||||||
symlink.darwin-shared: symlink.darwin
|
symlink.darwin-shared: symlink.darwin
|
||||||
link_o.cygwin-shared: link_o.cygwin
|
link_o.cygwin-shared: link_o.cygwin
|
||||||
link_a.cygwin-shared: link_a.cygwin
|
link_a.cygwin-shared: link_a.cygwin
|
||||||
|
link_app.cygwin-shared: link_app.cygwin
|
||||||
symlink.cygwin-shared: symlink.cygwin
|
symlink.cygwin-shared: symlink.cygwin
|
||||||
link_o.alpha-osf1-shared: link_o.alpha-osf1
|
link_o.alpha-osf1-shared: link_o.alpha-osf1
|
||||||
link_a.alpha-osf1-shared: link_a.alpha-osf1
|
link_a.alpha-osf1-shared: link_a.alpha-osf1
|
||||||
|
link_app.alpha-osf1-shared: link_app.alpha-osf1
|
||||||
symlink.alpha-osf1-shared: symlink.alpha-osf1
|
symlink.alpha-osf1-shared: symlink.alpha-osf1
|
||||||
link_o.tru64-shared: link_o.tru64
|
link_o.tru64-shared: link_o.tru64
|
||||||
link_a.tru64-shared: link_a.tru64
|
link_a.tru64-shared: link_a.tru64
|
||||||
|
link_app.tru64-shared: link_app.tru64
|
||||||
symlink.tru64-shared: symlink.tru64
|
symlink.tru64-shared: symlink.tru64
|
||||||
link_o.tru64-shared-rpath: link_o.tru64-rpath
|
link_o.tru64-shared-rpath: link_o.tru64-rpath
|
||||||
link_a.tru64-shared-rpath: link_a.tru64-rpath
|
link_a.tru64-shared-rpath: link_a.tru64-rpath
|
||||||
|
link_app.tru64-shared-rpath: link_app.tru64-rpath
|
||||||
symlink.tru64-shared-rpath: symlink.tru64-rpath
|
symlink.tru64-shared-rpath: symlink.tru64-rpath
|
||||||
link_o.solaris-shared: link_o.solaris
|
link_o.solaris-shared: link_o.solaris
|
||||||
link_a.solaris-shared: link_a.solaris
|
link_a.solaris-shared: link_a.solaris
|
||||||
|
link_app.solaris-shared: link_app.solaris
|
||||||
symlink.solaris-shared: symlink.solaris
|
symlink.solaris-shared: symlink.solaris
|
||||||
link_o.svr3-shared: link_o.svr3
|
link_o.svr3-shared: link_o.svr3
|
||||||
link_a.svr3-shared: link_a.svr3
|
link_a.svr3-shared: link_a.svr3
|
||||||
|
link_app.svr3-shared: link_app.svr3
|
||||||
symlink.svr3-shared: symlink.svr3
|
symlink.svr3-shared: symlink.svr3
|
||||||
link_o.svr5-shared: link_o.svr3
|
link_o.svr5-shared: link_o.svr5
|
||||||
link_a.svr5-shared: link_a.svr3
|
link_a.svr5-shared: link_a.svr5
|
||||||
symlink.svr5-shared: symlink.svr3
|
link_app.svr5-shared: link_app.svr5
|
||||||
|
symlink.svr5-shared: symlink.svr5
|
||||||
link_o.irix-shared: link_o.irix
|
link_o.irix-shared: link_o.irix
|
||||||
link_a.irix-shared: link_a.irix
|
link_a.irix-shared: link_a.irix
|
||||||
|
link_app.irix-shared: link_app.irix
|
||||||
symlink.irix-shared: symlink.irix
|
symlink.irix-shared: symlink.irix
|
||||||
link_o.hpux-shared: link_o.hpux32
|
link_o.hpux-shared: link_o.hpux
|
||||||
link_a.hpux-shared: link_a.hpux32
|
link_a.hpux-shared: link_a.hpux
|
||||||
symlink.hpux-shared: symlink.hpux32
|
link_app.hpux-shared: link_app.hpux
|
||||||
link_o.hpux64-shared: link_o.hpux64
|
symlink.hpux-shared: symlink.hpux
|
||||||
link_a.hpux64-shared: link_a.hpux64
|
|
||||||
symlink.hpux64-shared: symlink.hpux64
|
|
||||||
link_o.aix-shared: link_o.aix
|
link_o.aix-shared: link_o.aix
|
||||||
link_a.aix-shared: link_a.aix
|
link_a.aix-shared: link_a.aix
|
||||||
|
link_app.aix-shared: link_app.aix
|
||||||
symlink.aix-shared: symlink.aix
|
symlink.aix-shared: symlink.aix
|
||||||
link_o.reliantunix-shared: link_o.reliantunix
|
link_o.reliantunix-shared: link_o.reliantunix
|
||||||
link_a.reliantunix-shared: link_a.reliantunix
|
link_a.reliantunix-shared: link_a.reliantunix
|
||||||
|
link_app.reliantunix-shared: link_app.reliantunix
|
||||||
symlink.reliantunix-shared: symlink.reliantunix
|
symlink.reliantunix-shared: symlink.reliantunix
|
||||||
|
link_o.beos-shared: link_o.beos
|
||||||
|
link_a.beos-shared: link_a.beos
|
||||||
|
link_app.beos-shared: link_app.gnu
|
||||||
|
symlink.beos-shared: symlink.beos
|
||||||
|
|||||||
488
NEWS
488
NEWS
@@ -5,7 +5,442 @@
|
|||||||
This file gives a brief overview of the major changes between each OpenSSL
|
This file gives a brief overview of the major changes between each OpenSSL
|
||||||
release. For more details please read the CHANGES file.
|
release. For more details please read the CHANGES file.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.6 and OpenSSL 0.9.7:
|
Major changes between OpenSSL 1.0.1m and OpenSSL 1.0.1n [11 Jun 2015]
|
||||||
|
|
||||||
|
o Malformed ECParameters causes infinite loop (CVE-2015-1788)
|
||||||
|
o Exploitable out-of-bounds read in X509_cmp_time (CVE-2015-1789)
|
||||||
|
o PKCS7 crash with missing EnvelopedContent (CVE-2015-1790)
|
||||||
|
o CMS verify infinite loop with unknown hash function (CVE-2015-1792)
|
||||||
|
o Race condition handling NewSessionTicket (CVE-2015-1791)
|
||||||
|
|
||||||
|
Major changes between OpenSSL 1.0.1l and OpenSSL 1.0.1m [19 Mar 2015]
|
||||||
|
|
||||||
|
o Segmentation fault in ASN1_TYPE_cmp fix (CVE-2015-0286)
|
||||||
|
o ASN.1 structure reuse memory corruption fix (CVE-2015-0287)
|
||||||
|
o PKCS7 NULL pointer dereferences fix (CVE-2015-0289)
|
||||||
|
o DoS via reachable assert in SSLv2 servers fix (CVE-2015-0293)
|
||||||
|
o Use After Free following d2i_ECPrivatekey error fix (CVE-2015-0209)
|
||||||
|
o X509_to_X509_REQ NULL pointer deref fix (CVE-2015-0288)
|
||||||
|
o Removed the export ciphers from the DEFAULT ciphers
|
||||||
|
|
||||||
|
Major changes between OpenSSL 1.0.1k and OpenSSL 1.0.1l [15 Jan 2015]
|
||||||
|
|
||||||
|
o Build fixes for the Windows and OpenVMS platforms
|
||||||
|
|
||||||
|
Major changes between OpenSSL 1.0.1j and OpenSSL 1.0.1k [8 Jan 2015]
|
||||||
|
|
||||||
|
o Fix for CVE-2014-3571
|
||||||
|
o Fix for CVE-2015-0206
|
||||||
|
o Fix for CVE-2014-3569
|
||||||
|
o Fix for CVE-2014-3572
|
||||||
|
o Fix for CVE-2015-0204
|
||||||
|
o Fix for CVE-2015-0205
|
||||||
|
o Fix for CVE-2014-8275
|
||||||
|
o Fix for CVE-2014-3570
|
||||||
|
|
||||||
|
Major changes between OpenSSL 1.0.1i and OpenSSL 1.0.1j [15 Oct 2014]
|
||||||
|
|
||||||
|
o Fix for CVE-2014-3513
|
||||||
|
o Fix for CVE-2014-3567
|
||||||
|
o Mitigation for CVE-2014-3566 (SSL protocol vulnerability)
|
||||||
|
o Fix for CVE-2014-3568
|
||||||
|
|
||||||
|
Major changes between OpenSSL 1.0.1h and OpenSSL 1.0.1i [6 Aug 2014]
|
||||||
|
|
||||||
|
o Fix for CVE-2014-3512
|
||||||
|
o Fix for CVE-2014-3511
|
||||||
|
o Fix for CVE-2014-3510
|
||||||
|
o Fix for CVE-2014-3507
|
||||||
|
o Fix for CVE-2014-3506
|
||||||
|
o Fix for CVE-2014-3505
|
||||||
|
o Fix for CVE-2014-3509
|
||||||
|
o Fix for CVE-2014-5139
|
||||||
|
o Fix for CVE-2014-3508
|
||||||
|
|
||||||
|
Major changes between OpenSSL 1.0.1g and OpenSSL 1.0.1h [5 Jun 2014]
|
||||||
|
|
||||||
|
o Fix for CVE-2014-0224
|
||||||
|
o Fix for CVE-2014-0221
|
||||||
|
o Fix for CVE-2014-0198
|
||||||
|
o Fix for CVE-2014-0195
|
||||||
|
o Fix for CVE-2014-3470
|
||||||
|
o Fix for CVE-2010-5298
|
||||||
|
|
||||||
|
Major changes between OpenSSL 1.0.1f and OpenSSL 1.0.1g [7 Apr 2014]
|
||||||
|
|
||||||
|
o Fix for CVE-2014-0160
|
||||||
|
o Add TLS padding extension workaround for broken servers.
|
||||||
|
o Fix for CVE-2014-0076
|
||||||
|
|
||||||
|
Major changes between OpenSSL 1.0.1e and OpenSSL 1.0.1f [6 Jan 2014]
|
||||||
|
|
||||||
|
o Don't include gmt_unix_time in TLS server and client random values
|
||||||
|
o Fix for TLS record tampering bug CVE-2013-4353
|
||||||
|
o Fix for TLS version checking bug CVE-2013-6449
|
||||||
|
o Fix for DTLS retransmission bug CVE-2013-6450
|
||||||
|
|
||||||
|
Major changes between OpenSSL 1.0.1d and OpenSSL 1.0.1e [11 Feb 2013]:
|
||||||
|
|
||||||
|
o Corrected fix for CVE-2013-0169
|
||||||
|
|
||||||
|
Major changes between OpenSSL 1.0.1c and OpenSSL 1.0.1d [4 Feb 2013]:
|
||||||
|
|
||||||
|
o Fix renegotiation in TLS 1.1, 1.2 by using the correct TLS version.
|
||||||
|
o Include the fips configuration module.
|
||||||
|
o Fix OCSP bad key DoS attack CVE-2013-0166
|
||||||
|
o Fix for SSL/TLS/DTLS CBC plaintext recovery attack CVE-2013-0169
|
||||||
|
o Fix for TLS AESNI record handling flaw CVE-2012-2686
|
||||||
|
|
||||||
|
Major changes between OpenSSL 1.0.1b and OpenSSL 1.0.1c [10 May 2012]:
|
||||||
|
|
||||||
|
o Fix TLS/DTLS record length checking bug CVE-2012-2333
|
||||||
|
o Don't attempt to use non-FIPS composite ciphers in FIPS mode.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 1.0.1a and OpenSSL 1.0.1b [26 Apr 2012]:
|
||||||
|
|
||||||
|
o Fix compilation error on non-x86 platforms.
|
||||||
|
o Make FIPS capable OpenSSL ciphers work in non-FIPS mode.
|
||||||
|
o Fix SSL_OP_NO_TLSv1_1 clash with SSL_OP_ALL in OpenSSL 1.0.0
|
||||||
|
|
||||||
|
Major changes between OpenSSL 1.0.1 and OpenSSL 1.0.1a [19 Apr 2012]:
|
||||||
|
|
||||||
|
o Fix for ASN1 overflow bug CVE-2012-2110
|
||||||
|
o Workarounds for some servers that hang on long client hellos.
|
||||||
|
o Fix SEGV in AES code.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 1.0.0h and OpenSSL 1.0.1 [14 Mar 2012]:
|
||||||
|
|
||||||
|
o TLS/DTLS heartbeat support.
|
||||||
|
o SCTP support.
|
||||||
|
o RFC 5705 TLS key material exporter.
|
||||||
|
o RFC 5764 DTLS-SRTP negotiation.
|
||||||
|
o Next Protocol Negotiation.
|
||||||
|
o PSS signatures in certificates, requests and CRLs.
|
||||||
|
o Support for password based recipient info for CMS.
|
||||||
|
o Support TLS v1.2 and TLS v1.1.
|
||||||
|
o Preliminary FIPS capability for unvalidated 2.0 FIPS module.
|
||||||
|
o SRP support.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 1.0.0g and OpenSSL 1.0.0h [12 Mar 2012]:
|
||||||
|
|
||||||
|
o Fix for CMS/PKCS#7 MMA CVE-2012-0884
|
||||||
|
o Corrected fix for CVE-2011-4619
|
||||||
|
o Various DTLS fixes.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 1.0.0f and OpenSSL 1.0.0g [18 Jan 2012]:
|
||||||
|
|
||||||
|
o Fix for DTLS DoS issue CVE-2012-0050
|
||||||
|
|
||||||
|
Major changes between OpenSSL 1.0.0e and OpenSSL 1.0.0f [4 Jan 2012]:
|
||||||
|
|
||||||
|
o Fix for DTLS plaintext recovery attack CVE-2011-4108
|
||||||
|
o Clear block padding bytes of SSL 3.0 records CVE-2011-4576
|
||||||
|
o Only allow one SGC handshake restart for SSL/TLS CVE-2011-4619
|
||||||
|
o Check parameters are not NULL in GOST ENGINE CVE-2012-0027
|
||||||
|
o Check for malformed RFC3779 data CVE-2011-4577
|
||||||
|
|
||||||
|
Major changes between OpenSSL 1.0.0d and OpenSSL 1.0.0e [6 Sep 2011]:
|
||||||
|
|
||||||
|
o Fix for CRL vulnerability issue CVE-2011-3207
|
||||||
|
o Fix for ECDH crashes CVE-2011-3210
|
||||||
|
o Protection against EC timing attacks.
|
||||||
|
o Support ECDH ciphersuites for certificates using SHA2 algorithms.
|
||||||
|
o Various DTLS fixes.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 1.0.0c and OpenSSL 1.0.0d [8 Feb 2011]:
|
||||||
|
|
||||||
|
o Fix for security issue CVE-2011-0014
|
||||||
|
|
||||||
|
Major changes between OpenSSL 1.0.0b and OpenSSL 1.0.0c [2 Dec 2010]:
|
||||||
|
|
||||||
|
o Fix for security issue CVE-2010-4180
|
||||||
|
o Fix for CVE-2010-4252
|
||||||
|
o Fix mishandling of absent EC point format extension.
|
||||||
|
o Fix various platform compilation issues.
|
||||||
|
o Corrected fix for security issue CVE-2010-3864.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 1.0.0a and OpenSSL 1.0.0b [16 Nov 2010]:
|
||||||
|
|
||||||
|
o Fix for security issue CVE-2010-3864.
|
||||||
|
o Fix for CVE-2010-2939
|
||||||
|
o Fix WIN32 build system for GOST ENGINE.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 1.0.0 and OpenSSL 1.0.0a [1 Jun 2010]:
|
||||||
|
|
||||||
|
o Fix for security issue CVE-2010-1633.
|
||||||
|
o GOST MAC and CFB fixes.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8n and OpenSSL 1.0.0 [29 Mar 2010]:
|
||||||
|
|
||||||
|
o RFC3280 path validation: sufficient to process PKITS tests.
|
||||||
|
o Integrated support for PVK files and keyblobs.
|
||||||
|
o Change default private key format to PKCS#8.
|
||||||
|
o CMS support: able to process all examples in RFC4134
|
||||||
|
o Streaming ASN1 encode support for PKCS#7 and CMS.
|
||||||
|
o Multiple signer and signer add support for PKCS#7 and CMS.
|
||||||
|
o ASN1 printing support.
|
||||||
|
o Whirlpool hash algorithm added.
|
||||||
|
o RFC3161 time stamp support.
|
||||||
|
o New generalised public key API supporting ENGINE based algorithms.
|
||||||
|
o New generalised public key API utilities.
|
||||||
|
o New ENGINE supporting GOST algorithms.
|
||||||
|
o SSL/TLS GOST ciphersuite support.
|
||||||
|
o PKCS#7 and CMS GOST support.
|
||||||
|
o RFC4279 PSK ciphersuite support.
|
||||||
|
o Supported points format extension for ECC ciphersuites.
|
||||||
|
o ecdsa-with-SHA224/256/384/512 signature types.
|
||||||
|
o dsa-with-SHA224 and dsa-with-SHA256 signature types.
|
||||||
|
o Opaque PRF Input TLS extension support.
|
||||||
|
o Updated time routines to avoid OS limitations.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8m and OpenSSL 0.9.8n [24 Mar 2010]:
|
||||||
|
|
||||||
|
o CFB cipher definition fixes.
|
||||||
|
o Fix security issues CVE-2010-0740 and CVE-2010-0433.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8l and OpenSSL 0.9.8m [25 Feb 2010]:
|
||||||
|
|
||||||
|
o Cipher definition fixes.
|
||||||
|
o Workaround for slow RAND_poll() on some WIN32 versions.
|
||||||
|
o Remove MD2 from algorithm tables.
|
||||||
|
o SPKAC handling fixes.
|
||||||
|
o Support for RFC5746 TLS renegotiation extension.
|
||||||
|
o Compression memory leak fixed.
|
||||||
|
o Compression session resumption fixed.
|
||||||
|
o Ticket and SNI coexistence fixes.
|
||||||
|
o Many fixes to DTLS handling.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8k and OpenSSL 0.9.8l [5 Nov 2009]:
|
||||||
|
|
||||||
|
o Temporary work around for CVE-2009-3555: disable renegotiation.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8j and OpenSSL 0.9.8k [25 Mar 2009]:
|
||||||
|
|
||||||
|
o Fix various build issues.
|
||||||
|
o Fix security issues (CVE-2009-0590, CVE-2009-0591, CVE-2009-0789)
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8i and OpenSSL 0.9.8j [7 Jan 2009]:
|
||||||
|
|
||||||
|
o Fix security issue (CVE-2008-5077)
|
||||||
|
o Merge FIPS 140-2 branch code.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8g and OpenSSL 0.9.8h [28 May 2008]:
|
||||||
|
|
||||||
|
o CryptoAPI ENGINE support.
|
||||||
|
o Various precautionary measures.
|
||||||
|
o Fix for bugs affecting certificate request creation.
|
||||||
|
o Support for local machine keyset attribute in PKCS#12 files.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8f and OpenSSL 0.9.8g [19 Oct 2007]:
|
||||||
|
|
||||||
|
o Backport of CMS functionality to 0.9.8.
|
||||||
|
o Fixes for bugs introduced with 0.9.8f.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8e and OpenSSL 0.9.8f [11 Oct 2007]:
|
||||||
|
|
||||||
|
o Add gcc 4.2 support.
|
||||||
|
o Add support for AES and SSE2 assembly lanugauge optimization
|
||||||
|
for VC++ build.
|
||||||
|
o Support for RFC4507bis and server name extensions if explicitly
|
||||||
|
selected at compile time.
|
||||||
|
o DTLS improvements.
|
||||||
|
o RFC4507bis support.
|
||||||
|
o TLS Extensions support.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8d and OpenSSL 0.9.8e [23 Feb 2007]:
|
||||||
|
|
||||||
|
o Various ciphersuite selection fixes.
|
||||||
|
o RFC3779 support.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8c and OpenSSL 0.9.8d [28 Sep 2006]:
|
||||||
|
|
||||||
|
o Introduce limits to prevent malicious key DoS (CVE-2006-2940)
|
||||||
|
o Fix security issues (CVE-2006-2937, CVE-2006-3737, CVE-2006-4343)
|
||||||
|
o Changes to ciphersuite selection algorithm
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8b and OpenSSL 0.9.8c [5 Sep 2006]:
|
||||||
|
|
||||||
|
o Fix Daniel Bleichenbacher forged signature attack, CVE-2006-4339
|
||||||
|
o New cipher Camellia
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8a and OpenSSL 0.9.8b [4 May 2006]:
|
||||||
|
|
||||||
|
o Cipher string fixes.
|
||||||
|
o Fixes for VC++ 2005.
|
||||||
|
o Updated ECC cipher suite support.
|
||||||
|
o New functions EVP_CIPHER_CTX_new() and EVP_CIPHER_CTX_free().
|
||||||
|
o Zlib compression usage fixes.
|
||||||
|
o Built in dynamic engine compilation support on Win32.
|
||||||
|
o Fixes auto dynamic engine loading in Win32.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8 and OpenSSL 0.9.8a [11 Oct 2005]:
|
||||||
|
|
||||||
|
o Fix potential SSL 2.0 rollback, CVE-2005-2969
|
||||||
|
o Extended Windows CE support
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.7g and OpenSSL 0.9.8 [5 Jul 2005]:
|
||||||
|
|
||||||
|
o Major work on the BIGNUM library for higher efficiency and to
|
||||||
|
make operations more streamlined and less contradictory. This
|
||||||
|
is the result of a major audit of the BIGNUM library.
|
||||||
|
o Addition of BIGNUM functions for fields GF(2^m) and NIST
|
||||||
|
curves, to support the Elliptic Crypto functions.
|
||||||
|
o Major work on Elliptic Crypto; ECDH and ECDSA added, including
|
||||||
|
the use through EVP, X509 and ENGINE.
|
||||||
|
o New ASN.1 mini-compiler that's usable through the OpenSSL
|
||||||
|
configuration file.
|
||||||
|
o Added support for ASN.1 indefinite length constructed encoding.
|
||||||
|
o New PKCS#12 'medium level' API to manipulate PKCS#12 files.
|
||||||
|
o Complete rework of shared library construction and linking
|
||||||
|
programs with shared or static libraries, through a separate
|
||||||
|
Makefile.shared.
|
||||||
|
o Rework of the passing of parameters from one Makefile to another.
|
||||||
|
o Changed ENGINE framework to load dynamic engine modules
|
||||||
|
automatically from specifically given directories.
|
||||||
|
o New structure and ASN.1 functions for CertificatePair.
|
||||||
|
o Changed the ZLIB compression method to be stateful.
|
||||||
|
o Changed the key-generation and primality testing "progress"
|
||||||
|
mechanism to take a structure that contains the ticker
|
||||||
|
function and an argument.
|
||||||
|
o New engine module: GMP (performs private key exponentiation).
|
||||||
|
o New engine module: VIA PadLOck ACE extension in VIA C3
|
||||||
|
Nehemiah processors.
|
||||||
|
o Added support for IPv6 addresses in certificate extensions.
|
||||||
|
See RFC 1884, section 2.2.
|
||||||
|
o Added support for certificate policy mappings, policy
|
||||||
|
constraints and name constraints.
|
||||||
|
o Added support for multi-valued AVAs in the OpenSSL
|
||||||
|
configuration file.
|
||||||
|
o Added support for multiple certificates with the same subject
|
||||||
|
in the 'openssl ca' index file.
|
||||||
|
o Make it possible to create self-signed certificates using
|
||||||
|
'openssl ca -selfsign'.
|
||||||
|
o Make it possible to generate a serial number file with
|
||||||
|
'openssl ca -create_serial'.
|
||||||
|
o New binary search functions with extended functionality.
|
||||||
|
o New BUF functions.
|
||||||
|
o New STORE structure and library to provide an interface to all
|
||||||
|
sorts of data repositories. Supports storage of public and
|
||||||
|
private keys, certificates, CRLs, numbers and arbitrary blobs.
|
||||||
|
This library is unfortunately unfinished and unused withing
|
||||||
|
OpenSSL.
|
||||||
|
o New control functions for the error stack.
|
||||||
|
o Changed the PKCS#7 library to support one-pass S/MIME
|
||||||
|
processing.
|
||||||
|
o Added the possibility to compile without old deprecated
|
||||||
|
functionality with the OPENSSL_NO_DEPRECATED macro or the
|
||||||
|
'no-deprecated' argument to the config and Configure scripts.
|
||||||
|
o Constification of all ASN.1 conversion functions, and other
|
||||||
|
affected functions.
|
||||||
|
o Improved platform support for PowerPC.
|
||||||
|
o New FIPS 180-2 algorithms (SHA-224, -256, -384 and -512).
|
||||||
|
o New X509_VERIFY_PARAM structure to support parametrisation
|
||||||
|
of X.509 path validation.
|
||||||
|
o Major overhaul of RC4 performance on Intel P4, IA-64 and
|
||||||
|
AMD64.
|
||||||
|
o Changed the Configure script to have some algorithms disabled
|
||||||
|
by default. Those can be explicitely enabled with the new
|
||||||
|
argument form 'enable-xxx'.
|
||||||
|
o Change the default digest in 'openssl' commands from MD5 to
|
||||||
|
SHA-1.
|
||||||
|
o Added support for DTLS.
|
||||||
|
o New BIGNUM blinding.
|
||||||
|
o Added support for the RSA-PSS encryption scheme
|
||||||
|
o Added support for the RSA X.931 padding.
|
||||||
|
o Added support for BSD sockets on NetWare.
|
||||||
|
o Added support for files larger than 2GB.
|
||||||
|
o Added initial support for Win64.
|
||||||
|
o Added alternate pkg-config files.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.7l and OpenSSL 0.9.7m [23 Feb 2007]:
|
||||||
|
|
||||||
|
o FIPS 1.1.1 module linking.
|
||||||
|
o Various ciphersuite selection fixes.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.7k and OpenSSL 0.9.7l [28 Sep 2006]:
|
||||||
|
|
||||||
|
o Introduce limits to prevent malicious key DoS (CVE-2006-2940)
|
||||||
|
o Fix security issues (CVE-2006-2937, CVE-2006-3737, CVE-2006-4343)
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.7j and OpenSSL 0.9.7k [5 Sep 2006]:
|
||||||
|
|
||||||
|
o Fix Daniel Bleichenbacher forged signature attack, CVE-2006-4339
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.7i and OpenSSL 0.9.7j [4 May 2006]:
|
||||||
|
|
||||||
|
o Visual C++ 2005 fixes.
|
||||||
|
o Update Windows build system for FIPS.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.7h and OpenSSL 0.9.7i [14 Oct 2005]:
|
||||||
|
|
||||||
|
o Give EVP_MAX_MD_SIZE it's old value, except for a FIPS build.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.7g and OpenSSL 0.9.7h [11 Oct 2005]:
|
||||||
|
|
||||||
|
o Fix SSL 2.0 Rollback, CVE-2005-2969
|
||||||
|
o Allow use of fixed-length exponent on DSA signing
|
||||||
|
o Default fixed-window RSA, DSA, DH private-key operations
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.7f and OpenSSL 0.9.7g [11 Apr 2005]:
|
||||||
|
|
||||||
|
o More compilation issues fixed.
|
||||||
|
o Adaptation to more modern Kerberos API.
|
||||||
|
o Enhanced or corrected configuration for Solaris64, Mingw and Cygwin.
|
||||||
|
o Enhanced x86_64 assembler BIGNUM module.
|
||||||
|
o More constification.
|
||||||
|
o Added processing of proxy certificates (RFC 3820).
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.7e and OpenSSL 0.9.7f [22 Mar 2005]:
|
||||||
|
|
||||||
|
o Several compilation issues fixed.
|
||||||
|
o Many memory allocation failure checks added.
|
||||||
|
o Improved comparison of X509 Name type.
|
||||||
|
o Mandatory basic checks on certificates.
|
||||||
|
o Performance improvements.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.7d and OpenSSL 0.9.7e [25 Oct 2004]:
|
||||||
|
|
||||||
|
o Fix race condition in CRL checking code.
|
||||||
|
o Fixes to PKCS#7 (S/MIME) code.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.7c and OpenSSL 0.9.7d [17 Mar 2004]:
|
||||||
|
|
||||||
|
o Security: Fix Kerberos ciphersuite SSL/TLS handshaking bug
|
||||||
|
o Security: Fix null-pointer assignment in do_change_cipher_spec()
|
||||||
|
o Allow multiple active certificates with same subject in CA index
|
||||||
|
o Multiple X509 verification fixes
|
||||||
|
o Speed up HMAC and other operations
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.7b and OpenSSL 0.9.7c [30 Sep 2003]:
|
||||||
|
|
||||||
|
o Security: fix various ASN1 parsing bugs.
|
||||||
|
o New -ignore_err option to OCSP utility.
|
||||||
|
o Various interop and bug fixes in S/MIME code.
|
||||||
|
o SSL/TLS protocol fix for unrequested client certificates.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.7a and OpenSSL 0.9.7b [10 Apr 2003]:
|
||||||
|
|
||||||
|
o Security: counter the Klima-Pokorny-Rosa extension of
|
||||||
|
Bleichbacher's attack
|
||||||
|
o Security: make RSA blinding default.
|
||||||
|
o Configuration: Irix fixes, AIX fixes, better mingw support.
|
||||||
|
o Support for new platforms: linux-ia64-ecc.
|
||||||
|
o Build: shared library support fixes.
|
||||||
|
o ASN.1: treat domainComponent correctly.
|
||||||
|
o Documentation: fixes and additions.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.7 and OpenSSL 0.9.7a [19 Feb 2003]:
|
||||||
|
|
||||||
|
o Security: Important security related bugfixes.
|
||||||
|
o Enhanced compatibility with MIT Kerberos.
|
||||||
|
o Can be built without the ENGINE framework.
|
||||||
|
o IA32 assembler enhancements.
|
||||||
|
o Support for new platforms: FreeBSD/IA64 and FreeBSD/Sparc64.
|
||||||
|
o Configuration: the no-err option now works properly.
|
||||||
|
o SSL/TLS: now handles manual certificate chain building.
|
||||||
|
o SSL/TLS: certain session ID malfunctions corrected.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.6 and OpenSSL 0.9.7 [30 Dec 2002]:
|
||||||
|
|
||||||
o New library section OCSP.
|
o New library section OCSP.
|
||||||
o Complete rewrite of ASN1 code.
|
o Complete rewrite of ASN1 code.
|
||||||
@@ -18,11 +453,14 @@
|
|||||||
o New elliptic curve library section.
|
o New elliptic curve library section.
|
||||||
o New AES (Rijndael) library section.
|
o New AES (Rijndael) library section.
|
||||||
o Support for new platforms: Windows CE, Tandem OSS, A/UX, AIX 64-bit,
|
o Support for new platforms: Windows CE, Tandem OSS, A/UX, AIX 64-bit,
|
||||||
Linux x86_64
|
Linux x86_64, Linux 64-bit on Sparc v9
|
||||||
o Extended support for some platforms: VxWorks
|
o Extended support for some platforms: VxWorks
|
||||||
o Enhanced support for shared libraries.
|
o Enhanced support for shared libraries.
|
||||||
|
o Now only builds PIC code when shared library support is requested.
|
||||||
o Support for pkg-config.
|
o Support for pkg-config.
|
||||||
o Lots of new manuals.
|
o Lots of new manuals.
|
||||||
|
o Makes symbolic links to or copies of manuals to cover all described
|
||||||
|
functions.
|
||||||
o Change DES API to clean up the namespace (some applications link also
|
o Change DES API to clean up the namespace (some applications link also
|
||||||
against libdes providing similar functions having the same name).
|
against libdes providing similar functions having the same name).
|
||||||
Provide macros for backward compatibility (will be removed in the
|
Provide macros for backward compatibility (will be removed in the
|
||||||
@@ -48,7 +486,23 @@
|
|||||||
o SSL/TLS: add callback to retrieve SSL/TLS messages.
|
o SSL/TLS: add callback to retrieve SSL/TLS messages.
|
||||||
o SSL/TLS: support AES cipher suites (RFC3268).
|
o SSL/TLS: support AES cipher suites (RFC3268).
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.6g and OpenSSL 0.9.6h:
|
Major changes between OpenSSL 0.9.6j and OpenSSL 0.9.6k [30 Sep 2003]:
|
||||||
|
|
||||||
|
o Security: fix various ASN1 parsing bugs.
|
||||||
|
o SSL/TLS protocol fix for unrequested client certificates.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.6i and OpenSSL 0.9.6j [10 Apr 2003]:
|
||||||
|
|
||||||
|
o Security: counter the Klima-Pokorny-Rosa extension of
|
||||||
|
Bleichbacher's attack
|
||||||
|
o Security: make RSA blinding default.
|
||||||
|
o Build: shared library support fixes.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.6h and OpenSSL 0.9.6i [19 Feb 2003]:
|
||||||
|
|
||||||
|
o Important security related bugfixes.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.6g and OpenSSL 0.9.6h [5 Dec 2002]:
|
||||||
|
|
||||||
o New configuration targets for Tandem OSS and A/UX.
|
o New configuration targets for Tandem OSS and A/UX.
|
||||||
o New OIDs for Microsoft attributes.
|
o New OIDs for Microsoft attributes.
|
||||||
@@ -62,25 +516,25 @@
|
|||||||
o Fixes for smaller building problems.
|
o Fixes for smaller building problems.
|
||||||
o Updates of manuals, FAQ and other instructive documents.
|
o Updates of manuals, FAQ and other instructive documents.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.6f and OpenSSL 0.9.6g:
|
Major changes between OpenSSL 0.9.6f and OpenSSL 0.9.6g [9 Aug 2002]:
|
||||||
|
|
||||||
o Important building fixes on Unix.
|
o Important building fixes on Unix.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.6e and OpenSSL 0.9.6f:
|
Major changes between OpenSSL 0.9.6e and OpenSSL 0.9.6f [8 Aug 2002]:
|
||||||
|
|
||||||
o Various important bugfixes.
|
o Various important bugfixes.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.6d and OpenSSL 0.9.6e:
|
Major changes between OpenSSL 0.9.6d and OpenSSL 0.9.6e [30 Jul 2002]:
|
||||||
|
|
||||||
o Important security related bugfixes.
|
o Important security related bugfixes.
|
||||||
o Various SSL/TLS library bugfixes.
|
o Various SSL/TLS library bugfixes.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.6c and OpenSSL 0.9.6d:
|
Major changes between OpenSSL 0.9.6c and OpenSSL 0.9.6d [9 May 2002]:
|
||||||
|
|
||||||
o Various SSL/TLS library bugfixes.
|
o Various SSL/TLS library bugfixes.
|
||||||
o Fix DH parameter generation for 'non-standard' generators.
|
o Fix DH parameter generation for 'non-standard' generators.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.6b and OpenSSL 0.9.6c:
|
Major changes between OpenSSL 0.9.6b and OpenSSL 0.9.6c [21 Dec 2001]:
|
||||||
|
|
||||||
o Various SSL/TLS library bugfixes.
|
o Various SSL/TLS library bugfixes.
|
||||||
o BIGNUM library fixes.
|
o BIGNUM library fixes.
|
||||||
@@ -93,7 +547,7 @@
|
|||||||
Broadcom and Cryptographic Appliance's keyserver
|
Broadcom and Cryptographic Appliance's keyserver
|
||||||
[in 0.9.6c-engine release].
|
[in 0.9.6c-engine release].
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.6a and OpenSSL 0.9.6b:
|
Major changes between OpenSSL 0.9.6a and OpenSSL 0.9.6b [9 Jul 2001]:
|
||||||
|
|
||||||
o Security fix: PRNG improvements.
|
o Security fix: PRNG improvements.
|
||||||
o Security fix: RSA OAEP check.
|
o Security fix: RSA OAEP check.
|
||||||
@@ -110,7 +564,7 @@
|
|||||||
o Increase default size for BIO buffering filter.
|
o Increase default size for BIO buffering filter.
|
||||||
o Compatibility fixes in some scripts.
|
o Compatibility fixes in some scripts.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.6 and OpenSSL 0.9.6a:
|
Major changes between OpenSSL 0.9.6 and OpenSSL 0.9.6a [5 Apr 2001]:
|
||||||
|
|
||||||
o Security fix: change behavior of OpenSSL to avoid using
|
o Security fix: change behavior of OpenSSL to avoid using
|
||||||
environment variables when running as root.
|
environment variables when running as root.
|
||||||
@@ -135,7 +589,7 @@
|
|||||||
o New function BN_rand_range().
|
o New function BN_rand_range().
|
||||||
o Add "-rand" option to openssl s_client and s_server.
|
o Add "-rand" option to openssl s_client and s_server.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.5a and OpenSSL 0.9.6:
|
Major changes between OpenSSL 0.9.5a and OpenSSL 0.9.6 [10 Oct 2000]:
|
||||||
|
|
||||||
o Some documentation for BIO and SSL libraries.
|
o Some documentation for BIO and SSL libraries.
|
||||||
o Enhanced chain verification using key identifiers.
|
o Enhanced chain verification using key identifiers.
|
||||||
@@ -150,7 +604,7 @@
|
|||||||
[1] The support for external crypto devices is currently a separate
|
[1] The support for external crypto devices is currently a separate
|
||||||
distribution. See the file README.ENGINE.
|
distribution. See the file README.ENGINE.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.5 and OpenSSL 0.9.5a:
|
Major changes between OpenSSL 0.9.5 and OpenSSL 0.9.5a [1 Apr 2000]:
|
||||||
|
|
||||||
o Bug fixes for Win32, SuSE Linux, NeXTSTEP and FreeBSD 2.2.8
|
o Bug fixes for Win32, SuSE Linux, NeXTSTEP and FreeBSD 2.2.8
|
||||||
o Shared library support for HPUX and Solaris-gcc
|
o Shared library support for HPUX and Solaris-gcc
|
||||||
@@ -159,7 +613,7 @@
|
|||||||
o New 'rand' application
|
o New 'rand' application
|
||||||
o New way to check for existence of algorithms from scripts
|
o New way to check for existence of algorithms from scripts
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.4 and OpenSSL 0.9.5:
|
Major changes between OpenSSL 0.9.4 and OpenSSL 0.9.5 [25 May 2000]:
|
||||||
|
|
||||||
o S/MIME support in new 'smime' command
|
o S/MIME support in new 'smime' command
|
||||||
o Documentation for the OpenSSL command line application
|
o Documentation for the OpenSSL command line application
|
||||||
@@ -195,7 +649,7 @@
|
|||||||
o Enhanced support for Alpha Linux
|
o Enhanced support for Alpha Linux
|
||||||
o Experimental MacOS support
|
o Experimental MacOS support
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.3 and OpenSSL 0.9.4:
|
Major changes between OpenSSL 0.9.3 and OpenSSL 0.9.4 [9 Aug 1999]:
|
||||||
|
|
||||||
o Transparent support for PKCS#8 format private keys: these are used
|
o Transparent support for PKCS#8 format private keys: these are used
|
||||||
by several software packages and are more secure than the standard
|
by several software packages and are more secure than the standard
|
||||||
@@ -206,7 +660,7 @@
|
|||||||
o New pipe-like BIO that allows using the SSL library when actual I/O
|
o New pipe-like BIO that allows using the SSL library when actual I/O
|
||||||
must be handled by the application (BIO pair)
|
must be handled by the application (BIO pair)
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.2b and OpenSSL 0.9.3:
|
Major changes between OpenSSL 0.9.2b and OpenSSL 0.9.3 [24 May 1999]:
|
||||||
o Lots of enhancements and cleanups to the Configuration mechanism
|
o Lots of enhancements and cleanups to the Configuration mechanism
|
||||||
o RSA OEAP related fixes
|
o RSA OEAP related fixes
|
||||||
o Added `openssl ca -revoke' option for revoking a certificate
|
o Added `openssl ca -revoke' option for revoking a certificate
|
||||||
@@ -220,7 +674,7 @@
|
|||||||
o Sparc assembler bignum implementation, optimized hash functions
|
o Sparc assembler bignum implementation, optimized hash functions
|
||||||
o Option to disable selected ciphers
|
o Option to disable selected ciphers
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.1c and OpenSSL 0.9.2b:
|
Major changes between OpenSSL 0.9.1c and OpenSSL 0.9.2b [22 Mar 1999]:
|
||||||
o Fixed a security hole related to session resumption
|
o Fixed a security hole related to session resumption
|
||||||
o Fixed RSA encryption routines for the p < q case
|
o Fixed RSA encryption routines for the p < q case
|
||||||
o "ALL" in cipher lists now means "everything except NULL ciphers"
|
o "ALL" in cipher lists now means "everything except NULL ciphers"
|
||||||
@@ -242,7 +696,7 @@
|
|||||||
o Lots of memory leak fixes.
|
o Lots of memory leak fixes.
|
||||||
o Lots of bug fixes.
|
o Lots of bug fixes.
|
||||||
|
|
||||||
Major changes between SSLeay 0.9.0b and OpenSSL 0.9.1c:
|
Major changes between SSLeay 0.9.0b and OpenSSL 0.9.1c [23 Dec 1998]:
|
||||||
o Integration of the popular NO_RSA/NO_DSA patches
|
o Integration of the popular NO_RSA/NO_DSA patches
|
||||||
o Initial support for compression inside the SSL record layer
|
o Initial support for compression inside the SSL record layer
|
||||||
o Added BIO proxy and filtering functionality
|
o Added BIO proxy and filtering functionality
|
||||||
|
|||||||
235
Netware/build.bat
Normal file
235
Netware/build.bat
Normal file
@@ -0,0 +1,235 @@
|
|||||||
|
@echo off
|
||||||
|
|
||||||
|
rem ========================================================================
|
||||||
|
rem Batch file to automate building OpenSSL for NetWare.
|
||||||
|
rem
|
||||||
|
rem usage:
|
||||||
|
rem build [target] [debug opts] [assembly opts] [configure opts]
|
||||||
|
rem
|
||||||
|
rem target - "netware-clib" - CLib NetWare build (WinSock Sockets)
|
||||||
|
rem - "netware-clib-bsdsock" - CLib NetWare build (BSD Sockets)
|
||||||
|
rem - "netware-libc" - LibC NetWare build (WinSock Sockets)
|
||||||
|
rem - "netware-libc-bsdsock" - LibC NetWare build (BSD Sockets)
|
||||||
|
rem
|
||||||
|
rem debug opts - "debug" - build debug
|
||||||
|
rem
|
||||||
|
rem assembly opts - "nw-mwasm" - use Metrowerks assembler
|
||||||
|
rem - "nw-nasm" - use NASM assembler
|
||||||
|
rem - "no-asm" - don't use assembly
|
||||||
|
rem
|
||||||
|
rem configure opts- all unrecognized arguments are passed to the
|
||||||
|
rem perl configure script
|
||||||
|
rem
|
||||||
|
rem If no arguments are specified the default is to build non-debug with
|
||||||
|
rem no assembly. NOTE: there is no default BLD_TARGET.
|
||||||
|
rem
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
rem No assembly is the default - Uncomment section below to change
|
||||||
|
rem the assembler default
|
||||||
|
set ASM_MODE=
|
||||||
|
set ASSEMBLER=
|
||||||
|
set NO_ASM=no-asm
|
||||||
|
|
||||||
|
rem Uncomment to default to the Metrowerks assembler
|
||||||
|
rem set ASM_MODE=nw-mwasm
|
||||||
|
rem set ASSEMBLER=Metrowerks
|
||||||
|
rem set NO_ASM=
|
||||||
|
|
||||||
|
rem Uncomment to default to the NASM assembler
|
||||||
|
rem set ASM_MODE=nw-nasm
|
||||||
|
rem set ASSEMBLER=NASM
|
||||||
|
rem set NO_ASM=
|
||||||
|
|
||||||
|
rem No default Bld target
|
||||||
|
set BLD_TARGET=no_target
|
||||||
|
rem set BLD_TARGET=netware-clib
|
||||||
|
rem set BLD_TARGET=netware-libc
|
||||||
|
|
||||||
|
|
||||||
|
rem Default to build non-debug
|
||||||
|
set DEBUG=
|
||||||
|
|
||||||
|
rem Uncomment to default to debug build
|
||||||
|
rem set DEBUG=debug
|
||||||
|
|
||||||
|
|
||||||
|
set CONFIG_OPTS=
|
||||||
|
set ARG_PROCESSED=NO
|
||||||
|
|
||||||
|
|
||||||
|
rem Process command line args
|
||||||
|
:opts
|
||||||
|
if "a%1" == "a" goto endopt
|
||||||
|
if "%1" == "no-asm" set NO_ASM=no-asm
|
||||||
|
if "%1" == "no-asm" set ARG_PROCESSED=YES
|
||||||
|
if "%1" == "debug" set DEBUG=debug
|
||||||
|
if "%1" == "debug" set ARG_PROCESSED=YES
|
||||||
|
if "%1" == "nw-nasm" set ASM_MODE=nw-nasm
|
||||||
|
if "%1" == "nw-nasm" set ASSEMBLER=NASM
|
||||||
|
if "%1" == "nw-nasm" set NO_ASM=
|
||||||
|
if "%1" == "nw-nasm" set ARG_PROCESSED=YES
|
||||||
|
if "%1" == "nw-mwasm" set ASM_MODE=nw-mwasm
|
||||||
|
if "%1" == "nw-mwasm" set ASSEMBLER=Metrowerks
|
||||||
|
if "%1" == "nw-mwasm" set NO_ASM=
|
||||||
|
if "%1" == "nw-mwasm" set ARG_PROCESSED=YES
|
||||||
|
if "%1" == "netware-clib" set BLD_TARGET=netware-clib
|
||||||
|
if "%1" == "netware-clib" set ARG_PROCESSED=YES
|
||||||
|
if "%1" == "netware-clib-bsdsock" set BLD_TARGET=netware-clib-bsdsock
|
||||||
|
if "%1" == "netware-clib-bsdsock" set ARG_PROCESSED=YES
|
||||||
|
if "%1" == "netware-libc" set BLD_TARGET=netware-libc
|
||||||
|
if "%1" == "netware-libc" set ARG_PROCESSED=YES
|
||||||
|
if "%1" == "netware-libc-bsdsock" set BLD_TARGET=netware-libc-bsdsock
|
||||||
|
if "%1" == "netware-libc-bsdsock" set ARG_PROCESSED=YES
|
||||||
|
|
||||||
|
rem If we didn't recognize the argument, consider it an option for config
|
||||||
|
if "%ARG_PROCESSED%" == "NO" set CONFIG_OPTS=%CONFIG_OPTS% %1
|
||||||
|
if "%ARG_PROCESSED%" == "YES" set ARG_PROCESSED=NO
|
||||||
|
|
||||||
|
shift
|
||||||
|
goto opts
|
||||||
|
:endopt
|
||||||
|
|
||||||
|
rem make sure a valid BLD_TARGET was specified
|
||||||
|
if "%BLD_TARGET%" == "no_target" goto no_target
|
||||||
|
|
||||||
|
rem build the nlm make file name which includes target and debug info
|
||||||
|
set NLM_MAKE=
|
||||||
|
if "%BLD_TARGET%" == "netware-clib" set NLM_MAKE=netware\nlm_clib
|
||||||
|
if "%BLD_TARGET%" == "netware-clib-bsdsock" set NLM_MAKE=netware\nlm_clib_bsdsock
|
||||||
|
if "%BLD_TARGET%" == "netware-libc" set NLM_MAKE=netware\nlm_libc
|
||||||
|
if "%BLD_TARGET%" == "netware-libc-bsdsock" set NLM_MAKE=netware\nlm_libc_bsdsock
|
||||||
|
if "%DEBUG%" == "" set NLM_MAKE=%NLM_MAKE%.mak
|
||||||
|
if "%DEBUG%" == "debug" set NLM_MAKE=%NLM_MAKE%_dbg.mak
|
||||||
|
|
||||||
|
if "%NO_ASM%" == "no-asm" set ASM_MODE=
|
||||||
|
if "%NO_ASM%" == "no-asm" set ASSEMBLER=
|
||||||
|
if "%NO_ASM%" == "no-asm" set CONFIG_OPTS=%CONFIG_OPTS% no-asm
|
||||||
|
if "%NO_ASM%" == "no-asm" goto do_config
|
||||||
|
|
||||||
|
|
||||||
|
rem ==================================================
|
||||||
|
echo Generating x86 for %ASSEMBLER% assembler
|
||||||
|
|
||||||
|
echo Bignum
|
||||||
|
cd crypto\bn\asm
|
||||||
|
rem perl x86.pl %ASM_MODE% > bn-nw.asm
|
||||||
|
perl bn-586.pl %ASM_MODE% > bn-nw.asm
|
||||||
|
perl co-586.pl %ASM_MODE% > co-nw.asm
|
||||||
|
cd ..\..\..
|
||||||
|
|
||||||
|
echo AES
|
||||||
|
cd crypto\aes\asm
|
||||||
|
perl aes-586.pl %ASM_MODE% > a-nw.asm
|
||||||
|
cd ..\..\..
|
||||||
|
|
||||||
|
echo DES
|
||||||
|
cd crypto\des\asm
|
||||||
|
perl des-586.pl %ASM_MODE% > d-nw.asm
|
||||||
|
cd ..\..\..
|
||||||
|
|
||||||
|
echo "crypt(3)"
|
||||||
|
|
||||||
|
cd crypto\des\asm
|
||||||
|
perl crypt586.pl %ASM_MODE% > y-nw.asm
|
||||||
|
cd ..\..\..
|
||||||
|
|
||||||
|
echo Blowfish
|
||||||
|
|
||||||
|
cd crypto\bf\asm
|
||||||
|
perl bf-586.pl %ASM_MODE% > b-nw.asm
|
||||||
|
cd ..\..\..
|
||||||
|
|
||||||
|
echo CAST5
|
||||||
|
cd crypto\cast\asm
|
||||||
|
perl cast-586.pl %ASM_MODE% > c-nw.asm
|
||||||
|
cd ..\..\..
|
||||||
|
|
||||||
|
echo RC4
|
||||||
|
cd crypto\rc4\asm
|
||||||
|
perl rc4-586.pl %ASM_MODE% > r4-nw.asm
|
||||||
|
cd ..\..\..
|
||||||
|
|
||||||
|
echo MD5
|
||||||
|
cd crypto\md5\asm
|
||||||
|
perl md5-586.pl %ASM_MODE% > m5-nw.asm
|
||||||
|
cd ..\..\..
|
||||||
|
|
||||||
|
echo SHA1
|
||||||
|
cd crypto\sha\asm
|
||||||
|
perl sha1-586.pl %ASM_MODE% > s1-nw.asm
|
||||||
|
perl sha256-586.pl %ASM_MODE% > sha256-nw.asm
|
||||||
|
perl sha512-586.pl %ASM_MODE% > sha512-nw.asm
|
||||||
|
cd ..\..\..
|
||||||
|
|
||||||
|
echo RIPEMD160
|
||||||
|
cd crypto\ripemd\asm
|
||||||
|
perl rmd-586.pl %ASM_MODE% > rm-nw.asm
|
||||||
|
cd ..\..\..
|
||||||
|
|
||||||
|
echo RC5\32
|
||||||
|
cd crypto\rc5\asm
|
||||||
|
perl rc5-586.pl %ASM_MODE% > r5-nw.asm
|
||||||
|
cd ..\..\..
|
||||||
|
|
||||||
|
echo WHIRLPOOL
|
||||||
|
cd crypto\whrlpool\asm
|
||||||
|
perl wp-mmx.pl %ASM_MODE% > wp-nw.asm
|
||||||
|
cd ..\..\..
|
||||||
|
|
||||||
|
echo CPUID
|
||||||
|
cd crypto
|
||||||
|
perl x86cpuid.pl %ASM_MODE% > x86cpuid-nw.asm
|
||||||
|
cd ..\
|
||||||
|
|
||||||
|
rem ===============================================================
|
||||||
|
rem
|
||||||
|
:do_config
|
||||||
|
|
||||||
|
echo .
|
||||||
|
echo configure options: %CONFIG_OPTS% %BLD_TARGET%
|
||||||
|
echo .
|
||||||
|
perl configure %CONFIG_OPTS% %BLD_TARGET%
|
||||||
|
|
||||||
|
perl util\mkfiles.pl >MINFO
|
||||||
|
|
||||||
|
echo .
|
||||||
|
echo mk1mf.pl options: %DEBUG% %ASM_MODE% %CONFIG_OPTS% %BLD_TARGET%
|
||||||
|
echo .
|
||||||
|
perl util\mk1mf.pl %DEBUG% %ASM_MODE% %CONFIG_OPTS% %BLD_TARGET% >%NLM_MAKE%
|
||||||
|
|
||||||
|
make -f %NLM_MAKE% vclean
|
||||||
|
echo .
|
||||||
|
echo The makefile "%NLM_MAKE%" has been created use your maketool to
|
||||||
|
echo build (ex: make -f %NLM_MAKE%)
|
||||||
|
goto end
|
||||||
|
|
||||||
|
rem ===============================================================
|
||||||
|
rem
|
||||||
|
:no_target
|
||||||
|
echo .
|
||||||
|
echo . No build target specified!!!
|
||||||
|
echo .
|
||||||
|
echo . usage: build [target] [debug opts] [assembly opts] [configure opts]
|
||||||
|
echo .
|
||||||
|
echo . target - "netware-clib" - CLib NetWare build (WinSock Sockets)
|
||||||
|
echo . - "netware-clib-bsdsock" - CLib NetWare build (BSD Sockets)
|
||||||
|
echo . - "netware-libc" - LibC NetWare build (WinSock Sockets)
|
||||||
|
echo . - "netware-libc-bsdsock" - LibC NetWare build (BSD Sockets)
|
||||||
|
echo .
|
||||||
|
echo . debug opts - "debug" - build debug
|
||||||
|
echo .
|
||||||
|
echo . assembly opts - "nw-mwasm" - use Metrowerks assembler
|
||||||
|
echo . "nw-nasm" - use NASM assembler
|
||||||
|
echo . "no-asm" - don't use assembly
|
||||||
|
echo .
|
||||||
|
echo . configure opts- all unrecognized arguments are passed to the
|
||||||
|
echo . perl configure script
|
||||||
|
echo .
|
||||||
|
echo . If no debug or assembly opts are specified the default is to build
|
||||||
|
echo . non-debug without assembly
|
||||||
|
echo .
|
||||||
|
|
||||||
|
|
||||||
|
:end
|
||||||
113
Netware/cpy_tests.bat
Normal file
113
Netware/cpy_tests.bat
Normal file
@@ -0,0 +1,113 @@
|
|||||||
|
@echo off
|
||||||
|
|
||||||
|
rem Batch file to copy OpenSSL stuff to a NetWare server for testing
|
||||||
|
|
||||||
|
rem This batch file will create an "opensssl" directory at the root of the
|
||||||
|
rem specified NetWare drive and copy the required files to run the tests.
|
||||||
|
rem It should be run from inside the "openssl\netware" subdirectory.
|
||||||
|
|
||||||
|
rem Usage:
|
||||||
|
rem cpy_tests.bat <test subdirectory> <NetWare drive>
|
||||||
|
rem <test subdirectory> - out_nw.dbg | out_nw
|
||||||
|
rem <NetWare drive> - any mapped drive letter
|
||||||
|
rem
|
||||||
|
rem example ( copy from debug build to m: dirve ):
|
||||||
|
rem cpy_tests.bat out_nw.dbg m:
|
||||||
|
rem
|
||||||
|
rem CAUTION: If a directory named OpenSSL exists on the target drive
|
||||||
|
rem it will be deleted first.
|
||||||
|
|
||||||
|
|
||||||
|
if "%1" == "" goto usage
|
||||||
|
if "%2" == "" goto usage
|
||||||
|
|
||||||
|
rem Assume running in \openssl directory unless cpy_tests.bat exists then
|
||||||
|
rem it must be the \openssl\netware directory
|
||||||
|
set loc=.
|
||||||
|
if exist cpy_tests.bat set loc=..
|
||||||
|
|
||||||
|
rem make sure the local build subdirectory specified is valid
|
||||||
|
if not exist %loc%\%1\NUL goto invalid_dir
|
||||||
|
|
||||||
|
rem make sure target drive is valid
|
||||||
|
if not exist %2\NUL goto invalid_drive
|
||||||
|
|
||||||
|
rem If an OpenSSL directory exists on the target drive, remove it
|
||||||
|
if exist %2\openssl\NUL goto remove_openssl
|
||||||
|
goto do_copy
|
||||||
|
|
||||||
|
:remove_openssl
|
||||||
|
echo .
|
||||||
|
echo OpenSSL directory exists on %2 - it will be removed!
|
||||||
|
pause
|
||||||
|
rmdir %2\openssl /s /q
|
||||||
|
|
||||||
|
:do_copy
|
||||||
|
rem make an "openssl" directory and others at the root of the NetWare drive
|
||||||
|
mkdir %2\openssl
|
||||||
|
mkdir %2\openssl\test_out
|
||||||
|
mkdir %2\openssl\apps
|
||||||
|
mkdir %2\openssl\certs
|
||||||
|
mkdir %2\openssl\test
|
||||||
|
|
||||||
|
|
||||||
|
rem copy the test nlms
|
||||||
|
copy %loc%\%1\*.nlm %2\openssl\
|
||||||
|
|
||||||
|
rem copy the test perl script
|
||||||
|
copy %loc%\netware\do_tests.pl %2\openssl\
|
||||||
|
|
||||||
|
rem copy the certs directory stuff
|
||||||
|
xcopy %loc%\certs\*.* %2\openssl\certs\ /s
|
||||||
|
|
||||||
|
rem copy the test directory stuff
|
||||||
|
copy %loc%\test\CAss.cnf %2\openssl\test\
|
||||||
|
copy %loc%\test\Uss.cnf %2\openssl\test\
|
||||||
|
copy %loc%\test\pkcs7.pem %2\openssl\test\
|
||||||
|
copy %loc%\test\pkcs7-1.pem %2\openssl\test\
|
||||||
|
copy %loc%\test\testcrl.pem %2\openssl\test\
|
||||||
|
copy %loc%\test\testp7.pem %2\openssl\test\
|
||||||
|
copy %loc%\test\testreq2.pem %2\openssl\test\
|
||||||
|
copy %loc%\test\testrsa.pem %2\openssl\test\
|
||||||
|
copy %loc%\test\testsid.pem %2\openssl\test\
|
||||||
|
copy %loc%\test\testx509.pem %2\openssl\test\
|
||||||
|
copy %loc%\test\v3-cert1.pem %2\openssl\test\
|
||||||
|
copy %loc%\test\v3-cert2.pem %2\openssl\test\
|
||||||
|
copy %loc%\crypto\evp\evptests.txt %2\openssl\test\
|
||||||
|
|
||||||
|
rem copy the apps directory stuff
|
||||||
|
copy %loc%\apps\client.pem %2\openssl\apps\
|
||||||
|
copy %loc%\apps\server.pem %2\openssl\apps\
|
||||||
|
copy %loc%\apps\openssl.cnf %2\openssl\apps\
|
||||||
|
|
||||||
|
echo .
|
||||||
|
echo Tests copied
|
||||||
|
echo Run the test script at the console by typing:
|
||||||
|
echo "Perl \openssl\do_tests.pl"
|
||||||
|
echo .
|
||||||
|
echo Make sure the Search path includes the OpenSSL subdirectory
|
||||||
|
|
||||||
|
goto end
|
||||||
|
|
||||||
|
:invalid_dir
|
||||||
|
echo.
|
||||||
|
echo Invalid build directory specified: %1
|
||||||
|
echo.
|
||||||
|
goto usage
|
||||||
|
|
||||||
|
:invalid_drive
|
||||||
|
echo.
|
||||||
|
echo Invalid drive: %2
|
||||||
|
echo.
|
||||||
|
goto usage
|
||||||
|
|
||||||
|
:usage
|
||||||
|
echo.
|
||||||
|
echo usage: cpy_tests.bat [test subdirectory] [NetWare drive]
|
||||||
|
echo [test subdirectory] - out_nw_clib.dbg, out_nw_libc.dbg, etc.
|
||||||
|
echo [NetWare drive] - any mapped drive letter
|
||||||
|
echo.
|
||||||
|
echo example: cpy_test out_nw_clib.dbg M:
|
||||||
|
echo (copy from clib debug build area to M: drive)
|
||||||
|
|
||||||
|
:end
|
||||||
624
Netware/do_tests.pl
Normal file
624
Netware/do_tests.pl
Normal file
@@ -0,0 +1,624 @@
|
|||||||
|
# perl script to run OpenSSL tests
|
||||||
|
|
||||||
|
|
||||||
|
my $base_path = "\\openssl";
|
||||||
|
|
||||||
|
my $output_path = "$base_path\\test_out";
|
||||||
|
my $cert_path = "$base_path\\certs";
|
||||||
|
my $test_path = "$base_path\\test";
|
||||||
|
my $app_path = "$base_path\\apps";
|
||||||
|
|
||||||
|
my $tmp_cert = "$output_path\\cert.tmp";
|
||||||
|
my $OpenSSL_config = "$app_path\\openssl.cnf";
|
||||||
|
my $log_file = "$output_path\\tests.log";
|
||||||
|
|
||||||
|
my $pause = 0;
|
||||||
|
|
||||||
|
|
||||||
|
# process the command line args to see if they wanted us to pause
|
||||||
|
# between executing each command
|
||||||
|
foreach $i (@ARGV)
|
||||||
|
{
|
||||||
|
if ($i =~ /^-p$/)
|
||||||
|
{ $pause=1; }
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
main();
|
||||||
|
|
||||||
|
|
||||||
|
############################################################################
|
||||||
|
sub main()
|
||||||
|
{
|
||||||
|
# delete all the output files in the output directory
|
||||||
|
unlink <$output_path\\*.*>;
|
||||||
|
|
||||||
|
# open the main log file
|
||||||
|
open(OUT, ">$log_file") || die "unable to open $log_file\n";
|
||||||
|
|
||||||
|
print( OUT "========================================================\n");
|
||||||
|
my $outFile = "$output_path\\version.out";
|
||||||
|
system("openssl2 version (CLIB_OPT)/>$outFile");
|
||||||
|
log_output("CHECKING FOR OPENSSL VERSION:", $outFile);
|
||||||
|
|
||||||
|
algorithm_tests();
|
||||||
|
encryption_tests();
|
||||||
|
evp_tests();
|
||||||
|
pem_tests();
|
||||||
|
verify_tests();
|
||||||
|
ca_tests();
|
||||||
|
ssl_tests();
|
||||||
|
|
||||||
|
close(OUT);
|
||||||
|
|
||||||
|
print("\nCompleted running tests.\n\n");
|
||||||
|
print("Check log file for errors: $log_file\n");
|
||||||
|
}
|
||||||
|
|
||||||
|
############################################################################
|
||||||
|
sub algorithm_tests
|
||||||
|
{
|
||||||
|
my $i;
|
||||||
|
my $outFile;
|
||||||
|
my @tests = ( rsa_test, destest, ideatest, bftest, bntest, shatest, sha1test,
|
||||||
|
sha256t, sha512t, dsatest, md2test, md4test, md5test, mdc2test,
|
||||||
|
rc2test, rc4test, rc5test, randtest, rmdtest, dhtest, ecdhtest,
|
||||||
|
ecdsatest, ectest, exptest, casttest, hmactest );
|
||||||
|
|
||||||
|
print( "\nRUNNING CRYPTO ALGORITHM TESTS:\n\n");
|
||||||
|
|
||||||
|
print( OUT "\n========================================================\n");
|
||||||
|
print( OUT "CRYPTO ALGORITHM TESTS:\n\n");
|
||||||
|
|
||||||
|
foreach $i (@tests)
|
||||||
|
{
|
||||||
|
if (-e "$base_path\\$i.nlm")
|
||||||
|
{
|
||||||
|
$outFile = "$output_path\\$i.out";
|
||||||
|
system("$i (CLIB_OPT)/>$outFile");
|
||||||
|
log_desc("Test: $i\.nlm:");
|
||||||
|
log_output("", $outFile );
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
log_desc("Test: $i\.nlm: file not found");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
############################################################################
|
||||||
|
sub encryption_tests
|
||||||
|
{
|
||||||
|
my $i;
|
||||||
|
my $outFile;
|
||||||
|
my @enc_tests = ( "enc", "rc4", "des-cfb", "des-ede-cfb", "des-ede3-cfb",
|
||||||
|
"des-ofb", "des-ede-ofb", "des-ede3-ofb",
|
||||||
|
"des-ecb", "des-ede", "des-ede3", "des-cbc",
|
||||||
|
"des-ede-cbc", "des-ede3-cbc", "idea-ecb", "idea-cfb",
|
||||||
|
"idea-ofb", "idea-cbc", "rc2-ecb", "rc2-cfb",
|
||||||
|
"rc2-ofb", "rc2-cbc", "bf-ecb", "bf-cfb",
|
||||||
|
"bf-ofb", "bf-cbc" );
|
||||||
|
|
||||||
|
my $input = "$base_path\\do_tests.pl";
|
||||||
|
my $cipher = "$output_path\\cipher.out";
|
||||||
|
my $clear = "$output_path\\clear.out";
|
||||||
|
|
||||||
|
print( "\nRUNNING ENCRYPTION & DECRYPTION TESTS:\n\n");
|
||||||
|
|
||||||
|
print( OUT "\n========================================================\n");
|
||||||
|
print( OUT "FILE ENCRYPTION & DECRYPTION TESTS:\n\n");
|
||||||
|
|
||||||
|
foreach $i (@enc_tests)
|
||||||
|
{
|
||||||
|
log_desc("Testing: $i");
|
||||||
|
|
||||||
|
# do encryption
|
||||||
|
$outFile = "$output_path\\enc.out";
|
||||||
|
system("openssl2 $i -e -bufsize 113 -k test -in $input -out $cipher (CLIB_OPT)/>$outFile" );
|
||||||
|
log_output("Encrypting: $input --> $cipher", $outFile);
|
||||||
|
|
||||||
|
# do decryption
|
||||||
|
$outFile = "$output_path\\dec.out";
|
||||||
|
system("openssl2 $i -d -bufsize 157 -k test -in $cipher -out $clear (CLIB_OPT)/>$outFile");
|
||||||
|
log_output("Decrypting: $cipher --> $clear", $outFile);
|
||||||
|
|
||||||
|
# compare files
|
||||||
|
$x = compare_files( $input, $clear, 1);
|
||||||
|
if ( $x == 0 )
|
||||||
|
{
|
||||||
|
print( "\rSUCCESS - files match: $input, $clear\n");
|
||||||
|
print( OUT "SUCCESS - files match: $input, $clear\n");
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
print( "\rERROR: files don't match\n");
|
||||||
|
print( OUT "ERROR: files don't match\n");
|
||||||
|
}
|
||||||
|
|
||||||
|
do_wait();
|
||||||
|
|
||||||
|
# Now do the same encryption but use Base64
|
||||||
|
|
||||||
|
# do encryption B64
|
||||||
|
$outFile = "$output_path\\B64enc.out";
|
||||||
|
system("openssl2 $i -a -e -bufsize 113 -k test -in $input -out $cipher (CLIB_OPT)/>$outFile");
|
||||||
|
log_output("Encrypting(B64): $cipher --> $clear", $outFile);
|
||||||
|
|
||||||
|
# do decryption B64
|
||||||
|
$outFile = "$output_path\\B64dec.out";
|
||||||
|
system("openssl2 $i -a -d -bufsize 157 -k test -in $cipher -out $clear (CLIB_OPT)/>$outFile");
|
||||||
|
log_output("Decrypting(B64): $cipher --> $clear", $outFile);
|
||||||
|
|
||||||
|
# compare files
|
||||||
|
$x = compare_files( $input, $clear, 1);
|
||||||
|
if ( $x == 0 )
|
||||||
|
{
|
||||||
|
print( "\rSUCCESS - files match: $input, $clear\n");
|
||||||
|
print( OUT "SUCCESS - files match: $input, $clear\n");
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
print( "\rERROR: files don't match\n");
|
||||||
|
print( OUT "ERROR: files don't match\n");
|
||||||
|
}
|
||||||
|
|
||||||
|
do_wait();
|
||||||
|
|
||||||
|
} # end foreach
|
||||||
|
|
||||||
|
# delete the temporary files
|
||||||
|
unlink($cipher);
|
||||||
|
unlink($clear);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
############################################################################
|
||||||
|
sub pem_tests
|
||||||
|
{
|
||||||
|
my $i;
|
||||||
|
my $tmp_out;
|
||||||
|
my $outFile = "$output_path\\pem.out";
|
||||||
|
|
||||||
|
my %pem_tests = (
|
||||||
|
"crl" => "testcrl.pem",
|
||||||
|
"pkcs7" => "testp7.pem",
|
||||||
|
"req" => "testreq2.pem",
|
||||||
|
"rsa" => "testrsa.pem",
|
||||||
|
"x509" => "testx509.pem",
|
||||||
|
"x509" => "v3-cert1.pem",
|
||||||
|
"sess_id" => "testsid.pem" );
|
||||||
|
|
||||||
|
|
||||||
|
print( "\nRUNNING PEM TESTS:\n\n");
|
||||||
|
|
||||||
|
print( OUT "\n========================================================\n");
|
||||||
|
print( OUT "PEM TESTS:\n\n");
|
||||||
|
|
||||||
|
foreach $i (keys(%pem_tests))
|
||||||
|
{
|
||||||
|
log_desc( "Testing: $i");
|
||||||
|
|
||||||
|
my $input = "$test_path\\$pem_tests{$i}";
|
||||||
|
|
||||||
|
$tmp_out = "$output_path\\$pem_tests{$i}";
|
||||||
|
|
||||||
|
if ($i ne "req" )
|
||||||
|
{
|
||||||
|
system("openssl2 $i -in $input -out $tmp_out (CLIB_OPT)/>$outFile");
|
||||||
|
log_output( "openssl2 $i -in $input -out $tmp_out", $outFile);
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
system("openssl2 $i -in $input -out $tmp_out -config $OpenSSL_config (CLIB_OPT)/>$outFile");
|
||||||
|
log_output( "openssl2 $i -in $input -out $tmp_out -config $OpenSSL_config", $outFile );
|
||||||
|
}
|
||||||
|
|
||||||
|
$x = compare_files( $input, $tmp_out);
|
||||||
|
if ( $x == 0 )
|
||||||
|
{
|
||||||
|
print( "\rSUCCESS - files match: $input, $tmp_out\n");
|
||||||
|
print( OUT "SUCCESS - files match: $input, $tmp_out\n");
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
print( "\rERROR: files don't match\n");
|
||||||
|
print( OUT "ERROR: files don't match\n");
|
||||||
|
}
|
||||||
|
do_wait();
|
||||||
|
|
||||||
|
} # end foreach
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
############################################################################
|
||||||
|
sub verify_tests
|
||||||
|
{
|
||||||
|
my $i;
|
||||||
|
my $outFile = "$output_path\\verify.out";
|
||||||
|
|
||||||
|
$cert_path =~ s/\\/\//g;
|
||||||
|
my @cert_files = <$cert_path/*.pem>;
|
||||||
|
|
||||||
|
print( "\nRUNNING VERIFY TESTS:\n\n");
|
||||||
|
|
||||||
|
print( OUT "\n========================================================\n");
|
||||||
|
print( OUT "VERIFY TESTS:\n\n");
|
||||||
|
|
||||||
|
make_tmp_cert_file();
|
||||||
|
|
||||||
|
foreach $i (@cert_files)
|
||||||
|
{
|
||||||
|
system("openssl2 verify -CAfile $tmp_cert $i (CLIB_OPT)/>$outFile");
|
||||||
|
log_desc("Verifying cert: $i");
|
||||||
|
log_output("openssl2 verify -CAfile $tmp_cert $i", $outFile);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
############################################################################
|
||||||
|
sub ssl_tests
|
||||||
|
{
|
||||||
|
my $outFile = "$output_path\\ssl_tst.out";
|
||||||
|
my($CAcert) = "$output_path\\certCA.ss";
|
||||||
|
my($Ukey) = "$output_path\\keyU.ss";
|
||||||
|
my($Ucert) = "$output_path\\certU.ss";
|
||||||
|
my($ssltest)= "ssltest -key $Ukey -cert $Ucert -c_key $Ukey -c_cert $Ucert -CAfile $CAcert";
|
||||||
|
|
||||||
|
print( "\nRUNNING SSL TESTS:\n\n");
|
||||||
|
|
||||||
|
print( OUT "\n========================================================\n");
|
||||||
|
print( OUT "SSL TESTS:\n\n");
|
||||||
|
|
||||||
|
system("ssltest -ssl2 (CLIB_OPT)/>$outFile");
|
||||||
|
log_desc("Testing sslv2:");
|
||||||
|
log_output("ssltest -ssl2", $outFile);
|
||||||
|
|
||||||
|
system("$ssltest -ssl2 -server_auth (CLIB_OPT)/>$outFile");
|
||||||
|
log_desc("Testing sslv2 with server authentication:");
|
||||||
|
log_output("$ssltest -ssl2 -server_auth", $outFile);
|
||||||
|
|
||||||
|
system("$ssltest -ssl2 -client_auth (CLIB_OPT)/>$outFile");
|
||||||
|
log_desc("Testing sslv2 with client authentication:");
|
||||||
|
log_output("$ssltest -ssl2 -client_auth", $outFile);
|
||||||
|
|
||||||
|
system("$ssltest -ssl2 -server_auth -client_auth (CLIB_OPT)/>$outFile");
|
||||||
|
log_desc("Testing sslv2 with both client and server authentication:");
|
||||||
|
log_output("$ssltest -ssl2 -server_auth -client_auth", $outFile);
|
||||||
|
|
||||||
|
system("ssltest -ssl3 (CLIB_OPT)/>$outFile");
|
||||||
|
log_desc("Testing sslv3:");
|
||||||
|
log_output("ssltest -ssl3", $outFile);
|
||||||
|
|
||||||
|
system("$ssltest -ssl3 -server_auth (CLIB_OPT)/>$outFile");
|
||||||
|
log_desc("Testing sslv3 with server authentication:");
|
||||||
|
log_output("$ssltest -ssl3 -server_auth", $outFile);
|
||||||
|
|
||||||
|
system("$ssltest -ssl3 -client_auth (CLIB_OPT)/>$outFile");
|
||||||
|
log_desc("Testing sslv3 with client authentication:");
|
||||||
|
log_output("$ssltest -ssl3 -client_auth", $outFile);
|
||||||
|
|
||||||
|
system("$ssltest -ssl3 -server_auth -client_auth (CLIB_OPT)/>$outFile");
|
||||||
|
log_desc("Testing sslv3 with both client and server authentication:");
|
||||||
|
log_output("$ssltest -ssl3 -server_auth -client_auth", $outFile);
|
||||||
|
|
||||||
|
system("ssltest (CLIB_OPT)/>$outFile");
|
||||||
|
log_desc("Testing sslv2/sslv3:");
|
||||||
|
log_output("ssltest", $outFile);
|
||||||
|
|
||||||
|
system("$ssltest -server_auth (CLIB_OPT)/>$outFile");
|
||||||
|
log_desc("Testing sslv2/sslv3 with server authentication:");
|
||||||
|
log_output("$ssltest -server_auth", $outFile);
|
||||||
|
|
||||||
|
system("$ssltest -client_auth (CLIB_OPT)/>$outFile");
|
||||||
|
log_desc("Testing sslv2/sslv3 with client authentication:");
|
||||||
|
log_output("$ssltest -client_auth ", $outFile);
|
||||||
|
|
||||||
|
system("$ssltest -server_auth -client_auth (CLIB_OPT)/>$outFile");
|
||||||
|
log_desc("Testing sslv2/sslv3 with both client and server authentication:");
|
||||||
|
log_output("$ssltest -server_auth -client_auth", $outFile);
|
||||||
|
|
||||||
|
system("ssltest -bio_pair -ssl2 (CLIB_OPT)/>$outFile");
|
||||||
|
log_desc("Testing sslv2 via BIO pair:");
|
||||||
|
log_output("ssltest -bio_pair -ssl2", $outFile);
|
||||||
|
|
||||||
|
system("ssltest -bio_pair -dhe1024dsa -v (CLIB_OPT)/>$outFile");
|
||||||
|
log_desc("Testing sslv2/sslv3 with 1024 bit DHE via BIO pair:");
|
||||||
|
log_output("ssltest -bio_pair -dhe1024dsa -v", $outFile);
|
||||||
|
|
||||||
|
system("$ssltest -bio_pair -ssl2 -server_auth (CLIB_OPT)/>$outFile");
|
||||||
|
log_desc("Testing sslv2 with server authentication via BIO pair:");
|
||||||
|
log_output("$ssltest -bio_pair -ssl2 -server_auth", $outFile);
|
||||||
|
|
||||||
|
system("$ssltest -bio_pair -ssl2 -client_auth (CLIB_OPT)/>$outFile");
|
||||||
|
log_desc("Testing sslv2 with client authentication via BIO pair:");
|
||||||
|
log_output("$ssltest -bio_pair -ssl2 -client_auth", $outFile);
|
||||||
|
|
||||||
|
system("$ssltest -bio_pair -ssl2 -server_auth -client_auth (CLIB_OPT)/>$outFile");
|
||||||
|
log_desc("Testing sslv2 with both client and server authentication via BIO pair:");
|
||||||
|
log_output("$ssltest -bio_pair -ssl2 -server_auth -client_auth", $outFile);
|
||||||
|
|
||||||
|
system("ssltest -bio_pair -ssl3 (CLIB_OPT)/>$outFile");
|
||||||
|
log_desc("Testing sslv3 via BIO pair:");
|
||||||
|
log_output("ssltest -bio_pair -ssl3", $outFile);
|
||||||
|
|
||||||
|
system("$ssltest -bio_pair -ssl3 -server_auth (CLIB_OPT)/>$outFile");
|
||||||
|
log_desc("Testing sslv3 with server authentication via BIO pair:");
|
||||||
|
log_output("$ssltest -bio_pair -ssl3 -server_auth", $outFile);
|
||||||
|
|
||||||
|
system("$ssltest -bio_pair -ssl3 -client_auth (CLIB_OPT)/>$outFile");
|
||||||
|
log_desc("Testing sslv3 with client authentication via BIO pair:");
|
||||||
|
log_output("$ssltest -bio_pair -ssl3 -client_auth", $outFile);
|
||||||
|
|
||||||
|
system("$ssltest -bio_pair -ssl3 -server_auth -client_auth (CLIB_OPT)/>$outFile");
|
||||||
|
log_desc("Testing sslv3 with both client and server authentication via BIO pair:");
|
||||||
|
log_output("$ssltest -bio_pair -ssl3 -server_auth -client_auth", $outFile);
|
||||||
|
|
||||||
|
system("ssltest -bio_pair (CLIB_OPT)/>$outFile");
|
||||||
|
log_desc("Testing sslv2/sslv3 via BIO pair:");
|
||||||
|
log_output("ssltest -bio_pair", $outFile);
|
||||||
|
|
||||||
|
system("$ssltest -bio_pair -server_auth (CLIB_OPT)/>$outFile");
|
||||||
|
log_desc("Testing sslv2/sslv3 with server authentication via BIO pair:");
|
||||||
|
log_output("$ssltest -bio_pair -server_auth", $outFile);
|
||||||
|
|
||||||
|
system("$ssltest -bio_pair -client_auth (CLIB_OPT)/>$outFile");
|
||||||
|
log_desc("Testing sslv2/sslv3 with client authentication via BIO pair:");
|
||||||
|
log_output("$ssltest -bio_pair -client_auth", $outFile);
|
||||||
|
|
||||||
|
system("$ssltest -bio_pair -server_auth -client_auth (CLIB_OPT)/>$outFile");
|
||||||
|
log_desc("Testing sslv2/sslv3 with both client and server authentication via BIO pair:");
|
||||||
|
log_output("$ssltest -bio_pair -server_auth -client_auth", $outFile);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
############################################################################
|
||||||
|
sub ca_tests
|
||||||
|
{
|
||||||
|
my $outFile = "$output_path\\ca_tst.out";
|
||||||
|
|
||||||
|
my($CAkey) = "$output_path\\keyCA.ss";
|
||||||
|
my($CAcert) = "$output_path\\certCA.ss";
|
||||||
|
my($CAserial) = "$output_path\\certCA.srl";
|
||||||
|
my($CAreq) = "$output_path\\reqCA.ss";
|
||||||
|
my($CAreq2) = "$output_path\\req2CA.ss";
|
||||||
|
|
||||||
|
my($CAconf) = "$test_path\\CAss.cnf";
|
||||||
|
|
||||||
|
my($Uconf) = "$test_path\\Uss.cnf";
|
||||||
|
|
||||||
|
my($Ukey) = "$output_path\\keyU.ss";
|
||||||
|
my($Ureq) = "$output_path\\reqU.ss";
|
||||||
|
my($Ucert) = "$output_path\\certU.ss";
|
||||||
|
|
||||||
|
print( "\nRUNNING CA TESTS:\n\n");
|
||||||
|
|
||||||
|
print( OUT "\n========================================================\n");
|
||||||
|
print( OUT "CA TESTS:\n");
|
||||||
|
|
||||||
|
system("openssl2 req -config $CAconf -out $CAreq -keyout $CAkey -new (CLIB_OPT)/>$outFile");
|
||||||
|
log_desc("Make a certificate request using req:");
|
||||||
|
log_output("openssl2 req -config $CAconf -out $CAreq -keyout $CAkey -new", $outFile);
|
||||||
|
|
||||||
|
system("openssl2 x509 -CAcreateserial -in $CAreq -days 30 -req -out $CAcert -signkey $CAkey (CLIB_OPT)/>$outFile");
|
||||||
|
log_desc("Convert the certificate request into a self signed certificate using x509:");
|
||||||
|
log_output("openssl2 x509 -CAcreateserial -in $CAreq -days 30 -req -out $CAcert -signkey $CAkey", $outFile);
|
||||||
|
|
||||||
|
system("openssl2 x509 -in $CAcert -x509toreq -signkey $CAkey -out $CAreq2 (CLIB_OPT)/>$outFile");
|
||||||
|
log_desc("Convert a certificate into a certificate request using 'x509':");
|
||||||
|
log_output("openssl2 x509 -in $CAcert -x509toreq -signkey $CAkey -out $CAreq2", $outFile);
|
||||||
|
|
||||||
|
system("openssl2 req -config $OpenSSL_config -verify -in $CAreq -noout (CLIB_OPT)/>$outFile");
|
||||||
|
log_output("openssl2 req -config $OpenSSL_config -verify -in $CAreq -noout", $outFile);
|
||||||
|
|
||||||
|
system("openssl2 req -config $OpenSSL_config -verify -in $CAreq2 -noout (CLIB_OPT)/>$outFile");
|
||||||
|
log_output( "openssl2 req -config $OpenSSL_config -verify -in $CAreq2 -noout", $outFile);
|
||||||
|
|
||||||
|
system("openssl2 verify -CAfile $CAcert $CAcert (CLIB_OPT)/>$outFile");
|
||||||
|
log_output("openssl2 verify -CAfile $CAcert $CAcert", $outFile);
|
||||||
|
|
||||||
|
system("openssl2 req -config $Uconf -out $Ureq -keyout $Ukey -new (CLIB_OPT)/>$outFile");
|
||||||
|
log_desc("Make another certificate request using req:");
|
||||||
|
log_output("openssl2 req -config $Uconf -out $Ureq -keyout $Ukey -new", $outFile);
|
||||||
|
|
||||||
|
system("openssl2 x509 -CAcreateserial -in $Ureq -days 30 -req -out $Ucert -CA $CAcert -CAkey $CAkey -CAserial $CAserial (CLIB_OPT)/>$outFile");
|
||||||
|
log_desc("Sign certificate request with the just created CA via x509:");
|
||||||
|
log_output("openssl2 x509 -CAcreateserial -in $Ureq -days 30 -req -out $Ucert -CA $CAcert -CAkey $CAkey -CAserial $CAserial", $outFile);
|
||||||
|
|
||||||
|
system("openssl2 verify -CAfile $CAcert $Ucert (CLIB_OPT)/>$outFile");
|
||||||
|
log_output("openssl2 verify -CAfile $CAcert $Ucert", $outFile);
|
||||||
|
|
||||||
|
system("openssl2 x509 -subject -issuer -startdate -enddate -noout -in $Ucert (CLIB_OPT)/>$outFile");
|
||||||
|
log_desc("Certificate details");
|
||||||
|
log_output("openssl2 x509 -subject -issuer -startdate -enddate -noout -in $Ucert", $outFile);
|
||||||
|
|
||||||
|
print(OUT "--\n");
|
||||||
|
print(OUT "The generated CA certificate is $CAcert\n");
|
||||||
|
print(OUT "The generated CA private key is $CAkey\n");
|
||||||
|
print(OUT "The current CA signing serial number is in $CAserial\n");
|
||||||
|
|
||||||
|
print(OUT "The generated user certificate is $Ucert\n");
|
||||||
|
print(OUT "The generated user private key is $Ukey\n");
|
||||||
|
print(OUT "--\n");
|
||||||
|
}
|
||||||
|
|
||||||
|
############################################################################
|
||||||
|
sub evp_tests
|
||||||
|
{
|
||||||
|
my $i = 'evp_test';
|
||||||
|
|
||||||
|
print( "\nRUNNING EVP TESTS:\n\n");
|
||||||
|
|
||||||
|
print( OUT "\n========================================================\n");
|
||||||
|
print( OUT "EVP TESTS:\n\n");
|
||||||
|
|
||||||
|
if (-e "$base_path\\$i.nlm")
|
||||||
|
{
|
||||||
|
my $outFile = "$output_path\\$i.out";
|
||||||
|
system("$i $test_path\\evptests.txt (CLIB_OPT)/>$outFile");
|
||||||
|
log_desc("Test: $i\.nlm:");
|
||||||
|
log_output("", $outFile );
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
log_desc("Test: $i\.nlm: file not found");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
############################################################################
|
||||||
|
sub log_output( $ $ )
|
||||||
|
{
|
||||||
|
my( $desc, $file ) = @_;
|
||||||
|
my($error) = 0;
|
||||||
|
my($key);
|
||||||
|
my($msg);
|
||||||
|
|
||||||
|
if ($desc)
|
||||||
|
{
|
||||||
|
print("\r$desc\n");
|
||||||
|
print(OUT "$desc\n");
|
||||||
|
}
|
||||||
|
|
||||||
|
# loop waiting for test program to complete
|
||||||
|
while ( stat($file) == 0)
|
||||||
|
{ print(". "); sleep(1); }
|
||||||
|
|
||||||
|
|
||||||
|
# copy test output to log file
|
||||||
|
open(IN, "<$file");
|
||||||
|
while (<IN>)
|
||||||
|
{
|
||||||
|
print(OUT $_);
|
||||||
|
if ( $_ =~ /ERROR/ )
|
||||||
|
{
|
||||||
|
$error = 1;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
# close and delete the temporary test output file
|
||||||
|
close(IN);
|
||||||
|
unlink($file);
|
||||||
|
|
||||||
|
if ( $error == 0 )
|
||||||
|
{
|
||||||
|
$msg = "Test Succeeded";
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
$msg = "Test Failed";
|
||||||
|
}
|
||||||
|
|
||||||
|
print(OUT "$msg\n");
|
||||||
|
|
||||||
|
if ($pause)
|
||||||
|
{
|
||||||
|
print("$msg - press ENTER to continue...");
|
||||||
|
$key = getc;
|
||||||
|
print("\n");
|
||||||
|
}
|
||||||
|
|
||||||
|
# Several of the testing scripts run a loop loading the
|
||||||
|
# same NLM with different options.
|
||||||
|
# On slow NetWare machines there appears to be some delay in the
|
||||||
|
# OS actually unloading the test nlms and the OS complains about.
|
||||||
|
# the NLM already being loaded. This additional pause is to
|
||||||
|
# to help provide a little more time for unloading before trying to
|
||||||
|
# load again.
|
||||||
|
sleep(1);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
############################################################################
|
||||||
|
sub log_desc( $ )
|
||||||
|
{
|
||||||
|
my( $desc ) = @_;
|
||||||
|
|
||||||
|
print("\n");
|
||||||
|
print("$desc\n");
|
||||||
|
|
||||||
|
print(OUT "\n");
|
||||||
|
print(OUT "$desc\n");
|
||||||
|
print(OUT "======================================\n");
|
||||||
|
}
|
||||||
|
|
||||||
|
############################################################################
|
||||||
|
sub compare_files( $ $ $ )
|
||||||
|
{
|
||||||
|
my( $file1, $file2, $binary ) = @_;
|
||||||
|
my( $n1, $n2, $b1, $b2 );
|
||||||
|
my($ret) = 1;
|
||||||
|
|
||||||
|
open(IN0, $file1) || die "\nunable to open $file1\n";
|
||||||
|
open(IN1, $file2) || die "\nunable to open $file2\n";
|
||||||
|
|
||||||
|
if ($binary)
|
||||||
|
{
|
||||||
|
binmode IN0;
|
||||||
|
binmode IN1;
|
||||||
|
}
|
||||||
|
|
||||||
|
for (;;)
|
||||||
|
{
|
||||||
|
$n1 = read(IN0, $b1, 512);
|
||||||
|
$n2 = read(IN1, $b2, 512);
|
||||||
|
|
||||||
|
if ($n1 != $n2) {last;}
|
||||||
|
if ($b1 != $b2) {last;}
|
||||||
|
|
||||||
|
if ($n1 == 0)
|
||||||
|
{
|
||||||
|
$ret = 0;
|
||||||
|
last;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
close(IN0);
|
||||||
|
close(IN1);
|
||||||
|
return($ret);
|
||||||
|
}
|
||||||
|
|
||||||
|
############################################################################
|
||||||
|
sub do_wait()
|
||||||
|
{
|
||||||
|
my($key);
|
||||||
|
|
||||||
|
if ($pause)
|
||||||
|
{
|
||||||
|
print("Press ENTER to continue...");
|
||||||
|
$key = getc;
|
||||||
|
print("\n");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
############################################################################
|
||||||
|
sub make_tmp_cert_file()
|
||||||
|
{
|
||||||
|
my @cert_files = <$cert_path/*.pem>;
|
||||||
|
|
||||||
|
# delete the file if it already exists
|
||||||
|
unlink($tmp_cert);
|
||||||
|
|
||||||
|
open( TMP_CERT, ">$tmp_cert") || die "\nunable to open $tmp_cert\n";
|
||||||
|
|
||||||
|
print("building temporary cert file\n");
|
||||||
|
|
||||||
|
# create a temporary cert file that contains all the certs
|
||||||
|
foreach $i (@cert_files)
|
||||||
|
{
|
||||||
|
open( IN_CERT, $i ) || die "\nunable to open $i\n";
|
||||||
|
|
||||||
|
for(;;)
|
||||||
|
{
|
||||||
|
$n = sysread(IN_CERT, $data, 1024);
|
||||||
|
|
||||||
|
if ($n == 0)
|
||||||
|
{
|
||||||
|
close(IN_CERT);
|
||||||
|
last;
|
||||||
|
};
|
||||||
|
|
||||||
|
syswrite(TMP_CERT, $data, $n);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
close( TMP_CERT );
|
||||||
|
}
|
||||||
254
Netware/globals.txt
Normal file
254
Netware/globals.txt
Normal file
@@ -0,0 +1,254 @@
|
|||||||
|
An initial review of the OpenSSL code was done to determine how many
|
||||||
|
global variables where present. The idea was to determine the amount of
|
||||||
|
work required to pull the globals into an instance data structure in
|
||||||
|
order to build a Library NLM for NetWare. This file contains the results
|
||||||
|
of the review. Each file is listed along with the globals in the file.
|
||||||
|
The initial review was done very quickly so this list is probably
|
||||||
|
not a comprehensive list.
|
||||||
|
|
||||||
|
|
||||||
|
cryptlib.c
|
||||||
|
===========================================
|
||||||
|
|
||||||
|
static STACK *app_locks=NULL;
|
||||||
|
|
||||||
|
static STACK_OF(CRYPTO_dynlock) *dyn_locks=NULL;
|
||||||
|
|
||||||
|
static void (MS_FAR *locking_callback)(int mode,int type,
|
||||||
|
const char *file,int line)=NULL;
|
||||||
|
static int (MS_FAR *add_lock_callback)(int *pointer,int amount,
|
||||||
|
int type,const char *file,int line)=NULL;
|
||||||
|
static unsigned long (MS_FAR *id_callback)(void)=NULL;
|
||||||
|
static struct CRYPTO_dynlock_value *(MS_FAR *dynlock_create_callback)
|
||||||
|
(const char *file,int line)=NULL;
|
||||||
|
static void (MS_FAR *dynlock_lock_callback)(int mode,
|
||||||
|
struct CRYPTO_dynlock_value *l, const char *file,int line)=NULL;
|
||||||
|
static void (MS_FAR *dynlock_destroy_callback)(struct CRYPTO_dynlock_value *l,
|
||||||
|
const char *file,int line)=NULL;
|
||||||
|
|
||||||
|
|
||||||
|
mem.c
|
||||||
|
===========================================
|
||||||
|
static int allow_customize = 1; /* we provide flexible functions for */
|
||||||
|
static int allow_customize_debug = 1;/* exchanging memory-related functions at
|
||||||
|
|
||||||
|
/* may be changed as long as `allow_customize' is set */
|
||||||
|
static void *(*malloc_locked_func)(size_t) = malloc;
|
||||||
|
static void (*free_locked_func)(void *) = free;
|
||||||
|
static void *(*malloc_func)(size_t) = malloc;
|
||||||
|
static void *(*realloc_func)(void *, size_t)= realloc;
|
||||||
|
static void (*free_func)(void *) = free;
|
||||||
|
|
||||||
|
/* use default functions from mem_dbg.c */
|
||||||
|
static void (*malloc_debug_func)(void *,int,const char *,int,int)
|
||||||
|
= CRYPTO_dbg_malloc;
|
||||||
|
static void (*realloc_debug_func)(void *,void *,int,const char *,int,int)
|
||||||
|
= CRYPTO_dbg_realloc;
|
||||||
|
static void (*free_debug_func)(void *,int) = CRYPTO_dbg_free;
|
||||||
|
static void (*set_debug_options_func)(long) = CRYPTO_dbg_set_options;
|
||||||
|
static long (*get_debug_options_func)(void) = CRYPTO_dbg_get_options;
|
||||||
|
|
||||||
|
|
||||||
|
mem_dbg.c
|
||||||
|
===========================================
|
||||||
|
static int mh_mode=CRYPTO_MEM_CHECK_OFF;
|
||||||
|
static unsigned long order = 0; /* number of memory requests */
|
||||||
|
static LHASH *mh=NULL; /* hash-table of memory requests (address as key) */
|
||||||
|
|
||||||
|
static LHASH *amih=NULL; /* hash-table with those app_mem_info_st's */
|
||||||
|
static long options = /* extra information to be recorded */
|
||||||
|
static unsigned long disabling_thread = 0;
|
||||||
|
|
||||||
|
|
||||||
|
err.c
|
||||||
|
===========================================
|
||||||
|
static LHASH *error_hash=NULL;
|
||||||
|
static LHASH *thread_hash=NULL;
|
||||||
|
|
||||||
|
several files have routines with static "init" to track if error strings
|
||||||
|
have been loaded ( may not want seperate error strings for each process )
|
||||||
|
The "init" variable can't be left "global" because the error has is a ptr
|
||||||
|
that is malloc'ed. The malloc'ed error has is dependant on the "init"
|
||||||
|
vars.
|
||||||
|
|
||||||
|
files:
|
||||||
|
pem_err.c
|
||||||
|
cpt_err.c
|
||||||
|
pk12err.c
|
||||||
|
asn1_err.c
|
||||||
|
bio_err.c
|
||||||
|
bn_err.c
|
||||||
|
buf_err.c
|
||||||
|
comp_err.c
|
||||||
|
conf_err.c
|
||||||
|
cpt_err.c
|
||||||
|
dh_err.c
|
||||||
|
dsa_err.c
|
||||||
|
dso_err.c
|
||||||
|
evp_err.c
|
||||||
|
obj_err.c
|
||||||
|
pkcs7err.c
|
||||||
|
rand_err.c
|
||||||
|
rsa_err.c
|
||||||
|
rsar_err.c
|
||||||
|
ssl_err.c
|
||||||
|
x509_err.c
|
||||||
|
v3err.c
|
||||||
|
err.c
|
||||||
|
|
||||||
|
These file have similar "init" globals but they are for other stuff not
|
||||||
|
error strings:
|
||||||
|
|
||||||
|
bn_lib.c
|
||||||
|
ecc_enc.c
|
||||||
|
s23_clnt.c
|
||||||
|
s23_meth.c
|
||||||
|
s23_srvr.c
|
||||||
|
s2_clnt.c
|
||||||
|
s2_lib.c
|
||||||
|
s2_meth.c
|
||||||
|
s2_srvr.c
|
||||||
|
s3_clnt.c
|
||||||
|
s3_lib.c
|
||||||
|
s3_srvr.c
|
||||||
|
t1_clnt.c
|
||||||
|
t1_meth.c
|
||||||
|
t1_srvr.c
|
||||||
|
|
||||||
|
rand_lib.c
|
||||||
|
===========================================
|
||||||
|
static RAND_METHOD *rand_meth= &rand_ssleay_meth;
|
||||||
|
|
||||||
|
md_rand.c
|
||||||
|
===========================================
|
||||||
|
static int state_num=0,state_index=0;
|
||||||
|
static unsigned char state[STATE_SIZE+MD_DIGEST_LENGTH];
|
||||||
|
static unsigned char md[MD_DIGEST_LENGTH];
|
||||||
|
static long md_count[2]={0,0};
|
||||||
|
static double entropy=0;
|
||||||
|
static int initialized=0;
|
||||||
|
|
||||||
|
/* This should be set to 1 only when ssleay_rand_add() is called inside
|
||||||
|
an already locked state, so it doesn't try to lock and thereby cause
|
||||||
|
a hang. And it should always be reset back to 0 before unlocking. */
|
||||||
|
static int add_do_not_lock=0;
|
||||||
|
|
||||||
|
obj_dat.c
|
||||||
|
============================================
|
||||||
|
static int new_nid=NUM_NID;
|
||||||
|
static LHASH *added=NULL;
|
||||||
|
|
||||||
|
b_sock.c
|
||||||
|
===========================================
|
||||||
|
static unsigned long BIO_ghbn_hits=0L;
|
||||||
|
static unsigned long BIO_ghbn_miss=0L;
|
||||||
|
static struct ghbn_cache_st
|
||||||
|
{
|
||||||
|
char name[129];
|
||||||
|
struct hostent *ent;
|
||||||
|
unsigned long order;
|
||||||
|
} ghbn_cache[GHBN_NUM];
|
||||||
|
|
||||||
|
static int wsa_init_done=0;
|
||||||
|
|
||||||
|
|
||||||
|
bio_lib.c
|
||||||
|
===========================================
|
||||||
|
static STACK_OF(CRYPTO_EX_DATA_FUNCS) *bio_meth=NULL;
|
||||||
|
static int bio_meth_num=0;
|
||||||
|
|
||||||
|
|
||||||
|
bn_lib.c
|
||||||
|
========================================
|
||||||
|
static int bn_limit_bits=0;
|
||||||
|
static int bn_limit_num=8; /* (1<<bn_limit_bits) */
|
||||||
|
static int bn_limit_bits_low=0;
|
||||||
|
static int bn_limit_num_low=8; /* (1<<bn_limit_bits_low) */
|
||||||
|
static int bn_limit_bits_high=0;
|
||||||
|
static int bn_limit_num_high=8; /* (1<<bn_limit_bits_high) */
|
||||||
|
static int bn_limit_bits_mont=0;
|
||||||
|
static int bn_limit_num_mont=8; /* (1<<bn_limit_bits_mont) */
|
||||||
|
|
||||||
|
conf_lib.c
|
||||||
|
========================================
|
||||||
|
static CONF_METHOD *default_CONF_method=NULL;
|
||||||
|
|
||||||
|
dh_lib.c
|
||||||
|
========================================
|
||||||
|
static DH_METHOD *default_DH_method;
|
||||||
|
static int dh_meth_num = 0;
|
||||||
|
static STACK_OF(CRYPTO_EX_DATA_FUNCS) *dh_meth = NULL;
|
||||||
|
|
||||||
|
dsa_lib.c
|
||||||
|
========================================
|
||||||
|
static DSA_METHOD *default_DSA_method;
|
||||||
|
static int dsa_meth_num = 0;
|
||||||
|
static STACK_OF(CRYPTO_EX_DATA_FUNCS) *dsa_meth = NULL;
|
||||||
|
|
||||||
|
dso_lib.c
|
||||||
|
========================================
|
||||||
|
static DSO_METHOD *default_DSO_meth = NULL;
|
||||||
|
|
||||||
|
rsa_lib.c
|
||||||
|
========================================
|
||||||
|
static RSA_METHOD *default_RSA_meth=NULL;
|
||||||
|
static int rsa_meth_num=0;
|
||||||
|
static STACK_OF(CRYPTO_EX_DATA_FUNCS) *rsa_meth=NULL;
|
||||||
|
|
||||||
|
x509_trs.c
|
||||||
|
=======================================
|
||||||
|
static int (*default_trust)(int id, X509 *x, int flags) = obj_trust;
|
||||||
|
static STACK_OF(X509_TRUST) *trtable = NULL;
|
||||||
|
|
||||||
|
x509_req.c
|
||||||
|
=======================================
|
||||||
|
static int *ext_nids = ext_nid_list;
|
||||||
|
|
||||||
|
o_names.c
|
||||||
|
======================================
|
||||||
|
static LHASH *names_lh=NULL;
|
||||||
|
static STACK_OF(NAME_FUNCS) *name_funcs_stack;
|
||||||
|
static int free_type;
|
||||||
|
static int names_type_num=OBJ_NAME_TYPE_NUM;
|
||||||
|
|
||||||
|
|
||||||
|
th-lock.c - NEED to add support for locking for NetWare
|
||||||
|
==============================================
|
||||||
|
static long *lock_count;
|
||||||
|
(other platform specific globals)
|
||||||
|
|
||||||
|
x_x509.c
|
||||||
|
==============================================
|
||||||
|
static int x509_meth_num = 0;
|
||||||
|
static STACK_OF(CRYPTO_EX_DATA_FUNCS) *x509_meth = NULL;
|
||||||
|
|
||||||
|
|
||||||
|
evp_pbe.c
|
||||||
|
============================================
|
||||||
|
static STACK *pbe_algs;
|
||||||
|
|
||||||
|
evp_key.c
|
||||||
|
============================================
|
||||||
|
static char prompt_string[80];
|
||||||
|
|
||||||
|
ssl_ciph.c
|
||||||
|
============================================
|
||||||
|
static STACK_OF(SSL_COMP) *ssl_comp_methods=NULL;
|
||||||
|
|
||||||
|
ssl_lib.c
|
||||||
|
=============================================
|
||||||
|
static STACK_OF(CRYPTO_EX_DATA_FUNCS) *ssl_meth=NULL;
|
||||||
|
static STACK_OF(CRYPTO_EX_DATA_FUNCS) *ssl_ctx_meth=NULL;
|
||||||
|
static int ssl_meth_num=0;
|
||||||
|
static int ssl_ctx_meth_num=0;
|
||||||
|
|
||||||
|
ssl_sess.c
|
||||||
|
=============================================
|
||||||
|
static int ssl_session_num=0;
|
||||||
|
static STACK_OF(CRYPTO_EX_DATA_FUNCS) *ssl_session_meth=NULL;
|
||||||
|
|
||||||
|
x509_vfy.c
|
||||||
|
============================================
|
||||||
|
static STACK_OF(CRYPTO_EX_DATA_FUNCS) *x509_store_ctx_method=NULL;
|
||||||
|
static int x509_store_ctx_num=0;
|
||||||
|
|
||||||
19
Netware/readme.txt
Normal file
19
Netware/readme.txt
Normal file
@@ -0,0 +1,19 @@
|
|||||||
|
|
||||||
|
Contents of the openssl\netware directory
|
||||||
|
==========================================
|
||||||
|
|
||||||
|
Regular files:
|
||||||
|
|
||||||
|
readme.txt - this file
|
||||||
|
do_tests.pl - perl script used to run the OpenSSL tests on NetWare
|
||||||
|
cpy_tests.bat - batch to to copy test stuff to NetWare server
|
||||||
|
build.bat - batch file to help with builds
|
||||||
|
set_env.bat - batch file to help setup build environments
|
||||||
|
globals.txt - results of initial code review to identify OpenSSL global variables
|
||||||
|
|
||||||
|
|
||||||
|
The following files are generated by the various scripts. They are
|
||||||
|
recreated each time and it is okay to delete them.
|
||||||
|
|
||||||
|
*.def - command files used by Metrowerks linker
|
||||||
|
*.mak - make files generated by mk1mf.pl
|
||||||
112
Netware/set_env.bat
Normal file
112
Netware/set_env.bat
Normal file
@@ -0,0 +1,112 @@
|
|||||||
|
@echo off
|
||||||
|
|
||||||
|
rem ========================================================================
|
||||||
|
rem Batch file to assist in setting up the necessary enviroment for
|
||||||
|
rem building OpenSSL for NetWare.
|
||||||
|
rem
|
||||||
|
rem usage:
|
||||||
|
rem set_env [target]
|
||||||
|
rem
|
||||||
|
rem target - "netware-clib" - Clib build
|
||||||
|
rem - "netware-libc" - LibC build
|
||||||
|
rem
|
||||||
|
rem
|
||||||
|
|
||||||
|
if "a%1" == "a" goto usage
|
||||||
|
|
||||||
|
set LIBC_BUILD=
|
||||||
|
set CLIB_BUILD=
|
||||||
|
set GNUC=
|
||||||
|
|
||||||
|
if "%1" == "netware-clib" set CLIB_BUILD=Y
|
||||||
|
if "%1" == "netware-clib" set LIBC_BUILD=
|
||||||
|
|
||||||
|
if "%1" == "netware-libc" set LIBC_BUILD=Y
|
||||||
|
if "%1" == "netware-libc" set CLIB_BUILD=
|
||||||
|
|
||||||
|
if "%2" == "gnuc" set GNUC=Y
|
||||||
|
if "%2" == "codewarrior" set GNUC=
|
||||||
|
|
||||||
|
rem Location of tools (compiler, linker, etc)
|
||||||
|
if "%NDKBASE%" == "" set NDKBASE=c:\Novell
|
||||||
|
|
||||||
|
rem If Perl for Win32 is not already in your path, add it here
|
||||||
|
set PERL_PATH=
|
||||||
|
|
||||||
|
rem Define path to the Metrowerks command line tools
|
||||||
|
rem or GNU Crosscompiler gcc / nlmconv
|
||||||
|
rem ( compiler, assembler, linker)
|
||||||
|
if "%GNUC%" == "Y" set COMPILER_PATH=c:\usr\i586-netware\bin;c:\usr\bin
|
||||||
|
if "%GNUC%" == "" set COMPILER_PATH=c:\prg\cwcmdl40
|
||||||
|
|
||||||
|
rem If using gnu make define path to utility
|
||||||
|
rem set GNU_MAKE_PATH=%NDKBASE%\gnu
|
||||||
|
set GNU_MAKE_PATH=c:\prg\tools
|
||||||
|
|
||||||
|
rem If using ms nmake define path to nmake
|
||||||
|
rem set MS_NMAKE_PATH=%NDKBASE%\msvc\600\bin
|
||||||
|
|
||||||
|
rem If using NASM assembler define path
|
||||||
|
rem set NASM_PATH=%NDKBASE%\nasm
|
||||||
|
set NASM_PATH=c:\prg\tools
|
||||||
|
|
||||||
|
rem Update path to include tool paths
|
||||||
|
set path=%path%;%COMPILER_PATH%
|
||||||
|
if not "%GNU_MAKE_PATH%" == "" set path=%path%;%GNU_MAKE_PATH%
|
||||||
|
if not "%MS_NMAKE_PATH%" == "" set path=%path%;%MS_NMAKE_PATH%
|
||||||
|
if not "%NASM_PATH%" == "" set path=%path%;%NASM_PATH%
|
||||||
|
if not "%PERL_PATH%" == "" set path=%path%;%PERL_PATH%
|
||||||
|
|
||||||
|
rem Set INCLUDES to location of Novell NDK includes
|
||||||
|
if "%LIBC_BUILD%" == "Y" set INCLUDE=%NDKBASE%\ndk\libc\include;%NDKBASE%\ndk\libc\include\winsock
|
||||||
|
if "%CLIB_BUILD%" == "Y" set INCLUDE=%NDKBASE%\ndk\nwsdk\include\nlm;%NDKBASE%\ws295sdk\include
|
||||||
|
|
||||||
|
rem Set Imports to location of Novell NDK import files
|
||||||
|
if "%LIBC_BUILD%" == "Y" set IMPORTS=%NDKBASE%\ndk\libc\imports
|
||||||
|
if "%CLIB_BUILD%" == "Y" set IMPORTS=%NDKBASE%\ndk\nwsdk\imports
|
||||||
|
|
||||||
|
rem Set PRELUDE to the absolute path of the prelude object to link with in
|
||||||
|
rem the Metrowerks NetWare PDK - NOTE: for Clib builds "clibpre.o" is
|
||||||
|
rem recommended, for LibC NKS builds libcpre.o must be used
|
||||||
|
if "%GNUC%" == "Y" goto gnuc
|
||||||
|
if "%LIBC_BUILD%" == "Y" set PRELUDE=%IMPORTS%\libcpre.o
|
||||||
|
rem if "%CLIB_BUILD%" == "Y" set PRELUDE=%IMPORTS%\clibpre.o
|
||||||
|
if "%CLIB_BUILD%" == "Y" set PRELUDE=%IMPORTS%\prelude.o
|
||||||
|
echo using MetroWerks CodeWarrior
|
||||||
|
goto info
|
||||||
|
|
||||||
|
:gnuc
|
||||||
|
if "%LIBC_BUILD%" == "Y" set PRELUDE=%IMPORTS%\libcpre.gcc.o
|
||||||
|
rem if "%CLIB_BUILD%" == "Y" set PRELUDE=%IMPORTS%\clibpre.gcc.o
|
||||||
|
if "%CLIB_BUILD%" == "Y" set PRELUDE=%IMPORTS%\prelude.gcc.o
|
||||||
|
echo using GNU GCC Compiler
|
||||||
|
|
||||||
|
:info
|
||||||
|
echo.
|
||||||
|
|
||||||
|
if "%LIBC_BUILD%" == "Y" echo Enviroment configured for LibC build
|
||||||
|
if "%LIBC_BUILD%" == "Y" echo use "netware\build.bat netware-libc ..."
|
||||||
|
|
||||||
|
if "%CLIB_BUILD%" == "Y" echo Enviroment configured for CLib build
|
||||||
|
if "%CLIB_BUILD%" == "Y" echo use "netware\build.bat netware-clib ..."
|
||||||
|
|
||||||
|
goto end
|
||||||
|
|
||||||
|
:usage
|
||||||
|
rem ===============================================================
|
||||||
|
echo.
|
||||||
|
echo No target build specified!
|
||||||
|
echo.
|
||||||
|
echo usage: set_env [target] [compiler]
|
||||||
|
echo.
|
||||||
|
echo target - "netware-clib" - Clib build
|
||||||
|
echo - "netware-libc" - LibC build
|
||||||
|
echo.
|
||||||
|
echo compiler - "gnuc" - GNU GCC Compiler
|
||||||
|
echo - "codewarrior" - MetroWerks CodeWarrior (default)
|
||||||
|
echo.
|
||||||
|
|
||||||
|
:end
|
||||||
|
echo.
|
||||||
|
|
||||||
|
|
||||||
169
PROBLEMS
169
PROBLEMS
@@ -12,8 +12,8 @@ along the whole library path before it bothers looking for .a libraries. This
|
|||||||
means that -L switches won't matter unless OpenSSL is built with shared
|
means that -L switches won't matter unless OpenSSL is built with shared
|
||||||
library support.
|
library support.
|
||||||
|
|
||||||
The workaround may be to change the following lines in apps/Makefile.ssl and
|
The workaround may be to change the following lines in apps/Makefile and
|
||||||
test/Makefile.ssl:
|
test/Makefile:
|
||||||
|
|
||||||
LIBCRYPTO=-L.. -lcrypto
|
LIBCRYPTO=-L.. -lcrypto
|
||||||
LIBSSL=-L.. -lssl
|
LIBSSL=-L.. -lssl
|
||||||
@@ -36,7 +36,9 @@ may differ on your machine.
|
|||||||
|
|
||||||
|
|
||||||
As long as Apple doesn't fix the problem with ld, this problem building
|
As long as Apple doesn't fix the problem with ld, this problem building
|
||||||
OpenSSL will remain as is.
|
OpenSSL will remain as is. Well, the problem was addressed in 0.9.8f by
|
||||||
|
passing -Wl,-search_paths_first, but it's unknown if the flag was
|
||||||
|
supported from the initial MacOS X release.
|
||||||
|
|
||||||
|
|
||||||
* Parallell make leads to errors
|
* Parallell make leads to errors
|
||||||
@@ -48,17 +50,164 @@ will interfere with each other and lead to test failure.
|
|||||||
The solution is simple for now: don't run parallell make when testing.
|
The solution is simple for now: don't run parallell make when testing.
|
||||||
|
|
||||||
|
|
||||||
* Bugs in gcc 3.0 triggered
|
* Bugs in gcc triggered
|
||||||
|
|
||||||
According to a problem report, there are bugs in gcc 3.0 that are
|
- According to a problem report, there are bugs in gcc 3.0 that are
|
||||||
triggered by some of the code in OpenSSL, more specifically in
|
triggered by some of the code in OpenSSL, more specifically in
|
||||||
PEM_get_EVP_CIPHER_INFO(). The triggering code is the following:
|
PEM_get_EVP_CIPHER_INFO(). The triggering code is the following:
|
||||||
|
|
||||||
header+=11;
|
header+=11;
|
||||||
if (*header != '4') return(0); header++;
|
if (*header != '4') return(0); header++;
|
||||||
if (*header != ',') return(0); header++;
|
if (*header != ',') return(0); header++;
|
||||||
|
|
||||||
What happens is that gcc might optimize a little too agressively, and
|
What happens is that gcc might optimize a little too agressively, and
|
||||||
you end up with an extra incrementation when *header != '4'.
|
you end up with an extra incrementation when *header != '4'.
|
||||||
|
|
||||||
We recommend that you upgrade gcc to as high a 3.x version as you can.
|
We recommend that you upgrade gcc to as high a 3.x version as you can.
|
||||||
|
|
||||||
|
- According to multiple problem reports, some of our message digest
|
||||||
|
implementations trigger bug[s] in code optimizer in gcc 3.3 for sparc64
|
||||||
|
and gcc 2.96 for ppc. Former fails to complete RIPEMD160 test, while
|
||||||
|
latter - SHA one.
|
||||||
|
|
||||||
|
The recomendation is to upgrade your compiler. This naturally applies to
|
||||||
|
other similar cases.
|
||||||
|
|
||||||
|
- There is a subtle Solaris x86-specific gcc run-time environment bug, which
|
||||||
|
"falls between" OpenSSL [0.9.8 and later], Solaris ld and GCC. The bug
|
||||||
|
manifests itself as Segmentation Fault upon early application start-up.
|
||||||
|
The problem can be worked around by patching the environment according to
|
||||||
|
http://www.openssl.org/~appro/values.c.
|
||||||
|
|
||||||
|
* solaris64-sparcv9-cc SHA-1 performance with WorkShop 6 compiler.
|
||||||
|
|
||||||
|
As subject suggests SHA-1 might perform poorly (4 times slower)
|
||||||
|
if compiled with WorkShop 6 compiler and -xarch=v9. The cause for
|
||||||
|
this seems to be the fact that compiler emits multiplication to
|
||||||
|
perform shift operations:-( To work the problem around configure
|
||||||
|
with './Configure solaris64-sparcv9-cc -DMD32_REG_T=int'.
|
||||||
|
|
||||||
|
* Problems with hp-parisc2-cc target when used with "no-asm" flag
|
||||||
|
|
||||||
|
When using the hp-parisc2-cc target, wrong bignum code is generated.
|
||||||
|
This is due to the SIXTY_FOUR_BIT build being compiled with the +O3
|
||||||
|
aggressive optimization.
|
||||||
|
The problem manifests itself by the BN_kronecker test hanging in an
|
||||||
|
endless loop. Reason: the BN_kronecker test calls BN_generate_prime()
|
||||||
|
which itself hangs. The reason could be tracked down to the bn_mul_comba8()
|
||||||
|
function in bn_asm.c. At some occasions the higher 32bit value of r[7]
|
||||||
|
is off by 1 (meaning: calculated=shouldbe+1). Further analysis failed,
|
||||||
|
as no debugger support possible at +O3 and additional fprintf()'s
|
||||||
|
introduced fixed the bug, therefore it is most likely a bug in the
|
||||||
|
optimizer.
|
||||||
|
The bug was found in the BN_kronecker test but may also lead to
|
||||||
|
failures in other parts of the code.
|
||||||
|
(See Ticket #426.)
|
||||||
|
|
||||||
|
Workaround: modify the target to +O2 when building with no-asm.
|
||||||
|
|
||||||
|
* Problems building shared libraries on SCO OpenServer Release 5.0.6
|
||||||
|
with gcc 2.95.3
|
||||||
|
|
||||||
|
The symptoms appear when running the test suite, more specifically
|
||||||
|
test/ectest, with the following result:
|
||||||
|
|
||||||
|
OSSL_LIBPATH="`cd ..; pwd`"; LD_LIBRARY_PATH="$OSSL_LIBPATH:$LD_LIBRARY_PATH"; DYLD_LIBRARY_PATH="$OSSL_LIBPATH:$DYLD_LIBRARY_PATH"; SHLIB_PATH="$OSSL_LIBPATH:$SHLIB_PATH"; LIBPATH="$OSSL_LIBPATH:$LIBPATH"; if [ "debug-sco5-gcc" = "Cygwin" ]; then PATH="${LIBPATH}:$PATH"; fi; export LD_LIBRARY_PATH DYLD_LIBRARY_PATH SHLIB_PATH LIBPATH PATH; ./ectest
|
||||||
|
ectest.c:186: ABORT
|
||||||
|
|
||||||
|
The cause of the problem seems to be that isxdigit(), called from
|
||||||
|
BN_hex2bn(), returns 0 on a perfectly legitimate hex digit. Further
|
||||||
|
investigation shows that any of the isxxx() macros return 0 on any
|
||||||
|
input. A direct look in the information array that the isxxx() use,
|
||||||
|
called __ctype, shows that it contains all zeroes...
|
||||||
|
|
||||||
|
Taking a look at the newly created libcrypto.so with nm, one can see
|
||||||
|
that the variable __ctype is defined in libcrypto's .bss (which
|
||||||
|
explains why it is filled with zeroes):
|
||||||
|
|
||||||
|
$ nm -Pg libcrypto.so | grep __ctype
|
||||||
|
__ctype B 0011659c
|
||||||
|
__ctype2 U
|
||||||
|
|
||||||
|
Curiously, __ctype2 is undefined, in spite of being declared in
|
||||||
|
/usr/include/ctype.h in exactly the same way as __ctype.
|
||||||
|
|
||||||
|
Any information helping to solve this issue would be deeply
|
||||||
|
appreciated.
|
||||||
|
|
||||||
|
NOTE: building non-shared doesn't come with this problem.
|
||||||
|
|
||||||
|
* ULTRIX build fails with shell errors, such as "bad substitution"
|
||||||
|
and "test: argument expected"
|
||||||
|
|
||||||
|
The problem is caused by ULTRIX /bin/sh supporting only original
|
||||||
|
Bourne shell syntax/semantics, and the trouble is that the vast
|
||||||
|
majority is so accustomed to more modern syntax, that very few
|
||||||
|
people [if any] would recognize the ancient syntax even as valid.
|
||||||
|
This inevitably results in non-trivial scripts breaking on ULTRIX,
|
||||||
|
and OpenSSL isn't an exclusion. Fortunately there is workaround,
|
||||||
|
hire /bin/ksh to do the job /bin/sh fails to do.
|
||||||
|
|
||||||
|
1. Trick make(1) to use /bin/ksh by setting up following environ-
|
||||||
|
ment variables *prior* you execute ./Configure and make:
|
||||||
|
|
||||||
|
PROG_ENV=POSIX
|
||||||
|
MAKESHELL=/bin/ksh
|
||||||
|
export PROG_ENV MAKESHELL
|
||||||
|
|
||||||
|
or if your shell is csh-compatible:
|
||||||
|
|
||||||
|
setenv PROG_ENV POSIX
|
||||||
|
setenv MAKESHELL /bin/ksh
|
||||||
|
|
||||||
|
2. Trick /bin/sh to use alternative expression evaluator. Create
|
||||||
|
following 'test' script for example in /tmp:
|
||||||
|
|
||||||
|
#!/bin/ksh
|
||||||
|
${0##*/} "$@"
|
||||||
|
|
||||||
|
Then 'chmod a+x /tmp/test; ln /tmp/test /tmp/[' and *prepend*
|
||||||
|
your $PATH with chosen location, e.g. PATH=/tmp:$PATH. Alter-
|
||||||
|
natively just replace system /bin/test and /bin/[ with the
|
||||||
|
above script.
|
||||||
|
|
||||||
|
* hpux64-ia64-cc fails blowfish test.
|
||||||
|
|
||||||
|
Compiler bug, presumably at particular patch level. It should be noted
|
||||||
|
that same compiler generates correct 32-bit code, a.k.a. hpux-ia64-cc
|
||||||
|
target. Drop optimization level to +O2 when compiling 64-bit bf_skey.o.
|
||||||
|
|
||||||
|
* no-engines generates errors.
|
||||||
|
|
||||||
|
Unfortunately, the 'no-engines' configuration option currently doesn't
|
||||||
|
work properly. Use 'no-hw' and you'll will at least get no hardware
|
||||||
|
support. We'll see how we fix that on OpenSSL versions past 0.9.8.
|
||||||
|
|
||||||
|
* 'make test' fails in BN_sqr [commonly with "error 139" denoting SIGSEGV]
|
||||||
|
if elder GNU binutils were deployed to link shared libcrypto.so.
|
||||||
|
|
||||||
|
As subject suggests the failure is caused by a bug in elder binutils,
|
||||||
|
either as or ld, and was observed on FreeBSD and Linux. There are two
|
||||||
|
options. First is naturally to upgrade binutils, the second one - to
|
||||||
|
reconfigure with additional no-sse2 [or 386] option passed to ./config.
|
||||||
|
|
||||||
|
* If configured with ./config no-dso, toolkit still gets linked with -ldl,
|
||||||
|
which most notably poses a problem when linking with dietlibc.
|
||||||
|
|
||||||
|
We don't have framework to associate -ldl with no-dso, therefore the only
|
||||||
|
way is to edit Makefile right after ./config no-dso and remove -ldl from
|
||||||
|
EX_LIBS line.
|
||||||
|
|
||||||
|
* hpux-parisc2-cc no-asm build fails with SEGV in ECDSA/DH.
|
||||||
|
|
||||||
|
Compiler bug, presumably at particular patch level. Remaining
|
||||||
|
hpux*-parisc*-cc configurations can be affected too. Drop optimization
|
||||||
|
level to +O2 when compiling bn_nist.o.
|
||||||
|
|
||||||
|
* solaris64-sparcv9-cc link failure
|
||||||
|
|
||||||
|
Solaris 8 ar can fail to maintain symbol table in .a, which results in
|
||||||
|
link failures. Apply 109147-09 or later or modify Makefile generated
|
||||||
|
by ./Configure solaris64-sparcv9-cc and replace RANLIB assignment with
|
||||||
|
|
||||||
|
RANLIB= /usr/ccs/bin/ar rs
|
||||||
|
|||||||
61
README
61
README
@@ -1,7 +1,7 @@
|
|||||||
|
|
||||||
OpenSSL 0.9.8-dev XX xxx XXXX
|
OpenSSL 1.0.1n 11 Jun 2015
|
||||||
|
|
||||||
Copyright (c) 1998-2002 The OpenSSL Project
|
Copyright (c) 1998-2011 The OpenSSL Project
|
||||||
Copyright (c) 1995-1998 Eric A. Young, Tim J. Hudson
|
Copyright (c) 1995-1998 Eric A. Young, Tim J. Hudson
|
||||||
All rights reserved.
|
All rights reserved.
|
||||||
|
|
||||||
@@ -36,12 +36,13 @@
|
|||||||
actually logically part of it. It includes routines for the following:
|
actually logically part of it. It includes routines for the following:
|
||||||
|
|
||||||
Ciphers
|
Ciphers
|
||||||
libdes - EAY's libdes DES encryption package which has been floating
|
libdes - EAY's libdes DES encryption package which was floating
|
||||||
around the net for a few years. It includes 15
|
around the net for a few years, and was then relicensed by
|
||||||
'modes/variations' of DES (1, 2 and 3 key versions of ecb,
|
him as part of SSLeay. It includes 15 'modes/variations'
|
||||||
cbc, cfb and ofb; pcbc and a more general form of cfb and
|
of DES (1, 2 and 3 key versions of ecb, cbc, cfb and ofb;
|
||||||
ofb) including desx in cbc mode, a fast crypt(3), and
|
pcbc and a more general form of cfb and ofb) including desx
|
||||||
routines to read passwords from the keyboard.
|
in cbc mode, a fast crypt(3), and routines to read
|
||||||
|
passwords from the keyboard.
|
||||||
RC4 encryption,
|
RC4 encryption,
|
||||||
RC2 encryption - 4 different modes, ecb, cbc, cfb and ofb.
|
RC2 encryption - 4 different modes, ecb, cbc, cfb and ofb.
|
||||||
Blowfish encryption - 4 different modes, ecb, cbc, cfb and ofb.
|
Blowfish encryption - 4 different modes, ecb, cbc, cfb and ofb.
|
||||||
@@ -111,6 +112,10 @@
|
|||||||
should be contacted if that algorithm is to be used; their web page is
|
should be contacted if that algorithm is to be used; their web page is
|
||||||
http://www.ascom.ch/.
|
http://www.ascom.ch/.
|
||||||
|
|
||||||
|
NTT and Mitsubishi have patents and pending patents on the Camellia
|
||||||
|
algorithm, but allow use at no charge without requiring an explicit
|
||||||
|
licensing agreement: http://info.isl.ntt.co.jp/crypt/eng/info/chiteki.html
|
||||||
|
|
||||||
INSTALLATION
|
INSTALLATION
|
||||||
------------
|
------------
|
||||||
|
|
||||||
@@ -132,6 +137,9 @@
|
|||||||
SUPPORT
|
SUPPORT
|
||||||
-------
|
-------
|
||||||
|
|
||||||
|
See the OpenSSL website www.openssl.org for details of how to obtain
|
||||||
|
commercial technical support.
|
||||||
|
|
||||||
If you have any problems with OpenSSL then please take the following steps
|
If you have any problems with OpenSSL then please take the following steps
|
||||||
first:
|
first:
|
||||||
|
|
||||||
@@ -154,10 +162,14 @@
|
|||||||
- Stack Traceback (if the application dumps core)
|
- Stack Traceback (if the application dumps core)
|
||||||
|
|
||||||
Report the bug to the OpenSSL project via the Request Tracker
|
Report the bug to the OpenSSL project via the Request Tracker
|
||||||
(http://www.openssl.org/rt2.html) by mail to:
|
(http://www.openssl.org/support/rt.html) by mail to:
|
||||||
|
|
||||||
openssl-bugs@openssl.org
|
openssl-bugs@openssl.org
|
||||||
|
|
||||||
|
Note that the request tracker should NOT be used for general assistance
|
||||||
|
or support queries. Just because something doesn't work the way you expect
|
||||||
|
does not mean it is necessarily a bug in OpenSSL.
|
||||||
|
|
||||||
Note that mail to openssl-bugs@openssl.org is recorded in the publicly
|
Note that mail to openssl-bugs@openssl.org is recorded in the publicly
|
||||||
readable request tracker database and is forwarded to a public
|
readable request tracker database and is forwarded to a public
|
||||||
mailing list. Confidential mail may be sent to openssl-security@openssl.org
|
mailing list. Confidential mail may be sent to openssl-security@openssl.org
|
||||||
@@ -168,16 +180,34 @@
|
|||||||
|
|
||||||
Development is coordinated on the openssl-dev mailing list (see
|
Development is coordinated on the openssl-dev mailing list (see
|
||||||
http://www.openssl.org for information on subscribing). If you
|
http://www.openssl.org for information on subscribing). If you
|
||||||
would like to submit a patch, send it to openssl-dev@openssl.org with
|
would like to submit a patch, send it to openssl-bugs@openssl.org with
|
||||||
the string "[PATCH]" in the subject. Please be sure to include a
|
the string "[PATCH]" in the subject. Please be sure to include a
|
||||||
textual explanation of what your patch does.
|
textual explanation of what your patch does.
|
||||||
|
|
||||||
Note: For legal reasons, contributions from the US can be accepted only
|
If you are unsure as to whether a feature will be useful for the general
|
||||||
if a TSA notification and a copy of the patch is sent to crypt@bis.doc.gov;
|
OpenSSL community please discuss it on the openssl-dev mailing list first.
|
||||||
see http://www.bis.doc.gov/Encryption/PubAvailEncSourceCodeNofify.html [sic]
|
Someone may be already working on the same thing or there may be a good
|
||||||
and http://w3.access.gpo.gov/bis/ear/pdf/740.pdf (EAR Section 740.13(e)).
|
reason as to why that feature isn't implemented.
|
||||||
|
|
||||||
The preferred format for changes is "diff -u" output. You might
|
Patches should be as up to date as possible, preferably relative to the
|
||||||
|
current Git or the last snapshot. They should follow the coding style of
|
||||||
|
OpenSSL and compile without warnings. Some of the core team developer targets
|
||||||
|
can be used for testing purposes, (debug-steve64, debug-geoff etc). OpenSSL
|
||||||
|
compiles on many varied platforms: try to ensure you only use portable
|
||||||
|
features.
|
||||||
|
|
||||||
|
Note: For legal reasons, contributions from the US can be accepted only
|
||||||
|
if a TSU notification and a copy of the patch are sent to crypt@bis.doc.gov
|
||||||
|
(formerly BXA) with a copy to the ENC Encryption Request Coordinator;
|
||||||
|
please take some time to look at
|
||||||
|
http://www.bis.doc.gov/Encryption/PubAvailEncSourceCodeNofify.html [sic]
|
||||||
|
and
|
||||||
|
http://w3.access.gpo.gov/bis/ear/pdf/740.pdf (EAR Section 740.13(e))
|
||||||
|
for the details. If "your encryption source code is too large to serve as
|
||||||
|
an email attachment", they are glad to receive it by fax instead; hope you
|
||||||
|
have a cheap long-distance plan.
|
||||||
|
|
||||||
|
Our preferred format for changes is "diff -u" output. You might
|
||||||
generate it like this:
|
generate it like this:
|
||||||
|
|
||||||
# cd openssl-work
|
# cd openssl-work
|
||||||
@@ -185,3 +215,4 @@
|
|||||||
# ./Configure dist; make clean
|
# ./Configure dist; make clean
|
||||||
# cd ..
|
# cd ..
|
||||||
# diff -ur openssl-orig openssl-work > mydiffs.patch
|
# diff -ur openssl-orig openssl-work > mydiffs.patch
|
||||||
|
|
||||||
|
|||||||
129
STATUS
129
STATUS
@@ -1,129 +0,0 @@
|
|||||||
|
|
||||||
OpenSSL STATUS Last modified at
|
|
||||||
______________ $Date: 2002/12/07 20:03:42 $
|
|
||||||
|
|
||||||
DEVELOPMENT STATE
|
|
||||||
|
|
||||||
o OpenSSL 0.9.8: Under development...
|
|
||||||
o OpenSSL 0.9.7-beta5: Released on December 5th, 2002
|
|
||||||
o OpenSSL 0.9.7-beta4: Released on November 19th, 2002
|
|
||||||
Debian GNU/Linux (kernel version 2.4.19, gcc 2.95.4) - PASSED
|
|
||||||
o OpenSSL 0.9.7-beta3: Released on July 30th, 2002
|
|
||||||
o OpenSSL 0.9.7-beta2: Released on June 16th, 2002
|
|
||||||
o OpenSSL 0.9.7-beta1: Released on June 1st, 2002
|
|
||||||
o OpenSSL 0.9.6h: Released on December 5th, 2002
|
|
||||||
o OpenSSL 0.9.6g: Released on August 9th, 2002
|
|
||||||
o OpenSSL 0.9.6f: Released on August 8th, 2002
|
|
||||||
o OpenSSL 0.9.6e: Released on July 30th, 2002
|
|
||||||
o OpenSSL 0.9.6d: Released on May 9th, 2002
|
|
||||||
o OpenSSL 0.9.6c: Released on December 21st, 2001
|
|
||||||
o OpenSSL 0.9.6b: Released on July 9th, 2001
|
|
||||||
o OpenSSL 0.9.6a: Released on April 5th, 2001
|
|
||||||
o OpenSSL 0.9.6: Released on September 24th, 2000
|
|
||||||
o OpenSSL 0.9.5a: Released on April 1st, 2000
|
|
||||||
o OpenSSL 0.9.5: Released on February 28th, 2000
|
|
||||||
o OpenSSL 0.9.4: Released on August 09th, 1999
|
|
||||||
o OpenSSL 0.9.3a: Released on May 29th, 1999
|
|
||||||
o OpenSSL 0.9.3: Released on May 25th, 1999
|
|
||||||
o OpenSSL 0.9.2b: Released on March 22th, 1999
|
|
||||||
o OpenSSL 0.9.1c: Released on December 23th, 1998
|
|
||||||
|
|
||||||
[See also http://www.openssl.org/support/rt2.html]
|
|
||||||
|
|
||||||
RELEASE SHOWSTOPPERS
|
|
||||||
|
|
||||||
o BN_mod_mul verification fails for mips3-sgi-irix
|
|
||||||
unless configured with no-asm
|
|
||||||
|
|
||||||
o [2002-11-21]
|
|
||||||
PR 343 mentions that scrubbing memory with 'memset(ptr, 0, n)' may
|
|
||||||
be optimized away in modern compilers. This is definitely not good
|
|
||||||
and needs to be fixed immediately. The formula to use is presented
|
|
||||||
in:
|
|
||||||
|
|
||||||
http://online.securityfocus.com/archive/82/297918/2002-10-27/2002-11-02/0
|
|
||||||
|
|
||||||
The problem report that mentions this is:
|
|
||||||
|
|
||||||
https://www.aet.TU-Cottbus.DE/rt2/Ticket/Display.html?id=343
|
|
||||||
|
|
||||||
AVAILABLE PATCHES
|
|
||||||
|
|
||||||
o
|
|
||||||
|
|
||||||
IN PROGRESS
|
|
||||||
|
|
||||||
o Steve is currently working on (in no particular order):
|
|
||||||
ASN1 code redesign, butchery, replacement.
|
|
||||||
OCSP
|
|
||||||
EVP cipher enhancement.
|
|
||||||
Enhanced certificate chain verification.
|
|
||||||
Private key, certificate and CRL API and implementation.
|
|
||||||
Developing and bugfixing PKCS#7 (S/MIME code).
|
|
||||||
Various X509 issues: character sets, certificate request extensions.
|
|
||||||
o Geoff and Richard are currently working on:
|
|
||||||
ENGINE (the new code that gives hardware support among others).
|
|
||||||
o Richard is currently working on:
|
|
||||||
UI (User Interface)
|
|
||||||
UTIL (a new set of library functions to support some higher level
|
|
||||||
functionality that is currently missing).
|
|
||||||
Shared library support for VMS.
|
|
||||||
Kerberos 5 authentication (Heimdal)
|
|
||||||
Constification
|
|
||||||
Compression
|
|
||||||
Attribute Certificate support
|
|
||||||
Certificate Pair support
|
|
||||||
Storage Engines (primarly an LDAP storage engine)
|
|
||||||
|
|
||||||
NEEDS PATCH
|
|
||||||
|
|
||||||
o 0.9.8-dev: COMPLEMENTOFALL and COMPLEMENTOFDEFAULT do not
|
|
||||||
handle ECCdraft cipher suites correctly.
|
|
||||||
|
|
||||||
o apps/ca.c: "Sign the certificate?" - "n" creates empty certificate file
|
|
||||||
|
|
||||||
o "OpenSSL STATUS" is never up-to-date.
|
|
||||||
|
|
||||||
OPEN ISSUES
|
|
||||||
|
|
||||||
o The Makefile hierarchy and build mechanism is still not a round thing:
|
|
||||||
|
|
||||||
1. The config vs. Configure scripts
|
|
||||||
It's the same nasty situation as for Apache with APACI vs.
|
|
||||||
src/Configure. It confuses.
|
|
||||||
Suggestion: Merge Configure and config into a single configure
|
|
||||||
script with a Autoconf style interface ;-) and remove
|
|
||||||
Configure and config. Or even let us use GNU Autoconf
|
|
||||||
itself. Then we can avoid a lot of those platform checks
|
|
||||||
which are currently in Configure.
|
|
||||||
|
|
||||||
o Support for Shared Libraries has to be added at least
|
|
||||||
for the major Unix platforms. The details we can rip from the stuff
|
|
||||||
Ralf has done for the Apache src/Configure script. Ben wants the
|
|
||||||
solution to be really simple.
|
|
||||||
|
|
||||||
Status: Ralf will look how we can easily incorporate the
|
|
||||||
compiler PIC and linker DSO flags from Apache
|
|
||||||
into the OpenSSL Configure script.
|
|
||||||
|
|
||||||
Ulf: +1 for using GNU autoconf and libtool (but not automake,
|
|
||||||
which apparently is not flexible enough to generate
|
|
||||||
libcrypto)
|
|
||||||
|
|
||||||
WISHES
|
|
||||||
|
|
||||||
o Add variants of DH_generate_parameters() and BN_generate_prime() [etc?]
|
|
||||||
where the callback function can request that the function be aborted.
|
|
||||||
[Gregory Stark <ghstark@pobox.com>, <rayyang2000@yahoo.com>]
|
|
||||||
|
|
||||||
o SRP in TLS.
|
|
||||||
[wished by:
|
|
||||||
Dj <derek@yo.net>, Tom Wu <tom@arcot.com>,
|
|
||||||
Tom Holroyd <tomh@po.crl.go.jp>]
|
|
||||||
|
|
||||||
See http://search.ietf.org/internet-drafts/draft-ietf-tls-srp-00.txt
|
|
||||||
as well as http://www-cs-students.stanford.edu/~tjw/srp/.
|
|
||||||
|
|
||||||
Tom Holroyd tells us there is a SRP patch for OpenSSH at
|
|
||||||
http://members.tripod.com/professor_tom/archives/, that could
|
|
||||||
be useful.
|
|
||||||
34
VMS/VMSify-conf.pl
Normal file
34
VMS/VMSify-conf.pl
Normal file
@@ -0,0 +1,34 @@
|
|||||||
|
#! /usr/bin/perl
|
||||||
|
|
||||||
|
use strict;
|
||||||
|
use warnings;
|
||||||
|
|
||||||
|
my @directory_vars = ( "dir", "certs", "crl_dir", "new_certs_dir" );
|
||||||
|
my @file_vars = ( "database", "certificate", "serial", "crlnumber",
|
||||||
|
"crl", "private_key", "RANDFILE" );
|
||||||
|
while(<STDIN>) {
|
||||||
|
chomp;
|
||||||
|
foreach my $d (@directory_vars) {
|
||||||
|
if (/^(\s*\#?\s*${d}\s*=\s*)\.\/([^\s\#]*)([\s\#].*)$/) {
|
||||||
|
$_ = "$1sys\\\$disk:\[.$2$3";
|
||||||
|
} elsif (/^(\s*\#?\s*${d}\s*=\s*)(\w[^\s\#]*)([\s\#].*)$/) {
|
||||||
|
$_ = "$1sys\\\$disk:\[.$2$3";
|
||||||
|
}
|
||||||
|
s/^(\s*\#?\s*${d}\s*=\s*\$\w+)\/([^\s\#]*)([\s\#].*)$/$1.$2\]$3/;
|
||||||
|
while(/^(\s*\#?\s*${d}\s*=\s*(\$\w+\.|sys\\\$disk:\[\.)[\w\.]+)\/([^\]]*)\](.*)$/) {
|
||||||
|
$_ = "$1.$3]$4";
|
||||||
|
}
|
||||||
|
}
|
||||||
|
foreach my $f (@file_vars) {
|
||||||
|
s/^(\s*\#?\s*${f}\s*=\s*)\.\/(.*)$/$1sys\\\$disk:\[\/$2/;
|
||||||
|
while(/^(\s*\#?\s*${f}\s*=\s*(\$\w+|sys\\\$disk:\[)[^\/]*)\/(\w+\/[^\s\#]*)([\s\#].*)$/) {
|
||||||
|
$_ = "$1.$3$4";
|
||||||
|
}
|
||||||
|
if (/^(\s*\#?\s*${f}\s*=\s*(\$\w+|sys\\\$disk:\[)[^\/]*)\/(\w+)([\s\#].*)$/) {
|
||||||
|
$_ = "$1]$3.$4";
|
||||||
|
} elsif (/^(\s*\#?\s*${f}\s*=\s*(\$\w+|sys\\\$disk:\[)[^\/]*)\/([^\s\#]*)([\s\#].*)$/) {
|
||||||
|
$_ = "$1]$3$4";
|
||||||
|
}
|
||||||
|
}
|
||||||
|
print $_,"\n";
|
||||||
|
}
|
||||||
67
VMS/install-vms.com
Executable file
67
VMS/install-vms.com
Executable file
@@ -0,0 +1,67 @@
|
|||||||
|
$! install-vms.com -- Installs the files in a given directory tree
|
||||||
|
$!
|
||||||
|
$! Author: Richard Levitte <richard@levitte.org>
|
||||||
|
$! Time of creation: 23-MAY-1998 19:22
|
||||||
|
$!
|
||||||
|
$! P1 root of the directory tree
|
||||||
|
$!
|
||||||
|
$!
|
||||||
|
$! Announce/identify.
|
||||||
|
$!
|
||||||
|
$ proc = f$environment( "procedure")
|
||||||
|
$ write sys$output "@@@ "+ -
|
||||||
|
f$parse( proc, , , "name")+ f$parse( proc, , , "type")
|
||||||
|
$!
|
||||||
|
$ on error then goto tidy
|
||||||
|
$ on control_c then goto tidy
|
||||||
|
$!
|
||||||
|
$ if p1 .eqs. ""
|
||||||
|
$ then
|
||||||
|
$ write sys$output "First argument missing."
|
||||||
|
$ write sys$output -
|
||||||
|
"Should be the directory where you want things installed."
|
||||||
|
$ exit
|
||||||
|
$ endif
|
||||||
|
$
|
||||||
|
$ if (f$getsyi( "cpu") .lt. 128)
|
||||||
|
$ then
|
||||||
|
$ arch = "VAX"
|
||||||
|
$ else
|
||||||
|
$ arch = f$edit( f$getsyi( "arch_name"), "upcase")
|
||||||
|
$ if (arch .eqs. "") then arch = "UNK"
|
||||||
|
$ endif
|
||||||
|
$
|
||||||
|
$ root = f$parse( P1, "[]A.;0", , , "SYNTAX_ONLY, NO_CONCEAL")- "A.;0"
|
||||||
|
$ root_dev = f$parse( root, , , "device", "syntax_only")
|
||||||
|
$ root_dir = f$parse( root, , , "directory", "syntax_only") - -
|
||||||
|
"[000000." - "][" - "[" - "]"
|
||||||
|
$ root = root_dev + "[" + root_dir
|
||||||
|
$
|
||||||
|
$ define /nolog wrk_sslroot 'root'.] /translation_attributes = concealed
|
||||||
|
$ define /nolog wrk_sslinclude wrk_sslroot:[include]
|
||||||
|
$
|
||||||
|
$ if f$parse( "wrk_sslroot:[000000]") .eqs. "" then -
|
||||||
|
create /directory /log wrk_sslroot:[000000]
|
||||||
|
$ if f$parse( "wrk_sslinclude:") .eqs. "" then -
|
||||||
|
create /directory /log wrk_sslinclude:
|
||||||
|
$ if f$parse( "wrk_sslroot:[vms]") .eqs. "" then -
|
||||||
|
create /directory /log wrk_sslroot:[vms]
|
||||||
|
$!
|
||||||
|
$ copy /log /protection = world:re openssl_startup.com wrk_sslroot:[vms]
|
||||||
|
$ copy /log /protection = world:re openssl_undo.com wrk_sslroot:[vms]
|
||||||
|
$ copy /log /protection = world:re openssl_utils.com wrk_sslroot:[vms]
|
||||||
|
$!
|
||||||
|
$ tidy:
|
||||||
|
$!
|
||||||
|
$ call deass wrk_sslroot
|
||||||
|
$ call deass wrk_sslinclude
|
||||||
|
$!
|
||||||
|
$ exit
|
||||||
|
$!
|
||||||
|
$ deass: subroutine
|
||||||
|
$ if (f$trnlnm( p1, "LNM$PROCESS") .nes. "")
|
||||||
|
$ then
|
||||||
|
$ deassign /process 'p1'
|
||||||
|
$ endif
|
||||||
|
$ endsubroutine
|
||||||
|
$!
|
||||||
@@ -1,72 +0,0 @@
|
|||||||
$! INSTALL.COM -- Installs the files in a given directory tree
|
|
||||||
$!
|
|
||||||
$! Author: Richard Levitte <richard@levitte.org>
|
|
||||||
$! Time of creation: 23-MAY-1998 19:22
|
|
||||||
$!
|
|
||||||
$! P1 root of the directory tree
|
|
||||||
$!
|
|
||||||
$ IF P1 .EQS. ""
|
|
||||||
$ THEN
|
|
||||||
$ WRITE SYS$OUTPUT "First argument missing."
|
|
||||||
$ WRITE SYS$OUTPUT "Should be the directory where you want things installed."
|
|
||||||
$ EXIT
|
|
||||||
$ ENDIF
|
|
||||||
$
|
|
||||||
$ ROOT = F$PARSE(P1,"[]A.;0",,,"SYNTAX_ONLY,NO_CONCEAL") - "A.;0"
|
|
||||||
$ ROOT_DEV = F$PARSE(ROOT,,,"DEVICE","SYNTAX_ONLY")
|
|
||||||
$ ROOT_DIR = F$PARSE(ROOT,,,"DIRECTORY","SYNTAX_ONLY") -
|
|
||||||
- "[000000." - "][" - "[" - "]"
|
|
||||||
$ ROOT = ROOT_DEV + "[" + ROOT_DIR
|
|
||||||
$
|
|
||||||
$ DEFINE/NOLOG WRK_SSLROOT 'ROOT'.] /TRANS=CONC
|
|
||||||
$ DEFINE/NOLOG WRK_SSLVLIB WRK_SSLROOT:[VAX_LIB]
|
|
||||||
$ DEFINE/NOLOG WRK_SSLALIB WRK_SSLROOT:[ALPHA_LIB]
|
|
||||||
$ DEFINE/NOLOG WRK_SSLINCLUDE WRK_SSLROOT:[INCLUDE]
|
|
||||||
$ DEFINE/NOLOG WRK_SSLVEXE WRK_SSLROOT:[VAX_EXE]
|
|
||||||
$ DEFINE/NOLOG WRK_SSLAEXE WRK_SSLROOT:[ALPHA_EXE]
|
|
||||||
$ DEFINE/NOLOG WRK_SSLCERTS WRK_SSLROOT:[CERTS]
|
|
||||||
$ DEFINE/NOLOG WRK_SSLPRIVATE WRK_SSLROOT:[PRIVATE]
|
|
||||||
$
|
|
||||||
$ IF F$PARSE("WRK_SSLROOT:[000000]") .EQS. "" THEN -
|
|
||||||
CREATE/DIR/LOG WRK_SSLROOT:[000000]
|
|
||||||
$ IF F$PARSE("WRK_SSLINCLUDE:") .EQS. "" THEN -
|
|
||||||
CREATE/DIR/LOG WRK_SSLINCLUDE:
|
|
||||||
$ IF F$PARSE("WRK_SSLROOT:[VMS]") .EQS. "" THEN -
|
|
||||||
CREATE/DIR/LOG WRK_SSLROOT:[VMS]
|
|
||||||
$
|
|
||||||
$ IF F$SEARCH("WRK_SSLINCLUDE:vms_idhacks.h") .NES. "" THEN -
|
|
||||||
DELETE WRK_SSLINCLUDE:vms_idhacks.h;*
|
|
||||||
$
|
|
||||||
$ OPEN/WRITE SF WRK_SSLROOT:[VMS]OPENSSL_STARTUP.COM
|
|
||||||
$ WRITE SYS$OUTPUT "%OPEN-I-CREATED, ",F$SEARCH("WRK_SSLROOT:[VMS]OPENSSL_STARTUP.COM")," created."
|
|
||||||
$ WRITE SF "$! Startup file for Openssl 0.9.2-RL 15-Mar-1999"
|
|
||||||
$ WRITE SF "$!"
|
|
||||||
$ WRITE SF "$! Do not edit this file, as it will be regenerated during next installation."
|
|
||||||
$ WRITE SF "$! Instead, add or change SSLROOT:[VMS]OPENSSL_SYSTARTUP.COM"
|
|
||||||
$ WRITE SF "$!"
|
|
||||||
$ WRITE SF "$! P1 a qualifier to DEFINE. For example ""/SYSTEM"" to get the logical names"
|
|
||||||
$ WRITE SF "$! defined in the system logical name table."
|
|
||||||
$ WRITE SF "$!"
|
|
||||||
$ WRITE SF "$ ARCH = ""VAX"""
|
|
||||||
$ WRITE SF "$ IF F$GETSYI(""CPU"") .GE. 128 THEN ARCH = ""ALPHA"""
|
|
||||||
$ WRITE SF "$ DEFINE/NOLOG'P1 SSLROOT ",ROOT,".] /TRANS=CONC"
|
|
||||||
$ WRITE SF "$ DEFINE/NOLOG'P1 SSLLIB SSLROOT:['ARCH'_LIB]"
|
|
||||||
$ WRITE SF "$ DEFINE/NOLOG'P1 SSLINCLUDE SSLROOT:[INCLUDE]"
|
|
||||||
$ WRITE SF "$ DEFINE/NOLOG'P1 SSLEXE SSLROOT:['ARCH'_EXE]"
|
|
||||||
$ WRITE SF "$ DEFINE/NOLOG'P1 SSLCERTS SSLROOT:[CERTS]"
|
|
||||||
$ WRITE SF "$ DEFINE/NOLOG'P1 SSLPRIVATE SSLROOT:[PRIVATE]"
|
|
||||||
$ WRITE SF "$"
|
|
||||||
$ WRITE SF "$! This is program can include <openssl/{foo}.h>"
|
|
||||||
$ WRITE SF "$ DEFINE/NOLOG'P1 OPENSSL SSLINCLUDE:"
|
|
||||||
$ WRITE SF "$"
|
|
||||||
$ WRITE SF "$ IF F$SEARCH(""SSLROOT:[VMS]OPENSSL_SYSTARTUP.COM"") .NES."""" THEN -"
|
|
||||||
$ WRITE SF " @SSLROOT:[VMS]OPENSSL_SYSTARTUP.COM"
|
|
||||||
$ WRITE SF "$"
|
|
||||||
$ WRITE SF "$ EXIT"
|
|
||||||
$ CLOSE SF
|
|
||||||
$ SET FILE/PROT=WORLD:RE WRK_SSLROOT:[VMS]OPENSSL_STARTUP.COM
|
|
||||||
$
|
|
||||||
$ COPY OPENSSL_UTILS.COM WRK_SSLROOT:[VMS]/LOG
|
|
||||||
$ SET FILE/PROT=WORLD:RE WRK_SSLROOT:[VMS]OPENSSL_UTILS.COM
|
|
||||||
$
|
|
||||||
$ EXIT
|
|
||||||
276
VMS/mkshared.com
276
VMS/mkshared.com
@@ -1,77 +1,168 @@
|
|||||||
$! MKSHARED.COM -- script to created shareable images on VMS
|
$! MKSHARED.COM -- Create shareable images.
|
||||||
$!
|
$!
|
||||||
$! No command line parameters. This should be run at the start of the source
|
$! P1: "64" for 64-bit pointers.
|
||||||
$! tree (the same directory where one finds INSTALL.VMS).
|
|
||||||
$!
|
$!
|
||||||
$! Input: [.UTIL]LIBEAY.NUM,[.AXP.EXE.CRYPTO]LIBCRYPTO.OLB
|
$! P2: Zlib object library path (optional).
|
||||||
$! [.UTIL]SSLEAY.NUM,[.AXP.EXE.SSL]LIBSSL.OLB
|
$!
|
||||||
$! Output: [.AXP.EXE.CRYPTO]LIBCRYPTO.OPT,.MAP,.EXE
|
$! Input: [.UTIL]LIBEAY.NUM,[.xxx.EXE.CRYPTO]SSL_LIBCRYPTO[32].OLB
|
||||||
$! [.AXP.EXE.SSL]LIBSSL.OPT,.MAP,.EXE
|
$! [.UTIL]SSLEAY.NUM,[.xxx.EXE.SSL]SSL_LIBSSL[32].OLB
|
||||||
|
$! [.CRYPTO.xxx]OPENSSLCONF.H
|
||||||
|
$! Output: [.xxx.EXE.CRYPTO]SSL_LIBCRYPTO_SHR[32].OPT,.MAP,.EXE
|
||||||
|
$! [.xxx.EXE.SSL]SSL_LIBSSL_SRH[32].OPT,.MAP,.EXE
|
||||||
$!
|
$!
|
||||||
$! So far, tests have only been made on VMS for Alpha. VAX will come in time.
|
$! So far, tests have only been made on VMS for Alpha. VAX will come in time.
|
||||||
$! ===========================================================================
|
$! ===========================================================================
|
||||||
$
|
$!
|
||||||
|
$! Announce/identify.
|
||||||
|
$!
|
||||||
|
$ proc = f$environment( "procedure")
|
||||||
|
$ write sys$output "@@@ "+ -
|
||||||
|
f$parse( proc, , , "name")+ f$parse( proc, , , "type")
|
||||||
|
$!
|
||||||
|
$! Save the original default device:[directory].
|
||||||
|
$!
|
||||||
|
$ def_orig = f$environment( "default")
|
||||||
|
$ on error then goto tidy
|
||||||
|
$ on control_c then goto tidy
|
||||||
|
$!
|
||||||
|
$! SET DEFAULT to the main kit directory.
|
||||||
|
$!
|
||||||
|
$ proc = f$environment("procedure")
|
||||||
|
$ proc = f$parse( "A.;", proc)- "A.;"
|
||||||
|
$ set default 'proc'
|
||||||
|
$ set default [-]
|
||||||
|
$!
|
||||||
$! ----- Prepare info for processing: version number and file info
|
$! ----- Prepare info for processing: version number and file info
|
||||||
$ gosub read_version_info
|
$ gosub read_version_info
|
||||||
$ if libver .eqs. ""
|
$ if libver .eqs. ""
|
||||||
$ then
|
$ then
|
||||||
$ write sys$error "ERROR: Couldn't find any library version info..."
|
$ write sys$error "ERROR: Couldn't find any library version info..."
|
||||||
$ exit
|
$ go to tidy:
|
||||||
$ endif
|
$ endif
|
||||||
$
|
$
|
||||||
$ if f$getsyi("CPU") .ge. 128
|
$ if (f$getsyi("cpu") .lt. 128)
|
||||||
$ then
|
$ then
|
||||||
$ libid = "Crypto"
|
$ arch_vax = 1
|
||||||
$ libnum = "[.UTIL]LIBEAY.NUM"
|
$ arch = "VAX"
|
||||||
$ libdir = "[.AXP.EXE.CRYPTO]"
|
|
||||||
$ libolb = "''libdir'LIBCRYPTO.OLB"
|
|
||||||
$ libopt = "''libdir'LIBCRYPTO.OPT"
|
|
||||||
$ libmap = "''libdir'LIBCRYPTO.MAP"
|
|
||||||
$ libgoal= "''libdir'LIBCRYPTO.EXE"
|
|
||||||
$ libref = ""
|
|
||||||
$ gosub create_axp_shr
|
|
||||||
$ libid = "SSL"
|
|
||||||
$ libnum = "[.UTIL]SSLEAY.NUM"
|
|
||||||
$ libdir = "[.AXP.EXE.SSL]"
|
|
||||||
$ libolb = "''libdir'LIBSSL.OLB"
|
|
||||||
$ libopt = "''libdir'LIBSSL.OPT"
|
|
||||||
$ libmap = "''libdir'LIBSSL.MAP"
|
|
||||||
$ libgoal= "''libdir'LIBSSL.EXE"
|
|
||||||
$ libref = "[.AXP.EXE.CRYPTO]LIBCRYPTO.EXE"
|
|
||||||
$ gosub create_axp_shr
|
|
||||||
$ else
|
$ else
|
||||||
|
$ arch_vax = 0
|
||||||
|
$ arch = f$edit( f$getsyi( "ARCH_NAME"), "UPCASE")
|
||||||
|
$ if (arch .eqs. "") then arch = "UNK"
|
||||||
|
$ endif
|
||||||
|
$!
|
||||||
|
$ archd = arch
|
||||||
|
$ lib32 = "32"
|
||||||
|
$ shr = "SHR32"
|
||||||
|
$!
|
||||||
|
$ if (p1 .nes. "")
|
||||||
|
$ then
|
||||||
|
$ if (p1 .eqs. "64")
|
||||||
|
$ then
|
||||||
|
$ archd = arch+ "_64"
|
||||||
|
$ lib32 = ""
|
||||||
|
$ shr = "SHR"
|
||||||
|
$ else
|
||||||
|
$ if (p1 .nes. "32")
|
||||||
|
$ then
|
||||||
|
$ write sys$output "Second argument invalid."
|
||||||
|
$ write sys$output "It should be "32", "64", or nothing."
|
||||||
|
$ exit
|
||||||
|
$ endif
|
||||||
|
$ endif
|
||||||
|
$ endif
|
||||||
|
$!
|
||||||
|
$! ----- Prepare info for processing: disabled algorithms info
|
||||||
|
$ gosub read_disabled_algorithms_info
|
||||||
|
$!
|
||||||
|
$ ZLIB = p2
|
||||||
|
$ zlib_lib = ""
|
||||||
|
$ if (ZLIB .nes. "")
|
||||||
|
$ then
|
||||||
|
$ file2 = f$parse( ZLIB, "libz.olb", , , "syntax_only")
|
||||||
|
$ if (f$search( file2) .eqs. "")
|
||||||
|
$ then
|
||||||
|
$ write sys$output ""
|
||||||
|
$ write sys$output "The Option ", ZLIB, " Is Invalid."
|
||||||
|
$ write sys$output " Can't find library: ''file2'"
|
||||||
|
$ write sys$output ""
|
||||||
|
$ goto tidy
|
||||||
|
$ endif
|
||||||
|
$ zlib_lib = ", ''file2' /library"
|
||||||
|
$ endif
|
||||||
|
$!
|
||||||
|
$ if (arch_vax)
|
||||||
|
$ then
|
||||||
$ libtit = "CRYPTO_TRANSFER_VECTOR"
|
$ libtit = "CRYPTO_TRANSFER_VECTOR"
|
||||||
$ libid = "Crypto"
|
$ libid = "Crypto"
|
||||||
$ libnum = "[.UTIL]LIBEAY.NUM"
|
$ libnum = "[.UTIL]LIBEAY.NUM"
|
||||||
$ libdir = "[.VAX.EXE.CRYPTO]"
|
$ libdir = "[.''ARCHD'.EXE.CRYPTO]"
|
||||||
$ libmar = "''libdir'LIBCRYPTO.MAR"
|
$ libmar = "''libdir'SSL_LIBCRYPTO_''shr'.MAR"
|
||||||
$ libolb = "''libdir'LIBCRYPTO.OLB"
|
$ libolb = "''libdir'SSL_LIBCRYPTO''lib32'.OLB"
|
||||||
$ libopt = "''libdir'LIBCRYPTO.OPT"
|
$ libopt = "''libdir'SSL_LIBCRYPTO_''shr'.OPT"
|
||||||
$ libobj = "''libdir'LIBCRYPTO.OBJ"
|
$ libobj = "''libdir'SSL_LIBCRYPTO_''shr'.OBJ"
|
||||||
$ libmap = "''libdir'LIBCRYPTO.MAP"
|
$ libmap = "''libdir'SSL_LIBCRYPTO_''shr'.MAP"
|
||||||
$ libgoal= "''libdir'LIBCRYPTO.EXE"
|
$ libgoal= "''libdir'SSL_LIBCRYPTO_''shr'.EXE"
|
||||||
$ libref = ""
|
$ libref = ""
|
||||||
$ libvec = "LIBCRYPTO"
|
$ libvec = "LIBCRYPTO"
|
||||||
$ gosub create_vax_shr
|
$ if f$search( libolb) .nes. "" then gosub create_vax_shr
|
||||||
$ libtit = "SSL_TRANSFER_VECTOR"
|
$ libtit = "SSL_TRANSFER_VECTOR"
|
||||||
$ libid = "SSL"
|
$ libid = "SSL"
|
||||||
$ libnum = "[.UTIL]SSLEAY.NUM"
|
$ libnum = "[.UTIL]SSLEAY.NUM"
|
||||||
$ libdir = "[.VAX.EXE.SSL]"
|
$ libdir = "[.''ARCHD'.EXE.SSL]"
|
||||||
$ libmar = "''libdir'LIBSSL.MAR"
|
$ libmar = "''libdir'SSL_LIBSSL_''shr'.MAR"
|
||||||
$ libolb = "''libdir'LIBSSL.OLB"
|
$ libolb = "''libdir'SSL_LIBSSL''lib32'.OLB"
|
||||||
$ libopt = "''libdir'LIBSSL.OPT"
|
$ libopt = "''libdir'SSL_LIBSSL_''shr'.OPT"
|
||||||
$ libobj = "''libdir'LIBSSL.OBJ"
|
$ libobj = "''libdir'SSL_LIBSSL_''shr'.OBJ"
|
||||||
$ libmap = "''libdir'LIBSSL.MAP"
|
$ libmap = "''libdir'SSL_LIBSSL_''shr'.MAP"
|
||||||
$ libgoal= "''libdir'LIBSSL.EXE"
|
$ libgoal= "''libdir'SSL_LIBSSL_''shr'.EXE"
|
||||||
$ libref = "[.VAX.EXE.CRYPTO]LIBCRYPTO.EXE"
|
$ libref = "[.''ARCHD'.EXE.CRYPTO]SSL_LIBCRYPTO_''shr'.EXE"
|
||||||
$ libvec = "LIBSSL"
|
$ libvec = "LIBSSL"
|
||||||
$ gosub create_vax_shr
|
$ if f$search( libolb) .nes. "" then gosub create_vax_shr
|
||||||
|
$ else
|
||||||
|
$ libid = "Crypto"
|
||||||
|
$ libnum = "[.UTIL]LIBEAY.NUM"
|
||||||
|
$ libdir = "[.''ARCHD'.EXE.CRYPTO]"
|
||||||
|
$ libolb = "''libdir'SSL_LIBCRYPTO''lib32'.OLB"
|
||||||
|
$ libopt = "''libdir'SSL_LIBCRYPTO_''shr'.OPT"
|
||||||
|
$ libmap = "''libdir'SSL_LIBCRYPTO_''shr'.MAP"
|
||||||
|
$ libgoal= "''libdir'SSL_LIBCRYPTO_''shr'.EXE"
|
||||||
|
$ libref = ""
|
||||||
|
$ if f$search( libolb) .nes. "" then gosub create_nonvax_shr
|
||||||
|
$ libid = "SSL"
|
||||||
|
$ libnum = "[.UTIL]SSLEAY.NUM"
|
||||||
|
$ libdir = "[.''ARCHD'.EXE.SSL]"
|
||||||
|
$ libolb = "''libdir'SSL_LIBSSL''lib32'.OLB"
|
||||||
|
$ libopt = "''libdir'SSL_LIBSSL_''shr'.OPT"
|
||||||
|
$ libmap = "''libdir'SSL_LIBSSL_''shr'.MAP"
|
||||||
|
$ libgoal= "''libdir'SSL_LIBSSL_''shr'.EXE"
|
||||||
|
$ libref = "[.''ARCHD'.EXE.CRYPTO]SSL_LIBCRYPTO_''shr'.EXE"
|
||||||
|
$ if f$search( libolb) .nes. "" then gosub create_nonvax_shr
|
||||||
$ endif
|
$ endif
|
||||||
|
$!
|
||||||
|
$ tidy:
|
||||||
|
$!
|
||||||
|
$! Close any open files.
|
||||||
|
$!
|
||||||
|
$ if (f$trnlnm( "libnum", "LNM$PROCESS", 0, "SUPERVISOR") .nes. "") then -
|
||||||
|
close libnum
|
||||||
|
$!
|
||||||
|
$ if (f$trnlnm( "mar", "LNM$PROCESS", 0, "SUPERVISOR") .nes. "") then -
|
||||||
|
close mar
|
||||||
|
$!
|
||||||
|
$ if (f$trnlnm( "opt", "LNM$PROCESS", 0, "SUPERVISOR") .nes. "") then -
|
||||||
|
close opt
|
||||||
|
$!
|
||||||
|
$ if (f$trnlnm( "vf", "LNM$PROCESS", 0, "SUPERVISOR") .nes. "") then -
|
||||||
|
close vf
|
||||||
|
$!
|
||||||
|
$! Restore the original default device:[directory].
|
||||||
|
$!
|
||||||
|
$ set default 'def_orig'
|
||||||
$ exit
|
$ exit
|
||||||
$
|
$
|
||||||
$! ----- Soubroutines to actually build the shareable libraries
|
$! ----- Subroutines to build the shareable libraries
|
||||||
$! The way things work, there's a main shareable library creator for each
|
$! For each supported architecture, there's a main shareable library
|
||||||
$! supported architecture, which is called from the main code above.
|
$! creator, which is called from the main code above.
|
||||||
$! The creator will define a number of variables to tell the next levels of
|
$! The creator will define a number of variables to tell the next levels of
|
||||||
$! subroutines what routines to use to write to the option files, call the
|
$! subroutines what routines to use to write to the option files, call the
|
||||||
$! main processor, read_func_num, and when that is done, it will write version
|
$! main processor, read_func_num, and when that is done, it will write version
|
||||||
@@ -97,28 +188,29 @@ $! read_func_num depends on the following variables from the creator:
|
|||||||
$! libwriter The name of the writer routine to call for each .num file line
|
$! libwriter The name of the writer routine to call for each .num file line
|
||||||
$! -----
|
$! -----
|
||||||
$
|
$
|
||||||
$! ----- Subroutines for AXP
|
$! ----- Subroutines for non-VAX
|
||||||
$! -----
|
$! -----
|
||||||
$! The creator routine
|
$! The creator routine
|
||||||
$ create_axp_shr:
|
$ create_nonvax_shr:
|
||||||
$ open/write opt 'libopt'
|
$ open /write opt 'libopt'
|
||||||
$ write opt "identification=""",libid," ",libverstr,""""
|
$ write opt "identification=""",libid," ",libverstr,""""
|
||||||
$ write opt libolb,"/lib"
|
$ write opt libolb, " /library"
|
||||||
$ if libref .nes. "" then write opt libref,"/SHARE"
|
$ if libref .nes. "" then write opt libref,"/SHARE"
|
||||||
$ write opt "SYMBOL_VECTOR=(-"
|
$ write opt "SYMBOL_VECTOR=(-"
|
||||||
$ libfirstentry := true
|
$ libfirstentry := true
|
||||||
$ libwrch := opt
|
$ libwrch := opt
|
||||||
$ libwriter := write_axp_transfer_entry
|
$ libwriter := write_nonvax_transfer_entry
|
||||||
$ textcount = 0
|
$ textcount = 0
|
||||||
$ gosub read_func_num
|
$ gosub read_func_num
|
||||||
$ write opt ")"
|
$ write opt ")"
|
||||||
$ write opt "GSMATCH=",libvmatch,",",libver
|
$ write opt "GSMATCH=",libvmatch,",",libver
|
||||||
$ close opt
|
$ close opt
|
||||||
$ link/map='libmap'/full/share='libgoal' 'libopt'/option
|
$ link /map = 'libmap' /full /share = 'libgoal' 'libopt' /options -
|
||||||
|
'zlib_lib'
|
||||||
$ return
|
$ return
|
||||||
$
|
$
|
||||||
$! The record writer routine
|
$! The record writer routine
|
||||||
$ write_axp_transfer_entry:
|
$ write_nonvax_transfer_entry:
|
||||||
$ if libentry .eqs. ".dummy" then return
|
$ if libentry .eqs. ".dummy" then return
|
||||||
$ if info_kind .eqs. "VARIABLE"
|
$ if info_kind .eqs. "VARIABLE"
|
||||||
$ then
|
$ then
|
||||||
@@ -144,11 +236,11 @@ $ libfirstentry := false
|
|||||||
$ textcount = textcount + textcount_this
|
$ textcount = textcount + textcount_this
|
||||||
$ return
|
$ return
|
||||||
$
|
$
|
||||||
$! ----- Subroutines for AXP
|
$! ----- Subroutines for VAX
|
||||||
$! -----
|
$! -----
|
||||||
$! The creator routine
|
$! The creator routine
|
||||||
$ create_vax_shr:
|
$ create_vax_shr:
|
||||||
$ open/write mar 'libmar'
|
$ open /write mar 'libmar'
|
||||||
$ type sys$input:/out=mar:
|
$ type sys$input:/out=mar:
|
||||||
;
|
;
|
||||||
; Transfer vector for VAX shareable image
|
; Transfer vector for VAX shareable image
|
||||||
@@ -183,10 +275,10 @@ $! libwriter := write_vax_vtransfer_entry
|
|||||||
$! gosub read_func_num
|
$! gosub read_func_num
|
||||||
$ write mar " .END"
|
$ write mar " .END"
|
||||||
$ close mar
|
$ close mar
|
||||||
$ open/write opt 'libopt'
|
$ open /write opt 'libopt'
|
||||||
$ write opt "identification=""",libid," ",libverstr,""""
|
$ write opt "identification=""",libid," ",libverstr,""""
|
||||||
$ write opt libobj
|
$ write opt libobj
|
||||||
$ write opt libolb,"/lib"
|
$ write opt libolb, " /library"
|
||||||
$ if libref .nes. "" then write opt libref,"/SHARE"
|
$ if libref .nes. "" then write opt libref,"/SHARE"
|
||||||
$ type sys$input:/out=opt:
|
$ type sys$input:/out=opt:
|
||||||
!
|
!
|
||||||
@@ -205,7 +297,8 @@ $ libwriter := write_vax_psect_attr
|
|||||||
$ gosub read_func_num
|
$ gosub read_func_num
|
||||||
$ close opt
|
$ close opt
|
||||||
$ macro/obj='libobj' 'libmar'
|
$ macro/obj='libobj' 'libmar'
|
||||||
$ link/map='libmap'/full/share='libgoal' 'libopt'/option
|
$ link /map = 'libmap' /full /share = 'libgoal' 'libopt' /options -
|
||||||
|
'zlib_lib'
|
||||||
$ return
|
$ return
|
||||||
$
|
$
|
||||||
$! The record writer routine for VAX functions
|
$! The record writer routine for VAX functions
|
||||||
@@ -227,9 +320,9 @@ $ return
|
|||||||
$
|
$
|
||||||
$! ----- Common subroutines
|
$! ----- Common subroutines
|
||||||
$! -----
|
$! -----
|
||||||
$! The .num file reader. This one has great responsability.
|
$! The .num file reader. This one has great responsibility.
|
||||||
$ read_func_num:
|
$ read_func_num:
|
||||||
$ open libnum 'libnum'
|
$ open /read libnum 'libnum'
|
||||||
$ goto read_nums
|
$ goto read_nums
|
||||||
$
|
$
|
||||||
$ read_nums:
|
$ read_nums:
|
||||||
@@ -237,35 +330,46 @@ $ libentrynum=0
|
|||||||
$ liblastentry:=false
|
$ liblastentry:=false
|
||||||
$ entrycount=0
|
$ entrycount=0
|
||||||
$ loop:
|
$ loop:
|
||||||
$ read/end=loop_end/err=loop_end libnum line
|
$ read /end=loop_end /err=loop_end libnum line
|
||||||
$ entrynum=f$int(f$element(1," ",f$edit(line,"COMPRESS,TRIM")))
|
$ lin = f$edit( line, "COMPRESS,TRIM")
|
||||||
$ entryinfo=f$element(2," ",f$edit(line,"COMPRESS,TRIM"))
|
$! Skip a "#" comment line.
|
||||||
$ curentry=f$element(0," ",f$edit(line,"COMPRESS,TRIM"))
|
$ if (f$extract( 0, 1, lin) .eqs. "#") then goto loop
|
||||||
$ info_exist=f$element(0,":",entryinfo)
|
$ entrynum = f$int(f$element( 1, " ", lin))
|
||||||
$ info_platforms=","+f$element(1,":",entryinfo)+","
|
$ entryinfo = f$element( 2, " ", lin)
|
||||||
$ info_kind=f$element(2,":",entryinfo)
|
$ curentry = f$element( 0, " ", lin)
|
||||||
$ info_algorithms=","+f$element(3,":",entryinfo)+","
|
$ info_exist = f$element( 0, ":", entryinfo)
|
||||||
|
$ info_platforms = ","+ f$element(1, ":", entryinfo)+ ","
|
||||||
|
$ info_kind = f$element( 2, ":", entryinfo)
|
||||||
|
$ info_algorithms = ","+ f$element( 3, ":", entryinfo)+ ","
|
||||||
$ if info_exist .eqs. "NOEXIST" then goto loop
|
$ if info_exist .eqs. "NOEXIST" then goto loop
|
||||||
$ truesum = 0
|
$ truesum = 0
|
||||||
$ falsesum = 0
|
$ falsesum = 0
|
||||||
$ negatives = 1
|
$ negatives = 1
|
||||||
$ plat_i = 0
|
$ plat_i = 0
|
||||||
$ loop1:
|
$ loop1:
|
||||||
$ plat_entry = f$element(plat_i,",",info_platforms)
|
$ plat_entry = f$element( plat_i, ",", info_platforms)
|
||||||
$ plat_i = plat_i + 1
|
$ plat_i = plat_i + 1
|
||||||
$ if plat_entry .eqs. "" then goto loop1
|
$ if plat_entry .eqs. "" then goto loop1
|
||||||
$ if plat_entry .nes. ","
|
$ if plat_entry .nes. ","
|
||||||
$ then
|
$ then
|
||||||
$ if f$extract(0,1,plat_entry) .nes. "!" then negatives = 0
|
$ if f$extract(0,1,plat_entry) .nes. "!" then negatives = 0
|
||||||
$ if f$getsyi("CPU") .lt. 128
|
$ if (arch_vax)
|
||||||
$ then
|
$ then
|
||||||
$ if plat_entry .eqs. "EXPORT_VAR_AS_FUNCTION" then -
|
$ if plat_entry .eqs. "EXPORT_VAR_AS_FUNCTION" then -
|
||||||
$ truesum = truesum + 1
|
$ truesum = truesum + 1
|
||||||
$ if plat_entry .eqs. "!EXPORT_VAR_AS_FUNCTION" then -
|
$ if plat_entry .eqs. "!EXPORT_VAR_AS_FUNCTION" then -
|
||||||
$ falsesum = falsesum + 1
|
$ falsesum = falsesum + 1
|
||||||
$ endif
|
$ endif
|
||||||
$ if plat_entry .eqs. "VMS" then truesum = truesum + 1
|
$!
|
||||||
$ if plat_entry .eqs. "!VMS" then falsesum = falsesum + 1
|
$ if ((plat_entry .eqs. "VMS") .or. -
|
||||||
|
((plat_entry .eqs. "ZLIB") .and. (ZLIB .nes. "")) .or. -
|
||||||
|
(arch_vax .and. (plat_entry .eqs. "VMSVAX"))) then -
|
||||||
|
truesum = truesum + 1
|
||||||
|
$!
|
||||||
|
$ if ((plat_entry .eqs. "!VMS") .or. -
|
||||||
|
(arch_vax .and. (plat_entry .eqs. "!VMSVAX"))) then -
|
||||||
|
falsesum = falsesum + 1
|
||||||
|
$!
|
||||||
$ goto loop1
|
$ goto loop1
|
||||||
$ endif
|
$ endif
|
||||||
$ endloop1:
|
$ endloop1:
|
||||||
@@ -284,8 +388,7 @@ $ alg_i = alg_i + 1
|
|||||||
$ if alg_entry .eqs. "" then goto loop2
|
$ if alg_entry .eqs. "" then goto loop2
|
||||||
$ if alg_entry .nes. ","
|
$ if alg_entry .nes. ","
|
||||||
$ then
|
$ then
|
||||||
$ if alg_entry .eqs. "KRB5" then goto loop ! Special for now
|
$ if disabled_algorithms - ("," + alg_entry + ",") .nes disabled_algorithms then goto loop
|
||||||
$ if alg_entry .eqs. "STATIC_ENGINE" then goto loop ! Special for now
|
|
||||||
$ if f$trnlnm("OPENSSL_NO_"+alg_entry) .nes. "" then goto loop
|
$ if f$trnlnm("OPENSSL_NO_"+alg_entry) .nes. "" then goto loop
|
||||||
$ goto loop2
|
$ goto loop2
|
||||||
$ endif
|
$ endif
|
||||||
@@ -328,7 +431,7 @@ $
|
|||||||
$! The version number reader
|
$! The version number reader
|
||||||
$ read_version_info:
|
$ read_version_info:
|
||||||
$ libver = ""
|
$ libver = ""
|
||||||
$ open/read vf [.CRYPTO]OPENSSLV.H
|
$ open /read vf [.CRYPTO]OPENSSLV.H
|
||||||
$ loop_rvi:
|
$ loop_rvi:
|
||||||
$ read/err=endloop_rvi/end=endloop_rvi vf rvi_line
|
$ read/err=endloop_rvi/end=endloop_rvi vf rvi_line
|
||||||
$ if rvi_line - "SHLIB_VERSION_NUMBER """ .eqs. rvi_line then -
|
$ if rvi_line - "SHLIB_VERSION_NUMBER """ .eqs. rvi_line then -
|
||||||
@@ -352,3 +455,22 @@ $ endif
|
|||||||
$ endloop_rvi:
|
$ endloop_rvi:
|
||||||
$ close vf
|
$ close vf
|
||||||
$ return
|
$ return
|
||||||
|
$
|
||||||
|
$! The disabled algorithms reader
|
||||||
|
$ read_disabled_algorithms_info:
|
||||||
|
$ disabled_algorithms = ","
|
||||||
|
$ open /read cf [.CRYPTO.'ARCH']OPENSSLCONF.H
|
||||||
|
$ loop_rci:
|
||||||
|
$ read/err=endloop_rci/end=endloop_rci cf rci_line
|
||||||
|
$ rci_line = f$edit(rci_line,"TRIM,COMPRESS")
|
||||||
|
$ rci_ei = 0
|
||||||
|
$ if f$extract(0,9,rci_line) .eqs. "# define " then rci_ei = 2
|
||||||
|
$ if f$extract(0,8,rci_line) .eqs. "#define " then rci_ei = 1
|
||||||
|
$ if rci_ei .eq. 0 then goto loop_rci
|
||||||
|
$ rci_e = f$element(rci_ei," ",rci_line)
|
||||||
|
$ if f$extract(0,11,rci_e) .nes. "OPENSSL_NO_" then goto loop_rci
|
||||||
|
$ disabled_algorithms = disabled_algorithms + f$extract(11,999,rci_e) + ","
|
||||||
|
$ goto loop_rci
|
||||||
|
$ endloop_rci:
|
||||||
|
$ close cf
|
||||||
|
$ return
|
||||||
|
|||||||
108
VMS/openssl_startup.com
Executable file
108
VMS/openssl_startup.com
Executable file
@@ -0,0 +1,108 @@
|
|||||||
|
$!
|
||||||
|
$! Startup file for OpenSSL 1.x.
|
||||||
|
$!
|
||||||
|
$! 2011-03-05 SMS.
|
||||||
|
$!
|
||||||
|
$! This procedure must reside in the OpenSSL installation directory.
|
||||||
|
$! It will fail if it is copied to a different location.
|
||||||
|
$!
|
||||||
|
$! P1 qualifier(s) for DEFINE. For example, "/SYSTEM" to get the
|
||||||
|
$! logical names defined in the system logical name table.
|
||||||
|
$!
|
||||||
|
$! P2 "64", to use executables which were built with 64-bit pointers.
|
||||||
|
$!
|
||||||
|
$! Good (default) and bad status values.
|
||||||
|
$!
|
||||||
|
$ status = %x00010001 ! RMS$_NORMAL, normal successful completion.
|
||||||
|
$ rms_e_fnf = %x00018292 ! RMS$_FNF, file not found.
|
||||||
|
$!
|
||||||
|
$! Prepare for problems.
|
||||||
|
$!
|
||||||
|
$ orig_dev_dir = f$environment( "DEFAULT")
|
||||||
|
$ on control_y then goto clean_up
|
||||||
|
$ on error then goto clean_up
|
||||||
|
$!
|
||||||
|
$! Determine hardware architecture.
|
||||||
|
$!
|
||||||
|
$ if (f$getsyi( "cpu") .lt. 128)
|
||||||
|
$ then
|
||||||
|
$ arch_name = "VAX"
|
||||||
|
$ else
|
||||||
|
$ arch_name = f$edit( f$getsyi( "arch_name"), "upcase")
|
||||||
|
$ if (arch_name .eqs. "") then arch_name = "UNK"
|
||||||
|
$ endif
|
||||||
|
$!
|
||||||
|
$ if (p2 .eqs. "64")
|
||||||
|
$ then
|
||||||
|
$ arch_name_exe = arch_name+ "_64"
|
||||||
|
$ else
|
||||||
|
$ arch_name_exe = arch_name
|
||||||
|
$ endif
|
||||||
|
$!
|
||||||
|
$! Derive the OpenSSL installation device:[directory] from the location
|
||||||
|
$! of this command procedure.
|
||||||
|
$!
|
||||||
|
$ proc = f$environment( "procedure")
|
||||||
|
$ proc_dev_dir = f$parse( "A.;", proc, , , "no_conceal") - "A.;"
|
||||||
|
$ proc_dev = f$parse( proc_dev_dir, , , "device", "syntax_only")
|
||||||
|
$ proc_dir = f$parse( proc_dev_dir, , , "directory", "syntax_only") - -
|
||||||
|
".][000000"- "[000000."- "]["- "["- "]"
|
||||||
|
$ proc_dev_dir = proc_dev+ "["+ proc_dir+ "]"
|
||||||
|
$ set default 'proc_dev_dir'
|
||||||
|
$ set default [-]
|
||||||
|
$ ossl_dev_dir = f$environment( "default")
|
||||||
|
$!
|
||||||
|
$! Check existence of expected directories (to see if this procedure has
|
||||||
|
$! been moved away from its proper place).
|
||||||
|
$!
|
||||||
|
$ if ((f$search( "certs.dir;1") .eqs. "") .or. -
|
||||||
|
(f$search( "include.dir;1") .eqs. "") .or. -
|
||||||
|
(f$search( "private.dir;1") .eqs. "") .or. -
|
||||||
|
(f$search( "vms.dir;1") .eqs. ""))
|
||||||
|
$ then
|
||||||
|
$ write sys$output -
|
||||||
|
" Can't find expected common OpenSSL directories in:"
|
||||||
|
$ write sys$output " ''ossl_dev_dir'"
|
||||||
|
$ status = rms_e_fnf
|
||||||
|
$ goto clean_up
|
||||||
|
$ endif
|
||||||
|
$!
|
||||||
|
$ if ((f$search( "''arch_name_exe'_exe.dir;1") .eqs. "") .or. -
|
||||||
|
(f$search( "''arch_name'_lib.dir;1") .eqs. ""))
|
||||||
|
$ then
|
||||||
|
$ write sys$output -
|
||||||
|
" Can't find expected architecture-specific OpenSSL directories in:"
|
||||||
|
$ write sys$output " ''ossl_dev_dir'"
|
||||||
|
$ status = rms_e_fnf
|
||||||
|
$ goto clean_up
|
||||||
|
$ endif
|
||||||
|
$!
|
||||||
|
$! All seems well (enough). Define the OpenSSL logical names.
|
||||||
|
$!
|
||||||
|
$ ossl_root = ossl_dev_dir- "]"+ ".]"
|
||||||
|
$ define /translation_attributes = concealed /nolog'p1 SSLROOT 'ossl_root'
|
||||||
|
$ define /nolog 'p1' SSLCERTS sslroot:[certs]
|
||||||
|
$ define /nolog 'p1' SSLINCLUDE sslroot:[include]
|
||||||
|
$ define /nolog 'p1' SSLPRIVATE sslroot:[private]
|
||||||
|
$ define /nolog 'p1' SSLEXE sslroot:['arch_name_exe'_exe]
|
||||||
|
$ define /nolog 'p1' SSLLIB sslroot:['arch_name'_lib]
|
||||||
|
$!
|
||||||
|
$! Defining OPENSSL lets a C program use "#include <openssl/{foo}.h>":
|
||||||
|
$ define /nolog 'p1' OPENSSL SSLINCLUDE:
|
||||||
|
$!
|
||||||
|
$! Run a site-specific procedure, if it exists.
|
||||||
|
$!
|
||||||
|
$ if f$search( "sslroot:[vms]openssl_systartup.com") .nes."" then -
|
||||||
|
@ sslroot:[vms]openssl_systartup.com
|
||||||
|
$!
|
||||||
|
$! Restore the original default dev:[dir] (if known).
|
||||||
|
$!
|
||||||
|
$ clean_up:
|
||||||
|
$!
|
||||||
|
$ if (f$type( orig_dev_dir) .nes. "")
|
||||||
|
$ then
|
||||||
|
$ set default 'orig_dev_dir'
|
||||||
|
$ endif
|
||||||
|
$!
|
||||||
|
$ EXIT 'status'
|
||||||
|
$!
|
||||||
20
VMS/openssl_undo.com
Executable file
20
VMS/openssl_undo.com
Executable file
@@ -0,0 +1,20 @@
|
|||||||
|
$!
|
||||||
|
$! Deassign OpenSSL logical names.
|
||||||
|
$!
|
||||||
|
$ call deass "OPENSSL" "''p1'"
|
||||||
|
$ call deass "SSLCERTS" "''p1'"
|
||||||
|
$ call deass "SSLEXE" "''p1'"
|
||||||
|
$ call deass "SSLINCLUDE" "''p1'"
|
||||||
|
$ call deass "SSLLIB" "''p1'"
|
||||||
|
$ call deass "SSLPRIVATE" "''p1'"
|
||||||
|
$ call deass "SSLROOT" "''p1'"
|
||||||
|
$!
|
||||||
|
$ exit
|
||||||
|
$!
|
||||||
|
$deass: subroutine
|
||||||
|
$ if (f$trnlnm( p1) .nes. "")
|
||||||
|
$ then
|
||||||
|
$ deassign 'p2' 'p1'
|
||||||
|
$ endif
|
||||||
|
$ endsubroutine
|
||||||
|
$!
|
||||||
@@ -8,31 +8,39 @@ $!
|
|||||||
$!
|
$!
|
||||||
$! Slightly modified by Richard Levitte <richard@levitte.org>
|
$! Slightly modified by Richard Levitte <richard@levitte.org>
|
||||||
$!
|
$!
|
||||||
|
$!
|
||||||
|
$! Always define OPENSSL. Others are optional (non-null P1).
|
||||||
|
$!
|
||||||
$ OPENSSL :== $SSLEXE:OPENSSL
|
$ OPENSSL :== $SSLEXE:OPENSSL
|
||||||
$ VERIFY :== $SSLEXE:OPENSSL VERIFY
|
$
|
||||||
$ ASN1PARSE:== $SSLEXE:OPENSSL ASN1PARS
|
$ IF (P1 .NES. "")
|
||||||
$ REQ :== $SSLEXE:OPENSSL REQ
|
$ THEN
|
||||||
$ DGST :== $SSLEXE:OPENSSL DGST
|
$ VERIFY :== $SSLEXE:OPENSSL VERIFY
|
||||||
$ DH :== $SSLEXE:OPENSSL DH
|
$ ASN1PARSE:== $SSLEXE:OPENSSL ASN1PARS
|
||||||
$ ENC :== $SSLEXE:OPENSSL ENC
|
$! REQ could conflict with REQUEST.
|
||||||
$ GENDH :== $SSLEXE:OPENSSL GENDH
|
$ OREQ :== $SSLEXE:OPENSSL REQ
|
||||||
$ ERRSTR :== $SSLEXE:OPENSSL ERRSTR
|
$ DGST :== $SSLEXE:OPENSSL DGST
|
||||||
$ CA :== $SSLEXE:OPENSSL CA
|
$ DH :== $SSLEXE:OPENSSL DH
|
||||||
$ CRL :== $SSLEXE:OPENSSL CRL
|
$ ENC :== $SSLEXE:OPENSSL ENC
|
||||||
$ RSA :== $SSLEXE:OPENSSL RSA
|
$ GENDH :== $SSLEXE:OPENSSL GENDH
|
||||||
$ DSA :== $SSLEXE:OPENSSL DSA
|
$ ERRSTR :== $SSLEXE:OPENSSL ERRSTR
|
||||||
$ DSAPARAM :== $SSLEXE:OPENSSL DSAPARAM
|
$ CA :== $SSLEXE:OPENSSL CA
|
||||||
$ X509 :== $SSLEXE:OPENSSL X509
|
$ CRL :== $SSLEXE:OPENSSL CRL
|
||||||
$ GENRSA :== $SSLEXE:OPENSSL GENRSA
|
$ RSA :== $SSLEXE:OPENSSL RSA
|
||||||
$ GENDSA :== $SSLEXE:OPENSSL GENDSA
|
$ DSA :== $SSLEXE:OPENSSL DSA
|
||||||
$ S_SERVER :== $SSLEXE:OPENSSL S_SERVER
|
$ DSAPARAM :== $SSLEXE:OPENSSL DSAPARAM
|
||||||
$ S_CLIENT :== $SSLEXE:OPENSSL S_CLIENT
|
$ X509 :== $SSLEXE:OPENSSL X509
|
||||||
$ SPEED :== $SSLEXE:OPENSSL SPEED
|
$ GENRSA :== $SSLEXE:OPENSSL GENRSA
|
||||||
$ S_TIME :== $SSLEXE:OPENSSL S_TIME
|
$ GENDSA :== $SSLEXE:OPENSSL GENDSA
|
||||||
$ VERSION :== $SSLEXE:OPENSSL VERSION
|
$ S_SERVER :== $SSLEXE:OPENSSL S_SERVER
|
||||||
$ PKCS7 :== $SSLEXE:OPENSSL PKCS7
|
$ S_CLIENT :== $SSLEXE:OPENSSL S_CLIENT
|
||||||
$ CRL2PKCS7:== $SSLEXE:OPENSSL CRL2P7
|
$ SPEED :== $SSLEXE:OPENSSL SPEED
|
||||||
$ SESS_ID :== $SSLEXE:OPENSSL SESS_ID
|
$ S_TIME :== $SSLEXE:OPENSSL S_TIME
|
||||||
$ CIPHERS :== $SSLEXE:OPENSSL CIPHERS
|
$ VERSION :== $SSLEXE:OPENSSL VERSION
|
||||||
$ NSEQ :== $SSLEXE:OPENSSL NSEQ
|
$ PKCS7 :== $SSLEXE:OPENSSL PKCS7
|
||||||
$ PKCS12 :== $SSLEXE:OPENSSL PKCS12
|
$ CRL2PKCS7:== $SSLEXE:OPENSSL CRL2P7
|
||||||
|
$ SESS_ID :== $SSLEXE:OPENSSL SESS_ID
|
||||||
|
$ CIPHERS :== $SSLEXE:OPENSSL CIPHERS
|
||||||
|
$ NSEQ :== $SSLEXE:OPENSSL NSEQ
|
||||||
|
$ PKCS12 :== $SSLEXE:OPENSSL PKCS12
|
||||||
|
$ ENDIF
|
||||||
|
|||||||
1
VMS/tcpip_shr_decc.opt
Normal file
1
VMS/tcpip_shr_decc.opt
Normal file
@@ -0,0 +1 @@
|
|||||||
|
sys$share:tcpip$ipc_shr.exe/share
|
||||||
@@ -3,3 +3,6 @@ Makefile.save
|
|||||||
der_chop
|
der_chop
|
||||||
der_chop.bak
|
der_chop.bak
|
||||||
CA.pl
|
CA.pl
|
||||||
|
*.flc
|
||||||
|
semantic.cache
|
||||||
|
*.dll
|
||||||
|
|||||||
100
apps/CA.com
100
apps/CA.com
@@ -37,14 +37,25 @@ $ VERIFY = openssl + " verify"
|
|||||||
$ X509 = openssl + " x509"
|
$ X509 = openssl + " x509"
|
||||||
$ PKCS12 = openssl + " pkcs12"
|
$ PKCS12 = openssl + " pkcs12"
|
||||||
$ echo = "write sys$Output"
|
$ echo = "write sys$Output"
|
||||||
|
$ RET = 1
|
||||||
$!
|
$!
|
||||||
$ s = F$PARSE(F$ENVIRONMENT("DEFAULT"),"[]") - "].;"
|
$! 2010-12-20 SMS.
|
||||||
$ CATOP := 's'.demoCA
|
$! Use a concealed logical name to reduce command line lengths, to
|
||||||
$ CAKEY := ]cakey.pem
|
$! avoid DCL errors on VAX:
|
||||||
$ CACERT := ]cacert.pem
|
$! %DCL-W-TKNOVF, command element is too long - shorten
|
||||||
|
$! (Path segments like "openssl-1_0_1-stable-SNAP-20101217" accumulate
|
||||||
|
$! quickly.)
|
||||||
|
$!
|
||||||
|
$ CATOP = F$PARSE( F$ENVIRONMENT( "DEFAULT"), "[]")- "].;"+ ".demoCA.]"
|
||||||
|
$ define /translation_attributes = concealed CATOP 'CATOP'
|
||||||
|
$!
|
||||||
|
$ on error then goto clean_up
|
||||||
|
$ on control_y then goto clean_up
|
||||||
|
$!
|
||||||
|
$ CAKEY = "CATOP:[private]cakey.pem"
|
||||||
|
$ CACERT = "CATOP:[000000]cacert.pem"
|
||||||
$
|
$
|
||||||
$ __INPUT := SYS$COMMAND
|
$ __INPUT := SYS$COMMAND
|
||||||
$ RET = 1
|
|
||||||
$!
|
$!
|
||||||
$ i = 1
|
$ i = 1
|
||||||
$opt_loop:
|
$opt_loop:
|
||||||
@@ -55,7 +66,7 @@ $
|
|||||||
$ IF (prog_opt .EQS. "?" .OR. prog_opt .EQS. "-h" .OR. prog_opt .EQS. "-help")
|
$ IF (prog_opt .EQS. "?" .OR. prog_opt .EQS. "-h" .OR. prog_opt .EQS. "-help")
|
||||||
$ THEN
|
$ THEN
|
||||||
$ echo "usage: CA -newcert|-newreq|-newca|-sign|-verify"
|
$ echo "usage: CA -newcert|-newreq|-newca|-sign|-verify"
|
||||||
$ exit
|
$ goto clean_up
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$!
|
$!
|
||||||
$ IF (prog_opt .EQS. "-input")
|
$ IF (prog_opt .EQS. "-input")
|
||||||
@@ -69,7 +80,7 @@ $!
|
|||||||
$ IF (prog_opt .EQS. "-newcert")
|
$ IF (prog_opt .EQS. "-newcert")
|
||||||
$ THEN
|
$ THEN
|
||||||
$ ! Create a certificate.
|
$ ! Create a certificate.
|
||||||
$ DEFINE/USER SYS$INPUT '__INPUT'
|
$ DEFINE /USER_MODE SYS$INPUT '__INPUT'
|
||||||
$ REQ -new -x509 -keyout newreq.pem -out newreq.pem 'DAYS'
|
$ REQ -new -x509 -keyout newreq.pem -out newreq.pem 'DAYS'
|
||||||
$ RET=$STATUS
|
$ RET=$STATUS
|
||||||
$ echo "Certificate (and private key) is in newreq.pem"
|
$ echo "Certificate (and private key) is in newreq.pem"
|
||||||
@@ -79,7 +90,7 @@ $!
|
|||||||
$ IF (prog_opt .EQS. "-newreq")
|
$ IF (prog_opt .EQS. "-newreq")
|
||||||
$ THEN
|
$ THEN
|
||||||
$ ! Create a certificate request
|
$ ! Create a certificate request
|
||||||
$ DEFINE/USER SYS$INPUT '__INPUT'
|
$ DEFINE /USER_MODE SYS$INPUT '__INPUT'
|
||||||
$ REQ -new -keyout newreq.pem -out newreq.pem 'DAYS'
|
$ REQ -new -keyout newreq.pem -out newreq.pem 'DAYS'
|
||||||
$ RET=$STATUS
|
$ RET=$STATUS
|
||||||
$ echo "Request (and private key) is in newreq.pem"
|
$ echo "Request (and private key) is in newreq.pem"
|
||||||
@@ -90,41 +101,40 @@ $ IF (prog_opt .EQS. "-newca")
|
|||||||
$ THEN
|
$ THEN
|
||||||
$ ! If explicitly asked for or it doesn't exist then setup the directory
|
$ ! If explicitly asked for or it doesn't exist then setup the directory
|
||||||
$ ! structure that Eric likes to manage things.
|
$ ! structure that Eric likes to manage things.
|
||||||
$ IF F$SEARCH(CATOP+"]serial.") .EQS. ""
|
$ IF F$SEARCH( "CATOP:[000000]serial.") .EQS. ""
|
||||||
$ THEN
|
$ THEN
|
||||||
$ CREATE /DIR /PROTECTION=OWNER:RWED 'CATOP']
|
$ CREATE /DIRECTORY /PROTECTION=OWNER:RWED CATOP:[000000]
|
||||||
$ CREATE /DIR /PROTECTION=OWNER:RWED 'CATOP'.certs]
|
$ CREATE /DIRECTORY /PROTECTION=OWNER:RWED CATOP:[certs]
|
||||||
$ CREATE /DIR /PROTECTION=OWNER:RWED 'CATOP'.crl]
|
$ CREATE /DIRECTORY /PROTECTION=OWNER:RWED CATOP:[crl]
|
||||||
$ CREATE /DIR /PROTECTION=OWNER:RWED 'CATOP'.newcerts]
|
$ CREATE /DIRECTORY /PROTECTION=OWNER:RWED CATOP:[newcerts]
|
||||||
$ CREATE /DIR /PROTECTION=OWNER:RWED 'CATOP'.private]
|
$ CREATE /DIRECTORY /PROTECTION=OWNER:RWED CATOP:[private]
|
||||||
$
|
$
|
||||||
$ OPEN /WRITE ser_file 'CATOP']serial.
|
$ OPEN /WRITE ser_file CATOP:[000000]serial.
|
||||||
$ WRITE ser_file "01"
|
$ WRITE ser_file "01"
|
||||||
$ CLOSE ser_file
|
$ CLOSE ser_file
|
||||||
$ APPEND/NEW NL: 'CATOP']index.txt
|
$ APPEND /NEW_VERSION NL: CATOP:[000000]index.txt
|
||||||
$
|
$
|
||||||
$ ! The following is to make sure access() doesn't get confused. It
|
$ ! The following is to make sure access() doesn't get confused. It
|
||||||
$ ! really needs one file in the directory to give correct answers...
|
$ ! really needs one file in the directory to give correct answers...
|
||||||
$ COPY NLA0: 'CATOP'.certs].;
|
$ COPY NLA0: CATOP:[certs].;
|
||||||
$ COPY NLA0: 'CATOP'.crl].;
|
$ COPY NLA0: CATOP:[crl].;
|
||||||
$ COPY NLA0: 'CATOP'.newcerts].;
|
$ COPY NLA0: CATOP:[newcerts].;
|
||||||
$ COPY NLA0: 'CATOP'.private].;
|
$ COPY NLA0: CATOP:[private].;
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$!
|
$!
|
||||||
$ IF F$SEARCH(CATOP+".private"+CAKEY) .EQS. ""
|
$ IF F$SEARCH( CAKEY) .EQS. ""
|
||||||
$ THEN
|
$ THEN
|
||||||
$ READ '__INPUT' FILE -
|
$ READ '__INPUT' FILE -
|
||||||
/PROMT="CA certificate filename (or enter to create)"
|
/PROMPT="CA certificate filename (or enter to create): "
|
||||||
$ IF F$SEARCH(FILE) .NES. ""
|
$ IF (FILE .NES. "") .AND. (F$SEARCH(FILE) .NES. "")
|
||||||
$ THEN
|
$ THEN
|
||||||
$ COPY 'FILE' 'CATOP'.private'CAKEY'
|
$ COPY 'FILE' 'CAKEY'
|
||||||
$ RET=$STATUS
|
$ RET=$STATUS
|
||||||
$ ELSE
|
$ ELSE
|
||||||
$ echo "Making CA certificate ..."
|
$ echo "Making CA certificate ..."
|
||||||
$ DEFINE/USER SYS$INPUT '__INPUT'
|
$ DEFINE /USER_MODE SYS$INPUT '__INPUT'
|
||||||
$ REQ -new -x509 -keyout 'CATOP'.private'CAKEY' -
|
$ REQ -new -x509 -keyout 'CAKEY' -out 'CACERT' 'DAYS'
|
||||||
-out 'CATOP''CACERT' 'DAYS'
|
$ RET=$STATUS
|
||||||
$ RET=$STATUS
|
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$ GOTO opt_loop_continue
|
$ GOTO opt_loop_continue
|
||||||
@@ -135,16 +145,16 @@ $ THEN
|
|||||||
$ i = i + 1
|
$ i = i + 1
|
||||||
$ cname = P'i'
|
$ cname = P'i'
|
||||||
$ IF cname .EQS. "" THEN cname = "My certificate"
|
$ IF cname .EQS. "" THEN cname = "My certificate"
|
||||||
$ PKCS12 -in newcert.pem -inkey newreq.pem -certfile 'CATOP''CACERT -
|
$ PKCS12 -in newcert.pem -inkey newreq.pem -certfile 'CACERT' -
|
||||||
-out newcert.p12 -export -name "''cname'"
|
-out newcert.p12 -export -name "''cname'"
|
||||||
$ RET=$STATUS
|
$ RET=$STATUS
|
||||||
$ exit RET
|
$ goto clean_up
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$!
|
$!
|
||||||
$ IF (prog_opt .EQS. "-xsign")
|
$ IF (prog_opt .EQS. "-xsign")
|
||||||
$ THEN
|
$ THEN
|
||||||
$!
|
$!
|
||||||
$ DEFINE/USER SYS$INPUT '__INPUT'
|
$ DEFINE /USER_MODE SYS$INPUT '__INPUT'
|
||||||
$ CA -policy policy_anything -infiles newreq.pem
|
$ CA -policy policy_anything -infiles newreq.pem
|
||||||
$ RET=$STATUS
|
$ RET=$STATUS
|
||||||
$ GOTO opt_loop_continue
|
$ GOTO opt_loop_continue
|
||||||
@@ -153,7 +163,7 @@ $!
|
|||||||
$ IF ((prog_opt .EQS. "-sign") .OR. (prog_opt .EQS. "-signreq"))
|
$ IF ((prog_opt .EQS. "-sign") .OR. (prog_opt .EQS. "-signreq"))
|
||||||
$ THEN
|
$ THEN
|
||||||
$!
|
$!
|
||||||
$ DEFINE/USER SYS$INPUT '__INPUT'
|
$ DEFINE /USER_MODE SYS$INPUT '__INPUT'
|
||||||
$ CA -policy policy_anything -out newcert.pem -infiles newreq.pem
|
$ CA -policy policy_anything -out newcert.pem -infiles newreq.pem
|
||||||
$ RET=$STATUS
|
$ RET=$STATUS
|
||||||
$ type newcert.pem
|
$ type newcert.pem
|
||||||
@@ -165,9 +175,9 @@ $ IF (prog_opt .EQS. "-signcert")
|
|||||||
$ THEN
|
$ THEN
|
||||||
$!
|
$!
|
||||||
$ echo "Cert passphrase will be requested twice - bug?"
|
$ echo "Cert passphrase will be requested twice - bug?"
|
||||||
$ DEFINE/USER SYS$INPUT '__INPUT'
|
$ DEFINE /USER_MODE SYS$INPUT '__INPUT'
|
||||||
$ X509 -x509toreq -in newreq.pem -signkey newreq.pem -out tmp.pem
|
$ X509 -x509toreq -in newreq.pem -signkey newreq.pem -out tmp.pem
|
||||||
$ DEFINE/USER SYS$INPUT '__INPUT'
|
$ DEFINE /USER_MODE SYS$INPUT '__INPUT'
|
||||||
$ CA -policy policy_anything -out newcert.pem -infiles tmp.pem
|
$ CA -policy policy_anything -out newcert.pem -infiles tmp.pem
|
||||||
y
|
y
|
||||||
y
|
y
|
||||||
@@ -182,17 +192,17 @@ $!
|
|||||||
$ i = i + 1
|
$ i = i + 1
|
||||||
$ IF (p'i' .EQS. "")
|
$ IF (p'i' .EQS. "")
|
||||||
$ THEN
|
$ THEN
|
||||||
$ DEFINE/USER SYS$INPUT '__INPUT'
|
$ DEFINE /USER_MODE SYS$INPUT '__INPUT'
|
||||||
$ VERIFY "-CAfile" 'CATOP''CACERT' newcert.pem
|
$ VERIFY "-CAfile" 'CACERT' newcert.pem
|
||||||
$ ELSE
|
$ ELSE
|
||||||
$ j = i
|
$ j = i
|
||||||
$ verify_opt_loop:
|
$ verify_opt_loop:
|
||||||
$ IF j .GT. 8 THEN GOTO verify_opt_loop_end
|
$ IF j .GT. 8 THEN GOTO verify_opt_loop_end
|
||||||
$ IF p'j' .NES. ""
|
$ IF p'j' .NES. ""
|
||||||
$ THEN
|
$ THEN
|
||||||
$ DEFINE/USER SYS$INPUT '__INPUT'
|
$ DEFINE /USER_MODE SYS$INPUT '__INPUT'
|
||||||
$ __tmp = p'j'
|
$ __tmp = p'j'
|
||||||
$ VERIFY "-CAfile" 'CATOP''CACERT' '__tmp'
|
$ VERIFY "-CAfile" 'CACERT' '__tmp'
|
||||||
$ tmp=$STATUS
|
$ tmp=$STATUS
|
||||||
$ IF tmp .NE. 0 THEN RET=tmp
|
$ IF tmp .NE. 0 THEN RET=tmp
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
@@ -208,8 +218,8 @@ $ IF (prog_opt .NES. "")
|
|||||||
$ THEN
|
$ THEN
|
||||||
$!
|
$!
|
||||||
$ echo "Unknown argument ''prog_opt'"
|
$ echo "Unknown argument ''prog_opt'"
|
||||||
$
|
$ RET = 3
|
||||||
$ EXIT 3
|
$ goto clean_up
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$
|
$
|
||||||
$opt_loop_continue:
|
$opt_loop_continue:
|
||||||
@@ -217,4 +227,10 @@ $ i = i + 1
|
|||||||
$ GOTO opt_loop
|
$ GOTO opt_loop
|
||||||
$
|
$
|
||||||
$opt_loop_end:
|
$opt_loop_end:
|
||||||
|
$!
|
||||||
|
$clean_up:
|
||||||
|
$!
|
||||||
|
$ if f$trnlnm( "CATOP", "LNM$PROCESS") .nes. "" then -
|
||||||
|
deassign /process CATOP
|
||||||
|
$!
|
||||||
$ EXIT 'RET'
|
$ EXIT 'RET'
|
||||||
|
|||||||
@@ -36,16 +36,26 @@
|
|||||||
# default openssl.cnf file has setup as per the following
|
# default openssl.cnf file has setup as per the following
|
||||||
# demoCA ... where everything is stored
|
# demoCA ... where everything is stored
|
||||||
|
|
||||||
|
my $openssl;
|
||||||
|
if(defined $ENV{OPENSSL}) {
|
||||||
|
$openssl = $ENV{OPENSSL};
|
||||||
|
} else {
|
||||||
|
$openssl = "openssl";
|
||||||
|
$ENV{OPENSSL} = $openssl;
|
||||||
|
}
|
||||||
|
|
||||||
$SSLEAY_CONFIG=$ENV{"SSLEAY_CONFIG"};
|
$SSLEAY_CONFIG=$ENV{"SSLEAY_CONFIG"};
|
||||||
$DAYS="-days 365";
|
$DAYS="-days 365"; # 1 year
|
||||||
$REQ="openssl req $SSLEAY_CONFIG";
|
$CADAYS="-days 1095"; # 3 years
|
||||||
$CA="openssl ca $SSLEAY_CONFIG";
|
$REQ="$openssl req $SSLEAY_CONFIG";
|
||||||
$VERIFY="openssl verify";
|
$CA="$openssl ca $SSLEAY_CONFIG";
|
||||||
$X509="openssl x509";
|
$VERIFY="$openssl verify";
|
||||||
$PKCS12="openssl pkcs12";
|
$X509="$openssl x509";
|
||||||
|
$PKCS12="$openssl pkcs12";
|
||||||
|
|
||||||
$CATOP="./demoCA";
|
$CATOP="./demoCA";
|
||||||
$CAKEY="cakey.pem";
|
$CAKEY="cakey.pem";
|
||||||
|
$CAREQ="careq.pem";
|
||||||
$CACERT="cacert.pem";
|
$CACERT="cacert.pem";
|
||||||
|
|
||||||
$DIRMODE = 0777;
|
$DIRMODE = 0777;
|
||||||
@@ -58,19 +68,19 @@ foreach (@ARGV) {
|
|||||||
exit 0;
|
exit 0;
|
||||||
} elsif (/^-newcert$/) {
|
} elsif (/^-newcert$/) {
|
||||||
# create a certificate
|
# create a certificate
|
||||||
system ("$REQ -new -x509 -keyout newreq.pem -out newreq.pem $DAYS");
|
system ("$REQ -new -x509 -keyout newkey.pem -out newcert.pem $DAYS");
|
||||||
$RET=$?;
|
$RET=$?;
|
||||||
print "Certificate (and private key) is in newreq.pem\n"
|
print "Certificate is in newcert.pem, private key is in newkey.pem\n"
|
||||||
} elsif (/^-newreq$/) {
|
} elsif (/^-newreq$/) {
|
||||||
# create a certificate request
|
# create a certificate request
|
||||||
system ("$REQ -new -keyout newreq.pem -out newreq.pem $DAYS");
|
system ("$REQ -new -keyout newkey.pem -out newreq.pem $DAYS");
|
||||||
$RET=$?;
|
$RET=$?;
|
||||||
print "Request (and private key) is in newreq.pem\n";
|
print "Request is in newreq.pem, private key is in newkey.pem\n";
|
||||||
} elsif (/^-newreq-nodes$/) {
|
} elsif (/^-newreq-nodes$/) {
|
||||||
# create a certificate request
|
# create a certificate request
|
||||||
system ("$REQ -new -nodes -keyout newreq.pem -out newreq.pem $DAYS");
|
system ("$REQ -new -nodes -keyout newkey.pem -out newreq.pem $DAYS");
|
||||||
$RET=$?;
|
$RET=$?;
|
||||||
print "Request (and private key) is in newreq.pem\n";
|
print "Request is in newreq.pem, private key is in newkey.pem\n";
|
||||||
} elsif (/^-newca$/) {
|
} elsif (/^-newca$/) {
|
||||||
# if explicitly asked for or it doesn't exist then setup the
|
# if explicitly asked for or it doesn't exist then setup the
|
||||||
# directory structure that Eric likes to manage things
|
# directory structure that Eric likes to manage things
|
||||||
@@ -82,11 +92,11 @@ foreach (@ARGV) {
|
|||||||
mkdir "${CATOP}/crl", $DIRMODE ;
|
mkdir "${CATOP}/crl", $DIRMODE ;
|
||||||
mkdir "${CATOP}/newcerts", $DIRMODE;
|
mkdir "${CATOP}/newcerts", $DIRMODE;
|
||||||
mkdir "${CATOP}/private", $DIRMODE;
|
mkdir "${CATOP}/private", $DIRMODE;
|
||||||
open OUT, ">${CATOP}/serial";
|
|
||||||
print OUT "01\n";
|
|
||||||
close OUT;
|
|
||||||
open OUT, ">${CATOP}/index.txt";
|
open OUT, ">${CATOP}/index.txt";
|
||||||
close OUT;
|
close OUT;
|
||||||
|
open OUT, ">${CATOP}/crlnumber";
|
||||||
|
print OUT "01\n";
|
||||||
|
close OUT;
|
||||||
}
|
}
|
||||||
if ( ! -f "${CATOP}/private/$CAKEY" ) {
|
if ( ! -f "${CATOP}/private/$CAKEY" ) {
|
||||||
print "CA certificate filename (or enter to create)\n";
|
print "CA certificate filename (or enter to create)\n";
|
||||||
@@ -101,18 +111,24 @@ foreach (@ARGV) {
|
|||||||
$RET=$?;
|
$RET=$?;
|
||||||
} else {
|
} else {
|
||||||
print "Making CA certificate ...\n";
|
print "Making CA certificate ...\n";
|
||||||
system ("$REQ -new -x509 -keyout " .
|
system ("$REQ -new -keyout " .
|
||||||
"${CATOP}/private/$CAKEY -out ${CATOP}/$CACERT $DAYS");
|
"${CATOP}/private/$CAKEY -out ${CATOP}/$CAREQ");
|
||||||
|
system ("$CA -create_serial " .
|
||||||
|
"-out ${CATOP}/$CACERT $CADAYS -batch " .
|
||||||
|
"-keyfile ${CATOP}/private/$CAKEY -selfsign " .
|
||||||
|
"-extensions v3_ca " .
|
||||||
|
"-infiles ${CATOP}/$CAREQ ");
|
||||||
$RET=$?;
|
$RET=$?;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
} elsif (/^-pkcs12$/) {
|
} elsif (/^-pkcs12$/) {
|
||||||
my $cname = $ARGV[1];
|
my $cname = $ARGV[1];
|
||||||
$cname = "My Certificate" unless defined $cname;
|
$cname = "My Certificate" unless defined $cname;
|
||||||
system ("$PKCS12 -in newcert.pem -inkey newreq.pem " .
|
system ("$PKCS12 -in newcert.pem -inkey newkey.pem " .
|
||||||
"-certfile ${CATOP}/$CACERT -out newcert.p12 " .
|
"-certfile ${CATOP}/$CACERT -out newcert.p12 " .
|
||||||
"-export -name \"$cname\"");
|
"-export -name \"$cname\"");
|
||||||
$RET=$?;
|
$RET=$?;
|
||||||
|
print "PKCS #12 file is in newcert.p12\n";
|
||||||
exit $RET;
|
exit $RET;
|
||||||
} elsif (/^-xsign$/) {
|
} elsif (/^-xsign$/) {
|
||||||
system ("$CA -policy policy_anything -infiles newreq.pem");
|
system ("$CA -policy policy_anything -infiles newreq.pem");
|
||||||
|
|||||||
120
apps/CA.sh
120
apps/CA.sh
@@ -16,8 +16,8 @@
|
|||||||
# 12-Jan-96 tjh Added more things ... including CA -signcert which
|
# 12-Jan-96 tjh Added more things ... including CA -signcert which
|
||||||
# converts a certificate to a request and then signs it.
|
# converts a certificate to a request and then signs it.
|
||||||
# 10-Jan-96 eay Fixed a few more bugs and added the SSLEAY_CONFIG
|
# 10-Jan-96 eay Fixed a few more bugs and added the SSLEAY_CONFIG
|
||||||
# environment variable so this can be driven from
|
# environment variable so this can be driven from
|
||||||
# a script.
|
# a script.
|
||||||
# 25-Jul-96 eay Cleaned up filenames some more.
|
# 25-Jul-96 eay Cleaned up filenames some more.
|
||||||
# 11-Jun-96 eay Fixed a few filename missmatches.
|
# 11-Jun-96 eay Fixed a few filename missmatches.
|
||||||
# 03-May-96 eay Modified to use 'ssleay cmd' instead of 'cmd'.
|
# 03-May-96 eay Modified to use 'ssleay cmd' instead of 'cmd'.
|
||||||
@@ -29,33 +29,73 @@
|
|||||||
|
|
||||||
# default openssl.cnf file has setup as per the following
|
# default openssl.cnf file has setup as per the following
|
||||||
# demoCA ... where everything is stored
|
# demoCA ... where everything is stored
|
||||||
|
cp_pem() {
|
||||||
|
infile=$1
|
||||||
|
outfile=$2
|
||||||
|
bound=$3
|
||||||
|
flag=0
|
||||||
|
exec <$infile;
|
||||||
|
while read line; do
|
||||||
|
if [ $flag -eq 1 ]; then
|
||||||
|
echo $line|grep "^-----END.*$bound" 2>/dev/null 1>/dev/null
|
||||||
|
if [ $? -eq 0 ] ; then
|
||||||
|
echo $line >>$outfile
|
||||||
|
break
|
||||||
|
else
|
||||||
|
echo $line >>$outfile
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
|
||||||
DAYS="-days 365"
|
echo $line|grep "^-----BEGIN.*$bound" 2>/dev/null 1>/dev/null
|
||||||
REQ="openssl req $SSLEAY_CONFIG"
|
if [ $? -eq 0 ]; then
|
||||||
CA="openssl ca $SSLEAY_CONFIG"
|
echo $line >$outfile
|
||||||
VERIFY="openssl verify"
|
flag=1
|
||||||
X509="openssl x509"
|
fi
|
||||||
|
done
|
||||||
|
}
|
||||||
|
|
||||||
CATOP=./demoCA
|
usage() {
|
||||||
|
echo "usage: $0 -newcert|-newreq|-newreq-nodes|-newca|-sign|-verify" >&2
|
||||||
|
}
|
||||||
|
|
||||||
|
if [ -z "$OPENSSL" ]; then OPENSSL=openssl; fi
|
||||||
|
|
||||||
|
if [ -z "$DAYS" ] ; then DAYS="-days 365" ; fi # 1 year
|
||||||
|
CADAYS="-days 1095" # 3 years
|
||||||
|
REQ="$OPENSSL req $SSLEAY_CONFIG"
|
||||||
|
CA="$OPENSSL ca $SSLEAY_CONFIG"
|
||||||
|
VERIFY="$OPENSSL verify"
|
||||||
|
X509="$OPENSSL x509"
|
||||||
|
PKCS12="openssl pkcs12"
|
||||||
|
|
||||||
|
if [ -z "$CATOP" ] ; then CATOP=./demoCA ; fi
|
||||||
CAKEY=./cakey.pem
|
CAKEY=./cakey.pem
|
||||||
|
CAREQ=./careq.pem
|
||||||
CACERT=./cacert.pem
|
CACERT=./cacert.pem
|
||||||
|
|
||||||
for i
|
RET=0
|
||||||
do
|
|
||||||
case $i in
|
while [ "$1" != "" ] ; do
|
||||||
|
case $1 in
|
||||||
-\?|-h|-help)
|
-\?|-h|-help)
|
||||||
echo "usage: CA -newcert|-newreq|-newca|-sign|-verify" >&2
|
usage
|
||||||
exit 0
|
exit 0
|
||||||
;;
|
;;
|
||||||
-newcert)
|
-newcert)
|
||||||
# create a certificate
|
# create a certificate
|
||||||
$REQ -new -x509 -keyout newreq.pem -out newreq.pem $DAYS
|
$REQ -new -x509 -keyout newkey.pem -out newcert.pem $DAYS
|
||||||
RET=$?
|
RET=$?
|
||||||
echo "Certificate (and private key) is in newreq.pem"
|
echo "Certificate is in newcert.pem, private key is in newkey.pem"
|
||||||
;;
|
;;
|
||||||
-newreq)
|
-newreq)
|
||||||
# create a certificate request
|
# create a certificate request
|
||||||
$REQ -new -keyout newreq.pem -out newreq.pem $DAYS
|
$REQ -new -keyout newkey.pem -out newreq.pem $DAYS
|
||||||
|
RET=$?
|
||||||
|
echo "Request is in newreq.pem, private key is in newkey.pem"
|
||||||
|
;;
|
||||||
|
-newreq-nodes)
|
||||||
|
# create a certificate request
|
||||||
|
$REQ -new -nodes -keyout newreq.pem -out newreq.pem $DAYS
|
||||||
RET=$?
|
RET=$?
|
||||||
echo "Request (and private key) is in newreq.pem"
|
echo "Request (and private key) is in newreq.pem"
|
||||||
;;
|
;;
|
||||||
@@ -65,12 +105,11 @@ case $i in
|
|||||||
NEW="1"
|
NEW="1"
|
||||||
if [ "$NEW" -o ! -f ${CATOP}/serial ]; then
|
if [ "$NEW" -o ! -f ${CATOP}/serial ]; then
|
||||||
# create the directory hierarchy
|
# create the directory hierarchy
|
||||||
mkdir ${CATOP}
|
mkdir -p ${CATOP}
|
||||||
mkdir ${CATOP}/certs
|
mkdir -p ${CATOP}/certs
|
||||||
mkdir ${CATOP}/crl
|
mkdir -p ${CATOP}/crl
|
||||||
mkdir ${CATOP}/newcerts
|
mkdir -p ${CATOP}/newcerts
|
||||||
mkdir ${CATOP}/private
|
mkdir -p ${CATOP}/private
|
||||||
echo "01" > ${CATOP}/serial
|
|
||||||
touch ${CATOP}/index.txt
|
touch ${CATOP}/index.txt
|
||||||
fi
|
fi
|
||||||
if [ ! -f ${CATOP}/private/$CAKEY ]; then
|
if [ ! -f ${CATOP}/private/$CAKEY ]; then
|
||||||
@@ -79,12 +118,21 @@ case $i in
|
|||||||
|
|
||||||
# ask user for existing CA certificate
|
# ask user for existing CA certificate
|
||||||
if [ "$FILE" ]; then
|
if [ "$FILE" ]; then
|
||||||
cp $FILE ${CATOP}/private/$CAKEY
|
cp_pem $FILE ${CATOP}/private/$CAKEY PRIVATE
|
||||||
|
cp_pem $FILE ${CATOP}/$CACERT CERTIFICATE
|
||||||
RET=$?
|
RET=$?
|
||||||
|
if [ ! -f "${CATOP}/serial" ]; then
|
||||||
|
$X509 -in ${CATOP}/$CACERT -noout -next_serial \
|
||||||
|
-out ${CATOP}/serial
|
||||||
|
fi
|
||||||
else
|
else
|
||||||
echo "Making CA certificate ..."
|
echo "Making CA certificate ..."
|
||||||
$REQ -new -x509 -keyout ${CATOP}/private/$CAKEY \
|
$REQ -new -keyout ${CATOP}/private/$CAKEY \
|
||||||
-out ${CATOP}/$CACERT $DAYS
|
-out ${CATOP}/$CAREQ
|
||||||
|
$CA -create_serial -out ${CATOP}/$CACERT $CADAYS -batch \
|
||||||
|
-keyfile ${CATOP}/private/$CAKEY -selfsign \
|
||||||
|
-extensions v3_ca \
|
||||||
|
-infiles ${CATOP}/$CAREQ
|
||||||
RET=$?
|
RET=$?
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
@@ -93,16 +141,33 @@ case $i in
|
|||||||
$CA -policy policy_anything -infiles newreq.pem
|
$CA -policy policy_anything -infiles newreq.pem
|
||||||
RET=$?
|
RET=$?
|
||||||
;;
|
;;
|
||||||
|
-pkcs12)
|
||||||
|
if [ -z "$2" ] ; then
|
||||||
|
CNAME="My Certificate"
|
||||||
|
else
|
||||||
|
CNAME="$2"
|
||||||
|
fi
|
||||||
|
$PKCS12 -in newcert.pem -inkey newreq.pem -certfile ${CATOP}/$CACERT \
|
||||||
|
-out newcert.p12 -export -name "$CNAME"
|
||||||
|
RET=$?
|
||||||
|
exit $RET
|
||||||
|
;;
|
||||||
-sign|-signreq)
|
-sign|-signreq)
|
||||||
$CA -policy policy_anything -out newcert.pem -infiles newreq.pem
|
$CA -policy policy_anything -out newcert.pem -infiles newreq.pem
|
||||||
RET=$?
|
RET=$?
|
||||||
cat newcert.pem
|
cat newcert.pem
|
||||||
echo "Signed certificate is in newcert.pem"
|
echo "Signed certificate is in newcert.pem"
|
||||||
;;
|
;;
|
||||||
|
-signCA)
|
||||||
|
$CA -policy policy_anything -out newcert.pem -extensions v3_ca -infiles newreq.pem
|
||||||
|
RET=$?
|
||||||
|
echo "Signed CA certificate is in newcert.pem"
|
||||||
|
;;
|
||||||
-signcert)
|
-signcert)
|
||||||
echo "Cert passphrase will be requested twice - bug?"
|
echo "Cert passphrase will be requested twice - bug?"
|
||||||
$X509 -x509toreq -in newreq.pem -signkey newreq.pem -out tmp.pem
|
$X509 -x509toreq -in newreq.pem -signkey newreq.pem -out tmp.pem
|
||||||
$CA -policy policy_anything -out newcert.pem -infiles tmp.pem
|
$CA -policy policy_anything -out newcert.pem -infiles tmp.pem
|
||||||
|
RET=$?
|
||||||
cat newcert.pem
|
cat newcert.pem
|
||||||
echo "Signed certificate is in newcert.pem"
|
echo "Signed certificate is in newcert.pem"
|
||||||
;;
|
;;
|
||||||
@@ -120,13 +185,14 @@ case $i in
|
|||||||
fi
|
fi
|
||||||
done
|
done
|
||||||
fi
|
fi
|
||||||
exit 0
|
exit $RET
|
||||||
;;
|
;;
|
||||||
*)
|
*)
|
||||||
echo "Unknown arg $i";
|
echo "Unknown arg $i" >&2
|
||||||
|
usage
|
||||||
exit 1
|
exit 1
|
||||||
;;
|
;;
|
||||||
esac
|
esac
|
||||||
|
shift
|
||||||
done
|
done
|
||||||
exit $RET
|
exit $RET
|
||||||
|
|
||||||
|
|||||||
1059
apps/Makefile
Normal file
1059
apps/Makefile
Normal file
File diff suppressed because it is too large
Load Diff
1256
apps/Makefile.ssl
1256
apps/Makefile.ssl
File diff suppressed because it is too large
Load Diff
168
apps/app_rand.c
168
apps/app_rand.c
@@ -115,104 +115,106 @@
|
|||||||
#include <openssl/bio.h>
|
#include <openssl/bio.h>
|
||||||
#include <openssl/rand.h>
|
#include <openssl/rand.h>
|
||||||
|
|
||||||
|
|
||||||
static int seeded = 0;
|
static int seeded = 0;
|
||||||
static int egdsocket = 0;
|
static int egdsocket = 0;
|
||||||
|
|
||||||
int app_RAND_load_file(const char *file, BIO *bio_e, int dont_warn)
|
int app_RAND_load_file(const char *file, BIO *bio_e, int dont_warn)
|
||||||
{
|
{
|
||||||
int consider_randfile = (file == NULL);
|
int consider_randfile = (file == NULL);
|
||||||
char buffer[200];
|
char buffer[200];
|
||||||
|
|
||||||
#ifdef OPENSSL_SYS_WINDOWS
|
#ifdef OPENSSL_SYS_WINDOWS
|
||||||
BIO_printf(bio_e,"Loading 'screen' into random state -");
|
BIO_printf(bio_e, "Loading 'screen' into random state -");
|
||||||
BIO_flush(bio_e);
|
BIO_flush(bio_e);
|
||||||
RAND_screen();
|
RAND_screen();
|
||||||
BIO_printf(bio_e," done\n");
|
BIO_printf(bio_e, " done\n");
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
if (file == NULL)
|
if (file == NULL)
|
||||||
file = RAND_file_name(buffer, sizeof buffer);
|
file = RAND_file_name(buffer, sizeof buffer);
|
||||||
else if (RAND_egd(file) > 0)
|
else if (RAND_egd(file) > 0) {
|
||||||
{
|
/*
|
||||||
/* we try if the given filename is an EGD socket.
|
* we try if the given filename is an EGD socket. if it is, we don't
|
||||||
if it is, we don't write anything back to the file. */
|
* write anything back to the file.
|
||||||
egdsocket = 1;
|
*/
|
||||||
return 1;
|
egdsocket = 1;
|
||||||
}
|
return 1;
|
||||||
if (file == NULL || !RAND_load_file(file, -1))
|
}
|
||||||
{
|
if (file == NULL || !RAND_load_file(file, -1)) {
|
||||||
if (RAND_status() == 0)
|
if (RAND_status() == 0) {
|
||||||
{
|
if (!dont_warn) {
|
||||||
if (!dont_warn)
|
BIO_printf(bio_e, "unable to load 'random state'\n");
|
||||||
{
|
BIO_printf(bio_e,
|
||||||
BIO_printf(bio_e,"unable to load 'random state'\n");
|
"This means that the random number generator has not been seeded\n");
|
||||||
BIO_printf(bio_e,"This means that the random number generator has not been seeded\n");
|
BIO_printf(bio_e, "with much random data.\n");
|
||||||
BIO_printf(bio_e,"with much random data.\n");
|
if (consider_randfile) { /* explanation does not apply when a
|
||||||
if (consider_randfile) /* explanation does not apply when a file is explicitly named */
|
* file is explicitly named */
|
||||||
{
|
BIO_printf(bio_e,
|
||||||
BIO_printf(bio_e,"Consider setting the RANDFILE environment variable to point at a file that\n");
|
"Consider setting the RANDFILE environment variable to point at a file that\n");
|
||||||
BIO_printf(bio_e,"'random' data can be kept in (the file will be overwritten).\n");
|
BIO_printf(bio_e,
|
||||||
}
|
"'random' data can be kept in (the file will be overwritten).\n");
|
||||||
}
|
}
|
||||||
return 0;
|
}
|
||||||
}
|
return 0;
|
||||||
}
|
}
|
||||||
seeded = 1;
|
}
|
||||||
return 1;
|
seeded = 1;
|
||||||
}
|
return 1;
|
||||||
|
}
|
||||||
|
|
||||||
long app_RAND_load_files(char *name)
|
long app_RAND_load_files(char *name)
|
||||||
{
|
{
|
||||||
char *p,*n;
|
char *p, *n;
|
||||||
int last;
|
int last;
|
||||||
long tot=0;
|
long tot = 0;
|
||||||
int egd;
|
int egd;
|
||||||
|
|
||||||
for (;;)
|
for (;;) {
|
||||||
{
|
last = 0;
|
||||||
last=0;
|
for (p = name; ((*p != '\0') && (*p != LIST_SEPARATOR_CHAR)); p++) ;
|
||||||
for (p=name; ((*p != '\0') && (*p != LIST_SEPARATOR_CHAR)); p++);
|
if (*p == '\0')
|
||||||
if (*p == '\0') last=1;
|
last = 1;
|
||||||
*p='\0';
|
*p = '\0';
|
||||||
n=name;
|
n = name;
|
||||||
name=p+1;
|
name = p + 1;
|
||||||
if (*n == '\0') break;
|
if (*n == '\0')
|
||||||
|
break;
|
||||||
|
|
||||||
egd=RAND_egd(n);
|
egd = RAND_egd(n);
|
||||||
if (egd > 0)
|
if (egd > 0)
|
||||||
tot+=egd;
|
tot += egd;
|
||||||
else
|
else
|
||||||
tot+=RAND_load_file(n,-1);
|
tot += RAND_load_file(n, -1);
|
||||||
if (last) break;
|
if (last)
|
||||||
}
|
break;
|
||||||
if (tot > 512)
|
}
|
||||||
app_RAND_allow_write_file();
|
if (tot > 512)
|
||||||
return(tot);
|
app_RAND_allow_write_file();
|
||||||
}
|
return (tot);
|
||||||
|
}
|
||||||
|
|
||||||
int app_RAND_write_file(const char *file, BIO *bio_e)
|
int app_RAND_write_file(const char *file, BIO *bio_e)
|
||||||
{
|
{
|
||||||
char buffer[200];
|
char buffer[200];
|
||||||
|
|
||||||
if (egdsocket || !seeded)
|
if (egdsocket || !seeded)
|
||||||
/* If we did not manage to read the seed file,
|
/*
|
||||||
* we should not write a low-entropy seed file back --
|
* If we did not manage to read the seed file, we should not write a
|
||||||
* it would suppress a crucial warning the next time
|
* low-entropy seed file back -- it would suppress a crucial warning
|
||||||
* we want to use it. */
|
* the next time we want to use it.
|
||||||
return 0;
|
*/
|
||||||
|
return 0;
|
||||||
|
|
||||||
if (file == NULL)
|
if (file == NULL)
|
||||||
file = RAND_file_name(buffer, sizeof buffer);
|
file = RAND_file_name(buffer, sizeof buffer);
|
||||||
if (file == NULL || !RAND_write_file(file))
|
if (file == NULL || !RAND_write_file(file)) {
|
||||||
{
|
BIO_printf(bio_e, "unable to write 'random state'\n");
|
||||||
BIO_printf(bio_e,"unable to write 'random state'\n");
|
return 0;
|
||||||
return 0;
|
}
|
||||||
}
|
return 1;
|
||||||
return 1;
|
}
|
||||||
}
|
|
||||||
|
|
||||||
void app_RAND_allow_write_file(void)
|
void app_RAND_allow_write_file(void)
|
||||||
{
|
{
|
||||||
seeded = 1;
|
seeded = 1;
|
||||||
}
|
}
|
||||||
|
|||||||
3801
apps/apps.c
3801
apps/apps.c
File diff suppressed because it is too large
Load Diff
307
apps/apps.h
307
apps/apps.h
@@ -110,116 +110,119 @@
|
|||||||
*/
|
*/
|
||||||
|
|
||||||
#ifndef HEADER_APPS_H
|
#ifndef HEADER_APPS_H
|
||||||
#define HEADER_APPS_H
|
# define HEADER_APPS_H
|
||||||
|
|
||||||
#include "e_os.h"
|
# include "e_os.h"
|
||||||
|
|
||||||
#include <openssl/buffer.h>
|
# include <openssl/bio.h>
|
||||||
#include <openssl/bio.h>
|
# include <openssl/x509.h>
|
||||||
#include <openssl/crypto.h>
|
# include <openssl/lhash.h>
|
||||||
#include <openssl/x509.h>
|
# include <openssl/conf.h>
|
||||||
#include <openssl/lhash.h>
|
# include <openssl/txt_db.h>
|
||||||
#include <openssl/conf.h>
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
#include <openssl/txt_db.h>
|
# include <openssl/engine.h>
|
||||||
#include <openssl/engine.h>
|
# endif
|
||||||
#include <openssl/ossl_typ.h>
|
# ifndef OPENSSL_NO_OCSP
|
||||||
|
# include <openssl/ocsp.h>
|
||||||
|
# endif
|
||||||
|
# include <openssl/ossl_typ.h>
|
||||||
|
|
||||||
int app_RAND_load_file(const char *file, BIO *bio_e, int dont_warn);
|
int app_RAND_load_file(const char *file, BIO *bio_e, int dont_warn);
|
||||||
int app_RAND_write_file(const char *file, BIO *bio_e);
|
int app_RAND_write_file(const char *file, BIO *bio_e);
|
||||||
/* When `file' is NULL, use defaults.
|
/*
|
||||||
* `bio_e' is for error messages. */
|
* When `file' is NULL, use defaults. `bio_e' is for error messages.
|
||||||
|
*/
|
||||||
void app_RAND_allow_write_file(void);
|
void app_RAND_allow_write_file(void);
|
||||||
long app_RAND_load_files(char *file); /* `file' is a list of files to read,
|
long app_RAND_load_files(char *file); /* `file' is a list of files to read,
|
||||||
* separated by LIST_SEPARATOR_CHAR
|
* separated by LIST_SEPARATOR_CHAR
|
||||||
* (see e_os.h). The string is
|
* (see e_os.h). The string is
|
||||||
* destroyed! */
|
* destroyed! */
|
||||||
|
|
||||||
#ifdef OPENSSL_SYS_WIN32
|
# ifndef MONOLITH
|
||||||
#define rename(from,to) WIN32_rename((from),(to))
|
|
||||||
int WIN32_rename(char *oldname,char *newname);
|
|
||||||
#endif
|
|
||||||
|
|
||||||
/* VMS below version 7.0 doesn't have strcasecmp() */
|
# define MAIN(a,v) main(a,v)
|
||||||
#ifdef OPENSSL_SYS_VMS
|
|
||||||
#define strcasecmp(str1,str2) VMS_strcasecmp((str1),(str2))
|
|
||||||
int VMS_strcasecmp(const char *str1, const char *str2);
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#ifndef MONOLITH
|
# ifndef NON_MAIN
|
||||||
|
CONF *config = NULL;
|
||||||
#define MAIN(a,v) main(a,v)
|
BIO *bio_err = NULL;
|
||||||
|
# else
|
||||||
#ifndef NON_MAIN
|
|
||||||
CONF *config=NULL;
|
|
||||||
BIO *bio_err=NULL;
|
|
||||||
#else
|
|
||||||
extern CONF *config;
|
extern CONF *config;
|
||||||
extern BIO *bio_err;
|
extern BIO *bio_err;
|
||||||
#endif
|
# endif
|
||||||
|
|
||||||
#else
|
# else
|
||||||
|
|
||||||
#define MAIN(a,v) PROG(a,v)
|
# define MAIN(a,v) PROG(a,v)
|
||||||
extern CONF *config;
|
extern CONF *config;
|
||||||
extern char *default_config_file;
|
extern char *default_config_file;
|
||||||
extern BIO *bio_err;
|
extern BIO *bio_err;
|
||||||
|
|
||||||
#endif
|
# endif
|
||||||
|
|
||||||
#include <signal.h>
|
# ifndef OPENSSL_SYS_NETWARE
|
||||||
|
# include <signal.h>
|
||||||
|
# endif
|
||||||
|
|
||||||
#ifdef SIGPIPE
|
# ifdef SIGPIPE
|
||||||
#define do_pipe_sig() signal(SIGPIPE,SIG_IGN)
|
# define do_pipe_sig() signal(SIGPIPE,SIG_IGN)
|
||||||
#else
|
# else
|
||||||
#define do_pipe_sig()
|
# define do_pipe_sig()
|
||||||
#endif
|
# endif
|
||||||
|
|
||||||
#if defined(MONOLITH) && !defined(OPENSSL_C)
|
# ifdef OPENSSL_NO_COMP
|
||||||
|
# define zlib_cleanup()
|
||||||
|
# else
|
||||||
|
# define zlib_cleanup() COMP_zlib_cleanup()
|
||||||
|
# endif
|
||||||
|
|
||||||
|
# if defined(MONOLITH) && !defined(OPENSSL_C)
|
||||||
# define apps_startup() \
|
# define apps_startup() \
|
||||||
do_pipe_sig()
|
do_pipe_sig()
|
||||||
# define apps_shutdown()
|
# define apps_shutdown()
|
||||||
#else
|
# else
|
||||||
# if defined(OPENSSL_SYS_MSDOS) || defined(OPENSSL_SYS_WIN16) || \
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
defined(OPENSSL_SYS_WIN32)
|
# define apps_startup() \
|
||||||
# ifdef _O_BINARY
|
do { do_pipe_sig(); CRYPTO_malloc_init(); \
|
||||||
# define apps_startup() \
|
ERR_load_crypto_strings(); OpenSSL_add_all_algorithms(); \
|
||||||
do { _fmode=_O_BINARY; do_pipe_sig(); CRYPTO_malloc_init(); \
|
ENGINE_load_builtin_engines(); setup_ui_method(); } while(0)
|
||||||
ERR_load_crypto_strings(); OpenSSL_add_all_algorithms(); \
|
# define apps_shutdown() \
|
||||||
ENGINE_load_builtin_engines(); setup_ui_method(); } while(0)
|
do { CONF_modules_unload(1); destroy_ui_method(); \
|
||||||
# else
|
OBJ_cleanup(); EVP_cleanup(); ENGINE_cleanup(); \
|
||||||
# define apps_startup() \
|
CRYPTO_cleanup_all_ex_data(); ERR_remove_thread_state(NULL); \
|
||||||
do { _fmode=O_BINARY; do_pipe_sig(); CRYPTO_malloc_init(); \
|
RAND_cleanup(); \
|
||||||
ERR_load_crypto_strings(); OpenSSL_add_all_algorithms(); \
|
ERR_free_strings(); zlib_cleanup();} while(0)
|
||||||
ENGINE_load_builtin_engines(); setup_ui_method(); } while(0)
|
|
||||||
# endif
|
|
||||||
# else
|
# else
|
||||||
# define apps_startup() \
|
# define apps_startup() \
|
||||||
do { do_pipe_sig(); OpenSSL_add_all_algorithms(); \
|
do { do_pipe_sig(); CRYPTO_malloc_init(); \
|
||||||
ERR_load_crypto_strings(); ENGINE_load_builtin_engines(); \
|
ERR_load_crypto_strings(); OpenSSL_add_all_algorithms(); \
|
||||||
setup_ui_method(); } while(0)
|
setup_ui_method(); } while(0)
|
||||||
|
# define apps_shutdown() \
|
||||||
|
do { CONF_modules_unload(1); destroy_ui_method(); \
|
||||||
|
OBJ_cleanup(); EVP_cleanup(); \
|
||||||
|
CRYPTO_cleanup_all_ex_data(); ERR_remove_thread_state(NULL); \
|
||||||
|
RAND_cleanup(); \
|
||||||
|
ERR_free_strings(); zlib_cleanup(); } while(0)
|
||||||
# endif
|
# endif
|
||||||
# define apps_shutdown() \
|
# endif
|
||||||
do { CONF_modules_unload(1); destroy_ui_method(); \
|
|
||||||
EVP_cleanup(); ENGINE_cleanup(); \
|
|
||||||
CRYPTO_cleanup_all_ex_data(); ERR_remove_state(0); \
|
|
||||||
ERR_free_strings(); } while(0)
|
|
||||||
#endif
|
|
||||||
|
|
||||||
typedef struct args_st
|
# ifdef OPENSSL_SYSNAME_WIN32
|
||||||
{
|
# define openssl_fdset(a,b) FD_SET((unsigned int)a, b)
|
||||||
char **data;
|
# else
|
||||||
int count;
|
# define openssl_fdset(a,b) FD_SET(a, b)
|
||||||
} ARGS;
|
# endif
|
||||||
|
|
||||||
#define PW_MIN_LENGTH 4
|
typedef struct args_st {
|
||||||
typedef struct pw_cb_data
|
char **data;
|
||||||
{
|
int count;
|
||||||
const void *password;
|
} ARGS;
|
||||||
const char *prompt_info;
|
|
||||||
} PW_CB_DATA;
|
|
||||||
|
|
||||||
int password_callback(char *buf, int bufsiz, int verify,
|
# define PW_MIN_LENGTH 4
|
||||||
PW_CB_DATA *cb_data);
|
typedef struct pw_cb_data {
|
||||||
|
const void *password;
|
||||||
|
const char *prompt_info;
|
||||||
|
} PW_CB_DATA;
|
||||||
|
|
||||||
|
int password_callback(char *buf, int bufsiz, int verify, PW_CB_DATA *cb_data);
|
||||||
|
|
||||||
int setup_ui_method(void);
|
int setup_ui_method(void);
|
||||||
void destroy_ui_method(void);
|
void destroy_ui_method(void);
|
||||||
@@ -227,12 +230,13 @@ void destroy_ui_method(void);
|
|||||||
int should_retry(int i);
|
int should_retry(int i);
|
||||||
int args_from_file(char *file, int *argc, char **argv[]);
|
int args_from_file(char *file, int *argc, char **argv[]);
|
||||||
int str2fmt(char *s);
|
int str2fmt(char *s);
|
||||||
void program_name(char *in,char *out,int size);
|
void program_name(char *in, char *out, int size);
|
||||||
int chopup_args(ARGS *arg,char *buf, int *argc, char **argv[]);
|
int chopup_args(ARGS *arg, char *buf, int *argc, char **argv[]);
|
||||||
#ifdef HEADER_X509_H
|
# ifdef HEADER_X509_H
|
||||||
int dump_cert_text(BIO *out, X509 *x);
|
int dump_cert_text(BIO *out, X509 *x);
|
||||||
void print_name(BIO *out, char *title, X509_NAME *nm, unsigned long lflags);
|
void print_name(BIO *out, const char *title, X509_NAME *nm,
|
||||||
#endif
|
unsigned long lflags);
|
||||||
|
# endif
|
||||||
int set_cert_ex(unsigned long *flags, const char *arg);
|
int set_cert_ex(unsigned long *flags, const char *arg);
|
||||||
int set_name_ex(unsigned long *flags, const char *arg);
|
int set_name_ex(unsigned long *flags, const char *arg);
|
||||||
int set_ext_copy(int *copy_type, const char *arg);
|
int set_ext_copy(int *copy_type, const char *arg);
|
||||||
@@ -240,43 +244,134 @@ int copy_extensions(X509 *x, X509_REQ *req, int copy_type);
|
|||||||
int app_passwd(BIO *err, char *arg1, char *arg2, char **pass1, char **pass2);
|
int app_passwd(BIO *err, char *arg1, char *arg2, char **pass1, char **pass2);
|
||||||
int add_oid_section(BIO *err, CONF *conf);
|
int add_oid_section(BIO *err, CONF *conf);
|
||||||
X509 *load_cert(BIO *err, const char *file, int format,
|
X509 *load_cert(BIO *err, const char *file, int format,
|
||||||
const char *pass, ENGINE *e, const char *cert_descrip);
|
const char *pass, ENGINE *e, const char *cert_descrip);
|
||||||
EVP_PKEY *load_key(BIO *err, const char *file, int format, int maybe_stdin,
|
EVP_PKEY *load_key(BIO *err, const char *file, int format, int maybe_stdin,
|
||||||
const char *pass, ENGINE *e, const char *key_descrip);
|
const char *pass, ENGINE *e, const char *key_descrip);
|
||||||
EVP_PKEY *load_pubkey(BIO *err, const char *file, int format, int maybe_stdin,
|
EVP_PKEY *load_pubkey(BIO *err, const char *file, int format, int maybe_stdin,
|
||||||
const char *pass, ENGINE *e, const char *key_descrip);
|
const char *pass, ENGINE *e, const char *key_descrip);
|
||||||
STACK_OF(X509) *load_certs(BIO *err, const char *file, int format,
|
STACK_OF(X509) *load_certs(BIO *err, const char *file, int format,
|
||||||
const char *pass, ENGINE *e, const char *cert_descrip);
|
const char *pass, ENGINE *e,
|
||||||
|
const char *cert_descrip);
|
||||||
|
STACK_OF(X509_CRL) *load_crls(BIO *err, const char *file, int format,
|
||||||
|
const char *pass, ENGINE *e,
|
||||||
|
const char *cert_descrip);
|
||||||
X509_STORE *setup_verify(BIO *bp, char *CAfile, char *CApath);
|
X509_STORE *setup_verify(BIO *bp, char *CAfile, char *CApath);
|
||||||
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
ENGINE *setup_engine(BIO *err, const char *engine, int debug);
|
ENGINE *setup_engine(BIO *err, const char *engine, int debug);
|
||||||
|
# endif
|
||||||
|
|
||||||
|
# ifndef OPENSSL_NO_OCSP
|
||||||
|
OCSP_RESPONSE *process_responder(BIO *err, OCSP_REQUEST *req,
|
||||||
|
char *host, char *path, char *port,
|
||||||
|
int use_ssl, STACK_OF(CONF_VALUE) *headers,
|
||||||
|
int req_timeout);
|
||||||
|
# endif
|
||||||
|
|
||||||
int load_config(BIO *err, CONF *cnf);
|
int load_config(BIO *err, CONF *cnf);
|
||||||
char *make_config_name(void);
|
char *make_config_name(void);
|
||||||
|
|
||||||
/* Functions defined in ca.c and also used in ocsp.c */
|
/* Functions defined in ca.c and also used in ocsp.c */
|
||||||
int unpack_revinfo(ASN1_TIME **prevtm, int *preason, ASN1_OBJECT **phold,
|
int unpack_revinfo(ASN1_TIME **prevtm, int *preason, ASN1_OBJECT **phold,
|
||||||
ASN1_GENERALIZEDTIME **pinvtm, char *str);
|
ASN1_GENERALIZEDTIME **pinvtm, const char *str);
|
||||||
int make_serial_index(TXT_DB *db);
|
|
||||||
|
|
||||||
X509_NAME *do_subject(char *str, long chtype);
|
# define DB_type 0
|
||||||
|
# define DB_exp_date 1
|
||||||
|
# define DB_rev_date 2
|
||||||
|
# define DB_serial 3 /* index - unique */
|
||||||
|
# define DB_file 4
|
||||||
|
# define DB_name 5 /* index - unique when active and not
|
||||||
|
* disabled */
|
||||||
|
# define DB_NUMBER 6
|
||||||
|
|
||||||
#define FORMAT_UNDEF 0
|
# define DB_TYPE_REV 'R'
|
||||||
#define FORMAT_ASN1 1
|
# define DB_TYPE_EXP 'E'
|
||||||
#define FORMAT_TEXT 2
|
# define DB_TYPE_VAL 'V'
|
||||||
#define FORMAT_PEM 3
|
|
||||||
#define FORMAT_NETSCAPE 4
|
|
||||||
#define FORMAT_PKCS12 5
|
|
||||||
#define FORMAT_SMIME 6
|
|
||||||
#define FORMAT_ENGINE 7
|
|
||||||
#define FORMAT_IISSGC 8 /* XXX this stupid macro helps us to avoid
|
|
||||||
* adding yet another param to load_*key() */
|
|
||||||
|
|
||||||
#define EXT_COPY_NONE 0
|
typedef struct db_attr_st {
|
||||||
#define EXT_COPY_ADD 1
|
int unique_subject;
|
||||||
#define EXT_COPY_ALL 2
|
} DB_ATTR;
|
||||||
|
typedef struct ca_db_st {
|
||||||
|
DB_ATTR attributes;
|
||||||
|
TXT_DB *db;
|
||||||
|
} CA_DB;
|
||||||
|
|
||||||
#define NETSCAPE_CERT_HDR "certificate"
|
BIGNUM *load_serial(char *serialfile, int create, ASN1_INTEGER **retai);
|
||||||
|
int save_serial(char *serialfile, char *suffix, BIGNUM *serial,
|
||||||
|
ASN1_INTEGER **retai);
|
||||||
|
int rotate_serial(char *serialfile, char *new_suffix, char *old_suffix);
|
||||||
|
int rand_serial(BIGNUM *b, ASN1_INTEGER *ai);
|
||||||
|
CA_DB *load_index(char *dbfile, DB_ATTR *dbattr);
|
||||||
|
int index_index(CA_DB *db);
|
||||||
|
int save_index(const char *dbfile, const char *suffix, CA_DB *db);
|
||||||
|
int rotate_index(const char *dbfile, const char *new_suffix,
|
||||||
|
const char *old_suffix);
|
||||||
|
void free_index(CA_DB *db);
|
||||||
|
# define index_name_cmp_noconst(a, b) \
|
||||||
|
index_name_cmp((const OPENSSL_CSTRING *)CHECKED_PTR_OF(OPENSSL_STRING, a), \
|
||||||
|
(const OPENSSL_CSTRING *)CHECKED_PTR_OF(OPENSSL_STRING, b))
|
||||||
|
int index_name_cmp(const OPENSSL_CSTRING *a, const OPENSSL_CSTRING *b);
|
||||||
|
int parse_yesno(const char *str, int def);
|
||||||
|
|
||||||
#define APP_PASS_LEN 1024
|
X509_NAME *parse_name(char *str, long chtype, int multirdn);
|
||||||
|
int args_verify(char ***pargs, int *pargc,
|
||||||
|
int *badarg, BIO *err, X509_VERIFY_PARAM **pm);
|
||||||
|
void policies_print(BIO *out, X509_STORE_CTX *ctx);
|
||||||
|
int bio_to_mem(unsigned char **out, int maxlen, BIO *in);
|
||||||
|
int pkey_ctrl_string(EVP_PKEY_CTX *ctx, char *value);
|
||||||
|
int init_gen_str(BIO *err, EVP_PKEY_CTX **pctx,
|
||||||
|
const char *algname, ENGINE *e, int do_param);
|
||||||
|
int do_X509_sign(BIO *err, X509 *x, EVP_PKEY *pkey, const EVP_MD *md,
|
||||||
|
STACK_OF(OPENSSL_STRING) *sigopts);
|
||||||
|
int do_X509_REQ_sign(BIO *err, X509_REQ *x, EVP_PKEY *pkey, const EVP_MD *md,
|
||||||
|
STACK_OF(OPENSSL_STRING) *sigopts);
|
||||||
|
int do_X509_CRL_sign(BIO *err, X509_CRL *x, EVP_PKEY *pkey, const EVP_MD *md,
|
||||||
|
STACK_OF(OPENSSL_STRING) *sigopts);
|
||||||
|
# ifndef OPENSSL_NO_PSK
|
||||||
|
extern char *psk_key;
|
||||||
|
# endif
|
||||||
|
# ifndef OPENSSL_NO_JPAKE
|
||||||
|
void jpake_client_auth(BIO *out, BIO *conn, const char *secret);
|
||||||
|
void jpake_server_auth(BIO *out, BIO *conn, const char *secret);
|
||||||
|
# endif
|
||||||
|
|
||||||
|
# if !defined(OPENSSL_NO_TLSEXT) && !defined(OPENSSL_NO_NEXTPROTONEG)
|
||||||
|
unsigned char *next_protos_parse(unsigned short *outlen, const char *in);
|
||||||
|
# endif /* !OPENSSL_NO_TLSEXT &&
|
||||||
|
* !OPENSSL_NO_NEXTPROTONEG */
|
||||||
|
|
||||||
|
# define FORMAT_UNDEF 0
|
||||||
|
# define FORMAT_ASN1 1
|
||||||
|
# define FORMAT_TEXT 2
|
||||||
|
# define FORMAT_PEM 3
|
||||||
|
# define FORMAT_NETSCAPE 4
|
||||||
|
# define FORMAT_PKCS12 5
|
||||||
|
# define FORMAT_SMIME 6
|
||||||
|
# define FORMAT_ENGINE 7
|
||||||
|
# define FORMAT_IISSGC 8 /* XXX this stupid macro helps us to avoid
|
||||||
|
* adding yet another param to load_*key() */
|
||||||
|
# define FORMAT_PEMRSA 9 /* PEM RSAPubicKey format */
|
||||||
|
# define FORMAT_ASN1RSA 10 /* DER RSAPubicKey format */
|
||||||
|
# define FORMAT_MSBLOB 11 /* MS Key blob format */
|
||||||
|
# define FORMAT_PVK 12 /* MS PVK file format */
|
||||||
|
|
||||||
|
# define EXT_COPY_NONE 0
|
||||||
|
# define EXT_COPY_ADD 1
|
||||||
|
# define EXT_COPY_ALL 2
|
||||||
|
|
||||||
|
# define NETSCAPE_CERT_HDR "certificate"
|
||||||
|
|
||||||
|
# define APP_PASS_LEN 1024
|
||||||
|
|
||||||
|
# define SERIAL_RAND_BITS 64
|
||||||
|
|
||||||
|
int app_isdir(const char *);
|
||||||
|
int raw_read_stdin(void *, int);
|
||||||
|
int raw_write_stdout(const void *, int);
|
||||||
|
|
||||||
|
# define TM_START 0
|
||||||
|
# define TM_STOP 1
|
||||||
|
double app_tminterval(int stop, int usertime);
|
||||||
|
|
||||||
|
# define OPENSSL_NO_SSL_INTERN
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
622
apps/asn1pars.c
622
apps/asn1pars.c
@@ -56,8 +56,9 @@
|
|||||||
* [including the GNU Public Licence.]
|
* [including the GNU Public Licence.]
|
||||||
*/
|
*/
|
||||||
|
|
||||||
/* A nice addition from Dr Stephen Henson <shenson@bigfoot.com> to
|
/*
|
||||||
* add the -strparse option which parses nested binary structures
|
* A nice addition from Dr Stephen Henson <steve@openssl.org> to add the
|
||||||
|
* -strparse option which parses nested binary structures
|
||||||
*/
|
*/
|
||||||
|
|
||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
@@ -69,356 +70,361 @@
|
|||||||
#include <openssl/x509.h>
|
#include <openssl/x509.h>
|
||||||
#include <openssl/pem.h>
|
#include <openssl/pem.h>
|
||||||
|
|
||||||
/* -inform arg - input format - default PEM (DER or PEM)
|
/*-
|
||||||
* -in arg - input file - default stdin
|
* -inform arg - input format - default PEM (DER or PEM)
|
||||||
* -i - indent the details by depth
|
* -in arg - input file - default stdin
|
||||||
* -offset - where in the file to start
|
* -i - indent the details by depth
|
||||||
* -length - how many bytes to use
|
* -offset - where in the file to start
|
||||||
* -oid file - extra oid description file
|
* -length - how many bytes to use
|
||||||
|
* -oid file - extra oid description file
|
||||||
*/
|
*/
|
||||||
|
|
||||||
#undef PROG
|
#undef PROG
|
||||||
#define PROG asn1parse_main
|
#define PROG asn1parse_main
|
||||||
|
|
||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
static int do_generate(BIO *bio, char *genstr, char *genconf, BUF_MEM *buf);
|
static int do_generate(BIO *bio, char *genstr, char *genconf, BUF_MEM *buf);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
int i,badops=0,offset=0,ret=1,j;
|
int i, badops = 0, offset = 0, ret = 1, j;
|
||||||
unsigned int length=0;
|
unsigned int length = 0;
|
||||||
long num,tmplen;
|
long num, tmplen;
|
||||||
BIO *in=NULL,*out=NULL,*b64=NULL, *derout = NULL;
|
BIO *in = NULL, *out = NULL, *b64 = NULL, *derout = NULL;
|
||||||
int informat,indent=0, noout = 0, dump = 0;
|
int informat, indent = 0, noout = 0, dump = 0;
|
||||||
char *infile=NULL,*str=NULL,*prog,*oidfile=NULL, *derfile=NULL;
|
char *infile = NULL, *str = NULL, *prog, *oidfile = NULL, *derfile = NULL;
|
||||||
char *genstr=NULL, *genconf=NULL;
|
char *genstr = NULL, *genconf = NULL;
|
||||||
unsigned char *tmpbuf;
|
unsigned char *tmpbuf;
|
||||||
BUF_MEM *buf=NULL;
|
const unsigned char *ctmpbuf;
|
||||||
STACK *osk=NULL;
|
BUF_MEM *buf = NULL;
|
||||||
ASN1_TYPE *at=NULL;
|
STACK_OF(OPENSSL_STRING) *osk = NULL;
|
||||||
|
ASN1_TYPE *at = NULL;
|
||||||
|
|
||||||
informat=FORMAT_PEM;
|
informat = FORMAT_PEM;
|
||||||
|
|
||||||
apps_startup();
|
apps_startup();
|
||||||
|
|
||||||
if (bio_err == NULL)
|
if (bio_err == NULL)
|
||||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
if ((bio_err = BIO_new(BIO_s_file())) != NULL)
|
||||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||||
|
|
||||||
if (!load_config(bio_err, NULL))
|
if (!load_config(bio_err, NULL))
|
||||||
goto end;
|
goto end;
|
||||||
|
|
||||||
prog=argv[0];
|
prog = argv[0];
|
||||||
argc--;
|
argc--;
|
||||||
argv++;
|
argv++;
|
||||||
if ((osk=sk_new_null()) == NULL)
|
if ((osk = sk_OPENSSL_STRING_new_null()) == NULL) {
|
||||||
{
|
BIO_printf(bio_err, "Memory allocation failure\n");
|
||||||
BIO_printf(bio_err,"Memory allocation failure\n");
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
while (argc >= 1) {
|
||||||
while (argc >= 1)
|
if (strcmp(*argv, "-inform") == 0) {
|
||||||
{
|
if (--argc < 1)
|
||||||
if (strcmp(*argv,"-inform") == 0)
|
goto bad;
|
||||||
{
|
informat = str2fmt(*(++argv));
|
||||||
if (--argc < 1) goto bad;
|
} else if (strcmp(*argv, "-in") == 0) {
|
||||||
informat=str2fmt(*(++argv));
|
if (--argc < 1)
|
||||||
}
|
goto bad;
|
||||||
else if (strcmp(*argv,"-in") == 0)
|
infile = *(++argv);
|
||||||
{
|
} else if (strcmp(*argv, "-out") == 0) {
|
||||||
if (--argc < 1) goto bad;
|
if (--argc < 1)
|
||||||
infile= *(++argv);
|
goto bad;
|
||||||
}
|
derfile = *(++argv);
|
||||||
else if (strcmp(*argv,"-out") == 0)
|
} else if (strcmp(*argv, "-i") == 0) {
|
||||||
{
|
indent = 1;
|
||||||
if (--argc < 1) goto bad;
|
} else if (strcmp(*argv, "-noout") == 0)
|
||||||
derfile= *(++argv);
|
noout = 1;
|
||||||
}
|
else if (strcmp(*argv, "-oid") == 0) {
|
||||||
else if (strcmp(*argv,"-i") == 0)
|
if (--argc < 1)
|
||||||
{
|
goto bad;
|
||||||
indent=1;
|
oidfile = *(++argv);
|
||||||
}
|
} else if (strcmp(*argv, "-offset") == 0) {
|
||||||
else if (strcmp(*argv,"-noout") == 0) noout = 1;
|
if (--argc < 1)
|
||||||
else if (strcmp(*argv,"-oid") == 0)
|
goto bad;
|
||||||
{
|
offset = atoi(*(++argv));
|
||||||
if (--argc < 1) goto bad;
|
} else if (strcmp(*argv, "-length") == 0) {
|
||||||
oidfile= *(++argv);
|
if (--argc < 1)
|
||||||
}
|
goto bad;
|
||||||
else if (strcmp(*argv,"-offset") == 0)
|
length = atoi(*(++argv));
|
||||||
{
|
if (length == 0)
|
||||||
if (--argc < 1) goto bad;
|
goto bad;
|
||||||
offset= atoi(*(++argv));
|
} else if (strcmp(*argv, "-dump") == 0) {
|
||||||
}
|
dump = -1;
|
||||||
else if (strcmp(*argv,"-length") == 0)
|
} else if (strcmp(*argv, "-dlimit") == 0) {
|
||||||
{
|
if (--argc < 1)
|
||||||
if (--argc < 1) goto bad;
|
goto bad;
|
||||||
length= atoi(*(++argv));
|
dump = atoi(*(++argv));
|
||||||
if (length == 0) goto bad;
|
if (dump <= 0)
|
||||||
}
|
goto bad;
|
||||||
else if (strcmp(*argv,"-dump") == 0)
|
} else if (strcmp(*argv, "-strparse") == 0) {
|
||||||
{
|
if (--argc < 1)
|
||||||
dump= -1;
|
goto bad;
|
||||||
}
|
sk_OPENSSL_STRING_push(osk, *(++argv));
|
||||||
else if (strcmp(*argv,"-dlimit") == 0)
|
} else if (strcmp(*argv, "-genstr") == 0) {
|
||||||
{
|
if (--argc < 1)
|
||||||
if (--argc < 1) goto bad;
|
goto bad;
|
||||||
dump= atoi(*(++argv));
|
genstr = *(++argv);
|
||||||
if (dump <= 0) goto bad;
|
} else if (strcmp(*argv, "-genconf") == 0) {
|
||||||
}
|
if (--argc < 1)
|
||||||
else if (strcmp(*argv,"-strparse") == 0)
|
goto bad;
|
||||||
{
|
genconf = *(++argv);
|
||||||
if (--argc < 1) goto bad;
|
} else {
|
||||||
sk_push(osk,*(++argv));
|
BIO_printf(bio_err, "unknown option %s\n", *argv);
|
||||||
}
|
badops = 1;
|
||||||
else if (strcmp(*argv,"-genstr") == 0)
|
break;
|
||||||
{
|
}
|
||||||
if (--argc < 1) goto bad;
|
argc--;
|
||||||
genstr= *(++argv);
|
argv++;
|
||||||
}
|
}
|
||||||
else if (strcmp(*argv,"-genconf") == 0)
|
|
||||||
{
|
|
||||||
if (--argc < 1) goto bad;
|
|
||||||
genconf= *(++argv);
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"unknown option %s\n",*argv);
|
|
||||||
badops=1;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
argc--;
|
|
||||||
argv++;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (badops)
|
if (badops) {
|
||||||
{
|
bad:
|
||||||
bad:
|
BIO_printf(bio_err, "%s [options] <infile\n", prog);
|
||||||
BIO_printf(bio_err,"%s [options] <infile\n",prog);
|
BIO_printf(bio_err, "where options are\n");
|
||||||
BIO_printf(bio_err,"where options are\n");
|
BIO_printf(bio_err, " -inform arg input format - one of DER PEM\n");
|
||||||
BIO_printf(bio_err," -inform arg input format - one of DER TXT PEM\n");
|
BIO_printf(bio_err, " -in arg input file\n");
|
||||||
BIO_printf(bio_err," -in arg input file\n");
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err," -out arg output file (output format is always DER\n");
|
" -out arg output file (output format is always DER\n");
|
||||||
BIO_printf(bio_err," -noout arg don't produce any output\n");
|
BIO_printf(bio_err, " -noout arg don't produce any output\n");
|
||||||
BIO_printf(bio_err," -offset arg offset into file\n");
|
BIO_printf(bio_err, " -offset arg offset into file\n");
|
||||||
BIO_printf(bio_err," -length arg length of section in file\n");
|
BIO_printf(bio_err, " -length arg length of section in file\n");
|
||||||
BIO_printf(bio_err," -i indent entries\n");
|
BIO_printf(bio_err, " -i indent entries\n");
|
||||||
BIO_printf(bio_err," -dump dump unknown data in hex form\n");
|
BIO_printf(bio_err, " -dump dump unknown data in hex form\n");
|
||||||
BIO_printf(bio_err," -dlimit arg dump the first arg bytes of unknown data in hex form\n");
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err," -oid file file of extra oid definitions\n");
|
" -dlimit arg dump the first arg bytes of unknown data in hex form\n");
|
||||||
BIO_printf(bio_err," -strparse offset\n");
|
BIO_printf(bio_err, " -oid file file of extra oid definitions\n");
|
||||||
BIO_printf(bio_err," a series of these can be used to 'dig' into multiple\n");
|
BIO_printf(bio_err, " -strparse offset\n");
|
||||||
BIO_printf(bio_err," ASN1 blob wrappings\n");
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err," -genstr str string to generate ASN1 structure from\n");
|
" a series of these can be used to 'dig' into multiple\n");
|
||||||
BIO_printf(bio_err," -genconf file file to generate ASN1 structure from\n");
|
BIO_printf(bio_err, " ASN1 blob wrappings\n");
|
||||||
goto end;
|
BIO_printf(bio_err,
|
||||||
}
|
" -genstr str string to generate ASN1 structure from\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" -genconf file file to generate ASN1 structure from\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
ERR_load_crypto_strings();
|
ERR_load_crypto_strings();
|
||||||
|
|
||||||
in=BIO_new(BIO_s_file());
|
in = BIO_new(BIO_s_file());
|
||||||
out=BIO_new(BIO_s_file());
|
out = BIO_new(BIO_s_file());
|
||||||
if ((in == NULL) || (out == NULL))
|
if ((in == NULL) || (out == NULL)) {
|
||||||
{
|
ERR_print_errors(bio_err);
|
||||||
ERR_print_errors(bio_err);
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
BIO_set_fp(out, stdout, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||||
BIO_set_fp(out,stdout,BIO_NOCLOSE|BIO_FP_TEXT);
|
|
||||||
#ifdef OPENSSL_SYS_VMS
|
#ifdef OPENSSL_SYS_VMS
|
||||||
{
|
{
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
out = BIO_push(tmpbio, out);
|
out = BIO_push(tmpbio, out);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
if (oidfile != NULL)
|
if (oidfile != NULL) {
|
||||||
{
|
if (BIO_read_filename(in, oidfile) <= 0) {
|
||||||
if (BIO_read_filename(in,oidfile) <= 0)
|
BIO_printf(bio_err, "problems opening %s\n", oidfile);
|
||||||
{
|
ERR_print_errors(bio_err);
|
||||||
BIO_printf(bio_err,"problems opening %s\n",oidfile);
|
goto end;
|
||||||
ERR_print_errors(bio_err);
|
}
|
||||||
goto end;
|
OBJ_create_objects(in);
|
||||||
}
|
}
|
||||||
OBJ_create_objects(in);
|
|
||||||
}
|
|
||||||
|
|
||||||
if (infile == NULL)
|
if (infile == NULL)
|
||||||
BIO_set_fp(in,stdin,BIO_NOCLOSE);
|
BIO_set_fp(in, stdin, BIO_NOCLOSE);
|
||||||
else
|
else {
|
||||||
{
|
if (BIO_read_filename(in, infile) <= 0) {
|
||||||
if (BIO_read_filename(in,infile) <= 0)
|
perror(infile);
|
||||||
{
|
goto end;
|
||||||
perror(infile);
|
}
|
||||||
goto end;
|
}
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (derfile) {
|
if (derfile) {
|
||||||
if(!(derout = BIO_new_file(derfile, "wb"))) {
|
if (!(derout = BIO_new_file(derfile, "wb"))) {
|
||||||
BIO_printf(bio_err,"problems opening %s\n",derfile);
|
BIO_printf(bio_err, "problems opening %s\n", derfile);
|
||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if ((buf=BUF_MEM_new()) == NULL) goto end;
|
if ((buf = BUF_MEM_new()) == NULL)
|
||||||
if (!BUF_MEM_grow(buf,BUFSIZ*8)) goto end; /* Pre-allocate :-) */
|
goto end;
|
||||||
|
if (!BUF_MEM_grow(buf, BUFSIZ * 8))
|
||||||
|
goto end; /* Pre-allocate :-) */
|
||||||
|
|
||||||
if (genstr || genconf)
|
if (genstr || genconf) {
|
||||||
{
|
num = do_generate(bio_err, genstr, genconf, buf);
|
||||||
num = do_generate(bio_err, genstr, genconf, buf);
|
if (num < 0) {
|
||||||
if (num < 0)
|
ERR_print_errors(bio_err);
|
||||||
{
|
goto end;
|
||||||
ERR_print_errors(bio_err);
|
}
|
||||||
goto end;
|
}
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
else
|
else {
|
||||||
{
|
|
||||||
|
|
||||||
if (informat == FORMAT_PEM)
|
if (informat == FORMAT_PEM) {
|
||||||
{
|
BIO *tmp;
|
||||||
BIO *tmp;
|
|
||||||
|
|
||||||
if ((b64=BIO_new(BIO_f_base64())) == NULL)
|
if ((b64 = BIO_new(BIO_f_base64())) == NULL)
|
||||||
goto end;
|
goto end;
|
||||||
BIO_push(b64,in);
|
BIO_push(b64, in);
|
||||||
tmp=in;
|
tmp = in;
|
||||||
in=b64;
|
in = b64;
|
||||||
b64=tmp;
|
b64 = tmp;
|
||||||
}
|
}
|
||||||
|
|
||||||
num=0;
|
num = 0;
|
||||||
for (;;)
|
for (;;) {
|
||||||
{
|
if (!BUF_MEM_grow(buf, (int)num + BUFSIZ))
|
||||||
if (!BUF_MEM_grow(buf,(int)num+BUFSIZ)) goto end;
|
goto end;
|
||||||
i=BIO_read(in,&(buf->data[num]),BUFSIZ);
|
i = BIO_read(in, &(buf->data[num]), BUFSIZ);
|
||||||
if (i <= 0) break;
|
if (i <= 0)
|
||||||
num+=i;
|
break;
|
||||||
}
|
num += i;
|
||||||
}
|
}
|
||||||
str=buf->data;
|
}
|
||||||
|
str = buf->data;
|
||||||
|
|
||||||
/* If any structs to parse go through in sequence */
|
/* If any structs to parse go through in sequence */
|
||||||
|
|
||||||
if (sk_num(osk))
|
if (sk_OPENSSL_STRING_num(osk)) {
|
||||||
{
|
tmpbuf = (unsigned char *)str;
|
||||||
tmpbuf=(unsigned char *)str;
|
tmplen = num;
|
||||||
tmplen=num;
|
for (i = 0; i < sk_OPENSSL_STRING_num(osk); i++) {
|
||||||
for (i=0; i<sk_num(osk); i++)
|
ASN1_TYPE *atmp;
|
||||||
{
|
int typ;
|
||||||
ASN1_TYPE *atmp;
|
j = atoi(sk_OPENSSL_STRING_value(osk, i));
|
||||||
j=atoi(sk_value(osk,i));
|
if (j == 0) {
|
||||||
if (j == 0)
|
BIO_printf(bio_err, "'%s' is an invalid number\n",
|
||||||
{
|
sk_OPENSSL_STRING_value(osk, i));
|
||||||
BIO_printf(bio_err,"'%s' is an invalid number\n",sk_value(osk,i));
|
continue;
|
||||||
continue;
|
}
|
||||||
}
|
tmpbuf += j;
|
||||||
tmpbuf+=j;
|
tmplen -= j;
|
||||||
tmplen-=j;
|
atmp = at;
|
||||||
atmp = at;
|
ctmpbuf = tmpbuf;
|
||||||
at = d2i_ASN1_TYPE(NULL,&tmpbuf,tmplen);
|
at = d2i_ASN1_TYPE(NULL, &ctmpbuf, tmplen);
|
||||||
ASN1_TYPE_free(atmp);
|
ASN1_TYPE_free(atmp);
|
||||||
if(!at)
|
if (!at) {
|
||||||
{
|
BIO_printf(bio_err, "Error parsing structure\n");
|
||||||
BIO_printf(bio_err,"Error parsing structure\n");
|
ERR_print_errors(bio_err);
|
||||||
ERR_print_errors(bio_err);
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
typ = ASN1_TYPE_get(at);
|
||||||
/* hmm... this is a little evil but it works */
|
if ((typ == V_ASN1_OBJECT)
|
||||||
tmpbuf=at->value.asn1_string->data;
|
|| (typ == V_ASN1_NULL)) {
|
||||||
tmplen=at->value.asn1_string->length;
|
BIO_printf(bio_err, "Can't parse %s type\n",
|
||||||
}
|
typ == V_ASN1_NULL ? "NULL" : "OBJECT");
|
||||||
str=(char *)tmpbuf;
|
ERR_print_errors(bio_err);
|
||||||
num=tmplen;
|
goto end;
|
||||||
}
|
}
|
||||||
|
/* hmm... this is a little evil but it works */
|
||||||
|
tmpbuf = at->value.asn1_string->data;
|
||||||
|
tmplen = at->value.asn1_string->length;
|
||||||
|
}
|
||||||
|
str = (char *)tmpbuf;
|
||||||
|
num = tmplen;
|
||||||
|
}
|
||||||
|
|
||||||
if (length == 0) length=(unsigned int)num;
|
if (offset >= num) {
|
||||||
if(derout) {
|
BIO_printf(bio_err, "Error: offset too large\n");
|
||||||
if(BIO_write(derout, str + offset, length) != (int)length) {
|
goto end;
|
||||||
BIO_printf(bio_err, "Error writing output\n");
|
}
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
num -= offset;
|
||||||
}
|
|
||||||
}
|
if ((length == 0) || ((long)length > num))
|
||||||
if (!noout &&
|
length = (unsigned int)num;
|
||||||
!ASN1_parse_dump(out,(unsigned char *)&(str[offset]),length,
|
if (derout) {
|
||||||
indent,dump))
|
if (BIO_write(derout, str + offset, length) != (int)length) {
|
||||||
{
|
BIO_printf(bio_err, "Error writing output\n");
|
||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
ret=0;
|
}
|
||||||
end:
|
if (!noout &&
|
||||||
BIO_free(derout);
|
!ASN1_parse_dump(out, (unsigned char *)&(str[offset]), length,
|
||||||
if (in != NULL) BIO_free(in);
|
indent, dump)) {
|
||||||
if (out != NULL) BIO_free_all(out);
|
ERR_print_errors(bio_err);
|
||||||
if (b64 != NULL) BIO_free(b64);
|
goto end;
|
||||||
if (ret != 0)
|
}
|
||||||
ERR_print_errors(bio_err);
|
ret = 0;
|
||||||
if (buf != NULL) BUF_MEM_free(buf);
|
end:
|
||||||
if (at != NULL) ASN1_TYPE_free(at);
|
BIO_free(derout);
|
||||||
if (osk != NULL) sk_free(osk);
|
if (in != NULL)
|
||||||
OBJ_cleanup();
|
BIO_free(in);
|
||||||
apps_shutdown();
|
if (out != NULL)
|
||||||
OPENSSL_EXIT(ret);
|
BIO_free_all(out);
|
||||||
}
|
if (b64 != NULL)
|
||||||
|
BIO_free(b64);
|
||||||
|
if (ret != 0)
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
if (buf != NULL)
|
||||||
|
BUF_MEM_free(buf);
|
||||||
|
if (at != NULL)
|
||||||
|
ASN1_TYPE_free(at);
|
||||||
|
if (osk != NULL)
|
||||||
|
sk_OPENSSL_STRING_free(osk);
|
||||||
|
OBJ_cleanup();
|
||||||
|
apps_shutdown();
|
||||||
|
OPENSSL_EXIT(ret);
|
||||||
|
}
|
||||||
|
|
||||||
static int do_generate(BIO *bio, char *genstr, char *genconf, BUF_MEM *buf)
|
static int do_generate(BIO *bio, char *genstr, char *genconf, BUF_MEM *buf)
|
||||||
{
|
{
|
||||||
CONF *cnf = NULL;
|
CONF *cnf = NULL;
|
||||||
int len;
|
int len;
|
||||||
long errline;
|
long errline = 0;
|
||||||
unsigned char *p;
|
unsigned char *p;
|
||||||
ASN1_TYPE *atyp = NULL;
|
ASN1_TYPE *atyp = NULL;
|
||||||
|
|
||||||
if (genconf)
|
if (genconf) {
|
||||||
{
|
cnf = NCONF_new(NULL);
|
||||||
cnf = NCONF_new(NULL);
|
if (!NCONF_load(cnf, genconf, &errline))
|
||||||
if (!NCONF_load(cnf, genconf, &errline))
|
goto conferr;
|
||||||
goto conferr;
|
if (!genstr)
|
||||||
if (!genstr)
|
genstr = NCONF_get_string(cnf, "default", "asn1");
|
||||||
genstr = NCONF_get_string(cnf, "default", "asn1");
|
if (!genstr) {
|
||||||
if (!genstr)
|
BIO_printf(bio, "Can't find 'asn1' in '%s'\n", genconf);
|
||||||
{
|
goto err;
|
||||||
BIO_printf(bio, "Can't find 'asn1' in '%s'\n", genconf);
|
}
|
||||||
goto err;
|
}
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
atyp = ASN1_generate_nconf(genstr, cnf);
|
atyp = ASN1_generate_nconf(genstr, cnf);
|
||||||
NCONF_free(cnf);
|
NCONF_free(cnf);
|
||||||
|
cnf = NULL;
|
||||||
|
|
||||||
if (!atyp)
|
if (!atyp)
|
||||||
return -1;
|
return -1;
|
||||||
|
|
||||||
len = i2d_ASN1_TYPE(atyp, NULL);
|
len = i2d_ASN1_TYPE(atyp, NULL);
|
||||||
|
|
||||||
if (len <= 0)
|
if (len <= 0)
|
||||||
goto err;
|
goto err;
|
||||||
|
|
||||||
if (!BUF_MEM_grow(buf,len))
|
if (!BUF_MEM_grow(buf, len))
|
||||||
goto err;
|
goto err;
|
||||||
|
|
||||||
p=(unsigned char *)buf->data;
|
p = (unsigned char *)buf->data;
|
||||||
|
|
||||||
i2d_ASN1_TYPE(atyp, &p);
|
i2d_ASN1_TYPE(atyp, &p);
|
||||||
|
|
||||||
ASN1_TYPE_free(atyp);
|
ASN1_TYPE_free(atyp);
|
||||||
return len;
|
return len;
|
||||||
|
|
||||||
conferr:
|
conferr:
|
||||||
|
|
||||||
if (errline > 0)
|
if (errline > 0)
|
||||||
BIO_printf(bio, "Error on line %ld of config file '%s'\n",
|
BIO_printf(bio, "Error on line %ld of config file '%s'\n",
|
||||||
errline, genconf);
|
errline, genconf);
|
||||||
else
|
else
|
||||||
BIO_printf(bio, "Error loading config file '%s'\n", genconf);
|
BIO_printf(bio, "Error loading config file '%s'\n", genconf);
|
||||||
|
|
||||||
err:
|
err:
|
||||||
NCONF_free(cnf);
|
NCONF_free(cnf);
|
||||||
ASN1_TYPE_free(atyp);
|
ASN1_TYPE_free(atyp);
|
||||||
|
|
||||||
return -1;
|
return -1;
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
245
apps/ciphers.c
245
apps/ciphers.c
@@ -60,149 +60,166 @@
|
|||||||
#include <stdlib.h>
|
#include <stdlib.h>
|
||||||
#include <string.h>
|
#include <string.h>
|
||||||
#ifdef OPENSSL_NO_STDIO
|
#ifdef OPENSSL_NO_STDIO
|
||||||
#define APPS_WIN16
|
# define APPS_WIN16
|
||||||
#endif
|
#endif
|
||||||
#include "apps.h"
|
#include "apps.h"
|
||||||
#include <openssl/err.h>
|
#include <openssl/err.h>
|
||||||
#include <openssl/ssl.h>
|
#include <openssl/ssl.h>
|
||||||
|
|
||||||
#undef PROG
|
#undef PROG
|
||||||
#define PROG ciphers_main
|
#define PROG ciphers_main
|
||||||
|
|
||||||
static char *ciphers_usage[]={
|
static const char *ciphers_usage[] = {
|
||||||
"usage: ciphers args\n",
|
"usage: ciphers args\n",
|
||||||
" -v - verbose mode, a textual listing of the ciphers in SSLeay\n",
|
" -v - verbose mode, a textual listing of the SSL/TLS ciphers in OpenSSL\n",
|
||||||
" -ssl2 - SSL2 mode\n",
|
" -V - even more verbose\n",
|
||||||
" -ssl3 - SSL3 mode\n",
|
" -ssl2 - SSL2 mode\n",
|
||||||
" -tls1 - TLS1 mode\n",
|
" -ssl3 - SSL3 mode\n",
|
||||||
NULL
|
" -tls1 - TLS1 mode\n",
|
||||||
|
NULL
|
||||||
};
|
};
|
||||||
|
|
||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
int ret=1,i;
|
int ret = 1, i;
|
||||||
int verbose=0;
|
int verbose = 0, Verbose = 0;
|
||||||
char **pp;
|
const char **pp;
|
||||||
const char *p;
|
const char *p;
|
||||||
int badops=0;
|
int badops = 0;
|
||||||
SSL_CTX *ctx=NULL;
|
SSL_CTX *ctx = NULL;
|
||||||
SSL *ssl=NULL;
|
SSL *ssl = NULL;
|
||||||
char *ciphers=NULL;
|
char *ciphers = NULL;
|
||||||
SSL_METHOD *meth=NULL;
|
const SSL_METHOD *meth = NULL;
|
||||||
STACK_OF(SSL_CIPHER) *sk;
|
STACK_OF(SSL_CIPHER) *sk;
|
||||||
char buf[512];
|
char buf[512];
|
||||||
BIO *STDout=NULL;
|
BIO *STDout = NULL;
|
||||||
|
|
||||||
#if !defined(OPENSSL_NO_SSL2) && !defined(OPENSSL_NO_SSL3)
|
meth = SSLv23_server_method();
|
||||||
meth=SSLv23_server_method();
|
|
||||||
#elif !defined(OPENSSL_NO_SSL3)
|
|
||||||
meth=SSLv3_server_method();
|
|
||||||
#elif !defined(OPENSSL_NO_SSL2)
|
|
||||||
meth=SSLv2_server_method();
|
|
||||||
#endif
|
|
||||||
|
|
||||||
apps_startup();
|
apps_startup();
|
||||||
|
|
||||||
if (bio_err == NULL)
|
if (bio_err == NULL)
|
||||||
bio_err=BIO_new_fp(stderr,BIO_NOCLOSE);
|
bio_err = BIO_new_fp(stderr, BIO_NOCLOSE);
|
||||||
STDout=BIO_new_fp(stdout,BIO_NOCLOSE);
|
STDout = BIO_new_fp(stdout, BIO_NOCLOSE);
|
||||||
#ifdef OPENSSL_SYS_VMS
|
#ifdef OPENSSL_SYS_VMS
|
||||||
{
|
{
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
STDout = BIO_push(tmpbio, STDout);
|
STDout = BIO_push(tmpbio, STDout);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
if (!load_config(bio_err, NULL))
|
||||||
|
goto end;
|
||||||
|
|
||||||
argc--;
|
argc--;
|
||||||
argv++;
|
argv++;
|
||||||
while (argc >= 1)
|
while (argc >= 1) {
|
||||||
{
|
if (strcmp(*argv, "-v") == 0)
|
||||||
if (strcmp(*argv,"-v") == 0)
|
verbose = 1;
|
||||||
verbose=1;
|
else if (strcmp(*argv, "-V") == 0)
|
||||||
|
verbose = Verbose = 1;
|
||||||
#ifndef OPENSSL_NO_SSL2
|
#ifndef OPENSSL_NO_SSL2
|
||||||
else if (strcmp(*argv,"-ssl2") == 0)
|
else if (strcmp(*argv, "-ssl2") == 0)
|
||||||
meth=SSLv2_client_method();
|
meth = SSLv2_client_method();
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_SSL3
|
#ifndef OPENSSL_NO_SSL3
|
||||||
else if (strcmp(*argv,"-ssl3") == 0)
|
else if (strcmp(*argv, "-ssl3") == 0)
|
||||||
meth=SSLv3_client_method();
|
meth = SSLv3_client_method();
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_TLS1
|
#ifndef OPENSSL_NO_TLS1
|
||||||
else if (strcmp(*argv,"-tls1") == 0)
|
else if (strcmp(*argv, "-tls1") == 0)
|
||||||
meth=TLSv1_client_method();
|
meth = TLSv1_client_method();
|
||||||
#endif
|
#endif
|
||||||
else if ((strncmp(*argv,"-h",2) == 0) ||
|
else if ((strncmp(*argv, "-h", 2) == 0) || (strcmp(*argv, "-?") == 0)) {
|
||||||
(strcmp(*argv,"-?") == 0))
|
badops = 1;
|
||||||
{
|
break;
|
||||||
badops=1;
|
} else {
|
||||||
break;
|
ciphers = *argv;
|
||||||
}
|
}
|
||||||
else
|
argc--;
|
||||||
{
|
argv++;
|
||||||
ciphers= *argv;
|
}
|
||||||
}
|
|
||||||
argc--;
|
|
||||||
argv++;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (badops)
|
if (badops) {
|
||||||
{
|
for (pp = ciphers_usage; (*pp != NULL); pp++)
|
||||||
for (pp=ciphers_usage; (*pp != NULL); pp++)
|
BIO_printf(bio_err, "%s", *pp);
|
||||||
BIO_printf(bio_err,"%s",*pp);
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
|
||||||
|
|
||||||
OpenSSL_add_ssl_algorithms();
|
OpenSSL_add_ssl_algorithms();
|
||||||
|
|
||||||
ctx=SSL_CTX_new(meth);
|
ctx = SSL_CTX_new(meth);
|
||||||
if (ctx == NULL) goto err;
|
if (ctx == NULL)
|
||||||
if (ciphers != NULL) {
|
goto err;
|
||||||
if(!SSL_CTX_set_cipher_list(ctx,ciphers)) {
|
if (ciphers != NULL) {
|
||||||
BIO_printf(bio_err, "Error in cipher list\n");
|
if (!SSL_CTX_set_cipher_list(ctx, ciphers)) {
|
||||||
goto err;
|
BIO_printf(bio_err, "Error in cipher list\n");
|
||||||
}
|
goto err;
|
||||||
}
|
}
|
||||||
ssl=SSL_new(ctx);
|
}
|
||||||
if (ssl == NULL) goto err;
|
ssl = SSL_new(ctx);
|
||||||
|
if (ssl == NULL)
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
if (!verbose) {
|
||||||
|
for (i = 0;; i++) {
|
||||||
|
p = SSL_get_cipher_list(ssl, i);
|
||||||
|
if (p == NULL)
|
||||||
|
break;
|
||||||
|
if (i != 0)
|
||||||
|
BIO_printf(STDout, ":");
|
||||||
|
BIO_printf(STDout, "%s", p);
|
||||||
|
}
|
||||||
|
BIO_printf(STDout, "\n");
|
||||||
|
} else { /* verbose */
|
||||||
|
|
||||||
if (!verbose)
|
sk = SSL_get_ciphers(ssl);
|
||||||
{
|
|
||||||
for (i=0; ; i++)
|
|
||||||
{
|
|
||||||
p=SSL_get_cipher_list(ssl,i);
|
|
||||||
if (p == NULL) break;
|
|
||||||
if (i != 0) BIO_printf(STDout,":");
|
|
||||||
BIO_printf(STDout,"%s",p);
|
|
||||||
}
|
|
||||||
BIO_printf(STDout,"\n");
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
sk=SSL_get_ciphers(ssl);
|
|
||||||
|
|
||||||
for (i=0; i<sk_SSL_CIPHER_num(sk); i++)
|
for (i = 0; i < sk_SSL_CIPHER_num(sk); i++) {
|
||||||
{
|
SSL_CIPHER *c;
|
||||||
BIO_puts(STDout,SSL_CIPHER_description(
|
|
||||||
sk_SSL_CIPHER_value(sk,i),
|
|
||||||
buf,sizeof buf));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
ret=0;
|
c = sk_SSL_CIPHER_value(sk, i);
|
||||||
if (0)
|
|
||||||
{
|
|
||||||
err:
|
|
||||||
SSL_load_error_strings();
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
}
|
|
||||||
end:
|
|
||||||
if (ctx != NULL) SSL_CTX_free(ctx);
|
|
||||||
if (ssl != NULL) SSL_free(ssl);
|
|
||||||
if (STDout != NULL) BIO_free_all(STDout);
|
|
||||||
apps_shutdown();
|
|
||||||
OPENSSL_EXIT(ret);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
if (Verbose) {
|
||||||
|
unsigned long id = SSL_CIPHER_get_id(c);
|
||||||
|
int id0 = (int)(id >> 24);
|
||||||
|
int id1 = (int)((id >> 16) & 0xffL);
|
||||||
|
int id2 = (int)((id >> 8) & 0xffL);
|
||||||
|
int id3 = (int)(id & 0xffL);
|
||||||
|
|
||||||
|
if ((id & 0xff000000L) == 0x02000000L) {
|
||||||
|
/* SSL2 cipher */
|
||||||
|
BIO_printf(STDout, " 0x%02X,0x%02X,0x%02X - ", id1,
|
||||||
|
id2, id3);
|
||||||
|
} else if ((id & 0xff000000L) == 0x03000000L) {
|
||||||
|
/* SSL3 cipher */
|
||||||
|
BIO_printf(STDout, " 0x%02X,0x%02X - ", id2,
|
||||||
|
id3);
|
||||||
|
} else {
|
||||||
|
/* whatever */
|
||||||
|
BIO_printf(STDout, "0x%02X,0x%02X,0x%02X,0x%02X - ", id0,
|
||||||
|
id1, id2, id3);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
BIO_puts(STDout, SSL_CIPHER_description(c, buf, sizeof buf));
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
ret = 0;
|
||||||
|
if (0) {
|
||||||
|
err:
|
||||||
|
SSL_load_error_strings();
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
}
|
||||||
|
end:
|
||||||
|
if (ctx != NULL)
|
||||||
|
SSL_CTX_free(ctx);
|
||||||
|
if (ssl != NULL)
|
||||||
|
SSL_free(ssl);
|
||||||
|
if (STDout != NULL)
|
||||||
|
BIO_free_all(STDout);
|
||||||
|
apps_shutdown();
|
||||||
|
OPENSSL_EXIT(ret);
|
||||||
|
}
|
||||||
|
|||||||
@@ -1,24 +1,52 @@
|
|||||||
issuer= /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test CA (1024 bit)
|
subject= C = UK, O = OpenSSL Group, OU = FOR TESTING PURPOSES ONLY, CN = Test Client Cert
|
||||||
subject=/C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Client test cert (512 bit)
|
issuer= C = UK, O = OpenSSL Group, OU = FOR TESTING PURPOSES ONLY, CN = OpenSSL Test Intermediate CA
|
||||||
-----BEGIN CERTIFICATE-----
|
-----BEGIN CERTIFICATE-----
|
||||||
MIIB6TCCAVICAQIwDQYJKoZIhvcNAQEEBQAwWzELMAkGA1UEBhMCQVUxEzARBgNV
|
MIID5zCCAs+gAwIBAgIJALnu1NlVpZ6yMA0GCSqGSIb3DQEBBQUAMHAxCzAJBgNV
|
||||||
BAgTClF1ZWVuc2xhbmQxGjAYBgNVBAoTEUNyeXB0U29mdCBQdHkgTHRkMRswGQYD
|
BAYTAlVLMRYwFAYDVQQKDA1PcGVuU1NMIEdyb3VwMSIwIAYDVQQLDBlGT1IgVEVT
|
||||||
VQQDExJUZXN0IENBICgxMDI0IGJpdCkwHhcNOTcwNjA5MTM1NzU2WhcNOTgwNjA5
|
VElORyBQVVJQT1NFUyBPTkxZMSUwIwYDVQQDDBxPcGVuU1NMIFRlc3QgSW50ZXJt
|
||||||
MTM1NzU2WjBjMQswCQYDVQQGEwJBVTETMBEGA1UECBMKUXVlZW5zbGFuZDEaMBgG
|
ZWRpYXRlIENBMB4XDTExMTIwODE0MDE0OFoXDTIxMTAxNjE0MDE0OFowZDELMAkG
|
||||||
A1UEChMRQ3J5cHRTb2Z0IFB0eSBMdGQxIzAhBgNVBAMTGkNsaWVudCB0ZXN0IGNl
|
A1UEBhMCVUsxFjAUBgNVBAoMDU9wZW5TU0wgR3JvdXAxIjAgBgNVBAsMGUZPUiBU
|
||||||
cnQgKDUxMiBiaXQpMFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBALtv55QyzG6i2Plw
|
RVNUSU5HIFBVUlBPU0VTIE9OTFkxGTAXBgNVBAMMEFRlc3QgQ2xpZW50IENlcnQw
|
||||||
Z1pah7++Gv8L5j6Hnyr/uTZE1NLG0ABDDexmq/R4KedLjFEIYjocDui+IXs62NNt
|
ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC0ranbHRLcLVqN+0BzcZpY
|
||||||
XrT8odkCAwEAATANBgkqhkiG9w0BAQQFAAOBgQBwtMmI7oGUG8nKmftQssATViH5
|
+yOLqxzDWT1LD9eW1stC4NzXX9/DCtSIVyN7YIHdGLrIPr64IDdXXaMRzgZ2rOKs
|
||||||
NRRtoEw07DxJp/LfatHdrhqQB73eGdL5WILZJXk46Xz2e9WMSUjVCSYhdKxtflU3
|
lmHCAiFpO/ja99gGCJRxH0xwQatqAULfJVHeUhs7OEGOZc2nWifjqKvGfNTilP7D
|
||||||
UR2Ajv1Oo0sTNdfz0wDqJNirLNtzyhhsaq8qMTrLwXrCP31VxBiigFSQSUFnZyTE
|
nwi69ipQFq9oS19FmhwVHk2wg7KZGHI1qDyG04UrfCZMRitvS9+UVhPpIPjuiBi2
|
||||||
9TKwhS4GlwbtCfxSKQ==
|
x3/FZIpL5gXJvvFK6xHY63oq2asyzBATntBgnP4qJFWWcvRx24wF1PnZabxuVoL2
|
||||||
|
bPnQ/KvONDrw3IdqkKhYNTul7jEcu3OlcZIMw+7DiaKJLAzKb/bBF5gm/pwW6As9
|
||||||
|
AgMBAAGjgY8wgYwwDAYDVR0TAQH/BAIwADAOBgNVHQ8BAf8EBAMCBeAwLAYJYIZI
|
||||||
|
AYb4QgENBB8WHU9wZW5TU0wgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQW
|
||||||
|
BBSZHKyLoTh7Mb409Zn/mK1ceSDAjDAfBgNVHSMEGDAWgBQ2w2yI55X+sL3szj49
|
||||||
|
hqshgYfa2jANBgkqhkiG9w0BAQUFAAOCAQEAD0mL7PtPYgCEuDyOQSbLpeND5hVS
|
||||||
|
curxQdGnrJ6Acrhodb7E9ccATokeb0PLx6HBLQUicxhTZIQ9FbO43YkQcOU6C3BB
|
||||||
|
IlwskqmtN6+VmrQzNolHCDzvxNZs9lYL2VbGPGqVRyjZeHpoAlf9cQr8PgDb4d4b
|
||||||
|
vUx2KAhHQvV2nkmYvKyXcgnRuHggumF87mkxidriGAEFwH4qfOqetUg64WyxP7P2
|
||||||
|
QLipm04SyQa7ONtIApfVXgHcE42Py4/f4arzCzMjKe3VyhGkS7nsT55X/fWgTaRm
|
||||||
|
CQPkO+H94P958WTvQDt77bQ+D3IvYaVvfil8n6HJMOJfFT0LJuSUbpSXJg==
|
||||||
-----END CERTIFICATE-----
|
-----END CERTIFICATE-----
|
||||||
-----BEGIN RSA PRIVATE KEY-----
|
-----BEGIN RSA PRIVATE KEY-----
|
||||||
MIIBOwIBAAJBALtv55QyzG6i2PlwZ1pah7++Gv8L5j6Hnyr/uTZE1NLG0ABDDexm
|
MIIEpQIBAAKCAQEAtK2p2x0S3C1ajftAc3GaWPsji6scw1k9Sw/XltbLQuDc11/f
|
||||||
q/R4KedLjFEIYjocDui+IXs62NNtXrT8odkCAwEAAQJAbwXq0vJ/+uyEvsNgxLko
|
wwrUiFcje2CB3Ri6yD6+uCA3V12jEc4GdqzirJZhwgIhaTv42vfYBgiUcR9McEGr
|
||||||
/V86mGXQ/KrSkeKlL0r4ENxjcyeMAGoKu6J9yMY7+X9+Zm4nxShNfTsf/+Freoe1
|
agFC3yVR3lIbOzhBjmXNp1on46irxnzU4pT+w58IuvYqUBavaEtfRZocFR5NsIOy
|
||||||
HQIhAPOSm5Q1YI+KIsII2GeVJx1U69+wnd71OasIPakS1L1XAiEAxQAW+J3/JWE0
|
mRhyNag8htOFK3wmTEYrb0vflFYT6SD47ogYtsd/xWSKS+YFyb7xSusR2Ot6Ktmr
|
||||||
ftEYakbhUOKL8tD1OaFZS71/5GdG7E8CIQCefUMmySSvwd6kC0VlATSWbW+d+jp/
|
MswQE57QYJz+KiRVlnL0cduMBdT52Wm8blaC9mz50PyrzjQ68NyHapCoWDU7pe4x
|
||||||
nWmM1KvqnAo5uQIhALqEADu5U1Wvt8UN8UDGBRPQulHWNycuNV45d3nnskWPAiAw
|
HLtzpXGSDMPuw4miiSwMym/2wReYJv6cFugLPQIDAQABAoIBAAZOyc9MhIwLSU4L
|
||||||
ueTyr6WsZ5+SD8g/Hy3xuvF3nPmJRH+rwvVihlcFOg==
|
p4RgQvM4UVVe8/Id+3XTZ8NsXExJbWxXfIhiqGjaIfL8u4vsgRjcl+v1s/jo2/iT
|
||||||
|
KMab4o4D8gXD7UavQVDjtjb/ta79WL3SjRl2Uc9YjjMkyq6WmDNQeo2NKDdafCTB
|
||||||
|
1uzSJtLNipB8Z53ELPuHJhxX9QMHrMnuha49riQgXZ7buP9iQrHJFhImBjSzbxJx
|
||||||
|
L+TI6rkyLSf9Wi0Pd3L27Ob3QWNfNRYNSeTE+08eSRChkur5W0RuXAcuAICdQlCl
|
||||||
|
LBvWO/LmmvbzCqiDcgy/TliSb6CGGwgiNG7LJZmlkYNj8laGwalNlYZs3UrVv6NO
|
||||||
|
Br2loAECgYEA2kvCvPGj0Dg/6g7WhXDvAkEbcaL1tSeCxBbNH+6HS2UWMWvyTtCn
|
||||||
|
/bbD519QIdkvayy1QjEf32GV/UjUVmlULMLBcDy0DGjtL3+XpIhLKWDNxN1v1/ai
|
||||||
|
1oz23ZJCOgnk6K4qtFtlRS1XtynjA+rBetvYvLP9SKeFrnpzCgaA2r0CgYEA0+KX
|
||||||
|
1ACXDTNH5ySX3kMjSS9xdINf+OOw4CvPHFwbtc9aqk2HePlEsBTz5I/W3rKwXva3
|
||||||
|
NqZ/bRqVVeZB/hHKFywgdUQk2Uc5z/S7Lw70/w1HubNTXGU06Ngb6zOFAo/o/TwZ
|
||||||
|
zTP1BMIKSOB6PAZPS3l+aLO4FRIRotfFhgRHOoECgYEAmiZbqt8cJaJDB/5YYDzC
|
||||||
|
mp3tSk6gIb936Q6M5VqkMYp9pIKsxhk0N8aDCnTU+kIK6SzWBpr3/d9Ecmqmfyq7
|
||||||
|
5SvWO3KyVf0WWK9KH0abhOm2BKm2HBQvI0DB5u8sUx2/hsvOnjPYDISbZ11t0MtK
|
||||||
|
u35Zy89yMYcSsIYJjG/ROCUCgYEAgI2P9G5PNxEP5OtMwOsW84Y3Xat/hPAQFlI+
|
||||||
|
HES+AzbFGWJkeT8zL2nm95tVkFP1sggZ7Kxjz3w7cpx7GX0NkbWSE9O+T51pNASV
|
||||||
|
tN1sQ3p5M+/a+cnlqgfEGJVvc7iAcXQPa3LEi5h2yPR49QYXAgG6cifn3dDSpmwn
|
||||||
|
SUI7PQECgYEApGCIIpSRPLAEHTGmP87RBL1smurhwmy2s/pghkvUkWehtxg0sGHh
|
||||||
|
kuaqDWcskogv+QC0sVdytiLSz8G0DwcEcsHK1Fkyb8A+ayiw6jWJDo2m9+IF4Fww
|
||||||
|
1Te6jFPYDESnbhq7+TLGgHGhtwcu5cnb4vSuYXGXKupZGzoLOBbv1Zw=
|
||||||
-----END RSA PRIVATE KEY-----
|
-----END RSA PRIVATE KEY-----
|
||||||
|
|||||||
1223
apps/cms.c
Normal file
1223
apps/cms.c
Normal file
File diff suppressed because it is too large
Load Diff
650
apps/crl.c
650
apps/crl.c
@@ -67,358 +67,368 @@
|
|||||||
#include <openssl/pem.h>
|
#include <openssl/pem.h>
|
||||||
|
|
||||||
#undef PROG
|
#undef PROG
|
||||||
#define PROG crl_main
|
#define PROG crl_main
|
||||||
|
|
||||||
#undef POSTFIX
|
#undef POSTFIX
|
||||||
#define POSTFIX ".rvk"
|
#define POSTFIX ".rvk"
|
||||||
|
|
||||||
static char *crl_usage[]={
|
static const char *crl_usage[] = {
|
||||||
"usage: crl args\n",
|
"usage: crl args\n",
|
||||||
"\n",
|
"\n",
|
||||||
" -inform arg - input format - default PEM (DER or PEM)\n",
|
" -inform arg - input format - default PEM (DER or PEM)\n",
|
||||||
" -outform arg - output format - default PEM\n",
|
" -outform arg - output format - default PEM\n",
|
||||||
" -text - print out a text format version\n",
|
" -text - print out a text format version\n",
|
||||||
" -in arg - input file - default stdin\n",
|
" -in arg - input file - default stdin\n",
|
||||||
" -out arg - output file - default stdout\n",
|
" -out arg - output file - default stdout\n",
|
||||||
" -hash - print hash value\n",
|
" -hash - print hash value\n",
|
||||||
" -issuer - print issuer DN\n",
|
#ifndef OPENSSL_NO_MD5
|
||||||
" -lastupdate - lastUpdate field\n",
|
" -hash_old - print old-style (MD5) hash value\n",
|
||||||
" -nextupdate - nextUpdate field\n",
|
#endif
|
||||||
" -noout - no CRL output\n",
|
" -fingerprint - print the crl fingerprint\n",
|
||||||
" -CAfile name - verify CRL using certificates in file \"name\"\n",
|
" -issuer - print issuer DN\n",
|
||||||
" -CApath dir - verify CRL using certificates in \"dir\"\n",
|
" -lastupdate - lastUpdate field\n",
|
||||||
" -nameopt arg - various certificate name options\n",
|
" -nextupdate - nextUpdate field\n",
|
||||||
NULL
|
" -crlnumber - print CRL number\n",
|
||||||
|
" -noout - no CRL output\n",
|
||||||
|
" -CAfile name - verify CRL using certificates in file \"name\"\n",
|
||||||
|
" -CApath dir - verify CRL using certificates in \"dir\"\n",
|
||||||
|
" -nameopt arg - various certificate name options\n",
|
||||||
|
NULL
|
||||||
};
|
};
|
||||||
|
|
||||||
static X509_CRL *load_crl(char *file, int format);
|
static X509_CRL *load_crl(char *file, int format);
|
||||||
static BIO *bio_out=NULL;
|
static BIO *bio_out = NULL;
|
||||||
|
|
||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
unsigned long nmflag = 0;
|
unsigned long nmflag = 0;
|
||||||
X509_CRL *x=NULL;
|
X509_CRL *x = NULL;
|
||||||
char *CAfile = NULL, *CApath = NULL;
|
char *CAfile = NULL, *CApath = NULL;
|
||||||
int ret=1,i,num,badops=0;
|
int ret = 1, i, num, badops = 0;
|
||||||
BIO *out=NULL;
|
BIO *out = NULL;
|
||||||
int informat,outformat;
|
int informat, outformat;
|
||||||
char *infile=NULL,*outfile=NULL;
|
char *infile = NULL, *outfile = NULL;
|
||||||
int hash=0,issuer=0,lastupdate=0,nextupdate=0,noout=0,text=0;
|
int hash = 0, issuer = 0, lastupdate = 0, nextupdate = 0, noout =
|
||||||
int fingerprint = 0;
|
0, text = 0;
|
||||||
char **pp;
|
#ifndef OPENSSL_NO_MD5
|
||||||
X509_STORE *store = NULL;
|
int hash_old = 0;
|
||||||
X509_STORE_CTX ctx;
|
|
||||||
X509_LOOKUP *lookup = NULL;
|
|
||||||
X509_OBJECT xobj;
|
|
||||||
EVP_PKEY *pkey;
|
|
||||||
int do_ver = 0;
|
|
||||||
const EVP_MD *md_alg,*digest=EVP_md5();
|
|
||||||
|
|
||||||
apps_startup();
|
|
||||||
|
|
||||||
if (bio_err == NULL)
|
|
||||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
|
||||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
|
||||||
|
|
||||||
if (!load_config(bio_err, NULL))
|
|
||||||
goto end;
|
|
||||||
|
|
||||||
if (bio_out == NULL)
|
|
||||||
if ((bio_out=BIO_new(BIO_s_file())) != NULL)
|
|
||||||
{
|
|
||||||
BIO_set_fp(bio_out,stdout,BIO_NOCLOSE);
|
|
||||||
#ifdef OPENSSL_SYS_VMS
|
|
||||||
{
|
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
|
||||||
bio_out = BIO_push(tmpbio, bio_out);
|
|
||||||
}
|
|
||||||
#endif
|
#endif
|
||||||
}
|
int fingerprint = 0, crlnumber = 0;
|
||||||
|
const char **pp;
|
||||||
|
X509_STORE *store = NULL;
|
||||||
|
X509_STORE_CTX ctx;
|
||||||
|
X509_LOOKUP *lookup = NULL;
|
||||||
|
X509_OBJECT xobj;
|
||||||
|
EVP_PKEY *pkey;
|
||||||
|
int do_ver = 0;
|
||||||
|
const EVP_MD *md_alg, *digest = EVP_sha1();
|
||||||
|
|
||||||
informat=FORMAT_PEM;
|
apps_startup();
|
||||||
outformat=FORMAT_PEM;
|
|
||||||
|
|
||||||
argc--;
|
if (bio_err == NULL)
|
||||||
argv++;
|
if ((bio_err = BIO_new(BIO_s_file())) != NULL)
|
||||||
num=0;
|
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||||
while (argc >= 1)
|
|
||||||
{
|
if (!load_config(bio_err, NULL))
|
||||||
|
goto end;
|
||||||
|
|
||||||
|
if (bio_out == NULL)
|
||||||
|
if ((bio_out = BIO_new(BIO_s_file())) != NULL) {
|
||||||
|
BIO_set_fp(bio_out, stdout, BIO_NOCLOSE);
|
||||||
|
#ifdef OPENSSL_SYS_VMS
|
||||||
|
{
|
||||||
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
|
bio_out = BIO_push(tmpbio, bio_out);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
}
|
||||||
|
|
||||||
|
informat = FORMAT_PEM;
|
||||||
|
outformat = FORMAT_PEM;
|
||||||
|
|
||||||
|
argc--;
|
||||||
|
argv++;
|
||||||
|
num = 0;
|
||||||
|
while (argc >= 1) {
|
||||||
#ifdef undef
|
#ifdef undef
|
||||||
if (strcmp(*argv,"-p") == 0)
|
if (strcmp(*argv, "-p") == 0) {
|
||||||
{
|
if (--argc < 1)
|
||||||
if (--argc < 1) goto bad;
|
goto bad;
|
||||||
if (!args_from_file(++argv,Nargc,Nargv)) { goto end; }*/
|
if (!args_from_file(++argv, Nargc, Nargv)) {
|
||||||
}
|
goto end;
|
||||||
|
}
|
||||||
|
*/}
|
||||||
#endif
|
#endif
|
||||||
if (strcmp(*argv,"-inform") == 0)
|
if (strcmp(*argv, "-inform") == 0) {
|
||||||
{
|
if (--argc < 1)
|
||||||
if (--argc < 1) goto bad;
|
goto bad;
|
||||||
informat=str2fmt(*(++argv));
|
informat = str2fmt(*(++argv));
|
||||||
}
|
} else if (strcmp(*argv, "-outform") == 0) {
|
||||||
else if (strcmp(*argv,"-outform") == 0)
|
if (--argc < 1)
|
||||||
{
|
goto bad;
|
||||||
if (--argc < 1) goto bad;
|
outformat = str2fmt(*(++argv));
|
||||||
outformat=str2fmt(*(++argv));
|
} else if (strcmp(*argv, "-in") == 0) {
|
||||||
}
|
if (--argc < 1)
|
||||||
else if (strcmp(*argv,"-in") == 0)
|
goto bad;
|
||||||
{
|
infile = *(++argv);
|
||||||
if (--argc < 1) goto bad;
|
} else if (strcmp(*argv, "-out") == 0) {
|
||||||
infile= *(++argv);
|
if (--argc < 1)
|
||||||
}
|
goto bad;
|
||||||
else if (strcmp(*argv,"-out") == 0)
|
outfile = *(++argv);
|
||||||
{
|
} else if (strcmp(*argv, "-CApath") == 0) {
|
||||||
if (--argc < 1) goto bad;
|
if (--argc < 1)
|
||||||
outfile= *(++argv);
|
goto bad;
|
||||||
}
|
CApath = *(++argv);
|
||||||
else if (strcmp(*argv,"-CApath") == 0)
|
do_ver = 1;
|
||||||
{
|
} else if (strcmp(*argv, "-CAfile") == 0) {
|
||||||
if (--argc < 1) goto bad;
|
if (--argc < 1)
|
||||||
CApath = *(++argv);
|
goto bad;
|
||||||
do_ver = 1;
|
CAfile = *(++argv);
|
||||||
}
|
do_ver = 1;
|
||||||
else if (strcmp(*argv,"-CAfile") == 0)
|
} else if (strcmp(*argv, "-verify") == 0)
|
||||||
{
|
do_ver = 1;
|
||||||
if (--argc < 1) goto bad;
|
else if (strcmp(*argv, "-text") == 0)
|
||||||
CAfile = *(++argv);
|
text = 1;
|
||||||
do_ver = 1;
|
else if (strcmp(*argv, "-hash") == 0)
|
||||||
}
|
hash = ++num;
|
||||||
else if (strcmp(*argv,"-verify") == 0)
|
#ifndef OPENSSL_NO_MD5
|
||||||
do_ver = 1;
|
else if (strcmp(*argv, "-hash_old") == 0)
|
||||||
else if (strcmp(*argv,"-text") == 0)
|
hash_old = ++num;
|
||||||
text = 1;
|
#endif
|
||||||
else if (strcmp(*argv,"-hash") == 0)
|
else if (strcmp(*argv, "-nameopt") == 0) {
|
||||||
hash= ++num;
|
if (--argc < 1)
|
||||||
else if (strcmp(*argv,"-nameopt") == 0)
|
goto bad;
|
||||||
{
|
if (!set_name_ex(&nmflag, *(++argv)))
|
||||||
if (--argc < 1) goto bad;
|
goto bad;
|
||||||
if (!set_name_ex(&nmflag, *(++argv))) goto bad;
|
} else if (strcmp(*argv, "-issuer") == 0)
|
||||||
}
|
issuer = ++num;
|
||||||
else if (strcmp(*argv,"-issuer") == 0)
|
else if (strcmp(*argv, "-lastupdate") == 0)
|
||||||
issuer= ++num;
|
lastupdate = ++num;
|
||||||
else if (strcmp(*argv,"-lastupdate") == 0)
|
else if (strcmp(*argv, "-nextupdate") == 0)
|
||||||
lastupdate= ++num;
|
nextupdate = ++num;
|
||||||
else if (strcmp(*argv,"-nextupdate") == 0)
|
else if (strcmp(*argv, "-noout") == 0)
|
||||||
nextupdate= ++num;
|
noout = ++num;
|
||||||
else if (strcmp(*argv,"-noout") == 0)
|
else if (strcmp(*argv, "-fingerprint") == 0)
|
||||||
noout= ++num;
|
fingerprint = ++num;
|
||||||
else if (strcmp(*argv,"-fingerprint") == 0)
|
else if (strcmp(*argv, "-crlnumber") == 0)
|
||||||
fingerprint= ++num;
|
crlnumber = ++num;
|
||||||
else if ((md_alg=EVP_get_digestbyname(*argv + 1)))
|
else if ((md_alg = EVP_get_digestbyname(*argv + 1))) {
|
||||||
{
|
/* ok */
|
||||||
/* ok */
|
digest = md_alg;
|
||||||
digest=md_alg;
|
} else {
|
||||||
}
|
BIO_printf(bio_err, "unknown option %s\n", *argv);
|
||||||
else
|
badops = 1;
|
||||||
{
|
break;
|
||||||
BIO_printf(bio_err,"unknown option %s\n",*argv);
|
}
|
||||||
badops=1;
|
argc--;
|
||||||
break;
|
argv++;
|
||||||
}
|
}
|
||||||
argc--;
|
|
||||||
argv++;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (badops)
|
if (badops) {
|
||||||
{
|
bad:
|
||||||
bad:
|
for (pp = crl_usage; (*pp != NULL); pp++)
|
||||||
for (pp=crl_usage; (*pp != NULL); pp++)
|
BIO_printf(bio_err, "%s", *pp);
|
||||||
BIO_printf(bio_err,"%s",*pp);
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
|
||||||
|
|
||||||
ERR_load_crypto_strings();
|
ERR_load_crypto_strings();
|
||||||
x=load_crl(infile,informat);
|
x = load_crl(infile, informat);
|
||||||
if (x == NULL) { goto end; }
|
if (x == NULL) {
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
if(do_ver) {
|
if (do_ver) {
|
||||||
store = X509_STORE_new();
|
store = X509_STORE_new();
|
||||||
lookup=X509_STORE_add_lookup(store,X509_LOOKUP_file());
|
lookup = X509_STORE_add_lookup(store, X509_LOOKUP_file());
|
||||||
if (lookup == NULL) goto end;
|
if (lookup == NULL)
|
||||||
if (!X509_LOOKUP_load_file(lookup,CAfile,X509_FILETYPE_PEM))
|
goto end;
|
||||||
X509_LOOKUP_load_file(lookup,NULL,X509_FILETYPE_DEFAULT);
|
if (!X509_LOOKUP_load_file(lookup, CAfile, X509_FILETYPE_PEM))
|
||||||
|
X509_LOOKUP_load_file(lookup, NULL, X509_FILETYPE_DEFAULT);
|
||||||
|
|
||||||
lookup=X509_STORE_add_lookup(store,X509_LOOKUP_hash_dir());
|
lookup = X509_STORE_add_lookup(store, X509_LOOKUP_hash_dir());
|
||||||
if (lookup == NULL) goto end;
|
if (lookup == NULL)
|
||||||
if (!X509_LOOKUP_add_dir(lookup,CApath,X509_FILETYPE_PEM))
|
goto end;
|
||||||
X509_LOOKUP_add_dir(lookup,NULL,X509_FILETYPE_DEFAULT);
|
if (!X509_LOOKUP_add_dir(lookup, CApath, X509_FILETYPE_PEM))
|
||||||
ERR_clear_error();
|
X509_LOOKUP_add_dir(lookup, NULL, X509_FILETYPE_DEFAULT);
|
||||||
|
ERR_clear_error();
|
||||||
|
|
||||||
if(!X509_STORE_CTX_init(&ctx, store, NULL, NULL)) {
|
if (!X509_STORE_CTX_init(&ctx, store, NULL, NULL)) {
|
||||||
BIO_printf(bio_err,
|
BIO_printf(bio_err, "Error initialising X509 store\n");
|
||||||
"Error initialising X509 store\n");
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
|
||||||
|
|
||||||
i = X509_STORE_get_by_subject(&ctx, X509_LU_X509,
|
i = X509_STORE_get_by_subject(&ctx, X509_LU_X509,
|
||||||
X509_CRL_get_issuer(x), &xobj);
|
X509_CRL_get_issuer(x), &xobj);
|
||||||
if(i <= 0) {
|
if (i <= 0) {
|
||||||
BIO_printf(bio_err,
|
BIO_printf(bio_err, "Error getting CRL issuer certificate\n");
|
||||||
"Error getting CRL issuer certificate\n");
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
pkey = X509_get_pubkey(xobj.data.x509);
|
||||||
pkey = X509_get_pubkey(xobj.data.x509);
|
X509_OBJECT_free_contents(&xobj);
|
||||||
X509_OBJECT_free_contents(&xobj);
|
if (!pkey) {
|
||||||
if(!pkey) {
|
BIO_printf(bio_err, "Error getting CRL issuer public key\n");
|
||||||
BIO_printf(bio_err,
|
goto end;
|
||||||
"Error getting CRL issuer public key\n");
|
}
|
||||||
goto end;
|
i = X509_CRL_verify(x, pkey);
|
||||||
}
|
EVP_PKEY_free(pkey);
|
||||||
i = X509_CRL_verify(x, pkey);
|
if (i < 0)
|
||||||
EVP_PKEY_free(pkey);
|
goto end;
|
||||||
if(i < 0) goto end;
|
if (i == 0)
|
||||||
if(i == 0) BIO_printf(bio_err, "verify failure\n");
|
BIO_printf(bio_err, "verify failure\n");
|
||||||
else BIO_printf(bio_err, "verify OK\n");
|
else
|
||||||
}
|
BIO_printf(bio_err, "verify OK\n");
|
||||||
|
}
|
||||||
|
|
||||||
if (num)
|
if (num) {
|
||||||
{
|
for (i = 1; i <= num; i++) {
|
||||||
for (i=1; i<=num; i++)
|
if (issuer == i) {
|
||||||
{
|
print_name(bio_out, "issuer=", X509_CRL_get_issuer(x),
|
||||||
if (issuer == i)
|
nmflag);
|
||||||
{
|
}
|
||||||
print_name(bio_out, "issuer=", X509_CRL_get_issuer(x), nmflag);
|
if (crlnumber == i) {
|
||||||
}
|
ASN1_INTEGER *crlnum;
|
||||||
|
crlnum = X509_CRL_get_ext_d2i(x, NID_crl_number, NULL, NULL);
|
||||||
|
BIO_printf(bio_out, "crlNumber=");
|
||||||
|
if (crlnum) {
|
||||||
|
i2a_ASN1_INTEGER(bio_out, crlnum);
|
||||||
|
ASN1_INTEGER_free(crlnum);
|
||||||
|
} else
|
||||||
|
BIO_puts(bio_out, "<NONE>");
|
||||||
|
BIO_printf(bio_out, "\n");
|
||||||
|
}
|
||||||
|
if (hash == i) {
|
||||||
|
BIO_printf(bio_out, "%08lx\n",
|
||||||
|
X509_NAME_hash(X509_CRL_get_issuer(x)));
|
||||||
|
}
|
||||||
|
#ifndef OPENSSL_NO_MD5
|
||||||
|
if (hash_old == i) {
|
||||||
|
BIO_printf(bio_out, "%08lx\n",
|
||||||
|
X509_NAME_hash_old(X509_CRL_get_issuer(x)));
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
if (lastupdate == i) {
|
||||||
|
BIO_printf(bio_out, "lastUpdate=");
|
||||||
|
ASN1_TIME_print(bio_out, X509_CRL_get_lastUpdate(x));
|
||||||
|
BIO_printf(bio_out, "\n");
|
||||||
|
}
|
||||||
|
if (nextupdate == i) {
|
||||||
|
BIO_printf(bio_out, "nextUpdate=");
|
||||||
|
if (X509_CRL_get_nextUpdate(x))
|
||||||
|
ASN1_TIME_print(bio_out, X509_CRL_get_nextUpdate(x));
|
||||||
|
else
|
||||||
|
BIO_printf(bio_out, "NONE");
|
||||||
|
BIO_printf(bio_out, "\n");
|
||||||
|
}
|
||||||
|
if (fingerprint == i) {
|
||||||
|
int j;
|
||||||
|
unsigned int n;
|
||||||
|
unsigned char md[EVP_MAX_MD_SIZE];
|
||||||
|
|
||||||
if (hash == i)
|
if (!X509_CRL_digest(x, digest, md, &n)) {
|
||||||
{
|
BIO_printf(bio_err, "out of memory\n");
|
||||||
BIO_printf(bio_out,"%08lx\n",
|
goto end;
|
||||||
X509_NAME_hash(X509_CRL_get_issuer(x)));
|
}
|
||||||
}
|
BIO_printf(bio_out, "%s Fingerprint=",
|
||||||
if (lastupdate == i)
|
OBJ_nid2sn(EVP_MD_type(digest)));
|
||||||
{
|
for (j = 0; j < (int)n; j++) {
|
||||||
BIO_printf(bio_out,"lastUpdate=");
|
BIO_printf(bio_out, "%02X%c", md[j], (j + 1 == (int)n)
|
||||||
ASN1_TIME_print(bio_out,
|
? '\n' : ':');
|
||||||
X509_CRL_get_lastUpdate(x));
|
}
|
||||||
BIO_printf(bio_out,"\n");
|
}
|
||||||
}
|
}
|
||||||
if (nextupdate == i)
|
}
|
||||||
{
|
|
||||||
BIO_printf(bio_out,"nextUpdate=");
|
|
||||||
if (X509_CRL_get_nextUpdate(x))
|
|
||||||
ASN1_TIME_print(bio_out,
|
|
||||||
X509_CRL_get_nextUpdate(x));
|
|
||||||
else
|
|
||||||
BIO_printf(bio_out,"NONE");
|
|
||||||
BIO_printf(bio_out,"\n");
|
|
||||||
}
|
|
||||||
if (fingerprint == i)
|
|
||||||
{
|
|
||||||
int j;
|
|
||||||
unsigned int n;
|
|
||||||
unsigned char md[EVP_MAX_MD_SIZE];
|
|
||||||
|
|
||||||
if (!X509_CRL_digest(x,digest,md,&n))
|
out = BIO_new(BIO_s_file());
|
||||||
{
|
if (out == NULL) {
|
||||||
BIO_printf(bio_err,"out of memory\n");
|
ERR_print_errors(bio_err);
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
BIO_printf(bio_out,"%s Fingerprint=",
|
|
||||||
OBJ_nid2sn(EVP_MD_type(digest)));
|
|
||||||
for (j=0; j<(int)n; j++)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_out,"%02X%c",md[j],
|
|
||||||
(j+1 == (int)n)
|
|
||||||
?'\n':':');
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
out=BIO_new(BIO_s_file());
|
if (outfile == NULL) {
|
||||||
if (out == NULL)
|
BIO_set_fp(out, stdout, BIO_NOCLOSE);
|
||||||
{
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (outfile == NULL)
|
|
||||||
{
|
|
||||||
BIO_set_fp(out,stdout,BIO_NOCLOSE);
|
|
||||||
#ifdef OPENSSL_SYS_VMS
|
#ifdef OPENSSL_SYS_VMS
|
||||||
{
|
{
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
out = BIO_push(tmpbio, out);
|
out = BIO_push(tmpbio, out);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
}
|
} else {
|
||||||
else
|
if (BIO_write_filename(out, outfile) <= 0) {
|
||||||
{
|
perror(outfile);
|
||||||
if (BIO_write_filename(out,outfile) <= 0)
|
goto end;
|
||||||
{
|
}
|
||||||
perror(outfile);
|
}
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (text) X509_CRL_print(out, x);
|
if (text)
|
||||||
|
X509_CRL_print(out, x);
|
||||||
|
|
||||||
if (noout) goto end;
|
if (noout) {
|
||||||
|
ret = 0;
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
if (outformat == FORMAT_ASN1)
|
if (outformat == FORMAT_ASN1)
|
||||||
i=(int)i2d_X509_CRL_bio(out,x);
|
i = (int)i2d_X509_CRL_bio(out, x);
|
||||||
else if (outformat == FORMAT_PEM)
|
else if (outformat == FORMAT_PEM)
|
||||||
i=PEM_write_bio_X509_CRL(out,x);
|
i = PEM_write_bio_X509_CRL(out, x);
|
||||||
else
|
else {
|
||||||
{
|
BIO_printf(bio_err, "bad output format specified for outfile\n");
|
||||||
BIO_printf(bio_err,"bad output format specified for outfile\n");
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
if (!i) {
|
||||||
if (!i) { BIO_printf(bio_err,"unable to write CRL\n"); goto end; }
|
BIO_printf(bio_err, "unable to write CRL\n");
|
||||||
ret=0;
|
goto end;
|
||||||
end:
|
}
|
||||||
BIO_free_all(out);
|
ret = 0;
|
||||||
BIO_free_all(bio_out);
|
end:
|
||||||
bio_out=NULL;
|
BIO_free_all(out);
|
||||||
X509_CRL_free(x);
|
BIO_free_all(bio_out);
|
||||||
if(store) {
|
bio_out = NULL;
|
||||||
X509_STORE_CTX_cleanup(&ctx);
|
X509_CRL_free(x);
|
||||||
X509_STORE_free(store);
|
if (store) {
|
||||||
}
|
X509_STORE_CTX_cleanup(&ctx);
|
||||||
apps_shutdown();
|
X509_STORE_free(store);
|
||||||
OPENSSL_EXIT(ret);
|
}
|
||||||
}
|
apps_shutdown();
|
||||||
|
OPENSSL_EXIT(ret);
|
||||||
|
}
|
||||||
|
|
||||||
static X509_CRL *load_crl(char *infile, int format)
|
static X509_CRL *load_crl(char *infile, int format)
|
||||||
{
|
{
|
||||||
X509_CRL *x=NULL;
|
X509_CRL *x = NULL;
|
||||||
BIO *in=NULL;
|
BIO *in = NULL;
|
||||||
|
|
||||||
in=BIO_new(BIO_s_file());
|
in = BIO_new(BIO_s_file());
|
||||||
if (in == NULL)
|
if (in == NULL) {
|
||||||
{
|
ERR_print_errors(bio_err);
|
||||||
ERR_print_errors(bio_err);
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
|
||||||
|
|
||||||
if (infile == NULL)
|
if (infile == NULL)
|
||||||
BIO_set_fp(in,stdin,BIO_NOCLOSE);
|
BIO_set_fp(in, stdin, BIO_NOCLOSE);
|
||||||
else
|
else {
|
||||||
{
|
if (BIO_read_filename(in, infile) <= 0) {
|
||||||
if (BIO_read_filename(in,infile) <= 0)
|
perror(infile);
|
||||||
{
|
goto end;
|
||||||
perror(infile);
|
}
|
||||||
goto end;
|
}
|
||||||
}
|
if (format == FORMAT_ASN1)
|
||||||
}
|
x = d2i_X509_CRL_bio(in, NULL);
|
||||||
if (format == FORMAT_ASN1)
|
else if (format == FORMAT_PEM)
|
||||||
x=d2i_X509_CRL_bio(in,NULL);
|
x = PEM_read_bio_X509_CRL(in, NULL, NULL, NULL);
|
||||||
else if (format == FORMAT_PEM)
|
else {
|
||||||
x=PEM_read_bio_X509_CRL(in,NULL,NULL,NULL);
|
BIO_printf(bio_err, "bad input format specified for input crl\n");
|
||||||
else {
|
goto end;
|
||||||
BIO_printf(bio_err,"bad input format specified for input crl\n");
|
}
|
||||||
goto end;
|
if (x == NULL) {
|
||||||
}
|
BIO_printf(bio_err, "unable to load CRL\n");
|
||||||
if (x == NULL)
|
ERR_print_errors(bio_err);
|
||||||
{
|
goto end;
|
||||||
BIO_printf(bio_err,"unable to load CRL\n");
|
}
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
end:
|
|
||||||
BIO_free(in);
|
|
||||||
return(x);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
end:
|
||||||
|
BIO_free(in);
|
||||||
|
return (x);
|
||||||
|
}
|
||||||
|
|||||||
457
apps/crl2p7.c
457
apps/crl2p7.c
@@ -56,14 +56,15 @@
|
|||||||
* [including the GNU Public Licence.]
|
* [including the GNU Public Licence.]
|
||||||
*/
|
*/
|
||||||
|
|
||||||
/* This was written by Gordon Chaffee <chaffee@plateau.cs.berkeley.edu>
|
/*
|
||||||
* and donated 'to the cause' along with lots and lots of other fixes to
|
* This was written by Gordon Chaffee <chaffee@plateau.cs.berkeley.edu> and
|
||||||
* the library. */
|
* donated 'to the cause' along with lots and lots of other fixes to the
|
||||||
|
* library.
|
||||||
|
*/
|
||||||
|
|
||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
#include <string.h>
|
#include <string.h>
|
||||||
#include <sys/types.h>
|
#include <sys/types.h>
|
||||||
#include <sys/stat.h>
|
|
||||||
#include "apps.h"
|
#include "apps.h"
|
||||||
#include <openssl/err.h>
|
#include <openssl/err.h>
|
||||||
#include <openssl/evp.h>
|
#include <openssl/evp.h>
|
||||||
@@ -74,272 +75,260 @@
|
|||||||
|
|
||||||
static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile);
|
static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile);
|
||||||
#undef PROG
|
#undef PROG
|
||||||
#define PROG crl2pkcs7_main
|
#define PROG crl2pkcs7_main
|
||||||
|
|
||||||
/* -inform arg - input format - default PEM (DER or PEM)
|
/*-
|
||||||
|
* -inform arg - input format - default PEM (DER or PEM)
|
||||||
* -outform arg - output format - default PEM
|
* -outform arg - output format - default PEM
|
||||||
* -in arg - input file - default stdin
|
* -in arg - input file - default stdin
|
||||||
* -out arg - output file - default stdout
|
* -out arg - output file - default stdout
|
||||||
*/
|
*/
|
||||||
|
|
||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
int i,badops=0;
|
int i, badops = 0;
|
||||||
BIO *in=NULL,*out=NULL;
|
BIO *in = NULL, *out = NULL;
|
||||||
int informat,outformat;
|
int informat, outformat;
|
||||||
char *infile,*outfile,*prog,*certfile;
|
char *infile, *outfile, *prog, *certfile;
|
||||||
PKCS7 *p7 = NULL;
|
PKCS7 *p7 = NULL;
|
||||||
PKCS7_SIGNED *p7s = NULL;
|
PKCS7_SIGNED *p7s = NULL;
|
||||||
X509_CRL *crl=NULL;
|
X509_CRL *crl = NULL;
|
||||||
STACK *certflst=NULL;
|
STACK_OF(OPENSSL_STRING) *certflst = NULL;
|
||||||
STACK_OF(X509_CRL) *crl_stack=NULL;
|
STACK_OF(X509_CRL) *crl_stack = NULL;
|
||||||
STACK_OF(X509) *cert_stack=NULL;
|
STACK_OF(X509) *cert_stack = NULL;
|
||||||
int ret=1,nocrl=0;
|
int ret = 1, nocrl = 0;
|
||||||
|
|
||||||
apps_startup();
|
apps_startup();
|
||||||
|
|
||||||
if (bio_err == NULL)
|
if (bio_err == NULL)
|
||||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
if ((bio_err = BIO_new(BIO_s_file())) != NULL)
|
||||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||||
|
|
||||||
infile=NULL;
|
infile = NULL;
|
||||||
outfile=NULL;
|
outfile = NULL;
|
||||||
informat=FORMAT_PEM;
|
informat = FORMAT_PEM;
|
||||||
outformat=FORMAT_PEM;
|
outformat = FORMAT_PEM;
|
||||||
|
|
||||||
prog=argv[0];
|
prog = argv[0];
|
||||||
argc--;
|
argc--;
|
||||||
argv++;
|
argv++;
|
||||||
while (argc >= 1)
|
while (argc >= 1) {
|
||||||
{
|
if (strcmp(*argv, "-inform") == 0) {
|
||||||
if (strcmp(*argv,"-inform") == 0)
|
if (--argc < 1)
|
||||||
{
|
goto bad;
|
||||||
if (--argc < 1) goto bad;
|
informat = str2fmt(*(++argv));
|
||||||
informat=str2fmt(*(++argv));
|
} else if (strcmp(*argv, "-outform") == 0) {
|
||||||
}
|
if (--argc < 1)
|
||||||
else if (strcmp(*argv,"-outform") == 0)
|
goto bad;
|
||||||
{
|
outformat = str2fmt(*(++argv));
|
||||||
if (--argc < 1) goto bad;
|
} else if (strcmp(*argv, "-in") == 0) {
|
||||||
outformat=str2fmt(*(++argv));
|
if (--argc < 1)
|
||||||
}
|
goto bad;
|
||||||
else if (strcmp(*argv,"-in") == 0)
|
infile = *(++argv);
|
||||||
{
|
} else if (strcmp(*argv, "-nocrl") == 0) {
|
||||||
if (--argc < 1) goto bad;
|
nocrl = 1;
|
||||||
infile= *(++argv);
|
} else if (strcmp(*argv, "-out") == 0) {
|
||||||
}
|
if (--argc < 1)
|
||||||
else if (strcmp(*argv,"-nocrl") == 0)
|
goto bad;
|
||||||
{
|
outfile = *(++argv);
|
||||||
nocrl=1;
|
} else if (strcmp(*argv, "-certfile") == 0) {
|
||||||
}
|
if (--argc < 1)
|
||||||
else if (strcmp(*argv,"-out") == 0)
|
goto bad;
|
||||||
{
|
if (!certflst)
|
||||||
if (--argc < 1) goto bad;
|
certflst = sk_OPENSSL_STRING_new_null();
|
||||||
outfile= *(++argv);
|
if (!certflst)
|
||||||
}
|
goto end;
|
||||||
else if (strcmp(*argv,"-certfile") == 0)
|
if (!sk_OPENSSL_STRING_push(certflst, *(++argv))) {
|
||||||
{
|
sk_OPENSSL_STRING_free(certflst);
|
||||||
if (--argc < 1) goto bad;
|
goto end;
|
||||||
if(!certflst) certflst = sk_new_null();
|
}
|
||||||
sk_push(certflst,*(++argv));
|
} else {
|
||||||
}
|
BIO_printf(bio_err, "unknown option %s\n", *argv);
|
||||||
else
|
badops = 1;
|
||||||
{
|
break;
|
||||||
BIO_printf(bio_err,"unknown option %s\n",*argv);
|
}
|
||||||
badops=1;
|
argc--;
|
||||||
break;
|
argv++;
|
||||||
}
|
}
|
||||||
argc--;
|
|
||||||
argv++;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (badops)
|
if (badops) {
|
||||||
{
|
bad:
|
||||||
bad:
|
BIO_printf(bio_err, "%s [options] <infile >outfile\n", prog);
|
||||||
BIO_printf(bio_err,"%s [options] <infile >outfile\n",prog);
|
BIO_printf(bio_err, "where options are\n");
|
||||||
BIO_printf(bio_err,"where options are\n");
|
BIO_printf(bio_err, " -inform arg input format - DER or PEM\n");
|
||||||
BIO_printf(bio_err," -inform arg input format - DER or PEM\n");
|
BIO_printf(bio_err, " -outform arg output format - DER or PEM\n");
|
||||||
BIO_printf(bio_err," -outform arg output format - DER or PEM\n");
|
BIO_printf(bio_err, " -in arg input file\n");
|
||||||
BIO_printf(bio_err," -in arg input file\n");
|
BIO_printf(bio_err, " -out arg output file\n");
|
||||||
BIO_printf(bio_err," -out arg output file\n");
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err," -certfile arg certificates file of chain to a trusted CA\n");
|
" -certfile arg certificates file of chain to a trusted CA\n");
|
||||||
BIO_printf(bio_err," (can be used more than once)\n");
|
BIO_printf(bio_err, " (can be used more than once)\n");
|
||||||
BIO_printf(bio_err," -nocrl no crl to load, just certs from '-certfile'\n");
|
BIO_printf(bio_err,
|
||||||
ret = 1;
|
" -nocrl no crl to load, just certs from '-certfile'\n");
|
||||||
goto end;
|
ret = 1;
|
||||||
}
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
ERR_load_crypto_strings();
|
ERR_load_crypto_strings();
|
||||||
|
|
||||||
in=BIO_new(BIO_s_file());
|
in = BIO_new(BIO_s_file());
|
||||||
out=BIO_new(BIO_s_file());
|
out = BIO_new(BIO_s_file());
|
||||||
if ((in == NULL) || (out == NULL))
|
if ((in == NULL) || (out == NULL)) {
|
||||||
{
|
ERR_print_errors(bio_err);
|
||||||
ERR_print_errors(bio_err);
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
|
||||||
|
|
||||||
if (!nocrl)
|
if (!nocrl) {
|
||||||
{
|
if (infile == NULL)
|
||||||
if (infile == NULL)
|
BIO_set_fp(in, stdin, BIO_NOCLOSE);
|
||||||
BIO_set_fp(in,stdin,BIO_NOCLOSE);
|
else {
|
||||||
else
|
if (BIO_read_filename(in, infile) <= 0) {
|
||||||
{
|
perror(infile);
|
||||||
if (BIO_read_filename(in,infile) <= 0)
|
goto end;
|
||||||
{
|
}
|
||||||
perror(infile);
|
}
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (informat == FORMAT_ASN1)
|
if (informat == FORMAT_ASN1)
|
||||||
crl=d2i_X509_CRL_bio(in,NULL);
|
crl = d2i_X509_CRL_bio(in, NULL);
|
||||||
else if (informat == FORMAT_PEM)
|
else if (informat == FORMAT_PEM)
|
||||||
crl=PEM_read_bio_X509_CRL(in,NULL,NULL,NULL);
|
crl = PEM_read_bio_X509_CRL(in, NULL, NULL, NULL);
|
||||||
else {
|
else {
|
||||||
BIO_printf(bio_err,"bad input format specified for input crl\n");
|
BIO_printf(bio_err, "bad input format specified for input crl\n");
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
if (crl == NULL)
|
if (crl == NULL) {
|
||||||
{
|
BIO_printf(bio_err, "unable to load CRL\n");
|
||||||
BIO_printf(bio_err,"unable to load CRL\n");
|
ERR_print_errors(bio_err);
|
||||||
ERR_print_errors(bio_err);
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
}
|
||||||
}
|
|
||||||
|
|
||||||
if ((p7=PKCS7_new()) == NULL) goto end;
|
if ((p7 = PKCS7_new()) == NULL)
|
||||||
if ((p7s=PKCS7_SIGNED_new()) == NULL) goto end;
|
goto end;
|
||||||
p7->type=OBJ_nid2obj(NID_pkcs7_signed);
|
if ((p7s = PKCS7_SIGNED_new()) == NULL)
|
||||||
p7->d.sign=p7s;
|
goto end;
|
||||||
p7s->contents->type=OBJ_nid2obj(NID_pkcs7_data);
|
p7->type = OBJ_nid2obj(NID_pkcs7_signed);
|
||||||
|
p7->d.sign = p7s;
|
||||||
|
p7s->contents->type = OBJ_nid2obj(NID_pkcs7_data);
|
||||||
|
|
||||||
if (!ASN1_INTEGER_set(p7s->version,1)) goto end;
|
if (!ASN1_INTEGER_set(p7s->version, 1))
|
||||||
if ((crl_stack=sk_X509_CRL_new_null()) == NULL) goto end;
|
goto end;
|
||||||
p7s->crl=crl_stack;
|
if ((crl_stack = sk_X509_CRL_new_null()) == NULL)
|
||||||
if (crl != NULL)
|
goto end;
|
||||||
{
|
p7s->crl = crl_stack;
|
||||||
sk_X509_CRL_push(crl_stack,crl);
|
if (crl != NULL) {
|
||||||
crl=NULL; /* now part of p7 for OPENSSL_freeing */
|
sk_X509_CRL_push(crl_stack, crl);
|
||||||
}
|
crl = NULL; /* now part of p7 for OPENSSL_freeing */
|
||||||
|
}
|
||||||
|
|
||||||
if ((cert_stack=sk_X509_new_null()) == NULL) goto end;
|
if ((cert_stack = sk_X509_new_null()) == NULL)
|
||||||
p7s->cert=cert_stack;
|
goto end;
|
||||||
|
p7s->cert = cert_stack;
|
||||||
|
|
||||||
if(certflst) for(i = 0; i < sk_num(certflst); i++) {
|
if (certflst)
|
||||||
certfile = sk_value(certflst, i);
|
for (i = 0; i < sk_OPENSSL_STRING_num(certflst); i++) {
|
||||||
if (add_certs_from_file(cert_stack,certfile) < 0)
|
certfile = sk_OPENSSL_STRING_value(certflst, i);
|
||||||
{
|
if (add_certs_from_file(cert_stack, certfile) < 0) {
|
||||||
BIO_printf(bio_err, "error loading certificates\n");
|
BIO_printf(bio_err, "error loading certificates\n");
|
||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
sk_free(certflst);
|
sk_OPENSSL_STRING_free(certflst);
|
||||||
|
|
||||||
if (outfile == NULL)
|
if (outfile == NULL) {
|
||||||
{
|
BIO_set_fp(out, stdout, BIO_NOCLOSE);
|
||||||
BIO_set_fp(out,stdout,BIO_NOCLOSE);
|
|
||||||
#ifdef OPENSSL_SYS_VMS
|
#ifdef OPENSSL_SYS_VMS
|
||||||
{
|
{
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
out = BIO_push(tmpbio, out);
|
out = BIO_push(tmpbio, out);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
}
|
} else {
|
||||||
else
|
if (BIO_write_filename(out, outfile) <= 0) {
|
||||||
{
|
perror(outfile);
|
||||||
if (BIO_write_filename(out,outfile) <= 0)
|
goto end;
|
||||||
{
|
}
|
||||||
perror(outfile);
|
}
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (outformat == FORMAT_ASN1)
|
if (outformat == FORMAT_ASN1)
|
||||||
i=i2d_PKCS7_bio(out,p7);
|
i = i2d_PKCS7_bio(out, p7);
|
||||||
else if (outformat == FORMAT_PEM)
|
else if (outformat == FORMAT_PEM)
|
||||||
i=PEM_write_bio_PKCS7(out,p7);
|
i = PEM_write_bio_PKCS7(out, p7);
|
||||||
else {
|
else {
|
||||||
BIO_printf(bio_err,"bad output format specified for outfile\n");
|
BIO_printf(bio_err, "bad output format specified for outfile\n");
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
if (!i)
|
if (!i) {
|
||||||
{
|
BIO_printf(bio_err, "unable to write pkcs7 object\n");
|
||||||
BIO_printf(bio_err,"unable to write pkcs7 object\n");
|
ERR_print_errors(bio_err);
|
||||||
ERR_print_errors(bio_err);
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
ret = 0;
|
||||||
ret=0;
|
end:
|
||||||
end:
|
if (in != NULL)
|
||||||
if (in != NULL) BIO_free(in);
|
BIO_free(in);
|
||||||
if (out != NULL) BIO_free_all(out);
|
if (out != NULL)
|
||||||
if (p7 != NULL) PKCS7_free(p7);
|
BIO_free_all(out);
|
||||||
if (crl != NULL) X509_CRL_free(crl);
|
if (p7 != NULL)
|
||||||
|
PKCS7_free(p7);
|
||||||
|
if (crl != NULL)
|
||||||
|
X509_CRL_free(crl);
|
||||||
|
|
||||||
apps_shutdown();
|
apps_shutdown();
|
||||||
OPENSSL_EXIT(ret);
|
OPENSSL_EXIT(ret);
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
/*-
|
||||||
*----------------------------------------------------------------------
|
*----------------------------------------------------------------------
|
||||||
* int add_certs_from_file
|
* int add_certs_from_file
|
||||||
*
|
*
|
||||||
* Read a list of certificates to be checked from a file.
|
* Read a list of certificates to be checked from a file.
|
||||||
*
|
*
|
||||||
* Results:
|
* Results:
|
||||||
* number of certs added if successful, -1 if not.
|
* number of certs added if successful, -1 if not.
|
||||||
*----------------------------------------------------------------------
|
*----------------------------------------------------------------------
|
||||||
*/
|
*/
|
||||||
static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile)
|
static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile)
|
||||||
{
|
{
|
||||||
struct stat st;
|
BIO *in = NULL;
|
||||||
BIO *in=NULL;
|
int count = 0;
|
||||||
int count=0;
|
int ret = -1;
|
||||||
int ret= -1;
|
STACK_OF(X509_INFO) *sk = NULL;
|
||||||
STACK_OF(X509_INFO) *sk=NULL;
|
X509_INFO *xi;
|
||||||
X509_INFO *xi;
|
|
||||||
|
|
||||||
if ((stat(certfile,&st) != 0))
|
in = BIO_new(BIO_s_file());
|
||||||
{
|
if ((in == NULL) || (BIO_read_filename(in, certfile) <= 0)) {
|
||||||
BIO_printf(bio_err,"unable to load the file, %s\n",certfile);
|
BIO_printf(bio_err, "error opening the file, %s\n", certfile);
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
in=BIO_new(BIO_s_file());
|
/* This loads from a file, a stack of x509/crl/pkey sets */
|
||||||
if ((in == NULL) || (BIO_read_filename(in,certfile) <= 0))
|
sk = PEM_X509_INFO_read_bio(in, NULL, NULL, NULL);
|
||||||
{
|
if (sk == NULL) {
|
||||||
BIO_printf(bio_err,"error opening the file, %s\n",certfile);
|
BIO_printf(bio_err, "error reading the file, %s\n", certfile);
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* This loads from a file, a stack of x509/crl/pkey sets */
|
/* scan over it and pull out the CRL's */
|
||||||
sk=PEM_X509_INFO_read_bio(in,NULL,NULL,NULL);
|
while (sk_X509_INFO_num(sk)) {
|
||||||
if (sk == NULL) {
|
xi = sk_X509_INFO_shift(sk);
|
||||||
BIO_printf(bio_err,"error reading the file, %s\n",certfile);
|
if (xi->x509 != NULL) {
|
||||||
goto end;
|
sk_X509_push(stack, xi->x509);
|
||||||
}
|
xi->x509 = NULL;
|
||||||
|
count++;
|
||||||
/* scan over it and pull out the CRL's */
|
}
|
||||||
while (sk_X509_INFO_num(sk))
|
X509_INFO_free(xi);
|
||||||
{
|
}
|
||||||
xi=sk_X509_INFO_shift(sk);
|
|
||||||
if (xi->x509 != NULL)
|
|
||||||
{
|
|
||||||
sk_X509_push(stack,xi->x509);
|
|
||||||
xi->x509=NULL;
|
|
||||||
count++;
|
|
||||||
}
|
|
||||||
X509_INFO_free(xi);
|
|
||||||
}
|
|
||||||
|
|
||||||
ret=count;
|
|
||||||
end:
|
|
||||||
/* never need to OPENSSL_free x */
|
|
||||||
if (in != NULL) BIO_free(in);
|
|
||||||
if (sk != NULL) sk_X509_INFO_free(sk);
|
|
||||||
return(ret);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
ret = count;
|
||||||
|
end:
|
||||||
|
/* never need to OPENSSL_free x */
|
||||||
|
if (in != NULL)
|
||||||
|
BIO_free(in);
|
||||||
|
if (sk != NULL)
|
||||||
|
sk_X509_INFO_free(sk);
|
||||||
|
return (ret);
|
||||||
|
}
|
||||||
|
|||||||
6
apps/demoSRP/srp_verifier.txt
Normal file
6
apps/demoSRP/srp_verifier.txt
Normal file
@@ -0,0 +1,6 @@
|
|||||||
|
# This is a file that will be filled by the openssl srp routine.
|
||||||
|
# You can initialize the file with additional groups, these are
|
||||||
|
# records starting with a I followed by the g and N values and the id.
|
||||||
|
# The exact values ... you have to dig this out from the source of srp.c
|
||||||
|
# or srp_vfy.c
|
||||||
|
# The last value of an I is used as the default group for new users.
|
||||||
1
apps/demoSRP/srp_verifier.txt.attr
Normal file
1
apps/demoSRP/srp_verifier.txt.attr
Normal file
@@ -0,0 +1 @@
|
|||||||
|
unique_subject = yes
|
||||||
305
apps/der_chop.in
305
apps/der_chop.in
@@ -1,305 +0,0 @@
|
|||||||
#!/usr/local/bin/perl
|
|
||||||
#
|
|
||||||
# der_chop ... this is one total hack that Eric is really not proud of
|
|
||||||
# so don't look at it and don't ask for support
|
|
||||||
#
|
|
||||||
# The "documentation" for this (i.e. all the comments) are my fault --tjh
|
|
||||||
#
|
|
||||||
# This program takes the "raw" output of derparse/asn1parse and
|
|
||||||
# converts it into tokens and then runs regular expression matches
|
|
||||||
# to try to figure out what to grab to get the things that are needed
|
|
||||||
# and it is possible that this will do the wrong thing as it is a *hack*
|
|
||||||
#
|
|
||||||
# SSLeay 0.5.2+ should have direct read support for x509 (via -inform NET)
|
|
||||||
# [I know ... promises promises :-)]
|
|
||||||
#
|
|
||||||
# To convert a Netscape Certificate:
|
|
||||||
# der_chop < ServerCert.der > cert.pem
|
|
||||||
# To convert a Netscape Key (and encrypt it again to protect it)
|
|
||||||
# rsa -inform NET -in ServerKey.der -des > key.pem
|
|
||||||
#
|
|
||||||
# 23-Apr-96 eay Added the extra ASN.1 string types, I still think this
|
|
||||||
# is an evil hack. If nothing else the parsing should
|
|
||||||
# be relative, not absolute.
|
|
||||||
# 19-Apr-96 tjh hacked (with eay) into 0.5.x format
|
|
||||||
#
|
|
||||||
# Tim Hudson
|
|
||||||
# tjh@cryptsoft.com
|
|
||||||
#
|
|
||||||
|
|
||||||
|
|
||||||
require 'getopts.pl';
|
|
||||||
|
|
||||||
$debug=0;
|
|
||||||
|
|
||||||
# this was the 0.4.x way of doing things ...
|
|
||||||
$cmd="derparse";
|
|
||||||
$x509_cmd="x509";
|
|
||||||
$crl_cmd="crl";
|
|
||||||
$rc4_cmd="rc4";
|
|
||||||
$md2_cmd="md2";
|
|
||||||
$md4_cmd="md4";
|
|
||||||
$rsa_cmd="rsa -des -inform der ";
|
|
||||||
|
|
||||||
# this was the 0.5.x way of doing things ...
|
|
||||||
$cmd="openssl asn1parse";
|
|
||||||
$x509_cmd="openssl x509";
|
|
||||||
$crl_cmd="openssl crl";
|
|
||||||
$rc4_cmd="openssl rc4";
|
|
||||||
$md2_cmd="openssl md2";
|
|
||||||
$md4_cmd="openssl md4";
|
|
||||||
$rsa_cmd="openssl rsa -des -inform der ";
|
|
||||||
|
|
||||||
&Getopts('vd:') || die "usage:$0 [-v] [-d num] file";
|
|
||||||
$depth=($opt_d =~ /^\d+$/)?$opt_d:0;
|
|
||||||
|
|
||||||
&init_der();
|
|
||||||
|
|
||||||
if ($#ARGV != -1)
|
|
||||||
{
|
|
||||||
foreach $file (@ARGV)
|
|
||||||
{
|
|
||||||
print STDERR "doing $file\n";
|
|
||||||
&dofile($file);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
$file="/tmp/a$$.DER";
|
|
||||||
open(OUT,">$file") || die "unable to open $file:$!\n";
|
|
||||||
for (;;)
|
|
||||||
{
|
|
||||||
$i=sysread(STDIN,$b,1024*10);
|
|
||||||
last if ($i <= 0);
|
|
||||||
$i=syswrite(OUT,$b,$i);
|
|
||||||
}
|
|
||||||
&dofile($file);
|
|
||||||
unlink($file);
|
|
||||||
}
|
|
||||||
|
|
||||||
sub dofile
|
|
||||||
{
|
|
||||||
local($file)=@_;
|
|
||||||
local(@p);
|
|
||||||
|
|
||||||
$b=&load_file($file);
|
|
||||||
@p=&load_file_parse($file);
|
|
||||||
|
|
||||||
foreach $_ (@p)
|
|
||||||
{
|
|
||||||
($off,$d,$hl,$len)=&parse_line($_);
|
|
||||||
$d-=$depth;
|
|
||||||
next if ($d != 0);
|
|
||||||
next if ($len == 0);
|
|
||||||
|
|
||||||
$o=substr($b,$off,$len+$hl);
|
|
||||||
($str,@data)=&der_str($o);
|
|
||||||
print "$str\n" if ($opt_v);
|
|
||||||
if ($str =~ /^$crl/)
|
|
||||||
{
|
|
||||||
open(OUT,"|$crl_cmd -inform d -hash -issuer") ||
|
|
||||||
die "unable to run $crl_cmd:$!\n";
|
|
||||||
print OUT $o;
|
|
||||||
close(OUT);
|
|
||||||
}
|
|
||||||
elsif ($str =~ /^$x509/)
|
|
||||||
{
|
|
||||||
open(OUT,"|$x509_cmd -inform d -hash -subject -issuer")
|
|
||||||
|| die "unable to run $x509_cmd:$!\n";
|
|
||||||
print OUT $o;
|
|
||||||
close(OUT);
|
|
||||||
}
|
|
||||||
elsif ($str =~ /^$rsa/)
|
|
||||||
{
|
|
||||||
($type)=($data[3] =~ /OBJECT_IDENTIFIER :(.*)\s*$/);
|
|
||||||
next unless ($type eq "rsaEncryption");
|
|
||||||
($off,$d,$hl,$len)=&parse_line($data[5]);
|
|
||||||
$os=substr($o,$off+$hl,$len);
|
|
||||||
open(OUT,"|$rsa_cmd")
|
|
||||||
|| die "unable to run $rsa_cmd:$!\n";
|
|
||||||
print OUT $os;
|
|
||||||
close(OUT);
|
|
||||||
}
|
|
||||||
elsif ($str =~ /^0G-1D-1G/)
|
|
||||||
{
|
|
||||||
($off,$d,$hl,$len)=&parse_line($data[1]);
|
|
||||||
$os=substr($o,$off+$hl,$len);
|
|
||||||
print STDERR "<$os>\n" if $opt_v;
|
|
||||||
&do_certificate($o,@data)
|
|
||||||
if (($os eq "certificate") &&
|
|
||||||
($str =! /^0G-1D-1G-2G-3F-3E-2D/));
|
|
||||||
&do_private_key($o,@data)
|
|
||||||
if (($os eq "private-key") &&
|
|
||||||
($str =! /^0G-1D-1G-2G-3F-3E-2D/));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
sub der_str
|
|
||||||
{
|
|
||||||
local($str)=@_;
|
|
||||||
local(*OUT,*IN,@a,$t,$d,$ret);
|
|
||||||
local($file)="/tmp/b$$.DER";
|
|
||||||
local(@ret);
|
|
||||||
|
|
||||||
open(OUT,">$file");
|
|
||||||
print OUT $str;
|
|
||||||
close(OUT);
|
|
||||||
open(IN,"$cmd -inform 'd' -in $file |") ||
|
|
||||||
die "unable to run $cmd:$!\n";
|
|
||||||
$ret="";
|
|
||||||
while (<IN>)
|
|
||||||
{
|
|
||||||
chop;
|
|
||||||
push(@ret,$_);
|
|
||||||
|
|
||||||
print STDERR "$_\n" if ($debug);
|
|
||||||
|
|
||||||
@a=split(/\s*:\s*/);
|
|
||||||
($d)=($a[1] =~ /d=\s*(\d+)/);
|
|
||||||
$a[2] =~ s/\s+$//;
|
|
||||||
$t=$DER_s2i{$a[2]};
|
|
||||||
$ret.="$d$t-";
|
|
||||||
}
|
|
||||||
close(IN);
|
|
||||||
unlink($file);
|
|
||||||
chop $ret;
|
|
||||||
$ret =~ s/(-3H(-4G-5F-5[IJKMQRS])+)+/-NAME/g;
|
|
||||||
$ret =~ s/(-3G-4B-4L)+/-RCERT/g;
|
|
||||||
return($ret,@ret);
|
|
||||||
}
|
|
||||||
|
|
||||||
sub init_der
|
|
||||||
{
|
|
||||||
$crl= "0G-1G-2G-3F-3E-2G-NAME-2L-2L-2G-RCERT-1G-2F-2E-1C";
|
|
||||||
$x509="0G-1G-2B-2G-3F-3E-2G-NAME-2G-3L-3L-2G-NAME-2G-3G-4F-4E-3C-1G-2F-2E-1C";
|
|
||||||
$rsa= "0G-1B-1G-2F-2E-1D";
|
|
||||||
|
|
||||||
%DER_i2s=(
|
|
||||||
# SSLeay 0.4.x has this list
|
|
||||||
"A","EOC",
|
|
||||||
"B","INTEGER",
|
|
||||||
"C","BIT STRING",
|
|
||||||
"D","OCTET STRING",
|
|
||||||
"E","NULL",
|
|
||||||
"F","OBJECT",
|
|
||||||
"G","SEQUENCE",
|
|
||||||
"H","SET",
|
|
||||||
"I","PRINTABLESTRING",
|
|
||||||
"J","T61STRING",
|
|
||||||
"K","IA5STRING",
|
|
||||||
"L","UTCTIME",
|
|
||||||
"M","NUMERICSTRING",
|
|
||||||
"N","VIDEOTEXSTRING",
|
|
||||||
"O","GENERALIZEDTIME",
|
|
||||||
"P","GRAPHICSTRING",
|
|
||||||
"Q","ISO64STRING",
|
|
||||||
"R","GENERALSTRING",
|
|
||||||
"S","UNIVERSALSTRING",
|
|
||||||
|
|
||||||
# SSLeay 0.5.x changed some things ... and I'm
|
|
||||||
# leaving in the old stuff but adding in these
|
|
||||||
# to handle the new as well --tjh
|
|
||||||
# - Well I've just taken them out and added the extra new
|
|
||||||
# ones :-) - eay
|
|
||||||
);
|
|
||||||
|
|
||||||
foreach (keys %DER_i2s)
|
|
||||||
{ $DER_s2i{$DER_i2s{$_}}=$_; }
|
|
||||||
}
|
|
||||||
|
|
||||||
sub parse_line
|
|
||||||
{
|
|
||||||
local($_)=@_;
|
|
||||||
|
|
||||||
return(/\s*(\d+):d=\s*(\d+)\s+hl=\s*(\d+)\s+l=\s*(\d+|inf)\s/);
|
|
||||||
}
|
|
||||||
|
|
||||||
# 0:d=0 hl=4 l=377 cons: univ: SEQUENCE
|
|
||||||
# 4:d=1 hl=2 l= 11 prim: univ: OCTET_STRING
|
|
||||||
# 17:d=1 hl=4 l=360 cons: univ: SEQUENCE
|
|
||||||
# 21:d=2 hl=2 l= 12 cons: univ: SEQUENCE
|
|
||||||
# 23:d=3 hl=2 l= 8 prim: univ: OBJECT_IDENTIFIER :rc4
|
|
||||||
# 33:d=3 hl=2 l= 0 prim: univ: NULL
|
|
||||||
# 35:d=2 hl=4 l=342 prim: univ: OCTET_STRING
|
|
||||||
sub do_private_key
|
|
||||||
{
|
|
||||||
local($data,@struct)=@_;
|
|
||||||
local($file)="/tmp/b$$.DER";
|
|
||||||
local($off,$d,$hl,$len,$_,$b,@p,$s);
|
|
||||||
|
|
||||||
($type)=($struct[4] =~ /OBJECT_IDENTIFIER :(.*)\s*$/);
|
|
||||||
if ($type eq "rc4")
|
|
||||||
{
|
|
||||||
($off,$d,$hl,$len)=&parse_line($struct[6]);
|
|
||||||
open(OUT,"|$rc4_cmd >$file") ||
|
|
||||||
die "unable to run $rc4_cmd:$!\n";
|
|
||||||
print OUT substr($data,$off+$hl,$len);
|
|
||||||
close(OUT);
|
|
||||||
|
|
||||||
$b=&load_file($file);
|
|
||||||
unlink($file);
|
|
||||||
|
|
||||||
($s,@p)=&der_str($b);
|
|
||||||
die "unknown rsa key type\n$s\n"
|
|
||||||
if ($s ne '0G-1B-1G-2F-2E-1D');
|
|
||||||
local($off,$d,$hl,$len)=&parse_line($p[5]);
|
|
||||||
$b=substr($b,$off+$hl,$len);
|
|
||||||
($s,@p)=&der_str($b);
|
|
||||||
open(OUT,"|$rsa_cmd") || die "unable to run $rsa_cmd:$!\n";
|
|
||||||
print OUT $b;
|
|
||||||
close(OUT);
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
print "'$type' is unknown\n";
|
|
||||||
exit(1);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
sub do_certificate
|
|
||||||
{
|
|
||||||
local($data,@struct)=@_;
|
|
||||||
local($file)="/tmp/b$$.DER";
|
|
||||||
local($off,$d,$hl,$len,$_,$b,@p,$s);
|
|
||||||
|
|
||||||
($off,$d,$hl,$len)=&parse_line($struct[2]);
|
|
||||||
$b=substr($data,$off,$len+$hl);
|
|
||||||
|
|
||||||
open(OUT,"|$x509_cmd -inform d") || die "unable to run $x509_cmd:$!\n";
|
|
||||||
print OUT $b;
|
|
||||||
close(OUT);
|
|
||||||
}
|
|
||||||
|
|
||||||
sub load_file
|
|
||||||
{
|
|
||||||
local($file)=@_;
|
|
||||||
local(*IN,$r,$b,$i);
|
|
||||||
|
|
||||||
$r="";
|
|
||||||
open(IN,"<$file") || die "unable to open $file:$!\n";
|
|
||||||
for (;;)
|
|
||||||
{
|
|
||||||
$i=sysread(IN,$b,10240);
|
|
||||||
last if ($i <= 0);
|
|
||||||
$r.=$b;
|
|
||||||
}
|
|
||||||
close(IN);
|
|
||||||
return($r);
|
|
||||||
}
|
|
||||||
|
|
||||||
sub load_file_parse
|
|
||||||
{
|
|
||||||
local($file)=@_;
|
|
||||||
local(*IN,$r,@ret,$_,$i,$n,$b);
|
|
||||||
|
|
||||||
open(IN,"$cmd -inform d -in $file|")
|
|
||||||
|| die "unable to run der_parse\n";
|
|
||||||
while (<IN>)
|
|
||||||
{
|
|
||||||
chop;
|
|
||||||
push(@ret,$_);
|
|
||||||
}
|
|
||||||
return($r,@ret);
|
|
||||||
}
|
|
||||||
|
|
||||||
851
apps/dgst.c
851
apps/dgst.c
@@ -66,372 +66,533 @@
|
|||||||
#include <openssl/objects.h>
|
#include <openssl/objects.h>
|
||||||
#include <openssl/x509.h>
|
#include <openssl/x509.h>
|
||||||
#include <openssl/pem.h>
|
#include <openssl/pem.h>
|
||||||
|
#include <openssl/hmac.h>
|
||||||
|
|
||||||
#undef BUFSIZE
|
#undef BUFSIZE
|
||||||
#define BUFSIZE 1024*8
|
#define BUFSIZE 1024*8
|
||||||
|
|
||||||
#undef PROG
|
#undef PROG
|
||||||
#define PROG dgst_main
|
#define PROG dgst_main
|
||||||
|
|
||||||
int do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
|
int do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
|
||||||
EVP_PKEY *key, unsigned char *sigin, int siglen, const char *title,
|
EVP_PKEY *key, unsigned char *sigin, int siglen,
|
||||||
const char *file);
|
const char *sig_name, const char *md_name,
|
||||||
|
const char *file, BIO *bmd);
|
||||||
|
|
||||||
|
static void list_md_fn(const EVP_MD *m,
|
||||||
|
const char *from, const char *to, void *arg)
|
||||||
|
{
|
||||||
|
const char *mname;
|
||||||
|
/* Skip aliases */
|
||||||
|
if (!m)
|
||||||
|
return;
|
||||||
|
mname = OBJ_nid2ln(EVP_MD_type(m));
|
||||||
|
/* Skip shortnames */
|
||||||
|
if (strcmp(from, mname))
|
||||||
|
return;
|
||||||
|
/* Skip clones */
|
||||||
|
if (EVP_MD_flags(m) & EVP_MD_FLAG_PKEY_DIGEST)
|
||||||
|
return;
|
||||||
|
if (strchr(mname, ' '))
|
||||||
|
mname = EVP_MD_name(m);
|
||||||
|
BIO_printf(arg, "-%-14s to use the %s message digest algorithm\n",
|
||||||
|
mname, mname);
|
||||||
|
}
|
||||||
|
|
||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
ENGINE *e = NULL;
|
ENGINE *e = NULL;
|
||||||
unsigned char *buf=NULL;
|
unsigned char *buf = NULL;
|
||||||
int i,err=0;
|
int i, err = 1;
|
||||||
const EVP_MD *md=NULL,*m;
|
const EVP_MD *md = NULL, *m;
|
||||||
BIO *in=NULL,*inp;
|
BIO *in = NULL, *inp;
|
||||||
BIO *bmd=NULL;
|
BIO *bmd = NULL;
|
||||||
BIO *out = NULL;
|
BIO *out = NULL;
|
||||||
const char *name;
|
|
||||||
#define PROG_NAME_SIZE 39
|
#define PROG_NAME_SIZE 39
|
||||||
char pname[PROG_NAME_SIZE+1];
|
char pname[PROG_NAME_SIZE + 1];
|
||||||
int separator=0;
|
int separator = 0;
|
||||||
int debug=0;
|
int debug = 0;
|
||||||
int keyform=FORMAT_PEM;
|
int keyform = FORMAT_PEM;
|
||||||
const char *outfile = NULL, *keyfile = NULL;
|
const char *outfile = NULL, *keyfile = NULL;
|
||||||
const char *sigfile = NULL, *randfile = NULL;
|
const char *sigfile = NULL, *randfile = NULL;
|
||||||
int out_bin = -1, want_pub = 0, do_verify = 0;
|
int out_bin = -1, want_pub = 0, do_verify = 0;
|
||||||
EVP_PKEY *sigkey = NULL;
|
EVP_PKEY *sigkey = NULL;
|
||||||
unsigned char *sigbuf = NULL;
|
unsigned char *sigbuf = NULL;
|
||||||
int siglen = 0;
|
int siglen = 0;
|
||||||
char *engine=NULL;
|
char *passargin = NULL, *passin = NULL;
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
apps_startup();
|
char *engine = NULL;
|
||||||
|
|
||||||
if ((buf=(unsigned char *)OPENSSL_malloc(BUFSIZE)) == NULL)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"out of memory\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
if (bio_err == NULL)
|
|
||||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
|
||||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
|
||||||
|
|
||||||
if (!load_config(bio_err, NULL))
|
|
||||||
goto end;
|
|
||||||
|
|
||||||
/* first check the program name */
|
|
||||||
program_name(argv[0],pname,sizeof pname);
|
|
||||||
|
|
||||||
md=EVP_get_digestbyname(pname);
|
|
||||||
|
|
||||||
argc--;
|
|
||||||
argv++;
|
|
||||||
while (argc > 0)
|
|
||||||
{
|
|
||||||
if ((*argv)[0] != '-') break;
|
|
||||||
if (strcmp(*argv,"-c") == 0)
|
|
||||||
separator=1;
|
|
||||||
else if (strcmp(*argv,"-rand") == 0)
|
|
||||||
{
|
|
||||||
if (--argc < 1) break;
|
|
||||||
randfile=*(++argv);
|
|
||||||
}
|
|
||||||
else if (strcmp(*argv,"-out") == 0)
|
|
||||||
{
|
|
||||||
if (--argc < 1) break;
|
|
||||||
outfile=*(++argv);
|
|
||||||
}
|
|
||||||
else if (strcmp(*argv,"-sign") == 0)
|
|
||||||
{
|
|
||||||
if (--argc < 1) break;
|
|
||||||
keyfile=*(++argv);
|
|
||||||
}
|
|
||||||
else if (strcmp(*argv,"-verify") == 0)
|
|
||||||
{
|
|
||||||
if (--argc < 1) break;
|
|
||||||
keyfile=*(++argv);
|
|
||||||
want_pub = 1;
|
|
||||||
do_verify = 1;
|
|
||||||
}
|
|
||||||
else if (strcmp(*argv,"-prverify") == 0)
|
|
||||||
{
|
|
||||||
if (--argc < 1) break;
|
|
||||||
keyfile=*(++argv);
|
|
||||||
do_verify = 1;
|
|
||||||
}
|
|
||||||
else if (strcmp(*argv,"-signature") == 0)
|
|
||||||
{
|
|
||||||
if (--argc < 1) break;
|
|
||||||
sigfile=*(++argv);
|
|
||||||
}
|
|
||||||
else if (strcmp(*argv,"-keyform") == 0)
|
|
||||||
{
|
|
||||||
if (--argc < 1) break;
|
|
||||||
keyform=str2fmt(*(++argv));
|
|
||||||
}
|
|
||||||
else if (strcmp(*argv,"-engine") == 0)
|
|
||||||
{
|
|
||||||
if (--argc < 1) break;
|
|
||||||
engine= *(++argv);
|
|
||||||
}
|
|
||||||
else if (strcmp(*argv,"-hex") == 0)
|
|
||||||
out_bin = 0;
|
|
||||||
else if (strcmp(*argv,"-binary") == 0)
|
|
||||||
out_bin = 1;
|
|
||||||
else if (strcmp(*argv,"-d") == 0)
|
|
||||||
debug=1;
|
|
||||||
else if ((m=EVP_get_digestbyname(&((*argv)[1]))) != NULL)
|
|
||||||
md=m;
|
|
||||||
else
|
|
||||||
break;
|
|
||||||
argc--;
|
|
||||||
argv++;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (md == NULL)
|
|
||||||
md=EVP_md5();
|
|
||||||
|
|
||||||
if(do_verify && !sigfile) {
|
|
||||||
BIO_printf(bio_err, "No signature to verify: use the -signature option\n");
|
|
||||||
err = 1;
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
if ((argc > 0) && (argv[0][0] == '-')) /* bad option */
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"unknown option '%s'\n",*argv);
|
|
||||||
BIO_printf(bio_err,"options are\n");
|
|
||||||
BIO_printf(bio_err,"-c to output the digest with separating colons\n");
|
|
||||||
BIO_printf(bio_err,"-d to output debug info\n");
|
|
||||||
BIO_printf(bio_err,"-hex output as hex dump\n");
|
|
||||||
BIO_printf(bio_err,"-binary output in binary form\n");
|
|
||||||
BIO_printf(bio_err,"-sign file sign digest using private key in file\n");
|
|
||||||
BIO_printf(bio_err,"-verify file verify a signature using public key in file\n");
|
|
||||||
BIO_printf(bio_err,"-prverify file verify a signature using private key in file\n");
|
|
||||||
BIO_printf(bio_err,"-keyform arg key file format (PEM or ENGINE)\n");
|
|
||||||
BIO_printf(bio_err,"-signature file signature to verify\n");
|
|
||||||
BIO_printf(bio_err,"-binary output in binary form\n");
|
|
||||||
BIO_printf(bio_err,"-engine e use engine e, possibly a hardware device.\n");
|
|
||||||
|
|
||||||
BIO_printf(bio_err,"-%3s to use the %s message digest algorithm (default)\n",
|
|
||||||
LN_md5,LN_md5);
|
|
||||||
BIO_printf(bio_err,"-%3s to use the %s message digest algorithm\n",
|
|
||||||
LN_md4,LN_md4);
|
|
||||||
BIO_printf(bio_err,"-%3s to use the %s message digest algorithm\n",
|
|
||||||
LN_md2,LN_md2);
|
|
||||||
BIO_printf(bio_err,"-%3s to use the %s message digest algorithm\n",
|
|
||||||
LN_sha1,LN_sha1);
|
|
||||||
BIO_printf(bio_err,"-%3s to use the %s message digest algorithm\n",
|
|
||||||
LN_sha,LN_sha);
|
|
||||||
BIO_printf(bio_err,"-%3s to use the %s message digest algorithm\n",
|
|
||||||
LN_mdc2,LN_mdc2);
|
|
||||||
BIO_printf(bio_err,"-%3s to use the %s message digest algorithm\n",
|
|
||||||
LN_ripemd160,LN_ripemd160);
|
|
||||||
err=1;
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
e = setup_engine(bio_err, engine, 0);
|
|
||||||
|
|
||||||
in=BIO_new(BIO_s_file());
|
|
||||||
bmd=BIO_new(BIO_f_md());
|
|
||||||
if (debug)
|
|
||||||
{
|
|
||||||
BIO_set_callback(in,BIO_debug_callback);
|
|
||||||
/* needed for windows 3.1 */
|
|
||||||
BIO_set_callback_arg(in,bio_err);
|
|
||||||
}
|
|
||||||
|
|
||||||
if ((in == NULL) || (bmd == NULL))
|
|
||||||
{
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
if(out_bin == -1) {
|
|
||||||
if(keyfile) out_bin = 1;
|
|
||||||
else out_bin = 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
if(randfile)
|
|
||||||
app_RAND_load_file(randfile, bio_err, 0);
|
|
||||||
|
|
||||||
if(outfile) {
|
|
||||||
if(out_bin)
|
|
||||||
out = BIO_new_file(outfile, "wb");
|
|
||||||
else out = BIO_new_file(outfile, "w");
|
|
||||||
} else {
|
|
||||||
out = BIO_new_fp(stdout, BIO_NOCLOSE);
|
|
||||||
#ifdef OPENSSL_SYS_VMS
|
|
||||||
{
|
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
|
||||||
out = BIO_push(tmpbio, out);
|
|
||||||
}
|
|
||||||
#endif
|
#endif
|
||||||
}
|
char *hmac_key = NULL;
|
||||||
|
char *mac_name = NULL;
|
||||||
|
int non_fips_allow = 0;
|
||||||
|
STACK_OF(OPENSSL_STRING) *sigopts = NULL, *macopts = NULL;
|
||||||
|
|
||||||
if(!out) {
|
apps_startup();
|
||||||
BIO_printf(bio_err, "Error opening output file %s\n",
|
|
||||||
outfile ? outfile : "(stdout)");
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
if(keyfile)
|
if ((buf = (unsigned char *)OPENSSL_malloc(BUFSIZE)) == NULL) {
|
||||||
{
|
BIO_printf(bio_err, "out of memory\n");
|
||||||
if (want_pub)
|
goto end;
|
||||||
sigkey = load_pubkey(bio_err, keyfile, keyform, 0, NULL,
|
}
|
||||||
e, "key file");
|
if (bio_err == NULL)
|
||||||
else
|
if ((bio_err = BIO_new(BIO_s_file())) != NULL)
|
||||||
sigkey = load_key(bio_err, keyfile, keyform, 0, NULL,
|
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||||
e, "key file");
|
|
||||||
if (!sigkey)
|
|
||||||
{
|
|
||||||
/* load_[pub]key() has already printed an appropriate
|
|
||||||
message */
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if(sigfile && sigkey) {
|
if (!load_config(bio_err, NULL))
|
||||||
BIO *sigbio;
|
goto end;
|
||||||
sigbio = BIO_new_file(sigfile, "rb");
|
|
||||||
siglen = EVP_PKEY_size(sigkey);
|
|
||||||
sigbuf = OPENSSL_malloc(siglen);
|
|
||||||
if(!sigbio) {
|
|
||||||
BIO_printf(bio_err, "Error opening signature file %s\n",
|
|
||||||
sigfile);
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
siglen = BIO_read(sigbio, sigbuf, siglen);
|
|
||||||
BIO_free(sigbio);
|
|
||||||
if(siglen <= 0) {
|
|
||||||
BIO_printf(bio_err, "Error reading signature file %s\n",
|
|
||||||
sigfile);
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
|
/* first check the program name */
|
||||||
|
program_name(argv[0], pname, sizeof pname);
|
||||||
|
|
||||||
|
md = EVP_get_digestbyname(pname);
|
||||||
|
|
||||||
/* we use md as a filter, reading from 'in' */
|
argc--;
|
||||||
BIO_set_md(bmd,md);
|
argv++;
|
||||||
inp=BIO_push(bmd,in);
|
while (argc > 0) {
|
||||||
|
if ((*argv)[0] != '-')
|
||||||
|
break;
|
||||||
|
if (strcmp(*argv, "-c") == 0)
|
||||||
|
separator = 1;
|
||||||
|
else if (strcmp(*argv, "-r") == 0)
|
||||||
|
separator = 2;
|
||||||
|
else if (strcmp(*argv, "-rand") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
break;
|
||||||
|
randfile = *(++argv);
|
||||||
|
} else if (strcmp(*argv, "-out") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
break;
|
||||||
|
outfile = *(++argv);
|
||||||
|
} else if (strcmp(*argv, "-sign") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
break;
|
||||||
|
keyfile = *(++argv);
|
||||||
|
} else if (!strcmp(*argv, "-passin")) {
|
||||||
|
if (--argc < 1)
|
||||||
|
break;
|
||||||
|
passargin = *++argv;
|
||||||
|
} else if (strcmp(*argv, "-verify") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
break;
|
||||||
|
keyfile = *(++argv);
|
||||||
|
want_pub = 1;
|
||||||
|
do_verify = 1;
|
||||||
|
} else if (strcmp(*argv, "-prverify") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
break;
|
||||||
|
keyfile = *(++argv);
|
||||||
|
do_verify = 1;
|
||||||
|
} else if (strcmp(*argv, "-signature") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
break;
|
||||||
|
sigfile = *(++argv);
|
||||||
|
} else if (strcmp(*argv, "-keyform") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
break;
|
||||||
|
keyform = str2fmt(*(++argv));
|
||||||
|
}
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
else if (strcmp(*argv, "-engine") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
break;
|
||||||
|
engine = *(++argv);
|
||||||
|
e = setup_engine(bio_err, engine, 0);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
else if (strcmp(*argv, "-hex") == 0)
|
||||||
|
out_bin = 0;
|
||||||
|
else if (strcmp(*argv, "-binary") == 0)
|
||||||
|
out_bin = 1;
|
||||||
|
else if (strcmp(*argv, "-d") == 0)
|
||||||
|
debug = 1;
|
||||||
|
else if (!strcmp(*argv, "-fips-fingerprint"))
|
||||||
|
hmac_key = "etaonrishdlcupfm";
|
||||||
|
else if (strcmp(*argv, "-non-fips-allow") == 0)
|
||||||
|
non_fips_allow = 1;
|
||||||
|
else if (!strcmp(*argv, "-hmac")) {
|
||||||
|
if (--argc < 1)
|
||||||
|
break;
|
||||||
|
hmac_key = *++argv;
|
||||||
|
} else if (!strcmp(*argv, "-mac")) {
|
||||||
|
if (--argc < 1)
|
||||||
|
break;
|
||||||
|
mac_name = *++argv;
|
||||||
|
} else if (strcmp(*argv, "-sigopt") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
break;
|
||||||
|
if (!sigopts)
|
||||||
|
sigopts = sk_OPENSSL_STRING_new_null();
|
||||||
|
if (!sigopts || !sk_OPENSSL_STRING_push(sigopts, *(++argv)))
|
||||||
|
break;
|
||||||
|
} else if (strcmp(*argv, "-macopt") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
break;
|
||||||
|
if (!macopts)
|
||||||
|
macopts = sk_OPENSSL_STRING_new_null();
|
||||||
|
if (!macopts || !sk_OPENSSL_STRING_push(macopts, *(++argv)))
|
||||||
|
break;
|
||||||
|
} else if ((m = EVP_get_digestbyname(&((*argv)[1]))) != NULL)
|
||||||
|
md = m;
|
||||||
|
else
|
||||||
|
break;
|
||||||
|
argc--;
|
||||||
|
argv++;
|
||||||
|
}
|
||||||
|
|
||||||
if (argc == 0)
|
if (do_verify && !sigfile) {
|
||||||
{
|
BIO_printf(bio_err,
|
||||||
BIO_set_fp(in,stdin,BIO_NOCLOSE);
|
"No signature to verify: use the -signature option\n");
|
||||||
err=do_fp(out, buf,inp,separator, out_bin, sigkey, sigbuf,
|
goto end;
|
||||||
siglen,"","(stdin)");
|
}
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
name=OBJ_nid2sn(md->type);
|
|
||||||
for (i=0; i<argc; i++)
|
|
||||||
{
|
|
||||||
char *tmp,*tofree=NULL;
|
|
||||||
int r;
|
|
||||||
|
|
||||||
if (BIO_read_filename(in,argv[i]) <= 0)
|
if ((argc > 0) && (argv[0][0] == '-')) { /* bad option */
|
||||||
{
|
BIO_printf(bio_err, "unknown option '%s'\n", *argv);
|
||||||
perror(argv[i]);
|
BIO_printf(bio_err, "options are\n");
|
||||||
err++;
|
BIO_printf(bio_err,
|
||||||
continue;
|
"-c to output the digest with separating colons\n");
|
||||||
}
|
BIO_printf(bio_err,
|
||||||
if(!out_bin)
|
"-r to output the digest in coreutils format\n");
|
||||||
{
|
BIO_printf(bio_err, "-d to output debug info\n");
|
||||||
tmp=tofree=OPENSSL_malloc(strlen(name)+strlen(argv[i])+5);
|
BIO_printf(bio_err, "-hex output as hex dump\n");
|
||||||
sprintf(tmp,"%s(%s)= ",name,argv[i]);
|
BIO_printf(bio_err, "-binary output in binary form\n");
|
||||||
}
|
BIO_printf(bio_err, "-hmac arg set the HMAC key to arg\n");
|
||||||
else
|
BIO_printf(bio_err, "-non-fips-allow allow use of non FIPS digest\n");
|
||||||
tmp="";
|
BIO_printf(bio_err,
|
||||||
r=do_fp(out,buf,inp,separator,out_bin,sigkey,sigbuf,
|
"-sign file sign digest using private key in file\n");
|
||||||
siglen,tmp,argv[i]);
|
BIO_printf(bio_err,
|
||||||
if(r)
|
"-verify file verify a signature using public key in file\n");
|
||||||
err=r;
|
BIO_printf(bio_err,
|
||||||
if(tofree)
|
"-prverify file verify a signature using private key in file\n");
|
||||||
OPENSSL_free(tofree);
|
BIO_printf(bio_err,
|
||||||
(void)BIO_reset(bmd);
|
"-keyform arg key file format (PEM or ENGINE)\n");
|
||||||
}
|
BIO_printf(bio_err,
|
||||||
}
|
"-out filename output to filename rather than stdout\n");
|
||||||
end:
|
BIO_printf(bio_err, "-signature file signature to verify\n");
|
||||||
if (buf != NULL)
|
BIO_printf(bio_err, "-sigopt nm:v signature parameter\n");
|
||||||
{
|
BIO_printf(bio_err, "-hmac key create hashed MAC with key\n");
|
||||||
OPENSSL_cleanse(buf,BUFSIZE);
|
BIO_printf(bio_err,
|
||||||
OPENSSL_free(buf);
|
"-mac algorithm create MAC (not neccessarily HMAC)\n");
|
||||||
}
|
BIO_printf(bio_err,
|
||||||
if (in != NULL) BIO_free(in);
|
"-macopt nm:v MAC algorithm parameters or key\n");
|
||||||
BIO_free_all(out);
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
EVP_PKEY_free(sigkey);
|
BIO_printf(bio_err,
|
||||||
if(sigbuf) OPENSSL_free(sigbuf);
|
"-engine e use engine e, possibly a hardware device.\n");
|
||||||
if (bmd != NULL) BIO_free(bmd);
|
#endif
|
||||||
apps_shutdown();
|
|
||||||
OPENSSL_EXIT(err);
|
EVP_MD_do_all_sorted(list_md_fn, bio_err);
|
||||||
}
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
in = BIO_new(BIO_s_file());
|
||||||
|
bmd = BIO_new(BIO_f_md());
|
||||||
|
if ((in == NULL) || (bmd == NULL)) {
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (debug) {
|
||||||
|
BIO_set_callback(in, BIO_debug_callback);
|
||||||
|
/* needed for windows 3.1 */
|
||||||
|
BIO_set_callback_arg(in, (char *)bio_err);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!app_passwd(bio_err, passargin, NULL, &passin, NULL)) {
|
||||||
|
BIO_printf(bio_err, "Error getting password\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (out_bin == -1) {
|
||||||
|
if (keyfile)
|
||||||
|
out_bin = 1;
|
||||||
|
else
|
||||||
|
out_bin = 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (randfile)
|
||||||
|
app_RAND_load_file(randfile, bio_err, 0);
|
||||||
|
|
||||||
|
if (outfile) {
|
||||||
|
if (out_bin)
|
||||||
|
out = BIO_new_file(outfile, "wb");
|
||||||
|
else
|
||||||
|
out = BIO_new_file(outfile, "w");
|
||||||
|
} else {
|
||||||
|
out = BIO_new_fp(stdout, BIO_NOCLOSE);
|
||||||
|
#ifdef OPENSSL_SYS_VMS
|
||||||
|
{
|
||||||
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
|
out = BIO_push(tmpbio, out);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!out) {
|
||||||
|
BIO_printf(bio_err, "Error opening output file %s\n",
|
||||||
|
outfile ? outfile : "(stdout)");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
if ((! !mac_name + ! !keyfile + ! !hmac_key) > 1) {
|
||||||
|
BIO_printf(bio_err, "MAC and Signing key cannot both be specified\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (keyfile) {
|
||||||
|
if (want_pub)
|
||||||
|
sigkey = load_pubkey(bio_err, keyfile, keyform, 0, NULL,
|
||||||
|
e, "key file");
|
||||||
|
else
|
||||||
|
sigkey = load_key(bio_err, keyfile, keyform, 0, passin,
|
||||||
|
e, "key file");
|
||||||
|
if (!sigkey) {
|
||||||
|
/*
|
||||||
|
* load_[pub]key() has already printed an appropriate message
|
||||||
|
*/
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (mac_name) {
|
||||||
|
EVP_PKEY_CTX *mac_ctx = NULL;
|
||||||
|
int r = 0;
|
||||||
|
if (!init_gen_str(bio_err, &mac_ctx, mac_name, e, 0))
|
||||||
|
goto mac_end;
|
||||||
|
if (macopts) {
|
||||||
|
char *macopt;
|
||||||
|
for (i = 0; i < sk_OPENSSL_STRING_num(macopts); i++) {
|
||||||
|
macopt = sk_OPENSSL_STRING_value(macopts, i);
|
||||||
|
if (pkey_ctrl_string(mac_ctx, macopt) <= 0) {
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"MAC parameter error \"%s\"\n", macopt);
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto mac_end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (EVP_PKEY_keygen(mac_ctx, &sigkey) <= 0) {
|
||||||
|
BIO_puts(bio_err, "Error generating key\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto mac_end;
|
||||||
|
}
|
||||||
|
r = 1;
|
||||||
|
mac_end:
|
||||||
|
if (mac_ctx)
|
||||||
|
EVP_PKEY_CTX_free(mac_ctx);
|
||||||
|
if (r == 0)
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (non_fips_allow) {
|
||||||
|
EVP_MD_CTX *md_ctx;
|
||||||
|
BIO_get_md_ctx(bmd, &md_ctx);
|
||||||
|
EVP_MD_CTX_set_flags(md_ctx, EVP_MD_CTX_FLAG_NON_FIPS_ALLOW);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (hmac_key) {
|
||||||
|
sigkey = EVP_PKEY_new_mac_key(EVP_PKEY_HMAC, e,
|
||||||
|
(unsigned char *)hmac_key, -1);
|
||||||
|
if (!sigkey)
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (sigkey) {
|
||||||
|
EVP_MD_CTX *mctx = NULL;
|
||||||
|
EVP_PKEY_CTX *pctx = NULL;
|
||||||
|
int r;
|
||||||
|
if (!BIO_get_md_ctx(bmd, &mctx)) {
|
||||||
|
BIO_printf(bio_err, "Error getting context\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
if (do_verify)
|
||||||
|
r = EVP_DigestVerifyInit(mctx, &pctx, md, NULL, sigkey);
|
||||||
|
else
|
||||||
|
r = EVP_DigestSignInit(mctx, &pctx, md, NULL, sigkey);
|
||||||
|
if (!r) {
|
||||||
|
BIO_printf(bio_err, "Error setting context\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
if (sigopts) {
|
||||||
|
char *sigopt;
|
||||||
|
for (i = 0; i < sk_OPENSSL_STRING_num(sigopts); i++) {
|
||||||
|
sigopt = sk_OPENSSL_STRING_value(sigopts, i);
|
||||||
|
if (pkey_ctrl_string(pctx, sigopt) <= 0) {
|
||||||
|
BIO_printf(bio_err, "parameter error \"%s\"\n", sigopt);
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
/* we use md as a filter, reading from 'in' */
|
||||||
|
else {
|
||||||
|
if (md == NULL)
|
||||||
|
md = EVP_md5();
|
||||||
|
if (!BIO_set_md(bmd, md)) {
|
||||||
|
BIO_printf(bio_err, "Error setting digest %s\n", pname);
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (sigfile && sigkey) {
|
||||||
|
BIO *sigbio;
|
||||||
|
sigbio = BIO_new_file(sigfile, "rb");
|
||||||
|
siglen = EVP_PKEY_size(sigkey);
|
||||||
|
sigbuf = OPENSSL_malloc(siglen);
|
||||||
|
if (!sigbio) {
|
||||||
|
BIO_printf(bio_err, "Error opening signature file %s\n", sigfile);
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
if (!sigbuf) {
|
||||||
|
BIO_printf(bio_err, "Out of memory\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
siglen = BIO_read(sigbio, sigbuf, siglen);
|
||||||
|
BIO_free(sigbio);
|
||||||
|
if (siglen <= 0) {
|
||||||
|
BIO_printf(bio_err, "Error reading signature file %s\n", sigfile);
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
inp = BIO_push(bmd, in);
|
||||||
|
|
||||||
|
if (md == NULL) {
|
||||||
|
EVP_MD_CTX *tctx;
|
||||||
|
BIO_get_md_ctx(bmd, &tctx);
|
||||||
|
md = EVP_MD_CTX_md(tctx);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (argc == 0) {
|
||||||
|
BIO_set_fp(in, stdin, BIO_NOCLOSE);
|
||||||
|
err = do_fp(out, buf, inp, separator, out_bin, sigkey, sigbuf,
|
||||||
|
siglen, NULL, NULL, "stdin", bmd);
|
||||||
|
} else {
|
||||||
|
const char *md_name = NULL, *sig_name = NULL;
|
||||||
|
if (!out_bin) {
|
||||||
|
if (sigkey) {
|
||||||
|
const EVP_PKEY_ASN1_METHOD *ameth;
|
||||||
|
ameth = EVP_PKEY_get0_asn1(sigkey);
|
||||||
|
if (ameth)
|
||||||
|
EVP_PKEY_asn1_get0_info(NULL, NULL,
|
||||||
|
NULL, NULL, &sig_name, ameth);
|
||||||
|
}
|
||||||
|
md_name = EVP_MD_name(md);
|
||||||
|
}
|
||||||
|
err = 0;
|
||||||
|
for (i = 0; i < argc; i++) {
|
||||||
|
int r;
|
||||||
|
if (BIO_read_filename(in, argv[i]) <= 0) {
|
||||||
|
perror(argv[i]);
|
||||||
|
err++;
|
||||||
|
continue;
|
||||||
|
} else
|
||||||
|
r = do_fp(out, buf, inp, separator, out_bin, sigkey, sigbuf,
|
||||||
|
siglen, sig_name, md_name, argv[i], bmd);
|
||||||
|
if (r)
|
||||||
|
err = r;
|
||||||
|
(void)BIO_reset(bmd);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
end:
|
||||||
|
if (buf != NULL) {
|
||||||
|
OPENSSL_cleanse(buf, BUFSIZE);
|
||||||
|
OPENSSL_free(buf);
|
||||||
|
}
|
||||||
|
if (in != NULL)
|
||||||
|
BIO_free(in);
|
||||||
|
if (passin)
|
||||||
|
OPENSSL_free(passin);
|
||||||
|
BIO_free_all(out);
|
||||||
|
EVP_PKEY_free(sigkey);
|
||||||
|
if (sigopts)
|
||||||
|
sk_OPENSSL_STRING_free(sigopts);
|
||||||
|
if (macopts)
|
||||||
|
sk_OPENSSL_STRING_free(macopts);
|
||||||
|
if (sigbuf)
|
||||||
|
OPENSSL_free(sigbuf);
|
||||||
|
if (bmd != NULL)
|
||||||
|
BIO_free(bmd);
|
||||||
|
apps_shutdown();
|
||||||
|
OPENSSL_EXIT(err);
|
||||||
|
}
|
||||||
|
|
||||||
int do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
|
int do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
|
||||||
EVP_PKEY *key, unsigned char *sigin, int siglen, const char *title,
|
EVP_PKEY *key, unsigned char *sigin, int siglen,
|
||||||
const char *file)
|
const char *sig_name, const char *md_name,
|
||||||
{
|
const char *file, BIO *bmd)
|
||||||
int len;
|
{
|
||||||
int i;
|
size_t len;
|
||||||
|
int i;
|
||||||
|
|
||||||
for (;;)
|
for (;;) {
|
||||||
{
|
i = BIO_read(bp, (char *)buf, BUFSIZE);
|
||||||
i=BIO_read(bp,(char *)buf,BUFSIZE);
|
if (i < 0) {
|
||||||
if(i < 0)
|
BIO_printf(bio_err, "Read Error in %s\n", file);
|
||||||
{
|
ERR_print_errors(bio_err);
|
||||||
BIO_printf(bio_err, "Read Error in %s\n",file);
|
return 1;
|
||||||
ERR_print_errors(bio_err);
|
}
|
||||||
return 1;
|
if (i == 0)
|
||||||
}
|
break;
|
||||||
if (i == 0) break;
|
}
|
||||||
}
|
if (sigin) {
|
||||||
if(sigin)
|
EVP_MD_CTX *ctx;
|
||||||
{
|
BIO_get_md_ctx(bp, &ctx);
|
||||||
EVP_MD_CTX *ctx;
|
i = EVP_DigestVerifyFinal(ctx, sigin, (unsigned int)siglen);
|
||||||
BIO_get_md_ctx(bp, &ctx);
|
if (i > 0)
|
||||||
i = EVP_VerifyFinal(ctx, sigin, (unsigned int)siglen, key);
|
BIO_printf(out, "Verified OK\n");
|
||||||
if(i > 0)
|
else if (i == 0) {
|
||||||
BIO_printf(out, "Verified OK\n");
|
BIO_printf(out, "Verification Failure\n");
|
||||||
else if(i == 0)
|
return 1;
|
||||||
{
|
} else {
|
||||||
BIO_printf(out, "Verification Failure\n");
|
BIO_printf(bio_err, "Error Verifying Data\n");
|
||||||
return 1;
|
ERR_print_errors(bio_err);
|
||||||
}
|
return 1;
|
||||||
else
|
}
|
||||||
{
|
return 0;
|
||||||
BIO_printf(bio_err, "Error Verifying Data\n");
|
}
|
||||||
ERR_print_errors(bio_err);
|
if (key) {
|
||||||
return 1;
|
EVP_MD_CTX *ctx;
|
||||||
}
|
BIO_get_md_ctx(bp, &ctx);
|
||||||
return 0;
|
len = BUFSIZE;
|
||||||
}
|
if (!EVP_DigestSignFinal(ctx, buf, &len)) {
|
||||||
if(key)
|
BIO_printf(bio_err, "Error Signing Data\n");
|
||||||
{
|
ERR_print_errors(bio_err);
|
||||||
EVP_MD_CTX *ctx;
|
return 1;
|
||||||
BIO_get_md_ctx(bp, &ctx);
|
}
|
||||||
if(!EVP_SignFinal(ctx, buf, (unsigned int *)&len, key))
|
} else {
|
||||||
{
|
len = BIO_gets(bp, (char *)buf, BUFSIZE);
|
||||||
BIO_printf(bio_err, "Error Signing Data\n");
|
if ((int)len < 0) {
|
||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
else
|
|
||||||
len=BIO_gets(bp,(char *)buf,BUFSIZE);
|
|
||||||
|
|
||||||
if(binout) BIO_write(out, buf, len);
|
|
||||||
else
|
|
||||||
{
|
|
||||||
BIO_write(out,title,strlen(title));
|
|
||||||
for (i=0; i<len; i++)
|
|
||||||
{
|
|
||||||
if (sep && (i != 0))
|
|
||||||
BIO_printf(out, ":");
|
|
||||||
BIO_printf(out, "%02x",buf[i]);
|
|
||||||
}
|
|
||||||
BIO_printf(out, "\n");
|
|
||||||
}
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
if (binout)
|
||||||
|
BIO_write(out, buf, len);
|
||||||
|
else if (sep == 2) {
|
||||||
|
for (i = 0; i < (int)len; i++)
|
||||||
|
BIO_printf(out, "%02x", buf[i]);
|
||||||
|
BIO_printf(out, " *%s\n", file);
|
||||||
|
} else {
|
||||||
|
if (sig_name)
|
||||||
|
BIO_printf(out, "%s-%s(%s)= ", sig_name, md_name, file);
|
||||||
|
else if (md_name)
|
||||||
|
BIO_printf(out, "%s(%s)= ", md_name, file);
|
||||||
|
else
|
||||||
|
BIO_printf(out, "(%s)= ", file);
|
||||||
|
for (i = 0; i < (int)len; i++) {
|
||||||
|
if (sep && (i != 0))
|
||||||
|
BIO_printf(out, ":");
|
||||||
|
BIO_printf(out, "%02x", buf[i]);
|
||||||
|
}
|
||||||
|
BIO_printf(out, "\n");
|
||||||
|
}
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|||||||
511
apps/dh.c
511
apps/dh.c
@@ -57,27 +57,29 @@
|
|||||||
* [including the GNU Public Licence.]
|
* [including the GNU Public Licence.]
|
||||||
*/
|
*/
|
||||||
|
|
||||||
|
#include <openssl/opensslconf.h> /* for OPENSSL_NO_DH */
|
||||||
#ifndef OPENSSL_NO_DH
|
#ifndef OPENSSL_NO_DH
|
||||||
#include <stdio.h>
|
# include <stdio.h>
|
||||||
#include <stdlib.h>
|
# include <stdlib.h>
|
||||||
#include <time.h>
|
# include <time.h>
|
||||||
#include <string.h>
|
# include <string.h>
|
||||||
#include "apps.h"
|
# include "apps.h"
|
||||||
#include <openssl/bio.h>
|
# include <openssl/bio.h>
|
||||||
#include <openssl/err.h>
|
# include <openssl/err.h>
|
||||||
#include <openssl/bn.h>
|
# include <openssl/bn.h>
|
||||||
#include <openssl/dh.h>
|
# include <openssl/dh.h>
|
||||||
#include <openssl/x509.h>
|
# include <openssl/x509.h>
|
||||||
#include <openssl/pem.h>
|
# include <openssl/pem.h>
|
||||||
|
|
||||||
#undef PROG
|
# undef PROG
|
||||||
#define PROG dh_main
|
# define PROG dh_main
|
||||||
|
|
||||||
/* -inform arg - input format - default PEM (DER or PEM)
|
/*-
|
||||||
|
* -inform arg - input format - default PEM (DER or PEM)
|
||||||
* -outform arg - output format - default PEM
|
* -outform arg - output format - default PEM
|
||||||
* -in arg - input file - default stdin
|
* -in arg - input file - default stdin
|
||||||
* -out arg - output file - default stdout
|
* -out arg - output file - default stdout
|
||||||
* -check - check the parameters are ok
|
* -check - check the parameters are ok
|
||||||
* -noout
|
* -noout
|
||||||
* -text
|
* -text
|
||||||
* -C
|
* -C
|
||||||
@@ -86,253 +88,250 @@
|
|||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
ENGINE *e = NULL;
|
DH *dh = NULL;
|
||||||
DH *dh=NULL;
|
int i, badops = 0, text = 0;
|
||||||
int i,badops=0,text=0;
|
BIO *in = NULL, *out = NULL;
|
||||||
BIO *in=NULL,*out=NULL;
|
int informat, outformat, check = 0, noout = 0, C = 0, ret = 1;
|
||||||
int informat,outformat,check=0,noout=0,C=0,ret=1;
|
char *infile, *outfile, *prog;
|
||||||
char *infile,*outfile,*prog,*engine;
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
|
char *engine;
|
||||||
|
# endif
|
||||||
|
|
||||||
apps_startup();
|
apps_startup();
|
||||||
|
|
||||||
if (bio_err == NULL)
|
if (bio_err == NULL)
|
||||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
if ((bio_err = BIO_new(BIO_s_file())) != NULL)
|
||||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||||
|
|
||||||
if (!load_config(bio_err, NULL))
|
if (!load_config(bio_err, NULL))
|
||||||
goto end;
|
goto end;
|
||||||
|
|
||||||
engine=NULL;
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
infile=NULL;
|
engine = NULL;
|
||||||
outfile=NULL;
|
# endif
|
||||||
informat=FORMAT_PEM;
|
infile = NULL;
|
||||||
outformat=FORMAT_PEM;
|
outfile = NULL;
|
||||||
|
informat = FORMAT_PEM;
|
||||||
|
outformat = FORMAT_PEM;
|
||||||
|
|
||||||
prog=argv[0];
|
prog = argv[0];
|
||||||
argc--;
|
argc--;
|
||||||
argv++;
|
argv++;
|
||||||
while (argc >= 1)
|
while (argc >= 1) {
|
||||||
{
|
if (strcmp(*argv, "-inform") == 0) {
|
||||||
if (strcmp(*argv,"-inform") == 0)
|
if (--argc < 1)
|
||||||
{
|
goto bad;
|
||||||
if (--argc < 1) goto bad;
|
informat = str2fmt(*(++argv));
|
||||||
informat=str2fmt(*(++argv));
|
} else if (strcmp(*argv, "-outform") == 0) {
|
||||||
}
|
if (--argc < 1)
|
||||||
else if (strcmp(*argv,"-outform") == 0)
|
goto bad;
|
||||||
{
|
outformat = str2fmt(*(++argv));
|
||||||
if (--argc < 1) goto bad;
|
} else if (strcmp(*argv, "-in") == 0) {
|
||||||
outformat=str2fmt(*(++argv));
|
if (--argc < 1)
|
||||||
}
|
goto bad;
|
||||||
else if (strcmp(*argv,"-in") == 0)
|
infile = *(++argv);
|
||||||
{
|
} else if (strcmp(*argv, "-out") == 0) {
|
||||||
if (--argc < 1) goto bad;
|
if (--argc < 1)
|
||||||
infile= *(++argv);
|
goto bad;
|
||||||
}
|
outfile = *(++argv);
|
||||||
else if (strcmp(*argv,"-out") == 0)
|
}
|
||||||
{
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
if (--argc < 1) goto bad;
|
else if (strcmp(*argv, "-engine") == 0) {
|
||||||
outfile= *(++argv);
|
if (--argc < 1)
|
||||||
}
|
goto bad;
|
||||||
else if (strcmp(*argv,"-engine") == 0)
|
engine = *(++argv);
|
||||||
{
|
}
|
||||||
if (--argc < 1) goto bad;
|
# endif
|
||||||
engine= *(++argv);
|
else if (strcmp(*argv, "-check") == 0)
|
||||||
}
|
check = 1;
|
||||||
else if (strcmp(*argv,"-check") == 0)
|
else if (strcmp(*argv, "-text") == 0)
|
||||||
check=1;
|
text = 1;
|
||||||
else if (strcmp(*argv,"-text") == 0)
|
else if (strcmp(*argv, "-C") == 0)
|
||||||
text=1;
|
C = 1;
|
||||||
else if (strcmp(*argv,"-C") == 0)
|
else if (strcmp(*argv, "-noout") == 0)
|
||||||
C=1;
|
noout = 1;
|
||||||
else if (strcmp(*argv,"-noout") == 0)
|
else {
|
||||||
noout=1;
|
BIO_printf(bio_err, "unknown option %s\n", *argv);
|
||||||
else
|
badops = 1;
|
||||||
{
|
break;
|
||||||
BIO_printf(bio_err,"unknown option %s\n",*argv);
|
}
|
||||||
badops=1;
|
argc--;
|
||||||
break;
|
argv++;
|
||||||
}
|
}
|
||||||
argc--;
|
|
||||||
argv++;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (badops)
|
if (badops) {
|
||||||
{
|
bad:
|
||||||
bad:
|
BIO_printf(bio_err, "%s [options] <infile >outfile\n", prog);
|
||||||
BIO_printf(bio_err,"%s [options] <infile >outfile\n",prog);
|
BIO_printf(bio_err, "where options are\n");
|
||||||
BIO_printf(bio_err,"where options are\n");
|
BIO_printf(bio_err, " -inform arg input format - one of DER PEM\n");
|
||||||
BIO_printf(bio_err," -inform arg input format - one of DER PEM\n");
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err," -outform arg output format - one of DER PEM\n");
|
" -outform arg output format - one of DER PEM\n");
|
||||||
BIO_printf(bio_err," -in arg input file\n");
|
BIO_printf(bio_err, " -in arg input file\n");
|
||||||
BIO_printf(bio_err," -out arg output file\n");
|
BIO_printf(bio_err, " -out arg output file\n");
|
||||||
BIO_printf(bio_err," -check check the DH parameters\n");
|
BIO_printf(bio_err, " -check check the DH parameters\n");
|
||||||
BIO_printf(bio_err," -text print a text form of the DH parameters\n");
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err," -C Output C code\n");
|
" -text print a text form of the DH parameters\n");
|
||||||
BIO_printf(bio_err," -noout no output\n");
|
BIO_printf(bio_err, " -C Output C code\n");
|
||||||
BIO_printf(bio_err," -engine e use engine e, possibly a hardware device.\n");
|
BIO_printf(bio_err, " -noout no output\n");
|
||||||
goto end;
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
}
|
BIO_printf(bio_err,
|
||||||
|
" -engine e use engine e, possibly a hardware device.\n");
|
||||||
|
# endif
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
ERR_load_crypto_strings();
|
ERR_load_crypto_strings();
|
||||||
|
|
||||||
e = setup_engine(bio_err, engine, 0);
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
|
setup_engine(bio_err, engine, 0);
|
||||||
|
# endif
|
||||||
|
|
||||||
in=BIO_new(BIO_s_file());
|
in = BIO_new(BIO_s_file());
|
||||||
out=BIO_new(BIO_s_file());
|
out = BIO_new(BIO_s_file());
|
||||||
if ((in == NULL) || (out == NULL))
|
if ((in == NULL) || (out == NULL)) {
|
||||||
{
|
ERR_print_errors(bio_err);
|
||||||
ERR_print_errors(bio_err);
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
|
||||||
|
if (infile == NULL)
|
||||||
|
BIO_set_fp(in, stdin, BIO_NOCLOSE);
|
||||||
|
else {
|
||||||
|
if (BIO_read_filename(in, infile) <= 0) {
|
||||||
|
perror(infile);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (outfile == NULL) {
|
||||||
|
BIO_set_fp(out, stdout, BIO_NOCLOSE);
|
||||||
|
# ifdef OPENSSL_SYS_VMS
|
||||||
|
{
|
||||||
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
|
out = BIO_push(tmpbio, out);
|
||||||
|
}
|
||||||
|
# endif
|
||||||
|
} else {
|
||||||
|
if (BIO_write_filename(out, outfile) <= 0) {
|
||||||
|
perror(outfile);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (informat == FORMAT_ASN1)
|
||||||
|
dh = d2i_DHparams_bio(in, NULL);
|
||||||
|
else if (informat == FORMAT_PEM)
|
||||||
|
dh = PEM_read_bio_DHparams(in, NULL, NULL, NULL);
|
||||||
|
else {
|
||||||
|
BIO_printf(bio_err, "bad input format specified\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
if (dh == NULL) {
|
||||||
|
BIO_printf(bio_err, "unable to load DH parameters\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (text) {
|
||||||
|
DHparams_print(out, dh);
|
||||||
|
# ifdef undef
|
||||||
|
printf("p=");
|
||||||
|
BN_print(stdout, dh->p);
|
||||||
|
printf("\ng=");
|
||||||
|
BN_print(stdout, dh->g);
|
||||||
|
printf("\n");
|
||||||
|
if (dh->length != 0)
|
||||||
|
printf("recommended private length=%ld\n", dh->length);
|
||||||
|
# endif
|
||||||
|
}
|
||||||
|
|
||||||
|
if (check) {
|
||||||
|
if (!DH_check(dh, &i)) {
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
if (i & DH_CHECK_P_NOT_PRIME)
|
||||||
|
printf("p value is not prime\n");
|
||||||
|
if (i & DH_CHECK_P_NOT_SAFE_PRIME)
|
||||||
|
printf("p value is not a safe prime\n");
|
||||||
|
if (i & DH_UNABLE_TO_CHECK_GENERATOR)
|
||||||
|
printf("unable to check the generator value\n");
|
||||||
|
if (i & DH_NOT_SUITABLE_GENERATOR)
|
||||||
|
printf("the g value is not a generator\n");
|
||||||
|
if (i == 0)
|
||||||
|
printf("DH parameters appear to be ok.\n");
|
||||||
|
}
|
||||||
|
if (C) {
|
||||||
|
unsigned char *data;
|
||||||
|
int len, l, bits;
|
||||||
|
|
||||||
|
len = BN_num_bytes(dh->p);
|
||||||
|
bits = BN_num_bits(dh->p);
|
||||||
|
data = (unsigned char *)OPENSSL_malloc(len);
|
||||||
|
if (data == NULL) {
|
||||||
|
perror("OPENSSL_malloc");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
l = BN_bn2bin(dh->p, data);
|
||||||
|
printf("static unsigned char dh%d_p[]={", bits);
|
||||||
|
for (i = 0; i < l; i++) {
|
||||||
|
if ((i % 12) == 0)
|
||||||
|
printf("\n\t");
|
||||||
|
printf("0x%02X,", data[i]);
|
||||||
|
}
|
||||||
|
printf("\n\t};\n");
|
||||||
|
|
||||||
|
l = BN_bn2bin(dh->g, data);
|
||||||
|
printf("static unsigned char dh%d_g[]={", bits);
|
||||||
|
for (i = 0; i < l; i++) {
|
||||||
|
if ((i % 12) == 0)
|
||||||
|
printf("\n\t");
|
||||||
|
printf("0x%02X,", data[i]);
|
||||||
|
}
|
||||||
|
printf("\n\t};\n\n");
|
||||||
|
|
||||||
|
printf("DH *get_dh%d()\n\t{\n", bits);
|
||||||
|
printf("\tDH *dh;\n\n");
|
||||||
|
printf("\tif ((dh=DH_new()) == NULL) return(NULL);\n");
|
||||||
|
printf("\tdh->p=BN_bin2bn(dh%d_p,sizeof(dh%d_p),NULL);\n",
|
||||||
|
bits, bits);
|
||||||
|
printf("\tdh->g=BN_bin2bn(dh%d_g,sizeof(dh%d_g),NULL);\n",
|
||||||
|
bits, bits);
|
||||||
|
printf("\tif ((dh->p == NULL) || (dh->g == NULL))\n");
|
||||||
|
printf("\t\treturn(NULL);\n");
|
||||||
|
printf("\treturn(dh);\n\t}\n");
|
||||||
|
OPENSSL_free(data);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!noout) {
|
||||||
|
if (outformat == FORMAT_ASN1)
|
||||||
|
i = i2d_DHparams_bio(out, dh);
|
||||||
|
else if (outformat == FORMAT_PEM)
|
||||||
|
i = PEM_write_bio_DHparams(out, dh);
|
||||||
|
else {
|
||||||
|
BIO_printf(bio_err, "bad output format specified for outfile\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
if (!i) {
|
||||||
|
BIO_printf(bio_err, "unable to write DH parameters\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
ret = 0;
|
||||||
|
end:
|
||||||
|
if (in != NULL)
|
||||||
|
BIO_free(in);
|
||||||
|
if (out != NULL)
|
||||||
|
BIO_free_all(out);
|
||||||
|
if (dh != NULL)
|
||||||
|
DH_free(dh);
|
||||||
|
apps_shutdown();
|
||||||
|
OPENSSL_EXIT(ret);
|
||||||
|
}
|
||||||
|
#else /* !OPENSSL_NO_DH */
|
||||||
|
|
||||||
|
# if PEDANTIC
|
||||||
|
static void *dummy = &dummy;
|
||||||
|
# endif
|
||||||
|
|
||||||
if (infile == NULL)
|
|
||||||
BIO_set_fp(in,stdin,BIO_NOCLOSE);
|
|
||||||
else
|
|
||||||
{
|
|
||||||
if (BIO_read_filename(in,infile) <= 0)
|
|
||||||
{
|
|
||||||
perror(infile);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if (outfile == NULL)
|
|
||||||
{
|
|
||||||
BIO_set_fp(out,stdout,BIO_NOCLOSE);
|
|
||||||
#ifdef OPENSSL_SYS_VMS
|
|
||||||
{
|
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
|
||||||
out = BIO_push(tmpbio, out);
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
if (BIO_write_filename(out,outfile) <= 0)
|
|
||||||
{
|
|
||||||
perror(outfile);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (informat == FORMAT_ASN1)
|
|
||||||
dh=d2i_DHparams_bio(in,NULL);
|
|
||||||
else if (informat == FORMAT_PEM)
|
|
||||||
dh=PEM_read_bio_DHparams(in,NULL,NULL,NULL);
|
|
||||||
else
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"bad input format specified\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
if (dh == NULL)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"unable to load DH parameters\n");
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
if (text)
|
|
||||||
{
|
|
||||||
DHparams_print(out,dh);
|
|
||||||
#ifdef undef
|
|
||||||
printf("p=");
|
|
||||||
BN_print(stdout,dh->p);
|
|
||||||
printf("\ng=");
|
|
||||||
BN_print(stdout,dh->g);
|
|
||||||
printf("\n");
|
|
||||||
if (dh->length != 0)
|
|
||||||
printf("recommended private length=%ld\n",dh->length);
|
|
||||||
#endif
|
|
||||||
}
|
|
||||||
|
|
||||||
if (check)
|
|
||||||
{
|
|
||||||
if (!DH_check(dh,&i))
|
|
||||||
{
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
if (i & DH_CHECK_P_NOT_PRIME)
|
|
||||||
printf("p value is not prime\n");
|
|
||||||
if (i & DH_CHECK_P_NOT_SAFE_PRIME)
|
|
||||||
printf("p value is not a safe prime\n");
|
|
||||||
if (i & DH_UNABLE_TO_CHECK_GENERATOR)
|
|
||||||
printf("unable to check the generator value\n");
|
|
||||||
if (i & DH_NOT_SUITABLE_GENERATOR)
|
|
||||||
printf("the g value is not a generator\n");
|
|
||||||
if (i == 0)
|
|
||||||
printf("DH parameters appear to be ok.\n");
|
|
||||||
}
|
|
||||||
if (C)
|
|
||||||
{
|
|
||||||
unsigned char *data;
|
|
||||||
int len,l,bits;
|
|
||||||
|
|
||||||
len=BN_num_bytes(dh->p);
|
|
||||||
bits=BN_num_bits(dh->p);
|
|
||||||
data=(unsigned char *)OPENSSL_malloc(len);
|
|
||||||
if (data == NULL)
|
|
||||||
{
|
|
||||||
perror("OPENSSL_malloc");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
l=BN_bn2bin(dh->p,data);
|
|
||||||
printf("static unsigned char dh%d_p[]={",bits);
|
|
||||||
for (i=0; i<l; i++)
|
|
||||||
{
|
|
||||||
if ((i%12) == 0) printf("\n\t");
|
|
||||||
printf("0x%02X,",data[i]);
|
|
||||||
}
|
|
||||||
printf("\n\t};\n");
|
|
||||||
|
|
||||||
l=BN_bn2bin(dh->g,data);
|
|
||||||
printf("static unsigned char dh%d_g[]={",bits);
|
|
||||||
for (i=0; i<l; i++)
|
|
||||||
{
|
|
||||||
if ((i%12) == 0) printf("\n\t");
|
|
||||||
printf("0x%02X,",data[i]);
|
|
||||||
}
|
|
||||||
printf("\n\t};\n\n");
|
|
||||||
|
|
||||||
printf("DH *get_dh%d()\n\t{\n",bits);
|
|
||||||
printf("\tDH *dh;\n\n");
|
|
||||||
printf("\tif ((dh=DH_new()) == NULL) return(NULL);\n");
|
|
||||||
printf("\tdh->p=BN_bin2bn(dh%d_p,sizeof(dh%d_p),NULL);\n",
|
|
||||||
bits,bits);
|
|
||||||
printf("\tdh->g=BN_bin2bn(dh%d_g,sizeof(dh%d_g),NULL);\n",
|
|
||||||
bits,bits);
|
|
||||||
printf("\tif ((dh->p == NULL) || (dh->g == NULL))\n");
|
|
||||||
printf("\t\treturn(NULL);\n");
|
|
||||||
printf("\treturn(dh);\n\t}\n");
|
|
||||||
OPENSSL_free(data);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
if (!noout)
|
|
||||||
{
|
|
||||||
if (outformat == FORMAT_ASN1)
|
|
||||||
i=i2d_DHparams_bio(out,dh);
|
|
||||||
else if (outformat == FORMAT_PEM)
|
|
||||||
i=PEM_write_bio_DHparams(out,dh);
|
|
||||||
else {
|
|
||||||
BIO_printf(bio_err,"bad output format specified for outfile\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
if (!i)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"unable to write DH parameters\n");
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
ret=0;
|
|
||||||
end:
|
|
||||||
if (in != NULL) BIO_free(in);
|
|
||||||
if (out != NULL) BIO_free_all(out);
|
|
||||||
if (dh != NULL) DH_free(dh);
|
|
||||||
apps_shutdown();
|
|
||||||
OPENSSL_EXIT(ret);
|
|
||||||
}
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
758
apps/dhparam.c
758
apps/dhparam.c
@@ -109,433 +109,435 @@
|
|||||||
*
|
*
|
||||||
*/
|
*/
|
||||||
|
|
||||||
|
#include <openssl/opensslconf.h> /* for OPENSSL_NO_DH */
|
||||||
#ifndef OPENSSL_NO_DH
|
#ifndef OPENSSL_NO_DH
|
||||||
#include <stdio.h>
|
# include <stdio.h>
|
||||||
#include <stdlib.h>
|
# include <stdlib.h>
|
||||||
#include <time.h>
|
# include <time.h>
|
||||||
#include <string.h>
|
# include <string.h>
|
||||||
#include "apps.h"
|
# include "apps.h"
|
||||||
#include <openssl/bio.h>
|
# include <openssl/bio.h>
|
||||||
#include <openssl/err.h>
|
# include <openssl/err.h>
|
||||||
#include <openssl/bn.h>
|
# include <openssl/bn.h>
|
||||||
#include <openssl/dh.h>
|
# include <openssl/dh.h>
|
||||||
#include <openssl/x509.h>
|
# include <openssl/x509.h>
|
||||||
#include <openssl/pem.h>
|
# include <openssl/pem.h>
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_DSA
|
# ifndef OPENSSL_NO_DSA
|
||||||
#include <openssl/dsa.h>
|
# include <openssl/dsa.h>
|
||||||
#endif
|
# endif
|
||||||
|
|
||||||
#undef PROG
|
# undef PROG
|
||||||
#define PROG dhparam_main
|
# define PROG dhparam_main
|
||||||
|
|
||||||
#define DEFBITS 512
|
# define DEFBITS 2048
|
||||||
|
|
||||||
/* -inform arg - input format - default PEM (DER or PEM)
|
/*-
|
||||||
|
* -inform arg - input format - default PEM (DER or PEM)
|
||||||
* -outform arg - output format - default PEM
|
* -outform arg - output format - default PEM
|
||||||
* -in arg - input file - default stdin
|
* -in arg - input file - default stdin
|
||||||
* -out arg - output file - default stdout
|
* -out arg - output file - default stdout
|
||||||
* -dsaparam - read or generate DSA parameters, convert to DH
|
* -dsaparam - read or generate DSA parameters, convert to DH
|
||||||
* -check - check the parameters are ok
|
* -check - check the parameters are ok
|
||||||
* -noout
|
* -noout
|
||||||
* -text
|
* -text
|
||||||
* -C
|
* -C
|
||||||
*/
|
*/
|
||||||
|
|
||||||
static void MS_CALLBACK dh_cb(int p, int n, void *arg);
|
static int MS_CALLBACK dh_cb(int p, int n, BN_GENCB *cb);
|
||||||
|
|
||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
ENGINE *e = NULL;
|
DH *dh = NULL;
|
||||||
DH *dh=NULL;
|
int i, badops = 0, text = 0;
|
||||||
int i,badops=0,text=0;
|
# ifndef OPENSSL_NO_DSA
|
||||||
#ifndef OPENSSL_NO_DSA
|
int dsaparam = 0;
|
||||||
int dsaparam=0;
|
# endif
|
||||||
#endif
|
BIO *in = NULL, *out = NULL;
|
||||||
BIO *in=NULL,*out=NULL;
|
int informat, outformat, check = 0, noout = 0, C = 0, ret = 1;
|
||||||
int informat,outformat,check=0,noout=0,C=0,ret=1;
|
char *infile, *outfile, *prog;
|
||||||
char *infile,*outfile,*prog;
|
char *inrand = NULL;
|
||||||
char *inrand=NULL,*engine=NULL;
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
int num = 0, g = 0;
|
char *engine = NULL;
|
||||||
|
# endif
|
||||||
|
int num = 0, g = 0;
|
||||||
|
|
||||||
apps_startup();
|
apps_startup();
|
||||||
|
|
||||||
if (bio_err == NULL)
|
if (bio_err == NULL)
|
||||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
if ((bio_err = BIO_new(BIO_s_file())) != NULL)
|
||||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||||
|
|
||||||
if (!load_config(bio_err, NULL))
|
if (!load_config(bio_err, NULL))
|
||||||
goto end;
|
goto end;
|
||||||
|
|
||||||
infile=NULL;
|
infile = NULL;
|
||||||
outfile=NULL;
|
outfile = NULL;
|
||||||
informat=FORMAT_PEM;
|
informat = FORMAT_PEM;
|
||||||
outformat=FORMAT_PEM;
|
outformat = FORMAT_PEM;
|
||||||
|
|
||||||
prog=argv[0];
|
prog = argv[0];
|
||||||
argc--;
|
argc--;
|
||||||
argv++;
|
argv++;
|
||||||
while (argc >= 1)
|
while (argc >= 1) {
|
||||||
{
|
if (strcmp(*argv, "-inform") == 0) {
|
||||||
if (strcmp(*argv,"-inform") == 0)
|
if (--argc < 1)
|
||||||
{
|
goto bad;
|
||||||
if (--argc < 1) goto bad;
|
informat = str2fmt(*(++argv));
|
||||||
informat=str2fmt(*(++argv));
|
} else if (strcmp(*argv, "-outform") == 0) {
|
||||||
}
|
if (--argc < 1)
|
||||||
else if (strcmp(*argv,"-outform") == 0)
|
goto bad;
|
||||||
{
|
outformat = str2fmt(*(++argv));
|
||||||
if (--argc < 1) goto bad;
|
} else if (strcmp(*argv, "-in") == 0) {
|
||||||
outformat=str2fmt(*(++argv));
|
if (--argc < 1)
|
||||||
}
|
goto bad;
|
||||||
else if (strcmp(*argv,"-in") == 0)
|
infile = *(++argv);
|
||||||
{
|
} else if (strcmp(*argv, "-out") == 0) {
|
||||||
if (--argc < 1) goto bad;
|
if (--argc < 1)
|
||||||
infile= *(++argv);
|
goto bad;
|
||||||
}
|
outfile = *(++argv);
|
||||||
else if (strcmp(*argv,"-out") == 0)
|
}
|
||||||
{
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
if (--argc < 1) goto bad;
|
else if (strcmp(*argv, "-engine") == 0) {
|
||||||
outfile= *(++argv);
|
if (--argc < 1)
|
||||||
}
|
goto bad;
|
||||||
else if (strcmp(*argv,"-engine") == 0)
|
engine = *(++argv);
|
||||||
{
|
}
|
||||||
if (--argc < 1) goto bad;
|
# endif
|
||||||
engine= *(++argv);
|
else if (strcmp(*argv, "-check") == 0)
|
||||||
}
|
check = 1;
|
||||||
else if (strcmp(*argv,"-check") == 0)
|
else if (strcmp(*argv, "-text") == 0)
|
||||||
check=1;
|
text = 1;
|
||||||
else if (strcmp(*argv,"-text") == 0)
|
# ifndef OPENSSL_NO_DSA
|
||||||
text=1;
|
else if (strcmp(*argv, "-dsaparam") == 0)
|
||||||
#ifndef OPENSSL_NO_DSA
|
dsaparam = 1;
|
||||||
else if (strcmp(*argv,"-dsaparam") == 0)
|
# endif
|
||||||
dsaparam=1;
|
else if (strcmp(*argv, "-C") == 0)
|
||||||
#endif
|
C = 1;
|
||||||
else if (strcmp(*argv,"-C") == 0)
|
else if (strcmp(*argv, "-noout") == 0)
|
||||||
C=1;
|
noout = 1;
|
||||||
else if (strcmp(*argv,"-noout") == 0)
|
else if (strcmp(*argv, "-2") == 0)
|
||||||
noout=1;
|
g = 2;
|
||||||
else if (strcmp(*argv,"-2") == 0)
|
else if (strcmp(*argv, "-5") == 0)
|
||||||
g=2;
|
g = 5;
|
||||||
else if (strcmp(*argv,"-5") == 0)
|
else if (strcmp(*argv, "-rand") == 0) {
|
||||||
g=5;
|
if (--argc < 1)
|
||||||
else if (strcmp(*argv,"-rand") == 0)
|
goto bad;
|
||||||
{
|
inrand = *(++argv);
|
||||||
if (--argc < 1) goto bad;
|
} else if (((sscanf(*argv, "%d", &num) == 0) || (num <= 0)))
|
||||||
inrand= *(++argv);
|
goto bad;
|
||||||
}
|
argv++;
|
||||||
else if (((sscanf(*argv,"%d",&num) == 0) || (num <= 0)))
|
argc--;
|
||||||
goto bad;
|
}
|
||||||
argv++;
|
|
||||||
argc--;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (badops)
|
if (badops) {
|
||||||
{
|
bad:
|
||||||
bad:
|
BIO_printf(bio_err, "%s [options] [numbits]\n", prog);
|
||||||
BIO_printf(bio_err,"%s [options] [numbits]\n",prog);
|
BIO_printf(bio_err, "where options are\n");
|
||||||
BIO_printf(bio_err,"where options are\n");
|
BIO_printf(bio_err, " -inform arg input format - one of DER PEM\n");
|
||||||
BIO_printf(bio_err," -inform arg input format - one of DER PEM\n");
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err," -outform arg output format - one of DER PEM\n");
|
" -outform arg output format - one of DER PEM\n");
|
||||||
BIO_printf(bio_err," -in arg input file\n");
|
BIO_printf(bio_err, " -in arg input file\n");
|
||||||
BIO_printf(bio_err," -out arg output file\n");
|
BIO_printf(bio_err, " -out arg output file\n");
|
||||||
#ifndef OPENSSL_NO_DSA
|
# ifndef OPENSSL_NO_DSA
|
||||||
BIO_printf(bio_err," -dsaparam read or generate DSA parameters, convert to DH\n");
|
BIO_printf(bio_err,
|
||||||
#endif
|
" -dsaparam read or generate DSA parameters, convert to DH\n");
|
||||||
BIO_printf(bio_err," -check check the DH parameters\n");
|
# endif
|
||||||
BIO_printf(bio_err," -text print a text form of the DH parameters\n");
|
BIO_printf(bio_err, " -check check the DH parameters\n");
|
||||||
BIO_printf(bio_err," -C Output C code\n");
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err," -2 generate parameters using 2 as the generator value\n");
|
" -text print a text form of the DH parameters\n");
|
||||||
BIO_printf(bio_err," -5 generate parameters using 5 as the generator value\n");
|
BIO_printf(bio_err, " -C Output C code\n");
|
||||||
BIO_printf(bio_err," numbits number of bits in to generate (default 512)\n");
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err," -engine e use engine e, possibly a hardware device.\n");
|
" -2 generate parameters using 2 as the generator value\n");
|
||||||
BIO_printf(bio_err," -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err," - load the file (or the files in the directory) into\n");
|
" -5 generate parameters using 5 as the generator value\n");
|
||||||
BIO_printf(bio_err," the random number generator\n");
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err," -noout no output\n");
|
" numbits number of bits in to generate (default 2048)\n");
|
||||||
goto end;
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
}
|
BIO_printf(bio_err,
|
||||||
|
" -engine e use engine e, possibly a hardware device.\n");
|
||||||
|
# endif
|
||||||
|
BIO_printf(bio_err, " -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR,
|
||||||
|
LIST_SEPARATOR_CHAR);
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" - load the file (or the files in the directory) into\n");
|
||||||
|
BIO_printf(bio_err, " the random number generator\n");
|
||||||
|
BIO_printf(bio_err, " -noout no output\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
ERR_load_crypto_strings();
|
ERR_load_crypto_strings();
|
||||||
|
|
||||||
e = setup_engine(bio_err, engine, 0);
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
|
setup_engine(bio_err, engine, 0);
|
||||||
|
# endif
|
||||||
|
|
||||||
if (g && !num)
|
if (g && !num)
|
||||||
num = DEFBITS;
|
num = DEFBITS;
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_DSA
|
# ifndef OPENSSL_NO_DSA
|
||||||
if (dsaparam)
|
if (dsaparam) {
|
||||||
{
|
if (g) {
|
||||||
if (g)
|
BIO_printf(bio_err,
|
||||||
{
|
"generator may not be chosen for DSA parameters\n");
|
||||||
BIO_printf(bio_err, "generator may not be chosen for DSA parameters\n");
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
} else
|
||||||
}
|
# endif
|
||||||
else
|
{
|
||||||
#endif
|
/* DH parameters */
|
||||||
{
|
if (num && !g)
|
||||||
/* DH parameters */
|
g = 2;
|
||||||
if (num && !g)
|
}
|
||||||
g = 2;
|
|
||||||
}
|
|
||||||
|
|
||||||
if(num) {
|
if (num) {
|
||||||
|
|
||||||
if (!app_RAND_load_file(NULL, bio_err, 1) && inrand == NULL)
|
BN_GENCB cb;
|
||||||
{
|
BN_GENCB_set(&cb, dh_cb, bio_err);
|
||||||
BIO_printf(bio_err,"warning, not much extra random data, consider using the -rand option\n");
|
if (!app_RAND_load_file(NULL, bio_err, 1) && inrand == NULL) {
|
||||||
}
|
BIO_printf(bio_err,
|
||||||
if (inrand != NULL)
|
"warning, not much extra random data, consider using the -rand option\n");
|
||||||
BIO_printf(bio_err,"%ld semi-random bytes loaded\n",
|
}
|
||||||
app_RAND_load_files(inrand));
|
if (inrand != NULL)
|
||||||
|
BIO_printf(bio_err, "%ld semi-random bytes loaded\n",
|
||||||
|
app_RAND_load_files(inrand));
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_DSA
|
# ifndef OPENSSL_NO_DSA
|
||||||
if (dsaparam)
|
if (dsaparam) {
|
||||||
{
|
DSA *dsa = DSA_new();
|
||||||
DSA *dsa;
|
|
||||||
|
|
||||||
BIO_printf(bio_err,"Generating DSA parameters, %d bit long prime\n",num);
|
BIO_printf(bio_err,
|
||||||
dsa = DSA_generate_parameters(num, NULL, 0, NULL, NULL, dh_cb, bio_err);
|
"Generating DSA parameters, %d bit long prime\n", num);
|
||||||
if (dsa == NULL)
|
if (!dsa
|
||||||
{
|
|| !DSA_generate_parameters_ex(dsa, num, NULL, 0, NULL, NULL,
|
||||||
ERR_print_errors(bio_err);
|
&cb)) {
|
||||||
goto end;
|
if (dsa)
|
||||||
}
|
DSA_free(dsa);
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
dh = DSA_dup_DH(dsa);
|
dh = DSA_dup_DH(dsa);
|
||||||
DSA_free(dsa);
|
DSA_free(dsa);
|
||||||
if (dh == NULL)
|
if (dh == NULL) {
|
||||||
{
|
ERR_print_errors(bio_err);
|
||||||
ERR_print_errors(bio_err);
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
} else
|
||||||
}
|
# endif
|
||||||
else
|
{
|
||||||
#endif
|
dh = DH_new();
|
||||||
{
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err,"Generating DH parameters, %d bit long safe prime, generator %d\n",num,g);
|
"Generating DH parameters, %d bit long safe prime, generator %d\n",
|
||||||
BIO_printf(bio_err,"This is going to take a long time\n");
|
num, g);
|
||||||
dh=DH_generate_parameters(num,g,dh_cb,bio_err);
|
BIO_printf(bio_err, "This is going to take a long time\n");
|
||||||
|
if (!dh || !DH_generate_parameters_ex(dh, num, g, &cb)) {
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
if (dh == NULL)
|
app_RAND_write_file(NULL, bio_err);
|
||||||
{
|
} else {
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
app_RAND_write_file(NULL, bio_err);
|
in = BIO_new(BIO_s_file());
|
||||||
} else {
|
if (in == NULL) {
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
if (infile == NULL)
|
||||||
|
BIO_set_fp(in, stdin, BIO_NOCLOSE);
|
||||||
|
else {
|
||||||
|
if (BIO_read_filename(in, infile) <= 0) {
|
||||||
|
perror(infile);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
in=BIO_new(BIO_s_file());
|
if (informat != FORMAT_ASN1 && informat != FORMAT_PEM) {
|
||||||
if (in == NULL)
|
BIO_printf(bio_err, "bad input format specified\n");
|
||||||
{
|
goto end;
|
||||||
ERR_print_errors(bio_err);
|
}
|
||||||
goto end;
|
# ifndef OPENSSL_NO_DSA
|
||||||
}
|
if (dsaparam) {
|
||||||
if (infile == NULL)
|
DSA *dsa;
|
||||||
BIO_set_fp(in,stdin,BIO_NOCLOSE);
|
|
||||||
else
|
|
||||||
{
|
|
||||||
if (BIO_read_filename(in,infile) <= 0)
|
|
||||||
{
|
|
||||||
perror(infile);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (informat != FORMAT_ASN1 && informat != FORMAT_PEM)
|
if (informat == FORMAT_ASN1)
|
||||||
{
|
dsa = d2i_DSAparams_bio(in, NULL);
|
||||||
BIO_printf(bio_err,"bad input format specified\n");
|
else /* informat == FORMAT_PEM */
|
||||||
goto end;
|
dsa = PEM_read_bio_DSAparams(in, NULL, NULL, NULL);
|
||||||
}
|
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_DSA
|
if (dsa == NULL) {
|
||||||
if (dsaparam)
|
BIO_printf(bio_err, "unable to load DSA parameters\n");
|
||||||
{
|
ERR_print_errors(bio_err);
|
||||||
DSA *dsa;
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
if (informat == FORMAT_ASN1)
|
dh = DSA_dup_DH(dsa);
|
||||||
dsa=d2i_DSAparams_bio(in,NULL);
|
DSA_free(dsa);
|
||||||
else /* informat == FORMAT_PEM */
|
if (dh == NULL) {
|
||||||
dsa=PEM_read_bio_DSAparams(in,NULL,NULL,NULL);
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
} else
|
||||||
|
# endif
|
||||||
|
{
|
||||||
|
if (informat == FORMAT_ASN1)
|
||||||
|
dh = d2i_DHparams_bio(in, NULL);
|
||||||
|
else /* informat == FORMAT_PEM */
|
||||||
|
dh = PEM_read_bio_DHparams(in, NULL, NULL, NULL);
|
||||||
|
|
||||||
if (dsa == NULL)
|
if (dh == NULL) {
|
||||||
{
|
BIO_printf(bio_err, "unable to load DH parameters\n");
|
||||||
BIO_printf(bio_err,"unable to load DSA parameters\n");
|
ERR_print_errors(bio_err);
|
||||||
ERR_print_errors(bio_err);
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
dh = DSA_dup_DH(dsa);
|
/* dh != NULL */
|
||||||
DSA_free(dsa);
|
}
|
||||||
if (dh == NULL)
|
|
||||||
{
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
else
|
|
||||||
#endif
|
|
||||||
{
|
|
||||||
if (informat == FORMAT_ASN1)
|
|
||||||
dh=d2i_DHparams_bio(in,NULL);
|
|
||||||
else /* informat == FORMAT_PEM */
|
|
||||||
dh=PEM_read_bio_DHparams(in,NULL,NULL,NULL);
|
|
||||||
|
|
||||||
if (dh == NULL)
|
out = BIO_new(BIO_s_file());
|
||||||
{
|
if (out == NULL) {
|
||||||
BIO_printf(bio_err,"unable to load DH parameters\n");
|
ERR_print_errors(bio_err);
|
||||||
ERR_print_errors(bio_err);
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
if (outfile == NULL) {
|
||||||
}
|
BIO_set_fp(out, stdout, BIO_NOCLOSE);
|
||||||
|
# ifdef OPENSSL_SYS_VMS
|
||||||
|
{
|
||||||
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
|
out = BIO_push(tmpbio, out);
|
||||||
|
}
|
||||||
|
# endif
|
||||||
|
} else {
|
||||||
|
if (BIO_write_filename(out, outfile) <= 0) {
|
||||||
|
perror(outfile);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
/* dh != NULL */
|
if (text) {
|
||||||
}
|
DHparams_print(out, dh);
|
||||||
|
}
|
||||||
|
|
||||||
out=BIO_new(BIO_s_file());
|
if (check) {
|
||||||
if (out == NULL)
|
if (!DH_check(dh, &i)) {
|
||||||
{
|
ERR_print_errors(bio_err);
|
||||||
ERR_print_errors(bio_err);
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
if (i & DH_CHECK_P_NOT_PRIME)
|
||||||
if (outfile == NULL)
|
printf("p value is not prime\n");
|
||||||
{
|
if (i & DH_CHECK_P_NOT_SAFE_PRIME)
|
||||||
BIO_set_fp(out,stdout,BIO_NOCLOSE);
|
printf("p value is not a safe prime\n");
|
||||||
#ifdef OPENSSL_SYS_VMS
|
if (i & DH_UNABLE_TO_CHECK_GENERATOR)
|
||||||
{
|
printf("unable to check the generator value\n");
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
if (i & DH_NOT_SUITABLE_GENERATOR)
|
||||||
out = BIO_push(tmpbio, out);
|
printf("the g value is not a generator\n");
|
||||||
}
|
if (i == 0)
|
||||||
#endif
|
printf("DH parameters appear to be ok.\n");
|
||||||
}
|
}
|
||||||
else
|
if (C) {
|
||||||
{
|
unsigned char *data;
|
||||||
if (BIO_write_filename(out,outfile) <= 0)
|
int len, l, bits;
|
||||||
{
|
|
||||||
perror(outfile);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
|
len = BN_num_bytes(dh->p);
|
||||||
|
bits = BN_num_bits(dh->p);
|
||||||
|
data = (unsigned char *)OPENSSL_malloc(len);
|
||||||
|
if (data == NULL) {
|
||||||
|
perror("OPENSSL_malloc");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
printf("#ifndef HEADER_DH_H\n"
|
||||||
|
"#include <openssl/dh.h>\n" "#endif\n");
|
||||||
|
printf("DH *get_dh%d()\n\t{\n", bits);
|
||||||
|
|
||||||
if (text)
|
l = BN_bn2bin(dh->p, data);
|
||||||
{
|
printf("\tstatic unsigned char dh%d_p[]={", bits);
|
||||||
DHparams_print(out,dh);
|
for (i = 0; i < l; i++) {
|
||||||
}
|
if ((i % 12) == 0)
|
||||||
|
printf("\n\t\t");
|
||||||
|
printf("0x%02X,", data[i]);
|
||||||
|
}
|
||||||
|
printf("\n\t\t};\n");
|
||||||
|
|
||||||
if (check)
|
l = BN_bn2bin(dh->g, data);
|
||||||
{
|
printf("\tstatic unsigned char dh%d_g[]={", bits);
|
||||||
if (!DH_check(dh,&i))
|
for (i = 0; i < l; i++) {
|
||||||
{
|
if ((i % 12) == 0)
|
||||||
ERR_print_errors(bio_err);
|
printf("\n\t\t");
|
||||||
goto end;
|
printf("0x%02X,", data[i]);
|
||||||
}
|
}
|
||||||
if (i & DH_CHECK_P_NOT_PRIME)
|
printf("\n\t\t};\n");
|
||||||
printf("p value is not prime\n");
|
|
||||||
if (i & DH_CHECK_P_NOT_SAFE_PRIME)
|
|
||||||
printf("p value is not a safe prime\n");
|
|
||||||
if (i & DH_UNABLE_TO_CHECK_GENERATOR)
|
|
||||||
printf("unable to check the generator value\n");
|
|
||||||
if (i & DH_NOT_SUITABLE_GENERATOR)
|
|
||||||
printf("the g value is not a generator\n");
|
|
||||||
if (i == 0)
|
|
||||||
printf("DH parameters appear to be ok.\n");
|
|
||||||
}
|
|
||||||
if (C)
|
|
||||||
{
|
|
||||||
unsigned char *data;
|
|
||||||
int len,l,bits;
|
|
||||||
|
|
||||||
len=BN_num_bytes(dh->p);
|
printf("\tDH *dh;\n\n");
|
||||||
bits=BN_num_bits(dh->p);
|
printf("\tif ((dh=DH_new()) == NULL) return(NULL);\n");
|
||||||
data=(unsigned char *)OPENSSL_malloc(len);
|
printf("\tdh->p=BN_bin2bn(dh%d_p,sizeof(dh%d_p),NULL);\n",
|
||||||
if (data == NULL)
|
bits, bits);
|
||||||
{
|
printf("\tdh->g=BN_bin2bn(dh%d_g,sizeof(dh%d_g),NULL);\n",
|
||||||
perror("OPENSSL_malloc");
|
bits, bits);
|
||||||
goto end;
|
printf("\tif ((dh->p == NULL) || (dh->g == NULL))\n");
|
||||||
}
|
printf("\t\t{ DH_free(dh); return(NULL); }\n");
|
||||||
printf("#ifndef HEADER_DH_H\n"
|
if (dh->length)
|
||||||
"#include <openssl/dh.h>\n"
|
printf("\tdh->length = %ld;\n", dh->length);
|
||||||
"#endif\n");
|
printf("\treturn(dh);\n\t}\n");
|
||||||
printf("DH *get_dh%d()\n\t{\n",bits);
|
OPENSSL_free(data);
|
||||||
|
}
|
||||||
|
|
||||||
l=BN_bn2bin(dh->p,data);
|
if (!noout) {
|
||||||
printf("\tstatic unsigned char dh%d_p[]={",bits);
|
if (outformat == FORMAT_ASN1)
|
||||||
for (i=0; i<l; i++)
|
i = i2d_DHparams_bio(out, dh);
|
||||||
{
|
else if (outformat == FORMAT_PEM)
|
||||||
if ((i%12) == 0) printf("\n\t\t");
|
i = PEM_write_bio_DHparams(out, dh);
|
||||||
printf("0x%02X,",data[i]);
|
else {
|
||||||
}
|
BIO_printf(bio_err, "bad output format specified for outfile\n");
|
||||||
printf("\n\t\t};\n");
|
goto end;
|
||||||
|
}
|
||||||
l=BN_bn2bin(dh->g,data);
|
if (!i) {
|
||||||
printf("\tstatic unsigned char dh%d_g[]={",bits);
|
BIO_printf(bio_err, "unable to write DH parameters\n");
|
||||||
for (i=0; i<l; i++)
|
ERR_print_errors(bio_err);
|
||||||
{
|
goto end;
|
||||||
if ((i%12) == 0) printf("\n\t\t");
|
}
|
||||||
printf("0x%02X,",data[i]);
|
}
|
||||||
}
|
ret = 0;
|
||||||
printf("\n\t\t};\n");
|
end:
|
||||||
|
if (in != NULL)
|
||||||
printf("\tDH *dh;\n\n");
|
BIO_free(in);
|
||||||
printf("\tif ((dh=DH_new()) == NULL) return(NULL);\n");
|
if (out != NULL)
|
||||||
printf("\tdh->p=BN_bin2bn(dh%d_p,sizeof(dh%d_p),NULL);\n",
|
BIO_free_all(out);
|
||||||
bits,bits);
|
if (dh != NULL)
|
||||||
printf("\tdh->g=BN_bin2bn(dh%d_g,sizeof(dh%d_g),NULL);\n",
|
DH_free(dh);
|
||||||
bits,bits);
|
apps_shutdown();
|
||||||
printf("\tif ((dh->p == NULL) || (dh->g == NULL))\n");
|
OPENSSL_EXIT(ret);
|
||||||
printf("\t\t{ DH_free(dh); return(NULL); }\n");
|
}
|
||||||
if (dh->length)
|
|
||||||
printf("\tdh->length = %ld;\n", dh->length);
|
|
||||||
printf("\treturn(dh);\n\t}\n");
|
|
||||||
OPENSSL_free(data);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
if (!noout)
|
|
||||||
{
|
|
||||||
if (outformat == FORMAT_ASN1)
|
|
||||||
i=i2d_DHparams_bio(out,dh);
|
|
||||||
else if (outformat == FORMAT_PEM)
|
|
||||||
i=PEM_write_bio_DHparams(out,dh);
|
|
||||||
else {
|
|
||||||
BIO_printf(bio_err,"bad output format specified for outfile\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
if (!i)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"unable to write DH parameters\n");
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
ret=0;
|
|
||||||
end:
|
|
||||||
if (in != NULL) BIO_free(in);
|
|
||||||
if (out != NULL) BIO_free_all(out);
|
|
||||||
if (dh != NULL) DH_free(dh);
|
|
||||||
apps_shutdown();
|
|
||||||
OPENSSL_EXIT(ret);
|
|
||||||
}
|
|
||||||
|
|
||||||
/* dh_cb is identical to dsa_cb in apps/dsaparam.c */
|
/* dh_cb is identical to dsa_cb in apps/dsaparam.c */
|
||||||
static void MS_CALLBACK dh_cb(int p, int n, void *arg)
|
static int MS_CALLBACK dh_cb(int p, int n, BN_GENCB *cb)
|
||||||
{
|
{
|
||||||
char c='*';
|
char c = '*';
|
||||||
|
|
||||||
if (p == 0) c='.';
|
if (p == 0)
|
||||||
if (p == 1) c='+';
|
c = '.';
|
||||||
if (p == 2) c='*';
|
if (p == 1)
|
||||||
if (p == 3) c='\n';
|
c = '+';
|
||||||
BIO_write((BIO *)arg,&c,1);
|
if (p == 2)
|
||||||
(void)BIO_flush((BIO *)arg);
|
c = '*';
|
||||||
#ifdef LINT
|
if (p == 3)
|
||||||
p=n;
|
c = '\n';
|
||||||
#endif
|
BIO_write(cb->arg, &c, 1);
|
||||||
}
|
(void)BIO_flush(cb->arg);
|
||||||
|
# ifdef LINT
|
||||||
|
p = n;
|
||||||
|
# endif
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
#else /* !OPENSSL_NO_DH */
|
||||||
|
|
||||||
|
# if PEDANTIC
|
||||||
|
static void *dummy = &dummy;
|
||||||
|
# endif
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
545
apps/dsa.c
545
apps/dsa.c
@@ -56,264 +56,319 @@
|
|||||||
* [including the GNU Public Licence.]
|
* [including the GNU Public Licence.]
|
||||||
*/
|
*/
|
||||||
|
|
||||||
|
#include <openssl/opensslconf.h> /* for OPENSSL_NO_DSA */
|
||||||
#ifndef OPENSSL_NO_DSA
|
#ifndef OPENSSL_NO_DSA
|
||||||
#include <stdio.h>
|
# include <stdio.h>
|
||||||
#include <stdlib.h>
|
# include <stdlib.h>
|
||||||
#include <string.h>
|
# include <string.h>
|
||||||
#include <time.h>
|
# include <time.h>
|
||||||
#include "apps.h"
|
# include "apps.h"
|
||||||
#include <openssl/bio.h>
|
# include <openssl/bio.h>
|
||||||
#include <openssl/err.h>
|
# include <openssl/err.h>
|
||||||
#include <openssl/dsa.h>
|
# include <openssl/dsa.h>
|
||||||
#include <openssl/evp.h>
|
# include <openssl/evp.h>
|
||||||
#include <openssl/x509.h>
|
# include <openssl/x509.h>
|
||||||
#include <openssl/pem.h>
|
# include <openssl/pem.h>
|
||||||
|
# include <openssl/bn.h>
|
||||||
|
|
||||||
#undef PROG
|
# undef PROG
|
||||||
#define PROG dsa_main
|
# define PROG dsa_main
|
||||||
|
|
||||||
/* -inform arg - input format - default PEM (one of DER, NET or PEM)
|
/*-
|
||||||
|
* -inform arg - input format - default PEM (one of DER, NET or PEM)
|
||||||
* -outform arg - output format - default PEM
|
* -outform arg - output format - default PEM
|
||||||
* -in arg - input file - default stdin
|
* -in arg - input file - default stdin
|
||||||
* -out arg - output file - default stdout
|
* -out arg - output file - default stdout
|
||||||
* -des - encrypt output if PEM format with DES in cbc mode
|
* -des - encrypt output if PEM format with DES in cbc mode
|
||||||
* -des3 - encrypt output if PEM format
|
* -des3 - encrypt output if PEM format
|
||||||
* -idea - encrypt output if PEM format
|
* -idea - encrypt output if PEM format
|
||||||
* -aes128 - encrypt output if PEM format
|
* -aes128 - encrypt output if PEM format
|
||||||
* -aes192 - encrypt output if PEM format
|
* -aes192 - encrypt output if PEM format
|
||||||
* -aes256 - encrypt output if PEM format
|
* -aes256 - encrypt output if PEM format
|
||||||
* -text - print a text version
|
* -camellia128 - encrypt output if PEM format
|
||||||
* -modulus - print the DSA public key
|
* -camellia192 - encrypt output if PEM format
|
||||||
|
* -camellia256 - encrypt output if PEM format
|
||||||
|
* -seed - encrypt output if PEM format
|
||||||
|
* -text - print a text version
|
||||||
|
* -modulus - print the DSA public key
|
||||||
*/
|
*/
|
||||||
|
|
||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
ENGINE *e = NULL;
|
ENGINE *e = NULL;
|
||||||
int ret=1;
|
int ret = 1;
|
||||||
DSA *dsa=NULL;
|
DSA *dsa = NULL;
|
||||||
int i,badops=0;
|
int i, badops = 0;
|
||||||
const EVP_CIPHER *enc=NULL;
|
const EVP_CIPHER *enc = NULL;
|
||||||
BIO *in=NULL,*out=NULL;
|
BIO *in = NULL, *out = NULL;
|
||||||
int informat,outformat,text=0,noout=0;
|
int informat, outformat, text = 0, noout = 0;
|
||||||
int pubin = 0, pubout = 0;
|
int pubin = 0, pubout = 0;
|
||||||
char *infile,*outfile,*prog,*engine;
|
char *infile, *outfile, *prog;
|
||||||
char *passargin = NULL, *passargout = NULL;
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
char *passin = NULL, *passout = NULL;
|
char *engine;
|
||||||
int modulus=0;
|
# endif
|
||||||
|
char *passargin = NULL, *passargout = NULL;
|
||||||
|
char *passin = NULL, *passout = NULL;
|
||||||
|
int modulus = 0;
|
||||||
|
|
||||||
apps_startup();
|
int pvk_encr = 2;
|
||||||
|
|
||||||
if (bio_err == NULL)
|
apps_startup();
|
||||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
|
||||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
|
||||||
|
|
||||||
if (!load_config(bio_err, NULL))
|
if (bio_err == NULL)
|
||||||
goto end;
|
if ((bio_err = BIO_new(BIO_s_file())) != NULL)
|
||||||
|
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||||
|
|
||||||
engine=NULL;
|
if (!load_config(bio_err, NULL))
|
||||||
infile=NULL;
|
goto end;
|
||||||
outfile=NULL;
|
|
||||||
informat=FORMAT_PEM;
|
|
||||||
outformat=FORMAT_PEM;
|
|
||||||
|
|
||||||
prog=argv[0];
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
argc--;
|
engine = NULL;
|
||||||
argv++;
|
# endif
|
||||||
while (argc >= 1)
|
infile = NULL;
|
||||||
{
|
outfile = NULL;
|
||||||
if (strcmp(*argv,"-inform") == 0)
|
informat = FORMAT_PEM;
|
||||||
{
|
outformat = FORMAT_PEM;
|
||||||
if (--argc < 1) goto bad;
|
|
||||||
informat=str2fmt(*(++argv));
|
prog = argv[0];
|
||||||
}
|
argc--;
|
||||||
else if (strcmp(*argv,"-outform") == 0)
|
argv++;
|
||||||
{
|
while (argc >= 1) {
|
||||||
if (--argc < 1) goto bad;
|
if (strcmp(*argv, "-inform") == 0) {
|
||||||
outformat=str2fmt(*(++argv));
|
if (--argc < 1)
|
||||||
}
|
goto bad;
|
||||||
else if (strcmp(*argv,"-in") == 0)
|
informat = str2fmt(*(++argv));
|
||||||
{
|
} else if (strcmp(*argv, "-outform") == 0) {
|
||||||
if (--argc < 1) goto bad;
|
if (--argc < 1)
|
||||||
infile= *(++argv);
|
goto bad;
|
||||||
}
|
outformat = str2fmt(*(++argv));
|
||||||
else if (strcmp(*argv,"-out") == 0)
|
} else if (strcmp(*argv, "-in") == 0) {
|
||||||
{
|
if (--argc < 1)
|
||||||
if (--argc < 1) goto bad;
|
goto bad;
|
||||||
outfile= *(++argv);
|
infile = *(++argv);
|
||||||
}
|
} else if (strcmp(*argv, "-out") == 0) {
|
||||||
else if (strcmp(*argv,"-passin") == 0)
|
if (--argc < 1)
|
||||||
{
|
goto bad;
|
||||||
if (--argc < 1) goto bad;
|
outfile = *(++argv);
|
||||||
passargin= *(++argv);
|
} else if (strcmp(*argv, "-passin") == 0) {
|
||||||
}
|
if (--argc < 1)
|
||||||
else if (strcmp(*argv,"-passout") == 0)
|
goto bad;
|
||||||
{
|
passargin = *(++argv);
|
||||||
if (--argc < 1) goto bad;
|
} else if (strcmp(*argv, "-passout") == 0) {
|
||||||
passargout= *(++argv);
|
if (--argc < 1)
|
||||||
}
|
goto bad;
|
||||||
else if (strcmp(*argv,"-engine") == 0)
|
passargout = *(++argv);
|
||||||
{
|
}
|
||||||
if (--argc < 1) goto bad;
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
engine= *(++argv);
|
else if (strcmp(*argv, "-engine") == 0) {
|
||||||
}
|
if (--argc < 1)
|
||||||
else if (strcmp(*argv,"-noout") == 0)
|
goto bad;
|
||||||
noout=1;
|
engine = *(++argv);
|
||||||
else if (strcmp(*argv,"-text") == 0)
|
}
|
||||||
text=1;
|
# endif
|
||||||
else if (strcmp(*argv,"-modulus") == 0)
|
else if (strcmp(*argv, "-pvk-strong") == 0)
|
||||||
modulus=1;
|
pvk_encr = 2;
|
||||||
else if (strcmp(*argv,"-pubin") == 0)
|
else if (strcmp(*argv, "-pvk-weak") == 0)
|
||||||
pubin=1;
|
pvk_encr = 1;
|
||||||
else if (strcmp(*argv,"-pubout") == 0)
|
else if (strcmp(*argv, "-pvk-none") == 0)
|
||||||
pubout=1;
|
pvk_encr = 0;
|
||||||
else if ((enc=EVP_get_cipherbyname(&(argv[0][1]))) == NULL)
|
else if (strcmp(*argv, "-noout") == 0)
|
||||||
{
|
noout = 1;
|
||||||
BIO_printf(bio_err,"unknown option %s\n",*argv);
|
else if (strcmp(*argv, "-text") == 0)
|
||||||
badops=1;
|
text = 1;
|
||||||
break;
|
else if (strcmp(*argv, "-modulus") == 0)
|
||||||
}
|
modulus = 1;
|
||||||
argc--;
|
else if (strcmp(*argv, "-pubin") == 0)
|
||||||
argv++;
|
pubin = 1;
|
||||||
}
|
else if (strcmp(*argv, "-pubout") == 0)
|
||||||
|
pubout = 1;
|
||||||
|
else if ((enc = EVP_get_cipherbyname(&(argv[0][1]))) == NULL) {
|
||||||
|
BIO_printf(bio_err, "unknown option %s\n", *argv);
|
||||||
|
badops = 1;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
argc--;
|
||||||
|
argv++;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (badops) {
|
||||||
|
bad:
|
||||||
|
BIO_printf(bio_err, "%s [options] <infile >outfile\n", prog);
|
||||||
|
BIO_printf(bio_err, "where options are\n");
|
||||||
|
BIO_printf(bio_err, " -inform arg input format - DER or PEM\n");
|
||||||
|
BIO_printf(bio_err, " -outform arg output format - DER or PEM\n");
|
||||||
|
BIO_printf(bio_err, " -in arg input file\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" -passin arg input file pass phrase source\n");
|
||||||
|
BIO_printf(bio_err, " -out arg output file\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" -passout arg output file pass phrase source\n");
|
||||||
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" -engine e use engine e, possibly a hardware device.\n");
|
||||||
|
# endif
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" -des encrypt PEM output with cbc des\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" -des3 encrypt PEM output with ede cbc des using 168 bit key\n");
|
||||||
|
# ifndef OPENSSL_NO_IDEA
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" -idea encrypt PEM output with cbc idea\n");
|
||||||
|
# endif
|
||||||
|
# ifndef OPENSSL_NO_AES
|
||||||
|
BIO_printf(bio_err, " -aes128, -aes192, -aes256\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" encrypt PEM output with cbc aes\n");
|
||||||
|
# endif
|
||||||
|
# ifndef OPENSSL_NO_CAMELLIA
|
||||||
|
BIO_printf(bio_err, " -camellia128, -camellia192, -camellia256\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" encrypt PEM output with cbc camellia\n");
|
||||||
|
# endif
|
||||||
|
# ifndef OPENSSL_NO_SEED
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" -seed encrypt PEM output with cbc seed\n");
|
||||||
|
# endif
|
||||||
|
BIO_printf(bio_err, " -text print the key in text\n");
|
||||||
|
BIO_printf(bio_err, " -noout don't print key out\n");
|
||||||
|
BIO_printf(bio_err, " -modulus print the DSA public value\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
ERR_load_crypto_strings();
|
||||||
|
|
||||||
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
|
e = setup_engine(bio_err, engine, 0);
|
||||||
|
# endif
|
||||||
|
|
||||||
|
if (!app_passwd(bio_err, passargin, passargout, &passin, &passout)) {
|
||||||
|
BIO_printf(bio_err, "Error getting passwords\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
in = BIO_new(BIO_s_file());
|
||||||
|
out = BIO_new(BIO_s_file());
|
||||||
|
if ((in == NULL) || (out == NULL)) {
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (infile == NULL)
|
||||||
|
BIO_set_fp(in, stdin, BIO_NOCLOSE);
|
||||||
|
else {
|
||||||
|
if (BIO_read_filename(in, infile) <= 0) {
|
||||||
|
perror(infile);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
BIO_printf(bio_err, "read DSA key\n");
|
||||||
|
|
||||||
|
{
|
||||||
|
EVP_PKEY *pkey;
|
||||||
|
|
||||||
|
if (pubin)
|
||||||
|
pkey = load_pubkey(bio_err, infile, informat, 1,
|
||||||
|
passin, e, "Public Key");
|
||||||
|
else
|
||||||
|
pkey = load_key(bio_err, infile, informat, 1,
|
||||||
|
passin, e, "Private Key");
|
||||||
|
|
||||||
|
if (pkey) {
|
||||||
|
dsa = EVP_PKEY_get1_DSA(pkey);
|
||||||
|
EVP_PKEY_free(pkey);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (dsa == NULL) {
|
||||||
|
BIO_printf(bio_err, "unable to load Key\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (outfile == NULL) {
|
||||||
|
BIO_set_fp(out, stdout, BIO_NOCLOSE);
|
||||||
|
# ifdef OPENSSL_SYS_VMS
|
||||||
|
{
|
||||||
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
|
out = BIO_push(tmpbio, out);
|
||||||
|
}
|
||||||
|
# endif
|
||||||
|
} else {
|
||||||
|
if (BIO_write_filename(out, outfile) <= 0) {
|
||||||
|
perror(outfile);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (text)
|
||||||
|
if (!DSA_print(out, dsa, 0)) {
|
||||||
|
perror(outfile);
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (modulus) {
|
||||||
|
fprintf(stdout, "Public Key=");
|
||||||
|
BN_print(out, dsa->pub_key);
|
||||||
|
fprintf(stdout, "\n");
|
||||||
|
}
|
||||||
|
|
||||||
|
if (noout)
|
||||||
|
goto end;
|
||||||
|
BIO_printf(bio_err, "writing DSA key\n");
|
||||||
|
if (outformat == FORMAT_ASN1) {
|
||||||
|
if (pubin || pubout)
|
||||||
|
i = i2d_DSA_PUBKEY_bio(out, dsa);
|
||||||
|
else
|
||||||
|
i = i2d_DSAPrivateKey_bio(out, dsa);
|
||||||
|
} else if (outformat == FORMAT_PEM) {
|
||||||
|
if (pubin || pubout)
|
||||||
|
i = PEM_write_bio_DSA_PUBKEY(out, dsa);
|
||||||
|
else
|
||||||
|
i = PEM_write_bio_DSAPrivateKey(out, dsa, enc,
|
||||||
|
NULL, 0, NULL, passout);
|
||||||
|
# if !defined(OPENSSL_NO_RSA) && !defined(OPENSSL_NO_RC4)
|
||||||
|
} else if (outformat == FORMAT_MSBLOB || outformat == FORMAT_PVK) {
|
||||||
|
EVP_PKEY *pk;
|
||||||
|
pk = EVP_PKEY_new();
|
||||||
|
EVP_PKEY_set1_DSA(pk, dsa);
|
||||||
|
if (outformat == FORMAT_PVK)
|
||||||
|
i = i2b_PVK_bio(out, pk, pvk_encr, 0, passout);
|
||||||
|
else if (pubin || pubout)
|
||||||
|
i = i2b_PublicKey_bio(out, pk);
|
||||||
|
else
|
||||||
|
i = i2b_PrivateKey_bio(out, pk);
|
||||||
|
EVP_PKEY_free(pk);
|
||||||
|
# endif
|
||||||
|
} else {
|
||||||
|
BIO_printf(bio_err, "bad output format specified for outfile\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
if (i <= 0) {
|
||||||
|
BIO_printf(bio_err, "unable to write private key\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
} else
|
||||||
|
ret = 0;
|
||||||
|
end:
|
||||||
|
if (in != NULL)
|
||||||
|
BIO_free(in);
|
||||||
|
if (out != NULL)
|
||||||
|
BIO_free_all(out);
|
||||||
|
if (dsa != NULL)
|
||||||
|
DSA_free(dsa);
|
||||||
|
if (passin)
|
||||||
|
OPENSSL_free(passin);
|
||||||
|
if (passout)
|
||||||
|
OPENSSL_free(passout);
|
||||||
|
apps_shutdown();
|
||||||
|
OPENSSL_EXIT(ret);
|
||||||
|
}
|
||||||
|
#else /* !OPENSSL_NO_DSA */
|
||||||
|
|
||||||
|
# if PEDANTIC
|
||||||
|
static void *dummy = &dummy;
|
||||||
|
# endif
|
||||||
|
|
||||||
if (badops)
|
|
||||||
{
|
|
||||||
bad:
|
|
||||||
BIO_printf(bio_err,"%s [options] <infile >outfile\n",prog);
|
|
||||||
BIO_printf(bio_err,"where options are\n");
|
|
||||||
BIO_printf(bio_err," -inform arg input format - DER or PEM\n");
|
|
||||||
BIO_printf(bio_err," -outform arg output format - DER or PEM\n");
|
|
||||||
BIO_printf(bio_err," -in arg input file\n");
|
|
||||||
BIO_printf(bio_err," -passin arg input file pass phrase source\n");
|
|
||||||
BIO_printf(bio_err," -out arg output file\n");
|
|
||||||
BIO_printf(bio_err," -passout arg output file pass phrase source\n");
|
|
||||||
BIO_printf(bio_err," -engine e use engine e, possibly a hardware device.\n");
|
|
||||||
BIO_printf(bio_err," -des encrypt PEM output with cbc des\n");
|
|
||||||
BIO_printf(bio_err," -des3 encrypt PEM output with ede cbc des using 168 bit key\n");
|
|
||||||
#ifndef OPENSSL_NO_IDEA
|
|
||||||
BIO_printf(bio_err," -idea encrypt PEM output with cbc idea\n");
|
|
||||||
#endif
|
|
||||||
#ifndef OPENSSL_NO_AES
|
|
||||||
BIO_printf(bio_err," -aes128, -aes192, -aes256\n");
|
|
||||||
BIO_printf(bio_err," encrypt PEM output with cbc aes\n");
|
|
||||||
#endif
|
|
||||||
BIO_printf(bio_err," -text print the key in text\n");
|
|
||||||
BIO_printf(bio_err," -noout don't print key out\n");
|
|
||||||
BIO_printf(bio_err," -modulus print the DSA public value\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
ERR_load_crypto_strings();
|
|
||||||
|
|
||||||
e = setup_engine(bio_err, engine, 0);
|
|
||||||
|
|
||||||
if(!app_passwd(bio_err, passargin, passargout, &passin, &passout)) {
|
|
||||||
BIO_printf(bio_err, "Error getting passwords\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
in=BIO_new(BIO_s_file());
|
|
||||||
out=BIO_new(BIO_s_file());
|
|
||||||
if ((in == NULL) || (out == NULL))
|
|
||||||
{
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (infile == NULL)
|
|
||||||
BIO_set_fp(in,stdin,BIO_NOCLOSE);
|
|
||||||
else
|
|
||||||
{
|
|
||||||
if (BIO_read_filename(in,infile) <= 0)
|
|
||||||
{
|
|
||||||
perror(infile);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
BIO_printf(bio_err,"read DSA key\n");
|
|
||||||
if (informat == FORMAT_ASN1) {
|
|
||||||
if(pubin) dsa=d2i_DSA_PUBKEY_bio(in,NULL);
|
|
||||||
else dsa=d2i_DSAPrivateKey_bio(in,NULL);
|
|
||||||
} else if (informat == FORMAT_PEM) {
|
|
||||||
if(pubin) dsa=PEM_read_bio_DSA_PUBKEY(in,NULL, NULL, NULL);
|
|
||||||
else dsa=PEM_read_bio_DSAPrivateKey(in,NULL,NULL,passin);
|
|
||||||
} else
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"bad input format specified for key\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
if (dsa == NULL)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"unable to load Key\n");
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (outfile == NULL)
|
|
||||||
{
|
|
||||||
BIO_set_fp(out,stdout,BIO_NOCLOSE);
|
|
||||||
#ifdef OPENSSL_SYS_VMS
|
|
||||||
{
|
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
|
||||||
out = BIO_push(tmpbio, out);
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
if (BIO_write_filename(out,outfile) <= 0)
|
|
||||||
{
|
|
||||||
perror(outfile);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (text)
|
|
||||||
if (!DSA_print(out,dsa,0))
|
|
||||||
{
|
|
||||||
perror(outfile);
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (modulus)
|
|
||||||
{
|
|
||||||
fprintf(stdout,"Public Key=");
|
|
||||||
BN_print(out,dsa->pub_key);
|
|
||||||
fprintf(stdout,"\n");
|
|
||||||
}
|
|
||||||
|
|
||||||
if (noout) goto end;
|
|
||||||
BIO_printf(bio_err,"writing DSA key\n");
|
|
||||||
if (outformat == FORMAT_ASN1) {
|
|
||||||
if(pubin || pubout) i=i2d_DSA_PUBKEY_bio(out,dsa);
|
|
||||||
else i=i2d_DSAPrivateKey_bio(out,dsa);
|
|
||||||
} else if (outformat == FORMAT_PEM) {
|
|
||||||
if(pubin || pubout)
|
|
||||||
i=PEM_write_bio_DSA_PUBKEY(out,dsa);
|
|
||||||
else i=PEM_write_bio_DSAPrivateKey(out,dsa,enc,
|
|
||||||
NULL,0,NULL, passout);
|
|
||||||
} else {
|
|
||||||
BIO_printf(bio_err,"bad output format specified for outfile\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
if (!i)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"unable to write private key\n");
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
}
|
|
||||||
else
|
|
||||||
ret=0;
|
|
||||||
end:
|
|
||||||
if(in != NULL) BIO_free(in);
|
|
||||||
if(out != NULL) BIO_free_all(out);
|
|
||||||
if(dsa != NULL) DSA_free(dsa);
|
|
||||||
if(passin) OPENSSL_free(passin);
|
|
||||||
if(passout) OPENSSL_free(passout);
|
|
||||||
apps_shutdown();
|
|
||||||
OPENSSL_EXIT(ret);
|
|
||||||
}
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
721
apps/dsaparam.c
721
apps/dsaparam.c
@@ -56,33 +56,37 @@
|
|||||||
* [including the GNU Public Licence.]
|
* [including the GNU Public Licence.]
|
||||||
*/
|
*/
|
||||||
|
|
||||||
/* Until the key-gen callbacks are modified to use newer prototypes, we allow
|
#include <openssl/opensslconf.h> /* for OPENSSL_NO_DSA */
|
||||||
* deprecated functions for openssl-internal code */
|
/*
|
||||||
|
* Until the key-gen callbacks are modified to use newer prototypes, we allow
|
||||||
|
* deprecated functions for openssl-internal code
|
||||||
|
*/
|
||||||
#ifdef OPENSSL_NO_DEPRECATED
|
#ifdef OPENSSL_NO_DEPRECATED
|
||||||
#undef OPENSSL_NO_DEPRECATED
|
# undef OPENSSL_NO_DEPRECATED
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_DSA
|
#ifndef OPENSSL_NO_DSA
|
||||||
#include <assert.h>
|
# include <assert.h>
|
||||||
#include <stdio.h>
|
# include <stdio.h>
|
||||||
#include <stdlib.h>
|
# include <stdlib.h>
|
||||||
#include <time.h>
|
# include <time.h>
|
||||||
#include <string.h>
|
# include <string.h>
|
||||||
#include "apps.h"
|
# include "apps.h"
|
||||||
#include <openssl/bio.h>
|
# include <openssl/bio.h>
|
||||||
#include <openssl/err.h>
|
# include <openssl/err.h>
|
||||||
#include <openssl/bn.h>
|
# include <openssl/bn.h>
|
||||||
#include <openssl/dsa.h>
|
# include <openssl/dsa.h>
|
||||||
#include <openssl/x509.h>
|
# include <openssl/x509.h>
|
||||||
#include <openssl/pem.h>
|
# include <openssl/pem.h>
|
||||||
|
|
||||||
#undef PROG
|
# undef PROG
|
||||||
#define PROG dsaparam_main
|
# define PROG dsaparam_main
|
||||||
|
|
||||||
/* -inform arg - input format - default PEM (DER or PEM)
|
/*-
|
||||||
|
* -inform arg - input format - default PEM (DER or PEM)
|
||||||
* -outform arg - output format - default PEM
|
* -outform arg - output format - default PEM
|
||||||
* -in arg - input file - default stdin
|
* -in arg - input file - default stdin
|
||||||
* -out arg - output file - default stdout
|
* -out arg - output file - default stdout
|
||||||
* -noout
|
* -noout
|
||||||
* -text
|
* -text
|
||||||
* -C
|
* -C
|
||||||
@@ -93,378 +97,373 @@
|
|||||||
* #endif
|
* #endif
|
||||||
*/
|
*/
|
||||||
|
|
||||||
#ifdef GENCB_TEST
|
# ifdef GENCB_TEST
|
||||||
|
|
||||||
static int stop_keygen_flag = 0;
|
static int stop_keygen_flag = 0;
|
||||||
|
|
||||||
void timebomb_sigalarm(int foo)
|
static void timebomb_sigalarm(int foo)
|
||||||
{
|
{
|
||||||
stop_keygen_flag = 1;
|
stop_keygen_flag = 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
#endif
|
# endif
|
||||||
|
|
||||||
static int MS_CALLBACK dsa_cb(int p, int n, BN_GENCB *cb);
|
static int MS_CALLBACK dsa_cb(int p, int n, BN_GENCB *cb);
|
||||||
|
|
||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
ENGINE *e = NULL;
|
DSA *dsa = NULL;
|
||||||
DSA *dsa=NULL;
|
int i, badops = 0, text = 0;
|
||||||
int i,badops=0,text=0;
|
BIO *in = NULL, *out = NULL;
|
||||||
BIO *in=NULL,*out=NULL;
|
int informat, outformat, noout = 0, C = 0, ret = 1;
|
||||||
int informat,outformat,noout=0,C=0,ret=1;
|
char *infile, *outfile, *prog, *inrand = NULL;
|
||||||
char *infile,*outfile,*prog,*inrand=NULL;
|
int numbits = -1, num, genkey = 0;
|
||||||
int numbits= -1,num,genkey=0;
|
int need_rand = 0;
|
||||||
int need_rand=0;
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
char *engine=NULL;
|
char *engine = NULL;
|
||||||
#ifdef GENCB_TEST
|
# endif
|
||||||
int timebomb=0;
|
# ifdef GENCB_TEST
|
||||||
#endif
|
int timebomb = 0;
|
||||||
|
# endif
|
||||||
|
|
||||||
apps_startup();
|
apps_startup();
|
||||||
|
|
||||||
if (bio_err == NULL)
|
if (bio_err == NULL)
|
||||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
if ((bio_err = BIO_new(BIO_s_file())) != NULL)
|
||||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||||
|
|
||||||
if (!load_config(bio_err, NULL))
|
if (!load_config(bio_err, NULL))
|
||||||
goto end;
|
goto end;
|
||||||
|
|
||||||
infile=NULL;
|
infile = NULL;
|
||||||
outfile=NULL;
|
outfile = NULL;
|
||||||
informat=FORMAT_PEM;
|
informat = FORMAT_PEM;
|
||||||
outformat=FORMAT_PEM;
|
outformat = FORMAT_PEM;
|
||||||
|
|
||||||
prog=argv[0];
|
prog = argv[0];
|
||||||
argc--;
|
argc--;
|
||||||
argv++;
|
argv++;
|
||||||
while (argc >= 1)
|
while (argc >= 1) {
|
||||||
{
|
if (strcmp(*argv, "-inform") == 0) {
|
||||||
if (strcmp(*argv,"-inform") == 0)
|
if (--argc < 1)
|
||||||
{
|
goto bad;
|
||||||
if (--argc < 1) goto bad;
|
informat = str2fmt(*(++argv));
|
||||||
informat=str2fmt(*(++argv));
|
} else if (strcmp(*argv, "-outform") == 0) {
|
||||||
}
|
if (--argc < 1)
|
||||||
else if (strcmp(*argv,"-outform") == 0)
|
goto bad;
|
||||||
{
|
outformat = str2fmt(*(++argv));
|
||||||
if (--argc < 1) goto bad;
|
} else if (strcmp(*argv, "-in") == 0) {
|
||||||
outformat=str2fmt(*(++argv));
|
if (--argc < 1)
|
||||||
}
|
goto bad;
|
||||||
else if (strcmp(*argv,"-in") == 0)
|
infile = *(++argv);
|
||||||
{
|
} else if (strcmp(*argv, "-out") == 0) {
|
||||||
if (--argc < 1) goto bad;
|
if (--argc < 1)
|
||||||
infile= *(++argv);
|
goto bad;
|
||||||
}
|
outfile = *(++argv);
|
||||||
else if (strcmp(*argv,"-out") == 0)
|
}
|
||||||
{
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
if (--argc < 1) goto bad;
|
else if (strcmp(*argv, "-engine") == 0) {
|
||||||
outfile= *(++argv);
|
if (--argc < 1)
|
||||||
}
|
goto bad;
|
||||||
else if(strcmp(*argv, "-engine") == 0)
|
engine = *(++argv);
|
||||||
{
|
}
|
||||||
if (--argc < 1) goto bad;
|
# endif
|
||||||
engine = *(++argv);
|
# ifdef GENCB_TEST
|
||||||
}
|
else if (strcmp(*argv, "-timebomb") == 0) {
|
||||||
#ifdef GENCB_TEST
|
if (--argc < 1)
|
||||||
else if(strcmp(*argv, "-timebomb") == 0)
|
goto bad;
|
||||||
{
|
timebomb = atoi(*(++argv));
|
||||||
if (--argc < 1) goto bad;
|
}
|
||||||
timebomb = atoi(*(++argv));
|
# endif
|
||||||
}
|
else if (strcmp(*argv, "-text") == 0)
|
||||||
#endif
|
text = 1;
|
||||||
else if (strcmp(*argv,"-text") == 0)
|
else if (strcmp(*argv, "-C") == 0)
|
||||||
text=1;
|
C = 1;
|
||||||
else if (strcmp(*argv,"-C") == 0)
|
else if (strcmp(*argv, "-genkey") == 0) {
|
||||||
C=1;
|
genkey = 1;
|
||||||
else if (strcmp(*argv,"-genkey") == 0)
|
need_rand = 1;
|
||||||
{
|
} else if (strcmp(*argv, "-rand") == 0) {
|
||||||
genkey=1;
|
if (--argc < 1)
|
||||||
need_rand=1;
|
goto bad;
|
||||||
}
|
inrand = *(++argv);
|
||||||
else if (strcmp(*argv,"-rand") == 0)
|
need_rand = 1;
|
||||||
{
|
} else if (strcmp(*argv, "-noout") == 0)
|
||||||
if (--argc < 1) goto bad;
|
noout = 1;
|
||||||
inrand= *(++argv);
|
else if (sscanf(*argv, "%d", &num) == 1) {
|
||||||
need_rand=1;
|
/* generate a key */
|
||||||
}
|
numbits = num;
|
||||||
else if (strcmp(*argv,"-noout") == 0)
|
need_rand = 1;
|
||||||
noout=1;
|
} else {
|
||||||
else if (sscanf(*argv,"%d",&num) == 1)
|
BIO_printf(bio_err, "unknown option %s\n", *argv);
|
||||||
{
|
badops = 1;
|
||||||
/* generate a key */
|
break;
|
||||||
numbits=num;
|
}
|
||||||
need_rand=1;
|
argc--;
|
||||||
}
|
argv++;
|
||||||
else
|
}
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"unknown option %s\n",*argv);
|
|
||||||
badops=1;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
argc--;
|
|
||||||
argv++;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (badops)
|
if (badops) {
|
||||||
{
|
bad:
|
||||||
bad:
|
BIO_printf(bio_err, "%s [options] [bits] <infile >outfile\n", prog);
|
||||||
BIO_printf(bio_err,"%s [options] [bits] <infile >outfile\n",prog);
|
BIO_printf(bio_err, "where options are\n");
|
||||||
BIO_printf(bio_err,"where options are\n");
|
BIO_printf(bio_err, " -inform arg input format - DER or PEM\n");
|
||||||
BIO_printf(bio_err," -inform arg input format - DER or PEM\n");
|
BIO_printf(bio_err, " -outform arg output format - DER or PEM\n");
|
||||||
BIO_printf(bio_err," -outform arg output format - DER or PEM\n");
|
BIO_printf(bio_err, " -in arg input file\n");
|
||||||
BIO_printf(bio_err," -in arg input file\n");
|
BIO_printf(bio_err, " -out arg output file\n");
|
||||||
BIO_printf(bio_err," -out arg output file\n");
|
BIO_printf(bio_err, " -text print as text\n");
|
||||||
BIO_printf(bio_err," -text print as text\n");
|
BIO_printf(bio_err, " -C Output C code\n");
|
||||||
BIO_printf(bio_err," -C Output C code\n");
|
BIO_printf(bio_err, " -noout no output\n");
|
||||||
BIO_printf(bio_err," -noout no output\n");
|
BIO_printf(bio_err, " -genkey generate a DSA key\n");
|
||||||
BIO_printf(bio_err," -genkey generate a DSA key\n");
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err," -rand files to use for random number input\n");
|
" -rand files to use for random number input\n");
|
||||||
BIO_printf(bio_err," -engine e use engine e, possibly a hardware device.\n");
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
#ifdef GENCB_TEST
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err," -timebomb n interrupt keygen after <n> seconds\n");
|
" -engine e use engine e, possibly a hardware device.\n");
|
||||||
#endif
|
# endif
|
||||||
BIO_printf(bio_err," number number of bits to use for generating private key\n");
|
# ifdef GENCB_TEST
|
||||||
goto end;
|
BIO_printf(bio_err,
|
||||||
}
|
" -timebomb n interrupt keygen after <n> seconds\n");
|
||||||
|
# endif
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" number number of bits to use for generating private key\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
ERR_load_crypto_strings();
|
ERR_load_crypto_strings();
|
||||||
|
|
||||||
in=BIO_new(BIO_s_file());
|
in = BIO_new(BIO_s_file());
|
||||||
out=BIO_new(BIO_s_file());
|
out = BIO_new(BIO_s_file());
|
||||||
if ((in == NULL) || (out == NULL))
|
if ((in == NULL) || (out == NULL)) {
|
||||||
{
|
ERR_print_errors(bio_err);
|
||||||
ERR_print_errors(bio_err);
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
|
||||||
|
|
||||||
if (infile == NULL)
|
if (infile == NULL)
|
||||||
BIO_set_fp(in,stdin,BIO_NOCLOSE);
|
BIO_set_fp(in, stdin, BIO_NOCLOSE);
|
||||||
else
|
else {
|
||||||
{
|
if (BIO_read_filename(in, infile) <= 0) {
|
||||||
if (BIO_read_filename(in,infile) <= 0)
|
perror(infile);
|
||||||
{
|
goto end;
|
||||||
perror(infile);
|
}
|
||||||
goto end;
|
}
|
||||||
}
|
if (outfile == NULL) {
|
||||||
}
|
BIO_set_fp(out, stdout, BIO_NOCLOSE);
|
||||||
if (outfile == NULL)
|
# ifdef OPENSSL_SYS_VMS
|
||||||
{
|
{
|
||||||
BIO_set_fp(out,stdout,BIO_NOCLOSE);
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
#ifdef OPENSSL_SYS_VMS
|
out = BIO_push(tmpbio, out);
|
||||||
{
|
}
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
# endif
|
||||||
out = BIO_push(tmpbio, out);
|
} else {
|
||||||
}
|
if (BIO_write_filename(out, outfile) <= 0) {
|
||||||
#endif
|
perror(outfile);
|
||||||
}
|
goto end;
|
||||||
else
|
}
|
||||||
{
|
}
|
||||||
if (BIO_write_filename(out,outfile) <= 0)
|
|
||||||
{
|
|
||||||
perror(outfile);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
e = setup_engine(bio_err, engine, 0);
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
|
setup_engine(bio_err, engine, 0);
|
||||||
|
# endif
|
||||||
|
|
||||||
if (need_rand)
|
if (need_rand) {
|
||||||
{
|
app_RAND_load_file(NULL, bio_err, (inrand != NULL));
|
||||||
app_RAND_load_file(NULL, bio_err, (inrand != NULL));
|
if (inrand != NULL)
|
||||||
if (inrand != NULL)
|
BIO_printf(bio_err, "%ld semi-random bytes loaded\n",
|
||||||
BIO_printf(bio_err,"%ld semi-random bytes loaded\n",
|
app_RAND_load_files(inrand));
|
||||||
app_RAND_load_files(inrand));
|
}
|
||||||
}
|
|
||||||
|
|
||||||
if (numbits > 0)
|
if (numbits > 0) {
|
||||||
{
|
BN_GENCB cb;
|
||||||
BN_GENCB cb;
|
BN_GENCB_set(&cb, dsa_cb, bio_err);
|
||||||
cb.ver = 2;
|
assert(need_rand);
|
||||||
cb.cb_2 = dsa_cb;
|
dsa = DSA_new();
|
||||||
cb.arg = bio_err;
|
if (!dsa) {
|
||||||
|
BIO_printf(bio_err, "Error allocating DSA object\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
BIO_printf(bio_err, "Generating DSA parameters, %d bit long prime\n",
|
||||||
|
num);
|
||||||
|
BIO_printf(bio_err, "This could take some time\n");
|
||||||
|
# ifdef GENCB_TEST
|
||||||
|
if (timebomb > 0) {
|
||||||
|
struct sigaction act;
|
||||||
|
act.sa_handler = timebomb_sigalarm;
|
||||||
|
act.sa_flags = 0;
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"(though I'll stop it if not done within %d secs)\n",
|
||||||
|
timebomb);
|
||||||
|
if (sigaction(SIGALRM, &act, NULL) != 0) {
|
||||||
|
BIO_printf(bio_err, "Error, couldn't set SIGALRM handler\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
alarm(timebomb);
|
||||||
|
}
|
||||||
|
# endif
|
||||||
|
if (!DSA_generate_parameters_ex(dsa, num, NULL, 0, NULL, NULL, &cb)) {
|
||||||
|
# ifdef GENCB_TEST
|
||||||
|
if (stop_keygen_flag) {
|
||||||
|
BIO_printf(bio_err, "DSA key generation time-stopped\n");
|
||||||
|
/* This is an asked-for behaviour! */
|
||||||
|
ret = 0;
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
# endif
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
BIO_printf(bio_err, "Error, DSA key generation failed\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
} else if (informat == FORMAT_ASN1)
|
||||||
|
dsa = d2i_DSAparams_bio(in, NULL);
|
||||||
|
else if (informat == FORMAT_PEM)
|
||||||
|
dsa = PEM_read_bio_DSAparams(in, NULL, NULL, NULL);
|
||||||
|
else {
|
||||||
|
BIO_printf(bio_err, "bad input format specified\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
if (dsa == NULL) {
|
||||||
|
BIO_printf(bio_err, "unable to load DSA parameters\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
assert(need_rand);
|
if (text) {
|
||||||
dsa = DSA_new();
|
DSAparams_print(out, dsa);
|
||||||
if(!dsa)
|
}
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"Error allocating DSA object\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
BIO_printf(bio_err,"Generating DSA parameters, %d bit long prime\n",num);
|
|
||||||
BIO_printf(bio_err,"This could take some time\n");
|
|
||||||
#ifdef GENCB_TEST
|
|
||||||
if(timebomb > 0)
|
|
||||||
{
|
|
||||||
struct sigaction act;
|
|
||||||
act.sa_handler = timebomb_sigalarm;
|
|
||||||
act.sa_flags = 0;
|
|
||||||
BIO_printf(bio_err,"(though I'll stop it if not done within %d secs)\n",
|
|
||||||
timebomb);
|
|
||||||
if(sigaction(SIGALRM, &act, NULL) != 0)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"Error, couldn't set SIGALRM handler\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
alarm(timebomb);
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
if(!DSA_generate_parameters_ex(dsa,num,NULL,0,NULL,NULL, &cb))
|
|
||||||
{
|
|
||||||
#ifdef GENCB_TEST
|
|
||||||
if(stop_keygen_flag)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"DSA key generation time-stopped\n");
|
|
||||||
/* This is an asked-for behaviour! */
|
|
||||||
ret = 0;
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
BIO_printf(bio_err,"Error, DSA key generation failed\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
else if (informat == FORMAT_ASN1)
|
|
||||||
dsa=d2i_DSAparams_bio(in,NULL);
|
|
||||||
else if (informat == FORMAT_PEM)
|
|
||||||
dsa=PEM_read_bio_DSAparams(in,NULL,NULL,NULL);
|
|
||||||
else
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"bad input format specified\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
if (dsa == NULL)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"unable to load DSA parameters\n");
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (text)
|
if (C) {
|
||||||
{
|
unsigned char *data;
|
||||||
DSAparams_print(out,dsa);
|
int l, len, bits_p;
|
||||||
}
|
|
||||||
|
|
||||||
if (C)
|
len = BN_num_bytes(dsa->p);
|
||||||
{
|
bits_p = BN_num_bits(dsa->p);
|
||||||
unsigned char *data;
|
data = (unsigned char *)OPENSSL_malloc(len + 20);
|
||||||
int l,len,bits_p,bits_q,bits_g;
|
if (data == NULL) {
|
||||||
|
perror("OPENSSL_malloc");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
l = BN_bn2bin(dsa->p, data);
|
||||||
|
printf("static unsigned char dsa%d_p[]={", bits_p);
|
||||||
|
for (i = 0; i < l; i++) {
|
||||||
|
if ((i % 12) == 0)
|
||||||
|
printf("\n\t");
|
||||||
|
printf("0x%02X,", data[i]);
|
||||||
|
}
|
||||||
|
printf("\n\t};\n");
|
||||||
|
|
||||||
len=BN_num_bytes(dsa->p);
|
l = BN_bn2bin(dsa->q, data);
|
||||||
bits_p=BN_num_bits(dsa->p);
|
printf("static unsigned char dsa%d_q[]={", bits_p);
|
||||||
bits_q=BN_num_bits(dsa->q);
|
for (i = 0; i < l; i++) {
|
||||||
bits_g=BN_num_bits(dsa->g);
|
if ((i % 12) == 0)
|
||||||
data=(unsigned char *)OPENSSL_malloc(len+20);
|
printf("\n\t");
|
||||||
if (data == NULL)
|
printf("0x%02X,", data[i]);
|
||||||
{
|
}
|
||||||
perror("OPENSSL_malloc");
|
printf("\n\t};\n");
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
l=BN_bn2bin(dsa->p,data);
|
|
||||||
printf("static unsigned char dsa%d_p[]={",bits_p);
|
|
||||||
for (i=0; i<l; i++)
|
|
||||||
{
|
|
||||||
if ((i%12) == 0) printf("\n\t");
|
|
||||||
printf("0x%02X,",data[i]);
|
|
||||||
}
|
|
||||||
printf("\n\t};\n");
|
|
||||||
|
|
||||||
l=BN_bn2bin(dsa->q,data);
|
l = BN_bn2bin(dsa->g, data);
|
||||||
printf("static unsigned char dsa%d_q[]={",bits_p);
|
printf("static unsigned char dsa%d_g[]={", bits_p);
|
||||||
for (i=0; i<l; i++)
|
for (i = 0; i < l; i++) {
|
||||||
{
|
if ((i % 12) == 0)
|
||||||
if ((i%12) == 0) printf("\n\t");
|
printf("\n\t");
|
||||||
printf("0x%02X,",data[i]);
|
printf("0x%02X,", data[i]);
|
||||||
}
|
}
|
||||||
printf("\n\t};\n");
|
printf("\n\t};\n\n");
|
||||||
|
|
||||||
l=BN_bn2bin(dsa->g,data);
|
printf("DSA *get_dsa%d()\n\t{\n", bits_p);
|
||||||
printf("static unsigned char dsa%d_g[]={",bits_p);
|
printf("\tDSA *dsa;\n\n");
|
||||||
for (i=0; i<l; i++)
|
printf("\tif ((dsa=DSA_new()) == NULL) return(NULL);\n");
|
||||||
{
|
printf("\tdsa->p=BN_bin2bn(dsa%d_p,sizeof(dsa%d_p),NULL);\n",
|
||||||
if ((i%12) == 0) printf("\n\t");
|
bits_p, bits_p);
|
||||||
printf("0x%02X,",data[i]);
|
printf("\tdsa->q=BN_bin2bn(dsa%d_q,sizeof(dsa%d_q),NULL);\n",
|
||||||
}
|
bits_p, bits_p);
|
||||||
printf("\n\t};\n\n");
|
printf("\tdsa->g=BN_bin2bn(dsa%d_g,sizeof(dsa%d_g),NULL);\n",
|
||||||
|
bits_p, bits_p);
|
||||||
|
printf
|
||||||
|
("\tif ((dsa->p == NULL) || (dsa->q == NULL) || (dsa->g == NULL))\n");
|
||||||
|
printf("\t\t{ DSA_free(dsa); return(NULL); }\n");
|
||||||
|
printf("\treturn(dsa);\n\t}\n");
|
||||||
|
}
|
||||||
|
|
||||||
printf("DSA *get_dsa%d()\n\t{\n",bits_p);
|
if (!noout) {
|
||||||
printf("\tDSA *dsa;\n\n");
|
if (outformat == FORMAT_ASN1)
|
||||||
printf("\tif ((dsa=DSA_new()) == NULL) return(NULL);\n");
|
i = i2d_DSAparams_bio(out, dsa);
|
||||||
printf("\tdsa->p=BN_bin2bn(dsa%d_p,sizeof(dsa%d_p),NULL);\n",
|
else if (outformat == FORMAT_PEM)
|
||||||
bits_p,bits_p);
|
i = PEM_write_bio_DSAparams(out, dsa);
|
||||||
printf("\tdsa->q=BN_bin2bn(dsa%d_q,sizeof(dsa%d_q),NULL);\n",
|
else {
|
||||||
bits_p,bits_p);
|
BIO_printf(bio_err, "bad output format specified for outfile\n");
|
||||||
printf("\tdsa->g=BN_bin2bn(dsa%d_g,sizeof(dsa%d_g),NULL);\n",
|
goto end;
|
||||||
bits_p,bits_p);
|
}
|
||||||
printf("\tif ((dsa->p == NULL) || (dsa->q == NULL) || (dsa->g == NULL))\n");
|
if (!i) {
|
||||||
printf("\t\t{ DSA_free(dsa); return(NULL); }\n");
|
BIO_printf(bio_err, "unable to write DSA parameters\n");
|
||||||
printf("\treturn(dsa);\n\t}\n");
|
ERR_print_errors(bio_err);
|
||||||
}
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (genkey) {
|
||||||
|
DSA *dsakey;
|
||||||
|
|
||||||
|
assert(need_rand);
|
||||||
if (!noout)
|
if ((dsakey = DSAparams_dup(dsa)) == NULL)
|
||||||
{
|
goto end;
|
||||||
if (outformat == FORMAT_ASN1)
|
if (!DSA_generate_key(dsakey)) {
|
||||||
i=i2d_DSAparams_bio(out,dsa);
|
ERR_print_errors(bio_err);
|
||||||
else if (outformat == FORMAT_PEM)
|
DSA_free(dsakey);
|
||||||
i=PEM_write_bio_DSAparams(out,dsa);
|
goto end;
|
||||||
else {
|
}
|
||||||
BIO_printf(bio_err,"bad output format specified for outfile\n");
|
if (outformat == FORMAT_ASN1)
|
||||||
goto end;
|
i = i2d_DSAPrivateKey_bio(out, dsakey);
|
||||||
}
|
else if (outformat == FORMAT_PEM)
|
||||||
if (!i)
|
i = PEM_write_bio_DSAPrivateKey(out, dsakey, NULL, NULL, 0, NULL,
|
||||||
{
|
NULL);
|
||||||
BIO_printf(bio_err,"unable to write DSA parameters\n");
|
else {
|
||||||
ERR_print_errors(bio_err);
|
BIO_printf(bio_err, "bad output format specified for outfile\n");
|
||||||
goto end;
|
DSA_free(dsakey);
|
||||||
}
|
goto end;
|
||||||
}
|
}
|
||||||
if (genkey)
|
DSA_free(dsakey);
|
||||||
{
|
}
|
||||||
DSA *dsakey;
|
if (need_rand)
|
||||||
|
app_RAND_write_file(NULL, bio_err);
|
||||||
assert(need_rand);
|
ret = 0;
|
||||||
if ((dsakey=DSAparams_dup(dsa)) == NULL) goto end;
|
end:
|
||||||
if (!DSA_generate_key(dsakey)) goto end;
|
if (in != NULL)
|
||||||
if (outformat == FORMAT_ASN1)
|
BIO_free(in);
|
||||||
i=i2d_DSAPrivateKey_bio(out,dsakey);
|
if (out != NULL)
|
||||||
else if (outformat == FORMAT_PEM)
|
BIO_free_all(out);
|
||||||
i=PEM_write_bio_DSAPrivateKey(out,dsakey,NULL,NULL,0,NULL,NULL);
|
if (dsa != NULL)
|
||||||
else {
|
DSA_free(dsa);
|
||||||
BIO_printf(bio_err,"bad output format specified for outfile\n");
|
apps_shutdown();
|
||||||
goto end;
|
OPENSSL_EXIT(ret);
|
||||||
}
|
}
|
||||||
DSA_free(dsakey);
|
|
||||||
}
|
|
||||||
if (need_rand)
|
|
||||||
app_RAND_write_file(NULL, bio_err);
|
|
||||||
ret=0;
|
|
||||||
end:
|
|
||||||
if (in != NULL) BIO_free(in);
|
|
||||||
if (out != NULL) BIO_free_all(out);
|
|
||||||
if (dsa != NULL) DSA_free(dsa);
|
|
||||||
apps_shutdown();
|
|
||||||
OPENSSL_EXIT(ret);
|
|
||||||
}
|
|
||||||
|
|
||||||
static int MS_CALLBACK dsa_cb(int p, int n, BN_GENCB *cb)
|
static int MS_CALLBACK dsa_cb(int p, int n, BN_GENCB *cb)
|
||||||
{
|
{
|
||||||
char c='*';
|
char c = '*';
|
||||||
|
|
||||||
|
if (p == 0)
|
||||||
|
c = '.';
|
||||||
|
if (p == 1)
|
||||||
|
c = '+';
|
||||||
|
if (p == 2)
|
||||||
|
c = '*';
|
||||||
|
if (p == 3)
|
||||||
|
c = '\n';
|
||||||
|
BIO_write(cb->arg, &c, 1);
|
||||||
|
(void)BIO_flush(cb->arg);
|
||||||
|
# ifdef LINT
|
||||||
|
p = n;
|
||||||
|
# endif
|
||||||
|
# ifdef GENCB_TEST
|
||||||
|
if (stop_keygen_flag)
|
||||||
|
return 0;
|
||||||
|
# endif
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
#else /* !OPENSSL_NO_DSA */
|
||||||
|
|
||||||
|
# if PEDANTIC
|
||||||
|
static void *dummy = &dummy;
|
||||||
|
# endif
|
||||||
|
|
||||||
if (p == 0) c='.';
|
|
||||||
if (p == 1) c='+';
|
|
||||||
if (p == 2) c='*';
|
|
||||||
if (p == 3) c='\n';
|
|
||||||
BIO_write(cb->arg,&c,1);
|
|
||||||
(void)BIO_flush(cb->arg);
|
|
||||||
#ifdef LINT
|
|
||||||
p=n;
|
|
||||||
#endif
|
|
||||||
#ifdef GENCB_TEST
|
|
||||||
if(stop_keygen_flag)
|
|
||||||
return 0;
|
|
||||||
#endif
|
|
||||||
return 1;
|
|
||||||
}
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
570
apps/ec.c
570
apps/ec.c
@@ -3,7 +3,7 @@
|
|||||||
* Written by Nils Larsch for the OpenSSL project.
|
* Written by Nils Larsch for the OpenSSL project.
|
||||||
*/
|
*/
|
||||||
/* ====================================================================
|
/* ====================================================================
|
||||||
* Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved.
|
* Copyright (c) 1998-2005 The OpenSSL Project. All rights reserved.
|
||||||
*
|
*
|
||||||
* Redistribution and use in source and binary forms, with or without
|
* Redistribution and use in source and binary forms, with or without
|
||||||
* modification, are permitted provided that the following conditions
|
* modification, are permitted provided that the following conditions
|
||||||
@@ -56,20 +56,22 @@
|
|||||||
*
|
*
|
||||||
*/
|
*/
|
||||||
|
|
||||||
|
#include <openssl/opensslconf.h>
|
||||||
#ifndef OPENSSL_NO_EC
|
#ifndef OPENSSL_NO_EC
|
||||||
#include <stdio.h>
|
# include <stdio.h>
|
||||||
#include <stdlib.h>
|
# include <stdlib.h>
|
||||||
#include <string.h>
|
# include <string.h>
|
||||||
#include "apps.h"
|
# include "apps.h"
|
||||||
#include <openssl/bio.h>
|
# include <openssl/bio.h>
|
||||||
#include <openssl/err.h>
|
# include <openssl/err.h>
|
||||||
#include <openssl/evp.h>
|
# include <openssl/evp.h>
|
||||||
#include <openssl/pem.h>
|
# include <openssl/pem.h>
|
||||||
|
|
||||||
#undef PROG
|
# undef PROG
|
||||||
#define PROG ec_main
|
# define PROG ec_main
|
||||||
|
|
||||||
/* -inform arg - input format - default PEM (one of DER, NET or PEM)
|
/*-
|
||||||
|
* -inform arg - input format - default PEM (one of DER, NET or PEM)
|
||||||
* -outform arg - output format - default PEM
|
* -outform arg - output format - default PEM
|
||||||
* -in arg - input file - default stdin
|
* -in arg - input file - default stdin
|
||||||
* -out arg - output file - default stdout
|
* -out arg - output file - default stdout
|
||||||
@@ -84,312 +86,280 @@ int MAIN(int, char **);
|
|||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
ENGINE *e = NULL;
|
int ret = 1;
|
||||||
int ret = 1;
|
EC_KEY *eckey = NULL;
|
||||||
EC_KEY *eckey = NULL;
|
const EC_GROUP *group;
|
||||||
int i, badops = 0;
|
int i, badops = 0;
|
||||||
const EVP_CIPHER *enc = NULL;
|
const EVP_CIPHER *enc = NULL;
|
||||||
BIO *in = NULL, *out = NULL;
|
BIO *in = NULL, *out = NULL;
|
||||||
int informat, outformat, text=0, noout=0;
|
int informat, outformat, text = 0, noout = 0;
|
||||||
int pubin = 0, pubout = 0, param_out = 0;
|
int pubin = 0, pubout = 0, param_out = 0;
|
||||||
char *infile, *outfile, *prog, *engine;
|
char *infile, *outfile, *prog, *engine;
|
||||||
char *passargin = NULL, *passargout = NULL;
|
char *passargin = NULL, *passargout = NULL;
|
||||||
char *passin = NULL, *passout = NULL;
|
char *passin = NULL, *passout = NULL;
|
||||||
point_conversion_form_t form = POINT_CONVERSION_UNCOMPRESSED;
|
point_conversion_form_t form = POINT_CONVERSION_UNCOMPRESSED;
|
||||||
int new_form = 0;
|
int new_form = 0;
|
||||||
int asn1_flag = OPENSSL_EC_NAMED_CURVE;
|
int asn1_flag = OPENSSL_EC_NAMED_CURVE;
|
||||||
int new_asn1_flag = 0;
|
int new_asn1_flag = 0;
|
||||||
|
|
||||||
apps_startup();
|
apps_startup();
|
||||||
|
|
||||||
if (bio_err == NULL)
|
if (bio_err == NULL)
|
||||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
if ((bio_err = BIO_new(BIO_s_file())) != NULL)
|
||||||
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE|BIO_FP_TEXT);
|
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||||
|
|
||||||
if (!load_config(bio_err, NULL))
|
if (!load_config(bio_err, NULL))
|
||||||
goto end;
|
goto end;
|
||||||
|
|
||||||
engine = NULL;
|
engine = NULL;
|
||||||
infile = NULL;
|
infile = NULL;
|
||||||
outfile = NULL;
|
outfile = NULL;
|
||||||
informat = FORMAT_PEM;
|
informat = FORMAT_PEM;
|
||||||
outformat = FORMAT_PEM;
|
outformat = FORMAT_PEM;
|
||||||
|
|
||||||
prog = argv[0];
|
prog = argv[0];
|
||||||
argc--;
|
argc--;
|
||||||
argv++;
|
argv++;
|
||||||
while (argc >= 1)
|
while (argc >= 1) {
|
||||||
{
|
if (strcmp(*argv, "-inform") == 0) {
|
||||||
if (strcmp(*argv,"-inform") == 0)
|
if (--argc < 1)
|
||||||
{
|
goto bad;
|
||||||
if (--argc < 1) goto bad;
|
informat = str2fmt(*(++argv));
|
||||||
informat=str2fmt(*(++argv));
|
} else if (strcmp(*argv, "-outform") == 0) {
|
||||||
}
|
if (--argc < 1)
|
||||||
else if (strcmp(*argv,"-outform") == 0)
|
goto bad;
|
||||||
{
|
outformat = str2fmt(*(++argv));
|
||||||
if (--argc < 1) goto bad;
|
} else if (strcmp(*argv, "-in") == 0) {
|
||||||
outformat=str2fmt(*(++argv));
|
if (--argc < 1)
|
||||||
}
|
goto bad;
|
||||||
else if (strcmp(*argv,"-in") == 0)
|
infile = *(++argv);
|
||||||
{
|
} else if (strcmp(*argv, "-out") == 0) {
|
||||||
if (--argc < 1) goto bad;
|
if (--argc < 1)
|
||||||
infile= *(++argv);
|
goto bad;
|
||||||
}
|
outfile = *(++argv);
|
||||||
else if (strcmp(*argv,"-out") == 0)
|
} else if (strcmp(*argv, "-passin") == 0) {
|
||||||
{
|
if (--argc < 1)
|
||||||
if (--argc < 1) goto bad;
|
goto bad;
|
||||||
outfile= *(++argv);
|
passargin = *(++argv);
|
||||||
}
|
} else if (strcmp(*argv, "-passout") == 0) {
|
||||||
else if (strcmp(*argv,"-passin") == 0)
|
if (--argc < 1)
|
||||||
{
|
goto bad;
|
||||||
if (--argc < 1) goto bad;
|
passargout = *(++argv);
|
||||||
passargin= *(++argv);
|
} else if (strcmp(*argv, "-engine") == 0) {
|
||||||
}
|
if (--argc < 1)
|
||||||
else if (strcmp(*argv,"-passout") == 0)
|
goto bad;
|
||||||
{
|
engine = *(++argv);
|
||||||
if (--argc < 1) goto bad;
|
} else if (strcmp(*argv, "-noout") == 0)
|
||||||
passargout= *(++argv);
|
noout = 1;
|
||||||
}
|
else if (strcmp(*argv, "-text") == 0)
|
||||||
else if (strcmp(*argv, "-engine") == 0)
|
text = 1;
|
||||||
{
|
else if (strcmp(*argv, "-conv_form") == 0) {
|
||||||
if (--argc < 1) goto bad;
|
if (--argc < 1)
|
||||||
engine= *(++argv);
|
goto bad;
|
||||||
}
|
++argv;
|
||||||
else if (strcmp(*argv, "-noout") == 0)
|
new_form = 1;
|
||||||
noout = 1;
|
if (strcmp(*argv, "compressed") == 0)
|
||||||
else if (strcmp(*argv, "-text") == 0)
|
form = POINT_CONVERSION_COMPRESSED;
|
||||||
text = 1;
|
else if (strcmp(*argv, "uncompressed") == 0)
|
||||||
else if (strcmp(*argv, "-conv_form") == 0)
|
form = POINT_CONVERSION_UNCOMPRESSED;
|
||||||
{
|
else if (strcmp(*argv, "hybrid") == 0)
|
||||||
if (--argc < 1)
|
form = POINT_CONVERSION_HYBRID;
|
||||||
goto bad;
|
else
|
||||||
++argv;
|
goto bad;
|
||||||
new_form = 1;
|
} else if (strcmp(*argv, "-param_enc") == 0) {
|
||||||
if (strcmp(*argv, "compressed") == 0)
|
if (--argc < 1)
|
||||||
form = POINT_CONVERSION_COMPRESSED;
|
goto bad;
|
||||||
else if (strcmp(*argv, "uncompressed") == 0)
|
++argv;
|
||||||
form = POINT_CONVERSION_UNCOMPRESSED;
|
new_asn1_flag = 1;
|
||||||
else if (strcmp(*argv, "hybrid") == 0)
|
if (strcmp(*argv, "named_curve") == 0)
|
||||||
form = POINT_CONVERSION_HYBRID;
|
asn1_flag = OPENSSL_EC_NAMED_CURVE;
|
||||||
else
|
else if (strcmp(*argv, "explicit") == 0)
|
||||||
goto bad;
|
asn1_flag = 0;
|
||||||
}
|
else
|
||||||
else if (strcmp(*argv, "-param_enc") == 0)
|
goto bad;
|
||||||
{
|
} else if (strcmp(*argv, "-param_out") == 0)
|
||||||
if (--argc < 1)
|
param_out = 1;
|
||||||
goto bad;
|
else if (strcmp(*argv, "-pubin") == 0)
|
||||||
++argv;
|
pubin = 1;
|
||||||
new_asn1_flag = 1;
|
else if (strcmp(*argv, "-pubout") == 0)
|
||||||
if (strcmp(*argv, "named_curve") == 0)
|
pubout = 1;
|
||||||
asn1_flag = OPENSSL_EC_NAMED_CURVE;
|
else if ((enc = EVP_get_cipherbyname(&(argv[0][1]))) == NULL) {
|
||||||
else if (strcmp(*argv, "explicit") == 0)
|
BIO_printf(bio_err, "unknown option %s\n", *argv);
|
||||||
asn1_flag = 0;
|
badops = 1;
|
||||||
else
|
break;
|
||||||
goto bad;
|
}
|
||||||
}
|
argc--;
|
||||||
else if (strcmp(*argv, "-param_out") == 0)
|
argv++;
|
||||||
param_out = 1;
|
}
|
||||||
else if (strcmp(*argv, "-pubin") == 0)
|
|
||||||
pubin=1;
|
|
||||||
else if (strcmp(*argv, "-pubout") == 0)
|
|
||||||
pubout=1;
|
|
||||||
else if ((enc=EVP_get_cipherbyname(&(argv[0][1]))) == NULL)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err, "unknown option %s\n", *argv);
|
|
||||||
badops=1;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
argc--;
|
|
||||||
argv++;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (badops)
|
if (badops) {
|
||||||
{
|
bad:
|
||||||
bad:
|
BIO_printf(bio_err, "%s [options] <infile >outfile\n", prog);
|
||||||
BIO_printf(bio_err, "%s [options] <infile >outfile\n", prog);
|
BIO_printf(bio_err, "where options are\n");
|
||||||
BIO_printf(bio_err, "where options are\n");
|
BIO_printf(bio_err, " -inform arg input format - "
|
||||||
BIO_printf(bio_err, " -inform arg input format - "
|
"DER or PEM\n");
|
||||||
"DER or PEM\n");
|
BIO_printf(bio_err, " -outform arg output format - "
|
||||||
BIO_printf(bio_err, " -outform arg output format - "
|
"DER or PEM\n");
|
||||||
"DER or PEM\n");
|
BIO_printf(bio_err, " -in arg input file\n");
|
||||||
BIO_printf(bio_err, " -in arg input file\n");
|
BIO_printf(bio_err, " -passin arg input file pass "
|
||||||
BIO_printf(bio_err, " -passin arg input file pass "
|
"phrase source\n");
|
||||||
"phrase source\n");
|
BIO_printf(bio_err, " -out arg output file\n");
|
||||||
BIO_printf(bio_err, " -out arg output file\n");
|
BIO_printf(bio_err, " -passout arg output file pass "
|
||||||
BIO_printf(bio_err, " -passout arg output file pass "
|
"phrase source\n");
|
||||||
"phrase source\n");
|
BIO_printf(bio_err, " -engine e use engine e, "
|
||||||
BIO_printf(bio_err, " -engine e use engine e, "
|
"possibly a hardware device.\n");
|
||||||
"possibly a hardware device.\n");
|
BIO_printf(bio_err, " -des encrypt PEM output, "
|
||||||
BIO_printf(bio_err, " -des encrypt PEM output, "
|
"instead of 'des' every other \n"
|
||||||
"instead of 'des' every other \n"
|
" cipher "
|
||||||
" cipher "
|
"supported by OpenSSL can be used\n");
|
||||||
"supported by OpenSSL can be used\n");
|
BIO_printf(bio_err, " -text print the key\n");
|
||||||
BIO_printf(bio_err, " -text print the key\n");
|
BIO_printf(bio_err, " -noout don't print key out\n");
|
||||||
BIO_printf(bio_err, " -noout don't print key out\n");
|
BIO_printf(bio_err, " -param_out print the elliptic "
|
||||||
BIO_printf(bio_err, " -param_out print the elliptic "
|
"curve parameters\n");
|
||||||
"curve parameters\n");
|
BIO_printf(bio_err, " -conv_form arg specifies the "
|
||||||
BIO_printf(bio_err, " -conv_form arg specifies the "
|
"point conversion form \n");
|
||||||
"point conversion form \n");
|
BIO_printf(bio_err, " possible values:"
|
||||||
BIO_printf(bio_err, " possible values:"
|
" compressed\n");
|
||||||
" compressed\n");
|
BIO_printf(bio_err, " "
|
||||||
BIO_printf(bio_err, " "
|
" uncompressed (default)\n");
|
||||||
" uncompressed (default)\n");
|
BIO_printf(bio_err, " " " hybrid\n");
|
||||||
BIO_printf(bio_err, " "
|
BIO_printf(bio_err, " -param_enc arg specifies the way"
|
||||||
" hybrid\n");
|
" the ec parameters are encoded\n");
|
||||||
BIO_printf(bio_err, " -param_enc arg specifies the way"
|
BIO_printf(bio_err, " in the asn1 der " "encoding\n");
|
||||||
" the ec parameters are encoded\n");
|
BIO_printf(bio_err, " possible values:"
|
||||||
BIO_printf(bio_err, " in the asn1 der "
|
" named_curve (default)\n");
|
||||||
"encoding\n");
|
BIO_printf(bio_err, " "
|
||||||
BIO_printf(bio_err, " possilbe values:"
|
"explicit\n");
|
||||||
" named_curve (default)\n");
|
goto end;
|
||||||
BIO_printf(bio_err," "
|
}
|
||||||
"explicit\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
ERR_load_crypto_strings();
|
ERR_load_crypto_strings();
|
||||||
|
|
||||||
e = setup_engine(bio_err, engine, 0);
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
|
setup_engine(bio_err, engine, 0);
|
||||||
|
# endif
|
||||||
|
|
||||||
if(!app_passwd(bio_err, passargin, passargout, &passin, &passout))
|
if (!app_passwd(bio_err, passargin, passargout, &passin, &passout)) {
|
||||||
{
|
BIO_printf(bio_err, "Error getting passwords\n");
|
||||||
BIO_printf(bio_err, "Error getting passwords\n");
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
|
||||||
|
|
||||||
in = BIO_new(BIO_s_file());
|
in = BIO_new(BIO_s_file());
|
||||||
out = BIO_new(BIO_s_file());
|
out = BIO_new(BIO_s_file());
|
||||||
if ((in == NULL) || (out == NULL))
|
if ((in == NULL) || (out == NULL)) {
|
||||||
{
|
ERR_print_errors(bio_err);
|
||||||
ERR_print_errors(bio_err);
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
|
||||||
|
|
||||||
if (infile == NULL)
|
if (infile == NULL)
|
||||||
BIO_set_fp(in, stdin, BIO_NOCLOSE);
|
BIO_set_fp(in, stdin, BIO_NOCLOSE);
|
||||||
else
|
else {
|
||||||
{
|
if (BIO_read_filename(in, infile) <= 0) {
|
||||||
if (BIO_read_filename(in, infile) <= 0)
|
perror(infile);
|
||||||
{
|
goto end;
|
||||||
perror(infile);
|
}
|
||||||
goto end;
|
}
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
BIO_printf(bio_err, "read EC key\n");
|
BIO_printf(bio_err, "read EC key\n");
|
||||||
if (informat == FORMAT_ASN1)
|
if (informat == FORMAT_ASN1) {
|
||||||
{
|
if (pubin)
|
||||||
if (pubin)
|
eckey = d2i_EC_PUBKEY_bio(in, NULL);
|
||||||
eckey = d2i_EC_PUBKEY_bio(in, NULL);
|
else
|
||||||
else
|
eckey = d2i_ECPrivateKey_bio(in, NULL);
|
||||||
eckey = d2i_ECPrivateKey_bio(in, NULL);
|
} else if (informat == FORMAT_PEM) {
|
||||||
}
|
if (pubin)
|
||||||
else if (informat == FORMAT_PEM)
|
eckey = PEM_read_bio_EC_PUBKEY(in, NULL, NULL, NULL);
|
||||||
{
|
else
|
||||||
if (pubin)
|
eckey = PEM_read_bio_ECPrivateKey(in, NULL, NULL, passin);
|
||||||
eckey = PEM_read_bio_EC_PUBKEY(in, NULL, NULL,
|
} else {
|
||||||
NULL);
|
BIO_printf(bio_err, "bad input format specified for key\n");
|
||||||
else
|
goto end;
|
||||||
eckey = PEM_read_bio_ECPrivateKey(in, NULL, NULL,
|
}
|
||||||
passin);
|
if (eckey == NULL) {
|
||||||
}
|
BIO_printf(bio_err, "unable to load Key\n");
|
||||||
else
|
ERR_print_errors(bio_err);
|
||||||
{
|
goto end;
|
||||||
BIO_printf(bio_err, "bad input format specified for key\n");
|
}
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
if (eckey == NULL)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"unable to load Key\n");
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (outfile == NULL)
|
if (outfile == NULL) {
|
||||||
{
|
BIO_set_fp(out, stdout, BIO_NOCLOSE);
|
||||||
BIO_set_fp(out, stdout, BIO_NOCLOSE);
|
# ifdef OPENSSL_SYS_VMS
|
||||||
#ifdef OPENSSL_SYS_VMS
|
{
|
||||||
{
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
out = BIO_push(tmpbio, out);
|
||||||
out = BIO_push(tmpbio, out);
|
}
|
||||||
}
|
# endif
|
||||||
#endif
|
} else {
|
||||||
}
|
if (BIO_write_filename(out, outfile) <= 0) {
|
||||||
else
|
perror(outfile);
|
||||||
{
|
goto end;
|
||||||
if (BIO_write_filename(out, outfile) <= 0)
|
}
|
||||||
{
|
}
|
||||||
perror(outfile);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (new_form)
|
group = EC_KEY_get0_group(eckey);
|
||||||
{
|
|
||||||
EC_GROUP_set_point_conversion_form(eckey->group, form);
|
|
||||||
eckey->conv_form = form;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (new_asn1_flag)
|
if (new_form)
|
||||||
EC_GROUP_set_asn1_flag(eckey->group, asn1_flag);
|
EC_KEY_set_conv_form(eckey, form);
|
||||||
|
|
||||||
if (text)
|
if (new_asn1_flag)
|
||||||
if (!EC_KEY_print(out, eckey, 0))
|
EC_KEY_set_asn1_flag(eckey, asn1_flag);
|
||||||
{
|
|
||||||
perror(outfile);
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (noout)
|
if (text)
|
||||||
goto end;
|
if (!EC_KEY_print(out, eckey, 0)) {
|
||||||
|
perror(outfile);
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
BIO_printf(bio_err, "writing EC key\n");
|
if (noout) {
|
||||||
if (outformat == FORMAT_ASN1)
|
ret = 0;
|
||||||
{
|
goto end;
|
||||||
if (param_out)
|
}
|
||||||
i = i2d_ECPKParameters_bio(out, eckey->group);
|
|
||||||
else if (pubin || pubout)
|
|
||||||
i = i2d_EC_PUBKEY_bio(out, eckey);
|
|
||||||
else
|
|
||||||
i = i2d_ECPrivateKey_bio(out, eckey);
|
|
||||||
}
|
|
||||||
else if (outformat == FORMAT_PEM)
|
|
||||||
{
|
|
||||||
if (param_out)
|
|
||||||
i = PEM_write_bio_ECPKParameters(out, eckey->group);
|
|
||||||
else if (pubin || pubout)
|
|
||||||
i = PEM_write_bio_EC_PUBKEY(out, eckey);
|
|
||||||
else
|
|
||||||
i = PEM_write_bio_ECPrivateKey(out, eckey, enc,
|
|
||||||
NULL, 0, NULL, passout);
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err, "bad output format specified for "
|
|
||||||
"outfile\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!i)
|
BIO_printf(bio_err, "writing EC key\n");
|
||||||
{
|
if (outformat == FORMAT_ASN1) {
|
||||||
BIO_printf(bio_err, "unable to write private key\n");
|
if (param_out)
|
||||||
ERR_print_errors(bio_err);
|
i = i2d_ECPKParameters_bio(out, group);
|
||||||
}
|
else if (pubin || pubout)
|
||||||
else
|
i = i2d_EC_PUBKEY_bio(out, eckey);
|
||||||
ret=0;
|
else
|
||||||
end:
|
i = i2d_ECPrivateKey_bio(out, eckey);
|
||||||
if (in)
|
} else if (outformat == FORMAT_PEM) {
|
||||||
BIO_free(in);
|
if (param_out)
|
||||||
if (out)
|
i = PEM_write_bio_ECPKParameters(out, group);
|
||||||
BIO_free_all(out);
|
else if (pubin || pubout)
|
||||||
if (eckey)
|
i = PEM_write_bio_EC_PUBKEY(out, eckey);
|
||||||
EC_KEY_free(eckey);
|
else
|
||||||
if (passin)
|
i = PEM_write_bio_ECPrivateKey(out, eckey, enc,
|
||||||
OPENSSL_free(passin);
|
NULL, 0, NULL, passout);
|
||||||
if (passout)
|
} else {
|
||||||
OPENSSL_free(passout);
|
BIO_printf(bio_err, "bad output format specified for " "outfile\n");
|
||||||
apps_shutdown();
|
goto end;
|
||||||
OPENSSL_EXIT(ret);
|
}
|
||||||
|
|
||||||
|
if (!i) {
|
||||||
|
BIO_printf(bio_err, "unable to write private key\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
} else
|
||||||
|
ret = 0;
|
||||||
|
end:
|
||||||
|
if (in)
|
||||||
|
BIO_free(in);
|
||||||
|
if (out)
|
||||||
|
BIO_free_all(out);
|
||||||
|
if (eckey)
|
||||||
|
EC_KEY_free(eckey);
|
||||||
|
if (passin)
|
||||||
|
OPENSSL_free(passin);
|
||||||
|
if (passout)
|
||||||
|
OPENSSL_free(passout);
|
||||||
|
apps_shutdown();
|
||||||
|
OPENSSL_EXIT(ret);
|
||||||
}
|
}
|
||||||
|
#else /* !OPENSSL_NO_EC */
|
||||||
|
|
||||||
|
# if PEDANTIC
|
||||||
|
static void *dummy = &dummy;
|
||||||
|
# endif
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
1060
apps/ecparam.c
1060
apps/ecparam.c
File diff suppressed because it is too large
Load Diff
1149
apps/enc.c
1149
apps/enc.c
File diff suppressed because it is too large
Load Diff
855
apps/engine.c
855
apps/engine.c
@@ -1,6 +1,7 @@
|
|||||||
/* apps/engine.c -*- mode: C; c-file-style: "eay" -*- */
|
/* apps/engine.c -*- mode: C; c-file-style: "eay" -*- */
|
||||||
/* Written by Richard Levitte <richard@levitte.org> for the OpenSSL
|
/*
|
||||||
* project 2000.
|
* Written by Richard Levitte <richard@levitte.org> for the OpenSSL project
|
||||||
|
* 2000.
|
||||||
*/
|
*/
|
||||||
/* ====================================================================
|
/* ====================================================================
|
||||||
* Copyright (c) 2000 The OpenSSL Project. All rights reserved.
|
* Copyright (c) 2000 The OpenSSL Project. All rights reserved.
|
||||||
@@ -60,461 +61,457 @@
|
|||||||
#include <stdlib.h>
|
#include <stdlib.h>
|
||||||
#include <string.h>
|
#include <string.h>
|
||||||
#ifdef OPENSSL_NO_STDIO
|
#ifdef OPENSSL_NO_STDIO
|
||||||
#define APPS_WIN16
|
# define APPS_WIN16
|
||||||
#endif
|
#endif
|
||||||
#include "apps.h"
|
#include "apps.h"
|
||||||
#include <openssl/err.h>
|
#include <openssl/err.h>
|
||||||
#include <openssl/engine.h>
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
#include <openssl/ssl.h>
|
# include <openssl/engine.h>
|
||||||
|
# include <openssl/ssl.h>
|
||||||
|
|
||||||
#undef PROG
|
# undef PROG
|
||||||
#define PROG engine_main
|
# define PROG engine_main
|
||||||
|
|
||||||
static char *engine_usage[]={
|
static const char *engine_usage[] = {
|
||||||
"usage: engine opts [engine ...]\n",
|
"usage: engine opts [engine ...]\n",
|
||||||
" -v[v[v[v]]] - verbose mode, for each engine, list its 'control commands'\n",
|
" -v[v[v[v]]] - verbose mode, for each engine, list its 'control commands'\n",
|
||||||
" -vv will additionally display each command's description\n",
|
" -vv will additionally display each command's description\n",
|
||||||
" -vvv will also add the input flags for each command\n",
|
" -vvv will also add the input flags for each command\n",
|
||||||
" -vvvv will also show internal input flags\n",
|
" -vvvv will also show internal input flags\n",
|
||||||
" -c - for each engine, also list the capabilities\n",
|
" -c - for each engine, also list the capabilities\n",
|
||||||
" -t - for each engine, check that they are really available\n",
|
" -t[t] - for each engine, check that they are really available\n",
|
||||||
" -pre <cmd> - runs command 'cmd' against the ENGINE before any attempts\n",
|
" -tt will display error trace for unavailable engines\n",
|
||||||
" to load it (if -t is used)\n",
|
" -pre <cmd> - runs command 'cmd' against the ENGINE before any attempts\n",
|
||||||
" -post <cmd> - runs command 'cmd' against the ENGINE after loading it\n",
|
" to load it (if -t is used)\n",
|
||||||
" (only used if -t is also provided)\n",
|
" -post <cmd> - runs command 'cmd' against the ENGINE after loading it\n",
|
||||||
" NB: -pre and -post will be applied to all ENGINEs supplied on the command\n",
|
" (only used if -t is also provided)\n",
|
||||||
" line, or all supported ENGINEs if none are specified.\n",
|
" NB: -pre and -post will be applied to all ENGINEs supplied on the command\n",
|
||||||
" Eg. '-pre \"SO_PATH:/lib/libdriver.so\"' calls command \"SO_PATH\" with\n",
|
" line, or all supported ENGINEs if none are specified.\n",
|
||||||
" argument \"/lib/libdriver.so\".\n",
|
" Eg. '-pre \"SO_PATH:/lib/libdriver.so\"' calls command \"SO_PATH\" with\n",
|
||||||
NULL
|
" argument \"/lib/libdriver.so\".\n",
|
||||||
|
NULL
|
||||||
};
|
};
|
||||||
|
|
||||||
static void identity(void *ptr)
|
static void identity(char *ptr)
|
||||||
{
|
{
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
static int append_buf(char **buf, const char *s, int *size, int step)
|
static int append_buf(char **buf, const char *s, int *size, int step)
|
||||||
{
|
{
|
||||||
int l = strlen(s);
|
int l = strlen(s);
|
||||||
|
|
||||||
if (*buf == NULL)
|
if (*buf == NULL) {
|
||||||
{
|
*size = step;
|
||||||
*size = step;
|
*buf = OPENSSL_malloc(*size);
|
||||||
*buf = OPENSSL_malloc(*size);
|
if (*buf == NULL)
|
||||||
if (*buf == NULL)
|
return 0;
|
||||||
return 0;
|
**buf = '\0';
|
||||||
**buf = '\0';
|
}
|
||||||
}
|
|
||||||
|
|
||||||
if (**buf != '\0')
|
if (**buf != '\0')
|
||||||
l += 2; /* ", " */
|
l += 2; /* ", " */
|
||||||
|
|
||||||
if (strlen(*buf) + strlen(s) >= (unsigned int)*size)
|
if (strlen(*buf) + strlen(s) >= (unsigned int)*size) {
|
||||||
{
|
*size += step;
|
||||||
*size += step;
|
*buf = OPENSSL_realloc(*buf, *size);
|
||||||
*buf = OPENSSL_realloc(*buf, *size);
|
}
|
||||||
}
|
|
||||||
|
|
||||||
if (*buf == NULL)
|
if (*buf == NULL)
|
||||||
return 0;
|
return 0;
|
||||||
|
|
||||||
if (**buf != '\0')
|
if (**buf != '\0')
|
||||||
strcat(*buf, ", ");
|
BUF_strlcat(*buf, ", ", *size);
|
||||||
strcat(*buf, s);
|
BUF_strlcat(*buf, s, *size);
|
||||||
|
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
static int util_flags(BIO *bio_out, unsigned int flags, const char *indent)
|
static int util_flags(BIO *bio_out, unsigned int flags, const char *indent)
|
||||||
{
|
{
|
||||||
int started = 0, err = 0;
|
int started = 0, err = 0;
|
||||||
/* Indent before displaying input flags */
|
/* Indent before displaying input flags */
|
||||||
BIO_printf(bio_out, "%s%s(input flags): ", indent, indent);
|
BIO_printf(bio_out, "%s%s(input flags): ", indent, indent);
|
||||||
if(flags == 0)
|
if (flags == 0) {
|
||||||
{
|
BIO_printf(bio_out, "<no flags>\n");
|
||||||
BIO_printf(bio_out, "<no flags>\n");
|
return 1;
|
||||||
return 1;
|
}
|
||||||
}
|
/*
|
||||||
/* If the object is internal, mark it in a way that shows instead of
|
* If the object is internal, mark it in a way that shows instead of
|
||||||
* having it part of all the other flags, even if it really is. */
|
* having it part of all the other flags, even if it really is.
|
||||||
if(flags & ENGINE_CMD_FLAG_INTERNAL)
|
*/
|
||||||
{
|
if (flags & ENGINE_CMD_FLAG_INTERNAL) {
|
||||||
BIO_printf(bio_out, "[Internal] ");
|
BIO_printf(bio_out, "[Internal] ");
|
||||||
}
|
}
|
||||||
|
|
||||||
if(flags & ENGINE_CMD_FLAG_NUMERIC)
|
if (flags & ENGINE_CMD_FLAG_NUMERIC) {
|
||||||
{
|
BIO_printf(bio_out, "NUMERIC");
|
||||||
if(started)
|
started = 1;
|
||||||
{
|
}
|
||||||
BIO_printf(bio_out, "|");
|
/*
|
||||||
err = 1;
|
* Now we check that no combinations of the mutually exclusive NUMERIC,
|
||||||
}
|
* STRING, and NO_INPUT flags have been used. Future flags that can be
|
||||||
BIO_printf(bio_out, "NUMERIC");
|
* OR'd together with these would need to added after these to preserve
|
||||||
started = 1;
|
* the testing logic.
|
||||||
}
|
*/
|
||||||
/* Now we check that no combinations of the mutually exclusive NUMERIC,
|
if (flags & ENGINE_CMD_FLAG_STRING) {
|
||||||
* STRING, and NO_INPUT flags have been used. Future flags that can be
|
if (started) {
|
||||||
* OR'd together with these would need to added after these to preserve
|
BIO_printf(bio_out, "|");
|
||||||
* the testing logic. */
|
err = 1;
|
||||||
if(flags & ENGINE_CMD_FLAG_STRING)
|
}
|
||||||
{
|
BIO_printf(bio_out, "STRING");
|
||||||
if(started)
|
started = 1;
|
||||||
{
|
}
|
||||||
BIO_printf(bio_out, "|");
|
if (flags & ENGINE_CMD_FLAG_NO_INPUT) {
|
||||||
err = 1;
|
if (started) {
|
||||||
}
|
BIO_printf(bio_out, "|");
|
||||||
BIO_printf(bio_out, "STRING");
|
err = 1;
|
||||||
started = 1;
|
}
|
||||||
}
|
BIO_printf(bio_out, "NO_INPUT");
|
||||||
if(flags & ENGINE_CMD_FLAG_NO_INPUT)
|
started = 1;
|
||||||
{
|
}
|
||||||
if(started)
|
/* Check for unknown flags */
|
||||||
{
|
flags = flags & ~ENGINE_CMD_FLAG_NUMERIC &
|
||||||
BIO_printf(bio_out, "|");
|
~ENGINE_CMD_FLAG_STRING &
|
||||||
err = 1;
|
~ENGINE_CMD_FLAG_NO_INPUT & ~ENGINE_CMD_FLAG_INTERNAL;
|
||||||
}
|
if (flags) {
|
||||||
BIO_printf(bio_out, "NO_INPUT");
|
if (started)
|
||||||
started = 1;
|
BIO_printf(bio_out, "|");
|
||||||
}
|
BIO_printf(bio_out, "<0x%04X>", flags);
|
||||||
/* Check for unknown flags */
|
}
|
||||||
flags = flags & ~ENGINE_CMD_FLAG_NUMERIC &
|
if (err)
|
||||||
~ENGINE_CMD_FLAG_STRING &
|
BIO_printf(bio_out, " <illegal flags!>");
|
||||||
~ENGINE_CMD_FLAG_NO_INPUT &
|
BIO_printf(bio_out, "\n");
|
||||||
~ENGINE_CMD_FLAG_INTERNAL;
|
return 1;
|
||||||
if(flags)
|
}
|
||||||
{
|
|
||||||
if(started) BIO_printf(bio_out, "|");
|
|
||||||
BIO_printf(bio_out, "<0x%04X>", flags);
|
|
||||||
}
|
|
||||||
if(err)
|
|
||||||
BIO_printf(bio_out, " <illegal flags!>");
|
|
||||||
BIO_printf(bio_out, "\n");
|
|
||||||
return 1;
|
|
||||||
}
|
|
||||||
|
|
||||||
static int util_verbose(ENGINE *e, int verbose, BIO *bio_out, const char *indent)
|
static int util_verbose(ENGINE *e, int verbose, BIO *bio_out,
|
||||||
{
|
const char *indent)
|
||||||
static const int line_wrap = 78;
|
{
|
||||||
int num;
|
static const int line_wrap = 78;
|
||||||
int ret = 0;
|
int num;
|
||||||
char *name = NULL;
|
int ret = 0;
|
||||||
char *desc = NULL;
|
char *name = NULL;
|
||||||
int flags;
|
char *desc = NULL;
|
||||||
int xpos = 0;
|
int flags;
|
||||||
STACK *cmds = NULL;
|
int xpos = 0;
|
||||||
if(!ENGINE_ctrl(e, ENGINE_CTRL_HAS_CTRL_FUNCTION, 0, NULL, NULL) ||
|
STACK_OF(OPENSSL_STRING) *cmds = NULL;
|
||||||
((num = ENGINE_ctrl(e, ENGINE_CTRL_GET_FIRST_CMD_TYPE,
|
if (!ENGINE_ctrl(e, ENGINE_CTRL_HAS_CTRL_FUNCTION, 0, NULL, NULL) ||
|
||||||
0, NULL, NULL)) <= 0))
|
((num = ENGINE_ctrl(e, ENGINE_CTRL_GET_FIRST_CMD_TYPE,
|
||||||
{
|
0, NULL, NULL)) <= 0)) {
|
||||||
#if 0
|
# if 0
|
||||||
BIO_printf(bio_out, "%s<no control commands>\n", indent);
|
BIO_printf(bio_out, "%s<no control commands>\n", indent);
|
||||||
#endif
|
# endif
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
cmds = sk_new_null();
|
cmds = sk_OPENSSL_STRING_new_null();
|
||||||
|
|
||||||
if(!cmds)
|
if (!cmds)
|
||||||
goto err;
|
goto err;
|
||||||
do {
|
do {
|
||||||
int len;
|
int len;
|
||||||
/* Get the command input flags */
|
/* Get the command input flags */
|
||||||
if((flags = ENGINE_ctrl(e, ENGINE_CTRL_GET_CMD_FLAGS, num,
|
if ((flags = ENGINE_ctrl(e, ENGINE_CTRL_GET_CMD_FLAGS, num,
|
||||||
NULL, NULL)) < 0)
|
NULL, NULL)) < 0)
|
||||||
goto err;
|
goto err;
|
||||||
if (!(flags & ENGINE_CMD_FLAG_INTERNAL) || verbose >= 4)
|
if (!(flags & ENGINE_CMD_FLAG_INTERNAL) || verbose >= 4) {
|
||||||
{
|
/* Get the command name */
|
||||||
/* Get the command name */
|
if ((len = ENGINE_ctrl(e, ENGINE_CTRL_GET_NAME_LEN_FROM_CMD, num,
|
||||||
if((len = ENGINE_ctrl(e, ENGINE_CTRL_GET_NAME_LEN_FROM_CMD, num,
|
NULL, NULL)) <= 0)
|
||||||
NULL, NULL)) <= 0)
|
goto err;
|
||||||
goto err;
|
if ((name = OPENSSL_malloc(len + 1)) == NULL)
|
||||||
if((name = OPENSSL_malloc(len + 1)) == NULL)
|
goto err;
|
||||||
goto err;
|
if (ENGINE_ctrl(e, ENGINE_CTRL_GET_NAME_FROM_CMD, num, name,
|
||||||
if(ENGINE_ctrl(e, ENGINE_CTRL_GET_NAME_FROM_CMD, num, name,
|
NULL) <= 0)
|
||||||
|
goto err;
|
||||||
|
/* Get the command description */
|
||||||
|
if ((len = ENGINE_ctrl(e, ENGINE_CTRL_GET_DESC_LEN_FROM_CMD, num,
|
||||||
|
NULL, NULL)) < 0)
|
||||||
|
goto err;
|
||||||
|
if (len > 0) {
|
||||||
|
if ((desc = OPENSSL_malloc(len + 1)) == NULL)
|
||||||
|
goto err;
|
||||||
|
if (ENGINE_ctrl(e, ENGINE_CTRL_GET_DESC_FROM_CMD, num, desc,
|
||||||
NULL) <= 0)
|
NULL) <= 0)
|
||||||
goto err;
|
goto err;
|
||||||
/* Get the command description */
|
}
|
||||||
if((len = ENGINE_ctrl(e, ENGINE_CTRL_GET_DESC_LEN_FROM_CMD, num,
|
/* Now decide on the output */
|
||||||
NULL, NULL)) < 0)
|
if (xpos == 0)
|
||||||
goto err;
|
/* Do an indent */
|
||||||
if(len > 0)
|
xpos = BIO_puts(bio_out, indent);
|
||||||
{
|
else
|
||||||
if((desc = OPENSSL_malloc(len + 1)) == NULL)
|
/* Otherwise prepend a ", " */
|
||||||
goto err;
|
xpos += BIO_printf(bio_out, ", ");
|
||||||
if(ENGINE_ctrl(e, ENGINE_CTRL_GET_DESC_FROM_CMD, num, desc,
|
if (verbose == 1) {
|
||||||
NULL) <= 0)
|
/*
|
||||||
goto err;
|
* We're just listing names, comma-delimited
|
||||||
}
|
*/
|
||||||
/* Now decide on the output */
|
if ((xpos > (int)strlen(indent)) &&
|
||||||
if(xpos == 0)
|
(xpos + (int)strlen(name) > line_wrap)) {
|
||||||
/* Do an indent */
|
BIO_printf(bio_out, "\n");
|
||||||
xpos = BIO_printf(bio_out, indent);
|
xpos = BIO_puts(bio_out, indent);
|
||||||
else
|
}
|
||||||
/* Otherwise prepend a ", " */
|
xpos += BIO_printf(bio_out, "%s", name);
|
||||||
xpos += BIO_printf(bio_out, ", ");
|
} else {
|
||||||
if(verbose == 1)
|
/* We're listing names plus descriptions */
|
||||||
{
|
BIO_printf(bio_out, "%s: %s\n", name,
|
||||||
/* We're just listing names, comma-delimited */
|
(desc == NULL) ? "<no description>" : desc);
|
||||||
if((xpos > (int)strlen(indent)) &&
|
/* ... and sometimes input flags */
|
||||||
(xpos + (int)strlen(name) > line_wrap))
|
if ((verbose >= 3) && !util_flags(bio_out, flags, indent))
|
||||||
{
|
goto err;
|
||||||
BIO_printf(bio_out, "\n");
|
xpos = 0;
|
||||||
xpos = BIO_printf(bio_out, indent);
|
}
|
||||||
}
|
}
|
||||||
xpos += BIO_printf(bio_out, "%s", name);
|
OPENSSL_free(name);
|
||||||
}
|
name = NULL;
|
||||||
else
|
if (desc) {
|
||||||
{
|
OPENSSL_free(desc);
|
||||||
/* We're listing names plus descriptions */
|
desc = NULL;
|
||||||
BIO_printf(bio_out, "%s: %s\n", name,
|
}
|
||||||
(desc == NULL) ? "<no description>" : desc);
|
/* Move to the next command */
|
||||||
/* ... and sometimes input flags */
|
num = ENGINE_ctrl(e, ENGINE_CTRL_GET_NEXT_CMD_TYPE, num, NULL, NULL);
|
||||||
if((verbose >= 3) && !util_flags(bio_out, flags,
|
} while (num > 0);
|
||||||
indent))
|
if (xpos > 0)
|
||||||
goto err;
|
BIO_printf(bio_out, "\n");
|
||||||
xpos = 0;
|
ret = 1;
|
||||||
}
|
err:
|
||||||
}
|
if (cmds)
|
||||||
OPENSSL_free(name); name = NULL;
|
sk_OPENSSL_STRING_pop_free(cmds, identity);
|
||||||
if(desc) { OPENSSL_free(desc); desc = NULL; }
|
if (name)
|
||||||
/* Move to the next command */
|
OPENSSL_free(name);
|
||||||
num = ENGINE_ctrl(e, ENGINE_CTRL_GET_NEXT_CMD_TYPE,
|
if (desc)
|
||||||
num, NULL, NULL);
|
OPENSSL_free(desc);
|
||||||
} while(num > 0);
|
return ret;
|
||||||
if(xpos > 0)
|
}
|
||||||
BIO_printf(bio_out, "\n");
|
|
||||||
ret = 1;
|
|
||||||
err:
|
|
||||||
if(cmds) sk_pop_free(cmds, identity);
|
|
||||||
if(name) OPENSSL_free(name);
|
|
||||||
if(desc) OPENSSL_free(desc);
|
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
|
|
||||||
static void util_do_cmds(ENGINE *e, STACK *cmds, BIO *bio_out, const char *indent)
|
static void util_do_cmds(ENGINE *e, STACK_OF(OPENSSL_STRING) *cmds,
|
||||||
{
|
BIO *bio_out, const char *indent)
|
||||||
int loop, res, num = sk_num(cmds);
|
{
|
||||||
if(num < 0)
|
int loop, res, num = sk_OPENSSL_STRING_num(cmds);
|
||||||
{
|
|
||||||
BIO_printf(bio_out, "[Error]: internal stack error\n");
|
if (num < 0) {
|
||||||
return;
|
BIO_printf(bio_out, "[Error]: internal stack error\n");
|
||||||
}
|
return;
|
||||||
for(loop = 0; loop < num; loop++)
|
}
|
||||||
{
|
for (loop = 0; loop < num; loop++) {
|
||||||
char buf[256];
|
char buf[256];
|
||||||
const char *cmd, *arg;
|
const char *cmd, *arg;
|
||||||
cmd = sk_value(cmds, loop);
|
cmd = sk_OPENSSL_STRING_value(cmds, loop);
|
||||||
res = 1; /* assume success */
|
res = 1; /* assume success */
|
||||||
/* Check if this command has no ":arg" */
|
/* Check if this command has no ":arg" */
|
||||||
if((arg = strstr(cmd, ":")) == NULL)
|
if ((arg = strstr(cmd, ":")) == NULL) {
|
||||||
{
|
if (!ENGINE_ctrl_cmd_string(e, cmd, NULL, 0))
|
||||||
if(!ENGINE_ctrl_cmd_string(e, cmd, NULL, 0))
|
res = 0;
|
||||||
res = 0;
|
} else {
|
||||||
}
|
if ((int)(arg - cmd) > 254) {
|
||||||
else
|
BIO_printf(bio_out, "[Error]: command name too long\n");
|
||||||
{
|
return;
|
||||||
if((int)(arg - cmd) > 254)
|
}
|
||||||
{
|
memcpy(buf, cmd, (int)(arg - cmd));
|
||||||
BIO_printf(bio_out,"[Error]: command name too long\n");
|
buf[arg - cmd] = '\0';
|
||||||
return;
|
arg++; /* Move past the ":" */
|
||||||
}
|
/* Call the command with the argument */
|
||||||
memcpy(buf, cmd, (int)(arg - cmd));
|
if (!ENGINE_ctrl_cmd_string(e, buf, arg, 0))
|
||||||
buf[arg-cmd] = '\0';
|
res = 0;
|
||||||
arg++; /* Move past the ":" */
|
}
|
||||||
/* Call the command with the argument */
|
if (res)
|
||||||
if(!ENGINE_ctrl_cmd_string(e, buf, arg, 0))
|
BIO_printf(bio_out, "[Success]: %s\n", cmd);
|
||||||
res = 0;
|
else {
|
||||||
}
|
BIO_printf(bio_out, "[Failure]: %s\n", cmd);
|
||||||
if(res)
|
ERR_print_errors(bio_out);
|
||||||
BIO_printf(bio_out, "[Success]: %s\n", cmd);
|
}
|
||||||
else
|
}
|
||||||
{
|
}
|
||||||
BIO_printf(bio_out, "[Failure]: %s\n", cmd);
|
|
||||||
ERR_print_errors(bio_out);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
int ret=1,i;
|
int ret = 1, i;
|
||||||
char **pp;
|
const char **pp;
|
||||||
int verbose=0, list_cap=0, test_avail=0;
|
int verbose = 0, list_cap = 0, test_avail = 0, test_avail_noise = 0;
|
||||||
ENGINE *e;
|
ENGINE *e;
|
||||||
STACK *engines = sk_new_null();
|
STACK_OF(OPENSSL_STRING) *engines = sk_OPENSSL_STRING_new_null();
|
||||||
STACK *pre_cmds = sk_new_null();
|
STACK_OF(OPENSSL_STRING) *pre_cmds = sk_OPENSSL_STRING_new_null();
|
||||||
STACK *post_cmds = sk_new_null();
|
STACK_OF(OPENSSL_STRING) *post_cmds = sk_OPENSSL_STRING_new_null();
|
||||||
int badops=1;
|
int badops = 1;
|
||||||
BIO *bio_out=NULL;
|
BIO *bio_out = NULL;
|
||||||
const char *indent = " ";
|
const char *indent = " ";
|
||||||
|
|
||||||
apps_startup();
|
apps_startup();
|
||||||
SSL_load_error_strings();
|
SSL_load_error_strings();
|
||||||
|
|
||||||
if (bio_err == NULL)
|
if (bio_err == NULL)
|
||||||
bio_err=BIO_new_fp(stderr,BIO_NOCLOSE);
|
bio_err = BIO_new_fp(stderr, BIO_NOCLOSE);
|
||||||
|
|
||||||
|
if (!load_config(bio_err, NULL))
|
||||||
|
goto end;
|
||||||
|
bio_out = BIO_new_fp(stdout, BIO_NOCLOSE);
|
||||||
|
# ifdef OPENSSL_SYS_VMS
|
||||||
|
{
|
||||||
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
|
bio_out = BIO_push(tmpbio, bio_out);
|
||||||
|
}
|
||||||
|
# endif
|
||||||
|
|
||||||
|
argc--;
|
||||||
|
argv++;
|
||||||
|
while (argc >= 1) {
|
||||||
|
if (strncmp(*argv, "-v", 2) == 0) {
|
||||||
|
if (strspn(*argv + 1, "v") < strlen(*argv + 1))
|
||||||
|
goto skip_arg_loop;
|
||||||
|
if ((verbose = strlen(*argv + 1)) > 4)
|
||||||
|
goto skip_arg_loop;
|
||||||
|
} else if (strcmp(*argv, "-c") == 0)
|
||||||
|
list_cap = 1;
|
||||||
|
else if (strncmp(*argv, "-t", 2) == 0) {
|
||||||
|
test_avail = 1;
|
||||||
|
if (strspn(*argv + 1, "t") < strlen(*argv + 1))
|
||||||
|
goto skip_arg_loop;
|
||||||
|
if ((test_avail_noise = strlen(*argv + 1) - 1) > 1)
|
||||||
|
goto skip_arg_loop;
|
||||||
|
} else if (strcmp(*argv, "-pre") == 0) {
|
||||||
|
argc--;
|
||||||
|
argv++;
|
||||||
|
if (argc == 0)
|
||||||
|
goto skip_arg_loop;
|
||||||
|
sk_OPENSSL_STRING_push(pre_cmds, *argv);
|
||||||
|
} else if (strcmp(*argv, "-post") == 0) {
|
||||||
|
argc--;
|
||||||
|
argv++;
|
||||||
|
if (argc == 0)
|
||||||
|
goto skip_arg_loop;
|
||||||
|
sk_OPENSSL_STRING_push(post_cmds, *argv);
|
||||||
|
} else if ((strncmp(*argv, "-h", 2) == 0) ||
|
||||||
|
(strcmp(*argv, "-?") == 0))
|
||||||
|
goto skip_arg_loop;
|
||||||
|
else
|
||||||
|
sk_OPENSSL_STRING_push(engines, *argv);
|
||||||
|
argc--;
|
||||||
|
argv++;
|
||||||
|
}
|
||||||
|
/* Looks like everything went OK */
|
||||||
|
badops = 0;
|
||||||
|
skip_arg_loop:
|
||||||
|
|
||||||
|
if (badops) {
|
||||||
|
for (pp = engine_usage; (*pp != NULL); pp++)
|
||||||
|
BIO_printf(bio_err, "%s", *pp);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (sk_OPENSSL_STRING_num(engines) == 0) {
|
||||||
|
for (e = ENGINE_get_first(); e != NULL; e = ENGINE_get_next(e)) {
|
||||||
|
sk_OPENSSL_STRING_push(engines, (char *)ENGINE_get_id(e));
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
for (i = 0; i < sk_OPENSSL_STRING_num(engines); i++) {
|
||||||
|
const char *id = sk_OPENSSL_STRING_value(engines, i);
|
||||||
|
if ((e = ENGINE_by_id(id)) != NULL) {
|
||||||
|
const char *name = ENGINE_get_name(e);
|
||||||
|
/*
|
||||||
|
* Do "id" first, then "name". Easier to auto-parse.
|
||||||
|
*/
|
||||||
|
BIO_printf(bio_out, "(%s) %s\n", id, name);
|
||||||
|
util_do_cmds(e, pre_cmds, bio_out, indent);
|
||||||
|
if (strcmp(ENGINE_get_id(e), id) != 0) {
|
||||||
|
BIO_printf(bio_out, "Loaded: (%s) %s\n",
|
||||||
|
ENGINE_get_id(e), ENGINE_get_name(e));
|
||||||
|
}
|
||||||
|
if (list_cap) {
|
||||||
|
int cap_size = 256;
|
||||||
|
char *cap_buf = NULL;
|
||||||
|
int k, n;
|
||||||
|
const int *nids;
|
||||||
|
ENGINE_CIPHERS_PTR fn_c;
|
||||||
|
ENGINE_DIGESTS_PTR fn_d;
|
||||||
|
ENGINE_PKEY_METHS_PTR fn_pk;
|
||||||
|
|
||||||
|
if (ENGINE_get_RSA(e) != NULL
|
||||||
|
&& !append_buf(&cap_buf, "RSA", &cap_size, 256))
|
||||||
|
goto end;
|
||||||
|
if (ENGINE_get_DSA(e) != NULL
|
||||||
|
&& !append_buf(&cap_buf, "DSA", &cap_size, 256))
|
||||||
|
goto end;
|
||||||
|
if (ENGINE_get_DH(e) != NULL
|
||||||
|
&& !append_buf(&cap_buf, "DH", &cap_size, 256))
|
||||||
|
goto end;
|
||||||
|
if (ENGINE_get_RAND(e) != NULL
|
||||||
|
&& !append_buf(&cap_buf, "RAND", &cap_size, 256))
|
||||||
|
goto end;
|
||||||
|
|
||||||
|
fn_c = ENGINE_get_ciphers(e);
|
||||||
|
if (!fn_c)
|
||||||
|
goto skip_ciphers;
|
||||||
|
n = fn_c(e, NULL, &nids, 0);
|
||||||
|
for (k = 0; k < n; ++k)
|
||||||
|
if (!append_buf(&cap_buf,
|
||||||
|
OBJ_nid2sn(nids[k]), &cap_size, 256))
|
||||||
|
goto end;
|
||||||
|
|
||||||
|
skip_ciphers:
|
||||||
|
fn_d = ENGINE_get_digests(e);
|
||||||
|
if (!fn_d)
|
||||||
|
goto skip_digests;
|
||||||
|
n = fn_d(e, NULL, &nids, 0);
|
||||||
|
for (k = 0; k < n; ++k)
|
||||||
|
if (!append_buf(&cap_buf,
|
||||||
|
OBJ_nid2sn(nids[k]), &cap_size, 256))
|
||||||
|
goto end;
|
||||||
|
|
||||||
|
skip_digests:
|
||||||
|
fn_pk = ENGINE_get_pkey_meths(e);
|
||||||
|
if (!fn_pk)
|
||||||
|
goto skip_pmeths;
|
||||||
|
n = fn_pk(e, NULL, &nids, 0);
|
||||||
|
for (k = 0; k < n; ++k)
|
||||||
|
if (!append_buf(&cap_buf,
|
||||||
|
OBJ_nid2sn(nids[k]), &cap_size, 256))
|
||||||
|
goto end;
|
||||||
|
skip_pmeths:
|
||||||
|
if (cap_buf && (*cap_buf != '\0'))
|
||||||
|
BIO_printf(bio_out, " [%s]\n", cap_buf);
|
||||||
|
|
||||||
|
OPENSSL_free(cap_buf);
|
||||||
|
}
|
||||||
|
if (test_avail) {
|
||||||
|
BIO_printf(bio_out, "%s", indent);
|
||||||
|
if (ENGINE_init(e)) {
|
||||||
|
BIO_printf(bio_out, "[ available ]\n");
|
||||||
|
util_do_cmds(e, post_cmds, bio_out, indent);
|
||||||
|
ENGINE_finish(e);
|
||||||
|
} else {
|
||||||
|
BIO_printf(bio_out, "[ unavailable ]\n");
|
||||||
|
if (test_avail_noise)
|
||||||
|
ERR_print_errors_fp(stdout);
|
||||||
|
ERR_clear_error();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if ((verbose > 0) && !util_verbose(e, verbose, bio_out, indent))
|
||||||
|
goto end;
|
||||||
|
ENGINE_free(e);
|
||||||
|
} else
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
}
|
||||||
|
|
||||||
|
ret = 0;
|
||||||
|
end:
|
||||||
|
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
sk_OPENSSL_STRING_pop_free(engines, identity);
|
||||||
|
sk_OPENSSL_STRING_pop_free(pre_cmds, identity);
|
||||||
|
sk_OPENSSL_STRING_pop_free(post_cmds, identity);
|
||||||
|
if (bio_out != NULL)
|
||||||
|
BIO_free_all(bio_out);
|
||||||
|
apps_shutdown();
|
||||||
|
OPENSSL_EXIT(ret);
|
||||||
|
}
|
||||||
|
#else
|
||||||
|
|
||||||
|
# if PEDANTIC
|
||||||
|
static void *dummy = &dummy;
|
||||||
|
# endif
|
||||||
|
|
||||||
if (!load_config(bio_err, NULL))
|
|
||||||
goto end;
|
|
||||||
bio_out=BIO_new_fp(stdout,BIO_NOCLOSE);
|
|
||||||
#ifdef OPENSSL_SYS_VMS
|
|
||||||
{
|
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
|
||||||
bio_out = BIO_push(tmpbio, bio_out);
|
|
||||||
}
|
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
argc--;
|
|
||||||
argv++;
|
|
||||||
while (argc >= 1)
|
|
||||||
{
|
|
||||||
if (strncmp(*argv,"-v",2) == 0)
|
|
||||||
{
|
|
||||||
if(strspn(*argv + 1, "v") < strlen(*argv + 1))
|
|
||||||
goto skip_arg_loop;
|
|
||||||
if((verbose=strlen(*argv + 1)) > 4)
|
|
||||||
goto skip_arg_loop;
|
|
||||||
}
|
|
||||||
else if (strcmp(*argv,"-c") == 0)
|
|
||||||
list_cap=1;
|
|
||||||
else if (strcmp(*argv,"-t") == 0)
|
|
||||||
test_avail=1;
|
|
||||||
else if (strcmp(*argv,"-pre") == 0)
|
|
||||||
{
|
|
||||||
argc--; argv++;
|
|
||||||
sk_push(pre_cmds,*argv);
|
|
||||||
}
|
|
||||||
else if (strcmp(*argv,"-post") == 0)
|
|
||||||
{
|
|
||||||
argc--; argv++;
|
|
||||||
sk_push(post_cmds,*argv);
|
|
||||||
}
|
|
||||||
else if ((strncmp(*argv,"-h",2) == 0) ||
|
|
||||||
(strcmp(*argv,"-?") == 0))
|
|
||||||
goto skip_arg_loop;
|
|
||||||
else
|
|
||||||
sk_push(engines,*argv);
|
|
||||||
argc--;
|
|
||||||
argv++;
|
|
||||||
}
|
|
||||||
/* Looks like everything went OK */
|
|
||||||
badops = 0;
|
|
||||||
skip_arg_loop:
|
|
||||||
|
|
||||||
if (badops)
|
|
||||||
{
|
|
||||||
for (pp=engine_usage; (*pp != NULL); pp++)
|
|
||||||
BIO_printf(bio_err,"%s",*pp);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (sk_num(engines) == 0)
|
|
||||||
{
|
|
||||||
for(e = ENGINE_get_first(); e != NULL; e = ENGINE_get_next(e))
|
|
||||||
{
|
|
||||||
sk_push(engines,(char *)ENGINE_get_id(e));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
for (i=0; i<sk_num(engines); i++)
|
|
||||||
{
|
|
||||||
const char *id = sk_value(engines,i);
|
|
||||||
if ((e = ENGINE_by_id(id)) != NULL)
|
|
||||||
{
|
|
||||||
const char *name = ENGINE_get_name(e);
|
|
||||||
/* Do "id" first, then "name". Easier to auto-parse. */
|
|
||||||
BIO_printf(bio_out, "(%s) %s\n", id, name);
|
|
||||||
util_do_cmds(e, pre_cmds, bio_out, indent);
|
|
||||||
if (strcmp(ENGINE_get_id(e), id) != 0)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_out, "Loaded: (%s) %s\n",
|
|
||||||
ENGINE_get_id(e), ENGINE_get_name(e));
|
|
||||||
}
|
|
||||||
if (list_cap)
|
|
||||||
{
|
|
||||||
int cap_size = 256;
|
|
||||||
char *cap_buf = NULL;
|
|
||||||
int k,n;
|
|
||||||
const int *nids;
|
|
||||||
ENGINE_CIPHERS_PTR fn_c;
|
|
||||||
ENGINE_DIGESTS_PTR fn_d;
|
|
||||||
|
|
||||||
if (ENGINE_get_RSA(e) != NULL
|
|
||||||
&& !append_buf(&cap_buf, "RSA",
|
|
||||||
&cap_size, 256))
|
|
||||||
goto end;
|
|
||||||
if (ENGINE_get_DSA(e) != NULL
|
|
||||||
&& !append_buf(&cap_buf, "DSA",
|
|
||||||
&cap_size, 256))
|
|
||||||
goto end;
|
|
||||||
if (ENGINE_get_DH(e) != NULL
|
|
||||||
&& !append_buf(&cap_buf, "DH",
|
|
||||||
&cap_size, 256))
|
|
||||||
goto end;
|
|
||||||
if (ENGINE_get_RAND(e) != NULL
|
|
||||||
&& !append_buf(&cap_buf, "RAND",
|
|
||||||
&cap_size, 256))
|
|
||||||
goto end;
|
|
||||||
|
|
||||||
fn_c = ENGINE_get_ciphers(e);
|
|
||||||
if(!fn_c) goto skip_ciphers;
|
|
||||||
n = fn_c(e, NULL, &nids, 0);
|
|
||||||
for(k=0 ; k < n ; ++k)
|
|
||||||
if(!append_buf(&cap_buf,
|
|
||||||
OBJ_nid2sn(nids[k]),
|
|
||||||
&cap_size, 256))
|
|
||||||
goto end;
|
|
||||||
|
|
||||||
skip_ciphers:
|
|
||||||
fn_d = ENGINE_get_digests(e);
|
|
||||||
if(!fn_d) goto skip_digests;
|
|
||||||
n = fn_d(e, NULL, &nids, 0);
|
|
||||||
for(k=0 ; k < n ; ++k)
|
|
||||||
if(!append_buf(&cap_buf,
|
|
||||||
OBJ_nid2sn(nids[k]),
|
|
||||||
&cap_size, 256))
|
|
||||||
goto end;
|
|
||||||
|
|
||||||
skip_digests:
|
|
||||||
if (cap_buf && (*cap_buf != '\0'))
|
|
||||||
BIO_printf(bio_out, " [%s]\n", cap_buf);
|
|
||||||
|
|
||||||
OPENSSL_free(cap_buf);
|
|
||||||
}
|
|
||||||
if(test_avail)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_out, "%s", indent);
|
|
||||||
if (ENGINE_init(e))
|
|
||||||
{
|
|
||||||
BIO_printf(bio_out, "[ available ]\n");
|
|
||||||
util_do_cmds(e, post_cmds, bio_out, indent);
|
|
||||||
ENGINE_finish(e);
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
BIO_printf(bio_out, "[ unavailable ]\n");
|
|
||||||
ERR_print_errors_fp(stdout);
|
|
||||||
ERR_clear_error();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if((verbose > 0) && !util_verbose(e, verbose, bio_out, indent))
|
|
||||||
goto end;
|
|
||||||
ENGINE_free(e);
|
|
||||||
}
|
|
||||||
else
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
}
|
|
||||||
|
|
||||||
ret=0;
|
|
||||||
end:
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
sk_pop_free(engines, identity);
|
|
||||||
sk_pop_free(pre_cmds, identity);
|
|
||||||
sk_pop_free(post_cmds, identity);
|
|
||||||
if (bio_out != NULL) BIO_free_all(bio_out);
|
|
||||||
apps_shutdown();
|
|
||||||
OPENSSL_EXIT(ret);
|
|
||||||
}
|
|
||||||
|
|||||||
@@ -66,61 +66,56 @@
|
|||||||
#include <openssl/ssl.h>
|
#include <openssl/ssl.h>
|
||||||
|
|
||||||
#undef PROG
|
#undef PROG
|
||||||
#define PROG errstr_main
|
#define PROG errstr_main
|
||||||
|
|
||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
int i,ret=0;
|
int i, ret = 0;
|
||||||
char buf[256];
|
char buf[256];
|
||||||
unsigned long l;
|
unsigned long l;
|
||||||
|
|
||||||
apps_startup();
|
apps_startup();
|
||||||
|
|
||||||
if (bio_err == NULL)
|
if (bio_err == NULL)
|
||||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
if ((bio_err = BIO_new(BIO_s_file())) != NULL)
|
||||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||||
|
|
||||||
SSL_load_error_strings();
|
SSL_load_error_strings();
|
||||||
|
|
||||||
if ((argc > 1) && (strcmp(argv[1],"-stats") == 0))
|
if ((argc > 1) && (strcmp(argv[1], "-stats") == 0)) {
|
||||||
{
|
BIO *out = NULL;
|
||||||
BIO *out=NULL;
|
|
||||||
|
|
||||||
out=BIO_new(BIO_s_file());
|
out = BIO_new(BIO_s_file());
|
||||||
if ((out != NULL) && BIO_set_fp(out,stdout,BIO_NOCLOSE))
|
if ((out != NULL) && BIO_set_fp(out, stdout, BIO_NOCLOSE)) {
|
||||||
{
|
|
||||||
#ifdef OPENSSL_SYS_VMS
|
#ifdef OPENSSL_SYS_VMS
|
||||||
{
|
{
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
out = BIO_push(tmpbio, out);
|
out = BIO_push(tmpbio, out);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
lh_node_stats_bio((LHASH *)ERR_get_string_table(),out);
|
lh_ERR_STRING_DATA_node_stats_bio(ERR_get_string_table(), out);
|
||||||
lh_stats_bio((LHASH *)ERR_get_string_table(),out);
|
lh_ERR_STRING_DATA_stats_bio(ERR_get_string_table(), out);
|
||||||
lh_node_usage_stats_bio((LHASH *)
|
lh_ERR_STRING_DATA_node_usage_stats_bio(ERR_get_string_table(),
|
||||||
ERR_get_string_table(),out);
|
out);
|
||||||
}
|
}
|
||||||
if (out != NULL) BIO_free_all(out);
|
if (out != NULL)
|
||||||
argc--;
|
BIO_free_all(out);
|
||||||
argv++;
|
argc--;
|
||||||
}
|
argv++;
|
||||||
|
}
|
||||||
|
|
||||||
for (i=1; i<argc; i++)
|
for (i = 1; i < argc; i++) {
|
||||||
{
|
if (sscanf(argv[i], "%lx", &l)) {
|
||||||
if (sscanf(argv[i],"%lx",&l))
|
ERR_error_string_n(l, buf, sizeof buf);
|
||||||
{
|
printf("%s\n", buf);
|
||||||
ERR_error_string_n(l, buf, sizeof buf);
|
} else {
|
||||||
printf("%s\n",buf);
|
printf("%s: bad error code\n", argv[i]);
|
||||||
}
|
printf("usage: errstr [-stats] <errno> ...\n");
|
||||||
else
|
ret++;
|
||||||
{
|
}
|
||||||
printf("%s: bad error code\n",argv[i]);
|
}
|
||||||
printf("usage: errstr [-stats] <errno> ...\n");
|
apps_shutdown();
|
||||||
ret++;
|
OPENSSL_EXIT(ret);
|
||||||
}
|
}
|
||||||
}
|
|
||||||
apps_shutdown();
|
|
||||||
OPENSSL_EXIT(ret);
|
|
||||||
}
|
|
||||||
|
|||||||
318
apps/gendh.c
318
apps/gendh.c
@@ -57,168 +57,192 @@
|
|||||||
* [including the GNU Public Licence.]
|
* [including the GNU Public Licence.]
|
||||||
*/
|
*/
|
||||||
|
|
||||||
/* Until the key-gen callbacks are modified to use newer prototypes, we allow
|
#include <openssl/opensslconf.h>
|
||||||
* deprecated functions for openssl-internal code */
|
/*
|
||||||
|
* Until the key-gen callbacks are modified to use newer prototypes, we allow
|
||||||
|
* deprecated functions for openssl-internal code
|
||||||
|
*/
|
||||||
#ifdef OPENSSL_NO_DEPRECATED
|
#ifdef OPENSSL_NO_DEPRECATED
|
||||||
#undef OPENSSL_NO_DEPRECATED
|
# undef OPENSSL_NO_DEPRECATED
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_DH
|
#ifndef OPENSSL_NO_DH
|
||||||
#include <stdio.h>
|
# include <stdio.h>
|
||||||
#include <string.h>
|
# include <string.h>
|
||||||
#include <sys/types.h>
|
# include <sys/types.h>
|
||||||
#include <sys/stat.h>
|
# include <sys/stat.h>
|
||||||
#include "apps.h"
|
# include "apps.h"
|
||||||
#include <openssl/bio.h>
|
# include <openssl/bio.h>
|
||||||
#include <openssl/rand.h>
|
# include <openssl/rand.h>
|
||||||
#include <openssl/err.h>
|
# include <openssl/err.h>
|
||||||
#include <openssl/bn.h>
|
# include <openssl/bn.h>
|
||||||
#include <openssl/dh.h>
|
# include <openssl/dh.h>
|
||||||
#include <openssl/x509.h>
|
# include <openssl/x509.h>
|
||||||
#include <openssl/pem.h>
|
# include <openssl/pem.h>
|
||||||
|
|
||||||
#define DEFBITS 512
|
# define DEFBITS 2048
|
||||||
#undef PROG
|
# undef PROG
|
||||||
#define PROG gendh_main
|
# define PROG gendh_main
|
||||||
|
|
||||||
static void MS_CALLBACK dh_cb(int p, int n, void *arg);
|
static int MS_CALLBACK dh_cb(int p, int n, BN_GENCB *cb);
|
||||||
|
|
||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
ENGINE *e = NULL;
|
BN_GENCB cb;
|
||||||
DH *dh=NULL;
|
DH *dh = NULL;
|
||||||
int ret=1,num=DEFBITS;
|
int ret = 1, num = DEFBITS;
|
||||||
int g=2;
|
int g = 2;
|
||||||
char *outfile=NULL;
|
char *outfile = NULL;
|
||||||
char *inrand=NULL;
|
char *inrand = NULL;
|
||||||
char *engine=NULL;
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
BIO *out=NULL;
|
char *engine = NULL;
|
||||||
|
# endif
|
||||||
|
BIO *out = NULL;
|
||||||
|
|
||||||
apps_startup();
|
apps_startup();
|
||||||
|
|
||||||
if (bio_err == NULL)
|
BN_GENCB_set(&cb, dh_cb, bio_err);
|
||||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
if (bio_err == NULL)
|
||||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
if ((bio_err = BIO_new(BIO_s_file())) != NULL)
|
||||||
|
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||||
|
|
||||||
if (!load_config(bio_err, NULL))
|
if (!load_config(bio_err, NULL))
|
||||||
goto end;
|
goto end;
|
||||||
|
|
||||||
argv++;
|
argv++;
|
||||||
argc--;
|
argc--;
|
||||||
for (;;)
|
for (;;) {
|
||||||
{
|
if (argc <= 0)
|
||||||
if (argc <= 0) break;
|
break;
|
||||||
if (strcmp(*argv,"-out") == 0)
|
if (strcmp(*argv, "-out") == 0) {
|
||||||
{
|
if (--argc < 1)
|
||||||
if (--argc < 1) goto bad;
|
goto bad;
|
||||||
outfile= *(++argv);
|
outfile = *(++argv);
|
||||||
}
|
} else if (strcmp(*argv, "-2") == 0)
|
||||||
else if (strcmp(*argv,"-2") == 0)
|
g = 2;
|
||||||
g=2;
|
/*- else if (strcmp(*argv,"-3") == 0)
|
||||||
/* else if (strcmp(*argv,"-3") == 0)
|
g=3; */
|
||||||
g=3; */
|
else if (strcmp(*argv, "-5") == 0)
|
||||||
else if (strcmp(*argv,"-5") == 0)
|
g = 5;
|
||||||
g=5;
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
else if (strcmp(*argv,"-engine") == 0)
|
else if (strcmp(*argv, "-engine") == 0) {
|
||||||
{
|
if (--argc < 1)
|
||||||
if (--argc < 1) goto bad;
|
goto bad;
|
||||||
engine= *(++argv);
|
engine = *(++argv);
|
||||||
}
|
}
|
||||||
else if (strcmp(*argv,"-rand") == 0)
|
# endif
|
||||||
{
|
else if (strcmp(*argv, "-rand") == 0) {
|
||||||
if (--argc < 1) goto bad;
|
if (--argc < 1)
|
||||||
inrand= *(++argv);
|
goto bad;
|
||||||
}
|
inrand = *(++argv);
|
||||||
else
|
} else
|
||||||
break;
|
break;
|
||||||
argv++;
|
argv++;
|
||||||
argc--;
|
argc--;
|
||||||
}
|
}
|
||||||
if ((argc >= 1) && ((sscanf(*argv,"%d",&num) == 0) || (num < 0)))
|
if ((argc >= 1) && ((sscanf(*argv, "%d", &num) == 0) || (num < 0))) {
|
||||||
{
|
bad:
|
||||||
bad:
|
BIO_printf(bio_err, "usage: gendh [args] [numbits]\n");
|
||||||
BIO_printf(bio_err,"usage: gendh [args] [numbits]\n");
|
BIO_printf(bio_err, " -out file - output the key to 'file\n");
|
||||||
BIO_printf(bio_err," -out file - output the key to 'file\n");
|
BIO_printf(bio_err, " -2 - use 2 as the generator value\n");
|
||||||
BIO_printf(bio_err," -2 - use 2 as the generator value\n");
|
/*
|
||||||
/* BIO_printf(bio_err," -3 - use 3 as the generator value\n"); */
|
* BIO_printf(bio_err," -3 - use 3 as the generator value\n");
|
||||||
BIO_printf(bio_err," -5 - use 5 as the generator value\n");
|
*/
|
||||||
BIO_printf(bio_err," -engine e - use engine e, possibly a hardware device.\n");
|
BIO_printf(bio_err, " -5 - use 5 as the generator value\n");
|
||||||
BIO_printf(bio_err," -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
BIO_printf(bio_err," - load the file (or the files in the directory) into\n");
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err," the random number generator\n");
|
" -engine e - use engine e, possibly a hardware device.\n");
|
||||||
goto end;
|
# endif
|
||||||
}
|
BIO_printf(bio_err, " -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR,
|
||||||
|
LIST_SEPARATOR_CHAR);
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" - load the file (or the files in the directory) into\n");
|
||||||
|
BIO_printf(bio_err, " the random number generator\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
|
setup_engine(bio_err, engine, 0);
|
||||||
|
# endif
|
||||||
|
|
||||||
e = setup_engine(bio_err, engine, 0);
|
out = BIO_new(BIO_s_file());
|
||||||
|
if (out == NULL) {
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
out=BIO_new(BIO_s_file());
|
if (outfile == NULL) {
|
||||||
if (out == NULL)
|
BIO_set_fp(out, stdout, BIO_NOCLOSE);
|
||||||
{
|
# ifdef OPENSSL_SYS_VMS
|
||||||
ERR_print_errors(bio_err);
|
{
|
||||||
goto end;
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
}
|
out = BIO_push(tmpbio, out);
|
||||||
|
}
|
||||||
|
# endif
|
||||||
|
} else {
|
||||||
|
if (BIO_write_filename(out, outfile) <= 0) {
|
||||||
|
perror(outfile);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!app_RAND_load_file(NULL, bio_err, 1) && inrand == NULL) {
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"warning, not much extra random data, consider using the -rand option\n");
|
||||||
|
}
|
||||||
|
if (inrand != NULL)
|
||||||
|
BIO_printf(bio_err, "%ld semi-random bytes loaded\n",
|
||||||
|
app_RAND_load_files(inrand));
|
||||||
|
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"Generating DH parameters, %d bit long safe prime, generator %d\n",
|
||||||
|
num, g);
|
||||||
|
BIO_printf(bio_err, "This is going to take a long time\n");
|
||||||
|
|
||||||
|
if (((dh = DH_new()) == NULL)
|
||||||
|
|| !DH_generate_parameters_ex(dh, num, g, &cb))
|
||||||
|
goto end;
|
||||||
|
|
||||||
|
app_RAND_write_file(NULL, bio_err);
|
||||||
|
|
||||||
|
if (!PEM_write_bio_DHparams(out, dh))
|
||||||
|
goto end;
|
||||||
|
ret = 0;
|
||||||
|
end:
|
||||||
|
if (ret != 0)
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
if (out != NULL)
|
||||||
|
BIO_free_all(out);
|
||||||
|
if (dh != NULL)
|
||||||
|
DH_free(dh);
|
||||||
|
apps_shutdown();
|
||||||
|
OPENSSL_EXIT(ret);
|
||||||
|
}
|
||||||
|
|
||||||
|
static int MS_CALLBACK dh_cb(int p, int n, BN_GENCB *cb)
|
||||||
|
{
|
||||||
|
char c = '*';
|
||||||
|
|
||||||
|
if (p == 0)
|
||||||
|
c = '.';
|
||||||
|
if (p == 1)
|
||||||
|
c = '+';
|
||||||
|
if (p == 2)
|
||||||
|
c = '*';
|
||||||
|
if (p == 3)
|
||||||
|
c = '\n';
|
||||||
|
BIO_write(cb->arg, &c, 1);
|
||||||
|
(void)BIO_flush(cb->arg);
|
||||||
|
# ifdef LINT
|
||||||
|
p = n;
|
||||||
|
# endif
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
#else /* !OPENSSL_NO_DH */
|
||||||
|
|
||||||
|
# if PEDANTIC
|
||||||
|
static void *dummy = &dummy;
|
||||||
|
# endif
|
||||||
|
|
||||||
if (outfile == NULL)
|
|
||||||
{
|
|
||||||
BIO_set_fp(out,stdout,BIO_NOCLOSE);
|
|
||||||
#ifdef OPENSSL_SYS_VMS
|
|
||||||
{
|
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
|
||||||
out = BIO_push(tmpbio, out);
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
if (BIO_write_filename(out,outfile) <= 0)
|
|
||||||
{
|
|
||||||
perror(outfile);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!app_RAND_load_file(NULL, bio_err, 1) && inrand == NULL)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"warning, not much extra random data, consider using the -rand option\n");
|
|
||||||
}
|
|
||||||
if (inrand != NULL)
|
|
||||||
BIO_printf(bio_err,"%ld semi-random bytes loaded\n",
|
|
||||||
app_RAND_load_files(inrand));
|
|
||||||
|
|
||||||
BIO_printf(bio_err,"Generating DH parameters, %d bit long safe prime, generator %d\n",num,g);
|
|
||||||
BIO_printf(bio_err,"This is going to take a long time\n");
|
|
||||||
dh=DH_generate_parameters(num,g,dh_cb,bio_err);
|
|
||||||
|
|
||||||
if (dh == NULL) goto end;
|
|
||||||
|
|
||||||
app_RAND_write_file(NULL, bio_err);
|
|
||||||
|
|
||||||
if (!PEM_write_bio_DHparams(out,dh))
|
|
||||||
goto end;
|
|
||||||
ret=0;
|
|
||||||
end:
|
|
||||||
if (ret != 0)
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
if (out != NULL) BIO_free_all(out);
|
|
||||||
if (dh != NULL) DH_free(dh);
|
|
||||||
apps_shutdown();
|
|
||||||
OPENSSL_EXIT(ret);
|
|
||||||
}
|
|
||||||
|
|
||||||
static void MS_CALLBACK dh_cb(int p, int n, void *arg)
|
|
||||||
{
|
|
||||||
char c='*';
|
|
||||||
|
|
||||||
if (p == 0) c='.';
|
|
||||||
if (p == 1) c='+';
|
|
||||||
if (p == 2) c='*';
|
|
||||||
if (p == 3) c='\n';
|
|
||||||
BIO_write((BIO *)arg,&c,1);
|
|
||||||
(void)BIO_flush((BIO *)arg);
|
|
||||||
#ifdef LINT
|
|
||||||
p=n;
|
|
||||||
#endif
|
|
||||||
}
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
400
apps/gendsa.c
400
apps/gendsa.c
@@ -56,196 +56,232 @@
|
|||||||
* [including the GNU Public Licence.]
|
* [including the GNU Public Licence.]
|
||||||
*/
|
*/
|
||||||
|
|
||||||
|
#include <openssl/opensslconf.h> /* for OPENSSL_NO_DSA */
|
||||||
#ifndef OPENSSL_NO_DSA
|
#ifndef OPENSSL_NO_DSA
|
||||||
#include <stdio.h>
|
# include <stdio.h>
|
||||||
#include <string.h>
|
# include <string.h>
|
||||||
#include <sys/types.h>
|
# include <sys/types.h>
|
||||||
#include <sys/stat.h>
|
# include <sys/stat.h>
|
||||||
#include "apps.h"
|
# include "apps.h"
|
||||||
#include <openssl/bio.h>
|
# include <openssl/bio.h>
|
||||||
#include <openssl/err.h>
|
# include <openssl/err.h>
|
||||||
#include <openssl/bn.h>
|
# include <openssl/bn.h>
|
||||||
#include <openssl/dsa.h>
|
# include <openssl/dsa.h>
|
||||||
#include <openssl/x509.h>
|
# include <openssl/x509.h>
|
||||||
#include <openssl/pem.h>
|
# include <openssl/pem.h>
|
||||||
|
|
||||||
#define DEFBITS 512
|
# define DEFBITS 512
|
||||||
#undef PROG
|
# undef PROG
|
||||||
#define PROG gendsa_main
|
# define PROG gendsa_main
|
||||||
|
|
||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
ENGINE *e = NULL;
|
DSA *dsa = NULL;
|
||||||
DSA *dsa=NULL;
|
int ret = 1;
|
||||||
int ret=1;
|
char *outfile = NULL;
|
||||||
char *outfile=NULL;
|
char *inrand = NULL, *dsaparams = NULL;
|
||||||
char *inrand=NULL,*dsaparams=NULL;
|
char *passargout = NULL, *passout = NULL;
|
||||||
char *passargout = NULL, *passout = NULL;
|
BIO *out = NULL, *in = NULL;
|
||||||
BIO *out=NULL,*in=NULL;
|
const EVP_CIPHER *enc = NULL;
|
||||||
const EVP_CIPHER *enc=NULL;
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
char *engine=NULL;
|
char *engine = NULL;
|
||||||
|
# endif
|
||||||
|
|
||||||
apps_startup();
|
apps_startup();
|
||||||
|
|
||||||
if (bio_err == NULL)
|
if (bio_err == NULL)
|
||||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
if ((bio_err = BIO_new(BIO_s_file())) != NULL)
|
||||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||||
|
|
||||||
if (!load_config(bio_err, NULL))
|
if (!load_config(bio_err, NULL))
|
||||||
goto end;
|
goto end;
|
||||||
|
|
||||||
|
argv++;
|
||||||
|
argc--;
|
||||||
|
for (;;) {
|
||||||
|
if (argc <= 0)
|
||||||
|
break;
|
||||||
|
if (strcmp(*argv, "-out") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
goto bad;
|
||||||
|
outfile = *(++argv);
|
||||||
|
} else if (strcmp(*argv, "-passout") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
goto bad;
|
||||||
|
passargout = *(++argv);
|
||||||
|
}
|
||||||
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
|
else if (strcmp(*argv, "-engine") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
goto bad;
|
||||||
|
engine = *(++argv);
|
||||||
|
}
|
||||||
|
# endif
|
||||||
|
else if (strcmp(*argv, "-rand") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
goto bad;
|
||||||
|
inrand = *(++argv);
|
||||||
|
} else if (strcmp(*argv, "-") == 0)
|
||||||
|
goto bad;
|
||||||
|
# ifndef OPENSSL_NO_DES
|
||||||
|
else if (strcmp(*argv, "-des") == 0)
|
||||||
|
enc = EVP_des_cbc();
|
||||||
|
else if (strcmp(*argv, "-des3") == 0)
|
||||||
|
enc = EVP_des_ede3_cbc();
|
||||||
|
# endif
|
||||||
|
# ifndef OPENSSL_NO_IDEA
|
||||||
|
else if (strcmp(*argv, "-idea") == 0)
|
||||||
|
enc = EVP_idea_cbc();
|
||||||
|
# endif
|
||||||
|
# ifndef OPENSSL_NO_SEED
|
||||||
|
else if (strcmp(*argv, "-seed") == 0)
|
||||||
|
enc = EVP_seed_cbc();
|
||||||
|
# endif
|
||||||
|
# ifndef OPENSSL_NO_AES
|
||||||
|
else if (strcmp(*argv, "-aes128") == 0)
|
||||||
|
enc = EVP_aes_128_cbc();
|
||||||
|
else if (strcmp(*argv, "-aes192") == 0)
|
||||||
|
enc = EVP_aes_192_cbc();
|
||||||
|
else if (strcmp(*argv, "-aes256") == 0)
|
||||||
|
enc = EVP_aes_256_cbc();
|
||||||
|
# endif
|
||||||
|
# ifndef OPENSSL_NO_CAMELLIA
|
||||||
|
else if (strcmp(*argv, "-camellia128") == 0)
|
||||||
|
enc = EVP_camellia_128_cbc();
|
||||||
|
else if (strcmp(*argv, "-camellia192") == 0)
|
||||||
|
enc = EVP_camellia_192_cbc();
|
||||||
|
else if (strcmp(*argv, "-camellia256") == 0)
|
||||||
|
enc = EVP_camellia_256_cbc();
|
||||||
|
# endif
|
||||||
|
else if (**argv != '-' && dsaparams == NULL) {
|
||||||
|
dsaparams = *argv;
|
||||||
|
} else
|
||||||
|
goto bad;
|
||||||
|
argv++;
|
||||||
|
argc--;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (dsaparams == NULL) {
|
||||||
|
bad:
|
||||||
|
BIO_printf(bio_err, "usage: gendsa [args] dsaparam-file\n");
|
||||||
|
BIO_printf(bio_err, " -out file - output the key to 'file'\n");
|
||||||
|
# ifndef OPENSSL_NO_DES
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" -des - encrypt the generated key with DES in cbc mode\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" -des3 - encrypt the generated key with DES in ede cbc mode (168 bit key)\n");
|
||||||
|
# endif
|
||||||
|
# ifndef OPENSSL_NO_IDEA
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" -idea - encrypt the generated key with IDEA in cbc mode\n");
|
||||||
|
# endif
|
||||||
|
# ifndef OPENSSL_NO_SEED
|
||||||
|
BIO_printf(bio_err, " -seed\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" encrypt PEM output with cbc seed\n");
|
||||||
|
# endif
|
||||||
|
# ifndef OPENSSL_NO_AES
|
||||||
|
BIO_printf(bio_err, " -aes128, -aes192, -aes256\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" encrypt PEM output with cbc aes\n");
|
||||||
|
# endif
|
||||||
|
# ifndef OPENSSL_NO_CAMELLIA
|
||||||
|
BIO_printf(bio_err, " -camellia128, -camellia192, -camellia256\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" encrypt PEM output with cbc camellia\n");
|
||||||
|
# endif
|
||||||
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" -engine e - use engine e, possibly a hardware device.\n");
|
||||||
|
# endif
|
||||||
|
BIO_printf(bio_err, " -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR,
|
||||||
|
LIST_SEPARATOR_CHAR);
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" - load the file (or the files in the directory) into\n");
|
||||||
|
BIO_printf(bio_err, " the random number generator\n");
|
||||||
|
BIO_printf(bio_err, " dsaparam-file\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" - a DSA parameter file as generated by the dsaparam command\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
|
setup_engine(bio_err, engine, 0);
|
||||||
|
# endif
|
||||||
|
|
||||||
|
if (!app_passwd(bio_err, NULL, passargout, NULL, &passout)) {
|
||||||
|
BIO_printf(bio_err, "Error getting password\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
in = BIO_new(BIO_s_file());
|
||||||
|
if (!(BIO_read_filename(in, dsaparams))) {
|
||||||
|
perror(dsaparams);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if ((dsa = PEM_read_bio_DSAparams(in, NULL, NULL, NULL)) == NULL) {
|
||||||
|
BIO_printf(bio_err, "unable to load DSA parameter file\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
BIO_free(in);
|
||||||
|
in = NULL;
|
||||||
|
|
||||||
|
out = BIO_new(BIO_s_file());
|
||||||
|
if (out == NULL)
|
||||||
|
goto end;
|
||||||
|
|
||||||
|
if (outfile == NULL) {
|
||||||
|
BIO_set_fp(out, stdout, BIO_NOCLOSE);
|
||||||
|
# ifdef OPENSSL_SYS_VMS
|
||||||
|
{
|
||||||
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
|
out = BIO_push(tmpbio, out);
|
||||||
|
}
|
||||||
|
# endif
|
||||||
|
} else {
|
||||||
|
if (BIO_write_filename(out, outfile) <= 0) {
|
||||||
|
perror(outfile);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!app_RAND_load_file(NULL, bio_err, 1) && inrand == NULL) {
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"warning, not much extra random data, consider using the -rand option\n");
|
||||||
|
}
|
||||||
|
if (inrand != NULL)
|
||||||
|
BIO_printf(bio_err, "%ld semi-random bytes loaded\n",
|
||||||
|
app_RAND_load_files(inrand));
|
||||||
|
|
||||||
|
BIO_printf(bio_err, "Generating DSA key, %d bits\n", BN_num_bits(dsa->p));
|
||||||
|
if (!DSA_generate_key(dsa))
|
||||||
|
goto end;
|
||||||
|
|
||||||
|
app_RAND_write_file(NULL, bio_err);
|
||||||
|
|
||||||
|
if (!PEM_write_bio_DSAPrivateKey(out, dsa, enc, NULL, 0, NULL, passout))
|
||||||
|
goto end;
|
||||||
|
ret = 0;
|
||||||
|
end:
|
||||||
|
if (ret != 0)
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
if (in != NULL)
|
||||||
|
BIO_free(in);
|
||||||
|
if (out != NULL)
|
||||||
|
BIO_free_all(out);
|
||||||
|
if (dsa != NULL)
|
||||||
|
DSA_free(dsa);
|
||||||
|
if (passout)
|
||||||
|
OPENSSL_free(passout);
|
||||||
|
apps_shutdown();
|
||||||
|
OPENSSL_EXIT(ret);
|
||||||
|
}
|
||||||
|
#else /* !OPENSSL_NO_DSA */
|
||||||
|
|
||||||
|
# if PEDANTIC
|
||||||
|
static void *dummy = &dummy;
|
||||||
|
# endif
|
||||||
|
|
||||||
argv++;
|
|
||||||
argc--;
|
|
||||||
for (;;)
|
|
||||||
{
|
|
||||||
if (argc <= 0) break;
|
|
||||||
if (strcmp(*argv,"-out") == 0)
|
|
||||||
{
|
|
||||||
if (--argc < 1) goto bad;
|
|
||||||
outfile= *(++argv);
|
|
||||||
}
|
|
||||||
else if (strcmp(*argv,"-passout") == 0)
|
|
||||||
{
|
|
||||||
if (--argc < 1) goto bad;
|
|
||||||
passargout= *(++argv);
|
|
||||||
}
|
|
||||||
else if (strcmp(*argv,"-engine") == 0)
|
|
||||||
{
|
|
||||||
if (--argc < 1) goto bad;
|
|
||||||
engine= *(++argv);
|
|
||||||
}
|
|
||||||
else if (strcmp(*argv,"-rand") == 0)
|
|
||||||
{
|
|
||||||
if (--argc < 1) goto bad;
|
|
||||||
inrand= *(++argv);
|
|
||||||
}
|
|
||||||
else if (strcmp(*argv,"-") == 0)
|
|
||||||
goto bad;
|
|
||||||
#ifndef OPENSSL_NO_DES
|
|
||||||
else if (strcmp(*argv,"-des") == 0)
|
|
||||||
enc=EVP_des_cbc();
|
|
||||||
else if (strcmp(*argv,"-des3") == 0)
|
|
||||||
enc=EVP_des_ede3_cbc();
|
|
||||||
#endif
|
|
||||||
#ifndef OPENSSL_NO_IDEA
|
|
||||||
else if (strcmp(*argv,"-idea") == 0)
|
|
||||||
enc=EVP_idea_cbc();
|
|
||||||
#endif
|
|
||||||
#ifndef OPENSSL_NO_AES
|
|
||||||
else if (strcmp(*argv,"-aes128") == 0)
|
|
||||||
enc=EVP_aes_128_cbc();
|
|
||||||
else if (strcmp(*argv,"-aes192") == 0)
|
|
||||||
enc=EVP_aes_192_cbc();
|
|
||||||
else if (strcmp(*argv,"-aes256") == 0)
|
|
||||||
enc=EVP_aes_256_cbc();
|
|
||||||
#endif
|
|
||||||
else if (**argv != '-' && dsaparams == NULL)
|
|
||||||
{
|
|
||||||
dsaparams = *argv;
|
|
||||||
}
|
|
||||||
else
|
|
||||||
goto bad;
|
|
||||||
argv++;
|
|
||||||
argc--;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (dsaparams == NULL)
|
|
||||||
{
|
|
||||||
bad:
|
|
||||||
BIO_printf(bio_err,"usage: gendsa [args] dsaparam-file\n");
|
|
||||||
BIO_printf(bio_err," -out file - output the key to 'file'\n");
|
|
||||||
#ifndef OPENSSL_NO_DES
|
|
||||||
BIO_printf(bio_err," -des - encrypt the generated key with DES in cbc mode\n");
|
|
||||||
BIO_printf(bio_err," -des3 - encrypt the generated key with DES in ede cbc mode (168 bit key)\n");
|
|
||||||
#endif
|
|
||||||
#ifndef OPENSSL_NO_IDEA
|
|
||||||
BIO_printf(bio_err," -idea - encrypt the generated key with IDEA in cbc mode\n");
|
|
||||||
#endif
|
|
||||||
#ifndef OPENSSL_NO_AES
|
|
||||||
BIO_printf(bio_err," -aes128, -aes192, -aes256\n");
|
|
||||||
BIO_printf(bio_err," encrypt PEM output with cbc aes\n");
|
|
||||||
#endif
|
|
||||||
BIO_printf(bio_err," -engine e - use engine e, possibly a hardware device.\n");
|
|
||||||
BIO_printf(bio_err," -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
|
|
||||||
BIO_printf(bio_err," - load the file (or the files in the directory) into\n");
|
|
||||||
BIO_printf(bio_err," the random number generator\n");
|
|
||||||
BIO_printf(bio_err," dsaparam-file\n");
|
|
||||||
BIO_printf(bio_err," - a DSA parameter file as generated by the dsaparam command\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
e = setup_engine(bio_err, engine, 0);
|
|
||||||
|
|
||||||
if(!app_passwd(bio_err, NULL, passargout, NULL, &passout)) {
|
|
||||||
BIO_printf(bio_err, "Error getting password\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
in=BIO_new(BIO_s_file());
|
|
||||||
if (!(BIO_read_filename(in,dsaparams)))
|
|
||||||
{
|
|
||||||
perror(dsaparams);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
if ((dsa=PEM_read_bio_DSAparams(in,NULL,NULL,NULL)) == NULL)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"unable to load DSA parameter file\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
BIO_free(in);
|
|
||||||
in = NULL;
|
|
||||||
|
|
||||||
out=BIO_new(BIO_s_file());
|
|
||||||
if (out == NULL) goto end;
|
|
||||||
|
|
||||||
if (outfile == NULL)
|
|
||||||
{
|
|
||||||
BIO_set_fp(out,stdout,BIO_NOCLOSE);
|
|
||||||
#ifdef OPENSSL_SYS_VMS
|
|
||||||
{
|
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
|
||||||
out = BIO_push(tmpbio, out);
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
if (BIO_write_filename(out,outfile) <= 0)
|
|
||||||
{
|
|
||||||
perror(outfile);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!app_RAND_load_file(NULL, bio_err, 1) && inrand == NULL)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"warning, not much extra random data, consider using the -rand option\n");
|
|
||||||
}
|
|
||||||
if (inrand != NULL)
|
|
||||||
BIO_printf(bio_err,"%ld semi-random bytes loaded\n",
|
|
||||||
app_RAND_load_files(inrand));
|
|
||||||
|
|
||||||
BIO_printf(bio_err,"Generating DSA key, %d bits\n",
|
|
||||||
BN_num_bits(dsa->p));
|
|
||||||
if (!DSA_generate_key(dsa)) goto end;
|
|
||||||
|
|
||||||
app_RAND_write_file(NULL, bio_err);
|
|
||||||
|
|
||||||
if (!PEM_write_bio_DSAPrivateKey(out,dsa,enc,NULL,0,NULL, passout))
|
|
||||||
goto end;
|
|
||||||
ret=0;
|
|
||||||
end:
|
|
||||||
if (ret != 0)
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
if (in != NULL) BIO_free(in);
|
|
||||||
if (out != NULL) BIO_free_all(out);
|
|
||||||
if (dsa != NULL) DSA_free(dsa);
|
|
||||||
if(passout) OPENSSL_free(passout);
|
|
||||||
apps_shutdown();
|
|
||||||
OPENSSL_EXIT(ret);
|
|
||||||
}
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
405
apps/genpkey.c
Normal file
405
apps/genpkey.c
Normal file
@@ -0,0 +1,405 @@
|
|||||||
|
/* apps/genpkey.c */
|
||||||
|
/*
|
||||||
|
* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL project
|
||||||
|
* 2006
|
||||||
|
*/
|
||||||
|
/* ====================================================================
|
||||||
|
* Copyright (c) 2006 The OpenSSL Project. All rights reserved.
|
||||||
|
*
|
||||||
|
* Redistribution and use in source and binary forms, with or without
|
||||||
|
* modification, are permitted provided that the following conditions
|
||||||
|
* are met:
|
||||||
|
*
|
||||||
|
* 1. Redistributions of source code must retain the above copyright
|
||||||
|
* notice, this list of conditions and the following disclaimer.
|
||||||
|
*
|
||||||
|
* 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
* notice, this list of conditions and the following disclaimer in
|
||||||
|
* the documentation and/or other materials provided with the
|
||||||
|
* distribution.
|
||||||
|
*
|
||||||
|
* 3. All advertising materials mentioning features or use of this
|
||||||
|
* software must display the following acknowledgment:
|
||||||
|
* "This product includes software developed by the OpenSSL Project
|
||||||
|
* for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
|
||||||
|
*
|
||||||
|
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
|
||||||
|
* endorse or promote products derived from this software without
|
||||||
|
* prior written permission. For written permission, please contact
|
||||||
|
* licensing@OpenSSL.org.
|
||||||
|
*
|
||||||
|
* 5. Products derived from this software may not be called "OpenSSL"
|
||||||
|
* nor may "OpenSSL" appear in their names without prior written
|
||||||
|
* permission of the OpenSSL Project.
|
||||||
|
*
|
||||||
|
* 6. Redistributions of any form whatsoever must retain the following
|
||||||
|
* acknowledgment:
|
||||||
|
* "This product includes software developed by the OpenSSL Project
|
||||||
|
* for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
|
||||||
|
*
|
||||||
|
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
|
||||||
|
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||||
|
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
|
||||||
|
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||||||
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
||||||
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
||||||
|
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||||
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
||||||
|
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
||||||
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
||||||
|
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
|
* ====================================================================
|
||||||
|
*
|
||||||
|
* This product includes cryptographic software written by Eric Young
|
||||||
|
* (eay@cryptsoft.com). This product includes software written by Tim
|
||||||
|
* Hudson (tjh@cryptsoft.com).
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <string.h>
|
||||||
|
#include "apps.h"
|
||||||
|
#include <openssl/pem.h>
|
||||||
|
#include <openssl/err.h>
|
||||||
|
#include <openssl/evp.h>
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
# include <openssl/engine.h>
|
||||||
|
#endif
|
||||||
|
|
||||||
|
static int init_keygen_file(BIO *err, EVP_PKEY_CTX **pctx,
|
||||||
|
const char *file, ENGINE *e);
|
||||||
|
static int genpkey_cb(EVP_PKEY_CTX *ctx);
|
||||||
|
|
||||||
|
#define PROG genpkey_main
|
||||||
|
|
||||||
|
int MAIN(int, char **);
|
||||||
|
|
||||||
|
int MAIN(int argc, char **argv)
|
||||||
|
{
|
||||||
|
ENGINE *e = NULL;
|
||||||
|
char **args, *outfile = NULL;
|
||||||
|
char *passarg = NULL;
|
||||||
|
BIO *in = NULL, *out = NULL;
|
||||||
|
const EVP_CIPHER *cipher = NULL;
|
||||||
|
int outformat;
|
||||||
|
int text = 0;
|
||||||
|
EVP_PKEY *pkey = NULL;
|
||||||
|
EVP_PKEY_CTX *ctx = NULL;
|
||||||
|
char *pass = NULL;
|
||||||
|
int badarg = 0;
|
||||||
|
int ret = 1, rv;
|
||||||
|
|
||||||
|
int do_param = 0;
|
||||||
|
|
||||||
|
if (bio_err == NULL)
|
||||||
|
bio_err = BIO_new_fp(stderr, BIO_NOCLOSE);
|
||||||
|
|
||||||
|
if (!load_config(bio_err, NULL))
|
||||||
|
goto end;
|
||||||
|
|
||||||
|
outformat = FORMAT_PEM;
|
||||||
|
|
||||||
|
ERR_load_crypto_strings();
|
||||||
|
OpenSSL_add_all_algorithms();
|
||||||
|
args = argv + 1;
|
||||||
|
while (!badarg && *args && *args[0] == '-') {
|
||||||
|
if (!strcmp(*args, "-outform")) {
|
||||||
|
if (args[1]) {
|
||||||
|
args++;
|
||||||
|
outformat = str2fmt(*args);
|
||||||
|
} else
|
||||||
|
badarg = 1;
|
||||||
|
} else if (!strcmp(*args, "-pass")) {
|
||||||
|
if (!args[1])
|
||||||
|
goto bad;
|
||||||
|
passarg = *(++args);
|
||||||
|
}
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
else if (strcmp(*args, "-engine") == 0) {
|
||||||
|
if (!args[1])
|
||||||
|
goto bad;
|
||||||
|
e = setup_engine(bio_err, *(++args), 0);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
else if (!strcmp(*args, "-paramfile")) {
|
||||||
|
if (!args[1])
|
||||||
|
goto bad;
|
||||||
|
args++;
|
||||||
|
if (do_param == 1)
|
||||||
|
goto bad;
|
||||||
|
if (!init_keygen_file(bio_err, &ctx, *args, e))
|
||||||
|
goto end;
|
||||||
|
} else if (!strcmp(*args, "-out")) {
|
||||||
|
if (args[1]) {
|
||||||
|
args++;
|
||||||
|
outfile = *args;
|
||||||
|
} else
|
||||||
|
badarg = 1;
|
||||||
|
} else if (strcmp(*args, "-algorithm") == 0) {
|
||||||
|
if (!args[1])
|
||||||
|
goto bad;
|
||||||
|
if (!init_gen_str(bio_err, &ctx, *(++args), e, do_param))
|
||||||
|
goto end;
|
||||||
|
} else if (strcmp(*args, "-pkeyopt") == 0) {
|
||||||
|
if (!args[1])
|
||||||
|
goto bad;
|
||||||
|
if (!ctx) {
|
||||||
|
BIO_puts(bio_err, "No keytype specified\n");
|
||||||
|
goto bad;
|
||||||
|
} else if (pkey_ctrl_string(ctx, *(++args)) <= 0) {
|
||||||
|
BIO_puts(bio_err, "parameter setting error\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
} else if (strcmp(*args, "-genparam") == 0) {
|
||||||
|
if (ctx)
|
||||||
|
goto bad;
|
||||||
|
do_param = 1;
|
||||||
|
} else if (strcmp(*args, "-text") == 0)
|
||||||
|
text = 1;
|
||||||
|
else {
|
||||||
|
cipher = EVP_get_cipherbyname(*args + 1);
|
||||||
|
if (!cipher) {
|
||||||
|
BIO_printf(bio_err, "Unknown cipher %s\n", *args + 1);
|
||||||
|
badarg = 1;
|
||||||
|
}
|
||||||
|
if (do_param == 1)
|
||||||
|
badarg = 1;
|
||||||
|
}
|
||||||
|
args++;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!ctx)
|
||||||
|
badarg = 1;
|
||||||
|
|
||||||
|
if (badarg) {
|
||||||
|
bad:
|
||||||
|
BIO_printf(bio_err, "Usage: genpkey [options]\n");
|
||||||
|
BIO_printf(bio_err, "where options may be\n");
|
||||||
|
BIO_printf(bio_err, "-out file output file\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"-outform X output format (DER or PEM)\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"-pass arg output file pass phrase source\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"-<cipher> use cipher <cipher> to encrypt the key\n");
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"-engine e use engine e, possibly a hardware device.\n");
|
||||||
|
#endif
|
||||||
|
BIO_printf(bio_err, "-paramfile file parameters file\n");
|
||||||
|
BIO_printf(bio_err, "-algorithm alg the public key algorithm\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"-pkeyopt opt:value set the public key algorithm option <opt>\n"
|
||||||
|
" to value <value>\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"-genparam generate parameters, not key\n");
|
||||||
|
BIO_printf(bio_err, "-text print the in text\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"NB: options order may be important! See the manual page.\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!app_passwd(bio_err, passarg, NULL, &pass, NULL)) {
|
||||||
|
BIO_puts(bio_err, "Error getting password\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (outfile) {
|
||||||
|
if (!(out = BIO_new_file(outfile, "wb"))) {
|
||||||
|
BIO_printf(bio_err, "Can't open output file %s\n", outfile);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
out = BIO_new_fp(stdout, BIO_NOCLOSE);
|
||||||
|
#ifdef OPENSSL_SYS_VMS
|
||||||
|
{
|
||||||
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
|
out = BIO_push(tmpbio, out);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
}
|
||||||
|
|
||||||
|
EVP_PKEY_CTX_set_cb(ctx, genpkey_cb);
|
||||||
|
EVP_PKEY_CTX_set_app_data(ctx, bio_err);
|
||||||
|
|
||||||
|
if (do_param) {
|
||||||
|
if (EVP_PKEY_paramgen(ctx, &pkey) <= 0) {
|
||||||
|
BIO_puts(bio_err, "Error generating parameters\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
if (EVP_PKEY_keygen(ctx, &pkey) <= 0) {
|
||||||
|
BIO_puts(bio_err, "Error generating key\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (do_param)
|
||||||
|
rv = PEM_write_bio_Parameters(out, pkey);
|
||||||
|
else if (outformat == FORMAT_PEM)
|
||||||
|
rv = PEM_write_bio_PrivateKey(out, pkey, cipher, NULL, 0, NULL, pass);
|
||||||
|
else if (outformat == FORMAT_ASN1)
|
||||||
|
rv = i2d_PrivateKey_bio(out, pkey);
|
||||||
|
else {
|
||||||
|
BIO_printf(bio_err, "Bad format specified for key\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (rv <= 0) {
|
||||||
|
BIO_puts(bio_err, "Error writing key\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (text) {
|
||||||
|
if (do_param)
|
||||||
|
rv = EVP_PKEY_print_params(out, pkey, 0, NULL);
|
||||||
|
else
|
||||||
|
rv = EVP_PKEY_print_private(out, pkey, 0, NULL);
|
||||||
|
|
||||||
|
if (rv <= 0) {
|
||||||
|
BIO_puts(bio_err, "Error printing key\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
ret = 0;
|
||||||
|
|
||||||
|
end:
|
||||||
|
if (pkey)
|
||||||
|
EVP_PKEY_free(pkey);
|
||||||
|
if (ctx)
|
||||||
|
EVP_PKEY_CTX_free(ctx);
|
||||||
|
if (out)
|
||||||
|
BIO_free_all(out);
|
||||||
|
BIO_free(in);
|
||||||
|
if (pass)
|
||||||
|
OPENSSL_free(pass);
|
||||||
|
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int init_keygen_file(BIO *err, EVP_PKEY_CTX **pctx,
|
||||||
|
const char *file, ENGINE *e)
|
||||||
|
{
|
||||||
|
BIO *pbio;
|
||||||
|
EVP_PKEY *pkey = NULL;
|
||||||
|
EVP_PKEY_CTX *ctx = NULL;
|
||||||
|
if (*pctx) {
|
||||||
|
BIO_puts(err, "Parameters already set!\n");
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
pbio = BIO_new_file(file, "r");
|
||||||
|
if (!pbio) {
|
||||||
|
BIO_printf(err, "Can't open parameter file %s\n", file);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
pkey = PEM_read_bio_Parameters(pbio, NULL);
|
||||||
|
BIO_free(pbio);
|
||||||
|
|
||||||
|
if (!pkey) {
|
||||||
|
BIO_printf(bio_err, "Error reading parameter file %s\n", file);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
ctx = EVP_PKEY_CTX_new(pkey, e);
|
||||||
|
if (!ctx)
|
||||||
|
goto err;
|
||||||
|
if (EVP_PKEY_keygen_init(ctx) <= 0)
|
||||||
|
goto err;
|
||||||
|
EVP_PKEY_free(pkey);
|
||||||
|
*pctx = ctx;
|
||||||
|
return 1;
|
||||||
|
|
||||||
|
err:
|
||||||
|
BIO_puts(err, "Error initializing context\n");
|
||||||
|
ERR_print_errors(err);
|
||||||
|
if (ctx)
|
||||||
|
EVP_PKEY_CTX_free(ctx);
|
||||||
|
if (pkey)
|
||||||
|
EVP_PKEY_free(pkey);
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
int init_gen_str(BIO *err, EVP_PKEY_CTX **pctx,
|
||||||
|
const char *algname, ENGINE *e, int do_param)
|
||||||
|
{
|
||||||
|
EVP_PKEY_CTX *ctx = NULL;
|
||||||
|
const EVP_PKEY_ASN1_METHOD *ameth;
|
||||||
|
ENGINE *tmpeng = NULL;
|
||||||
|
int pkey_id;
|
||||||
|
|
||||||
|
if (*pctx) {
|
||||||
|
BIO_puts(err, "Algorithm already set!\n");
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
ameth = EVP_PKEY_asn1_find_str(&tmpeng, algname, -1);
|
||||||
|
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
if (!ameth && e)
|
||||||
|
ameth = ENGINE_get_pkey_asn1_meth_str(e, algname, -1);
|
||||||
|
#endif
|
||||||
|
|
||||||
|
if (!ameth) {
|
||||||
|
BIO_printf(bio_err, "Algorithm %s not found\n", algname);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
ERR_clear_error();
|
||||||
|
|
||||||
|
EVP_PKEY_asn1_get0_info(&pkey_id, NULL, NULL, NULL, NULL, ameth);
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
if (tmpeng)
|
||||||
|
ENGINE_finish(tmpeng);
|
||||||
|
#endif
|
||||||
|
ctx = EVP_PKEY_CTX_new_id(pkey_id, e);
|
||||||
|
|
||||||
|
if (!ctx)
|
||||||
|
goto err;
|
||||||
|
if (do_param) {
|
||||||
|
if (EVP_PKEY_paramgen_init(ctx) <= 0)
|
||||||
|
goto err;
|
||||||
|
} else {
|
||||||
|
if (EVP_PKEY_keygen_init(ctx) <= 0)
|
||||||
|
goto err;
|
||||||
|
}
|
||||||
|
|
||||||
|
*pctx = ctx;
|
||||||
|
return 1;
|
||||||
|
|
||||||
|
err:
|
||||||
|
BIO_printf(err, "Error initializing %s context\n", algname);
|
||||||
|
ERR_print_errors(err);
|
||||||
|
if (ctx)
|
||||||
|
EVP_PKEY_CTX_free(ctx);
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
static int genpkey_cb(EVP_PKEY_CTX *ctx)
|
||||||
|
{
|
||||||
|
char c = '*';
|
||||||
|
BIO *b = EVP_PKEY_CTX_get_app_data(ctx);
|
||||||
|
int p;
|
||||||
|
p = EVP_PKEY_CTX_get_keygen_info(ctx, 0);
|
||||||
|
if (p == 0)
|
||||||
|
c = '.';
|
||||||
|
if (p == 1)
|
||||||
|
c = '+';
|
||||||
|
if (p == 2)
|
||||||
|
c = '*';
|
||||||
|
if (p == 3)
|
||||||
|
c = '\n';
|
||||||
|
BIO_write(b, &c, 1);
|
||||||
|
(void)BIO_flush(b);
|
||||||
|
#ifdef LINT
|
||||||
|
p = n;
|
||||||
|
#endif
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
462
apps/genrsa.c
462
apps/genrsa.c
@@ -56,235 +56,295 @@
|
|||||||
* [including the GNU Public Licence.]
|
* [including the GNU Public Licence.]
|
||||||
*/
|
*/
|
||||||
|
|
||||||
/* Until the key-gen callbacks are modified to use newer prototypes, we allow
|
#include <openssl/opensslconf.h>
|
||||||
* deprecated functions for openssl-internal code */
|
/*
|
||||||
|
* Until the key-gen callbacks are modified to use newer prototypes, we allow
|
||||||
|
* deprecated functions for openssl-internal code
|
||||||
|
*/
|
||||||
#ifdef OPENSSL_NO_DEPRECATED
|
#ifdef OPENSSL_NO_DEPRECATED
|
||||||
#undef OPENSSL_NO_DEPRECATED
|
# undef OPENSSL_NO_DEPRECATED
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_RSA
|
#ifndef OPENSSL_NO_RSA
|
||||||
#include <stdio.h>
|
# include <stdio.h>
|
||||||
#include <string.h>
|
# include <string.h>
|
||||||
#include <sys/types.h>
|
# include <sys/types.h>
|
||||||
#include <sys/stat.h>
|
# include <sys/stat.h>
|
||||||
#include "apps.h"
|
# include "apps.h"
|
||||||
#include <openssl/bio.h>
|
# include <openssl/bio.h>
|
||||||
#include <openssl/err.h>
|
# include <openssl/err.h>
|
||||||
#include <openssl/bn.h>
|
# include <openssl/bn.h>
|
||||||
#include <openssl/rsa.h>
|
# include <openssl/rsa.h>
|
||||||
#include <openssl/evp.h>
|
# include <openssl/evp.h>
|
||||||
#include <openssl/x509.h>
|
# include <openssl/x509.h>
|
||||||
#include <openssl/pem.h>
|
# include <openssl/pem.h>
|
||||||
#include <openssl/rand.h>
|
# include <openssl/rand.h>
|
||||||
|
|
||||||
#define DEFBITS 512
|
# define DEFBITS 1024
|
||||||
#undef PROG
|
# undef PROG
|
||||||
#define PROG genrsa_main
|
# define PROG genrsa_main
|
||||||
|
|
||||||
static void MS_CALLBACK genrsa_cb(int p, int n, void *arg);
|
static int MS_CALLBACK genrsa_cb(int p, int n, BN_GENCB *cb);
|
||||||
|
|
||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
ENGINE *e = NULL;
|
BN_GENCB cb;
|
||||||
int ret=1;
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
RSA *rsa=NULL;
|
ENGINE *e = NULL;
|
||||||
int i,num=DEFBITS;
|
# endif
|
||||||
long l;
|
int ret = 1;
|
||||||
const EVP_CIPHER *enc=NULL;
|
int i, num = DEFBITS;
|
||||||
unsigned long f4=RSA_F4;
|
long l;
|
||||||
char *outfile=NULL;
|
const EVP_CIPHER *enc = NULL;
|
||||||
char *passargout = NULL, *passout = NULL;
|
unsigned long f4 = RSA_F4;
|
||||||
char *engine=NULL;
|
char *outfile = NULL;
|
||||||
char *inrand=NULL;
|
char *passargout = NULL, *passout = NULL;
|
||||||
BIO *out=NULL;
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
|
char *engine = NULL;
|
||||||
|
# endif
|
||||||
|
char *inrand = NULL;
|
||||||
|
BIO *out = NULL;
|
||||||
|
BIGNUM *bn = BN_new();
|
||||||
|
RSA *rsa = NULL;
|
||||||
|
|
||||||
apps_startup();
|
if (!bn)
|
||||||
|
goto err;
|
||||||
|
|
||||||
if (bio_err == NULL)
|
apps_startup();
|
||||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
BN_GENCB_set(&cb, genrsa_cb, bio_err);
|
||||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
|
||||||
|
|
||||||
if (!load_config(bio_err, NULL))
|
if (bio_err == NULL)
|
||||||
goto err;
|
if ((bio_err = BIO_new(BIO_s_file())) != NULL)
|
||||||
if ((out=BIO_new(BIO_s_file())) == NULL)
|
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"unable to create BIO for output\n");
|
|
||||||
goto err;
|
|
||||||
}
|
|
||||||
|
|
||||||
argv++;
|
if (!load_config(bio_err, NULL))
|
||||||
argc--;
|
goto err;
|
||||||
for (;;)
|
if ((out = BIO_new(BIO_s_file())) == NULL) {
|
||||||
{
|
BIO_printf(bio_err, "unable to create BIO for output\n");
|
||||||
if (argc <= 0) break;
|
goto err;
|
||||||
if (strcmp(*argv,"-out") == 0)
|
}
|
||||||
{
|
|
||||||
if (--argc < 1) goto bad;
|
|
||||||
outfile= *(++argv);
|
|
||||||
}
|
|
||||||
else if (strcmp(*argv,"-3") == 0)
|
|
||||||
f4=3;
|
|
||||||
else if (strcmp(*argv,"-F4") == 0 || strcmp(*argv,"-f4") == 0)
|
|
||||||
f4=RSA_F4;
|
|
||||||
else if (strcmp(*argv,"-engine") == 0)
|
|
||||||
{
|
|
||||||
if (--argc < 1) goto bad;
|
|
||||||
engine= *(++argv);
|
|
||||||
}
|
|
||||||
else if (strcmp(*argv,"-rand") == 0)
|
|
||||||
{
|
|
||||||
if (--argc < 1) goto bad;
|
|
||||||
inrand= *(++argv);
|
|
||||||
}
|
|
||||||
#ifndef OPENSSL_NO_DES
|
|
||||||
else if (strcmp(*argv,"-des") == 0)
|
|
||||||
enc=EVP_des_cbc();
|
|
||||||
else if (strcmp(*argv,"-des3") == 0)
|
|
||||||
enc=EVP_des_ede3_cbc();
|
|
||||||
#endif
|
|
||||||
#ifndef OPENSSL_NO_IDEA
|
|
||||||
else if (strcmp(*argv,"-idea") == 0)
|
|
||||||
enc=EVP_idea_cbc();
|
|
||||||
#endif
|
|
||||||
#ifndef OPENSSL_NO_AES
|
|
||||||
else if (strcmp(*argv,"-aes128") == 0)
|
|
||||||
enc=EVP_aes_128_cbc();
|
|
||||||
else if (strcmp(*argv,"-aes192") == 0)
|
|
||||||
enc=EVP_aes_192_cbc();
|
|
||||||
else if (strcmp(*argv,"-aes256") == 0)
|
|
||||||
enc=EVP_aes_256_cbc();
|
|
||||||
#endif
|
|
||||||
else if (strcmp(*argv,"-passout") == 0)
|
|
||||||
{
|
|
||||||
if (--argc < 1) goto bad;
|
|
||||||
passargout= *(++argv);
|
|
||||||
}
|
|
||||||
else
|
|
||||||
break;
|
|
||||||
argv++;
|
|
||||||
argc--;
|
|
||||||
}
|
|
||||||
if ((argc >= 1) && ((sscanf(*argv,"%d",&num) == 0) || (num < 0)))
|
|
||||||
{
|
|
||||||
bad:
|
|
||||||
BIO_printf(bio_err,"usage: genrsa [args] [numbits]\n");
|
|
||||||
BIO_printf(bio_err," -des encrypt the generated key with DES in cbc mode\n");
|
|
||||||
BIO_printf(bio_err," -des3 encrypt the generated key with DES in ede cbc mode (168 bit key)\n");
|
|
||||||
#ifndef OPENSSL_NO_IDEA
|
|
||||||
BIO_printf(bio_err," -idea encrypt the generated key with IDEA in cbc mode\n");
|
|
||||||
#endif
|
|
||||||
#ifndef OPENSSL_NO_AES
|
|
||||||
BIO_printf(bio_err," -aes128, -aes192, -aes256\n");
|
|
||||||
BIO_printf(bio_err," encrypt PEM output with cbc aes\n");
|
|
||||||
#endif
|
|
||||||
BIO_printf(bio_err," -out file output the key to 'file\n");
|
|
||||||
BIO_printf(bio_err," -passout arg output file pass phrase source\n");
|
|
||||||
BIO_printf(bio_err," -f4 use F4 (0x10001) for the E value\n");
|
|
||||||
BIO_printf(bio_err," -3 use 3 for the E value\n");
|
|
||||||
BIO_printf(bio_err," -engine e use engine e, possibly a hardware device.\n");
|
|
||||||
BIO_printf(bio_err," -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
|
|
||||||
BIO_printf(bio_err," load the file (or the files in the directory) into\n");
|
|
||||||
BIO_printf(bio_err," the random number generator\n");
|
|
||||||
goto err;
|
|
||||||
}
|
|
||||||
|
|
||||||
ERR_load_crypto_strings();
|
argv++;
|
||||||
|
argc--;
|
||||||
|
for (;;) {
|
||||||
|
if (argc <= 0)
|
||||||
|
break;
|
||||||
|
if (strcmp(*argv, "-out") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
goto bad;
|
||||||
|
outfile = *(++argv);
|
||||||
|
} else if (strcmp(*argv, "-3") == 0)
|
||||||
|
f4 = 3;
|
||||||
|
else if (strcmp(*argv, "-F4") == 0 || strcmp(*argv, "-f4") == 0)
|
||||||
|
f4 = RSA_F4;
|
||||||
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
|
else if (strcmp(*argv, "-engine") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
goto bad;
|
||||||
|
engine = *(++argv);
|
||||||
|
}
|
||||||
|
# endif
|
||||||
|
else if (strcmp(*argv, "-rand") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
goto bad;
|
||||||
|
inrand = *(++argv);
|
||||||
|
}
|
||||||
|
# ifndef OPENSSL_NO_DES
|
||||||
|
else if (strcmp(*argv, "-des") == 0)
|
||||||
|
enc = EVP_des_cbc();
|
||||||
|
else if (strcmp(*argv, "-des3") == 0)
|
||||||
|
enc = EVP_des_ede3_cbc();
|
||||||
|
# endif
|
||||||
|
# ifndef OPENSSL_NO_IDEA
|
||||||
|
else if (strcmp(*argv, "-idea") == 0)
|
||||||
|
enc = EVP_idea_cbc();
|
||||||
|
# endif
|
||||||
|
# ifndef OPENSSL_NO_SEED
|
||||||
|
else if (strcmp(*argv, "-seed") == 0)
|
||||||
|
enc = EVP_seed_cbc();
|
||||||
|
# endif
|
||||||
|
# ifndef OPENSSL_NO_AES
|
||||||
|
else if (strcmp(*argv, "-aes128") == 0)
|
||||||
|
enc = EVP_aes_128_cbc();
|
||||||
|
else if (strcmp(*argv, "-aes192") == 0)
|
||||||
|
enc = EVP_aes_192_cbc();
|
||||||
|
else if (strcmp(*argv, "-aes256") == 0)
|
||||||
|
enc = EVP_aes_256_cbc();
|
||||||
|
# endif
|
||||||
|
# ifndef OPENSSL_NO_CAMELLIA
|
||||||
|
else if (strcmp(*argv, "-camellia128") == 0)
|
||||||
|
enc = EVP_camellia_128_cbc();
|
||||||
|
else if (strcmp(*argv, "-camellia192") == 0)
|
||||||
|
enc = EVP_camellia_192_cbc();
|
||||||
|
else if (strcmp(*argv, "-camellia256") == 0)
|
||||||
|
enc = EVP_camellia_256_cbc();
|
||||||
|
# endif
|
||||||
|
else if (strcmp(*argv, "-passout") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
goto bad;
|
||||||
|
passargout = *(++argv);
|
||||||
|
} else
|
||||||
|
break;
|
||||||
|
argv++;
|
||||||
|
argc--;
|
||||||
|
}
|
||||||
|
if ((argc >= 1) && ((sscanf(*argv, "%d", &num) == 0) || (num < 0))) {
|
||||||
|
bad:
|
||||||
|
BIO_printf(bio_err, "usage: genrsa [args] [numbits]\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" -des encrypt the generated key with DES in cbc mode\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" -des3 encrypt the generated key with DES in ede cbc mode (168 bit key)\n");
|
||||||
|
# ifndef OPENSSL_NO_IDEA
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" -idea encrypt the generated key with IDEA in cbc mode\n");
|
||||||
|
# endif
|
||||||
|
# ifndef OPENSSL_NO_SEED
|
||||||
|
BIO_printf(bio_err, " -seed\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" encrypt PEM output with cbc seed\n");
|
||||||
|
# endif
|
||||||
|
# ifndef OPENSSL_NO_AES
|
||||||
|
BIO_printf(bio_err, " -aes128, -aes192, -aes256\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" encrypt PEM output with cbc aes\n");
|
||||||
|
# endif
|
||||||
|
# ifndef OPENSSL_NO_CAMELLIA
|
||||||
|
BIO_printf(bio_err, " -camellia128, -camellia192, -camellia256\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" encrypt PEM output with cbc camellia\n");
|
||||||
|
# endif
|
||||||
|
BIO_printf(bio_err, " -out file output the key to 'file\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" -passout arg output file pass phrase source\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" -f4 use F4 (0x10001) for the E value\n");
|
||||||
|
BIO_printf(bio_err, " -3 use 3 for the E value\n");
|
||||||
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" -engine e use engine e, possibly a hardware device.\n");
|
||||||
|
# endif
|
||||||
|
BIO_printf(bio_err, " -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR,
|
||||||
|
LIST_SEPARATOR_CHAR);
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" load the file (or the files in the directory) into\n");
|
||||||
|
BIO_printf(bio_err, " the random number generator\n");
|
||||||
|
goto err;
|
||||||
|
}
|
||||||
|
|
||||||
if(!app_passwd(bio_err, NULL, passargout, NULL, &passout)) {
|
ERR_load_crypto_strings();
|
||||||
BIO_printf(bio_err, "Error getting password\n");
|
|
||||||
goto err;
|
|
||||||
}
|
|
||||||
|
|
||||||
e = setup_engine(bio_err, engine, 0);
|
if (!app_passwd(bio_err, NULL, passargout, NULL, &passout)) {
|
||||||
|
BIO_printf(bio_err, "Error getting password\n");
|
||||||
|
goto err;
|
||||||
|
}
|
||||||
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
|
e = setup_engine(bio_err, engine, 0);
|
||||||
|
# endif
|
||||||
|
|
||||||
if (outfile == NULL)
|
if (outfile == NULL) {
|
||||||
{
|
BIO_set_fp(out, stdout, BIO_NOCLOSE);
|
||||||
BIO_set_fp(out,stdout,BIO_NOCLOSE);
|
# ifdef OPENSSL_SYS_VMS
|
||||||
#ifdef OPENSSL_SYS_VMS
|
{
|
||||||
{
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
out = BIO_push(tmpbio, out);
|
||||||
out = BIO_push(tmpbio, out);
|
}
|
||||||
}
|
# endif
|
||||||
#endif
|
} else {
|
||||||
}
|
if (BIO_write_filename(out, outfile) <= 0) {
|
||||||
else
|
perror(outfile);
|
||||||
{
|
goto err;
|
||||||
if (BIO_write_filename(out,outfile) <= 0)
|
}
|
||||||
{
|
}
|
||||||
perror(outfile);
|
|
||||||
goto err;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!app_RAND_load_file(NULL, bio_err, 1) && inrand == NULL
|
if (!app_RAND_load_file(NULL, bio_err, 1) && inrand == NULL
|
||||||
&& !RAND_status())
|
&& !RAND_status()) {
|
||||||
{
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err,"warning, not much extra random data, consider using the -rand option\n");
|
"warning, not much extra random data, consider using the -rand option\n");
|
||||||
}
|
}
|
||||||
if (inrand != NULL)
|
if (inrand != NULL)
|
||||||
BIO_printf(bio_err,"%ld semi-random bytes loaded\n",
|
BIO_printf(bio_err, "%ld semi-random bytes loaded\n",
|
||||||
app_RAND_load_files(inrand));
|
app_RAND_load_files(inrand));
|
||||||
|
|
||||||
BIO_printf(bio_err,"Generating RSA private key, %d bit long modulus\n",
|
BIO_printf(bio_err, "Generating RSA private key, %d bit long modulus\n",
|
||||||
num);
|
num);
|
||||||
rsa=RSA_generate_key(num,f4,genrsa_cb,bio_err);
|
# ifdef OPENSSL_NO_ENGINE
|
||||||
|
rsa = RSA_new();
|
||||||
|
# else
|
||||||
|
rsa = RSA_new_method(e);
|
||||||
|
# endif
|
||||||
|
if (!rsa)
|
||||||
|
goto err;
|
||||||
|
|
||||||
app_RAND_write_file(NULL, bio_err);
|
if (!BN_set_word(bn, f4) || !RSA_generate_key_ex(rsa, num, bn, &cb))
|
||||||
|
goto err;
|
||||||
|
|
||||||
if (rsa == NULL) goto err;
|
app_RAND_write_file(NULL, bio_err);
|
||||||
|
|
||||||
/* We need to do the following for when the base number size is <
|
/*
|
||||||
* long, esp windows 3.1 :-(. */
|
* We need to do the following for when the base number size is < long,
|
||||||
l=0L;
|
* esp windows 3.1 :-(.
|
||||||
for (i=0; i<rsa->e->top; i++)
|
*/
|
||||||
{
|
l = 0L;
|
||||||
#ifndef SIXTY_FOUR_BIT
|
for (i = 0; i < rsa->e->top; i++) {
|
||||||
l<<=BN_BITS4;
|
# ifndef SIXTY_FOUR_BIT
|
||||||
l<<=BN_BITS4;
|
l <<= BN_BITS4;
|
||||||
#endif
|
l <<= BN_BITS4;
|
||||||
l+=rsa->e->d[i];
|
# endif
|
||||||
}
|
l += rsa->e->d[i];
|
||||||
BIO_printf(bio_err,"e is %ld (0x%lX)\n",l,l);
|
}
|
||||||
{
|
BIO_printf(bio_err, "e is %ld (0x%lX)\n", l, l);
|
||||||
PW_CB_DATA cb_data;
|
{
|
||||||
cb_data.password = passout;
|
PW_CB_DATA cb_data;
|
||||||
cb_data.prompt_info = outfile;
|
cb_data.password = passout;
|
||||||
if (!PEM_write_bio_RSAPrivateKey(out,rsa,enc,NULL,0,
|
cb_data.prompt_info = outfile;
|
||||||
(pem_password_cb *)password_callback,&cb_data))
|
if (!PEM_write_bio_RSAPrivateKey(out, rsa, enc, NULL, 0,
|
||||||
goto err;
|
(pem_password_cb *)password_callback,
|
||||||
}
|
&cb_data))
|
||||||
|
goto err;
|
||||||
|
}
|
||||||
|
|
||||||
ret=0;
|
ret = 0;
|
||||||
err:
|
err:
|
||||||
if (rsa != NULL) RSA_free(rsa);
|
if (bn)
|
||||||
if (out != NULL) BIO_free_all(out);
|
BN_free(bn);
|
||||||
if(passout) OPENSSL_free(passout);
|
if (rsa)
|
||||||
if (ret != 0)
|
RSA_free(rsa);
|
||||||
ERR_print_errors(bio_err);
|
if (out)
|
||||||
apps_shutdown();
|
BIO_free_all(out);
|
||||||
OPENSSL_EXIT(ret);
|
if (passout)
|
||||||
}
|
OPENSSL_free(passout);
|
||||||
|
if (ret != 0)
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
apps_shutdown();
|
||||||
|
OPENSSL_EXIT(ret);
|
||||||
|
}
|
||||||
|
|
||||||
static void MS_CALLBACK genrsa_cb(int p, int n, void *arg)
|
static int MS_CALLBACK genrsa_cb(int p, int n, BN_GENCB *cb)
|
||||||
{
|
{
|
||||||
char c='*';
|
char c = '*';
|
||||||
|
|
||||||
if (p == 0) c='.';
|
if (p == 0)
|
||||||
if (p == 1) c='+';
|
c = '.';
|
||||||
if (p == 2) c='*';
|
if (p == 1)
|
||||||
if (p == 3) c='\n';
|
c = '+';
|
||||||
BIO_write((BIO *)arg,&c,1);
|
if (p == 2)
|
||||||
(void)BIO_flush((BIO *)arg);
|
c = '*';
|
||||||
#ifdef LINT
|
if (p == 3)
|
||||||
p=n;
|
c = '\n';
|
||||||
#endif
|
BIO_write(cb->arg, &c, 1);
|
||||||
}
|
(void)BIO_flush(cb->arg);
|
||||||
#else /* !OPENSSL_NO_RSA */
|
# ifdef LINT
|
||||||
|
p = n;
|
||||||
|
# endif
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
#else /* !OPENSSL_NO_RSA */
|
||||||
|
|
||||||
# if PEDANTIC
|
# if PEDANTIC
|
||||||
static void *dummy=&dummy;
|
static void *dummy = &dummy;
|
||||||
# endif
|
# endif
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
107
apps/install-apps.com
Executable file
107
apps/install-apps.com
Executable file
@@ -0,0 +1,107 @@
|
|||||||
|
$! INSTALL.COM -- Installs the files in a given directory tree
|
||||||
|
$!
|
||||||
|
$! Author: Richard Levitte <richard@levitte.org>
|
||||||
|
$! Time of creation: 22-MAY-1998 10:13
|
||||||
|
$!
|
||||||
|
$! P1 root of the directory tree
|
||||||
|
$! P2 "64" for 64-bit pointers.
|
||||||
|
$!
|
||||||
|
$!
|
||||||
|
$! Announce/identify.
|
||||||
|
$!
|
||||||
|
$ proc = f$environment( "procedure")
|
||||||
|
$ write sys$output "@@@ "+ -
|
||||||
|
f$parse( proc, , , "name")+ f$parse( proc, , , "type")
|
||||||
|
$!
|
||||||
|
$ on error then goto tidy
|
||||||
|
$ on control_c then goto tidy
|
||||||
|
$!
|
||||||
|
$ if (p1 .eqs. "")
|
||||||
|
$ then
|
||||||
|
$ write sys$output "First argument missing."
|
||||||
|
$ write sys$output -
|
||||||
|
"It should be the directory where you want things installed."
|
||||||
|
$ exit
|
||||||
|
$ endif
|
||||||
|
$!
|
||||||
|
$ if (f$getsyi("cpu") .lt. 128)
|
||||||
|
$ then
|
||||||
|
$ arch = "VAX"
|
||||||
|
$ else
|
||||||
|
$ arch = f$edit( f$getsyi( "arch_name"), "upcase")
|
||||||
|
$ if (arch .eqs. "") then arch = "UNK"
|
||||||
|
$ endif
|
||||||
|
$!
|
||||||
|
$ archd = arch
|
||||||
|
$!
|
||||||
|
$ if (p2 .nes. "")
|
||||||
|
$ then
|
||||||
|
$ if (p2 .eqs. "64")
|
||||||
|
$ then
|
||||||
|
$ archd = arch+ "_64"
|
||||||
|
$ else
|
||||||
|
$ if (p2 .nes. "32")
|
||||||
|
$ then
|
||||||
|
$ write sys$output "Second argument invalid."
|
||||||
|
$ write sys$output "It should be "32", "64", or nothing."
|
||||||
|
$ exit
|
||||||
|
$ endif
|
||||||
|
$ endif
|
||||||
|
$ endif
|
||||||
|
$!
|
||||||
|
$ root = f$parse( p1, "[]A.;0", , , "syntax_only, no_conceal") - "A.;0"
|
||||||
|
$ root_dev = f$parse(root,,,"device","syntax_only")
|
||||||
|
$ root_dir = f$parse(root,,,"directory","syntax_only") - -
|
||||||
|
"[000000." - "][" - "[" - "]"
|
||||||
|
$ root = root_dev + "[" + root_dir
|
||||||
|
$!
|
||||||
|
$ define /nolog wrk_sslroot 'root'.] /trans=conc
|
||||||
|
$ define /nolog wrk_sslxexe wrk_sslroot:['archd'_exe]
|
||||||
|
$!
|
||||||
|
$ if f$parse("wrk_sslroot:[000000]") .eqs. "" then -
|
||||||
|
create /directory /log wrk_sslroot:[000000]
|
||||||
|
$ if f$parse("wrk_sslxexe:") .eqs. "" then -
|
||||||
|
create /directory /log wrk_sslxexe:
|
||||||
|
$!
|
||||||
|
$ exe := openssl
|
||||||
|
$!
|
||||||
|
$ exe_dir := [-.'archd'.exe.apps]
|
||||||
|
$!
|
||||||
|
$! Executables.
|
||||||
|
$!
|
||||||
|
$ i = 0
|
||||||
|
$ loop_exe:
|
||||||
|
$ e = f$edit(f$element( i, ",", exe), "trim")
|
||||||
|
$ i = i + 1
|
||||||
|
$ if e .eqs. "," then goto loop_exe_end
|
||||||
|
$ set noon
|
||||||
|
$ file = exe_dir+ e+ ".exe"
|
||||||
|
$ if f$search( file) .nes. ""
|
||||||
|
$ then
|
||||||
|
$ copy /protection = w:re 'file' wrk_sslxexe: /log
|
||||||
|
$ endif
|
||||||
|
$ set on
|
||||||
|
$ goto loop_exe
|
||||||
|
$ loop_exe_end:
|
||||||
|
$!
|
||||||
|
$! Miscellaneous.
|
||||||
|
$!
|
||||||
|
$ set noon
|
||||||
|
$ copy /protection = w:re ca.com wrk_sslxexe:ca.com /log
|
||||||
|
$ copy /protection = w:re openssl-vms.cnf wrk_sslroot:[000000]openssl.cnf /log
|
||||||
|
$ set on
|
||||||
|
$!
|
||||||
|
$ tidy:
|
||||||
|
$!
|
||||||
|
$ call deass wrk_sslroot
|
||||||
|
$ call deass wrk_sslxexe
|
||||||
|
$!
|
||||||
|
$ exit
|
||||||
|
$!
|
||||||
|
$ deass: subroutine
|
||||||
|
$ if (f$trnlnm( p1, "LNM$PROCESS") .nes. "")
|
||||||
|
$ then
|
||||||
|
$ deassign /process 'p1'
|
||||||
|
$ endif
|
||||||
|
$ endsubroutine
|
||||||
|
$!
|
||||||
@@ -1,69 +0,0 @@
|
|||||||
$! INSTALL.COM -- Installs the files in a given directory tree
|
|
||||||
$!
|
|
||||||
$! Author: Richard Levitte <richard@levitte.org>
|
|
||||||
$! Time of creation: 22-MAY-1998 10:13
|
|
||||||
$!
|
|
||||||
$! P1 root of the directory tree
|
|
||||||
$!
|
|
||||||
$ IF P1 .EQS. ""
|
|
||||||
$ THEN
|
|
||||||
$ WRITE SYS$OUTPUT "First argument missing."
|
|
||||||
$ WRITE SYS$OUTPUT "Should be the directory where you want things installed."
|
|
||||||
$ EXIT
|
|
||||||
$ ENDIF
|
|
||||||
$
|
|
||||||
$ ROOT = F$PARSE(P1,"[]A.;0",,,"SYNTAX_ONLY,NO_CONCEAL") - "A.;0"
|
|
||||||
$ ROOT_DEV = F$PARSE(ROOT,,,"DEVICE","SYNTAX_ONLY")
|
|
||||||
$ ROOT_DIR = F$PARSE(ROOT,,,"DIRECTORY","SYNTAX_ONLY") -
|
|
||||||
- "[000000." - "][" - "[" - "]"
|
|
||||||
$ ROOT = ROOT_DEV + "[" + ROOT_DIR
|
|
||||||
$
|
|
||||||
$ DEFINE/NOLOG WRK_SSLROOT 'ROOT'.] /TRANS=CONC
|
|
||||||
$ DEFINE/NOLOG WRK_SSLVEXE WRK_SSLROOT:[VAX_EXE]
|
|
||||||
$ DEFINE/NOLOG WRK_SSLAEXE WRK_SSLROOT:[ALPHA_EXE]
|
|
||||||
$ DEFINE/NOLOG WRK_SSLLIB WRK_SSLROOT:[LIB]
|
|
||||||
$
|
|
||||||
$ IF F$PARSE("WRK_SSLROOT:[000000]") .EQS. "" THEN -
|
|
||||||
CREATE/DIR/LOG WRK_SSLROOT:[000000]
|
|
||||||
$ IF F$PARSE("WRK_SSLVEXE:") .EQS. "" THEN -
|
|
||||||
CREATE/DIR/LOG WRK_SSLVEXE:
|
|
||||||
$ IF F$PARSE("WRK_SSLAEXE:") .EQS. "" THEN -
|
|
||||||
CREATE/DIR/LOG WRK_SSLAEXE:
|
|
||||||
$ IF F$PARSE("WRK_SSLLIB:") .EQS. "" THEN -
|
|
||||||
CREATE/DIR/LOG WRK_SSLLIB:
|
|
||||||
$
|
|
||||||
$ EXE := openssl
|
|
||||||
$
|
|
||||||
$ VEXE_DIR := [-.VAX.EXE.APPS]
|
|
||||||
$ AEXE_DIR := [-.AXP.EXE.APPS]
|
|
||||||
$
|
|
||||||
$ I = 0
|
|
||||||
$ LOOP_EXE:
|
|
||||||
$ E = F$EDIT(F$ELEMENT(I, ",", EXE),"TRIM")
|
|
||||||
$ I = I + 1
|
|
||||||
$ IF E .EQS. "," THEN GOTO LOOP_EXE_END
|
|
||||||
$ SET NOON
|
|
||||||
$ IF F$SEARCH(VEXE_DIR+E+".EXE") .NES. ""
|
|
||||||
$ THEN
|
|
||||||
$ COPY 'VEXE_DIR''E'.EXE WRK_SSLVEXE:'E'.EXE/log
|
|
||||||
$ SET FILE/PROT=W:RE WRK_SSLVEXE:'E'.EXE
|
|
||||||
$ ENDIF
|
|
||||||
$ IF F$SEARCH(AEXE_DIR+E+".EXE") .NES. ""
|
|
||||||
$ THEN
|
|
||||||
$ COPY 'AEXE_DIR''E'.EXE WRK_SSLAEXE:'E'.EXE/log
|
|
||||||
$ SET FILE/PROT=W:RE WRK_SSLAEXE:'E'.EXE
|
|
||||||
$ ENDIF
|
|
||||||
$ SET ON
|
|
||||||
$ GOTO LOOP_EXE
|
|
||||||
$ LOOP_EXE_END:
|
|
||||||
$
|
|
||||||
$ SET NOON
|
|
||||||
$ COPY CA.COM WRK_SSLAEXE:CA.COM/LOG
|
|
||||||
$ SET FILE/PROT=W:RE WRK_SSLAEXE:CA.COM
|
|
||||||
$ COPY CA.COM WRK_SSLVEXE:CA.COM/LOG
|
|
||||||
$ SET FILE/PROT=W:RE WRK_SSLVEXE:CA.COM
|
|
||||||
$ COPY OPENSSL-VMS.CNF WRK_SSLROOT:[000000]OPENSSL.CNF/LOG
|
|
||||||
$ SET FILE/PROT=W:R WRK_SSLROOT:[000000]OPENSSL.CNF
|
|
||||||
$ SET ON
|
|
||||||
$
|
|
||||||
$ EXIT
|
|
||||||
@@ -6,11 +6,12 @@ $! A-Com Computing, Inc.
|
|||||||
$! byer@mail.all-net.net
|
$! byer@mail.all-net.net
|
||||||
$!
|
$!
|
||||||
$! Changes by Richard Levitte <richard@levitte.org>
|
$! Changes by Richard Levitte <richard@levitte.org>
|
||||||
|
$! Zoltan Arpadffy <zoli@polarhome.com>
|
||||||
$!
|
$!
|
||||||
$! This command files compiles and creates all the various different
|
$! This command files compiles and creates all the various different
|
||||||
$! "application" programs for the different types of encryption for OpenSSL.
|
$! "application" programs for the different types of encryption for OpenSSL.
|
||||||
$! The EXE's are placed in the directory [.xxx.EXE.APPS] where "xxx" denotes
|
$! The EXE's are placed in the directory [.xxx.EXE.APPS] where "xxx" denotes
|
||||||
$! either AXP or VAX depending on your machine architecture.
|
$! ALPHA, IA64 or VAX, depending on your machine architecture.
|
||||||
$!
|
$!
|
||||||
$! It was written so it would try to determine what "C" compiler to
|
$! It was written so it would try to determine what "C" compiler to
|
||||||
$! use or you can specify which "C" compiler to use.
|
$! use or you can specify which "C" compiler to use.
|
||||||
@@ -24,7 +25,7 @@ $! VAXC For VAX C.
|
|||||||
$! DECC For DEC C.
|
$! DECC For DEC C.
|
||||||
$! GNUC For GNU C.
|
$! GNUC For GNU C.
|
||||||
$!
|
$!
|
||||||
$! If you don't speficy a compiler, it will try to determine which
|
$! If you don't specify a compiler, it will try to determine which
|
||||||
$! "C" compiler to use.
|
$! "C" compiler to use.
|
||||||
$!
|
$!
|
||||||
$! P3, if defined, sets a TCP/IP library to use, through one of the following
|
$! P3, if defined, sets a TCP/IP library to use, through one of the following
|
||||||
@@ -38,64 +39,105 @@ $! P4, if defined, sets a compiler thread NOT needed on OpenVMS 7.1 (and up)
|
|||||||
$!
|
$!
|
||||||
$! P5, if defined, sets a choice of programs to compile.
|
$! P5, if defined, sets a choice of programs to compile.
|
||||||
$!
|
$!
|
||||||
|
$! P6, if defined, specifies the C pointer size. Ignored on VAX.
|
||||||
|
$! ("64=ARGV" gives more efficient code with HP C V7.3 or newer.)
|
||||||
|
$! Supported values are:
|
||||||
|
$!
|
||||||
|
$! "" Compile with default (/NOPOINTER_SIZE)
|
||||||
|
$! 32 Compile with /POINTER_SIZE=32 (SHORT)
|
||||||
|
$! 64 Compile with /POINTER_SIZE=64[=ARGV] (LONG[=ARGV])
|
||||||
|
$! (Automatically select ARGV if compiler supports it.)
|
||||||
|
$! 64= Compile with /POINTER_SIZE=64 (LONG).
|
||||||
|
$! 64=ARGV Compile with /POINTER_SIZE=64=ARGV (LONG=ARGV).
|
||||||
|
$!
|
||||||
|
$! P7, if defined, specifies a directory where ZLIB files (zlib.h,
|
||||||
|
$! libz.olb) may be found. Optionally, a non-default object library
|
||||||
|
$! name may be included ("dev:[dir]libz_64.olb", for example).
|
||||||
|
$!
|
||||||
|
$!
|
||||||
|
$! Announce/identify.
|
||||||
|
$!
|
||||||
|
$ proc = f$environment( "procedure")
|
||||||
|
$ write sys$output "@@@ "+ -
|
||||||
|
f$parse( proc, , , "name")+ f$parse( proc, , , "type")
|
||||||
|
$!
|
||||||
|
$ on control_c then goto exit
|
||||||
$!
|
$!
|
||||||
$! Define A TCP/IP Library That We Will Need To Link To.
|
$! Define A TCP/IP Library That We Will Need To Link To.
|
||||||
$! (That Is, If We Need To Link To One.)
|
$! (That Is, If We Need To Link To One.)
|
||||||
$!
|
$!
|
||||||
$ TCPIP_LIB = ""
|
$ TCPIP_LIB = ""
|
||||||
|
$ ZLIB_LIB = ""
|
||||||
$!
|
$!
|
||||||
$! Check What Architecture We Are Using.
|
$! Check What Architecture We Are Using.
|
||||||
$!
|
$!
|
||||||
$ IF (F$GETSYI("CPU").GE.128)
|
$ IF (F$GETSYI("CPU").LT.128)
|
||||||
$ THEN
|
$ THEN
|
||||||
$!
|
$!
|
||||||
$! The Architecture Is AXP.
|
$! The Architecture Is VAX.
|
||||||
$!
|
$!
|
||||||
$ ARCH := AXP
|
$ ARCH = "VAX"
|
||||||
$!
|
$!
|
||||||
$! Else...
|
$! Else...
|
||||||
$!
|
$!
|
||||||
$ ELSE
|
$ ELSE
|
||||||
$!
|
$!
|
||||||
$! The Architecture Is VAX.
|
$! The Architecture Is Alpha, IA64 or whatever comes in the future.
|
||||||
$!
|
$!
|
||||||
$ ARCH := VAX
|
$ ARCH = F$EDIT( F$GETSYI( "ARCH_NAME"), "UPCASE")
|
||||||
|
$ IF (ARCH .EQS. "") THEN ARCH = "UNK"
|
||||||
$!
|
$!
|
||||||
$! End The Architecture Check.
|
$! End The Architecture Check.
|
||||||
$!
|
$!
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$!
|
$!
|
||||||
|
$ ARCHD = ARCH
|
||||||
|
$ LIB32 = "32"
|
||||||
|
$ OPT_FILE = ""
|
||||||
|
$ POINTER_SIZE = ""
|
||||||
|
$!
|
||||||
$! Define what programs should be compiled
|
$! Define what programs should be compiled
|
||||||
$!
|
$!
|
||||||
$ PROGRAMS := OPENSSL
|
$ PROGRAMS := OPENSSL
|
||||||
$!$ PROGRAMS := VERIFY,ASN1PARS,REQ,DGST,DH,ENC,PASSWD,GENDH,ERRSTR,CA,CRL,-
|
|
||||||
$! RSA,DSA,DSAPARAM,-
|
|
||||||
$! X509,GENRSA,GENDSA,S_SERVER,S_CLIENT,SPEED,-
|
|
||||||
$! S_TIME,VERSION,PKCS7,CRL2P7,SESS_ID,CIPHERS,NSEQ,
|
|
||||||
$!
|
$!
|
||||||
$! Check To Make Sure We Have Valid Command Line Parameters.
|
$! Check To Make Sure We Have Valid Command Line Parameters.
|
||||||
$!
|
$!
|
||||||
$ GOSUB CHECK_OPTIONS
|
$ GOSUB CHECK_OPTIONS
|
||||||
$!
|
$!
|
||||||
|
$! Define The CRYPTO Library.
|
||||||
|
$!
|
||||||
|
$ CRYPTO_LIB := SYS$DISK:[-.'ARCHD'.EXE.CRYPTO]SSL_LIBCRYPTO'LIB32'.OLB
|
||||||
|
$!
|
||||||
|
$! Define The SSL Library.
|
||||||
|
$!
|
||||||
|
$ SSL_LIB := SYS$DISK:[-.'ARCHD'.EXE.SSL]SSL_LIBSSL'LIB32'.OLB
|
||||||
|
$!
|
||||||
|
$! Define The OBJ and EXE Directories.
|
||||||
|
$!
|
||||||
|
$ OBJ_DIR := SYS$DISK:[-.'ARCHD'.OBJ.APPS]
|
||||||
|
$ EXE_DIR := SYS$DISK:[-.'ARCHD'.EXE.APPS]
|
||||||
|
$!
|
||||||
|
$! Specify the destination directory in any /MAP option.
|
||||||
|
$!
|
||||||
|
$ if (LINKMAP .eqs. "MAP")
|
||||||
|
$ then
|
||||||
|
$ LINKMAP = LINKMAP+ "=''EXE_DIR'"
|
||||||
|
$ endif
|
||||||
|
$!
|
||||||
|
$! Add the location prefix to the linker options file name.
|
||||||
|
$!
|
||||||
|
$ if (OPT_FILE .nes. "")
|
||||||
|
$ then
|
||||||
|
$ OPT_FILE = EXE_DIR+ OPT_FILE
|
||||||
|
$ endif
|
||||||
|
$!
|
||||||
$! Initialise logical names and such
|
$! Initialise logical names and such
|
||||||
$!
|
$!
|
||||||
$ GOSUB INITIALISE
|
$ GOSUB INITIALISE
|
||||||
$!
|
$!
|
||||||
$! Tell The User What Kind of Machine We Run On.
|
$! Tell The User What Kind of Machine We Run On.
|
||||||
$!
|
$!
|
||||||
$ WRITE SYS$OUTPUT "Compiling On A ",ARCH," Machine."
|
$ WRITE SYS$OUTPUT "Host system architecture: ''ARCHD'"
|
||||||
$!
|
|
||||||
$! Define The CRYPTO Library.
|
|
||||||
$!
|
|
||||||
$ CRYPTO_LIB := SYS$DISK:[-.'ARCH'.EXE.CRYPTO]LIBCRYPTO.OLB
|
|
||||||
$!
|
|
||||||
$! Define The SSL Library.
|
|
||||||
$!
|
|
||||||
$ SSL_LIB := SYS$DISK:[-.'ARCH'.EXE.SSL]LIBSSL.OLB
|
|
||||||
$!
|
|
||||||
$! Define The OBJ Directory.
|
|
||||||
$!
|
|
||||||
$ OBJ_DIR := SYS$DISK:[-.'ARCH'.OBJ.APPS]
|
|
||||||
$!
|
$!
|
||||||
$! Check To See If The OBJ Directory Exists.
|
$! Check To See If The OBJ Directory Exists.
|
||||||
$!
|
$!
|
||||||
@@ -110,10 +152,6 @@ $! End The OBJ Directory Check.
|
|||||||
$!
|
$!
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$!
|
$!
|
||||||
$! Define The EXE Directory.
|
|
||||||
$!
|
|
||||||
$ EXE_DIR := SYS$DISK:[-.'ARCH'.EXE.APPS]
|
|
||||||
$!
|
|
||||||
$! Check To See If The EXE Directory Exists.
|
$! Check To See If The EXE Directory Exists.
|
||||||
$!
|
$!
|
||||||
$ IF (F$PARSE(EXE_DIR).EQS."")
|
$ IF (F$PARSE(EXE_DIR).EQS."")
|
||||||
@@ -136,33 +174,23 @@ $!
|
|||||||
$ GOSUB CHECK_OPT_FILE
|
$ GOSUB CHECK_OPT_FILE
|
||||||
$!
|
$!
|
||||||
$! Define The Application Files.
|
$! Define The Application Files.
|
||||||
|
$! NOTE: Some might think this list ugly. However, it's made this way to
|
||||||
|
$! reflect the E_OBJ variable in Makefile as closely as possible, thereby
|
||||||
|
$! making it fairly easy to verify that the lists are the same.
|
||||||
|
$!
|
||||||
|
$ LIB_OPENSSL = "VERIFY,ASN1PARS,REQ,DGST,DH,DHPARAM,ENC,PASSWD,GENDH,ERRSTR,"+-
|
||||||
|
"CA,PKCS7,CRL2P7,CRL,"+-
|
||||||
|
"RSA,RSAUTL,DSA,DSAPARAM,EC,ECPARAM,"+-
|
||||||
|
"X509,GENRSA,GENDSA,GENPKEY,S_SERVER,S_CLIENT,SPEED,"+-
|
||||||
|
"S_TIME,APPS,S_CB,S_SOCKET,APP_RAND,VERSION,SESS_ID,"+-
|
||||||
|
"CIPHERS,NSEQ,PKCS12,PKCS8,PKEY,PKEYPARAM,PKEYUTL,"+ -
|
||||||
|
"SPKAC,SMIME,CMS,RAND,ENGINE,OCSP,PRIME,TS,SRP"
|
||||||
|
$!
|
||||||
|
$ LIB_OPENSSL = LIB_OPENSSL+ ",VMS_DECC_INIT"
|
||||||
$!
|
$!
|
||||||
$ LIB_FILES = "VERIFY;ASN1PARS;REQ;DGST;DH;DHPARAM;ENC;PASSWD;GENDH;ERRSTR;"+-
|
|
||||||
"CA;PKCS7;CRL2P7;CRL;"+-
|
|
||||||
"RSA;RSAUTL;DSA;DSAPARAM;EC;ECPARAM;"+-
|
|
||||||
"X509;GENRSA;GENDSA;S_SERVER;S_CLIENT;SPEED;"+-
|
|
||||||
"S_TIME;APPS;S_CB;S_SOCKET;APP_RAND;VERSION;SESS_ID;"+-
|
|
||||||
"CIPHERS;NSEQ;PKCS12;PKCS8;SPKAC;SMIME;RAND;ENGINE;OCSP"
|
|
||||||
$ APP_FILES := OPENSSL,'OBJ_DIR'VERIFY.OBJ,ASN1PARS.OBJ,REQ.OBJ,DGST.OBJ,DH.OBJ,DHPARAM.OBJ,ENC.OBJ,PASSWD.OBJ,GENDH.OBJ,ERRSTR.OBJ,-
|
|
||||||
CA.OBJ,PKCS7.OBJ,CRL2P7.OBJ,CRL.OBJ,-
|
|
||||||
RSA.OBJ,RSAUTL.OBJ,DSA.OBJ,DSAPARAM.OBJ,EC.OBJ,ECPARAM.OBJ,-
|
|
||||||
X509.OBJ,GENRSA.OBJ,GENDSA.OBJ,S_SERVER.OBJ,S_CLIENT.OBJ,SPEED.OBJ,-
|
|
||||||
S_TIME.OBJ,APPS.OBJ,S_CB.OBJ,S_SOCKET.OBJ,APP_RAND.OBJ,VERSION.OBJ,SESS_ID.OBJ,-
|
|
||||||
CIPHERS.OBJ,NSEQ.OBJ,PKCS12.OBJ,PKCS8.OBJ,SPKAC.OBJ,SMIME.OBJ,RAND.OBJ,ENGINE.OBJ,OCSP.OBJ
|
|
||||||
$ TCPIP_PROGRAMS = ",,"
|
$ TCPIP_PROGRAMS = ",,"
|
||||||
$ IF COMPILER .EQS. "VAXC" THEN -
|
$ IF COMPILER .EQS. "VAXC" THEN -
|
||||||
TCPIP_PROGRAMS = ",OPENSSL,"
|
TCPIP_PROGRAMS = ",OPENSSL,"
|
||||||
$!$ APP_FILES := VERIFY;ASN1PARS;REQ;DGST;DH;ENC;GENDH;ERRSTR;CA;-
|
|
||||||
$! PKCS7;CRL2P7;CRL;-
|
|
||||||
$! RSA;DSA;DSAPARAM;-
|
|
||||||
$! X509;GENRSA;GENDSA;-
|
|
||||||
$! S_SERVER,'OBJ_DIR'S_SOCKET.OBJ,'OBJ_DIR'S_CB.OBJ;-
|
|
||||||
$! S_CLIENT,'OBJ_DIR'S_SOCKET.OBJ,'OBJ_DIR'S_CB.OBJ;-
|
|
||||||
$! SPEED;-
|
|
||||||
$! S_TIME,'OBJ_DIR'S_CB.OBJ;VERSION;SESS_ID;CIPHERS;NSEQ
|
|
||||||
$!$ TCPIP_PROGRAMS = ",,"
|
|
||||||
$!$ IF COMPILER .EQS. "VAXC" THEN -
|
|
||||||
$! TCPIP_PROGRAMS = ",S_SERVER,S_CLIENT,SESS_ID,CIPHERS,S_TIME,"
|
|
||||||
$!
|
$!
|
||||||
$! Setup exceptional compilations
|
$! Setup exceptional compilations
|
||||||
$!
|
$!
|
||||||
@@ -172,146 +200,158 @@ $ PHASE := LIB
|
|||||||
$!
|
$!
|
||||||
$ RESTART:
|
$ RESTART:
|
||||||
$!
|
$!
|
||||||
$! Define A File Counter And Set It To "0".
|
$! Define An App Counter And Set It To "0".
|
||||||
$!
|
$!
|
||||||
$ FILE_COUNTER = 0
|
$ APP_COUNTER = 0
|
||||||
$!
|
$!
|
||||||
$! Top Of The File Loop.
|
$! Top Of The App Loop.
|
||||||
$!
|
$!
|
||||||
$ NEXT_FILE:
|
$ NEXT_APP:
|
||||||
$!
|
$!
|
||||||
$! O.K, Extract The File Name From The File List.
|
$! Make The Application File Name
|
||||||
$!
|
$!
|
||||||
$ FILE_NAME0 = F$EDIT(F$ELEMENT(FILE_COUNTER,";",'PHASE'_FILES),"TRIM")
|
$ CURRENT_APP = F$EDIT(F$ELEMENT(APP_COUNTER,",",PROGRAMS),"TRIM")
|
||||||
$ FILE_NAME = F$EDIT(F$ELEMENT(0,",",FILE_NAME0),"TRIM")
|
|
||||||
$ EXTRA_OBJ = FILE_NAME0 - FILE_NAME
|
|
||||||
$!
|
$!
|
||||||
$! Check To See If We Are At The End Of The File List.
|
$! Create The Executable File Name.
|
||||||
$!
|
$!
|
||||||
$ IF (FILE_NAME0.EQS.";")
|
$ EXE_FILE = EXE_DIR + CURRENT_APP + ".EXE"
|
||||||
|
$!
|
||||||
|
$! Check To See If We Are At The End Of The File List.
|
||||||
|
$!
|
||||||
|
$ IF (CURRENT_APP.EQS.",")
|
||||||
$ THEN
|
$ THEN
|
||||||
$ IF (PHASE.EQS."LIB")
|
$ IF (PHASE.EQS."LIB")
|
||||||
$ THEN
|
$ THEN
|
||||||
$ PHASE := APP
|
$ PHASE := APP
|
||||||
$ GOTO RESTART
|
$ GOTO RESTART
|
||||||
$ ELSE
|
$ ELSE
|
||||||
$ GOTO FILE_DONE
|
$ GOTO APP_DONE
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$!
|
$!
|
||||||
$! Increment The Counter.
|
$! Increment The Counter.
|
||||||
$!
|
$!
|
||||||
$ FILE_COUNTER = FILE_COUNTER + 1
|
$ APP_COUNTER = APP_COUNTER + 1
|
||||||
$!
|
$!
|
||||||
$! Check to see if this program should actually be compiled
|
$! Decide if we're building the object files or not.
|
||||||
$!
|
|
||||||
$ IF PHASE .EQS. "APP" .AND. -
|
|
||||||
","+PROGRAMS+"," - (","+F$EDIT(FILE_NAME,"UPCASE")+",") .EQS. ","+PROGRAMS+","
|
|
||||||
$ THEN
|
|
||||||
$ GOTO NEXT_FILE
|
|
||||||
$ ENDIF
|
|
||||||
$!
|
|
||||||
$! Create The Source File Name.
|
|
||||||
$!
|
|
||||||
$ SOURCE_FILE = "SYS$DISK:[]" + FILE_NAME + ".C"
|
|
||||||
$!
|
|
||||||
$! Create The Object File Name.
|
|
||||||
$!
|
|
||||||
$ OBJECT_FILE = OBJ_DIR + FILE_NAME + ".OBJ"
|
|
||||||
$!
|
|
||||||
$! Create The Executable File Name.
|
|
||||||
$!
|
|
||||||
$ EXE_FILE = EXE_DIR + FILE_NAME + ".EXE"
|
|
||||||
$ ON WARNING THEN GOTO NEXT_FILE
|
|
||||||
$!
|
|
||||||
$! Check To See If The File We Want To Compile Actually Exists.
|
|
||||||
$!
|
|
||||||
$ IF (F$SEARCH(SOURCE_FILE).EQS."")
|
|
||||||
$ THEN
|
|
||||||
$!
|
|
||||||
$! Tell The User That The File Dosen't Exist.
|
|
||||||
$!
|
|
||||||
$ WRITE SYS$OUTPUT ""
|
|
||||||
$ WRITE SYS$OUTPUT "The File ",SOURCE_FILE," Dosen't Exist."
|
|
||||||
$ WRITE SYS$OUTPUT ""
|
|
||||||
$!
|
|
||||||
$! Exit The Build.
|
|
||||||
$!
|
|
||||||
$ GOTO EXIT
|
|
||||||
$!
|
|
||||||
$! End The File Exist Check.
|
|
||||||
$!
|
|
||||||
$ ENDIF
|
|
||||||
$!
|
|
||||||
$! Tell The User What We Are Building.
|
|
||||||
$!
|
$!
|
||||||
$ IF (PHASE.EQS."LIB")
|
$ IF (PHASE.EQS."LIB")
|
||||||
$ THEN
|
$ THEN
|
||||||
$ WRITE SYS$OUTPUT "Compiling The ",FILE_NAME,".C File."
|
|
||||||
$ ELSE
|
|
||||||
$ WRITE SYS$OUTPUT "Building The ",FILE_NAME," Application Program."
|
|
||||||
$ ENDIF
|
|
||||||
$!
|
$!
|
||||||
$! Compile The File.
|
$! Define A Library File Counter And Set It To "-1".
|
||||||
|
$! -1 Means The Application File Name Is To Be Used.
|
||||||
$!
|
$!
|
||||||
$ ON ERROR THEN GOTO NEXT_FILE
|
$ LIB_COUNTER = -1
|
||||||
$ IF COMPILEWITH_CC2 - FILE_NAME .NES. COMPILEWITH_CC2
|
|
||||||
$ THEN
|
|
||||||
$ CC2/OBJECT='OBJECT_FILE' 'SOURCE_FILE'
|
|
||||||
$ ELSE
|
|
||||||
$ CC/OBJECT='OBJECT_FILE' 'SOURCE_FILE'
|
|
||||||
$ ENDIF
|
|
||||||
$!
|
$!
|
||||||
$ ON WARNING THEN GOTO NEXT_FILE
|
$! Create a .OPT file for the object files
|
||||||
$!
|
$!
|
||||||
$ IF (PHASE.EQS."LIB")
|
$ OPEN /WRITE OBJECTS 'EXE_DIR''CURRENT_APP'.OPT
|
||||||
$ THEN
|
$!
|
||||||
$ GOTO NEXT_FILE
|
$! Top Of The File Loop.
|
||||||
|
$!
|
||||||
|
$ NEXT_LIB:
|
||||||
|
$!
|
||||||
|
$! O.K, Extract The File Name From The File List.
|
||||||
|
$!
|
||||||
|
$ IF LIB_COUNTER .GE. 0
|
||||||
|
$ THEN
|
||||||
|
$ FILE_NAME = F$EDIT(F$ELEMENT(LIB_COUNTER,",",LIB_'CURRENT_APP'),"TRIM")
|
||||||
|
$ ELSE
|
||||||
|
$ FILE_NAME = CURRENT_APP
|
||||||
|
$ ENDIF
|
||||||
|
$!
|
||||||
|
$! Check To See If We Are At The End Of The File List.
|
||||||
|
$!
|
||||||
|
$ IF (FILE_NAME.EQS.",")
|
||||||
|
$ THEN
|
||||||
|
$ CLOSE OBJECTS
|
||||||
|
$ GOTO NEXT_APP
|
||||||
|
$ ENDIF
|
||||||
|
$!
|
||||||
|
$! Increment The Counter.
|
||||||
|
$!
|
||||||
|
$ LIB_COUNTER = LIB_COUNTER + 1
|
||||||
|
$!
|
||||||
|
$! Create The Source File Name.
|
||||||
|
$!
|
||||||
|
$ SOURCE_FILE = "SYS$DISK:[]" + FILE_NAME + ".C"
|
||||||
|
$!
|
||||||
|
$! Create The Object File Name.
|
||||||
|
$!
|
||||||
|
$ OBJECT_FILE = OBJ_DIR + FILE_NAME + ".OBJ"
|
||||||
|
$ ON WARNING THEN GOTO NEXT_LIB
|
||||||
|
$!
|
||||||
|
$! Check To See If The File We Want To Compile Actually Exists.
|
||||||
|
$!
|
||||||
|
$ IF (F$SEARCH(SOURCE_FILE).EQS."")
|
||||||
|
$ THEN
|
||||||
|
$!
|
||||||
|
$! Tell The User That The File Dosen't Exist.
|
||||||
|
$!
|
||||||
|
$ WRITE SYS$OUTPUT ""
|
||||||
|
$ WRITE SYS$OUTPUT "The File ",SOURCE_FILE," Dosen't Exist."
|
||||||
|
$ WRITE SYS$OUTPUT ""
|
||||||
|
$!
|
||||||
|
$! Exit The Build.
|
||||||
|
$!
|
||||||
|
$ GOTO EXIT
|
||||||
|
$!
|
||||||
|
$! End The File Exist Check.
|
||||||
|
$!
|
||||||
|
$ ENDIF
|
||||||
|
$!
|
||||||
|
$! Tell The User What We Are Building.
|
||||||
|
$!
|
||||||
|
$ IF (PHASE.EQS."LIB")
|
||||||
|
$ THEN
|
||||||
|
$ WRITE SYS$OUTPUT "Compiling The ",FILE_NAME,".C File."
|
||||||
|
$ ELSE
|
||||||
|
$ WRITE SYS$OUTPUT "Building The ",FILE_NAME," Application Program."
|
||||||
|
$ ENDIF
|
||||||
|
$!
|
||||||
|
$! Compile The File.
|
||||||
|
$!
|
||||||
|
$ ON ERROR THEN GOTO NEXT_LIB
|
||||||
|
$ IF COMPILEWITH_CC2 - FILE_NAME .NES. COMPILEWITH_CC2
|
||||||
|
$ THEN
|
||||||
|
$ CC2/OBJECT='OBJECT_FILE' 'SOURCE_FILE'
|
||||||
|
$ ELSE
|
||||||
|
$ CC/OBJECT='OBJECT_FILE' 'SOURCE_FILE'
|
||||||
|
$ ENDIF
|
||||||
|
$ WRITE OBJECTS OBJECT_FILE
|
||||||
|
$!
|
||||||
|
$ GOTO NEXT_LIB
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$!
|
$!
|
||||||
$! Check if this program works well without a TCPIP library
|
$! Check if this program works well without a TCPIP library
|
||||||
$!
|
$!
|
||||||
$ IF TCPIP_LIB .EQS. "" .AND. TCPIP_PROGRAMS - FILE_NAME .NES. TCPIP_PROGRAMS
|
$ IF TCPIP_LIB .EQS. "" .AND. TCPIP_PROGRAMS - CURRENT_APP .NES. TCPIP_PROGRAMS
|
||||||
$ THEN
|
$ THEN
|
||||||
$ WRITE SYS$OUTPUT FILE_NAME," needs a TCP/IP library. Can't link. Skipping..."
|
$ WRITE SYS$OUTPUT CURRENT_APP," needs a TCP/IP library. Can't link. Skipping..."
|
||||||
$ GOTO NEXT_FILE
|
$ GOTO NEXT_APP
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$!
|
$!
|
||||||
$! Link The Program.
|
$! Link The Program.
|
||||||
$! Check To See If We Are To Link With A Specific TCP/IP Library.
|
|
||||||
$!
|
$!
|
||||||
$ IF (TCPIP_LIB.NES."")
|
$ ON WARNING THEN GOTO NEXT_APP
|
||||||
$ THEN
|
|
||||||
$!
|
$!
|
||||||
$! Don't Link With The RSAREF Routines And TCP/IP Library.
|
$! Don't Link With The RSAREF Routines And TCP/IP Library.
|
||||||
$!
|
$!
|
||||||
$ LINK/'DEBUGGER'/'TRACEBACK' /EXE='EXE_FILE' -
|
$ LINK /'DEBUGGER' /'LINKMAP' /'TRACEBACK' /EXE='EXE_FILE' -
|
||||||
'OBJECT_FILE''EXTRA_OBJ', -
|
'EXE_DIR''CURRENT_APP'.OPT /OPTIONS, -
|
||||||
'SSL_LIB'/LIBRARY,'CRYPTO_LIB'/LIBRARY, -
|
'SSL_LIB' /LIBRARY, -
|
||||||
'TCPIP_LIB','OPT_FILE'/OPTION
|
'CRYPTO_LIB' /LIBRARY -
|
||||||
$!
|
'TCPIP_LIB' -
|
||||||
$! Else...
|
'ZLIB_LIB' -
|
||||||
$!
|
,'OPT_FILE' /OPTIONS
|
||||||
$ ELSE
|
|
||||||
$!
|
|
||||||
$! Don't Link With The RSAREF Routines And Link With A TCP/IP Library.
|
|
||||||
$!
|
|
||||||
$ LINK/'DEBUGGER'/'TRACEBACK' /EXE='EXE_FILE' -
|
|
||||||
'OBJECT_FILE''EXTRA_OBJ', -
|
|
||||||
'SSL_LIB'/LIBRARY,'CRYPTO_LIB'/LIBRARY, -
|
|
||||||
'OPT_FILE'/OPTION
|
|
||||||
$!
|
|
||||||
$! End The TCP/IP Library Check.
|
|
||||||
$!
|
|
||||||
$ ENDIF
|
|
||||||
$!
|
$!
|
||||||
$! Go Back And Do It Again.
|
$! Go Back And Do It Again.
|
||||||
$!
|
$!
|
||||||
$ GOTO NEXT_FILE
|
$ GOTO NEXT_APP
|
||||||
$!
|
$!
|
||||||
$! All Done With This File.
|
$! All Done With This File.
|
||||||
$!
|
$!
|
||||||
$ FILE_DONE:
|
$ APP_DONE:
|
||||||
$ EXIT:
|
$ EXIT:
|
||||||
$!
|
$!
|
||||||
$! All Done, Time To Clean Up And Exit.
|
$! All Done, Time To Clean Up And Exit.
|
||||||
@@ -338,7 +378,7 @@ $!
|
|||||||
$ CREATE 'OPT_FILE'
|
$ CREATE 'OPT_FILE'
|
||||||
$DECK
|
$DECK
|
||||||
!
|
!
|
||||||
! Default System Options File To Link Agianst
|
! Default System Options File To Link Against
|
||||||
! The Sharable VAX C Runtime Library.
|
! The Sharable VAX C Runtime Library.
|
||||||
!
|
!
|
||||||
SYS$SHARE:VAXCRTL.EXE/SHARE
|
SYS$SHARE:VAXCRTL.EXE/SHARE
|
||||||
@@ -367,7 +407,7 @@ $!
|
|||||||
$ CREATE 'OPT_FILE'
|
$ CREATE 'OPT_FILE'
|
||||||
$DECK
|
$DECK
|
||||||
!
|
!
|
||||||
! Default System Options File To Link Agianst
|
! Default System Options File To Link Against
|
||||||
! The Sharable C Runtime Library.
|
! The Sharable C Runtime Library.
|
||||||
!
|
!
|
||||||
GNU_CC:[000000]GCCLIB/LIBRARY
|
GNU_CC:[000000]GCCLIB/LIBRARY
|
||||||
@@ -402,7 +442,7 @@ $!
|
|||||||
$ CREATE 'OPT_FILE'
|
$ CREATE 'OPT_FILE'
|
||||||
$DECK
|
$DECK
|
||||||
!
|
!
|
||||||
! Default System Options File To Link Agianst
|
! Default System Options File To Link Against
|
||||||
! The Sharable DEC C Runtime Library.
|
! The Sharable DEC C Runtime Library.
|
||||||
!
|
!
|
||||||
SYS$SHARE:DECC$SHR.EXE/SHARE
|
SYS$SHARE:DECC$SHR.EXE/SHARE
|
||||||
@@ -412,19 +452,19 @@ $! Else...
|
|||||||
$!
|
$!
|
||||||
$ ELSE
|
$ ELSE
|
||||||
$!
|
$!
|
||||||
$! Create The AXP Linker Option File.
|
$! Create The non-VAX Linker Option File.
|
||||||
$!
|
$!
|
||||||
$ CREATE 'OPT_FILE'
|
$ CREATE 'OPT_FILE'
|
||||||
$DECK
|
$DECK
|
||||||
!
|
!
|
||||||
! Default System Options File For AXP To Link Agianst
|
! Default System Options File For non-VAX To Link Against
|
||||||
! The Sharable C Runtime Library.
|
! The Sharable C Runtime Library.
|
||||||
!
|
!
|
||||||
SYS$SHARE:CMA$OPEN_LIB_SHR/SHARE
|
SYS$SHARE:CMA$OPEN_LIB_SHR/SHARE
|
||||||
SYS$SHARE:CMA$OPEN_RTL/SHARE
|
SYS$SHARE:CMA$OPEN_RTL/SHARE
|
||||||
$EOD
|
$EOD
|
||||||
$!
|
$!
|
||||||
$! End The VAX/AXP DEC C Option File Check.
|
$! End The DEC C Option File Check.
|
||||||
$!
|
$!
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$!
|
$!
|
||||||
@@ -501,14 +541,15 @@ $!
|
|||||||
$ IF (P1.EQS."NODEBUG")
|
$ IF (P1.EQS."NODEBUG")
|
||||||
$ THEN
|
$ THEN
|
||||||
$!
|
$!
|
||||||
$! P1 Is NODEBUG, So Compile Without Debugger Information.
|
$! P1 Is NODEBUG, So Compile Without Debugger Information.
|
||||||
$!
|
$!
|
||||||
$ DEBUGGER = "NODEBUG"
|
$ DEBUGGER = "NODEBUG"
|
||||||
$ TRACEBACK = "NOTRACEBACK"
|
$ LINKMAP = "NOMAP"
|
||||||
$ GCC_OPTIMIZE = "OPTIMIZE"
|
$ TRACEBACK = "NOTRACEBACK"
|
||||||
$ CC_OPTIMIZE = "OPTIMIZE"
|
$ GCC_OPTIMIZE = "OPTIMIZE"
|
||||||
$ WRITE SYS$OUTPUT "No Debugger Information Will Be Produced During Compile."
|
$ CC_OPTIMIZE = "OPTIMIZE"
|
||||||
$ WRITE SYS$OUTPUT "Compiling With Compiler Optimization."
|
$ WRITE SYS$OUTPUT "No Debugger Information Will Be Produced During Compile."
|
||||||
|
$ WRITE SYS$OUTPUT "Compiling With Compiler Optimization."
|
||||||
$!
|
$!
|
||||||
$! Else...
|
$! Else...
|
||||||
$!
|
$!
|
||||||
@@ -522,6 +563,7 @@ $!
|
|||||||
$! Compile With Debugger Information.
|
$! Compile With Debugger Information.
|
||||||
$!
|
$!
|
||||||
$ DEBUGGER = "DEBUG"
|
$ DEBUGGER = "DEBUG"
|
||||||
|
$ LINKMAP = "MAP"
|
||||||
$ TRACEBACK = "TRACEBACK"
|
$ TRACEBACK = "TRACEBACK"
|
||||||
$ GCC_OPTIMIZE = "NOOPTIMIZE"
|
$ GCC_OPTIMIZE = "NOOPTIMIZE"
|
||||||
$ CC_OPTIMIZE = "NOOPTIMIZE"
|
$ CC_OPTIMIZE = "NOOPTIMIZE"
|
||||||
@@ -529,7 +571,7 @@ $ WRITE SYS$OUTPUT "Debugger Information Will Be Produced During Compile."
|
|||||||
$ WRITE SYS$OUTPUT "Compiling Without Compiler Optimization."
|
$ WRITE SYS$OUTPUT "Compiling Without Compiler Optimization."
|
||||||
$ ELSE
|
$ ELSE
|
||||||
$!
|
$!
|
||||||
$! Tell The User Entered An Invalid Option..
|
$! Tell The User Entered An Invalid Option.
|
||||||
$!
|
$!
|
||||||
$ WRITE SYS$OUTPUT ""
|
$ WRITE SYS$OUTPUT ""
|
||||||
$ WRITE SYS$OUTPUT "The Option ",P1," Is Invalid. The Valid Options Are:"
|
$ WRITE SYS$OUTPUT "The Option ",P1," Is Invalid. The Valid Options Are:"
|
||||||
@@ -542,7 +584,7 @@ $! Time To EXIT.
|
|||||||
$!
|
$!
|
||||||
$ EXIT
|
$ EXIT
|
||||||
$!
|
$!
|
||||||
$! End The Valid Arguement Check.
|
$! End The Valid Argument Check.
|
||||||
$!
|
$!
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$!
|
$!
|
||||||
@@ -550,6 +592,87 @@ $! End The P1 Check.
|
|||||||
$!
|
$!
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$!
|
$!
|
||||||
|
$! Check P6 (POINTER_SIZE).
|
||||||
|
$!
|
||||||
|
$ IF (P6 .NES. "") .AND. (ARCH .NES. "VAX")
|
||||||
|
$ THEN
|
||||||
|
$!
|
||||||
|
$ IF (P6 .EQS. "32")
|
||||||
|
$ THEN
|
||||||
|
$ POINTER_SIZE = " /POINTER_SIZE=32"
|
||||||
|
$ ELSE
|
||||||
|
$ POINTER_SIZE = F$EDIT( P6, "COLLAPSE, UPCASE")
|
||||||
|
$ IF ((POINTER_SIZE .EQS. "64") .OR. -
|
||||||
|
(POINTER_SIZE .EQS. "64=") .OR. -
|
||||||
|
(POINTER_SIZE .EQS. "64=ARGV"))
|
||||||
|
$ THEN
|
||||||
|
$ ARCHD = ARCH+ "_64"
|
||||||
|
$ LIB32 = ""
|
||||||
|
$ IF (F$EXTRACT( 2, 1, POINTER_SIZE) .EQS. "=")
|
||||||
|
$ THEN
|
||||||
|
$! Explicit user choice: "64" or "64=ARGV".
|
||||||
|
$ IF (POINTER_SIZE .EQS. "64=") THEN POINTER_SIZE = "64"
|
||||||
|
$ ELSE
|
||||||
|
$ SET NOON
|
||||||
|
$ DEFINE /USER_MODE SYS$OUTPUT NL:
|
||||||
|
$ DEFINE /USER_MODE SYS$ERROR NL:
|
||||||
|
$ CC /NOLIST /NOOBJECT /POINTER_SIZE=64=ARGV NL:
|
||||||
|
$ IF ($STATUS .AND. %X0FFF0000) .EQ. %X00030000
|
||||||
|
$ THEN
|
||||||
|
$ ! If we got here, it means DCL complained like this:
|
||||||
|
$ ! %DCL-W-NOVALU, value not allowed - remove value specification
|
||||||
|
$ ! \64=\
|
||||||
|
$ !
|
||||||
|
$ ! If the compiler was run, logicals defined in /USER would
|
||||||
|
$ ! have been deassigned automatically. However, when DCL
|
||||||
|
$ ! complains, they aren't, so we do it here (it might be
|
||||||
|
$ ! unnecessary, but just in case there will be another error
|
||||||
|
$ ! message further on that we don't want to miss)
|
||||||
|
$ DEASSIGN /USER_MODE SYS$ERROR
|
||||||
|
$ DEASSIGN /USER_MODE SYS$OUTPUT
|
||||||
|
$ ELSE
|
||||||
|
$ POINTER_SIZE = POINTER_SIZE + "=ARGV"
|
||||||
|
$ ENDIF
|
||||||
|
$ SET ON
|
||||||
|
$ ENDIF
|
||||||
|
$ POINTER_SIZE = " /POINTER_SIZE=''POINTER_SIZE'"
|
||||||
|
$!
|
||||||
|
$ ELSE
|
||||||
|
$!
|
||||||
|
$! Tell The User Entered An Invalid Option.
|
||||||
|
$!
|
||||||
|
$ WRITE SYS$OUTPUT ""
|
||||||
|
$ WRITE SYS$OUTPUT "The Option ", P6, -
|
||||||
|
" Is Invalid. The Valid Options Are:"
|
||||||
|
$ WRITE SYS$OUTPUT ""
|
||||||
|
$ WRITE SYS$OUTPUT -
|
||||||
|
" """" : Compile with default (short) pointers."
|
||||||
|
$ WRITE SYS$OUTPUT -
|
||||||
|
" 32 : Compile with 32-bit (short) pointers."
|
||||||
|
$ WRITE SYS$OUTPUT -
|
||||||
|
" 64 : Compile with 64-bit (long) pointers (auto ARGV)."
|
||||||
|
$ WRITE SYS$OUTPUT -
|
||||||
|
" 64= : Compile with 64-bit (long) pointers (no ARGV)."
|
||||||
|
$ WRITE SYS$OUTPUT -
|
||||||
|
" 64=ARGV : Compile with 64-bit (long) pointers (ARGV)."
|
||||||
|
$ WRITE SYS$OUTPUT ""
|
||||||
|
$!
|
||||||
|
$! Time To EXIT.
|
||||||
|
$!
|
||||||
|
$ EXIT
|
||||||
|
$!
|
||||||
|
$ ENDIF
|
||||||
|
$!
|
||||||
|
$ ENDIF
|
||||||
|
$!
|
||||||
|
$! End The P6 (POINTER_SIZE) Check.
|
||||||
|
$!
|
||||||
|
$ ENDIF
|
||||||
|
$!
|
||||||
|
$! Set basic C compiler /INCLUDE directories.
|
||||||
|
$!
|
||||||
|
$ CC_INCLUDES = "SYS$DISK:[-],SYS$DISK:[-.CRYPTO]"
|
||||||
|
$!
|
||||||
$! Check To See If P2 Is Blank.
|
$! Check To See If P2 Is Blank.
|
||||||
$!
|
$!
|
||||||
$ IF (P2.EQS."")
|
$ IF (P2.EQS."")
|
||||||
@@ -573,7 +696,7 @@ $ ELSE
|
|||||||
$!
|
$!
|
||||||
$! Check To See If We Have VAXC Or DECC.
|
$! Check To See If We Have VAXC Or DECC.
|
||||||
$!
|
$!
|
||||||
$ IF (ARCH.EQS."AXP").OR.(F$TRNLNM("DECC$CC_DEFAULT").NES."")
|
$ IF (ARCH.NES."VAX").OR.(F$TRNLNM("DECC$CC_DEFAULT").NES."")
|
||||||
$ THEN
|
$ THEN
|
||||||
$!
|
$!
|
||||||
$! Looks Like DECC, Set To Use DECC.
|
$! Looks Like DECC, Set To Use DECC.
|
||||||
@@ -650,11 +773,67 @@ $ CCDEFS = "MONOLITH"
|
|||||||
$ IF F$TYPE(USER_CCDEFS) .NES. "" THEN CCDEFS = CCDEFS + "," + USER_CCDEFS
|
$ IF F$TYPE(USER_CCDEFS) .NES. "" THEN CCDEFS = CCDEFS + "," + USER_CCDEFS
|
||||||
$ CCEXTRAFLAGS = ""
|
$ CCEXTRAFLAGS = ""
|
||||||
$ IF F$TYPE(USER_CCFLAGS) .NES. "" THEN CCEXTRAFLAGS = USER_CCFLAGS
|
$ IF F$TYPE(USER_CCFLAGS) .NES. "" THEN CCEXTRAFLAGS = USER_CCFLAGS
|
||||||
$ CCDISABLEWARNINGS = "LONGLONGTYPE,LONGLONGSUFX"
|
$ CCDISABLEWARNINGS = "" !!! "MAYLOSEDATA3" !!! "LONGLONGTYPE,LONGLONGSUFX,FOUNDCR"
|
||||||
$ IF F$TYPE(USER_CCDISABLEWARNINGS) .NES. "" THEN -
|
$ IF F$TYPE(USER_CCDISABLEWARNINGS) .NES. ""
|
||||||
CCDISABLEWARNINGS = CCDISABLEWARNINGS + "," + USER_CCDISABLEWARNINGS
|
$ THEN
|
||||||
|
$ IF CCDISABLEWARNINGS .NES. "" THEN CCDISABLEWARNINGS = CCDISABLEWARNINGS + ","
|
||||||
|
$ CCDISABLEWARNINGS = CCDISABLEWARNINGS + USER_CCDISABLEWARNINGS
|
||||||
|
$ ENDIF
|
||||||
$!
|
$!
|
||||||
$! Check To See If The User Entered A Valid Paramter.
|
$! Check To See If We Have A ZLIB Option.
|
||||||
|
$!
|
||||||
|
$ ZLIB = P7
|
||||||
|
$ IF (ZLIB .NES. "")
|
||||||
|
$ THEN
|
||||||
|
$!
|
||||||
|
$! Check for expected ZLIB files.
|
||||||
|
$!
|
||||||
|
$ err = 0
|
||||||
|
$ file1 = f$parse( "zlib.h", ZLIB, , , "SYNTAX_ONLY")
|
||||||
|
$ if (f$search( file1) .eqs. "")
|
||||||
|
$ then
|
||||||
|
$ WRITE SYS$OUTPUT ""
|
||||||
|
$ WRITE SYS$OUTPUT "The Option ", ZLIB, " Is Invalid."
|
||||||
|
$ WRITE SYS$OUTPUT " Can't find header: ''file1'"
|
||||||
|
$ err = 1
|
||||||
|
$ endif
|
||||||
|
$ file1 = f$parse( "A.;", ZLIB)- "A.;"
|
||||||
|
$!
|
||||||
|
$ file2 = f$parse( ZLIB, "libz.olb", , , "SYNTAX_ONLY")
|
||||||
|
$ if (f$search( file2) .eqs. "")
|
||||||
|
$ then
|
||||||
|
$ if (err .eq. 0)
|
||||||
|
$ then
|
||||||
|
$ WRITE SYS$OUTPUT ""
|
||||||
|
$ WRITE SYS$OUTPUT "The Option ", ZLIB, " Is Invalid."
|
||||||
|
$ endif
|
||||||
|
$ WRITE SYS$OUTPUT " Can't find library: ''file2'"
|
||||||
|
$ WRITE SYS$OUTPUT ""
|
||||||
|
$ err = err+ 2
|
||||||
|
$ endif
|
||||||
|
$ if (err .eq. 1)
|
||||||
|
$ then
|
||||||
|
$ WRITE SYS$OUTPUT ""
|
||||||
|
$ endif
|
||||||
|
$!
|
||||||
|
$ if (err .ne. 0)
|
||||||
|
$ then
|
||||||
|
$ EXIT
|
||||||
|
$ endif
|
||||||
|
$!
|
||||||
|
$ CCDEFS = """ZLIB=1"", "+ CCDEFS
|
||||||
|
$ CC_INCLUDES = CC_INCLUDES+ ", "+ file1
|
||||||
|
$ ZLIB_LIB = ", ''file2' /library"
|
||||||
|
$!
|
||||||
|
$! Print info
|
||||||
|
$!
|
||||||
|
$ WRITE SYS$OUTPUT "ZLIB library spec: ", file2
|
||||||
|
$!
|
||||||
|
$! End The ZLIB Check.
|
||||||
|
$!
|
||||||
|
$ ENDIF
|
||||||
|
$!
|
||||||
|
$! Check To See If The User Entered A Valid Parameter.
|
||||||
$!
|
$!
|
||||||
$ IF (P2.EQS."VAXC").OR.(P2.EQS."DECC").OR.(P2.EQS."GNUC")
|
$ IF (P2.EQS."VAXC").OR.(P2.EQS."DECC").OR.(P2.EQS."GNUC")
|
||||||
$ THEN
|
$ THEN
|
||||||
@@ -677,13 +856,13 @@ $!
|
|||||||
$ CC = "CC"
|
$ CC = "CC"
|
||||||
$ IF ARCH.EQS."VAX" .AND. F$TRNLNM("DECC$CC_DEFAULT").NES."/DECC" -
|
$ IF ARCH.EQS."VAX" .AND. F$TRNLNM("DECC$CC_DEFAULT").NES."/DECC" -
|
||||||
THEN CC = "CC/DECC"
|
THEN CC = "CC/DECC"
|
||||||
$ CC = CC + "/''CC_OPTIMIZE'/''DEBUGGER'/STANDARD=ANSI89" + -
|
$ CC = CC + " /''CC_OPTIMIZE' /''DEBUGGER' /STANDARD=RELAXED"+ -
|
||||||
"/NOLIST/PREFIX=ALL" + -
|
"''POINTER_SIZE' /NOLIST /PREFIX=ALL" + -
|
||||||
"/INCLUDE=(SYS$DISK:[-])" + CCEXTRAFLAGS
|
" /INCLUDE=(''CC_INCLUDES') " + CCEXTRAFLAGS
|
||||||
$!
|
$!
|
||||||
$! Define The Linker Options File Name.
|
$! Define The Linker Options File Name.
|
||||||
$!
|
$!
|
||||||
$ OPT_FILE = "SYS$DISK:[]VAX_DECC_OPTIONS.OPT"
|
$ OPT_FILE = "VAX_DECC_OPTIONS.OPT"
|
||||||
$!
|
$!
|
||||||
$! End DECC Check.
|
$! End DECC Check.
|
||||||
$!
|
$!
|
||||||
@@ -704,14 +883,14 @@ $!
|
|||||||
$! Compile Using VAXC.
|
$! Compile Using VAXC.
|
||||||
$!
|
$!
|
||||||
$ CC = "CC"
|
$ CC = "CC"
|
||||||
$ IF ARCH.EQS."AXP"
|
$ IF ARCH.NES."VAX"
|
||||||
$ THEN
|
$ THEN
|
||||||
$ WRITE SYS$OUTPUT "There is no VAX C on Alpha!"
|
$ WRITE SYS$OUTPUT "There is no VAX C on ''ARCH'!"
|
||||||
$ EXIT
|
$ EXIT
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$ IF F$TRNLNM("DECC$CC_DEFAULT").EQS."/DECC" THEN CC = "CC/VAXC"
|
$ IF F$TRNLNM("DECC$CC_DEFAULT").EQS."/DECC" THEN CC = "CC/VAXC"
|
||||||
$ CC = CC + "/''CC_OPTIMIZE'/''DEBUGGER'/NOLIST" + -
|
$ CC = CC + "/''CC_OPTIMIZE'/''DEBUGGER'/NOLIST" + -
|
||||||
"/INCLUDE=(SYS$DISK:[-])" + CCEXTRAFLAGS
|
"/INCLUDE=(''CC_INCLUDES')" + CCEXTRAFLAGS
|
||||||
$ CCDEFS = CCDEFS + ",""VAXC"""
|
$ CCDEFS = CCDEFS + ",""VAXC"""
|
||||||
$!
|
$!
|
||||||
$! Define <sys> As SYS$COMMON:[SYSLIB]
|
$! Define <sys> As SYS$COMMON:[SYSLIB]
|
||||||
@@ -720,7 +899,7 @@ $ DEFINE/NOLOG SYS SYS$COMMON:[SYSLIB]
|
|||||||
$!
|
$!
|
||||||
$! Define The Linker Options File Name.
|
$! Define The Linker Options File Name.
|
||||||
$!
|
$!
|
||||||
$ OPT_FILE = "SYS$DISK:[]VAX_VAXC_OPTIONS.OPT"
|
$ OPT_FILE = "VAX_VAXC_OPTIONS.OPT"
|
||||||
$!
|
$!
|
||||||
$! End VAXC Check
|
$! End VAXC Check
|
||||||
$!
|
$!
|
||||||
@@ -743,11 +922,11 @@ $! Use GNU C...
|
|||||||
$!
|
$!
|
||||||
$ IF F$TYPE(GCC) .EQS. "" THEN GCC := GCC
|
$ IF F$TYPE(GCC) .EQS. "" THEN GCC := GCC
|
||||||
$ CC = GCC+"/NOCASE_HACK/''GCC_OPTIMIZE'/''DEBUGGER'/NOLIST" + -
|
$ CC = GCC+"/NOCASE_HACK/''GCC_OPTIMIZE'/''DEBUGGER'/NOLIST" + -
|
||||||
"/INCLUDE=(SYS$DISK:[-])" + CCEXTRAFLAGS
|
"/INCLUDE=(''CC_INCLUDES')" + CCEXTRAFLAGS
|
||||||
$!
|
$!
|
||||||
$! Define The Linker Options File Name.
|
$! Define The Linker Options File Name.
|
||||||
$!
|
$!
|
||||||
$ OPT_FILE = "SYS$DISK:[]VAX_GNUC_OPTIONS.OPT"
|
$ OPT_FILE = "VAX_GNUC_OPTIONS.OPT"
|
||||||
$!
|
$!
|
||||||
$! End The GNU C Check.
|
$! End The GNU C Check.
|
||||||
$!
|
$!
|
||||||
@@ -757,7 +936,7 @@ $! Set up default defines
|
|||||||
$!
|
$!
|
||||||
$ CCDEFS = """FLAT_INC=1""," + CCDEFS
|
$ CCDEFS = """FLAT_INC=1""," + CCDEFS
|
||||||
$!
|
$!
|
||||||
$! Else The User Entered An Invalid Arguement.
|
$! Else The User Entered An Invalid Argument.
|
||||||
$!
|
$!
|
||||||
$ ELSE
|
$ ELSE
|
||||||
$!
|
$!
|
||||||
@@ -789,7 +968,7 @@ $ THEN
|
|||||||
$!
|
$!
|
||||||
$! Set the library to use SOCKETSHR
|
$! Set the library to use SOCKETSHR
|
||||||
$!
|
$!
|
||||||
$ TCPIP_LIB = "SYS$DISK:[-.VMS]SOCKETSHR_SHR.OPT/OPT"
|
$ TCPIP_LIB = ",SYS$DISK:[-.VMS]SOCKETSHR_SHR.OPT /OPTIONS"
|
||||||
$!
|
$!
|
||||||
$! Done with SOCKETSHR
|
$! Done with SOCKETSHR
|
||||||
$!
|
$!
|
||||||
@@ -815,13 +994,13 @@ $ THEN
|
|||||||
$!
|
$!
|
||||||
$! Set the library to use UCX.
|
$! Set the library to use UCX.
|
||||||
$!
|
$!
|
||||||
$ TCPIP_LIB = "SYS$DISK:[-.VMS]UCX_SHR_DECC.OPT/OPT"
|
$ TCPIP_LIB = ",SYS$DISK:[-.VMS]UCX_SHR_DECC.OPT /OPTIONS"
|
||||||
$ IF F$TRNLNM("UCX$IPC_SHR") .NES. ""
|
$ IF F$TRNLNM("UCX$IPC_SHR") .NES. ""
|
||||||
$ THEN
|
$ THEN
|
||||||
$ TCPIP_LIB = "SYS$DISK:[-.VMS]UCX_SHR_DECC_LOG.OPT/OPT"
|
$ TCPIP_LIB = ",SYS$DISK:[-.VMS]UCX_SHR_DECC_LOG.OPT /OPTIONS"
|
||||||
$ ELSE
|
$ ELSE
|
||||||
$ IF COMPILER .NES. "DECC" .AND. ARCH .EQS. "VAX" THEN -
|
$ IF COMPILER .NES. "DECC" .AND. ARCH .EQS. "VAX" THEN -
|
||||||
TCPIP_LIB = "SYS$DISK:[-.VMS]UCX_SHR_VAXC.OPT/OPT"
|
TCPIP_LIB = ",SYS$DISK:[-.VMS]UCX_SHR_VAXC.OPT /OPTIONS"
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$!
|
$!
|
||||||
$! Done with UCX
|
$! Done with UCX
|
||||||
@@ -835,7 +1014,7 @@ $ THEN
|
|||||||
$!
|
$!
|
||||||
$! Set the library to use TCPIP.
|
$! Set the library to use TCPIP.
|
||||||
$!
|
$!
|
||||||
$ TCPIP_LIB = "SYS$DISK:[-.VMS]TCPIP_SHR_DECC.OPT/OPT"
|
$ TCPIP_LIB = ",SYS$DISK:[-.VMS]TCPIP_SHR_DECC.OPT /OPTIONS"
|
||||||
$!
|
$!
|
||||||
$! Done with TCPIP
|
$! Done with TCPIP
|
||||||
$!
|
$!
|
||||||
@@ -860,9 +1039,9 @@ $ CCDEFS = CCDEFS + ",TCPIP_TYPE_''P3'"
|
|||||||
$!
|
$!
|
||||||
$! Print info
|
$! Print info
|
||||||
$!
|
$!
|
||||||
$ WRITE SYS$OUTPUT "TCP/IP library spec: ", TCPIP_LIB
|
$ WRITE SYS$OUTPUT "TCP/IP library spec: ", TCPIP_LIB- ","
|
||||||
$!
|
$!
|
||||||
$! Else The User Entered An Invalid Arguement.
|
$! Else The User Entered An Invalid Argument.
|
||||||
$!
|
$!
|
||||||
$ ELSE
|
$ ELSE
|
||||||
$!
|
$!
|
||||||
@@ -888,15 +1067,27 @@ $! Finish up the definition of CC.
|
|||||||
$!
|
$!
|
||||||
$ IF COMPILER .EQS. "DECC"
|
$ IF COMPILER .EQS. "DECC"
|
||||||
$ THEN
|
$ THEN
|
||||||
|
$! Not all compiler versions support MAYLOSEDATA3.
|
||||||
|
$ OPT_TEST = "MAYLOSEDATA3"
|
||||||
|
$ DEFINE /USER_MODE SYS$ERROR NL:
|
||||||
|
$ DEFINE /USER_MODE SYS$OUTPUT NL:
|
||||||
|
$ 'CC' /NOCROSS_REFERENCE /NOLIST /NOOBJECT -
|
||||||
|
/WARNINGS = DISABLE = ('OPT_TEST', EMPTYFILE) NL:
|
||||||
|
$ IF ($SEVERITY)
|
||||||
|
$ THEN
|
||||||
|
$ IF CCDISABLEWARNINGS .NES. "" THEN -
|
||||||
|
CCDISABLEWARNINGS = CCDISABLEWARNINGS+ ","
|
||||||
|
$ CCDISABLEWARNINGS = CCDISABLEWARNINGS+ OPT_TEST
|
||||||
|
$ ENDIF
|
||||||
$ IF CCDISABLEWARNINGS .NES. ""
|
$ IF CCDISABLEWARNINGS .NES. ""
|
||||||
$ THEN
|
$ THEN
|
||||||
$ CCDISABLEWARNINGS = "/WARNING=(DISABLE=(" + CCDISABLEWARNINGS + "))"
|
$ CCDISABLEWARNINGS = " /WARNING=(DISABLE=(" + CCDISABLEWARNINGS + "))"
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$ ELSE
|
$ ELSE
|
||||||
$ CCDISABLEWARNINGS = ""
|
$ CCDISABLEWARNINGS = ""
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$ CC2 = CC + "/DEFINE=(" + CCDEFS + ",_POSIX_C_SOURCE)" + CCDISABLEWARNINGS
|
$ CC2 = CC + " /DEFINE=(" + CCDEFS + ",_POSIX_C_SOURCE)" + CCDISABLEWARNINGS
|
||||||
$ CC = CC + "/DEFINE=(" + CCDEFS + ")" + CCDISABLEWARNINGS
|
$ CC = CC + " /DEFINE=(" + CCDEFS + ")" + CCDISABLEWARNINGS
|
||||||
$!
|
$!
|
||||||
$! Show user the result
|
$! Show user the result
|
||||||
$!
|
$!
|
||||||
@@ -962,7 +1153,7 @@ $ __INCLUDE = __TOP + "INCLUDE.OPENSSL]"
|
|||||||
$!
|
$!
|
||||||
$! Set up the logical name OPENSSL to point at the include directory
|
$! Set up the logical name OPENSSL to point at the include directory
|
||||||
$!
|
$!
|
||||||
$ DEFINE OPENSSL/NOLOG '__INCLUDE'
|
$ DEFINE OPENSSL /NOLOG '__INCLUDE'
|
||||||
$!
|
$!
|
||||||
$! Done
|
$! Done
|
||||||
$!
|
$!
|
||||||
@@ -970,15 +1161,24 @@ $ RETURN
|
|||||||
$!
|
$!
|
||||||
$ CLEANUP:
|
$ CLEANUP:
|
||||||
$!
|
$!
|
||||||
$! Restore the logical name OPENSSL if it had a value
|
$! Restore the saved logical name OPENSSL, if it had a value.
|
||||||
$!
|
$!
|
||||||
$ IF __SAVE_OPENSSL .EQS. ""
|
$ if (f$type( __SAVE_OPENSSL) .nes. "")
|
||||||
$ THEN
|
$ then
|
||||||
$ DEASSIGN OPENSSL
|
$ IF __SAVE_OPENSSL .EQS. ""
|
||||||
$ ELSE
|
$ THEN
|
||||||
$ DEFINE/NOLOG OPENSSL '__SAVE_OPENSSL'
|
$ DEASSIGN OPENSSL
|
||||||
$ ENDIF
|
$ ELSE
|
||||||
|
$ DEFINE /NOLOG OPENSSL '__SAVE_OPENSSL'
|
||||||
|
$ ENDIF
|
||||||
|
$ endif
|
||||||
|
$!
|
||||||
|
$! Close any open files.
|
||||||
|
$!
|
||||||
|
$ if (f$trnlnm( "objects", "LNM$PROCESS", 0, "SUPERVISOR") .nes. "") then -
|
||||||
|
close objects
|
||||||
$!
|
$!
|
||||||
$! Done
|
$! Done
|
||||||
$!
|
$!
|
||||||
$ RETURN
|
$ RETURN
|
||||||
|
$!
|
||||||
|
|||||||
179
apps/nseq.c
179
apps/nseq.c
@@ -1,6 +1,7 @@
|
|||||||
/* nseq.c */
|
/* nseq.c */
|
||||||
/* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
|
/*
|
||||||
* project 1999.
|
* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL project
|
||||||
|
* 1999.
|
||||||
*/
|
*/
|
||||||
/* ====================================================================
|
/* ====================================================================
|
||||||
* Copyright (c) 1999 The OpenSSL Project. All rights reserved.
|
* Copyright (c) 1999 The OpenSSL Project. All rights reserved.
|
||||||
@@ -69,99 +70,101 @@ int MAIN(int, char **);
|
|||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
char **args, *infile = NULL, *outfile = NULL;
|
char **args, *infile = NULL, *outfile = NULL;
|
||||||
BIO *in = NULL, *out = NULL;
|
BIO *in = NULL, *out = NULL;
|
||||||
int toseq = 0;
|
int toseq = 0;
|
||||||
X509 *x509 = NULL;
|
X509 *x509 = NULL;
|
||||||
NETSCAPE_CERT_SEQUENCE *seq = NULL;
|
NETSCAPE_CERT_SEQUENCE *seq = NULL;
|
||||||
int i, ret = 1;
|
int i, ret = 1;
|
||||||
int badarg = 0;
|
int badarg = 0;
|
||||||
if (bio_err == NULL) bio_err = BIO_new_fp (stderr, BIO_NOCLOSE);
|
if (bio_err == NULL)
|
||||||
ERR_load_crypto_strings();
|
bio_err = BIO_new_fp(stderr, BIO_NOCLOSE);
|
||||||
args = argv + 1;
|
ERR_load_crypto_strings();
|
||||||
while (!badarg && *args && *args[0] == '-') {
|
args = argv + 1;
|
||||||
if (!strcmp (*args, "-toseq")) toseq = 1;
|
while (!badarg && *args && *args[0] == '-') {
|
||||||
else if (!strcmp (*args, "-in")) {
|
if (!strcmp(*args, "-toseq"))
|
||||||
if (args[1]) {
|
toseq = 1;
|
||||||
args++;
|
else if (!strcmp(*args, "-in")) {
|
||||||
infile = *args;
|
if (args[1]) {
|
||||||
} else badarg = 1;
|
args++;
|
||||||
} else if (!strcmp (*args, "-out")) {
|
infile = *args;
|
||||||
if (args[1]) {
|
} else
|
||||||
args++;
|
badarg = 1;
|
||||||
outfile = *args;
|
} else if (!strcmp(*args, "-out")) {
|
||||||
} else badarg = 1;
|
if (args[1]) {
|
||||||
} else badarg = 1;
|
args++;
|
||||||
args++;
|
outfile = *args;
|
||||||
}
|
} else
|
||||||
|
badarg = 1;
|
||||||
|
} else
|
||||||
|
badarg = 1;
|
||||||
|
args++;
|
||||||
|
}
|
||||||
|
|
||||||
if (badarg) {
|
if (badarg) {
|
||||||
BIO_printf (bio_err, "Netscape certificate sequence utility\n");
|
BIO_printf(bio_err, "Netscape certificate sequence utility\n");
|
||||||
BIO_printf (bio_err, "Usage nseq [options]\n");
|
BIO_printf(bio_err, "Usage nseq [options]\n");
|
||||||
BIO_printf (bio_err, "where options are\n");
|
BIO_printf(bio_err, "where options are\n");
|
||||||
BIO_printf (bio_err, "-in file input file\n");
|
BIO_printf(bio_err, "-in file input file\n");
|
||||||
BIO_printf (bio_err, "-out file output file\n");
|
BIO_printf(bio_err, "-out file output file\n");
|
||||||
BIO_printf (bio_err, "-toseq output NS Sequence file\n");
|
BIO_printf(bio_err, "-toseq output NS Sequence file\n");
|
||||||
OPENSSL_EXIT(1);
|
OPENSSL_EXIT(1);
|
||||||
}
|
}
|
||||||
|
|
||||||
if (infile) {
|
if (infile) {
|
||||||
if (!(in = BIO_new_file (infile, "r"))) {
|
if (!(in = BIO_new_file(infile, "r"))) {
|
||||||
BIO_printf (bio_err,
|
BIO_printf(bio_err, "Can't open input file %s\n", infile);
|
||||||
"Can't open input file %s\n", infile);
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
} else
|
||||||
} else in = BIO_new_fp(stdin, BIO_NOCLOSE);
|
in = BIO_new_fp(stdin, BIO_NOCLOSE);
|
||||||
|
|
||||||
if (outfile) {
|
if (outfile) {
|
||||||
if (!(out = BIO_new_file (outfile, "w"))) {
|
if (!(out = BIO_new_file(outfile, "w"))) {
|
||||||
BIO_printf (bio_err,
|
BIO_printf(bio_err, "Can't open output file %s\n", outfile);
|
||||||
"Can't open output file %s\n", outfile);
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
} else {
|
||||||
} else {
|
out = BIO_new_fp(stdout, BIO_NOCLOSE);
|
||||||
out = BIO_new_fp(stdout, BIO_NOCLOSE);
|
|
||||||
#ifdef OPENSSL_SYS_VMS
|
#ifdef OPENSSL_SYS_VMS
|
||||||
{
|
{
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
out = BIO_push(tmpbio, out);
|
out = BIO_push(tmpbio, out);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
if (toseq) {
|
if (toseq) {
|
||||||
seq = NETSCAPE_CERT_SEQUENCE_new();
|
seq = NETSCAPE_CERT_SEQUENCE_new();
|
||||||
seq->certs = sk_X509_new_null();
|
seq->certs = sk_X509_new_null();
|
||||||
while((x509 = PEM_read_bio_X509(in, NULL, NULL, NULL)))
|
while ((x509 = PEM_read_bio_X509(in, NULL, NULL, NULL)))
|
||||||
sk_X509_push(seq->certs,x509);
|
sk_X509_push(seq->certs, x509);
|
||||||
|
|
||||||
if(!sk_X509_num(seq->certs))
|
if (!sk_X509_num(seq->certs)) {
|
||||||
{
|
BIO_printf(bio_err, "Error reading certs file %s\n", infile);
|
||||||
BIO_printf (bio_err, "Error reading certs file %s\n", infile);
|
ERR_print_errors(bio_err);
|
||||||
ERR_print_errors(bio_err);
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
PEM_write_bio_NETSCAPE_CERT_SEQUENCE(out, seq);
|
||||||
PEM_write_bio_NETSCAPE_CERT_SEQUENCE(out, seq);
|
ret = 0;
|
||||||
ret = 0;
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
|
||||||
|
|
||||||
if (!(seq = PEM_read_bio_NETSCAPE_CERT_SEQUENCE(in, NULL, NULL, NULL))) {
|
if (!(seq = PEM_read_bio_NETSCAPE_CERT_SEQUENCE(in, NULL, NULL, NULL))) {
|
||||||
BIO_printf (bio_err, "Error reading sequence file %s\n", infile);
|
BIO_printf(bio_err, "Error reading sequence file %s\n", infile);
|
||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
for(i = 0; i < sk_X509_num(seq->certs); i++) {
|
for (i = 0; i < sk_X509_num(seq->certs); i++) {
|
||||||
x509 = sk_X509_value(seq->certs, i);
|
x509 = sk_X509_value(seq->certs, i);
|
||||||
dump_cert_text(out, x509);
|
dump_cert_text(out, x509);
|
||||||
PEM_write_bio_X509(out, x509);
|
PEM_write_bio_X509(out, x509);
|
||||||
}
|
}
|
||||||
ret = 0;
|
ret = 0;
|
||||||
end:
|
end:
|
||||||
BIO_free(in);
|
BIO_free(in);
|
||||||
BIO_free_all(out);
|
BIO_free_all(out);
|
||||||
NETSCAPE_CERT_SEQUENCE_free(seq);
|
NETSCAPE_CERT_SEQUENCE_free(seq);
|
||||||
|
|
||||||
OPENSSL_EXIT(ret);
|
OPENSSL_EXIT(ret);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
2229
apps/ocsp.c
2229
apps/ocsp.c
File diff suppressed because it is too large
Load Diff
@@ -3,8 +3,13 @@
|
|||||||
# This is mostly being used for generation of certificate requests.
|
# This is mostly being used for generation of certificate requests.
|
||||||
#
|
#
|
||||||
|
|
||||||
|
# This definition stops the following lines choking if HOME isn't
|
||||||
|
# defined.
|
||||||
|
HOME = .
|
||||||
RANDFILE = $ENV::HOME/.rnd
|
RANDFILE = $ENV::HOME/.rnd
|
||||||
oid_file = $ENV::HOME/.oid
|
|
||||||
|
# Extra OBJECT IDENTIFIER info:
|
||||||
|
#oid_file = $ENV::HOME/.oid
|
||||||
oid_section = new_oids
|
oid_section = new_oids
|
||||||
|
|
||||||
# To use this configuration file with the "-extfile" option of the
|
# To use this configuration file with the "-extfile" option of the
|
||||||
@@ -16,12 +21,17 @@ oid_section = new_oids
|
|||||||
|
|
||||||
[ new_oids ]
|
[ new_oids ]
|
||||||
|
|
||||||
# We can add new OIDs in here for use by 'ca' and 'req'.
|
# We can add new OIDs in here for use by 'ca', 'req' and 'ts'.
|
||||||
# Add a simple OID like this:
|
# Add a simple OID like this:
|
||||||
# testoid1=1.2.3.4
|
# testoid1=1.2.3.4
|
||||||
# Or use config file substitution like this:
|
# Or use config file substitution like this:
|
||||||
# testoid2=${testoid1}.5.6
|
# testoid2=${testoid1}.5.6
|
||||||
|
|
||||||
|
# Policies used by the TSA examples.
|
||||||
|
tsa_policy1 = 1.2.3.4.1
|
||||||
|
tsa_policy2 = 1.2.3.4.5.6
|
||||||
|
tsa_policy3 = 1.2.3.4.5.7
|
||||||
|
|
||||||
####################################################################
|
####################################################################
|
||||||
[ ca ]
|
[ ca ]
|
||||||
default_ca = CA_default # The default ca section
|
default_ca = CA_default # The default ca section
|
||||||
@@ -29,27 +39,40 @@ default_ca = CA_default # The default ca section
|
|||||||
####################################################################
|
####################################################################
|
||||||
[ CA_default ]
|
[ CA_default ]
|
||||||
|
|
||||||
dir = sys\$disk:[.demoCA # Where everything is kept
|
dir = sys\$disk:[.demoCA # Where everything is kept
|
||||||
certs = $dir.certs] # Where the issued certs are kept
|
certs = $dir.certs] # Where the issued certs are kept
|
||||||
crl_dir = $dir.crl] # Where the issued crl are kept
|
crl_dir = $dir.crl] # Where the issued crl are kept
|
||||||
database = $dir]index.txt # database index file.
|
database = $dir]index.txt # database index file.
|
||||||
new_certs_dir = $dir.newcerts] # default place for new certs.
|
#unique_subject = no # Set to 'no' to allow creation of
|
||||||
|
# several ctificates with same subject.
|
||||||
|
new_certs_dir = $dir.newcerts] # default place for new certs.
|
||||||
|
|
||||||
certificate = $dir]cacert.pem # The CA certificate
|
certificate = $dir]cacert.pem # The CA certificate
|
||||||
serial = $dir]serial. # The current serial number
|
serial = $dir]serial. # The current serial number
|
||||||
|
crlnumber = $dir]crlnumber. # the current crl number
|
||||||
|
# must be commented out to leave a V1 CRL
|
||||||
crl = $dir]crl.pem # The current CRL
|
crl = $dir]crl.pem # The current CRL
|
||||||
private_key = $dir.private]cakey.pem# The private key
|
private_key = $dir.private]cakey.pem# The private key
|
||||||
RANDFILE = $dir.private].rand # private random number file
|
RANDFILE = $dir.private].rand # private random number file
|
||||||
|
|
||||||
x509_extensions = usr_cert # The extentions to add to the cert
|
x509_extensions = usr_cert # The extentions to add to the cert
|
||||||
|
|
||||||
|
# Comment out the following two lines for the "traditional"
|
||||||
|
# (and highly broken) format.
|
||||||
|
name_opt = ca_default # Subject Name options
|
||||||
|
cert_opt = ca_default # Certificate field options
|
||||||
|
|
||||||
|
# Extension copying option: use with caution.
|
||||||
|
# copy_extensions = copy
|
||||||
|
|
||||||
# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
|
# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
|
||||||
# so this is commented out by default to leave a V1 CRL.
|
# so this is commented out by default to leave a V1 CRL.
|
||||||
|
# crlnumber must also be commented out to leave a V1 CRL.
|
||||||
# crl_extensions = crl_ext
|
# crl_extensions = crl_ext
|
||||||
|
|
||||||
default_days = 365 # how long to certify for
|
default_days = 365 # how long to certify for
|
||||||
default_crl_days= 30 # how long before next CRL
|
default_crl_days= 30 # how long before next CRL
|
||||||
default_md = md5 # which md to use.
|
default_md = default # use public key default MD
|
||||||
preserve = no # keep passed DN ordering
|
preserve = no # keep passed DN ordering
|
||||||
|
|
||||||
# A few difference way of specifying how similar the request should look
|
# A few difference way of specifying how similar the request should look
|
||||||
@@ -86,16 +109,18 @@ distinguished_name = req_distinguished_name
|
|||||||
attributes = req_attributes
|
attributes = req_attributes
|
||||||
x509_extensions = v3_ca # The extentions to add to the self signed cert
|
x509_extensions = v3_ca # The extentions to add to the self signed cert
|
||||||
|
|
||||||
# This sets the permitted types in a DirectoryString. There are several
|
# Passwords for private keys if not present they will be prompted for
|
||||||
# options.
|
# input_password = secret
|
||||||
|
# output_password = secret
|
||||||
|
|
||||||
|
# This sets a mask for permitted string types. There are several options.
|
||||||
# default: PrintableString, T61String, BMPString.
|
# default: PrintableString, T61String, BMPString.
|
||||||
# pkix : PrintableString, BMPString.
|
# pkix : PrintableString, BMPString (PKIX recommendation before 2004)
|
||||||
# utf8only: only UTF8Strings.
|
# utf8only: only UTF8Strings (PKIX recommendation after 2004).
|
||||||
# nobmp : PrintableString, T61String (no BMPStrings).
|
# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
|
||||||
# MASK:XXXX a literal mask value.
|
# MASK:XXXX a literal mask value.
|
||||||
# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings
|
# WARNING: ancient versions of Netscape crash on BMPStrings or UTF8Strings.
|
||||||
# so use this option with caution!
|
string_mask = utf8only
|
||||||
dirstring_type = nobmp
|
|
||||||
|
|
||||||
# req_extensions = v3_req # The extensions to add to a certificate request
|
# req_extensions = v3_req # The extensions to add to a certificate request
|
||||||
|
|
||||||
@@ -120,11 +145,11 @@ localityName = Locality Name (eg, city)
|
|||||||
organizationalUnitName = Organizational Unit Name (eg, section)
|
organizationalUnitName = Organizational Unit Name (eg, section)
|
||||||
#organizationalUnitName_default =
|
#organizationalUnitName_default =
|
||||||
|
|
||||||
commonName = Common Name (eg, YOUR name)
|
commonName = Common Name (e.g. server FQDN or YOUR name)
|
||||||
commonName_max = 64
|
commonName_max = 64
|
||||||
|
|
||||||
emailAddress = Email Address
|
emailAddress = Email Address
|
||||||
emailAddress_max = 40
|
emailAddress_max = 64
|
||||||
|
|
||||||
# SET-ex3 = SET extension number 3
|
# SET-ex3 = SET extension number 3
|
||||||
|
|
||||||
@@ -167,11 +192,14 @@ nsComment = "OpenSSL Generated Certificate"
|
|||||||
|
|
||||||
# PKIX recommendations harmless if included in all certificates.
|
# PKIX recommendations harmless if included in all certificates.
|
||||||
subjectKeyIdentifier=hash
|
subjectKeyIdentifier=hash
|
||||||
authorityKeyIdentifier=keyid,issuer:always
|
authorityKeyIdentifier=keyid,issuer
|
||||||
|
|
||||||
# This stuff is for subjectAltName and issuerAltname.
|
# This stuff is for subjectAltName and issuerAltname.
|
||||||
# Import the email address.
|
# Import the email address.
|
||||||
# subjectAltName=email:copy
|
# subjectAltName=email:copy
|
||||||
|
# An alternative to produce certificates that aren't
|
||||||
|
# deprecated according to PKIX.
|
||||||
|
# subjectAltName=email:move
|
||||||
|
|
||||||
# Copy subject details
|
# Copy subject details
|
||||||
# issuerAltName=issuer:copy
|
# issuerAltName=issuer:copy
|
||||||
@@ -183,6 +211,9 @@ authorityKeyIdentifier=keyid,issuer:always
|
|||||||
#nsCaPolicyUrl
|
#nsCaPolicyUrl
|
||||||
#nsSslServerName
|
#nsSslServerName
|
||||||
|
|
||||||
|
# This is required for TSA certificates.
|
||||||
|
# extendedKeyUsage = critical,timeStamping
|
||||||
|
|
||||||
[ v3_req ]
|
[ v3_req ]
|
||||||
|
|
||||||
# Extensions to add to a certificate request
|
# Extensions to add to a certificate request
|
||||||
@@ -200,7 +231,7 @@ keyUsage = nonRepudiation, digitalSignature, keyEncipherment
|
|||||||
|
|
||||||
subjectKeyIdentifier=hash
|
subjectKeyIdentifier=hash
|
||||||
|
|
||||||
authorityKeyIdentifier=keyid:always,issuer:always
|
authorityKeyIdentifier=keyid:always,issuer
|
||||||
|
|
||||||
# This is what PKIX recommends but some broken software chokes on critical
|
# This is what PKIX recommends but some broken software chokes on critical
|
||||||
# extensions.
|
# extensions.
|
||||||
@@ -233,4 +264,87 @@ basicConstraints = CA:true
|
|||||||
# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
|
# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
|
||||||
|
|
||||||
# issuerAltName=issuer:copy
|
# issuerAltName=issuer:copy
|
||||||
authorityKeyIdentifier=keyid:always,issuer:always
|
authorityKeyIdentifier=keyid:always
|
||||||
|
|
||||||
|
[ proxy_cert_ext ]
|
||||||
|
# These extensions should be added when creating a proxy certificate
|
||||||
|
|
||||||
|
# This goes against PKIX guidelines but some CAs do it and some software
|
||||||
|
# requires this to avoid interpreting an end user certificate as a CA.
|
||||||
|
|
||||||
|
basicConstraints=CA:FALSE
|
||||||
|
|
||||||
|
# Here are some examples of the usage of nsCertType. If it is omitted
|
||||||
|
# the certificate can be used for anything *except* object signing.
|
||||||
|
|
||||||
|
# This is OK for an SSL server.
|
||||||
|
# nsCertType = server
|
||||||
|
|
||||||
|
# For an object signing certificate this would be used.
|
||||||
|
# nsCertType = objsign
|
||||||
|
|
||||||
|
# For normal client use this is typical
|
||||||
|
# nsCertType = client, email
|
||||||
|
|
||||||
|
# and for everything including object signing:
|
||||||
|
# nsCertType = client, email, objsign
|
||||||
|
|
||||||
|
# This is typical in keyUsage for a client certificate.
|
||||||
|
# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
|
||||||
|
|
||||||
|
# This will be displayed in Netscape's comment listbox.
|
||||||
|
nsComment = "OpenSSL Generated Certificate"
|
||||||
|
|
||||||
|
# PKIX recommendations harmless if included in all certificates.
|
||||||
|
subjectKeyIdentifier=hash
|
||||||
|
authorityKeyIdentifier=keyid,issuer
|
||||||
|
|
||||||
|
# This stuff is for subjectAltName and issuerAltname.
|
||||||
|
# Import the email address.
|
||||||
|
# subjectAltName=email:copy
|
||||||
|
# An alternative to produce certificates that aren't
|
||||||
|
# deprecated according to PKIX.
|
||||||
|
# subjectAltName=email:move
|
||||||
|
|
||||||
|
# Copy subject details
|
||||||
|
# issuerAltName=issuer:copy
|
||||||
|
|
||||||
|
#nsCaRevocationUrl = http://www.domain.dom/ca-crl.pem
|
||||||
|
#nsBaseUrl
|
||||||
|
#nsRevocationUrl
|
||||||
|
#nsRenewalUrl
|
||||||
|
#nsCaPolicyUrl
|
||||||
|
#nsSslServerName
|
||||||
|
|
||||||
|
# This really needs to be in place for it to be a proxy certificate.
|
||||||
|
proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
|
||||||
|
|
||||||
|
####################################################################
|
||||||
|
[ tsa ]
|
||||||
|
|
||||||
|
default_tsa = tsa_config1 # the default TSA section
|
||||||
|
|
||||||
|
[ tsa_config1 ]
|
||||||
|
|
||||||
|
# These are used by the TSA reply generation only.
|
||||||
|
dir = sys\$disk:[.demoCA # TSA root directory
|
||||||
|
serial = $dir]tsaserial. # The current serial number (mandatory)
|
||||||
|
crypto_device = builtin # OpenSSL engine to use for signing
|
||||||
|
signer_cert = $dir/tsacert.pem # The TSA signing certificate
|
||||||
|
# (optional)
|
||||||
|
certs = $dir.cacert.pem] # Certificate chain to include in reply
|
||||||
|
# (optional)
|
||||||
|
signer_key = $dir/private/tsakey.pem # The TSA private key (optional)
|
||||||
|
|
||||||
|
default_policy = tsa_policy1 # Policy if request did not specify it
|
||||||
|
# (optional)
|
||||||
|
other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional)
|
||||||
|
digests = md5, sha1 # Acceptable message digests (mandatory)
|
||||||
|
accuracy = secs:1, millisecs:500, microsecs:100 # (optional)
|
||||||
|
clock_precision_digits = 0 # number of digits after dot. (optional)
|
||||||
|
ordering = yes # Is ordering defined for timestamps?
|
||||||
|
# (optional, default: no)
|
||||||
|
tsa_name = yes # Must the TSA name be included in the reply?
|
||||||
|
# (optional, default: no)
|
||||||
|
ess_cert_id_chain = no # Must the ESS cert id chain be included?
|
||||||
|
# (optional, default: no)
|
||||||
|
|||||||
863
apps/openssl.c
863
apps/openssl.c
@@ -56,7 +56,7 @@
|
|||||||
* [including the GNU Public Licence.]
|
* [including the GNU Public Licence.]
|
||||||
*/
|
*/
|
||||||
/* ====================================================================
|
/* ====================================================================
|
||||||
* Copyright (c) 1998-2001 The OpenSSL Project. All rights reserved.
|
* Copyright (c) 1998-2006 The OpenSSL Project. All rights reserved.
|
||||||
*
|
*
|
||||||
* Redistribution and use in source and binary forms, with or without
|
* Redistribution and use in source and binary forms, with or without
|
||||||
* modification, are permitted provided that the following conditions
|
* modification, are permitted provided that the following conditions
|
||||||
@@ -109,407 +109,588 @@
|
|||||||
*
|
*
|
||||||
*/
|
*/
|
||||||
|
|
||||||
|
|
||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
#include <string.h>
|
#include <string.h>
|
||||||
#include <stdlib.h>
|
#include <stdlib.h>
|
||||||
#define OPENSSL_C /* tells apps.h to use complete apps_startup() */
|
#define OPENSSL_C /* tells apps.h to use complete
|
||||||
|
* apps_startup() */
|
||||||
#include "apps.h"
|
#include "apps.h"
|
||||||
#include <openssl/bio.h>
|
#include <openssl/bio.h>
|
||||||
#include <openssl/crypto.h>
|
#include <openssl/crypto.h>
|
||||||
|
#include <openssl/rand.h>
|
||||||
#include <openssl/lhash.h>
|
#include <openssl/lhash.h>
|
||||||
#include <openssl/conf.h>
|
#include <openssl/conf.h>
|
||||||
#include <openssl/x509.h>
|
#include <openssl/x509.h>
|
||||||
#include <openssl/pem.h>
|
#include <openssl/pem.h>
|
||||||
#include <openssl/ssl.h>
|
#include <openssl/ssl.h>
|
||||||
#include <openssl/engine.h>
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
#define USE_SOCKETS /* needed for the _O_BINARY defs in the MS world */
|
# include <openssl/engine.h>
|
||||||
|
#endif
|
||||||
|
#define USE_SOCKETS /* needed for the _O_BINARY defs in the MS
|
||||||
|
* world */
|
||||||
#include "progs.h"
|
#include "progs.h"
|
||||||
#include "s_apps.h"
|
#include "s_apps.h"
|
||||||
#include <openssl/err.h>
|
#include <openssl/err.h>
|
||||||
|
#ifdef OPENSSL_FIPS
|
||||||
|
# include <openssl/fips.h>
|
||||||
|
#endif
|
||||||
|
|
||||||
/* The LHASH callbacks ("hash" & "cmp") have been replaced by functions with the
|
/*
|
||||||
* base prototypes (we cast each variable inside the function to the required
|
* The LHASH callbacks ("hash" & "cmp") have been replaced by functions with
|
||||||
* type of "FUNCTION*"). This removes the necessity for macro-generated wrapper
|
* the base prototypes (we cast each variable inside the function to the
|
||||||
* functions. */
|
* required type of "FUNCTION*"). This removes the necessity for
|
||||||
|
* macro-generated wrapper functions.
|
||||||
|
*/
|
||||||
|
|
||||||
/* static unsigned long MS_CALLBACK hash(FUNCTION *a); */
|
static LHASH_OF(FUNCTION) *prog_init(void);
|
||||||
static unsigned long MS_CALLBACK hash(const void *a_void);
|
static int do_cmd(LHASH_OF(FUNCTION) *prog, int argc, char *argv[]);
|
||||||
/* static int MS_CALLBACK cmp(FUNCTION *a,FUNCTION *b); */
|
static void list_pkey(BIO *out);
|
||||||
static int MS_CALLBACK cmp(const void *a_void,const void *b_void);
|
static void list_cipher(BIO *out);
|
||||||
static LHASH *prog_init(void );
|
static void list_md(BIO *out);
|
||||||
static int do_cmd(LHASH *prog,int argc,char *argv[]);
|
char *default_config_file = NULL;
|
||||||
char *default_config_file=NULL;
|
|
||||||
|
|
||||||
/* Make sure there is only one when MONOLITH is defined */
|
/* Make sure there is only one when MONOLITH is defined */
|
||||||
#ifdef MONOLITH
|
#ifdef MONOLITH
|
||||||
CONF *config=NULL;
|
CONF *config = NULL;
|
||||||
BIO *bio_err=NULL;
|
BIO *bio_err = NULL;
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
|
||||||
static void lock_dbg_cb(int mode, int type, const char *file, int line)
|
static void lock_dbg_cb(int mode, int type, const char *file, int line)
|
||||||
{
|
{
|
||||||
static int modes[CRYPTO_NUM_LOCKS]; /* = {0, 0, ... } */
|
static int modes[CRYPTO_NUM_LOCKS]; /* = {0, 0, ... } */
|
||||||
const char *errstr = NULL;
|
const char *errstr = NULL;
|
||||||
int rw;
|
int rw;
|
||||||
|
|
||||||
rw = mode & (CRYPTO_READ|CRYPTO_WRITE);
|
rw = mode & (CRYPTO_READ | CRYPTO_WRITE);
|
||||||
if (!((rw == CRYPTO_READ) || (rw == CRYPTO_WRITE)))
|
if (!((rw == CRYPTO_READ) || (rw == CRYPTO_WRITE))) {
|
||||||
{
|
errstr = "invalid mode";
|
||||||
errstr = "invalid mode";
|
goto err;
|
||||||
goto err;
|
}
|
||||||
}
|
|
||||||
|
|
||||||
if (type < 0 || type > CRYPTO_NUM_LOCKS)
|
if (type < 0 || type >= CRYPTO_NUM_LOCKS) {
|
||||||
{
|
errstr = "type out of bounds";
|
||||||
errstr = "type out of bounds";
|
goto err;
|
||||||
goto err;
|
}
|
||||||
}
|
|
||||||
|
|
||||||
if (mode & CRYPTO_LOCK)
|
if (mode & CRYPTO_LOCK) {
|
||||||
{
|
if (modes[type]) {
|
||||||
if (modes[type])
|
errstr = "already locked";
|
||||||
{
|
/*
|
||||||
errstr = "already locked";
|
* must not happen in a single-threaded program (would deadlock)
|
||||||
/* must not happen in a single-threaded program
|
*/
|
||||||
* (would deadlock) */
|
goto err;
|
||||||
goto err;
|
}
|
||||||
}
|
|
||||||
|
|
||||||
modes[type] = rw;
|
modes[type] = rw;
|
||||||
}
|
} else if (mode & CRYPTO_UNLOCK) {
|
||||||
else if (mode & CRYPTO_UNLOCK)
|
if (!modes[type]) {
|
||||||
{
|
errstr = "not locked";
|
||||||
if (!modes[type])
|
goto err;
|
||||||
{
|
}
|
||||||
errstr = "not locked";
|
|
||||||
goto err;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (modes[type] != rw)
|
if (modes[type] != rw) {
|
||||||
{
|
errstr = (rw == CRYPTO_READ) ?
|
||||||
errstr = (rw == CRYPTO_READ) ?
|
"CRYPTO_r_unlock on write lock" :
|
||||||
"CRYPTO_r_unlock on write lock" :
|
"CRYPTO_w_unlock on read lock";
|
||||||
"CRYPTO_w_unlock on read lock";
|
}
|
||||||
}
|
|
||||||
|
|
||||||
modes[type] = 0;
|
modes[type] = 0;
|
||||||
}
|
} else {
|
||||||
else
|
errstr = "invalid mode";
|
||||||
{
|
goto err;
|
||||||
errstr = "invalid mode";
|
}
|
||||||
goto err;
|
|
||||||
}
|
|
||||||
|
|
||||||
err:
|
err:
|
||||||
if (errstr)
|
if (errstr) {
|
||||||
{
|
/* we cannot use bio_err here */
|
||||||
/* we cannot use bio_err here */
|
fprintf(stderr,
|
||||||
fprintf(stderr, "openssl (lock_dbg_cb): %s (mode=%d, type=%d) at %s:%d\n",
|
"openssl (lock_dbg_cb): %s (mode=%d, type=%d) at %s:%d\n",
|
||||||
errstr, mode, type, file, line);
|
errstr, mode, type, file, line);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#if defined( OPENSSL_SYS_VMS) && (__INITIAL_POINTER_SIZE == 64)
|
||||||
|
# define ARGV _Argv
|
||||||
|
#else
|
||||||
|
# define ARGV Argv
|
||||||
|
#endif
|
||||||
|
|
||||||
int main(int Argc, char *Argv[])
|
int main(int Argc, char *ARGV[])
|
||||||
{
|
{
|
||||||
ARGS arg;
|
ARGS arg;
|
||||||
#define PROG_NAME_SIZE 39
|
#define PROG_NAME_SIZE 39
|
||||||
char pname[PROG_NAME_SIZE+1];
|
char pname[PROG_NAME_SIZE + 1];
|
||||||
FUNCTION f,*fp;
|
FUNCTION f, *fp;
|
||||||
MS_STATIC char *prompt,buf[1024];
|
MS_STATIC const char *prompt;
|
||||||
char *to_free=NULL;
|
MS_STATIC char buf[1024];
|
||||||
int n,i,ret=0;
|
char *to_free = NULL;
|
||||||
int argc;
|
int n, i, ret = 0;
|
||||||
char **argv,*p;
|
int argc;
|
||||||
LHASH *prog=NULL;
|
char **argv, *p;
|
||||||
long errline;
|
LHASH_OF(FUNCTION) *prog = NULL;
|
||||||
|
long errline;
|
||||||
|
|
||||||
arg.data=NULL;
|
#if defined( OPENSSL_SYS_VMS) && (__INITIAL_POINTER_SIZE == 64)
|
||||||
arg.count=0;
|
/*-
|
||||||
|
* 2011-03-22 SMS.
|
||||||
|
* If we have 32-bit pointers everywhere, then we're safe, and
|
||||||
|
* we bypass this mess, as on non-VMS systems. (See ARGV,
|
||||||
|
* above.)
|
||||||
|
* Problem 1: Compaq/HP C before V7.3 always used 32-bit
|
||||||
|
* pointers for argv[].
|
||||||
|
* Fix 1: For a 32-bit argv[], when we're using 64-bit pointers
|
||||||
|
* everywhere else, we always allocate and use a 64-bit
|
||||||
|
* duplicate of argv[].
|
||||||
|
* Problem 2: Compaq/HP C V7.3 (Alpha, IA64) before ECO1 failed
|
||||||
|
* to NULL-terminate a 64-bit argv[]. (As this was written, the
|
||||||
|
* compiler ECO was available only on IA64.)
|
||||||
|
* Fix 2: Unless advised not to (VMS_TRUST_ARGV), we test a
|
||||||
|
* 64-bit argv[argc] for NULL, and, if necessary, use a
|
||||||
|
* (properly) NULL-terminated (64-bit) duplicate of argv[].
|
||||||
|
* The same code is used in either case to duplicate argv[].
|
||||||
|
* Some of these decisions could be handled in preprocessing,
|
||||||
|
* but the code tends to get even uglier, and the penalty for
|
||||||
|
* deciding at compile- or run-time is tiny.
|
||||||
|
*/
|
||||||
|
char **Argv = NULL;
|
||||||
|
int free_Argv = 0;
|
||||||
|
|
||||||
if (bio_err == NULL)
|
if ((sizeof(_Argv) < 8) /* 32-bit argv[]. */
|
||||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
# if !defined( VMS_TRUST_ARGV)
|
||||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
|| (_Argv[Argc] != NULL) /* Untrusted argv[argc] not NULL. */
|
||||||
|
# endif
|
||||||
|
) {
|
||||||
|
int i;
|
||||||
|
Argv = OPENSSL_malloc((Argc + 1) * sizeof(char *));
|
||||||
|
if (Argv == NULL) {
|
||||||
|
ret = -1;
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
for (i = 0; i < Argc; i++)
|
||||||
|
Argv[i] = _Argv[i];
|
||||||
|
Argv[Argc] = NULL; /* Certain NULL termination. */
|
||||||
|
free_Argv = 1;
|
||||||
|
} else {
|
||||||
|
/*
|
||||||
|
* Use the known-good 32-bit argv[] (which needs the type cast to
|
||||||
|
* satisfy the compiler), or the trusted or tested-good 64-bit argv[]
|
||||||
|
* as-is.
|
||||||
|
*/
|
||||||
|
Argv = (char **)_Argv;
|
||||||
|
}
|
||||||
|
#endif /* defined( OPENSSL_SYS_VMS) &&
|
||||||
|
* (__INITIAL_POINTER_SIZE == 64) */
|
||||||
|
|
||||||
if (getenv("OPENSSL_DEBUG_MEMORY") != NULL) /* if not defined, use compiled-in library defaults */
|
arg.data = NULL;
|
||||||
{
|
arg.count = 0;
|
||||||
if (!(0 == strcmp(getenv("OPENSSL_DEBUG_MEMORY"), "off")))
|
|
||||||
{
|
if (bio_err == NULL)
|
||||||
CRYPTO_malloc_debug_init();
|
if ((bio_err = BIO_new(BIO_s_file())) != NULL)
|
||||||
CRYPTO_set_mem_debug_options(V_CRYPTO_MDEBUG_ALL);
|
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||||
}
|
|
||||||
else
|
if (getenv("OPENSSL_DEBUG_MEMORY") != NULL) { /* if not defined, use
|
||||||
{
|
* compiled-in library
|
||||||
/* OPENSSL_DEBUG_MEMORY=off */
|
* defaults */
|
||||||
CRYPTO_set_mem_debug_functions(0, 0, 0, 0, 0);
|
if (!(0 == strcmp(getenv("OPENSSL_DEBUG_MEMORY"), "off"))) {
|
||||||
}
|
CRYPTO_malloc_debug_init();
|
||||||
}
|
CRYPTO_set_mem_debug_options(V_CRYPTO_MDEBUG_ALL);
|
||||||
CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ON);
|
} else {
|
||||||
|
/* OPENSSL_DEBUG_MEMORY=off */
|
||||||
|
CRYPTO_set_mem_debug_functions(0, 0, 0, 0, 0);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ON);
|
||||||
|
|
||||||
#if 0
|
#if 0
|
||||||
if (getenv("OPENSSL_DEBUG_LOCKING") != NULL)
|
if (getenv("OPENSSL_DEBUG_LOCKING") != NULL)
|
||||||
#endif
|
#endif
|
||||||
{
|
{
|
||||||
CRYPTO_set_locking_callback(lock_dbg_cb);
|
CRYPTO_set_locking_callback(lock_dbg_cb);
|
||||||
}
|
}
|
||||||
|
|
||||||
apps_startup();
|
if (getenv("OPENSSL_FIPS")) {
|
||||||
|
#ifdef OPENSSL_FIPS
|
||||||
|
if (!FIPS_mode_set(1)) {
|
||||||
|
ERR_load_crypto_strings();
|
||||||
|
ERR_print_errors(BIO_new_fp(stderr, BIO_NOCLOSE));
|
||||||
|
EXIT(1);
|
||||||
|
}
|
||||||
|
#else
|
||||||
|
fprintf(stderr, "FIPS mode not supported.\n");
|
||||||
|
EXIT(1);
|
||||||
|
#endif
|
||||||
|
}
|
||||||
|
|
||||||
/* Lets load up our environment a little */
|
apps_startup();
|
||||||
p=getenv("OPENSSL_CONF");
|
|
||||||
if (p == NULL)
|
|
||||||
p=getenv("SSLEAY_CONF");
|
|
||||||
if (p == NULL)
|
|
||||||
p=to_free=make_config_name();
|
|
||||||
|
|
||||||
default_config_file=p;
|
/* Lets load up our environment a little */
|
||||||
|
p = getenv("OPENSSL_CONF");
|
||||||
|
if (p == NULL)
|
||||||
|
p = getenv("SSLEAY_CONF");
|
||||||
|
if (p == NULL)
|
||||||
|
p = to_free = make_config_name();
|
||||||
|
|
||||||
config=NCONF_new(NULL);
|
default_config_file = p;
|
||||||
i=NCONF_load(config,p,&errline);
|
|
||||||
if (i == 0)
|
|
||||||
{
|
|
||||||
NCONF_free(config);
|
|
||||||
config = NULL;
|
|
||||||
ERR_clear_error();
|
|
||||||
}
|
|
||||||
|
|
||||||
prog=prog_init();
|
config = NCONF_new(NULL);
|
||||||
|
i = NCONF_load(config, p, &errline);
|
||||||
|
if (i == 0) {
|
||||||
|
if (ERR_GET_REASON(ERR_peek_last_error())
|
||||||
|
== CONF_R_NO_SUCH_FILE) {
|
||||||
|
BIO_printf(bio_err, "WARNING: can't open config file: %s\n", p);
|
||||||
|
ERR_clear_error();
|
||||||
|
NCONF_free(config);
|
||||||
|
config = NULL;
|
||||||
|
} else {
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
NCONF_free(config);
|
||||||
|
exit(1);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
/* first check the program name */
|
prog = prog_init();
|
||||||
program_name(Argv[0],pname,sizeof pname);
|
|
||||||
|
|
||||||
f.name=pname;
|
/* first check the program name */
|
||||||
fp=(FUNCTION *)lh_retrieve(prog,&f);
|
program_name(Argv[0], pname, sizeof pname);
|
||||||
if (fp != NULL)
|
|
||||||
{
|
|
||||||
Argv[0]=pname;
|
|
||||||
ret=fp->func(Argc,Argv);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
/* ok, now check that there are not arguments, if there are,
|
f.name = pname;
|
||||||
* run with them, shifting the ssleay off the front */
|
fp = lh_FUNCTION_retrieve(prog, &f);
|
||||||
if (Argc != 1)
|
if (fp != NULL) {
|
||||||
{
|
Argv[0] = pname;
|
||||||
Argc--;
|
ret = fp->func(Argc, Argv);
|
||||||
Argv++;
|
goto end;
|
||||||
ret=do_cmd(prog,Argc,Argv);
|
}
|
||||||
if (ret < 0) ret=0;
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
/* ok, lets enter the old 'OpenSSL>' mode */
|
/*
|
||||||
|
* ok, now check that there are not arguments, if there are, run with
|
||||||
|
* them, shifting the ssleay off the front
|
||||||
|
*/
|
||||||
|
if (Argc != 1) {
|
||||||
|
Argc--;
|
||||||
|
Argv++;
|
||||||
|
ret = do_cmd(prog, Argc, Argv);
|
||||||
|
if (ret < 0)
|
||||||
|
ret = 0;
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
for (;;)
|
/* ok, lets enter the old 'OpenSSL>' mode */
|
||||||
{
|
|
||||||
ret=0;
|
|
||||||
p=buf;
|
|
||||||
n=sizeof buf;
|
|
||||||
i=0;
|
|
||||||
for (;;)
|
|
||||||
{
|
|
||||||
p[0]='\0';
|
|
||||||
if (i++)
|
|
||||||
prompt=">";
|
|
||||||
else prompt="OpenSSL> ";
|
|
||||||
fputs(prompt,stdout);
|
|
||||||
fflush(stdout);
|
|
||||||
fgets(p,n,stdin);
|
|
||||||
if (p[0] == '\0') goto end;
|
|
||||||
i=strlen(p);
|
|
||||||
if (i <= 1) break;
|
|
||||||
if (p[i-2] != '\\') break;
|
|
||||||
i-=2;
|
|
||||||
p+=i;
|
|
||||||
n-=i;
|
|
||||||
}
|
|
||||||
if (!chopup_args(&arg,buf,&argc,&argv)) break;
|
|
||||||
|
|
||||||
ret=do_cmd(prog,argc,argv);
|
for (;;) {
|
||||||
if (ret < 0)
|
ret = 0;
|
||||||
{
|
p = buf;
|
||||||
ret=0;
|
n = sizeof buf;
|
||||||
goto end;
|
i = 0;
|
||||||
}
|
for (;;) {
|
||||||
if (ret != 0)
|
p[0] = '\0';
|
||||||
BIO_printf(bio_err,"error in %s\n",argv[0]);
|
if (i++)
|
||||||
(void)BIO_flush(bio_err);
|
prompt = ">";
|
||||||
}
|
else
|
||||||
BIO_printf(bio_err,"bad exit\n");
|
prompt = "OpenSSL> ";
|
||||||
ret=1;
|
fputs(prompt, stdout);
|
||||||
end:
|
fflush(stdout);
|
||||||
if (to_free)
|
if (!fgets(p, n, stdin))
|
||||||
OPENSSL_free(to_free);
|
goto end;
|
||||||
if (config != NULL)
|
if (p[0] == '\0')
|
||||||
{
|
goto end;
|
||||||
NCONF_free(config);
|
i = strlen(p);
|
||||||
config=NULL;
|
if (i <= 1)
|
||||||
}
|
break;
|
||||||
if (prog != NULL) lh_free(prog);
|
if (p[i - 2] != '\\')
|
||||||
if (arg.data != NULL) OPENSSL_free(arg.data);
|
break;
|
||||||
|
i -= 2;
|
||||||
|
p += i;
|
||||||
|
n -= i;
|
||||||
|
}
|
||||||
|
if (!chopup_args(&arg, buf, &argc, &argv))
|
||||||
|
break;
|
||||||
|
|
||||||
apps_shutdown();
|
ret = do_cmd(prog, argc, argv);
|
||||||
|
if (ret < 0) {
|
||||||
|
ret = 0;
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
if (ret != 0)
|
||||||
|
BIO_printf(bio_err, "error in %s\n", argv[0]);
|
||||||
|
(void)BIO_flush(bio_err);
|
||||||
|
}
|
||||||
|
BIO_printf(bio_err, "bad exit\n");
|
||||||
|
ret = 1;
|
||||||
|
end:
|
||||||
|
if (to_free)
|
||||||
|
OPENSSL_free(to_free);
|
||||||
|
if (config != NULL) {
|
||||||
|
NCONF_free(config);
|
||||||
|
config = NULL;
|
||||||
|
}
|
||||||
|
if (prog != NULL)
|
||||||
|
lh_FUNCTION_free(prog);
|
||||||
|
if (arg.data != NULL)
|
||||||
|
OPENSSL_free(arg.data);
|
||||||
|
|
||||||
CRYPTO_mem_leaks(bio_err);
|
#if defined( OPENSSL_SYS_VMS) && (__INITIAL_POINTER_SIZE == 64)
|
||||||
if (bio_err != NULL)
|
/* Free any duplicate Argv[] storage. */
|
||||||
{
|
if (free_Argv) {
|
||||||
BIO_free(bio_err);
|
OPENSSL_free(Argv);
|
||||||
bio_err=NULL;
|
}
|
||||||
}
|
#endif
|
||||||
OPENSSL_EXIT(ret);
|
apps_shutdown();
|
||||||
}
|
CRYPTO_mem_leaks(bio_err);
|
||||||
|
if (bio_err != NULL) {
|
||||||
|
BIO_free(bio_err);
|
||||||
|
bio_err = NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
OPENSSL_EXIT(ret);
|
||||||
|
}
|
||||||
|
|
||||||
#define LIST_STANDARD_COMMANDS "list-standard-commands"
|
#define LIST_STANDARD_COMMANDS "list-standard-commands"
|
||||||
#define LIST_MESSAGE_DIGEST_COMMANDS "list-message-digest-commands"
|
#define LIST_MESSAGE_DIGEST_COMMANDS "list-message-digest-commands"
|
||||||
|
#define LIST_MESSAGE_DIGEST_ALGORITHMS "list-message-digest-algorithms"
|
||||||
#define LIST_CIPHER_COMMANDS "list-cipher-commands"
|
#define LIST_CIPHER_COMMANDS "list-cipher-commands"
|
||||||
|
#define LIST_CIPHER_ALGORITHMS "list-cipher-algorithms"
|
||||||
|
#define LIST_PUBLIC_KEY_ALGORITHMS "list-public-key-algorithms"
|
||||||
|
|
||||||
static int do_cmd(LHASH *prog, int argc, char *argv[])
|
static int do_cmd(LHASH_OF(FUNCTION) *prog, int argc, char *argv[])
|
||||||
{
|
{
|
||||||
FUNCTION f,*fp;
|
FUNCTION f, *fp;
|
||||||
int i,ret=1,tp,nl;
|
int i, ret = 1, tp, nl;
|
||||||
|
|
||||||
if ((argc <= 0) || (argv[0] == NULL))
|
if ((argc <= 0) || (argv[0] == NULL)) {
|
||||||
{ ret=0; goto end; }
|
ret = 0;
|
||||||
f.name=argv[0];
|
goto end;
|
||||||
fp=(FUNCTION *)lh_retrieve(prog,&f);
|
|
||||||
if (fp != NULL)
|
|
||||||
{
|
|
||||||
ret=fp->func(argc,argv);
|
|
||||||
}
|
|
||||||
else if ((strncmp(argv[0],"no-",3)) == 0)
|
|
||||||
{
|
|
||||||
BIO *bio_stdout = BIO_new_fp(stdout,BIO_NOCLOSE);
|
|
||||||
#ifdef OPENSSL_SYS_VMS
|
|
||||||
{
|
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
|
||||||
bio_stdout = BIO_push(tmpbio, bio_stdout);
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
f.name=argv[0]+3;
|
|
||||||
ret = (lh_retrieve(prog,&f) != NULL);
|
|
||||||
if (!ret)
|
|
||||||
BIO_printf(bio_stdout, "%s\n", argv[0]);
|
|
||||||
else
|
|
||||||
BIO_printf(bio_stdout, "%s\n", argv[0]+3);
|
|
||||||
BIO_free_all(bio_stdout);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
else if ((strcmp(argv[0],"quit") == 0) ||
|
|
||||||
(strcmp(argv[0],"q") == 0) ||
|
|
||||||
(strcmp(argv[0],"exit") == 0) ||
|
|
||||||
(strcmp(argv[0],"bye") == 0))
|
|
||||||
{
|
|
||||||
ret= -1;
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
else if ((strcmp(argv[0],LIST_STANDARD_COMMANDS) == 0) ||
|
|
||||||
(strcmp(argv[0],LIST_MESSAGE_DIGEST_COMMANDS) == 0) ||
|
|
||||||
(strcmp(argv[0],LIST_CIPHER_COMMANDS) == 0))
|
|
||||||
{
|
|
||||||
int list_type;
|
|
||||||
BIO *bio_stdout;
|
|
||||||
|
|
||||||
if (strcmp(argv[0],LIST_STANDARD_COMMANDS) == 0)
|
|
||||||
list_type = FUNC_TYPE_GENERAL;
|
|
||||||
else if (strcmp(argv[0],LIST_MESSAGE_DIGEST_COMMANDS) == 0)
|
|
||||||
list_type = FUNC_TYPE_MD;
|
|
||||||
else /* strcmp(argv[0],LIST_CIPHER_COMMANDS) == 0 */
|
|
||||||
list_type = FUNC_TYPE_CIPHER;
|
|
||||||
bio_stdout = BIO_new_fp(stdout,BIO_NOCLOSE);
|
|
||||||
#ifdef OPENSSL_SYS_VMS
|
|
||||||
{
|
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
|
||||||
bio_stdout = BIO_push(tmpbio, bio_stdout);
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
|
|
||||||
for (fp=functions; fp->name != NULL; fp++)
|
|
||||||
if (fp->type == list_type)
|
|
||||||
BIO_printf(bio_stdout, "%s\n", fp->name);
|
|
||||||
BIO_free_all(bio_stdout);
|
|
||||||
ret=0;
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"openssl:Error: '%s' is an invalid command.\n",
|
|
||||||
argv[0]);
|
|
||||||
BIO_printf(bio_err, "\nStandard commands");
|
|
||||||
i=0;
|
|
||||||
tp=0;
|
|
||||||
for (fp=functions; fp->name != NULL; fp++)
|
|
||||||
{
|
|
||||||
nl=0;
|
|
||||||
if (((i++) % 5) == 0)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"\n");
|
|
||||||
nl=1;
|
|
||||||
}
|
|
||||||
if (fp->type != tp)
|
|
||||||
{
|
|
||||||
tp=fp->type;
|
|
||||||
if (!nl) BIO_printf(bio_err,"\n");
|
|
||||||
if (tp == FUNC_TYPE_MD)
|
|
||||||
{
|
|
||||||
i=1;
|
|
||||||
BIO_printf(bio_err,
|
|
||||||
"\nMessage Digest commands (see the `dgst' command for more details)\n");
|
|
||||||
}
|
|
||||||
else if (tp == FUNC_TYPE_CIPHER)
|
|
||||||
{
|
|
||||||
i=1;
|
|
||||||
BIO_printf(bio_err,"\nCipher commands (see the `enc' command for more details)\n");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
BIO_printf(bio_err,"%-15s",fp->name);
|
|
||||||
}
|
|
||||||
BIO_printf(bio_err,"\n\n");
|
|
||||||
ret=0;
|
|
||||||
}
|
|
||||||
end:
|
|
||||||
return(ret);
|
|
||||||
}
|
|
||||||
|
|
||||||
static int SortFnByName(const void *_f1,const void *_f2)
|
|
||||||
{
|
|
||||||
const FUNCTION *f1=_f1;
|
|
||||||
const FUNCTION *f2=_f2;
|
|
||||||
|
|
||||||
if(f1->type != f2->type)
|
|
||||||
return f1->type-f2->type;
|
|
||||||
return strcmp(f1->name,f2->name);
|
|
||||||
}
|
}
|
||||||
|
f.name = argv[0];
|
||||||
|
fp = lh_FUNCTION_retrieve(prog, &f);
|
||||||
|
if (fp == NULL) {
|
||||||
|
if (EVP_get_digestbyname(argv[0])) {
|
||||||
|
f.type = FUNC_TYPE_MD;
|
||||||
|
f.func = dgst_main;
|
||||||
|
fp = &f;
|
||||||
|
} else if (EVP_get_cipherbyname(argv[0])) {
|
||||||
|
f.type = FUNC_TYPE_CIPHER;
|
||||||
|
f.func = enc_main;
|
||||||
|
fp = &f;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (fp != NULL) {
|
||||||
|
ret = fp->func(argc, argv);
|
||||||
|
} else if ((strncmp(argv[0], "no-", 3)) == 0) {
|
||||||
|
BIO *bio_stdout = BIO_new_fp(stdout, BIO_NOCLOSE);
|
||||||
|
#ifdef OPENSSL_SYS_VMS
|
||||||
|
{
|
||||||
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
|
bio_stdout = BIO_push(tmpbio, bio_stdout);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
f.name = argv[0] + 3;
|
||||||
|
ret = (lh_FUNCTION_retrieve(prog, &f) != NULL);
|
||||||
|
if (!ret)
|
||||||
|
BIO_printf(bio_stdout, "%s\n", argv[0]);
|
||||||
|
else
|
||||||
|
BIO_printf(bio_stdout, "%s\n", argv[0] + 3);
|
||||||
|
BIO_free_all(bio_stdout);
|
||||||
|
goto end;
|
||||||
|
} else if ((strcmp(argv[0], "quit") == 0) ||
|
||||||
|
(strcmp(argv[0], "q") == 0) ||
|
||||||
|
(strcmp(argv[0], "exit") == 0) ||
|
||||||
|
(strcmp(argv[0], "bye") == 0)) {
|
||||||
|
ret = -1;
|
||||||
|
goto end;
|
||||||
|
} else if ((strcmp(argv[0], LIST_STANDARD_COMMANDS) == 0) ||
|
||||||
|
(strcmp(argv[0], LIST_MESSAGE_DIGEST_COMMANDS) == 0) ||
|
||||||
|
(strcmp(argv[0], LIST_MESSAGE_DIGEST_ALGORITHMS) == 0) ||
|
||||||
|
(strcmp(argv[0], LIST_CIPHER_COMMANDS) == 0) ||
|
||||||
|
(strcmp(argv[0], LIST_CIPHER_ALGORITHMS) == 0) ||
|
||||||
|
(strcmp(argv[0], LIST_PUBLIC_KEY_ALGORITHMS) == 0)) {
|
||||||
|
int list_type;
|
||||||
|
BIO *bio_stdout;
|
||||||
|
|
||||||
static LHASH *prog_init(void)
|
if (strcmp(argv[0], LIST_STANDARD_COMMANDS) == 0)
|
||||||
{
|
list_type = FUNC_TYPE_GENERAL;
|
||||||
LHASH *ret;
|
else if (strcmp(argv[0], LIST_MESSAGE_DIGEST_COMMANDS) == 0)
|
||||||
FUNCTION *f;
|
list_type = FUNC_TYPE_MD;
|
||||||
int i;
|
else if (strcmp(argv[0], LIST_MESSAGE_DIGEST_ALGORITHMS) == 0)
|
||||||
|
list_type = FUNC_TYPE_MD_ALG;
|
||||||
|
else if (strcmp(argv[0], LIST_PUBLIC_KEY_ALGORITHMS) == 0)
|
||||||
|
list_type = FUNC_TYPE_PKEY;
|
||||||
|
else if (strcmp(argv[0], LIST_CIPHER_ALGORITHMS) == 0)
|
||||||
|
list_type = FUNC_TYPE_CIPHER_ALG;
|
||||||
|
else /* strcmp(argv[0],LIST_CIPHER_COMMANDS) == 0 */
|
||||||
|
list_type = FUNC_TYPE_CIPHER;
|
||||||
|
bio_stdout = BIO_new_fp(stdout, BIO_NOCLOSE);
|
||||||
|
#ifdef OPENSSL_SYS_VMS
|
||||||
|
{
|
||||||
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
|
bio_stdout = BIO_push(tmpbio, bio_stdout);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
/* Purely so it looks nice when the user hits ? */
|
if (!load_config(bio_err, NULL))
|
||||||
for(i=0,f=functions ; f->name != NULL ; ++f,++i)
|
goto end;
|
||||||
;
|
|
||||||
qsort(functions,i,sizeof *functions,SortFnByName);
|
|
||||||
|
|
||||||
if ((ret=lh_new(hash, cmp)) == NULL)
|
if (list_type == FUNC_TYPE_PKEY)
|
||||||
return(NULL);
|
list_pkey(bio_stdout);
|
||||||
|
if (list_type == FUNC_TYPE_MD_ALG)
|
||||||
|
list_md(bio_stdout);
|
||||||
|
if (list_type == FUNC_TYPE_CIPHER_ALG)
|
||||||
|
list_cipher(bio_stdout);
|
||||||
|
else {
|
||||||
|
for (fp = functions; fp->name != NULL; fp++)
|
||||||
|
if (fp->type == list_type)
|
||||||
|
BIO_printf(bio_stdout, "%s\n", fp->name);
|
||||||
|
}
|
||||||
|
BIO_free_all(bio_stdout);
|
||||||
|
ret = 0;
|
||||||
|
goto end;
|
||||||
|
} else {
|
||||||
|
BIO_printf(bio_err, "openssl:Error: '%s' is an invalid command.\n",
|
||||||
|
argv[0]);
|
||||||
|
BIO_printf(bio_err, "\nStandard commands");
|
||||||
|
i = 0;
|
||||||
|
tp = 0;
|
||||||
|
for (fp = functions; fp->name != NULL; fp++) {
|
||||||
|
nl = 0;
|
||||||
|
#ifdef OPENSSL_NO_CAMELLIA
|
||||||
|
if (((i++) % 5) == 0)
|
||||||
|
#else
|
||||||
|
if (((i++) % 4) == 0)
|
||||||
|
#endif
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "\n");
|
||||||
|
nl = 1;
|
||||||
|
}
|
||||||
|
if (fp->type != tp) {
|
||||||
|
tp = fp->type;
|
||||||
|
if (!nl)
|
||||||
|
BIO_printf(bio_err, "\n");
|
||||||
|
if (tp == FUNC_TYPE_MD) {
|
||||||
|
i = 1;
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"\nMessage Digest commands (see the `dgst' command for more details)\n");
|
||||||
|
} else if (tp == FUNC_TYPE_CIPHER) {
|
||||||
|
i = 1;
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"\nCipher commands (see the `enc' command for more details)\n");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
#ifdef OPENSSL_NO_CAMELLIA
|
||||||
|
BIO_printf(bio_err, "%-15s", fp->name);
|
||||||
|
#else
|
||||||
|
BIO_printf(bio_err, "%-18s", fp->name);
|
||||||
|
#endif
|
||||||
|
}
|
||||||
|
BIO_printf(bio_err, "\n\n");
|
||||||
|
ret = 0;
|
||||||
|
}
|
||||||
|
end:
|
||||||
|
return (ret);
|
||||||
|
}
|
||||||
|
|
||||||
for (f=functions; f->name != NULL; f++)
|
static int SortFnByName(const void *_f1, const void *_f2)
|
||||||
lh_insert(ret,f);
|
{
|
||||||
return(ret);
|
const FUNCTION *f1 = _f1;
|
||||||
}
|
const FUNCTION *f2 = _f2;
|
||||||
|
|
||||||
/* static int MS_CALLBACK cmp(FUNCTION *a, FUNCTION *b) */
|
if (f1->type != f2->type)
|
||||||
static int MS_CALLBACK cmp(const void *a_void, const void *b_void)
|
return f1->type - f2->type;
|
||||||
{
|
return strcmp(f1->name, f2->name);
|
||||||
return(strncmp(((FUNCTION *)a_void)->name,
|
}
|
||||||
((FUNCTION *)b_void)->name,8));
|
|
||||||
}
|
|
||||||
|
|
||||||
/* static unsigned long MS_CALLBACK hash(FUNCTION *a) */
|
static void list_pkey(BIO *out)
|
||||||
static unsigned long MS_CALLBACK hash(const void *a_void)
|
{
|
||||||
{
|
int i;
|
||||||
return(lh_strhash(((FUNCTION *)a_void)->name));
|
for (i = 0; i < EVP_PKEY_asn1_get_count(); i++) {
|
||||||
}
|
const EVP_PKEY_ASN1_METHOD *ameth;
|
||||||
|
int pkey_id, pkey_base_id, pkey_flags;
|
||||||
|
const char *pinfo, *pem_str;
|
||||||
|
ameth = EVP_PKEY_asn1_get0(i);
|
||||||
|
EVP_PKEY_asn1_get0_info(&pkey_id, &pkey_base_id, &pkey_flags,
|
||||||
|
&pinfo, &pem_str, ameth);
|
||||||
|
if (pkey_flags & ASN1_PKEY_ALIAS) {
|
||||||
|
BIO_printf(out, "Name: %s\n", OBJ_nid2ln(pkey_id));
|
||||||
|
BIO_printf(out, "\tType: Alias to %s\n",
|
||||||
|
OBJ_nid2ln(pkey_base_id));
|
||||||
|
} else {
|
||||||
|
BIO_printf(out, "Name: %s\n", pinfo);
|
||||||
|
BIO_printf(out, "\tType: %s Algorithm\n",
|
||||||
|
pkey_flags & ASN1_PKEY_DYNAMIC ?
|
||||||
|
"External" : "Builtin");
|
||||||
|
BIO_printf(out, "\tOID: %s\n", OBJ_nid2ln(pkey_id));
|
||||||
|
if (pem_str == NULL)
|
||||||
|
pem_str = "(none)";
|
||||||
|
BIO_printf(out, "\tPEM string: %s\n", pem_str);
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
static void list_cipher_fn(const EVP_CIPHER *c,
|
||||||
|
const char *from, const char *to, void *arg)
|
||||||
|
{
|
||||||
|
if (c)
|
||||||
|
BIO_printf(arg, "%s\n", EVP_CIPHER_name(c));
|
||||||
|
else {
|
||||||
|
if (!from)
|
||||||
|
from = "<undefined>";
|
||||||
|
if (!to)
|
||||||
|
to = "<undefined>";
|
||||||
|
BIO_printf(arg, "%s => %s\n", from, to);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
static void list_cipher(BIO *out)
|
||||||
|
{
|
||||||
|
EVP_CIPHER_do_all_sorted(list_cipher_fn, out);
|
||||||
|
}
|
||||||
|
|
||||||
|
static void list_md_fn(const EVP_MD *m,
|
||||||
|
const char *from, const char *to, void *arg)
|
||||||
|
{
|
||||||
|
if (m)
|
||||||
|
BIO_printf(arg, "%s\n", EVP_MD_name(m));
|
||||||
|
else {
|
||||||
|
if (!from)
|
||||||
|
from = "<undefined>";
|
||||||
|
if (!to)
|
||||||
|
to = "<undefined>";
|
||||||
|
BIO_printf(arg, "%s => %s\n", from, to);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
static void list_md(BIO *out)
|
||||||
|
{
|
||||||
|
EVP_MD_do_all_sorted(list_md_fn, out);
|
||||||
|
}
|
||||||
|
|
||||||
|
static int MS_CALLBACK function_cmp(const FUNCTION * a, const FUNCTION * b)
|
||||||
|
{
|
||||||
|
return strncmp(a->name, b->name, 8);
|
||||||
|
}
|
||||||
|
|
||||||
|
static IMPLEMENT_LHASH_COMP_FN(function, FUNCTION)
|
||||||
|
|
||||||
|
static unsigned long MS_CALLBACK function_hash(const FUNCTION * a)
|
||||||
|
{
|
||||||
|
return lh_strhash(a->name);
|
||||||
|
}
|
||||||
|
|
||||||
|
static IMPLEMENT_LHASH_HASH_FN(function, FUNCTION)
|
||||||
|
|
||||||
|
static LHASH_OF(FUNCTION) *prog_init(void)
|
||||||
|
{
|
||||||
|
LHASH_OF(FUNCTION) *ret;
|
||||||
|
FUNCTION *f;
|
||||||
|
size_t i;
|
||||||
|
|
||||||
|
/* Purely so it looks nice when the user hits ? */
|
||||||
|
for (i = 0, f = functions; f->name != NULL; ++f, ++i) ;
|
||||||
|
qsort(functions, i, sizeof *functions, SortFnByName);
|
||||||
|
|
||||||
|
if ((ret = lh_FUNCTION_new()) == NULL)
|
||||||
|
return (NULL);
|
||||||
|
|
||||||
|
for (f = functions; f->name != NULL; f++)
|
||||||
|
(void)lh_FUNCTION_insert(ret, f);
|
||||||
|
return (ret);
|
||||||
|
}
|
||||||
|
|||||||
117
apps/openssl.cnf
117
apps/openssl.cnf
@@ -21,12 +21,17 @@ oid_section = new_oids
|
|||||||
|
|
||||||
[ new_oids ]
|
[ new_oids ]
|
||||||
|
|
||||||
# We can add new OIDs in here for use by 'ca' and 'req'.
|
# We can add new OIDs in here for use by 'ca', 'req' and 'ts'.
|
||||||
# Add a simple OID like this:
|
# Add a simple OID like this:
|
||||||
# testoid1=1.2.3.4
|
# testoid1=1.2.3.4
|
||||||
# Or use config file substitution like this:
|
# Or use config file substitution like this:
|
||||||
# testoid2=${testoid1}.5.6
|
# testoid2=${testoid1}.5.6
|
||||||
|
|
||||||
|
# Policies used by the TSA examples.
|
||||||
|
tsa_policy1 = 1.2.3.4.1
|
||||||
|
tsa_policy2 = 1.2.3.4.5.6
|
||||||
|
tsa_policy3 = 1.2.3.4.5.7
|
||||||
|
|
||||||
####################################################################
|
####################################################################
|
||||||
[ ca ]
|
[ ca ]
|
||||||
default_ca = CA_default # The default ca section
|
default_ca = CA_default # The default ca section
|
||||||
@@ -38,10 +43,14 @@ dir = ./demoCA # Where everything is kept
|
|||||||
certs = $dir/certs # Where the issued certs are kept
|
certs = $dir/certs # Where the issued certs are kept
|
||||||
crl_dir = $dir/crl # Where the issued crl are kept
|
crl_dir = $dir/crl # Where the issued crl are kept
|
||||||
database = $dir/index.txt # database index file.
|
database = $dir/index.txt # database index file.
|
||||||
|
#unique_subject = no # Set to 'no' to allow creation of
|
||||||
|
# several ctificates with same subject.
|
||||||
new_certs_dir = $dir/newcerts # default place for new certs.
|
new_certs_dir = $dir/newcerts # default place for new certs.
|
||||||
|
|
||||||
certificate = $dir/cacert.pem # The CA certificate
|
certificate = $dir/cacert.pem # The CA certificate
|
||||||
serial = $dir/serial # The current serial number
|
serial = $dir/serial # The current serial number
|
||||||
|
crlnumber = $dir/crlnumber # the current crl number
|
||||||
|
# must be commented out to leave a V1 CRL
|
||||||
crl = $dir/crl.pem # The current CRL
|
crl = $dir/crl.pem # The current CRL
|
||||||
private_key = $dir/private/cakey.pem# The private key
|
private_key = $dir/private/cakey.pem# The private key
|
||||||
RANDFILE = $dir/private/.rand # private random number file
|
RANDFILE = $dir/private/.rand # private random number file
|
||||||
@@ -58,11 +67,12 @@ cert_opt = ca_default # Certificate field options
|
|||||||
|
|
||||||
# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
|
# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
|
||||||
# so this is commented out by default to leave a V1 CRL.
|
# so this is commented out by default to leave a V1 CRL.
|
||||||
|
# crlnumber must also be commented out to leave a V1 CRL.
|
||||||
# crl_extensions = crl_ext
|
# crl_extensions = crl_ext
|
||||||
|
|
||||||
default_days = 365 # how long to certify for
|
default_days = 365 # how long to certify for
|
||||||
default_crl_days= 30 # how long before next CRL
|
default_crl_days= 30 # how long before next CRL
|
||||||
default_md = md5 # which md to use.
|
default_md = default # use public key default MD
|
||||||
preserve = no # keep passed DN ordering
|
preserve = no # keep passed DN ordering
|
||||||
|
|
||||||
# A few difference way of specifying how similar the request should look
|
# A few difference way of specifying how similar the request should look
|
||||||
@@ -105,13 +115,12 @@ x509_extensions = v3_ca # The extentions to add to the self signed cert
|
|||||||
|
|
||||||
# This sets a mask for permitted string types. There are several options.
|
# This sets a mask for permitted string types. There are several options.
|
||||||
# default: PrintableString, T61String, BMPString.
|
# default: PrintableString, T61String, BMPString.
|
||||||
# pkix : PrintableString, BMPString.
|
# pkix : PrintableString, BMPString (PKIX recommendation before 2004)
|
||||||
# utf8only: only UTF8Strings.
|
# utf8only: only UTF8Strings (PKIX recommendation after 2004).
|
||||||
# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
|
# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
|
||||||
# MASK:XXXX a literal mask value.
|
# MASK:XXXX a literal mask value.
|
||||||
# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings
|
# WARNING: ancient versions of Netscape crash on BMPStrings or UTF8Strings.
|
||||||
# so use this option with caution!
|
string_mask = utf8only
|
||||||
string_mask = nombstr
|
|
||||||
|
|
||||||
# req_extensions = v3_req # The extensions to add to a certificate request
|
# req_extensions = v3_req # The extensions to add to a certificate request
|
||||||
|
|
||||||
@@ -136,7 +145,7 @@ localityName = Locality Name (eg, city)
|
|||||||
organizationalUnitName = Organizational Unit Name (eg, section)
|
organizationalUnitName = Organizational Unit Name (eg, section)
|
||||||
#organizationalUnitName_default =
|
#organizationalUnitName_default =
|
||||||
|
|
||||||
commonName = Common Name (eg, YOUR name)
|
commonName = Common Name (e.g. server FQDN or YOUR name)
|
||||||
commonName_max = 64
|
commonName_max = 64
|
||||||
|
|
||||||
emailAddress = Email Address
|
emailAddress = Email Address
|
||||||
@@ -183,7 +192,7 @@ nsComment = "OpenSSL Generated Certificate"
|
|||||||
|
|
||||||
# PKIX recommendations harmless if included in all certificates.
|
# PKIX recommendations harmless if included in all certificates.
|
||||||
subjectKeyIdentifier=hash
|
subjectKeyIdentifier=hash
|
||||||
authorityKeyIdentifier=keyid,issuer:always
|
authorityKeyIdentifier=keyid,issuer
|
||||||
|
|
||||||
# This stuff is for subjectAltName and issuerAltname.
|
# This stuff is for subjectAltName and issuerAltname.
|
||||||
# Import the email address.
|
# Import the email address.
|
||||||
@@ -202,6 +211,9 @@ authorityKeyIdentifier=keyid,issuer:always
|
|||||||
#nsCaPolicyUrl
|
#nsCaPolicyUrl
|
||||||
#nsSslServerName
|
#nsSslServerName
|
||||||
|
|
||||||
|
# This is required for TSA certificates.
|
||||||
|
# extendedKeyUsage = critical,timeStamping
|
||||||
|
|
||||||
[ v3_req ]
|
[ v3_req ]
|
||||||
|
|
||||||
# Extensions to add to a certificate request
|
# Extensions to add to a certificate request
|
||||||
@@ -219,7 +231,7 @@ keyUsage = nonRepudiation, digitalSignature, keyEncipherment
|
|||||||
|
|
||||||
subjectKeyIdentifier=hash
|
subjectKeyIdentifier=hash
|
||||||
|
|
||||||
authorityKeyIdentifier=keyid:always,issuer:always
|
authorityKeyIdentifier=keyid:always,issuer
|
||||||
|
|
||||||
# This is what PKIX recommends but some broken software chokes on critical
|
# This is what PKIX recommends but some broken software chokes on critical
|
||||||
# extensions.
|
# extensions.
|
||||||
@@ -252,4 +264,87 @@ basicConstraints = CA:true
|
|||||||
# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
|
# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
|
||||||
|
|
||||||
# issuerAltName=issuer:copy
|
# issuerAltName=issuer:copy
|
||||||
authorityKeyIdentifier=keyid:always,issuer:always
|
authorityKeyIdentifier=keyid:always
|
||||||
|
|
||||||
|
[ proxy_cert_ext ]
|
||||||
|
# These extensions should be added when creating a proxy certificate
|
||||||
|
|
||||||
|
# This goes against PKIX guidelines but some CAs do it and some software
|
||||||
|
# requires this to avoid interpreting an end user certificate as a CA.
|
||||||
|
|
||||||
|
basicConstraints=CA:FALSE
|
||||||
|
|
||||||
|
# Here are some examples of the usage of nsCertType. If it is omitted
|
||||||
|
# the certificate can be used for anything *except* object signing.
|
||||||
|
|
||||||
|
# This is OK for an SSL server.
|
||||||
|
# nsCertType = server
|
||||||
|
|
||||||
|
# For an object signing certificate this would be used.
|
||||||
|
# nsCertType = objsign
|
||||||
|
|
||||||
|
# For normal client use this is typical
|
||||||
|
# nsCertType = client, email
|
||||||
|
|
||||||
|
# and for everything including object signing:
|
||||||
|
# nsCertType = client, email, objsign
|
||||||
|
|
||||||
|
# This is typical in keyUsage for a client certificate.
|
||||||
|
# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
|
||||||
|
|
||||||
|
# This will be displayed in Netscape's comment listbox.
|
||||||
|
nsComment = "OpenSSL Generated Certificate"
|
||||||
|
|
||||||
|
# PKIX recommendations harmless if included in all certificates.
|
||||||
|
subjectKeyIdentifier=hash
|
||||||
|
authorityKeyIdentifier=keyid,issuer
|
||||||
|
|
||||||
|
# This stuff is for subjectAltName and issuerAltname.
|
||||||
|
# Import the email address.
|
||||||
|
# subjectAltName=email:copy
|
||||||
|
# An alternative to produce certificates that aren't
|
||||||
|
# deprecated according to PKIX.
|
||||||
|
# subjectAltName=email:move
|
||||||
|
|
||||||
|
# Copy subject details
|
||||||
|
# issuerAltName=issuer:copy
|
||||||
|
|
||||||
|
#nsCaRevocationUrl = http://www.domain.dom/ca-crl.pem
|
||||||
|
#nsBaseUrl
|
||||||
|
#nsRevocationUrl
|
||||||
|
#nsRenewalUrl
|
||||||
|
#nsCaPolicyUrl
|
||||||
|
#nsSslServerName
|
||||||
|
|
||||||
|
# This really needs to be in place for it to be a proxy certificate.
|
||||||
|
proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
|
||||||
|
|
||||||
|
####################################################################
|
||||||
|
[ tsa ]
|
||||||
|
|
||||||
|
default_tsa = tsa_config1 # the default TSA section
|
||||||
|
|
||||||
|
[ tsa_config1 ]
|
||||||
|
|
||||||
|
# These are used by the TSA reply generation only.
|
||||||
|
dir = ./demoCA # TSA root directory
|
||||||
|
serial = $dir/tsaserial # The current serial number (mandatory)
|
||||||
|
crypto_device = builtin # OpenSSL engine to use for signing
|
||||||
|
signer_cert = $dir/tsacert.pem # The TSA signing certificate
|
||||||
|
# (optional)
|
||||||
|
certs = $dir/cacert.pem # Certificate chain to include in reply
|
||||||
|
# (optional)
|
||||||
|
signer_key = $dir/private/tsakey.pem # The TSA private key (optional)
|
||||||
|
|
||||||
|
default_policy = tsa_policy1 # Policy if request did not specify it
|
||||||
|
# (optional)
|
||||||
|
other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional)
|
||||||
|
digests = md5, sha1 # Acceptable message digests (mandatory)
|
||||||
|
accuracy = secs:1, millisecs:500, microsecs:100 # (optional)
|
||||||
|
clock_precision_digits = 0 # number of digits after dot. (optional)
|
||||||
|
ordering = yes # Is ordering defined for timestamps?
|
||||||
|
# (optional, default: no)
|
||||||
|
tsa_name = yes # Must the TSA name be included in the reply?
|
||||||
|
# (optional, default: no)
|
||||||
|
ess_cert_id_chain = no # Must the ESS cert id chain be included?
|
||||||
|
# (optional, default: no)
|
||||||
|
|||||||
842
apps/passwd.c
842
apps/passwd.c
@@ -6,44 +6,44 @@
|
|||||||
|
|
||||||
#if !defined(OPENSSL_NO_DES) || !defined(NO_MD5CRYPT_1)
|
#if !defined(OPENSSL_NO_DES) || !defined(NO_MD5CRYPT_1)
|
||||||
|
|
||||||
#include <assert.h>
|
# include <assert.h>
|
||||||
#include <string.h>
|
# include <string.h>
|
||||||
|
|
||||||
#include "apps.h"
|
# include "apps.h"
|
||||||
|
|
||||||
#include <openssl/bio.h>
|
# include <openssl/bio.h>
|
||||||
#include <openssl/err.h>
|
# include <openssl/err.h>
|
||||||
#include <openssl/evp.h>
|
# include <openssl/evp.h>
|
||||||
#include <openssl/rand.h>
|
# include <openssl/rand.h>
|
||||||
#ifndef OPENSSL_NO_DES
|
# ifndef OPENSSL_NO_DES
|
||||||
# include <openssl/des.h>
|
# include <openssl/des.h>
|
||||||
#endif
|
# endif
|
||||||
#ifndef NO_MD5CRYPT_1
|
# ifndef NO_MD5CRYPT_1
|
||||||
# include <openssl/md5.h>
|
# include <openssl/md5.h>
|
||||||
#endif
|
# endif
|
||||||
|
|
||||||
|
# undef PROG
|
||||||
|
# define PROG passwd_main
|
||||||
|
|
||||||
#undef PROG
|
static unsigned const char cov_2char[64] = {
|
||||||
#define PROG passwd_main
|
/* from crypto/des/fcrypt.c */
|
||||||
|
0x2E, 0x2F, 0x30, 0x31, 0x32, 0x33, 0x34, 0x35,
|
||||||
|
0x36, 0x37, 0x38, 0x39, 0x41, 0x42, 0x43, 0x44,
|
||||||
static unsigned const char cov_2char[64]={
|
0x45, 0x46, 0x47, 0x48, 0x49, 0x4A, 0x4B, 0x4C,
|
||||||
/* from crypto/des/fcrypt.c */
|
0x4D, 0x4E, 0x4F, 0x50, 0x51, 0x52, 0x53, 0x54,
|
||||||
0x2E,0x2F,0x30,0x31,0x32,0x33,0x34,0x35,
|
0x55, 0x56, 0x57, 0x58, 0x59, 0x5A, 0x61, 0x62,
|
||||||
0x36,0x37,0x38,0x39,0x41,0x42,0x43,0x44,
|
0x63, 0x64, 0x65, 0x66, 0x67, 0x68, 0x69, 0x6A,
|
||||||
0x45,0x46,0x47,0x48,0x49,0x4A,0x4B,0x4C,
|
0x6B, 0x6C, 0x6D, 0x6E, 0x6F, 0x70, 0x71, 0x72,
|
||||||
0x4D,0x4E,0x4F,0x50,0x51,0x52,0x53,0x54,
|
0x73, 0x74, 0x75, 0x76, 0x77, 0x78, 0x79, 0x7A
|
||||||
0x55,0x56,0x57,0x58,0x59,0x5A,0x61,0x62,
|
|
||||||
0x63,0x64,0x65,0x66,0x67,0x68,0x69,0x6A,
|
|
||||||
0x6B,0x6C,0x6D,0x6E,0x6F,0x70,0x71,0x72,
|
|
||||||
0x73,0x74,0x75,0x76,0x77,0x78,0x79,0x7A
|
|
||||||
};
|
};
|
||||||
|
|
||||||
static int do_passwd(int passed_salt, char **salt_p, char **salt_malloc_p,
|
static int do_passwd(int passed_salt, char **salt_p, char **salt_malloc_p,
|
||||||
char *passwd, BIO *out, int quiet, int table, int reverse,
|
char *passwd, BIO *out, int quiet, int table,
|
||||||
size_t pw_maxlen, int usecrypt, int use1, int useapr1);
|
int reverse, size_t pw_maxlen, int usecrypt, int use1,
|
||||||
|
int useapr1);
|
||||||
|
|
||||||
/* -crypt - standard Unix password algorithm (default)
|
/*-
|
||||||
|
* -crypt - standard Unix password algorithm (default)
|
||||||
* -1 - MD5-based password algorithm
|
* -1 - MD5-based password algorithm
|
||||||
* -apr1 - MD5-based password algorithm, Apache variant
|
* -apr1 - MD5-based password algorithm, Apache variant
|
||||||
* -salt string - salt
|
* -salt string - salt
|
||||||
@@ -58,453 +58,437 @@ static int do_passwd(int passed_salt, char **salt_p, char **salt_malloc_p,
|
|||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
int ret = 1;
|
int ret = 1;
|
||||||
char *infile = NULL;
|
char *infile = NULL;
|
||||||
int in_stdin = 0;
|
int in_stdin = 0;
|
||||||
int in_noverify = 0;
|
int in_noverify = 0;
|
||||||
char *salt = NULL, *passwd = NULL, **passwds = NULL;
|
char *salt = NULL, *passwd = NULL, **passwds = NULL;
|
||||||
char *salt_malloc = NULL, *passwd_malloc = NULL;
|
char *salt_malloc = NULL, *passwd_malloc = NULL;
|
||||||
size_t passwd_malloc_size = 0;
|
size_t passwd_malloc_size = 0;
|
||||||
int pw_source_defined = 0;
|
int pw_source_defined = 0;
|
||||||
BIO *in = NULL, *out = NULL;
|
BIO *in = NULL, *out = NULL;
|
||||||
int i, badopt, opt_done;
|
int i, badopt, opt_done;
|
||||||
int passed_salt = 0, quiet = 0, table = 0, reverse = 0;
|
int passed_salt = 0, quiet = 0, table = 0, reverse = 0;
|
||||||
int usecrypt = 0, use1 = 0, useapr1 = 0;
|
int usecrypt = 0, use1 = 0, useapr1 = 0;
|
||||||
size_t pw_maxlen = 0;
|
size_t pw_maxlen = 0;
|
||||||
|
|
||||||
apps_startup();
|
apps_startup();
|
||||||
|
|
||||||
if (bio_err == NULL)
|
if (bio_err == NULL)
|
||||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
if ((bio_err = BIO_new(BIO_s_file())) != NULL)
|
||||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||||
|
|
||||||
if (!load_config(bio_err, NULL))
|
if (!load_config(bio_err, NULL))
|
||||||
goto err;
|
goto err;
|
||||||
out = BIO_new(BIO_s_file());
|
out = BIO_new(BIO_s_file());
|
||||||
if (out == NULL)
|
if (out == NULL)
|
||||||
goto err;
|
goto err;
|
||||||
BIO_set_fp(out, stdout, BIO_NOCLOSE | BIO_FP_TEXT);
|
BIO_set_fp(out, stdout, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||||
#ifdef OPENSSL_SYS_VMS
|
# ifdef OPENSSL_SYS_VMS
|
||||||
{
|
{
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
out = BIO_push(tmpbio, out);
|
out = BIO_push(tmpbio, out);
|
||||||
}
|
}
|
||||||
#endif
|
# endif
|
||||||
|
|
||||||
badopt = 0, opt_done = 0;
|
badopt = 0, opt_done = 0;
|
||||||
i = 0;
|
i = 0;
|
||||||
while (!badopt && !opt_done && argv[++i] != NULL)
|
while (!badopt && !opt_done && argv[++i] != NULL) {
|
||||||
{
|
if (strcmp(argv[i], "-crypt") == 0)
|
||||||
if (strcmp(argv[i], "-crypt") == 0)
|
usecrypt = 1;
|
||||||
usecrypt = 1;
|
else if (strcmp(argv[i], "-1") == 0)
|
||||||
else if (strcmp(argv[i], "-1") == 0)
|
use1 = 1;
|
||||||
use1 = 1;
|
else if (strcmp(argv[i], "-apr1") == 0)
|
||||||
else if (strcmp(argv[i], "-apr1") == 0)
|
useapr1 = 1;
|
||||||
useapr1 = 1;
|
else if (strcmp(argv[i], "-salt") == 0) {
|
||||||
else if (strcmp(argv[i], "-salt") == 0)
|
if ((argv[i + 1] != NULL) && (salt == NULL)) {
|
||||||
{
|
passed_salt = 1;
|
||||||
if ((argv[i+1] != NULL) && (salt == NULL))
|
salt = argv[++i];
|
||||||
{
|
} else
|
||||||
passed_salt = 1;
|
badopt = 1;
|
||||||
salt = argv[++i];
|
} else if (strcmp(argv[i], "-in") == 0) {
|
||||||
}
|
if ((argv[i + 1] != NULL) && !pw_source_defined) {
|
||||||
else
|
pw_source_defined = 1;
|
||||||
badopt = 1;
|
infile = argv[++i];
|
||||||
}
|
} else
|
||||||
else if (strcmp(argv[i], "-in") == 0)
|
badopt = 1;
|
||||||
{
|
} else if (strcmp(argv[i], "-stdin") == 0) {
|
||||||
if ((argv[i+1] != NULL) && !pw_source_defined)
|
if (!pw_source_defined) {
|
||||||
{
|
pw_source_defined = 1;
|
||||||
pw_source_defined = 1;
|
in_stdin = 1;
|
||||||
infile = argv[++i];
|
} else
|
||||||
}
|
badopt = 1;
|
||||||
else
|
} else if (strcmp(argv[i], "-noverify") == 0)
|
||||||
badopt = 1;
|
in_noverify = 1;
|
||||||
}
|
else if (strcmp(argv[i], "-quiet") == 0)
|
||||||
else if (strcmp(argv[i], "-stdin") == 0)
|
quiet = 1;
|
||||||
{
|
else if (strcmp(argv[i], "-table") == 0)
|
||||||
if (!pw_source_defined)
|
table = 1;
|
||||||
{
|
else if (strcmp(argv[i], "-reverse") == 0)
|
||||||
pw_source_defined = 1;
|
reverse = 1;
|
||||||
in_stdin = 1;
|
else if (argv[i][0] == '-')
|
||||||
}
|
badopt = 1;
|
||||||
else
|
else if (!pw_source_defined)
|
||||||
badopt = 1;
|
/* non-option arguments, use as passwords */
|
||||||
}
|
{
|
||||||
else if (strcmp(argv[i], "-noverify") == 0)
|
pw_source_defined = 1;
|
||||||
in_noverify = 1;
|
passwds = &argv[i];
|
||||||
else if (strcmp(argv[i], "-quiet") == 0)
|
opt_done = 1;
|
||||||
quiet = 1;
|
} else
|
||||||
else if (strcmp(argv[i], "-table") == 0)
|
badopt = 1;
|
||||||
table = 1;
|
}
|
||||||
else if (strcmp(argv[i], "-reverse") == 0)
|
|
||||||
reverse = 1;
|
|
||||||
else if (argv[i][0] == '-')
|
|
||||||
badopt = 1;
|
|
||||||
else if (!pw_source_defined)
|
|
||||||
/* non-option arguments, use as passwords */
|
|
||||||
{
|
|
||||||
pw_source_defined = 1;
|
|
||||||
passwds = &argv[i];
|
|
||||||
opt_done = 1;
|
|
||||||
}
|
|
||||||
else
|
|
||||||
badopt = 1;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!usecrypt && !use1 && !useapr1) /* use default */
|
if (!usecrypt && !use1 && !useapr1) /* use default */
|
||||||
usecrypt = 1;
|
usecrypt = 1;
|
||||||
if (usecrypt + use1 + useapr1 > 1) /* conflict */
|
if (usecrypt + use1 + useapr1 > 1) /* conflict */
|
||||||
badopt = 1;
|
badopt = 1;
|
||||||
|
|
||||||
/* reject unsupported algorithms */
|
/* reject unsupported algorithms */
|
||||||
#ifdef OPENSSL_NO_DES
|
# ifdef OPENSSL_NO_DES
|
||||||
if (usecrypt) badopt = 1;
|
if (usecrypt)
|
||||||
#endif
|
badopt = 1;
|
||||||
#ifdef NO_MD5CRYPT_1
|
# endif
|
||||||
if (use1 || useapr1) badopt = 1;
|
# ifdef NO_MD5CRYPT_1
|
||||||
#endif
|
if (use1 || useapr1)
|
||||||
|
badopt = 1;
|
||||||
|
# endif
|
||||||
|
|
||||||
if (badopt)
|
if (badopt) {
|
||||||
{
|
BIO_printf(bio_err, "Usage: passwd [options] [passwords]\n");
|
||||||
BIO_printf(bio_err, "Usage: passwd [options] [passwords]\n");
|
BIO_printf(bio_err, "where options are\n");
|
||||||
BIO_printf(bio_err, "where options are\n");
|
# ifndef OPENSSL_NO_DES
|
||||||
#ifndef OPENSSL_NO_DES
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err, "-crypt standard Unix password algorithm (default)\n");
|
"-crypt standard Unix password algorithm (default)\n");
|
||||||
#endif
|
# endif
|
||||||
#ifndef NO_MD5CRYPT_1
|
# ifndef NO_MD5CRYPT_1
|
||||||
BIO_printf(bio_err, "-1 MD5-based password algorithm\n");
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err, "-apr1 MD5-based password algorithm, Apache variant\n");
|
"-1 MD5-based password algorithm\n");
|
||||||
#endif
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err, "-salt string use provided salt\n");
|
"-apr1 MD5-based password algorithm, Apache variant\n");
|
||||||
BIO_printf(bio_err, "-in file read passwords from file\n");
|
# endif
|
||||||
BIO_printf(bio_err, "-stdin read passwords from stdin\n");
|
BIO_printf(bio_err, "-salt string use provided salt\n");
|
||||||
BIO_printf(bio_err, "-noverify never verify when reading password from terminal\n");
|
BIO_printf(bio_err, "-in file read passwords from file\n");
|
||||||
BIO_printf(bio_err, "-quiet no warnings\n");
|
BIO_printf(bio_err, "-stdin read passwords from stdin\n");
|
||||||
BIO_printf(bio_err, "-table format output as table\n");
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err, "-reverse switch table columns\n");
|
"-noverify never verify when reading password from terminal\n");
|
||||||
|
BIO_printf(bio_err, "-quiet no warnings\n");
|
||||||
|
BIO_printf(bio_err, "-table format output as table\n");
|
||||||
|
BIO_printf(bio_err, "-reverse switch table columns\n");
|
||||||
|
|
||||||
goto err;
|
goto err;
|
||||||
}
|
}
|
||||||
|
|
||||||
if ((infile != NULL) || in_stdin)
|
if ((infile != NULL) || in_stdin) {
|
||||||
{
|
in = BIO_new(BIO_s_file());
|
||||||
in = BIO_new(BIO_s_file());
|
if (in == NULL)
|
||||||
if (in == NULL)
|
goto err;
|
||||||
goto err;
|
if (infile != NULL) {
|
||||||
if (infile != NULL)
|
assert(in_stdin == 0);
|
||||||
{
|
if (BIO_read_filename(in, infile) <= 0)
|
||||||
assert(in_stdin == 0);
|
goto err;
|
||||||
if (BIO_read_filename(in, infile) <= 0)
|
} else {
|
||||||
goto err;
|
assert(in_stdin);
|
||||||
}
|
BIO_set_fp(in, stdin, BIO_NOCLOSE);
|
||||||
else
|
}
|
||||||
{
|
}
|
||||||
assert(in_stdin);
|
|
||||||
BIO_set_fp(in, stdin, BIO_NOCLOSE);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (usecrypt)
|
if (usecrypt)
|
||||||
pw_maxlen = 8;
|
pw_maxlen = 8;
|
||||||
else if (use1 || useapr1)
|
else if (use1 || useapr1)
|
||||||
pw_maxlen = 256; /* arbitrary limit, should be enough for most passwords */
|
pw_maxlen = 256; /* arbitrary limit, should be enough for most
|
||||||
|
* passwords */
|
||||||
|
|
||||||
if (passwds == NULL)
|
if (passwds == NULL) {
|
||||||
{
|
/* no passwords on the command line */
|
||||||
/* no passwords on the command line */
|
|
||||||
|
|
||||||
passwd_malloc_size = pw_maxlen + 2;
|
passwd_malloc_size = pw_maxlen + 2;
|
||||||
/* longer than necessary so that we can warn about truncation */
|
/*
|
||||||
passwd = passwd_malloc = OPENSSL_malloc(passwd_malloc_size);
|
* longer than necessary so that we can warn about truncation
|
||||||
if (passwd_malloc == NULL)
|
*/
|
||||||
goto err;
|
passwd = passwd_malloc = OPENSSL_malloc(passwd_malloc_size);
|
||||||
}
|
if (passwd_malloc == NULL)
|
||||||
|
goto err;
|
||||||
|
}
|
||||||
|
|
||||||
if ((in == NULL) && (passwds == NULL))
|
if ((in == NULL) && (passwds == NULL)) {
|
||||||
{
|
/* build a null-terminated list */
|
||||||
/* build a null-terminated list */
|
static char *passwds_static[2] = { NULL, NULL };
|
||||||
static char *passwds_static[2] = {NULL, NULL};
|
|
||||||
|
|
||||||
passwds = passwds_static;
|
passwds = passwds_static;
|
||||||
if (in == NULL)
|
if (in == NULL)
|
||||||
if (EVP_read_pw_string(passwd_malloc, passwd_malloc_size, "Password: ", !(passed_salt || in_noverify)) != 0)
|
if (EVP_read_pw_string
|
||||||
goto err;
|
(passwd_malloc, passwd_malloc_size, "Password: ",
|
||||||
passwds[0] = passwd_malloc;
|
!(passed_salt || in_noverify)) != 0)
|
||||||
}
|
goto err;
|
||||||
|
passwds[0] = passwd_malloc;
|
||||||
|
}
|
||||||
|
|
||||||
if (in == NULL)
|
if (in == NULL) {
|
||||||
{
|
assert(passwds != NULL);
|
||||||
assert(passwds != NULL);
|
assert(*passwds != NULL);
|
||||||
assert(*passwds != NULL);
|
|
||||||
|
|
||||||
do /* loop over list of passwords */
|
do { /* loop over list of passwords */
|
||||||
{
|
passwd = *passwds++;
|
||||||
passwd = *passwds++;
|
if (!do_passwd(passed_salt, &salt, &salt_malloc, passwd, out,
|
||||||
if (!do_passwd(passed_salt, &salt, &salt_malloc, passwd, out,
|
quiet, table, reverse, pw_maxlen, usecrypt, use1,
|
||||||
quiet, table, reverse, pw_maxlen, usecrypt, use1, useapr1))
|
useapr1))
|
||||||
goto err;
|
goto err;
|
||||||
}
|
}
|
||||||
while (*passwds != NULL);
|
while (*passwds != NULL);
|
||||||
}
|
} else
|
||||||
else
|
/* in != NULL */
|
||||||
/* in != NULL */
|
{
|
||||||
{
|
int done;
|
||||||
int done;
|
|
||||||
|
|
||||||
assert (passwd != NULL);
|
assert(passwd != NULL);
|
||||||
do
|
do {
|
||||||
{
|
int r = BIO_gets(in, passwd, pw_maxlen + 1);
|
||||||
int r = BIO_gets(in, passwd, pw_maxlen + 1);
|
if (r > 0) {
|
||||||
if (r > 0)
|
char *c = (strchr(passwd, '\n'));
|
||||||
{
|
if (c != NULL)
|
||||||
char *c = (strchr(passwd, '\n')) ;
|
*c = 0; /* truncate at newline */
|
||||||
if (c != NULL)
|
else {
|
||||||
*c = 0; /* truncate at newline */
|
/* ignore rest of line */
|
||||||
else
|
char trash[BUFSIZ];
|
||||||
{
|
do
|
||||||
/* ignore rest of line */
|
r = BIO_gets(in, trash, sizeof trash);
|
||||||
char trash[BUFSIZ];
|
while ((r > 0) && (!strchr(trash, '\n')));
|
||||||
do
|
}
|
||||||
r = BIO_gets(in, trash, sizeof trash);
|
|
||||||
while ((r > 0) && (!strchr(trash, '\n')));
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!do_passwd(passed_salt, &salt, &salt_malloc, passwd, out,
|
if (!do_passwd(passed_salt, &salt, &salt_malloc, passwd, out,
|
||||||
quiet, table, reverse, pw_maxlen, usecrypt, use1, useapr1))
|
quiet, table, reverse, pw_maxlen, usecrypt,
|
||||||
goto err;
|
use1, useapr1))
|
||||||
}
|
goto err;
|
||||||
done = (r <= 0);
|
}
|
||||||
}
|
done = (r <= 0);
|
||||||
while (!done);
|
}
|
||||||
}
|
while (!done);
|
||||||
ret = 0;
|
}
|
||||||
|
ret = 0;
|
||||||
|
|
||||||
err:
|
err:
|
||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
if (salt_malloc)
|
if (salt_malloc)
|
||||||
OPENSSL_free(salt_malloc);
|
OPENSSL_free(salt_malloc);
|
||||||
if (passwd_malloc)
|
if (passwd_malloc)
|
||||||
OPENSSL_free(passwd_malloc);
|
OPENSSL_free(passwd_malloc);
|
||||||
if (in)
|
if (in)
|
||||||
BIO_free(in);
|
BIO_free(in);
|
||||||
if (out)
|
if (out)
|
||||||
BIO_free_all(out);
|
BIO_free_all(out);
|
||||||
apps_shutdown();
|
apps_shutdown();
|
||||||
OPENSSL_EXIT(ret);
|
OPENSSL_EXIT(ret);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
# ifndef NO_MD5CRYPT_1
|
||||||
#ifndef NO_MD5CRYPT_1
|
/*
|
||||||
/* MD5-based password algorithm (should probably be available as a library
|
* MD5-based password algorithm (should probably be available as a library
|
||||||
* function; then the static buffer would not be acceptable).
|
* function; then the static buffer would not be acceptable). For magic
|
||||||
* For magic string "1", this should be compatible to the MD5-based BSD
|
* string "1", this should be compatible to the MD5-based BSD password
|
||||||
* password algorithm.
|
* algorithm. For 'magic' string "apr1", this is compatible to the MD5-based
|
||||||
* For 'magic' string "apr1", this is compatible to the MD5-based Apache
|
* Apache password algorithm. (Apparently, the Apache password algorithm is
|
||||||
* password algorithm.
|
* identical except that the 'magic' string was changed -- the laziest
|
||||||
* (Apparently, the Apache password algorithm is identical except that the
|
* application of the NIH principle I've ever encountered.)
|
||||||
* 'magic' string was changed -- the laziest application of the NIH principle
|
|
||||||
* I've ever encountered.)
|
|
||||||
*/
|
*/
|
||||||
static char *md5crypt(const char *passwd, const char *magic, const char *salt)
|
static char *md5crypt(const char *passwd, const char *magic, const char *salt)
|
||||||
{
|
{
|
||||||
static char out_buf[6 + 9 + 24 + 2]; /* "$apr1$..salt..$.......md5hash..........\0" */
|
/* "$apr1$..salt..$.......md5hash..........\0" */
|
||||||
unsigned char buf[MD5_DIGEST_LENGTH];
|
static char out_buf[6 + 9 + 24 + 2];
|
||||||
char *salt_out;
|
unsigned char buf[MD5_DIGEST_LENGTH];
|
||||||
int n, i;
|
char *salt_out;
|
||||||
EVP_MD_CTX md,md2;
|
int n;
|
||||||
size_t passwd_len, salt_len;
|
unsigned int i;
|
||||||
|
EVP_MD_CTX md, md2;
|
||||||
|
size_t passwd_len, salt_len;
|
||||||
|
|
||||||
passwd_len = strlen(passwd);
|
passwd_len = strlen(passwd);
|
||||||
out_buf[0] = '$';
|
out_buf[0] = '$';
|
||||||
out_buf[1] = 0;
|
out_buf[1] = 0;
|
||||||
assert(strlen(magic) <= 4); /* "1" or "apr1" */
|
assert(strlen(magic) <= 4); /* "1" or "apr1" */
|
||||||
strncat(out_buf, magic, 4);
|
strncat(out_buf, magic, 4);
|
||||||
strncat(out_buf, "$", 1);
|
strncat(out_buf, "$", 1);
|
||||||
strncat(out_buf, salt, 8);
|
strncat(out_buf, salt, 8);
|
||||||
assert(strlen(out_buf) <= 6 + 8); /* "$apr1$..salt.." */
|
assert(strlen(out_buf) <= 6 + 8); /* "$apr1$..salt.." */
|
||||||
salt_out = out_buf + 2 + strlen(magic);
|
salt_out = out_buf + 2 + strlen(magic);
|
||||||
salt_len = strlen(salt_out);
|
salt_len = strlen(salt_out);
|
||||||
assert(salt_len <= 8);
|
assert(salt_len <= 8);
|
||||||
|
|
||||||
EVP_MD_CTX_init(&md);
|
EVP_MD_CTX_init(&md);
|
||||||
EVP_DigestInit_ex(&md,EVP_md5(), NULL);
|
EVP_DigestInit_ex(&md, EVP_md5(), NULL);
|
||||||
EVP_DigestUpdate(&md, passwd, passwd_len);
|
EVP_DigestUpdate(&md, passwd, passwd_len);
|
||||||
EVP_DigestUpdate(&md, "$", 1);
|
EVP_DigestUpdate(&md, "$", 1);
|
||||||
EVP_DigestUpdate(&md, magic, strlen(magic));
|
EVP_DigestUpdate(&md, magic, strlen(magic));
|
||||||
EVP_DigestUpdate(&md, "$", 1);
|
EVP_DigestUpdate(&md, "$", 1);
|
||||||
EVP_DigestUpdate(&md, salt_out, salt_len);
|
EVP_DigestUpdate(&md, salt_out, salt_len);
|
||||||
|
|
||||||
EVP_MD_CTX_init(&md2);
|
EVP_MD_CTX_init(&md2);
|
||||||
EVP_DigestInit_ex(&md2,EVP_md5(), NULL);
|
EVP_DigestInit_ex(&md2, EVP_md5(), NULL);
|
||||||
EVP_DigestUpdate(&md2, passwd, passwd_len);
|
EVP_DigestUpdate(&md2, passwd, passwd_len);
|
||||||
EVP_DigestUpdate(&md2, salt_out, salt_len);
|
EVP_DigestUpdate(&md2, salt_out, salt_len);
|
||||||
EVP_DigestUpdate(&md2, passwd, passwd_len);
|
EVP_DigestUpdate(&md2, passwd, passwd_len);
|
||||||
EVP_DigestFinal_ex(&md2, buf, NULL);
|
EVP_DigestFinal_ex(&md2, buf, NULL);
|
||||||
|
|
||||||
for (i = passwd_len; i > sizeof buf; i -= sizeof buf)
|
for (i = passwd_len; i > sizeof buf; i -= sizeof buf)
|
||||||
EVP_DigestUpdate(&md, buf, sizeof buf);
|
EVP_DigestUpdate(&md, buf, sizeof buf);
|
||||||
EVP_DigestUpdate(&md, buf, i);
|
EVP_DigestUpdate(&md, buf, i);
|
||||||
|
|
||||||
n = passwd_len;
|
n = passwd_len;
|
||||||
while (n)
|
while (n) {
|
||||||
{
|
EVP_DigestUpdate(&md, (n & 1) ? "\0" : passwd, 1);
|
||||||
EVP_DigestUpdate(&md, (n & 1) ? "\0" : passwd, 1);
|
n >>= 1;
|
||||||
n >>= 1;
|
}
|
||||||
}
|
EVP_DigestFinal_ex(&md, buf, NULL);
|
||||||
EVP_DigestFinal_ex(&md, buf, NULL);
|
|
||||||
|
|
||||||
for (i = 0; i < 1000; i++)
|
for (i = 0; i < 1000; i++) {
|
||||||
{
|
EVP_DigestInit_ex(&md2, EVP_md5(), NULL);
|
||||||
EVP_DigestInit_ex(&md2,EVP_md5(), NULL);
|
EVP_DigestUpdate(&md2, (i & 1) ? (unsigned const char *)passwd : buf,
|
||||||
EVP_DigestUpdate(&md2, (i & 1) ? (unsigned char *) passwd : buf,
|
(i & 1) ? passwd_len : sizeof buf);
|
||||||
(i & 1) ? passwd_len : sizeof buf);
|
if (i % 3)
|
||||||
if (i % 3)
|
EVP_DigestUpdate(&md2, salt_out, salt_len);
|
||||||
EVP_DigestUpdate(&md2, salt_out, salt_len);
|
if (i % 7)
|
||||||
if (i % 7)
|
EVP_DigestUpdate(&md2, passwd, passwd_len);
|
||||||
EVP_DigestUpdate(&md2, passwd, passwd_len);
|
EVP_DigestUpdate(&md2, (i & 1) ? buf : (unsigned const char *)passwd,
|
||||||
EVP_DigestUpdate(&md2, (i & 1) ? buf : (unsigned char *) passwd,
|
(i & 1) ? sizeof buf : passwd_len);
|
||||||
(i & 1) ? sizeof buf : passwd_len);
|
EVP_DigestFinal_ex(&md2, buf, NULL);
|
||||||
EVP_DigestFinal_ex(&md2, buf, NULL);
|
}
|
||||||
}
|
EVP_MD_CTX_cleanup(&md2);
|
||||||
EVP_MD_CTX_cleanup(&md2);
|
|
||||||
|
|
||||||
{
|
{
|
||||||
/* transform buf into output string */
|
/* transform buf into output string */
|
||||||
|
|
||||||
unsigned char buf_perm[sizeof buf];
|
unsigned char buf_perm[sizeof buf];
|
||||||
int dest, source;
|
int dest, source;
|
||||||
char *output;
|
char *output;
|
||||||
|
|
||||||
/* silly output permutation */
|
/* silly output permutation */
|
||||||
for (dest = 0, source = 0; dest < 14; dest++, source = (source + 6) % 17)
|
for (dest = 0, source = 0; dest < 14;
|
||||||
buf_perm[dest] = buf[source];
|
dest++, source = (source + 6) % 17)
|
||||||
buf_perm[14] = buf[5];
|
buf_perm[dest] = buf[source];
|
||||||
buf_perm[15] = buf[11];
|
buf_perm[14] = buf[5];
|
||||||
#ifndef PEDANTIC /* Unfortunately, this generates a "no effect" warning */
|
buf_perm[15] = buf[11];
|
||||||
assert(16 == sizeof buf_perm);
|
# ifndef PEDANTIC /* Unfortunately, this generates a "no
|
||||||
#endif
|
* effect" warning */
|
||||||
|
assert(16 == sizeof buf_perm);
|
||||||
|
# endif
|
||||||
|
|
||||||
output = salt_out + salt_len;
|
output = salt_out + salt_len;
|
||||||
assert(output == out_buf + strlen(out_buf));
|
assert(output == out_buf + strlen(out_buf));
|
||||||
|
|
||||||
*output++ = '$';
|
*output++ = '$';
|
||||||
|
|
||||||
for (i = 0; i < 15; i += 3)
|
for (i = 0; i < 15; i += 3) {
|
||||||
{
|
*output++ = cov_2char[buf_perm[i + 2] & 0x3f];
|
||||||
*output++ = cov_2char[buf_perm[i+2] & 0x3f];
|
*output++ = cov_2char[((buf_perm[i + 1] & 0xf) << 2) |
|
||||||
*output++ = cov_2char[((buf_perm[i+1] & 0xf) << 2) |
|
(buf_perm[i + 2] >> 6)];
|
||||||
(buf_perm[i+2] >> 6)];
|
*output++ = cov_2char[((buf_perm[i] & 3) << 4) |
|
||||||
*output++ = cov_2char[((buf_perm[i] & 3) << 4) |
|
(buf_perm[i + 1] >> 4)];
|
||||||
(buf_perm[i+1] >> 4)];
|
*output++ = cov_2char[buf_perm[i] >> 2];
|
||||||
*output++ = cov_2char[buf_perm[i] >> 2];
|
}
|
||||||
}
|
assert(i == 15);
|
||||||
assert(i == 15);
|
*output++ = cov_2char[buf_perm[i] & 0x3f];
|
||||||
*output++ = cov_2char[buf_perm[i] & 0x3f];
|
*output++ = cov_2char[buf_perm[i] >> 6];
|
||||||
*output++ = cov_2char[buf_perm[i] >> 6];
|
*output = 0;
|
||||||
*output = 0;
|
assert(strlen(out_buf) < sizeof(out_buf));
|
||||||
assert(strlen(out_buf) < sizeof(out_buf));
|
}
|
||||||
}
|
EVP_MD_CTX_cleanup(&md);
|
||||||
EVP_MD_CTX_cleanup(&md);
|
|
||||||
|
|
||||||
return out_buf;
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
|
|
||||||
|
return out_buf;
|
||||||
|
}
|
||||||
|
# endif
|
||||||
|
|
||||||
static int do_passwd(int passed_salt, char **salt_p, char **salt_malloc_p,
|
static int do_passwd(int passed_salt, char **salt_p, char **salt_malloc_p,
|
||||||
char *passwd, BIO *out, int quiet, int table, int reverse,
|
char *passwd, BIO *out, int quiet, int table,
|
||||||
size_t pw_maxlen, int usecrypt, int use1, int useapr1)
|
int reverse, size_t pw_maxlen, int usecrypt, int use1,
|
||||||
{
|
int useapr1)
|
||||||
char *hash = NULL;
|
{
|
||||||
|
char *hash = NULL;
|
||||||
|
|
||||||
assert(salt_p != NULL);
|
assert(salt_p != NULL);
|
||||||
assert(salt_malloc_p != NULL);
|
assert(salt_malloc_p != NULL);
|
||||||
|
|
||||||
/* first make sure we have a salt */
|
/* first make sure we have a salt */
|
||||||
if (!passed_salt)
|
if (!passed_salt) {
|
||||||
{
|
# ifndef OPENSSL_NO_DES
|
||||||
#ifndef OPENSSL_NO_DES
|
if (usecrypt) {
|
||||||
if (usecrypt)
|
if (*salt_malloc_p == NULL) {
|
||||||
{
|
*salt_p = *salt_malloc_p = OPENSSL_malloc(3);
|
||||||
if (*salt_malloc_p == NULL)
|
if (*salt_malloc_p == NULL)
|
||||||
{
|
goto err;
|
||||||
*salt_p = *salt_malloc_p = OPENSSL_malloc(3);
|
}
|
||||||
if (*salt_malloc_p == NULL)
|
if (RAND_pseudo_bytes((unsigned char *)*salt_p, 2) < 0)
|
||||||
goto err;
|
goto err;
|
||||||
}
|
(*salt_p)[0] = cov_2char[(*salt_p)[0] & 0x3f]; /* 6 bits */
|
||||||
if (RAND_pseudo_bytes((unsigned char *)*salt_p, 2) < 0)
|
(*salt_p)[1] = cov_2char[(*salt_p)[1] & 0x3f]; /* 6 bits */
|
||||||
goto err;
|
(*salt_p)[2] = 0;
|
||||||
(*salt_p)[0] = cov_2char[(*salt_p)[0] & 0x3f]; /* 6 bits */
|
# ifdef CHARSET_EBCDIC
|
||||||
(*salt_p)[1] = cov_2char[(*salt_p)[1] & 0x3f]; /* 6 bits */
|
ascii2ebcdic(*salt_p, *salt_p, 2); /* des_crypt will convert back
|
||||||
(*salt_p)[2] = 0;
|
* to ASCII */
|
||||||
#ifdef CHARSET_EBCDIC
|
# endif
|
||||||
ascii2ebcdic(*salt_p, *salt_p, 2); /* des_crypt will convert
|
}
|
||||||
* back to ASCII */
|
# endif /* !OPENSSL_NO_DES */
|
||||||
#endif
|
|
||||||
}
|
|
||||||
#endif /* !OPENSSL_NO_DES */
|
|
||||||
|
|
||||||
#ifndef NO_MD5CRYPT_1
|
# ifndef NO_MD5CRYPT_1
|
||||||
if (use1 || useapr1)
|
if (use1 || useapr1) {
|
||||||
{
|
int i;
|
||||||
int i;
|
|
||||||
|
|
||||||
if (*salt_malloc_p == NULL)
|
if (*salt_malloc_p == NULL) {
|
||||||
{
|
*salt_p = *salt_malloc_p = OPENSSL_malloc(9);
|
||||||
*salt_p = *salt_malloc_p = OPENSSL_malloc(9);
|
if (*salt_malloc_p == NULL)
|
||||||
if (*salt_malloc_p == NULL)
|
goto err;
|
||||||
goto err;
|
}
|
||||||
}
|
if (RAND_pseudo_bytes((unsigned char *)*salt_p, 8) < 0)
|
||||||
if (RAND_pseudo_bytes((unsigned char *)*salt_p, 8) < 0)
|
goto err;
|
||||||
goto err;
|
|
||||||
|
|
||||||
for (i = 0; i < 8; i++)
|
for (i = 0; i < 8; i++)
|
||||||
(*salt_p)[i] = cov_2char[(*salt_p)[i] & 0x3f]; /* 6 bits */
|
(*salt_p)[i] = cov_2char[(*salt_p)[i] & 0x3f]; /* 6 bits */
|
||||||
(*salt_p)[8] = 0;
|
(*salt_p)[8] = 0;
|
||||||
}
|
}
|
||||||
#endif /* !NO_MD5CRYPT_1 */
|
# endif /* !NO_MD5CRYPT_1 */
|
||||||
}
|
}
|
||||||
|
|
||||||
assert(*salt_p != NULL);
|
assert(*salt_p != NULL);
|
||||||
|
|
||||||
/* truncate password if necessary */
|
/* truncate password if necessary */
|
||||||
if ((strlen(passwd) > pw_maxlen))
|
if ((strlen(passwd) > pw_maxlen)) {
|
||||||
{
|
if (!quiet)
|
||||||
if (!quiet)
|
/*
|
||||||
BIO_printf(bio_err, "Warning: truncating password to %u characters\n", pw_maxlen);
|
* XXX: really we should know how to print a size_t, not cast it
|
||||||
passwd[pw_maxlen] = 0;
|
*/
|
||||||
}
|
BIO_printf(bio_err,
|
||||||
assert(strlen(passwd) <= pw_maxlen);
|
"Warning: truncating password to %u characters\n",
|
||||||
|
(unsigned)pw_maxlen);
|
||||||
|
passwd[pw_maxlen] = 0;
|
||||||
|
}
|
||||||
|
assert(strlen(passwd) <= pw_maxlen);
|
||||||
|
|
||||||
/* now compute password hash */
|
/* now compute password hash */
|
||||||
#ifndef OPENSSL_NO_DES
|
# ifndef OPENSSL_NO_DES
|
||||||
if (usecrypt)
|
if (usecrypt)
|
||||||
hash = DES_crypt(passwd, *salt_p);
|
hash = DES_crypt(passwd, *salt_p);
|
||||||
#endif
|
# endif
|
||||||
#ifndef NO_MD5CRYPT_1
|
# ifndef NO_MD5CRYPT_1
|
||||||
if (use1 || useapr1)
|
if (use1 || useapr1)
|
||||||
hash = md5crypt(passwd, (use1 ? "1" : "apr1"), *salt_p);
|
hash = md5crypt(passwd, (use1 ? "1" : "apr1"), *salt_p);
|
||||||
#endif
|
# endif
|
||||||
assert(hash != NULL);
|
assert(hash != NULL);
|
||||||
|
|
||||||
if (table && !reverse)
|
if (table && !reverse)
|
||||||
BIO_printf(out, "%s\t%s\n", passwd, hash);
|
BIO_printf(out, "%s\t%s\n", passwd, hash);
|
||||||
else if (table && reverse)
|
else if (table && reverse)
|
||||||
BIO_printf(out, "%s\t%s\n", hash, passwd);
|
BIO_printf(out, "%s\t%s\n", hash, passwd);
|
||||||
else
|
else
|
||||||
BIO_printf(out, "%s\n", hash);
|
BIO_printf(out, "%s\n", hash);
|
||||||
return 1;
|
return 1;
|
||||||
|
|
||||||
err:
|
err:
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
#else
|
#else
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
fputs("Program not available.\n", stderr)
|
fputs("Program not available.\n", stderr)
|
||||||
OPENSSL_EXIT(1);
|
OPENSSL_EXIT(1);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
1513
apps/pkcs12.c
1513
apps/pkcs12.c
File diff suppressed because it is too large
Load Diff
431
apps/pkcs7.c
431
apps/pkcs7.c
@@ -69,237 +69,240 @@
|
|||||||
#include <openssl/pem.h>
|
#include <openssl/pem.h>
|
||||||
|
|
||||||
#undef PROG
|
#undef PROG
|
||||||
#define PROG pkcs7_main
|
#define PROG pkcs7_main
|
||||||
|
|
||||||
/* -inform arg - input format - default PEM (DER or PEM)
|
/*-
|
||||||
|
* -inform arg - input format - default PEM (DER or PEM)
|
||||||
* -outform arg - output format - default PEM
|
* -outform arg - output format - default PEM
|
||||||
* -in arg - input file - default stdin
|
* -in arg - input file - default stdin
|
||||||
* -out arg - output file - default stdout
|
* -out arg - output file - default stdout
|
||||||
* -print_certs
|
* -print_certs
|
||||||
*/
|
*/
|
||||||
|
|
||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
ENGINE *e = NULL;
|
PKCS7 *p7 = NULL;
|
||||||
PKCS7 *p7=NULL;
|
int i, badops = 0;
|
||||||
int i,badops=0;
|
BIO *in = NULL, *out = NULL;
|
||||||
BIO *in=NULL,*out=NULL;
|
int informat, outformat;
|
||||||
int informat,outformat;
|
char *infile, *outfile, *prog;
|
||||||
char *infile,*outfile,*prog;
|
int print_certs = 0, text = 0, noout = 0, p7_print = 0;
|
||||||
int print_certs=0,text=0,noout=0;
|
int ret = 1;
|
||||||
int ret=1;
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
char *engine=NULL;
|
char *engine = NULL;
|
||||||
|
|
||||||
apps_startup();
|
|
||||||
|
|
||||||
if (bio_err == NULL)
|
|
||||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
|
||||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
|
||||||
|
|
||||||
infile=NULL;
|
|
||||||
outfile=NULL;
|
|
||||||
informat=FORMAT_PEM;
|
|
||||||
outformat=FORMAT_PEM;
|
|
||||||
|
|
||||||
prog=argv[0];
|
|
||||||
argc--;
|
|
||||||
argv++;
|
|
||||||
while (argc >= 1)
|
|
||||||
{
|
|
||||||
if (strcmp(*argv,"-inform") == 0)
|
|
||||||
{
|
|
||||||
if (--argc < 1) goto bad;
|
|
||||||
informat=str2fmt(*(++argv));
|
|
||||||
}
|
|
||||||
else if (strcmp(*argv,"-outform") == 0)
|
|
||||||
{
|
|
||||||
if (--argc < 1) goto bad;
|
|
||||||
outformat=str2fmt(*(++argv));
|
|
||||||
}
|
|
||||||
else if (strcmp(*argv,"-in") == 0)
|
|
||||||
{
|
|
||||||
if (--argc < 1) goto bad;
|
|
||||||
infile= *(++argv);
|
|
||||||
}
|
|
||||||
else if (strcmp(*argv,"-out") == 0)
|
|
||||||
{
|
|
||||||
if (--argc < 1) goto bad;
|
|
||||||
outfile= *(++argv);
|
|
||||||
}
|
|
||||||
else if (strcmp(*argv,"-noout") == 0)
|
|
||||||
noout=1;
|
|
||||||
else if (strcmp(*argv,"-text") == 0)
|
|
||||||
text=1;
|
|
||||||
else if (strcmp(*argv,"-print_certs") == 0)
|
|
||||||
print_certs=1;
|
|
||||||
else if (strcmp(*argv,"-engine") == 0)
|
|
||||||
{
|
|
||||||
if (--argc < 1) goto bad;
|
|
||||||
engine= *(++argv);
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"unknown option %s\n",*argv);
|
|
||||||
badops=1;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
argc--;
|
|
||||||
argv++;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (badops)
|
|
||||||
{
|
|
||||||
bad:
|
|
||||||
BIO_printf(bio_err,"%s [options] <infile >outfile\n",prog);
|
|
||||||
BIO_printf(bio_err,"where options are\n");
|
|
||||||
BIO_printf(bio_err," -inform arg input format - DER or PEM\n");
|
|
||||||
BIO_printf(bio_err," -outform arg output format - DER or PEM\n");
|
|
||||||
BIO_printf(bio_err," -in arg input file\n");
|
|
||||||
BIO_printf(bio_err," -out arg output file\n");
|
|
||||||
BIO_printf(bio_err," -print_certs print any certs or crl in the input\n");
|
|
||||||
BIO_printf(bio_err," -text print full details of certificates\n");
|
|
||||||
BIO_printf(bio_err," -noout don't output encoded data\n");
|
|
||||||
BIO_printf(bio_err," -engine e use engine e, possibly a hardware device.\n");
|
|
||||||
ret = 1;
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
ERR_load_crypto_strings();
|
|
||||||
|
|
||||||
e = setup_engine(bio_err, engine, 0);
|
|
||||||
|
|
||||||
in=BIO_new(BIO_s_file());
|
|
||||||
out=BIO_new(BIO_s_file());
|
|
||||||
if ((in == NULL) || (out == NULL))
|
|
||||||
{
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (infile == NULL)
|
|
||||||
BIO_set_fp(in,stdin,BIO_NOCLOSE);
|
|
||||||
else
|
|
||||||
{
|
|
||||||
if (BIO_read_filename(in,infile) <= 0)
|
|
||||||
if (in == NULL)
|
|
||||||
{
|
|
||||||
perror(infile);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (informat == FORMAT_ASN1)
|
|
||||||
p7=d2i_PKCS7_bio(in,NULL);
|
|
||||||
else if (informat == FORMAT_PEM)
|
|
||||||
p7=PEM_read_bio_PKCS7(in,NULL,NULL,NULL);
|
|
||||||
else
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"bad input format specified for pkcs7 object\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
if (p7 == NULL)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"unable to load PKCS7 object\n");
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (outfile == NULL)
|
|
||||||
{
|
|
||||||
BIO_set_fp(out,stdout,BIO_NOCLOSE);
|
|
||||||
#ifdef OPENSSL_SYS_VMS
|
|
||||||
{
|
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
|
||||||
out = BIO_push(tmpbio, out);
|
|
||||||
}
|
|
||||||
#endif
|
#endif
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
if (BIO_write_filename(out,outfile) <= 0)
|
|
||||||
{
|
|
||||||
perror(outfile);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (print_certs)
|
apps_startup();
|
||||||
{
|
|
||||||
STACK_OF(X509) *certs=NULL;
|
|
||||||
STACK_OF(X509_CRL) *crls=NULL;
|
|
||||||
|
|
||||||
i=OBJ_obj2nid(p7->type);
|
if (bio_err == NULL)
|
||||||
switch (i)
|
if ((bio_err = BIO_new(BIO_s_file())) != NULL)
|
||||||
{
|
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||||
case NID_pkcs7_signed:
|
|
||||||
certs=p7->d.sign->cert;
|
|
||||||
crls=p7->d.sign->crl;
|
|
||||||
break;
|
|
||||||
case NID_pkcs7_signedAndEnveloped:
|
|
||||||
certs=p7->d.signed_and_enveloped->cert;
|
|
||||||
crls=p7->d.signed_and_enveloped->crl;
|
|
||||||
break;
|
|
||||||
default:
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (certs != NULL)
|
if (!load_config(bio_err, NULL))
|
||||||
{
|
goto end;
|
||||||
X509 *x;
|
|
||||||
|
|
||||||
for (i=0; i<sk_X509_num(certs); i++)
|
infile = NULL;
|
||||||
{
|
outfile = NULL;
|
||||||
x=sk_X509_value(certs,i);
|
informat = FORMAT_PEM;
|
||||||
if(text) X509_print(out, x);
|
outformat = FORMAT_PEM;
|
||||||
else dump_cert_text(out, x);
|
|
||||||
|
|
||||||
if(!noout) PEM_write_bio_X509(out,x);
|
prog = argv[0];
|
||||||
BIO_puts(out,"\n");
|
argc--;
|
||||||
}
|
argv++;
|
||||||
}
|
while (argc >= 1) {
|
||||||
if (crls != NULL)
|
if (strcmp(*argv, "-inform") == 0) {
|
||||||
{
|
if (--argc < 1)
|
||||||
X509_CRL *crl;
|
goto bad;
|
||||||
|
informat = str2fmt(*(++argv));
|
||||||
|
} else if (strcmp(*argv, "-outform") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
goto bad;
|
||||||
|
outformat = str2fmt(*(++argv));
|
||||||
|
} else if (strcmp(*argv, "-in") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
goto bad;
|
||||||
|
infile = *(++argv);
|
||||||
|
} else if (strcmp(*argv, "-out") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
goto bad;
|
||||||
|
outfile = *(++argv);
|
||||||
|
} else if (strcmp(*argv, "-noout") == 0)
|
||||||
|
noout = 1;
|
||||||
|
else if (strcmp(*argv, "-text") == 0)
|
||||||
|
text = 1;
|
||||||
|
else if (strcmp(*argv, "-print") == 0)
|
||||||
|
p7_print = 1;
|
||||||
|
else if (strcmp(*argv, "-print_certs") == 0)
|
||||||
|
print_certs = 1;
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
else if (strcmp(*argv, "-engine") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
goto bad;
|
||||||
|
engine = *(++argv);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
else {
|
||||||
|
BIO_printf(bio_err, "unknown option %s\n", *argv);
|
||||||
|
badops = 1;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
argc--;
|
||||||
|
argv++;
|
||||||
|
}
|
||||||
|
|
||||||
for (i=0; i<sk_X509_CRL_num(crls); i++)
|
if (badops) {
|
||||||
{
|
bad:
|
||||||
crl=sk_X509_CRL_value(crls,i);
|
BIO_printf(bio_err, "%s [options] <infile >outfile\n", prog);
|
||||||
|
BIO_printf(bio_err, "where options are\n");
|
||||||
|
BIO_printf(bio_err, " -inform arg input format - DER or PEM\n");
|
||||||
|
BIO_printf(bio_err, " -outform arg output format - DER or PEM\n");
|
||||||
|
BIO_printf(bio_err, " -in arg input file\n");
|
||||||
|
BIO_printf(bio_err, " -out arg output file\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" -print_certs print any certs or crl in the input\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" -text print full details of certificates\n");
|
||||||
|
BIO_printf(bio_err, " -noout don't output encoded data\n");
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" -engine e use engine e, possibly a hardware device.\n");
|
||||||
|
#endif
|
||||||
|
ret = 1;
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
X509_CRL_print(out, crl);
|
ERR_load_crypto_strings();
|
||||||
|
|
||||||
if(!noout)PEM_write_bio_X509_CRL(out,crl);
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
BIO_puts(out,"\n");
|
setup_engine(bio_err, engine, 0);
|
||||||
}
|
#endif
|
||||||
}
|
|
||||||
|
|
||||||
ret=0;
|
in = BIO_new(BIO_s_file());
|
||||||
goto end;
|
out = BIO_new(BIO_s_file());
|
||||||
}
|
if ((in == NULL) || (out == NULL)) {
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
if(!noout) {
|
if (infile == NULL)
|
||||||
if (outformat == FORMAT_ASN1)
|
BIO_set_fp(in, stdin, BIO_NOCLOSE);
|
||||||
i=i2d_PKCS7_bio(out,p7);
|
else {
|
||||||
else if (outformat == FORMAT_PEM)
|
if (BIO_read_filename(in, infile) <= 0) {
|
||||||
i=PEM_write_bio_PKCS7(out,p7);
|
BIO_printf(bio_err, "unable to load input file\n");
|
||||||
else {
|
ERR_print_errors(bio_err);
|
||||||
BIO_printf(bio_err,"bad output format specified for outfile\n");
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if (!i)
|
if (informat == FORMAT_ASN1)
|
||||||
{
|
p7 = d2i_PKCS7_bio(in, NULL);
|
||||||
BIO_printf(bio_err,"unable to write pkcs7 object\n");
|
else if (informat == FORMAT_PEM)
|
||||||
ERR_print_errors(bio_err);
|
p7 = PEM_read_bio_PKCS7(in, NULL, NULL, NULL);
|
||||||
goto end;
|
else {
|
||||||
}
|
BIO_printf(bio_err, "bad input format specified for pkcs7 object\n");
|
||||||
}
|
goto end;
|
||||||
ret=0;
|
}
|
||||||
end:
|
if (p7 == NULL) {
|
||||||
if (p7 != NULL) PKCS7_free(p7);
|
BIO_printf(bio_err, "unable to load PKCS7 object\n");
|
||||||
if (in != NULL) BIO_free(in);
|
ERR_print_errors(bio_err);
|
||||||
if (out != NULL) BIO_free_all(out);
|
goto end;
|
||||||
apps_shutdown();
|
}
|
||||||
OPENSSL_EXIT(ret);
|
|
||||||
}
|
if (outfile == NULL) {
|
||||||
|
BIO_set_fp(out, stdout, BIO_NOCLOSE);
|
||||||
|
#ifdef OPENSSL_SYS_VMS
|
||||||
|
{
|
||||||
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
|
out = BIO_push(tmpbio, out);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
} else {
|
||||||
|
if (BIO_write_filename(out, outfile) <= 0) {
|
||||||
|
perror(outfile);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (p7_print)
|
||||||
|
PKCS7_print_ctx(out, p7, 0, NULL);
|
||||||
|
|
||||||
|
if (print_certs) {
|
||||||
|
STACK_OF(X509) *certs = NULL;
|
||||||
|
STACK_OF(X509_CRL) *crls = NULL;
|
||||||
|
|
||||||
|
i = OBJ_obj2nid(p7->type);
|
||||||
|
switch (i) {
|
||||||
|
case NID_pkcs7_signed:
|
||||||
|
certs = p7->d.sign->cert;
|
||||||
|
crls = p7->d.sign->crl;
|
||||||
|
break;
|
||||||
|
case NID_pkcs7_signedAndEnveloped:
|
||||||
|
certs = p7->d.signed_and_enveloped->cert;
|
||||||
|
crls = p7->d.signed_and_enveloped->crl;
|
||||||
|
break;
|
||||||
|
default:
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (certs != NULL) {
|
||||||
|
X509 *x;
|
||||||
|
|
||||||
|
for (i = 0; i < sk_X509_num(certs); i++) {
|
||||||
|
x = sk_X509_value(certs, i);
|
||||||
|
if (text)
|
||||||
|
X509_print(out, x);
|
||||||
|
else
|
||||||
|
dump_cert_text(out, x);
|
||||||
|
|
||||||
|
if (!noout)
|
||||||
|
PEM_write_bio_X509(out, x);
|
||||||
|
BIO_puts(out, "\n");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (crls != NULL) {
|
||||||
|
X509_CRL *crl;
|
||||||
|
|
||||||
|
for (i = 0; i < sk_X509_CRL_num(crls); i++) {
|
||||||
|
crl = sk_X509_CRL_value(crls, i);
|
||||||
|
|
||||||
|
X509_CRL_print(out, crl);
|
||||||
|
|
||||||
|
if (!noout)
|
||||||
|
PEM_write_bio_X509_CRL(out, crl);
|
||||||
|
BIO_puts(out, "\n");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
ret = 0;
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!noout) {
|
||||||
|
if (outformat == FORMAT_ASN1)
|
||||||
|
i = i2d_PKCS7_bio(out, p7);
|
||||||
|
else if (outformat == FORMAT_PEM)
|
||||||
|
i = PEM_write_bio_PKCS7(out, p7);
|
||||||
|
else {
|
||||||
|
BIO_printf(bio_err, "bad output format specified for outfile\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!i) {
|
||||||
|
BIO_printf(bio_err, "unable to write pkcs7 object\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
ret = 0;
|
||||||
|
end:
|
||||||
|
if (p7 != NULL)
|
||||||
|
PKCS7_free(p7);
|
||||||
|
if (in != NULL)
|
||||||
|
BIO_free(in);
|
||||||
|
if (out != NULL)
|
||||||
|
BIO_free_all(out);
|
||||||
|
apps_shutdown();
|
||||||
|
OPENSSL_EXIT(ret);
|
||||||
|
}
|
||||||
|
|||||||
590
apps/pkcs8.c
590
apps/pkcs8.c
@@ -1,6 +1,7 @@
|
|||||||
/* pkcs8.c */
|
/* pkcs8.c */
|
||||||
/* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
|
/*
|
||||||
* project 1999.
|
* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL project
|
||||||
|
* 1999-2004.
|
||||||
*/
|
*/
|
||||||
/* ====================================================================
|
/* ====================================================================
|
||||||
* Copyright (c) 1999 The OpenSSL Project. All rights reserved.
|
* Copyright (c) 1999 The OpenSSL Project. All rights reserved.
|
||||||
@@ -69,294 +70,323 @@ int MAIN(int, char **);
|
|||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
ENGINE *e = NULL;
|
ENGINE *e = NULL;
|
||||||
char **args, *infile = NULL, *outfile = NULL;
|
char **args, *infile = NULL, *outfile = NULL;
|
||||||
char *passargin = NULL, *passargout = NULL;
|
char *passargin = NULL, *passargout = NULL;
|
||||||
BIO *in = NULL, *out = NULL;
|
BIO *in = NULL, *out = NULL;
|
||||||
int topk8 = 0;
|
int topk8 = 0;
|
||||||
int pbe_nid = -1;
|
int pbe_nid = -1;
|
||||||
const EVP_CIPHER *cipher = NULL;
|
const EVP_CIPHER *cipher = NULL;
|
||||||
int iter = PKCS12_DEFAULT_ITER;
|
int iter = PKCS12_DEFAULT_ITER;
|
||||||
int informat, outformat;
|
int informat, outformat;
|
||||||
int p8_broken = PKCS8_OK;
|
int p8_broken = PKCS8_OK;
|
||||||
int nocrypt = 0;
|
int nocrypt = 0;
|
||||||
X509_SIG *p8;
|
X509_SIG *p8 = NULL;
|
||||||
PKCS8_PRIV_KEY_INFO *p8inf;
|
PKCS8_PRIV_KEY_INFO *p8inf = NULL;
|
||||||
EVP_PKEY *pkey=NULL;
|
EVP_PKEY *pkey = NULL;
|
||||||
char pass[50], *passin = NULL, *passout = NULL, *p8pass = NULL;
|
char pass[50], *passin = NULL, *passout = NULL, *p8pass = NULL;
|
||||||
int badarg = 0;
|
int badarg = 0;
|
||||||
char *engine=NULL;
|
int ret = 1;
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
if (bio_err == NULL) bio_err = BIO_new_fp (stderr, BIO_NOCLOSE);
|
char *engine = NULL;
|
||||||
|
|
||||||
if (!load_config(bio_err, NULL))
|
|
||||||
goto end;
|
|
||||||
|
|
||||||
informat=FORMAT_PEM;
|
|
||||||
outformat=FORMAT_PEM;
|
|
||||||
|
|
||||||
ERR_load_crypto_strings();
|
|
||||||
OpenSSL_add_all_algorithms();
|
|
||||||
args = argv + 1;
|
|
||||||
while (!badarg && *args && *args[0] == '-') {
|
|
||||||
if (!strcmp(*args,"-v2")) {
|
|
||||||
if (args[1]) {
|
|
||||||
args++;
|
|
||||||
cipher=EVP_get_cipherbyname(*args);
|
|
||||||
if(!cipher) {
|
|
||||||
BIO_printf(bio_err,
|
|
||||||
"Unknown cipher %s\n", *args);
|
|
||||||
badarg = 1;
|
|
||||||
}
|
|
||||||
} else badarg = 1;
|
|
||||||
} else if (!strcmp(*args,"-v1")) {
|
|
||||||
if (args[1]) {
|
|
||||||
args++;
|
|
||||||
pbe_nid=OBJ_txt2nid(*args);
|
|
||||||
if(pbe_nid == NID_undef) {
|
|
||||||
BIO_printf(bio_err,
|
|
||||||
"Unknown PBE algorithm %s\n", *args);
|
|
||||||
badarg = 1;
|
|
||||||
}
|
|
||||||
} else badarg = 1;
|
|
||||||
} else if (!strcmp(*args,"-inform")) {
|
|
||||||
if (args[1]) {
|
|
||||||
args++;
|
|
||||||
informat=str2fmt(*args);
|
|
||||||
} else badarg = 1;
|
|
||||||
} else if (!strcmp(*args,"-outform")) {
|
|
||||||
if (args[1]) {
|
|
||||||
args++;
|
|
||||||
outformat=str2fmt(*args);
|
|
||||||
} else badarg = 1;
|
|
||||||
} else if (!strcmp (*args, "-topk8")) topk8 = 1;
|
|
||||||
else if (!strcmp (*args, "-noiter")) iter = 1;
|
|
||||||
else if (!strcmp (*args, "-nocrypt")) nocrypt = 1;
|
|
||||||
else if (!strcmp (*args, "-nooct")) p8_broken = PKCS8_NO_OCTET;
|
|
||||||
else if (!strcmp (*args, "-nsdb")) p8_broken = PKCS8_NS_DB;
|
|
||||||
else if (!strcmp (*args, "-embed")) p8_broken = PKCS8_EMBEDDED_PARAM;
|
|
||||||
else if (!strcmp(*args,"-passin"))
|
|
||||||
{
|
|
||||||
if (!args[1]) goto bad;
|
|
||||||
passargin= *(++args);
|
|
||||||
}
|
|
||||||
else if (!strcmp(*args,"-passout"))
|
|
||||||
{
|
|
||||||
if (!args[1]) goto bad;
|
|
||||||
passargout= *(++args);
|
|
||||||
}
|
|
||||||
else if (strcmp(*args,"-engine") == 0)
|
|
||||||
{
|
|
||||||
if (!args[1]) goto bad;
|
|
||||||
engine= *(++args);
|
|
||||||
}
|
|
||||||
else if (!strcmp (*args, "-in")) {
|
|
||||||
if (args[1]) {
|
|
||||||
args++;
|
|
||||||
infile = *args;
|
|
||||||
} else badarg = 1;
|
|
||||||
} else if (!strcmp (*args, "-out")) {
|
|
||||||
if (args[1]) {
|
|
||||||
args++;
|
|
||||||
outfile = *args;
|
|
||||||
} else badarg = 1;
|
|
||||||
} else badarg = 1;
|
|
||||||
args++;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (badarg) {
|
|
||||||
bad:
|
|
||||||
BIO_printf(bio_err, "Usage pkcs8 [options]\n");
|
|
||||||
BIO_printf(bio_err, "where options are\n");
|
|
||||||
BIO_printf(bio_err, "-in file input file\n");
|
|
||||||
BIO_printf(bio_err, "-inform X input format (DER or PEM)\n");
|
|
||||||
BIO_printf(bio_err, "-passin arg input file pass phrase source\n");
|
|
||||||
BIO_printf(bio_err, "-outform X output format (DER or PEM)\n");
|
|
||||||
BIO_printf(bio_err, "-out file output file\n");
|
|
||||||
BIO_printf(bio_err, "-passout arg output file pass phrase source\n");
|
|
||||||
BIO_printf(bio_err, "-topk8 output PKCS8 file\n");
|
|
||||||
BIO_printf(bio_err, "-nooct use (nonstandard) no octet format\n");
|
|
||||||
BIO_printf(bio_err, "-embed use (nonstandard) embedded DSA parameters format\n");
|
|
||||||
BIO_printf(bio_err, "-nsdb use (nonstandard) DSA Netscape DB format\n");
|
|
||||||
BIO_printf(bio_err, "-noiter use 1 as iteration count\n");
|
|
||||||
BIO_printf(bio_err, "-nocrypt use or expect unencrypted private key\n");
|
|
||||||
BIO_printf(bio_err, "-v2 alg use PKCS#5 v2.0 and cipher \"alg\"\n");
|
|
||||||
BIO_printf(bio_err, "-v1 obj use PKCS#5 v1.5 and cipher \"alg\"\n");
|
|
||||||
BIO_printf(bio_err," -engine e use engine e, possibly a hardware device.\n");
|
|
||||||
return (1);
|
|
||||||
}
|
|
||||||
|
|
||||||
e = setup_engine(bio_err, engine, 0);
|
|
||||||
|
|
||||||
if(!app_passwd(bio_err, passargin, passargout, &passin, &passout)) {
|
|
||||||
BIO_printf(bio_err, "Error getting passwords\n");
|
|
||||||
return (1);
|
|
||||||
}
|
|
||||||
|
|
||||||
if ((pbe_nid == -1) && !cipher) pbe_nid = NID_pbeWithMD5AndDES_CBC;
|
|
||||||
|
|
||||||
if (infile) {
|
|
||||||
if (!(in = BIO_new_file(infile, "rb"))) {
|
|
||||||
BIO_printf(bio_err,
|
|
||||||
"Can't open input file %s\n", infile);
|
|
||||||
return (1);
|
|
||||||
}
|
|
||||||
} else in = BIO_new_fp (stdin, BIO_NOCLOSE);
|
|
||||||
|
|
||||||
if (outfile) {
|
|
||||||
if (!(out = BIO_new_file (outfile, "wb"))) {
|
|
||||||
BIO_printf(bio_err,
|
|
||||||
"Can't open output file %s\n", outfile);
|
|
||||||
return (1);
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
out = BIO_new_fp (stdout, BIO_NOCLOSE);
|
|
||||||
#ifdef OPENSSL_SYS_VMS
|
|
||||||
{
|
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
|
||||||
out = BIO_push(tmpbio, out);
|
|
||||||
}
|
|
||||||
#endif
|
#endif
|
||||||
}
|
|
||||||
if (topk8)
|
|
||||||
{
|
|
||||||
BIO_free(in); /* Not needed in this section */
|
|
||||||
pkey = load_key(bio_err, infile, informat, 1,
|
|
||||||
passin, e, "key");
|
|
||||||
if (!pkey) {
|
|
||||||
return (1);
|
|
||||||
}
|
|
||||||
if (!(p8inf = EVP_PKEY2PKCS8_broken(pkey, p8_broken))) {
|
|
||||||
BIO_printf(bio_err, "Error converting key\n", outfile);
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
return (1);
|
|
||||||
}
|
|
||||||
if(nocrypt) {
|
|
||||||
if(outformat == FORMAT_PEM)
|
|
||||||
PEM_write_bio_PKCS8_PRIV_KEY_INFO(out, p8inf);
|
|
||||||
else if(outformat == FORMAT_ASN1)
|
|
||||||
i2d_PKCS8_PRIV_KEY_INFO_bio(out, p8inf);
|
|
||||||
else {
|
|
||||||
BIO_printf(bio_err, "Bad format specified for key\n");
|
|
||||||
return (1);
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
if(passout) p8pass = passout;
|
|
||||||
else {
|
|
||||||
p8pass = pass;
|
|
||||||
if (EVP_read_pw_string(pass, sizeof pass, "Enter Encryption Password:", 1))
|
|
||||||
return (1);
|
|
||||||
}
|
|
||||||
app_RAND_load_file(NULL, bio_err, 0);
|
|
||||||
if (!(p8 = PKCS8_encrypt(pbe_nid, cipher,
|
|
||||||
p8pass, strlen(p8pass),
|
|
||||||
NULL, 0, iter, p8inf))) {
|
|
||||||
BIO_printf(bio_err, "Error encrypting key\n",
|
|
||||||
outfile);
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
return (1);
|
|
||||||
}
|
|
||||||
app_RAND_write_file(NULL, bio_err);
|
|
||||||
if(outformat == FORMAT_PEM)
|
|
||||||
PEM_write_bio_PKCS8(out, p8);
|
|
||||||
else if(outformat == FORMAT_ASN1)
|
|
||||||
i2d_PKCS8_bio(out, p8);
|
|
||||||
else {
|
|
||||||
BIO_printf(bio_err, "Bad format specified for key\n");
|
|
||||||
return (1);
|
|
||||||
}
|
|
||||||
X509_SIG_free(p8);
|
|
||||||
}
|
|
||||||
PKCS8_PRIV_KEY_INFO_free (p8inf);
|
|
||||||
EVP_PKEY_free(pkey);
|
|
||||||
BIO_free_all(out);
|
|
||||||
if(passin) OPENSSL_free(passin);
|
|
||||||
if(passout) OPENSSL_free(passout);
|
|
||||||
return (0);
|
|
||||||
}
|
|
||||||
|
|
||||||
if(nocrypt) {
|
if (bio_err == NULL)
|
||||||
if(informat == FORMAT_PEM)
|
bio_err = BIO_new_fp(stderr, BIO_NOCLOSE);
|
||||||
p8inf = PEM_read_bio_PKCS8_PRIV_KEY_INFO(in,NULL,NULL, NULL);
|
|
||||||
else if(informat == FORMAT_ASN1)
|
|
||||||
p8inf = d2i_PKCS8_PRIV_KEY_INFO_bio(in, NULL);
|
|
||||||
else {
|
|
||||||
BIO_printf(bio_err, "Bad format specified for key\n");
|
|
||||||
return (1);
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
if(informat == FORMAT_PEM)
|
|
||||||
p8 = PEM_read_bio_PKCS8(in, NULL, NULL, NULL);
|
|
||||||
else if(informat == FORMAT_ASN1)
|
|
||||||
p8 = d2i_PKCS8_bio(in, NULL);
|
|
||||||
else {
|
|
||||||
BIO_printf(bio_err, "Bad format specified for key\n");
|
|
||||||
return (1);
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!p8) {
|
if (!load_config(bio_err, NULL))
|
||||||
BIO_printf (bio_err, "Error reading key\n", outfile);
|
goto end;
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
return (1);
|
|
||||||
}
|
|
||||||
if(passin) p8pass = passin;
|
|
||||||
else {
|
|
||||||
p8pass = pass;
|
|
||||||
EVP_read_pw_string(pass, sizeof pass, "Enter Password:", 0);
|
|
||||||
}
|
|
||||||
p8inf = PKCS8_decrypt(p8, p8pass, strlen(p8pass));
|
|
||||||
X509_SIG_free(p8);
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!p8inf) {
|
informat = FORMAT_PEM;
|
||||||
BIO_printf(bio_err, "Error decrypting key\n", outfile);
|
outformat = FORMAT_PEM;
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
return (1);
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!(pkey = EVP_PKCS82PKEY(p8inf))) {
|
ERR_load_crypto_strings();
|
||||||
BIO_printf(bio_err, "Error converting key\n", outfile);
|
OpenSSL_add_all_algorithms();
|
||||||
ERR_print_errors(bio_err);
|
args = argv + 1;
|
||||||
return (1);
|
while (!badarg && *args && *args[0] == '-') {
|
||||||
}
|
if (!strcmp(*args, "-v2")) {
|
||||||
|
if (args[1]) {
|
||||||
|
args++;
|
||||||
|
cipher = EVP_get_cipherbyname(*args);
|
||||||
|
if (!cipher) {
|
||||||
|
BIO_printf(bio_err, "Unknown cipher %s\n", *args);
|
||||||
|
badarg = 1;
|
||||||
|
}
|
||||||
|
} else
|
||||||
|
badarg = 1;
|
||||||
|
} else if (!strcmp(*args, "-v1")) {
|
||||||
|
if (args[1]) {
|
||||||
|
args++;
|
||||||
|
pbe_nid = OBJ_txt2nid(*args);
|
||||||
|
if (pbe_nid == NID_undef) {
|
||||||
|
BIO_printf(bio_err, "Unknown PBE algorithm %s\n", *args);
|
||||||
|
badarg = 1;
|
||||||
|
}
|
||||||
|
} else
|
||||||
|
badarg = 1;
|
||||||
|
} else if (!strcmp(*args, "-inform")) {
|
||||||
|
if (args[1]) {
|
||||||
|
args++;
|
||||||
|
informat = str2fmt(*args);
|
||||||
|
} else
|
||||||
|
badarg = 1;
|
||||||
|
} else if (!strcmp(*args, "-outform")) {
|
||||||
|
if (args[1]) {
|
||||||
|
args++;
|
||||||
|
outformat = str2fmt(*args);
|
||||||
|
} else
|
||||||
|
badarg = 1;
|
||||||
|
} else if (!strcmp(*args, "-topk8"))
|
||||||
|
topk8 = 1;
|
||||||
|
else if (!strcmp(*args, "-noiter"))
|
||||||
|
iter = 1;
|
||||||
|
else if (!strcmp(*args, "-nocrypt"))
|
||||||
|
nocrypt = 1;
|
||||||
|
else if (!strcmp(*args, "-nooct"))
|
||||||
|
p8_broken = PKCS8_NO_OCTET;
|
||||||
|
else if (!strcmp(*args, "-nsdb"))
|
||||||
|
p8_broken = PKCS8_NS_DB;
|
||||||
|
else if (!strcmp(*args, "-embed"))
|
||||||
|
p8_broken = PKCS8_EMBEDDED_PARAM;
|
||||||
|
else if (!strcmp(*args, "-passin")) {
|
||||||
|
if (!args[1])
|
||||||
|
goto bad;
|
||||||
|
passargin = *(++args);
|
||||||
|
} else if (!strcmp(*args, "-passout")) {
|
||||||
|
if (!args[1])
|
||||||
|
goto bad;
|
||||||
|
passargout = *(++args);
|
||||||
|
}
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
else if (strcmp(*args, "-engine") == 0) {
|
||||||
|
if (!args[1])
|
||||||
|
goto bad;
|
||||||
|
engine = *(++args);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
else if (!strcmp(*args, "-in")) {
|
||||||
|
if (args[1]) {
|
||||||
|
args++;
|
||||||
|
infile = *args;
|
||||||
|
} else
|
||||||
|
badarg = 1;
|
||||||
|
} else if (!strcmp(*args, "-out")) {
|
||||||
|
if (args[1]) {
|
||||||
|
args++;
|
||||||
|
outfile = *args;
|
||||||
|
} else
|
||||||
|
badarg = 1;
|
||||||
|
} else
|
||||||
|
badarg = 1;
|
||||||
|
args++;
|
||||||
|
}
|
||||||
|
|
||||||
if (p8inf->broken) {
|
if (badarg) {
|
||||||
BIO_printf(bio_err, "Warning: broken key encoding: ");
|
bad:
|
||||||
switch (p8inf->broken) {
|
BIO_printf(bio_err, "Usage pkcs8 [options]\n");
|
||||||
case PKCS8_NO_OCTET:
|
BIO_printf(bio_err, "where options are\n");
|
||||||
BIO_printf(bio_err, "No Octet String in PrivateKey\n");
|
BIO_printf(bio_err, "-in file input file\n");
|
||||||
break;
|
BIO_printf(bio_err, "-inform X input format (DER or PEM)\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"-passin arg input file pass phrase source\n");
|
||||||
|
BIO_printf(bio_err, "-outform X output format (DER or PEM)\n");
|
||||||
|
BIO_printf(bio_err, "-out file output file\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"-passout arg output file pass phrase source\n");
|
||||||
|
BIO_printf(bio_err, "-topk8 output PKCS8 file\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"-nooct use (nonstandard) no octet format\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"-embed use (nonstandard) embedded DSA parameters format\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"-nsdb use (nonstandard) DSA Netscape DB format\n");
|
||||||
|
BIO_printf(bio_err, "-noiter use 1 as iteration count\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"-nocrypt use or expect unencrypted private key\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"-v2 alg use PKCS#5 v2.0 and cipher \"alg\"\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"-v1 obj use PKCS#5 v1.5 and cipher \"alg\"\n");
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" -engine e use engine e, possibly a hardware device.\n");
|
||||||
|
#endif
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
e = setup_engine(bio_err, engine, 0);
|
||||||
|
#endif
|
||||||
|
|
||||||
case PKCS8_EMBEDDED_PARAM:
|
if (!app_passwd(bio_err, passargin, passargout, &passin, &passout)) {
|
||||||
BIO_printf(bio_err, "DSA parameters included in PrivateKey\n");
|
BIO_printf(bio_err, "Error getting passwords\n");
|
||||||
break;
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
case PKCS8_NS_DB:
|
if ((pbe_nid == -1) && !cipher)
|
||||||
BIO_printf(bio_err, "DSA public key include in PrivateKey\n");
|
pbe_nid = NID_pbeWithMD5AndDES_CBC;
|
||||||
break;
|
|
||||||
|
|
||||||
default:
|
if (infile) {
|
||||||
BIO_printf(bio_err, "Unknown broken type\n");
|
if (!(in = BIO_new_file(infile, "rb"))) {
|
||||||
break;
|
BIO_printf(bio_err, "Can't open input file %s\n", infile);
|
||||||
}
|
goto end;
|
||||||
}
|
}
|
||||||
|
} else
|
||||||
|
in = BIO_new_fp(stdin, BIO_NOCLOSE);
|
||||||
|
|
||||||
PKCS8_PRIV_KEY_INFO_free(p8inf);
|
if (outfile) {
|
||||||
if(outformat == FORMAT_PEM)
|
if (!(out = BIO_new_file(outfile, "wb"))) {
|
||||||
PEM_write_bio_PrivateKey(out, pkey, NULL, NULL, 0, NULL, passout);
|
BIO_printf(bio_err, "Can't open output file %s\n", outfile);
|
||||||
else if(outformat == FORMAT_ASN1)
|
goto end;
|
||||||
i2d_PrivateKey_bio(out, pkey);
|
}
|
||||||
else {
|
} else {
|
||||||
BIO_printf(bio_err, "Bad format specified for key\n");
|
out = BIO_new_fp(stdout, BIO_NOCLOSE);
|
||||||
return (1);
|
#ifdef OPENSSL_SYS_VMS
|
||||||
}
|
{
|
||||||
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
|
out = BIO_push(tmpbio, out);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
}
|
||||||
|
if (topk8) {
|
||||||
|
pkey = load_key(bio_err, infile, informat, 1, passin, e, "key");
|
||||||
|
if (!pkey)
|
||||||
|
goto end;
|
||||||
|
if (!(p8inf = EVP_PKEY2PKCS8_broken(pkey, p8_broken))) {
|
||||||
|
BIO_printf(bio_err, "Error converting key\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
if (nocrypt) {
|
||||||
|
if (outformat == FORMAT_PEM)
|
||||||
|
PEM_write_bio_PKCS8_PRIV_KEY_INFO(out, p8inf);
|
||||||
|
else if (outformat == FORMAT_ASN1)
|
||||||
|
i2d_PKCS8_PRIV_KEY_INFO_bio(out, p8inf);
|
||||||
|
else {
|
||||||
|
BIO_printf(bio_err, "Bad format specified for key\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
if (passout)
|
||||||
|
p8pass = passout;
|
||||||
|
else {
|
||||||
|
p8pass = pass;
|
||||||
|
if (EVP_read_pw_string
|
||||||
|
(pass, sizeof pass, "Enter Encryption Password:", 1))
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
app_RAND_load_file(NULL, bio_err, 0);
|
||||||
|
if (!(p8 = PKCS8_encrypt(pbe_nid, cipher,
|
||||||
|
p8pass, strlen(p8pass),
|
||||||
|
NULL, 0, iter, p8inf))) {
|
||||||
|
BIO_printf(bio_err, "Error encrypting key\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
app_RAND_write_file(NULL, bio_err);
|
||||||
|
if (outformat == FORMAT_PEM)
|
||||||
|
PEM_write_bio_PKCS8(out, p8);
|
||||||
|
else if (outformat == FORMAT_ASN1)
|
||||||
|
i2d_PKCS8_bio(out, p8);
|
||||||
|
else {
|
||||||
|
BIO_printf(bio_err, "Bad format specified for key\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
end:
|
ret = 0;
|
||||||
EVP_PKEY_free(pkey);
|
goto end;
|
||||||
BIO_free_all(out);
|
}
|
||||||
BIO_free(in);
|
|
||||||
if(passin) OPENSSL_free(passin);
|
|
||||||
if(passout) OPENSSL_free(passout);
|
|
||||||
|
|
||||||
return (0);
|
if (nocrypt) {
|
||||||
|
if (informat == FORMAT_PEM)
|
||||||
|
p8inf = PEM_read_bio_PKCS8_PRIV_KEY_INFO(in, NULL, NULL, NULL);
|
||||||
|
else if (informat == FORMAT_ASN1)
|
||||||
|
p8inf = d2i_PKCS8_PRIV_KEY_INFO_bio(in, NULL);
|
||||||
|
else {
|
||||||
|
BIO_printf(bio_err, "Bad format specified for key\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
if (informat == FORMAT_PEM)
|
||||||
|
p8 = PEM_read_bio_PKCS8(in, NULL, NULL, NULL);
|
||||||
|
else if (informat == FORMAT_ASN1)
|
||||||
|
p8 = d2i_PKCS8_bio(in, NULL);
|
||||||
|
else {
|
||||||
|
BIO_printf(bio_err, "Bad format specified for key\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!p8) {
|
||||||
|
BIO_printf(bio_err, "Error reading key\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
if (passin)
|
||||||
|
p8pass = passin;
|
||||||
|
else {
|
||||||
|
p8pass = pass;
|
||||||
|
EVP_read_pw_string(pass, sizeof pass, "Enter Password:", 0);
|
||||||
|
}
|
||||||
|
p8inf = PKCS8_decrypt(p8, p8pass, strlen(p8pass));
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!p8inf) {
|
||||||
|
BIO_printf(bio_err, "Error decrypting key\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!(pkey = EVP_PKCS82PKEY(p8inf))) {
|
||||||
|
BIO_printf(bio_err, "Error converting key\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (p8inf->broken) {
|
||||||
|
BIO_printf(bio_err, "Warning: broken key encoding: ");
|
||||||
|
switch (p8inf->broken) {
|
||||||
|
case PKCS8_NO_OCTET:
|
||||||
|
BIO_printf(bio_err, "No Octet String in PrivateKey\n");
|
||||||
|
break;
|
||||||
|
|
||||||
|
case PKCS8_EMBEDDED_PARAM:
|
||||||
|
BIO_printf(bio_err, "DSA parameters included in PrivateKey\n");
|
||||||
|
break;
|
||||||
|
|
||||||
|
case PKCS8_NS_DB:
|
||||||
|
BIO_printf(bio_err, "DSA public key include in PrivateKey\n");
|
||||||
|
break;
|
||||||
|
|
||||||
|
case PKCS8_NEG_PRIVKEY:
|
||||||
|
BIO_printf(bio_err, "DSA private key value is negative\n");
|
||||||
|
break;
|
||||||
|
|
||||||
|
default:
|
||||||
|
BIO_printf(bio_err, "Unknown broken type\n");
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (outformat == FORMAT_PEM)
|
||||||
|
PEM_write_bio_PrivateKey(out, pkey, NULL, NULL, 0, NULL, passout);
|
||||||
|
else if (outformat == FORMAT_ASN1)
|
||||||
|
i2d_PrivateKey_bio(out, pkey);
|
||||||
|
else {
|
||||||
|
BIO_printf(bio_err, "Bad format specified for key\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
ret = 0;
|
||||||
|
|
||||||
|
end:
|
||||||
|
X509_SIG_free(p8);
|
||||||
|
PKCS8_PRIV_KEY_INFO_free(p8inf);
|
||||||
|
EVP_PKEY_free(pkey);
|
||||||
|
BIO_free_all(out);
|
||||||
|
BIO_free(in);
|
||||||
|
if (passin)
|
||||||
|
OPENSSL_free(passin);
|
||||||
|
if (passout)
|
||||||
|
OPENSSL_free(passout);
|
||||||
|
|
||||||
|
return ret;
|
||||||
}
|
}
|
||||||
|
|||||||
251
apps/pkey.c
Normal file
251
apps/pkey.c
Normal file
@@ -0,0 +1,251 @@
|
|||||||
|
/* apps/pkey.c */
|
||||||
|
/*
|
||||||
|
* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL project
|
||||||
|
* 2006
|
||||||
|
*/
|
||||||
|
/* ====================================================================
|
||||||
|
* Copyright (c) 2006 The OpenSSL Project. All rights reserved.
|
||||||
|
*
|
||||||
|
* Redistribution and use in source and binary forms, with or without
|
||||||
|
* modification, are permitted provided that the following conditions
|
||||||
|
* are met:
|
||||||
|
*
|
||||||
|
* 1. Redistributions of source code must retain the above copyright
|
||||||
|
* notice, this list of conditions and the following disclaimer.
|
||||||
|
*
|
||||||
|
* 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
* notice, this list of conditions and the following disclaimer in
|
||||||
|
* the documentation and/or other materials provided with the
|
||||||
|
* distribution.
|
||||||
|
*
|
||||||
|
* 3. All advertising materials mentioning features or use of this
|
||||||
|
* software must display the following acknowledgment:
|
||||||
|
* "This product includes software developed by the OpenSSL Project
|
||||||
|
* for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
|
||||||
|
*
|
||||||
|
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
|
||||||
|
* endorse or promote products derived from this software without
|
||||||
|
* prior written permission. For written permission, please contact
|
||||||
|
* licensing@OpenSSL.org.
|
||||||
|
*
|
||||||
|
* 5. Products derived from this software may not be called "OpenSSL"
|
||||||
|
* nor may "OpenSSL" appear in their names without prior written
|
||||||
|
* permission of the OpenSSL Project.
|
||||||
|
*
|
||||||
|
* 6. Redistributions of any form whatsoever must retain the following
|
||||||
|
* acknowledgment:
|
||||||
|
* "This product includes software developed by the OpenSSL Project
|
||||||
|
* for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
|
||||||
|
*
|
||||||
|
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
|
||||||
|
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||||
|
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
|
||||||
|
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||||||
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
||||||
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
||||||
|
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||||
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
||||||
|
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
||||||
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
||||||
|
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
|
* ====================================================================
|
||||||
|
*
|
||||||
|
* This product includes cryptographic software written by Eric Young
|
||||||
|
* (eay@cryptsoft.com). This product includes software written by Tim
|
||||||
|
* Hudson (tjh@cryptsoft.com).
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <string.h>
|
||||||
|
#include "apps.h"
|
||||||
|
#include <openssl/pem.h>
|
||||||
|
#include <openssl/err.h>
|
||||||
|
#include <openssl/evp.h>
|
||||||
|
|
||||||
|
#define PROG pkey_main
|
||||||
|
|
||||||
|
int MAIN(int, char **);
|
||||||
|
|
||||||
|
int MAIN(int argc, char **argv)
|
||||||
|
{
|
||||||
|
ENGINE *e = NULL;
|
||||||
|
char **args, *infile = NULL, *outfile = NULL;
|
||||||
|
char *passargin = NULL, *passargout = NULL;
|
||||||
|
BIO *in = NULL, *out = NULL;
|
||||||
|
const EVP_CIPHER *cipher = NULL;
|
||||||
|
int informat, outformat;
|
||||||
|
int pubin = 0, pubout = 0, pubtext = 0, text = 0, noout = 0;
|
||||||
|
EVP_PKEY *pkey = NULL;
|
||||||
|
char *passin = NULL, *passout = NULL;
|
||||||
|
int badarg = 0;
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
char *engine = NULL;
|
||||||
|
#endif
|
||||||
|
int ret = 1;
|
||||||
|
|
||||||
|
if (bio_err == NULL)
|
||||||
|
bio_err = BIO_new_fp(stderr, BIO_NOCLOSE);
|
||||||
|
|
||||||
|
if (!load_config(bio_err, NULL))
|
||||||
|
goto end;
|
||||||
|
|
||||||
|
informat = FORMAT_PEM;
|
||||||
|
outformat = FORMAT_PEM;
|
||||||
|
|
||||||
|
ERR_load_crypto_strings();
|
||||||
|
OpenSSL_add_all_algorithms();
|
||||||
|
args = argv + 1;
|
||||||
|
while (!badarg && *args && *args[0] == '-') {
|
||||||
|
if (!strcmp(*args, "-inform")) {
|
||||||
|
if (args[1]) {
|
||||||
|
args++;
|
||||||
|
informat = str2fmt(*args);
|
||||||
|
} else
|
||||||
|
badarg = 1;
|
||||||
|
} else if (!strcmp(*args, "-outform")) {
|
||||||
|
if (args[1]) {
|
||||||
|
args++;
|
||||||
|
outformat = str2fmt(*args);
|
||||||
|
} else
|
||||||
|
badarg = 1;
|
||||||
|
} else if (!strcmp(*args, "-passin")) {
|
||||||
|
if (!args[1])
|
||||||
|
goto bad;
|
||||||
|
passargin = *(++args);
|
||||||
|
} else if (!strcmp(*args, "-passout")) {
|
||||||
|
if (!args[1])
|
||||||
|
goto bad;
|
||||||
|
passargout = *(++args);
|
||||||
|
}
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
else if (strcmp(*args, "-engine") == 0) {
|
||||||
|
if (!args[1])
|
||||||
|
goto bad;
|
||||||
|
engine = *(++args);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
else if (!strcmp(*args, "-in")) {
|
||||||
|
if (args[1]) {
|
||||||
|
args++;
|
||||||
|
infile = *args;
|
||||||
|
} else
|
||||||
|
badarg = 1;
|
||||||
|
} else if (!strcmp(*args, "-out")) {
|
||||||
|
if (args[1]) {
|
||||||
|
args++;
|
||||||
|
outfile = *args;
|
||||||
|
} else
|
||||||
|
badarg = 1;
|
||||||
|
} else if (strcmp(*args, "-pubin") == 0) {
|
||||||
|
pubin = 1;
|
||||||
|
pubout = 1;
|
||||||
|
pubtext = 1;
|
||||||
|
} else if (strcmp(*args, "-pubout") == 0)
|
||||||
|
pubout = 1;
|
||||||
|
else if (strcmp(*args, "-text_pub") == 0) {
|
||||||
|
pubtext = 1;
|
||||||
|
text = 1;
|
||||||
|
} else if (strcmp(*args, "-text") == 0)
|
||||||
|
text = 1;
|
||||||
|
else if (strcmp(*args, "-noout") == 0)
|
||||||
|
noout = 1;
|
||||||
|
else {
|
||||||
|
cipher = EVP_get_cipherbyname(*args + 1);
|
||||||
|
if (!cipher) {
|
||||||
|
BIO_printf(bio_err, "Unknown cipher %s\n", *args + 1);
|
||||||
|
badarg = 1;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
args++;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (badarg) {
|
||||||
|
bad:
|
||||||
|
BIO_printf(bio_err, "Usage pkey [options]\n");
|
||||||
|
BIO_printf(bio_err, "where options are\n");
|
||||||
|
BIO_printf(bio_err, "-in file input file\n");
|
||||||
|
BIO_printf(bio_err, "-inform X input format (DER or PEM)\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"-passin arg input file pass phrase source\n");
|
||||||
|
BIO_printf(bio_err, "-outform X output format (DER or PEM)\n");
|
||||||
|
BIO_printf(bio_err, "-out file output file\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"-passout arg output file pass phrase source\n");
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"-engine e use engine e, possibly a hardware device.\n");
|
||||||
|
#endif
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
e = setup_engine(bio_err, engine, 0);
|
||||||
|
#endif
|
||||||
|
|
||||||
|
if (!app_passwd(bio_err, passargin, passargout, &passin, &passout)) {
|
||||||
|
BIO_printf(bio_err, "Error getting passwords\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (outfile) {
|
||||||
|
if (!(out = BIO_new_file(outfile, "wb"))) {
|
||||||
|
BIO_printf(bio_err, "Can't open output file %s\n", outfile);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
out = BIO_new_fp(stdout, BIO_NOCLOSE);
|
||||||
|
#ifdef OPENSSL_SYS_VMS
|
||||||
|
{
|
||||||
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
|
out = BIO_push(tmpbio, out);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
}
|
||||||
|
|
||||||
|
if (pubin)
|
||||||
|
pkey = load_pubkey(bio_err, infile, informat, 1,
|
||||||
|
passin, e, "Public Key");
|
||||||
|
else
|
||||||
|
pkey = load_key(bio_err, infile, informat, 1, passin, e, "key");
|
||||||
|
if (!pkey)
|
||||||
|
goto end;
|
||||||
|
|
||||||
|
if (!noout) {
|
||||||
|
if (outformat == FORMAT_PEM) {
|
||||||
|
if (pubout)
|
||||||
|
PEM_write_bio_PUBKEY(out, pkey);
|
||||||
|
else
|
||||||
|
PEM_write_bio_PrivateKey(out, pkey, cipher,
|
||||||
|
NULL, 0, NULL, passout);
|
||||||
|
} else if (outformat == FORMAT_ASN1) {
|
||||||
|
if (pubout)
|
||||||
|
i2d_PUBKEY_bio(out, pkey);
|
||||||
|
else
|
||||||
|
i2d_PrivateKey_bio(out, pkey);
|
||||||
|
} else {
|
||||||
|
BIO_printf(bio_err, "Bad format specified for key\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
if (text) {
|
||||||
|
if (pubtext)
|
||||||
|
EVP_PKEY_print_public(out, pkey, 0, NULL);
|
||||||
|
else
|
||||||
|
EVP_PKEY_print_private(out, pkey, 0, NULL);
|
||||||
|
}
|
||||||
|
|
||||||
|
ret = 0;
|
||||||
|
|
||||||
|
end:
|
||||||
|
EVP_PKEY_free(pkey);
|
||||||
|
BIO_free_all(out);
|
||||||
|
BIO_free(in);
|
||||||
|
if (passin)
|
||||||
|
OPENSSL_free(passin);
|
||||||
|
if (passout)
|
||||||
|
OPENSSL_free(passout);
|
||||||
|
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
185
apps/pkeyparam.c
Normal file
185
apps/pkeyparam.c
Normal file
@@ -0,0 +1,185 @@
|
|||||||
|
/* apps/pkeyparam.c */
|
||||||
|
/*
|
||||||
|
* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL project
|
||||||
|
* 2006
|
||||||
|
*/
|
||||||
|
/* ====================================================================
|
||||||
|
* Copyright (c) 2006 The OpenSSL Project. All rights reserved.
|
||||||
|
*
|
||||||
|
* Redistribution and use in source and binary forms, with or without
|
||||||
|
* modification, are permitted provided that the following conditions
|
||||||
|
* are met:
|
||||||
|
*
|
||||||
|
* 1. Redistributions of source code must retain the above copyright
|
||||||
|
* notice, this list of conditions and the following disclaimer.
|
||||||
|
*
|
||||||
|
* 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
* notice, this list of conditions and the following disclaimer in
|
||||||
|
* the documentation and/or other materials provided with the
|
||||||
|
* distribution.
|
||||||
|
*
|
||||||
|
* 3. All advertising materials mentioning features or use of this
|
||||||
|
* software must display the following acknowledgment:
|
||||||
|
* "This product includes software developed by the OpenSSL Project
|
||||||
|
* for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
|
||||||
|
*
|
||||||
|
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
|
||||||
|
* endorse or promote products derived from this software without
|
||||||
|
* prior written permission. For written permission, please contact
|
||||||
|
* licensing@OpenSSL.org.
|
||||||
|
*
|
||||||
|
* 5. Products derived from this software may not be called "OpenSSL"
|
||||||
|
* nor may "OpenSSL" appear in their names without prior written
|
||||||
|
* permission of the OpenSSL Project.
|
||||||
|
*
|
||||||
|
* 6. Redistributions of any form whatsoever must retain the following
|
||||||
|
* acknowledgment:
|
||||||
|
* "This product includes software developed by the OpenSSL Project
|
||||||
|
* for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
|
||||||
|
*
|
||||||
|
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
|
||||||
|
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||||
|
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
|
||||||
|
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||||||
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
||||||
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
||||||
|
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||||
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
||||||
|
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
||||||
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
||||||
|
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
|
* ====================================================================
|
||||||
|
*
|
||||||
|
* This product includes cryptographic software written by Eric Young
|
||||||
|
* (eay@cryptsoft.com). This product includes software written by Tim
|
||||||
|
* Hudson (tjh@cryptsoft.com).
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <string.h>
|
||||||
|
#include "apps.h"
|
||||||
|
#include <openssl/pem.h>
|
||||||
|
#include <openssl/err.h>
|
||||||
|
#include <openssl/evp.h>
|
||||||
|
|
||||||
|
#define PROG pkeyparam_main
|
||||||
|
|
||||||
|
int MAIN(int, char **);
|
||||||
|
|
||||||
|
int MAIN(int argc, char **argv)
|
||||||
|
{
|
||||||
|
char **args, *infile = NULL, *outfile = NULL;
|
||||||
|
BIO *in = NULL, *out = NULL;
|
||||||
|
int text = 0, noout = 0;
|
||||||
|
EVP_PKEY *pkey = NULL;
|
||||||
|
int badarg = 0;
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
char *engine = NULL;
|
||||||
|
#endif
|
||||||
|
int ret = 1;
|
||||||
|
|
||||||
|
if (bio_err == NULL)
|
||||||
|
bio_err = BIO_new_fp(stderr, BIO_NOCLOSE);
|
||||||
|
|
||||||
|
if (!load_config(bio_err, NULL))
|
||||||
|
goto end;
|
||||||
|
|
||||||
|
ERR_load_crypto_strings();
|
||||||
|
OpenSSL_add_all_algorithms();
|
||||||
|
args = argv + 1;
|
||||||
|
while (!badarg && *args && *args[0] == '-') {
|
||||||
|
if (!strcmp(*args, "-in")) {
|
||||||
|
if (args[1]) {
|
||||||
|
args++;
|
||||||
|
infile = *args;
|
||||||
|
} else
|
||||||
|
badarg = 1;
|
||||||
|
} else if (!strcmp(*args, "-out")) {
|
||||||
|
if (args[1]) {
|
||||||
|
args++;
|
||||||
|
outfile = *args;
|
||||||
|
} else
|
||||||
|
badarg = 1;
|
||||||
|
}
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
else if (strcmp(*args, "-engine") == 0) {
|
||||||
|
if (!args[1])
|
||||||
|
goto bad;
|
||||||
|
engine = *(++args);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
|
else if (strcmp(*args, "-text") == 0)
|
||||||
|
text = 1;
|
||||||
|
else if (strcmp(*args, "-noout") == 0)
|
||||||
|
noout = 1;
|
||||||
|
args++;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (badarg) {
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
bad:
|
||||||
|
#endif
|
||||||
|
BIO_printf(bio_err, "Usage pkeyparam [options]\n");
|
||||||
|
BIO_printf(bio_err, "where options are\n");
|
||||||
|
BIO_printf(bio_err, "-in file input file\n");
|
||||||
|
BIO_printf(bio_err, "-out file output file\n");
|
||||||
|
BIO_printf(bio_err, "-text print parameters as text\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"-noout don't output encoded parameters\n");
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"-engine e use engine e, possibly a hardware device.\n");
|
||||||
|
#endif
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
setup_engine(bio_err, engine, 0);
|
||||||
|
#endif
|
||||||
|
|
||||||
|
if (infile) {
|
||||||
|
if (!(in = BIO_new_file(infile, "r"))) {
|
||||||
|
BIO_printf(bio_err, "Can't open input file %s\n", infile);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
} else
|
||||||
|
in = BIO_new_fp(stdin, BIO_NOCLOSE);
|
||||||
|
|
||||||
|
if (outfile) {
|
||||||
|
if (!(out = BIO_new_file(outfile, "w"))) {
|
||||||
|
BIO_printf(bio_err, "Can't open output file %s\n", outfile);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
out = BIO_new_fp(stdout, BIO_NOCLOSE);
|
||||||
|
#ifdef OPENSSL_SYS_VMS
|
||||||
|
{
|
||||||
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
|
out = BIO_push(tmpbio, out);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
}
|
||||||
|
|
||||||
|
pkey = PEM_read_bio_Parameters(in, NULL);
|
||||||
|
if (!pkey) {
|
||||||
|
BIO_printf(bio_err, "Error reading parameters\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!noout)
|
||||||
|
PEM_write_bio_Parameters(out, pkey);
|
||||||
|
|
||||||
|
if (text)
|
||||||
|
EVP_PKEY_print_params(out, pkey, 0, NULL);
|
||||||
|
|
||||||
|
ret = 0;
|
||||||
|
|
||||||
|
end:
|
||||||
|
EVP_PKEY_free(pkey);
|
||||||
|
BIO_free_all(out);
|
||||||
|
BIO_free(in);
|
||||||
|
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
523
apps/pkeyutl.c
Normal file
523
apps/pkeyutl.c
Normal file
@@ -0,0 +1,523 @@
|
|||||||
|
/*
|
||||||
|
* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL project
|
||||||
|
* 2006.
|
||||||
|
*/
|
||||||
|
/* ====================================================================
|
||||||
|
* Copyright (c) 2006 The OpenSSL Project. All rights reserved.
|
||||||
|
*
|
||||||
|
* Redistribution and use in source and binary forms, with or without
|
||||||
|
* modification, are permitted provided that the following conditions
|
||||||
|
* are met:
|
||||||
|
*
|
||||||
|
* 1. Redistributions of source code must retain the above copyright
|
||||||
|
* notice, this list of conditions and the following disclaimer.
|
||||||
|
*
|
||||||
|
* 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
* notice, this list of conditions and the following disclaimer in
|
||||||
|
* the documentation and/or other materials provided with the
|
||||||
|
* distribution.
|
||||||
|
*
|
||||||
|
* 3. All advertising materials mentioning features or use of this
|
||||||
|
* software must display the following acknowledgment:
|
||||||
|
* "This product includes software developed by the OpenSSL Project
|
||||||
|
* for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
|
||||||
|
*
|
||||||
|
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
|
||||||
|
* endorse or promote products derived from this software without
|
||||||
|
* prior written permission. For written permission, please contact
|
||||||
|
* licensing@OpenSSL.org.
|
||||||
|
*
|
||||||
|
* 5. Products derived from this software may not be called "OpenSSL"
|
||||||
|
* nor may "OpenSSL" appear in their names without prior written
|
||||||
|
* permission of the OpenSSL Project.
|
||||||
|
*
|
||||||
|
* 6. Redistributions of any form whatsoever must retain the following
|
||||||
|
* acknowledgment:
|
||||||
|
* "This product includes software developed by the OpenSSL Project
|
||||||
|
* for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
|
||||||
|
*
|
||||||
|
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
|
||||||
|
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||||
|
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
|
||||||
|
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||||||
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
||||||
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
||||||
|
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||||
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
||||||
|
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
||||||
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
||||||
|
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
|
* ====================================================================
|
||||||
|
*
|
||||||
|
* This product includes cryptographic software written by Eric Young
|
||||||
|
* (eay@cryptsoft.com). This product includes software written by Tim
|
||||||
|
* Hudson (tjh@cryptsoft.com).
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include "apps.h"
|
||||||
|
#include <string.h>
|
||||||
|
#include <openssl/err.h>
|
||||||
|
#include <openssl/pem.h>
|
||||||
|
#include <openssl/evp.h>
|
||||||
|
|
||||||
|
#define KEY_PRIVKEY 1
|
||||||
|
#define KEY_PUBKEY 2
|
||||||
|
#define KEY_CERT 3
|
||||||
|
|
||||||
|
static void usage(void);
|
||||||
|
|
||||||
|
#undef PROG
|
||||||
|
|
||||||
|
#define PROG pkeyutl_main
|
||||||
|
|
||||||
|
static EVP_PKEY_CTX *init_ctx(int *pkeysize,
|
||||||
|
char *keyfile, int keyform, int key_type,
|
||||||
|
char *passargin, int pkey_op, ENGINE *e);
|
||||||
|
|
||||||
|
static int setup_peer(BIO *err, EVP_PKEY_CTX *ctx, int peerform,
|
||||||
|
const char *file);
|
||||||
|
|
||||||
|
static int do_keyop(EVP_PKEY_CTX *ctx, int pkey_op,
|
||||||
|
unsigned char *out, size_t *poutlen,
|
||||||
|
unsigned char *in, size_t inlen);
|
||||||
|
|
||||||
|
int MAIN(int argc, char **);
|
||||||
|
|
||||||
|
int MAIN(int argc, char **argv)
|
||||||
|
{
|
||||||
|
BIO *in = NULL, *out = NULL;
|
||||||
|
char *infile = NULL, *outfile = NULL, *sigfile = NULL;
|
||||||
|
ENGINE *e = NULL;
|
||||||
|
int pkey_op = EVP_PKEY_OP_SIGN, key_type = KEY_PRIVKEY;
|
||||||
|
int keyform = FORMAT_PEM, peerform = FORMAT_PEM;
|
||||||
|
char badarg = 0, rev = 0;
|
||||||
|
char hexdump = 0, asn1parse = 0;
|
||||||
|
EVP_PKEY_CTX *ctx = NULL;
|
||||||
|
char *passargin = NULL;
|
||||||
|
int keysize = -1;
|
||||||
|
|
||||||
|
unsigned char *buf_in = NULL, *buf_out = NULL, *sig = NULL;
|
||||||
|
size_t buf_outlen;
|
||||||
|
int buf_inlen = 0, siglen = -1;
|
||||||
|
|
||||||
|
int ret = 1, rv = -1;
|
||||||
|
|
||||||
|
argc--;
|
||||||
|
argv++;
|
||||||
|
|
||||||
|
if (!bio_err)
|
||||||
|
bio_err = BIO_new_fp(stderr, BIO_NOCLOSE);
|
||||||
|
|
||||||
|
if (!load_config(bio_err, NULL))
|
||||||
|
goto end;
|
||||||
|
ERR_load_crypto_strings();
|
||||||
|
OpenSSL_add_all_algorithms();
|
||||||
|
|
||||||
|
while (argc >= 1) {
|
||||||
|
if (!strcmp(*argv, "-in")) {
|
||||||
|
if (--argc < 1)
|
||||||
|
badarg = 1;
|
||||||
|
else
|
||||||
|
infile = *(++argv);
|
||||||
|
} else if (!strcmp(*argv, "-out")) {
|
||||||
|
if (--argc < 1)
|
||||||
|
badarg = 1;
|
||||||
|
else
|
||||||
|
outfile = *(++argv);
|
||||||
|
} else if (!strcmp(*argv, "-sigfile")) {
|
||||||
|
if (--argc < 1)
|
||||||
|
badarg = 1;
|
||||||
|
else
|
||||||
|
sigfile = *(++argv);
|
||||||
|
} else if (!strcmp(*argv, "-inkey")) {
|
||||||
|
if (--argc < 1)
|
||||||
|
badarg = 1;
|
||||||
|
else {
|
||||||
|
ctx = init_ctx(&keysize,
|
||||||
|
*(++argv), keyform, key_type,
|
||||||
|
passargin, pkey_op, e);
|
||||||
|
if (!ctx) {
|
||||||
|
BIO_puts(bio_err, "Error initializing context\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
badarg = 1;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
} else if (!strcmp(*argv, "-peerkey")) {
|
||||||
|
if (--argc < 1)
|
||||||
|
badarg = 1;
|
||||||
|
else if (!setup_peer(bio_err, ctx, peerform, *(++argv)))
|
||||||
|
badarg = 1;
|
||||||
|
} else if (!strcmp(*argv, "-passin")) {
|
||||||
|
if (--argc < 1)
|
||||||
|
badarg = 1;
|
||||||
|
else
|
||||||
|
passargin = *(++argv);
|
||||||
|
} else if (strcmp(*argv, "-peerform") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
badarg = 1;
|
||||||
|
else
|
||||||
|
peerform = str2fmt(*(++argv));
|
||||||
|
} else if (strcmp(*argv, "-keyform") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
badarg = 1;
|
||||||
|
else
|
||||||
|
keyform = str2fmt(*(++argv));
|
||||||
|
}
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
else if (!strcmp(*argv, "-engine")) {
|
||||||
|
if (--argc < 1)
|
||||||
|
badarg = 1;
|
||||||
|
else
|
||||||
|
e = setup_engine(bio_err, *(++argv), 0);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
else if (!strcmp(*argv, "-pubin"))
|
||||||
|
key_type = KEY_PUBKEY;
|
||||||
|
else if (!strcmp(*argv, "-certin"))
|
||||||
|
key_type = KEY_CERT;
|
||||||
|
else if (!strcmp(*argv, "-asn1parse"))
|
||||||
|
asn1parse = 1;
|
||||||
|
else if (!strcmp(*argv, "-hexdump"))
|
||||||
|
hexdump = 1;
|
||||||
|
else if (!strcmp(*argv, "-sign"))
|
||||||
|
pkey_op = EVP_PKEY_OP_SIGN;
|
||||||
|
else if (!strcmp(*argv, "-verify"))
|
||||||
|
pkey_op = EVP_PKEY_OP_VERIFY;
|
||||||
|
else if (!strcmp(*argv, "-verifyrecover"))
|
||||||
|
pkey_op = EVP_PKEY_OP_VERIFYRECOVER;
|
||||||
|
else if (!strcmp(*argv, "-rev"))
|
||||||
|
rev = 1;
|
||||||
|
else if (!strcmp(*argv, "-encrypt"))
|
||||||
|
pkey_op = EVP_PKEY_OP_ENCRYPT;
|
||||||
|
else if (!strcmp(*argv, "-decrypt"))
|
||||||
|
pkey_op = EVP_PKEY_OP_DECRYPT;
|
||||||
|
else if (!strcmp(*argv, "-derive"))
|
||||||
|
pkey_op = EVP_PKEY_OP_DERIVE;
|
||||||
|
else if (strcmp(*argv, "-pkeyopt") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
badarg = 1;
|
||||||
|
else if (!ctx) {
|
||||||
|
BIO_puts(bio_err, "-pkeyopt command before -inkey\n");
|
||||||
|
badarg = 1;
|
||||||
|
} else if (pkey_ctrl_string(ctx, *(++argv)) <= 0) {
|
||||||
|
BIO_puts(bio_err, "parameter setting error\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
} else
|
||||||
|
badarg = 1;
|
||||||
|
if (badarg) {
|
||||||
|
usage();
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
argc--;
|
||||||
|
argv++;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!ctx) {
|
||||||
|
usage();
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (sigfile && (pkey_op != EVP_PKEY_OP_VERIFY)) {
|
||||||
|
BIO_puts(bio_err, "Signature file specified for non verify\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!sigfile && (pkey_op == EVP_PKEY_OP_VERIFY)) {
|
||||||
|
BIO_puts(bio_err, "No signature file specified for verify\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* FIXME: seed PRNG only if needed */
|
||||||
|
app_RAND_load_file(NULL, bio_err, 0);
|
||||||
|
|
||||||
|
if (pkey_op != EVP_PKEY_OP_DERIVE) {
|
||||||
|
if (infile) {
|
||||||
|
if (!(in = BIO_new_file(infile, "rb"))) {
|
||||||
|
BIO_puts(bio_err, "Error Opening Input File\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
} else
|
||||||
|
in = BIO_new_fp(stdin, BIO_NOCLOSE);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (outfile) {
|
||||||
|
if (!(out = BIO_new_file(outfile, "wb"))) {
|
||||||
|
BIO_printf(bio_err, "Error Creating Output File\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
out = BIO_new_fp(stdout, BIO_NOCLOSE);
|
||||||
|
#ifdef OPENSSL_SYS_VMS
|
||||||
|
{
|
||||||
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
|
out = BIO_push(tmpbio, out);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
}
|
||||||
|
|
||||||
|
if (sigfile) {
|
||||||
|
BIO *sigbio = BIO_new_file(sigfile, "rb");
|
||||||
|
if (!sigbio) {
|
||||||
|
BIO_printf(bio_err, "Can't open signature file %s\n", sigfile);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
siglen = bio_to_mem(&sig, keysize * 10, sigbio);
|
||||||
|
BIO_free(sigbio);
|
||||||
|
if (siglen <= 0) {
|
||||||
|
BIO_printf(bio_err, "Error reading signature data\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (in) {
|
||||||
|
/* Read the input data */
|
||||||
|
buf_inlen = bio_to_mem(&buf_in, keysize * 10, in);
|
||||||
|
if (buf_inlen <= 0) {
|
||||||
|
BIO_printf(bio_err, "Error reading input Data\n");
|
||||||
|
exit(1);
|
||||||
|
}
|
||||||
|
if (rev) {
|
||||||
|
size_t i;
|
||||||
|
unsigned char ctmp;
|
||||||
|
size_t l = (size_t)buf_inlen;
|
||||||
|
for (i = 0; i < l / 2; i++) {
|
||||||
|
ctmp = buf_in[i];
|
||||||
|
buf_in[i] = buf_in[l - 1 - i];
|
||||||
|
buf_in[l - 1 - i] = ctmp;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (pkey_op == EVP_PKEY_OP_VERIFY) {
|
||||||
|
rv = EVP_PKEY_verify(ctx, sig, (size_t)siglen,
|
||||||
|
buf_in, (size_t)buf_inlen);
|
||||||
|
if (rv == 0)
|
||||||
|
BIO_puts(out, "Signature Verification Failure\n");
|
||||||
|
else if (rv == 1)
|
||||||
|
BIO_puts(out, "Signature Verified Successfully\n");
|
||||||
|
if (rv >= 0)
|
||||||
|
goto end;
|
||||||
|
} else {
|
||||||
|
rv = do_keyop(ctx, pkey_op, NULL, (size_t *)&buf_outlen,
|
||||||
|
buf_in, (size_t)buf_inlen);
|
||||||
|
if (rv > 0) {
|
||||||
|
buf_out = OPENSSL_malloc(buf_outlen);
|
||||||
|
if (!buf_out)
|
||||||
|
rv = -1;
|
||||||
|
else
|
||||||
|
rv = do_keyop(ctx, pkey_op,
|
||||||
|
buf_out, (size_t *)&buf_outlen,
|
||||||
|
buf_in, (size_t)buf_inlen);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (rv <= 0) {
|
||||||
|
BIO_printf(bio_err, "Public Key operation error\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
ret = 0;
|
||||||
|
if (asn1parse) {
|
||||||
|
if (!ASN1_parse_dump(out, buf_out, buf_outlen, 1, -1))
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
} else if (hexdump)
|
||||||
|
BIO_dump(out, (char *)buf_out, buf_outlen);
|
||||||
|
else
|
||||||
|
BIO_write(out, buf_out, buf_outlen);
|
||||||
|
|
||||||
|
end:
|
||||||
|
if (ctx)
|
||||||
|
EVP_PKEY_CTX_free(ctx);
|
||||||
|
BIO_free(in);
|
||||||
|
BIO_free_all(out);
|
||||||
|
if (buf_in)
|
||||||
|
OPENSSL_free(buf_in);
|
||||||
|
if (buf_out)
|
||||||
|
OPENSSL_free(buf_out);
|
||||||
|
if (sig)
|
||||||
|
OPENSSL_free(sig);
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
|
static void usage()
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Usage: pkeyutl [options]\n");
|
||||||
|
BIO_printf(bio_err, "-in file input file\n");
|
||||||
|
BIO_printf(bio_err, "-out file output file\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"-sigfile file signature file (verify operation only)\n");
|
||||||
|
BIO_printf(bio_err, "-inkey file input key\n");
|
||||||
|
BIO_printf(bio_err, "-keyform arg private key format - default PEM\n");
|
||||||
|
BIO_printf(bio_err, "-pubin input is a public key\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"-certin input is a certificate carrying a public key\n");
|
||||||
|
BIO_printf(bio_err, "-pkeyopt X:Y public key options\n");
|
||||||
|
BIO_printf(bio_err, "-sign sign with private key\n");
|
||||||
|
BIO_printf(bio_err, "-verify verify with public key\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"-verifyrecover verify with public key, recover original data\n");
|
||||||
|
BIO_printf(bio_err, "-encrypt encrypt with public key\n");
|
||||||
|
BIO_printf(bio_err, "-decrypt decrypt with private key\n");
|
||||||
|
BIO_printf(bio_err, "-derive derive shared secret\n");
|
||||||
|
BIO_printf(bio_err, "-hexdump hex dump output\n");
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"-engine e use engine e, possibly a hardware device.\n");
|
||||||
|
#endif
|
||||||
|
BIO_printf(bio_err, "-passin arg pass phrase source\n");
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
static EVP_PKEY_CTX *init_ctx(int *pkeysize,
|
||||||
|
char *keyfile, int keyform, int key_type,
|
||||||
|
char *passargin, int pkey_op, ENGINE *e)
|
||||||
|
{
|
||||||
|
EVP_PKEY *pkey = NULL;
|
||||||
|
EVP_PKEY_CTX *ctx = NULL;
|
||||||
|
char *passin = NULL;
|
||||||
|
int rv = -1;
|
||||||
|
X509 *x;
|
||||||
|
if (((pkey_op == EVP_PKEY_OP_SIGN) || (pkey_op == EVP_PKEY_OP_DECRYPT)
|
||||||
|
|| (pkey_op == EVP_PKEY_OP_DERIVE))
|
||||||
|
&& (key_type != KEY_PRIVKEY)) {
|
||||||
|
BIO_printf(bio_err, "A private key is needed for this operation\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
if (!app_passwd(bio_err, passargin, NULL, &passin, NULL)) {
|
||||||
|
BIO_printf(bio_err, "Error getting password\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
switch (key_type) {
|
||||||
|
case KEY_PRIVKEY:
|
||||||
|
pkey = load_key(bio_err, keyfile, keyform, 0,
|
||||||
|
passin, e, "Private Key");
|
||||||
|
break;
|
||||||
|
|
||||||
|
case KEY_PUBKEY:
|
||||||
|
pkey = load_pubkey(bio_err, keyfile, keyform, 0,
|
||||||
|
NULL, e, "Public Key");
|
||||||
|
break;
|
||||||
|
|
||||||
|
case KEY_CERT:
|
||||||
|
x = load_cert(bio_err, keyfile, keyform, NULL, e, "Certificate");
|
||||||
|
if (x) {
|
||||||
|
pkey = X509_get_pubkey(x);
|
||||||
|
X509_free(x);
|
||||||
|
}
|
||||||
|
break;
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
*pkeysize = EVP_PKEY_size(pkey);
|
||||||
|
|
||||||
|
if (!pkey)
|
||||||
|
goto end;
|
||||||
|
|
||||||
|
ctx = EVP_PKEY_CTX_new(pkey, e);
|
||||||
|
|
||||||
|
EVP_PKEY_free(pkey);
|
||||||
|
|
||||||
|
if (!ctx)
|
||||||
|
goto end;
|
||||||
|
|
||||||
|
switch (pkey_op) {
|
||||||
|
case EVP_PKEY_OP_SIGN:
|
||||||
|
rv = EVP_PKEY_sign_init(ctx);
|
||||||
|
break;
|
||||||
|
|
||||||
|
case EVP_PKEY_OP_VERIFY:
|
||||||
|
rv = EVP_PKEY_verify_init(ctx);
|
||||||
|
break;
|
||||||
|
|
||||||
|
case EVP_PKEY_OP_VERIFYRECOVER:
|
||||||
|
rv = EVP_PKEY_verify_recover_init(ctx);
|
||||||
|
break;
|
||||||
|
|
||||||
|
case EVP_PKEY_OP_ENCRYPT:
|
||||||
|
rv = EVP_PKEY_encrypt_init(ctx);
|
||||||
|
break;
|
||||||
|
|
||||||
|
case EVP_PKEY_OP_DECRYPT:
|
||||||
|
rv = EVP_PKEY_decrypt_init(ctx);
|
||||||
|
break;
|
||||||
|
|
||||||
|
case EVP_PKEY_OP_DERIVE:
|
||||||
|
rv = EVP_PKEY_derive_init(ctx);
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (rv <= 0) {
|
||||||
|
EVP_PKEY_CTX_free(ctx);
|
||||||
|
ctx = NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
end:
|
||||||
|
|
||||||
|
if (passin)
|
||||||
|
OPENSSL_free(passin);
|
||||||
|
|
||||||
|
return ctx;
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
static int setup_peer(BIO *err, EVP_PKEY_CTX *ctx, int peerform,
|
||||||
|
const char *file)
|
||||||
|
{
|
||||||
|
EVP_PKEY *peer = NULL;
|
||||||
|
int ret;
|
||||||
|
if (!ctx) {
|
||||||
|
BIO_puts(err, "-peerkey command before -inkey\n");
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
peer = load_pubkey(bio_err, file, peerform, 0, NULL, NULL, "Peer Key");
|
||||||
|
|
||||||
|
if (!peer) {
|
||||||
|
BIO_printf(bio_err, "Error reading peer key %s\n", file);
|
||||||
|
ERR_print_errors(err);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
ret = EVP_PKEY_derive_set_peer(ctx, peer);
|
||||||
|
|
||||||
|
EVP_PKEY_free(peer);
|
||||||
|
if (ret <= 0)
|
||||||
|
ERR_print_errors(err);
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int do_keyop(EVP_PKEY_CTX *ctx, int pkey_op,
|
||||||
|
unsigned char *out, size_t *poutlen,
|
||||||
|
unsigned char *in, size_t inlen)
|
||||||
|
{
|
||||||
|
int rv = 0;
|
||||||
|
switch (pkey_op) {
|
||||||
|
case EVP_PKEY_OP_VERIFYRECOVER:
|
||||||
|
rv = EVP_PKEY_verify_recover(ctx, out, poutlen, in, inlen);
|
||||||
|
break;
|
||||||
|
|
||||||
|
case EVP_PKEY_OP_SIGN:
|
||||||
|
rv = EVP_PKEY_sign(ctx, out, poutlen, in, inlen);
|
||||||
|
break;
|
||||||
|
|
||||||
|
case EVP_PKEY_OP_ENCRYPT:
|
||||||
|
rv = EVP_PKEY_encrypt(ctx, out, poutlen, in, inlen);
|
||||||
|
break;
|
||||||
|
|
||||||
|
case EVP_PKEY_OP_DECRYPT:
|
||||||
|
rv = EVP_PKEY_decrypt(ctx, out, poutlen, in, inlen);
|
||||||
|
break;
|
||||||
|
|
||||||
|
case EVP_PKEY_OP_DERIVE:
|
||||||
|
rv = EVP_PKEY_derive(ctx, out, poutlen);
|
||||||
|
break;
|
||||||
|
|
||||||
|
}
|
||||||
|
return rv;
|
||||||
|
}
|
||||||
151
apps/prime.c
Normal file
151
apps/prime.c
Normal file
@@ -0,0 +1,151 @@
|
|||||||
|
/* ====================================================================
|
||||||
|
* Copyright (c) 2004 The OpenSSL Project. All rights reserved.
|
||||||
|
*
|
||||||
|
* Redistribution and use in source and binary forms, with or without
|
||||||
|
* modification, are permitted provided that the following conditions
|
||||||
|
* are met:
|
||||||
|
*
|
||||||
|
* 1. Redistributions of source code must retain the above copyright
|
||||||
|
* notice, this list of conditions and the following disclaimer.
|
||||||
|
*
|
||||||
|
* 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
* notice, this list of conditions and the following disclaimer in
|
||||||
|
* the documentation and/or other materials provided with the
|
||||||
|
* distribution.
|
||||||
|
*
|
||||||
|
* 3. All advertising materials mentioning features or use of this
|
||||||
|
* software must display the following acknowledgment:
|
||||||
|
* "This product includes software developed by the OpenSSL Project
|
||||||
|
* for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
|
||||||
|
*
|
||||||
|
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
|
||||||
|
* endorse or promote products derived from this software without
|
||||||
|
* prior written permission. For written permission, please contact
|
||||||
|
* openssl-core@openssl.org.
|
||||||
|
*
|
||||||
|
* 5. Products derived from this software may not be called "OpenSSL"
|
||||||
|
* nor may "OpenSSL" appear in their names without prior written
|
||||||
|
* permission of the OpenSSL Project.
|
||||||
|
*
|
||||||
|
* 6. Redistributions of any form whatsoever must retain the following
|
||||||
|
* acknowledgment:
|
||||||
|
* "This product includes software developed by the OpenSSL Project
|
||||||
|
* for use in the OpenSSL Toolkit (http://www.openssl.org/)"
|
||||||
|
*
|
||||||
|
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
|
||||||
|
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||||
|
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
|
||||||
|
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||||||
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
||||||
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
||||||
|
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||||
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
||||||
|
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
||||||
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
||||||
|
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include <string.h>
|
||||||
|
|
||||||
|
#include "apps.h"
|
||||||
|
#include <openssl/bn.h>
|
||||||
|
|
||||||
|
#undef PROG
|
||||||
|
#define PROG prime_main
|
||||||
|
|
||||||
|
int MAIN(int, char **);
|
||||||
|
|
||||||
|
int MAIN(int argc, char **argv)
|
||||||
|
{
|
||||||
|
int hex = 0;
|
||||||
|
int checks = 20;
|
||||||
|
int generate = 0;
|
||||||
|
int bits = 0;
|
||||||
|
int safe = 0;
|
||||||
|
BIGNUM *bn = NULL;
|
||||||
|
BIO *bio_out;
|
||||||
|
|
||||||
|
apps_startup();
|
||||||
|
|
||||||
|
if (bio_err == NULL)
|
||||||
|
if ((bio_err = BIO_new(BIO_s_file())) != NULL)
|
||||||
|
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||||
|
|
||||||
|
--argc;
|
||||||
|
++argv;
|
||||||
|
while (argc >= 1 && **argv == '-') {
|
||||||
|
if (!strcmp(*argv, "-hex"))
|
||||||
|
hex = 1;
|
||||||
|
else if (!strcmp(*argv, "-generate"))
|
||||||
|
generate = 1;
|
||||||
|
else if (!strcmp(*argv, "-bits"))
|
||||||
|
if (--argc < 1)
|
||||||
|
goto bad;
|
||||||
|
else
|
||||||
|
bits = atoi(*++argv);
|
||||||
|
else if (!strcmp(*argv, "-safe"))
|
||||||
|
safe = 1;
|
||||||
|
else if (!strcmp(*argv, "-checks"))
|
||||||
|
if (--argc < 1)
|
||||||
|
goto bad;
|
||||||
|
else
|
||||||
|
checks = atoi(*++argv);
|
||||||
|
else {
|
||||||
|
BIO_printf(bio_err, "Unknown option '%s'\n", *argv);
|
||||||
|
goto bad;
|
||||||
|
}
|
||||||
|
--argc;
|
||||||
|
++argv;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (argv[0] == NULL && !generate) {
|
||||||
|
BIO_printf(bio_err, "No prime specified\n");
|
||||||
|
goto bad;
|
||||||
|
}
|
||||||
|
|
||||||
|
if ((bio_out = BIO_new(BIO_s_file())) != NULL) {
|
||||||
|
BIO_set_fp(bio_out, stdout, BIO_NOCLOSE);
|
||||||
|
#ifdef OPENSSL_SYS_VMS
|
||||||
|
{
|
||||||
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
|
bio_out = BIO_push(tmpbio, bio_out);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
}
|
||||||
|
|
||||||
|
if (generate) {
|
||||||
|
char *s;
|
||||||
|
|
||||||
|
if (!bits) {
|
||||||
|
BIO_printf(bio_err, "Specifiy the number of bits.\n");
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
bn = BN_new();
|
||||||
|
BN_generate_prime_ex(bn, bits, safe, NULL, NULL, NULL);
|
||||||
|
s = hex ? BN_bn2hex(bn) : BN_bn2dec(bn);
|
||||||
|
BIO_printf(bio_out, "%s\n", s);
|
||||||
|
OPENSSL_free(s);
|
||||||
|
} else {
|
||||||
|
if (hex)
|
||||||
|
BN_hex2bn(&bn, argv[0]);
|
||||||
|
else
|
||||||
|
BN_dec2bn(&bn, argv[0]);
|
||||||
|
|
||||||
|
BN_print(bio_out, bn);
|
||||||
|
BIO_printf(bio_out, " is %sprime\n",
|
||||||
|
BN_is_prime_ex(bn, checks, NULL, NULL) ? "" : "not ");
|
||||||
|
}
|
||||||
|
|
||||||
|
BN_free(bn);
|
||||||
|
BIO_free_all(bio_out);
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
bad:
|
||||||
|
BIO_printf(bio_err, "options are\n");
|
||||||
|
BIO_printf(bio_err, "%-14s hex\n", "-hex");
|
||||||
|
BIO_printf(bio_err, "%-14s number of checks\n", "-checks <n>");
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
364
apps/progs.h
364
apps/progs.h
@@ -1,300 +1,366 @@
|
|||||||
/* apps/progs.h */
|
/* apps/progs.h */
|
||||||
/* automatically generated by progs.pl for openssl.c */
|
/* automatically generated by progs.pl for openssl.c */
|
||||||
|
|
||||||
extern int verify_main(int argc,char *argv[]);
|
extern int verify_main(int argc, char *argv[]);
|
||||||
extern int asn1parse_main(int argc,char *argv[]);
|
extern int asn1parse_main(int argc, char *argv[]);
|
||||||
extern int req_main(int argc,char *argv[]);
|
extern int req_main(int argc, char *argv[]);
|
||||||
extern int dgst_main(int argc,char *argv[]);
|
extern int dgst_main(int argc, char *argv[]);
|
||||||
extern int dh_main(int argc,char *argv[]);
|
extern int dh_main(int argc, char *argv[]);
|
||||||
extern int dhparam_main(int argc,char *argv[]);
|
extern int dhparam_main(int argc, char *argv[]);
|
||||||
extern int enc_main(int argc,char *argv[]);
|
extern int enc_main(int argc, char *argv[]);
|
||||||
extern int passwd_main(int argc,char *argv[]);
|
extern int passwd_main(int argc, char *argv[]);
|
||||||
extern int gendh_main(int argc,char *argv[]);
|
extern int gendh_main(int argc, char *argv[]);
|
||||||
extern int errstr_main(int argc,char *argv[]);
|
extern int errstr_main(int argc, char *argv[]);
|
||||||
extern int ca_main(int argc,char *argv[]);
|
extern int ca_main(int argc, char *argv[]);
|
||||||
extern int crl_main(int argc,char *argv[]);
|
extern int crl_main(int argc, char *argv[]);
|
||||||
extern int rsa_main(int argc,char *argv[]);
|
extern int rsa_main(int argc, char *argv[]);
|
||||||
extern int rsautl_main(int argc,char *argv[]);
|
extern int rsautl_main(int argc, char *argv[]);
|
||||||
extern int dsa_main(int argc,char *argv[]);
|
extern int dsa_main(int argc, char *argv[]);
|
||||||
extern int dsaparam_main(int argc,char *argv[]);
|
extern int dsaparam_main(int argc, char *argv[]);
|
||||||
extern int ec_main(int argc,char *argv[]);
|
extern int ec_main(int argc, char *argv[]);
|
||||||
extern int ecparam_main(int argc,char *argv[]);
|
extern int ecparam_main(int argc, char *argv[]);
|
||||||
extern int x509_main(int argc,char *argv[]);
|
extern int x509_main(int argc, char *argv[]);
|
||||||
extern int genrsa_main(int argc,char *argv[]);
|
extern int genrsa_main(int argc, char *argv[]);
|
||||||
extern int gendsa_main(int argc,char *argv[]);
|
extern int gendsa_main(int argc, char *argv[]);
|
||||||
extern int s_server_main(int argc,char *argv[]);
|
extern int genpkey_main(int argc, char *argv[]);
|
||||||
extern int s_client_main(int argc,char *argv[]);
|
extern int s_server_main(int argc, char *argv[]);
|
||||||
extern int speed_main(int argc,char *argv[]);
|
extern int s_client_main(int argc, char *argv[]);
|
||||||
extern int s_time_main(int argc,char *argv[]);
|
extern int speed_main(int argc, char *argv[]);
|
||||||
extern int version_main(int argc,char *argv[]);
|
extern int s_time_main(int argc, char *argv[]);
|
||||||
extern int pkcs7_main(int argc,char *argv[]);
|
extern int version_main(int argc, char *argv[]);
|
||||||
extern int crl2pkcs7_main(int argc,char *argv[]);
|
extern int pkcs7_main(int argc, char *argv[]);
|
||||||
extern int sess_id_main(int argc,char *argv[]);
|
extern int cms_main(int argc, char *argv[]);
|
||||||
extern int ciphers_main(int argc,char *argv[]);
|
extern int crl2pkcs7_main(int argc, char *argv[]);
|
||||||
extern int nseq_main(int argc,char *argv[]);
|
extern int sess_id_main(int argc, char *argv[]);
|
||||||
extern int pkcs12_main(int argc,char *argv[]);
|
extern int ciphers_main(int argc, char *argv[]);
|
||||||
extern int pkcs8_main(int argc,char *argv[]);
|
extern int nseq_main(int argc, char *argv[]);
|
||||||
extern int spkac_main(int argc,char *argv[]);
|
extern int pkcs12_main(int argc, char *argv[]);
|
||||||
extern int smime_main(int argc,char *argv[]);
|
extern int pkcs8_main(int argc, char *argv[]);
|
||||||
extern int rand_main(int argc,char *argv[]);
|
extern int pkey_main(int argc, char *argv[]);
|
||||||
extern int engine_main(int argc,char *argv[]);
|
extern int pkeyparam_main(int argc, char *argv[]);
|
||||||
extern int ocsp_main(int argc,char *argv[]);
|
extern int pkeyutl_main(int argc, char *argv[]);
|
||||||
|
extern int spkac_main(int argc, char *argv[]);
|
||||||
|
extern int smime_main(int argc, char *argv[]);
|
||||||
|
extern int rand_main(int argc, char *argv[]);
|
||||||
|
extern int engine_main(int argc, char *argv[]);
|
||||||
|
extern int ocsp_main(int argc, char *argv[]);
|
||||||
|
extern int prime_main(int argc, char *argv[]);
|
||||||
|
extern int ts_main(int argc, char *argv[]);
|
||||||
|
extern int srp_main(int argc, char *argv[]);
|
||||||
|
|
||||||
#define FUNC_TYPE_GENERAL 1
|
#define FUNC_TYPE_GENERAL 1
|
||||||
#define FUNC_TYPE_MD 2
|
#define FUNC_TYPE_MD 2
|
||||||
#define FUNC_TYPE_CIPHER 3
|
#define FUNC_TYPE_CIPHER 3
|
||||||
|
#define FUNC_TYPE_PKEY 4
|
||||||
|
#define FUNC_TYPE_MD_ALG 5
|
||||||
|
#define FUNC_TYPE_CIPHER_ALG 6
|
||||||
|
|
||||||
typedef struct {
|
typedef struct {
|
||||||
int type;
|
int type;
|
||||||
char *name;
|
const char *name;
|
||||||
int (*func)();
|
int (*func) (int argc, char *argv[]);
|
||||||
} FUNCTION;
|
} FUNCTION;
|
||||||
|
DECLARE_LHASH_OF(FUNCTION);
|
||||||
|
|
||||||
FUNCTION functions[] = {
|
FUNCTION functions[] = {
|
||||||
{FUNC_TYPE_GENERAL,"verify",verify_main},
|
{FUNC_TYPE_GENERAL, "verify", verify_main},
|
||||||
{FUNC_TYPE_GENERAL,"asn1parse",asn1parse_main},
|
{FUNC_TYPE_GENERAL, "asn1parse", asn1parse_main},
|
||||||
{FUNC_TYPE_GENERAL,"req",req_main},
|
{FUNC_TYPE_GENERAL, "req", req_main},
|
||||||
{FUNC_TYPE_GENERAL,"dgst",dgst_main},
|
{FUNC_TYPE_GENERAL, "dgst", dgst_main},
|
||||||
#ifndef OPENSSL_NO_DH
|
#ifndef OPENSSL_NO_DH
|
||||||
{FUNC_TYPE_GENERAL,"dh",dh_main},
|
{FUNC_TYPE_GENERAL, "dh", dh_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_DH
|
#ifndef OPENSSL_NO_DH
|
||||||
{FUNC_TYPE_GENERAL,"dhparam",dhparam_main},
|
{FUNC_TYPE_GENERAL, "dhparam", dhparam_main},
|
||||||
#endif
|
#endif
|
||||||
{FUNC_TYPE_GENERAL,"enc",enc_main},
|
{FUNC_TYPE_GENERAL, "enc", enc_main},
|
||||||
{FUNC_TYPE_GENERAL,"passwd",passwd_main},
|
{FUNC_TYPE_GENERAL, "passwd", passwd_main},
|
||||||
#ifndef OPENSSL_NO_DH
|
#ifndef OPENSSL_NO_DH
|
||||||
{FUNC_TYPE_GENERAL,"gendh",gendh_main},
|
{FUNC_TYPE_GENERAL, "gendh", gendh_main},
|
||||||
#endif
|
#endif
|
||||||
{FUNC_TYPE_GENERAL,"errstr",errstr_main},
|
{FUNC_TYPE_GENERAL, "errstr", errstr_main},
|
||||||
{FUNC_TYPE_GENERAL,"ca",ca_main},
|
{FUNC_TYPE_GENERAL, "ca", ca_main},
|
||||||
{FUNC_TYPE_GENERAL,"crl",crl_main},
|
{FUNC_TYPE_GENERAL, "crl", crl_main},
|
||||||
#ifndef OPENSSL_NO_RSA
|
#ifndef OPENSSL_NO_RSA
|
||||||
{FUNC_TYPE_GENERAL,"rsa",rsa_main},
|
{FUNC_TYPE_GENERAL, "rsa", rsa_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_RSA
|
#ifndef OPENSSL_NO_RSA
|
||||||
{FUNC_TYPE_GENERAL,"rsautl",rsautl_main},
|
{FUNC_TYPE_GENERAL, "rsautl", rsautl_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_DSA
|
#ifndef OPENSSL_NO_DSA
|
||||||
{FUNC_TYPE_GENERAL,"dsa",dsa_main},
|
{FUNC_TYPE_GENERAL, "dsa", dsa_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_DSA
|
#ifndef OPENSSL_NO_DSA
|
||||||
{FUNC_TYPE_GENERAL,"dsaparam",dsaparam_main},
|
{FUNC_TYPE_GENERAL, "dsaparam", dsaparam_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_EC
|
#ifndef OPENSSL_NO_EC
|
||||||
{FUNC_TYPE_GENERAL,"ec",ec_main},
|
{FUNC_TYPE_GENERAL, "ec", ec_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_EC
|
#ifndef OPENSSL_NO_EC
|
||||||
{FUNC_TYPE_GENERAL,"ecparam",ecparam_main},
|
{FUNC_TYPE_GENERAL, "ecparam", ecparam_main},
|
||||||
#endif
|
#endif
|
||||||
{FUNC_TYPE_GENERAL,"x509",x509_main},
|
{FUNC_TYPE_GENERAL, "x509", x509_main},
|
||||||
#ifndef OPENSSL_NO_RSA
|
#ifndef OPENSSL_NO_RSA
|
||||||
{FUNC_TYPE_GENERAL,"genrsa",genrsa_main},
|
{FUNC_TYPE_GENERAL, "genrsa", genrsa_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_DSA
|
#ifndef OPENSSL_NO_DSA
|
||||||
{FUNC_TYPE_GENERAL,"gendsa",gendsa_main},
|
{FUNC_TYPE_GENERAL, "gendsa", gendsa_main},
|
||||||
#endif
|
#endif
|
||||||
#if !defined(OPENSSL_NO_SOCK) && !(defined(OPENSSL_NO_SSL2) && defined(OPENSSL_NO_SSL3))
|
{FUNC_TYPE_GENERAL, "genpkey", genpkey_main},
|
||||||
{FUNC_TYPE_GENERAL,"s_server",s_server_main},
|
#if !defined(OPENSSL_NO_SOCK)
|
||||||
|
{FUNC_TYPE_GENERAL, "s_server", s_server_main},
|
||||||
#endif
|
#endif
|
||||||
#if !defined(OPENSSL_NO_SOCK) && !(defined(OPENSSL_NO_SSL2) && defined(OPENSSL_NO_SSL3))
|
#if !defined(OPENSSL_NO_SOCK)
|
||||||
{FUNC_TYPE_GENERAL,"s_client",s_client_main},
|
{FUNC_TYPE_GENERAL, "s_client", s_client_main},
|
||||||
#endif
|
#endif
|
||||||
{FUNC_TYPE_GENERAL,"speed",speed_main},
|
#ifndef OPENSSL_NO_SPEED
|
||||||
#if !defined(OPENSSL_NO_SOCK) && !(defined(OPENSSL_NO_SSL2) && defined(OPENSSL_NO_SSL3))
|
{FUNC_TYPE_GENERAL, "speed", speed_main},
|
||||||
{FUNC_TYPE_GENERAL,"s_time",s_time_main},
|
|
||||||
#endif
|
#endif
|
||||||
{FUNC_TYPE_GENERAL,"version",version_main},
|
#if !defined(OPENSSL_NO_SOCK)
|
||||||
{FUNC_TYPE_GENERAL,"pkcs7",pkcs7_main},
|
{FUNC_TYPE_GENERAL, "s_time", s_time_main},
|
||||||
{FUNC_TYPE_GENERAL,"crl2pkcs7",crl2pkcs7_main},
|
|
||||||
{FUNC_TYPE_GENERAL,"sess_id",sess_id_main},
|
|
||||||
#if !defined(OPENSSL_NO_SOCK) && !(defined(OPENSSL_NO_SSL2) && defined(OPENSSL_NO_SSL3))
|
|
||||||
{FUNC_TYPE_GENERAL,"ciphers",ciphers_main},
|
|
||||||
#endif
|
#endif
|
||||||
{FUNC_TYPE_GENERAL,"nseq",nseq_main},
|
{FUNC_TYPE_GENERAL, "version", version_main},
|
||||||
|
{FUNC_TYPE_GENERAL, "pkcs7", pkcs7_main},
|
||||||
|
#ifndef OPENSSL_NO_CMS
|
||||||
|
{FUNC_TYPE_GENERAL, "cms", cms_main},
|
||||||
|
#endif
|
||||||
|
{FUNC_TYPE_GENERAL, "crl2pkcs7", crl2pkcs7_main},
|
||||||
|
{FUNC_TYPE_GENERAL, "sess_id", sess_id_main},
|
||||||
|
#if !defined(OPENSSL_NO_SOCK)
|
||||||
|
{FUNC_TYPE_GENERAL, "ciphers", ciphers_main},
|
||||||
|
#endif
|
||||||
|
{FUNC_TYPE_GENERAL, "nseq", nseq_main},
|
||||||
#if !defined(OPENSSL_NO_DES) && !defined(OPENSSL_NO_SHA1)
|
#if !defined(OPENSSL_NO_DES) && !defined(OPENSSL_NO_SHA1)
|
||||||
{FUNC_TYPE_GENERAL,"pkcs12",pkcs12_main},
|
{FUNC_TYPE_GENERAL, "pkcs12", pkcs12_main},
|
||||||
|
#endif
|
||||||
|
{FUNC_TYPE_GENERAL, "pkcs8", pkcs8_main},
|
||||||
|
{FUNC_TYPE_GENERAL, "pkey", pkey_main},
|
||||||
|
{FUNC_TYPE_GENERAL, "pkeyparam", pkeyparam_main},
|
||||||
|
{FUNC_TYPE_GENERAL, "pkeyutl", pkeyutl_main},
|
||||||
|
{FUNC_TYPE_GENERAL, "spkac", spkac_main},
|
||||||
|
{FUNC_TYPE_GENERAL, "smime", smime_main},
|
||||||
|
{FUNC_TYPE_GENERAL, "rand", rand_main},
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
{FUNC_TYPE_GENERAL, "engine", engine_main},
|
||||||
|
#endif
|
||||||
|
#ifndef OPENSSL_NO_OCSP
|
||||||
|
{FUNC_TYPE_GENERAL, "ocsp", ocsp_main},
|
||||||
|
#endif
|
||||||
|
{FUNC_TYPE_GENERAL, "prime", prime_main},
|
||||||
|
{FUNC_TYPE_GENERAL, "ts", ts_main},
|
||||||
|
#ifndef OPENSSL_NO_SRP
|
||||||
|
{FUNC_TYPE_GENERAL, "srp", srp_main},
|
||||||
#endif
|
#endif
|
||||||
{FUNC_TYPE_GENERAL,"pkcs8",pkcs8_main},
|
|
||||||
{FUNC_TYPE_GENERAL,"spkac",spkac_main},
|
|
||||||
{FUNC_TYPE_GENERAL,"smime",smime_main},
|
|
||||||
{FUNC_TYPE_GENERAL,"rand",rand_main},
|
|
||||||
{FUNC_TYPE_GENERAL,"engine",engine_main},
|
|
||||||
{FUNC_TYPE_GENERAL,"ocsp",ocsp_main},
|
|
||||||
#ifndef OPENSSL_NO_MD2
|
#ifndef OPENSSL_NO_MD2
|
||||||
{FUNC_TYPE_MD,"md2",dgst_main},
|
{FUNC_TYPE_MD, "md2", dgst_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_MD4
|
#ifndef OPENSSL_NO_MD4
|
||||||
{FUNC_TYPE_MD,"md4",dgst_main},
|
{FUNC_TYPE_MD, "md4", dgst_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_MD5
|
#ifndef OPENSSL_NO_MD5
|
||||||
{FUNC_TYPE_MD,"md5",dgst_main},
|
{FUNC_TYPE_MD, "md5", dgst_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_SHA
|
#ifndef OPENSSL_NO_SHA
|
||||||
{FUNC_TYPE_MD,"sha",dgst_main},
|
{FUNC_TYPE_MD, "sha", dgst_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_SHA1
|
#ifndef OPENSSL_NO_SHA1
|
||||||
{FUNC_TYPE_MD,"sha1",dgst_main},
|
{FUNC_TYPE_MD, "sha1", dgst_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_MDC2
|
#ifndef OPENSSL_NO_MDC2
|
||||||
{FUNC_TYPE_MD,"mdc2",dgst_main},
|
{FUNC_TYPE_MD, "mdc2", dgst_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_RMD160
|
#ifndef OPENSSL_NO_RMD160
|
||||||
{FUNC_TYPE_MD,"rmd160",dgst_main},
|
{FUNC_TYPE_MD, "rmd160", dgst_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_AES
|
#ifndef OPENSSL_NO_AES
|
||||||
{FUNC_TYPE_CIPHER,"aes-128-cbc",enc_main},
|
{FUNC_TYPE_CIPHER, "aes-128-cbc", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_AES
|
#ifndef OPENSSL_NO_AES
|
||||||
{FUNC_TYPE_CIPHER,"aes-128-ecb",enc_main},
|
{FUNC_TYPE_CIPHER, "aes-128-ecb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_AES
|
#ifndef OPENSSL_NO_AES
|
||||||
{FUNC_TYPE_CIPHER,"aes-192-cbc",enc_main},
|
{FUNC_TYPE_CIPHER, "aes-192-cbc", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_AES
|
#ifndef OPENSSL_NO_AES
|
||||||
{FUNC_TYPE_CIPHER,"aes-192-ecb",enc_main},
|
{FUNC_TYPE_CIPHER, "aes-192-ecb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_AES
|
#ifndef OPENSSL_NO_AES
|
||||||
{FUNC_TYPE_CIPHER,"aes-256-cbc",enc_main},
|
{FUNC_TYPE_CIPHER, "aes-256-cbc", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_AES
|
#ifndef OPENSSL_NO_AES
|
||||||
{FUNC_TYPE_CIPHER,"aes-256-ecb",enc_main},
|
{FUNC_TYPE_CIPHER, "aes-256-ecb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
{FUNC_TYPE_CIPHER,"base64",enc_main},
|
#ifndef OPENSSL_NO_CAMELLIA
|
||||||
#ifndef OPENSSL_NO_DES
|
{FUNC_TYPE_CIPHER, "camellia-128-cbc", enc_main},
|
||||||
{FUNC_TYPE_CIPHER,"des",enc_main},
|
#endif
|
||||||
|
#ifndef OPENSSL_NO_CAMELLIA
|
||||||
|
{FUNC_TYPE_CIPHER, "camellia-128-ecb", enc_main},
|
||||||
|
#endif
|
||||||
|
#ifndef OPENSSL_NO_CAMELLIA
|
||||||
|
{FUNC_TYPE_CIPHER, "camellia-192-cbc", enc_main},
|
||||||
|
#endif
|
||||||
|
#ifndef OPENSSL_NO_CAMELLIA
|
||||||
|
{FUNC_TYPE_CIPHER, "camellia-192-ecb", enc_main},
|
||||||
|
#endif
|
||||||
|
#ifndef OPENSSL_NO_CAMELLIA
|
||||||
|
{FUNC_TYPE_CIPHER, "camellia-256-cbc", enc_main},
|
||||||
|
#endif
|
||||||
|
#ifndef OPENSSL_NO_CAMELLIA
|
||||||
|
{FUNC_TYPE_CIPHER, "camellia-256-ecb", enc_main},
|
||||||
|
#endif
|
||||||
|
{FUNC_TYPE_CIPHER, "base64", enc_main},
|
||||||
|
#ifdef ZLIB
|
||||||
|
{FUNC_TYPE_CIPHER, "zlib", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_DES
|
#ifndef OPENSSL_NO_DES
|
||||||
{FUNC_TYPE_CIPHER,"des3",enc_main},
|
{FUNC_TYPE_CIPHER, "des", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_DES
|
#ifndef OPENSSL_NO_DES
|
||||||
{FUNC_TYPE_CIPHER,"desx",enc_main},
|
{FUNC_TYPE_CIPHER, "des3", enc_main},
|
||||||
|
#endif
|
||||||
|
#ifndef OPENSSL_NO_DES
|
||||||
|
{FUNC_TYPE_CIPHER, "desx", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_IDEA
|
#ifndef OPENSSL_NO_IDEA
|
||||||
{FUNC_TYPE_CIPHER,"idea",enc_main},
|
{FUNC_TYPE_CIPHER, "idea", enc_main},
|
||||||
|
#endif
|
||||||
|
#ifndef OPENSSL_NO_SEED
|
||||||
|
{FUNC_TYPE_CIPHER, "seed", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_RC4
|
#ifndef OPENSSL_NO_RC4
|
||||||
{FUNC_TYPE_CIPHER,"rc4",enc_main},
|
{FUNC_TYPE_CIPHER, "rc4", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_RC4
|
#ifndef OPENSSL_NO_RC4
|
||||||
{FUNC_TYPE_CIPHER,"rc4-40",enc_main},
|
{FUNC_TYPE_CIPHER, "rc4-40", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_RC2
|
#ifndef OPENSSL_NO_RC2
|
||||||
{FUNC_TYPE_CIPHER,"rc2",enc_main},
|
{FUNC_TYPE_CIPHER, "rc2", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_BF
|
#ifndef OPENSSL_NO_BF
|
||||||
{FUNC_TYPE_CIPHER,"bf",enc_main},
|
{FUNC_TYPE_CIPHER, "bf", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_CAST
|
#ifndef OPENSSL_NO_CAST
|
||||||
{FUNC_TYPE_CIPHER,"cast",enc_main},
|
{FUNC_TYPE_CIPHER, "cast", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_RC5
|
#ifndef OPENSSL_NO_RC5
|
||||||
{FUNC_TYPE_CIPHER,"rc5",enc_main},
|
{FUNC_TYPE_CIPHER, "rc5", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_DES
|
#ifndef OPENSSL_NO_DES
|
||||||
{FUNC_TYPE_CIPHER,"des-ecb",enc_main},
|
{FUNC_TYPE_CIPHER, "des-ecb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_DES
|
#ifndef OPENSSL_NO_DES
|
||||||
{FUNC_TYPE_CIPHER,"des-ede",enc_main},
|
{FUNC_TYPE_CIPHER, "des-ede", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_DES
|
#ifndef OPENSSL_NO_DES
|
||||||
{FUNC_TYPE_CIPHER,"des-ede3",enc_main},
|
{FUNC_TYPE_CIPHER, "des-ede3", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_DES
|
#ifndef OPENSSL_NO_DES
|
||||||
{FUNC_TYPE_CIPHER,"des-cbc",enc_main},
|
{FUNC_TYPE_CIPHER, "des-cbc", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_DES
|
#ifndef OPENSSL_NO_DES
|
||||||
{FUNC_TYPE_CIPHER,"des-ede-cbc",enc_main},
|
{FUNC_TYPE_CIPHER, "des-ede-cbc", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_DES
|
#ifndef OPENSSL_NO_DES
|
||||||
{FUNC_TYPE_CIPHER,"des-ede3-cbc",enc_main},
|
{FUNC_TYPE_CIPHER, "des-ede3-cbc", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_DES
|
#ifndef OPENSSL_NO_DES
|
||||||
{FUNC_TYPE_CIPHER,"des-cfb",enc_main},
|
{FUNC_TYPE_CIPHER, "des-cfb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_DES
|
#ifndef OPENSSL_NO_DES
|
||||||
{FUNC_TYPE_CIPHER,"des-ede-cfb",enc_main},
|
{FUNC_TYPE_CIPHER, "des-ede-cfb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_DES
|
#ifndef OPENSSL_NO_DES
|
||||||
{FUNC_TYPE_CIPHER,"des-ede3-cfb",enc_main},
|
{FUNC_TYPE_CIPHER, "des-ede3-cfb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_DES
|
#ifndef OPENSSL_NO_DES
|
||||||
{FUNC_TYPE_CIPHER,"des-ofb",enc_main},
|
{FUNC_TYPE_CIPHER, "des-ofb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_DES
|
#ifndef OPENSSL_NO_DES
|
||||||
{FUNC_TYPE_CIPHER,"des-ede-ofb",enc_main},
|
{FUNC_TYPE_CIPHER, "des-ede-ofb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_DES
|
#ifndef OPENSSL_NO_DES
|
||||||
{FUNC_TYPE_CIPHER,"des-ede3-ofb",enc_main},
|
{FUNC_TYPE_CIPHER, "des-ede3-ofb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_IDEA
|
#ifndef OPENSSL_NO_IDEA
|
||||||
{FUNC_TYPE_CIPHER,"idea-cbc",enc_main},
|
{FUNC_TYPE_CIPHER, "idea-cbc", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_IDEA
|
#ifndef OPENSSL_NO_IDEA
|
||||||
{FUNC_TYPE_CIPHER,"idea-ecb",enc_main},
|
{FUNC_TYPE_CIPHER, "idea-ecb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_IDEA
|
#ifndef OPENSSL_NO_IDEA
|
||||||
{FUNC_TYPE_CIPHER,"idea-cfb",enc_main},
|
{FUNC_TYPE_CIPHER, "idea-cfb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_IDEA
|
#ifndef OPENSSL_NO_IDEA
|
||||||
{FUNC_TYPE_CIPHER,"idea-ofb",enc_main},
|
{FUNC_TYPE_CIPHER, "idea-ofb", enc_main},
|
||||||
|
#endif
|
||||||
|
#ifndef OPENSSL_NO_SEED
|
||||||
|
{FUNC_TYPE_CIPHER, "seed-cbc", enc_main},
|
||||||
|
#endif
|
||||||
|
#ifndef OPENSSL_NO_SEED
|
||||||
|
{FUNC_TYPE_CIPHER, "seed-ecb", enc_main},
|
||||||
|
#endif
|
||||||
|
#ifndef OPENSSL_NO_SEED
|
||||||
|
{FUNC_TYPE_CIPHER, "seed-cfb", enc_main},
|
||||||
|
#endif
|
||||||
|
#ifndef OPENSSL_NO_SEED
|
||||||
|
{FUNC_TYPE_CIPHER, "seed-ofb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_RC2
|
#ifndef OPENSSL_NO_RC2
|
||||||
{FUNC_TYPE_CIPHER,"rc2-cbc",enc_main},
|
{FUNC_TYPE_CIPHER, "rc2-cbc", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_RC2
|
#ifndef OPENSSL_NO_RC2
|
||||||
{FUNC_TYPE_CIPHER,"rc2-ecb",enc_main},
|
{FUNC_TYPE_CIPHER, "rc2-ecb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_RC2
|
#ifndef OPENSSL_NO_RC2
|
||||||
{FUNC_TYPE_CIPHER,"rc2-cfb",enc_main},
|
{FUNC_TYPE_CIPHER, "rc2-cfb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_RC2
|
#ifndef OPENSSL_NO_RC2
|
||||||
{FUNC_TYPE_CIPHER,"rc2-ofb",enc_main},
|
{FUNC_TYPE_CIPHER, "rc2-ofb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_RC2
|
#ifndef OPENSSL_NO_RC2
|
||||||
{FUNC_TYPE_CIPHER,"rc2-64-cbc",enc_main},
|
{FUNC_TYPE_CIPHER, "rc2-64-cbc", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_RC2
|
#ifndef OPENSSL_NO_RC2
|
||||||
{FUNC_TYPE_CIPHER,"rc2-40-cbc",enc_main},
|
{FUNC_TYPE_CIPHER, "rc2-40-cbc", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_BF
|
#ifndef OPENSSL_NO_BF
|
||||||
{FUNC_TYPE_CIPHER,"bf-cbc",enc_main},
|
{FUNC_TYPE_CIPHER, "bf-cbc", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_BF
|
#ifndef OPENSSL_NO_BF
|
||||||
{FUNC_TYPE_CIPHER,"bf-ecb",enc_main},
|
{FUNC_TYPE_CIPHER, "bf-ecb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_BF
|
#ifndef OPENSSL_NO_BF
|
||||||
{FUNC_TYPE_CIPHER,"bf-cfb",enc_main},
|
{FUNC_TYPE_CIPHER, "bf-cfb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_BF
|
#ifndef OPENSSL_NO_BF
|
||||||
{FUNC_TYPE_CIPHER,"bf-ofb",enc_main},
|
{FUNC_TYPE_CIPHER, "bf-ofb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_CAST
|
#ifndef OPENSSL_NO_CAST
|
||||||
{FUNC_TYPE_CIPHER,"cast5-cbc",enc_main},
|
{FUNC_TYPE_CIPHER, "cast5-cbc", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_CAST
|
#ifndef OPENSSL_NO_CAST
|
||||||
{FUNC_TYPE_CIPHER,"cast5-ecb",enc_main},
|
{FUNC_TYPE_CIPHER, "cast5-ecb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_CAST
|
#ifndef OPENSSL_NO_CAST
|
||||||
{FUNC_TYPE_CIPHER,"cast5-cfb",enc_main},
|
{FUNC_TYPE_CIPHER, "cast5-cfb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_CAST
|
#ifndef OPENSSL_NO_CAST
|
||||||
{FUNC_TYPE_CIPHER,"cast5-ofb",enc_main},
|
{FUNC_TYPE_CIPHER, "cast5-ofb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_CAST
|
#ifndef OPENSSL_NO_CAST
|
||||||
{FUNC_TYPE_CIPHER,"cast-cbc",enc_main},
|
{FUNC_TYPE_CIPHER, "cast-cbc", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_RC5
|
#ifndef OPENSSL_NO_RC5
|
||||||
{FUNC_TYPE_CIPHER,"rc5-cbc",enc_main},
|
{FUNC_TYPE_CIPHER, "rc5-cbc", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_RC5
|
#ifndef OPENSSL_NO_RC5
|
||||||
{FUNC_TYPE_CIPHER,"rc5-ecb",enc_main},
|
{FUNC_TYPE_CIPHER, "rc5-ecb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_RC5
|
#ifndef OPENSSL_NO_RC5
|
||||||
{FUNC_TYPE_CIPHER,"rc5-cfb",enc_main},
|
{FUNC_TYPE_CIPHER, "rc5-cfb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_RC5
|
#ifndef OPENSSL_NO_RC5
|
||||||
{FUNC_TYPE_CIPHER,"rc5-ofb",enc_main},
|
{FUNC_TYPE_CIPHER, "rc5-ofb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
{0,NULL,NULL}
|
{0, NULL, NULL}
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -13,12 +13,16 @@ print <<'EOF';
|
|||||||
#define FUNC_TYPE_GENERAL 1
|
#define FUNC_TYPE_GENERAL 1
|
||||||
#define FUNC_TYPE_MD 2
|
#define FUNC_TYPE_MD 2
|
||||||
#define FUNC_TYPE_CIPHER 3
|
#define FUNC_TYPE_CIPHER 3
|
||||||
|
#define FUNC_TYPE_PKEY 4
|
||||||
|
#define FUNC_TYPE_MD_ALG 5
|
||||||
|
#define FUNC_TYPE_CIPHER_ALG 6
|
||||||
|
|
||||||
typedef struct {
|
typedef struct {
|
||||||
int type;
|
int type;
|
||||||
char *name;
|
const char *name;
|
||||||
int (*func)();
|
int (*func)(int argc,char *argv[]);
|
||||||
} FUNCTION;
|
} FUNCTION;
|
||||||
|
DECLARE_LHASH_OF(FUNCTION);
|
||||||
|
|
||||||
FUNCTION functions[] = {
|
FUNCTION functions[] = {
|
||||||
EOF
|
EOF
|
||||||
@@ -28,7 +32,11 @@ foreach (@ARGV)
|
|||||||
push(@files,$_);
|
push(@files,$_);
|
||||||
$str="\t{FUNC_TYPE_GENERAL,\"$_\",${_}_main},\n";
|
$str="\t{FUNC_TYPE_GENERAL,\"$_\",${_}_main},\n";
|
||||||
if (($_ =~ /^s_/) || ($_ =~ /^ciphers$/))
|
if (($_ =~ /^s_/) || ($_ =~ /^ciphers$/))
|
||||||
{ print "#if !defined(OPENSSL_NO_SOCK) && !(defined(OPENSSL_NO_SSL2) && defined(OPENSSL_NO_SSL3))\n${str}#endif\n"; }
|
{ print "#if !defined(OPENSSL_NO_SOCK)\n${str}#endif\n"; }
|
||||||
|
elsif ( ($_ =~ /^speed$/))
|
||||||
|
{ print "#ifndef OPENSSL_NO_SPEED\n${str}#endif\n"; }
|
||||||
|
elsif ( ($_ =~ /^engine$/))
|
||||||
|
{ print "#ifndef OPENSSL_NO_ENGINE\n${str}#endif\n"; }
|
||||||
elsif ( ($_ =~ /^rsa$/) || ($_ =~ /^genrsa$/) || ($_ =~ /^rsautl$/))
|
elsif ( ($_ =~ /^rsa$/) || ($_ =~ /^genrsa$/) || ($_ =~ /^rsautl$/))
|
||||||
{ print "#ifndef OPENSSL_NO_RSA\n${str}#endif\n"; }
|
{ print "#ifndef OPENSSL_NO_RSA\n${str}#endif\n"; }
|
||||||
elsif ( ($_ =~ /^dsa$/) || ($_ =~ /^gendsa$/) || ($_ =~ /^dsaparam$/))
|
elsif ( ($_ =~ /^dsa$/) || ($_ =~ /^gendsa$/) || ($_ =~ /^dsaparam$/))
|
||||||
@@ -39,6 +47,12 @@ foreach (@ARGV)
|
|||||||
{ print "#ifndef OPENSSL_NO_DH\n${str}#endif\n"; }
|
{ print "#ifndef OPENSSL_NO_DH\n${str}#endif\n"; }
|
||||||
elsif ( ($_ =~ /^pkcs12$/))
|
elsif ( ($_ =~ /^pkcs12$/))
|
||||||
{ print "#if !defined(OPENSSL_NO_DES) && !defined(OPENSSL_NO_SHA1)\n${str}#endif\n"; }
|
{ print "#if !defined(OPENSSL_NO_DES) && !defined(OPENSSL_NO_SHA1)\n${str}#endif\n"; }
|
||||||
|
elsif ( ($_ =~ /^cms$/))
|
||||||
|
{ print "#ifndef OPENSSL_NO_CMS\n${str}#endif\n"; }
|
||||||
|
elsif ( ($_ =~ /^ocsp$/))
|
||||||
|
{ print "#ifndef OPENSSL_NO_OCSP\n${str}#endif\n"; }
|
||||||
|
elsif ( ($_ =~ /^srp$/))
|
||||||
|
{ print "#ifndef OPENSSL_NO_SRP\n${str}#endif\n"; }
|
||||||
else
|
else
|
||||||
{ print $str; }
|
{ print $str; }
|
||||||
}
|
}
|
||||||
@@ -53,14 +67,18 @@ foreach (
|
|||||||
"aes-128-cbc", "aes-128-ecb",
|
"aes-128-cbc", "aes-128-ecb",
|
||||||
"aes-192-cbc", "aes-192-ecb",
|
"aes-192-cbc", "aes-192-ecb",
|
||||||
"aes-256-cbc", "aes-256-ecb",
|
"aes-256-cbc", "aes-256-ecb",
|
||||||
"base64",
|
"camellia-128-cbc", "camellia-128-ecb",
|
||||||
"des", "des3", "desx", "idea", "rc4", "rc4-40",
|
"camellia-192-cbc", "camellia-192-ecb",
|
||||||
|
"camellia-256-cbc", "camellia-256-ecb",
|
||||||
|
"base64", "zlib",
|
||||||
|
"des", "des3", "desx", "idea", "seed", "rc4", "rc4-40",
|
||||||
"rc2", "bf", "cast", "rc5",
|
"rc2", "bf", "cast", "rc5",
|
||||||
"des-ecb", "des-ede", "des-ede3",
|
"des-ecb", "des-ede", "des-ede3",
|
||||||
"des-cbc", "des-ede-cbc","des-ede3-cbc",
|
"des-cbc", "des-ede-cbc","des-ede3-cbc",
|
||||||
"des-cfb", "des-ede-cfb","des-ede3-cfb",
|
"des-cfb", "des-ede-cfb","des-ede3-cfb",
|
||||||
"des-ofb", "des-ede-ofb","des-ede3-ofb",
|
"des-ofb", "des-ede-ofb","des-ede3-ofb",
|
||||||
"idea-cbc","idea-ecb", "idea-cfb", "idea-ofb",
|
"idea-cbc","idea-ecb", "idea-cfb", "idea-ofb",
|
||||||
|
"seed-cbc","seed-ecb", "seed-cfb", "seed-ofb",
|
||||||
"rc2-cbc", "rc2-ecb", "rc2-cfb","rc2-ofb", "rc2-64-cbc", "rc2-40-cbc",
|
"rc2-cbc", "rc2-ecb", "rc2-cfb","rc2-ofb", "rc2-64-cbc", "rc2-40-cbc",
|
||||||
"bf-cbc", "bf-ecb", "bf-cfb", "bf-ofb",
|
"bf-cbc", "bf-ecb", "bf-cfb", "bf-ofb",
|
||||||
"cast5-cbc","cast5-ecb", "cast5-cfb","cast5-ofb",
|
"cast5-cbc","cast5-ecb", "cast5-cfb","cast5-ofb",
|
||||||
@@ -71,12 +89,15 @@ foreach (
|
|||||||
$t=sprintf("\t{FUNC_TYPE_CIPHER,\"%s\",enc_main},\n",$_);
|
$t=sprintf("\t{FUNC_TYPE_CIPHER,\"%s\",enc_main},\n",$_);
|
||||||
if ($_ =~ /des/) { $t="#ifndef OPENSSL_NO_DES\n${t}#endif\n"; }
|
if ($_ =~ /des/) { $t="#ifndef OPENSSL_NO_DES\n${t}#endif\n"; }
|
||||||
elsif ($_ =~ /aes/) { $t="#ifndef OPENSSL_NO_AES\n${t}#endif\n"; }
|
elsif ($_ =~ /aes/) { $t="#ifndef OPENSSL_NO_AES\n${t}#endif\n"; }
|
||||||
|
elsif ($_ =~ /camellia/) { $t="#ifndef OPENSSL_NO_CAMELLIA\n${t}#endif\n"; }
|
||||||
elsif ($_ =~ /idea/) { $t="#ifndef OPENSSL_NO_IDEA\n${t}#endif\n"; }
|
elsif ($_ =~ /idea/) { $t="#ifndef OPENSSL_NO_IDEA\n${t}#endif\n"; }
|
||||||
|
elsif ($_ =~ /seed/) { $t="#ifndef OPENSSL_NO_SEED\n${t}#endif\n"; }
|
||||||
elsif ($_ =~ /rc4/) { $t="#ifndef OPENSSL_NO_RC4\n${t}#endif\n"; }
|
elsif ($_ =~ /rc4/) { $t="#ifndef OPENSSL_NO_RC4\n${t}#endif\n"; }
|
||||||
elsif ($_ =~ /rc2/) { $t="#ifndef OPENSSL_NO_RC2\n${t}#endif\n"; }
|
elsif ($_ =~ /rc2/) { $t="#ifndef OPENSSL_NO_RC2\n${t}#endif\n"; }
|
||||||
elsif ($_ =~ /bf/) { $t="#ifndef OPENSSL_NO_BF\n${t}#endif\n"; }
|
elsif ($_ =~ /bf/) { $t="#ifndef OPENSSL_NO_BF\n${t}#endif\n"; }
|
||||||
elsif ($_ =~ /cast/) { $t="#ifndef OPENSSL_NO_CAST\n${t}#endif\n"; }
|
elsif ($_ =~ /cast/) { $t="#ifndef OPENSSL_NO_CAST\n${t}#endif\n"; }
|
||||||
elsif ($_ =~ /rc5/) { $t="#ifndef OPENSSL_NO_RC5\n${t}#endif\n"; }
|
elsif ($_ =~ /rc5/) { $t="#ifndef OPENSSL_NO_RC5\n${t}#endif\n"; }
|
||||||
|
elsif ($_ =~ /zlib/) { $t="#ifdef ZLIB\n${t}#endif\n"; }
|
||||||
print $t;
|
print $t;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
284
apps/rand.c
284
apps/rand.c
@@ -66,152 +66,164 @@
|
|||||||
#undef PROG
|
#undef PROG
|
||||||
#define PROG rand_main
|
#define PROG rand_main
|
||||||
|
|
||||||
/* -out file - write to file
|
/*-
|
||||||
|
* -out file - write to file
|
||||||
* -rand file:file - PRNG seed files
|
* -rand file:file - PRNG seed files
|
||||||
* -base64 - encode output
|
* -base64 - base64 encode output
|
||||||
|
* -hex - hex encode output
|
||||||
* num - write 'num' bytes
|
* num - write 'num' bytes
|
||||||
*/
|
*/
|
||||||
|
|
||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
ENGINE *e = NULL;
|
int i, r, ret = 1;
|
||||||
int i, r, ret = 1;
|
int badopt;
|
||||||
int badopt;
|
char *outfile = NULL;
|
||||||
char *outfile = NULL;
|
char *inrand = NULL;
|
||||||
char *inrand = NULL;
|
int base64 = 0;
|
||||||
int base64 = 0;
|
int hex = 0;
|
||||||
BIO *out = NULL;
|
BIO *out = NULL;
|
||||||
int num = -1;
|
int num = -1;
|
||||||
char *engine=NULL;
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
char *engine = NULL;
|
||||||
apps_startup();
|
|
||||||
|
|
||||||
if (bio_err == NULL)
|
|
||||||
if ((bio_err = BIO_new(BIO_s_file())) != NULL)
|
|
||||||
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE|BIO_FP_TEXT);
|
|
||||||
|
|
||||||
if (!load_config(bio_err, NULL))
|
|
||||||
goto err;
|
|
||||||
|
|
||||||
badopt = 0;
|
|
||||||
i = 0;
|
|
||||||
while (!badopt && argv[++i] != NULL)
|
|
||||||
{
|
|
||||||
if (strcmp(argv[i], "-out") == 0)
|
|
||||||
{
|
|
||||||
if ((argv[i+1] != NULL) && (outfile == NULL))
|
|
||||||
outfile = argv[++i];
|
|
||||||
else
|
|
||||||
badopt = 1;
|
|
||||||
}
|
|
||||||
else if (strcmp(argv[i], "-engine") == 0)
|
|
||||||
{
|
|
||||||
if ((argv[i+1] != NULL) && (engine == NULL))
|
|
||||||
engine = argv[++i];
|
|
||||||
else
|
|
||||||
badopt = 1;
|
|
||||||
}
|
|
||||||
else if (strcmp(argv[i], "-rand") == 0)
|
|
||||||
{
|
|
||||||
if ((argv[i+1] != NULL) && (inrand == NULL))
|
|
||||||
inrand = argv[++i];
|
|
||||||
else
|
|
||||||
badopt = 1;
|
|
||||||
}
|
|
||||||
else if (strcmp(argv[i], "-base64") == 0)
|
|
||||||
{
|
|
||||||
if (!base64)
|
|
||||||
base64 = 1;
|
|
||||||
else
|
|
||||||
badopt = 1;
|
|
||||||
}
|
|
||||||
else if (isdigit((unsigned char)argv[i][0]))
|
|
||||||
{
|
|
||||||
if (num < 0)
|
|
||||||
{
|
|
||||||
r = sscanf(argv[i], "%d", &num);
|
|
||||||
if (r == 0 || num < 0)
|
|
||||||
badopt = 1;
|
|
||||||
}
|
|
||||||
else
|
|
||||||
badopt = 1;
|
|
||||||
}
|
|
||||||
else
|
|
||||||
badopt = 1;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (num < 0)
|
|
||||||
badopt = 1;
|
|
||||||
|
|
||||||
if (badopt)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err, "Usage: rand [options] num\n");
|
|
||||||
BIO_printf(bio_err, "where options are\n");
|
|
||||||
BIO_printf(bio_err, "-out file - write to file\n");
|
|
||||||
BIO_printf(bio_err, "-engine e - use engine e, possibly a hardware device.\n");
|
|
||||||
BIO_printf(bio_err, "-rand file%cfile%c... - seed PRNG from files\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
|
|
||||||
BIO_printf(bio_err, "-base64 - encode output\n");
|
|
||||||
goto err;
|
|
||||||
}
|
|
||||||
|
|
||||||
e = setup_engine(bio_err, engine, 0);
|
|
||||||
|
|
||||||
app_RAND_load_file(NULL, bio_err, (inrand != NULL));
|
|
||||||
if (inrand != NULL)
|
|
||||||
BIO_printf(bio_err,"%ld semi-random bytes loaded\n",
|
|
||||||
app_RAND_load_files(inrand));
|
|
||||||
|
|
||||||
out = BIO_new(BIO_s_file());
|
|
||||||
if (out == NULL)
|
|
||||||
goto err;
|
|
||||||
if (outfile != NULL)
|
|
||||||
r = BIO_write_filename(out, outfile);
|
|
||||||
else
|
|
||||||
{
|
|
||||||
r = BIO_set_fp(out, stdout, BIO_NOCLOSE | BIO_FP_TEXT);
|
|
||||||
#ifdef OPENSSL_SYS_VMS
|
|
||||||
{
|
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
|
||||||
out = BIO_push(tmpbio, out);
|
|
||||||
}
|
|
||||||
#endif
|
#endif
|
||||||
}
|
|
||||||
if (r <= 0)
|
|
||||||
goto err;
|
|
||||||
|
|
||||||
if (base64)
|
apps_startup();
|
||||||
{
|
|
||||||
BIO *b64 = BIO_new(BIO_f_base64());
|
|
||||||
if (b64 == NULL)
|
|
||||||
goto err;
|
|
||||||
out = BIO_push(b64, out);
|
|
||||||
}
|
|
||||||
|
|
||||||
while (num > 0)
|
if (bio_err == NULL)
|
||||||
{
|
if ((bio_err = BIO_new(BIO_s_file())) != NULL)
|
||||||
unsigned char buf[4096];
|
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||||
int chunk;
|
|
||||||
|
|
||||||
chunk = num;
|
if (!load_config(bio_err, NULL))
|
||||||
if (chunk > sizeof buf)
|
goto err;
|
||||||
chunk = sizeof buf;
|
|
||||||
r = RAND_bytes(buf, chunk);
|
|
||||||
if (r <= 0)
|
|
||||||
goto err;
|
|
||||||
BIO_write(out, buf, chunk);
|
|
||||||
num -= chunk;
|
|
||||||
}
|
|
||||||
BIO_flush(out);
|
|
||||||
|
|
||||||
app_RAND_write_file(NULL, bio_err);
|
badopt = 0;
|
||||||
ret = 0;
|
i = 0;
|
||||||
|
while (!badopt && argv[++i] != NULL) {
|
||||||
|
if (strcmp(argv[i], "-out") == 0) {
|
||||||
|
if ((argv[i + 1] != NULL) && (outfile == NULL))
|
||||||
|
outfile = argv[++i];
|
||||||
|
else
|
||||||
|
badopt = 1;
|
||||||
|
}
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
else if (strcmp(argv[i], "-engine") == 0) {
|
||||||
|
if ((argv[i + 1] != NULL) && (engine == NULL))
|
||||||
|
engine = argv[++i];
|
||||||
|
else
|
||||||
|
badopt = 1;
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
else if (strcmp(argv[i], "-rand") == 0) {
|
||||||
|
if ((argv[i + 1] != NULL) && (inrand == NULL))
|
||||||
|
inrand = argv[++i];
|
||||||
|
else
|
||||||
|
badopt = 1;
|
||||||
|
} else if (strcmp(argv[i], "-base64") == 0) {
|
||||||
|
if (!base64)
|
||||||
|
base64 = 1;
|
||||||
|
else
|
||||||
|
badopt = 1;
|
||||||
|
} else if (strcmp(argv[i], "-hex") == 0) {
|
||||||
|
if (!hex)
|
||||||
|
hex = 1;
|
||||||
|
else
|
||||||
|
badopt = 1;
|
||||||
|
} else if (isdigit((unsigned char)argv[i][0])) {
|
||||||
|
if (num < 0) {
|
||||||
|
r = sscanf(argv[i], "%d", &num);
|
||||||
|
if (r == 0 || num < 0)
|
||||||
|
badopt = 1;
|
||||||
|
} else
|
||||||
|
badopt = 1;
|
||||||
|
} else
|
||||||
|
badopt = 1;
|
||||||
|
}
|
||||||
|
|
||||||
err:
|
if (hex && base64)
|
||||||
ERR_print_errors(bio_err);
|
badopt = 1;
|
||||||
if (out)
|
|
||||||
BIO_free_all(out);
|
if (num < 0)
|
||||||
apps_shutdown();
|
badopt = 1;
|
||||||
OPENSSL_EXIT(ret);
|
|
||||||
}
|
if (badopt) {
|
||||||
|
BIO_printf(bio_err, "Usage: rand [options] num\n");
|
||||||
|
BIO_printf(bio_err, "where options are\n");
|
||||||
|
BIO_printf(bio_err, "-out file - write to file\n");
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"-engine e - use engine e, possibly a hardware device.\n");
|
||||||
|
#endif
|
||||||
|
BIO_printf(bio_err, "-rand file%cfile%c... - seed PRNG from files\n",
|
||||||
|
LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
|
||||||
|
BIO_printf(bio_err, "-base64 - base64 encode output\n");
|
||||||
|
BIO_printf(bio_err, "-hex - hex encode output\n");
|
||||||
|
goto err;
|
||||||
|
}
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
setup_engine(bio_err, engine, 0);
|
||||||
|
#endif
|
||||||
|
|
||||||
|
app_RAND_load_file(NULL, bio_err, (inrand != NULL));
|
||||||
|
if (inrand != NULL)
|
||||||
|
BIO_printf(bio_err, "%ld semi-random bytes loaded\n",
|
||||||
|
app_RAND_load_files(inrand));
|
||||||
|
|
||||||
|
out = BIO_new(BIO_s_file());
|
||||||
|
if (out == NULL)
|
||||||
|
goto err;
|
||||||
|
if (outfile != NULL)
|
||||||
|
r = BIO_write_filename(out, outfile);
|
||||||
|
else {
|
||||||
|
r = BIO_set_fp(out, stdout, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||||
|
#ifdef OPENSSL_SYS_VMS
|
||||||
|
{
|
||||||
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
|
out = BIO_push(tmpbio, out);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
}
|
||||||
|
if (r <= 0)
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
if (base64) {
|
||||||
|
BIO *b64 = BIO_new(BIO_f_base64());
|
||||||
|
if (b64 == NULL)
|
||||||
|
goto err;
|
||||||
|
out = BIO_push(b64, out);
|
||||||
|
}
|
||||||
|
|
||||||
|
while (num > 0) {
|
||||||
|
unsigned char buf[4096];
|
||||||
|
int chunk;
|
||||||
|
|
||||||
|
chunk = num;
|
||||||
|
if (chunk > (int)sizeof(buf))
|
||||||
|
chunk = sizeof buf;
|
||||||
|
r = RAND_bytes(buf, chunk);
|
||||||
|
if (r <= 0)
|
||||||
|
goto err;
|
||||||
|
if (!hex)
|
||||||
|
BIO_write(out, buf, chunk);
|
||||||
|
else {
|
||||||
|
for (i = 0; i < chunk; i++)
|
||||||
|
BIO_printf(out, "%02x", buf[i]);
|
||||||
|
}
|
||||||
|
num -= chunk;
|
||||||
|
}
|
||||||
|
if (hex)
|
||||||
|
BIO_puts(out, "\n");
|
||||||
|
(void)BIO_flush(out);
|
||||||
|
|
||||||
|
app_RAND_write_file(NULL, bio_err);
|
||||||
|
ret = 0;
|
||||||
|
|
||||||
|
err:
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
if (out)
|
||||||
|
BIO_free_all(out);
|
||||||
|
apps_shutdown();
|
||||||
|
OPENSSL_EXIT(ret);
|
||||||
|
}
|
||||||
|
|||||||
2884
apps/req.c
2884
apps/req.c
File diff suppressed because it is too large
Load Diff
627
apps/rsa.c
627
apps/rsa.c
@@ -56,325 +56,384 @@
|
|||||||
* [including the GNU Public Licence.]
|
* [including the GNU Public Licence.]
|
||||||
*/
|
*/
|
||||||
|
|
||||||
|
#include <openssl/opensslconf.h>
|
||||||
#ifndef OPENSSL_NO_RSA
|
#ifndef OPENSSL_NO_RSA
|
||||||
#include <stdio.h>
|
# include <stdio.h>
|
||||||
#include <stdlib.h>
|
# include <stdlib.h>
|
||||||
#include <string.h>
|
# include <string.h>
|
||||||
#include <time.h>
|
# include <time.h>
|
||||||
#include "apps.h"
|
# include "apps.h"
|
||||||
#include <openssl/bio.h>
|
# include <openssl/bio.h>
|
||||||
#include <openssl/err.h>
|
# include <openssl/err.h>
|
||||||
#include <openssl/rsa.h>
|
# include <openssl/rsa.h>
|
||||||
#include <openssl/evp.h>
|
# include <openssl/evp.h>
|
||||||
#include <openssl/x509.h>
|
# include <openssl/x509.h>
|
||||||
#include <openssl/pem.h>
|
# include <openssl/pem.h>
|
||||||
|
# include <openssl/bn.h>
|
||||||
|
|
||||||
#undef PROG
|
# undef PROG
|
||||||
#define PROG rsa_main
|
# define PROG rsa_main
|
||||||
|
|
||||||
/* -inform arg - input format - default PEM (one of DER, NET or PEM)
|
/*-
|
||||||
|
* -inform arg - input format - default PEM (one of DER, NET or PEM)
|
||||||
* -outform arg - output format - default PEM
|
* -outform arg - output format - default PEM
|
||||||
* -in arg - input file - default stdin
|
* -in arg - input file - default stdin
|
||||||
* -out arg - output file - default stdout
|
* -out arg - output file - default stdout
|
||||||
* -des - encrypt output if PEM format with DES in cbc mode
|
* -des - encrypt output if PEM format with DES in cbc mode
|
||||||
* -des3 - encrypt output if PEM format
|
* -des3 - encrypt output if PEM format
|
||||||
* -idea - encrypt output if PEM format
|
* -idea - encrypt output if PEM format
|
||||||
* -aes128 - encrypt output if PEM format
|
* -seed - encrypt output if PEM format
|
||||||
* -aes192 - encrypt output if PEM format
|
* -aes128 - encrypt output if PEM format
|
||||||
* -aes256 - encrypt output if PEM format
|
* -aes192 - encrypt output if PEM format
|
||||||
* -text - print a text version
|
* -aes256 - encrypt output if PEM format
|
||||||
* -modulus - print the RSA key modulus
|
* -camellia128 - encrypt output if PEM format
|
||||||
* -check - verify key consistency
|
* -camellia192 - encrypt output if PEM format
|
||||||
* -pubin - Expect a public key in input file.
|
* -camellia256 - encrypt output if PEM format
|
||||||
* -pubout - Output a public key.
|
* -text - print a text version
|
||||||
|
* -modulus - print the RSA key modulus
|
||||||
|
* -check - verify key consistency
|
||||||
|
* -pubin - Expect a public key in input file.
|
||||||
|
* -pubout - Output a public key.
|
||||||
*/
|
*/
|
||||||
|
|
||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
ENGINE *e = NULL;
|
ENGINE *e = NULL;
|
||||||
int ret=1;
|
int ret = 1;
|
||||||
RSA *rsa=NULL;
|
RSA *rsa = NULL;
|
||||||
int i,badops=0, sgckey=0;
|
int i, badops = 0, sgckey = 0;
|
||||||
const EVP_CIPHER *enc=NULL;
|
const EVP_CIPHER *enc = NULL;
|
||||||
BIO *out=NULL;
|
BIO *out = NULL;
|
||||||
int informat,outformat,text=0,check=0,noout=0;
|
int informat, outformat, text = 0, check = 0, noout = 0;
|
||||||
int pubin = 0, pubout = 0;
|
int pubin = 0, pubout = 0;
|
||||||
char *infile,*outfile,*prog;
|
char *infile, *outfile, *prog;
|
||||||
char *passargin = NULL, *passargout = NULL;
|
char *passargin = NULL, *passargout = NULL;
|
||||||
char *passin = NULL, *passout = NULL;
|
char *passin = NULL, *passout = NULL;
|
||||||
char *engine=NULL;
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
int modulus=0;
|
char *engine = NULL;
|
||||||
|
# endif
|
||||||
|
int modulus = 0;
|
||||||
|
|
||||||
apps_startup();
|
int pvk_encr = 2;
|
||||||
|
|
||||||
if (bio_err == NULL)
|
apps_startup();
|
||||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
|
||||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
|
||||||
|
|
||||||
if (!load_config(bio_err, NULL))
|
if (bio_err == NULL)
|
||||||
goto end;
|
if ((bio_err = BIO_new(BIO_s_file())) != NULL)
|
||||||
|
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||||
|
|
||||||
infile=NULL;
|
if (!load_config(bio_err, NULL))
|
||||||
outfile=NULL;
|
goto end;
|
||||||
informat=FORMAT_PEM;
|
|
||||||
outformat=FORMAT_PEM;
|
|
||||||
|
|
||||||
prog=argv[0];
|
infile = NULL;
|
||||||
argc--;
|
outfile = NULL;
|
||||||
argv++;
|
informat = FORMAT_PEM;
|
||||||
while (argc >= 1)
|
outformat = FORMAT_PEM;
|
||||||
{
|
|
||||||
if (strcmp(*argv,"-inform") == 0)
|
|
||||||
{
|
|
||||||
if (--argc < 1) goto bad;
|
|
||||||
informat=str2fmt(*(++argv));
|
|
||||||
}
|
|
||||||
else if (strcmp(*argv,"-outform") == 0)
|
|
||||||
{
|
|
||||||
if (--argc < 1) goto bad;
|
|
||||||
outformat=str2fmt(*(++argv));
|
|
||||||
}
|
|
||||||
else if (strcmp(*argv,"-in") == 0)
|
|
||||||
{
|
|
||||||
if (--argc < 1) goto bad;
|
|
||||||
infile= *(++argv);
|
|
||||||
}
|
|
||||||
else if (strcmp(*argv,"-out") == 0)
|
|
||||||
{
|
|
||||||
if (--argc < 1) goto bad;
|
|
||||||
outfile= *(++argv);
|
|
||||||
}
|
|
||||||
else if (strcmp(*argv,"-passin") == 0)
|
|
||||||
{
|
|
||||||
if (--argc < 1) goto bad;
|
|
||||||
passargin= *(++argv);
|
|
||||||
}
|
|
||||||
else if (strcmp(*argv,"-passout") == 0)
|
|
||||||
{
|
|
||||||
if (--argc < 1) goto bad;
|
|
||||||
passargout= *(++argv);
|
|
||||||
}
|
|
||||||
else if (strcmp(*argv,"-engine") == 0)
|
|
||||||
{
|
|
||||||
if (--argc < 1) goto bad;
|
|
||||||
engine= *(++argv);
|
|
||||||
}
|
|
||||||
else if (strcmp(*argv,"-sgckey") == 0)
|
|
||||||
sgckey=1;
|
|
||||||
else if (strcmp(*argv,"-pubin") == 0)
|
|
||||||
pubin=1;
|
|
||||||
else if (strcmp(*argv,"-pubout") == 0)
|
|
||||||
pubout=1;
|
|
||||||
else if (strcmp(*argv,"-noout") == 0)
|
|
||||||
noout=1;
|
|
||||||
else if (strcmp(*argv,"-text") == 0)
|
|
||||||
text=1;
|
|
||||||
else if (strcmp(*argv,"-modulus") == 0)
|
|
||||||
modulus=1;
|
|
||||||
else if (strcmp(*argv,"-check") == 0)
|
|
||||||
check=1;
|
|
||||||
else if ((enc=EVP_get_cipherbyname(&(argv[0][1]))) == NULL)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"unknown option %s\n",*argv);
|
|
||||||
badops=1;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
argc--;
|
|
||||||
argv++;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (badops)
|
prog = argv[0];
|
||||||
{
|
argc--;
|
||||||
bad:
|
argv++;
|
||||||
BIO_printf(bio_err,"%s [options] <infile >outfile\n",prog);
|
while (argc >= 1) {
|
||||||
BIO_printf(bio_err,"where options are\n");
|
if (strcmp(*argv, "-inform") == 0) {
|
||||||
BIO_printf(bio_err," -inform arg input format - one of DER NET PEM\n");
|
if (--argc < 1)
|
||||||
BIO_printf(bio_err," -outform arg output format - one of DER NET PEM\n");
|
goto bad;
|
||||||
BIO_printf(bio_err," -in arg input file\n");
|
informat = str2fmt(*(++argv));
|
||||||
BIO_printf(bio_err," -sgckey Use IIS SGC key format\n");
|
} else if (strcmp(*argv, "-outform") == 0) {
|
||||||
BIO_printf(bio_err," -passin arg input file pass phrase source\n");
|
if (--argc < 1)
|
||||||
BIO_printf(bio_err," -out arg output file\n");
|
goto bad;
|
||||||
BIO_printf(bio_err," -passout arg output file pass phrase source\n");
|
outformat = str2fmt(*(++argv));
|
||||||
BIO_printf(bio_err," -des encrypt PEM output with cbc des\n");
|
} else if (strcmp(*argv, "-in") == 0) {
|
||||||
BIO_printf(bio_err," -des3 encrypt PEM output with ede cbc des using 168 bit key\n");
|
if (--argc < 1)
|
||||||
#ifndef OPENSSL_NO_IDEA
|
goto bad;
|
||||||
BIO_printf(bio_err," -idea encrypt PEM output with cbc idea\n");
|
infile = *(++argv);
|
||||||
#endif
|
} else if (strcmp(*argv, "-out") == 0) {
|
||||||
#ifndef OPENSSL_NO_AES
|
if (--argc < 1)
|
||||||
BIO_printf(bio_err," -aes128, -aes192, -aes256\n");
|
goto bad;
|
||||||
BIO_printf(bio_err," encrypt PEM output with cbc aes\n");
|
outfile = *(++argv);
|
||||||
#endif
|
} else if (strcmp(*argv, "-passin") == 0) {
|
||||||
BIO_printf(bio_err," -text print the key in text\n");
|
if (--argc < 1)
|
||||||
BIO_printf(bio_err," -noout don't print key out\n");
|
goto bad;
|
||||||
BIO_printf(bio_err," -modulus print the RSA key modulus\n");
|
passargin = *(++argv);
|
||||||
BIO_printf(bio_err," -check verify key consistency\n");
|
} else if (strcmp(*argv, "-passout") == 0) {
|
||||||
BIO_printf(bio_err," -pubin expect a public key in input file\n");
|
if (--argc < 1)
|
||||||
BIO_printf(bio_err," -pubout output a public key\n");
|
goto bad;
|
||||||
BIO_printf(bio_err," -engine e use engine e, possibly a hardware device.\n");
|
passargout = *(++argv);
|
||||||
goto end;
|
}
|
||||||
}
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
|
else if (strcmp(*argv, "-engine") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
goto bad;
|
||||||
|
engine = *(++argv);
|
||||||
|
}
|
||||||
|
# endif
|
||||||
|
else if (strcmp(*argv, "-sgckey") == 0)
|
||||||
|
sgckey = 1;
|
||||||
|
else if (strcmp(*argv, "-pubin") == 0)
|
||||||
|
pubin = 1;
|
||||||
|
else if (strcmp(*argv, "-pubout") == 0)
|
||||||
|
pubout = 1;
|
||||||
|
else if (strcmp(*argv, "-RSAPublicKey_in") == 0)
|
||||||
|
pubin = 2;
|
||||||
|
else if (strcmp(*argv, "-RSAPublicKey_out") == 0)
|
||||||
|
pubout = 2;
|
||||||
|
else if (strcmp(*argv, "-pvk-strong") == 0)
|
||||||
|
pvk_encr = 2;
|
||||||
|
else if (strcmp(*argv, "-pvk-weak") == 0)
|
||||||
|
pvk_encr = 1;
|
||||||
|
else if (strcmp(*argv, "-pvk-none") == 0)
|
||||||
|
pvk_encr = 0;
|
||||||
|
else if (strcmp(*argv, "-noout") == 0)
|
||||||
|
noout = 1;
|
||||||
|
else if (strcmp(*argv, "-text") == 0)
|
||||||
|
text = 1;
|
||||||
|
else if (strcmp(*argv, "-modulus") == 0)
|
||||||
|
modulus = 1;
|
||||||
|
else if (strcmp(*argv, "-check") == 0)
|
||||||
|
check = 1;
|
||||||
|
else if ((enc = EVP_get_cipherbyname(&(argv[0][1]))) == NULL) {
|
||||||
|
BIO_printf(bio_err, "unknown option %s\n", *argv);
|
||||||
|
badops = 1;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
argc--;
|
||||||
|
argv++;
|
||||||
|
}
|
||||||
|
|
||||||
ERR_load_crypto_strings();
|
if (badops) {
|
||||||
|
bad:
|
||||||
|
BIO_printf(bio_err, "%s [options] <infile >outfile\n", prog);
|
||||||
|
BIO_printf(bio_err, "where options are\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" -inform arg input format - one of DER NET PEM\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" -outform arg output format - one of DER NET PEM\n");
|
||||||
|
BIO_printf(bio_err, " -in arg input file\n");
|
||||||
|
BIO_printf(bio_err, " -sgckey Use IIS SGC key format\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" -passin arg input file pass phrase source\n");
|
||||||
|
BIO_printf(bio_err, " -out arg output file\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" -passout arg output file pass phrase source\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" -des encrypt PEM output with cbc des\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" -des3 encrypt PEM output with ede cbc des using 168 bit key\n");
|
||||||
|
# ifndef OPENSSL_NO_IDEA
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" -idea encrypt PEM output with cbc idea\n");
|
||||||
|
# endif
|
||||||
|
# ifndef OPENSSL_NO_SEED
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" -seed encrypt PEM output with cbc seed\n");
|
||||||
|
# endif
|
||||||
|
# ifndef OPENSSL_NO_AES
|
||||||
|
BIO_printf(bio_err, " -aes128, -aes192, -aes256\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" encrypt PEM output with cbc aes\n");
|
||||||
|
# endif
|
||||||
|
# ifndef OPENSSL_NO_CAMELLIA
|
||||||
|
BIO_printf(bio_err, " -camellia128, -camellia192, -camellia256\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" encrypt PEM output with cbc camellia\n");
|
||||||
|
# endif
|
||||||
|
BIO_printf(bio_err, " -text print the key in text\n");
|
||||||
|
BIO_printf(bio_err, " -noout don't print key out\n");
|
||||||
|
BIO_printf(bio_err, " -modulus print the RSA key modulus\n");
|
||||||
|
BIO_printf(bio_err, " -check verify key consistency\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" -pubin expect a public key in input file\n");
|
||||||
|
BIO_printf(bio_err, " -pubout output a public key\n");
|
||||||
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" -engine e use engine e, possibly a hardware device.\n");
|
||||||
|
# endif
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
e = setup_engine(bio_err, engine, 0);
|
ERR_load_crypto_strings();
|
||||||
|
|
||||||
if(!app_passwd(bio_err, passargin, passargout, &passin, &passout)) {
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
BIO_printf(bio_err, "Error getting passwords\n");
|
e = setup_engine(bio_err, engine, 0);
|
||||||
goto end;
|
# endif
|
||||||
}
|
|
||||||
|
|
||||||
if(check && pubin) {
|
if (!app_passwd(bio_err, passargin, passargout, &passin, &passout)) {
|
||||||
BIO_printf(bio_err, "Only private keys can be checked\n");
|
BIO_printf(bio_err, "Error getting passwords\n");
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
out=BIO_new(BIO_s_file());
|
if (check && pubin) {
|
||||||
|
BIO_printf(bio_err, "Only private keys can be checked\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
{
|
out = BIO_new(BIO_s_file());
|
||||||
EVP_PKEY *pkey;
|
|
||||||
|
|
||||||
if (pubin)
|
{
|
||||||
pkey = load_pubkey(bio_err, infile,
|
EVP_PKEY *pkey;
|
||||||
(informat == FORMAT_NETSCAPE && sgckey ?
|
|
||||||
FORMAT_IISSGC : informat), 1,
|
|
||||||
passin, e, "Public Key");
|
|
||||||
else
|
|
||||||
pkey = load_key(bio_err, infile,
|
|
||||||
(informat == FORMAT_NETSCAPE && sgckey ?
|
|
||||||
FORMAT_IISSGC : informat), 1,
|
|
||||||
passin, e, "Private Key");
|
|
||||||
|
|
||||||
if (pkey != NULL)
|
if (pubin) {
|
||||||
rsa = pkey == NULL ? NULL : EVP_PKEY_get1_RSA(pkey);
|
int tmpformat = -1;
|
||||||
EVP_PKEY_free(pkey);
|
if (pubin == 2) {
|
||||||
}
|
if (informat == FORMAT_PEM)
|
||||||
|
tmpformat = FORMAT_PEMRSA;
|
||||||
|
else if (informat == FORMAT_ASN1)
|
||||||
|
tmpformat = FORMAT_ASN1RSA;
|
||||||
|
} else if (informat == FORMAT_NETSCAPE && sgckey)
|
||||||
|
tmpformat = FORMAT_IISSGC;
|
||||||
|
else
|
||||||
|
tmpformat = informat;
|
||||||
|
|
||||||
if (rsa == NULL)
|
pkey = load_pubkey(bio_err, infile, tmpformat, 1,
|
||||||
{
|
passin, e, "Public Key");
|
||||||
ERR_print_errors(bio_err);
|
} else
|
||||||
goto end;
|
pkey = load_key(bio_err, infile,
|
||||||
}
|
(informat == FORMAT_NETSCAPE && sgckey ?
|
||||||
|
FORMAT_IISSGC : informat), 1,
|
||||||
|
passin, e, "Private Key");
|
||||||
|
|
||||||
if (outfile == NULL)
|
if (pkey != NULL)
|
||||||
{
|
rsa = EVP_PKEY_get1_RSA(pkey);
|
||||||
BIO_set_fp(out,stdout,BIO_NOCLOSE);
|
EVP_PKEY_free(pkey);
|
||||||
#ifdef OPENSSL_SYS_VMS
|
}
|
||||||
{
|
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
|
||||||
out = BIO_push(tmpbio, out);
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
if (BIO_write_filename(out,outfile) <= 0)
|
|
||||||
{
|
|
||||||
perror(outfile);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (text)
|
if (rsa == NULL) {
|
||||||
if (!RSA_print(out,rsa,0))
|
ERR_print_errors(bio_err);
|
||||||
{
|
goto end;
|
||||||
perror(outfile);
|
}
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (modulus)
|
if (outfile == NULL) {
|
||||||
{
|
BIO_set_fp(out, stdout, BIO_NOCLOSE);
|
||||||
BIO_printf(out,"Modulus=");
|
# ifdef OPENSSL_SYS_VMS
|
||||||
BN_print(out,rsa->n);
|
{
|
||||||
BIO_printf(out,"\n");
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
}
|
out = BIO_push(tmpbio, out);
|
||||||
|
}
|
||||||
|
# endif
|
||||||
|
} else {
|
||||||
|
if (BIO_write_filename(out, outfile) <= 0) {
|
||||||
|
perror(outfile);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
if (check)
|
if (text)
|
||||||
{
|
if (!RSA_print(out, rsa, 0)) {
|
||||||
int r = RSA_check_key(rsa);
|
perror(outfile);
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
if (r == 1)
|
if (modulus) {
|
||||||
BIO_printf(out,"RSA key ok\n");
|
BIO_printf(out, "Modulus=");
|
||||||
else if (r == 0)
|
BN_print(out, rsa->n);
|
||||||
{
|
BIO_printf(out, "\n");
|
||||||
long err;
|
}
|
||||||
|
|
||||||
while ((err = ERR_peek_error()) != 0 &&
|
if (check) {
|
||||||
ERR_GET_LIB(err) == ERR_LIB_RSA &&
|
int r = RSA_check_key(rsa);
|
||||||
ERR_GET_FUNC(err) == RSA_F_RSA_CHECK_KEY &&
|
|
||||||
ERR_GET_REASON(err) != ERR_R_MALLOC_FAILURE)
|
|
||||||
{
|
|
||||||
BIO_printf(out, "RSA key error: %s\n", ERR_reason_error_string(err));
|
|
||||||
ERR_get_error(); /* remove e from error stack */
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (r == -1 || ERR_peek_error() != 0) /* should happen only if r == -1 */
|
if (r == 1)
|
||||||
{
|
BIO_printf(out, "RSA key ok\n");
|
||||||
ERR_print_errors(bio_err);
|
else if (r == 0) {
|
||||||
goto end;
|
unsigned long err;
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (noout)
|
while ((err = ERR_peek_error()) != 0 &&
|
||||||
{
|
ERR_GET_LIB(err) == ERR_LIB_RSA &&
|
||||||
ret = 0;
|
ERR_GET_FUNC(err) == RSA_F_RSA_CHECK_KEY &&
|
||||||
goto end;
|
ERR_GET_REASON(err) != ERR_R_MALLOC_FAILURE) {
|
||||||
}
|
BIO_printf(out, "RSA key error: %s\n",
|
||||||
BIO_printf(bio_err,"writing RSA key\n");
|
ERR_reason_error_string(err));
|
||||||
if (outformat == FORMAT_ASN1) {
|
ERR_get_error(); /* remove e from error stack */
|
||||||
if(pubout || pubin) i=i2d_RSA_PUBKEY_bio(out,rsa);
|
}
|
||||||
else i=i2d_RSAPrivateKey_bio(out,rsa);
|
}
|
||||||
}
|
|
||||||
#ifndef OPENSSL_NO_RC4
|
|
||||||
else if (outformat == FORMAT_NETSCAPE)
|
|
||||||
{
|
|
||||||
unsigned char *p,*pp;
|
|
||||||
int size;
|
|
||||||
|
|
||||||
i=1;
|
if (r == -1 || ERR_peek_error() != 0) { /* should happen only if r ==
|
||||||
size=i2d_RSA_NET(rsa,NULL,NULL, sgckey);
|
* -1 */
|
||||||
if ((p=(unsigned char *)OPENSSL_malloc(size)) == NULL)
|
ERR_print_errors(bio_err);
|
||||||
{
|
goto end;
|
||||||
BIO_printf(bio_err,"Memory allocation failure\n");
|
}
|
||||||
goto end;
|
}
|
||||||
}
|
|
||||||
pp=p;
|
if (noout) {
|
||||||
i2d_RSA_NET(rsa,&p,NULL, sgckey);
|
ret = 0;
|
||||||
BIO_write(out,(char *)pp,size);
|
goto end;
|
||||||
OPENSSL_free(pp);
|
}
|
||||||
}
|
BIO_printf(bio_err, "writing RSA key\n");
|
||||||
#endif
|
if (outformat == FORMAT_ASN1) {
|
||||||
else if (outformat == FORMAT_PEM) {
|
if (pubout || pubin) {
|
||||||
if(pubout || pubin)
|
if (pubout == 2)
|
||||||
i=PEM_write_bio_RSA_PUBKEY(out,rsa);
|
i = i2d_RSAPublicKey_bio(out, rsa);
|
||||||
else i=PEM_write_bio_RSAPrivateKey(out,rsa,
|
else
|
||||||
enc,NULL,0,NULL,passout);
|
i = i2d_RSA_PUBKEY_bio(out, rsa);
|
||||||
} else {
|
} else
|
||||||
BIO_printf(bio_err,"bad output format specified for outfile\n");
|
i = i2d_RSAPrivateKey_bio(out, rsa);
|
||||||
goto end;
|
}
|
||||||
}
|
# ifndef OPENSSL_NO_RC4
|
||||||
if (!i)
|
else if (outformat == FORMAT_NETSCAPE) {
|
||||||
{
|
unsigned char *p, *pp;
|
||||||
BIO_printf(bio_err,"unable to write key\n");
|
int size;
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
}
|
i = 1;
|
||||||
else
|
size = i2d_RSA_NET(rsa, NULL, NULL, sgckey);
|
||||||
ret=0;
|
if ((p = (unsigned char *)OPENSSL_malloc(size)) == NULL) {
|
||||||
end:
|
BIO_printf(bio_err, "Memory allocation failure\n");
|
||||||
if(out != NULL) BIO_free_all(out);
|
goto end;
|
||||||
if(rsa != NULL) RSA_free(rsa);
|
}
|
||||||
if(passin) OPENSSL_free(passin);
|
pp = p;
|
||||||
if(passout) OPENSSL_free(passout);
|
i2d_RSA_NET(rsa, &p, NULL, sgckey);
|
||||||
apps_shutdown();
|
BIO_write(out, (char *)pp, size);
|
||||||
OPENSSL_EXIT(ret);
|
OPENSSL_free(pp);
|
||||||
}
|
}
|
||||||
#else /* !OPENSSL_NO_RSA */
|
# endif
|
||||||
|
else if (outformat == FORMAT_PEM) {
|
||||||
|
if (pubout || pubin) {
|
||||||
|
if (pubout == 2)
|
||||||
|
i = PEM_write_bio_RSAPublicKey(out, rsa);
|
||||||
|
else
|
||||||
|
i = PEM_write_bio_RSA_PUBKEY(out, rsa);
|
||||||
|
} else
|
||||||
|
i = PEM_write_bio_RSAPrivateKey(out, rsa,
|
||||||
|
enc, NULL, 0, NULL, passout);
|
||||||
|
# if !defined(OPENSSL_NO_DSA) && !defined(OPENSSL_NO_RC4)
|
||||||
|
} else if (outformat == FORMAT_MSBLOB || outformat == FORMAT_PVK) {
|
||||||
|
EVP_PKEY *pk;
|
||||||
|
pk = EVP_PKEY_new();
|
||||||
|
EVP_PKEY_set1_RSA(pk, rsa);
|
||||||
|
if (outformat == FORMAT_PVK)
|
||||||
|
i = i2b_PVK_bio(out, pk, pvk_encr, 0, passout);
|
||||||
|
else if (pubin || pubout)
|
||||||
|
i = i2b_PublicKey_bio(out, pk);
|
||||||
|
else
|
||||||
|
i = i2b_PrivateKey_bio(out, pk);
|
||||||
|
EVP_PKEY_free(pk);
|
||||||
|
# endif
|
||||||
|
} else {
|
||||||
|
BIO_printf(bio_err, "bad output format specified for outfile\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
if (i <= 0) {
|
||||||
|
BIO_printf(bio_err, "unable to write key\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
} else
|
||||||
|
ret = 0;
|
||||||
|
end:
|
||||||
|
if (out != NULL)
|
||||||
|
BIO_free_all(out);
|
||||||
|
if (rsa != NULL)
|
||||||
|
RSA_free(rsa);
|
||||||
|
if (passin)
|
||||||
|
OPENSSL_free(passin);
|
||||||
|
if (passout)
|
||||||
|
OPENSSL_free(passout);
|
||||||
|
apps_shutdown();
|
||||||
|
OPENSSL_EXIT(ret);
|
||||||
|
}
|
||||||
|
#else /* !OPENSSL_NO_RSA */
|
||||||
|
|
||||||
# if PEDANTIC
|
# if PEDANTIC
|
||||||
static void *dummy=&dummy;
|
static void *dummy = &dummy;
|
||||||
# endif
|
# endif
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
483
apps/rsautl.c
483
apps/rsautl.c
@@ -1,6 +1,7 @@
|
|||||||
/* rsautl.c */
|
/* rsautl.c */
|
||||||
/* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
|
/*
|
||||||
* project 2000.
|
* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL project
|
||||||
|
* 2000.
|
||||||
*/
|
*/
|
||||||
/* ====================================================================
|
/* ====================================================================
|
||||||
* Copyright (c) 2000 The OpenSSL Project. All rights reserved.
|
* Copyright (c) 2000 The OpenSSL Project. All rights reserved.
|
||||||
@@ -56,257 +57,319 @@
|
|||||||
*
|
*
|
||||||
*/
|
*/
|
||||||
|
|
||||||
|
#include <openssl/opensslconf.h>
|
||||||
#ifndef OPENSSL_NO_RSA
|
#ifndef OPENSSL_NO_RSA
|
||||||
|
|
||||||
#include "apps.h"
|
# include "apps.h"
|
||||||
#include <string.h>
|
# include <string.h>
|
||||||
#include <openssl/err.h>
|
# include <openssl/err.h>
|
||||||
#include <openssl/pem.h>
|
# include <openssl/pem.h>
|
||||||
|
# include <openssl/rsa.h>
|
||||||
|
|
||||||
#define RSA_SIGN 1
|
# define RSA_SIGN 1
|
||||||
#define RSA_VERIFY 2
|
# define RSA_VERIFY 2
|
||||||
#define RSA_ENCRYPT 3
|
# define RSA_ENCRYPT 3
|
||||||
#define RSA_DECRYPT 4
|
# define RSA_DECRYPT 4
|
||||||
|
|
||||||
#define KEY_PRIVKEY 1
|
# define KEY_PRIVKEY 1
|
||||||
#define KEY_PUBKEY 2
|
# define KEY_PUBKEY 2
|
||||||
#define KEY_CERT 3
|
# define KEY_CERT 3
|
||||||
|
|
||||||
static void usage(void);
|
static void usage(void);
|
||||||
|
|
||||||
#undef PROG
|
# undef PROG
|
||||||
|
|
||||||
#define PROG rsautl_main
|
# define PROG rsautl_main
|
||||||
|
|
||||||
int MAIN(int argc, char **);
|
int MAIN(int argc, char **);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
ENGINE *e = NULL;
|
ENGINE *e = NULL;
|
||||||
BIO *in = NULL, *out = NULL;
|
BIO *in = NULL, *out = NULL;
|
||||||
char *infile = NULL, *outfile = NULL;
|
char *infile = NULL, *outfile = NULL;
|
||||||
char *engine = NULL;
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
char *keyfile = NULL;
|
char *engine = NULL;
|
||||||
char rsa_mode = RSA_VERIFY, key_type = KEY_PRIVKEY;
|
# endif
|
||||||
int keyform = FORMAT_PEM;
|
char *keyfile = NULL;
|
||||||
char need_priv = 0, badarg = 0, rev = 0;
|
char rsa_mode = RSA_VERIFY, key_type = KEY_PRIVKEY;
|
||||||
char hexdump = 0, asn1parse = 0;
|
int keyform = FORMAT_PEM;
|
||||||
X509 *x;
|
char need_priv = 0, badarg = 0, rev = 0;
|
||||||
EVP_PKEY *pkey = NULL;
|
char hexdump = 0, asn1parse = 0;
|
||||||
RSA *rsa = NULL;
|
X509 *x;
|
||||||
unsigned char *rsa_in = NULL, *rsa_out = NULL, pad;
|
EVP_PKEY *pkey = NULL;
|
||||||
int rsa_inlen, rsa_outlen = 0;
|
RSA *rsa = NULL;
|
||||||
int keysize;
|
unsigned char *rsa_in = NULL, *rsa_out = NULL, pad;
|
||||||
|
char *passargin = NULL, *passin = NULL;
|
||||||
|
int rsa_inlen, rsa_outlen = 0;
|
||||||
|
int keysize;
|
||||||
|
|
||||||
int ret = 1;
|
int ret = 1;
|
||||||
|
|
||||||
argc--;
|
argc--;
|
||||||
argv++;
|
argv++;
|
||||||
|
|
||||||
if(!bio_err) bio_err = BIO_new_fp(stderr, BIO_NOCLOSE);
|
if (!bio_err)
|
||||||
|
bio_err = BIO_new_fp(stderr, BIO_NOCLOSE);
|
||||||
|
|
||||||
if (!load_config(bio_err, NULL))
|
if (!load_config(bio_err, NULL))
|
||||||
goto end;
|
goto end;
|
||||||
ERR_load_crypto_strings();
|
ERR_load_crypto_strings();
|
||||||
OpenSSL_add_all_algorithms();
|
OpenSSL_add_all_algorithms();
|
||||||
pad = RSA_PKCS1_PADDING;
|
pad = RSA_PKCS1_PADDING;
|
||||||
|
|
||||||
while(argc >= 1)
|
while (argc >= 1) {
|
||||||
{
|
if (!strcmp(*argv, "-in")) {
|
||||||
if (!strcmp(*argv,"-in")) {
|
if (--argc < 1)
|
||||||
if (--argc < 1) badarg = 1;
|
badarg = 1;
|
||||||
infile= *(++argv);
|
else
|
||||||
} else if (!strcmp(*argv,"-out")) {
|
infile = *(++argv);
|
||||||
if (--argc < 1) badarg = 1;
|
} else if (!strcmp(*argv, "-out")) {
|
||||||
outfile= *(++argv);
|
if (--argc < 1)
|
||||||
} else if(!strcmp(*argv, "-inkey")) {
|
badarg = 1;
|
||||||
if (--argc < 1) badarg = 1;
|
else
|
||||||
keyfile = *(++argv);
|
outfile = *(++argv);
|
||||||
} else if (strcmp(*argv,"-keyform") == 0) {
|
} else if (!strcmp(*argv, "-inkey")) {
|
||||||
if (--argc < 1) badarg = 1;
|
if (--argc < 1)
|
||||||
keyform=str2fmt(*(++argv));
|
badarg = 1;
|
||||||
} else if(!strcmp(*argv, "-engine")) {
|
else
|
||||||
if (--argc < 1) badarg = 1;
|
keyfile = *(++argv);
|
||||||
engine = *(++argv);
|
} else if (!strcmp(*argv, "-passin")) {
|
||||||
} else if(!strcmp(*argv, "-pubin")) {
|
if (--argc < 1)
|
||||||
key_type = KEY_PUBKEY;
|
badarg = 1;
|
||||||
} else if(!strcmp(*argv, "-certin")) {
|
else
|
||||||
key_type = KEY_CERT;
|
passargin = *(++argv);
|
||||||
}
|
} else if (strcmp(*argv, "-keyform") == 0) {
|
||||||
else if(!strcmp(*argv, "-asn1parse")) asn1parse = 1;
|
if (--argc < 1)
|
||||||
else if(!strcmp(*argv, "-hexdump")) hexdump = 1;
|
badarg = 1;
|
||||||
else if(!strcmp(*argv, "-raw")) pad = RSA_NO_PADDING;
|
else
|
||||||
else if(!strcmp(*argv, "-oaep")) pad = RSA_PKCS1_OAEP_PADDING;
|
keyform = str2fmt(*(++argv));
|
||||||
else if(!strcmp(*argv, "-ssl")) pad = RSA_SSLV23_PADDING;
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
else if(!strcmp(*argv, "-pkcs")) pad = RSA_PKCS1_PADDING;
|
} else if (!strcmp(*argv, "-engine")) {
|
||||||
else if(!strcmp(*argv, "-sign")) {
|
if (--argc < 1)
|
||||||
rsa_mode = RSA_SIGN;
|
badarg = 1;
|
||||||
need_priv = 1;
|
else
|
||||||
} else if(!strcmp(*argv, "-verify")) rsa_mode = RSA_VERIFY;
|
engine = *(++argv);
|
||||||
else if(!strcmp(*argv, "-rev")) rev = 1;
|
# endif
|
||||||
else if(!strcmp(*argv, "-encrypt")) rsa_mode = RSA_ENCRYPT;
|
} else if (!strcmp(*argv, "-pubin")) {
|
||||||
else if(!strcmp(*argv, "-decrypt")) {
|
key_type = KEY_PUBKEY;
|
||||||
rsa_mode = RSA_DECRYPT;
|
} else if (!strcmp(*argv, "-certin")) {
|
||||||
need_priv = 1;
|
key_type = KEY_CERT;
|
||||||
} else badarg = 1;
|
} else if (!strcmp(*argv, "-asn1parse"))
|
||||||
if(badarg) {
|
asn1parse = 1;
|
||||||
usage();
|
else if (!strcmp(*argv, "-hexdump"))
|
||||||
goto end;
|
hexdump = 1;
|
||||||
}
|
else if (!strcmp(*argv, "-raw"))
|
||||||
argc--;
|
pad = RSA_NO_PADDING;
|
||||||
argv++;
|
else if (!strcmp(*argv, "-oaep"))
|
||||||
}
|
pad = RSA_PKCS1_OAEP_PADDING;
|
||||||
|
else if (!strcmp(*argv, "-ssl"))
|
||||||
|
pad = RSA_SSLV23_PADDING;
|
||||||
|
else if (!strcmp(*argv, "-pkcs"))
|
||||||
|
pad = RSA_PKCS1_PADDING;
|
||||||
|
else if (!strcmp(*argv, "-x931"))
|
||||||
|
pad = RSA_X931_PADDING;
|
||||||
|
else if (!strcmp(*argv, "-sign")) {
|
||||||
|
rsa_mode = RSA_SIGN;
|
||||||
|
need_priv = 1;
|
||||||
|
} else if (!strcmp(*argv, "-verify"))
|
||||||
|
rsa_mode = RSA_VERIFY;
|
||||||
|
else if (!strcmp(*argv, "-rev"))
|
||||||
|
rev = 1;
|
||||||
|
else if (!strcmp(*argv, "-encrypt"))
|
||||||
|
rsa_mode = RSA_ENCRYPT;
|
||||||
|
else if (!strcmp(*argv, "-decrypt")) {
|
||||||
|
rsa_mode = RSA_DECRYPT;
|
||||||
|
need_priv = 1;
|
||||||
|
} else
|
||||||
|
badarg = 1;
|
||||||
|
if (badarg) {
|
||||||
|
usage();
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
argc--;
|
||||||
|
argv++;
|
||||||
|
}
|
||||||
|
|
||||||
if(need_priv && (key_type != KEY_PRIVKEY)) {
|
if (need_priv && (key_type != KEY_PRIVKEY)) {
|
||||||
BIO_printf(bio_err, "A private key is needed for this operation\n");
|
BIO_printf(bio_err, "A private key is needed for this operation\n");
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
e = setup_engine(bio_err, engine, 0);
|
e = setup_engine(bio_err, engine, 0);
|
||||||
|
# endif
|
||||||
|
if (!app_passwd(bio_err, passargin, NULL, &passin, NULL)) {
|
||||||
|
BIO_printf(bio_err, "Error getting password\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
/* FIXME: seed PRNG only if needed */
|
/* FIXME: seed PRNG only if needed */
|
||||||
app_RAND_load_file(NULL, bio_err, 0);
|
app_RAND_load_file(NULL, bio_err, 0);
|
||||||
|
|
||||||
switch(key_type) {
|
switch (key_type) {
|
||||||
case KEY_PRIVKEY:
|
case KEY_PRIVKEY:
|
||||||
pkey = load_key(bio_err, keyfile, keyform, 0,
|
pkey = load_key(bio_err, keyfile, keyform, 0,
|
||||||
NULL, e, "Private Key");
|
passin, e, "Private Key");
|
||||||
break;
|
break;
|
||||||
|
|
||||||
case KEY_PUBKEY:
|
case KEY_PUBKEY:
|
||||||
pkey = load_pubkey(bio_err, keyfile, keyform, 0,
|
pkey = load_pubkey(bio_err, keyfile, keyform, 0,
|
||||||
NULL, e, "Public Key");
|
NULL, e, "Public Key");
|
||||||
break;
|
break;
|
||||||
|
|
||||||
case KEY_CERT:
|
case KEY_CERT:
|
||||||
x = load_cert(bio_err, keyfile, keyform,
|
x = load_cert(bio_err, keyfile, keyform, NULL, e, "Certificate");
|
||||||
NULL, e, "Certificate");
|
if (x) {
|
||||||
if(x) {
|
pkey = X509_get_pubkey(x);
|
||||||
pkey = X509_get_pubkey(x);
|
X509_free(x);
|
||||||
X509_free(x);
|
}
|
||||||
}
|
break;
|
||||||
break;
|
}
|
||||||
}
|
|
||||||
|
|
||||||
if(!pkey) {
|
if (!pkey) {
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
rsa = EVP_PKEY_get1_RSA(pkey);
|
rsa = EVP_PKEY_get1_RSA(pkey);
|
||||||
EVP_PKEY_free(pkey);
|
EVP_PKEY_free(pkey);
|
||||||
|
|
||||||
if(!rsa) {
|
if (!rsa) {
|
||||||
BIO_printf(bio_err, "Error getting RSA key\n");
|
BIO_printf(bio_err, "Error getting RSA key\n");
|
||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (infile) {
|
||||||
|
if (!(in = BIO_new_file(infile, "rb"))) {
|
||||||
|
BIO_printf(bio_err, "Error Reading Input File\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
} else
|
||||||
|
in = BIO_new_fp(stdin, BIO_NOCLOSE);
|
||||||
|
|
||||||
if(infile) {
|
if (outfile) {
|
||||||
if(!(in = BIO_new_file(infile, "rb"))) {
|
if (!(out = BIO_new_file(outfile, "wb"))) {
|
||||||
BIO_printf(bio_err, "Error Reading Input File\n");
|
BIO_printf(bio_err, "Error Reading Output File\n");
|
||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
} else in = BIO_new_fp(stdin, BIO_NOCLOSE);
|
} else {
|
||||||
|
out = BIO_new_fp(stdout, BIO_NOCLOSE);
|
||||||
|
# ifdef OPENSSL_SYS_VMS
|
||||||
|
{
|
||||||
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
|
out = BIO_push(tmpbio, out);
|
||||||
|
}
|
||||||
|
# endif
|
||||||
|
}
|
||||||
|
|
||||||
if(outfile) {
|
keysize = RSA_size(rsa);
|
||||||
if(!(out = BIO_new_file(outfile, "wb"))) {
|
|
||||||
BIO_printf(bio_err, "Error Reading Output File\n");
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
out = BIO_new_fp(stdout, BIO_NOCLOSE);
|
|
||||||
#ifdef OPENSSL_SYS_VMS
|
|
||||||
{
|
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
|
||||||
out = BIO_push(tmpbio, out);
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
}
|
|
||||||
|
|
||||||
keysize = RSA_size(rsa);
|
rsa_in = OPENSSL_malloc(keysize * 2);
|
||||||
|
rsa_out = OPENSSL_malloc(keysize);
|
||||||
|
if (!rsa_in || !rsa_out) {
|
||||||
|
BIO_printf(bio_err, "Out of memory\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
rsa_in = OPENSSL_malloc(keysize * 2);
|
/* Read the input data */
|
||||||
rsa_out = OPENSSL_malloc(keysize);
|
rsa_inlen = BIO_read(in, rsa_in, keysize * 2);
|
||||||
|
if (rsa_inlen <= 0) {
|
||||||
|
BIO_printf(bio_err, "Error reading input Data\n");
|
||||||
|
exit(1);
|
||||||
|
}
|
||||||
|
if (rev) {
|
||||||
|
int i;
|
||||||
|
unsigned char ctmp;
|
||||||
|
for (i = 0; i < rsa_inlen / 2; i++) {
|
||||||
|
ctmp = rsa_in[i];
|
||||||
|
rsa_in[i] = rsa_in[rsa_inlen - 1 - i];
|
||||||
|
rsa_in[rsa_inlen - 1 - i] = ctmp;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
switch (rsa_mode) {
|
||||||
|
|
||||||
/* Read the input data */
|
case RSA_VERIFY:
|
||||||
rsa_inlen = BIO_read(in, rsa_in, keysize * 2);
|
rsa_outlen = RSA_public_decrypt(rsa_inlen, rsa_in, rsa_out, rsa, pad);
|
||||||
if(rsa_inlen <= 0) {
|
break;
|
||||||
BIO_printf(bio_err, "Error reading input Data\n");
|
|
||||||
exit(1);
|
|
||||||
}
|
|
||||||
if(rev) {
|
|
||||||
int i;
|
|
||||||
unsigned char ctmp;
|
|
||||||
for(i = 0; i < rsa_inlen/2; i++) {
|
|
||||||
ctmp = rsa_in[i];
|
|
||||||
rsa_in[i] = rsa_in[rsa_inlen - 1 - i];
|
|
||||||
rsa_in[rsa_inlen - 1 - i] = ctmp;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
switch(rsa_mode) {
|
|
||||||
|
|
||||||
case RSA_VERIFY:
|
case RSA_SIGN:
|
||||||
rsa_outlen = RSA_public_decrypt(rsa_inlen, rsa_in, rsa_out, rsa, pad);
|
rsa_outlen =
|
||||||
break;
|
RSA_private_encrypt(rsa_inlen, rsa_in, rsa_out, rsa, pad);
|
||||||
|
break;
|
||||||
|
|
||||||
case RSA_SIGN:
|
case RSA_ENCRYPT:
|
||||||
rsa_outlen = RSA_private_encrypt(rsa_inlen, rsa_in, rsa_out, rsa, pad);
|
rsa_outlen = RSA_public_encrypt(rsa_inlen, rsa_in, rsa_out, rsa, pad);
|
||||||
break;
|
break;
|
||||||
|
|
||||||
case RSA_ENCRYPT:
|
case RSA_DECRYPT:
|
||||||
rsa_outlen = RSA_public_encrypt(rsa_inlen, rsa_in, rsa_out, rsa, pad);
|
rsa_outlen =
|
||||||
break;
|
RSA_private_decrypt(rsa_inlen, rsa_in, rsa_out, rsa, pad);
|
||||||
|
break;
|
||||||
|
|
||||||
case RSA_DECRYPT:
|
}
|
||||||
rsa_outlen = RSA_private_decrypt(rsa_inlen, rsa_in, rsa_out, rsa, pad);
|
|
||||||
break;
|
|
||||||
|
|
||||||
}
|
if (rsa_outlen <= 0) {
|
||||||
|
BIO_printf(bio_err, "RSA operation error\n");
|
||||||
if(rsa_outlen <= 0) {
|
ERR_print_errors(bio_err);
|
||||||
BIO_printf(bio_err, "RSA operation error\n");
|
goto end;
|
||||||
ERR_print_errors(bio_err);
|
}
|
||||||
goto end;
|
ret = 0;
|
||||||
}
|
if (asn1parse) {
|
||||||
ret = 0;
|
if (!ASN1_parse_dump(out, rsa_out, rsa_outlen, 1, -1)) {
|
||||||
if(asn1parse) {
|
ERR_print_errors(bio_err);
|
||||||
if(!ASN1_parse_dump(out, rsa_out, rsa_outlen, 1, -1)) {
|
}
|
||||||
ERR_print_errors(bio_err);
|
} else if (hexdump)
|
||||||
}
|
BIO_dump(out, (char *)rsa_out, rsa_outlen);
|
||||||
} else if(hexdump) BIO_dump(out, (char *)rsa_out, rsa_outlen);
|
else
|
||||||
else BIO_write(out, rsa_out, rsa_outlen);
|
BIO_write(out, rsa_out, rsa_outlen);
|
||||||
end:
|
end:
|
||||||
RSA_free(rsa);
|
RSA_free(rsa);
|
||||||
BIO_free(in);
|
BIO_free(in);
|
||||||
BIO_free_all(out);
|
BIO_free_all(out);
|
||||||
if(rsa_in) OPENSSL_free(rsa_in);
|
if (rsa_in)
|
||||||
if(rsa_out) OPENSSL_free(rsa_out);
|
OPENSSL_free(rsa_in);
|
||||||
return ret;
|
if (rsa_out)
|
||||||
|
OPENSSL_free(rsa_out);
|
||||||
|
if (passin)
|
||||||
|
OPENSSL_free(passin);
|
||||||
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
static void usage()
|
static void usage()
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err, "Usage: rsautl [options]\n");
|
BIO_printf(bio_err, "Usage: rsautl [options]\n");
|
||||||
BIO_printf(bio_err, "-in file input file\n");
|
BIO_printf(bio_err, "-in file input file\n");
|
||||||
BIO_printf(bio_err, "-out file output file\n");
|
BIO_printf(bio_err, "-out file output file\n");
|
||||||
BIO_printf(bio_err, "-inkey file input key\n");
|
BIO_printf(bio_err, "-inkey file input key\n");
|
||||||
BIO_printf(bio_err, "-keyform arg private key format - default PEM\n");
|
BIO_printf(bio_err, "-keyform arg private key format - default PEM\n");
|
||||||
BIO_printf(bio_err, "-pubin input is an RSA public\n");
|
BIO_printf(bio_err, "-pubin input is an RSA public\n");
|
||||||
BIO_printf(bio_err, "-certin input is a certificate carrying an RSA public key\n");
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err, "-ssl use SSL v2 padding\n");
|
"-certin input is a certificate carrying an RSA public key\n");
|
||||||
BIO_printf(bio_err, "-raw use no padding\n");
|
BIO_printf(bio_err, "-ssl use SSL v2 padding\n");
|
||||||
BIO_printf(bio_err, "-pkcs use PKCS#1 v1.5 padding (default)\n");
|
BIO_printf(bio_err, "-raw use no padding\n");
|
||||||
BIO_printf(bio_err, "-oaep use PKCS#1 OAEP\n");
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err, "-sign sign with private key\n");
|
"-pkcs use PKCS#1 v1.5 padding (default)\n");
|
||||||
BIO_printf(bio_err, "-verify verify with public key\n");
|
BIO_printf(bio_err, "-oaep use PKCS#1 OAEP\n");
|
||||||
BIO_printf(bio_err, "-encrypt encrypt with public key\n");
|
BIO_printf(bio_err, "-sign sign with private key\n");
|
||||||
BIO_printf(bio_err, "-decrypt decrypt with private key\n");
|
BIO_printf(bio_err, "-verify verify with public key\n");
|
||||||
BIO_printf(bio_err, "-hexdump hex dump output\n");
|
BIO_printf(bio_err, "-encrypt encrypt with public key\n");
|
||||||
BIO_printf(bio_err, "-engine e use engine e, possibly a hardware device.\n");
|
BIO_printf(bio_err, "-decrypt decrypt with private key\n");
|
||||||
|
BIO_printf(bio_err, "-hexdump hex dump output\n");
|
||||||
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"-engine e use engine e, possibly a hardware device.\n");
|
||||||
|
BIO_printf(bio_err, "-passin arg pass phrase source\n");
|
||||||
|
# endif
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#else /* !OPENSSL_NO_RSA */
|
||||||
|
|
||||||
|
# if PEDANTIC
|
||||||
|
static void *dummy = &dummy;
|
||||||
|
# endif
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
@@ -108,53 +108,77 @@
|
|||||||
* Hudson (tjh@cryptsoft.com).
|
* Hudson (tjh@cryptsoft.com).
|
||||||
*
|
*
|
||||||
*/
|
*/
|
||||||
|
/* conflicts with winsock2 stuff on netware */
|
||||||
#include <sys/types.h>
|
#if !defined(OPENSSL_SYS_NETWARE)
|
||||||
|
# include <sys/types.h>
|
||||||
|
#endif
|
||||||
#include <openssl/opensslconf.h>
|
#include <openssl/opensslconf.h>
|
||||||
|
|
||||||
#if defined(OPENSSL_SYS_VMS) && !defined(FD_SET)
|
#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS)
|
||||||
/* VAX C does not defined fd_set and friends, but it's actually quite simple */
|
# include <conio.h>
|
||||||
/* These definitions are borrowed from SOCKETSHR. /Richard Levitte */
|
#endif
|
||||||
#define MAX_NOFILE 32
|
|
||||||
#define NBBY 8 /* number of bits in a byte */
|
|
||||||
|
|
||||||
#ifndef FD_SETSIZE
|
#if defined(OPENSSL_SYS_MSDOS) && !defined(_WIN32)
|
||||||
#define FD_SETSIZE MAX_NOFILE
|
# define _kbhit kbhit
|
||||||
#endif /* FD_SETSIZE */
|
#endif
|
||||||
|
|
||||||
|
#if defined(OPENSSL_SYS_VMS) && !defined(FD_SET)
|
||||||
|
/*
|
||||||
|
* VAX C does not defined fd_set and friends, but it's actually quite simple
|
||||||
|
*/
|
||||||
|
/* These definitions are borrowed from SOCKETSHR. /Richard Levitte */
|
||||||
|
# define MAX_NOFILE 32
|
||||||
|
# define NBBY 8 /* number of bits in a byte */
|
||||||
|
|
||||||
|
# ifndef FD_SETSIZE
|
||||||
|
# define FD_SETSIZE MAX_NOFILE
|
||||||
|
# endif /* FD_SETSIZE */
|
||||||
|
|
||||||
/* How many things we'll allow select to use. 0 if unlimited */
|
/* How many things we'll allow select to use. 0 if unlimited */
|
||||||
#define MAXSELFD MAX_NOFILE
|
# define MAXSELFD MAX_NOFILE
|
||||||
typedef int fd_mask; /* int here! VMS prototypes int, not long */
|
typedef int fd_mask; /* int here! VMS prototypes int, not long */
|
||||||
#define NFDBITS (sizeof(fd_mask) * NBBY) /* bits per mask (power of 2!)*/
|
# define NFDBITS (sizeof(fd_mask) * NBBY)/* bits per mask (power of 2!) */
|
||||||
#define NFDSHIFT 5 /* Shift based on above */
|
# define NFDSHIFT 5 /* Shift based on above */
|
||||||
|
|
||||||
typedef fd_mask fd_set;
|
typedef fd_mask fd_set;
|
||||||
#define FD_SET(n, p) (*(p) |= (1 << ((n) % NFDBITS)))
|
# define FD_SET(n, p) (*(p) |= (1 << ((n) % NFDBITS)))
|
||||||
#define FD_CLR(n, p) (*(p) &= ~(1 << ((n) % NFDBITS)))
|
# define FD_CLR(n, p) (*(p) &= ~(1 << ((n) % NFDBITS)))
|
||||||
#define FD_ISSET(n, p) (*(p) & (1 << ((n) % NFDBITS)))
|
# define FD_ISSET(n, p) (*(p) & (1 << ((n) % NFDBITS)))
|
||||||
#define FD_ZERO(p) memset((char *)(p), 0, sizeof(*(p)))
|
# define FD_ZERO(p) memset((char *)(p), 0, sizeof(*(p)))
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#define PORT 4433
|
#define PORT 4433
|
||||||
#define PORT_STR "4433"
|
#define PORT_STR "4433"
|
||||||
#define PROTOCOL "tcp"
|
#define PROTOCOL "tcp"
|
||||||
|
|
||||||
int do_server(int port, int *ret, int (*cb) (), char *context);
|
int do_server(int port, int type, int *ret,
|
||||||
|
int (*cb) (char *hostname, int s, unsigned char *context),
|
||||||
|
unsigned char *context);
|
||||||
#ifdef HEADER_X509_H
|
#ifdef HEADER_X509_H
|
||||||
int MS_CALLBACK verify_callback(int ok, X509_STORE_CTX *ctx);
|
int MS_CALLBACK verify_callback(int ok, X509_STORE_CTX *ctx);
|
||||||
#endif
|
#endif
|
||||||
#ifdef HEADER_SSL_H
|
#ifdef HEADER_SSL_H
|
||||||
int set_cert_stuff(SSL_CTX *ctx, char *cert_file, char *key_file);
|
int set_cert_stuff(SSL_CTX *ctx, char *cert_file, char *key_file);
|
||||||
|
int set_cert_key_stuff(SSL_CTX *ctx, X509 *cert, EVP_PKEY *key);
|
||||||
#endif
|
#endif
|
||||||
int init_client(int *sock, char *server, int port);
|
int init_client(int *sock, char *server, int port, int type);
|
||||||
int should_retry(int i);
|
int should_retry(int i);
|
||||||
int extract_port(char *str, short *port_ptr);
|
int extract_port(char *str, short *port_ptr);
|
||||||
int extract_host_port(char *str,char **host_ptr,unsigned char *ip,short *p);
|
int extract_host_port(char *str, char **host_ptr, unsigned char *ip,
|
||||||
|
short *p);
|
||||||
|
|
||||||
long MS_CALLBACK bio_dump_cb(BIO *bio, int cmd, const char *argp,
|
long MS_CALLBACK bio_dump_callback(BIO *bio, int cmd, const char *argp,
|
||||||
int argi, long argl, long ret);
|
int argi, long argl, long ret);
|
||||||
|
|
||||||
#ifdef HEADER_SSL_H
|
#ifdef HEADER_SSL_H
|
||||||
void MS_CALLBACK apps_ssl_info_callback(const SSL *s, int where, int ret);
|
void MS_CALLBACK apps_ssl_info_callback(const SSL *s, int where, int ret);
|
||||||
void MS_CALLBACK msg_cb(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg);
|
void MS_CALLBACK msg_cb(int write_p, int version, int content_type,
|
||||||
|
const void *buf, size_t len, SSL *ssl, void *arg);
|
||||||
|
void MS_CALLBACK tlsext_cb(SSL *s, int client_server, int type,
|
||||||
|
unsigned char *data, int len, void *arg);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
int MS_CALLBACK generate_cookie_callback(SSL *ssl, unsigned char *cookie,
|
||||||
|
unsigned int *cookie_len);
|
||||||
|
int MS_CALLBACK verify_cookie_callback(SSL *ssl, unsigned char *cookie,
|
||||||
|
unsigned int cookie_len);
|
||||||
|
|||||||
1121
apps/s_cb.c
1121
apps/s_cb.c
File diff suppressed because it is too large
Load Diff
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user