Compare commits
1866 Commits
rsaref
...
AFTER_COMP
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
a13ec6774d | ||
|
|
77e2de7ea7 | ||
|
|
606efc54e6 | ||
|
|
7711de24f9 | ||
|
|
eee6c81af8 | ||
|
|
b89670ef0e | ||
|
|
0fccb00b5b | ||
|
|
72da660ddb | ||
|
|
46ffee4792 | ||
|
|
c0a953650b | ||
|
|
0424fe1a8f | ||
|
|
544a2aea4b | ||
|
|
60e5f36d27 | ||
|
|
2469361c0f | ||
|
|
6fa865a325 | ||
|
|
e9ba69631b | ||
|
|
d80a8d1919 | ||
|
|
d0ff2a237b | ||
|
|
6e5dd63c77 | ||
|
|
dc014d43af | ||
|
|
2f9cf160e4 | ||
|
|
336c35dc9e | ||
|
|
72b5215645 | ||
|
|
06bed64317 | ||
|
|
c559759265 | ||
|
|
b4000e8ad8 | ||
|
|
21d5ed98d5 | ||
|
|
e9a182fa30 | ||
|
|
b6db386ffd | ||
|
|
2c975b501d | ||
|
|
279fe3b1c5 | ||
|
|
98a9092af1 | ||
|
|
87108f5af9 | ||
|
|
f257d984b7 | ||
|
|
b889d6a8e8 | ||
|
|
47234cd3d2 | ||
|
|
2c8d0dccfc | ||
|
|
a4f576a378 | ||
|
|
3def5a010e | ||
|
|
294bd1e2f3 | ||
|
|
253ef2187c | ||
|
|
c0455cbb18 | ||
|
|
17e2c77a77 | ||
|
|
b52f3818f4 | ||
|
|
cc12975514 | ||
|
|
9738f395c6 | ||
|
|
d4294c8984 | ||
|
|
8df61b5011 | ||
|
|
f1e6643751 | ||
|
|
6991bf196c | ||
|
|
822a4c1bdb | ||
|
|
a5868b3fe2 | ||
|
|
4edfacb983 | ||
|
|
c6efe6f59e | ||
|
|
35c2b3a9ac | ||
|
|
af9675e75a | ||
|
|
8b2f9cdfad | ||
|
|
01682a8b3c | ||
|
|
8b07f23c30 | ||
|
|
45932ad508 | ||
|
|
ce94682ce1 | ||
|
|
2d7ab7e9ea | ||
|
|
6176df94ed | ||
|
|
a8f8788248 | ||
|
|
d5d007abe3 | ||
|
|
151457ab16 | ||
|
|
dde3e83129 | ||
|
|
8f182fdc69 | ||
|
|
1064acafc4 | ||
|
|
ff8e412ceb | ||
|
|
e9cbcb1d98 | ||
|
|
ea7fc0311c | ||
|
|
30911232c1 | ||
|
|
2940a1298e | ||
|
|
f916052eab | ||
|
|
2fb3f002d0 | ||
|
|
82b0bf0b87 | ||
|
|
3a7cef3e76 | ||
|
|
592c0e0273 | ||
|
|
08b977b5a5 | ||
|
|
85fb12d554 | ||
|
|
b975183c41 | ||
|
|
083100e2ab | ||
|
|
241d2ba1da | ||
|
|
e4fb49775b | ||
|
|
381a146dc6 | ||
|
|
b4a262832a | ||
|
|
6d498d478e | ||
|
|
d0561b5c2d | ||
|
|
4f4b192402 | ||
|
|
0ae1661ba2 | ||
|
|
4e9ef338fc | ||
|
|
d16e1131b4 | ||
|
|
a18894d159 | ||
|
|
dfee50ecd9 | ||
|
|
10189984f9 | ||
|
|
d8425465a3 | ||
|
|
1fc02dcf6a | ||
|
|
83d092f785 | ||
|
|
4825092bbe | ||
|
|
bbd79bdf03 | ||
|
|
a096e9b719 | ||
|
|
ddab25a90d | ||
|
|
ffbe98b763 | ||
|
|
d7a9bb0a2a | ||
|
|
0d81c69b8e | ||
|
|
401cd0af0f | ||
|
|
c7b41e67f0 | ||
|
|
003144a8e8 | ||
|
|
af1cb47e65 | ||
|
|
e8e7fbdb16 | ||
|
|
d5c21afd4b | ||
|
|
1afa967909 | ||
|
|
85b7b80434 | ||
|
|
fe0f662310 | ||
|
|
90453438ff | ||
|
|
2e63f3b733 | ||
|
|
125cc35b59 | ||
|
|
7e58aa7d71 | ||
|
|
be3d90de02 | ||
|
|
82652aaf17 | ||
|
|
17d6bb8158 | ||
|
|
11c26ecf81 | ||
|
|
99d5b23023 | ||
|
|
611ba3f4a1 | ||
|
|
af28dd6c75 | ||
|
|
e79ec456be | ||
|
|
3e268d2717 | ||
|
|
c46acbacde | ||
|
|
304d90425f | ||
|
|
bfaa8a89e1 | ||
|
|
de941e289e | ||
|
|
1d28453529 | ||
|
|
690ecff795 | ||
|
|
234c73767d | ||
|
|
497810cae7 | ||
|
|
cbc9d9713d | ||
|
|
98fa4fe8c5 | ||
|
|
0b4c91c0fc | ||
|
|
b9b43196e1 | ||
|
|
bf6a9e66d6 | ||
|
|
0c372b94f7 | ||
|
|
26e1237380 | ||
|
|
4882171df5 | ||
|
|
931627e6a0 | ||
|
|
274a2c9970 | ||
|
|
006fcc22a8 | ||
|
|
709c51c424 | ||
|
|
9bc448546e | ||
|
|
0dc092334b | ||
|
|
36c194638e | ||
|
|
45fb737950 | ||
|
|
a01273bae3 | ||
|
|
2c17323e15 | ||
|
|
870694b3da | ||
|
|
87a4b4d1f4 | ||
|
|
8ecf5104b3 | ||
|
|
2b3aeffbbd | ||
|
|
2c2f9e2cc3 | ||
|
|
2d9b1b3ffa | ||
|
|
f070480275 | ||
|
|
49f1597de2 | ||
|
|
b44e425f39 | ||
|
|
93683c3cf8 | ||
|
|
a08ee55e2d | ||
|
|
3bac6d9479 | ||
|
|
5c5143de48 | ||
|
|
c8cd7d9e0f | ||
|
|
e0a6cdcf30 | ||
|
|
a0ecb9b8fc | ||
|
|
4bf4bc784f | ||
|
|
9437fef8cc | ||
|
|
16b0384bd2 | ||
|
|
87ebdd8a71 | ||
|
|
7d68189d8a | ||
|
|
26414ee013 | ||
|
|
5c62f68e14 | ||
|
|
0d22b5dace | ||
|
|
023ec151df | ||
|
|
59dbdb51dc | ||
|
|
92d1bc09cb | ||
|
|
d62bfb39cd | ||
|
|
ce4b274aa1 | ||
|
|
334f1842fc | ||
|
|
b12540520d | ||
|
|
0d7b9b8b7e | ||
|
|
31188ee1a8 | ||
|
|
4a3e6bce79 | ||
|
|
a3829cb720 | ||
|
|
e84be9b495 | ||
|
|
3a3ca3f515 | ||
|
|
032c49b8b3 | ||
|
|
3208ff58ca | ||
|
|
6707d22a40 | ||
|
|
3647bee263 | ||
|
|
e2aebccba1 | ||
|
|
3e563bcea7 | ||
|
|
92f91ff48b | ||
|
|
b3dfaaa143 | ||
|
|
5b7848a345 | ||
|
|
915c6a21ba | ||
|
|
58706d595b | ||
|
|
236be53269 | ||
|
|
1fc1bd382b | ||
|
|
a60033f106 | ||
|
|
3613e6fc57 | ||
|
|
f8e21776f9 | ||
|
|
006723cf76 | ||
|
|
aa89bcd279 | ||
|
|
f19759a182 | ||
|
|
d009bcbfb6 | ||
|
|
4b71f63ac0 | ||
|
|
3adb8c3854 | ||
|
|
02e666d59f | ||
|
|
5b2d6ff07e | ||
|
|
877b2fbd3c | ||
|
|
afeab58a3c | ||
|
|
744c49a81b | ||
|
|
9c5b91fd0b | ||
|
|
290d3eab76 | ||
|
|
46dae77c23 | ||
|
|
a6cd870784 | ||
|
|
97879bcd57 | ||
|
|
ab1dee1efc | ||
|
|
e072aa535d | ||
|
|
48f9859d2a | ||
|
|
48b5083ca0 | ||
|
|
cd64618674 | ||
|
|
5d7e960adf | ||
|
|
f0d6ee6be8 | ||
|
|
e65991f977 | ||
|
|
3e83e686ba | ||
|
|
8f06b00373 | ||
|
|
1dea1f4509 | ||
|
|
44411db8e0 | ||
|
|
23ac7a1407 | ||
|
|
dda640835f | ||
|
|
6cc3700314 | ||
|
|
cc1489d2f2 | ||
|
|
016029c69f | ||
|
|
516b848286 | ||
|
|
c4202285ef | ||
|
|
49e045482a | ||
|
|
d8309efc72 | ||
|
|
f43acc8a50 | ||
|
|
ba47f5c9b0 | ||
|
|
4d94ae00d5 | ||
|
|
60d8bae30d | ||
|
|
0caec9e8f8 | ||
|
|
4f85a2e21e | ||
|
|
945e15a253 | ||
|
|
1fe198b6f9 | ||
|
|
78d6603aad | ||
|
|
7241ae1a0a | ||
|
|
5f58d6a5e0 | ||
|
|
acfe628b6e | ||
|
|
182d8435f0 | ||
|
|
4de920c91d | ||
|
|
3cd039dd8f | ||
|
|
81269a81ee | ||
|
|
3537525e00 | ||
|
|
d38f3ad1ee | ||
|
|
e083f91497 | ||
|
|
ba2cad19cf | ||
|
|
db0a1efcc9 | ||
|
|
9074521458 | ||
|
|
f924200e1b | ||
|
|
de2f6e4dae | ||
|
|
44bdb056d4 | ||
|
|
c31bbf1e68 | ||
|
|
5e68f8ce15 | ||
|
|
b9a3ef4c6e | ||
|
|
1955b87423 | ||
|
|
866eedb936 | ||
|
|
f701551f36 | ||
|
|
adc4df3616 | ||
|
|
1199e2d8cf | ||
|
|
0f180d1d1d | ||
|
|
072569e0f1 | ||
|
|
ba9786e4b8 | ||
|
|
613599ffff | ||
|
|
c9c21d3b89 | ||
|
|
d0d046eca2 | ||
|
|
2a81428489 | ||
|
|
7073e9e2a0 | ||
|
|
d866df33a1 | ||
|
|
b77fcddb6b | ||
|
|
f6fbd470e3 | ||
|
|
63810d8566 | ||
|
|
123c401967 | ||
|
|
a3fffd648b | ||
|
|
2d57b73a50 | ||
|
|
f14845d999 | ||
|
|
80bb905d3d | ||
|
|
a297985f42 | ||
|
|
404dcc5e8e | ||
|
|
8242a6a9fc | ||
|
|
17bcb8d465 | ||
|
|
72165799a8 | ||
|
|
f1c2a9de45 | ||
|
|
52b66a622d | ||
|
|
273db408a8 | ||
|
|
957b6db3b1 | ||
|
|
a14e2d9dfe | ||
|
|
a8b94d6409 | ||
|
|
fe19c448f0 | ||
|
|
fcf6473199 | ||
|
|
1285221370 | ||
|
|
5dcf517d84 | ||
|
|
9b2f486c9e | ||
|
|
24995f3a10 | ||
|
|
0fc5cf0870 | ||
|
|
f78d4a35f8 | ||
|
|
df5eaa8a52 | ||
|
|
6ce46d69f5 | ||
|
|
575e664a7c | ||
|
|
7389c848d4 | ||
|
|
4d393410f3 | ||
|
|
bd69750360 | ||
|
|
c9501c223f | ||
|
|
9dd5ae6553 | ||
|
|
e1e876072d | ||
|
|
dd2589494f | ||
|
|
1cfa8a397f | ||
|
|
bdae099862 | ||
|
|
cca28b291c | ||
|
|
062d3e39e7 | ||
|
|
e29f478a7a | ||
|
|
1b58b616e3 | ||
|
|
c70d381775 | ||
|
|
508d8b1617 | ||
|
|
8c74b5e56c | ||
|
|
c59ba5b528 | ||
|
|
45d87a1ffe | ||
|
|
a3feb21bbe | ||
|
|
37530362fa | ||
|
|
fd69886aed | ||
|
|
fd795679bb | ||
|
|
e523f5f389 | ||
|
|
e4dd79bbc8 | ||
|
|
bc37d996fc | ||
|
|
31cafe53c9 | ||
|
|
dc4ddcd2bb | ||
|
|
5256b021f3 | ||
|
|
1bb68d62ab | ||
|
|
4ab1e7ceaf | ||
|
|
06623ff028 | ||
|
|
67d48c8cc8 | ||
|
|
d59fb0dd2f | ||
|
|
245f44e2ab | ||
|
|
e5d6528a12 | ||
|
|
980afccf98 | ||
|
|
9bd2cd745f | ||
|
|
015fbde807 | ||
|
|
ba1b888384 | ||
|
|
6f9079fd50 | ||
|
|
c938563a81 | ||
|
|
40928698bb | ||
|
|
138d8ab0c7 | ||
|
|
47cc5525a2 | ||
|
|
67fec850e1 | ||
|
|
82db6e1646 | ||
|
|
e7227322b3 | ||
|
|
a5595fde9a | ||
|
|
95f8c7195c | ||
|
|
dcbbf83dba | ||
|
|
3c89d78dba | ||
|
|
84fcd6f83e | ||
|
|
a92ae07091 | ||
|
|
68809d3969 | ||
|
|
d6a89fcf88 | ||
|
|
ef5f6a08ff | ||
|
|
7c517a04b1 | ||
|
|
d78e52987e | ||
|
|
755cc53a6e | ||
|
|
1226c472b7 | ||
|
|
4d7072f4b5 | ||
|
|
b5348a095d | ||
|
|
66df02fd98 | ||
|
|
206eb6a11d | ||
|
|
f11fd3f4e1 | ||
|
|
29b108f939 | ||
|
|
31106cc750 | ||
|
|
ff3fa48fc7 | ||
|
|
87166e1fb6 | ||
|
|
f3e24baddf | ||
|
|
a6977ee73d | ||
|
|
d4704d5245 | ||
|
|
8f0edcb3d2 | ||
|
|
35e25255e0 | ||
|
|
c3fbf5d9a8 | ||
|
|
55e42c93a8 | ||
|
|
6a0dec9584 | ||
|
|
21a85f1977 | ||
|
|
322de0c8c1 | ||
|
|
6a9af68b56 | ||
|
|
b6e4dac217 | ||
|
|
8a0a9392ab | ||
|
|
bcbe4e5254 | ||
|
|
47ff5c6279 | ||
|
|
898f856c44 | ||
|
|
883b0c2274 | ||
|
|
4f94d1a8b1 | ||
|
|
1d4581c2dd | ||
|
|
c05940edc7 | ||
|
|
c507a16e49 | ||
|
|
308f028e28 | ||
|
|
e4a6cf421a | ||
|
|
329636d6e3 | ||
|
|
9163b8fb23 | ||
|
|
a542db90c6 | ||
|
|
a7ce69dbd7 | ||
|
|
9d93ce246c | ||
|
|
76c4336c43 | ||
|
|
e71adb85c5 | ||
|
|
033c51f0a3 | ||
|
|
452d1595a6 | ||
|
|
0d197a833c | ||
|
|
e0031b80ee | ||
|
|
b19941ab05 | ||
|
|
752938daab | ||
|
|
c78515f55e | ||
|
|
3ba1f11147 | ||
|
|
bbc206fdf7 | ||
|
|
2bd065dfbe | ||
|
|
6d7dbc12f2 | ||
|
|
83c40e7fc0 | ||
|
|
b5fe234588 | ||
|
|
e1a00d7d1d | ||
|
|
acf60ef707 | ||
|
|
c85a157854 | ||
|
|
0c5d16e4f5 | ||
|
|
bd2af5e707 | ||
|
|
58d55afa6f | ||
|
|
6343e2fac3 | ||
|
|
b476df64a1 | ||
|
|
1d46b6b3b9 | ||
|
|
bbb35447c4 | ||
|
|
6276f1e100 | ||
|
|
5b8a57ecae | ||
|
|
817dfc18a3 | ||
|
|
0b0b2a8087 | ||
|
|
c23d16ac19 | ||
|
|
1b28ed575b | ||
|
|
135c0af1bb | ||
|
|
475918410b | ||
|
|
3102792161 | ||
|
|
a291182757 | ||
|
|
b26ca3408c | ||
|
|
83978bd37a | ||
|
|
a3790c0d01 | ||
|
|
63b6090f7c | ||
|
|
c5571db0c2 | ||
|
|
e0457d5f7c | ||
|
|
ae52ec9869 | ||
|
|
0b33bc6b72 | ||
|
|
7aa983c6db | ||
|
|
2b90b1f344 | ||
|
|
65123f8064 | ||
|
|
1d8634b110 | ||
|
|
29e0c30c2a | ||
|
|
cf82191d77 | ||
|
|
3a8a0a3945 | ||
|
|
c5d4ab7e35 | ||
|
|
b955dbd325 | ||
|
|
45582d1e2b | ||
|
|
60c50cbf9c | ||
|
|
3a3619b46a | ||
|
|
b83eddc578 | ||
|
|
7f558334ad | ||
|
|
6229a5607c | ||
|
|
6acc3b9689 | ||
|
|
66aa856698 | ||
|
|
f559f31bef | ||
|
|
3210b4fd14 | ||
|
|
a7b42009c4 | ||
|
|
7b5ffd6834 | ||
|
|
9b55da73ca | ||
|
|
e7156ff2e8 | ||
|
|
437db75b94 | ||
|
|
1586365835 | ||
|
|
7d5b04db4e | ||
|
|
48b0cf8b10 | ||
|
|
b693f941fd | ||
|
|
c602e7f4e8 | ||
|
|
1fc6d41bf6 | ||
|
|
a41477f92e | ||
|
|
5f68c5feef | ||
|
|
ee84a5a7fb | ||
|
|
66d3e7481e | ||
|
|
0e21156333 | ||
|
|
f533b7780e | ||
|
|
cc2f5a8022 | ||
|
|
b441bf9226 | ||
|
|
2a9aca32dc | ||
|
|
89da653fa6 | ||
|
|
af50b58c3f | ||
|
|
4d635a7001 | ||
|
|
ce15d5a9dc | ||
|
|
ba1c602281 | ||
|
|
cfc781be6e | ||
|
|
84acc3c2bc | ||
|
|
c2e4f17c1a | ||
|
|
979689aa5c | ||
|
|
a3faebd104 | ||
|
|
025c7737b2 | ||
|
|
513d4b4c16 | ||
|
|
7ef701519b | ||
|
|
50d194af4d | ||
|
|
287973746e | ||
|
|
f1558bb424 | ||
|
|
6ca487992b | ||
|
|
cf3a5cebd7 | ||
|
|
a661b65357 | ||
|
|
98e6654938 | ||
|
|
cecd263878 | ||
|
|
31fe950d2b | ||
|
|
db6a87d8cc | ||
|
|
7beb408771 | ||
|
|
51008ffce1 | ||
|
|
3811eed8d5 | ||
|
|
581f1c8494 | ||
|
|
41ebed27fa | ||
|
|
bf21446a2a | ||
|
|
e72d734d5f | ||
|
|
20d2186c87 | ||
|
|
9ba3ec9176 | ||
|
|
8f71fb8d98 | ||
|
|
48948d53b6 | ||
|
|
dbec19622e | ||
|
|
2ce15df528 | ||
|
|
681bfae499 | ||
|
|
5dd955dcd2 | ||
|
|
56fa8e69cf | ||
|
|
67d0738aba | ||
|
|
b8a61e7362 | ||
|
|
dd5e774664 | ||
|
|
6b86bad5ef | ||
|
|
712557128b | ||
|
|
3009e9f9ef | ||
|
|
b30245dae0 | ||
|
|
116daf4c2f | ||
|
|
cb40bdaf57 | ||
|
|
4b12506891 | ||
|
|
cf98440178 | ||
|
|
c500d44735 | ||
|
|
18eda73234 | ||
|
|
7526e2c043 | ||
|
|
6d52f260bf | ||
|
|
752f2b6785 | ||
|
|
e1c279b63d | ||
|
|
467889703a | ||
|
|
3a457cca86 | ||
|
|
285046ec51 | ||
|
|
f8000b9345 | ||
|
|
77a8eb352f | ||
|
|
114697bef3 | ||
|
|
2aa9043ad3 | ||
|
|
1a095560f7 | ||
|
|
f329b8d73b | ||
|
|
3d90a32429 | ||
|
|
e3a7463c5d | ||
|
|
796c6eadcb | ||
|
|
b485e5b7e3 | ||
|
|
d1cc7b8f22 | ||
|
|
1cf9d58cb4 | ||
|
|
0cff933416 | ||
|
|
c41b29e5db | ||
|
|
65fb3fa630 | ||
|
|
0b0f08dbc7 | ||
|
|
5c32657c80 | ||
|
|
07cee70258 | ||
|
|
4ba163cbf9 | ||
|
|
2bfb2398e3 | ||
|
|
a4a8f7b3ef | ||
|
|
34c66925aa | ||
|
|
cb7fd76f57 | ||
|
|
de822715b2 | ||
|
|
89f534e1d3 | ||
|
|
d46c1a8126 | ||
|
|
e32587d5a6 | ||
|
|
7876e4488f | ||
|
|
1a19f83d4c | ||
|
|
db8c838c6a | ||
|
|
37da54b10e | ||
|
|
0fea7ed4a4 | ||
|
|
dbeac560aa | ||
|
|
89eeccacde | ||
|
|
c9fc143972 | ||
|
|
004aa803a9 | ||
|
|
c921a5e1d4 | ||
|
|
0b4b9a11f5 | ||
|
|
d7e0299792 | ||
|
|
9dfdf0ad1d | ||
|
|
3b04cdd706 | ||
|
|
11a57c7be5 | ||
|
|
b370230b78 | ||
|
|
50a381b789 | ||
|
|
534aaf3731 | ||
|
|
6dc5d570d0 | ||
|
|
cb78486d97 | ||
|
|
9c9aa4f145 | ||
|
|
b6d1e52d45 | ||
|
|
f185e725a0 | ||
|
|
591ccf586d | ||
|
|
b7061c61b0 | ||
|
|
8a428200a6 | ||
|
|
10b2328fea | ||
|
|
98c2a26ea6 | ||
|
|
965b6dad44 | ||
|
|
a3d8c0fc5d | ||
|
|
a32d795aae | ||
|
|
ef3dc028ef | ||
|
|
2413a3975f | ||
|
|
3b0b5abae3 | ||
|
|
b49124f6d9 | ||
|
|
2260ad21fb | ||
|
|
6b0e9facf4 | ||
|
|
c404ff7955 | ||
|
|
8e2f6b79ea | ||
|
|
ee60d9fb28 | ||
|
|
be6d77005f | ||
|
|
b263b66746 | ||
|
|
5294dd705d | ||
|
|
2b67158673 | ||
|
|
db744f8950 | ||
|
|
e059b19ddb | ||
|
|
997a54c981 | ||
|
|
b78e502104 | ||
|
|
b6d0054a52 | ||
|
|
117df10db4 | ||
|
|
d300bcca7f | ||
|
|
d59c3e5046 | ||
|
|
6d8566f2eb | ||
|
|
4e1b0d8904 | ||
|
|
8ce2912fbc | ||
|
|
1372965e2e | ||
|
|
1a1422643b | ||
|
|
409960491d | ||
|
|
96bd6f730a | ||
|
|
c0f5dd070b | ||
|
|
9d7a8d3578 | ||
|
|
4dec4f646d | ||
|
|
2cb924b052 | ||
|
|
51ac0cfe44 | ||
|
|
16e819e1d8 | ||
|
|
1023cfe70d | ||
|
|
8e0a2d8461 | ||
|
|
e13ae96d7c | ||
|
|
9f29ec4721 | ||
|
|
b9a20b5057 | ||
|
|
c2222c2ea2 | ||
|
|
336da5642d | ||
|
|
8573fa1806 | ||
|
|
a52c2fb296 | ||
|
|
41450b27f2 | ||
|
|
e72d5983f2 | ||
|
|
5a85385387 | ||
|
|
5e54b4f364 | ||
|
|
5ba372b17c | ||
|
|
f9b0f47c0c | ||
|
|
4deeadf7dc | ||
|
|
384eff877c | ||
|
|
68dbba9817 | ||
|
|
ea7150b070 | ||
|
|
cb42ce0b67 | ||
|
|
e8330cf5ac | ||
|
|
7d34470458 | ||
|
|
f1047cebea | ||
|
|
da8a2e6f90 | ||
|
|
546ec5a9b3 | ||
|
|
e3fefbfd56 | ||
|
|
3b80e3aa9e | ||
|
|
14cfde9c83 | ||
|
|
9cabef963c | ||
|
|
ce9eab79a7 | ||
|
|
e9e202cfa8 | ||
|
|
d83ae69455 | ||
|
|
bb4f7a8d52 | ||
|
|
619b2c03dc | ||
|
|
aa4c2de10e | ||
|
|
6c36f7a9f2 | ||
|
|
78f7923580 | ||
|
|
978ebf0141 | ||
|
|
a9ed4da8eb | ||
|
|
e1a4814cd4 | ||
|
|
3cad81f6fe | ||
|
|
4450107afb | ||
|
|
908efd3b73 | ||
|
|
1a7691c059 | ||
|
|
f524ddbe04 | ||
|
|
541814c403 | ||
|
|
5013540224 | ||
|
|
94cb5ee63c | ||
|
|
fc9c61bc3b | ||
|
|
e815d3015e | ||
|
|
dc2a33d680 | ||
|
|
7ba45bf133 | ||
|
|
d98a4b7366 | ||
|
|
889a54c467 | ||
|
|
9d07fd03e3 | ||
|
|
a8a1878256 | ||
|
|
5b46eee0f5 | ||
|
|
e5e6a94fbf | ||
|
|
d9ff889073 | ||
|
|
e4decc418a | ||
|
|
cf5bfbfc21 | ||
|
|
567fef894e | ||
|
|
6ee2a1365e | ||
|
|
435037d4e4 | ||
|
|
c5de8996cc | ||
|
|
2dc5383a20 | ||
|
|
9391f97715 | ||
|
|
5b16639538 | ||
|
|
1738bb61e1 | ||
|
|
91b3f0e691 | ||
|
|
6ac4e8bd6e | ||
|
|
983495c4b2 | ||
|
|
931a23a5a5 | ||
|
|
72849dce81 | ||
|
|
2618893114 | ||
|
|
36026dfc01 | ||
|
|
79aa04ef27 | ||
|
|
3a0799977b | ||
|
|
e19ea55783 | ||
|
|
8716dbea40 | ||
|
|
e9bc66c84f | ||
|
|
c078798c60 | ||
|
|
de73cca923 | ||
|
|
b1051789d6 | ||
|
|
4db73c1bb8 | ||
|
|
3ae34e3a8c | ||
|
|
1f3b65801b | ||
|
|
5e2c4e23f4 | ||
|
|
35780c2139 | ||
|
|
ceff5fec5a | ||
|
|
4897dc4056 | ||
|
|
35e33f0e52 | ||
|
|
a844e27baa | ||
|
|
0783bf151c | ||
|
|
566bdf2bda | ||
|
|
eb6dc02b23 | ||
|
|
78435364ec | ||
|
|
5cbc2e8bc1 | ||
|
|
e7cf7fcd21 | ||
|
|
bb8aab0211 | ||
|
|
0fbf5f7102 | ||
|
|
f1b2807478 | ||
|
|
faacb092f8 | ||
|
|
b439a74620 | ||
|
|
3132ab8ce6 | ||
|
|
bfd7bb3eb6 | ||
|
|
11c8f0b79d | ||
|
|
c4068186ac | ||
|
|
0a93a68020 | ||
|
|
f2ab7d1392 | ||
|
|
c41ab9ade5 | ||
|
|
141e584998 | ||
|
|
336736ef35 | ||
|
|
df7cb13525 | ||
|
|
d93eb21c7c | ||
|
|
a403188f92 | ||
|
|
82b2230527 | ||
|
|
a8a004987c | ||
|
|
0e36019977 | ||
|
|
354c3ace73 | ||
|
|
52129c0b0b | ||
|
|
a52877a2f1 | ||
|
|
cdd7c3ce92 | ||
|
|
c1497b4d19 | ||
|
|
b2ed462934 | ||
|
|
bb766a0ad6 | ||
|
|
b65f851318 | ||
|
|
35bf35411c | ||
|
|
54fbc77dc8 | ||
|
|
9e09eebf94 | ||
|
|
45a2f93906 | ||
|
|
6982c0da4e | ||
|
|
b7727ee616 | ||
|
|
f0446ca8d7 | ||
|
|
6bc847e49e | ||
|
|
3f1c4e49a3 | ||
|
|
37a7cd1a11 | ||
|
|
3a2d9c4dd0 | ||
|
|
e51d1321fc | ||
|
|
b9fdb3eb99 | ||
|
|
d66ace9da5 | ||
|
|
db75357110 | ||
|
|
0713f8abe6 | ||
|
|
93d9121a77 | ||
|
|
92dad6cc84 | ||
|
|
61454a9f8c | ||
|
|
bb2297a41d | ||
|
|
75e98d0563 | ||
|
|
e9eb000c53 | ||
|
|
1ba01caaa3 | ||
|
|
5cd6571fae | ||
|
|
6383bbe525 | ||
|
|
06da6e4977 | ||
|
|
b72faddc47 | ||
|
|
d92f0bb6e9 | ||
|
|
710e5d5639 | ||
|
|
6da980e2b5 | ||
|
|
37f599bcec | ||
|
|
8408f4fbc7 | ||
|
|
534164ef90 | ||
|
|
e32c852e1e | ||
|
|
dbfc0f8c2b | ||
|
|
3728974460 | ||
|
|
fdc2bbcacb | ||
|
|
c2a3358b60 | ||
|
|
882e891284 | ||
|
|
05bbf78afd | ||
|
|
99ecb90a99 | ||
|
|
dbad169019 | ||
|
|
3ba5d1cf2e | ||
|
|
be2e2c3297 | ||
|
|
ed0015284b | ||
|
|
6d03b73e35 | ||
|
|
622d3d3592 | ||
|
|
0e06354402 | ||
|
|
62c271610b | ||
|
|
db089ad60d | ||
|
|
1f0c9ad7e1 | ||
|
|
06efc222f9 | ||
|
|
de3333bae4 | ||
|
|
924875e53b | ||
|
|
3a64458217 | ||
|
|
ea71c22731 | ||
|
|
dc706cd35f | ||
|
|
1241126adf | ||
|
|
19da130053 | ||
|
|
a75b191502 | ||
|
|
e5cb260365 | ||
|
|
6aecef815c | ||
|
|
daba492c3a | ||
|
|
24cff6ced5 | ||
|
|
ac7b42610f | ||
|
|
7abe76e1bd | ||
|
|
7bc03ded12 | ||
|
|
ea3b8af50a | ||
|
|
badb910f3c | ||
|
|
3866752e7e | ||
|
|
3e3dac9f97 | ||
|
|
397ba0f08a | ||
|
|
07ad8f5d17 | ||
|
|
47c3448a97 | ||
|
|
4db48ec0bd | ||
|
|
c518ade1fd | ||
|
|
acdf4afb91 | ||
|
|
6d3dec92fb | ||
|
|
2d3b6a5be7 | ||
|
|
81d1998e09 | ||
|
|
6b46ca135a | ||
|
|
fa293e4e4b | ||
|
|
24cbf3efc6 | ||
|
|
534a1ed0cb | ||
|
|
ee306a1332 | ||
|
|
45442167b0 | ||
|
|
131645ecce | ||
|
|
f1ca5f5b89 | ||
|
|
e452de9d87 | ||
|
|
a0256f462a | ||
|
|
82d5d46c14 | ||
|
|
0665dd6852 | ||
|
|
98fc09b18a | ||
|
|
192ebef8cf | ||
|
|
b01ab14338 | ||
|
|
2a96235bf7 | ||
|
|
1cf9bf00f4 | ||
|
|
a5224c3420 | ||
|
|
af436bc158 | ||
|
|
ab603c6987 | ||
|
|
9c11a0e541 | ||
|
|
8de83bf876 | ||
|
|
679df234b7 | ||
|
|
26eaab0990 | ||
|
|
7be96d7c9f | ||
|
|
d11493934c | ||
|
|
c62da732a4 | ||
|
|
a1a63a4239 | ||
|
|
103a434386 | ||
|
|
567671e291 | ||
|
|
d8a750ee7f | ||
|
|
9c10b2c8d3 | ||
|
|
56a106115f | ||
|
|
e9ad0d2c31 | ||
|
|
97639f0d73 | ||
|
|
e3a4f8b84c | ||
|
|
7e99812432 | ||
|
|
2a1ef75435 | ||
|
|
c148d70978 | ||
|
|
7b6055d1af | ||
|
|
f31b12503e | ||
|
|
f82197ad75 | ||
|
|
3f37e73bae | ||
|
|
0774f470d9 | ||
|
|
d7a9e91688 | ||
|
|
601cb9be20 | ||
|
|
f3229ee19a | ||
|
|
219a3580b7 | ||
|
|
d63c6bd397 | ||
|
|
fdb61e583a | ||
|
|
b8e2f83ae6 | ||
|
|
93dbd83570 | ||
|
|
5be022712a | ||
|
|
43f9391bcc | ||
|
|
c1c971654b | ||
|
|
72b1072fbd | ||
|
|
3bfd99bfbb | ||
|
|
a169e82065 | ||
|
|
c80410c50c | ||
|
|
dc01b6b1f2 | ||
|
|
b7a26e6daf | ||
|
|
ce16450a89 | ||
|
|
9d2e51c199 | ||
|
|
1e325f6149 | ||
|
|
c458a33196 | ||
|
|
7953b8ff1b | ||
|
|
b1460627f3 | ||
|
|
5abc8ae6f9 | ||
|
|
6a184a6098 | ||
|
|
3d5e97f560 | ||
|
|
54c7559a7e | ||
|
|
0c9de428ae | ||
|
|
f13def508c | ||
|
|
1ae6ddac91 | ||
|
|
55dcfa421c | ||
|
|
c04f8cf44a | ||
|
|
870d986131 | ||
|
|
4f272c17f5 | ||
|
|
fd3e027faa | ||
|
|
235dd0a22a | ||
|
|
b589977b9e | ||
|
|
291e4a6ebe | ||
|
|
2d2ed9dffd | ||
|
|
8ada6e7705 | ||
|
|
7f657f342a | ||
|
|
20e8f0ee27 | ||
|
|
429266b7e4 | ||
|
|
2c7bc88d78 | ||
|
|
54f7ebe789 | ||
|
|
dd499e74de | ||
|
|
19a6e8b32c | ||
|
|
ed5538dc2b | ||
|
|
b8ffcf49ed | ||
|
|
eb929eef14 | ||
|
|
2cd3ad9bdd | ||
|
|
323f289c48 | ||
|
|
a45e4a5537 | ||
|
|
b7fe2f9675 | ||
|
|
6dcd1c9109 | ||
|
|
2fe5adc36c | ||
|
|
839590f576 | ||
|
|
e0a8d1f94e | ||
|
|
9ad0f6812f | ||
|
|
a3376fe8fc | ||
|
|
3cc1f498a1 | ||
|
|
c6c0035ea5 | ||
|
|
531d630b5c | ||
|
|
853b1eb424 | ||
|
|
09a2615fb2 | ||
|
|
285b42756a | ||
|
|
508f15cdab | ||
|
|
52c0d30078 | ||
|
|
10997ee8ab | ||
|
|
8a774dc9a6 | ||
|
|
200bc9e3e8 | ||
|
|
7dd0ee0495 | ||
|
|
76569fc662 | ||
|
|
f2a253e0dd | ||
|
|
0ad0eaf61c | ||
|
|
47b0f48dd9 | ||
|
|
44e48abc44 | ||
|
|
f420de027f | ||
|
|
ecf186065c | ||
|
|
20e021bf41 | ||
|
|
8ca2ae775d | ||
|
|
ee8aa8217a | ||
|
|
2b49dd1e8f | ||
|
|
30a54b9085 | ||
|
|
1e7e62f8cd | ||
|
|
5352823fbf | ||
|
|
20251f01ea | ||
|
|
528f6b81db | ||
|
|
27bfba299e | ||
|
|
1690863acc | ||
|
|
397211323c | ||
|
|
a87f50fb5a | ||
|
|
31bc51c8cf | ||
|
|
be487c429e | ||
|
|
80340f1fe9 | ||
|
|
d918f85146 | ||
|
|
a95541d61e | ||
|
|
30b4c2724e | ||
|
|
2adc929367 | ||
|
|
7e97837274 | ||
|
|
4cb73bf8e4 | ||
|
|
79bb8d0077 | ||
|
|
6c1a3e4f58 | ||
|
|
76c919c1a3 | ||
|
|
98405f240b | ||
|
|
181355616e | ||
|
|
b49a5b2dc0 | ||
|
|
713f226114 | ||
|
|
d57d85ff35 | ||
|
|
74daa124c2 | ||
|
|
b8e35bd66e | ||
|
|
e8734731d3 | ||
|
|
9e0fcabeca | ||
|
|
6482dec1bb | ||
|
|
81b5eeed6a | ||
|
|
365359dd79 | ||
|
|
2757be06de | ||
|
|
d0afe49d3e | ||
|
|
81b31b7087 | ||
|
|
2643b122fc | ||
|
|
88db657ac2 | ||
|
|
1f0af2c073 | ||
|
|
2ed2d1515e | ||
|
|
bb5b16a36c | ||
|
|
5892855c5f | ||
|
|
a6e859e9ec | ||
|
|
99c65cef0f | ||
|
|
496da8b918 | ||
|
|
739862384c | ||
|
|
0a647c2b8b | ||
|
|
429e4f0de8 | ||
|
|
2d10c7156c | ||
|
|
299053becd | ||
|
|
1449bda052 | ||
|
|
56bb1a7c83 | ||
|
|
96aaf806d8 | ||
|
|
d70e5100c0 | ||
|
|
4831e626aa | ||
|
|
33ab4699ba | ||
|
|
595cc5b4b8 | ||
|
|
29fb08c2de | ||
|
|
7babdf2029 | ||
|
|
4b3270f78e | ||
|
|
3351b8d007 | ||
|
|
4b49bf6a93 | ||
|
|
926a56bfe3 | ||
|
|
d6f188be71 | ||
|
|
016cadfb54 | ||
|
|
bdee69f718 | ||
|
|
ff43e2e155 | ||
|
|
f53948856e | ||
|
|
14056ee2ee | ||
|
|
b545dc6775 | ||
|
|
027902999e | ||
|
|
9a310a5d4e | ||
|
|
a63d5eaab2 | ||
|
|
6af59bc095 | ||
|
|
24cc290b85 | ||
|
|
8e264a933f | ||
|
|
f0b54fefe9 | ||
|
|
cf2d9e09b3 | ||
|
|
d02408ad8a | ||
|
|
7ae551fd03 | ||
|
|
c2e45f6ddf | ||
|
|
f9a4ad4fa6 | ||
|
|
10645a4f13 | ||
|
|
06cb0353e5 | ||
|
|
b41f836e5f | ||
|
|
26a81abffc | ||
|
|
ab03b0df4c | ||
|
|
e5a77633cf | ||
|
|
6f8a82c7af | ||
|
|
7a7f47ea80 | ||
|
|
0ce5f3e4f5 | ||
|
|
21023745e2 | ||
|
|
a679116f6f | ||
|
|
3988bb34aa | ||
|
|
9e78e6c3f8 | ||
|
|
3caff6092a | ||
|
|
0d96bf8950 | ||
|
|
91dc71f98d | ||
|
|
b7b6c047ca | ||
|
|
0ea659475c | ||
|
|
1e20bb0648 | ||
|
|
c962479bdf | ||
|
|
b31ccc362c | ||
|
|
0cd5866726 | ||
|
|
2a8a10eda6 | ||
|
|
f11bc84080 | ||
|
|
e2f3ae1252 | ||
|
|
40fcda292f | ||
|
|
59bc3126c5 | ||
|
|
4d6115a5cc | ||
|
|
3a25b96caf | ||
|
|
6e6d04e29a | ||
|
|
48ff225300 | ||
|
|
a4a9d97a3e | ||
|
|
404f952aa3 | ||
|
|
dcd87618ab | ||
|
|
d54bf14559 | ||
|
|
ea3a429efe | ||
|
|
e3f1223fe4 | ||
|
|
7ef6e3fe2f | ||
|
|
197322455d | ||
|
|
4f19a0672b | ||
|
|
854e076df8 | ||
|
|
cb2a0e1319 | ||
|
|
638b0d4277 | ||
|
|
f2346808de | ||
|
|
d7818facb9 | ||
|
|
bcf95a2183 | ||
|
|
f7181a9179 | ||
|
|
9237ba8b66 | ||
|
|
95874603b0 | ||
|
|
ed2e24d564 | ||
|
|
c9fd77e9dd | ||
|
|
a9d2bc4902 | ||
|
|
c3bdbcf639 | ||
|
|
d9a770e6ea | ||
|
|
35feed50f0 | ||
|
|
a116afa42e | ||
|
|
b4542fb307 | ||
|
|
1f224bf029 | ||
|
|
4d231b4359 | ||
|
|
ac0f1d0b14 | ||
|
|
124d8cf701 | ||
|
|
7d0d0996aa | ||
|
|
9cddbf14db | ||
|
|
5f1fddbbe7 | ||
|
|
027e257b1d | ||
|
|
93f117003e | ||
|
|
42748c084e | ||
|
|
77dd9c1850 | ||
|
|
83d968df60 | ||
|
|
4ac881ede3 | ||
|
|
ccd2cd3e64 | ||
|
|
6186ef9338 | ||
|
|
6bcac6e578 | ||
|
|
967d95f096 | ||
|
|
26c7750827 | ||
|
|
5a16d270ab | ||
|
|
3a465d5ec9 | ||
|
|
413a4a0461 | ||
|
|
a95d2c5133 | ||
|
|
1876cc32ae | ||
|
|
4e2a08ddd4 | ||
|
|
61e2c34a10 | ||
|
|
e56b54a376 | ||
|
|
0da945bb20 | ||
|
|
69443d0da0 | ||
|
|
e4dc18d7e5 | ||
|
|
3f86a2b147 | ||
|
|
fd664b9fc6 | ||
|
|
722ca2781c | ||
|
|
1c72eebf89 | ||
|
|
69ce8bb952 | ||
|
|
50b8ba0201 | ||
|
|
c9fd9152bd | ||
|
|
f891abccf2 | ||
|
|
e2effdbc6b | ||
|
|
b10ae320f7 | ||
|
|
5d3ab9b096 | ||
|
|
4fea8145e2 | ||
|
|
884e26080f | ||
|
|
9946491fcc | ||
|
|
ae6dfff5bf | ||
|
|
307bf4dae2 | ||
|
|
96d65fc022 | ||
|
|
080b8cadfa | ||
|
|
7cdd2aa128 | ||
|
|
7d7672f119 | ||
|
|
6a5b52efa0 | ||
|
|
6d864b7030 | ||
|
|
71a39dd4be | ||
|
|
500230ee94 | ||
|
|
347177e052 | ||
|
|
b7883fbb6e | ||
|
|
a77e023ab4 | ||
|
|
812cb5638c | ||
|
|
77a0f1d727 | ||
|
|
b9a18f3b8d | ||
|
|
73aeb61c3f | ||
|
|
3041903844 | ||
|
|
ad8ee98617 | ||
|
|
bc29d0e5d4 | ||
|
|
f89aebb1c4 | ||
|
|
1d7fb4f0c5 | ||
|
|
81a6c7817f | ||
|
|
5238fccc15 | ||
|
|
fba9046490 | ||
|
|
8a2908a24a | ||
|
|
e8b12f7a6f | ||
|
|
271da5a2e0 | ||
|
|
26fbabf3d1 | ||
|
|
37cdcb4d8a | ||
|
|
57b6534e53 | ||
|
|
8bf49ea170 | ||
|
|
02ee8626fb | ||
|
|
6276e5b41b | ||
|
|
51740b12ae | ||
|
|
6e6783056e | ||
|
|
791bd0cd2b | ||
|
|
e890dcdb19 | ||
|
|
5ddcb8664a | ||
|
|
09c4b4e0b7 | ||
|
|
368101778e | ||
|
|
535d79da63 | ||
|
|
4f69172d25 | ||
|
|
eb272ac0b0 | ||
|
|
63c43dcc59 | ||
|
|
8562801137 | ||
|
|
5d8094143e | ||
|
|
bb6dcb54f9 | ||
|
|
0a3ea5d34a | ||
|
|
a5e4c0bb9e | ||
|
|
cad4b840c8 | ||
|
|
37a92e9ce4 | ||
|
|
1896ce3558 | ||
|
|
0357422d14 | ||
|
|
d3ee37c5d9 | ||
|
|
f51cf14b85 | ||
|
|
194dd04699 | ||
|
|
14f7ee4916 | ||
|
|
a29d78e90b | ||
|
|
5b054c6955 | ||
|
|
10654d3a74 | ||
|
|
6017e604f8 | ||
|
|
3837491174 | ||
|
|
86a921af06 | ||
|
|
616df35633 | ||
|
|
e44fcedadf | ||
|
|
6f8f443170 | ||
|
|
d18af3f37e | ||
|
|
48fe4d6233 | ||
|
|
7b8250053b | ||
|
|
251cb4cfed | ||
|
|
24a93e6cdd | ||
|
|
40e15f9d78 | ||
|
|
b4f682d32f | ||
|
|
83d0e5e512 | ||
|
|
4e20b1a656 | ||
|
|
cc5ba6a7b6 | ||
|
|
0396479dec | ||
|
|
e34cfcf7e1 | ||
|
|
1358835050 | ||
|
|
754d494bef | ||
|
|
42909e3968 | ||
|
|
c108108028 | ||
|
|
5451e0d924 | ||
|
|
4ea3855514 | ||
|
|
20a9b1a7cf | ||
|
|
156e85578d | ||
|
|
b28ec12420 | ||
|
|
bb62a8b0c5 | ||
|
|
a75d8bebd2 | ||
|
|
b72ff47037 | ||
|
|
a2b03690a8 | ||
|
|
abb48d5a5f | ||
|
|
0e99546424 | ||
|
|
bd9e2e4c53 | ||
|
|
ff612904d2 | ||
|
|
429cf462d0 | ||
|
|
c62b26fdc6 | ||
|
|
e0a9ba9c3c | ||
|
|
2dc769a1c1 | ||
|
|
4f98cbabde | ||
|
|
98499135d7 | ||
|
|
3285076c8e | ||
|
|
3b4cfea688 | ||
|
|
de10f6900d | ||
|
|
adfe54b7be | ||
|
|
b576337e8b | ||
|
|
4de633dd5f | ||
|
|
91f29a38a0 | ||
|
|
1d5bd6cf71 | ||
|
|
226cc7ded4 | ||
|
|
e869d4bd32 | ||
|
|
60428dbf0a | ||
|
|
70d70a3c81 | ||
|
|
f1f25544e0 | ||
|
|
2e0db07627 | ||
|
|
58fc62296f | ||
|
|
df9cc1535e | ||
|
|
c4b36ff474 | ||
|
|
f418f8c17c | ||
|
|
5277d7cb7c | ||
|
|
0657bf9c14 | ||
|
|
5b438e9b0f | ||
|
|
7b4c588f58 | ||
|
|
1d00800e88 | ||
|
|
774530f412 | ||
|
|
fb171e534e | ||
|
|
7d7db13e67 | ||
|
|
45abac85a9 | ||
|
|
24b8dc9a55 | ||
|
|
d8c79c7f72 | ||
|
|
3a12ce0137 | ||
|
|
9bd35f6376 | ||
|
|
62763f682b | ||
|
|
38e3c5815c | ||
|
|
f8fe20e0d9 | ||
|
|
65e8167079 | ||
|
|
757a8b4621 | ||
|
|
5cac59b6c1 | ||
|
|
bad4058574 | ||
|
|
d8c2adae57 | ||
|
|
786e0c2424 | ||
|
|
794103d285 | ||
|
|
c454dbcd32 | ||
|
|
f3a3106807 | ||
|
|
62dc5aad06 | ||
|
|
45ecfb1973 | ||
|
|
f23478c314 | ||
|
|
3d2e469cfa | ||
|
|
bf401a2aef | ||
|
|
06a2b07bb0 | ||
|
|
8700e7b3cf | ||
|
|
7f19d42e9d | ||
|
|
d7bbd31efe | ||
|
|
fafc7f9875 | ||
|
|
d88a26c489 | ||
|
|
64b48877fa | ||
|
|
b31cc2d9f7 | ||
|
|
f196522159 | ||
|
|
4ff18c8c3e | ||
|
|
db4a465974 | ||
|
|
3cdc8ad07a | ||
|
|
2c1571b4ff | ||
|
|
6767a53669 | ||
|
|
ba93fd6a38 | ||
|
|
d7c06e9ec7 | ||
|
|
386828d029 | ||
|
|
d339187b1a | ||
|
|
61fca8b69b | ||
|
|
bb5ea36b96 | ||
|
|
e3a9164073 | ||
|
|
f85c9904c6 | ||
|
|
48bf4aae24 | ||
|
|
6231576088 | ||
|
|
4270144b39 | ||
|
|
5031a89dc3 | ||
|
|
bbd1c84e6e | ||
|
|
a2cf08cc23 | ||
|
|
d3a73875e2 | ||
|
|
41d2a336ee | ||
|
|
627774fd87 | ||
|
|
a5bc1e8568 | ||
|
|
c38171ba1f | ||
|
|
bb3ee8e75d | ||
|
|
32654e792b | ||
|
|
19f2192136 | ||
|
|
1961b327eb | ||
|
|
2ae87d465e | ||
|
|
e3ef8d2e6b | ||
|
|
65a87c7d01 | ||
|
|
72e3c20c14 | ||
|
|
ec0f19597e | ||
|
|
fa2b8db499 | ||
|
|
1aa0d94781 | ||
|
|
dc644fe229 | ||
|
|
47ddf355b4 | ||
|
|
941181ec0f | ||
|
|
d399fdf877 | ||
|
|
487550b61d | ||
|
|
35618bf6ad | ||
|
|
460fe31f0c | ||
|
|
14565bedaf | ||
|
|
02cc82ff8a | ||
|
|
38f3b3e29c | ||
|
|
4dc719fc37 | ||
|
|
48f2ef8d00 | ||
|
|
be1bd9239f | ||
|
|
b8feddae71 | ||
|
|
a9daa46758 | ||
|
|
569afce4b0 | ||
|
|
a9aa3d580c | ||
|
|
56a6ccc84f | ||
|
|
03c4d82fa1 | ||
|
|
7ab1a39181 | ||
|
|
56dde3ebe6 | ||
|
|
6525ced540 | ||
|
|
32d0ad41a4 | ||
|
|
e28e42a549 | ||
|
|
ff055b5c89 | ||
|
|
d8770f3ece | ||
|
|
4981372d03 | ||
|
|
3ebac273f5 | ||
|
|
5af18f65f4 | ||
|
|
a9b34991d9 | ||
|
|
bc36ee6227 | ||
|
|
f2bc668429 | ||
|
|
8120813066 | ||
|
|
7242cd8f8f | ||
|
|
12c2fe8d53 | ||
|
|
28143c66e1 | ||
|
|
335c4f0966 | ||
|
|
5003a61b9f | ||
|
|
7bd51947e5 | ||
|
|
4901b41653 | ||
|
|
74cd365b03 | ||
|
|
2affbab9fc | ||
|
|
cf1b7d9664 | ||
|
|
649c5a2b09 | ||
|
|
07247321c6 | ||
|
|
0c43540433 | ||
|
|
acba75c59d | ||
|
|
267a1927eb | ||
|
|
b0c8638650 | ||
|
|
b36c170d1b | ||
|
|
934397ec66 | ||
|
|
0f8631495d | ||
|
|
95ffe86dbc | ||
|
|
87b79c3ef3 | ||
|
|
52d160d85d | ||
|
|
54ff1e6ae5 | ||
|
|
a6b7ffddac | ||
|
|
f30d34f3a8 | ||
|
|
84a2173797 | ||
|
|
52b621db88 | ||
|
|
a6ed5dd674 | ||
|
|
1417f2dccb | ||
|
|
f2e5ca84d4 | ||
|
|
36fafffae2 | ||
|
|
cdc7b8cc60 | ||
|
|
720235eeec | ||
|
|
8e495e4ac7 | ||
|
|
2afbd6fa08 | ||
|
|
f282ca7413 | ||
|
|
67c1801924 | ||
|
|
46a58ab946 | ||
|
|
94fcd01349 | ||
|
|
9a04387362 | ||
|
|
282d8b1c38 | ||
|
|
41ecaba97e | ||
|
|
96dfab9e0e | ||
|
|
1b65ce7db3 | ||
|
|
7b9cb4a224 | ||
|
|
bc2dfde4b3 | ||
|
|
ec9dc137e7 | ||
|
|
620cea37e0 | ||
|
|
c15e036398 | ||
|
|
ccb08f98ae | ||
|
|
e306892994 | ||
|
|
836f996010 | ||
|
|
1613c4d3bf | ||
|
|
b5f6d9dc6e | ||
|
|
c063f2c5ec | ||
|
|
c47c619680 | ||
|
|
93cd57a578 | ||
|
|
49ce63cd7c | ||
|
|
b3f2e399d2 | ||
|
|
8c950429a9 | ||
|
|
c2bf70a27c | ||
|
|
9235adbf47 | ||
|
|
a71b5abfa4 | ||
|
|
928cc3a6de | ||
|
|
466e4249ab | ||
|
|
9fbc45b159 | ||
|
|
792e2ce7f4 | ||
|
|
3952584571 | ||
|
|
a5d2acfc79 | ||
|
|
35ed8cb8b6 | ||
|
|
7edc5ed90a | ||
|
|
420125f996 | ||
|
|
57e7d3ce15 | ||
|
|
a8ebe4697e | ||
|
|
deb2c1a1c5 | ||
|
|
d4219c485b | ||
|
|
73fc98a7bf | ||
|
|
259810e05b | ||
|
|
171cc53a96 | ||
|
|
9eea2be6f1 | ||
|
|
69a03c1799 | ||
|
|
4327aae816 | ||
|
|
741a9690df | ||
|
|
e24e40657f | ||
|
|
448361a86c | ||
|
|
26e083ccb7 | ||
|
|
4978361212 | ||
|
|
247c1361f3 | ||
|
|
1618bc7921 | ||
|
|
1b843d3c69 | ||
|
|
0bc6597d4d | ||
|
|
2b916952a8 | ||
|
|
02e4fbed3d | ||
|
|
7403c34b0b | ||
|
|
9022f2403b | ||
|
|
08f3f07212 | ||
|
|
8cbceba610 | ||
|
|
88ce56f8c1 | ||
|
|
664d83bb23 | ||
|
|
8cff6331c9 | ||
|
|
cd6aa710b5 | ||
|
|
903872d65e | ||
|
|
16a44ae7e9 | ||
|
|
739423fceb | ||
|
|
78f3a2aad7 | ||
|
|
b847024026 | ||
|
|
50d5199120 | ||
|
|
9020b86250 | ||
|
|
a342cc5a70 | ||
|
|
67c3cf0675 | ||
|
|
9a875a3574 | ||
|
|
a43cf9fae9 | ||
|
|
9ae9c221de | ||
|
|
4256650d68 | ||
|
|
ae0665b8f1 | ||
|
|
75802000c8 | ||
|
|
325ae88efb | ||
|
|
a25b265d27 | ||
|
|
d0a8af61b1 | ||
|
|
e58d808a4c | ||
|
|
751b5e8ff2 | ||
|
|
36f74d60b3 | ||
|
|
9756da13dd | ||
|
|
893b76c544 | ||
|
|
b5a6f0a92d | ||
|
|
ba8e28248f | ||
|
|
bfcec27d61 | ||
|
|
8e8972bb68 | ||
|
|
57108f0ad5 | ||
|
|
73758d435b | ||
|
|
90f63e8f83 | ||
|
|
e8af92fcb1 | ||
|
|
361ef5f4dc | ||
|
|
b3466895e6 | ||
|
|
81f169e95c | ||
|
|
a068630a20 | ||
|
|
dfebac32c0 | ||
|
|
ab5db00717 | ||
|
|
6308af199d | ||
|
|
8e5b6314ef | ||
|
|
b4b1bdd5d3 | ||
|
|
5782ceb298 | ||
|
|
cc85ec447b | ||
|
|
c67cdb50d2 | ||
|
|
af5473c45a | ||
|
|
f2c46006e7 | ||
|
|
69e42952e1 | ||
|
|
adf87b2df5 | ||
|
|
40753f760d | ||
|
|
d199858e89 | ||
|
|
10a2975a27 | ||
|
|
9b4dc8308f | ||
|
|
b93642c5cc | ||
|
|
a5435e8b29 | ||
|
|
72e2d9138c | ||
|
|
1dd080bca4 | ||
|
|
f648590991 | ||
|
|
a14280d41e | ||
|
|
91b842c972 | ||
|
|
eddf82a36a | ||
|
|
673b3fde82 | ||
|
|
a87e50a945 | ||
|
|
b62a0c4cab | ||
|
|
c06648f7f0 | ||
|
|
cd56182b41 | ||
|
|
65a22e8e4d | ||
|
|
cbf0f45f90 | ||
|
|
b2293b1e9b | ||
|
|
04e53c273f | ||
|
|
599c03530a | ||
|
|
56a67adb64 | ||
|
|
28e5428d5d | ||
|
|
3c91484052 | ||
|
|
98d517c5da | ||
|
|
18602745de | ||
|
|
ad2e032049 | ||
|
|
601140b363 | ||
|
|
e02cc10ea4 | ||
|
|
b5524a3ac3 | ||
|
|
0c61e299b3 | ||
|
|
0b33bc65cd | ||
|
|
0f5fa24a7c | ||
|
|
8e96183506 | ||
|
|
a8312c0e24 | ||
|
|
bf0d176e48 | ||
|
|
ec5add8784 | ||
|
|
856d456a71 | ||
|
|
7f2113a2d5 | ||
|
|
97f56446a3 | ||
|
|
5d92be8cc6 | ||
|
|
e102a3dcfd | ||
|
|
ecbe07817a | ||
|
|
71db02813c | ||
|
|
a6574c21eb | ||
|
|
26da3e65ac | ||
|
|
21cd437886 | ||
|
|
f09628e42f | ||
|
|
6f346c7115 | ||
|
|
d8ecc56c9d | ||
|
|
4e1209ebf8 | ||
|
|
78d3b819f0 | ||
|
|
200b24e391 | ||
|
|
1690c2b26e | ||
|
|
701adceb12 | ||
|
|
3f07fe09b5 | ||
|
|
f86c5c9ac7 | ||
|
|
66a0def81b | ||
|
|
73e92de577 | ||
|
|
09ab755c55 | ||
|
|
ec558b6548 | ||
|
|
037a9f9c1a | ||
|
|
29e1fdf3f2 | ||
|
|
28ddfc61dc | ||
|
|
725c88879c | ||
|
|
a0aae68cf6 | ||
|
|
57d2f21782 | ||
|
|
895959b736 | ||
|
|
3c07b4c2ee | ||
|
|
1cc0b0a66a | ||
|
|
beb23252a6 | ||
|
|
3ba25ee86a | ||
|
|
0be35f5c51 | ||
|
|
60f7492646 | ||
|
|
1456d1860e | ||
|
|
5755cab49d | ||
|
|
975842f9fb | ||
|
|
126fe085db | ||
|
|
123d24d600 | ||
|
|
3880cd35ad | ||
|
|
cb38052b3a | ||
|
|
f640ee90c3 | ||
|
|
09f4278d25 | ||
|
|
1f47ec53a2 | ||
|
|
959f67d6a4 | ||
|
|
b2e7419a1d | ||
|
|
6546fdfaf8 | ||
|
|
3a3ca1d474 | ||
|
|
7522254b48 | ||
|
|
f1a6a0d4dd | ||
|
|
9c67ab2f26 | ||
|
|
1a7b2d33f4 | ||
|
|
6e2dad1cc7 | ||
|
|
2c0d10123e | ||
|
|
3ac82faae5 | ||
|
|
c08523d862 | ||
|
|
137e601277 | ||
|
|
09f4bd2a39 | ||
|
|
2fc0d1f15e | ||
|
|
2a86064f95 | ||
|
|
016d7d250a | ||
|
|
2c15d426b9 | ||
|
|
bdcfe1d165 | ||
|
|
3b28dbce7e | ||
|
|
5a4fbc69c3 | ||
|
|
7e7c8952b5 | ||
|
|
de487514ae | ||
|
|
06db4253e2 | ||
|
|
4ce7894c4a | ||
|
|
36f554d43c | ||
|
|
8d28d5f81b | ||
|
|
53b407da84 | ||
|
|
765e531159 | ||
|
|
de282fe3ba | ||
|
|
36ac656a1b | ||
|
|
2aff7727f7 | ||
|
|
cc93ae3ef4 | ||
|
|
34d69d3b23 | ||
|
|
daea0ff8a9 | ||
|
|
448701473a | ||
|
|
572f0017d5 | ||
|
|
df2c442a6d | ||
|
|
23e2947cc8 | ||
|
|
44b51ca36c | ||
|
|
bbf848ce8d | ||
|
|
d0fa136ce2 | ||
|
|
15156cce0e | ||
|
|
9d6b1ce644 | ||
|
|
66ebbb6a56 | ||
|
|
c5e48d8b01 | ||
|
|
8dea52fa42 | ||
|
|
f7356b677b | ||
|
|
80d89e6a6a | ||
|
|
bc5f2740d2 | ||
|
|
aa66eba7c8 | ||
|
|
f27b45d237 | ||
|
|
3bb4736289 | ||
|
|
bac685417a | ||
|
|
1a4d6400ae | ||
|
|
322006dcb1 | ||
|
|
db01d55671 | ||
|
|
0a52d38b31 | ||
|
|
902d1051b1 | ||
|
|
f67868ff4c | ||
|
|
a6576c56dd | ||
|
|
240f516939 | ||
|
|
ef8f14a882 | ||
|
|
aecb0b018f | ||
|
|
e4d56bab5b | ||
|
|
1435ccfba1 | ||
|
|
d766a23deb | ||
|
|
b1e21f8fac | ||
|
|
9347ba487c | ||
|
|
c28500900e | ||
|
|
e4c5391ddb | ||
|
|
0c34556cbd | ||
|
|
b50118ca3e | ||
|
|
a57ecb95f6 | ||
|
|
428a55a0fe | ||
|
|
cc74659fcc | ||
|
|
90e7ce363a | ||
|
|
a47b505e37 | ||
|
|
9f49524331 | ||
|
|
6a2347ee45 | ||
|
|
e5164b7041 | ||
|
|
ebff44b83a | ||
|
|
c0e7c3aab9 | ||
|
|
733777275b | ||
|
|
f1919c3df9 | ||
|
|
97b1719583 | ||
|
|
b0dc680f71 | ||
|
|
addb309ad6 | ||
|
|
152a689cf9 | ||
|
|
35a99b6380 | ||
|
|
dfa46e502d | ||
|
|
c21c35e6a4 | ||
|
|
b26f84cbbd | ||
|
|
0dba0613ea | ||
|
|
e0c875081e | ||
|
|
ea1b7fe6d4 | ||
|
|
db88223baa | ||
|
|
d29b63bc9b | ||
|
|
1946cd8bc2 | ||
|
|
111482cf2e | ||
|
|
52a1bab2d9 | ||
|
|
0826c85f4c | ||
|
|
385d81380c | ||
|
|
862e973b50 | ||
|
|
2efff10cfa | ||
|
|
33479d275a | ||
|
|
3e7a6396ed | ||
|
|
5a12df5c40 | ||
|
|
b5a25a430a | ||
|
|
592c784ffe | ||
|
|
17e757478a | ||
|
|
a023052580 | ||
|
|
4b757c830d | ||
|
|
9b7a552f4b | ||
|
|
8df788c97f | ||
|
|
12cfcc128c | ||
|
|
f9b3bff6f7 | ||
|
|
fc2e05c2d5 | ||
|
|
b2993bdea1 | ||
|
|
470fa98f8a | ||
|
|
de6e207db6 | ||
|
|
1363155145 | ||
|
|
db5bda670f | ||
|
|
0ae485dc07 | ||
|
|
19cda70045 | ||
|
|
4751717cd8 | ||
|
|
bd68b6b1f6 | ||
|
|
cd9b7d7c35 | ||
|
|
058123afb6 | ||
|
|
a4614bf06d | ||
|
|
23f80f46a4 | ||
|
|
c4438dc0e5 | ||
|
|
04ca16890b | ||
|
|
20f88b9bd4 | ||
|
|
25439b76ad | ||
|
|
3465dd3853 | ||
|
|
ac445acf69 | ||
|
|
77ac92d00a | ||
|
|
73c2522c7c | ||
|
|
6b5d39e82d | ||
|
|
cd2eebfd64 | ||
|
|
06676624fc | ||
|
|
ef8b601789 | ||
|
|
01e62900c7 | ||
|
|
d50f1bdfac | ||
|
|
38b40c624c | ||
|
|
eb1f1b0a34 | ||
|
|
a9376dbff9 | ||
|
|
14697d9d6d | ||
|
|
c6a926d9e2 | ||
|
|
c1db5bfc08 | ||
|
|
429b8162c6 | ||
|
|
0dd2254d76 | ||
|
|
03a0848922 | ||
|
|
9161672950 | ||
|
|
a08bcccc67 | ||
|
|
bdec3c5323 | ||
|
|
53d286797c | ||
|
|
b6cafbd7d8 | ||
|
|
499e167fda | ||
|
|
0135e33511 | ||
|
|
f2cc7559dd | ||
|
|
fe8686ba4b | ||
|
|
4aa69fe0b6 | ||
|
|
b984cd2b01 | ||
|
|
adcc64cd9e | ||
|
|
c94b6de017 | ||
|
|
000e21779c | ||
|
|
f1d6f64c8e | ||
|
|
d79cab27a5 | ||
|
|
24b44446e2 | ||
|
|
87739b2c53 | ||
|
|
c782089611 | ||
|
|
265592b99a | ||
|
|
077ff61eef | ||
|
|
dcbd0d74d5 | ||
|
|
1ec0a3862e | ||
|
|
946cd9a540 | ||
|
|
0ac87024e3 | ||
|
|
7abe830501 | ||
|
|
5acaa49504 | ||
|
|
535b9b5724 | ||
|
|
78a0c1f18d | ||
|
|
6cc5e19d47 | ||
|
|
7e0c5264e7 | ||
|
|
73343ac38a | ||
|
|
d53d271728 | ||
|
|
37fc8c3747 | ||
|
|
01412ec600 | ||
|
|
c4f3542abf | ||
|
|
c799770060 | ||
|
|
cd26e6c79d | ||
|
|
4e773226f5 | ||
|
|
646d56956b | ||
|
|
0cc1115643 | ||
|
|
257341b5b4 | ||
|
|
83f2571782 | ||
|
|
baa257f1ed | ||
|
|
e06cc57118 | ||
|
|
0450d28759 | ||
|
|
7f56097c65 | ||
|
|
7396958515 | ||
|
|
3c758be86e | ||
|
|
227385b719 | ||
|
|
f7a059316f | ||
|
|
b1d6e3f551 | ||
|
|
db70a3fd6e | ||
|
|
28fd5c60de | ||
|
|
cbd48ba626 | ||
|
|
67d93e6f49 | ||
|
|
afb83c45e6 | ||
|
|
43fcc1b096 | ||
|
|
d5695a26a6 | ||
|
|
8bfc8f934f | ||
|
|
ef02b10a16 | ||
|
|
803e4e93d4 | ||
|
|
60b8607727 | ||
|
|
159564ae9f | ||
|
|
cd1bf28e2c | ||
|
|
74e10aa58b | ||
|
|
5f524accc1 | ||
|
|
451e60e99f | ||
|
|
89c16ab53e | ||
|
|
820aaa5fc5 | ||
|
|
993ea851f5 | ||
|
|
305db17b5f | ||
|
|
6a8ba34f9d | ||
|
|
f777408fc5 | ||
|
|
2984b0ae24 | ||
|
|
3d6001f7b9 | ||
|
|
f6a8898fc3 | ||
|
|
757e392d4e | ||
|
|
2f9f0c72de | ||
|
|
cb4ae6c0d3 | ||
|
|
359fd02fec | ||
|
|
e1a8ac495b | ||
|
|
0b5806b5f5 | ||
|
|
ccb9643f02 | ||
|
|
7f7b8d6871 | ||
|
|
bb7e632aef | ||
|
|
55d892e373 | ||
|
|
f971ccb264 | ||
|
|
a4aba800d9 | ||
|
|
669cefdd35 |
632
FAQ
632
FAQ
@@ -1,20 +1,24 @@
|
||||
OpenSSL - Frequently Asked Questions
|
||||
--------------------------------------
|
||||
|
||||
[MISC] Miscellaneous questions
|
||||
|
||||
* Which is the current version of OpenSSL?
|
||||
* Where is the documentation?
|
||||
* How can I contact the OpenSSL developers?
|
||||
* Do I need patent licenses to use OpenSSL?
|
||||
* Is OpenSSL thread-safe?
|
||||
* Why do I get a "PRNG not seeded" error message?
|
||||
* Why does the linker complain about undefined symbols?
|
||||
* Where can I get a compiled version of OpenSSL?
|
||||
* I've compiled a program under Windows and it crashes: why?
|
||||
* How do I read or write a DER encoded buffer using the ASN1 functions?
|
||||
* I've tried using <M_some_evil_pkcs12_macro> and I get errors why?
|
||||
* I've called <some function> and it fails, why?
|
||||
* I just get a load of numbers for the error output, what do they mean?
|
||||
* Why do I get errors about unknown algorithms?
|
||||
* Why aren't tools like 'autoconf' and 'libtool' used?
|
||||
* What is an 'engine' version?
|
||||
|
||||
[LEGAL] Legal questions
|
||||
|
||||
* Do I need patent licenses to use OpenSSL?
|
||||
* Can I use OpenSSL with GPL software?
|
||||
|
||||
[USER] Questions on using the OpenSSL applications
|
||||
|
||||
* Why do I get a "PRNG not seeded" error message?
|
||||
* Why do I get an "unable to write 'random state'" error message?
|
||||
* How do I create certificates or certificate requests?
|
||||
* Why can't I create certificate requests?
|
||||
* Why does <SSL program> fail with a certificate verify error?
|
||||
@@ -22,19 +26,41 @@ OpenSSL - Frequently Asked Questions
|
||||
* How can I create DSA certificates?
|
||||
* Why can't I make an SSL connection using a DSA certificate?
|
||||
* How can I remove the passphrase on a private key?
|
||||
* Why can't the OpenSSH configure script detect OpenSSL?
|
||||
* Why can't I use OpenSSL certificates with SSL client authentication?
|
||||
* Why does my browser give a warning about a mismatched hostname?
|
||||
* How do I install a CA certificate into a browser?
|
||||
* Why is OpenSSL x509 DN output not conformant to RFC2253?
|
||||
|
||||
[BUILD] Questions about building and testing OpenSSL
|
||||
|
||||
* Why does the linker complain about undefined symbols?
|
||||
* Why does the OpenSSL test fail with "bc: command not found"?
|
||||
* Why does the OpenSSL test fail with "bc: 1 no implemented"?
|
||||
* Why does the OpenSSL compilation fail on Alpha True64 Unix?
|
||||
* Why does the OpenSSL compilation fail on Alpha Tru64 Unix?
|
||||
* Why does the OpenSSL compilation fail with "ar: command not found"?
|
||||
* Why does the OpenSSL compilation fail on Win32 with VC++?
|
||||
* Why aren't tools like 'autoconf' and 'libtool' used?
|
||||
|
||||
[PROG] Questions about programming with OpenSSL
|
||||
|
||||
* Is OpenSSL thread-safe?
|
||||
* I've compiled a program under Windows and it crashes: why?
|
||||
* How do I read or write a DER encoded buffer using the ASN1 functions?
|
||||
* I've tried using <M_some_evil_pkcs12_macro> and I get errors why?
|
||||
* I've called <some function> and it fails, why?
|
||||
* I just get a load of numbers for the error output, what do they mean?
|
||||
* Why do I get errors about unknown algorithms?
|
||||
* Why can't the OpenSSH configure script detect OpenSSL?
|
||||
* Can I use OpenSSL's SSL library with non-blocking I/O?
|
||||
* Why doesn't my server application receive a client certificate?
|
||||
|
||||
===============================================================================
|
||||
|
||||
[MISC] ========================================================================
|
||||
|
||||
* Which is the current version of OpenSSL?
|
||||
|
||||
The current version is available from <URL: http://www.openssl.org>.
|
||||
OpenSSL 0.9.6 was released on September 24th, 2000.
|
||||
OpenSSL 0.9.6d was released on May 9, 2002.
|
||||
|
||||
In addition to the current stable release, you can also access daily
|
||||
snapshots of the OpenSSL development version at <URL:
|
||||
@@ -80,6 +106,33 @@ OpenSSL. Information on the OpenSSL mailing lists is available from
|
||||
<URL: http://www.openssl.org>.
|
||||
|
||||
|
||||
* Where can I get a compiled version of OpenSSL?
|
||||
|
||||
Some applications that use OpenSSL are distributed in binary form.
|
||||
When using such an application, you don't need to install OpenSSL
|
||||
yourself; the application will include the required parts (e.g. DLLs).
|
||||
|
||||
If you want to install OpenSSL on a Windows system and you don't have
|
||||
a C compiler, read the "Mingw32" section of INSTALL.W32 for information
|
||||
on how to obtain and install the free GNU C compiler.
|
||||
|
||||
A number of Linux and *BSD distributions include OpenSSL.
|
||||
|
||||
|
||||
* Why aren't tools like 'autoconf' and 'libtool' used?
|
||||
|
||||
autoconf will probably be used in future OpenSSL versions. If it was
|
||||
less Unix-centric, it might have been used much earlier.
|
||||
|
||||
* What is an 'engine' version?
|
||||
|
||||
With version 0.9.6 OpenSSL was extended to interface to external crypto
|
||||
hardware. This was realized in a special release '0.9.6-engine'. With
|
||||
version 0.9.7 (not yet released) the changes were merged into the main
|
||||
development line, so that the special release is no longer necessary.
|
||||
|
||||
[LEGAL] =======================================================================
|
||||
|
||||
* Do I need patent licenses to use OpenSSL?
|
||||
|
||||
The patents section of the README file lists patents that may apply to
|
||||
@@ -91,17 +144,25 @@ You can configure OpenSSL so as not to use RC5 and IDEA by using
|
||||
./config no-rc5 no-idea
|
||||
|
||||
|
||||
* Is OpenSSL thread-safe?
|
||||
* Can I use OpenSSL with GPL software?
|
||||
|
||||
Yes (with limitations: an SSL connection may not concurrently be used
|
||||
by multiple threads). On Windows and many Unix systems, OpenSSL
|
||||
automatically uses the multi-threaded versions of the standard
|
||||
libraries. If your platform is not one of these, consult the INSTALL
|
||||
file.
|
||||
On many systems including the major Linux and BSD distributions, yes (the
|
||||
GPL does not place restrictions on using libraries that are part of the
|
||||
normal operating system distribution).
|
||||
|
||||
Multi-threaded applications must provide two callback functions to
|
||||
OpenSSL. This is described in the threads(3) manpage.
|
||||
On other systems, the situation is less clear. Some GPL software copyright
|
||||
holders claim that you infringe on their rights if you use OpenSSL with
|
||||
their software on operating systems that don't normally include OpenSSL.
|
||||
|
||||
If you develop open source software that uses OpenSSL, you may find it
|
||||
useful to choose an other license than the GPL, or state explicitly that
|
||||
"This program is released under the GPL with the additional exemption that
|
||||
compiling, linking, and/or using OpenSSL is allowed." If you are using
|
||||
GPL software developed by others, you may want to ask the copyright holder
|
||||
for permission to use their software with OpenSSL.
|
||||
|
||||
|
||||
[USER] ========================================================================
|
||||
|
||||
* Why do I get a "PRNG not seeded" error message?
|
||||
|
||||
@@ -110,6 +171,7 @@ correctly. Many open source operating systems provide a "randomness
|
||||
device" that serves this purpose. On other systems, applications have
|
||||
to call the RAND_add() or RAND_seed() function with appropriate data
|
||||
before generating keys or performing public key encryption.
|
||||
(These functions initialize the pseudo-random number generator, PRNG.)
|
||||
|
||||
Some broken applications do not do this. As of version 0.9.5, the
|
||||
OpenSSL functions that need randomness report an error if the random
|
||||
@@ -119,18 +181,36 @@ application you are using. It is likely that it never worked
|
||||
correctly. OpenSSL 0.9.5 and later make the error visible by refusing
|
||||
to perform potentially insecure encryption.
|
||||
|
||||
On systems without /dev/urandom, it is a good idea to use the Entropy
|
||||
Gathering Demon; see the RAND_egd() manpage for details.
|
||||
On systems without /dev/urandom and /dev/random, it is a good idea to
|
||||
use the Entropy Gathering Demon (EGD); see the RAND_egd() manpage for
|
||||
details. Starting with version 0.9.7, OpenSSL will automatically look
|
||||
for an EGD socket at /var/run/egd-pool, /dev/egd-pool, /etc/egd-pool and
|
||||
/etc/entropy.
|
||||
|
||||
Most components of the openssl command line tool try to use the
|
||||
file $HOME/.rnd (or $RANDFILE, if this environment variable is set)
|
||||
for seeding the PRNG. If this file does not exist or is too short,
|
||||
the "PRNG not seeded" error message may occur.
|
||||
Most components of the openssl command line utility automatically try
|
||||
to seed the random number generator from a file. The name of the
|
||||
default seeding file is determined as follows: If environment variable
|
||||
RANDFILE is set, then it names the seeding file. Otherwise if
|
||||
environment variable HOME is set, then the seeding file is $HOME/.rnd.
|
||||
If neither RANDFILE nor HOME is set, versions up to OpenSSL 0.9.6 will
|
||||
use file .rnd in the current directory while OpenSSL 0.9.6a uses no
|
||||
default seeding file at all. OpenSSL 0.9.6b and later will behave
|
||||
similarly to 0.9.6a, but will use a default of "C:\" for HOME on
|
||||
Windows systems if the environment variable has not been set.
|
||||
|
||||
[Note to OpenSSL 0.9.5 users: The command "openssl rsa" in version
|
||||
0.9.5 does not do this and will fail on systems without /dev/urandom
|
||||
when trying to password-encrypt an RSA key! This is a bug in the
|
||||
library; try a later version instead.]
|
||||
If the default seeding file does not exist or is too short, the "PRNG
|
||||
not seeded" error message may occur.
|
||||
|
||||
The openssl command line utility will write back a new state to the
|
||||
default seeding file (and create this file if necessary) unless
|
||||
there was no sufficient seeding.
|
||||
|
||||
Pointing $RANDFILE to an Entropy Gathering Daemon socket does not work.
|
||||
Use the "-rand" option of the OpenSSL command line tools instead.
|
||||
The $RANDFILE environment variable and $HOME/.rnd are only used by the
|
||||
OpenSSL command line tools. Applications using the OpenSSL library
|
||||
provide their own configuration options to specify the entropy source,
|
||||
please check out the documentation coming the with application.
|
||||
|
||||
For Solaris 2.6, Tim Nibbe <tnibbe@sprint.net> and others have suggested
|
||||
installing the SUNski package from Sun patch 105710-01 (Sparc) which
|
||||
@@ -140,6 +220,140 @@ versions. However, be warned that /dev/random is usually a blocking
|
||||
device, which may have some effects on OpenSSL.
|
||||
|
||||
|
||||
* Why do I get an "unable to write 'random state'" error message?
|
||||
|
||||
|
||||
Sometimes the openssl command line utility does not abort with
|
||||
a "PRNG not seeded" error message, but complains that it is
|
||||
"unable to write 'random state'". This message refers to the
|
||||
default seeding file (see previous answer). A possible reason
|
||||
is that no default filename is known because neither RANDFILE
|
||||
nor HOME is set. (Versions up to 0.9.6 used file ".rnd" in the
|
||||
current directory in this case, but this has changed with 0.9.6a.)
|
||||
|
||||
|
||||
* How do I create certificates or certificate requests?
|
||||
|
||||
Check out the CA.pl(1) manual page. This provides a simple wrapper round
|
||||
the 'req', 'verify', 'ca' and 'pkcs12' utilities. For finer control check
|
||||
out the manual pages for the individual utilities and the certificate
|
||||
extensions documentation (currently in doc/openssl.txt).
|
||||
|
||||
|
||||
* Why can't I create certificate requests?
|
||||
|
||||
You typically get the error:
|
||||
|
||||
unable to find 'distinguished_name' in config
|
||||
problems making Certificate Request
|
||||
|
||||
This is because it can't find the configuration file. Check out the
|
||||
DIAGNOSTICS section of req(1) for more information.
|
||||
|
||||
|
||||
* Why does <SSL program> fail with a certificate verify error?
|
||||
|
||||
This problem is usually indicated by log messages saying something like
|
||||
"unable to get local issuer certificate" or "self signed certificate".
|
||||
When a certificate is verified its root CA must be "trusted" by OpenSSL
|
||||
this typically means that the CA certificate must be placed in a directory
|
||||
or file and the relevant program configured to read it. The OpenSSL program
|
||||
'verify' behaves in a similar way and issues similar error messages: check
|
||||
the verify(1) program manual page for more information.
|
||||
|
||||
|
||||
* Why can I only use weak ciphers when I connect to a server using OpenSSL?
|
||||
|
||||
This is almost certainly because you are using an old "export grade" browser
|
||||
which only supports weak encryption. Upgrade your browser to support 128 bit
|
||||
ciphers.
|
||||
|
||||
|
||||
* How can I create DSA certificates?
|
||||
|
||||
Check the CA.pl(1) manual page for a DSA certificate example.
|
||||
|
||||
|
||||
* Why can't I make an SSL connection to a server using a DSA certificate?
|
||||
|
||||
Typically you'll see a message saying there are no shared ciphers when
|
||||
the same setup works fine with an RSA certificate. There are two possible
|
||||
causes. The client may not support connections to DSA servers most web
|
||||
browsers (including Netscape and MSIE) only support connections to servers
|
||||
supporting RSA cipher suites. The other cause is that a set of DH parameters
|
||||
has not been supplied to the server. DH parameters can be created with the
|
||||
dhparam(1) command and loaded using the SSL_CTX_set_tmp_dh() for example:
|
||||
check the source to s_server in apps/s_server.c for an example.
|
||||
|
||||
|
||||
* How can I remove the passphrase on a private key?
|
||||
|
||||
Firstly you should be really *really* sure you want to do this. Leaving
|
||||
a private key unencrypted is a major security risk. If you decide that
|
||||
you do have to do this check the EXAMPLES sections of the rsa(1) and
|
||||
dsa(1) manual pages.
|
||||
|
||||
|
||||
* Why can't I use OpenSSL certificates with SSL client authentication?
|
||||
|
||||
What will typically happen is that when a server requests authentication
|
||||
it will either not include your certificate or tell you that you have
|
||||
no client certificates (Netscape) or present you with an empty list box
|
||||
(MSIE). The reason for this is that when a server requests a client
|
||||
certificate it includes a list of CAs names which it will accept. Browsers
|
||||
will only let you select certificates from the list on the grounds that
|
||||
there is little point presenting a certificate which the server will
|
||||
reject.
|
||||
|
||||
The solution is to add the relevant CA certificate to your servers "trusted
|
||||
CA list". How you do this depends on the server software in uses. You can
|
||||
print out the servers list of acceptable CAs using the OpenSSL s_client tool:
|
||||
|
||||
openssl s_client -connect www.some.host:443 -prexit
|
||||
|
||||
If your server only requests certificates on certain URLs then you may need
|
||||
to manually issue an HTTP GET command to get the list when s_client connects:
|
||||
|
||||
GET /some/page/needing/a/certificate.html
|
||||
|
||||
If your CA does not appear in the list then this confirms the problem.
|
||||
|
||||
|
||||
* Why does my browser give a warning about a mismatched hostname?
|
||||
|
||||
Browsers expect the server's hostname to match the value in the commonName
|
||||
(CN) field of the certificate. If it does not then you get a warning.
|
||||
|
||||
|
||||
* How do I install a CA certificate into a browser?
|
||||
|
||||
The usual way is to send the DER encoded certificate to the browser as
|
||||
MIME type application/x-x509-ca-cert, for example by clicking on an appropriate
|
||||
link. On MSIE certain extensions such as .der or .cacert may also work, or you
|
||||
can import the certificate using the certificate import wizard.
|
||||
|
||||
You can convert a certificate to DER form using the command:
|
||||
|
||||
openssl x509 -in ca.pem -outform DER -out ca.der
|
||||
|
||||
Occasionally someone suggests using a command such as:
|
||||
|
||||
openssl pkcs12 -export -out cacert.p12 -in cacert.pem -inkey cakey.pem
|
||||
|
||||
DO NOT DO THIS! This command will give away your CAs private key and
|
||||
reduces its security to zero: allowing anyone to forge certificates in
|
||||
whatever name they choose.
|
||||
|
||||
* Why is OpenSSL x509 DN output not conformant to RFC2253?
|
||||
|
||||
The ways to print out the oneline format of the DN (Distinguished Name) have
|
||||
been extended in version 0.9.7 of OpenSSL. Using the new X509_NAME_print_ex()
|
||||
interface, the "-nameopt" option could be introduded. See the manual
|
||||
page of the "openssl x509" commandline tool for details. The old behaviour
|
||||
has however been left as default for the sake of compatibility.
|
||||
|
||||
[BUILD] =======================================================================
|
||||
|
||||
* Why does the linker complain about undefined symbols?
|
||||
|
||||
Maybe the compilation was interrupted, and make doesn't notice that
|
||||
@@ -164,25 +378,140 @@ If none of these helps, you may want to try using the current snapshot.
|
||||
If the problem persists, please submit a bug report.
|
||||
|
||||
|
||||
* Where can I get a compiled version of OpenSSL?
|
||||
* Why does the OpenSSL test fail with "bc: command not found"?
|
||||
|
||||
Some applications that use OpenSSL are distributed in binary form.
|
||||
When using such an application, you don't need to install OpenSSL
|
||||
yourself; the application will include the required parts (e.g. DLLs).
|
||||
You didn't install "bc", the Unix calculator. If you want to run the
|
||||
tests, get GNU bc from ftp://ftp.gnu.org or from your OS distributor.
|
||||
|
||||
If you want to install OpenSSL on a Windows system and you don't have
|
||||
a C compiler, read the "Mingw32" section of INSTALL.W32 for information
|
||||
on how to obtain and install the free GNU C compiler.
|
||||
|
||||
A number of Linux and *BSD distributions include OpenSSL.
|
||||
* Why does the OpenSSL test fail with "bc: 1 no implemented"?
|
||||
|
||||
On some SCO installations or versions, bc has a bug that gets triggered
|
||||
when you run the test suite (using "make test"). The message returned is
|
||||
"bc: 1 not implemented".
|
||||
|
||||
The best way to deal with this is to find another implementation of bc
|
||||
and compile/install it. GNU bc (see http://www.gnu.org/software/software.html
|
||||
for download instructions) can be safely used, for example.
|
||||
|
||||
|
||||
* Why does the OpenSSL compilation fail on Alpha Tru64 Unix?
|
||||
|
||||
On some Alpha installations running Tru64 Unix and Compaq C, the compilation
|
||||
of crypto/sha/sha_dgst.c fails with the message 'Fatal: Insufficient virtual
|
||||
memory to continue compilation.' As far as the tests have shown, this may be
|
||||
a compiler bug. What happens is that it eats up a lot of resident memory
|
||||
to build something, probably a table. The problem is clearly in the
|
||||
optimization code, because if one eliminates optimization completely (-O0),
|
||||
the compilation goes through (and the compiler consumes about 2MB of resident
|
||||
memory instead of 240MB or whatever one's limit is currently).
|
||||
|
||||
There are three options to solve this problem:
|
||||
|
||||
1. set your current data segment size soft limit higher. Experience shows
|
||||
that about 241000 kbytes seems to be enough on an AlphaServer DS10. You do
|
||||
this with the command 'ulimit -Sd nnnnnn', where 'nnnnnn' is the number of
|
||||
kbytes to set the limit to.
|
||||
|
||||
2. If you have a hard limit that is lower than what you need and you can't
|
||||
get it changed, you can compile all of OpenSSL with -O0 as optimization
|
||||
level. This is however not a very nice thing to do for those who expect to
|
||||
get the best result from OpenSSL. A bit more complicated solution is the
|
||||
following:
|
||||
|
||||
----- snip:start -----
|
||||
make DIRS=crypto SDIRS=sha "`grep '^CFLAG=' Makefile.ssl | \
|
||||
sed -e 's/ -O[0-9] / -O0 /'`"
|
||||
rm `ls crypto/*.o crypto/sha/*.o | grep -v 'sha_dgst\.o'`
|
||||
make
|
||||
----- snip:end -----
|
||||
|
||||
This will only compile sha_dgst.c with -O0, the rest with the optimization
|
||||
level chosen by the configuration process. When the above is done, do the
|
||||
test and installation and you're set.
|
||||
|
||||
|
||||
* Why does the OpenSSL compilation fail with "ar: command not found"?
|
||||
|
||||
Getting this message is quite usual on Solaris 2, because Sun has hidden
|
||||
away 'ar' and other development commands in directories that aren't in
|
||||
$PATH by default. One of those directories is '/usr/ccs/bin'. The
|
||||
quickest way to fix this is to do the following (it assumes you use sh
|
||||
or any sh-compatible shell):
|
||||
|
||||
----- snip:start -----
|
||||
PATH=${PATH}:/usr/ccs/bin; export PATH
|
||||
----- snip:end -----
|
||||
|
||||
and then redo the compilation. What you should really do is make sure
|
||||
'/usr/ccs/bin' is permanently in your $PATH, for example through your
|
||||
'.profile' (again, assuming you use a sh-compatible shell).
|
||||
|
||||
|
||||
* Why does the OpenSSL compilation fail on Win32 with VC++?
|
||||
|
||||
Sometimes, you may get reports from VC++ command line (cl) that it
|
||||
can't find standard include files like stdio.h and other weirdnesses.
|
||||
One possible cause is that the environment isn't correctly set up.
|
||||
To solve that problem, one should run VCVARS32.BAT which is found in
|
||||
the 'bin' subdirectory of the VC++ installation directory (somewhere
|
||||
under 'Program Files'). This needs to be done prior to running NMAKE,
|
||||
and the changes are only valid for the current DOS session.
|
||||
|
||||
|
||||
[PROG] ========================================================================
|
||||
|
||||
* Is OpenSSL thread-safe?
|
||||
|
||||
Yes (with limitations: an SSL connection may not concurrently be used
|
||||
by multiple threads). On Windows and many Unix systems, OpenSSL
|
||||
automatically uses the multi-threaded versions of the standard
|
||||
libraries. If your platform is not one of these, consult the INSTALL
|
||||
file.
|
||||
|
||||
Multi-threaded applications must provide two callback functions to
|
||||
OpenSSL. This is described in the threads(3) manpage.
|
||||
|
||||
|
||||
* I've compiled a program under Windows and it crashes: why?
|
||||
|
||||
This is usually because you've missed the comment in INSTALL.W32. You
|
||||
must link with the multithreaded DLL version of the VC++ runtime library
|
||||
otherwise the conflict will cause a program to crash: typically on the
|
||||
first BIO related read or write operation.
|
||||
This is usually because you've missed the comment in INSTALL.W32.
|
||||
Your application must link against the same version of the Win32
|
||||
C-Runtime against which your openssl libraries were linked. The
|
||||
default version for OpenSSL is /MD - "Multithreaded DLL".
|
||||
|
||||
If you are using Microsoft Visual C++'s IDE (Visual Studio), in
|
||||
many cases, your new project most likely defaulted to "Debug
|
||||
Singlethreaded" - /ML. This is NOT interchangeable with /MD and your
|
||||
program will crash, typically on the first BIO related read or write
|
||||
operation.
|
||||
|
||||
For each of the six possible link stage configurations within Win32,
|
||||
your application must link against the same by which OpenSSL was
|
||||
built. If you are using MS Visual C++ (Studio) this can be changed
|
||||
by:
|
||||
|
||||
1. Select Settings... from the Project Menu.
|
||||
2. Select the C/C++ Tab.
|
||||
3. Select "Code Generation from the "Category" drop down list box
|
||||
4. Select the Appropriate library (see table below) from the "Use
|
||||
run-time library" drop down list box. Perform this step for both
|
||||
your debug and release versions of your application (look at the
|
||||
top left of the settings panel to change between the two)
|
||||
|
||||
Single Threaded /ML - MS VC++ often defaults to
|
||||
this for the release
|
||||
version of a new project.
|
||||
Debug Single Threaded /MLd - MS VC++ often defaults to
|
||||
this for the debug version
|
||||
of a new project.
|
||||
Multithreaded /MT
|
||||
Debug Multithreaded /MTd
|
||||
Multithreaded DLL /MD - OpenSSL defaults to this.
|
||||
Debug Multithreaded DLL /MDd
|
||||
|
||||
Note that debug and release libraries are NOT interchangeable. If you
|
||||
built OpenSSL with /MD your application must use /MD and cannot use /MDd.
|
||||
|
||||
|
||||
* How do I read or write a DER encoded buffer using the ASN1 functions?
|
||||
@@ -261,200 +590,39 @@ is forgetting to load OpenSSL's table of algorithms with
|
||||
OpenSSL_add_all_algorithms(). See the manual page for more information.
|
||||
|
||||
|
||||
* How do I create certificates or certificate requests?
|
||||
|
||||
Check out the CA.pl(1) manual page. This provides a simple wrapper round
|
||||
the 'req', 'verify', 'ca' and 'pkcs12' utilities. For finer control check
|
||||
out the manual pages for the individual utilities and the certificate
|
||||
extensions documentation (currently in doc/openssl.txt).
|
||||
|
||||
|
||||
* Why can't I create certificate requests?
|
||||
|
||||
You typically get the error:
|
||||
|
||||
unable to find 'distinguished_name' in config
|
||||
problems making Certificate Request
|
||||
|
||||
This is because it can't find the configuration file. Check out the
|
||||
DIAGNOSTICS section of req(1) for more information.
|
||||
|
||||
|
||||
* Why does <SSL program> fail with a certificate verify error?
|
||||
|
||||
This problem is usually indicated by log messages saying something like
|
||||
"unable to get local issuer certificate" or "self signed certificate".
|
||||
When a certificate is verified its root CA must be "trusted" by OpenSSL
|
||||
this typically means that the CA certificate must be placed in a directory
|
||||
or file and the relevant program configured to read it. The OpenSSL program
|
||||
'verify' behaves in a similar way and issues similar error messages: check
|
||||
the verify(1) program manual page for more information.
|
||||
|
||||
|
||||
* Why can I only use weak ciphers when I connect to a server using OpenSSL?
|
||||
|
||||
This is almost certainly because you are using an old "export grade" browser
|
||||
which only supports weak encryption. Upgrade your browser to support 128 bit
|
||||
ciphers.
|
||||
|
||||
|
||||
* How can I create DSA certificates?
|
||||
|
||||
Check the CA.pl(1) manual page for a DSA certificate example.
|
||||
|
||||
|
||||
* Why can't I make an SSL connection to a server using a DSA certificate?
|
||||
|
||||
Typically you'll see a message saying there are no shared ciphers when
|
||||
the same setup works fine with an RSA certificate. There are two possible
|
||||
causes. The client may not support connections to DSA servers most web
|
||||
browsers (including Netscape and MSIE) only support connections to servers
|
||||
supporting RSA cipher suites. The other cause is that a set of DH parameters
|
||||
has not been supplied to the server. DH parameters can be created with the
|
||||
dhparam(1) command and loaded using the SSL_CTX_set_tmp_dh() for example:
|
||||
check the source to s_server in apps/s_server.c for an example.
|
||||
|
||||
|
||||
* How can I remove the passphrase on a private key?
|
||||
|
||||
Firstly you should be really *really* sure you want to do this. Leaving
|
||||
a private key unencrypted is a major security risk. If you decide that
|
||||
you do have to do this check the EXAMPLES sections of the rsa(1) and
|
||||
dsa(1) manual pages.
|
||||
|
||||
|
||||
* Why can't the OpenSSH configure script detect OpenSSL?
|
||||
|
||||
There is a problem with OpenSSH 1.2.2p1, in that the configure script
|
||||
can't find the installed OpenSSL libraries. The problem is actually
|
||||
a small glitch that is easily solved with the following patch to be
|
||||
applied to the OpenSSH distribution:
|
||||
Several reasons for problems with the automatic detection exist.
|
||||
OpenSSH requires at least version 0.9.5a of the OpenSSL libraries.
|
||||
Sometimes the distribution has installed an older version in the system
|
||||
locations that is detected instead of a new one installed. The OpenSSL
|
||||
library might have been compiled for another CPU or another mode (32/64 bits).
|
||||
Permissions might be wrong.
|
||||
|
||||
----- snip:start -----
|
||||
--- openssh-1.2.2p1/configure.in.orig Thu Mar 23 18:56:58 2000
|
||||
+++ openssh-1.2.2p1/configure.in Thu Mar 23 18:55:05 2000
|
||||
@@ -152,10 +152,10 @@
|
||||
AC_MSG_CHECKING([for OpenSSL/SSLeay directory])
|
||||
for ssldir in "" $tryssldir /usr /usr/local/openssl /usr/lib/openssl /usr/local/ssl /usr/lib/ssl /usr/local /usr/pkg /opt /opt/openssl ; do
|
||||
if test ! -z "$ssldir" ; then
|
||||
- LIBS="$saved_LIBS -L$ssldir"
|
||||
+ LIBS="$saved_LIBS -L$ssldir/lib"
|
||||
CFLAGS="$CFLAGS -I$ssldir/include"
|
||||
if test "x$need_dash_r" = "x1" ; then
|
||||
- LIBS="$LIBS -R$ssldir"
|
||||
+ LIBS="$LIBS -R$ssldir/lib"
|
||||
fi
|
||||
fi
|
||||
LIBS="$LIBS -lcrypto"
|
||||
--- openssh-1.2.2p1/configure.orig Thu Mar 23 18:55:02 2000
|
||||
+++ openssh-1.2.2p1/configure Thu Mar 23 18:57:08 2000
|
||||
@@ -1890,10 +1890,10 @@
|
||||
echo "configure:1891: checking for OpenSSL/SSLeay directory" >&5
|
||||
for ssldir in "" $tryssldir /usr /usr/local/openssl /usr/lib/openssl /usr/local/ssl /usr/lib/ssl /usr/local /usr/pkg /opt /opt/openssl ; do
|
||||
if test ! -z "$ssldir" ; then
|
||||
- LIBS="$saved_LIBS -L$ssldir"
|
||||
+ LIBS="$saved_LIBS -L$ssldir/lib"
|
||||
CFLAGS="$CFLAGS -I$ssldir/include"
|
||||
if test "x$need_dash_r" = "x1" ; then
|
||||
- LIBS="$LIBS -R$ssldir"
|
||||
+ LIBS="$LIBS -R$ssldir/lib"
|
||||
fi
|
||||
fi
|
||||
LIBS="$LIBS -lcrypto"
|
||||
----- snip:end -----
|
||||
The general answer is to check the config.log file generated when running
|
||||
the OpenSSH configure script. It should contain the detailed information
|
||||
on why the OpenSSL library was not detected or considered incompatible.
|
||||
|
||||
* Can I use OpenSSL's SSL library with non-blocking I/O?
|
||||
|
||||
Yes; make sure to read the SSL_get_error(3) manual page!
|
||||
|
||||
A pitfall to avoid: Don't assume that SSL_read() will just read from
|
||||
the underlying transport or that SSL_write() will just write to it --
|
||||
it is also possible that SSL_write() cannot do any useful work until
|
||||
there is data to read, or that SSL_read() cannot do anything until it
|
||||
is possible to send data. One reason for this is that the peer may
|
||||
request a new TLS/SSL handshake at any time during the protocol,
|
||||
requiring a bi-directional message exchange; both SSL_read() and
|
||||
SSL_write() will try to continue any pending handshake.
|
||||
|
||||
|
||||
* Why does the OpenSSL test fail with "bc: command not found"?
|
||||
* Why doesn't my server application receive a client certificate?
|
||||
|
||||
You didn't install "bc", the Unix calculator. If you want to run the
|
||||
tests, get GNU bc from ftp://ftp.gnu.org or from your OS distributor.
|
||||
Due to the TLS protocol definition, a client will only send a certificate,
|
||||
if explicitly asked by the server. Use the SSL_VERIFY_PEER flag of the
|
||||
SSL_CTX_set_verify() function to enable the use of client certificates.
|
||||
|
||||
|
||||
* Why does the OpenSSL test fail with "bc: 1 no implemented"?
|
||||
|
||||
On some SCO installations or versions, bc has a bug that gets triggered when
|
||||
you run the test suite (using "make test"). The message returned is "bc:
|
||||
1 not implemented". The best way to deal with this is to find another
|
||||
implementation of bc and compile/install it. For example, GNU bc (see
|
||||
http://www.gnu.org/software/software.html for download instructions) can
|
||||
be safely used.
|
||||
|
||||
|
||||
* Why does the OpenSSL compilation fail on Alpha True64 Unix?
|
||||
|
||||
On some Alpha installations running True64 Unix and Compaq C, the compilation
|
||||
of crypto/sha/sha_dgst.c fails with the message 'Fatal: Insufficient virtual
|
||||
memory to continue compilation.' As far as the tests have shown, this may be
|
||||
a compiler bug. What happens is that it eats up a lot of resident memory
|
||||
to build something, probably a table. The problem is clearly in the
|
||||
optimization code, because if one eliminates optimization completely (-O0),
|
||||
the compilation goes through (and the compiler consumes about 2MB of resident
|
||||
memory instead of 240MB or whatever one's limit is currently).
|
||||
|
||||
There are three options to solve this problem:
|
||||
|
||||
1. set your current data segment size soft limit higher. Experience shows
|
||||
that about 241000 kbytes seems to be enough on an AlphaServer DS10. You do
|
||||
this with the command 'ulimit -Sd nnnnnn', where 'nnnnnn' is the number of
|
||||
kbytes to set the limit to.
|
||||
|
||||
2. If you have a hard limit that is lower than what you need and you can't
|
||||
get it changed, you can compile all of OpenSSL with -O0 as optimization
|
||||
level. This is however not a very nice thing to do for those who expect to
|
||||
get the best result from OpenSSL. A bit more complicated solution is the
|
||||
following:
|
||||
|
||||
----- snip:start -----
|
||||
make DIRS=crypto SDIRS=sha "`grep '^CFLAG=' Makefile.ssl | \
|
||||
sed -e 's/ -O[0-9] / -O0 /'`"
|
||||
rm `ls crypto/*.o crypto/sha/*.o | grep -v 'sha_dgst\.o'`
|
||||
make
|
||||
----- snip:end -----
|
||||
|
||||
This will only compile sha_dgst.c with -O0, the rest with the optimization
|
||||
level chosen by the configuration process. When the above is done, do the
|
||||
test and installation and you're set.
|
||||
|
||||
|
||||
* Why does the OpenSSL compilation fail with "ar: command not found"?
|
||||
|
||||
Getting this message is quite usual on Solaris 2, because Sun has hidden
|
||||
away 'ar' and other development commands in directories that aren't in
|
||||
$PATH by default. One of those directories is '/usr/ccs/bin'. The
|
||||
quickest way to fix this is to do the following (it assumes you use sh
|
||||
or any sh-compatible shell):
|
||||
|
||||
----- snip:start -----
|
||||
PATH=${PATH}:/usr/ccs/bin; export PATH
|
||||
----- snip:end -----
|
||||
|
||||
and then redo the compilation. What you should really do is make sure
|
||||
'/usr/ccs/bin' is permanently in your $PATH, for example through your
|
||||
'.profile' (again, assuming you use a sh-compatible shell).
|
||||
|
||||
|
||||
* Why does the OpenSSL compilation fail on Win32 with VC++?
|
||||
|
||||
Sometimes, you may get reports from VC++ command line (cl) that it
|
||||
can't find standard include files like stdio.h and other weirdnesses.
|
||||
One possible cause is that the environment isn't correctly set up.
|
||||
To solve that problem, one should run VCVARS32.BAT which is found in
|
||||
the 'bin' subdirectory of the VC++ installation directory (somewhere
|
||||
under 'Program Files'). This needs to be done prior to running NMAKE,
|
||||
and the changes are only valid for the current DOS session.
|
||||
|
||||
|
||||
* Why aren't tools like 'autoconf' and 'libtool' used?
|
||||
|
||||
autoconf is a nice tool, but is unfortunately very Unix-centric.
|
||||
Although one can come up with solution to have ports keep in track,
|
||||
there's also some work needed for that, and can be quite painful at
|
||||
times. If there was a 'autoconf'-like tool that generated perl
|
||||
scripts or something similarly general, it would probably be used
|
||||
in OpenSSL much earlier.
|
||||
|
||||
libtool has repeatadly been reported by some members of the OpenSSL
|
||||
development and others to be a pain to use. So far, those in the
|
||||
development team who have said anything about this have expressed
|
||||
a wish to avoid libtool for that reason.
|
||||
===============================================================================
|
||||
|
||||
|
||||
22
INSTALL
22
INSTALL
@@ -7,8 +7,11 @@
|
||||
|
||||
To install OpenSSL, you will need:
|
||||
|
||||
* make
|
||||
* Perl 5
|
||||
* an ANSI C compiler
|
||||
* a development environment in form of development libraries and C
|
||||
header files
|
||||
* a supported Unix operating system
|
||||
|
||||
Quick Start
|
||||
@@ -43,9 +46,6 @@
|
||||
--openssldir=DIR Directory for OpenSSL files. If no prefix is specified,
|
||||
the library files and binaries are also installed there.
|
||||
|
||||
rsaref Build with RSADSI's RSAREF toolkit (this assumes that
|
||||
librsaref.a is in the library search path).
|
||||
|
||||
no-threads Don't try to build with support for multi-threaded
|
||||
applications.
|
||||
|
||||
@@ -53,6 +53,15 @@
|
||||
This will usually require additional system-dependent options!
|
||||
See "Note on multi-threading" below.
|
||||
|
||||
no-zlib Don't try to build with support for zlib compression and
|
||||
decompression.
|
||||
|
||||
zlib Build with support for zlib compression/decompression.
|
||||
|
||||
zlib-dynamic Like "zlib", but has OpenSSL load the zlib library dynamically
|
||||
when needed. This is only supported on systems where loading
|
||||
of shared libraries is supported. This is the default choice.
|
||||
|
||||
no-shared Don't try to create shared libraries.
|
||||
|
||||
shared In addition to the usual static libraries, create shared
|
||||
@@ -125,7 +134,7 @@
|
||||
directory, and the binary will be in the "apps" directory.
|
||||
|
||||
If "make" fails, look at the output. There may be reasons for
|
||||
the failure that isn't a problem in OpenSSL itself (like missing
|
||||
the failure that aren't problems in OpenSSL itself (like missing
|
||||
standard headers). If it is a problem with OpenSSL itself, please
|
||||
report the problem to <openssl-bugs@openssl.org> (note that your
|
||||
message will be forwarded to a public mailing list). Include the
|
||||
@@ -269,6 +278,11 @@
|
||||
Note on shared libraries
|
||||
------------------------
|
||||
|
||||
Shared library is currently an experimental feature. The only reason to
|
||||
have them would be to conserve memory on systems where several program
|
||||
are using OpenSSL. Binary backward compatibility can't be guaranteed
|
||||
before OpenSSL version 1.0.
|
||||
|
||||
For some systems, the OpenSSL Configure script knows what is needed to
|
||||
build shared libraries for libcrypto and libssl. On these systems,
|
||||
the shared libraries are currently not created by default, but giving
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
OpenSSL - Port To The Macintosh
|
||||
===============================
|
||||
OpenSSL - Port To The Macintosh OS 9 or Earlier
|
||||
===============================================
|
||||
|
||||
Thanks to Roy Wood <roy@centricsystems.ca> initial support for MacOS (pre
|
||||
Thanks to Roy Wood <roy@centricsystems.ca> initial support for Mac OS (pre
|
||||
X) is now provided. "Initial" means that unlike other platforms where you
|
||||
get an SDK and a "swiss army" openssl application, on Macintosh you only
|
||||
get one sample application which fetches a page over HTTPS(*) and dumps it
|
||||
@@ -32,17 +32,17 @@ Installation procedure:
|
||||
to 42, change appropriately.
|
||||
(**) If you use SUNtar, then it might have already unbinhexed the files
|
||||
in question.
|
||||
(***) The project file was saved with CW Pro 5.3. If you have earlier
|
||||
(***) The project file was saved with CW Pro 5.3. If you have an earlier
|
||||
version and it refuses to open it, then download
|
||||
http://www.openssl.org/~appro/OpenSSL.mcp.xml and import it
|
||||
overwriting the original OpenSSL.mcp.
|
||||
(****) Other targets are work in progress. If you feel like giving 'em a
|
||||
(****) Other targets are works in progress. If you feel like giving 'em a
|
||||
shot, then you should know that OpenSSL* and Lib* targets are
|
||||
supposed to be built with the GUSI, MacOS library which mimics
|
||||
BSD sockets and some other POSIX APIs. The GUSI distribution is
|
||||
expected to be found in the same directory as openssl source tree,
|
||||
i.e. in the parent directory to the one where this very file,
|
||||
namely INSTALL.MacOS. For more informations about GUSI, see
|
||||
expected to be found in the same directory as the openssl source tree,
|
||||
i.e., in the parent directory to the one where this very file,
|
||||
namely INSTALL.MacOS, resides. For more information about GUSI, see
|
||||
http://www.iis.ee.ethz.ch/~neeri/macintosh/gusi-qa.html
|
||||
|
||||
Finally some essential comments from our generous contributor:-)
|
||||
|
||||
22
INSTALL.OS2
Normal file
22
INSTALL.OS2
Normal file
@@ -0,0 +1,22 @@
|
||||
|
||||
Installation on OS/2
|
||||
--------------------
|
||||
|
||||
You need to have the following tools installed:
|
||||
|
||||
* EMX GCC
|
||||
* PERL
|
||||
* GNU make
|
||||
|
||||
|
||||
To build the makefile, run
|
||||
|
||||
> os2\os2-emx
|
||||
|
||||
This will configure OpenSSL and create OS2-EMX.mak which you then use to
|
||||
build the OpenSSL libraries & programs by running
|
||||
|
||||
> make -f os2-emx.mak
|
||||
|
||||
If that finishes successfully you will find the libraries and programs in the
|
||||
"out" directory.
|
||||
22
INSTALL.VMS
22
INSTALL.VMS
@@ -8,6 +8,7 @@ Intro:
|
||||
|
||||
This file is divided in the following parts:
|
||||
|
||||
Requirements - Mandatory reading.
|
||||
Checking the distribution - Mandatory reading.
|
||||
Compilation - Mandatory reading.
|
||||
Logical names - Mandatory reading.
|
||||
@@ -19,15 +20,24 @@ This file is divided in the following parts:
|
||||
TODO - Things that are to come.
|
||||
|
||||
|
||||
Requirements:
|
||||
=============
|
||||
|
||||
To build and install OpenSSL, you will need:
|
||||
|
||||
* DEC C or some other ANSI C compiler. VAX C is *not* supported.
|
||||
[Note: OpenSSL has only been tested with DEC C. Compiling with
|
||||
a different ANSI C compiler may require some work]
|
||||
|
||||
Checking the distribution:
|
||||
==========================
|
||||
|
||||
There have been reports of places where the distribution didn't quite get
|
||||
through, for example if you've copied the tree from a NFS-mounted unix
|
||||
through, for example if you've copied the tree from a NFS-mounted Unix
|
||||
mount point.
|
||||
|
||||
The easiest way to check if everything got through as it should is to check
|
||||
for oen of the following files:
|
||||
for one of the following files:
|
||||
|
||||
[.CRYPTO]OPENSSLCONF.H_IN
|
||||
[.CRYPTO]OPENSSLCONF_H.IN
|
||||
@@ -59,7 +69,7 @@ for a command procedure name xxx-LIB.COM (in the library directories)
|
||||
or MAKExxx.COM (in the program directories) and read the comments at
|
||||
the top to understand how to use them. However, if you want to
|
||||
compile all you can get, the simplest is to use MAKEVMS.COM in the top
|
||||
directory. The syntax is trhe following:
|
||||
directory. The syntax is the following:
|
||||
|
||||
@MAKEVMS <option> <rsaref-p> <debug-p> [<compiler>]
|
||||
|
||||
@@ -69,7 +79,7 @@ directory. The syntax is trhe following:
|
||||
CONFIG Just build the "[.CRYPTO]OPENSSLCONF.H" file.
|
||||
BUILDINF Just build the "[.INCLUDE]BUILDINF.H" file.
|
||||
SOFTLINKS Just copies some files, to simulate Unix soft links.
|
||||
BUILDALL Same as ALL, except CONFIG, BUILDINF and SOFTILNKS aren't done.
|
||||
BUILDALL Same as ALL, except CONFIG, BUILDINF and SOFTLINKS aren't done.
|
||||
RSAREF Just build the "[.xxx.EXE.RSAREF]LIBRSAGLUE.OLB" library.
|
||||
CRYPTO Just build the "[.xxx.EXE.CRYPTO]LIBCRYPTO.OLB" library.
|
||||
SSL Just build the "[.xxx.EXE.SSL]LIBSSL.OLB" library.
|
||||
@@ -82,7 +92,7 @@ directory. The syntax is trhe following:
|
||||
RSAREF compile using the RSAREF Library
|
||||
NORSAREF compile without using RSAREF
|
||||
|
||||
Note 0: The RASREF library IS NO LONGER NEEDED. The RSA patent
|
||||
Note 0: The RSAREF library IS NO LONGER NEEDED. The RSA patent
|
||||
expires September 20, 2000, and RSA Security chose to make
|
||||
the algorithm public domain two weeks before that.
|
||||
|
||||
@@ -254,7 +264,7 @@ following before you start compiling:
|
||||
The USER_CCDISABLEWARNINGS is there because otherwise, DEC C will complain
|
||||
that those macros have been changed.
|
||||
|
||||
Note: Currently, this is only usefull for library compilation. The
|
||||
Note: Currently, this is only useful for library compilation. The
|
||||
programs will still be linked with the current version of the
|
||||
C library shareable image, and will thus complain if they are
|
||||
faced with an older version of the same C library shareable image.
|
||||
|
||||
60
INSTALL.W32
60
INSTALL.W32
@@ -2,16 +2,19 @@
|
||||
INSTALLATION ON THE WIN32 PLATFORM
|
||||
----------------------------------
|
||||
|
||||
Heres a few comments about building OpenSSL in Windows environments. Most of
|
||||
this is tested on Win32 but it may also work in Win 3.1 with some
|
||||
Heres a few comments about building OpenSSL in Windows environments. Most
|
||||
of this is tested on Win32 but it may also work in Win 3.1 with some
|
||||
modification.
|
||||
|
||||
You need Perl for Win32 (available from http://www.activestate.com/ActivePerl)
|
||||
You need Perl for Win32. Unless you will build on Cygwin, you will need
|
||||
ActiveState Perl, available from http://www.activestate.com/ActivePerl.
|
||||
For Cygwin users, there's more info in the Cygwin section.
|
||||
|
||||
and one of the following C compilers:
|
||||
|
||||
* Visual C++
|
||||
* Borland C
|
||||
* GNU C (Mingw32 or Cygwin32)
|
||||
* GNU C (Mingw32 or Cygwin)
|
||||
|
||||
If you want to compile in the assembly language routines with Visual C++ then
|
||||
you will need an assembler. This is worth doing because it will result in
|
||||
@@ -78,7 +81,7 @@
|
||||
|
||||
There are various changes you can make to the Win32 compile environment. By
|
||||
default the library is not compiled with debugging symbols. If you add 'debug'
|
||||
to the mk1mk.pl lines in the do_* batch file then debugging symbols will be
|
||||
to the mk1mf.pl lines in the do_* batch file then debugging symbols will be
|
||||
compiled in.
|
||||
|
||||
The default Win32 environment is to leave out any Windows NT specific
|
||||
@@ -109,10 +112,10 @@
|
||||
* Compiler installation:
|
||||
|
||||
Mingw32 is available from <ftp://ftp.xraylith.wisc.edu/pub/khan/
|
||||
gnu-win32/mingw32/gcc-2.95.2/gcc-2.95.2-msvcrt.exe>. GNU make is at
|
||||
<ftp://agnes.dida.physik.uni-essen.de/home/janjaap/mingw32/binaries/
|
||||
make-3.76.1.zip>. Install both of them in C:\egcs-1.1.2 and run
|
||||
C:\egcs-1.1.2\mingw32.bat to set the PATH.
|
||||
gnu-win32/mingw32/gcc-2.95.2/gcc-2.95.2-msvcrt.exe>. Extract it
|
||||
to a directory such as C:\gcc-2.95.2 and add c:\gcc-2.95.2\bin to
|
||||
the PATH environment variable in "System Properties"; or edit and
|
||||
run C:\gcc-2.95.2\mingw32.bat to set the PATH.
|
||||
|
||||
* Compile OpenSSL:
|
||||
|
||||
@@ -134,28 +137,30 @@
|
||||
> cd out
|
||||
> ..\ms\test
|
||||
|
||||
GNU C (CygWin32)
|
||||
---------------
|
||||
GNU C (Cygwin)
|
||||
--------------
|
||||
|
||||
CygWin32 provides a bash shell and GNU tools environment running on
|
||||
Cygwin provides a bash shell and GNU tools environment running on
|
||||
NT 4.0, Windows 9x and Windows 2000. Consequently, a make of OpenSSL
|
||||
with CygWin is closer to a GNU bash environment such as Linux rather
|
||||
with Cygwin is closer to a GNU bash environment such as Linux rather
|
||||
than other W32 makes that are based on a single makefile approach.
|
||||
CygWin32 implements Posix/Unix calls through cygwin1.dll, and is
|
||||
Cygwin implements Posix/Unix calls through cygwin1.dll, and is
|
||||
contrasted to Mingw32 which links dynamically to msvcrt.dll or
|
||||
crtdll.dll.
|
||||
|
||||
To build OpenSSL using CygWin32:
|
||||
To build OpenSSL using Cygwin:
|
||||
|
||||
* Install CygWin32 (see http://sourceware.cygnus.com/cygwin)
|
||||
* Install Cygwin (see http://sourceware.cygnus.com/cygwin)
|
||||
|
||||
* Install Perl and ensure it is in the path
|
||||
* Install Perl and ensure it is in the path (recent Cygwin perl
|
||||
(version 5.6.1-2 of the latter has been reported to work) or
|
||||
ActivePerl)
|
||||
|
||||
* Run the CygWin bash shell
|
||||
* Run the Cygwin bash shell
|
||||
|
||||
* $ tar zxvf openssl-x.x.x.tar.gz
|
||||
$ cd openssl-x.x.x
|
||||
$ ./Configure no-threads CygWin32
|
||||
$ ./config
|
||||
[...]
|
||||
$ make
|
||||
[...]
|
||||
@@ -164,27 +169,28 @@
|
||||
|
||||
This will create a default install in /usr/local/ssl.
|
||||
|
||||
CygWin32 Notes:
|
||||
Cygwin Notes:
|
||||
|
||||
"make test" and normal file operations may fail in directories
|
||||
mounted as text (i.e. mount -t c:\somewhere /home) due to CygWin
|
||||
mounted as text (i.e. mount -t c:\somewhere /home) due to Cygwin
|
||||
stripping of carriage returns. To avoid this ensure that a binary
|
||||
mount is used, e.g. mount -b c:\somewhere /home.
|
||||
|
||||
As of version 1.1.1 CygWin32 is relatively unstable in its handling
|
||||
As of version 1.1.1 Cygwin is relatively unstable in its handling
|
||||
of cr/lf issues. These make procedures succeeded with versions 1.1 and
|
||||
the snapshot 20000524 (Slow!).
|
||||
|
||||
"bc" is not provided in the CygWin32 distribution. This causes a
|
||||
"bc" is not provided in the Cygwin distribution. This causes a
|
||||
non-fatal error in "make test" but is otherwise harmless. If
|
||||
desired, GNU bc can be built with CygWin32 without change.
|
||||
desired, GNU bc can be built with Cygwin without change.
|
||||
|
||||
|
||||
Installation
|
||||
------------
|
||||
|
||||
There's currently no real installation procedure for Win32. There are,
|
||||
however, some suggestions:
|
||||
If you used the Cygwin procedure above, you have already installed and
|
||||
can skip this section. For all other procedures, there's currently no real
|
||||
installation procedure for Win32. There are, however, some suggestions:
|
||||
|
||||
- do nothing. The include files are found in the inc32/ subdirectory,
|
||||
all binaries are found in out32dll/ or out32/ depending if you built
|
||||
@@ -256,5 +262,5 @@
|
||||
malloc(), free() and realloc() as the application. However there are many
|
||||
standard library functions used by OpenSSL that call malloc() internally
|
||||
(e.g. fopen()), and OpenSSL cannot change these; so in general you cannot
|
||||
rely on CYRPTO_malloc_init() solving your problem, and you should
|
||||
rely on CRYPTO_malloc_init() solving your problem, and you should
|
||||
consistently use the multithreaded library.
|
||||
|
||||
2
LICENSE
2
LICENSE
@@ -12,7 +12,7 @@
|
||||
---------------
|
||||
|
||||
/* ====================================================================
|
||||
* Copyright (c) 1998-2000 The OpenSSL Project. All rights reserved.
|
||||
* Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
|
||||
@@ -167,7 +167,7 @@ void main(void)
|
||||
|
||||
tempString[bytesRead] = '\0';
|
||||
|
||||
printf(tempString);
|
||||
printf("%s", tempString);
|
||||
}
|
||||
|
||||
printf("\n\n\n");
|
||||
@@ -201,7 +201,7 @@ EXITPOINT:
|
||||
{
|
||||
printf("An error occurred:\n");
|
||||
|
||||
printf(GetErrorMessage());
|
||||
printf("%s",GetErrorMessage());
|
||||
}
|
||||
|
||||
|
||||
|
||||
393
Makefile.org
393
Makefile.org
@@ -24,7 +24,6 @@ INSTALLTOP=/usr/local/ssl
|
||||
# Do not edit this manually. Use Configure --openssldir=DIR do change this!
|
||||
OPENSSLDIR=/usr/local/ssl
|
||||
|
||||
# RSAref - Define if we are to link with RSAref.
|
||||
# NO_IDEA - Define to build without the IDEA algorithm
|
||||
# NO_RC4 - Define to build without the RC4 algorithm
|
||||
# NO_RC2 - Define to build without the RC2 algorithm
|
||||
@@ -57,13 +56,15 @@ CC= gcc
|
||||
#CFLAG= -DL_ENDIAN -DTERMIO -O3 -fomit-frame-pointer -m486 -Wall -Wuninitialized -DSHA1_ASM -DMD5_ASM -DRMD160_ASM
|
||||
CFLAG= -DTERMIOS -DL_ENDIAN -fomit-frame-pointer -O3 -m486 -Wall -DSHA1_ASM -DMD5_ASM -DRMD160_ASM
|
||||
DEPFLAG=
|
||||
PEX_LIBS= -L. -L.. -L../.. -L../../..
|
||||
PEX_LIBS=
|
||||
EX_LIBS=
|
||||
EXE_EXT=
|
||||
AR=ar r
|
||||
RANLIB= ranlib
|
||||
PERL= perl
|
||||
TAR= tar
|
||||
TARFLAGS= --no-recursion
|
||||
MAKEDEPPROG=makedepend
|
||||
|
||||
# Set BN_ASM to bn_asm.o if you want to use the C version
|
||||
BN_ASM= bn_asm.o
|
||||
@@ -150,20 +151,28 @@ RMD160_ASM_OBJ= asm/rm86-out.o
|
||||
#RMD160_ASM_OBJ= asm/rm86-out.o # a.out, FreeBSD
|
||||
#RMD160_ASM_OBJ= asm/rm86bsdi.o # bsdi
|
||||
|
||||
# KRB5 stuff
|
||||
KRB5_INCLUDES=
|
||||
LIBKRB5=
|
||||
|
||||
# When we're prepared to use shared libraries in the programs we link here
|
||||
# we might set SHLIB_MARK to '$(SHARED_LIBS)'.
|
||||
SHLIB_MARK=
|
||||
|
||||
DIRS= crypto ssl rsaref $(SHLIB_MARK) apps test tools
|
||||
DIRS= crypto ssl $(SHLIB_MARK) apps test tools
|
||||
SHLIBDIRS= crypto ssl
|
||||
|
||||
# dirs in crypto to build
|
||||
SDIRS= \
|
||||
md2 md4 md5 sha mdc2 hmac ripemd \
|
||||
des rc2 rc4 rc5 idea bf cast \
|
||||
bn rsa dsa dh dso engine rijndael \
|
||||
bn ec rsa dsa ecdsa dh dso engine aes \
|
||||
buffer bio stack lhash rand err objects \
|
||||
evp asn1 pem x509 x509v3 conf txt_db pkcs7 pkcs12 comp ocsp
|
||||
evp asn1 pem x509 x509v3 conf txt_db pkcs7 pkcs12 comp ocsp ui krb5
|
||||
|
||||
# tests to perform. "alltests" is a special word indicating that all tests
|
||||
# should be performed.
|
||||
TESTS = alltests
|
||||
|
||||
MAKEFILE= Makefile.ssl
|
||||
MAKE= make -f Makefile.ssl
|
||||
@@ -182,35 +191,31 @@ SHARED_CRYPTO=libcrypto$(SHLIB_EXT)
|
||||
SHARED_SSL=libssl$(SHLIB_EXT)
|
||||
SHARED_LIBS=
|
||||
SHARED_LIBS_LINK_EXTS=
|
||||
SHARED_LDFLAGS=
|
||||
|
||||
GENERAL= Makefile
|
||||
BASENAME= openssl
|
||||
NAME= $(BASENAME)-$(VERSION)
|
||||
TARFILE= $(NAME).tar
|
||||
WTARFILE= $(NAME)-win.tar
|
||||
EXHEADER= e_os.h e_os2.h
|
||||
EXHEADER= e_os2.h
|
||||
HEADER= e_os.h
|
||||
|
||||
# When we're prepared to use shared libraries in the programs we link here
|
||||
# we might remove 'clean-shared' from the targets to perform at this stage
|
||||
|
||||
all: clean-shared Makefile.ssl sub_all
|
||||
all: Makefile.ssl sub_all
|
||||
|
||||
sub_all:
|
||||
@for i in $(DIRS); \
|
||||
do \
|
||||
if [ -d "$$i" ]; then \
|
||||
(cd $$i && echo "making all in $$i..." && \
|
||||
$(MAKE) CC='${CC}' PLATFORM='${PLATFORM}' CFLAG='${CFLAG}' SDIRS='$(SDIRS)' INSTALLTOP='${INSTALLTOP}' PEX_LIBS='${PEX_LIBS}' EX_LIBS='${EX_LIBS}' BN_ASM='${BN_ASM}' DES_ENC='${DES_ENC}' BF_ENC='${BF_ENC}' CAST_ENC='${CAST_ENC}' RC4_ENC='${RC4_ENC}' RC5_ENC='${RC5_ENC}' SHA1_ASM_OBJ='${SHA1_ASM_OBJ}' MD5_ASM_OBJ='${MD5_ASM_OBJ}' RMD160_ASM_OBJ='${RMD160_ASM_OBJ}' AR='${AR}' PROCESSOR='${PROCESSOR}' PERL='${PERL}' RANLIB='${RANLIB}' all ) || exit 1; \
|
||||
$(MAKE) CC='${CC}' PLATFORM='${PLATFORM}' CFLAG='${CFLAG}' SDIRS='$(SDIRS)' INSTALLTOP='${INSTALLTOP}' PEX_LIBS='${PEX_LIBS}' EX_LIBS='${EX_LIBS}' BN_ASM='${BN_ASM}' DES_ENC='${DES_ENC}' BF_ENC='${BF_ENC}' CAST_ENC='${CAST_ENC}' RC4_ENC='${RC4_ENC}' RC5_ENC='${RC5_ENC}' SHA1_ASM_OBJ='${SHA1_ASM_OBJ}' MD5_ASM_OBJ='${MD5_ASM_OBJ}' RMD160_ASM_OBJ='${RMD160_ASM_OBJ}' AR='${AR}' PROCESSOR='${PROCESSOR}' PERL='${PERL}' RANLIB='${RANLIB}' KRB5_INCLUDES='${KRB5_INCLUDES}' LIBKRB5='${LIBKRB5}' EXE_EXT='${EXE_EXT}' SHARED_LIBS='${SHARED_LIBS}' SHLIB_EXT='${SHLIB_EXT}' SHLIB_TARGET='${SHLIB_TARGET}' all ) || exit 1; \
|
||||
else \
|
||||
$(MAKE) $$i; \
|
||||
fi; \
|
||||
done; \
|
||||
if echo "$(DIRS)" | \
|
||||
egrep '(^| )(crypto|ssl)( |$$)' > /dev/null 2>&1 && \
|
||||
[ -n "$(SHARED_LIBS)" ]; then \
|
||||
$(MAKE) $(SHARED_LIBS); \
|
||||
fi
|
||||
done;
|
||||
|
||||
libcrypto$(SHLIB_EXT): libcrypto.a
|
||||
@if [ "$(SHLIB_TARGET)" != "" ]; then \
|
||||
@@ -218,9 +223,10 @@ libcrypto$(SHLIB_EXT): libcrypto.a
|
||||
else \
|
||||
echo "There's no support for shared libraries on this platform" >&2; \
|
||||
fi
|
||||
|
||||
libssl$(SHLIB_EXT): libcrypto$(SHLIB_EXT) libssl.a
|
||||
@if [ "$(SHLIB_TARGET)" != "" ]; then \
|
||||
$(MAKE) SHLIBDIRS=ssl SHLIBDEPS='-L. -lcrypto' build-shared; \
|
||||
$(MAKE) SHLIBDIRS=ssl SHLIBDEPS='-lcrypto' build-shared; \
|
||||
else \
|
||||
echo "There's no support for shared libraries on this platform" >&2; \
|
||||
fi
|
||||
@@ -234,76 +240,276 @@ clean-shared:
|
||||
done; \
|
||||
fi; \
|
||||
( set -x; rm -f lib$$i$(SHLIB_EXT) ); \
|
||||
done
|
||||
|
||||
link-shared:
|
||||
@for i in $(SHLIBDIRS); do \
|
||||
prev=lib$$i$(SHLIB_EXT); \
|
||||
if [ -n "$(SHARED_LIBS_LINK_EXTS)" ]; then \
|
||||
tmp="$(SHARED_LIBS_LINK_EXTS)"; \
|
||||
for j in $${tmp:-x}; do \
|
||||
( set -x; ln -s -f $$prev lib$$i$$j ); \
|
||||
prev=lib$$i$$j; \
|
||||
done; \
|
||||
if [ "$(PLATFORM)" = "Cygwin" ]; then \
|
||||
( set -x; rm -f cyg$$i$(SHLIB_EXT) lib$$i$(SHLIB_EXT).a ); \
|
||||
fi; \
|
||||
done
|
||||
|
||||
link-shared:
|
||||
@if [ -n "$(SHARED_LIBS_LINK_EXTS)" ]; then \
|
||||
tmp="$(SHARED_LIBS_LINK_EXTS)"; \
|
||||
for i in $(SHLIBDIRS); do \
|
||||
prev=lib$$i$(SHLIB_EXT); \
|
||||
for j in $${tmp:-x}; do \
|
||||
( set -x; ln -f -s $$prev lib$$i$$j ); \
|
||||
prev=lib$$i$$j; \
|
||||
done; \
|
||||
done; \
|
||||
fi
|
||||
|
||||
build-shared: clean-shared do_$(SHLIB_TARGET) link-shared
|
||||
|
||||
do_bsd-gcc-shared: linux-shared
|
||||
do_linux-shared:
|
||||
libs='${SHLIBDEPS}'; for i in ${SHLIBDIRS}; do \
|
||||
( set -x; ${CC} -shared -o lib$$i.so.${SHLIB_MAJOR}.${SHLIB_MINOR} \
|
||||
-Wl,-S,-soname=lib$$i.so.${SHLIB_MAJOR}.${SHLIB_MINOR} \
|
||||
do_bsd-gcc-shared: do_gnu-shared
|
||||
do_linux-shared: do_gnu-shared
|
||||
do_gnu-shared:
|
||||
libs='-L. ${SHLIBDEPS}'; for i in ${SHLIBDIRS}; do \
|
||||
( set -x; ${CC} ${SHARED_LDFLAGS} \
|
||||
-shared -o lib$$i.so.${SHLIB_MAJOR}.${SHLIB_MINOR} \
|
||||
-Wl,-soname=lib$$i.so.${SHLIB_MAJOR}.${SHLIB_MINOR} \
|
||||
-Wl,-Bsymbolic \
|
||||
-Wl,--whole-archive lib$$i.a \
|
||||
-Wl,--no-whole-archive $$libs ${EX_LIBS} -lc ) || exit 1; \
|
||||
libs="$$libs -L. -l$$i"; \
|
||||
libs="$$libs -l$$i"; \
|
||||
done
|
||||
|
||||
DETECT_GNU_LD=${CC} -v 2>&1 | grep '^gcc' >/dev/null 2>&1 && \
|
||||
collect2=`gcc -print-prog-name=collect2 2>&1` && \
|
||||
[ -n "$$collect2" ] && \
|
||||
my_ld=`$$collect2 --help 2>&1 | grep Usage: | sed 's/^Usage: *\([^ ][^ ]*\).*/\1/'` && \
|
||||
[ -n "$$my_ld" ] && \
|
||||
$$my_ld -v 2>&1 | grep 'GNU ld' >/dev/null 2>&1
|
||||
|
||||
# For Darwin AKA Mac OS/X (dyld)
|
||||
do_darwin-shared:
|
||||
libs='-L. ${SHLIBDEPS}'; for i in ${SHLIBDIRS}; do \
|
||||
( set -x ; ${CC} --verbose -dynamiclib -o lib$$i${SHLIB_EXT} \
|
||||
lib$$i.a $$libs -all_load -current_version ${SHLIB_MAJOR}.${SHLIB_MINOR} \
|
||||
-compatibility_version ${SHLIB_MAJOR}.`echo ${SHLIB_MINOR} | cut -d. -f1` \
|
||||
-install_name ${INSTALLTOP}/lib/lib$$i${SHLIB_EXT} ) || exit 1; \
|
||||
libs="$$libs -l`basename $$i${SHLIB_EXT} .dylib`"; \
|
||||
echo "" ; \
|
||||
done
|
||||
|
||||
do_cygwin-shared:
|
||||
libs='-L. ${SHLIBDEPS}'; for i in ${SHLIBDIRS}; do \
|
||||
( set -x; ${CC} -shared -o cyg$$i.dll \
|
||||
-Wl,-Bsymbolic \
|
||||
-Wl,--whole-archive lib$$i.a \
|
||||
-Wl,--out-implib,lib$$i.dll.a \
|
||||
-Wl,--no-whole-archive $$libs ) || exit 1; \
|
||||
libs="$$libs -l$$i"; \
|
||||
done
|
||||
|
||||
# This assumes that GNU utilities are *not* used
|
||||
do_alpha-osf1-shared:
|
||||
if ${DETECT_GNU_LD}; then \
|
||||
$(MAKE) do_gnu-shared; \
|
||||
else \
|
||||
libs='-L. ${SHLIBDEPS}'; for i in ${SHLIBDIRS}; do \
|
||||
( set -x; ${CC} ${SHARED_LDFLAGS} \
|
||||
-shared -o lib$$i.so \
|
||||
-set_version "${SHLIB_VERSION_HISTORY}${SHLIB_VERSION_NUMBER}" \
|
||||
-all lib$$i.a -none $$libs ${EX_LIBS} -lc ) || exit 1; \
|
||||
libs="$$libs -l$$i"; \
|
||||
done; \
|
||||
fi
|
||||
|
||||
# This assumes that GNU utilities are *not* used
|
||||
# The difference between alpha-osf1-shared and tru64-shared is the `-msym'
|
||||
# option passed to the linker.
|
||||
do_tru64-shared:
|
||||
libs='${SHLIBDEPS}'; for i in ${SHLIBDIRS}; do \
|
||||
( set -x; ${CC} -shared -no_archive -o lib$$i.so \
|
||||
-set_version "${SHLIB_VERSION_HISTORY}${SHLIB_VERSION_NUMBER}" \
|
||||
-all lib$$i.a -none $$libs ${EX_LIBS} -lc ) || exit 1; \
|
||||
libs="$$libs -L. -l$$i"; \
|
||||
done
|
||||
if ${DETECT_GNU_LD}; then \
|
||||
$(MAKE) do_gnu-shared; \
|
||||
else \
|
||||
libs='-L. ${SHLIBDEPS}'; for i in ${SHLIBDIRS}; do \
|
||||
( set -x; ${CC} ${SHARED_LDFLAGS} \
|
||||
-shared -msym -o lib$$i.so \
|
||||
-set_version "${SHLIB_VERSION_HISTORY}${SHLIB_VERSION_NUMBER}" \
|
||||
-all lib$$i.a -none $$libs ${EX_LIBS} -lc ) || exit 1; \
|
||||
libs="$$libs -l$$i"; \
|
||||
done; \
|
||||
fi
|
||||
|
||||
# This assumes that GNU utilities are *not* used
|
||||
# The difference between tru64-shared and tru64-shared-rpath is the
|
||||
# -rpath ${INSTALLTOP}/lib passed to the linker.
|
||||
do_tru64-shared-rpath:
|
||||
if ${DETECT_GNU_LD}; then \
|
||||
$(MAKE) do_gnu-shared; \
|
||||
else \
|
||||
libs='-L. ${SHLIBDEPS}'; for i in ${SHLIBDIRS}; do \
|
||||
( set -x; ${CC} ${SHARED_LDFLAGS} \
|
||||
-shared -msym -o lib$$i.so \
|
||||
-rpath ${INSTALLTOP}/lib \
|
||||
-set_version "${SHLIB_VERSION_HISTORY}${SHLIB_VERSION_NUMBER}" \
|
||||
-all lib$$i.a -none $$libs ${EX_LIBS} -lc ) || exit 1; \
|
||||
libs="$$libs -l$$i"; \
|
||||
done; \
|
||||
fi
|
||||
|
||||
|
||||
# This assumes that GNU utilities are *not* used
|
||||
do_solaris-shared:
|
||||
libs='${SHLIBDEPS}'; for i in ${SHLIBDIRS}; do \
|
||||
( set -x; ${CC} -G -o lib$$i.so.${SHLIB_MAJOR}.${SHLIB_MINOR} \
|
||||
-h lib$$i.so.${SHLIB_MAJOR}.${SHLIB_MINOR} \
|
||||
-z allextract lib$$i.a $$libs ${EX_LIBS} -lc ) || exit 1; \
|
||||
libs="$$libs -L. -l$$i"; \
|
||||
done
|
||||
if ${DETECT_GNU_LD}; then \
|
||||
$(MAKE) do_gnu-shared; \
|
||||
else \
|
||||
libs='-L. ${SHLIBDEPS}'; for i in ${SHLIBDIRS}; do \
|
||||
( PATH=/usr/ccs/bin:$$PATH ; export PATH; \
|
||||
set -x; ${CC} ${SHARED_LDFLAGS} \
|
||||
-G -o lib$$i.so.${SHLIB_MAJOR}.${SHLIB_MINOR} \
|
||||
-h lib$$i.so.${SHLIB_MAJOR}.${SHLIB_MINOR} \
|
||||
-z allextract lib$$i.a $$libs ${EX_LIBS} -lc ) || exit 1; \
|
||||
libs="$$libs -l$$i"; \
|
||||
done; \
|
||||
fi
|
||||
|
||||
# OpenServer 5 native compilers used
|
||||
do_svr3-shared:
|
||||
if ${DETECT_GNU_LD}; then \
|
||||
$(MAKE) do_gnu-shared; \
|
||||
else \
|
||||
libs='-L. ${SHLIBDEPS}'; for i in ${SHLIBDIRS}; do \
|
||||
( PATH=/usr/ccs/bin:$$PATH ; export PATH; \
|
||||
find . -name "*.o" -print > allobjs ; \
|
||||
OBJS= ; export OBJS ; \
|
||||
for obj in `ar t lib$$i.a` ; do \
|
||||
OBJS="$${OBJS} `grep $$obj allobjs`" ; \
|
||||
done ; \
|
||||
set -x; ${CC} -G -o lib$$i.so.${SHLIB_MAJOR}.${SHLIB_MINOR} \
|
||||
-h lib$$i.so.${SHLIB_MAJOR}.${SHLIB_MINOR} \
|
||||
$${OBJS} $$libs ${EX_LIBS} ) || exit 1; \
|
||||
libs="$$libs -l$$i"; \
|
||||
done; \
|
||||
fi
|
||||
|
||||
# UnixWare 7 and OpenUNIX 8 native compilers used
|
||||
do_svr5-shared:
|
||||
if ${DETECT_GNU_LD}; then \
|
||||
$(MAKE) do_gnu-shared; \
|
||||
else \
|
||||
libs='-L. ${SHLIBDEPS}'; for i in ${SHLIBDIRS}; do \
|
||||
( PATH=/usr/ccs/bin:$$PATH ; export PATH; \
|
||||
find . -name "*.o" -print > allobjs ; \
|
||||
OBJS= ; export OBJS ; \
|
||||
for obj in `ar t lib$$i.a` ; do \
|
||||
OBJS="$${OBJS} `grep $$obj allobjs`" ; \
|
||||
done ; \
|
||||
set -x; ${CC} ${SHARED_LDFLAGS} \
|
||||
-G -o lib$$i.so.${SHLIB_MAJOR}.${SHLIB_MINOR} \
|
||||
-h lib$$i.so.${SHLIB_MAJOR}.${SHLIB_MINOR} \
|
||||
$${OBJS} $$libs ${EX_LIBS} ) || exit 1; \
|
||||
libs="$$libs -l$$i"; \
|
||||
done; \
|
||||
fi
|
||||
|
||||
# This assumes that GNU utilities are *not* used
|
||||
do_irix-shared:
|
||||
libs='${SHLIBDEPS}'; for i in ${SHLIBDIRS}; do \
|
||||
( set -x; ${CC} -shared -o lib$$i.so.${SHLIB_MAJOR}.${SHLIB_MINOR} \
|
||||
-Wl,-soname,lib$$i.so.${SHLIB_MAJOR}.${SHLIB_MINOR} \
|
||||
-all lib$$i.a $$libs ${EX_LIBS} -lc) || exit 1; \
|
||||
libs="$$libs -L. -l$$i"; \
|
||||
done
|
||||
if ${DETECT_GNU_LD}; then \
|
||||
$(MAKE) do_gnu-shared; \
|
||||
else \
|
||||
libs='-L. ${SHLIBDEPS}'; for i in ${SHLIBDIRS}; do \
|
||||
( set -x; ${CC} ${SHARED_LDFLAGS} \
|
||||
-shared -o lib$$i.so.${SHLIB_MAJOR}.${SHLIB_MINOR} \
|
||||
-Wl,-soname,lib$$i.so.${SHLIB_MAJOR}.${SHLIB_MINOR} \
|
||||
-all lib$$i.a $$libs ${EX_LIBS} -lc) || exit 1; \
|
||||
libs="$$libs -l$$i"; \
|
||||
done; \
|
||||
fi
|
||||
|
||||
# This assumes that GNU utilities are *not* used
|
||||
# HP-UX includes the full pathname of libs we depend on, so we would get
|
||||
# ./libcrypto (with ./ as path information) compiled into libssl, hence
|
||||
# we omit the SHLIBDEPS. Applications must be linked with -lssl -lcrypto
|
||||
# anyway.
|
||||
# The object modules are loaded from lib$i.a using the undocumented -Fl
|
||||
# option.
|
||||
#
|
||||
# WARNING: Until DSO is fixed to support a search path, we support SHLIB_PATH
|
||||
# by temporarily specifying "+s"!
|
||||
#
|
||||
do_hpux-shared:
|
||||
libs='${SHLIBDEPS}'; for i in ${SHLIBDIRS}; do \
|
||||
( set -x; /usr/ccs/bin/ld +vnocompatwarnings \
|
||||
-b -z -o lib$$i.sl.${SHLIB_MAJOR}.${SHLIB_MINOR} \
|
||||
for i in ${SHLIBDIRS}; do \
|
||||
( set -x; /usr/ccs/bin/ld ${SHARED_LDFLAGS} \
|
||||
+vnocompatwarnings \
|
||||
-b -z +s \
|
||||
-o lib$$i.sl.${SHLIB_MAJOR}.${SHLIB_MINOR} \
|
||||
+h lib$$i.sl.${SHLIB_MAJOR}.${SHLIB_MINOR} \
|
||||
-Fl lib$$i.a $$libs ${EX_LIBS} -lc ) || exit 1; \
|
||||
libs="$$libs -L. -l$$i"; \
|
||||
-Fl lib$$i.a -ldld -lc ) || exit 1; \
|
||||
done
|
||||
|
||||
# This assumes that GNU utilities are *not* used
|
||||
# HP-UX includes the full pathname of libs we depend on, so we would get
|
||||
# ./libcrypto (with ./ as path information) compiled into libssl, hence
|
||||
# we omit the SHLIBDEPS. Applications must be linked with -lssl -lcrypto
|
||||
# anyway.
|
||||
#
|
||||
# HP-UX in 64bit mode has "+s" enabled by default; it will search for
|
||||
# shared libraries along LD_LIBRARY_PATH _and_ SHLIB_PATH.
|
||||
#
|
||||
do_hpux64-shared:
|
||||
libs='${SHLIBDEPS}'; for i in ${SHLIBDIRS}; do \
|
||||
( set -x; /usr/ccs/bin/ld -b -z -o lib$$i.sl.${SHLIB_MAJOR}.${SHLIB_MINOR} \
|
||||
for i in ${SHLIBDIRS}; do \
|
||||
( set -x; /usr/ccs/bin/ld ${SHARED_LDFLAGS} \
|
||||
-b -z \
|
||||
-o lib$$i.sl.${SHLIB_MAJOR}.${SHLIB_MINOR} \
|
||||
+h lib$$i.sl.${SHLIB_MAJOR}.${SHLIB_MINOR} \
|
||||
+forceload lib$$i.a $$libs ${EX_LIBS} -lc ) || exit 1; \
|
||||
libs="$$libs -L. -l$$i"; \
|
||||
+forceload lib$$i.a -ldl -lc ) || exit 1; \
|
||||
done
|
||||
|
||||
# The following method is said to work on all platforms. Tests will
|
||||
# determine if that's how it's gong to be used.
|
||||
# This assumes that for all but GNU systems, GNU utilities are *not* used.
|
||||
# ALLSYMSFLAGS would be:
|
||||
# GNU systems: --whole-archive
|
||||
# Tru64 Unix: -all
|
||||
# Solaris: -z allextract
|
||||
# Irix: -all
|
||||
# HP/UX-32bit: -Fl
|
||||
# HP/UX-64bit: +forceload
|
||||
# AIX: -bnogc
|
||||
# SHAREDFLAGS would be:
|
||||
# GNU systems: -shared -Wl,-soname=lib$$i.so.${SHLIB_MAJOR}.${SHLIB_MINOR}
|
||||
# Tru64 Unix: -shared \
|
||||
# -set_version "${SHLIB_VERSION_HISTORY}${SHLIB_VERSION_NUMBER}"
|
||||
# Solaris: -G -h lib$$i.so.${SHLIB_MAJOR}.${SHLIB_MINOR}
|
||||
# Irix: -shared -Wl,-soname,lib$$i.so.${SHLIB_MAJOR}.${SHLIB_MINOR}
|
||||
# HP/UX-32bit: +vnocompatwarnings -b -z +s \
|
||||
# +h lib$$i.sl.${SHLIB_MAJOR}.${SHLIB_MINOR}
|
||||
# HP/UX-64bit: -b -z +h lib$$i.sl.${SHLIB_MAJOR}.${SHLIB_MINOR}
|
||||
# AIX: -G -bE:lib$$i.exp -bM:SRE
|
||||
# SHAREDCMD would be:
|
||||
# GNU systems: $(CC)
|
||||
# Tru64 Unix: $(CC)
|
||||
# Solaris: $(CC)
|
||||
# Irix: $(CC)
|
||||
# HP/UX-32bit: /usr/ccs/bin/ld
|
||||
# HP/UX-64bit: /usr/ccs/bin/ld
|
||||
# AIX: $(CC)
|
||||
ALLSYMSFLAG=-bnogc
|
||||
SHAREDFLAGS=${SHARED_LDFLAGS} -G -bE:lib$$i.exp -bM:SRE
|
||||
SHAREDCMD=$(CC)
|
||||
do_aix-shared:
|
||||
libs='-L. ${SHLIBDEPS}'; for i in ${SHLIBDIRS}; do \
|
||||
( set -x; \
|
||||
ld -r -o $$i.o $(ALLSYMSFLAG) lib$$i.a && \
|
||||
( nm -Pg lib$$i.o | grep ' [BD] ' | cut -f1 -d' ' > lib$$i.exp; \
|
||||
$(SHAREDCMD) $(SHAREDFLAG) -o lib$$i.so lib$$i.o \
|
||||
$$libs ${EX_LIBS} ) ) \
|
||||
|| exit 1; \
|
||||
libs="$$libs -l$$i"; \
|
||||
done
|
||||
|
||||
do_reliantunix-shared:
|
||||
libs='-L. ${SHLIBDEPS}'; for i in ${SHLIBDIRS}; do \
|
||||
tmpdir=/tmp/openssl.$$$$ ; rm -rf $$tmpdir ; \
|
||||
( set -x; \
|
||||
( Opwd=`pwd` ; mkdir $$tmpdir || exit 1; \
|
||||
cd $$tmpdir || exit 1 ; ar x $$Opwd/lib$$i.a ; \
|
||||
${CC} -G -o lib$$i.so.${SHLIB_MAJOR}.${SHLIB_MINOR} *.o \
|
||||
) || exit 1; \
|
||||
cp $$tmpdir/lib$$i.so.${SHLIB_MAJOR}.${SHLIB_MINOR} . ; \
|
||||
) || exit 1; \
|
||||
rm -rf $$tmpdir ; \
|
||||
libs="$$libs -l$$i"; \
|
||||
done
|
||||
|
||||
Makefile.ssl: Makefile.org
|
||||
@@ -352,7 +558,7 @@ links:
|
||||
@for i in $(DIRS); do \
|
||||
if [ -d "$$i" ]; then \
|
||||
(cd $$i && echo "making links in $$i..." && \
|
||||
$(MAKE) CC='${CC}' PLATFORM='${PLATFORM}' CFLAG='${CFLAG}' SDIRS='$(SDIRS)' INSTALLTOP='${INSTALLTOP}' PEX_LIBS='${PEX_LIBS}' EX_LIBS='${EX_LIBS}' BN_ASM='${BN_ASM}' DES_ENC='${DES_ENC}' BF_ENC='${BF_ENC}' CAST_ENC='${CAST_ENC}' RC4_ENC='${RC4_ENC}' RC5_ENC='${RC5_ENC}' SHA1_ASM_OBJ='${SHA1_ASM_OBJ}' MD5_ASM_OBJ='${MD5_ASM_OBJ}' RMD160_ASM_OBJ='${RMD160_ASM_OBJ}' AR='${AR}' PERL='${PERL}' links ) || exit 1; \
|
||||
$(MAKE) CC='${CC}' PLATFORM='${PLATFORM}' CFLAG='${CFLAG}' SDIRS='$(SDIRS)' INSTALLTOP='${INSTALLTOP}' PEX_LIBS='${PEX_LIBS}' EX_LIBS='${EX_LIBS}' BN_ASM='${BN_ASM}' DES_ENC='${DES_ENC}' BF_ENC='${BF_ENC}' CAST_ENC='${CAST_ENC}' RC4_ENC='${RC4_ENC}' RC5_ENC='${RC5_ENC}' SHA1_ASM_OBJ='${SHA1_ASM_OBJ}' MD5_ASM_OBJ='${MD5_ASM_OBJ}' RMD160_ASM_OBJ='${RMD160_ASM_OBJ}' AR='${AR}' PERL='${PERL}' KRB5_INCLUDES='${KRB5_INCLUDES}' LIBKRB5='${LIBKRB5}' links ) || exit 1; \
|
||||
fi; \
|
||||
done;
|
||||
|
||||
@@ -368,15 +574,21 @@ dclean:
|
||||
|
||||
rehash: rehash.time
|
||||
rehash.time: certs
|
||||
@(OPENSSL="`pwd`/apps/openssl"; export OPENSSL; $(PERL) tools/c_rehash certs)
|
||||
@(OPENSSL="`pwd`/apps/openssl"; OPENSSL_DEBUG_MEMORY=on; \
|
||||
export OPENSSL OPENSSL_DEBUG_MEMORY; \
|
||||
LD_LIBRARY_PATH="`pwd`"; SHLIB_PATH="`pwd`"; LIBPATH="`pwd`"; \
|
||||
export LD_LIBRARY_PATH SHLIB_PATH LIBPATH; \
|
||||
$(PERL) tools/c_rehash certs)
|
||||
touch rehash.time
|
||||
|
||||
test: tests
|
||||
|
||||
tests: rehash
|
||||
@(cd test && echo "testing..." && \
|
||||
$(MAKE) CC='${CC}' CFLAG='${CFLAG}' INSTALLTOP='${INSTALLTOP}' PEX_LIBS='${PEX_LIBS}' EX_LIBS='${EX_LIBS}' BN_ASM='${BN_ASM}' DES_ENC='${DES_ENC}' BF_ENC='${BF_ENC}' CAST_ENC='${CAST_ENC}' RC4_ENC='${RC4_ENC}' RC5_ENC='${RC5_ENC}' SDIRS='${SDIRS}' SHA1_ASM_OBJ='${SHA1_ASM_OBJ}' MD5_ASM_OBJ='${MD5_ASM_OBJ}' RMD160_ASM_OBJ='${RMD160_ASM_OBJ}' AR='${AR}' tests );
|
||||
@apps/openssl version -a
|
||||
$(MAKE) CC='${CC}' CFLAG='${CFLAG}' INSTALLTOP='${INSTALLTOP}' PEX_LIBS='${PEX_LIBS}' EX_LIBS='${EX_LIBS}' BN_ASM='${BN_ASM}' DES_ENC='${DES_ENC}' BF_ENC='${BF_ENC}' CAST_ENC='${CAST_ENC}' RC4_ENC='${RC4_ENC}' RC5_ENC='${RC5_ENC}' SDIRS='${SDIRS}' SHA1_ASM_OBJ='${SHA1_ASM_OBJ}' MD5_ASM_OBJ='${MD5_ASM_OBJ}' RMD160_ASM_OBJ='${RMD160_ASM_OBJ}' AR='${AR}' PERL='${PERL}' TESTS='${TESTS}' KRB5_INCLUDES='${KRB5_INCLUDES}' LIBKRB5='${LIBKRB5}' EXE_EXT='${EXE_EXT}' OPENSSL_DEBUG_MEMORY=on tests );
|
||||
@LD_LIBRARY_PATH="`pwd`"; SHLIB_PATH="`pwd`"; LIBPATH="`pwd`"; \
|
||||
export LD_LIBRARY_PATH SHLIB_PATH LIBPATH; \
|
||||
apps/openssl version -a
|
||||
|
||||
report:
|
||||
@$(PERL) util/selftest.pl
|
||||
@@ -386,7 +598,7 @@ depend:
|
||||
do \
|
||||
if [ -d "$$i" ]; then \
|
||||
(cd $$i && echo "making dependencies $$i..." && \
|
||||
$(MAKE) SDIRS='${SDIRS}' DEPFLAG='${DEPFLAG}' depend ) || exit 1; \
|
||||
$(MAKE) SDIRS='${SDIRS}' DEPFLAG='${DEPFLAG}' MAKEDEPPROG='${MAKEDEPPROG}' KRB5_INCLUDES='${KRB5_INCLUDES}' depend ) || exit 1; \
|
||||
fi; \
|
||||
done;
|
||||
|
||||
@@ -409,25 +621,26 @@ tags:
|
||||
done;
|
||||
|
||||
errors:
|
||||
perl util/mkerr.pl -recurse -write
|
||||
$(PERL) util/mkerr.pl -recurse -write
|
||||
(cd crypto/engine; $(MAKE) PERL=$(PERL) errors)
|
||||
|
||||
stacks:
|
||||
perl util/mkstack.pl -write
|
||||
$(PERL) util/mkstack.pl -write
|
||||
|
||||
util/libeay.num::
|
||||
perl util/mkdef.pl crypto update
|
||||
$(PERL) util/mkdef.pl crypto update
|
||||
|
||||
util/ssleay.num::
|
||||
perl util/mkdef.pl ssl update
|
||||
$(PERL) util/mkdef.pl ssl update
|
||||
|
||||
crypto/objects/obj_dat.h: crypto/objects/obj_mac.h crypto/objects/obj_dat.pl
|
||||
perl crypto/objects/obj_dat.pl crypto/objects/obj_mac.h crypto/objects/obj_dat.h
|
||||
crypto/objects/obj_mac.h: crypto/objects/objects.pl crypto/objects/objects.txt
|
||||
perl crypto/objects/objects.pl crypto/objects/objects.txt crypto/objects/obj_mac.num crypto/objects/obj_mac.h
|
||||
crypto/objects/obj_dat.h: crypto/objects/obj_dat.pl crypto/objects/obj_mac.h
|
||||
$(PERL) crypto/objects/obj_dat.pl crypto/objects/obj_mac.h crypto/objects/obj_dat.h
|
||||
crypto/objects/obj_mac.h: crypto/objects/objects.pl crypto/objects/objects.txt crypto/objects/obj_mac.num
|
||||
$(PERL) crypto/objects/objects.pl crypto/objects/objects.txt crypto/objects/obj_mac.num crypto/objects/obj_mac.h
|
||||
|
||||
TABLE: Configure
|
||||
(echo 'Output of `Configure TABLE'"':"; \
|
||||
perl Configure TABLE) > TABLE
|
||||
$(PERL) Configure TABLE) > TABLE
|
||||
|
||||
update: depend errors stacks util/libeay.num util/ssleay.num crypto/objects/obj_dat.h TABLE
|
||||
|
||||
@@ -440,6 +653,14 @@ tar:
|
||||
gzip --best >../$(TARFILE).gz; \
|
||||
ls -l ../$(TARFILE).gz
|
||||
|
||||
tar-snap:
|
||||
@$(TAR) $(TARFLAGS) -cvf - \
|
||||
`find * \! -path CVS/\* \! -path \*/CVS/\* \! -name CVS \! -name .cvsignore \! -name STATUS \! -name TABLE \! -name '*.o' \! -name '*.a' \! -name '*.so' \! -name '*.so.*' \! -name 'openssl' \! -name '*test' \! -name '.#*' \! -name '*~' | sort` |\
|
||||
tardy --user_number=0 --user_name=openssl \
|
||||
--group_number=0 --group_name=openssl \
|
||||
--prefix=openssl-$(VERSION) - > ../$(TARFILE);\
|
||||
ls -l ../$(TARFILE)
|
||||
|
||||
dist:
|
||||
$(PERL) Configure dist
|
||||
@$(MAKE) dist_pem_h
|
||||
@@ -466,7 +687,7 @@ install: all install_docs
|
||||
do \
|
||||
if [ -d "$$i" ]; then \
|
||||
(cd $$i; echo "installing $$i..."; \
|
||||
$(MAKE) CC='${CC}' CFLAG='${CFLAG}' INSTALL_PREFIX='${INSTALL_PREFIX}' INSTALLTOP='${INSTALLTOP}' OPENSSLDIR='${OPENSSLDIR}' EX_LIBS='${EX_LIBS}' SDIRS='${SDIRS}' RANLIB='${RANLIB}' install ); \
|
||||
$(MAKE) CC='${CC}' CFLAG='${CFLAG}' INSTALL_PREFIX='${INSTALL_PREFIX}' INSTALLTOP='${INSTALLTOP}' OPENSSLDIR='${OPENSSLDIR}' EX_LIBS='${EX_LIBS}' SDIRS='${SDIRS}' RANLIB='${RANLIB}' EXE_EXT='${EXE_EXT}' install ); \
|
||||
fi; \
|
||||
done
|
||||
@for i in $(LIBS) ;\
|
||||
@@ -476,17 +697,25 @@ install: all install_docs
|
||||
cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/lib; \
|
||||
$(RANLIB) $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i; \
|
||||
chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i ); \
|
||||
fi \
|
||||
done
|
||||
fi; \
|
||||
done;
|
||||
@if [ -n "$(SHARED_LIBS)" ]; then \
|
||||
tmp="$(SHARED_LIBS)"; \
|
||||
for i in $${tmp:-x}; \
|
||||
do \
|
||||
if [ -f "$$i" ]; then \
|
||||
if [ -f "$$i" -o -f "$$i.a" ]; then \
|
||||
( echo installing $$i; \
|
||||
cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/lib; \
|
||||
chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i ); \
|
||||
fi \
|
||||
if [ "$(PLATFORM)" != "Cygwin" ]; then \
|
||||
cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/lib; \
|
||||
chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i; \
|
||||
else \
|
||||
c=`echo $$i | sed 's/^lib/cyg/'`; \
|
||||
cp $$c $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$c; \
|
||||
chmod 755 $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$c; \
|
||||
cp $$i.a $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i.a; \
|
||||
chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i.a; \
|
||||
fi ); \
|
||||
fi; \
|
||||
done; \
|
||||
( here="`pwd`"; \
|
||||
cd $(INSTALL_PREFIX)$(INSTALLTOP)/lib; \
|
||||
@@ -501,7 +730,7 @@ install_docs:
|
||||
$(INSTALL_PREFIX)$(MANDIR)/man7
|
||||
@for i in doc/apps/*.pod; do \
|
||||
fn=`basename $$i .pod`; \
|
||||
sec=`[ "$$fn" = "config" ] && echo 5 || echo 1`; \
|
||||
if [ "$$fn" = "config" ]; then sec=5; else sec=1; fi; \
|
||||
echo "installing man$$sec/`basename $$i .pod`.$$sec"; \
|
||||
(cd `dirname $$i`; \
|
||||
$(PERL) ../../util/pod2man.pl --section=$$sec --center=OpenSSL \
|
||||
@@ -510,7 +739,7 @@ install_docs:
|
||||
done
|
||||
@for i in doc/crypto/*.pod doc/ssl/*.pod; do \
|
||||
fn=`basename $$i .pod`; \
|
||||
sec=`[ "$$fn" = "des_modes" ] && echo 7 || echo 3`; \
|
||||
if [ "$$fn" = "des_modes" ]; then sec=7; else sec=3; fi; \
|
||||
echo "installing man$$sec/`basename $$i .pod`.$$sec"; \
|
||||
(cd `dirname $$i`; \
|
||||
$(PERL) ../../util/pod2man.pl --section=$$sec --center=OpenSSL \
|
||||
|
||||
95
NEWS
95
NEWS
@@ -5,6 +5,101 @@
|
||||
This file gives a brief overview of the major changes between each OpenSSL
|
||||
release. For more details please read the CHANGES file.
|
||||
|
||||
Major changes between OpenSSL 0.9.6 and OpenSSL 0.9.7:
|
||||
|
||||
o New library section OCSP.
|
||||
o Complete rewrite of ASN1 code.
|
||||
o CRL checking in verify code and openssl utility.
|
||||
o Extension copying in 'ca' utility.
|
||||
o Flexible display options in 'ca' utility.
|
||||
o Provisional support for international characters with UTF8.
|
||||
o Support for external crypto devices ('engine') is no longer
|
||||
a separate distribution.
|
||||
o New elliptic curve library section.
|
||||
o New AES (Rijndael) library section.
|
||||
o Change DES API to clean up the namespace (some applications link also
|
||||
against libdes providing similar functions having the same name).
|
||||
Provide macros for backward compatibility (will be removed in the
|
||||
future).
|
||||
o Unifiy handling of cryptographic algorithms (software and
|
||||
engine) to be available via EVP routines for asymmetric and
|
||||
symmetric ciphers.
|
||||
o NCONF: new configuration handling routines.
|
||||
o Change API to use more 'const' modifiers to improve error checking
|
||||
and help optimizers.
|
||||
o Finally remove references to RSAref.
|
||||
o Reworked parts of the BIGNUM code.
|
||||
o Support for new engines: Broadcom ubsec, Accelerated Encryption
|
||||
Processing, IBM 4758.
|
||||
o PRNG: query at more locations for a random device, automatic query for
|
||||
EGD style random sources at several locations.
|
||||
o SSL/TLS: allow optional cipher choice according to server's preference.
|
||||
o SSL/TLS: allow server to explicitly set new session ids.
|
||||
o SSL/TLS: support Kerberos cipher suites (RFC2712).
|
||||
o SSL/TLS: allow more precise control of renegotiations and sessions.
|
||||
o SSL/TLS: add callback to retrieve SSL/TLS messages.
|
||||
o SSL/TLS: add draft AES ciphersuites (disabled unless explicitly requested).
|
||||
|
||||
Major changes between OpenSSL 0.9.6c and OpenSSL 0.9.6d:
|
||||
|
||||
o Various SSL/TLS library bugfixes.
|
||||
o Fix DH parameter generation for 'non-standard' generators.
|
||||
|
||||
Major changes between OpenSSL 0.9.6b and OpenSSL 0.9.6c:
|
||||
|
||||
o Various SSL/TLS library bugfixes.
|
||||
o BIGNUM library fixes.
|
||||
o RSA OAEP and random number generation fixes.
|
||||
o Object identifiers corrected and added.
|
||||
o Add assembler BN routines for IA64.
|
||||
o Add support for OS/390 Unix, UnixWare with gcc, OpenUNIX 8,
|
||||
MIPS Linux; shared library support for Irix, HP-UX.
|
||||
o Add crypto accelerator support for AEP, Baltimore SureWare,
|
||||
Broadcom and Cryptographic Appliance's keyserver
|
||||
[in 0.9.6c-engine release].
|
||||
|
||||
Major changes between OpenSSL 0.9.6a and OpenSSL 0.9.6b:
|
||||
|
||||
o Security fix: PRNG improvements.
|
||||
o Security fix: RSA OAEP check.
|
||||
o Security fix: Reinsert and fix countermeasure to Bleichbacher's
|
||||
attack.
|
||||
o MIPS bug fix in BIGNUM.
|
||||
o Bug fix in "openssl enc".
|
||||
o Bug fix in X.509 printing routine.
|
||||
o Bug fix in DSA verification routine and DSA S/MIME verification.
|
||||
o Bug fix to make PRNG thread-safe.
|
||||
o Bug fix in RAND_file_name().
|
||||
o Bug fix in compatibility mode trust settings.
|
||||
o Bug fix in blowfish EVP.
|
||||
o Increase default size for BIO buffering filter.
|
||||
o Compatibility fixes in some scripts.
|
||||
|
||||
Major changes between OpenSSL 0.9.6 and OpenSSL 0.9.6a:
|
||||
|
||||
o Security fix: change behavior of OpenSSL to avoid using
|
||||
environment variables when running as root.
|
||||
o Security fix: check the result of RSA-CRT to reduce the
|
||||
possibility of deducing the private key from an incorrectly
|
||||
calculated signature.
|
||||
o Security fix: prevent Bleichenbacher's DSA attack.
|
||||
o Security fix: Zero the premaster secret after deriving the
|
||||
master secret in DH ciphersuites.
|
||||
o Reimplement SSL_peek(), which had various problems.
|
||||
o Compatibility fix: the function des_encrypt() renamed to
|
||||
des_encrypt1() to avoid clashes with some Unixen libc.
|
||||
o Bug fixes for Win32, HP/UX and Irix.
|
||||
o Bug fixes in BIGNUM, SSL, PKCS#7, PKCS#12, X.509, CONF and
|
||||
memory checking routines.
|
||||
o Bug fixes for RSA operations in threaded enviroments.
|
||||
o Bug fixes in misc. openssl applications.
|
||||
o Remove a few potential memory leaks.
|
||||
o Add tighter checks of BIGNUM routines.
|
||||
o Shared library support has been reworked for generality.
|
||||
o More documentation.
|
||||
o New function BN_rand_range().
|
||||
o Add "-rand" option to openssl s_client and s_server.
|
||||
|
||||
Major changes between OpenSSL 0.9.5a and OpenSSL 0.9.6:
|
||||
|
||||
o Some documentation for BIO and SSL libraries.
|
||||
|
||||
16
README
16
README
@@ -1,7 +1,7 @@
|
||||
|
||||
OpenSSL 0.9.7-dev 24 Sep 2000
|
||||
OpenSSL 0.9.8-dev XX xxx XXXX
|
||||
|
||||
Copyright (c) 1998-2000 The OpenSSL Project
|
||||
Copyright (c) 1998-2002 The OpenSSL Project
|
||||
Copyright (c) 1995-1998 Eric A. Young, Tim J. Hudson
|
||||
All rights reserved.
|
||||
|
||||
@@ -62,7 +62,7 @@
|
||||
|
||||
X.509v3 certificates
|
||||
X509 encoding/decoding into/from binary ASN1 and a PEM
|
||||
based ascii-binary encoding which supports encryption with a
|
||||
based ASCII-binary encoding which supports encryption with a
|
||||
private key. Program to generate RSA and DSA certificate
|
||||
requests and to generate RSA and DSA certificates.
|
||||
|
||||
@@ -97,7 +97,7 @@
|
||||
locations around the world. _YOU_ are responsible for ensuring that your use
|
||||
of any algorithms is legal by checking if there are any patents in your
|
||||
country. The file contains some of the patents that we know about or are
|
||||
rumoured to exist. This is not a definitive list.
|
||||
rumored to exist. This is not a definitive list.
|
||||
|
||||
RSA Security holds software patents on the RC5 algorithm. If you
|
||||
intend to use this cipher, you must contact RSA Security for
|
||||
@@ -107,8 +107,8 @@
|
||||
only be used with RSA Security's permission.
|
||||
|
||||
The IDEA algorithm is patented by Ascom in Austria, France, Germany, Italy,
|
||||
Japan, Netherlands, Spain, Sweden, Switzerland, UK and the USA. They should
|
||||
be contacted if that algorithm is to be used, their web page is
|
||||
Japan, the Netherlands, Spain, Sweden, Switzerland, UK and the USA. They
|
||||
should be contacted if that algorithm is to be used; their web page is
|
||||
http://www.ascom.ch/.
|
||||
|
||||
INSTALLATION
|
||||
@@ -119,8 +119,8 @@
|
||||
INSTALL.VMS.
|
||||
|
||||
Read the documentation in the doc/ directory. It is quite rough, but it
|
||||
lists the functions, you will probably have to look at the code to work out
|
||||
how to used them. Look at the example programs.
|
||||
lists the functions; you will probably have to look at the code to work out
|
||||
how to use them. Look at the example programs.
|
||||
|
||||
SUPPORT
|
||||
-------
|
||||
|
||||
187
README.ASN1
Normal file
187
README.ASN1
Normal file
@@ -0,0 +1,187 @@
|
||||
|
||||
OpenSSL ASN1 Revision
|
||||
=====================
|
||||
|
||||
This document describes some of the issues relating to the new ASN1 code.
|
||||
|
||||
Previous OpenSSL ASN1 problems
|
||||
=============================
|
||||
|
||||
OK why did the OpenSSL ASN1 code need revising in the first place? Well
|
||||
there are lots of reasons some of which are included below...
|
||||
|
||||
1. The code is difficult to read and write. For every single ASN1 structure
|
||||
(e.g. SEQUENCE) four functions need to be written for new, free, encode and
|
||||
decode operations. This is a very painful and error prone operation. Very few
|
||||
people have ever written any OpenSSL ASN1 and those that have usually wish
|
||||
they hadn't.
|
||||
|
||||
2. Partly because of 1. the code is bloated and takes up a disproportionate
|
||||
amount of space. The SEQUENCE encoder is particularly bad: it essentially
|
||||
contains two copies of the same operation, one to compute the SEQUENCE length
|
||||
and the other to encode it.
|
||||
|
||||
3. The code is memory based: that is it expects to be able to read the whole
|
||||
structure from memory. This is fine for small structures but if you have a
|
||||
(say) 1Gb PKCS#7 signedData structure it isn't such a good idea...
|
||||
|
||||
4. The code for the ASN1 IMPLICIT tag is evil. It is handled by temporarily
|
||||
changing the tag to the expected one, attempting to read it, then changing it
|
||||
back again. This means that decode buffers have to be writable even though they
|
||||
are ultimately unchanged. This gets in the way of constification.
|
||||
|
||||
5. The handling of EXPLICIT isn't much better. It adds a chunk of code into
|
||||
the decoder and encoder for every EXPLICIT tag.
|
||||
|
||||
6. APPLICATION and PRIVATE tags aren't even supported at all.
|
||||
|
||||
7. Even IMPLICIT isn't complete: there is no support for implicitly tagged
|
||||
types that are not OPTIONAL.
|
||||
|
||||
8. Much of the code assumes that a tag will fit in a single octet. This is
|
||||
only true if the tag is 30 or less (mercifully tags over 30 are rare).
|
||||
|
||||
9. The ASN1 CHOICE type has to be largely handled manually, there aren't any
|
||||
macros that properly support it.
|
||||
|
||||
10. Encoders have no concept of OPTIONAL and have no error checking. If the
|
||||
passed structure contains a NULL in a mandatory field it will not be encoded,
|
||||
resulting in an invalid structure.
|
||||
|
||||
11. It is tricky to add ASN1 encoders and decoders to external applications.
|
||||
|
||||
Template model
|
||||
==============
|
||||
|
||||
One of the major problems with revision is the sheer volume of the ASN1 code.
|
||||
Attempts to change (for example) the IMPLICIT behaviour would result in a
|
||||
modification of *every* single decode function.
|
||||
|
||||
I decided to adopt a template based approach. I'm using the term 'template'
|
||||
in a manner similar to SNACC templates: it has nothing to do with C++
|
||||
templates.
|
||||
|
||||
A template is a description of an ASN1 module as several constant C structures.
|
||||
It describes in a machine readable way exactly how the ASN1 structure should
|
||||
behave. If this template contains enough detail then it is possible to write
|
||||
versions of new, free, encode, decode (and possibly others operations) that
|
||||
operate on templates.
|
||||
|
||||
Instead of having to write code to handle each operation only a single
|
||||
template needs to be written. If new operations are needed (such as a 'print'
|
||||
operation) only a single new template based function needs to be written
|
||||
which will then automatically handle all existing templates.
|
||||
|
||||
Plans for revision
|
||||
==================
|
||||
|
||||
The revision will consist of the following steps. Other than the first two
|
||||
these can be handled in any order.
|
||||
|
||||
o Design and write template new, free, encode and decode operations, initially
|
||||
memory based. *DONE*
|
||||
|
||||
o Convert existing ASN1 code to template form. *IN PROGRESS*
|
||||
|
||||
o Convert an existing ASN1 compiler (probably SNACC) to output templates
|
||||
in OpenSSL form.
|
||||
|
||||
o Add support for BIO based ASN1 encoders and decoders to handle large
|
||||
structures, initially blocking I/O.
|
||||
|
||||
o Add support for non blocking I/O: this is quite a bit harder than blocking
|
||||
I/O.
|
||||
|
||||
o Add new ASN1 structures, such as OCSP, CRMF, S/MIME v3 (CMS), attribute
|
||||
certificates etc etc.
|
||||
|
||||
Description of major changes
|
||||
============================
|
||||
|
||||
The BOOLEAN type now takes three values. 0xff is TRUE, 0 is FALSE and -1 is
|
||||
absent. The meaning of absent depends on the context. If for example the
|
||||
boolean type is DEFAULT FALSE (as in the case of the critical flag for
|
||||
certificate extensions) then -1 is FALSE, if DEFAULT TRUE then -1 is TRUE.
|
||||
Usually the value will only ever be read via an API which will hide this from
|
||||
an application.
|
||||
|
||||
There is an evil bug in the old ASN1 code that mishandles OPTIONAL with
|
||||
SEQUENCE OF or SET OF. These are both implemented as a STACK structure. The
|
||||
old code would omit the structure if the STACK was NULL (which is fine) or if
|
||||
it had zero elements (which is NOT OK). This causes problems because an empty
|
||||
SEQUENCE OF or SET OF will result in an empty STACK when it is decoded but when
|
||||
it is encoded it will be omitted resulting in different encodings. The new code
|
||||
only omits the encoding if the STACK is NULL, if it contains zero elements it
|
||||
is encoded and empty. There is an additional problem though: because an empty
|
||||
STACK was omitted, sometimes the corresponding *_new() function would
|
||||
initialize the STACK to empty so an application could immediately use it, if
|
||||
this is done with the new code (i.e. a NULL) it wont work. Therefore a new
|
||||
STACK should be allocated first. One instance of this is the X509_CRL list of
|
||||
revoked certificates: a helper function X509_CRL_add0_revoked() has been added
|
||||
for this purpose.
|
||||
|
||||
The X509_ATTRIBUTE structure used to have an element called 'set' which took
|
||||
the value 1 if the attribute value was a SET OF or 0 if it was a single. Due
|
||||
to the behaviour of CHOICE in the new code this has been changed to a field
|
||||
called 'single' which is 0 for a SET OF and 1 for single. The old field has
|
||||
been deleted to deliberately break source compatibility. Since this structure
|
||||
is normally accessed via higher level functions this shouldn't break too much.
|
||||
|
||||
The X509_REQ_INFO certificate request info structure no longer has a field
|
||||
called 'req_kludge'. This used to be set to 1 if the attributes field was
|
||||
(incorrectly) omitted. You can check to see if the field is omitted now by
|
||||
checking if the attributes field is NULL. Similarly if you need to omit
|
||||
the field then free attributes and set it to NULL.
|
||||
|
||||
The top level 'detached' field in the PKCS7 structure is no longer set when
|
||||
a PKCS#7 structure is read in. PKCS7_is_detached() should be called instead.
|
||||
The behaviour of PKCS7_get_detached() is unaffected.
|
||||
|
||||
The values of 'type' in the GENERAL_NAME structure have changed. This is
|
||||
because the old code use the ASN1 initial octet as the selector. The new
|
||||
code uses the index in the ASN1_CHOICE template.
|
||||
|
||||
The DIST_POINT_NAME structure has changed to be a true CHOICE type.
|
||||
|
||||
typedef struct DIST_POINT_NAME_st {
|
||||
int type;
|
||||
union {
|
||||
STACK_OF(GENERAL_NAME) *fullname;
|
||||
STACK_OF(X509_NAME_ENTRY) *relativename;
|
||||
} name;
|
||||
} DIST_POINT_NAME;
|
||||
|
||||
This means that name.fullname or name.relativename should be set
|
||||
and type reflects the option. That is if name.fullname is set then
|
||||
type is 0 and if name.relativename is set type is 1.
|
||||
|
||||
With the old code using the i2d functions would typically involve:
|
||||
|
||||
unsigned char *buf, *p;
|
||||
int len;
|
||||
/* Find length of encoding */
|
||||
len = i2d_SOMETHING(x, NULL);
|
||||
/* Allocate buffer */
|
||||
buf = OPENSSL_malloc(len);
|
||||
if(buf == NULL) {
|
||||
/* Malloc error */
|
||||
}
|
||||
/* Use temp variable because &p gets updated to point to end of
|
||||
* encoding.
|
||||
*/
|
||||
p = buf;
|
||||
i2d_SOMETHING(x, &p);
|
||||
|
||||
|
||||
Using the new i2d you can also do:
|
||||
|
||||
unsigned char *buf = NULL;
|
||||
int len;
|
||||
len = i2d_SOMETHING(x, &buf);
|
||||
if(len < 0) {
|
||||
/* Malloc error */
|
||||
}
|
||||
|
||||
and it will automatically allocate and populate a buffer with the
|
||||
encoding. After this call 'buf' will point to the start of the
|
||||
encoding which is len bytes long.
|
||||
293
README.ENGINE
293
README.ENGINE
@@ -1,44 +1,289 @@
|
||||
|
||||
ENGINE
|
||||
======
|
||||
|
||||
With OpenSSL 0.9.6, a new component has been added to support external
|
||||
crypto devices, for example accelerator cards. The component is called
|
||||
ENGINE, and has still a pretty experimental status and almost no
|
||||
documentation. It's designed to be faily easily extensible by the
|
||||
calling programs.
|
||||
With OpenSSL 0.9.6, a new component was added to support alternative
|
||||
cryptography implementations, most commonly for interfacing with external
|
||||
crypto devices (eg. accelerator cards). This component is called ENGINE,
|
||||
and its presence in OpenSSL 0.9.6 (and subsequent bug-fix releases)
|
||||
caused a little confusion as 0.9.6** releases were rolled in two
|
||||
versions, a "standard" and an "engine" version. In development for 0.9.7,
|
||||
the ENGINE code has been merged into the main branch and will be present
|
||||
in the standard releases from 0.9.7 forwards.
|
||||
|
||||
There's currently built-in support for the following crypto devices:
|
||||
There are currently built-in ENGINE implementations for the following
|
||||
crypto devices:
|
||||
|
||||
o CryptoSwift
|
||||
o Compaq Atalla
|
||||
o nCipher CHIL
|
||||
o Nuron
|
||||
o Broadcom uBSec
|
||||
|
||||
A number of things are still needed and are being worked on:
|
||||
In addition, dynamic binding to external ENGINE implementations is now
|
||||
provided by a special ENGINE called "dynamic". See the "DYNAMIC ENGINE"
|
||||
section below for details.
|
||||
|
||||
o An openssl utility command to handle or at least check available
|
||||
engines.
|
||||
o A better way of handling the methods that are handled by the
|
||||
engines.
|
||||
o Documentation!
|
||||
At this stage, a number of things are still needed and are being worked on:
|
||||
|
||||
1 Integration of EVP support.
|
||||
2 Configuration support.
|
||||
3 Documentation!
|
||||
|
||||
1 With respect to EVP, this relates to support for ciphers and digests in
|
||||
the ENGINE model so that alternative implementations of existing
|
||||
algorithms/modes (or previously unimplemented ones) can be provided by
|
||||
ENGINE implementations.
|
||||
|
||||
2 Configuration support currently exists in the ENGINE API itself, in the
|
||||
form of "control commands". These allow an application to expose to the
|
||||
user/admin the set of commands and parameter types a given ENGINE
|
||||
implementation supports, and for an application to directly feed string
|
||||
based input to those ENGINEs, in the form of name-value pairs. This is an
|
||||
extensible way for ENGINEs to define their own "configuration" mechanisms
|
||||
that are specific to a given ENGINE (eg. for a particular hardware
|
||||
device) but that should be consistent across *all* OpenSSL-based
|
||||
applications when they use that ENGINE. Work is in progress (or at least
|
||||
in planning) for supporting these control commands from the CONF (or
|
||||
NCONF) code so that applications using OpenSSL's existing configuration
|
||||
file format can have ENGINE settings specified in much the same way.
|
||||
Presently however, applications must use the ENGINE API itself to provide
|
||||
such functionality. To see first hand the types of commands available
|
||||
with the various compiled-in ENGINEs (see further down for dynamic
|
||||
ENGINEs), use the "engine" openssl utility with full verbosity, ie;
|
||||
openssl engine -vvvv
|
||||
|
||||
3 Documentation? Volunteers welcome! The source code is reasonably well
|
||||
self-documenting, but some summaries and usage instructions are needed -
|
||||
moreover, they are needed in the same POD format the existing OpenSSL
|
||||
documentation is provided in. Any complete or incomplete contributions
|
||||
would help make this happen.
|
||||
|
||||
STABILITY & BUG-REPORTS
|
||||
=======================
|
||||
|
||||
What already exists is fairly stable as far as it has been tested, but
|
||||
the test base has been a bit small most of the time.
|
||||
the test base has been a bit small most of the time. For the most part,
|
||||
the vendors of the devices these ENGINEs support have contributed to the
|
||||
development and/or testing of the implementations, and *usually* (with no
|
||||
guarantees) have experience in using the ENGINE support to drive their
|
||||
devices from common OpenSSL-based applications. Bugs and/or inexplicable
|
||||
behaviour in using a specific ENGINE implementation should be sent to the
|
||||
author of that implementation (if it is mentioned in the corresponding C
|
||||
file), and in the case of implementations for commercial hardware
|
||||
devices, also through whatever vendor support channels are available. If
|
||||
none of this is possible, or the problem seems to be something about the
|
||||
ENGINE API itself (ie. not necessarily specific to a particular ENGINE
|
||||
implementation) then you should mail complete details to the relevant
|
||||
OpenSSL mailing list. For a definition of "complete details", refer to
|
||||
the OpenSSL "README" file. As for which list to send it to;
|
||||
|
||||
openssl-users: if you are *using* the ENGINE abstraction, either in an
|
||||
pre-compiled application or in your own application code.
|
||||
|
||||
No external crypto device is chosen unless you say so. You have actively
|
||||
tell the openssl utility commands to use it through a new command line
|
||||
switch called "-engine". And if you want to use the ENGINE library to
|
||||
do something similar, you must also explicitely choose an external crypto
|
||||
device, or the built-in crypto routines will be used, just as in the
|
||||
default OpenSSL distribution.
|
||||
openssl-dev: if you are discussing problems with OpenSSL source code.
|
||||
|
||||
USAGE
|
||||
=====
|
||||
|
||||
The default "openssl" ENGINE is always chosen when performing crypto
|
||||
operations unless you specify otherwise. You must actively tell the
|
||||
openssl utility commands to use anything else through a new command line
|
||||
switch called "-engine". Also, if you want to use the ENGINE support in
|
||||
your own code to do something similar, you must likewise explicitly
|
||||
select the ENGINE implementation you want.
|
||||
|
||||
Depending on the type of hardware, system, and configuration, "settings"
|
||||
may need to be applied to an ENGINE for it to function as expected/hoped.
|
||||
The recommended way of doing this is for the application to support
|
||||
ENGINE "control commands" so that each ENGINE implementation can provide
|
||||
whatever configuration primitives it might require and the application
|
||||
can allow the user/admin (and thus the hardware vendor's support desk
|
||||
also) to provide any such input directly to the ENGINE implementation.
|
||||
This way, applications do not need to know anything specific to any
|
||||
device, they only need to provide the means to carry such user/admin
|
||||
input through to the ENGINE in question. Ie. this connects *you* (and
|
||||
your helpdesk) to the specific ENGINE implementation (and device), and
|
||||
allows application authors to not get buried in hassle supporting
|
||||
arbitrary devices they know (and care) nothing about.
|
||||
|
||||
A new "openssl" utility, "openssl engine", has been added in that allows
|
||||
for testing and examination of ENGINE implementations. Basic usage
|
||||
instructions are available by specifying the "-?" command line switch.
|
||||
|
||||
DYNAMIC ENGINES
|
||||
===============
|
||||
|
||||
The new "dynamic" ENGINE provides a low-overhead way to support ENGINE
|
||||
implementations that aren't pre-compiled and linked into OpenSSL-based
|
||||
applications. This could be because existing compiled-in implementations
|
||||
have known problems and you wish to use a newer version with an existing
|
||||
application. It could equally be because the application (or OpenSSL
|
||||
library) you are using simply doesn't have support for the ENGINE you
|
||||
wish to use, and the ENGINE provider (eg. hardware vendor) is providing
|
||||
you with a self-contained implementation in the form of a shared-library.
|
||||
The other use-case for "dynamic" is with applications that wish to
|
||||
maintain the smallest foot-print possible and so do not link in various
|
||||
ENGINE implementations from OpenSSL, but instead leaves you to provide
|
||||
them, if you want them, in the form of "dynamic"-loadable
|
||||
shared-libraries. It should be possible for hardware vendors to provide
|
||||
their own shared-libraries to support arbitrary hardware to work with
|
||||
applications based on OpenSSL 0.9.7 or later. If you're using an
|
||||
application based on 0.9.7 (or later) and the support you desire is only
|
||||
announced for versions later than the one you need, ask the vendor to
|
||||
backport their ENGINE to the version you need.
|
||||
|
||||
How does "dynamic" work?
|
||||
------------------------
|
||||
The dynamic ENGINE has a special flag in its implementation such that
|
||||
every time application code asks for the 'dynamic' ENGINE, it in fact
|
||||
gets its own copy of it. As such, multi-threaded code (or code that
|
||||
multiplexes multiple uses of 'dynamic' in a single application in any
|
||||
way at all) does not get confused by 'dynamic' being used to do many
|
||||
independent things. Other ENGINEs typically don't do this so there is
|
||||
only ever 1 ENGINE structure of its type (and reference counts are used
|
||||
to keep order). The dynamic ENGINE itself provides absolutely no
|
||||
cryptographic functionality, and any attempt to "initialise" the ENGINE
|
||||
automatically fails. All it does provide are a few "control commands"
|
||||
that can be used to control how it will load an external ENGINE
|
||||
implementation from a shared-library. To see these control commands,
|
||||
use the command-line;
|
||||
|
||||
openssl engine -vvvv dynamic
|
||||
|
||||
The "SO_PATH" control command should be used to identify the
|
||||
shared-library that contains the ENGINE implementation, and "NO_VCHECK"
|
||||
might possibly be useful if there is a minor version conflict and you
|
||||
(or a vendor helpdesk) is convinced you can safely ignore it.
|
||||
"ENGINE_ID" is probably only needed if a shared-library implements
|
||||
multiple ENGINEs, but if you know the engine id you expect to be using,
|
||||
it doesn't hurt to specify it (and this provides a sanity check if
|
||||
nothing else). "LIST_ADD" is only required if you actually wish the
|
||||
loaded ENGINE to be discoverable by application code later on using the
|
||||
ENGINE's "id". For most applications, this isn't necessary - but some
|
||||
application authors may have nifty reasons for using it. The "LOAD"
|
||||
command is the only one that takes no parameters and is the command
|
||||
that uses the settings from any previous commands to actually *load*
|
||||
the shared-library ENGINE implementation. If this command succeeds, the
|
||||
(copy of the) 'dynamic' ENGINE will magically morph into the ENGINE
|
||||
that has been loaded from the shared-library. As such, any control
|
||||
commands supported by the loaded ENGINE could then be executed as per
|
||||
normal. Eg. if ENGINE "foo" is implemented in the shared-library
|
||||
"libfoo.so" and it supports some special control command "CMD_FOO", the
|
||||
following code would load and use it (NB: obviously this code has no
|
||||
error checking);
|
||||
|
||||
ENGINE *e = ENGINE_by_id("dynamic");
|
||||
ENGINE_ctrl_cmd_string(e, "SO_PATH", "/lib/libfoo.so", 0);
|
||||
ENGINE_ctrl_cmd_string(e, "ENGINE_ID", "foo", 0);
|
||||
ENGINE_ctrl_cmd_string(e, "LOAD", NULL, 0);
|
||||
ENGINE_ctrl_cmd_string(e, "CMD_FOO", "some input data", 0);
|
||||
|
||||
For testing, the "openssl engine" utility can be useful for this sort
|
||||
of thing. For example the above code excerpt would achieve much the
|
||||
same result as;
|
||||
|
||||
openssl engine dynamic \
|
||||
-pre SO_PATH:/lib/libfoo.so \
|
||||
-pre ENGINE_ID:foo \
|
||||
-pre LOAD \
|
||||
-pre "CMD_FOO:some input data"
|
||||
|
||||
Or to simply see the list of commands supported by the "foo" ENGINE;
|
||||
|
||||
openssl engine -vvvv dynamic \
|
||||
-pre SO_PATH:/lib/libfoo.so \
|
||||
-pre ENGINE_ID:foo \
|
||||
-pre LOAD
|
||||
|
||||
Applications that support the ENGINE API and more specifically, the
|
||||
"control commands" mechanism, will provide some way for you to pass
|
||||
such commands through to ENGINEs. As such, you would select "dynamic"
|
||||
as the ENGINE to use, and the parameters/commands you pass would
|
||||
control the *actual* ENGINE used. Each command is actually a name-value
|
||||
pair and the value can sometimes be omitted (eg. the "LOAD" command).
|
||||
Whilst the syntax demonstrated in "openssl engine" uses a colon to
|
||||
separate the command name from the value, applications may provide
|
||||
their own syntax for making that separation (eg. a win32 registry
|
||||
key-value pair may be used by some applications). The reason for the
|
||||
"-pre" syntax in the "openssl engine" utility is that some commands
|
||||
might be issued to an ENGINE *after* it has been initialised for use.
|
||||
Eg. if an ENGINE implementation requires a smart-card to be inserted
|
||||
during initialisation (or a PIN to be typed, or whatever), there may be
|
||||
a control command you can issue afterwards to "forget" the smart-card
|
||||
so that additional initialisation is no longer possible. In
|
||||
applications such as web-servers, where potentially volatile code may
|
||||
run on the same host system, this may provide some arguable security
|
||||
value. In such a case, the command would be passed to the ENGINE after
|
||||
it has been initialised for use, and so the "-post" switch would be
|
||||
used instead. Applications may provide a different syntax for
|
||||
supporting this distinction, and some may simply not provide it at all
|
||||
("-pre" is almost always what you're after, in reality).
|
||||
|
||||
How do I build a "dynamic" ENGINE?
|
||||
----------------------------------
|
||||
This question is trickier - currently OpenSSL bundles various ENGINE
|
||||
implementations that are statically built in, and any application that
|
||||
calls the "ENGINE_load_builtin_engines()" function will automatically
|
||||
have all such ENGINEs available (and occupying memory). Applications
|
||||
that don't call that function have no ENGINEs available like that and
|
||||
would have to use "dynamic" to load any such ENGINE - but on the other
|
||||
hand such applications would only have the memory footprint of any
|
||||
ENGINEs explicitly loaded using user/admin provided control commands.
|
||||
The main advantage of not statically linking ENGINEs and only using
|
||||
"dynamic" for hardware support is that any installation using no
|
||||
"external" ENGINE suffers no unnecessary memory footprint from unused
|
||||
ENGINEs. Likewise, installations that do require an ENGINE incur the
|
||||
overheads from only *that* ENGINE once it has been loaded.
|
||||
|
||||
Sounds good? Maybe, but currently building an ENGINE implementation as
|
||||
a shared-library that can be loaded by "dynamic" isn't automated in
|
||||
OpenSSL's build process. It can be done manually quite easily however.
|
||||
Such a shared-library can either be built with any OpenSSL code it
|
||||
needs statically linked in, or it can link dynamically against OpenSSL
|
||||
if OpenSSL itself is built as a shared library. The instructions are
|
||||
the same in each case, but in the former (statically linked any
|
||||
dependencies on OpenSSL) you must ensure OpenSSL is built with
|
||||
position-independent code ("PIC"). The default OpenSSL compilation may
|
||||
already specify the relevant flags to do this, but you should consult
|
||||
with your compiler documentation if you are in any doubt.
|
||||
|
||||
This example will show building the "atalla" ENGINE in the
|
||||
crypto/engine/ directory as a shared-library for use via the "dynamic"
|
||||
ENGINE.
|
||||
1) "cd" to the crypto/engine/ directory of a pre-compiled OpenSSL
|
||||
source tree.
|
||||
2) Recompile at least one source file so you can see all the compiler
|
||||
flags (and syntax) being used to build normally. Eg;
|
||||
touch hw_atalla.c ; make
|
||||
will rebuild "hw_atalla.o" using all such flags.
|
||||
3) Manually enter the same compilation line to compile the
|
||||
"hw_atalla.c" file but with the following two changes;
|
||||
(a) add "-DENGINE_DYNAMIC_SUPPORT" to the command line switches,
|
||||
(b) change the output file from "hw_atalla.o" to something new,
|
||||
eg. "tmp_atalla.o"
|
||||
4) Link "tmp_atalla.o" into a shared-library using the top-level
|
||||
OpenSSL libraries to resolve any dependencies. The syntax for doing
|
||||
this depends heavily on your system/compiler and is a nightmare
|
||||
known well to anyone who has worked with shared-library portability
|
||||
before. 'gcc' on Linux, for example, would use the following syntax;
|
||||
gcc -shared -o dyn_atalla.so tmp_atalla.o -L../.. -lcrypto
|
||||
5) Test your shared library using "openssl engine" as explained in the
|
||||
previous section. Eg. from the top-level directory, you might try;
|
||||
apps/openssl engine -vvvv dynamic \
|
||||
-pre SO_PATH:./crypto/engine/dyn_atalla.so -pre LOAD
|
||||
If the shared-library loads successfully, you will see both "-pre"
|
||||
commands marked as "SUCCESS" and the list of control commands
|
||||
displayed (because of "-vvvv") will be the control commands for the
|
||||
*atalla* ENGINE (ie. *not* the 'dynamic' ENGINE). You can also add
|
||||
the "-t" switch to the utility if you want it to try and initialise
|
||||
the atalla ENGINE for use to test any possible hardware/driver
|
||||
issues.
|
||||
|
||||
PROBLEMS
|
||||
========
|
||||
|
||||
It seems like the ENGINE part doesn't work too well with Cryptoswift on
|
||||
Win32. A quick test done right before the release showed that trying
|
||||
"openssl speed -engine cswift" generated errors. If the DSO gets enabled,
|
||||
an attempt is made to write at memory address 0x00000002.
|
||||
It seems like the ENGINE part doesn't work too well with CryptoSwift on Win32.
|
||||
A quick test done right before the release showed that trying "openssl speed
|
||||
-engine cswift" generated errors. If the DSO gets enabled, an attempt is made
|
||||
to write at memory address 0x00000002.
|
||||
|
||||
|
||||
62
STATUS
62
STATUS
@@ -1,10 +1,14 @@
|
||||
|
||||
OpenSSL STATUS Last modified at
|
||||
______________ $Date: 2000/10/26 21:07:27 $
|
||||
______________ $Date: 2002/05/16 10:01:53 $
|
||||
|
||||
DEVELOPMENT STATE
|
||||
|
||||
o OpenSSL 0.9.7: Under development...
|
||||
o OpenSSL 0.9.6d: Released on May 9th, 2002
|
||||
o OpenSSL 0.9.6c: Released on December 21st, 2001
|
||||
o OpenSSL 0.9.6b: Released on July 9th, 2001
|
||||
o OpenSSL 0.9.6a: Released on April 5th, 2001
|
||||
o OpenSSL 0.9.6: Released on September 24th, 2000
|
||||
o OpenSSL 0.9.5a: Released on April 1st, 2000
|
||||
o OpenSSL 0.9.5: Released on February 28th, 2000
|
||||
@@ -14,37 +18,49 @@
|
||||
o OpenSSL 0.9.2b: Released on March 22th, 1999
|
||||
o OpenSSL 0.9.1c: Released on December 23th, 1998
|
||||
|
||||
[See also http://www.openssl.org/support/rt2.html]
|
||||
|
||||
RELEASE SHOWSTOPPERS
|
||||
|
||||
o BN_mod_mul verification fails for mips3-sgi-irix
|
||||
unless configured with no-asm
|
||||
|
||||
AVAILABLE PATCHES
|
||||
|
||||
o CA.pl patch (Damien Miller)
|
||||
o
|
||||
|
||||
IN PROGRESS
|
||||
|
||||
o Steve is currently working on (in no particular order):
|
||||
ASN1 code redesign, butchery, replacement.
|
||||
OCSP
|
||||
EVP cipher enhancement.
|
||||
/* Proper (or at least usable) certificate chain verification. */
|
||||
Enhanced certificate chain verification.
|
||||
Private key, certificate and CRL API and implementation.
|
||||
Developing and bugfixing PKCS#7 (S/MIME code).
|
||||
Various X509 issues: character sets, certificate request extensions.
|
||||
o Geoff and Richard are currently working on:
|
||||
ENGINE (the new code that gives hardware support among others).
|
||||
o Richard is currently working on:
|
||||
UI (User Interface)
|
||||
UTIL (a new set of library functions to support some higher level
|
||||
functionality that is currently missing).
|
||||
Dynamic thread-lock support.
|
||||
Shared library support for VMS.
|
||||
Kerberos 5 authentication
|
||||
Constification
|
||||
OCSP
|
||||
|
||||
NEEDS PATCH
|
||||
|
||||
o non-blocking socket on AIX
|
||||
o $(PERL) in */Makefile.ssl
|
||||
o "Sign the certificate?" - "n" creates empty certificate file
|
||||
o apps/ca.c: "Sign the certificate?" - "n" creates empty certificate file
|
||||
|
||||
o "OpenSSL STATUS" is never up-to-date.
|
||||
|
||||
OPEN ISSUES
|
||||
|
||||
o Do we want the EVP API changes in 0.9.7?
|
||||
Can compatibility be improved?
|
||||
|
||||
o The Makefile hierarchy and build mechanism is still not a round thing:
|
||||
|
||||
1. The config vs. Configure scripts
|
||||
@@ -69,22 +85,20 @@
|
||||
which apparently is not flexible enough to generate
|
||||
libcrypto)
|
||||
|
||||
|
||||
o The perl/ stuff needs a major overhaul. Currently it's
|
||||
totally obsolete. Either we clean it up and enhance it to be up-to-date
|
||||
with the C code or we also could replace it with the really nice
|
||||
Net::SSLeay package we can find under
|
||||
http://www.neuronio.pt/SSLeay.pm.html. Ralf uses this package for a
|
||||
longer time and it works fine and is a nice Perl module. Best would be
|
||||
to convince the author to work for the OpenSSL project and create a
|
||||
Net::OpenSSL or Crypt::OpenSSL package out of it and maintains it for
|
||||
us.
|
||||
|
||||
Status: Ralf thinks we should both contact the author of Net::SSLeay
|
||||
and look how much effort it is to bring Eric's perl/ stuff up
|
||||
to date.
|
||||
Paul +1
|
||||
|
||||
WISHES
|
||||
|
||||
o
|
||||
o Add variants of DH_generate_parameters() and BN_generate_prime() [etc?]
|
||||
where the callback function can request that the function be aborted.
|
||||
[Gregory Stark <ghstark@pobox.com>, <rayyang2000@yahoo.com>]
|
||||
|
||||
o SRP in TLS.
|
||||
[wished by:
|
||||
Dj <derek@yo.net>, Tom Wu <tom@arcot.com>,
|
||||
Tom Holroyd <tomh@po.crl.go.jp>]
|
||||
|
||||
See http://search.ietf.org/internet-drafts/draft-ietf-tls-srp-00.txt
|
||||
as well as http://www-cs-students.stanford.edu/~tjw/srp/.
|
||||
|
||||
Tom Holroyd tells us there is a SRP patch for OpenSSH at
|
||||
http://members.tripod.com/professor_tom/archives/, that could
|
||||
be useful.
|
||||
|
||||
477
VMS/cert_tool/hostaddr.c
Normal file
477
VMS/cert_tool/hostaddr.c
Normal file
@@ -0,0 +1,477 @@
|
||||
|
||||
#ifdef VMS
|
||||
#pragma module HOSTADDR "X-1"
|
||||
|
||||
/*
|
||||
**
|
||||
** Copyright (c) 2000 Compaq Computer Corporation
|
||||
** COMPAQ Registered in U.S. Patent and Trademark Office.
|
||||
**
|
||||
** Confidential computer software. Valid license from Compaq or
|
||||
** authorized sublicensor required for possession, use or copying.
|
||||
** Consistent with FAR 12.211 and 12.212, Commercial Computer Software,
|
||||
** Computer Software Documentation, and Technical Data for Commercial
|
||||
** Items are licensed to the U.S. Government under vendor's standard
|
||||
** commercial license.
|
||||
**
|
||||
*/
|
||||
|
||||
/*
|
||||
**++
|
||||
**
|
||||
** FACILITY: Apache Web Server
|
||||
**
|
||||
** ABSTRACT:
|
||||
**
|
||||
** This program determine the hostaddr of the default node or of
|
||||
** a given hostname.
|
||||
**
|
||||
** The command line syntax is:
|
||||
**
|
||||
** HOSTADDR [-l log-name] [-s sym-name] [host-name]
|
||||
**
|
||||
** where:
|
||||
**
|
||||
** -l log-name specifies an optional logical name to receive hostname.
|
||||
**
|
||||
** -c sym-name specifies an optional symbol name to receive hostname.
|
||||
**
|
||||
** host-name specifies an optional host name to resolve.
|
||||
**
|
||||
** AUTHOR: Matthew Doremus CREATION DATE: 07-Jul-2000
|
||||
**
|
||||
** Modification History:
|
||||
**
|
||||
** X-1 Matthew Doremus 07-Jul-2000
|
||||
** Initial development
|
||||
**
|
||||
**--
|
||||
**
|
||||
** Compile/Link instructions:
|
||||
**
|
||||
** OpenVMS Alpha/VAX:
|
||||
** $ CC HOSTADDR+SYS$LIBRARY:SYS$LIB_C/LIBRARY
|
||||
** $ LINK HOSTADDR
|
||||
**
|
||||
*/
|
||||
|
||||
/*
|
||||
** Define __NEW_STARLET if it's not already defined
|
||||
*/
|
||||
#ifndef __NEW_STARLET
|
||||
#define __NEW_STARLET
|
||||
#define __NEW_STARLET_SET
|
||||
#endif
|
||||
|
||||
/*
|
||||
** Include the necessary header files
|
||||
*/
|
||||
#include <lib$routines>
|
||||
#include <libclidef>
|
||||
#include <descrip>
|
||||
#include <stdlib>
|
||||
#include <string>
|
||||
#include <stdio>
|
||||
#include <netdb>
|
||||
#include <in>
|
||||
|
||||
/*
|
||||
** Undefine __NEW_STARLET if we had defined it
|
||||
*/
|
||||
#ifndef __NEW_STARLET_SET
|
||||
#undef __NEW_STARLET_SET
|
||||
#undef __NEW_STARLET
|
||||
#endif
|
||||
|
||||
/*
|
||||
** Option Data Structure
|
||||
*/
|
||||
typedef struct _opt_data {
|
||||
char *log_name;
|
||||
char *sym_name;
|
||||
char *host_name;
|
||||
} OPT_DATA;
|
||||
|
||||
/*
|
||||
** Local Routine Prototypes
|
||||
*/
|
||||
static void
|
||||
ParseCmdLine (
|
||||
int,
|
||||
char *[],
|
||||
OPT_DATA *);
|
||||
|
||||
static void
|
||||
SetLogName (
|
||||
char *,
|
||||
char *);
|
||||
|
||||
static void
|
||||
SetSymName (
|
||||
char *,
|
||||
char *);
|
||||
|
||||
static void
|
||||
Usage ();
|
||||
|
||||
/*
|
||||
**
|
||||
** main - Main processing routine for the HOSTADDR utility
|
||||
**
|
||||
** Functional Description:
|
||||
**
|
||||
** This routine controls overall program execution.
|
||||
**
|
||||
** Usage:
|
||||
**
|
||||
** main argc, argv, envp
|
||||
**
|
||||
** Formal parameters:
|
||||
**
|
||||
** argc - (IN) argument count
|
||||
** argv - (IN) address of an argument array
|
||||
** envp - (IN) address of an environment string
|
||||
**
|
||||
** Implicit Parameters:
|
||||
**
|
||||
** None
|
||||
**
|
||||
** Routine Value:
|
||||
**
|
||||
** None
|
||||
**
|
||||
** Side Effects:
|
||||
**
|
||||
** None
|
||||
**
|
||||
*/
|
||||
int
|
||||
main (
|
||||
int argc,
|
||||
char *argv[],
|
||||
char *envp[]
|
||||
)
|
||||
{
|
||||
struct in_addr *addr_ptr;
|
||||
char hostname[512+1];
|
||||
struct hostent *hp;
|
||||
OPT_DATA OptData;
|
||||
char *hostaddr;
|
||||
int addr_max,
|
||||
i;
|
||||
|
||||
/*
|
||||
** Parse the command line
|
||||
*/
|
||||
ParseCmdLine (argc, argv, &OptData);
|
||||
|
||||
/*
|
||||
** If no host name was given, then use gethostname otherwise
|
||||
** use the host name given.
|
||||
*/
|
||||
if (! OptData.host_name)
|
||||
{
|
||||
if (gethostname (hostname, sizeof (hostname) - 1))
|
||||
{
|
||||
perror ("gethostname");
|
||||
exit (1);
|
||||
}
|
||||
}
|
||||
else
|
||||
strcpy (hostname, OptData.host_name);
|
||||
|
||||
/*
|
||||
** Get the host address using gethostbyname
|
||||
*/
|
||||
if (! (hp = gethostbyname (hostname)))
|
||||
{
|
||||
perror ("gethostbyname");
|
||||
exit (1);
|
||||
}
|
||||
|
||||
/*
|
||||
** Format the host address(es) into a comma separated list
|
||||
*/
|
||||
addr_max = hp->h_length / sizeof (struct in_addr);
|
||||
hostaddr = malloc ((addr_max * (15 + 1)) + 1);
|
||||
addr_ptr = (struct in_addr *) hp->h_addr;
|
||||
for (i = 0; i < addr_max; i++)
|
||||
{
|
||||
if (i > 0)
|
||||
strcat (hostaddr, ",");
|
||||
addr_ptr = addr_ptr + (i * sizeof (struct in_addr));
|
||||
sprintf (hostaddr + strlen (hostaddr), "%d.%d.%d.%d",
|
||||
addr_ptr->s_net, addr_ptr->s_host,
|
||||
addr_ptr->s_lh, addr_ptr->s_impno);
|
||||
}
|
||||
|
||||
/*
|
||||
** Define a logical name if one was provided
|
||||
*/
|
||||
if (OptData.log_name)
|
||||
SetLogName (OptData.log_name, hostaddr);
|
||||
|
||||
/*
|
||||
** Define a symbol name if one was provided
|
||||
*/
|
||||
if (OptData.sym_name)
|
||||
SetSymName (OptData.sym_name, hostaddr);
|
||||
|
||||
/*
|
||||
** print the host address if no logical or symbol name was provided
|
||||
*/
|
||||
if (! OptData.log_name && ! OptData.sym_name)
|
||||
printf ("%s\n", hostaddr);
|
||||
|
||||
}
|
||||
|
||||
/*
|
||||
**
|
||||
** ParseCmdLine - Parse the command line options
|
||||
**
|
||||
** Functional Description:
|
||||
**
|
||||
** This routine parses the command line options.
|
||||
**
|
||||
** Usage:
|
||||
**
|
||||
** ParseCmdLine argc, argv, OptData
|
||||
**
|
||||
** Formal parameters:
|
||||
**
|
||||
** argc - (IN) argument count
|
||||
** argv - (IN) address of an argument array
|
||||
** OptData - (OUT) address of command option data structure
|
||||
** which will contain the parsed input.
|
||||
**
|
||||
** Implicit Parameters:
|
||||
**
|
||||
** None
|
||||
**
|
||||
** Routine Value:
|
||||
**
|
||||
** None
|
||||
**
|
||||
** Side Effects:
|
||||
**
|
||||
** None
|
||||
**
|
||||
*/
|
||||
static void
|
||||
ParseCmdLine (
|
||||
int argc,
|
||||
char *argv[],
|
||||
OPT_DATA *OptData
|
||||
)
|
||||
{
|
||||
int option,
|
||||
i;
|
||||
|
||||
/*
|
||||
** Initialize the option data
|
||||
*/
|
||||
OptData->log_name = NULL;
|
||||
OptData->sym_name = NULL;
|
||||
OptData->host_name = NULL;
|
||||
|
||||
/*
|
||||
** Process the command line options
|
||||
*/
|
||||
while ((option = getopt (argc, argv, "l:s:?")) != EOF)
|
||||
{
|
||||
switch (option)
|
||||
{
|
||||
/*
|
||||
** Output to logical name ?
|
||||
*/
|
||||
case 'l':
|
||||
OptData->log_name = strdup (optarg);
|
||||
break;
|
||||
|
||||
/*
|
||||
** Output to symbol name ?
|
||||
*/
|
||||
case 's':
|
||||
OptData->sym_name = strdup (optarg);
|
||||
break;
|
||||
|
||||
/*
|
||||
** Invalid argument ?
|
||||
*/
|
||||
case '?':
|
||||
default:
|
||||
Usage ();
|
||||
exit (1);
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
/*
|
||||
** Are the number of parameters correct ?
|
||||
*/
|
||||
if (argc - optind > 1)
|
||||
{
|
||||
Usage ();
|
||||
exit (1);
|
||||
}
|
||||
|
||||
/*
|
||||
** Host Name provided ?
|
||||
*/
|
||||
if (argc - optind == 1)
|
||||
OptData->host_name = strdup (argv[optind]);
|
||||
|
||||
}
|
||||
|
||||
/*
|
||||
**
|
||||
** SetLogName - Set a logical name & value
|
||||
**
|
||||
** Functional Description:
|
||||
**
|
||||
** This routine sets a logical name & value.
|
||||
**
|
||||
** Usage:
|
||||
**
|
||||
** SetLogName LogName, LogValue
|
||||
**
|
||||
** Formal parameters:
|
||||
**
|
||||
** LogName - (IN) address of the logical name
|
||||
** LogValue - (IN) address of the logical value
|
||||
**
|
||||
** Implicit Parameters:
|
||||
**
|
||||
** None
|
||||
**
|
||||
** Routine Value:
|
||||
**
|
||||
** None
|
||||
**
|
||||
** Side Effects:
|
||||
**
|
||||
** None
|
||||
**
|
||||
*/
|
||||
static void
|
||||
SetLogName (
|
||||
char *LogName,
|
||||
char *LogValue
|
||||
)
|
||||
{
|
||||
struct dsc$descriptor_s log_nam_desc = {0, DSC$K_DTYPE_T, DSC$K_CLASS_S, 0};
|
||||
struct dsc$descriptor_s log_val_desc = {0, DSC$K_DTYPE_T, DSC$K_CLASS_S, 0};
|
||||
int status;
|
||||
|
||||
/*
|
||||
** Setup the logical name & value descriptors
|
||||
*/
|
||||
log_nam_desc.dsc$w_length = strlen (LogName);
|
||||
log_nam_desc.dsc$a_pointer = LogName;
|
||||
log_val_desc.dsc$w_length = strlen (LogValue);
|
||||
log_val_desc.dsc$a_pointer = LogValue;
|
||||
|
||||
/*
|
||||
** Set the logical name & value
|
||||
*/
|
||||
status = lib$set_logical (&log_nam_desc, &log_val_desc, 0, 0, 0);
|
||||
if (! (status & 1))
|
||||
exit (status);
|
||||
|
||||
}
|
||||
|
||||
/*
|
||||
**
|
||||
** SetSymName - Set a symbol name & value
|
||||
**
|
||||
** Functional Description:
|
||||
**
|
||||
** This routine sets a symbol name & value.
|
||||
**
|
||||
** Usage:
|
||||
**
|
||||
** SetSymName SymName, SymValue
|
||||
**
|
||||
** Formal parameters:
|
||||
**
|
||||
** SymName - (IN) address of the symbol name
|
||||
** SymValue - (IN) address of the Symbol value
|
||||
**
|
||||
** Implicit Parameters:
|
||||
**
|
||||
** None
|
||||
**
|
||||
** Routine Value:
|
||||
**
|
||||
** None
|
||||
**
|
||||
** Side Effects:
|
||||
**
|
||||
** None
|
||||
**
|
||||
*/
|
||||
static void
|
||||
SetSymName (
|
||||
char *SymName,
|
||||
char *SymValue
|
||||
)
|
||||
{
|
||||
struct dsc$descriptor_s sym_nam_desc = {0, DSC$K_DTYPE_T, DSC$K_CLASS_S, 0};
|
||||
struct dsc$descriptor_s sym_val_desc = {0, DSC$K_DTYPE_T, DSC$K_CLASS_S, 0};
|
||||
int status;
|
||||
|
||||
/*
|
||||
** Setup the symbol name & value descriptors
|
||||
*/
|
||||
sym_nam_desc.dsc$w_length = strlen (SymName);
|
||||
sym_nam_desc.dsc$a_pointer = SymName;
|
||||
sym_val_desc.dsc$w_length = strlen (SymValue);
|
||||
sym_val_desc.dsc$a_pointer = SymValue;
|
||||
|
||||
/*
|
||||
** Set the symbol name & value
|
||||
*/
|
||||
status = lib$set_symbol (&sym_nam_desc, &sym_val_desc, &LIB$K_CLI_LOCAL_SYM);
|
||||
if (! (status & 1))
|
||||
exit (status);
|
||||
|
||||
}
|
||||
|
||||
/*
|
||||
**
|
||||
** Usage - Display the acceptable unix style command usage
|
||||
**
|
||||
** Functional Description:
|
||||
**
|
||||
** This routine displays to standard output the appropriate unix style
|
||||
** command usage.
|
||||
**
|
||||
** Usage:
|
||||
**
|
||||
** Usage
|
||||
**
|
||||
** Formal parameters:
|
||||
**
|
||||
** None
|
||||
**
|
||||
** Implicit Parameters:
|
||||
**
|
||||
** None
|
||||
**
|
||||
** Routine Value:
|
||||
**
|
||||
** None
|
||||
**
|
||||
** Side Effects:
|
||||
**
|
||||
** None
|
||||
**
|
||||
*/
|
||||
static void
|
||||
Usage ()
|
||||
{
|
||||
|
||||
fprintf (stdout, "Usage: HOSTADDR [-l log-name] [-s sym-name] [host-name]\n");
|
||||
|
||||
}
|
||||
#endif /* #ifdef VMS */
|
||||
513
VMS/cert_tool/hostname.c
Normal file
513
VMS/cert_tool/hostname.c
Normal file
@@ -0,0 +1,513 @@
|
||||
|
||||
#ifdef VMS
|
||||
#pragma module HOSTNAME "X-1"
|
||||
|
||||
/*
|
||||
**
|
||||
** Copyright (c) 2000 Compaq Computer Corporation
|
||||
** COMPAQ Registered in U.S. Patent and Trademark Office.
|
||||
**
|
||||
** Confidential computer software. Valid license from Compaq or
|
||||
** authorized sublicensor required for possession, use or copying.
|
||||
** Consistent with FAR 12.211 and 12.212, Commercial Computer Software,
|
||||
** Computer Software Documentation, and Technical Data for Commercial
|
||||
** Items are licensed to the U.S. Government under vendor's standard
|
||||
** commercial license.
|
||||
**
|
||||
*/
|
||||
|
||||
/*
|
||||
**++
|
||||
**
|
||||
** FACILITY: Apache Web Server
|
||||
**
|
||||
** ABSTRACT:
|
||||
**
|
||||
** This program determine the hostname of the default node or of
|
||||
** a given hostaddr.
|
||||
**
|
||||
** The command line syntax is:
|
||||
**
|
||||
** HOSTNAME [-l log-name] [-s sym-name] [host-addr]
|
||||
**
|
||||
** where:
|
||||
**
|
||||
** -l log-name specifies an optional logical name to receive hostname.
|
||||
**
|
||||
** -c sym-name specifies an optional symbol name to receive hostname.
|
||||
**
|
||||
** host-addr specifies an optional host address to resolve.
|
||||
**
|
||||
** AUTHOR: Matthew Doremus CREATION DATE: 07-Jul-2000
|
||||
**
|
||||
** Modification History:
|
||||
**
|
||||
** X-1 Matthew Doremus 07-Jul-2000
|
||||
** Initial development
|
||||
**
|
||||
**--
|
||||
**
|
||||
** Compile/Link instructions:
|
||||
**
|
||||
** OpenVMS Alpha/VAX:
|
||||
** $ CC HOSTNAME+SYS$LIBRARY:SYS$LIB_C/LIBRARY
|
||||
** $ LINK HOSTNAME
|
||||
**
|
||||
*/
|
||||
|
||||
/*
|
||||
** Define __NEW_STARLET if it's not already defined
|
||||
*/
|
||||
#ifndef __NEW_STARLET
|
||||
#define __NEW_STARLET
|
||||
#define __NEW_STARLET_SET
|
||||
#endif
|
||||
|
||||
/*
|
||||
** Include the necessary header files
|
||||
*/
|
||||
#include <lib$routines>
|
||||
#include <libclidef>
|
||||
#include <descrip>
|
||||
#include <stdlib>
|
||||
#include <string>
|
||||
#include <stdio>
|
||||
#include <netdb>
|
||||
#include <in>
|
||||
#include <socket>
|
||||
|
||||
/*
|
||||
** Undefine __NEW_STARLET if we had defined it
|
||||
*/
|
||||
#ifndef __NEW_STARLET_SET
|
||||
#undef __NEW_STARLET_SET
|
||||
#undef __NEW_STARLET
|
||||
#endif
|
||||
|
||||
/*
|
||||
** Option Data Structure
|
||||
*/
|
||||
typedef struct _opt_data {
|
||||
char *log_name;
|
||||
char *sym_name;
|
||||
unsigned char host_addr[4];
|
||||
} OPT_DATA;
|
||||
|
||||
/*
|
||||
** Local Routine Prototypes
|
||||
*/
|
||||
static void
|
||||
ParseCmdLine (
|
||||
int,
|
||||
char *[],
|
||||
OPT_DATA *);
|
||||
|
||||
static void
|
||||
SetLogName (
|
||||
char *,
|
||||
char *);
|
||||
|
||||
static void
|
||||
SetSymName (
|
||||
char *,
|
||||
char *);
|
||||
|
||||
static void
|
||||
Usage ();
|
||||
|
||||
/*
|
||||
**
|
||||
** main - Main processing routine for the HOSTNAME utility
|
||||
**
|
||||
** Functional Description:
|
||||
**
|
||||
** This routine controls overall program execution.
|
||||
**
|
||||
** Usage:
|
||||
**
|
||||
** main argc, argv, envp
|
||||
**
|
||||
** Formal parameters:
|
||||
**
|
||||
** argc - (IN) argument count
|
||||
** argv - (IN) address of an argument array
|
||||
** envp - (IN) address of an environment string
|
||||
**
|
||||
** Implicit Parameters:
|
||||
**
|
||||
** None
|
||||
**
|
||||
** Routine Value:
|
||||
**
|
||||
** None
|
||||
**
|
||||
** Side Effects:
|
||||
**
|
||||
** None
|
||||
**
|
||||
*/
|
||||
int
|
||||
main (
|
||||
int argc,
|
||||
char *argv[],
|
||||
char *envp[]
|
||||
)
|
||||
{
|
||||
struct in_addr host_addr;
|
||||
char hostname[512+1];
|
||||
struct hostent *hp;
|
||||
OPT_DATA OptData;
|
||||
int i;
|
||||
|
||||
/*
|
||||
** Parse the command line
|
||||
*/
|
||||
ParseCmdLine (argc, argv, &OptData);
|
||||
|
||||
/*
|
||||
** If no host address was given, then use gethostname otherwise
|
||||
** use gethostbyaddr.
|
||||
*/
|
||||
if (! OptData.host_addr[0] && ! OptData.host_addr[1] &&
|
||||
! OptData.host_addr[2] && ! OptData.host_addr[3])
|
||||
{
|
||||
if (gethostname (hostname, sizeof (hostname) - 1))
|
||||
{
|
||||
perror ("gethostname");
|
||||
exit (1);
|
||||
}
|
||||
|
||||
if (! (hp = gethostbyname (hostname)))
|
||||
{
|
||||
perror ("gethostbyname");
|
||||
exit (1);
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
host_addr.s_net = OptData.host_addr[0];
|
||||
host_addr.s_host = OptData.host_addr[1];
|
||||
host_addr.s_lh = OptData.host_addr[2];
|
||||
host_addr.s_impno = OptData.host_addr[3];
|
||||
|
||||
if (! (hp = gethostbyaddr (&host_addr, sizeof (host_addr), AF_INET)))
|
||||
{
|
||||
perror ("gethostbyaddr");
|
||||
exit (1);
|
||||
}
|
||||
}
|
||||
|
||||
/*
|
||||
** Let's try to determine the best available fully qualified hostname.
|
||||
*/
|
||||
if (hp->h_name)
|
||||
{
|
||||
strcpy (hostname, hp->h_name);
|
||||
if (! strchr (hostname, '.'))
|
||||
{
|
||||
for (i = 0; hp->h_aliases[i]; i++)
|
||||
{
|
||||
if (strchr (hp->h_aliases[i], '.') &&
|
||||
! strncasecmp (hp->h_aliases[i], hostname, strlen (hostname)))
|
||||
{
|
||||
strcpy (hostname, hp->h_aliases[i]);
|
||||
break;
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
else
|
||||
strcpy (hostname, "(unavailable)");
|
||||
|
||||
/*
|
||||
** Define a logical name if one was provided
|
||||
*/
|
||||
if (OptData.log_name)
|
||||
SetLogName (OptData.log_name, hostname);
|
||||
|
||||
/*
|
||||
** Define a symbol name if one was provided
|
||||
*/
|
||||
if (OptData.sym_name)
|
||||
SetSymName (OptData.sym_name, hostname);
|
||||
|
||||
/*
|
||||
** print the host name if no logical or symbol name was provided
|
||||
*/
|
||||
if (! OptData.log_name && ! OptData.sym_name)
|
||||
printf ("%s\n", hostname);
|
||||
|
||||
}
|
||||
|
||||
/*
|
||||
**
|
||||
** ParseCmdLine - Parse the command line options
|
||||
**
|
||||
** Functional Description:
|
||||
**
|
||||
** This routine parses the command line options.
|
||||
**
|
||||
** Usage:
|
||||
**
|
||||
** ParseCmdLine argc, argv, OptData
|
||||
**
|
||||
** Formal parameters:
|
||||
**
|
||||
** argc - (IN) argument count
|
||||
** argv - (IN) address of an argument array
|
||||
** OptData - (OUT) address of command option data structure
|
||||
** which will contain the parsed input.
|
||||
**
|
||||
** Implicit Parameters:
|
||||
**
|
||||
** None
|
||||
**
|
||||
** Routine Value:
|
||||
**
|
||||
** None
|
||||
**
|
||||
** Side Effects:
|
||||
**
|
||||
** None
|
||||
**
|
||||
*/
|
||||
static void
|
||||
ParseCmdLine (
|
||||
int argc,
|
||||
char *argv[],
|
||||
OPT_DATA *OptData
|
||||
)
|
||||
{
|
||||
int option,
|
||||
i;
|
||||
|
||||
/*
|
||||
** Initialize the option data
|
||||
*/
|
||||
OptData->log_name = NULL;
|
||||
OptData->sym_name = NULL;
|
||||
OptData->host_addr[0] = 0;
|
||||
OptData->host_addr[1] = 0;
|
||||
OptData->host_addr[2] = 0;
|
||||
OptData->host_addr[3] = 0;
|
||||
|
||||
/*
|
||||
** Process the command line options
|
||||
*/
|
||||
while ((option = getopt (argc, argv, "l:s:?")) != EOF)
|
||||
{
|
||||
switch (option)
|
||||
{
|
||||
/*
|
||||
** Output to logical name ?
|
||||
*/
|
||||
case 'l':
|
||||
OptData->log_name = strdup (optarg);
|
||||
break;
|
||||
|
||||
/*
|
||||
** Output to symbol name ?
|
||||
*/
|
||||
case 's':
|
||||
OptData->sym_name = strdup (optarg);
|
||||
break;
|
||||
|
||||
/*
|
||||
** Invalid argument ?
|
||||
*/
|
||||
case '?':
|
||||
default:
|
||||
Usage ();
|
||||
exit (1);
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
/*
|
||||
** Are the number of parameters correct ?
|
||||
*/
|
||||
if (argc - optind > 1)
|
||||
{
|
||||
Usage ();
|
||||
exit (1);
|
||||
}
|
||||
|
||||
/*
|
||||
** Host Address provided ?
|
||||
*/
|
||||
if (argc - optind == 1)
|
||||
{
|
||||
char *addr_ptr = argv[optind],
|
||||
*addr_sep;
|
||||
|
||||
for (i = 0; i < 4; i++)
|
||||
{
|
||||
if ((addr_sep = strchr (addr_ptr, '.')) && (i < 3))
|
||||
*addr_sep = '\0';
|
||||
|
||||
if (strlen (addr_ptr) == 0 || atoi (addr_ptr) > 255 ||
|
||||
strspn (addr_ptr, "0123456789") != strlen (addr_ptr))
|
||||
{
|
||||
printf ("Invalid TCP/IP address format.\n");
|
||||
exit (1);
|
||||
}
|
||||
|
||||
OptData->host_addr[i] = atoi (addr_ptr);
|
||||
if (addr_sep)
|
||||
addr_ptr = addr_sep + 1;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/*
|
||||
**
|
||||
** SetLogName - Set a logical name & value
|
||||
**
|
||||
** Functional Description:
|
||||
**
|
||||
** This routine sets a logical name & value.
|
||||
**
|
||||
** Usage:
|
||||
**
|
||||
** SetLogName LogName, LogValue
|
||||
**
|
||||
** Formal parameters:
|
||||
**
|
||||
** LogName - (IN) address of the logical name
|
||||
** LogValue - (IN) address of the logical value
|
||||
**
|
||||
** Implicit Parameters:
|
||||
**
|
||||
** None
|
||||
**
|
||||
** Routine Value:
|
||||
**
|
||||
** None
|
||||
**
|
||||
** Side Effects:
|
||||
**
|
||||
** None
|
||||
**
|
||||
*/
|
||||
static void
|
||||
SetLogName (
|
||||
char *LogName,
|
||||
char *LogValue
|
||||
)
|
||||
{
|
||||
struct dsc$descriptor_s log_nam_desc = {0, DSC$K_DTYPE_T, DSC$K_CLASS_S, 0};
|
||||
struct dsc$descriptor_s log_val_desc = {0, DSC$K_DTYPE_T, DSC$K_CLASS_S, 0};
|
||||
int status;
|
||||
|
||||
/*
|
||||
** Setup the logical name & value descriptors
|
||||
*/
|
||||
log_nam_desc.dsc$w_length = strlen (LogName);
|
||||
log_nam_desc.dsc$a_pointer = LogName;
|
||||
log_val_desc.dsc$w_length = strlen (LogValue);
|
||||
log_val_desc.dsc$a_pointer = LogValue;
|
||||
|
||||
/*
|
||||
** Set the logical name & value
|
||||
*/
|
||||
status = lib$set_logical (&log_nam_desc, &log_val_desc, 0, 0, 0);
|
||||
if (! (status & 1))
|
||||
exit (status);
|
||||
|
||||
}
|
||||
|
||||
/*
|
||||
**
|
||||
** SetSymName - Set a symbol name & value
|
||||
**
|
||||
** Functional Description:
|
||||
**
|
||||
** This routine sets a symbol name & value.
|
||||
**
|
||||
** Usage:
|
||||
**
|
||||
** SetSymName SymName, SymValue
|
||||
**
|
||||
** Formal parameters:
|
||||
**
|
||||
** SymName - (IN) address of the symbol name
|
||||
** SymValue - (IN) address of the Symbol value
|
||||
**
|
||||
** Implicit Parameters:
|
||||
**
|
||||
** None
|
||||
**
|
||||
** Routine Value:
|
||||
**
|
||||
** None
|
||||
**
|
||||
** Side Effects:
|
||||
**
|
||||
** None
|
||||
**
|
||||
*/
|
||||
static void
|
||||
SetSymName (
|
||||
char *SymName,
|
||||
char *SymValue
|
||||
)
|
||||
{
|
||||
struct dsc$descriptor_s sym_nam_desc = {0, DSC$K_DTYPE_T, DSC$K_CLASS_S, 0};
|
||||
struct dsc$descriptor_s sym_val_desc = {0, DSC$K_DTYPE_T, DSC$K_CLASS_S, 0};
|
||||
int status;
|
||||
|
||||
/*
|
||||
** Setup the symbol name & value descriptors
|
||||
*/
|
||||
sym_nam_desc.dsc$w_length = strlen (SymName);
|
||||
sym_nam_desc.dsc$a_pointer = SymName;
|
||||
sym_val_desc.dsc$w_length = strlen (SymValue);
|
||||
sym_val_desc.dsc$a_pointer = SymValue;
|
||||
|
||||
/*
|
||||
** Set the symbol name & value
|
||||
*/
|
||||
status = lib$set_symbol (&sym_nam_desc, &sym_val_desc, &LIB$K_CLI_LOCAL_SYM);
|
||||
if (! (status & 1))
|
||||
exit (status);
|
||||
|
||||
}
|
||||
|
||||
/*
|
||||
**
|
||||
** Usage - Display the acceptable unix style command usage
|
||||
**
|
||||
** Functional Description:
|
||||
**
|
||||
** This routine displays to standard output the appropriate unix style
|
||||
** command usage.
|
||||
**
|
||||
** Usage:
|
||||
**
|
||||
** Usage
|
||||
**
|
||||
** Formal parameters:
|
||||
**
|
||||
** None
|
||||
**
|
||||
** Implicit Parameters:
|
||||
**
|
||||
** None
|
||||
**
|
||||
** Routine Value:
|
||||
**
|
||||
** None
|
||||
**
|
||||
** Side Effects:
|
||||
**
|
||||
** None
|
||||
**
|
||||
*/
|
||||
static void
|
||||
Usage ()
|
||||
{
|
||||
|
||||
fprintf (stdout, "Usage: HOSTNAME [-l log-name] [-s sym-name] [host-addr]\n");
|
||||
|
||||
}
|
||||
#endif /* #ifdef VMS */
|
||||
639
VMS/cert_tool/ssl$auth_cert.com
Normal file
639
VMS/cert_tool/ssl$auth_cert.com
Normal file
@@ -0,0 +1,639 @@
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! SSL$AUTH_CERT.COM - SSL Certificate Authority procedure
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ Verify = F$VERIFY (0)
|
||||
$ Set NoOn
|
||||
$ Set NoControl=Y
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Description
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$! This procedure prompts the user through creating a Server Certificate.
|
||||
$!
|
||||
$! There are no parameters used.
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Define symbols
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ DELETE := DELETE
|
||||
$ SAY := WRITE SYS$OUTPUT
|
||||
$ ASK := READ SYS$COMMAND /END_OF_FILE=EXIT /PROMPT=
|
||||
$ PID = F$GETJPI ("","PID")
|
||||
$ TT_NOECHO = F$GETDVI ("TT:","TT_NOECHO")
|
||||
$ On Control_Y THEN GOTO EXIT
|
||||
$ Set Control=Y
|
||||
$!
|
||||
$ TT_ROWS = F$GETDVI ("TT:","TT_PAGE")
|
||||
$ TT_COLS = F$GETDVI ("TT:","DEVBUFSIZ")
|
||||
$!
|
||||
$ GET_USER_DATA := CALL GET_USER_DATA
|
||||
$ SET_USER_DATA := CALL SET_USER_DATA
|
||||
$ DEL_USER_DATA := CALL DEL_USER_DATA
|
||||
$ INIT_TERM := @SSL$COM:SSL$INIT_TERM
|
||||
$ SHOW_FILE := @SSL$COM:SSL$SHOW_FILE
|
||||
$ SSL_CONF_FILE = F$TRNLMN ("SSL$CA_CONF")
|
||||
$ GET_CONF_DATA := @SSL$COM:SSL$CONF_UTIL 'SSL_CONF_FILE' GET
|
||||
$ SET_CONF_DATA := @SSL$COM:SSL$CONF_UTIL 'SSL_CONF_FILE' SET
|
||||
$!
|
||||
$ ESC[0,8] = 27 ! Set the Escape Character
|
||||
$ BELL[0,8] = 7 ! Ring the terminal Bell
|
||||
$ RED = 1 ! Color - Red
|
||||
$ FGD = 30 ! Foreground
|
||||
$ BGD = 0 ! Background
|
||||
$ CSCR = ESC + "[2J" ! Clear the Screen
|
||||
$ CEOS = ESC + "[0J" ! Clear to the End of the Screen
|
||||
$ CEOL = ESC + "[0K" ! Clear to the End of the Line
|
||||
$ NORM = ESC + "[0m" ! Turn Attributes off
|
||||
$ BLNK = ESC + "[5m" ! Turn on BLINK Attribute
|
||||
$ WIDE = ESC + "#6" ! Turn on WIDE Attribute
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Run the SSL setup if it hasn't been run yet
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ IF F$TRNLNM ("SSL$CA_CONF") .EQS. ""
|
||||
$ THEN
|
||||
$ IF F$SEARCH ("SSL$COM:SSL$INIT_ENV.COM") .NES. ""
|
||||
$ THEN
|
||||
$ @SSL$COM:SSL$INIT_ENV.COM
|
||||
$ ELSE
|
||||
$ SAY BELL, "Unable to locate SSL$COM:SSL$INIT_ENV.COM ..."
|
||||
$ GOTO EXIT
|
||||
$ ENDIF
|
||||
$ ENDIF
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Display the Page Header
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ INIT_TERM
|
||||
$ BCOLOR = BGD
|
||||
$ FCOLOR = FGD + RED
|
||||
$ COLOR = ESC + "[''BCOLOR';''FCOLOR'm"
|
||||
$!
|
||||
$ TEXT = "SSL Certificate Tool"
|
||||
$ COL = (TT_COLS - (F$LENGTH (TEXT) * 2)) / 4
|
||||
$!
|
||||
$ SAY ESC + "[01;01H", CSCR
|
||||
$ SAY ESC + "[02;''COL'H", COLOR, WIDE, TEXT, NORM
|
||||
$!
|
||||
$ TEXT = "Create Certification Authority"
|
||||
$ COL = (TT_COLS - F$LENGTH (TEXT)) / 2
|
||||
$!
|
||||
$ SAY ESC + "[04;01H"
|
||||
$ SAY ESC + "[04;''COL'H", COLOR, TEXT, NORM
|
||||
$!
|
||||
$ ROW = 6
|
||||
$ COL = 2
|
||||
$ TOP_ROW = ROW
|
||||
$ MSG_ROW = TT_ROWS - 1
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Initialize the Request Data
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ IF F$SEARCH ("''SSL_CONF_FILE'") .NES. ""
|
||||
$ THEN
|
||||
$ SAY ESC + "[''MSG_ROW';01H", BLNK, " Reading Configuration ...", NORM
|
||||
$ ELSE
|
||||
$ SAY ESC + "[''MSG_ROW';01H", BLNK, " Initializing Configuration ...", NORM
|
||||
$ ENDIF
|
||||
$!
|
||||
$ _request_name = "req"
|
||||
$!
|
||||
$ _distinguished_name = "CA_distinguished_name"
|
||||
$ _distinguished_name_upd = "Y"
|
||||
$!
|
||||
$ _default_bits = "1024"
|
||||
$ _default_bits_upd = "Y"
|
||||
$!
|
||||
$ _default_days = "1825"
|
||||
$ _default_days_upd = "Y"
|
||||
$!
|
||||
$ _default_keyfile = "SSL$KEY:SERVER_CA.KEY"
|
||||
$ _default_keyfile_upd = "Y"
|
||||
$!
|
||||
$ _default_crtfile = "SSL$CRT:SERVER_CA.CRT"
|
||||
$ _default_crtfile_upd = "Y"
|
||||
$!
|
||||
$ _countryName_prompt = "Country Name ?"
|
||||
$ _countryName_min = "2"
|
||||
$ _countryName_max = "2"
|
||||
$ _countryName_default = "US"
|
||||
$ _countryName_upd = "Y"
|
||||
$ _countryName_cnt = 4
|
||||
$!
|
||||
$ _0organizationName_prompt = "Organization Name ?"
|
||||
$ _0organizationName_default = ""
|
||||
$ _0organizationName_upd = "Y"
|
||||
$ _0organizationName_cnt = 2
|
||||
$!
|
||||
$ _organizationalUnitName_prompt = "Organization Unit Name ?"
|
||||
$ _organizationalUnitName_default = ""
|
||||
$ _organizationalUnitName_upd = "Y"
|
||||
$ _organizationalUnitName_cnt = 2
|
||||
$!
|
||||
$ _commonName_prompt = "Common Name ?"
|
||||
$ _commonName_max = "64"
|
||||
$ _commonName_default = "CA Authority"
|
||||
$ _commonName_upd = "Y"
|
||||
$ _commonName_cnt = 3
|
||||
$!
|
||||
$ IF F$SEARCH ("''SSL_CONF_FILE'") .NES. ""
|
||||
$ THEN
|
||||
$ GET_CONF_DATA "[''_request_name']#distinguished_name"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _distinguished_name = SSL_CONF_DATA
|
||||
$ _distinguished_name_upd = "N"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ GET_CONF_DATA "[''_request_name']#default_bits"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _default_bits = SSL_CONF_DATA
|
||||
$ _default_bits_upd = "N"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ GET_CONF_DATA "[''_request_name']#default_days"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _default_days = SSL_CONF_DATA
|
||||
$ _default_days_upd = "N"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ GET_CONF_DATA "[''_request_name']#default_keyfile"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _default_keyfile = F$PARSE (SSL_CONF_DATA,"SSL$ROOT:",,"DEVICE") + -
|
||||
F$PARSE (SSL_CONF_DATA,"[KEY]",,"DIRECTORY") + -
|
||||
F$PARSE (SSL_CONF_DATA,"SERVER",,"NAME") + -
|
||||
F$PARSE (SSL_CONF_DATA,".KEY",,"TYPE")
|
||||
$ _default_keyfile_upd = "N"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ GET_CONF_DATA "[''_request_name']#default_crtfile"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _default_crtfile = F$PARSE (SSL_CONF_DATA,"SSL$ROOT:",,"DEVICE") + -
|
||||
F$PARSE (SSL_CONF_DATA,"[CRT]",,"DIRECTORY") + -
|
||||
F$PARSE (SSL_CONF_DATA,"SERVER",,"NAME") + -
|
||||
F$PARSE (SSL_CONF_DATA,".CRT",,"TYPE")
|
||||
$ _default_crtfile_upd = "N"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ CTR = 0
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#countryName"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _countryName_prompt = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#countryName_min"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _countryName_min = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#countryName_max"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _countryName_max = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#countryName_default"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _countryName_default = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ IF _countryName_cnt .EQ. CTR THEN _countryName_upd = "N"
|
||||
$!
|
||||
$ CTR = 0
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#0.organizationName"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _0organizationName_prompt = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#0.organizationName_default"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _0organizationName_default = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ IF _0organizationName_cnt .EQ. CTR THEN _0organizationName_upd = "N"
|
||||
$!
|
||||
$ CTR = 0
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#organizationalUnitName"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _organizationalUnitName_prompt = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#organizationalUnitName_default"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _organizationalUnitName_default = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ IF _organizationalUnitName_cnt .EQ. CTR THEN _organizationalUnitName_upd = "N"
|
||||
$!
|
||||
$ CTR = 0
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#commonName"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _commonName_prompt = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#commonName_max"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _commonName_max = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#commonName_default"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _commonName_default = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ IF _commonName_cnt .EQ. CTR THEN _commonName_upd = "N"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ SET_USER_DATA "[]#pem_pass_phrase#-##PEM Pass Phrase ?#P#1###Y#Y"
|
||||
$ SET_USER_DATA "[''_request_name']#default_bits#D#''_default_bits'#Encryption Bits ?#I###''_default_bits_upd'#Y#N"
|
||||
$ SET_USER_DATA "[''_request_name']#default_days#D#''_default_days'#Default Days ?#I###''_default_days_upd'#Y#N"
|
||||
$ SET_USER_DATA "[''_request_name']#default_keyfile#D#''_default_keyfile'#CA certificate Key File ?#F###''_default_keyfile_upd'#Y#N"
|
||||
$ SET_USER_DATA "[''_request_name']#default_crtfile#D#''_default_crtfile'#CA certificate File ?#F###''_default_crtfile_upd'#Y#N"
|
||||
$ SET_USER_DATA "[''_request_name']#distinguished_name#D#''_distinguished_name'##S###''_distinguished_name_upd'#N#N"
|
||||
$ SET_USER_DATA "[''_distinguished_name']#countryName#P#''_countryName_default'#''_countryName_prompt'#S#''_countryName_min'#''_countryName_max'#''_countryName_upd'#Y#N"
|
||||
$ SET_USER_DATA "[''_distinguished_name']#0.organizationName#P#''_0organizationName_default'#''_0organizationName_prompt'#S###''_0organizationName_upd'#Y#N"
|
||||
$ SET_USER_DATA "[''_distinguished_name']#organizationalUnitName#P#''_organizationalUnitName_default'#''_organizationalUnitName_prompt'#S###''_organizationUnitName_upd'#Y#N"
|
||||
$ SET_USER_DATA "[''_distinguished_name']#commonName#P#''_commonName_default'#''_commonName_prompt'#S##''_commonName_max'#''_commonName_upd'#Y#N"
|
||||
$ SET_USER_DATA "[]#display_certificate#-#N#Display the CA certificate ?#S##1##Y#N"
|
||||
$!
|
||||
$ SAY ESC + "[''MSG_ROW';01H", CEOS
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Confirm/Update the SSL Configuration Data
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ CTR = 1
|
||||
$!
|
||||
$PROMPT_LOOP:
|
||||
$!
|
||||
$ IF CTR .LE. SSL_USER_DATA_MAX
|
||||
$ THEN
|
||||
$ KEY = F$ELEMENT (0,"#",SSL_USER_DATA_'CTR') ! Key Name
|
||||
$ ITM = F$ELEMENT (1,"#",SSL_USER_DATA_'CTR') ! Item Name
|
||||
$ VAL = F$ELEMENT (2,"#",SSL_USER_DATA_'CTR') ! Item Value Contains Default or Prompt
|
||||
$ DEF = F$ELEMENT (3,"#",SSL_USER_DATA_'CTR') ! Default Value
|
||||
$ PRM = F$ELEMENT (4,"#",SSL_USER_DATA_'CTR') ! Prompt Value
|
||||
$ TYP = F$ELEMENT (5,"#",SSL_USER_DATA_'CTR') ! Value Type
|
||||
$ MIN = F$ELEMENT (6,"#",SSL_USER_DATA_'CTR') ! Value Minimum Length
|
||||
$ MAX = F$ELEMENT (7,"#",SSL_USER_DATA_'CTR') ! Value Maximum Length
|
||||
$ UPD = F$ELEMENT (8,"#",SSL_USER_DATA_'CTR') ! Entry Updated ?
|
||||
$ REQ = F$ELEMENT (9,"#",SSL_USER_DATA_'CTR') ! Entry Required for Input ?
|
||||
$ CFM = F$ELEMENT (10,"#",SSL_USER_DATA_'CTR')! Confirm Input ?
|
||||
$ CONFIRMED = 0
|
||||
$ IF REQ .EQS. "N"
|
||||
$ THEN
|
||||
$ CTR = CTR + 1
|
||||
$ GOTO PROMPT_LOOP
|
||||
$ ENDIF
|
||||
$ IF ROW .GT. MSG_ROW - 2
|
||||
$ THEN
|
||||
$ SAY ESC + "[''TOP_ROW';01H", CEOS
|
||||
$ ROW = TOP_ROW
|
||||
$ ENDIF
|
||||
$!
|
||||
$CONFIRM_LOOP:
|
||||
$!
|
||||
$ IF PRM .EQS. ""
|
||||
$ THEN
|
||||
$ PROMPT = ESC + "[''ROW';''COL'H''ITM' ? [''DEF'] ''CEOL'"
|
||||
$ ELSE
|
||||
$ PROMPT = ESC + "[''ROW';''COL'H''PRM' [''DEF'] ''CEOL'"
|
||||
$ ENDIF
|
||||
$ IF TYP .EQS. "P" THEN SET TERMINAL /NOECHO
|
||||
$ ASK "''PROMPT'" ANS /END_OF_FILE=EXIT
|
||||
$ IF TYP .EQS. "P" THEN SET TERMINAL /ECHO
|
||||
$ ANS = F$EDIT (ANS,"TRIM")
|
||||
$ IF ANS .EQS. "" THEN ANS = DEF
|
||||
$ IF TYP .EQS. "F"
|
||||
$ THEN
|
||||
$ ANS = F$PARSE ("''ANS'","''DEF'",,,"SYNTAX_ONLY")
|
||||
$ ENDIF
|
||||
$ IF TYP .EQS. "I" .AND. F$TYPE (ANS) .NES. "INTEGER"
|
||||
$ THEN
|
||||
$ CALL INVALID_ENTRY
|
||||
$ SAY ESC + "[''ROW';01H", CEOS
|
||||
$ GOTO PROMPT_LOOP
|
||||
$ ENDIF
|
||||
$ IF (TYP .EQS. "S" .OR. TYP .EQS. "P") .AND. -
|
||||
((MIN .NES. "" .AND. F$LENGTH (ANS) .LT. F$INTEGER(MIN)) .OR. -
|
||||
(MAX .NES. "" .AND. F$LENGTH (ANS) .GT. F$INTEGER(MAX)))
|
||||
$ THEN
|
||||
$ CALL INVALID_ENTRY
|
||||
$ SAY ESC + "[''ROW';01H", CEOS
|
||||
$ IF TYP .EQS. "S" THEN GOTO PROMPT_LOOP
|
||||
$ IF TYP .EQS. "P" THEN GOTO CONFIRM_LOOP
|
||||
$ ENDIF
|
||||
$ ROW = ROW + 1
|
||||
$ IF CFM .EQS. "Y"
|
||||
$ THEN
|
||||
$ IF CONFIRMED .EQ. 0
|
||||
$ THEN
|
||||
$ CONFIRMED = 1
|
||||
$ CONFIRMED_ANS = ANS
|
||||
$ PRM = "Confirm ''PRM'"
|
||||
$ GOTO CONFIRM_LOOP
|
||||
$ ELSE
|
||||
$ IF ANS .NES. CONFIRMED_ANS
|
||||
$ THEN
|
||||
$ CALL INVALID_ENTRY
|
||||
$ ROW = ROW - 2
|
||||
$ SAY ESC + "[''ROW';01H", CEOS
|
||||
$ GOTO PROMPT_LOOP
|
||||
$ ENDIF
|
||||
$ ENDIF
|
||||
$ ENDIF
|
||||
$ IF ANS .NES. DEF THEN SSL_USER_DATA_'CTR' = "''KEY'#''ITM'#''VAL'#''ANS'#''PRM'#''TYP'#''MIN'#''MAX'#Y#''REQ'#''CFM'"
|
||||
$ CTR = CTR + 1
|
||||
$ GOTO PROMPT_LOOP
|
||||
$ ENDIF
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Save the SSL Configuration Data
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ CTR = 1
|
||||
$ SAY ESC + "[''MSG_ROW';01H", BLNK, " Saving Configuration ...", NORM
|
||||
$!
|
||||
$SAVE_CONF_LOOP:
|
||||
$!
|
||||
$ IF CTR .LE. SSL_USER_DATA_MAX
|
||||
$ THEN
|
||||
$ KEY = F$ELEMENT (0,"#",SSL_USER_DATA_'CTR') ! Key Name
|
||||
$ ITM = F$ELEMENT (1,"#",SSL_USER_DATA_'CTR') ! Item Name
|
||||
$ VAL = F$ELEMENT (2,"#",SSL_USER_DATA_'CTR') ! Item Value Contains Default or Prompt
|
||||
$ DEF = F$ELEMENT (3,"#",SSL_USER_DATA_'CTR') ! Default Value
|
||||
$ PRM = F$ELEMENT (4,"#",SSL_USER_DATA_'CTR') ! Prompt Value
|
||||
$ TYP = F$ELEMENT (5,"#",SSL_USER_DATA_'CTR') ! Value Type
|
||||
$ MIN = F$ELEMENT (6,"#",SSL_USER_DATA_'CTR') ! Value Minimum Length
|
||||
$ MAX = F$ELEMENT (7,"#",SSL_USER_DATA_'CTR') ! Value Maximum Length
|
||||
$ UPD = F$ELEMENT (8,"#",SSL_USER_DATA_'CTR') ! Entry Updated ?
|
||||
$ REQ = F$ELEMENT (9,"#",SSL_USER_DATA_'CTR') ! Entry Required for Input ?
|
||||
$ CFM = F$ELEMENT (10,"#",SSL_USER_DATA_'CTR')! Confirm Input ?
|
||||
$ IF UPD .NES. "Y" .OR. VAL .EQS. "-"
|
||||
$ THEN
|
||||
$ CTR = CTR + 1
|
||||
$ GOTO SAVE_CONF_LOOP
|
||||
$ ENDIF
|
||||
$ IF VAL .EQS. "D"
|
||||
$ THEN
|
||||
$ SET_CONF_DATA "''KEY'#''ITM'" "''DEF'"
|
||||
$ ELSE
|
||||
$ SET_CONF_DATA "''KEY'#''ITM'" "''PRM'"
|
||||
$ SET_CONF_DATA "''KEY'#''ITM'_default" "''DEF'"
|
||||
$ ENDIF
|
||||
$ IF MIN .NES. "" THEN SET_CONF_DATA "''KEY'#''ITM'_min" "''MIN'"
|
||||
$ IF MAX .NES. "" THEN SET_CONF_DATA "''KEY'#''ITM'_max" "''MAX'"
|
||||
$ CTR = CTR + 1
|
||||
$ GOTO SAVE_CONF_LOOP
|
||||
$ ENDIF
|
||||
$!
|
||||
$ PURGE /NOLOG /NOCONFIRM 'SSL_CONF_FILE'
|
||||
$ RENAME 'SSL_CONF_FILE'; ;1
|
||||
$!
|
||||
$ SAY ESC + "[''MSG_ROW';01H", CEOS
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Create the Certificiate Authority
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ SAY ESC + "[''MSG_ROW';01H", BLNK, " Creating Certificate Authority ...", NORM
|
||||
$!
|
||||
$ X1 = 2
|
||||
$ Y1 = TOP_ROW
|
||||
$ X2 = TT_COLS - 2
|
||||
$ Y2 = MSG_ROW - 1
|
||||
$!
|
||||
$ GET_USER_DATA "[''_request_name']#default_days"
|
||||
$ _default_days = SSL_USER_DATA
|
||||
$ GET_USER_DATA "[''_request_name']#default_keyfile"
|
||||
$ _default_keyfile = SSL_USER_DATA
|
||||
$ GET_USER_DATA "[''_request_name']#default_crtfile"
|
||||
$ _default_crtfile = SSL_USER_DATA
|
||||
$ GET_USER_DATA "[]#pem_pass_phrase"
|
||||
$ _pem_pass_phrase = SSL_USER_DATA
|
||||
$ GET_USER_DATA "[]#display_certificate"
|
||||
$ _display_certificate = SSL_USER_DATA
|
||||
$!
|
||||
$ DEFINE /USER /NOLOG SYS$ERROR NL:
|
||||
$ DEFINE /USER /NOLOG SYS$OUTPUT NL:
|
||||
$ SHOW SYSTEM /FULL /OUT=SYS$LOGIN:SSL_REQ_'PID'.RND
|
||||
$!
|
||||
$ OPEN /WRITE OFILE SYS$LOGIN:SSL_REQ_'PID'.COM
|
||||
$ WRITE OFILE "$ DEFINE /USER /NOLOG RANDFILE SYS$LOGIN:SSL_REQ_''PID'.RND"
|
||||
$ WRITE OFILE "$ DEFINE /USER /NOLOG SYS$ERROR SYS$LOGIN:SSL_REQ_''PID'.LOG"
|
||||
$ WRITE OFILE "$ DEFINE /USER /NOLOG SYS$OUTPUT SYS$LOGIN:SSL_REQ_''PID'.LOG"
|
||||
$ WRITE OFILE "$ DEFINE /USER /NOLOG SYS$COMMAND SYS$INPUT"
|
||||
$ WRITE OFILE "$ OPENSSL req -config ''SSL_CONF_FILE' -new -x509 -days ''_default_days' -keyout ''_default_keyfile' -out ''_default_crtfile'"
|
||||
$ WRITE OFILE "''_pem_pass_phrase'"
|
||||
$ WRITE OFILE "''_pem_pass_phrase'"
|
||||
$ WRITE OFILE ""
|
||||
$ WRITE OFILE ""
|
||||
$ WRITE OFILE ""
|
||||
$ WRITE OFILE ""
|
||||
$ CLOSE OFILE
|
||||
$!
|
||||
$ @SYS$LOGIN:SSL_REQ_'PID'.COM
|
||||
$!
|
||||
$ DELETE/NOLOG/NOCONFIRM SYS$LOGIN:SSL_REQ_'PID'.RND;*
|
||||
$ DELETE/NOLOG/NOCONFIRM SYS$LOGIN:SSL_REQ_'PID'.COM;*
|
||||
$!
|
||||
$ DEFINE /USER /NOLOG SYS$ERROR NL:
|
||||
$ DEFINE /USER /NOLOG SYS$OUTPUT NL:
|
||||
$ SEARCH SYS$LOGIN:SSL_REQ_'PID'.LOG /OUT=SYS$LOGIN:SSL_REQ_'PID'.ERR ":error:"
|
||||
$ IF F$SEARCH ("SYS$LOGIN:SSL_REQ_''PID'.ERR") .NES. ""
|
||||
$ THEN
|
||||
$ IF F$FILE_ATTRIBUTE ("SYS$LOGIN:SSL_REQ_''PID'.ERR","ALQ") .NE. 0
|
||||
$ THEN
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_REQ_'PID'.ERR;*
|
||||
$ SAY ESC + "[''MSG_ROW';01H''BELL'''CEOS'"
|
||||
$ SHOW_FILE "SYS$LOGIN:SSL_REQ_''PID'.LOG" 'X1' 'Y1' 'X2' 'Y2' "< ERROR >"
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_REQ_'PID'.LOG;*
|
||||
$ GOTO EXIT
|
||||
$ ENDIF
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_REQ_'PID'.ERR;*
|
||||
$ ENDIF
|
||||
$!
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_REQ_'PID'.LOG;*
|
||||
$!
|
||||
$ IF F$EDIT (_display_certificate,"TRIM,UPCASE") .EQS. "Y"
|
||||
$ THEN
|
||||
$ SAY ESC + "[''MSG_ROW';01H", BLNK, " Generating Output ...", NORM, CEOL
|
||||
$!
|
||||
$ OPEN /WRITE OFILE SYS$LOGIN:SSL_X509_'PID'.COM
|
||||
$ WRITE OFILE "$ DEFINE /USER /NOLOG SYS$ERROR SYS$LOGIN:SSL_X509_''PID'.LOG"
|
||||
$ WRITE OFILE "$ DEFINE /USER /NOLOG SYS$OUTPUT SYS$LOGIN:SSL_X509_''PID'.LOG"
|
||||
$ WRITE OFILE "$ DEFINE /USER /NOLOG SYS$COMMAND SYS$INPUT"
|
||||
$ WRITE OFILE "$ OPENSSL x509 -noout -text -in ''_default_crtfile'"
|
||||
$ CLOSE OFILE
|
||||
$!
|
||||
$ @SYS$LOGIN:SSL_X509_'PID'.COM
|
||||
$!
|
||||
$ DELETE/NOLOG/NOCONFIRM SYS$LOGIN:SSL_X509_'PID'.COM;*
|
||||
$!
|
||||
$ DEFINE /USER /NOLOG SYS$ERROR NL:
|
||||
$ DEFINE /USER /NOLOG SYS$OUTPUT NL:
|
||||
$ SEARCH SYS$LOGIN:SSL_X509_'PID'.LOG /OUT=SYS$LOGIN:SSL_X509_'PID'.ERR ":error:"
|
||||
$ IF F$SEARCH ("SYS$LOGIN:SSL_X509_''PID'.ERR") .NES. ""
|
||||
$ THEN
|
||||
$ IF F$FILE_ATTRIBUTE ("SYS$LOGIN:SSL_X509_''PID'.ERR","ALQ") .NE. 0
|
||||
$ THEN
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_X509_'PID'.ERR;*
|
||||
$ SAY ESC + "[''MSG_ROW';01H''BELL'''CEOS'"
|
||||
$ SHOW_FILE "SYS$LOGIN:SSL_X509_''PID'.LOG" 'X1' 'Y1' 'X2' 'Y2' "< ERROR >"
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_X509_'PID'.LOG;*
|
||||
$ GOTO EXIT
|
||||
$ ENDIF
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_X509_'PID'.ERR;*
|
||||
$ ENDIF
|
||||
$!
|
||||
$ SAY ESC + "[''MSG_ROW';01H''CEOS'"
|
||||
$ SHOW_FILE "SYS$LOGIN:SSL_X509_''PID'.LOG" 'X1' 'Y1' 'X2' 'Y2' "< ''_default_crtfile' >"
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_X509_'PID'.LOG;*
|
||||
$ GOTO EXIT
|
||||
$ ENDIF
|
||||
$!
|
||||
$ TEXT = "Press return to continue"
|
||||
$ COL = (TT_COLS - F$LENGTH (TEXT)) / 2
|
||||
$!
|
||||
$ SAY ESC + "[''MSG_ROW';01H", CEOS
|
||||
$ PROMPT = ESC + "[''MSG_ROW';''COL'H''TEXT'"
|
||||
$ ASK "''PROMPT'" OPT
|
||||
$!
|
||||
$GOTO EXIT
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Set the User Data
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$SET_USER_DATA: SUBROUTINE
|
||||
$!
|
||||
$ IF F$TYPE (SSL_USER_DATA_MAX) .EQS. ""
|
||||
$ THEN
|
||||
$ SSL_USER_DATA_MAX == 1
|
||||
$ ELSE
|
||||
$ SSL_USER_DATA_MAX == SSL_USER_DATA_MAX + 1
|
||||
$ ENDIF
|
||||
$!
|
||||
$ SSL_USER_DATA_'SSL_USER_DATA_MAX' == "''P1'"
|
||||
$!
|
||||
$ EXIT
|
||||
$!
|
||||
$ ENDSUBROUTINE
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Get the User Data
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$GET_USER_DATA: SUBROUTINE
|
||||
$!
|
||||
$ CTR = 1
|
||||
$ USER_KEY = F$ELEMENT (0,"#",P1)
|
||||
$ USER_ITM = F$ELEMENT (1,"#",P1)
|
||||
$!
|
||||
$GET_USER_DATA_LOOP:
|
||||
$!
|
||||
$ IF CTR .LE. SSL_USER_DATA_MAX
|
||||
$ THEN
|
||||
$ KEY = F$ELEMENT (0,"#",SSL_USER_DATA_'CTR') ! Key Name
|
||||
$ ITM = F$ELEMENT (1,"#",SSL_USER_DATA_'CTR') ! Item Name
|
||||
$ VAL = F$ELEMENT (2,"#",SSL_USER_DATA_'CTR') ! Item Value Contains Default or Prompt
|
||||
$ DEF = F$ELEMENT (3,"#",SSL_USER_DATA_'CTR') ! Default Value
|
||||
$ PRM = F$ELEMENT (4,"#",SSL_USER_DATA_'CTR') ! Prompt Value
|
||||
$ IF USER_KEY .NES. KEY .OR. USER_ITM .NES. ITM
|
||||
$ THEN
|
||||
$ CTR = CTR + 1
|
||||
$ GOTO GET_USER_DATA_LOOP
|
||||
$ ENDIF
|
||||
$ IF VAL .EQS. "-" THEN SSL_USER_DATA == "''DEF'"
|
||||
$ IF VAL .EQS. "D" THEN SSL_USER_DATA == "''DEF'"
|
||||
$ IF VAL .EQS. "P" THEN SSL_USER_DATA == "''PRM'"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ EXIT
|
||||
$!
|
||||
$ ENDSUBROUTINE
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Delete the User Data
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$DEL_USER_DATA: SUBROUTINE
|
||||
$!
|
||||
$ IF F$TYPE (SSL_USER_DATA_MAX) .EQS. "" THEN GOTO DEL_USER_DATA_END
|
||||
$!
|
||||
$DEL_USER_DATA_LOOP:
|
||||
$!
|
||||
$ IF F$TYPE (SSL_USER_DATA_'SSL_USER_DATA_MAX') .NES. ""
|
||||
$ THEN
|
||||
$ DELETE /SYMBOL /GLOBAL SSL_USER_DATA_'SSL_USER_DATA_MAX'
|
||||
$ SSL_USER_DATA_MAX == SSL_USER_DATA_MAX - 1
|
||||
$ GOTO DEL_USER_DATA_LOOP
|
||||
$ ENDIF
|
||||
$!
|
||||
$ DELETE /SYMBOL /GLOBAL SSL_USER_DATA_MAX
|
||||
$!
|
||||
$DEL_USER_DATA_END:
|
||||
$!
|
||||
$ IF F$TYPE (SSL_USER_DATA) .NES. "" THEN DELETE /SYMBOL /GLOBAL SSL_USER_DATA
|
||||
$!
|
||||
$ EXIT
|
||||
$!
|
||||
$ ENDSUBROUTINE
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Display the invalid entry
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$INVALID_ENTRY: SUBROUTINE
|
||||
$!
|
||||
$ SAY ESC + "[''MSG_ROW';01H", BELL, " Invalid Entry, Try again ...''CEOL'"
|
||||
$ Wait 00:00:01.5
|
||||
$ SAY ESC + "[''MSG_ROW';01H", CEOL
|
||||
$!
|
||||
$ EXIT
|
||||
$!
|
||||
$ ENDSUBROUTINE
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Exit the procedure
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$EXIT:
|
||||
$!
|
||||
$ DEFINE /USER /NOLOG SYS$ERROR NL:
|
||||
$ DEFINE /USER /NOLOG SYS$OUTPUT NL:
|
||||
$ CLOSE OFILE
|
||||
$!
|
||||
$ DEL_USER_DATA
|
||||
$!
|
||||
$ IF F$TYPE (SSL_CONF_DATA) .NES. "" THEN DELETE /SYMBOL /GLOBAL SSL_CONF_DATA
|
||||
$!
|
||||
$ IF F$GETDVI ("TT:","TT_NOECHO") .AND. .NOT. TT_NOECHO THEN SET TERMINAL /ECHO
|
||||
$!
|
||||
$ IF F$SEARCH ("SYS$LOGIN:SSL_REQ_''PID'.%%%;*") .NES. "" THEN DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_REQ_'PID'.%%%;*
|
||||
$ IF F$SEARCH ("SYS$LOGIN:SSL_X509_''PID'.%%%;*") .NES. "" THEN DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_X509_'PID'.%%%;*
|
||||
$!
|
||||
$ Verify = F$VERIFY (Verify)
|
||||
$!
|
||||
$ EXIT
|
||||
101
VMS/cert_tool/ssl$auto_cert.com
Normal file
101
VMS/cert_tool/ssl$auto_cert.com
Normal file
@@ -0,0 +1,101 @@
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! SSL$AUTO_CERT.COM - SSL Automatic Self-Signed Certificate procedure
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ Verify = F$VERIFY (0)
|
||||
$!
|
||||
$ Set NoOn
|
||||
$ Set NoControl=Y
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Define Symbols
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ OPENSSL :== $ SSL$EXE:OPENSSL
|
||||
$ HOSTNAME :== $ SSL$EXE:SSL$HOSTNAME
|
||||
$!
|
||||
$ HOSTNAME -s HOST_NAME
|
||||
$ PID = F$GETJPI ("","PID")
|
||||
$ USER = F$EDIT (F$GETJPI ("","USERNAME"),"TRIM")
|
||||
$ KEY_FILE = "SSL$KEY:SERVER.KEY"
|
||||
$ CRT_FILE = "SSL$CRT:SERVER.CRT"
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Create a Temporary SSL Configuration
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ OPEN /WRITE CFILE SYS$LOGIN:SSL_'PID'.CNF
|
||||
$ WRITE CFILE "[req]"
|
||||
$ WRITE CFILE "default_bits = 1024"
|
||||
$ WRITE CFILE "distinguished_name = REQ_distinguished_name"
|
||||
$ WRITE CFILE "[REQ_distinguished_name]"
|
||||
$ WRITE CFILE "countryName = Country Name ?"
|
||||
$ WRITE CFILE "countryName_default = "
|
||||
$ WRITE CFILE "stateOrProvinceName = State or Province Name ?"
|
||||
$ WRITE CFILE "stateOrProvinceName_default = "
|
||||
$ WRITE CFILE "localityName = City Name ?"
|
||||
$ WRITE CFILE "localityName_default = "
|
||||
$ WRITE CFILE "0.organizationName = Organization Name ?"
|
||||
$ WRITE CFILE "0.organizationName_default = "
|
||||
$ WRITE CFILE "organizationalUnitName = Organization Unit Name ?
|
||||
$ WRITE CFILE "organizationalUnitName_default = "
|
||||
$ WRITE CFILE "commonName = Common Name ?"
|
||||
$ WRITE CFILE "commonName_default = ''HOST_NAME'"
|
||||
$ WRITE CFILE "emailAddress = Email Address ?"
|
||||
$ WRITE CFILE "emailAddress_default = ''USER'@''HOST_NAME'"
|
||||
$ CLOSE CFILE
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Create the Self-Signed Server Certificiate
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ DEFINE /USER /NOLOG SYS$ERROR NL:
|
||||
$ DEFINE /USER /NOLOG SYS$OUTPUT NL:
|
||||
$ SHOW SYSTEM /FULL /OUT=SYS$LOGIN:SSL_'PID'.RND
|
||||
$!
|
||||
$ OPEN /WRITE OFILE SYS$LOGIN:SSL_'PID'.COM
|
||||
$ WRITE OFILE "$ DEFINE /USER /NOLOG RANDFILE SYS$LOGIN:SSL_''PID'.RND"
|
||||
$ WRITE OFILE "$ DEFINE /USER /NOLOG SYS$ERROR SYS$LOGIN:SSL_''PID'.LOG"
|
||||
$ WRITE OFILE "$ DEFINE /USER /NOLOG SYS$OUTPUT SYS$LOGIN:SSL_''PID'.LOG"
|
||||
$ WRITE OFILE "$ DEFINE /USER /NOLOG SYS$COMMAND SYS$INPUT"
|
||||
$ WRITE OFILE "$ OPENSSL req -nodes -new -days 30 -x509 -config SYS$LOGIN:SSL_''PID'.CNF -keyout ''KEY_FILE' -out ''CRT_FILE'"
|
||||
$ WRITE OFILE ""
|
||||
$ WRITE OFILE ""
|
||||
$ WRITE OFILE ""
|
||||
$ WRITE OFILE ""
|
||||
$ WRITE OFILE ""
|
||||
$ WRITE OFILE ""
|
||||
$ WRITE OFILE ""
|
||||
$ CLOSE OFILE
|
||||
$!
|
||||
$ @SYS$LOGIN:SSL_'PID'.COM
|
||||
$!
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_'PID'.CNF;*
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_'PID'.RND;*
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_'PID'.COM;*
|
||||
$!
|
||||
$ DEFINE /USER /NOLOG SYS$ERROR NL:
|
||||
$ DEFINE /USER /NOLOG SYS$OUTPUT NL:
|
||||
$ SEARCH SYS$LOGIN:SSL_'PID'.LOG /OUT=SYS$LOGIN:SSL_'PID'.ERR ":error:"
|
||||
$!
|
||||
$ IF F$SEARCH ("SYS$LOGIN:SSL_''PID'.ERR") .NES. ""
|
||||
$ THEN
|
||||
$ IF F$FILE_ATTRIBUTE ("SYS$LOGIN:SSL_''PID'.ERR","ALQ") .NE. 0
|
||||
$ THEN
|
||||
$ TYPE SYS$LOGIN:SSL_'PID'.LOG
|
||||
$ ENDIF
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_'PID'.ERR;*
|
||||
$ ENDIF
|
||||
$!
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_'PID'.LOG;*
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Exit
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$EXIT:
|
||||
$!
|
||||
$ Verify = F$VERIFY (Verify)
|
||||
$!
|
||||
$ EXIT
|
||||
231
VMS/cert_tool/ssl$cert_tool.com
Normal file
231
VMS/cert_tool/ssl$cert_tool.com
Normal file
@@ -0,0 +1,231 @@
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! SSL$CERT_TOOL.COM - SSL Certificate Tool procedure
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ Verify = F$VERIFY (0)
|
||||
$ Set NoOn
|
||||
$ Set NoControl=Y
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Description
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$! This procedure provides the user a menu from which they can choose desired
|
||||
$! SSL Certificate processing.
|
||||
$!
|
||||
$! There are no parameters used.
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Define symbols
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ DELETE := DELETE
|
||||
$ SAY := WRITE SYS$OUTPUT
|
||||
$ ASK := READ SYS$COMMAND /END_OF_FILE=EXIT /PROMPT=
|
||||
$ On Control_Y THEN GOTO EXIT
|
||||
$ Set Control=Y
|
||||
$!
|
||||
$ TT_ROWS = f$getdvi ("TT:","TT_PAGE")
|
||||
$ TT_COLS = f$getdvi ("TT:","DEVBUFSIZ")
|
||||
$!
|
||||
$ SET_MENU_DATA := CALL SET_MENU_DATA
|
||||
$ DEL_MENU_DATA := CALL DEL_MENU_DATA
|
||||
$!
|
||||
$ ESC[0,8] = 27 ! Set the Escape Character
|
||||
$ BELL[0,8] = 7 ! Ring the terminal Bell
|
||||
$ RED = 1 ! Color - Red
|
||||
$ FGD = 30 ! Foreground
|
||||
$ BGD = 0 ! Background
|
||||
$ CSCR = ESC + "[2J" ! Clear the Screen
|
||||
$ CEOS = ESC + "[0J" ! Clear to the End of the Screen
|
||||
$ CEOL = ESC + "[0K" ! Clear to the End of the Line
|
||||
$ NORM = ESC + "[0m" ! Turn Attributes off
|
||||
$ BOLD = ESC + "[1m" ! Turn on BOLD Attribute
|
||||
$ WIDE = ESC + "#6" ! Turn on WIDE Attribute
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Run the SSL setup if it hasn't been run yet
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ IF F$TRNLNM ("SSL$CA_CONF") .EQS. ""
|
||||
$ THEN
|
||||
$ IF F$SEARCH ("SSL$COM:SSL$INIT_ENV.COM") .NES. ""
|
||||
$ THEN
|
||||
$ @SSL$COM:SSL$INIT_ENV.COM
|
||||
$ ELSE
|
||||
$ SAY BELL, "Unable to locate SSL$COM:SSL$INIT_ENV.COM ..."
|
||||
$ GOTO EXIT
|
||||
$ ENDIF
|
||||
$ ENDIF
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Initialize the Menu Items
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ SET_MENU_DATA "View a Certificate#@SSL$COM:SSL$VIEW_CERT.COM CRT"
|
||||
$ SET_MENU_DATA "View a Certificate Signing Request#@SSL$COM:SSL$VIEW_CERT.COM CSR"
|
||||
$ SET_MENU_DATA "Create a Certificate Signing Request#@SSL$COM:SSL$RQST_CERT.COM"
|
||||
$ SET_MENU_DATA "Create a Self-Signed Certificate#@SSL$COM:SSL$SELF_CERT.COM"
|
||||
$ SET_MENU_DATA "Create a CA (Certification Authority) Certificate#@SSL$COM:SSL$AUTH_CERT.COM"
|
||||
$ SET_MENU_DATA "Sign a Certificate Signing Request#@SSL$COM:SSL$SIGN_CERT.COM"
|
||||
$ SET_MENU_DATA "Hash Certificates#@SSL$COM:SSL$HASH_CERT.COM CRT"
|
||||
$ SET_MENU_DATA "Hash Certificate Revocations#@SSL$COM:SSL$HASH_CERT.COM CRL"
|
||||
$ SET_MENU_DATA "Exit#GOTO EXIT"
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Display the Page Header
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$PAGE_LOOP:
|
||||
$!
|
||||
$ BCOLOR = BGD
|
||||
$ FCOLOR = FGD + RED
|
||||
$ COLOR = ESC + "[''BCOLOR';''FCOLOR'm"
|
||||
$!
|
||||
$ TEXT = "SSL Certificate Tool"
|
||||
$ COL = (TT_COLS - (F$LENGTH (TEXT) * 2)) / 4
|
||||
$!
|
||||
$ SAY ESC + "[01;01H", CSCR
|
||||
$ SAY ESC + "[02;''COL'H", COLOR, WIDE, TEXT, NORM
|
||||
$!
|
||||
$ TEXT = "Main Menu"
|
||||
$ COL = (TT_COLS - F$LENGTH (TEXT)) / 2
|
||||
$!
|
||||
$ SAY ESC + "[04;01H"
|
||||
$ SAY ESC + "[04;''COL'H", COLOR, TEXT, NORM
|
||||
$!
|
||||
$ CTR = 1
|
||||
$ ROW = 6
|
||||
$ COL = (TT_COLS - (SSL_MENU_ITEM_MAX + 4)) / 2
|
||||
$ TOP_ROW = ROW
|
||||
$ SEP_ROWS = 2
|
||||
$ MSG_ROW = TT_ROWS - 1
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Process the menu options
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$MENU_LOOP:
|
||||
$!
|
||||
$ IF CTR .LE. SSL_MENU_DATA_MAX
|
||||
$ THEN
|
||||
$ OPT = F$ELEMENT (0,"#",SSL_MENU_DATA_'CTR') ! Option String
|
||||
$ CMD = F$ELEMENT (1,"#",SSL_MENU_DATA_'CTR') ! Command String
|
||||
$ IF ROW .GE. (MSG_ROW - (SEP_ROWS + 2)) .AND. SEP_ROWS .GT. 1
|
||||
$ THEN
|
||||
$ SAY ESC + "[''TOP_ROW';01H", CEOS
|
||||
$ ROW = TOP_ROW
|
||||
$ SEP_ROWS = 1
|
||||
$ CTR = 1
|
||||
$ ELSE
|
||||
$ NUM = F$FAO ("!2SL", CTR)
|
||||
$ SAY ESC + "[''ROW';''COL'H", BOLD, "''NUM'. ", NORM, "''OPT'"
|
||||
$ ROW = ROW + SEP_ROWS
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ GOTO MENU_LOOP
|
||||
$ ENDIF
|
||||
$!
|
||||
$ ROW = ROW + 1
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Prompt the user for input
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$PROMPT_LOOP:
|
||||
$!
|
||||
$ PROMPT = ESC + "[''ROW';''COL'HEnter Option: ''CEOL'"
|
||||
$ ASK "''PROMPT'" OPT /END_OF_FILE=EXIT
|
||||
$ OPT = F$EDIT (OPT, "TRIM")
|
||||
$ IF OPT .EQS. "" THEN GOTO PROMPT_LOOP
|
||||
$!
|
||||
$ IF F$TYPE (OPT) .NES. "INTEGER" .OR. -
|
||||
F$INTEGER (OPT) .LE. 0 .OR. -
|
||||
F$INTEGER (OPT) .GT. SSL_MENU_DATA_MAX
|
||||
$ THEN
|
||||
$ CALL INVALID_OPTION
|
||||
$ GOTO PROMPT_LOOP
|
||||
$ ENDIF
|
||||
$!
|
||||
$ CMD = F$ELEMENT (1,"#",SSL_MENU_DATA_'OPT')
|
||||
$!
|
||||
$ 'CMD'
|
||||
$!
|
||||
$ GOTO PAGE_LOOP
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Set the Menu Data
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$SET_MENU_DATA: SUBROUTINE
|
||||
$!
|
||||
$ IF F$TYPE (SSL_MENU_DATA_MAX) .EQS. ""
|
||||
$ THEN
|
||||
$ SSL_MENU_DATA_MAX == 1
|
||||
$ SSL_MENU_ITEM_MAX == 0
|
||||
$ ELSE
|
||||
$ SSL_MENU_DATA_MAX == SSL_MENU_DATA_MAX + 1
|
||||
$ ENDIF
|
||||
$!
|
||||
$ SSL_MENU_DATA_'SSL_MENU_DATA_MAX' == "''P1'"
|
||||
$!
|
||||
$ MENU_ITEM = F$ELEMENT (0,"#",SSL_MENU_DATA_'SSL_MENU_DATA_MAX')
|
||||
$ IF F$LENGTH (MENU_ITEM) .GT. SSL_MENU_ITEM_MAX THEN SSL_MENU_ITEM_MAX == F$LENGTH (MENU_ITEM)
|
||||
$!
|
||||
$ EXIT
|
||||
$!
|
||||
$ ENDSUBROUTINE
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Delete the Menu Data
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$DEL_MENU_DATA: SUBROUTINE
|
||||
$!
|
||||
$ IF F$TYPE (SSL_MENU_DATA_MAX) .EQS. "" THEN GOTO DEL_MENU_DATA_END
|
||||
$!
|
||||
$DEL_MENU_DATA_LOOP:
|
||||
$!
|
||||
$ IF F$TYPE (SSL_MENU_DATA_'SSL_MENU_DATA_MAX') .NES. ""
|
||||
$ THEN
|
||||
$ DELETE /SYMBOL /GLOBAL SSL_MENU_DATA_'SSL_MENU_DATA_MAX'
|
||||
$ SSL_MENU_DATA_MAX == SSL_MENU_DATA_MAX - 1
|
||||
$ GOTO DEL_MENU_DATA_LOOP
|
||||
$ ENDIF
|
||||
$!
|
||||
$ DELETE /SYMBOL /GLOBAL SSL_MENU_DATA_MAX
|
||||
$!
|
||||
$DEL_MENU_DATA_END:
|
||||
$!
|
||||
$ IF F$TYPE (SSL_MENU_ITEM_MAX) .NES. "" THEN DELETE /SYMBOL /GLOBAL SSL_MENU_ITEM_MAX
|
||||
$!
|
||||
$ EXIT
|
||||
$!
|
||||
$ ENDSUBROUTINE
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Display the invalid entry
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$INVALID_OPTION: SUBROUTINE
|
||||
$!
|
||||
$ SAY ESC + "[''MSG_ROW';01H", BELL, " Invalid Option, Try again ...''CEOL'"
|
||||
$ Wait 00:00:01.5
|
||||
$ SAY ESC + "[''MSG_ROW';01H", CEOL
|
||||
$!
|
||||
$ EXIT
|
||||
$!
|
||||
$ ENDSUBROUTINE
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Exit
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$EXIT:
|
||||
$!
|
||||
$ DEL_MENU_DATA
|
||||
$!
|
||||
$ Verify = F$VERIFY (Verify)
|
||||
$!
|
||||
$ EXIT
|
||||
220
VMS/cert_tool/ssl$conf_util.com
Normal file
220
VMS/cert_tool/ssl$conf_util.com
Normal file
@@ -0,0 +1,220 @@
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! SSL$CONF_UTIL.COM - SSL Configuration Utility procedure
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ Verify = F$VERIFY (0)
|
||||
$ Set NoOn
|
||||
$ Set NoControl=Y
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Description
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$! This procedure gets or sets a given key item in a SSL configuration file.
|
||||
$! The parameters used are:
|
||||
$!
|
||||
$! P1 - SSL Configuration File
|
||||
$! P2 - SSL Configuration Function (i.e. GET/SET)
|
||||
$! P3 - SSL Configuration Key/Item (delimited by '#')
|
||||
$! P4 - SSL Configuration Key/Item Value (for SET function only)
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Define symbols
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ SSL_CONF_DATA == ""
|
||||
$ SAY := WRITE SYS$OUTPUT
|
||||
$ ASK := READ SYS$COMMAND /END_OF_FILE=EXIT /PROMPT=
|
||||
$ On Control_Y THEN GOTO EXIT
|
||||
$ Set Control=Y
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Process parameters
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ KEY_FOUND = 0
|
||||
$ ITM_FOUND = 0
|
||||
$ P1 = F$EDIT (P1,"TRIM")
|
||||
$ P2 = F$EDIT (P2,"TRIM,UPCASE")
|
||||
$ KEY = F$ELEMENT (0,"#",P3)
|
||||
$ ITM = F$ELEMENT (1,"#",P3)
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Process the configuration function
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ IF P2 .EQS. "GET" THEN GOSUB GET_CONF_DATA
|
||||
$ IF P2 .EQS. "SET" THEN GOSUB SET_CONF_DATA
|
||||
$!
|
||||
$ GOTO EXIT
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Get the configuration data
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$GET_CONF_DATA:
|
||||
$!
|
||||
$ OPEN /READ /ERROR=OPEN_ERROR IFILE 'P1'
|
||||
$!
|
||||
$GET_CONF_DATA_LOOP:
|
||||
$!
|
||||
$ READ /ERROR=READ_ERROR /END_OF_FILE=GET_CONF_DATA_END IFILE IREC
|
||||
$!
|
||||
$ SREC = IREC
|
||||
$ IPOS = F$LOCATE ("#",IREC)
|
||||
$ IF IPOS .NE. F$LENGTH (IREC) THEN IREC = F$EXTRACT (0,IPOS,IREC)
|
||||
$ IREC = F$EDIT (IREC,"COLLAPSE")
|
||||
|
||||
$ IF IREC .EQS. "" THEN GOTO GET_CONF_DATA_LOOP
|
||||
$!
|
||||
$ IF IREC .EQS. KEY
|
||||
$ THEN
|
||||
$ KEY_FOUND = 1
|
||||
$ GOTO GET_CONF_DATA_LOOP
|
||||
$ ENDIF
|
||||
$!
|
||||
$ IF KEY_FOUND .EQ. 1
|
||||
$ THEN
|
||||
$ IF F$EXTRACT (0,1,IREC) .EQS. "[" .AND. F$EXTRACT (F$LENGTH (IREC)-1,1,IREC) .EQS. "]"
|
||||
$ THEN
|
||||
$ SSL_CONF_DATA == ""
|
||||
$ GOTO GET_CONF_DATA_END
|
||||
$ ENDIF
|
||||
$!
|
||||
$ IF ITM .EQS. F$EDIT (F$ELEMENT (0,"=",IREC),"TRIM")
|
||||
$ THEN
|
||||
$ VAL = F$EDIT (F$ELEMENT (1,"=",SREC),"TRIM")
|
||||
$ SSL_CONF_DATA == "''VAL'"
|
||||
$ GOTO GET_CONF_DATA_END
|
||||
$ ENDIF
|
||||
$ ENDIF
|
||||
$!
|
||||
$ GOTO GET_CONF_DATA_LOOP
|
||||
$!
|
||||
$GET_CONF_DATA_END:
|
||||
$!
|
||||
$ CLOSE /ERROR=CLOSE_ERROR IFILE
|
||||
$!
|
||||
$ RETURN
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Set the configuration data
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$SET_CONF_DATA:
|
||||
$!
|
||||
$ IF F$SEARCH ("''P1'") .EQS. "" THEN CREATE /NOLOG 'P1'
|
||||
$!
|
||||
$ OPEN /READ /ERROR=OPEN_ERROR IFILE 'P1'
|
||||
$ OPEN /WRITE /ERROR=OPEN_ERROR OFILE 'P1'
|
||||
$!
|
||||
$SET_CONF_DATA_LOOP:
|
||||
$!
|
||||
$ READ /ERROR=READ_ERROR /END_OF_FILE=SET_CONF_DATA_END IFILE IREC
|
||||
$!
|
||||
$ IF ITM_FOUND .EQ. 1
|
||||
$ THEN
|
||||
$ WRITE /ERROR=WRITE_ERROR OFILE IREC
|
||||
$ GOTO SET_CONF_DATA_LOOP
|
||||
$ ENDIF
|
||||
$!
|
||||
$ SREC = IREC
|
||||
$ IPOS = F$LOCATE ("#",IREC)
|
||||
$ IF IPOS .NE. F$LENGTH (IREC) THEN IREC = F$EXTRACT (0,IPOS,IREC)
|
||||
$ IREC = F$EDIT (IREC,"COLLAPSE")
|
||||
$!
|
||||
$ IF IREC .EQS. ""
|
||||
$ THEN
|
||||
$ WRITE /ERROR=WRITE_ERROR OFILE SREC
|
||||
$ GOTO SET_CONF_DATA_LOOP
|
||||
$ ENDIF
|
||||
$!
|
||||
$ IF IREC .EQS. KEY
|
||||
$ THEN
|
||||
$ KEY_FOUND = 1
|
||||
$ WRITE /ERROR=WRITE_ERROR OFILE SREC
|
||||
$ GOTO SET_CONF_DATA_LOOP
|
||||
$ ENDIF
|
||||
$!
|
||||
$ IF KEY_FOUND .EQ. 1
|
||||
$ THEN
|
||||
$ IF F$EXTRACT (0,1,IREC) .EQS. "[" .AND. F$EXTRACT (F$LENGTH (IREC)-1,1,IREC) .EQS. "]"
|
||||
$ THEN
|
||||
$ WRITE /ERROR=WRITE_ERROR OFILE "''ITM' = ''P4'"
|
||||
$ WRITE /ERROR=WRITE_ERROR OFILE SREC
|
||||
$ ITM_FOUND = 1
|
||||
$ GOTO SET_CONF_DATA_LOOP
|
||||
$ ENDIF
|
||||
$!
|
||||
$ IF ITM .EQS. F$EDIT (F$ELEMENT (0,"=",IREC),"TRIM")
|
||||
$ THEN
|
||||
$ WRITE /ERROR=WRITE_ERROR OFILE "''ITM' = ''P4'"
|
||||
$ ITM_FOUND = 1
|
||||
$ GOTO SET_CONF_DATA_LOOP
|
||||
$ ENDIF
|
||||
$ ENDIF
|
||||
$!
|
||||
$ WRITE /ERROR=WRITE_ERROR OFILE SREC
|
||||
$!
|
||||
$ GOTO SET_CONF_DATA_LOOP
|
||||
$!
|
||||
$SET_CONF_DATA_END:
|
||||
$!
|
||||
$ IF KEY_FOUND .EQ. 0
|
||||
$ THEN
|
||||
$ WRITE /ERROR=WRITE_ERROR OFILE "''KEY'"
|
||||
$ WRITE /ERROR=WRITE_ERROR OFILE "''ITM' = ''P4'"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ IF KEY_FOUND .EQ. 1 .AND. ITM_FOUND .EQ. 0
|
||||
$ THEN
|
||||
$ WRITE /ERROR=WRITE_ERROR OFILE "''ITM' = ''P4'"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ CLOSE IFILE
|
||||
$ CLOSE OFILE
|
||||
$!
|
||||
$ RETURN
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! File Errors
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$OPEN_ERROR:
|
||||
$!
|
||||
$ SAY "Open error for file ''P1' ... aborting ''P2'"
|
||||
$ GOTO EXIT
|
||||
$!
|
||||
$READ_ERROR:
|
||||
$!
|
||||
$ SAY "Read error for file ''P1' ... aborting ''P2'"
|
||||
$ GOTO EXIT
|
||||
$!
|
||||
$WRITE_ERROR:
|
||||
$!
|
||||
$ SAY "Write error for file ''P1' ... aborting ''P2'"
|
||||
$ GOTO EXIT
|
||||
$!
|
||||
$CLOSE_ERROR:
|
||||
$!
|
||||
$ SAY "Close error for file ''P1' ... aborting ''P2'"
|
||||
$ GOTO EXIT
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Exit
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$EXIT:
|
||||
$!
|
||||
$ DEFINE /USER /NOLOG SYS$ERROR NL:
|
||||
$ DEFINE /USER /NOLOG SYS$OUTPUT NL:
|
||||
$ CLOSE IFILE
|
||||
$!
|
||||
$ DEFINE /USER /NOLOG SYS$ERROR NL:
|
||||
$ DEFINE /USER /NOLOG SYS$OUTPUT NL:
|
||||
$ CLOSE OFILE
|
||||
$!
|
||||
$ Verify = F$VERIFY (Verify)
|
||||
$!
|
||||
$ EXIT 1
|
||||
109
VMS/cert_tool/ssl$draw_box.com
Normal file
109
VMS/cert_tool/ssl$draw_box.com
Normal file
@@ -0,0 +1,109 @@
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! SSL$DRAW_BOX.COM - SSL Draw Box procedure
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ Verify = F$VERIFY (0)
|
||||
$ Set NoOn
|
||||
$ Set NoControl=Y
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Description
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$! This procedure draws a box with the specified coordinates.
|
||||
$!
|
||||
$! The parameters used are:
|
||||
$!
|
||||
$! P1 - X1 coordinate
|
||||
$! P2 - Y1 coordinate
|
||||
$! P3 - X2 coordinate
|
||||
$! P4 - Y3 coordinate
|
||||
$! P5 - Box Header (Optional)
|
||||
$! P6 - Box Footer (Optional)
|
||||
$! P7 - Fill Box (Optional)
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Define symbols
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ SAY := WRITE SYS$OUTPUT
|
||||
$ On Control_Y THEN GOTO EXIT
|
||||
$ Set Control=Y
|
||||
$!
|
||||
$ FILL_BOX := @SSL$COM:SSL$FILL_BOX
|
||||
$!
|
||||
$ ESC[0,8] = 27 ! Set the Escape Character
|
||||
$ GRPH_ON[0,8] = 14 ! Turn GRAPHICS mode On
|
||||
$ GRPH_OFF[0,8] = 15 ! Turn GRAPHICS mode Off
|
||||
$ NORM = ESC + "[0m" ! Turn Attributes off
|
||||
$ BOLD = ESC + "[1m" ! Turn on BOLD Attribute
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Draw the box
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ X1 = F$INTEGER (P1)
|
||||
$ Y1 = F$INTEGER (P2)
|
||||
$ X2 = F$INTEGER (P3)
|
||||
$ Y2 = F$INTEGER (P4)
|
||||
$!
|
||||
$ ROW = Y1 + 1
|
||||
$ COL = X1 + 1
|
||||
$ SIDE1 = X1
|
||||
$ SIDE2 = X2 + 1
|
||||
$ TOP = "l" + F$FAO("!#*q", x2 - x1) + "k"
|
||||
$ BOT = "m" + F$FAO("!#*q", x2 - x1) + "j"
|
||||
$!
|
||||
$ SAY ESC + "[''Y1';''X1'H", BOLD, GRPH_ON, TOP, GRPH_OFF, NORM
|
||||
$!
|
||||
$SIDES:
|
||||
$!
|
||||
$ SAY ESC + "[''ROW';''SIDE1'H",BOLD,GRPH_ON,"x",GRPH_OFF,NORM
|
||||
$ SAY ESC + "[''ROW';''SIDE2'H",BOLD,GRPH_ON,"x",GRPH_OFF,NORM
|
||||
$!
|
||||
$ IF ROW .LT. Y2
|
||||
$ THEN
|
||||
$ ROW = ROW + 1
|
||||
$ GOTO SIDES
|
||||
$ ENDIF
|
||||
$!
|
||||
$ SAY ESC + "[''Y2';''X1'H", BOLD, GRPH_ON, BOT, GRPH_OFF, NORM
|
||||
$!
|
||||
$ IF P5 .NES. ""
|
||||
$ THEN
|
||||
$ IF F$LENGTH(P5) .GT. X2 - X1
|
||||
$ THEN
|
||||
$ HEADER = F$EXTRACT (0, (X2 - X1 - 4), P5)
|
||||
$ ELSE
|
||||
$ HEADER = P5
|
||||
$ ENDIF
|
||||
$ COL = X1 + ((X2 - X1 - F$LENGTH(HEADER)) / 2)
|
||||
$ SAY ESC + "[''Y1';''COL'H''BOLD'''HEADER'''NORM'"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ IF P6 .NES. ""
|
||||
$ THEN
|
||||
$ IF F$LENGTH(P6) .GT. X2 - X1
|
||||
$ THEN
|
||||
$ FOOTER = F$EXTRACT (0, (X2 - X1 - 4), P6)
|
||||
$ ELSE
|
||||
$ FOOTER = P6
|
||||
$ ENDIF
|
||||
$ COL = X1 + ((X2 - X1 - F$LENGTH(FOOTER)) / 2)
|
||||
$ SAY ESC + "[''Y2';''COL'H''BOLD'''FOOTER'''NORM'"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ IF P7 .EQS. "" .OR. P7 .EQS. "Y" THEN FILL_BOX 'X1' 'Y1' 'X2' 'Y2'
|
||||
$!
|
||||
$ GOTO EXIT
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Exit
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$EXIT:
|
||||
$!
|
||||
$ Verify = F$VERIFY (Verify)
|
||||
$!
|
||||
$ EXIT
|
||||
1
VMS/cert_tool/ssl$exit_cmd.tpu
Normal file
1
VMS/cert_tool/ssl$exit_cmd.tpu
Normal file
@@ -0,0 +1 @@
|
||||
EXIT
|
||||
65
VMS/cert_tool/ssl$fill_box.com
Normal file
65
VMS/cert_tool/ssl$fill_box.com
Normal file
@@ -0,0 +1,65 @@
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! SSL$FILL_BOX.COM - SSL Fill Box procedure
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ Verify = F$VERIFY (0)
|
||||
$ Set NoOn
|
||||
$ Set NoControl=Y
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Description
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$! This procedure draws a box with the specified coordinates.
|
||||
$!
|
||||
$! The parameters used are:
|
||||
$!
|
||||
$! P1 - X1 coordinate
|
||||
$! P2 - Y1 coordinate
|
||||
$! P3 - X2 coordinate
|
||||
$! P4 - Y2 coordinate
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Define symbols
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ SAY := WRITE SYS$OUTPUT
|
||||
$ On Control_Y THEN GOTO EXIT
|
||||
$ Set Control=Y
|
||||
$!
|
||||
$ ESC[0,8] = 27 ! Set the Escape Character
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Draw the box
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ X1 = F$INTEGER (P1)
|
||||
$ Y1 = F$INTEGER (P2)
|
||||
$ X2 = F$INTEGER (P3)
|
||||
$ Y2 = F$INTEGER (P4)
|
||||
$!
|
||||
$ ROW = Y1 + 1
|
||||
$ COL = X1 + 1
|
||||
$ FILL = F$FAO("!#* ", X2 - X1)
|
||||
$!
|
||||
$FILL_LOOP:
|
||||
$!
|
||||
$ IF ROW .LT. Y2
|
||||
$ THEN
|
||||
$ SAY ESC + "[''ROW';''COL'H",FILL
|
||||
$ ROW = ROW + 1
|
||||
$ GOTO FILL_LOOP
|
||||
$ ENDIF
|
||||
$!
|
||||
$ GOTO EXIT
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Exit
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$EXIT:
|
||||
$!
|
||||
$ Verify = F$VERIFY (Verify)
|
||||
$!
|
||||
$ EXIT
|
||||
235
VMS/cert_tool/ssl$hash_cert.com
Normal file
235
VMS/cert_tool/ssl$hash_cert.com
Normal file
@@ -0,0 +1,235 @@
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! SSL$HASH_CERT.COM - SSL Hash Certificate procedure
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ Verify = F$VERIFY (0)
|
||||
$ Set NoOn
|
||||
$ Set NoControl=Y
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Description
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$! This procedure prompts the user through hashing Certificates.
|
||||
$!
|
||||
$! The parameters used are:
|
||||
$!
|
||||
$! P1 - Certificate or Certificate Revocation List (i.e. "CRT" or "CRL")
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Define symbols
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ DELETE := DELETE
|
||||
$ SAY := WRITE SYS$OUTPUT
|
||||
$ ASK := READ SYS$COMMAND /END_OF_FILE=EXIT /PROMPT=
|
||||
$ On Control_Y THEN GOTO EXIT
|
||||
$ Set Control=Y
|
||||
$!
|
||||
$ TT_ROWS = F$GETDVI ("TT:","TT_PAGE")
|
||||
$ TT_COLS = F$GETDVI ("TT:","DEVBUFSIZ")
|
||||
$!
|
||||
$ INIT_TERM := @SSL$COM:SSL$INIT_TERM
|
||||
$!
|
||||
$ ESC[0,8] = 27 ! Set the Escape Character
|
||||
$ BELL[0,8] = 7 ! Ring the terminal Bell
|
||||
$ RED = 1 ! Color - Red
|
||||
$ FGD = 30 ! Foreground
|
||||
$ BGD = 0 ! Background
|
||||
$ CSCR = ESC + "[2J" ! Clear the Screen
|
||||
$ CEOS = ESC + "[0J" ! Clear to the End of the Screen
|
||||
$ CEOL = ESC + "[0K" ! Clear to the End of the Line
|
||||
$ NORM = ESC + "[0m" ! Turn Attributes off
|
||||
$ BLNK = ESC + "[5m" ! Turn on BLINK Attribute
|
||||
$ WIDE = ESC + "#6" ! Turn on WIDE Attribute
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Run the SSL setup if it hasn't been run yet
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ IF F$TRNLNM ("SSL$ROOT") .EQS. ""
|
||||
$ THEN
|
||||
$ IF F$SEARCH ("SSL$COM:SSL$INIT_ENV.COM") .NES. ""
|
||||
$ THEN
|
||||
$ @SSL$COM:SSL$INIT_ENV.COM
|
||||
$ ELSE
|
||||
$ SAY BELL, "Unable to locate SSL$COM:SSL$INIT_ENV.COM ..."
|
||||
$ GOTO EXIT
|
||||
$ ENDIF
|
||||
$ ENDIF
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Display the Page Header
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ INIT_TERM
|
||||
$ BCOLOR = BGD
|
||||
$ FCOLOR = FGD + RED
|
||||
$ COLOR = ESC + "[''BCOLOR';''FCOLOR'm"
|
||||
$!
|
||||
$ TEXT = "SSL Certificate Tool"
|
||||
$ COL = (TT_COLS - (F$LENGTH (TEXT) * 2)) / 4
|
||||
$!
|
||||
$ SAY ESC + "[01;01H", CSCR
|
||||
$ SAY ESC + "[02;''COL'H", COLOR, WIDE, TEXT, NORM
|
||||
$!
|
||||
$ IF P1 .EQS. "CRT"
|
||||
$ THEN
|
||||
$ TEXT = "Hash Certification Authorities"
|
||||
$ ELSE
|
||||
$ TEXT = "Hash Certificate Revocations"
|
||||
$ ENDIF
|
||||
$ COL = (TT_COLS - F$LENGTH (TEXT)) / 2
|
||||
$!
|
||||
$ SAY ESC + "[04;01H"
|
||||
$ SAY ESC + "[04;''COL'H", COLOR, TEXT, NORM
|
||||
$!
|
||||
$ CTR = 1
|
||||
$ ROW = 6
|
||||
$ COL = 2
|
||||
$ TOP_ROW = ROW
|
||||
$ MSG_ROW = TT_ROWS - 1
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Initialize the Request Data
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ IF P1 .EQS. "CRT"
|
||||
$ THEN
|
||||
$ PRM = "Certificate Path:"
|
||||
$ DEF = "SSL$CRT:*.CRT"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ IF P1 .EQS. "CRL"
|
||||
$ THEN
|
||||
$ PRM = "Certificate Revocation Path:"
|
||||
$ DEF = "SSL$CRT:*.CRL"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ SAY ESC + "[''MSG_ROW';01H", CEOS
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Confirm/Update the SSL Configuration Data
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$PROMPT_LOOP:
|
||||
$!
|
||||
$ PROMPT = ESC + "[''ROW';''COL'H''PRM' ? [''DEF'] ''CEOL'"
|
||||
$ ASK "''PROMPT'" _hash_path_name
|
||||
$ _hash_path_name = F$EDIT (_hash_path_name,"TRIM")
|
||||
$ IF _hash_path_name .EQS. "" THEN _hash_path_name = DEF
|
||||
$!
|
||||
$ HASH_DEV = F$PARSE (_hash_path_name,DEF,,"DEVICE")
|
||||
$ HASH_DIR = F$PARSE (_hash_path_name,DEF,,"DIRECTORY")
|
||||
$ HASH_NAM = F$PARSE (_hash_path_name,DEF,,"NAME")
|
||||
$ HASH_TYP = F$PARSE (_hash_path_name,DEF,,"TYPE")
|
||||
$ _hash_path_name = HASH_DEV + HASH_DIR + HASH_NAM + HASH_TYP
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Create the Certificiate Hashes
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ IF P1 .EQS. "CRT"
|
||||
$ THEN
|
||||
$ SAY ESC + "[''MSG_ROW';01H", BLNK, " Hashing Certificate Authorities ...", NORM, CEOL
|
||||
$ ENDIF
|
||||
$!
|
||||
$ IF P1 .EQS. "CRL"
|
||||
$ THEN
|
||||
$ SAY ESC + "[''MSG_ROW';01H", BLNK, " Hashing Certificate Revocations ...", NORM, CEOL
|
||||
$ ENDIF
|
||||
$!
|
||||
$ IF F$SEARCH ("''HASH_DEV'''HASH_DIR'DELETE_HASH_FILES.COM") .NES. ""
|
||||
$ THEN
|
||||
$ @'HASH_DEV''HASH_DIR'DELETE_HASH_FILES.COM
|
||||
$ DELETE 'HASH_DEV''HASH_DIR'DELETE_HASH_FILES.COM;*
|
||||
$ ENDIF
|
||||
$!
|
||||
$ CTR = 0
|
||||
$!
|
||||
$ OPEN /WRITE OFILE 'HASH_DEV''HASH_DIR'DELETE_HASH_FILES.COM
|
||||
$!
|
||||
$CERT_LOOP:
|
||||
$!
|
||||
$ CERT_FILE = F$SEARCH ("''_hash_path_name'", 1)
|
||||
$ IF CERT_FILE .EQS. "" THEN GOTO CERT_END
|
||||
$ CTR = CTR + 1
|
||||
$!
|
||||
$ CALL HASH_CERT 'P1' 'CERT_FILE'
|
||||
$!
|
||||
$ GOTO CERT_LOOP
|
||||
$!
|
||||
$CERT_END:
|
||||
$!
|
||||
$ CLOSE OFILE
|
||||
$!
|
||||
$ IF CTR .EQ. 0
|
||||
$ THEN
|
||||
$ TEXT = "No files found, Press return to continue"
|
||||
$ ELSE
|
||||
$ TEXT = "Press return to continue"
|
||||
$ ENDIF
|
||||
$ COL = (TT_COLS - F$LENGTH (TEXT)) / 2
|
||||
$!
|
||||
$ IF CTR .EQ. 0
|
||||
$ THEN
|
||||
$ SAY BELL, ESC + "[''MSG_ROW';01H", CEOS
|
||||
$ ELSE
|
||||
$ SAY ESC + "[''MSG_ROW';01H", CEOS
|
||||
$ ENDIF
|
||||
$ PROMPT = ESC + "[''MSG_ROW';''COL'H''TEXT'"
|
||||
$ ASK "''PROMPT'" OPT
|
||||
$!
|
||||
$ GOTO EXIT
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Hash Certificate Subroutine
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$HASH_CERT: SUBROUTINE
|
||||
$!
|
||||
$ IF P1 .EQS. "CRT"
|
||||
$ THEN
|
||||
$ HASH_SUFF = ""
|
||||
$ HASH_FUNC = "$SSL$EXE:OPENSSL X509 -HASH -NOOUT -IN"
|
||||
$ ELSE
|
||||
$ HASH_SUFF = "R"
|
||||
$ HASH_FUNC = "$SSL$EXE:OPENSSL CRL -HASH -NOOUT -IN"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ PIPE HASH_FUNC 'P2' | (READ SYS$INPUT VAL ; DEFINE/NOLOG/JOB HASH_VAL &VAL)
|
||||
$ HASH_VAL = F$TRNLNM ("HASH_VAL")
|
||||
$ DEASSIGN /JOB HASH_VAL
|
||||
$!
|
||||
$ IDX = 0
|
||||
$!
|
||||
$IDX_LOOP:
|
||||
$!
|
||||
$ HASH_FILE = "''HASH_DEV'''HASH_DIR'''HASH_VAL'.''HASH_SUFF'''IDX'"
|
||||
$ IF F$SEARCH ("''HASH_FILE'") .NES. ""
|
||||
$ THEN
|
||||
$ IDX = IDX + 1
|
||||
$ GOTO IDX_LOOP
|
||||
$ ENDIF
|
||||
$!
|
||||
$ COPY 'P2' 'HASH_FILE'
|
||||
$ WRITE OFILE "$ DELETE ''HASH_FILE';*"
|
||||
$!
|
||||
$ EXIT
|
||||
$!
|
||||
$ ENDSUBOUTINE
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Exit the procedure
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$EXIT:
|
||||
$!
|
||||
$ DEFINE /USER /NOLOG SYS$ERROR NL:
|
||||
$ DEFINE /USER /NOLOG SYS$OUTPUT NL:
|
||||
$ CLOSE OFILE
|
||||
$!
|
||||
$ Verify = F$VERIFY (Verify)
|
||||
$!
|
||||
$ EXIT
|
||||
61
VMS/cert_tool/ssl$init_env.com
Normal file
61
VMS/cert_tool/ssl$init_env.com
Normal file
@@ -0,0 +1,61 @@
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! SSL$INIT_ENV.COM - SSL Initialize Environment
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ Verify = F$VERIFY (0)
|
||||
$ Set NoOn
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Description
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$! This procedure sets up the SSL environment logicals & symbols.
|
||||
$!
|
||||
$! P1 = Mode of the logicals (ie - "/SYSTEM/EXECUTIVE_MODE").
|
||||
$! Note - if P1 is not passed in, P1 will default to PROCESS.
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Initialization
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ IF F$TRNLNM("SSL$ROOT") .EQS. ""
|
||||
$ THEN
|
||||
$ WRITE SYS$OUTPUT " "
|
||||
$ WRITE SYS$OUTPUT " SSL-E-ERROR, SSL has not been started."
|
||||
$ WRITE SYS$OUTPUT " "
|
||||
$ WRITE SYS$OUTPUT " Execute the command procedure, SYS$STARTUP:SSL$STARTUP.COM, and then try this procedure again."
|
||||
$ WRITE SYS$OUTPUT " "
|
||||
$ EXIT
|
||||
$ ENDIF
|
||||
$!
|
||||
$ IF P1 .EQS. ""
|
||||
$ THEN
|
||||
$ P1 = "/PROCESS"
|
||||
$ ENDIF
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Define logicals
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ DEFINE 'P1 SSL$CA_CONF SSL$ROOT:[CONF]SSL$CA.CNF
|
||||
$ DEFINE 'P1 SSL$CONF SSL$ROOT:[CONF]SSL$CERT.CNF
|
||||
$ DEFINE 'P1 SSL$COM SSL$ROOT:[COM]
|
||||
$ DEFINE 'P1 SSL$CRT SSL$ROOT:[CERTS]
|
||||
$ DEFINE 'P1 SSL$CSR SSL$ROOT:[CERTS]
|
||||
$ DEFINE 'P1 SSL$KEY SSL$ROOT:[CERTS]
|
||||
$ DEFINE 'P1 SSL$DB SSL$ROOT:[PRIVATE]
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Define foreign symbols
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ OPENSSL :== $ SSL$EXE:OPENSSL
|
||||
$ HOSTADDR :== $ SSL$EXE:SSL$HOSTADDR
|
||||
$ HOSTNAME :== $ SSL$EXE:SSL$HOSTNAME
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Exit
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ EXIT
|
||||
55
VMS/cert_tool/ssl$init_term.com
Normal file
55
VMS/cert_tool/ssl$init_term.com
Normal file
@@ -0,0 +1,55 @@
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! SSL$INIT_TERM.COM - SSL Initialize Terminal procedure
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ Verify = F$VERIFY (0)
|
||||
$ Set NoOn
|
||||
$ Set NoControl=Y
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Description
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$! This procedure initializes the terminal attributes.
|
||||
$!
|
||||
$! The parameters used are:
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Define symbols
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ On Control_Y THEN GOTO EXIT
|
||||
$ Set Control=Y
|
||||
$!
|
||||
$ EDIT := EDIT
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Initialize the terminal with TPU
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ IF F$SEARCH ("SSL$COM:SSL$EXIT_CMD.TPU") .EQS. ""
|
||||
$ THEN
|
||||
$ OPEN /WRITE OFILE SSL$COM:SSL$EXIT_CMD.TPU
|
||||
$ WRITE OFILE "EXIT"
|
||||
$ CLOSE OFILE
|
||||
$ ENDIF
|
||||
$!
|
||||
$ DEFINE /USER /NOLOG SYS$OUTPUT NL:
|
||||
$ DEFINE /USER /NOLOG SYS$ERROR NL:
|
||||
$ DEFINE /USER /NOLOG SYS$INPUT SYS$COMMAND
|
||||
$ EDIT /TPU /COMMAND=OPENSS$COM:SSL$EXIT_CMD.TPU
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Exit
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$EXIT:
|
||||
$!
|
||||
$ DEFINE /USER /NOLOG SYS$ERROR NL:
|
||||
$ DEFINE /USER /NOLOG SYS$OUTPUT NL:
|
||||
$ CLOSE OFILE
|
||||
$!
|
||||
$ Verify = F$VERIFY (Verify)
|
||||
$!
|
||||
$ EXIT
|
||||
230
VMS/cert_tool/ssl$pick_file.com
Normal file
230
VMS/cert_tool/ssl$pick_file.com
Normal file
@@ -0,0 +1,230 @@
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! SSL$PICK_FILE.COM - SSL Pick File procedure
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ Verify = F$VERIFY (0)
|
||||
$ Set NoOn
|
||||
$ Set NoControl=Y
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Description
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$! This procedure display the contents of a given file in a box size specified.
|
||||
$!
|
||||
$! The parameters used are:
|
||||
$!
|
||||
$! P1 - File Spec to Parse
|
||||
$! P2 - X1 coordinate
|
||||
$! P3 - Y1 coordinate
|
||||
$! P4 - X2 coordinate
|
||||
$! P5 - Y3 coordinate
|
||||
$! P6 - File Pick Header (Optional)
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Define symbols
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ SSL_FILE_NAME == ""
|
||||
$ SAY := WRITE SYS$OUTPUT
|
||||
$ ASK := READ SYS$COMMAND /END_OF_FILE=EXIT /PROMPT=
|
||||
$ On Control_Y THEN GOTO EXIT
|
||||
$ Set Control=Y
|
||||
$!
|
||||
$ DRAW_BOX := @SSL$COM:SSL$DRAW_BOX
|
||||
$ FILL_BOX := @SSL$COM:SSL$FILL_BOX
|
||||
$!
|
||||
$ ESC[0,8] = 27 ! Set the Escape Character
|
||||
$ BELL[0,8] = 7 ! Ring the terminal Bell
|
||||
$ CEOL = ESC + "[0K" ! Clear to the End of the Line
|
||||
$ NORM = ESC + "[0m" ! Turn Attributes off
|
||||
$ BOLD = ESC + "[1m" ! Turn on BOLD Attribute
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Display the Page Header
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ P1 = F$EDIT (P1, "TRIM")
|
||||
$ P2 = F$INTEGER (P2)
|
||||
$ P3 = F$INTEGER (P3)
|
||||
$ P4 = F$INTEGER (P4)
|
||||
$ P5 = F$INTEGER (P5)
|
||||
$ FILE_MAX = 0
|
||||
$!
|
||||
$SEARCH_LOOP:
|
||||
$!
|
||||
$ FILE = F$SEARCH ("''P1'",1)
|
||||
$ IF FILE .NES. ""
|
||||
$ THEN
|
||||
$ IF FILE_MAX .EQ. 1
|
||||
$ THEN
|
||||
$ IF FILE_1 .EQS. FILE THEN GOTO SEARCH_END
|
||||
$ ENDIF
|
||||
$ FILE_MAX = FILE_MAX + 1
|
||||
$ FILE_'FILE_MAX' = FILE
|
||||
$ GOTO SEARCH_LOOP
|
||||
$ ENDIF
|
||||
$!
|
||||
$SEARCH_END:
|
||||
$!
|
||||
$ IF FILE_MAX .EQ. 0
|
||||
$ THEN
|
||||
$ DRAW_BOX 'P2' 'P3' 'P4' 'P5' "''P6'" " No Files Found, Press Return to Exit "
|
||||
$ INPUT_ROW = P5 + 1
|
||||
$ PROMPT = ESC + "[''INPUT_ROW';01H ''CEOL'"
|
||||
$ ASK "''PROMPT'" OPT
|
||||
$ GOTO EXIT
|
||||
$ ENDIF
|
||||
$!
|
||||
$ COL = P2 + 2
|
||||
$ ROW = P3 + 2
|
||||
$ TOP_ROW = ROW
|
||||
$ INPUT_ROW = P5 + 1
|
||||
$ BOX_WIDTH = P4 - (P2 + 2)
|
||||
$ BOX_HEIGHT = P5 - (P3 + 3)
|
||||
$!
|
||||
$ FILE_CTR = 1
|
||||
$ PAGE_CTR = 1
|
||||
$ PAGE_'PAGE_CTR'_FILE_CTR = FILE_CTR
|
||||
$ FILES_PER_PAGE = BOX_HEIGHT
|
||||
$ PAGE_MAX = FILE_MAX / FILES_PER_PAGE
|
||||
$ IF PAGE_MAX * FILES_PER_PAGE .LT. FILE_MAX THEN PAGE_MAX = PAGE_MAX + 1
|
||||
$!
|
||||
$ DRAW_BOX 'P2' 'P3' 'P4' 'P5' "''P6'" " Enter B for Back, N for Next, Ctrl-Z to Exit or Enter a File Number "
|
||||
$ PAGE_TXT = F$FAO (" Page !UL of !UL ", PAGE_CTR, PAGE_MAX)
|
||||
$ _COL = P2 + (BOX_WIDTH - F$LENGTH (PAGE_TXT)) + 2
|
||||
$ SAY ESC + "[''P3';''_COL'H''BOLD'''PAGE_TXT'''NORM'"
|
||||
$!
|
||||
$DISPLAY_LOOP:
|
||||
$!
|
||||
$ IF FILE_CTR .LE. FILE_MAX .AND. F$TYPE (FILE_'FILE_CTR') .NES. ""
|
||||
$ THEN
|
||||
$ FILE = FILE_'FILE_CTR'
|
||||
$ ELSE
|
||||
$ FILE = ""
|
||||
$ ENDIF
|
||||
$ WRAP_IN_PROGRESS = 0
|
||||
$!
|
||||
$WRAP_LOOP:
|
||||
$!
|
||||
$ IF ROW .LE. (P5 - 2) .AND. -
|
||||
FILE_CTR .LE. PAGE_CTR * FILES_PER_PAGE
|
||||
$ THEN
|
||||
$ IF F$LENGTH (FILE) .GT. BOX_WIDTH
|
||||
$ THEN
|
||||
$ IF WRAP_IN_PROGRESS .EQ. 0
|
||||
$ THEN
|
||||
$ CTR_TXT = F$FAO ("!3UL. ",FILE_CTR)
|
||||
$ WRAP_IN_PROGRESS = 1
|
||||
$ ELSE
|
||||
$ CTR_TXT = " "
|
||||
$ ENDIF
|
||||
$ FILE_SEG = F$EXTRACT (0, BOX_WIDTH - F$LENGTH (CTR_TXT), FILE)
|
||||
$ SAY ESC + "[''ROW';''COL'H''BOLD'''CTR_TXT'''NORM'''FILE_SEG'"
|
||||
$ FILE = F$EXTRACT (BOX_WIDTH - F$LENGTH (CTR_TXT), F$LENGTH (FILE) - (BOX_WIDTH + F$LENGTH (CTR_TXT)), FILE)
|
||||
$ ROW = ROW + 1
|
||||
$ GOTO WRAP_LOOP
|
||||
$ ELSE
|
||||
$ IF FILE .NES. ""
|
||||
$ THEN
|
||||
$ IF WRAP_IN_PROGRESS .EQ. 0
|
||||
$ THEN
|
||||
$ CTR_TXT = F$FAO ("!3UL. ",FILE_CTR)
|
||||
$ ELSE
|
||||
$ CTR_TXT = " "
|
||||
$ ENDIF
|
||||
$ SAY ESC + "[''ROW';''COL'H''BOLD'''CTR_TXT'''NORM'''FILE'"
|
||||
$ ENDIF
|
||||
$ ENDIF
|
||||
$ ELSE
|
||||
$!
|
||||
$RETRY:
|
||||
$!
|
||||
$ PROMPT = ESC + "[''INPUT_ROW';01H ''CEOL'"
|
||||
$ ASK "''PROMPT'" OPT
|
||||
$ IF F$TYPE (OPT) .NES. "INTEGER" .AND. -
|
||||
F$EDIT (OPT,"TRIM,UPCASE") .NES. "B" .AND. -
|
||||
F$EDIT (OPT,"TRIM,UPCASE") .NES. "N"
|
||||
$ THEN
|
||||
$ CALL INVALID_ENTRY
|
||||
$ GOTO RETRY
|
||||
$ ENDIF
|
||||
$ IF F$TYPE (OPT) .EQS. "INTEGER"
|
||||
$ THEN
|
||||
$ IF OPT .GT. 0 .AND. -
|
||||
OPT .LE. FILE_MAX .AND. -
|
||||
OPT .LE. (FILE_CTR - 1) .AND. -
|
||||
OPT .GE. (FILE_CTR - 1 - FILES_PER_PAGE)
|
||||
$ THEN
|
||||
$ SSL_FILE_NAME == FILE_'OPT'
|
||||
$ GOTO EXIT
|
||||
$ ELSE
|
||||
$ CALL INVALID_ENTRY
|
||||
$ GOTO RETRY
|
||||
$ ENDIF
|
||||
$ ENDIF
|
||||
$ IF F$EDIT (OPT,"TRIM,UPCASE") .EQS. "B"
|
||||
$ THEN
|
||||
$ IF PAGE_CTR .GT. 1
|
||||
$ THEN
|
||||
$ ROW = TOP_ROW
|
||||
$ PAGE_CTR = PAGE_CTR - 1
|
||||
$ FILE_CTR = PAGE_'PAGE_CTR'_FILE_CTR
|
||||
$ PAGE_TXT = F$FAO (" Page !UL of !UL ", PAGE_CTR, PAGE_MAX)
|
||||
$ _COL = P2 + (BOX_WIDTH - F$LENGTH (PAGE_TXT)) + 2
|
||||
$ SAY ESC + "[''P3';''_COL'H''BOLD'''PAGE_TXT'''NORM'"
|
||||
$ FILL_BOX 'P2' 'P3' 'P4' 'P5'
|
||||
$ GOTO DISPLAY_LOOP
|
||||
$ ELSE
|
||||
$ CALL INVALID_ENTRY
|
||||
$ GOTO RETRY
|
||||
$ ENDIF
|
||||
$ ENDIF
|
||||
$ IF F$EDIT (OPT,"TRIM,UPCASE") .EQS. "N"
|
||||
$ THEN
|
||||
$ IF PAGE_CTR .LT. PAGE_MAX
|
||||
$ THEN
|
||||
$ PAGE_CTR = PAGE_CTR + 1
|
||||
$ PAGE_'PAGE_CTR'_FILE_CTR = FILE_CTR
|
||||
$ FILE_CTR = PAGE_'PAGE_CTR'_FILE_CTR
|
||||
$ PAGE_TXT = F$FAO (" Page !UL of !UL ", PAGE_CTR, PAGE_MAX)
|
||||
$ _COL = P2 + (BOX_WIDTH - F$LENGTH (PAGE_TXT)) + 2
|
||||
$ SAY ESC + "[''P3';''_COL'H''BOLD'''PAGE_TXT'''NORM'"
|
||||
$ FILL_BOX 'P2' 'P3' 'P4' 'P5'
|
||||
$ ELSE
|
||||
$ CALL INVALID_ENTRY
|
||||
$ GOTO RETRY
|
||||
$ ENDIF
|
||||
$ ENDIF
|
||||
$ FILL_BOX 'P2' 'P3' 'P4' 'P5'
|
||||
$ ROW = TOP_ROW
|
||||
$ GOTO WRAP_LOOP
|
||||
$ ENDIF
|
||||
$ FILE_CTR = FILE_CTR + 1
|
||||
$ ROW = ROW + 1
|
||||
$ GOTO DISPLAY_LOOP
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Display the invalid entry
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$INVALID_ENTRY: SUBROUTINE
|
||||
$!
|
||||
$ SAY ESC + "[''INPUT_ROW';01H", BELL, " Invalid Entry, Try again ...''CEOL'"
|
||||
$ Wait 00:00:01.5
|
||||
$ SAY ESC + "[''INPUT_ROW';01H", CEOL
|
||||
$!
|
||||
$ EXIT
|
||||
$!
|
||||
$ ENDSUBROUTINE
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Exit
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$EXIT:
|
||||
$!
|
||||
$ Verify = F$VERIFY (Verify)
|
||||
$!
|
||||
$ EXIT
|
||||
62
VMS/cert_tool/ssl$rem_env.com
Normal file
62
VMS/cert_tool/ssl$rem_env.com
Normal file
@@ -0,0 +1,62 @@
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! SSL$REM_ENV.COM - Remove the SSL Initialize Environment
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ Verify = F$VERIFY (0)
|
||||
$ Set NoOn
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Description
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$! This procedure deletes the SSL environment logicals & symbols set up by
|
||||
$! SSL$INIT_ENV.COM.
|
||||
$!
|
||||
$! P1 = Mode of the logicals (ie - "/SYSTEM/EXECUTIVE_MODE").
|
||||
$! Note - if P1 is not passed in, P1 will default to PROCESS.
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Initialization
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ IF F$TRNLNM("SSL$ROOT") .EQS. ""
|
||||
$ THEN
|
||||
$ WRITE SYS$OUTPUT " "
|
||||
$ WRITE SYS$OUTPUT " SSL-E-ERROR, SSL has not been started."
|
||||
$ WRITE SYS$OUTPUT " "
|
||||
$ WRITE SYS$OUTPUT " Execute the command procedure, SYS$STARTUP:SSL$STARTUP.COM, and then try this procedure again."
|
||||
$ WRITE SYS$OUTPUT " "
|
||||
$ EXIT
|
||||
$ ENDIF
|
||||
$!
|
||||
$ IF P1 .EQS. ""
|
||||
$ THEN
|
||||
$ P1 = "/PROCESS"
|
||||
$ ENDIF
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Define logicals
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ DEASSIGN 'P1 SSL$CA_CONF
|
||||
$ DEASSIGN 'P1 SSL$CONF
|
||||
$ DEASSIGN 'P1 SSL$COM
|
||||
$ DEASSIGN 'P1 SSL$CRT
|
||||
$ DEASSIGN 'P1 SSL$CSR
|
||||
$ DEASSIGN 'P1 SSL$KEY
|
||||
$ DEASSIGN 'P1 SSL$DB
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Define foreign symbols
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ DELETE/SYMBOL/GLOBAL OPENSSL
|
||||
$ DELETE/SYMBOL/GLOBAL HOSTADDR
|
||||
$ DELETE/SYMBOL/GLOBAL HOSTNAME
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Exit
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ EXIT
|
||||
769
VMS/cert_tool/ssl$rqst_cert.com
Normal file
769
VMS/cert_tool/ssl$rqst_cert.com
Normal file
@@ -0,0 +1,769 @@
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! SSL$RQST_CERT.COM - SSL Certificate Request procedure
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ Verify = F$VERIFY (0)
|
||||
$ Set NoOn
|
||||
$ Set NoControl=Y
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Description
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$! This procedure prompts the user through creating a Certificate Request.
|
||||
$!
|
||||
$! There are no parameters used.
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Define symbols
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ DELETE := DELETE
|
||||
$ SAY := WRITE SYS$OUTPUT
|
||||
$ ASK := READ SYS$COMMAND /END_OF_FILE=EXIT /PROMPT=
|
||||
$ PID = F$GETJPI ("","PID")
|
||||
$ TT_NOECHO = F$GETDVI ("TT:","TT_NOECHO")
|
||||
$ On Control_Y THEN GOTO EXIT
|
||||
$ Set Control=Y
|
||||
$!
|
||||
$ TT_ROWS = F$GETDVI ("TT:","TT_PAGE")
|
||||
$ TT_COLS = F$GETDVI ("TT:","DEVBUFSIZ")
|
||||
$!
|
||||
$ GET_USER_DATA := CALL GET_USER_DATA
|
||||
$ SET_USER_DATA := CALL SET_USER_DATA
|
||||
$ DEL_USER_DATA := CALL DEL_USER_DATA
|
||||
$ INIT_TERM := @SSL$COM:SSL$INIT_TERM
|
||||
$ SHOW_FILE := @SSL$COM:SSL$SHOW_FILE
|
||||
$ SSL_CONF_FILE = F$TRNLNM ("SSL$CONF")
|
||||
$ GET_CONF_DATA := @SSL$COM:SSL$CONF_UTIL 'SSL_CONF_FILE' GET
|
||||
$ SET_CONF_DATA := @SSL$COM:SSL$CONF_UTIL 'SSL_CONF_FILE' SET
|
||||
$!
|
||||
$ ESC[0,8] = 27 ! Set the Escape Character
|
||||
$ BELL[0,8] = 7 ! Ring the terminal Bell
|
||||
$ RED = 1 ! Color - Red
|
||||
$ FGD = 30 ! Foreground
|
||||
$ BGD = 0 ! Background
|
||||
$ CSCR = ESC + "[2J" ! Clear the Screen
|
||||
$ CEOS = ESC + "[0J" ! Clear to the End of the Screen
|
||||
$ CEOL = ESC + "[0K" ! Clear to the End of the Line
|
||||
$ NORM = ESC + "[0m" ! Turn Attributes off
|
||||
$ BLNK = ESC + "[5m" ! Turn on BLINK Attribute
|
||||
$ WIDE = ESC + "#6" ! Turn on WIDE Attribute
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Run the SSL setup if it hasn't been run yet
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ IF F$TRNLNM ("SSL$ROOT") .EQS. ""
|
||||
$ THEN
|
||||
$ IF F$SEARCH ("SSL$COM:SSL$INIT_ENV.COM") .NES. ""
|
||||
$ THEN
|
||||
$ @SSL$COM:SSL$INIT_ENV.COM
|
||||
$ ELSE
|
||||
$ SAY BELL, "Unable to locate SSL$COM:SSL$INIT_ENV.COM ..."
|
||||
$ GOTO EXIT
|
||||
$ ENDIF
|
||||
$ ENDIF
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Display the Page Header
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ INIT_TERM
|
||||
$ BCOLOR = BGD
|
||||
$ FCOLOR = FGD + RED
|
||||
$ COLOR = ESC + "[''BCOLOR';''FCOLOR'm"
|
||||
$!
|
||||
$ TEXT = "SSL Certificate Tool"
|
||||
$ COL = (TT_COLS - (F$LENGTH (TEXT) * 2)) / 4
|
||||
$!
|
||||
$ SAY ESC + "[01;01H", CSCR
|
||||
$ SAY ESC + "[02;''COL'H", COLOR, WIDE, TEXT, NORM
|
||||
$!
|
||||
$ TEXT = "Create Certificate Request"
|
||||
$ COL = (TT_COLS - F$LENGTH (TEXT)) / 2
|
||||
$!
|
||||
$ SAY ESC + "[04;01H"
|
||||
$ SAY ESC + "[04;''COL'H", COLOR, TEXT, NORM
|
||||
$!
|
||||
$ ROW = 6
|
||||
$ COL = 2
|
||||
$ TOP_ROW = ROW
|
||||
$ MSG_ROW = TT_ROWS - 1
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Initialize the Request Data
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ IF F$SEARCH ("''SSL_CONF_FILE'") .NES. ""
|
||||
$ THEN
|
||||
$ SAY ESC + "[''MSG_ROW';01H", BLNK, " Reading Configuration ...", NORM
|
||||
$ ELSE
|
||||
$ SAY ESC + "[''MSG_ROW';01H", BLNK, " Initializing Configuration ...", NORM
|
||||
$ ENDIF
|
||||
$!
|
||||
$ _request_name = "req"
|
||||
$!
|
||||
$ _distinguished_name = "REQ_distinguished_name"
|
||||
$ _distinguished_name_upd = "Y"
|
||||
$!
|
||||
$ _default_bits = "1024"
|
||||
$ _default_bits_upd = "Y"
|
||||
$!
|
||||
$ _default_keyfile = "SSL$KEY:SERVER.KEY"
|
||||
$ _default_keyfile_upd = "Y"
|
||||
$!
|
||||
$ _default_csrfile = "SSL$CSR:SERVER.CSR"
|
||||
$ _default_csrfile_upd = "Y"
|
||||
$!
|
||||
$ _countryName_prompt = "Country Name ?"
|
||||
$ _countryName_min = "2"
|
||||
$ _countryName_max = "2"
|
||||
$ _countryName_default = "US"
|
||||
$ _countryName_upd = "Y"
|
||||
$ _countryName_cnt = 4
|
||||
$!
|
||||
$ _stateOrProvinceName_prompt = "State or Province Name ?"
|
||||
$ _stateOrProvinceName_default = ""
|
||||
$ _stateOrProvinceName_upd = "Y"
|
||||
$ _stateOrProvinceName_cnt = 2
|
||||
$!
|
||||
$ _localityName_prompt = "City Name ?"
|
||||
$ _localityName_default = ""
|
||||
$ _localityName_upd = "Y"
|
||||
$ _localityName_cnt = 2
|
||||
$!
|
||||
$ _0organizationName_prompt = "Organization Name ?"
|
||||
$ _0organizationName_default = ""
|
||||
$ _0organizationName_upd = "Y"
|
||||
$ _0organizationName_cnt = 2
|
||||
$!
|
||||
$ _organizationalUnitName_prompt = "Organization Unit Name ?"
|
||||
$ _organizationalUnitName_default = ""
|
||||
$ _organizationalUnitName_upd = "Y"
|
||||
$ _organizationalUnitName_cnt = 2
|
||||
$!
|
||||
$ _commonName_prompt = "Common Name ?"
|
||||
$ _commonName_max = "64"
|
||||
$ HOSTNAME -s _commonName_default
|
||||
$ _commonName_upd = "Y"
|
||||
$ _commonName_cnt = 3
|
||||
$!
|
||||
$ _emailAddress_prompt = "Email Address ?"
|
||||
$ _emailAddress_max = "40"
|
||||
$ _emailAddress_default = "webmaster@''_commonName_default'"
|
||||
$ _emailAddress_upd = "Y"
|
||||
$ _emailAddress_cnt = 3
|
||||
$!
|
||||
$ IF F$SEARCH ("''SSL_CONF_FILE'") .NES. ""
|
||||
$ THEN
|
||||
$ GET_CONF_DATA "[''_request_name']#distinguished_name"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _distinguished_name = SSL_CONF_DATA
|
||||
$ _distinguished_name_upd = "N"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ GET_CONF_DATA "[''_request_name']#default_bits"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _default_bits = SSL_CONF_DATA
|
||||
$ _default_bits_upd = "N"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ GET_CONF_DATA "[''_request_name']#default_keyfile"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _default_keyfile = F$PARSE (SSL_CONF_DATA,"SSL$ROOT:",,"DEVICE") + -
|
||||
F$PARSE (SSL_CONF_DATA,"[KEY]",,"DIRECTORY") + -
|
||||
F$PARSE (SSL_CONF_DATA,"SERVER",,"NAME") + -
|
||||
F$PARSE (SSL_CONF_DATA,".KEY",,"TYPE")
|
||||
$ _default_keyfile_upd = "N"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ GET_CONF_DATA "[''_request_name']#default_csrfile"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _default_csrfile = F$PARSE (SSL_CONF_DATA,"SSL$ROOT:",,"DEVICE") + -
|
||||
F$PARSE (SSL_CONF_DATA,"[CSR]",,"DIRECTORY") + -
|
||||
F$PARSE (SSL_CONF_DATA,"SERVER",,"NAME") + -
|
||||
F$PARSE (SSL_CONF_DATA,".CSR",,"TYPE")
|
||||
$ _default_csrfile_upd = "N"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ CTR = 0
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#countryName"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _countryName_prompt = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#countryName_min"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _countryName_min = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#countryName_max"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _countryName_max = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#countryName_default"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _countryName_default = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ IF _countryName_cnt .EQ. CTR THEN _countryName_upd = "N"
|
||||
$!
|
||||
$ CTR = 0
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#stateOrProvinceName"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _stateOrProvinceName_prompt = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#stateOrProvinceName_default"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _stateOrProvinceName_default = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ IF _stateOrProvinceName_cnt .EQ. CTR THEN _stateOrProvinceName_upd = "N"
|
||||
$!
|
||||
$ CTR = 0
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#localityName"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _localityName_prompt = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#localityName_default"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _localityName_default = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ IF _localityName_cnt .EQ. CTR THEN _localityName_upd = "N"
|
||||
$!
|
||||
$ CTR = 0
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#0.organizationName"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _0organizationName_prompt = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#0.organizationName_default"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _0organizationName_default = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ IF _0organizationName_cnt .EQ. CTR THEN _0organizationName_upd = "N"
|
||||
$!
|
||||
$ CTR = 0
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#organizationalUnitName"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _organizationalUnitName_prompt = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#organizationalUnitName_default"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _organizationalUnitName_default = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ IF _organizationalUnitName_cnt .EQ. CTR THEN _organizationalUnitName_upd = "N"
|
||||
$!
|
||||
$ CTR = 0
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#commonName"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _commonName_prompt = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#commonName_max"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _commonName_max = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#commonName_default"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _commonName_default = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ IF _commonName_cnt .EQ. CTR THEN _commonName_upd = "N"
|
||||
$!
|
||||
$ CTR = 0
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#emailAddress"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _emailAddress_prompt = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#emailAddress_max"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _emailAddress_max = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#emailAddress_default"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _emailAddress_default = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ IF _emailAddress_cnt .EQ. CTR THEN _emailAddress_upd = "N"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ SET_USER_DATA "[]#encrypt_key#-#N#Encrypt Private Key ?#S##1##Y#N"
|
||||
$ SET_USER_DATA "[]#pem_pass_phrase#-##PEM Pass Phrase ?#P#1###Y#Y"
|
||||
$ SET_USER_DATA "[''_request_name']#default_bits#D#''_default_bits'#Encryption Bits ?#I###''_default_bits_upd'#Y#N"
|
||||
$ SET_USER_DATA "[''_request_name']#default_keyfile#D#''_default_keyfile'#Certificate Key File ?#F###''_default_keyfile_upd'#Y#N"
|
||||
$ SET_USER_DATA "[''_request_name']#default_csrfile#D#''_default_csrfile'#Certificate Request File ?#F###''_default_csrfile_upd'#Y#N"
|
||||
$ SET_USER_DATA "[''_request_name']#distinguished_name#D#''_distinguished_name'##S###''_distinguished_name_upd'#N#N"
|
||||
$ SET_USER_DATA "[''_distinguished_name']#countryName#P#''_countryName_default'#''_countryName_prompt'#S#''_countryName_min'#''_countryName_max'#''_countryName_upd'#Y#N"
|
||||
$ SET_USER_DATA "[''_distinguished_name']#stateOrProvinceName#P#''_stateOrProvinceName_default'#''_stateOrProvinceName_prompt'#S###''_stateOrProvinceName_upd'#Y#N"
|
||||
$ SET_USER_DATA "[''_distinguished_name']#localityName#P#''_localityName_default'#''_localityName_prompt'#S###''_localityName_upd'#Y#N"
|
||||
$ SET_USER_DATA "[''_distinguished_name']#0.organizationName#P#''_0organizationName_default'#''_0organizationName_prompt'#S###''_0organizationName_upd'#Y#N"
|
||||
$ SET_USER_DATA "[''_distinguished_name']#organizationalUnitName#P#''_organizationalUnitName_default'#''_organizationalUnitName_prompt'#S###''_organizationUnitName_upd'#Y#N"
|
||||
$ SET_USER_DATA "[''_distinguished_name']#commonName#P#''_commonName_default'#''_commonName_prompt'#S##''_commonName_max'#''_commonName_upd'#Y#N"
|
||||
$ SET_USER_DATA "[''_distinguished_name']#emailAddress#P#''_emailAddress_default'#''_emailAddress_prompt'#S##''_emailAddress_max'#''_emailAddress_upd'#Y#N"
|
||||
$ SET_USER_DATA "[]#display_certificate#-#N#Display the Certificate ?#S##1##Y#N"
|
||||
$!
|
||||
$ SAY ESC + "[''MSG_ROW';01H", CEOS
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Confirm/Update the SSL Configuration Data
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ CTR = 1
|
||||
$!
|
||||
$PROMPT_LOOP:
|
||||
$!
|
||||
$ IF CTR .LE. SSL_USER_DATA_MAX
|
||||
$ THEN
|
||||
$ KEY = F$ELEMENT (0,"#",SSL_USER_DATA_'CTR') ! Key Name
|
||||
$ ITM = F$ELEMENT (1,"#",SSL_USER_DATA_'CTR') ! Item Name
|
||||
$ VAL = F$ELEMENT (2,"#",SSL_USER_DATA_'CTR') ! Item Value Contains Default or Prompt
|
||||
$ DEF = F$ELEMENT (3,"#",SSL_USER_DATA_'CTR') ! Default Value
|
||||
$ PRM = F$ELEMENT (4,"#",SSL_USER_DATA_'CTR') ! Prompt Value
|
||||
$ TYP = F$ELEMENT (5,"#",SSL_USER_DATA_'CTR') ! Value Type
|
||||
$ MIN = F$ELEMENT (6,"#",SSL_USER_DATA_'CTR') ! Value Minimum Length
|
||||
$ MAX = F$ELEMENT (7,"#",SSL_USER_DATA_'CTR') ! Value Maximum Length
|
||||
$ UPD = F$ELEMENT (8,"#",SSL_USER_DATA_'CTR') ! Entry Updated ?
|
||||
$ REQ = F$ELEMENT (9,"#",SSL_USER_DATA_'CTR') ! Entry Required for Input ?
|
||||
$ CFM = F$ELEMENT (10,"#",SSL_USER_DATA_'CTR')! Confirm Input ?
|
||||
$!
|
||||
$! The PEM Pass Phrase prompt is dependant on the answer to encrypt the private key
|
||||
$!
|
||||
$ IF KEY .EQS. "[]" .AND. ITM .EQS. "pem_pass_phrase"
|
||||
$ THEN
|
||||
$ GET_USER_DATA "[]#encrypt_key"
|
||||
$ _encrypt_key = SSL_USER_DATA
|
||||
$ IF F$EDIT (_encrypt_key,"UPCASE") .NES. "Y"
|
||||
$ THEN
|
||||
$ CTR = CTR + 1
|
||||
$ GOTO PROMPT_LOOP
|
||||
$ ENDIF
|
||||
$ ENDIF
|
||||
$!
|
||||
$ CONFIRMED = 0
|
||||
$ IF REQ .EQS. "N"
|
||||
$ THEN
|
||||
$ CTR = CTR + 1
|
||||
$ GOTO PROMPT_LOOP
|
||||
$ ENDIF
|
||||
$ IF ROW .GT. MSG_ROW - 2
|
||||
$ THEN
|
||||
$ SAY ESC + "[''TOP_ROW';01H", CEOS
|
||||
$ ROW = TOP_ROW
|
||||
$ ENDIF
|
||||
$!
|
||||
$CONFIRM_LOOP:
|
||||
$!
|
||||
$ IF PRM .EQS. ""
|
||||
$ THEN
|
||||
$ PROMPT = ESC + "[''ROW';''COL'H''ITM' ? [''DEF'] ''CEOL'"
|
||||
$ ELSE
|
||||
$ PROMPT = ESC + "[''ROW';''COL'H''PRM' [''DEF'] ''CEOL'"
|
||||
$ ENDIF
|
||||
$ IF TYP .EQS. "P" THEN SET TERMINAL /NOECHO
|
||||
$ ASK "''PROMPT'" ANS /END_OF_FILE=EXIT
|
||||
$ IF TYP .EQS. "P" THEN SET TERMINAL /ECHO
|
||||
$ ANS = F$EDIT (ANS,"TRIM")
|
||||
$ IF ANS .EQS. "" THEN ANS = DEF
|
||||
$ IF TYP .EQS. "F"
|
||||
$ THEN
|
||||
$ ANS = F$PARSE ("''ANS'","''DEF'",,,"SYNTAX_ONLY")
|
||||
$ ENDIF
|
||||
$ IF TYP .EQS. "I" .AND. F$TYPE (ANS) .NES. "INTEGER"
|
||||
$ THEN
|
||||
$ CALL INVALID_ENTRY
|
||||
$ SAY ESC + "[''ROW';01H", CEOS
|
||||
$ GOTO PROMPT_LOOP
|
||||
$ ENDIF
|
||||
$ IF (TYP .EQS. "S" .OR. TYP .EQS. "P") .AND. -
|
||||
((MIN .NES. "" .AND. F$LENGTH (ANS) .LT. F$INTEGER(MIN)) .OR. -
|
||||
(MAX .NES. "" .AND. F$LENGTH (ANS) .GT. F$INTEGER(MAX)))
|
||||
$ THEN
|
||||
$ CALL INVALID_ENTRY
|
||||
$ SAY ESC + "[''ROW';01H", CEOS
|
||||
$ IF TYP .EQS. "S" THEN GOTO PROMPT_LOOP
|
||||
$ IF TYP .EQS. "P" THEN GOTO CONFIRM_LOOP
|
||||
$ ENDIF
|
||||
$ ROW = ROW + 1
|
||||
$ IF CFM .EQS. "Y"
|
||||
$ THEN
|
||||
$ IF CONFIRMED .EQ. 0
|
||||
$ THEN
|
||||
$ CONFIRMED = 1
|
||||
$ CONFIRMED_ANS = ANS
|
||||
$ PRM = "Confirm ''PRM'"
|
||||
$ GOTO CONFIRM_LOOP
|
||||
$ ELSE
|
||||
$ IF ANS .NES. CONFIRMED_ANS
|
||||
$ THEN
|
||||
$ CALL INVALID_ENTRY
|
||||
$ ROW = ROW - 2
|
||||
$ SAY ESC + "[''ROW';01H", CEOS
|
||||
$ GOTO PROMPT_LOOP
|
||||
$ ENDIF
|
||||
$ ENDIF
|
||||
$ ENDIF
|
||||
$ IF ANS .NES. DEF THEN SSL_USER_DATA_'CTR' = "''KEY'#''ITM'#''VAL'#''ANS'#''PRM'#''TYP'#''MIN'#''MAX'#Y#''REQ'#''CFM'"
|
||||
$ CTR = CTR + 1
|
||||
$ GOTO PROMPT_LOOP
|
||||
$ ENDIF
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Save the SSL Configuration Data
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ CTR = 1
|
||||
$ SAY ESC + "[''MSG_ROW';01H", BLNK, " Saving Configuration ...", NORM
|
||||
$!
|
||||
$SAVE_CONF_LOOP:
|
||||
$!
|
||||
$ IF CTR .LE. SSL_USER_DATA_MAX
|
||||
$ THEN
|
||||
$ KEY = F$ELEMENT (0,"#",SSL_USER_DATA_'CTR') ! Key Name
|
||||
$ ITM = F$ELEMENT (1,"#",SSL_USER_DATA_'CTR') ! Item Name
|
||||
$ VAL = F$ELEMENT (2,"#",SSL_USER_DATA_'CTR') ! Item Value Contains Default or Prompt
|
||||
$ DEF = F$ELEMENT (3,"#",SSL_USER_DATA_'CTR') ! Default Value
|
||||
$ PRM = F$ELEMENT (4,"#",SSL_USER_DATA_'CTR') ! Prompt Value
|
||||
$ TYP = F$ELEMENT (5,"#",SSL_USER_DATA_'CTR') ! Value Type
|
||||
$ MIN = F$ELEMENT (6,"#",SSL_USER_DATA_'CTR') ! Value Minimum Length
|
||||
$ MAX = F$ELEMENT (7,"#",SSL_USER_DATA_'CTR') ! Value Maximum Length
|
||||
$ UPD = F$ELEMENT (8,"#",SSL_USER_DATA_'CTR') ! Entry Updated ?
|
||||
$ REQ = F$ELEMENT (9,"#",SSL_USER_DATA_'CTR') ! Entry Required for Input ?
|
||||
$ CFM = F$ELEMENT (10,"#",SSL_USER_DATA_'CTR')! Confirm Input ?
|
||||
$ IF UPD .NES. "Y" .OR. VAL .EQS. "-"
|
||||
$ THEN
|
||||
$ CTR = CTR + 1
|
||||
$ GOTO SAVE_CONF_LOOP
|
||||
$ ENDIF
|
||||
$ IF VAL .EQS. "D"
|
||||
$ THEN
|
||||
$ SET_CONF_DATA "''KEY'#''ITM'" "''DEF'"
|
||||
$ ELSE
|
||||
$ SET_CONF_DATA "''KEY'#''ITM'" "''PRM'"
|
||||
$ SET_CONF_DATA "''KEY'#''ITM'_default" "''DEF'"
|
||||
$ ENDIF
|
||||
$ IF MIN .NES. "" THEN SET_CONF_DATA "''KEY'#''ITM'_min" "''MIN'"
|
||||
$ IF MAX .NES. "" THEN SET_CONF_DATA "''KEY'#''ITM'_max" "''MAX'"
|
||||
$ CTR = CTR + 1
|
||||
$ GOTO SAVE_CONF_LOOP
|
||||
$ ENDIF
|
||||
$!
|
||||
$ PURGE /NOLOG /NOCONFIRM 'SSL_CONF_FILE'
|
||||
$ RENAME 'SSL_CONF_FILE'; ;1
|
||||
$!
|
||||
$ SAY ESC + "[''MSG_ROW';01H", CEOS
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Create the Server Certificiate
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ SAY ESC + "[''MSG_ROW';01H", BLNK, " Creating Certificate Request ...", NORM
|
||||
$!
|
||||
$ X1 = 2
|
||||
$ Y1 = TOP_ROW
|
||||
$ X2 = TT_COLS - 2
|
||||
$ Y2 = MSG_ROW - 1
|
||||
$!
|
||||
$ GET_USER_DATA "[]#encrypt_key"
|
||||
$ _encrypt_key = SSL_USER_DATA
|
||||
$ IF F$EDIT (_encrypt_key,"UPCASE") .EQS. "Y"
|
||||
$ THEN
|
||||
$ GET_USER_DATA "[]#pem_pass_phrase"
|
||||
$ _pem_pass_phrase = SSL_USER_DATA
|
||||
$ ENDIF
|
||||
$ GET_USER_DATA "[req]#default_bits"
|
||||
$ _default_bits = SSL_USER_DATA
|
||||
$ GET_USER_DATA "[req]#default_keyfile"
|
||||
$ _default_keyfile = SSL_USER_DATA
|
||||
$ GET_USER_DATA "[req]#default_csrfile"
|
||||
$ _default_csrfile = SSL_USER_DATA
|
||||
$ GET_USER_DATA "[]#display_certificate"
|
||||
$ _display_certificate = SSL_USER_DATA
|
||||
$!
|
||||
$!
|
||||
$ DEFINE /USER /NOLOG SYS$ERROR NL:
|
||||
$ DEFINE /USER /NOLOG SYS$OUTPUT NL:
|
||||
$ SHOW SYSTEM /FULL /OUT=SYS$LOGIN:SSL_GENRSA_'PID'.RND
|
||||
$!
|
||||
$ OPEN /WRITE OFILE SYS$LOGIN:SSL_GENRSA_'PID'.COM
|
||||
$ WRITE OFILE "$ DEFINE /USER /NOLOG RANDFILE SYS$LOGIN:SSL_GENRSA_''PID'.RND"
|
||||
$ WRITE OFILE "$ DEFINE /USER /NOLOG SYS$ERROR SYS$LOGIN:SSL_GENRSA_''PID'.LOG"
|
||||
$ WRITE OFILE "$ DEFINE /USER /NOLOG SYS$OUTPUT SYS$LOGIN:SSL_GENRSA_''PID'.LOG"
|
||||
$ WRITE OFILE "$ DEFINE /USER /NOLOG SYS$COMMAND SYS$INPUT"
|
||||
$ IF _encrypt_key .EQS. "Y"
|
||||
$ THEN
|
||||
$ WRITE OFILE "$ OPENSSL genrsa -des3 -out ''_default_keyfile' ''_default_bits'"
|
||||
$ WRITE OFILE "''_pem_pass_phrase'"
|
||||
$ WRITE OFILE "''_pem_pass_phrase'"
|
||||
$ ELSE
|
||||
$ WRITE OFILE "$ OPENSSL genrsa -out ''_default_keyfile' ''_default_bits'"
|
||||
$ ENDIF
|
||||
$ CLOSE OFILE
|
||||
$!
|
||||
$ @SYS$LOGIN:SSL_GENRSA_'PID'.COM
|
||||
$!
|
||||
$ DELETE/NOLOG/NOCONFIRM SYS$LOGIN:SSL_GENRSA_'PID'.RND;*
|
||||
$ DELETE/NOLOG/NOCONFIRM SYS$LOGIN:SSL_GENRSA_'PID'.COM;*
|
||||
$!
|
||||
$ DEFINE /USER /NOLOG SYS$ERROR NL:
|
||||
$ DEFINE /USER /NOLOG SYS$OUTPUT NL:
|
||||
$ SEARCH SYS$LOGIN:SSL_GENRSA_'PID'.LOG /OUT=SYS$LOGIN:SSL_GENRSA_'PID'.ERR ":error:"
|
||||
$ IF F$SEARCH ("SYS$LOGIN:SSL_GENRSA_''PID'.ERR") .NES. ""
|
||||
$ THEN
|
||||
$ IF F$FILE_ATTRIBUTE ("SYS$LOGIN:SSL_GENRSA_''PID'.ERR","ALQ") .NE. 0
|
||||
$ THEN
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_GENRSA_'PID'.ERR;*
|
||||
$ SAY ESC + "[''MSG_ROW';01H''BELL'''CEOS'"
|
||||
$ SHOW_FILE "SYS$LOGIN:SSL_GENRSA_''PID'.LOG" 'X1' 'Y1' 'X2' 'Y2' "< ERROR >"
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_GENRSA_'PID'.LOG;*
|
||||
$ GOTO EXIT
|
||||
$ ENDIF
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_GENRSA_'PID'.ERR;*
|
||||
$ ENDIF
|
||||
$!
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_GENRSA_'PID'.LOG;*
|
||||
$!
|
||||
$!
|
||||
$ DEFINE /USER /NOLOG SYS$ERROR NL:
|
||||
$ DEFINE /USER /NOLOG SYS$OUTPUT NL:
|
||||
$ SHOW SYSTEM /FULL /OUT=SYS$LOGIN:SSL_REQ_'PID'.RND
|
||||
$!
|
||||
$ OPEN /WRITE OFILE SYS$LOGIN:SSL_REQ_'PID'.COM
|
||||
$ WRITE OFILE "$ DEFINE /USER /NOLOG RANDFILE SYS$LOGIN:SSL_REQ_''PID'.RND"
|
||||
$ WRITE OFILE "$ DEFINE /USER /NOLOG SYS$ERROR SYS$LOGIN:SSL_REQ_''PID'.LOG"
|
||||
$ WRITE OFILE "$ DEFINE /USER /NOLOG SYS$OUTPUT SYS$LOGIN:SSL_REQ_''PID'.LOG"
|
||||
$ WRITE OFILE "$ DEFINE /USER /NOLOG SYS$COMMAND SYS$INPUT"
|
||||
$ IF _encrypt_key .EQS. "Y"
|
||||
$ THEN
|
||||
$ WRITE OFILE "$ OPENSSL req -new -config ''SSL_CONF_FILE' -key ''_default_keyfile' -out ''_default_csrfile'"
|
||||
$ WRITE OFILE "''_pem_pass_phrase'"
|
||||
$ WRITE OFILE "''_pem_pass_phrase'"
|
||||
$ ELSE
|
||||
$ WRITE OFILE "$ OPENSSL req -new -nodes -config ''SSL_CONF_FILE' -keyout ''_default_keyfile' -out ''_default_csrfile'"
|
||||
$ ENDIF
|
||||
$ WRITE OFILE ""
|
||||
$ WRITE OFILE ""
|
||||
$ WRITE OFILE ""
|
||||
$ WRITE OFILE ""
|
||||
$ WRITE OFILE ""
|
||||
$ WRITE OFILE ""
|
||||
$ WRITE OFILE ""
|
||||
$ CLOSE OFILE
|
||||
$!
|
||||
$ @SYS$LOGIN:SSL_REQ_'PID'.COM
|
||||
$!
|
||||
$ DELETE/NOLOG/NOCONFIRM SYS$LOGIN:SSL_REQ_'PID'.COM;*
|
||||
$!
|
||||
$ DEFINE /USER /NOLOG SYS$ERROR NL:
|
||||
$ DEFINE /USER /NOLOG SYS$OUTPUT NL:
|
||||
$ SEARCH SYS$LOGIN:SSL_REQ_'PID'.LOG /OUT=SYS$LOGIN:SSL_REQ_'PID'.ERR ":error:"
|
||||
$ IF F$SEARCH ("SYS$LOGIN:SSL_REQ_''PID'.ERR") .NES. ""
|
||||
$ THEN
|
||||
$ IF F$FILE_ATTRIBUTE ("SYS$LOGIN:SSL_REQ_''PID'.ERR","ALQ") .NE. 0
|
||||
$ THEN
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_REQ_'PID'.ERR;*
|
||||
$ SAY ESC + "[''MSG_ROW';01H''BELL'''CEOS'"
|
||||
$ SHOW_FILE "SYS$LOGIN:SSL_REQ_''PID'.LOG" 'X1' 'Y1' 'X2' 'Y2' "< ERROR >"
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_REQ_'PID'.LOG;*
|
||||
$ GOTO EXIT
|
||||
$ ENDIF
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_REQ_'PID'.ERR;*
|
||||
$ ENDIF
|
||||
$!
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_REQ_'PID'.LOG;*
|
||||
$!
|
||||
$ IF F$EDIT (_display_certificate,"TRIM,UPCASE") .EQS. "Y"
|
||||
$ THEN
|
||||
$ SAY ESC + "[''MSG_ROW';01H", BLNK, " Generating Output ...", NORM, CEOL
|
||||
$!
|
||||
$ OPEN /WRITE OFILE SYS$LOGIN:SSL_REQ_'PID'.COM
|
||||
$ WRITE OFILE "$ DEFINE /USER /NOLOG SYS$ERROR SYS$LOGIN:SSL_REQ_''PID'.LOG"
|
||||
$ WRITE OFILE "$ DEFINE /USER /NOLOG SYS$OUTPUT SYS$LOGIN:SSL_REQ_''PID'.LOG"
|
||||
$ WRITE OFILE "$ DEFINE /USER /NOLOG SYS$COMMAND SYS$INPUT"
|
||||
$ WRITE OFILE "$ OPENSSL req -noout -text -config ''SSL_CONF_FILE' -in ''_default_csrfile'"
|
||||
$ CLOSE OFILE
|
||||
$!
|
||||
$ @SYS$LOGIN:SSL_REQ_'PID'.COM
|
||||
$!
|
||||
$ DELETE/NOLOG/NOCONFIRM SYS$LOGIN:SSL_REQ_'PID'.COM;*
|
||||
$!
|
||||
$ DEFINE /USER /NOLOG SYS$ERROR NL:
|
||||
$ DEFINE /USER /NOLOG SYS$OUTPUT NL:
|
||||
$ SEARCH SYS$LOGIN:SSL_REQ_'PID'.LOG /OUT=SYS$LOGIN:SSL_REQ_'PID'.ERR ":error:"
|
||||
$ IF F$SEARCH ("SYS$LOGIN:SSL_REQ_''PID'.ERR") .NES. ""
|
||||
$ THEN
|
||||
$ IF F$FILE_ATTRIBUTE ("SYS$LOGIN:SSL_REQ_''PID'.ERR","ALQ") .NE. 0
|
||||
$ THEN
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_REQ_'PID'.ERR;*
|
||||
$ SAY ESC + "[''MSG_ROW';01H''BELL'''CEOS'"
|
||||
$ SHOW_FILE "SYS$LOGIN:SSL_REQ_''PID'.LOG" 'X1' 'Y1' 'X2' 'Y2' "< ERROR >"
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_REQ_'PID'.LOG;*
|
||||
$ GOTO EXIT
|
||||
$ ENDIF
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_REQ_'PID'.ERR;*
|
||||
$ ENDIF
|
||||
$!
|
||||
$ SAY ESC + "[''MSG_ROW';01H''CEOS'"
|
||||
$ SHOW_FILE "SYS$LOGIN:SSL_REQ_''PID'.LOG" 'X1' 'Y1' 'X2' 'Y2' "< ''_default_csrfile' >"
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_REQ_'PID'.LOG;*
|
||||
$ GOTO EXIT
|
||||
$ ENDIF
|
||||
$!
|
||||
$ TEXT = "Press return to continue"
|
||||
$ COL = (TT_COLS - F$LENGTH (TEXT)) / 2
|
||||
$!
|
||||
$ SAY ESC + "[''MSG_ROW';01H", CEOS
|
||||
$ PROMPT = ESC + "[''MSG_ROW';''COL'H''TEXT'"
|
||||
$ ASK "''PROMPT'" OPT
|
||||
$!
|
||||
$GOTO EXIT
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Set the User Data
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$SET_USER_DATA: SUBROUTINE
|
||||
$!
|
||||
$ IF F$TYPE (SSL_USER_DATA_MAX) .EQS. ""
|
||||
$ THEN
|
||||
$ SSL_USER_DATA_MAX == 1
|
||||
$ ELSE
|
||||
$ SSL_USER_DATA_MAX == SSL_USER_DATA_MAX + 1
|
||||
$ ENDIF
|
||||
$!
|
||||
$ SSL_USER_DATA_'SSL_USER_DATA_MAX' == "''P1'"
|
||||
$!
|
||||
$ EXIT
|
||||
$!
|
||||
$ ENDSUBROUTINE
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Get the User Data
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$GET_USER_DATA: SUBROUTINE
|
||||
$!
|
||||
$ CTR = 1
|
||||
$ USER_KEY = F$ELEMENT (0,"#",P1)
|
||||
$ USER_ITM = F$ELEMENT (1,"#",P1)
|
||||
$!
|
||||
$GET_USER_DATA_LOOP:
|
||||
$!
|
||||
$ IF CTR .LE. SSL_USER_DATA_MAX
|
||||
$ THEN
|
||||
$ KEY = F$ELEMENT (0,"#",SSL_USER_DATA_'CTR') ! Key Name
|
||||
$ ITM = F$ELEMENT (1,"#",SSL_USER_DATA_'CTR') ! Item Name
|
||||
$ VAL = F$ELEMENT (2,"#",SSL_USER_DATA_'CTR') ! Item Value Contains Default or Prompt
|
||||
$ DEF = F$ELEMENT (3,"#",SSL_USER_DATA_'CTR') ! Default Value
|
||||
$ PRM = F$ELEMENT (4,"#",SSL_USER_DATA_'CTR') ! Prompt Value
|
||||
$ IF USER_KEY .NES. KEY .OR. USER_ITM .NES. ITM
|
||||
$ THEN
|
||||
$ CTR = CTR + 1
|
||||
$ GOTO GET_USER_DATA_LOOP
|
||||
$ ENDIF
|
||||
$ IF VAL .EQS. "-" THEN SSL_USER_DATA == "''DEF'"
|
||||
$ IF VAL .EQS. "D" THEN SSL_USER_DATA == "''DEF'"
|
||||
$ IF VAL .EQS. "P" THEN SSL_USER_DATA == "''PRM'"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ EXIT
|
||||
$!
|
||||
$ ENDSUBROUTINE
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Delete the User Data
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$DEL_USER_DATA: SUBROUTINE
|
||||
$!
|
||||
$ IF F$TYPE (SSL_USER_DATA_MAX) .EQS. "" THEN GOTO DEL_USER_DATA_END
|
||||
$!
|
||||
$DEL_USER_DATA_LOOP:
|
||||
$!
|
||||
$ IF F$TYPE (SSL_USER_DATA_'SSL_USER_DATA_MAX') .NES. ""
|
||||
$ THEN
|
||||
$ DELETE /SYMBOL /GLOBAL SSL_USER_DATA_'SSL_USER_DATA_MAX'
|
||||
$ SSL_USER_DATA_MAX == SSL_USER_DATA_MAX - 1
|
||||
$ GOTO DEL_USER_DATA_LOOP
|
||||
$ ENDIF
|
||||
$!
|
||||
$ DELETE /SYMBOL /GLOBAL SSL_USER_DATA_MAX
|
||||
$!
|
||||
$DEL_USER_DATA_END:
|
||||
$!
|
||||
$ IF F$TYPE (SSL_USER_DATA) .NES. "" THEN DELETE /SYMBOL /GLOBAL SSL_USER_DATA
|
||||
$!
|
||||
$ EXIT
|
||||
$!
|
||||
$ ENDSUBROUTINE
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Display the invalid entry
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$INVALID_ENTRY: SUBROUTINE
|
||||
$!
|
||||
$ SAY ESC + "[''MSG_ROW';01H", BELL, " Invalid Entry, Try again ...''CEOL'"
|
||||
$ Wait 00:00:01.5
|
||||
$ SAY ESC + "[''MSG_ROW';01H", CEOL
|
||||
$!
|
||||
$ EXIT
|
||||
$!
|
||||
$ ENDSUBROUTINE
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$EXIT:
|
||||
$!
|
||||
$ DEFINE /USER /NOLOG SYS$ERROR NL:
|
||||
$ DEFINE /USER /NOLOG SYS$OUTPUT NL:
|
||||
$ CLOSE OFILE
|
||||
$!
|
||||
$ DEL_USER_DATA
|
||||
$!
|
||||
$ IF F$TYPE (SSL_CONF_DATA) .NES. "" THEN DELETE /SYMBOL /GLOBAL SSL_CONF_DATA
|
||||
$!
|
||||
$ IF F$GETDVI ("TT:","TT_NOECHO") .AND. .NOT. TT_NOECHO THEN SET TERMINAL /ECHO
|
||||
$!
|
||||
$ IF F$SEARCH ("SYS$LOGIN:SSL_GENRSA_''PID'.%%%;*") .NES. "" THEN DELETE/NOLOG/NOCONFIRM SYS$LOGIN:SSL_GENRSA_'PID'.%%%;*
|
||||
$ IF F$SEARCH ("SYS$LOGIN:SSL_REQ_''PID'.%%%;*") .NES. "" THEN DELETE/NOLOG/NOCONFIRM SYS$LOGIN:SSL_REQ_'PID'.%%%;*
|
||||
$!
|
||||
$ Verify = F$VERIFY (Verify)
|
||||
$!
|
||||
$ EXIT
|
||||
725
VMS/cert_tool/ssl$self_cert.com
Normal file
725
VMS/cert_tool/ssl$self_cert.com
Normal file
@@ -0,0 +1,725 @@
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! SSL$SELF_CERT.COM - SSL Self Signed Certificate procedure
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ Verify = F$VERIFY (0)
|
||||
$ Set NoOn
|
||||
$ Set NoControl=Y
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Description
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$! This procedure prompts the user through creating a Server Certificate.
|
||||
$!
|
||||
$! There are no parameters used.
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Define symbols
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ DELETE := DELETE
|
||||
$ SAY := WRITE SYS$OUTPUT
|
||||
$ ASK := READ SYS$COMMAND /END_OF_FILE=EXIT /PROMPT=
|
||||
$ PID = F$GETJPI ("","PID")
|
||||
$ TT_NOECHO = F$GETDVI ("TT:","TT_NOECHO")
|
||||
$ On Control_Y THEN GOTO EXIT
|
||||
$ Set Control=Y
|
||||
$!
|
||||
$ TT_ROWS = F$GETDVI ("TT:","TT_PAGE")
|
||||
$ TT_COLS = F$GETDVI ("TT:","DEVBUFSIZ")
|
||||
$!
|
||||
$ GET_USER_DATA := CALL GET_USER_DATA
|
||||
$ SET_USER_DATA := CALL SET_USER_DATA
|
||||
$ DEL_USER_DATA := CALL DEL_USER_DATA
|
||||
$ INIT_TERM := @SSL$COM:SSL$INIT_TERM
|
||||
$ SHOW_FILE := @SSL$COM:SSL$SHOW_FILE
|
||||
$ SSL_CONF_FILE = F$TRNLNM ("SSL$CONF")
|
||||
$ GET_CONF_DATA := @SSL$COM:SSL$CONF_UTIL 'SSL_CONF_FILE' GET
|
||||
$ SET_CONF_DATA := @SSL$COM:SSL$CONF_UTIL 'SSL_CONF_FILE' SET
|
||||
$!
|
||||
$ ESC[0,8] = 27 ! Set the Escape Character
|
||||
$ BELL[0,8] = 7 ! Ring the terminal Bell
|
||||
$ RED = 1 ! Color - Red
|
||||
$ FGD = 30 ! Foreground
|
||||
$ BGD = 0 ! Background
|
||||
$ CSCR = ESC + "[2J" ! Clear the Screen
|
||||
$ CEOS = ESC + "[0J" ! Clear to the End of the Screen
|
||||
$ CEOL = ESC + "[0K" ! Clear to the End of the Line
|
||||
$ NORM = ESC + "[0m" ! Turn Attributes off
|
||||
$ BLNK = ESC + "[5m" ! Turn on BLINK Attribute
|
||||
$ WIDE = ESC + "#6" ! Turn on WIDE Attribute
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Run the SSL setup if it hasn't been run yet
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ IF F$TRNLNM ("SSL$ROOT") .EQS. ""
|
||||
$ THEN
|
||||
$ IF F$SEARCH ("SSL$COM:SSL$INIT_ENV.COM") .NES. ""
|
||||
$ THEN
|
||||
$ @SSL$COM:SSL$INIT_ENV.COM
|
||||
$ ELSE
|
||||
$ SAY BELL, "Unable to locate SSL$COM:SSL$INIT_ENV.COM ..."
|
||||
$ GOTO EXIT
|
||||
$ ENDIF
|
||||
$ ENDIF
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Display the Page Header
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ INIT_TERM
|
||||
$ BCOLOR = BGD
|
||||
$ FCOLOR = FGD + RED
|
||||
$ COLOR = ESC + "[''BCOLOR';''FCOLOR'm"
|
||||
$!
|
||||
$ TEXT = "SSL Certificate Tool"
|
||||
$ COL = (TT_COLS - (F$LENGTH (TEXT) * 2)) / 4
|
||||
$!
|
||||
$ SAY ESC + "[01;01H", CSCR
|
||||
$ SAY ESC + "[02;''COL'H", COLOR, WIDE, TEXT, NORM
|
||||
$!
|
||||
$ TEXT = "Create Self-Signed Certificate"
|
||||
$ COL = (TT_COLS - F$LENGTH (TEXT)) / 2
|
||||
$!
|
||||
$ SAY ESC + "[04;01H"
|
||||
$ SAY ESC + "[04;''COL'H", COLOR, TEXT, NORM
|
||||
$!
|
||||
$ ROW = 6
|
||||
$ COL = 2
|
||||
$ TOP_ROW = ROW
|
||||
$ MSG_ROW = TT_ROWS - 1
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Initialize the Request Data
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ IF F$SEARCH ("''SSL_CONF_FILE'") .NES. ""
|
||||
$ THEN
|
||||
$ SAY ESC + "[''MSG_ROW';01H", BLNK, " Reading Configuration ...", NORM
|
||||
$ ELSE
|
||||
$ SAY ESC + "[''MSG_ROW';01H", BLNK, " Initializing Configuration ...", NORM
|
||||
$ ENDIF
|
||||
$!
|
||||
$ _request_name = "req"
|
||||
$!
|
||||
$ _distinguished_name = "REQ_distinguished_name"
|
||||
$ _distinguished_name_upd = "Y"
|
||||
$!
|
||||
$ _default_bits = "1024"
|
||||
$ _default_bits_upd = "Y"
|
||||
$!
|
||||
$ _default_keyfile = "SSL$KEY:SERVER.KEY"
|
||||
$ _default_keyfile_upd = "Y"
|
||||
$!
|
||||
$ _default_crtfile = "SSL$CRT:SERVER.CRT"
|
||||
$ _default_crtfile_upd = "Y"
|
||||
$!
|
||||
$ _countryName_prompt = "Country Name ?"
|
||||
$ _countryName_min = "2"
|
||||
$ _countryName_max = "2"
|
||||
$ _countryName_default = "US"
|
||||
$ _countryName_upd = "Y"
|
||||
$ _countryName_cnt = 4
|
||||
$!
|
||||
$ _stateOrProvinceName_prompt = "State or Province Name ?"
|
||||
$ _stateOrProvinceName_default = ""
|
||||
$ _stateOrProvinceName_upd = "Y"
|
||||
$ _stateOrProvinceName_cnt = 2
|
||||
$!
|
||||
$ _localityName_prompt = "City Name ?"
|
||||
$ _localityName_default = ""
|
||||
$ _localityName_upd = "Y"
|
||||
$ _localityName_cnt = 2
|
||||
$!
|
||||
$ _0organizationName_prompt = "Organization Name ?"
|
||||
$ _0organizationName_default = ""
|
||||
$ _0organizationName_upd = "Y"
|
||||
$ _0organizationName_cnt = 2
|
||||
$!
|
||||
$ _organizationalUnitName_prompt = "Organization Unit Name ?"
|
||||
$ _organizationalUnitName_default = ""
|
||||
$ _organizationalUnitName_upd = "Y"
|
||||
$ _organizationalUnitName_cnt = 2
|
||||
$!
|
||||
$ _commonName_prompt = "Common Name ?"
|
||||
$ _commonName_max = "64"
|
||||
$ HOSTNAME -s _commonName_default
|
||||
$ _commonName_upd = "Y"
|
||||
$ _commonName_cnt = 3
|
||||
$!
|
||||
$ _emailAddress_prompt = "Email Address ?"
|
||||
$ _emailAddress_max = "40"
|
||||
$ _emailAddress_default = "webmaster@''_commonName_default'"
|
||||
$ _emailAddress_upd = "Y"
|
||||
$ _emailAddress_cnt = 3
|
||||
$!
|
||||
$ IF F$SEARCH ("''SSL_CONF_FILE'") .NES. ""
|
||||
$ THEN
|
||||
$ GET_CONF_DATA "[''_request_name']#distinguished_name"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _distinguished_name = SSL_CONF_DATA
|
||||
$ _distinguished_name_upd = "N"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ GET_CONF_DATA "[''_request_name']#default_bits"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _default_bits = SSL_CONF_DATA
|
||||
$ _default_bits_upd = "N"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ GET_CONF_DATA "[''_request_name']#default_keyfile"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _default_keyfile = F$PARSE (SSL_CONF_DATA,"SSL$ROOT:",,"DEVICE") + -
|
||||
F$PARSE (SSL_CONF_DATA,"[KEY]",,"DIRECTORY") + -
|
||||
F$PARSE (SSL_CONF_DATA,"SERVER",,"NAME") + -
|
||||
F$PARSE (SSL_CONF_DATA,".KEY",,"TYPE")
|
||||
$ _default_keyfile_upd = "N"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ GET_CONF_DATA "[''_request_name']#default_crtfile"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _default_crtfile = F$PARSE (SSL_CONF_DATA,"SSL$ROOT:",,"DEVICE") + -
|
||||
F$PARSE (SSL_CONF_DATA,"[CRT]",,"DIRECTORY") + -
|
||||
F$PARSE (SSL_CONF_DATA,"SERVER",,"NAME") + -
|
||||
F$PARSE (SSL_CONF_DATA,".CRT",,"TYPE")
|
||||
$ _default_crtfile_upd = "N"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ CTR = 0
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#countryName"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _countryName_prompt = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#countryName_min"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _countryName_min = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#countryName_max"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _countryName_max = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#countryName_default"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _countryName_default = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ IF _countryName_cnt .EQS. CTR THEN _countryName_upd = "N"
|
||||
$!
|
||||
$ CTR = 0
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#stateOrProvinceName"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _stateOrProvinceName_prompt = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#stateOrProvinceName_default"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _stateOrProvinceName_default = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ IF _stateOrProvinceName_cnt .EQ. CTR THEN _stateOrProvinceName_upd = "N"
|
||||
$!
|
||||
$ CTR = 0
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#localityName"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _localityName_prompt = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#localityName_default"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _localityName_default = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ IF _localityName_cnt .EQ. CTR THEN _localityName_default_upd = "N"
|
||||
$!
|
||||
$ CTR = 0
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#0.organizationName"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _0organizationName_prompt = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#0.organizationName_default"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _0organizationName_default = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ IF _0organizationName_cnt .EQ. CTR THEN _0organizationName_default_upd = "N"
|
||||
$!
|
||||
$ CTR = 0
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#organizationalUnitName"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _organizationalUnitName_prompt = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#organizationalUnitName_default"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _organizationalUnitName_default = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ IF _organizationalUnitName_cnt .EQ. CTR THEN _organizationalUnitName_upd = "N"
|
||||
$!
|
||||
$ CTR = 0
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#commonName"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _commonName_prompt = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#commonName_max"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _commonName_max = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#commonName_default"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _commonName_default = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ IF _commonName_cnt .EQ. CTR THEN _commonName_default_upd = "N"
|
||||
$!
|
||||
$ CTR = 0
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#emailAddress"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _emailAddress_prompt = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#emailAddress_max"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _emailAddress_max = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ GET_CONF_DATA "[''_distinguished_name']#emailAddress_default"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _emailAddress_default = SSL_CONF_DATA
|
||||
$ CTR = CTR + 1
|
||||
$ ENDIF
|
||||
$ IF _emailAddress_cnt .EQ. CTR THEN _emailAddress_default_upd = "N"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ SET_USER_DATA "[]#encrypt_key#-#N#Encrypt Private Key ?#S##1##Y#N"
|
||||
$ SET_USER_DATA "[]#pem_pass_phrase#-##PEM Pass Phrase ?#P#1###Y#Y"
|
||||
$ SET_USER_DATA "[''_request_name']#default_bits#D#''_default_bits'#Encryption Bits ?#I###''_default_bits_upd'#Y#N"
|
||||
$ SET_USER_DATA "[''_request_name']#default_keyfile#D#''_default_keyfile'#Certificate Key File ?#F###''_default_keyfile_upd'#Y#N"
|
||||
$ SET_USER_DATA "[''_request_name']#default_crtfile#D#''_default_crtfile'#Certificate File ?#F###''_default_crtfile_upd'#Y#N"
|
||||
$ SET_USER_DATA "[''_request_name']#distinguished_name#D#''_distinguished_name'##S###''_distinguished_name_upd'#N#N"
|
||||
$ SET_USER_DATA "[''_distinguished_name']#countryName#P#''_countryName_default'#''_countryName_prompt'#S#''_countryName_min'#''#''_countryName_upd'#Y#N"
|
||||
$ SET_USER_DATA "[''_distinguished_name']#stateOrProvinceName#P#''_stateOrProvinceName_default'#''_stateOrProvinceName_prompt'####''_stateOrProvinceName_upd'#Y#N"
|
||||
$ SET_USER_DATA "[''_distinguished_name']#localityName#P#''_localityName_default'#''_localityName_prompt'#S###''_localityName_upd'#Y#N"
|
||||
$ SET_USER_DATA "[''_distinguished_name']#0.organizationName#P#''_0organizationName_default'#''_0organizationName_prompt'#S###''_0organizationalName_upd'#Y#N"
|
||||
$ SET_USER_DATA "[''_distinguished_name']#organizationalUnitName#P#''_organizationalUnitName_default'#''_organizationalUnitName_prompt#S###''_organizationalUnitName_upd'#Y#N"
|
||||
$ SET_USER_DATA "[''_distinguished_name']#commonName#P#''_commonName_default'#''_commonName_prompt'#S##''_commonName_max'#''_commonName_upd'#Y#N"
|
||||
$ SET_USER_DATA "[''_distinguished_name']#emailAddress#P#''_emailAddress_default'#''_emailAddress_prompt'#S##''_emailAddress_max'#''_emailAddress_upd'#Y#N"
|
||||
$ SET_USER_DATA "[]#display_certificate#-#N#Display the Certificate ?#S##1##Y#N"
|
||||
$!
|
||||
$ SAY ESC + "[''MSG_ROW';01H", CEOS
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Confirm/Update the SSL Configuration Data
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ CTR = 1
|
||||
$!
|
||||
$PROMPT_LOOP:
|
||||
$!
|
||||
$ IF CTR .LE. SSL_USER_DATA_MAX
|
||||
$ THEN
|
||||
$ KEY = F$ELEMENT (0,"#",SSL_USER_DATA_'CTR') ! Key Name
|
||||
$ ITM = F$ELEMENT (1,"#",SSL_USER_DATA_'CTR') ! Item Name
|
||||
$ VAL = F$ELEMENT (2,"#",SSL_USER_DATA_'CTR') ! Item Value Contains Default or Prompt
|
||||
$ DEF = F$ELEMENT (3,"#",SSL_USER_DATA_'CTR') ! Default Value
|
||||
$ PRM = F$ELEMENT (4,"#",SSL_USER_DATA_'CTR') ! Prompt Value
|
||||
$ TYP = F$ELEMENT (5,"#",SSL_USER_DATA_'CTR') ! Value Type
|
||||
$ MIN = F$ELEMENT (6,"#",SSL_USER_DATA_'CTR') ! Value Minimum Length
|
||||
$ MAX = F$ELEMENT (7,"#",SSL_USER_DATA_'CTR') ! Value Maximum Length
|
||||
$ UPD = F$ELEMENT (8,"#",SSL_USER_DATA_'CTR') ! Entry Updated ?
|
||||
$ REQ = F$ELEMENT (9,"#",SSL_USER_DATA_'CTR') ! Entry Required for Input ?
|
||||
$ CFM = F$ELEMENT (10,"#",SSL_USER_DATA_'CTR')! Confirm Input ?
|
||||
$!
|
||||
$! The PEM Pass Phrase prompt is dependant on the answer to encrypt the private key
|
||||
$!
|
||||
$ IF KEY .EQS. "[]" .AND. ITM .EQS. "pem_pass_phrase"
|
||||
$ THEN
|
||||
$ GET_USER_DATA "[]#encrypt_key"
|
||||
$ _encrypt_key = SSL_USER_DATA
|
||||
$ IF F$EDIT (_encrypt_key,"UPCASE") .NES. "Y"
|
||||
$ THEN
|
||||
$ CTR = CTR + 1
|
||||
$ GOTO PROMPT_LOOP
|
||||
$ ENDIF
|
||||
$ ENDIF
|
||||
$!
|
||||
$ CONFIRMED = 0
|
||||
$ IF REQ .EQS. "N"
|
||||
$ THEN
|
||||
$ CTR = CTR + 1
|
||||
$ GOTO PROMPT_LOOP
|
||||
$ ENDIF
|
||||
$ IF ROW .GT. MSG_ROW - 2
|
||||
$ THEN
|
||||
$ SAY ESC + "[''TOP_ROW';01H", CEOS
|
||||
$ ROW = TOP_ROW
|
||||
$ ENDIF
|
||||
$!
|
||||
$CONFIRM_LOOP:
|
||||
$!
|
||||
$ IF PRM .EQS. ""
|
||||
$ THEN
|
||||
$ PROMPT = ESC + "[''ROW';''COL'H''ITM' ? [''DEF'] ''CEOL'"
|
||||
$ ELSE
|
||||
$ PROMPT = ESC + "[''ROW';''COL'H''PRM' [''DEF'] ''CEOL'"
|
||||
$ ENDIF
|
||||
$ IF TYP .EQS. "P" THEN SET TERMINAL /NOECHO
|
||||
$ ASK "''PROMPT'" ANS /END_OF_FILE=EXIT
|
||||
$ IF TYP .EQS. "P" THEN SET TERMINAL /ECHO
|
||||
$ ANS = F$EDIT (ANS,"TRIM")
|
||||
$ IF ANS .EQS. "" THEN ANS = DEF
|
||||
$ IF TYP .EQS. "F"
|
||||
$ THEN
|
||||
$ ANS = F$PARSE ("''ANS'","''DEF'",,,"SYNTAX_ONLY")
|
||||
$ ENDIF
|
||||
$ IF TYP .EQS. "I" .AND. F$TYPE (ANS) .NES. "INTEGER"
|
||||
$ THEN
|
||||
$ CALL INVALID_ENTRY
|
||||
$ SAY ESC + "[''ROW';01H", CEOS
|
||||
$ GOTO PROMPT_LOOP
|
||||
$ ENDIF
|
||||
$ IF (TYP .EQS. "S" .OR. TYP .EQS. "P") .AND. -
|
||||
((MIN .NES. "" .AND. F$LENGTH (ANS) .LT. F$INTEGER(MIN)) .OR. -
|
||||
(MAX .NES. "" .AND. F$LENGTH (ANS) .GT. F$INTEGER(MAX)))
|
||||
$ THEN
|
||||
$ CALL INVALID_ENTRY
|
||||
$ SAY ESC + "[''ROW';01H", CEOS
|
||||
$ IF TYP .EQS. "S" THEN GOTO PROMPT_LOOP
|
||||
$ IF TYP .EQS. "P" THEN GOTO CONFIRM_LOOP
|
||||
$ ENDIF
|
||||
$ ROW = ROW + 1
|
||||
$ IF CFM .EQS. "Y"
|
||||
$ THEN
|
||||
$ IF CONFIRMED .EQ. 0
|
||||
$ THEN
|
||||
$ CONFIRMED = 1
|
||||
$ CONFIRMED_ANS = ANS
|
||||
$ PRM = "Confirm ''PRM'"
|
||||
$ GOTO CONFIRM_LOOP
|
||||
$ ELSE
|
||||
$ IF ANS .NES. CONFIRMED_ANS
|
||||
$ THEN
|
||||
$ CALL INVALID_ENTRY
|
||||
$ ROW = ROW - 2
|
||||
$ SAY ESC + "[''ROW';01H", CEOS
|
||||
$ GOTO PROMPT_LOOP
|
||||
$ ENDIF
|
||||
$ ENDIF
|
||||
$ ENDIF
|
||||
$ IF ANS .NES. DEF THEN SSL_USER_DATA_'CTR' = "''KEY'#''ITM'#''VAL'#''ANS'#''PRM'#''TYP'#''MIN'#''MAX'#Y#''REQ'#''CFM'"
|
||||
$ CTR = CTR + 1
|
||||
$ GOTO PROMPT_LOOP
|
||||
$ ENDIF
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Save the SSL Configuration Data
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ CTR = 1
|
||||
$ SAY ESC + "[''MSG_ROW';01H", BLNK, " Saving Configuration ...", NORM
|
||||
$!
|
||||
$SAVE_CONF_LOOP:
|
||||
$!
|
||||
$ IF CTR .LE. SSL_USER_DATA_MAX
|
||||
$ THEN
|
||||
$ KEY = F$ELEMENT (0,"#",SSL_USER_DATA_'CTR') ! Key Name
|
||||
$ ITM = F$ELEMENT (1,"#",SSL_USER_DATA_'CTR') ! Item Name
|
||||
$ VAL = F$ELEMENT (2,"#",SSL_USER_DATA_'CTR') ! Item Value Contains Default or Prompt
|
||||
$ DEF = F$ELEMENT (3,"#",SSL_USER_DATA_'CTR') ! Default Value
|
||||
$ PRM = F$ELEMENT (4,"#",SSL_USER_DATA_'CTR') ! Prompt Value
|
||||
$ TYP = F$ELEMENT (5,"#",SSL_USER_DATA_'CTR') ! Value Type
|
||||
$ MIN = F$ELEMENT (6,"#",SSL_USER_DATA_'CTR') ! Value Minimum Length
|
||||
$ MAX = F$ELEMENT (7,"#",SSL_USER_DATA_'CTR') ! Value Maximum Length
|
||||
$ UPD = F$ELEMENT (8,"#",SSL_USER_DATA_'CTR') ! Entry Updated ?
|
||||
$ REQ = F$ELEMENT (9,"#",SSL_USER_DATA_'CTR') ! Entry Required for Input ?
|
||||
$ CFM = F$ELEMENT (10,"#",SSL_USER_DATA_'CTR')! Confirm Input ?
|
||||
$ IF UPD .NES. "Y" .OR. VAL .EQS. "-"
|
||||
$ THEN
|
||||
$ CTR = CTR + 1
|
||||
$ GOTO SAVE_CONF_LOOP
|
||||
$ ENDIF
|
||||
$ IF VAL .EQS. "D"
|
||||
$ THEN
|
||||
$ SET_CONF_DATA "''KEY'#''ITM'" "''DEF'"
|
||||
$ ELSE
|
||||
$ SET_CONF_DATA "''KEY'#''ITM'" "''PRM'"
|
||||
$ SET_CONF_DATA "''KEY'#''ITM'_default" "''DEF'"
|
||||
$ ENDIF
|
||||
$ IF MIN .NES. "" THEN SET_CONF_DATA "''KEY'#''ITM'_min" "''MIN'"
|
||||
$ IF MAX .NES. "" THEN SET_CONF_DATA "''KEY'#''ITM'_max" "''MAX'"
|
||||
$ CTR = CTR + 1
|
||||
$ GOTO SAVE_CONF_LOOP
|
||||
$ ENDIF
|
||||
$!
|
||||
$ PURGE /NOLOG /NOCONFIRM 'SSL_CONF_FILE'
|
||||
$ RENAME 'SSL_CONF_FILE'; ;1
|
||||
$!
|
||||
$ SAY ESC + "[''MSG_ROW';01H", CEOS
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Create the Server Certificiate
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ SAY ESC + "[''MSG_ROW';01H", BLNK, " Creating Self-Signed Certificate ...", NORM
|
||||
$!
|
||||
$ X1 = 2
|
||||
$ Y1 = TOP_ROW
|
||||
$ X2 = TT_COLS - 2
|
||||
$ Y2 = MSG_ROW - 1
|
||||
$!
|
||||
$ GET_USER_DATA "[]#encrypt_key"
|
||||
$ _encrypt_key = SSL_USER_DATA
|
||||
$ IF F$EDIT (_encrypt_key,"UPCASE") .EQS. "Y"
|
||||
$ THEN
|
||||
$ GET_USER_DATA "[]#pem_pass_phrase"
|
||||
$ _pem_pass_phrase = SSL_USER_DATA
|
||||
$ ENDIF
|
||||
$ GET_USER_DATA "[''_request_name']#default_bits"
|
||||
$ _default_bits = SSL_USER_DATA
|
||||
$ GET_USER_DATA "[''_request_name']#default_keyfile"
|
||||
$ _default_keyfile = SSL_USER_DATA
|
||||
$ GET_USER_DATA "[''_request_name']#default_crtfile"
|
||||
$ _default_crtfile = SSL_USER_DATA
|
||||
$ GET_USER_DATA "[]#display_certificate"
|
||||
$ _display_certificate = SSL_USER_DATA
|
||||
$!
|
||||
$ DEFINE /USER /NOLOG SYS$ERROR NL:
|
||||
$ DEFINE /USER /NOLOG SYS$OUTPUT NL:
|
||||
$ SHOW SYSTEM /FULL /OUT=SYS$LOGIN:SSL_REQ_'PID'.RND
|
||||
$!
|
||||
$ OPEN /WRITE OFILE SYS$LOGIN:SSL_REQ_'PID'.COM
|
||||
$ WRITE OFILE "$ DEFINE /USER /NOLOG RANDFILE SYS$LOGIN:SSL_REQ_''PID'.RND"
|
||||
$ WRITE OFILE "$ DEFINE /USER /NOLOG SYS$ERROR SYS$LOGIN:SSL_REQ_''PID'.LOG"
|
||||
$ WRITE OFILE "$ DEFINE /USER /NOLOG SYS$OUTPUT SYS$LOGIN:SSL_REQ_''PID'.LOG"
|
||||
$ WRITE OFILE "$ DEFINE /USER /NOLOG SYS$COMMAND SYS$INPUT"
|
||||
$ IF F$EDIT (_encrypt_key,"UPCASE") .EQS. "Y"
|
||||
$ THEN
|
||||
$ WRITE OFILE "$ OPENSSL req -config ''SSL_CONF_FILE' -new -days 365 -x509 -keyout ''_default_keyfile' -out ''_default_crtfile'"
|
||||
$ WRITE OFILE "''_pem_pass_phrase'"
|
||||
$ WRITE OFILE "''_pem_pass_phrase'"
|
||||
$ ELSE
|
||||
$ WRITE OFILE "$ OPENSSL req -config ''SSL_CONF_FILE' -nodes -new -days 365 -x509 -keyout ''_default_keyfile' -out ''_default_crtfile'"
|
||||
$ ENDIF
|
||||
$ WRITE OFILE ""
|
||||
$ WRITE OFILE ""
|
||||
$ WRITE OFILE ""
|
||||
$ WRITE OFILE ""
|
||||
$ WRITE OFILE ""
|
||||
$ WRITE OFILE ""
|
||||
$ WRITE OFILE ""
|
||||
$ CLOSE OFILE
|
||||
$!
|
||||
$ @SYS$LOGIN:SSL_REQ_'PID'.COM
|
||||
$!
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_REQ_'PID'.COM;*
|
||||
$!
|
||||
$ DEFINE /USER /NOLOG SYS$ERROR NL:
|
||||
$ DEFINE /USER /NOLOG SYS$OUTPUT NL:
|
||||
$ SEARCH SYS$LOGIN:SSL_REQ_'PID'.LOG /OUT=SYS$LOGIN:SSL_REQ_'PID'.ERR ":error:"
|
||||
$ IF F$SEARCH ("SYS$LOGIN:SSL_REQ_''PID'.ERR") .NES. ""
|
||||
$ THEN
|
||||
$ IF F$FILE_ATTRIBUTE ("SYS$LOGIN:SSL_REQ_''PID'.ERR","ALQ") .NE. 0
|
||||
$ THEN
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_REQ_'PID'.ERR;*
|
||||
$ SAY ESC + "[''MSG_ROW';01H''BELL'''CEOS'"
|
||||
$ SHOW_FILE "SYS$LOGIN:SSL_REQ_''PID'.LOG" 'X1' 'Y1' 'X2' 'Y2' "< ERROR >"
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_REQ_'PID'.LOG;*
|
||||
$ GOTO EXIT
|
||||
$ ENDIF
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_REQ_'PID'.ERR;*
|
||||
$ ENDIF
|
||||
$!
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_REQ_'PID'.LOG;*
|
||||
$!
|
||||
$ IF F$EDIT (_display_certificate,"TRIM,UPCASE") .EQS. "Y"
|
||||
$ THEN
|
||||
$ SAY ESC + "[''MSG_ROW';01H", BLNK, " Generating Output ...", NORM, CEOL
|
||||
$!
|
||||
$ OPEN /WRITE OFILE SYS$LOGIN:SSL_X509_'PID'.COM
|
||||
$ WRITE OFILE "$ DEFINE /USER /NOLOG SYS$ERROR SYS$LOGIN:SSL_X509_''PID'.LOG"
|
||||
$ WRITE OFILE "$ DEFINE /USER /NOLOG SYS$OUTPUT SYS$LOGIN:SSL_X509_''PID'.LOG"
|
||||
$ WRITE OFILE "$ DEFINE /USER /NOLOG SYS$COMMAND SYS$INPUT"
|
||||
$ WRITE OFILE "$ OPENSSL x509 -noout -text -in ''_default_crtfile'"
|
||||
$ CLOSE OFILE
|
||||
$!
|
||||
$ @SYS$LOGIN:SSL_X509_'PID'.COM
|
||||
$!
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_X509_'PID'.COM;*
|
||||
$!
|
||||
$ DEFINE /USER /NOLOG SYS$ERROR NL:
|
||||
$ DEFINE /USER /NOLOG SYS$OUTPUT NL:
|
||||
$ SEARCH SYS$LOGIN:SSL_X509_'PID'.LOG /OUT=SYS$LOGIN:SSL_X509_'PID'.ERR ":error:"
|
||||
$ IF F$SEARCH ("SYS$LOGIN:SSL_X509_''PID'.ERR") .NES. ""
|
||||
$ THEN
|
||||
$ IF F$FILE_ATTRIBUTE ("SYS$LOGIN:SSL_X509_''PID'.ERR","ALQ") .NE. 0
|
||||
$ THEN
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_X509_'PID'.ERR;*
|
||||
$ SAY ESC + "[''MSG_ROW';01H''BELL'''CEOS'"
|
||||
$ SHOW_FILE "SYS$LOGIN:SSL_X509_''PID'.LOG" 'X1' 'Y1' 'X2' 'Y2' "< ERROR >"
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_X509_'PID'.LOG;*
|
||||
$ GOTO EXIT
|
||||
$ ENDIF
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_X509_'PID'.ERR;*
|
||||
$ ENDIF
|
||||
$!
|
||||
$ SAY ESC + "[''MSG_ROW';01H''CEOS'"
|
||||
$ SHOW_FILE "SYS$LOGIN:SSL_X509_''PID'.LOG" 'X1' 'Y1' 'X2' 'Y2' "< ''_default_crtfile' >"
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_X509_'PID'.LOG;*
|
||||
$ GOTO EXIT
|
||||
$ ENDIF
|
||||
$!
|
||||
$ TEXT = "Press return to continue"
|
||||
$ COL = (TT_COLS - F$LENGTH (TEXT)) / 2
|
||||
$!
|
||||
$ SAY ESC + "[''MSG_ROW';01H", CEOS
|
||||
$ PROMPT = ESC + "[''MSG_ROW';''COL'H''TEXT'"
|
||||
$ ASK "''PROMPT'" OPT
|
||||
$!
|
||||
$GOTO EXIT
|
||||
z$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Set the User Data
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$SET_USER_DATA: SUBROUTINE
|
||||
$!
|
||||
$ IF F$TYPE (SSL_USER_DATA_MAX) .EQS. ""
|
||||
$ THEN
|
||||
$ SSL_USER_DATA_MAX == 1
|
||||
$ ELSE
|
||||
$ SSL_USER_DATA_MAX == SSL_USER_DATA_MAX + 1
|
||||
$ ENDIF
|
||||
$!
|
||||
$ SSL_USER_DATA_'SSL_USER_DATA_MAX' == "''P1'"
|
||||
$!
|
||||
$ EXIT
|
||||
$!
|
||||
$ ENDSUBROUTINE
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Find the Request Data
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$GET_USER_DATA: SUBROUTINE
|
||||
$!
|
||||
$ CTR = 1
|
||||
$ USER_KEY = F$ELEMENT (0,"#",P1)
|
||||
$ USER_ITM = F$ELEMENT (1,"#",P1)
|
||||
$!
|
||||
$GET_USER_DATA_LOOP:
|
||||
$!
|
||||
$ IF CTR .LE. SSL_USER_DATA_MAX
|
||||
$ THEN
|
||||
$ KEY = F$ELEMENT (0,"#",SSL_USER_DATA_'CTR') ! Key Name
|
||||
$ ITM = F$ELEMENT (1,"#",SSL_USER_DATA_'CTR') ! Item Name
|
||||
$ VAL = F$ELEMENT (2,"#",SSL_USER_DATA_'CTR') ! Item Value Contains Default or Prompt
|
||||
$ DEF = F$ELEMENT (3,"#",SSL_USER_DATA_'CTR') ! Default Value
|
||||
$ PRM = F$ELEMENT (4,"#",SSL_USER_DATA_'CTR') ! Prompt Value
|
||||
$ IF USER_KEY .NES. KEY .OR. USER_ITM .NES. ITM
|
||||
$ THEN
|
||||
$ CTR = CTR + 1
|
||||
$ GOTO GET_USER_DATA_LOOP
|
||||
$ ENDIF
|
||||
$ IF VAL .EQS. "-" THEN SSL_USER_DATA == "''DEF'"
|
||||
$ IF VAL .EQS. "D" THEN SSL_USER_DATA == "''DEF'"
|
||||
$ IF VAL .EQS. "P" THEN SSL_USER_DATA == "''PRM'"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ EXIT
|
||||
$!
|
||||
$ ENDSUBROUTINE
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Delete the User Data
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$DEL_USER_DATA: SUBROUTINE
|
||||
$!
|
||||
$ IF F$TYPE (SSL_USER_DATA_MAX) .EQS. "" THEN GOTO DEL_USER_DATA_END
|
||||
$!
|
||||
$DEL_USER_DATA_LOOP:
|
||||
$!
|
||||
$ IF F$TYPE (SSL_USER_DATA_'SSL_USER_DATA_MAX') .NES. ""
|
||||
$ THEN
|
||||
$ DELETE /SYMBOL /GLOBAL SSL_USER_DATA_'SSL_USER_DATA_MAX'
|
||||
$ SSL_USER_DATA_MAX == SSL_USER_DATA_MAX - 1
|
||||
$ GOTO DEL_USER_DATA_LOOP
|
||||
$ ENDIF
|
||||
$!
|
||||
$ DELETE /SYMBOL /GLOBAL SSL_USER_DATA_MAX
|
||||
$!
|
||||
$DEL_USER_DATA_END:
|
||||
$!
|
||||
$ IF F$TYPE (SSL_USER_DATA) .NES. "" THEN DELETE /SYMBOL /GLOBAL SSL_USER_DATA
|
||||
$!
|
||||
$ EXIT
|
||||
$!
|
||||
$ ENDSUBROUTINE
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Display the invalid entry
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$INVALID_ENTRY: SUBROUTINE
|
||||
$!
|
||||
$ SAY ESC + "[''MSG_ROW';01H", BELL, " Invalid Entry, Try again ...''CEOL'"
|
||||
$ Wait 00:00:01.5
|
||||
$ SAY ESC + "[''MSG_ROW';01H", CEOL
|
||||
$!
|
||||
$ EXIT
|
||||
$!
|
||||
$ ENDSUBROUTINE
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$EXIT:
|
||||
$!
|
||||
$ DEFINE /USER /NOLOG SYS$ERROR NL:
|
||||
$ DEFINE /USER /NOLOG SYS$OUTPUT NL:
|
||||
$ CLOSE OFILE
|
||||
$!
|
||||
$ DEL_USER_DATA
|
||||
$!
|
||||
$ IF F$TYPE (SSL_CONF_DATA) .NES. "" THEN DELETE /SYMBOL /GLOBAL SSL_CONF_DATA
|
||||
$!
|
||||
$ IF F$GETDVI ("TT:","TT_NOECHO") .AND. .NOT. TT_NOECHO THEN SET TERMINAL /ECHO
|
||||
$!
|
||||
$ IF F$SEARCH ("SYS$LOGIN:SSL_REQ_''PID'.%%%;*") .NES. "" THEN DELETE/NOLOG/NOCONFIRM SYS$LOGIN:SSL_REQ_'PID'.%%%;*
|
||||
$ IF F$SEARCH ("SYS$LOGIN:SSL_X509_''PID'.%%%;*") .NES. "" THEN DELETE/NOLOG/NOCONFIRM SYS$LOGIN:SSL_X509_'PID'.%%%;*
|
||||
$!
|
||||
$ Verify = F$VERIFY (Verify)
|
||||
$!
|
||||
$ EXIT
|
||||
205
VMS/cert_tool/ssl$show_file.com
Normal file
205
VMS/cert_tool/ssl$show_file.com
Normal file
@@ -0,0 +1,205 @@
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! SSL$SHOW_FILE.COM - SSL Show File procedure
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ Verify = F$VERIFY (0)
|
||||
$ Set NoOn
|
||||
$ Set NoControl=Y
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Description
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$! This procedure display the contents of a given file in a box size specified.
|
||||
$!
|
||||
$! The parameters used are:
|
||||
$!
|
||||
$! P1 - File to View
|
||||
$! P2 - X1 coordinate
|
||||
$! P3 - Y1 coordinate
|
||||
$! P4 - X2 coordinate
|
||||
$! P5 - Y3 coordinate
|
||||
$! P6 - File Box Title (Optional)
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Define symbols
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ SAY := WRITE SYS$OUTPUT
|
||||
$ ASK := READ SYS$COMMAND /END_OF_FILE=EXIT /PROMPT=
|
||||
$ On Control_Y THEN GOTO EXIT
|
||||
$ Set Control=Y
|
||||
$!
|
||||
$ DRAW_BOX := @SSL$COM:SSL$DRAW_BOX
|
||||
$ FILL_BOX := @SSL$COM:SSL$FILL_BOX
|
||||
$!
|
||||
$ ESC[0,8] = 27 ! Set the Escape Character
|
||||
$ CEOL = ESC + "[0K" ! Clear to the End of the Line
|
||||
$ NORM = ESC + "[0m" ! Turn Attributes off
|
||||
$ BOLD = ESC + "[1m" ! Turn on BOLD Attribute
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Display the Page Header
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ REC_MAX = 0
|
||||
$ OPEN /READ IFILE 'P1'
|
||||
$!
|
||||
$READ_LOOP:
|
||||
$!
|
||||
$ READ /END_OF_FILE=READ_END IFILE IREC
|
||||
$ REC_MAX = REC_MAX + 1
|
||||
$ REC_'REC_MAX' = IREC
|
||||
$ GOTO READ_LOOP
|
||||
$!
|
||||
$READ_END:
|
||||
$!
|
||||
$ CLOSE IFILE
|
||||
$!
|
||||
$ IF REC_MAX .EQ. 0
|
||||
$ THEN
|
||||
$ DRAW_BOX 'P2' 'P3' 'P4' 'P5' "''P6'" " ** End-of-File **, Press Return to Exit "
|
||||
$ INPUT_ROW = P5 + 1
|
||||
$ PROMPT = ESC + "[''INPUT_ROW';01H ''CEOL'"
|
||||
$ ASK "''PROMPT'" OPT
|
||||
$ GOTO EXIT
|
||||
$ ENDIF
|
||||
$!
|
||||
$ COL = P2 + 2
|
||||
$ ROW = P3 + 2
|
||||
$ TOP_ROW = ROW
|
||||
$ INPUT_ROW = P5 + 1
|
||||
$ BOX_WIDTH = P4 - (P2 + 2)
|
||||
$ BOX_HEIGHT = P5 - (P3 + 3)
|
||||
$!
|
||||
$ REC_CTR = 1
|
||||
$ PAGE_CTR = 1
|
||||
$ PAGE_'PAGE_CTR'_REC_CTR = REC_CTR
|
||||
$ RECS_PER_PAGE = BOX_HEIGHT
|
||||
$ PAGE_MAX = REC_MAX / RECS_PER_PAGE
|
||||
$ IF PAGE_MAX * RECS_PER_PAGE .LT. REC_MAX THEN PAGE_MAX = PAGE_MAX + 1
|
||||
$!
|
||||
$ DRAW_BOX 'P2' 'P3' 'P4' 'P5' "''P6'" " Enter B for Back, N for Next, Ctrl-Z to Exit "
|
||||
$ PAGE_TXT = F$FAO (" Page !UL of !UL ", PAGE_CTR, PAGE_MAX)
|
||||
$ _COL = P2 + (BOX_WIDTH - F$LENGTH (PAGE_TXT)) + 2
|
||||
$ SAY ESC + "[''P3';''_COL'H''BOLD'''PAGE_TXT'''NORM'"
|
||||
$!
|
||||
$DISPLAY_LOOP:
|
||||
$!
|
||||
$ IF REC_CTR .LE. REC_MAX .AND. F$TYPE (REC_'REC_CTR') .NES. ""
|
||||
$ THEN
|
||||
$ REC = REC_'REC_CTR'
|
||||
$ ENDIF
|
||||
$ WRAP_IN_PROGRESS = 0
|
||||
$!
|
||||
$WRAP_LOOP:
|
||||
$!
|
||||
$ IF ROW .LE. (P5 - 2) .AND. -
|
||||
REC_CTR .LE. PAGE_CTR * RECS_PER_PAGE
|
||||
$ THEN
|
||||
$ IF F$LENGTH (REC) .GT. BOX_WIDTH
|
||||
$ THEN
|
||||
$ IF WRAP_IN_PROGRESS .EQ. 0
|
||||
$ THEN
|
||||
$ WRAP_IN_PROGRESS = 1
|
||||
$ _COL = COL
|
||||
$ ELSE
|
||||
$ _COL = COL - 1
|
||||
$ ENDIF
|
||||
$ REC_SEG = F$EXTRACT (0, BOX_WIDTH, REC)
|
||||
$ SAY ESC + "[''ROW';''_COL'H", REC_SEG
|
||||
$ REC = ">" + F$EXTRACT (BOX_WIDTH, F$LENGTH (REC)-BOX_WIDTH, REC)
|
||||
$ ROW = ROW + 1
|
||||
$ GOTO WRAP_LOOP
|
||||
$ ELSE
|
||||
$ IF REC_CTR .LE. REC_MAX .AND. F$TYPE (REC_'REC_CTR') .NES. ""
|
||||
$ THEN
|
||||
$ IF WRAP_IN_PROGRESS .EQ. 1
|
||||
$ THEN
|
||||
$ _COL = COL - 1
|
||||
$ ELSE
|
||||
$ _COL = COL
|
||||
$ ENDIF
|
||||
$ SAY ESC + "[''ROW';''_COL'H", REC
|
||||
$ ENDIF
|
||||
$ ENDIF
|
||||
$ ELSE
|
||||
$!
|
||||
$RETRY:
|
||||
$!
|
||||
$ PROMPT = ESC + "[''INPUT_ROW';01H ''CEOL'"
|
||||
$ ASK "''PROMPT'" OPT
|
||||
$ IF F$EDIT (OPT,"TRIM,UPCASE") .NES. "B" .AND. -
|
||||
F$EDIT (OPT,"TRIM,UPCASE") .NES. "N"
|
||||
$ THEN
|
||||
$ CALL INVALID_ENTRY
|
||||
$ GOTO RETRY
|
||||
$ ENDIF
|
||||
$ IF F$EDIT (OPT,"TRIM,UPCASE") .EQS. "B"
|
||||
$ THEN
|
||||
$ IF PAGE_CTR .GT. 1
|
||||
$ THEN
|
||||
$ ROW = TOP_ROW
|
||||
$ PAGE_CTR = PAGE_CTR - 1
|
||||
$ REC_CTR = PAGE_'PAGE_CTR'_REC_CTR
|
||||
$ PAGE_TXT = F$FAO (" Page !UL of !UL ", PAGE_CTR, PAGE_MAX)
|
||||
$ _COL = P2 + (BOX_WIDTH - F$LENGTH (PAGE_TXT)) + 2
|
||||
$ SAY ESC + "[''P3';''_COL'H''BOLD'''PAGE_TXT'''NORM'"
|
||||
$ FILL_BOX 'P2' 'P3' 'P4' 'P5'
|
||||
$ GOTO DISPLAY_LOOP
|
||||
$ ELSE
|
||||
$ CALL INVALID_ENTRY
|
||||
$ GOTO RETRY
|
||||
$ ENDIF
|
||||
$ ENDIF
|
||||
$ IF F$EDIT (OPT,"TRIM,UPCASE") .EQS. "N"
|
||||
$ THEN
|
||||
$ IF PAGE_CTR .LT. PAGE_MAX
|
||||
$ THEN
|
||||
$ PAGE_CTR = PAGE_CTR + 1
|
||||
$ PAGE_'PAGE_CTR'_REC_CTR = REC_CTR
|
||||
$ PAGE_TXT = F$FAO (" Page !UL of !UL ", PAGE_CTR, PAGE_MAX)
|
||||
$ _COL = P2 + (BOX_WIDTH - F$LENGTH (PAGE_TXT)) + 2
|
||||
$ SAY ESC + "[''P3';''_COL'H''BOLD'''PAGE_TXT'''NORM'"
|
||||
$ FILL_BOX 'P2' 'P3' 'P4' 'P5'
|
||||
$ ELSE
|
||||
$ CALL INVALID_ENTRY
|
||||
$ GOTO RETRY
|
||||
$ ENDIF
|
||||
$ ENDIF
|
||||
$ FILL_BOX 'P2' 'P3' 'P4' 'P5'
|
||||
$ ROW = TOP_ROW
|
||||
$ GOTO WRAP_LOOP
|
||||
$ ENDIF
|
||||
$ REC_CTR = REC_CTR + 1
|
||||
$ ROW = ROW + 1
|
||||
$ GOTO DISPLAY_LOOP
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Display the invalid entry
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$INVALID_ENTRY: SUBROUTINE
|
||||
$!
|
||||
$ SAY ESC + "[''INPUT_ROW';01H", BELL, " Invalid Entry, Try again ...''CEOL'"
|
||||
$ Wait 00:00:01.5
|
||||
$ SAY ESC + "[''INPUT_ROW';01H", CEOL
|
||||
$!
|
||||
$ EXIT
|
||||
$!
|
||||
$ ENDSUBROUTINE
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Exit
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$EXIT:
|
||||
$!
|
||||
$ DEFINE /USER /NOLOG SYS$ERROR NL:
|
||||
$ DEFINE /USER /NOLOG SYS$OUTPUT NL:
|
||||
$ CLOSE IFILE
|
||||
$!
|
||||
$ Verify = F$VERIFY (Verify)
|
||||
$!
|
||||
$ EXIT
|
||||
759
VMS/cert_tool/ssl$sign_cert.com
Normal file
759
VMS/cert_tool/ssl$sign_cert.com
Normal file
@@ -0,0 +1,759 @@
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! SSL$SIGN_CERT.COM - SSL Sign Certificate Request procedure
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ Verify = F$VERIFY (0)
|
||||
$ Set NoOn
|
||||
$ Set NoControl=Y
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Description
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$! This procedure prompts the user through creating a Server Certificate.
|
||||
$!
|
||||
$! There are no parameters used.
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Define symbols
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ DELETE := DELETE
|
||||
$ SAY := WRITE SYS$OUTPUT
|
||||
$ ASK := READ SYS$COMMAND /END_OF_FILE=EXIT /PROMPT=
|
||||
$ PID = F$GETJPI ("","PID")
|
||||
$ TT_NOECHO = F$GETDVI ("TT:","TT_NOECHO")
|
||||
$ On Control_Y THEN GOTO EXIT
|
||||
$ Set Control=Y
|
||||
$!
|
||||
$ TT_ROWS = F$GETDVI ("TT:","TT_PAGE")
|
||||
$ TT_COLS = F$GETDVI ("TT:","DEVBUFSIZ")
|
||||
$!
|
||||
$ GET_USER_DATA := CALL GET_USER_DATA
|
||||
$ SET_USER_DATA := CALL SET_USER_DATA
|
||||
$ DEL_USER_DATA := CALL DEL_USER_DATA
|
||||
$ INIT_TERM := @SSL$COM:SSL$INIT_TERM
|
||||
$ SHOW_FILE := @SSL$COM:SSL$SHOW_FILE
|
||||
$ SSL_CONF_FILE = F$TRNLMN ("SSL$CA_CONF")
|
||||
$ GET_CONF_DATA := @SSL$COM:SSL$CONF_UTIL 'SSL_CONF_FILE' GET
|
||||
$ SET_CONF_DATA := @SSL$COM:SSL$CONF_UTIL 'SSL_CONF_FILE' SET
|
||||
$!
|
||||
$ ESC[0,8] = 27 ! Set the Escape Character
|
||||
$ BELL[0,8] = 7 ! Ring the terminal Bell
|
||||
$ RED = 1 ! Color - Red
|
||||
$ FGD = 30 ! Foreground
|
||||
$ BGD = 0 ! Background
|
||||
$ CSCR = ESC + "[2J" ! Clear the Screen
|
||||
$ CEOS = ESC + "[0J" ! Clear to the End of the Screen
|
||||
$ CEOL = ESC + "[0K" ! Clear to the End of the Line
|
||||
$ NORM = ESC + "[0m" ! Turn Attributes off
|
||||
$ BLNK = ESC + "[5m" ! Turn on BLINK Attribute
|
||||
$ WIDE = ESC + "#6" ! Turn on WIDE Attribute
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Run the SSL setup if it hasn't been run yet
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ IF F$TRNLNM ("SSL$ROOT") .EQS. ""
|
||||
$ THEN
|
||||
$ IF F$SEARCH ("SSL$COM:SSL$INIT_ENV.COM") .NES. ""
|
||||
$ THEN
|
||||
$ @SSL$COM:SSL$INIT_ENV.COM
|
||||
$ ELSE
|
||||
$ SAY BELL, "Unable to locate SSL$COM:SSL$INIT_ENV.COM ..."
|
||||
$ GOTO EXIT
|
||||
$ ENDIF
|
||||
$ ENDIF
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Display the Page Header
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ INIT_TERM
|
||||
$ BCOLOR = BGD
|
||||
$ FCOLOR = FGD + RED
|
||||
$ COLOR = ESC + "[''BCOLOR';''FCOLOR'm"
|
||||
$!
|
||||
$ TEXT = "SSL Certificate Tool"
|
||||
$ COL = (TT_COLS - (F$LENGTH (TEXT) * 2)) / 4
|
||||
$!
|
||||
$ SAY ESC + "[01;01H", CSCR
|
||||
$ SAY ESC + "[02;''COL'H", COLOR, WIDE, TEXT, NORM
|
||||
$!
|
||||
$ TEXT = "Sign Certificate Request"
|
||||
$ COL = (TT_COLS - F$LENGTH (TEXT)) / 2
|
||||
$!
|
||||
$ SAY ESC + "[04;01H"
|
||||
$ SAY ESC + "[04;''COL'H", COLOR, TEXT, NORM
|
||||
$!
|
||||
$ CTR = 1
|
||||
$ ROW = 6
|
||||
$ COL = 2
|
||||
$ TOP_ROW = ROW
|
||||
$ MSG_ROW = TT_ROWS - 1
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Initialize the Request Data
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ IF F$SEARCH ("''SSL_CONF_FILE'") .NES. ""
|
||||
$ THEN
|
||||
$ SAY ESC + "[''MSG_ROW';01H", BLNK, " Reading Configuration ...", NORM
|
||||
$ ELSE
|
||||
$ SAY ESC + "[''MSG_ROW';01H", BLNK, " Initializing Configuration ...", NORM
|
||||
$ ENDIF
|
||||
$!
|
||||
$ _ca = "ca"
|
||||
$!
|
||||
$ _default_ca = "CA_default_ca"
|
||||
$ _default_ca_upd = "Y"
|
||||
$!
|
||||
$ _default_serfile = "SSL$DB:SERIAL.TXT"
|
||||
$ _default_serfile_upd = "Y"
|
||||
$!
|
||||
$ _default_idxfile = "SSL$DB:INDEX.TXT"
|
||||
$ _default_idxfile_upd = "Y"
|
||||
$!
|
||||
$ _default_crtfile = "SSL$CRT:SERVER_CA.CRT"
|
||||
$ _default_crtfile_upd = "Y"
|
||||
$!
|
||||
$ _default_keyfile = "SSL$KEY:SERVER_CA.KEY"
|
||||
$ _default_keyfile_upd = "Y"
|
||||
$!
|
||||
$ _default_csrfile = "SSL$CSR:SERVER.CSR"
|
||||
$ _default_csrfile_upd = "Y"
|
||||
$!
|
||||
$ _default_sgnfile = "SSL$CRT:SIGNED.CRT"
|
||||
$ _default_sgnfile_upd = "Y"
|
||||
$!
|
||||
$ _default_newcert = "SSL$CRT"
|
||||
$ _default_newcert_upd = "Y"
|
||||
$!
|
||||
$ _default_md = "md5"
|
||||
$ _default_md_upd = "Y"
|
||||
$!
|
||||
$ _default_days = "365"
|
||||
$ _default_days_upd = "Y"
|
||||
$!
|
||||
$ _default_policy = "policy_anything"
|
||||
$ _default_policy_upd = "Y"
|
||||
$!
|
||||
$ _policy_countryName = "optional"
|
||||
$ _policy_countryName_upd = "Y"
|
||||
$!
|
||||
$ _policy_stateOrProvinceName = "optional"
|
||||
$ _policy_stateOrProvinceName_upd = "Y"
|
||||
$!
|
||||
$ _policy_localityName = "optional"
|
||||
$ _policy_localityName_upd = "Y"
|
||||
$!
|
||||
$ _policy_organizationName = "optional"
|
||||
$ _policy_organizationName_upd = "Y"
|
||||
$!
|
||||
$ _policy_organizationalUnitName = "optional"
|
||||
$ _policy_organizationalUnitName_upd = "Y"
|
||||
$!
|
||||
$ _policy_commonName = "supplied"
|
||||
$ _policy_commonName_upd = "Y"
|
||||
$!
|
||||
$ _policy_emailAddress = "optional"
|
||||
$ _policy_emailAddress_upd = "Y"
|
||||
$!
|
||||
$ _default_x509_extensions = "CA_x509_extensions"
|
||||
$ _default_x509_extensions_upd = "Y"
|
||||
$!
|
||||
$ _x509_basicContraints = "CA:FALSE"
|
||||
$ _x509_basicContraints_upd = "Y"
|
||||
$!
|
||||
$ _x509_nsCertType = "client,email,objsign,server"
|
||||
$ _x509_nsCertType_upd = "Y"
|
||||
$!
|
||||
$ _x509_nsComment = "SSL Generated Certificate"
|
||||
$ _x509_nsComment_upd = "Y"
|
||||
$!
|
||||
$ _x509_subjectKeyIdentifier = "hash"
|
||||
$ _x509_subjectKeyIdentifier_upd = "Y"
|
||||
$!
|
||||
$ _x509_authorityKeyIdentifier = "keyid,issuer:always"
|
||||
$ _x509_authorityKeyIdentifier_upd = "Y"
|
||||
$!
|
||||
$ IF F$SEARCH ("''SSL_CONF_FILE'") .NES. ""
|
||||
$ THEN
|
||||
$ GET_CONF_DATA "[''_ca']#default_ca"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _default_ca = SSL_CONF_DATA
|
||||
$ _default_ca_upd = "N"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ GET_CONF_DATA "[''_default_ca']#serial"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _default_serfile = F$PARSE (SSL_CONF_DATA,"SSL$ROOT:",,"DEVICE") + -
|
||||
F$PARSE (SSL_CONF_DATA,"[DB]",,"DIRECTORY") + -
|
||||
F$PARSE (SSL_CONF_DATA,"SERIAL",,"NAME") + -
|
||||
F$PARSE (SSL_CONF_DATA,".TXT",,"TYPE")
|
||||
$ _default_serfile_upd = "N"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ GET_CONF_DATA "[''_default_ca']#database"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _default_idxfile = F$PARSE (SSL_CONF_DATA,"SSL$ROOT:",,"DEVICE") + -
|
||||
F$PARSE (SSL_CONF_DATA,"[DB]",,"DIRECTORY") + -
|
||||
F$PARSE (SSL_CONF_DATA,"INDEX",,"NAME") + -
|
||||
F$PARSE (SSL_CONF_DATA,".TXT",,"TYPE")
|
||||
$ _default_idxfile_upd = "N"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ GET_CONF_DATA "[''_default_ca']#certificate"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _default_crtfile = F$PARSE (SSL_CONF_DATA,"SSL$ROOT:",,"DEVICE") + -
|
||||
F$PARSE (SSL_CONF_DATA,"[CRT]",,"DIRECTORY") + -
|
||||
F$PARSE (SSL_CONF_DATA,"SERVER_CA",,"NAME") + -
|
||||
F$PARSE (SSL_CONF_DATA,".CRT",,"TYPE")
|
||||
$ _default_crtfile_upd = "N"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ GET_CONF_DATA "[''_default_ca']#private_key"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _default_keyfile = F$PARSE (SSL_CONF_DATA,"SSL$ROOT:",,"DEVICE") + -
|
||||
F$PARSE (SSL_CONF_DATA,"[KEY]",,"DIRECTORY") + -
|
||||
F$PARSE (SSL_CONF_DATA,"SERVER_CA",,"NAME") + -
|
||||
F$PARSE (SSL_CONF_DATA,".KEY",,"TYPE")
|
||||
$ _default_keyfile_upd = "N"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ GET_CONF_DATA "[''_default_ca']#new_certs_dir"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _default_newcert = SSL_CONF_DATA
|
||||
$ _default_newcert_upd = "N"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ GET_CONF_DATA "[''_default_ca']#default_md"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _default_md = SSL_CONF_DATA
|
||||
$ _default_md_upd = "N"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ GET_CONF_DATA "[''_default_ca']#default_days"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _default_days = SSL_CONF_DATA
|
||||
$ _default_days_upd = "N"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ GET_CONF_DATA "[''_default_ca']#policy"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _default_policy = SSL_CONF_DATA
|
||||
$ _default_policy_upd = "N"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ GET_CONF_DATA "[''_default_policy']#countryName"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _policy_countryName = SSL_CONF_DATA
|
||||
$ _policy_countryName_upd = "N"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ GET_CONF_DATA "[''_default_policy']#stateOrProvinceName"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _policy_stateOrProvinceName = SSL_CONF_DATA
|
||||
$ _policy_stateOrProvinceName_upd = "N"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ GET_CONF_DATA "[''_default_policy']#localityName"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _policy_localityName = SSL_CONF_DATA
|
||||
$ _policy_localityName_upd = "N"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ GET_CONF_DATA "[''_default_policy']#organizationName"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _policy_organizationName = SSL_CONF_DATA
|
||||
$ _policy_organizationName_upd = "N"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ GET_CONF_DATA "[''_default_policy']#organizationalUnitName"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _policy_organizationalUnitName = SSL_CONF_DATA
|
||||
$ _policy_organizationalUnitName_upd = "N"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ GET_CONF_DATA "[''_default_policy']#commonName"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _policy_commonName = SSL_CONF_DATA
|
||||
$ _policy_commonName_upd = "N"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ GET_CONF_DATA "[''_default_policy']#emailAddress"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _policy_emailAddress = SSL_CONF_DATA
|
||||
$ _policy_emailAddress_upd = "N"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ GET_CONF_DATA "[''_default_ca']#x509_extensions"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _default_x509_extensions = SSL_CONF_DATA
|
||||
$ _default_x509_extensions_upd = "N"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ GET_CONF_DATA "[''_default_x509_extensions']#basicConstraints"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _x509_basicConstraints = SSL_CONF_DATA
|
||||
$ _x509_basicConstraints_upd = "N"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ GET_CONF_DATA "[''_default_x509_extensions']#nsCertType"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _x509_nsCertType = SSL_CONF_DATA
|
||||
$ _x509_nsCertType_upd = "N"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ GET_CONF_DATA "[''_default_x509_extensions']#nsComment"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _x509_nsComment = SSL_CONF_DATA
|
||||
$ _x509_nsComment_upd = "N"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ GET_CONF_DATA "[''_default_x509_extensions']#subjectKeyIdentifier"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _x509_subjectKeyIdentifier = SSL_CONF_DATA
|
||||
$ _x509_subjectKeyIdentifier_upd = "N"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ GET_CONF_DATA "[''_default_x509_extensions']#authorityKeyIdentifier"
|
||||
$ IF SSL_CONF_DATA .NES. ""
|
||||
$ THEN
|
||||
$ _x509_authorityKeyIdentifier = SSL_CONF_DATA
|
||||
$ _x509_authorityKeyIdentifier_upd = "N"
|
||||
$ ENDIF
|
||||
$ ENDIF
|
||||
$!
|
||||
$ SET_USER_DATA "[''_ca']#default_ca#D#''_default_ca'##S###''_default_ca_upd'#N#N"
|
||||
$ SET_USER_DATA "[''_default_ca']#serial#D#''_default_serfile'#Serial File ?#F###''_default_serfile_upd'#N#N"
|
||||
$ SET_USER_DATA "[''_default_ca']#database#D#''_default_idxfile'#Database File ?#F###''_default_idxfile_upd'#N#N"
|
||||
$ SET_USER_DATA "[''_default_ca']#certificate#D#''_default_crtfile'#CA Certificate File ?#F###''_default_crtfile_upd'#Y#N"
|
||||
$ SET_USER_DATA "[''_default_ca']#private_key#D#''_default_keyfile'#CA Certificate Key File ?#F###''_default_keyfile_upd'#Y#N"
|
||||
$ SET_USER_DATA "[]#default_csrfile#-#''_default_csrfile'#Certificate Request File ?#F###''_default_csrfile_upd'#Y#N"
|
||||
$ SET_USER_DATA "[]#default_sgnfile#-#''_default_sgnfile'#Signed Certificate File ?#F###''_default_sgnfile_upd'#Y#N"
|
||||
$ SET_USER_DATA "[''_default_ca']#new_certs_dir#D#''_default_newcert'#New Certificate Directory ?#S###''_default_newcert_upd'#N#N"
|
||||
$ SET_USER_DATA "[''_default_ca']#default_md#D#''_default_md'#Default Digest ?#I###''_default_md_upd'#N#N"
|
||||
$ SET_USER_DATA "[''_default_ca']#default_days#D#''_default_days'#Default Days ?#I###''_default_days_upd'#Y#N"
|
||||
$ SET_USER_DATA "[''_default_ca']#policy#D#''_default_policy'#Default Policy ?#S###''_default_policy_upd'#N#N"
|
||||
$ SET_USER_DATA "[''_default_policy']#countryName#D#''_policy_countryName'#Country Name Policy ?#S###''_policy_countryName_upd'#N#N"
|
||||
$ SET_USER_DATA "[''_default_policy']#stateOrProvinceName#D#''_policy_stateOrProvinceName'#State or Province Name Policy ?#S###''_policy_stateOrProvinceName_upd'#N#N"
|
||||
$ SET_USER_DATA "[''_default_policy']#localityName#D#''_policy_localityName'#Locality Name Policy ?#S###''_policy_localityName_upd'#N#N"
|
||||
$ SET_USER_DATA "[''_default_policy']#organizationName#D#''_policy_organizationName'#Organization Name Policy ?#S###''_policy_organizationName_upd'#N#N"
|
||||
$ SET_USER_DATA "[''_default_policy']#organizationalUnitName#D#''_policy_organizationalUnitName'#Organization Unit Name Policy ?#S###''_policy_organizationalUnitName_upd'#N#N"
|
||||
$ SET_USER_DATA "[''_default_policy']#commonName#D#''_policy_commonName'#Common Name Policy ?#S###''_policy_commonName_upd'#N#N"
|
||||
$ SET_USER_DATA "[''_default_policy']#emailAddress#D#''_policy_emailAddress'#Email Address Policy ?#S###''_policy_emailAddress_upd'#N#N"
|
||||
$ SET_USER_DATA "[''_default_ca']#x509_extensions#D#''_default_x509_extensions'#X509 Extensions ?#S###''_default_x509_extensions_upd'#N#N"
|
||||
$ SET_USER_DATA "[''_default_x509_extensions']#basicConstraints#D#''_x509_basicConstraints'#X509 Basic Constraints ?#S###''_x509_basicConstraints_upd'#N#N"
|
||||
$ SET_USER_DATA "[''_default_x509_extensions']#nsCertType#D#''_x509_nsCertType'#X509 NS Cert Type ?#S###''_x509_nsCertType_upd'#N#N"
|
||||
$ SET_USER_DATA "[''_default_x509_extensions']#nsComment#D#''_x509_nsComment'#X509 NS Comment ?#S###''_x509_nsComment_upd'#N#N"
|
||||
$ SET_USER_DATA "[''_default_x509_extensions']#subjectKeyIdentifier#D#''_x509_subjectKeyIdentifier'#X509 Subject Key Identifier ?#S###''_x509_subjectKeyIdentifier_upd'#N#N"
|
||||
$ SET_USER_DATA "[''_default_x509_extensions']#authorityKeyIdentifier#D#''_x509_authorityKeyIdentifier'#X509 Authority Key Identifier ?#S###''_x509_authorityKeyIdentifier_upd'#N#N"
|
||||
$ SET_USER_DATA "[]#pem_pass_phrase#-##PEM Pass Phrase ?#P#1###Y#N"
|
||||
$ SET_USER_DATA "[]#display_certificate#-#N#Display the Certificate ?#S##1##Y#N"
|
||||
$!
|
||||
$ SAY ESC + "[''MSG_ROW';01H", CEOS
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Confirm/Update the SSL Configuration Data
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$PROMPT_LOOP:
|
||||
$!
|
||||
$ IF CTR .LE. SSL_USER_DATA_MAX
|
||||
$ THEN
|
||||
$ KEY = F$ELEMENT (0,"#",SSL_USER_DATA_'CTR') ! Key Name
|
||||
$ ITM = F$ELEMENT (1,"#",SSL_USER_DATA_'CTR') ! Item Name
|
||||
$ VAL = F$ELEMENT (2,"#",SSL_USER_DATA_'CTR') ! Item Value Contains Default or Prompt
|
||||
$ DEF = F$ELEMENT (3,"#",SSL_USER_DATA_'CTR') ! Default Value
|
||||
$ PRM = F$ELEMENT (4,"#",SSL_USER_DATA_'CTR') ! Prompt Value
|
||||
$ TYP = F$ELEMENT (5,"#",SSL_USER_DATA_'CTR') ! Value Type
|
||||
$ MIN = F$ELEMENT (6,"#",SSL_USER_DATA_'CTR') ! Value Minimum Length
|
||||
$ MAX = F$ELEMENT (7,"#",SSL_USER_DATA_'CTR') ! Value Maximum Length
|
||||
$ UPD = F$ELEMENT (8,"#",SSL_USER_DATA_'CTR') ! Entry Updated ?
|
||||
$ REQ = F$ELEMENT (9,"#",SSL_USER_DATA_'CTR') ! Entry Required for Input ?
|
||||
$ CFM = F$ELEMENT (10,"#",SSL_USER_DATA_'CTR')! Confirm Input ?
|
||||
$ CONFIRMED = 0
|
||||
$ IF REQ .EQS. "N"
|
||||
$ THEN
|
||||
$ CTR = CTR + 1
|
||||
$ GOTO PROMPT_LOOP
|
||||
$ ENDIF
|
||||
$ IF ROW .GT. MSG_ROW - 2
|
||||
$ THEN
|
||||
$ SAY ESC + "[''TOP_ROW';01H", CEOS
|
||||
$ ROW = TOP_ROW
|
||||
$ ENDIF
|
||||
$!
|
||||
$CONFIRM_LOOP:
|
||||
$!
|
||||
$ IF PRM .EQS. ""
|
||||
$ THEN
|
||||
$ PROMPT = ESC + "[''ROW';''COL'H''ITM' ? [''DEF'] ''CEOL'"
|
||||
$ ELSE
|
||||
$ PROMPT = ESC + "[''ROW';''COL'H''PRM' [''DEF'] ''CEOL'"
|
||||
$ ENDIF
|
||||
$ IF TYP .EQS. "P" THEN SET TERMINAL /NOECHO
|
||||
$ ASK "''PROMPT'" ANS /END_OF_FILE=EXIT
|
||||
$ IF TYP .EQS. "P" THEN SET TERMINAL /ECHO
|
||||
$ ANS = F$EDIT (ANS,"TRIM")
|
||||
$ IF ANS .EQS. "" THEN ANS = DEF
|
||||
$ IF TYP .EQS. "F"
|
||||
$ THEN
|
||||
$ ANS = F$PARSE ("''ANS'","''DEF'",,,"SYNTAX_ONLY")
|
||||
$ ENDIF
|
||||
$ IF TYP .EQS. "I" .AND. F$TYPE (ANS) .NES. "INTEGER"
|
||||
$ THEN
|
||||
$ CALL INVALID_ENTRY
|
||||
$ SAY ESC + "[''ROW';01H", CEOS
|
||||
$ GOTO PROMPT_LOOP
|
||||
$ ENDIF
|
||||
$ IF (TYP .EQS. "S" .OR. TYP .EQS. "P") .AND. -
|
||||
((MIN .NES. "" .AND. F$LENGTH (ANS) .LT. F$INTEGER(MIN)) .OR. -
|
||||
(MAX .NES. "" .AND. F$LENGTH (ANS) .GT. F$INTEGER(MAX)))
|
||||
$ THEN
|
||||
$ CALL INVALID_ENTRY
|
||||
$ SAY ESC + "[''ROW';01H", CEOS
|
||||
$ IF TYP .EQS. "S" THEN GOTO PROMPT_LOOP
|
||||
$ IF TYP .EQS. "P" THEN GOTO CONFIRM_LOOP
|
||||
$ ENDIF
|
||||
$ ROW = ROW + 1
|
||||
$ IF CFM .EQS. "Y"
|
||||
$ THEN
|
||||
$ IF CONFIRMED .EQ. 0
|
||||
$ THEN
|
||||
$ CONFIRMED = 1
|
||||
$ CONFIRMED_ANS = ANS
|
||||
$ PRM = "Confirm ''PRM'"
|
||||
$ GOTO CONFIRM_LOOP
|
||||
$ ELSE
|
||||
$ IF ANS .NES. CONFIRMED_ANS
|
||||
$ THEN
|
||||
$ CALL INVALID_ENTRY
|
||||
$ ROW = ROW - 2
|
||||
$ SAY ESC + "[''ROW';01H", CEOS
|
||||
$ GOTO PROMPT_LOOP
|
||||
$ ENDIF
|
||||
$ ENDIF
|
||||
$ ENDIF
|
||||
$ IF ANS .NES. DEF THEN SSL_USER_DATA_'CTR' = "''KEY'#''ITM'#''VAL'#''ANS'#''PRM'#''TYP'#''MIN'#''MAX'#Y#''REQ'#''CFM'"
|
||||
$ CTR = CTR + 1
|
||||
$ GOTO PROMPT_LOOP
|
||||
$ ENDIF
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Save the SSL Configuration Data
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ CTR = 1
|
||||
$ SAY ESC + "[''MSG_ROW';01H", BLNK, " Saving Configuration ...", NORM
|
||||
$!
|
||||
$SAVE_CONF_LOOP:
|
||||
$!
|
||||
$ IF CTR .LE. SSL_USER_DATA_MAX
|
||||
$ THEN
|
||||
$ KEY = F$ELEMENT (0,"#",SSL_USER_DATA_'CTR') ! Key Name
|
||||
$ ITM = F$ELEMENT (1,"#",SSL_USER_DATA_'CTR') ! Item Name
|
||||
$ VAL = F$ELEMENT (2,"#",SSL_USER_DATA_'CTR') ! Item Value Contains Default or Prompt
|
||||
$ DEF = F$ELEMENT (3,"#",SSL_USER_DATA_'CTR') ! Default Value
|
||||
$ PRM = F$ELEMENT (4,"#",SSL_USER_DATA_'CTR') ! Prompt Value
|
||||
$ TYP = F$ELEMENT (5,"#",SSL_USER_DATA_'CTR') ! Value Type
|
||||
$ MIN = F$ELEMENT (6,"#",SSL_USER_DATA_'CTR') ! Value Minimum Length
|
||||
$ MAX = F$ELEMENT (7,"#",SSL_USER_DATA_'CTR') ! Value Maximum Length
|
||||
$ UPD = F$ELEMENT (8,"#",SSL_USER_DATA_'CTR') ! Entry Updated ?
|
||||
$ REQ = F$ELEMENT (9,"#",SSL_USER_DATA_'CTR') ! Entry Required for Input ?
|
||||
$ CFM = F$ELEMENT (10,"#",SSL_USER_DATA_'CTR')! Confirm Input ?
|
||||
$ IF UPD .NES. "Y" .OR. VAL .EQS. "-"
|
||||
$ THEN
|
||||
$ CTR = CTR + 1
|
||||
$ GOTO SAVE_CONF_LOOP
|
||||
$ ENDIF
|
||||
$ IF VAL .EQS. "D"
|
||||
$ THEN
|
||||
$ SET_CONF_DATA "''KEY'#''ITM'" "''DEF'"
|
||||
$ ELSE
|
||||
$ SET_CONF_DATA "''KEY'#''ITM'" "''PRM'"
|
||||
$ SET_CONF_DATA "''KEY'#''ITM'_default" "''DEF'"
|
||||
$ ENDIF
|
||||
$ IF MIN .NES. "" THEN SET_CONF_DATA "''KEY'#''ITM'_min" "''MIN'"
|
||||
$ IF MAX .NES. "" THEN SET_CONF_DATA "''KEY'#''ITM'_max" "''MAX'"
|
||||
$ CTR = CTR + 1
|
||||
$ GOTO SAVE_CONF_LOOP
|
||||
$ ENDIF
|
||||
$!
|
||||
$ PURGE /NOLOG /NOCONFIRM 'SSL_CONF_FILE'
|
||||
$ RENAME 'SSL_CONF_FILE'; ;1
|
||||
$!
|
||||
$ SAY ESC + "[''MSG_ROW';01H", CEOS
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Create the Certificiate Authority
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$SKIP:
|
||||
$!
|
||||
$ SAY ESC + "[''MSG_ROW';01H", BLNK, " Signing Certificate Request ...", NORM
|
||||
$!
|
||||
$ X1 = 2
|
||||
$ Y1 = TOP_ROW
|
||||
$ X2 = TT_COLS - 2
|
||||
$ Y2 = MSG_ROW - 1
|
||||
$!
|
||||
$ GET_USER_DATA "[]#pem_pass_phrase"
|
||||
$ _pem_pass_phrase = SSL_USER_DATA
|
||||
$ GET_USER_DATA "[''_default_ca']#database"
|
||||
$ _default_idxfile = SSL_USER_DATA
|
||||
$ GET_USER_DATA "[''_default_ca']#serial"
|
||||
$ _default_serfile = SSL_USER_DATA
|
||||
$ GET_USER_DATA "[]#default_csrfile"
|
||||
$ _default_csrfile = SSL_USER_DATA
|
||||
$ GET_USER_DATA "[]#default_sgnfile"
|
||||
$ _default_sgnfile = SSL_USER_DATA
|
||||
$ GET_USER_DATA "[]#display_certificate"
|
||||
$ _display_certificate = SSL_USER_DATA
|
||||
$!
|
||||
$ IF F$SEARCH ("''_default_idxfile'") .EQS. ""
|
||||
$ THEN
|
||||
$ OPEN /WRITE OFILE '_default_idxfile'
|
||||
$ CLOSE OFILE
|
||||
$ ENDIF
|
||||
$!
|
||||
$ IF F$SEARCH ("''_default_serfile'") .EQS. ""
|
||||
$ THEN
|
||||
$ OPEN /WRITE OFILE '_default_serfile'
|
||||
$ WRITE OFILE "01"
|
||||
$ CLOSE OFILE
|
||||
$ ENDIF
|
||||
$!
|
||||
$ DEFINE /USER /NOLOG SYS$ERROR NL:
|
||||
$ DEFINE /USER /NOLOG SYS$OUTPUT NL:
|
||||
$ SHOW SYSTEM /FULL /OUT=SYS$LOGIN:SSL_CA_'PID'.RND
|
||||
$!
|
||||
$ OPEN /WRITE OFILE SYS$LOGIN:SSL_CA_'PID'.COM
|
||||
$ WRITE OFILE "$ SET NOON"
|
||||
$ WRITE OFILE "$ SET MESSAGE /NOFACILITY /NOIDENTIFICATION /NOSEVERITY /NOTEXT"
|
||||
$ WRITE OFILE "$ DEFINE /USER /NOLOG RANDFILE SYS$LOGIN:SSL_CA_''PID'.RND"
|
||||
$ WRITE OFILE "$ DEFINE /USER /NOLOG SYS$ERROR SYS$LOGIN:SSL_CA_''PID'.LOG"
|
||||
$ WRITE OFILE "$ DEFINE /USER /NOLOG SYS$OUTPUT SYS$LOGIN:SSL_CA_''PID'.LOG"
|
||||
$ WRITE OFILE "$ DEFINE /USER /NOLOG SYS$COMMAND SYS$INPUT"
|
||||
$ WRITE OFILE "$ OPENSSL ca -config ''SSL_CONF_FILE' -out ''_default_sgnfile' -infiles ''_default_csrfile'"
|
||||
$ WRITE OFILE "''_pem_pass_phrase'"
|
||||
$ WRITE OFILE "y"
|
||||
$ WRITE OFILE "y"
|
||||
$ WRITE OFILE "$ SET MESSAGE /FACILITY /IDENTIFICATION /SEVERITY /TEXT"
|
||||
$ CLOSE OFILE
|
||||
$!
|
||||
$ @SYS$LOGIN:SSL_CA_'PID'.COM
|
||||
$!
|
||||
$ DELETE/NOLOG/NOCONFIRM SYS$LOGIN:SSL_CA_'PID'.RND;*
|
||||
$ DELETE/NOLOG/NOCONFIRM SYS$LOGIN:SSL_CA_'PID'.COM;*
|
||||
$!
|
||||
$ DEFINE /USER /NOLOG SYS$ERROR NL:
|
||||
$ DEFINE /USER /NOLOG SYS$OUTPUT NL:
|
||||
$ SEARCH SYS$LOGIN:SSL_CA_'PID'.LOG /OUT=SYS$LOGIN:SSL_CA_'PID'.ERR "error:"
|
||||
$ IF F$SEARCH ("SYS$LOGIN:SSL_CA_''PID'.ERR") .NES. ""
|
||||
$ THEN
|
||||
$ IF F$FILE_ATTRIBUTE ("SYS$LOGIN:SSL_CA_''PID'.ERR","ALQ") .NE. 0
|
||||
$ THEN
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_CA_'PID'.ERR;*
|
||||
$ SAY ESC + "[''MSG_ROW';01H''BELL'''CEOS'"
|
||||
$ SHOW_FILE "SYS$LOGIN:SSL_CA_''PID'.LOG" 'X1' 'Y1' 'X2' 'Y2' "< ERROR >"
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_CA_'PID'.LOG;*
|
||||
$ GOTO EXIT
|
||||
$ ENDIF
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_CA_'PID'.ERR;*
|
||||
$ ENDIF
|
||||
$!
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_CA_'PID'.LOG;*
|
||||
$!
|
||||
$ IF F$EDIT (_display_certificate,"TRIM,UPCASE") .EQS. "Y"
|
||||
$ THEN
|
||||
$ SAY ESC + "[''MSG_ROW';01H", BLNK, " Generating Output ...", NORM, CEOL
|
||||
$!
|
||||
$ OPEN /WRITE OFILE SYS$LOGIN:SSL_X509_'PID'.COM
|
||||
$ WRITE OFILE "$ DEFINE /USER /NOLOG SYS$ERROR SYS$LOGIN:SSL_X509_''PID'.LOG"
|
||||
$ WRITE OFILE "$ DEFINE /USER /NOLOG SYS$OUTPUT SYS$LOGIN:SSL_X509_''PID'.LOG"
|
||||
$ WRITE OFILE "$ DEFINE /USER /NOLOG SYS$COMMAND SYS$INPUT"
|
||||
$ WRITE OFILE "$ OPENSSL x509 -noout -text -in ''_default_sgnfile'"
|
||||
$ CLOSE OFILE
|
||||
$!
|
||||
$ @SYS$LOGIN:SSL_X509_'PID'.COM
|
||||
$!
|
||||
$ DELETE/NOLOG/NOCONFIRM SYS$LOGIN:SSL_X509_'PID'.COM;*
|
||||
$!
|
||||
$ DEFINE /USER /NOLOG SYS$ERROR NL:
|
||||
$ DEFINE /USER /NOLOG SYS$OUTPUT NL:
|
||||
$ SEARCH SYS$LOGIN:SSL_X509_'PID'.LOG /OUT=SYS$LOGIN:SSL_X509_'PID'.ERR ":error:"
|
||||
$ IF F$SEARCH ("SYS$LOGIN:SSL_X509_''PID'.ERR") .NES. ""
|
||||
$ THEN
|
||||
$ IF F$FILE_ATTRIBUTE ("SYS$LOGIN:SSL_X509_''PID'.ERR","ALQ") .NE. 0
|
||||
$ THEN
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_X509_'PID'.ERR;*
|
||||
$ SAY ESC + "[''MSG_ROW';01H''BELL'''CEOS'"
|
||||
$ SHOW_FILE "SYS$LOGIN:SSL_X509_''PID'.LOG" 'X1' 'Y1' 'X2' 'Y2' "< ERROR >"
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_X509_'PID'.LOG;*
|
||||
$ GOTO EXIT
|
||||
$ ENDIF
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_X509_'PID'.ERR;*
|
||||
$ ENDIF
|
||||
$!
|
||||
$ SAY ESC + "[''MSG_ROW';01H''CEOS'"
|
||||
$ SHOW_FILE "SYS$LOGIN:SSL_X509_''PID'.LOG" 'X1' 'Y1' 'X2' 'Y2' "< ''_default_sgnfile' >"
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_X509_'PID'.LOG;*
|
||||
$ GOTO EXIT
|
||||
$ ENDIF
|
||||
$!
|
||||
$ TEXT = "Press return to continue"
|
||||
$ COL = (TT_COLS - F$LENGTH (TEXT)) / 2
|
||||
$!
|
||||
$ SAY ESC + "[''MSG_ROW';01H", CEOS
|
||||
$ PROMPT = ESC + "[''MSG_ROW';''COL'H''TEXT'"
|
||||
$ ASK "''PROMPT'" OPT
|
||||
$!
|
||||
$GOTO EXIT
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Set the User Data
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$SET_USER_DATA: SUBROUTINE
|
||||
$!
|
||||
$ IF F$TYPE (SSL_USER_DATA_MAX) .EQS. ""
|
||||
$ THEN
|
||||
$ SSL_USER_DATA_MAX == 1
|
||||
$ ELSE
|
||||
$ SSL_USER_DATA_MAX == SSL_USER_DATA_MAX + 1
|
||||
$ ENDIF
|
||||
$!
|
||||
$ SSL_USER_DATA_'SSL_USER_DATA_MAX' == "''P1'"
|
||||
$!
|
||||
$ EXIT
|
||||
$!
|
||||
$ ENDSUBROUTINE
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Find the Request Data
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$GET_USER_DATA: SUBROUTINE
|
||||
$!
|
||||
$ CTR = 1
|
||||
$ USER_KEY = F$ELEMENT (0,"#",P1)
|
||||
$ USER_ITM = F$ELEMENT (1,"#",P1)
|
||||
$!
|
||||
$GET_USER_DATA_LOOP:
|
||||
$!
|
||||
$ IF CTR .LE. SSL_USER_DATA_MAX
|
||||
$ THEN
|
||||
$ KEY = F$ELEMENT (0,"#",SSL_USER_DATA_'CTR') ! Key Name
|
||||
$ ITM = F$ELEMENT (1,"#",SSL_USER_DATA_'CTR') ! Item Name
|
||||
$ VAL = F$ELEMENT (2,"#",SSL_USER_DATA_'CTR') ! Item Value Contains Default or Prompt
|
||||
$ DEF = F$ELEMENT (3,"#",SSL_USER_DATA_'CTR') ! Default Value
|
||||
$ PRM = F$ELEMENT (4,"#",SSL_USER_DATA_'CTR') ! Prompt Value
|
||||
$ IF USER_KEY .NES. KEY .OR. USER_ITM .NES. ITM
|
||||
$ THEN
|
||||
$ CTR = CTR + 1
|
||||
$ GOTO GET_USER_DATA_LOOP
|
||||
$ ENDIF
|
||||
$ IF VAL .EQS. "-" THEN SSL_USER_DATA == "''DEF'"
|
||||
$ IF VAL .EQS. "D" THEN SSL_USER_DATA == "''DEF'"
|
||||
$ IF VAL .EQS. "P" THEN SSL_USER_DATA == "''PRM'"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ EXIT
|
||||
$!
|
||||
$ ENDSUBROUTINE
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Delete the User Data
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$DEL_USER_DATA: SUBROUTINE
|
||||
$!
|
||||
$ IF F$TYPE (SSL_USER_DATA_MAX) .EQS. "" THEN GOTO DEL_USER_DATA_END
|
||||
$!
|
||||
$DEL_USER_DATA_LOOP:
|
||||
$!
|
||||
$ IF F$TYPE (SSL_USER_DATA_'SSL_USER_DATA_MAX') .NES. ""
|
||||
$ THEN
|
||||
$ DELETE /SYMBOL /GLOBAL SSL_USER_DATA_'SSL_USER_DATA_MAX'
|
||||
$ SSL_USER_DATA_MAX == SSL_USER_DATA_MAX - 1
|
||||
$ GOTO DEL_USER_DATA_LOOP
|
||||
$ ENDIF
|
||||
$!
|
||||
$ DELETE /SYMBOL /GLOBAL SSL_USER_DATA_MAX
|
||||
$!
|
||||
$DEL_USER_DATA_END:
|
||||
$!
|
||||
$ IF F$TYPE (SSL_USER_DATA) .NES. "" THEN DELETE /SYMBOL /GLOBAL SSL_USER_DATA
|
||||
$!
|
||||
$ EXIT
|
||||
$!
|
||||
$ ENDSUBROUTINE
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Display the invalid entry
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$INVALID_ENTRY: SUBROUTINE
|
||||
$!
|
||||
$ SAY ESC + "[''MSG_ROW';01H", BELL, " Invalid Entry, Try again ...''CEOL'"
|
||||
$ Wait 00:00:01.5
|
||||
$ SAY ESC + "[''MSG_ROW';01H", CEOL
|
||||
$!
|
||||
$ EXIT
|
||||
$!
|
||||
$ ENDSUBROUTINE
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Exit the procedure
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$EXIT:
|
||||
$!
|
||||
$ DEFINE /USER /NOLOG SYS$ERROR NL:
|
||||
$ DEFINE /USER /NOLOG SYS$OUTPUT NL:
|
||||
$ DEASSIGN SYS$OUTPUT
|
||||
$!
|
||||
$ DEFINE /USER /NOLOG SYS$ERROR NL:
|
||||
$ DEFINE /USER /NOLOG SYS$OUTPUT NL:
|
||||
$ DEASSIGN SYS$ERROR
|
||||
$!
|
||||
$ DEFINE /USER /NOLOG SYS$ERROR NL:
|
||||
$ DEFINE /USER /NOLOG SYS$OUTPUT NL:
|
||||
$ CLOSE OFILE
|
||||
$!
|
||||
$ DEL_USER_DATA
|
||||
$!
|
||||
$ IF F$TYPE (SSL_CONF_DATA) .NES. "" THEN DELETE /SYMBOL /GLOBAL SSL_CONF_DATA
|
||||
$!
|
||||
$ IF F$GETDVI ("TT:","TT_NOECHO") .AND. .NOT. TT_NOECHO THEN SET TERMINAL /ECHO
|
||||
$!
|
||||
$ IF F$SEARCH ("SYS$LOGIN:SSL_CA_''PID'.%%%;*") .NES. "" THEN DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_CA_'PID'.%%%;*
|
||||
$ IF F$SEARCH ("SYS$LOGIN:SSL_X509_''PID'.%%%;*") .NES. "" THEN DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_X509_'PID'.%%%;*
|
||||
$!
|
||||
$ Verify = F$VERIFY (Verify)
|
||||
$!
|
||||
$ EXIT
|
||||
245
VMS/cert_tool/ssl$view_cert.com
Normal file
245
VMS/cert_tool/ssl$view_cert.com
Normal file
@@ -0,0 +1,245 @@
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! SSL$VIEW_CERT.COM - SSL View Certificate procedure
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ Verify = F$VERIFY (0)
|
||||
$ Set NoOn
|
||||
$ Set NoControl=Y
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Description
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$! This procedure prompts the user through creating a Server Certificate.
|
||||
$!
|
||||
$! The parameters used are:
|
||||
$!
|
||||
$! P1 - Certificate or Certificate Request (i.e. "CRT" or "CSR")
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Define symbols
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ DELETE := DELETE
|
||||
$ SAY := WRITE SYS$OUTPUT
|
||||
$ ASK := READ SYS$COMMAND /END_OF_FILE=EXIT /PROMPT=
|
||||
$ PID = F$GETJPI ("","PID")
|
||||
$ TT_NOECHO = F$GETDVI ("TT:","TT_NOECHO")
|
||||
$ On Control_Y THEN GOTO EXIT
|
||||
$ Set Control=Y
|
||||
$!
|
||||
$ TT_ROWS = F$GETDVI ("TT:","TT_PAGE")
|
||||
$ TT_COLS = F$GETDVI ("TT:","DEVBUFSIZ")
|
||||
$!
|
||||
$ INIT_TERM := @SSL$COM:SSL$INIT_TERM
|
||||
$ PICK_FILE := @SSL$COM:SSL$PICK_FILE
|
||||
$ SHOW_FILE := @SSL$COM:SSL$SHOW_FILE
|
||||
$!
|
||||
$ ESC[0,8] = 27 ! Set the Escape Character
|
||||
$ BELL[0,8] = 7 ! Ring the terminal Bell
|
||||
$ RED = 1 ! Color - Red
|
||||
$ FGD = 30 ! Foreground
|
||||
$ BGD = 0 ! Background
|
||||
$ CSCR = ESC + "[2J" ! Clear the Screen
|
||||
$ CEOS = ESC + "[0J" ! Clear to the End of the Screen
|
||||
$ CEOL = ESC + "[0K" ! Clear to the End of the Line
|
||||
$ NORM = ESC + "[0m" ! Turn Attributes off
|
||||
$ BLNK = ESC + "[5m" ! Turn on BLINK Attribute
|
||||
$ WIDE = ESC + "#6" ! Turn on WIDE Attribute
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Run the SSL setup if it hasn't been run yet
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ IF F$TRNLNM ("SSL$ROOT") .EQS. ""
|
||||
$ THEN
|
||||
$ IF F$SEARCH ("SSL$COM:SSL$INIT_ENV.COM") .NES. ""
|
||||
$ THEN
|
||||
$ @SSL$COM:SSL$INIT_ENV.COM
|
||||
$ ELSE
|
||||
$ SAY BELL, "Unable to locate SSL$COM:SSL$INIT_ENV.COM ..."
|
||||
$ GOTO EXIT
|
||||
$ ENDIF
|
||||
$ ENDIF
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Display the Page Header
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ INIT_TERM
|
||||
$ BCOLOR = BGD
|
||||
$ FCOLOR = FGD + RED
|
||||
$ COLOR = ESC + "[''BCOLOR';''FCOLOR'm"
|
||||
$!
|
||||
$ TEXT = "SSL Certificate Tool"
|
||||
$ COL = (TT_COLS - (F$LENGTH (TEXT) * 2)) / 4
|
||||
$!
|
||||
$ SAY ESC + "[01;01H", CSCR
|
||||
$ SAY ESC + "[02;''COL'H", COLOR, WIDE, TEXT, NORM
|
||||
$!
|
||||
$ IF P1 .EQS. "CSR"
|
||||
$ THEN
|
||||
$ TEXT = "View Certificate Request"
|
||||
$ ELSE
|
||||
$ TEXT = "View Certificate"
|
||||
$ ENDIF
|
||||
$ COL = (TT_COLS - F$LENGTH (TEXT)) / 2
|
||||
$!
|
||||
$ SAY ESC + "[04;01H"
|
||||
$ SAY ESC + "[04;''COL'H", COLOR, TEXT, NORM
|
||||
$!
|
||||
$ CTR = 1
|
||||
$ ROW = 6
|
||||
$ COL = 2
|
||||
$ TOP_ROW = ROW
|
||||
$ MSG_ROW = TT_ROWS - 1
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Initialize the Request Data
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ IF P1 .NES. "CRT" .AND. P1 .NES. "CSR"
|
||||
$ THEN
|
||||
$ PRM = "Display File:"
|
||||
$ DEF = "*.*"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ IF P1 .EQS. "CRT"
|
||||
$ THEN
|
||||
$ PRM = "Display Certificate File:"
|
||||
$ DEF = "SSL$CRT:*.CRT"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ IF P1 .EQS. "CSR"
|
||||
$ THEN
|
||||
$ PRM = "Display Certificate Request File:"
|
||||
$ DEF = "SSL$CSR:*.CSR"
|
||||
$ ENDIF
|
||||
$!
|
||||
$ SAY ESC + "[''MSG_ROW';01H", CEOS
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Confirm/Update the SSL Configuration Data
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$PROMPT_LOOP:
|
||||
$!
|
||||
$ PROMPT = ESC + "[''ROW';''COL'H''PRM' ? [''DEF'] ''CEOL'"
|
||||
$ ASK "''PROMPT'" _view_file_name
|
||||
$ _view_file_name = F$EDIT (_view_file_name,"TRIM")
|
||||
$ IF _view_file_name .EQS. "" THEN _view_file_name = DEF
|
||||
$!
|
||||
$ X1 = 2
|
||||
$ Y1 = TOP_ROW
|
||||
$ X2 = TT_COLS - 2
|
||||
$ Y2 = MSG_ROW - 1
|
||||
$!
|
||||
$PICK_FILE:
|
||||
$!
|
||||
$ PICK_FILE "''_view_file_name'" 'X1' 'Y1' 'X2' 'Y2' "< Select a File >"
|
||||
$!
|
||||
$ SAY ESC + "[''TOP_ROW';01H", CEOS
|
||||
$!
|
||||
$ IF SSL_FILE_NAME .EQS. "" THEN GOTO EXIT
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Create the Certificiate Authority
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$ SAY ESC + "[''MSG_ROW';01H", BLNK, " Generating Output ...", NORM, CEOL
|
||||
$!
|
||||
$ IF P1 .EQS. "CRT"
|
||||
$ THEN
|
||||
$ OPEN /WRITE OFILE SYS$LOGIN:SSL_X509_'PID'.COM
|
||||
$ WRITE OFILE "$ DEFINE /USER /NOLOG SYS$ERROR SYS$LOGIN:SSL_X509_''PID'.LOG"
|
||||
$ WRITE OFILE "$ DEFINE /USER /NOLOG SYS$OUTPUT SYS$LOGIN:SSL_X509_''PID'.LOG"
|
||||
$ WRITE OFILE "$ DEFINE /USER /NOLOG SYS$COMMAND SYS$INPUT"
|
||||
$ WRITE OFILE "$ OPENSSL x509 -noout -text -in ''SSL_FILE_NAME'"
|
||||
$ CLOSE OFILE
|
||||
$!
|
||||
$ @SYS$LOGIN:SSL_X509_'PID'.COM
|
||||
$!
|
||||
$ DELETE/NOLOG/NOCONFIRM SYS$LOGIN:SSL_X509_'PID'.COM;*
|
||||
$!
|
||||
$ DEFINE /USER /NOLOG SYS$ERROR NL:
|
||||
$ DEFINE /USER /NOLOG SYS$OUTPUT NL:
|
||||
$ SEARCH SYS$LOGIN:SSL_X509_'PID'.LOG /OUT=SYS$LOGIN:SSL_X509_'PID'.ERR ":error:"
|
||||
$ IF F$SEARCH ("SYS$LOGIN:SSL_X509_''PID'.ERR") .NES. ""
|
||||
$ THEN
|
||||
$ IF F$FILE_ATTRIBUTE ("SYS$LOGIN:SSL_X509_''PID'.ERR","ALQ") .NE. 0
|
||||
$ THEN
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_X509_'PID'.ERR;*
|
||||
$ SAY ESC + "[''MSG_ROW';01H''BELL'''CEOS'"
|
||||
$ SHOW_FILE "SYS$LOGIN:SSL_X509_''PID'.LOG" 'X1' 'Y1' 'X2' 'Y2' "< ERROR >"
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_X509_'PID'.LOG;*
|
||||
$ GOTO EXIT
|
||||
$ ENDIF
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_X509_'PID'.ERR;*
|
||||
$ ENDIF
|
||||
$!
|
||||
$ SAY ESC + "[''MSG_ROW';01H''CEOS'"
|
||||
$ SHOW_FILE "SYS$LOGIN:SSL_X509_''PID'.LOG" 'X1' 'Y1' 'X2' 'Y2' "< ''SSL_FILE_NAME' >"
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_X509_'PID'.LOG;*
|
||||
$ GOTO PICK_FILE
|
||||
$ ENDIF
|
||||
$!
|
||||
$ IF P1 .EQS. "CSR"
|
||||
$ THEN
|
||||
$ OPEN /WRITE OFILE SYS$LOGIN:SSL_REQ_'PID'.COM
|
||||
$ WRITE OFILE "$ DEFINE /USER /NOLOG SYS$ERROR SYS$LOGIN:SSL_REQ_''PID'.LOG"
|
||||
$ WRITE OFILE "$ DEFINE /USER /NOLOG SYS$OUTPUT SYS$LOGIN:SSL_REQ_''PID'.LOG"
|
||||
$ WRITE OFILE "$ DEFINE /USER /NOLOG SYS$COMMAND SYS$INPUT"
|
||||
$ WRITE OFILE "$ OPENSSL req -noout -text -in ''SSL_FILE_NAME'"
|
||||
$ CLOSE OFILE
|
||||
$!
|
||||
$ @SYS$LOGIN:SSL_REQ_'PID'.COM
|
||||
$!
|
||||
$ DELETE/NOLOG/NOCONFIRM SYS$LOGIN:SSL_REQ_'PID'.COM;*
|
||||
$!
|
||||
$ DEFINE /USER /NOLOG SYS$ERROR NL:
|
||||
$ DEFINE /USER /NOLOG SYS$OUTPUT NL:
|
||||
$ SEARCH SYS$LOGIN:SSL_REQ_'PID'.LOG /OUT=SYS$LOGIN:SSL_REQ_'PID'.ERR ":error:"
|
||||
$ IF F$SEARCH ("SYS$LOGIN:SSL_REQ_''PID'.ERR") .NES. ""
|
||||
$ THEN
|
||||
$ IF F$FILE_ATTRIBUTE ("SYS$LOGIN:SSL_REQ_''PID'.ERR","ALQ") .NE. 0
|
||||
$ THEN
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_REQ_'PID'.ERR;*
|
||||
$ SAY ESC + "[''MSG_ROW';01H''BELL'''CEOS'"
|
||||
$ SHOW_FILE "SYS$LOGIN:SSL_REQ_''PID'.LOG" 'X1' 'Y1' 'X2' 'Y2' "< ERROR >"
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_REQ_'PID'.LOG;*
|
||||
$ GOTO EXIT
|
||||
$ ENDIF
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_REQ_'PID'.ERR;*
|
||||
$ ENDIF
|
||||
$!
|
||||
$ SAY ESC + "[''MSG_ROW';01H''CEOS'"
|
||||
$ SHOW_FILE "SYS$LOGIN:SSL_REQ_''PID'.LOG" 'X1' 'Y1' 'X2' 'Y2' "< ''SSL_FILE_NAME' >"
|
||||
$ DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_REQ_'PID'.LOG;*
|
||||
$ GOTO PICK_FILE
|
||||
$ ENDIF
|
||||
$!
|
||||
$ SAY ESC + "[''MSG_ROW';01H''CEOS'"
|
||||
$ SHOW_FILE "''SYS$LOGIN:SSL_FILE_NAME'" 'X1' 'Y1' 'X2' 'Y2' "< ''SSL_FILE_NAME' >"
|
||||
$ GOTO PICK_FILE
|
||||
$!
|
||||
$!------------------------------------------------------------------------------
|
||||
$! Exit the procedure
|
||||
$!------------------------------------------------------------------------------
|
||||
$!
|
||||
$EXIT:
|
||||
$!
|
||||
$ DEFINE /USER /NOLOG SYS$ERROR NL:
|
||||
$ DEFINE /USER /NOLOG SYS$OUTPUT NL:
|
||||
$ CLOSE OFILE
|
||||
$!
|
||||
$ IF F$TYPE (SSL_FILE_NAME) .NES. "" THEN DELETE /SYMBOL /GLOBAL SSL_FILE_NAME
|
||||
$!
|
||||
$ IF F$GETDVI ("TT:","TT_NOECHO") .AND. .NOT. TT_NOECHO THEN SET TERMINAL /ECHO
|
||||
$!
|
||||
$ IF F$SEARCH ("SYS$LOGIN:SSL_REQ_''PID'.%%%;*") .NES. "" THEN DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_REQ_'PID'.%%%;*
|
||||
$ IF F$SEARCH ("SYS$LOGIN:SSL_X509_''PID'.%%%;*") .NES. "" THEN DELETE /NOLOG /NOCONFIRM SYS$LOGIN:SSL_X509_'PID'.%%%;*
|
||||
$!
|
||||
$ Verify = F$VERIFY (Verify)
|
||||
$!
|
||||
$ EXIT
|
||||
128
VMS/install.com
128
VMS/install.com
@@ -26,47 +26,129 @@ $ DEFINE/NOLOG WRK_SSLVEXE WRK_SSLROOT:[VAX_EXE]
|
||||
$ DEFINE/NOLOG WRK_SSLAEXE WRK_SSLROOT:[ALPHA_EXE]
|
||||
$ DEFINE/NOLOG WRK_SSLCERTS WRK_SSLROOT:[CERTS]
|
||||
$ DEFINE/NOLOG WRK_SSLPRIVATE WRK_SSLROOT:[PRIVATE]
|
||||
$ DEFINE/NOLOG WRK_SSLCOM WRK_SSLROOT:[COM]
|
||||
$
|
||||
$ IF F$PARSE("WRK_SSLROOT:[000000]") .EQS. "" THEN -
|
||||
CREATE/DIR/LOG WRK_SSLROOT:[000000]
|
||||
$ IF F$PARSE("WRK_SSLINCLUDE:") .EQS. "" THEN -
|
||||
CREATE/DIR/LOG WRK_SSLINCLUDE:
|
||||
$ IF F$PARSE("WRK_SSLROOT:[VMS]") .EQS. "" THEN -
|
||||
CREATE/DIR/LOG WRK_SSLROOT:[VMS]
|
||||
$! IF F$PARSE("WRK_SSLROOT:[VMS]") .EQS. "" THEN -
|
||||
$! CREATE/DIR/LOG WRK_SSLROOT:[VMS]
|
||||
$ IF F$PARSE("WRK_SSLCOM:") .EQS. "" THEN -
|
||||
CREATE/DIR/LOG WRK_SSLROOT:[COM]
|
||||
$
|
||||
$ IF F$SEARCH("WRK_SSLINCLUDE:vms_idhacks.h") .NES. "" THEN -
|
||||
DELETE WRK_SSLINCLUDE:vms_idhacks.h;*
|
||||
$
|
||||
$ OPEN/WRITE SF WRK_SSLROOT:[VMS]OPENSSL_STARTUP.COM
|
||||
$ WRITE SYS$OUTPUT "%OPEN-I-CREATED, ",F$SEARCH("WRK_SSLROOT:[VMS]OPENSSL_STARTUP.COM")," created."
|
||||
$ WRITE SF "$! Startup file for Openssl 0.9.2-RL 15-Mar-1999"
|
||||
$ OPEN/WRITE SF WRK_SSLCOM:SSL$STARTUP.COM
|
||||
$ WRITE SYS$OUTPUT "%OPEN-I-CREATED, ",F$SEARCH("WRK_SSLCOM:SSL$STARTUP.COM")," created."
|
||||
$ WRITE SF "$! Startup file for SSL 0.9.2-RL 15-Mar-1999"
|
||||
$ WRITE SF "$!"
|
||||
$ WRITE SF "$! Do not edit this file, as it will be regenerated during next installation."
|
||||
$ WRITE SF "$! Instead, add or change SSLROOT:[VMS]OPENSSL_SYSTARTUP.COM"
|
||||
$ WRITE SF "$! Instead, add or change SSL$COM:SSL$SYSTARTUP.COM"
|
||||
$ WRITE SF "$!"
|
||||
$ WRITE SF "$! P1 a qualifier to DEFINE. For example ""/SYSTEM"" to get the logical names"
|
||||
$ WRITE SF "$! defined in the system logical name table."
|
||||
$ WRITE SF "$!"
|
||||
$ WRITE SF "$ ARCH = ""VAX"""
|
||||
$ WRITE SF "$ IF F$GETSYI(""CPU"") .GE. 128 THEN ARCH = ""ALPHA"""
|
||||
$ WRITE SF "$ DEFINE/NOLOG'P1 SSLROOT ",ROOT,".] /TRANS=CONC"
|
||||
$ WRITE SF "$ DEFINE/NOLOG'P1 SSLLIB SSLROOT:['ARCH'_LIB]"
|
||||
$ WRITE SF "$ DEFINE/NOLOG'P1 SSLINCLUDE SSLROOT:[INCLUDE]"
|
||||
$ WRITE SF "$ DEFINE/NOLOG'P1 SSLEXE SSLROOT:['ARCH'_EXE]"
|
||||
$ WRITE SF "$ DEFINE/NOLOG'P1 SSLCERTS SSLROOT:[CERTS]"
|
||||
$ WRITE SF "$ DEFINE/NOLOG'P1 SSLPRIVATE SSLROOT:[PRIVATE]"
|
||||
$ WRITE SF "$!"
|
||||
$ WRITE SF "$ IF F$SEARCH(""SYS$STARTUP:SSL$DEFINE_ROOT.COM"") .NES."""" THEN -"
|
||||
$ WRITE SF "$ @SYS$STARTUP:SSL$DEFINE_ROOT.COM"
|
||||
$ WRITE SF "$!"
|
||||
$ WRITE SF "$!"
|
||||
$ WRITE SF "$ DEFINE/NOLOG/SYSTEM/EXEC SSL$CERTS SSL$ROOT:[CERTS]"
|
||||
$ WRITE SF "$ DEFINE/NOLOG/SYSTEM/EXEC SSL$COM SSL$ROOT:[COM]"
|
||||
$ WRITE SF "$ DEFINE/NOLOG/SYSTEM/EXEC SSL$EXE SSL$ROOT:['ARCH'_EXE]"
|
||||
$ WRITE SF "$ DEFINE/NOLOG/SYSTEM/EXEC SSL$INCLUDE SSL$ROOT:[INCLUDE]"
|
||||
$ WRITE SF "$ DEFINE/NOLOG/SYSTEM/EXEC SSL$KEY SSL$ROOT:[CERTS]"
|
||||
$ WRITE SF "$ DEFINE/NOLOG/SYSTEM/EXEC SSL$PRIVATE SSL$ROOT:[PRIVATE]"
|
||||
$ WRITE SF "$"
|
||||
$ WRITE SF "$! This is program can include <openssl/{foo}.h>"
|
||||
$ WRITE SF "$ DEFINE/NOLOG'P1 OPENSSL SSLINCLUDE:"
|
||||
$ WRITE SF "$"
|
||||
$ WRITE SF "$ IF F$SEARCH(""SSLROOT:[VMS]OPENSSL_SYSTARTUP.COM"") .NES."""" THEN -"
|
||||
$ WRITE SF " @SSLROOT:[VMS]OPENSSL_SYSTARTUP.COM"
|
||||
$ WRITE SF "$ DEFINE/NOLOG/SYSTEM/EXEC OPENSSL SSL$INCLUDE:"
|
||||
$ WRITE SF "$!"
|
||||
$ WRITE SF "$ IF F$SEARCH(""SSL$COM:SSL$SYSTARTUP.COM"") .NES."""" THEN -"
|
||||
$ WRITE SF " @SSL$COM:SSL$SYSTARTUP.COM"
|
||||
$ WRITE SF "$"
|
||||
$ WRITE SF "$ EXIT"
|
||||
$ CLOSE SF
|
||||
$ SET FILE/PROT=WORLD:RE WRK_SSLROOT:[VMS]OPENSSL_STARTUP.COM
|
||||
$
|
||||
$ COPY OPENSSL_UTILS.COM WRK_SSLROOT:[VMS]/LOG
|
||||
$ SET FILE/PROT=WORLD:RE WRK_SSLROOT:[VMS]OPENSSL_UTILS.COM
|
||||
$
|
||||
$ SET FILE/PROT=WORLD:RE WRK_SSLCOM:SSL$STARTUP.COM
|
||||
$!
|
||||
$ OPEN/WRITE SF WRK_SSLCOM:SSL$SHUTDOWN.COM
|
||||
$ WRITE SYS$OUTPUT "%OPEN-I-CREATED, ",F$SEARCH("WRK_SSLCOM:SSL$SHUTDOWN.COM")," created."
|
||||
$ WRITE SF "$! Shutdown file for SSL"
|
||||
$ WRITE SF "$!"
|
||||
$ WRITE SF "$! Do not edit this file, as it will be regenerated during next installation."
|
||||
$ WRITE SF "$!"
|
||||
$ WRITE SF "$ ARCH = ""VAX"""
|
||||
$ WRITE SF "$ IF F$GETSYI(""CPU"") .GE. 128 THEN ARCH = ""ALPHA"""
|
||||
$ WRITE SF "$!"
|
||||
$ WRITE SF "$ IF F$SEARCH(""SSL$COM:SSL$SYSHUTDOWN.COM"") .NES."""" THEN -"
|
||||
$ WRITE SF " @SSL$COM:SSL$SYSHUTDOWN.COM"
|
||||
$ WRITE SF "$!"
|
||||
$ WRITE SF "$ IF F$TRNLNM(""SSL$CERTS"") .NES."""" THEN -"
|
||||
$ WRITE SF " DEASSIGN/SYSTEM/EXEC SSL$CERTS"
|
||||
$!
|
||||
$ WRITE SF "$ IF F$TRNLNM(""SSL$COM"") .NES."""" THEN -"
|
||||
$ WRITE SF " DEASSIGN/SYSTEM/EXEC SSL$COM"
|
||||
$!
|
||||
$ WRITE SF "$ IF F$TRNLNM(""SSL$EXE"") .NES."""" THEN -"
|
||||
$ WRITE SF " DEASSIGN/SYSTEM/EXEC SSL$EXE"
|
||||
$!
|
||||
$ WRITE SF "$ IF F$TRNLNM(""SSL$INCLUDE"") .NES."""" THEN -"
|
||||
$ WRITE SF " DEASSIGN/SYSTEM/EXEC SSL$INCLUDE"
|
||||
$!
|
||||
$ WRITE SF "$ IF F$TRNLNM(""SSL$KEY"") .NES."""" THEN -"
|
||||
$ WRITE SF " DEASSIGN/SYSTEM/EXEC SSL$KEY"
|
||||
$!
|
||||
$ WRITE SF "$ IF F$TRNLNM(""SSL$PRIVATE"") .NES."""" THEN -"
|
||||
$ WRITE SF " DEASSIGN/SYSTEM/EXEC SSL$PRIVATE"
|
||||
$!
|
||||
$ WRITE SF "$!"
|
||||
$ WRITE SF "$ IF F$TRNLNM(""OPENSSL"") .NES."""" THEN -"
|
||||
$ WRITE SF " DEASSIGN/SYSTEM/EXEC OPENSSL"
|
||||
$ WRITE SF "$!"
|
||||
$ WRITE SF "$ IF F$TRNLNM(""SSL$ROOT"") .NES."""" THEN -"
|
||||
$ WRITE SF " DEASSIGN/SYSTEM/EXEC SSL$ROOT"
|
||||
$ WRITE SF "$!"
|
||||
$ WRITE SF "$ EXIT"
|
||||
$ CLOSE SF
|
||||
$ SET FILE/PROT=WORLD:RE WRK_SSLCOM:SSL$SHUTDOWN.COM
|
||||
$!
|
||||
$ COPY SSL$UTILS.COM WRK_SSLCOM:/LOG
|
||||
$ SET FILE/PROT=WORLD:RE WRK_SSLCOM:SSL$UTILS.COM
|
||||
$!
|
||||
$ COPY SSL$SYSTARTUP.COM WRK_SSLCOM:/LOG
|
||||
$ SET FILE/PROT=WORLD:RE WRK_SSLCOM:SSL$SYSTARTUP.COM
|
||||
$ COPY SSL$SYSHUTDOWN.COM WRK_SSLCOM:/LOG
|
||||
$ SET FILE/PROT=WORLD:RE WRK_SSLCOM:SSL$SYSHUTDOWN.COM
|
||||
$!
|
||||
$ CERT_DIR := [.CERT_TOOL]
|
||||
$ CERT_FILES := SSL$AUTH_CERT.COM,SSL$AUTO_CERT.COM,SSL$CERT_TOOL.COM, -
|
||||
SSL$CONF_UTIL.COM,SSL$DRAW_BOX.COM,SSL$EXIT_CMD.TPU, -
|
||||
SSL$FILL_BOX.COM,SSL$HASH_CERT.COM,SSL$HOSTADDR.EXE, -
|
||||
SSL$HOSTNAME.EXE,SSL$INIT_ENV.COM,SSL$INIT_TERM.COM, -
|
||||
SSL$PICK_FILE.COM,SSL$RQST_CERT.COM,SSL$SELF_CERT.COM, -
|
||||
SSL$SHOW_FILE.COM,SSL$SIGN_CERT.COM,SSL$VIEW_CERT.COM, -
|
||||
SSL$REM_ENV.COM
|
||||
$!
|
||||
$ I = 0
|
||||
$ LOOP:
|
||||
$ CF = F$EDIT(F$ELEMENT(I, ",", CERT_FILES),"TRIM")
|
||||
$ I = I + 1
|
||||
$ IF CF .EQS. "," THEN GOTO LOOP_END
|
||||
$ SET NOON
|
||||
$ IF F$SEARCH(CERT_DIR+CF) .NES. ""
|
||||
$ THEN
|
||||
$ COPY 'CERT_DIR''CF' WRK_SSLCOM:*.*/log
|
||||
$ SET FILE/PROT=W:RE WRK_SSLCOM:'CF'
|
||||
$ ENDIF
|
||||
$ SET ON
|
||||
$ GOTO LOOP
|
||||
$ LOOP_END:
|
||||
$!
|
||||
$ SHOW SYSTEM/FULL/OUTPUT=WRK_SSLROOT:[PRIVATE]RANDFILE.
|
||||
$ SET FILE/PROT=WORLD:RE WRK_SSLROOT:[PRIVATE]RANDFILE.
|
||||
$!
|
||||
$ COPY SSL010.RELEASE_NOTES WRK_SSLROOT:[000000]/LOG
|
||||
$ SET FILE/PROT=WORLD:RE WRK_SSLROOT:[000000]SSL010.RELEASE_NOTES
|
||||
$!
|
||||
$ EXIT
|
||||
|
||||
490
VMS/mkshared.com
Normal file
490
VMS/mkshared.com
Normal file
@@ -0,0 +1,490 @@
|
||||
$! MKSHARED.COM -- script to created shareable images on VMS
|
||||
$!
|
||||
$! No command line parameters. This should be run at the start of the source
|
||||
$! tree (the same directory where one finds INSTALL.VMS).
|
||||
$!
|
||||
$! Input: [.UTIL]LIBEAY.NUM,[.AXP.EXE.CRYPTO]LIBCRYPTO.OLB
|
||||
$! [.UTIL]SSLEAY.NUM,[.AXP.EXE.SSL]LIBSSL.OLB
|
||||
$! Output: [.AXP.EXE.CRYPTO]LIBCRYPTO.OPT,.MAP,.EXE
|
||||
$! [.AXP.EXE.SSL]LIBSSL.OPT,.MAP,.EXE
|
||||
$!
|
||||
$! So far, tests have only been made on VMS for Alpha. VAX will come in time.
|
||||
$!
|
||||
$!
|
||||
$! >>>>>
|
||||
$! Note: Since I don't know how to put a comment into one of the .NUM
|
||||
$! files, I will put the comment here and hope that it is found.
|
||||
$!
|
||||
$! For SSLEAY.NUM, we do not expose SSL_add_dir_cert_subjs_to_stk.
|
||||
$! We do not expose it because it is a truncated VMS name that
|
||||
$! points to (via SYMHACKS.H) SSL_add_dir_cert_subjects_to_stack.
|
||||
$! However, SSL_add_dir_cert_subjects_to_stack is #ifndef VMS
|
||||
$! out of SSL_CERT.C. So, comment them all out and we won't get
|
||||
$! any link errors about undefined symbols. This all works fine
|
||||
$! until we need this API's functionality.
|
||||
$!
|
||||
$! For LIBEAY.NUM,
|
||||
$! ASN1_UTCTIME_GET #if 0 [.CRYPTO.ASN1]A_UTCTM.C
|
||||
$! [.CRYPTO.ASN1]ASN1.H
|
||||
$!
|
||||
$! DES_SET_WEAK_KEY_FLAG [.CRYPTO.DES]DES.H
|
||||
$! Not used in any .C file.
|
||||
$!
|
||||
$! DH_GET_DEFAULT_METHOD Not found in any .C or .H file.
|
||||
$! DH_SET_DEFAULT_METHOD Not found in any .C or .H file.
|
||||
$! DSA_GET_DEFAULT_METHOD Not found in any .C or .H file.
|
||||
$! DSA_SET_DEFAULT_METHOD Not found in any .C or .H file.
|
||||
$!
|
||||
$! PEM_READ_BIO_NETSCAPE_CERT_SEQUENCE [.CRYPTO.PEM]PEM.H
|
||||
$! [.CRYPTO]SYMHACKS.H
|
||||
$! PEM_read_bio_NS_CERT_SEQ is not in any .C or .H file.
|
||||
$!
|
||||
$! PEM_READ_BIO_PKCS8_PRIV_KEY_INFO [.CRYPTO]SYMHACKS.H
|
||||
$! #define PEM_read_bio_PKCS8_PRIV_KEY_INFO PEM_read_bio_P8_PRIV_KEY_INFO
|
||||
$! PEM_read_bio_P8_PRIV_KEY_INFO is not in any .C or .H file.
|
||||
$!
|
||||
$! PEM_READ_NETSCAPE_CERT_SEQUENCE [.CRYPTO.PEM]PEM.H
|
||||
$! [.CRYPTO]SYMHACKS.H
|
||||
$! #define PEM_read_NETSCAPE_CERT_SEQUENCE PEM_read_NS_CERT_SEQ
|
||||
$! PEM_read_NS_CERT_SEQ is not in any .C or .H file.
|
||||
$!
|
||||
$! PEM_READ_PKCS8_PRIV_KEY_INFO [.CRYPTO]SYMHACKS.H
|
||||
$! #define PEM_read_PKCS8_PRIV_KEY_INFO PEM_read_P8_PRIV_KEY_INFO
|
||||
$! PEM_read_P8_PRIV_KEY_INFO is not in any .C or .H file.
|
||||
$!
|
||||
$! PEM_WRITE_BIO_NETSCAPE_CERT_SEQUENCE [.CRYPTO.PEM]PEM.H
|
||||
$! [.CRYPTO]SYMHACKS.H
|
||||
$! #define PEM_write_bio_NETSCAPE_CERT_SEQUENCE PEM_write_bio_NS_CERT_SEQ
|
||||
$! PEM_write_bio_NS_CERT_SEQ is not in any .C or .H file.
|
||||
$!
|
||||
$! PEM_WRITE_BIO_PKCS8_PRIV_KEY_INFO [.CRYPTO]SYMHACKS.H
|
||||
$! #define PEM_write_bio_PKCS8_PRIV_KEY_INFO PEM_write_bio_P8_PRIV_KEY_INFO
|
||||
$! PEM_write_bio_P8_PRIV_KEY_INFO is not in any .C or .H file.
|
||||
$!
|
||||
$! PEM_WRITE_NETSCAPE_CERT_SEQUENCE [.CRYPTO.PEM]PEM.H
|
||||
$! [.CRYPTO]SYMHACKS.H
|
||||
$! #define PEM_write_NETSCAPE_CERT_SEQUENCE PEM_write_NS_CERT_SEQ
|
||||
$! PEM_write_NS_CERT_SEQ is not in any .C or .H file.
|
||||
$!
|
||||
$! PEM_WRITE_PKCS8_PRIV_KEY_INFO [.CRYPTO]SYMHACKS.H
|
||||
$! #define PEM_write_PKCS8_PRIV_KEY_INFO PEM_write_P8_PRIV_KEY_INFO
|
||||
$! PEM_write_P8_PRIV_KEY_INFO is not in any .C or .H file.
|
||||
$!
|
||||
$! RAND_EVENT [.CRYPTO.RAND]RAND.H RAND_event is #if windows || Win32
|
||||
$! [.CRYPTO.RAND]RAND_WIN.C
|
||||
$! All modules in RAND_WIN are WINDOWS or WIN32 modules.
|
||||
$!
|
||||
$! RAND_SCREEN if Windows or Win32 - [.CRYPTO.RAND]RAND.H
|
||||
$!
|
||||
$! RSA_GET_DEFAULT_METHOD is not in any .C or .H file.
|
||||
$!
|
||||
$! RSA_SET_DEFAULT_METHOD is not in any .C or .H file.
|
||||
$!
|
||||
$!
|
||||
$!
|
||||
$! ===========================================================================
|
||||
$!
|
||||
$! Setup VMS specific information.
|
||||
$!
|
||||
$ @vms_build_info
|
||||
$!
|
||||
$! ----- Prepare info for processing: version number and file info
|
||||
$ gosub read_version_info
|
||||
$!
|
||||
$ if libver .eqs. ""
|
||||
$ then
|
||||
$ write sys$error "ERROR: Couldn't find any library version info..."
|
||||
$ exit
|
||||
$ endif
|
||||
$
|
||||
$ if f$getsyi("CPU") .ge. 128
|
||||
$ then
|
||||
$ libid = "Crypto"
|
||||
$ libnum = "[.UTIL]LIBEAY.NUM"
|
||||
$ libdir = "[.AXP.EXE.CRYPTO]"
|
||||
$ libolb = "''libdir'LIBCRYPTO''build_bits'.OLB"
|
||||
$ libopt = "''libdir'LIBCRYPTO.OPT"
|
||||
$ libmap = "''libdir'LIBCRYPTO.MAP"
|
||||
$ if build_bits .eqs. "32"
|
||||
$ then
|
||||
$ libgoal= "''libdir'SSL$LIBCRYPTO_SHR''build_bits'.EXE"
|
||||
$ else
|
||||
$ libgoal= "''libdir'SSL$LIBCRYPTO_SHR.EXE"
|
||||
$ endif
|
||||
$ libref = ""
|
||||
$ gosub create_axp_shr
|
||||
$ libid = "SSL"
|
||||
$ libnum = "[.UTIL]SSLEAY.NUM"
|
||||
$ libdir = "[.AXP.EXE.SSL]"
|
||||
$ libolb = "''libdir'LIBSSL''build_bits'.OLB"
|
||||
$ libopt = "''libdir'LIBSSL.OPT"
|
||||
$ libmap = "''libdir'LIBSSL.MAP"
|
||||
$ if build_bits .eqs. "32"
|
||||
$ then
|
||||
$ libgoal= "''libdir'SSL$LIBSSL_SHR''build_bits'.EXE"
|
||||
$ libref = "[.AXP.EXE.CRYPTO]SSL$LIBCRYPTO_SHR''build_bits'.EXE"
|
||||
$ else
|
||||
$ libgoal= "''libdir'SSL$LIBSSL_SHR.EXE"
|
||||
$ libref = "[.AXP.EXE.CRYPTO]SSL$LIBCRYPTO_SHR.EXE"
|
||||
$ endif
|
||||
$ gosub create_axp_shr
|
||||
$ else
|
||||
$ libtit = "CRYPTO_TRANSFER_VECTOR"
|
||||
$ libid = "Crypto"
|
||||
$ libnum = "[.UTIL]LIBEAY.NUM"
|
||||
$ libdir = "[.VAX.EXE.CRYPTO]"
|
||||
$ libmar = "''libdir'LIBCRYPTO.MAR"
|
||||
$ libolb = "''libdir'LIBCRYPTO''build_bits.OLB"
|
||||
$ libopt = "''libdir'LIBCRYPTO.OPT"
|
||||
$ libobj = "''libdir'LIBCRYPTO.OBJ"
|
||||
$ libmap = "''libdir'LIBCRYPTO.MAP"
|
||||
$ if build_bits .eqs. "32"
|
||||
$ then
|
||||
$ libgoal= "''libdir'SSL$LIBCRYPTO_SHR''build_bits'.EXE"
|
||||
$ else
|
||||
$ libgoal= "''libdir'SSL$LIBCRYPTO_SHR.EXE"
|
||||
$ endif
|
||||
$ libref = ""
|
||||
$ libvec = "LIBCRYPTO"
|
||||
$ gosub create_vax_shr
|
||||
$ libtit = "SSL_TRANSFER_VECTOR"
|
||||
$ libid = "SSL"
|
||||
$ libnum = "[.UTIL]SSLEAY.NUM"
|
||||
$ libdir = "[.VAX.EXE.SSL]"
|
||||
$ libmar = "''libdir'LIBSSL.MAR"
|
||||
$ libolb = "''libdir'LIBSSL''build_bits'.OLB"
|
||||
$ libopt = "''libdir'LIBSSL.OPT"
|
||||
$ libobj = "''libdir'LIBSSL.OBJ"
|
||||
$ libmap = "''libdir'LIBSSL.MAP"
|
||||
$ if build_bits .eqs. "32"
|
||||
$ then
|
||||
$ libgoal= "''libdir'SSL$LIBSSL_SHR''build_bits'.EXE"
|
||||
$ libref = "[.VAX.EXE.CRYPTO]SSL$LIBCRYPTO_SHR''build_bits'.EXE"
|
||||
$ else
|
||||
$ libgoal= "''libdir'SSL$LIBSSL_SHR.EXE"
|
||||
$ libref = "[.VAX.EXE.CRYPTO]SSL$LIBCRYPTO_SHR.EXE"
|
||||
$ endif
|
||||
$ libvec = "LIBSSL"
|
||||
$ gosub create_vax_shr
|
||||
$ endif
|
||||
$ exit
|
||||
$
|
||||
$! ----- Soubroutines to actually build the shareable libraries
|
||||
$! The way things work, there's a main shareable library creator for each
|
||||
$! supported architecture, which is called from the main code above.
|
||||
$! The creator will define a number of variables to tell the next levels of
|
||||
$! subroutines what routines to use to write to the option files, call the
|
||||
$! main processor, read_func_num, and when that is done, it will write version
|
||||
$! data at the end of the .opt file, close it, and link the library.
|
||||
$!
|
||||
$! read_func_num reads through a .num file and calls the writer routine for
|
||||
$! each line. It's also responsible for checking that order is properly kept
|
||||
$! in the .num file, check that each line applies to VMS and the architecture,
|
||||
$! and to fill in "holes" with dummy entries.
|
||||
$!
|
||||
$! The creator routines depend on the following variables:
|
||||
$! libnum The name of the .num file to use as input
|
||||
$! libolb The name of the object library to build from
|
||||
$! libid The identification string of the shareable library
|
||||
$! libopt The name of the .opt file to write
|
||||
$! libtit The title of the assembler transfer vector file (VAX only)
|
||||
$! libmar The name of the assembler transfer vector file (VAX only)
|
||||
$! libmap The name of the map file to write
|
||||
$! libgoal The name of the shareable library to write
|
||||
$! libref The name of a shareable library to link in
|
||||
$!
|
||||
$! read_func_num depends on the following variables from the creator:
|
||||
$! libwriter The name of the writer routine to call for each .num file line
|
||||
$! -----
|
||||
$
|
||||
$! ----- Subroutines for AXP
|
||||
$! -----
|
||||
$! The creator routine
|
||||
$ create_axp_shr:
|
||||
$ open/write opt 'libopt'
|
||||
$ write opt "identification=""",libid," ",libverstr,""""
|
||||
$ write opt "build_ident=""",build_ident,"_",build_platform,"_",build_bits,""" "
|
||||
$ write opt libolb,"/lib"
|
||||
$ if libref .nes. "" then write opt libref,"/SHARE"
|
||||
$ write opt "SYMBOL_VECTOR=(-"
|
||||
$ libfirstentry := true
|
||||
$ libwrch := opt
|
||||
$ libwriter := write_axp_transfer_entry
|
||||
$ textcount = 0
|
||||
$ gosub read_func_num
|
||||
$ write opt ")"
|
||||
$ write opt "GSMATCH=",libvmatch,",",libver
|
||||
$ close opt
|
||||
$ link/map='libmap'/full/share='libgoal' 'libopt'/option
|
||||
$ return
|
||||
$
|
||||
$! The record writer routine
|
||||
$ write_axp_transfer_entry:
|
||||
$ if libentry .eqs. ".dummy" then return
|
||||
$ if info_kind .eqs. "VARIABLE"
|
||||
$ then
|
||||
$ pr:=DATA
|
||||
$ else
|
||||
$ pr:=PROCEDURE
|
||||
$ endif
|
||||
$ textcount_this = f$length(pr) + f$length(libentry) + 5
|
||||
$ if textcount + textcount_this .gt. 1024
|
||||
$ then
|
||||
$ write opt ")"
|
||||
$ write opt "SYMBOL_VECTOR=(-"
|
||||
$ textcount = 16
|
||||
$ libfirstentry := true
|
||||
$ endif
|
||||
$ if libfirstentry
|
||||
$ then
|
||||
$ write 'libwrch' " ",libentry,"=",pr," -"
|
||||
$!DEBUG!$ write sys$output "''libentry' = ''pr' #1"
|
||||
$ else
|
||||
$ write 'libwrch' " ,",libentry,"=",pr," -"
|
||||
$!DEBUG!$ write sys$output ",''libentry' = ''pr'"
|
||||
$ endif
|
||||
$ libfirstentry := false
|
||||
$ textcount = textcount + textcount_this
|
||||
$ return
|
||||
$
|
||||
$! ----- Subroutines for VAX
|
||||
$! -----
|
||||
$! The creator routine
|
||||
$ create_vax_shr:
|
||||
$ open/write mar 'libmar'
|
||||
$ type sys$input:/out=mar:
|
||||
;
|
||||
; Transfer vector for VAX shareable image
|
||||
;
|
||||
$ write mar " .TITLE ",libtit
|
||||
$ write mar " .IDENT /",libid,"/"
|
||||
$ type sys$input:/out=mar:
|
||||
;
|
||||
; Define macro to assist in building transfer vector entries. Each entry
|
||||
; should take no more than 8 bytes.
|
||||
;
|
||||
.MACRO FTRANSFER_ENTRY routine
|
||||
.ALIGN QUAD
|
||||
.TRANSFER routine
|
||||
.MASK routine
|
||||
JMP routine+2
|
||||
.ENDM TRANSFER_ENTRY
|
||||
;
|
||||
; Place entries in own program section.
|
||||
;
|
||||
$ write mar " .PSECT $$",libvec,"QUAD,PIC,USR,CON,REL,LCL,SHR,EXE,RD,NOWRT"
|
||||
$ write mar libvec,"_xfer:"
|
||||
$ libwrch := mar
|
||||
$ libwriter := write_vax_ftransfer_entry
|
||||
$ gosub read_func_num
|
||||
$ type sys$input:/out=mar:
|
||||
;
|
||||
; Allocate extra storage at end of vector to allow for expansion.
|
||||
;
|
||||
$ write mar " .BLKB 32768-<.-",libvec,"_xfer> ; 64 pages total."
|
||||
$ libwriter := write_vax_vtransfer_entry
|
||||
$ gosub read_func_num
|
||||
$ write mar " .END"
|
||||
$ close mar
|
||||
$ open/write opt 'libopt'
|
||||
$ write opt "identification=""",libid," ",libverstr,""""
|
||||
$ write opt libobj
|
||||
$ write opt libolb,"/lib"
|
||||
$ if libref .nes. "" then write opt libref,"/SHARE"
|
||||
$ type sys$input:/out=opt:
|
||||
!
|
||||
! Ensure transfer vector is at beginning of image
|
||||
!
|
||||
CLUSTER=FIRST
|
||||
$ write opt "COLLECT=FIRST,$$",libvec
|
||||
$ write opt "GSMATCH=",libvmatch,",",libver
|
||||
$ type sys$input:/out=opt:
|
||||
!
|
||||
! make psects nonshareable so image can be installed.
|
||||
!
|
||||
PSECT_ATTR=$CHAR_STRING_CONSTANTS,NOWRT
|
||||
$ libwrch := opt
|
||||
$ libwriter := write_vax_psect_attr
|
||||
$ gosub read_var_num
|
||||
$ close opt
|
||||
$ macro/obj='libobj' 'libmar'
|
||||
$ link/map='libmap'/full/share='libgoal' 'libopt'/option
|
||||
$ return
|
||||
$
|
||||
$! The record writer routine for VAX functions
|
||||
$ write_vax_ftransfer_entry:
|
||||
$ if info_kind .nes. "FUNCTION" then return
|
||||
$ if libentry .eqs ".dummy"
|
||||
$ then
|
||||
$ write 'libwrch' " .BLKB 8" ! Dummy is zeroes...
|
||||
$ else
|
||||
$ write 'libwrch' " FTRANSFER_ENTRY ",libentry
|
||||
$ endif
|
||||
$ return
|
||||
$! The record writer routine for VAX variables (should never happen!)
|
||||
$ write_vax_psect_attr:
|
||||
$ if info_kind .nes. "VARIABLE" then return
|
||||
$ if libentry .eqs ".dummy" then return
|
||||
$ write 'libwrch' "PSECT_ATTR=",libentry,",NOSHR"
|
||||
$ return
|
||||
$
|
||||
$! ----- Common subroutines
|
||||
$! -----
|
||||
$! The .num file reader. This one has great responsability.
|
||||
$ read_func_num:
|
||||
$ open libnum 'libnum'
|
||||
$ goto read_nums
|
||||
$
|
||||
$ read_nums:
|
||||
$ libentrynum=0
|
||||
$ liblastentry:=false
|
||||
$ entrycount=0
|
||||
$ loop:
|
||||
$ read/end=loop_end/err=loop_end libnum line
|
||||
$ entrynum=f$int(f$element(1," ",f$edit(line,"COMPRESS,TRIM")))
|
||||
$ entryinfo=f$element(2," ",f$edit(line,"COMPRESS,TRIM"))
|
||||
$ curentry=f$element(0," ",f$edit(line,"COMPRESS,TRIM"))
|
||||
$ info_exist=f$element(0,":",entryinfo)
|
||||
$ info_platforms=","+f$element(1,":",entryinfo)+","
|
||||
$ info_kind=f$element(2,":",entryinfo)
|
||||
$ info_algorithms=","+f$element(3,":",entryinfo)+","
|
||||
$!
|
||||
$!DEBUG!$ write sys$output " Processing ... ", line
|
||||
$!DEBUG!$ write sys$output "Entry num = ",entrynum
|
||||
$!DEBUG!$ write sys$output "Entry info = ",entryinfo
|
||||
$!DEBUG!$ write sys$output "Cur Entry = ",curentry
|
||||
$!DEBUG!$ write sys$output "info exist = ",info_exist
|
||||
$!DEBUG!$ write sys$output "info platforms = ",info_platforms
|
||||
$!DEBUG!$ write sys$output "info kind = ",info_kind
|
||||
$!DEBUG!$ write sys$output "info algs = ",info_algorithms
|
||||
$!
|
||||
$ if info_exist .eqs. "NOEXIST" then goto loop
|
||||
$ truesum = 0
|
||||
$ falsesum = 0
|
||||
$ negatives = 1
|
||||
$ plat_i = 0
|
||||
$ loop1:
|
||||
$ plat_entry = f$element(plat_i,",",info_platforms)
|
||||
$!DEBUG!$ write sys$output "plat entry = ",plat_entry
|
||||
$!
|
||||
$ plat_i = plat_i + 1
|
||||
$!DEBUG!$ write sys$output "plat i = ", plat_i
|
||||
$ if plat_entry .eqs. "" then goto loop1
|
||||
$ if plat_entry .eqs. ","
|
||||
$ then
|
||||
$ goto endloop1
|
||||
$ else
|
||||
$ if f$extract(0,1,plat_entry) .nes. "!" then negatives = 0
|
||||
$ if f$getsyi("CPU") .lt. 128
|
||||
$ then
|
||||
$ if plat_entry .eqs. "EXPORT_VAR_AS_FUNCTION" then -
|
||||
$ truesum = truesum + 1
|
||||
$ if plat_entry .eqs. "!EXPORT_VAR_AS_FUNCTION" then -
|
||||
$ falsesum = falsesum + 1
|
||||
$ endif
|
||||
$ if plat_entry .eqs. "VMS"
|
||||
$ then
|
||||
$ truesum = truesum + 1
|
||||
$!DEBUG!$ write sys$output "plat_entry = VMS"
|
||||
$ endif
|
||||
$!
|
||||
$ if plat_entry .eqs. "!VMS"
|
||||
$ then
|
||||
$ falsesum = falsesum + 1
|
||||
$!DEBUG!$ write sys$output "plat_entry <> VMS"
|
||||
$ endif
|
||||
$ endif
|
||||
$ goto loop1
|
||||
$!
|
||||
$ endloop1:
|
||||
$!DEBUG!$ if info_platforms - "EXPORT_VAR_AS_FUNCTION" .nes. info_platforms
|
||||
$!DEBUG!$ then
|
||||
$!DEBUG!$ write sys$output line
|
||||
$!DEBUG!$ write sys$output " truesum = ",truesum,-
|
||||
$!DEBUG! ", negatives = ",negatives,", falsesum = ",falsesum
|
||||
$!DEBUG!$ endif
|
||||
$ if falsesum .ne. 0 then goto loop
|
||||
$ if truesum+negatives .eq. 0
|
||||
$ then
|
||||
$!DEBUG!$ write sys$output "truesum+negatives .eq. 0. Going to loop."
|
||||
$ goto loop
|
||||
$ endif
|
||||
$ alg_i = 0
|
||||
$ loop2:
|
||||
$ alg_entry = f$element(alg_i,",",info_algorithms)
|
||||
$!DEBUG!$ write sys$output "alg entry = ",alg_entry
|
||||
$ alg_i = alg_i + 1
|
||||
$ if alg_entry .eqs. "" then goto loop2
|
||||
$ if alg_entry .eqs. ","
|
||||
$ then
|
||||
$ goto endloop2
|
||||
$ else
|
||||
$ if alg_entry .eqs. "KRB5" then goto loop ! Special for now
|
||||
$ if f$trnlnm("OPENSSL_NO_"+alg_entry) .nes. "" then goto loop
|
||||
$ endif
|
||||
$ goto loop2
|
||||
$!
|
||||
$ endloop2:
|
||||
$ if info_platforms - "EXPORT_VAR_AS_FUNCTION" .nes. info_platforms
|
||||
$ then
|
||||
$!DEBUG!$ write sys$output curentry," ; ",entrynum," ; ",entryinfo
|
||||
$ endif
|
||||
$ redo:
|
||||
$ next:=loop
|
||||
$ tolibentry=curentry
|
||||
$ if libentrynum .ne. entrynum
|
||||
$ then
|
||||
$ entrycount=entrycount+1
|
||||
$ if entrycount .lt. entrynum
|
||||
$ then
|
||||
$!DEBUG!$ write sys$output "Info: entrycount: ''entrycount', entrynum: ''entrynum' => 0"
|
||||
$ tolibentry=".dummy"
|
||||
$ next:=redo
|
||||
$ endif
|
||||
$ if entrycount .gt. entrynum
|
||||
$ then
|
||||
$ write sys$error "Decreasing library entry numbers! Can't continue"
|
||||
$ write sys$error """",line,""""
|
||||
$ close libnum
|
||||
$ return
|
||||
$ endif
|
||||
$ libentry=tolibentry
|
||||
$!DEBUG!$ write sys$output entrycount," ",libentry," ",entryinfo
|
||||
$ if libentry .nes. "" .and. libwriter .nes. "" then gosub 'libwriter'
|
||||
$ else
|
||||
$ write sys$error "Info: ""''curentry'"" is an alias for ""''libentry'"". Overriding..."
|
||||
$ endif
|
||||
$ libentrynum=entrycount
|
||||
$ goto 'next'
|
||||
$ loop_end:
|
||||
$ close libnum
|
||||
$ return
|
||||
$!
|
||||
$! The version number reader
|
||||
$!
|
||||
$read_version_info:
|
||||
$ libver = ""
|
||||
$ open/read vf [.CRYPTO]OPENSSLV.H
|
||||
$ loop_rvi:
|
||||
$ read/err=endloop_rvi/end=endloop_rvi vf rvi_line
|
||||
$ if rvi_line - "SHLIB_VERSION_NUMBER """ .eqs. rvi_line then -
|
||||
goto loop_rvi
|
||||
$ libverstr = f$element(1,"""",rvi_line)
|
||||
$ libvmajor = f$element(0,".",libverstr)
|
||||
$ libvminor = f$element(1,".",libverstr)
|
||||
$ libvedit = f$element(2,".",libverstr)
|
||||
$ libvpatch = f$cvui(0,8,f$extract(1,1,libvedit)+"@")-f$cvui(0,8,"@")
|
||||
$ libvedit = f$extract(0,1,libvedit)
|
||||
$ libver = f$string(f$int(libvmajor)*100)+","+-
|
||||
f$string(f$int(libvminor)*100+f$int(libvedit)*10+f$int(libvpatch))
|
||||
$ if libvmajor .eqs. "0"
|
||||
$ then
|
||||
$ libvmatch = "EQUAL"
|
||||
$ else
|
||||
$ ! Starting with the 1.0 release, backward compatibility should be
|
||||
$ ! kept, so switch over to the following
|
||||
$ libvmatch = "LEQUAL"
|
||||
$ endif
|
||||
$ endloop_rvi:
|
||||
$ close vf
|
||||
$ return
|
||||
8
VMS/ssl$syshutdown.com
Normal file
8
VMS/ssl$syshutdown.com
Normal file
@@ -0,0 +1,8 @@
|
||||
$!
|
||||
$! SSL$SYSHUTDOWN.COM - This command procedure is used for site specific SSL
|
||||
$! shutdown tasks. Anything setup in SSL$SYSTARTUP.COM
|
||||
$! should be cleaned up in this command procedure.
|
||||
$!
|
||||
$ DEASSIGN/SYSTEM/EXEC RANDFILE
|
||||
$ DEASSIGN/SYSTEM/EXEC SSL$RANDFILE
|
||||
$!
|
||||
7
VMS/ssl$systartup.com
Normal file
7
VMS/ssl$systartup.com
Normal file
@@ -0,0 +1,7 @@
|
||||
$!
|
||||
$!
|
||||
$! Add logical to aid random number generators. -- http://www.free.lp.se/openssl/docs/openssl3.html#ss3.1
|
||||
$!
|
||||
$ DEFINE/SYSTEM/EXEC RANDFILE SSL$ROOT:[PRIVATE]RANDFILE.;
|
||||
$ DEFINE/SYSTEM/EXEC SSL$RANDFILE SSL$ROOT:[PRIVATE]RANDFILE.;
|
||||
$!
|
||||
76
VMS/ssl$utils.com
Normal file
76
VMS/ssl$utils.com
Normal file
@@ -0,0 +1,76 @@
|
||||
$!
|
||||
$! APPS.COM
|
||||
$! Written By: Robert Byer
|
||||
$! Vice-President
|
||||
$! A-Com Computing, Inc.
|
||||
$! byer@mail.all-net.net
|
||||
$!
|
||||
$!
|
||||
$! Slightly modified by Richard Levitte <richard@levitte.org>
|
||||
$!
|
||||
$ IF P1 .NES. "" THEN GOTO 'P1
|
||||
$!
|
||||
$DEFINE:
|
||||
$!
|
||||
$ OPENSSL :== $SSL$EXE:OPENSSL
|
||||
$ VERIFY :== $SSL$EXE:OPENSSL VERIFY
|
||||
$ ASN1PARSE:== $SSL$EXE:OPENSSL ASN1PARS
|
||||
$ REQ :== $SSL$EXE:OPENSSL REQ
|
||||
$ DGST :== $SSL$EXE:OPENSSL DGST
|
||||
$ DH :== $SSL$EXE:OPENSSL DH
|
||||
$ ENC :== $SSL$EXE:OPENSSL ENC
|
||||
$ GENDH :== $SSL$EXE:OPENSSL GENDH
|
||||
$ ERRSTR :== $SSL$EXE:OPENSSL ERRSTR
|
||||
$ CA :== $SSL$EXE:OPENSSL CA
|
||||
$ CRL :== $SSL$EXE:OPENSSL CRL
|
||||
$ RSA :== $SSL$EXE:OPENSSL RSA
|
||||
$ DSA :== $SSL$EXE:OPENSSL DSA
|
||||
$ DSAPARAM :== $SSL$EXE:OPENSSL DSAPARAM
|
||||
$ X509 :== $SSL$EXE:OPENSSL X509
|
||||
$ GENRSA :== $SSL$EXE:OPENSSL GENRSA
|
||||
$ GENDSA :== $SSL$EXE:OPENSSL GENDSA
|
||||
$ S_SERVER :== $SSL$EXE:OPENSSL S_SERVER
|
||||
$ S_CLIENT :== $SSL$EXE:OPENSSL S_CLIENT
|
||||
$ SPEED :== $SSL$EXE:OPENSSL SPEED
|
||||
$ S_TIME :== $SSL$EXE:OPENSSL S_TIME
|
||||
$ VERSION :== $SSL$EXE:OPENSSL VERSION
|
||||
$ PKCS7 :== $SSL$EXE:OPENSSL PKCS7
|
||||
$ CRL2PKCS7:== $SSL$EXE:OPENSSL CRL2P7
|
||||
$ SESS_ID :== $SSL$EXE:OPENSSL SESS_ID
|
||||
$ CIPHERS :== $SSL$EXE:OPENSSL CIPHERS
|
||||
$ NSEQ :== $SSL$EXE:OPENSSL NSEQ
|
||||
$ PKCS12 :== $SSL$EXE:OPENSSL PKCS12
|
||||
$!
|
||||
$EXIT
|
||||
$!
|
||||
$REMOVE:
|
||||
$ DELETE/SYMBOL/GLOBAL OPENSSL
|
||||
$ DELETE/SYMBOL/GLOBAL VERIFY
|
||||
$ DELETE/SYMBOL/GLOBAL ASN1PARSE
|
||||
$ DELETE/SYMBOL/GLOBAL REQ
|
||||
$ DELETE/SYMBOL/GLOBAL DGST
|
||||
$ DELETE/SYMBOL/GLOBAL DH
|
||||
$ DELETE/SYMBOL/GLOBAL ENC
|
||||
$ DELETE/SYMBOL/GLOBAL GENDH
|
||||
$ DELETE/SYMBOL/GLOBAL ERRSTR
|
||||
$ DELETE/SYMBOL/GLOBAL CA
|
||||
$ DELETE/SYMBOL/GLOBAL CRL
|
||||
$ DELETE/SYMBOL/GLOBAL RSA
|
||||
$ DELETE/SYMBOL/GLOBAL DSA
|
||||
$ DELETE/SYMBOL/GLOBAL DSAPARAM
|
||||
$ DELETE/SYMBOL/GLOBAL X509
|
||||
$ DELETE/SYMBOL/GLOBAL GENRSA
|
||||
$ DELETE/SYMBOL/GLOBAL GENDSA
|
||||
$ DELETE/SYMBOL/GLOBAL S_SERVER
|
||||
$ DELETE/SYMBOL/GLOBAL S_CLIENT
|
||||
$ DELETE/SYMBOL/GLOBAL SPEED
|
||||
$ DELETE/SYMBOL/GLOBAL S_TIME
|
||||
$ DELETE/SYMBOL/GLOBAL VERSION
|
||||
$ DELETE/SYMBOL/GLOBAL PKCS7
|
||||
$ DELETE/SYMBOL/GLOBAL CRL2PKCS7
|
||||
$ DELETE/SYMBOL/GLOBAL SESS_ID
|
||||
$ DELETE/SYMBOL/GLOBAL CIPHERS
|
||||
$ DELETE/SYMBOL/GLOBAL NSEQ
|
||||
$ DELETE/SYMBOL/GLOBAL PKCS12
|
||||
$!
|
||||
$EXIT
|
||||
25
VMS/ssl010.release_notes
Normal file
25
VMS/ssl010.release_notes
Normal file
@@ -0,0 +1,25 @@
|
||||
|
||||
Compaq SSL for OpenVMS Alpha
|
||||
|
||||
Field Test Release Notes
|
||||
|
||||
February 2002
|
||||
|
||||
Based on OpenSSL 0.9.6B
|
||||
|
||||
Compaq SSL T1.0 for OpenVMS Alpha
|
||||
CPQ-AXPVMS-SSL-T0100--1.PCSI-DCX-AXPEXE
|
||||
|
||||
----------------------------------------------
|
||||
|
||||
Compaq is pleased to provide you with the first release of Compaq
|
||||
SSL for OpenVMS Alpha. Compaq SSL (Secure Sockets Layer)
|
||||
is based on the 0.9.6B release from the Open Group. See
|
||||
http://www.openssl.org for more information about OpenSSL.
|
||||
|
||||
Documentation for this kit, including installation and configuration
|
||||
information, release notes, a programming tutorial and API reference,
|
||||
is included in "Open Source Security for OpenVMS Alpha
|
||||
Volume 2: SSL" in HTML, PDF, and PostScript format. This document
|
||||
is included on the OpenVMS field test documentation CD-ROM.
|
||||
|
||||
1
VMS/tcpip_shr_decc.opt
Normal file
1
VMS/tcpip_shr_decc.opt
Normal file
@@ -0,0 +1 @@
|
||||
sys$share:tcpip$ipc_shr.exe/share
|
||||
@@ -5,7 +5,7 @@
|
||||
# things easier between now and when Eric is convinced to fix it :-)
|
||||
#
|
||||
# CA -newca ... will setup the right stuff
|
||||
# CA -newreq ... will generate a certificate request
|
||||
# CA -newreq[-nodes] ... will generate a certificate request
|
||||
# CA -sign ... will sign the generated request and output
|
||||
#
|
||||
# At the end of that grab newreq.pem and newcert.pem (one has the key
|
||||
@@ -54,7 +54,7 @@ $RET = 0;
|
||||
|
||||
foreach (@ARGV) {
|
||||
if ( /^(-\?|-h|-help)$/ ) {
|
||||
print STDERR "usage: CA -newcert|-newreq|-newca|-sign|-verify\n";
|
||||
print STDERR "usage: CA -newcert|-newreq|-newreq-nodes|-newca|-sign|-verify\n";
|
||||
exit 0;
|
||||
} elsif (/^-newcert$/) {
|
||||
# create a certificate
|
||||
@@ -66,6 +66,11 @@ foreach (@ARGV) {
|
||||
system ("$REQ -new -keyout newreq.pem -out newreq.pem $DAYS");
|
||||
$RET=$?;
|
||||
print "Request (and private key) is in newreq.pem\n";
|
||||
} elsif (/^-newreq-nodes$/) {
|
||||
# create a certificate request
|
||||
system ("$REQ -new -nodes -keyout newreq.pem -out newreq.pem $DAYS");
|
||||
$RET=$?;
|
||||
print "Request (and private key) is in newreq.pem\n";
|
||||
} elsif (/^-newca$/) {
|
||||
# if explicitly asked for or it doesn't exist then setup the
|
||||
# directory structure that Eric likes to manage things
|
||||
@@ -143,7 +148,7 @@ foreach (@ARGV) {
|
||||
}
|
||||
} else {
|
||||
print STDERR "Unknown arg $_\n";
|
||||
print STDERR "usage: CA -newcert|-newreq|-newca|-sign|-verify\n";
|
||||
print STDERR "usage: CA -newcert|-newreq|-newreq-nodes|-newca|-sign|-verify\n";
|
||||
exit 1;
|
||||
}
|
||||
}
|
||||
|
||||
1384
apps/Makefile.ssl
1384
apps/Makefile.ssl
File diff suppressed because it is too large
Load Diff
@@ -124,7 +124,7 @@ int app_RAND_load_file(const char *file, BIO *bio_e, int dont_warn)
|
||||
int consider_randfile = (file == NULL);
|
||||
char buffer[200];
|
||||
|
||||
#ifdef WINDOWS
|
||||
#ifdef OPENSSL_SYS_WINDOWS
|
||||
BIO_printf(bio_e,"Loading 'screen' into random state -");
|
||||
BIO_flush(bio_e);
|
||||
RAND_screen();
|
||||
@@ -180,8 +180,10 @@ long app_RAND_load_files(char *name)
|
||||
if (*n == '\0') break;
|
||||
|
||||
egd=RAND_egd(n);
|
||||
if (egd > 0) tot+=egd;
|
||||
tot+=RAND_load_file(n,-1);
|
||||
if (egd > 0)
|
||||
tot+=egd;
|
||||
else
|
||||
tot+=RAND_load_file(n,-1);
|
||||
if (last) break;
|
||||
}
|
||||
if (tot > 512)
|
||||
|
||||
576
apps/apps.c
576
apps/apps.c
@@ -55,6 +55,59 @@
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
/* ====================================================================
|
||||
* Copyright (c) 1998-2001 The OpenSSL Project. All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
*
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
*
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in
|
||||
* the documentation and/or other materials provided with the
|
||||
* distribution.
|
||||
*
|
||||
* 3. All advertising materials mentioning features or use of this
|
||||
* software must display the following acknowledgment:
|
||||
* "This product includes software developed by the OpenSSL Project
|
||||
* for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
|
||||
*
|
||||
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
|
||||
* endorse or promote products derived from this software without
|
||||
* prior written permission. For written permission, please contact
|
||||
* openssl-core@openssl.org.
|
||||
*
|
||||
* 5. Products derived from this software may not be called "OpenSSL"
|
||||
* nor may "OpenSSL" appear in their names without prior written
|
||||
* permission of the OpenSSL Project.
|
||||
*
|
||||
* 6. Redistributions of any form whatsoever must retain the following
|
||||
* acknowledgment:
|
||||
* "This product includes software developed by the OpenSSL Project
|
||||
* for use in the OpenSSL Toolkit (http://www.openssl.org/)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
|
||||
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
|
||||
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||||
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
||||
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
||||
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
||||
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
||||
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
||||
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
* ====================================================================
|
||||
*
|
||||
* This product includes cryptographic software written by Eric Young
|
||||
* (eay@cryptsoft.com). This product includes software written by Tim
|
||||
* Hudson (tjh@cryptsoft.com).
|
||||
*
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
@@ -66,11 +119,20 @@
|
||||
#undef NON_MAIN
|
||||
#include <openssl/err.h>
|
||||
#include <openssl/x509.h>
|
||||
#include <openssl/x509v3.h>
|
||||
#include <openssl/pem.h>
|
||||
#include <openssl/pkcs12.h>
|
||||
#include <openssl/ui.h>
|
||||
#include <openssl/safestack.h>
|
||||
#include <openssl/engine.h>
|
||||
|
||||
#ifdef WINDOWS
|
||||
#ifdef OPENSSL_SYS_WINDOWS
|
||||
#define strcasecmp _stricmp
|
||||
#else
|
||||
#include <strings.h>
|
||||
#endif
|
||||
|
||||
#ifdef OPENSSL_SYS_WINDOWS
|
||||
# include "bss_file.c"
|
||||
#endif
|
||||
|
||||
@@ -80,7 +142,17 @@ typedef struct {
|
||||
unsigned long mask;
|
||||
} NAME_EX_TBL;
|
||||
|
||||
static UI_METHOD *ui_method = NULL;
|
||||
|
||||
static int set_table_opts(unsigned long *flags, const char *arg, const NAME_EX_TBL *in_tbl);
|
||||
static int set_multi_opts(unsigned long *flags, const char *arg, const NAME_EX_TBL *in_tbl);
|
||||
|
||||
#if !defined(OPENSSL_NO_RC4) && !defined(OPENSSL_NO_RSA)
|
||||
/* Looks like this stuff is worth moving into separate function */
|
||||
static EVP_PKEY *
|
||||
load_netscape_key(BIO *err, BIO *key, const char *file,
|
||||
const char *key_descrip, int format);
|
||||
#endif
|
||||
|
||||
int app_init(long mesgwin);
|
||||
#ifdef undef /* never finished - probably never will be :-) */
|
||||
@@ -184,7 +256,7 @@ int str2fmt(char *s)
|
||||
return(FORMAT_UNDEF);
|
||||
}
|
||||
|
||||
#if defined(MSDOS) || defined(WIN32) || defined(WIN16)
|
||||
#if defined(OPENSSL_SYS_MSDOS) || defined(OPENSSL_SYS_WIN32) || defined(OPENSSL_SYS_WIN16)
|
||||
void program_name(char *in, char *out, int size)
|
||||
{
|
||||
int i,n;
|
||||
@@ -222,7 +294,7 @@ void program_name(char *in, char *out, int size)
|
||||
out[n]='\0';
|
||||
}
|
||||
#else
|
||||
#ifdef VMS
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
void program_name(char *in, char *out, int size)
|
||||
{
|
||||
char *p=in, *q;
|
||||
@@ -258,19 +330,16 @@ void program_name(char *in, char *out, int size)
|
||||
#endif
|
||||
#endif
|
||||
|
||||
#ifdef WIN32
|
||||
#ifdef OPENSSL_SYS_WIN32
|
||||
int WIN32_rename(char *from, char *to)
|
||||
{
|
||||
#ifdef WINNT
|
||||
int ret;
|
||||
/* Note: MoveFileEx() doesn't work under Win95, Win98 */
|
||||
|
||||
ret=MoveFileEx(from,to,MOVEFILE_REPLACE_EXISTING|MOVEFILE_COPY_ALLOWED);
|
||||
return(ret?0:-1);
|
||||
#else
|
||||
unlink(to);
|
||||
return MoveFile(from, to);
|
||||
#endif
|
||||
/* Windows rename gives an error if 'to' exists, so delete it
|
||||
* first and ignore file not found errror
|
||||
*/
|
||||
if((remove(to) != 0) && (errno != ENOENT))
|
||||
return -1;
|
||||
#undef rename
|
||||
return rename(from, to);
|
||||
}
|
||||
#endif
|
||||
|
||||
@@ -361,6 +430,159 @@ int dump_cert_text (BIO *out, X509 *x)
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int ui_open(UI *ui)
|
||||
{
|
||||
return UI_method_get_opener(UI_OpenSSL())(ui);
|
||||
}
|
||||
static int ui_read(UI *ui, UI_STRING *uis)
|
||||
{
|
||||
if (UI_get_input_flags(uis) & UI_INPUT_FLAG_DEFAULT_PWD
|
||||
&& UI_get0_user_data(ui))
|
||||
{
|
||||
switch(UI_get_string_type(uis))
|
||||
{
|
||||
case UIT_PROMPT:
|
||||
case UIT_VERIFY:
|
||||
{
|
||||
const char *password =
|
||||
((PW_CB_DATA *)UI_get0_user_data(ui))->password;
|
||||
if (password[0] != '\0')
|
||||
{
|
||||
UI_set_result(ui, uis, password);
|
||||
return 1;
|
||||
}
|
||||
}
|
||||
default:
|
||||
break;
|
||||
}
|
||||
}
|
||||
return UI_method_get_reader(UI_OpenSSL())(ui, uis);
|
||||
}
|
||||
static int ui_write(UI *ui, UI_STRING *uis)
|
||||
{
|
||||
if (UI_get_input_flags(uis) & UI_INPUT_FLAG_DEFAULT_PWD
|
||||
&& UI_get0_user_data(ui))
|
||||
{
|
||||
switch(UI_get_string_type(uis))
|
||||
{
|
||||
case UIT_PROMPT:
|
||||
case UIT_VERIFY:
|
||||
{
|
||||
const char *password =
|
||||
((PW_CB_DATA *)UI_get0_user_data(ui))->password;
|
||||
if (password[0] != '\0')
|
||||
return 1;
|
||||
}
|
||||
default:
|
||||
break;
|
||||
}
|
||||
}
|
||||
return UI_method_get_writer(UI_OpenSSL())(ui, uis);
|
||||
}
|
||||
static int ui_close(UI *ui)
|
||||
{
|
||||
return UI_method_get_closer(UI_OpenSSL())(ui);
|
||||
}
|
||||
int setup_ui_method()
|
||||
{
|
||||
ui_method = UI_create_method("OpenSSL application user interface");
|
||||
UI_method_set_opener(ui_method, ui_open);
|
||||
UI_method_set_reader(ui_method, ui_read);
|
||||
UI_method_set_writer(ui_method, ui_write);
|
||||
UI_method_set_closer(ui_method, ui_close);
|
||||
return 0;
|
||||
}
|
||||
void destroy_ui_method()
|
||||
{
|
||||
if(ui_method)
|
||||
{
|
||||
UI_destroy_method(ui_method);
|
||||
ui_method = NULL;
|
||||
}
|
||||
}
|
||||
int password_callback(char *buf, int bufsiz, int verify,
|
||||
PW_CB_DATA *cb_tmp)
|
||||
{
|
||||
UI *ui = NULL;
|
||||
int res = 0;
|
||||
const char *prompt_info = NULL;
|
||||
const char *password = NULL;
|
||||
PW_CB_DATA *cb_data = (PW_CB_DATA *)cb_tmp;
|
||||
|
||||
if (cb_data)
|
||||
{
|
||||
if (cb_data->password)
|
||||
password = cb_data->password;
|
||||
if (cb_data->prompt_info)
|
||||
prompt_info = cb_data->prompt_info;
|
||||
}
|
||||
|
||||
if (password)
|
||||
{
|
||||
res = strlen(password);
|
||||
if (res > bufsiz)
|
||||
res = bufsiz;
|
||||
memcpy(buf, password, res);
|
||||
return res;
|
||||
}
|
||||
|
||||
ui = UI_new_method(ui_method);
|
||||
if (ui)
|
||||
{
|
||||
int ok = 0;
|
||||
char *buff = NULL;
|
||||
int ui_flags = 0;
|
||||
char *prompt = NULL;
|
||||
|
||||
prompt = UI_construct_prompt(ui, "pass phrase",
|
||||
cb_data->prompt_info);
|
||||
|
||||
ui_flags |= UI_INPUT_FLAG_DEFAULT_PWD;
|
||||
UI_ctrl(ui, UI_CTRL_PRINT_ERRORS, 1, 0, 0);
|
||||
|
||||
if (ok >= 0)
|
||||
ok = UI_add_input_string(ui,prompt,ui_flags,buf,
|
||||
PW_MIN_LENGTH,BUFSIZ-1);
|
||||
if (ok >= 0 && verify)
|
||||
{
|
||||
buff = (char *)OPENSSL_malloc(bufsiz);
|
||||
ok = UI_add_verify_string(ui,prompt,ui_flags,buff,
|
||||
PW_MIN_LENGTH,BUFSIZ-1, buf);
|
||||
}
|
||||
if (ok >= 0)
|
||||
do
|
||||
{
|
||||
ok = UI_process(ui);
|
||||
}
|
||||
while (ok < 0 && UI_ctrl(ui, UI_CTRL_IS_REDOABLE, 0, 0, 0));
|
||||
|
||||
if (buff)
|
||||
{
|
||||
memset(buff,0,(unsigned int)bufsiz);
|
||||
OPENSSL_free(buff);
|
||||
}
|
||||
|
||||
if (ok >= 0)
|
||||
res = strlen(buf);
|
||||
if (ok == -1)
|
||||
{
|
||||
BIO_printf(bio_err, "User interface error\n");
|
||||
ERR_print_errors(bio_err);
|
||||
memset(buf,0,(unsigned int)bufsiz);
|
||||
res = 0;
|
||||
}
|
||||
if (ok == -2)
|
||||
{
|
||||
BIO_printf(bio_err,"aborted!\n");
|
||||
memset(buf,0,(unsigned int)bufsiz);
|
||||
res = 0;
|
||||
}
|
||||
UI_free(ui);
|
||||
OPENSSL_free(prompt);
|
||||
}
|
||||
return res;
|
||||
}
|
||||
|
||||
static char *app_get_pass(BIO *err, char *arg, int keepbio);
|
||||
|
||||
int app_passwd(BIO *err, char *arg1, char *arg2, char **pass1, char **pass2)
|
||||
@@ -436,14 +658,18 @@ static char *app_get_pass(BIO *err, char *arg, int keepbio)
|
||||
return BUF_strdup(tpass);
|
||||
}
|
||||
|
||||
int add_oid_section(BIO *err, LHASH *conf)
|
||||
int add_oid_section(BIO *err, CONF *conf)
|
||||
{
|
||||
char *p;
|
||||
STACK_OF(CONF_VALUE) *sktmp;
|
||||
CONF_VALUE *cnf;
|
||||
int i;
|
||||
if(!(p=CONF_get_string(conf,NULL,"oid_section"))) return 1;
|
||||
if(!(sktmp = CONF_get_section(conf, p))) {
|
||||
if(!(p=NCONF_get_string(conf,NULL,"oid_section")))
|
||||
{
|
||||
ERR_clear_error();
|
||||
return 1;
|
||||
}
|
||||
if(!(sktmp = NCONF_get_section(conf, p))) {
|
||||
BIO_printf(err, "problem loading oid section %s\n", p);
|
||||
return 0;
|
||||
}
|
||||
@@ -458,7 +684,8 @@ int add_oid_section(BIO *err, LHASH *conf)
|
||||
return 1;
|
||||
}
|
||||
|
||||
X509 *load_cert(BIO *err, char *file, int format)
|
||||
X509 *load_cert(BIO *err, const char *file, int format,
|
||||
const char *pass, ENGINE *e, const char *cert_descrip)
|
||||
{
|
||||
ASN1_HEADER *ah=NULL;
|
||||
BUF_MEM *buf=NULL;
|
||||
@@ -472,12 +699,17 @@ X509 *load_cert(BIO *err, char *file, int format)
|
||||
}
|
||||
|
||||
if (file == NULL)
|
||||
{
|
||||
setvbuf(stdin, NULL, _IONBF, 0);
|
||||
BIO_set_fp(cert,stdin,BIO_NOCLOSE);
|
||||
}
|
||||
else
|
||||
{
|
||||
if (BIO_read_filename(cert,file) <= 0)
|
||||
{
|
||||
perror(file);
|
||||
BIO_printf(err, "Error opening %s %s\n",
|
||||
cert_descrip, file);
|
||||
ERR_print_errors(err);
|
||||
goto end;
|
||||
}
|
||||
}
|
||||
@@ -528,7 +760,8 @@ X509 *load_cert(BIO *err, char *file, int format)
|
||||
ah->data=NULL;
|
||||
}
|
||||
else if (format == FORMAT_PEM)
|
||||
x=PEM_read_bio_X509_AUX(cert,NULL,NULL,NULL);
|
||||
x=PEM_read_bio_X509_AUX(cert,NULL,
|
||||
(pem_password_cb *)password_callback, NULL);
|
||||
else if (format == FORMAT_PKCS12)
|
||||
{
|
||||
PKCS12 *p12 = d2i_PKCS12_bio(cert, NULL);
|
||||
@@ -538,7 +771,8 @@ X509 *load_cert(BIO *err, char *file, int format)
|
||||
p12 = NULL;
|
||||
}
|
||||
else {
|
||||
BIO_printf(err,"bad input format specified for input cert\n");
|
||||
BIO_printf(err,"bad input format specified for %s\n",
|
||||
cert_descrip);
|
||||
goto end;
|
||||
}
|
||||
end:
|
||||
@@ -553,10 +787,15 @@ end:
|
||||
return(x);
|
||||
}
|
||||
|
||||
EVP_PKEY *load_key(BIO *err, char *file, int format, char *pass, ENGINE *e)
|
||||
EVP_PKEY *load_key(BIO *err, const char *file, int format,
|
||||
const char *pass, ENGINE *e, const char *key_descrip)
|
||||
{
|
||||
BIO *key=NULL;
|
||||
EVP_PKEY *pkey=NULL;
|
||||
PW_CB_DATA cb_data;
|
||||
|
||||
cb_data.password = pass;
|
||||
cb_data.prompt_info = file;
|
||||
|
||||
if (file == NULL)
|
||||
{
|
||||
@@ -568,7 +807,8 @@ EVP_PKEY *load_key(BIO *err, char *file, int format, char *pass, ENGINE *e)
|
||||
if (!e)
|
||||
BIO_printf(bio_err,"no engine specified\n");
|
||||
else
|
||||
pkey = ENGINE_load_private_key(e, file, pass);
|
||||
pkey = ENGINE_load_private_key(e, file,
|
||||
ui_method, &cb_data);
|
||||
goto end;
|
||||
}
|
||||
key=BIO_new(BIO_s_file());
|
||||
@@ -579,7 +819,8 @@ EVP_PKEY *load_key(BIO *err, char *file, int format, char *pass, ENGINE *e)
|
||||
}
|
||||
if (BIO_read_filename(key,file) <= 0)
|
||||
{
|
||||
perror(file);
|
||||
BIO_printf(err, "Error opening %s %s\n", key_descrip, file);
|
||||
ERR_print_errors(err);
|
||||
goto end;
|
||||
}
|
||||
if (format == FORMAT_ASN1)
|
||||
@@ -588,8 +829,13 @@ EVP_PKEY *load_key(BIO *err, char *file, int format, char *pass, ENGINE *e)
|
||||
}
|
||||
else if (format == FORMAT_PEM)
|
||||
{
|
||||
pkey=PEM_read_bio_PrivateKey(key,NULL,NULL,pass);
|
||||
pkey=PEM_read_bio_PrivateKey(key,NULL,
|
||||
(pem_password_cb *)password_callback, &cb_data);
|
||||
}
|
||||
#if !defined(OPENSSL_NO_RC4) && !defined(OPENSSL_NO_RSA)
|
||||
else if (format == FORMAT_NETSCAPE || format == FORMAT_IISSGC)
|
||||
pkey = load_netscape_key(err, key, file, key_descrip, format);
|
||||
#endif
|
||||
else if (format == FORMAT_PKCS12)
|
||||
{
|
||||
PKCS12 *p12 = d2i_PKCS12_bio(key, NULL);
|
||||
@@ -600,20 +846,25 @@ EVP_PKEY *load_key(BIO *err, char *file, int format, char *pass, ENGINE *e)
|
||||
}
|
||||
else
|
||||
{
|
||||
BIO_printf(err,"bad input format specified for key\n");
|
||||
BIO_printf(err,"bad input format specified for key file\n");
|
||||
goto end;
|
||||
}
|
||||
end:
|
||||
if (key != NULL) BIO_free(key);
|
||||
if (pkey == NULL)
|
||||
BIO_printf(err,"unable to load Private Key\n");
|
||||
BIO_printf(err,"unable to load %s\n", key_descrip);
|
||||
return(pkey);
|
||||
}
|
||||
|
||||
EVP_PKEY *load_pubkey(BIO *err, char *file, int format, ENGINE *e)
|
||||
EVP_PKEY *load_pubkey(BIO *err, const char *file, int format,
|
||||
const char *pass, ENGINE *e, const char *key_descrip)
|
||||
{
|
||||
BIO *key=NULL;
|
||||
EVP_PKEY *pkey=NULL;
|
||||
PW_CB_DATA cb_data;
|
||||
|
||||
cb_data.password = pass;
|
||||
cb_data.prompt_info = file;
|
||||
|
||||
if (file == NULL)
|
||||
{
|
||||
@@ -625,7 +876,8 @@ EVP_PKEY *load_pubkey(BIO *err, char *file, int format, ENGINE *e)
|
||||
if (!e)
|
||||
BIO_printf(bio_err,"no engine specified\n");
|
||||
else
|
||||
pkey = ENGINE_load_public_key(e, file, NULL);
|
||||
pkey = ENGINE_load_public_key(e, file,
|
||||
ui_method, &cb_data);
|
||||
goto end;
|
||||
}
|
||||
key=BIO_new(BIO_s_file());
|
||||
@@ -636,7 +888,8 @@ EVP_PKEY *load_pubkey(BIO *err, char *file, int format, ENGINE *e)
|
||||
}
|
||||
if (BIO_read_filename(key,file) <= 0)
|
||||
{
|
||||
perror(file);
|
||||
BIO_printf(err, "Error opening %s %s\n", key_descrip, file);
|
||||
ERR_print_errors(err);
|
||||
goto end;
|
||||
}
|
||||
if (format == FORMAT_ASN1)
|
||||
@@ -645,27 +898,83 @@ EVP_PKEY *load_pubkey(BIO *err, char *file, int format, ENGINE *e)
|
||||
}
|
||||
else if (format == FORMAT_PEM)
|
||||
{
|
||||
pkey=PEM_read_bio_PUBKEY(key,NULL,NULL,NULL);
|
||||
pkey=PEM_read_bio_PUBKEY(key,NULL,
|
||||
(pem_password_cb *)password_callback, &cb_data);
|
||||
}
|
||||
#if !defined(OPENSSL_NO_RC4) && !defined(OPENSSL_NO_RSA)
|
||||
else if (format == FORMAT_NETSCAPE || format == FORMAT_IISSGC)
|
||||
pkey = load_netscape_key(err, key, file, key_descrip, format);
|
||||
#endif
|
||||
else
|
||||
{
|
||||
BIO_printf(err,"bad input format specified for key\n");
|
||||
BIO_printf(err,"bad input format specified for key file\n");
|
||||
goto end;
|
||||
}
|
||||
end:
|
||||
if (key != NULL) BIO_free(key);
|
||||
if (pkey == NULL)
|
||||
BIO_printf(err,"unable to load Public Key\n");
|
||||
BIO_printf(err,"unable to load %s\n", key_descrip);
|
||||
return(pkey);
|
||||
}
|
||||
|
||||
STACK_OF(X509) *load_certs(BIO *err, char *file, int format)
|
||||
#if !defined(OPENSSL_NO_RC4) && !defined(OPENSSL_NO_RSA)
|
||||
EVP_PKEY *
|
||||
load_netscape_key(BIO *err, BIO *key, const char *file,
|
||||
const char *key_descrip, int format)
|
||||
{
|
||||
EVP_PKEY *pkey;
|
||||
BUF_MEM *buf;
|
||||
RSA *rsa;
|
||||
const unsigned char *p;
|
||||
int size, i;
|
||||
|
||||
buf=BUF_MEM_new();
|
||||
pkey = EVP_PKEY_new();
|
||||
size = 0;
|
||||
if (buf == NULL || pkey == NULL)
|
||||
goto error;
|
||||
for (;;)
|
||||
{
|
||||
if (!BUF_MEM_grow(buf,size+1024*10))
|
||||
goto error;
|
||||
i = BIO_read(key, &(buf->data[size]), 1024*10);
|
||||
size += i;
|
||||
if (i == 0)
|
||||
break;
|
||||
if (i < 0)
|
||||
{
|
||||
BIO_printf(err, "Error reading %s %s",
|
||||
key_descrip, file);
|
||||
goto error;
|
||||
}
|
||||
}
|
||||
p=(unsigned char *)buf->data;
|
||||
rsa = d2i_RSA_NET(NULL,&p,(long)size,NULL,
|
||||
(format == FORMAT_IISSGC ? 1 : 0));
|
||||
if (rsa == NULL)
|
||||
goto error;
|
||||
BUF_MEM_free(buf);
|
||||
EVP_PKEY_set1_RSA(pkey, rsa);
|
||||
return pkey;
|
||||
error:
|
||||
BUF_MEM_free(buf);
|
||||
EVP_PKEY_free(pkey);
|
||||
return NULL;
|
||||
}
|
||||
#endif /* ndef OPENSSL_NO_RC4 */
|
||||
|
||||
STACK_OF(X509) *load_certs(BIO *err, const char *file, int format,
|
||||
const char *pass, ENGINE *e, const char *cert_descrip)
|
||||
{
|
||||
BIO *certs;
|
||||
int i;
|
||||
STACK_OF(X509) *othercerts = NULL;
|
||||
STACK_OF(X509_INFO) *allcerts = NULL;
|
||||
X509_INFO *xi;
|
||||
PW_CB_DATA cb_data;
|
||||
|
||||
cb_data.password = pass;
|
||||
cb_data.prompt_info = file;
|
||||
|
||||
if((certs = BIO_new(BIO_s_file())) == NULL)
|
||||
{
|
||||
@@ -679,7 +988,9 @@ STACK_OF(X509) *load_certs(BIO *err, char *file, int format)
|
||||
{
|
||||
if (BIO_read_filename(certs,file) <= 0)
|
||||
{
|
||||
perror(file);
|
||||
BIO_printf(err, "Error opening %s %s\n",
|
||||
cert_descrip, file);
|
||||
ERR_print_errors(err);
|
||||
goto end;
|
||||
}
|
||||
}
|
||||
@@ -693,7 +1004,8 @@ STACK_OF(X509) *load_certs(BIO *err, char *file, int format)
|
||||
othercerts = NULL;
|
||||
goto end;
|
||||
}
|
||||
allcerts = PEM_X509_INFO_read_bio(certs, NULL, NULL, NULL);
|
||||
allcerts = PEM_X509_INFO_read_bio(certs, NULL,
|
||||
(pem_password_cb *)password_callback, &cb_data);
|
||||
for(i = 0; i < sk_X509_INFO_num(allcerts); i++)
|
||||
{
|
||||
xi = sk_X509_INFO_value (allcerts, i);
|
||||
@@ -706,7 +1018,8 @@ STACK_OF(X509) *load_certs(BIO *err, char *file, int format)
|
||||
goto end;
|
||||
}
|
||||
else {
|
||||
BIO_printf(err,"bad input format specified for input cert\n");
|
||||
BIO_printf(err,"bad input format specified for %s\n",
|
||||
cert_descrip);
|
||||
goto end;
|
||||
}
|
||||
end:
|
||||
@@ -731,16 +1044,21 @@ end:
|
||||
/* BIO_dump unknown extensions */
|
||||
#define X509V3_EXT_DUMP_UNKNOWN (3L << 16)
|
||||
|
||||
#define X509_FLAG_CA (X509_FLAG_NO_ISSUER | X509_FLAG_NO_PUBKEY | \
|
||||
X509_FLAG_NO_HEADER | X509_FLAG_NO_VERSION)
|
||||
|
||||
int set_cert_ex(unsigned long *flags, const char *arg)
|
||||
{
|
||||
static const NAME_EX_TBL cert_tbl[] = {
|
||||
{ "compatible", X509_FLAG_COMPAT, 0xffffffffl},
|
||||
{ "ca_default", X509_FLAG_CA, 0xffffffffl},
|
||||
{ "no_header", X509_FLAG_NO_HEADER, 0},
|
||||
{ "no_version", X509_FLAG_NO_VERSION, 0},
|
||||
{ "no_serial", X509_FLAG_NO_SERIAL, 0},
|
||||
{ "no_signame", X509_FLAG_NO_SIGNAME, 0},
|
||||
{ "no_validity", X509_FLAG_NO_VALIDITY, 0},
|
||||
{ "no_subject", X509_FLAG_NO_SUBJECT, 0},
|
||||
{ "no_issuer", X509_FLAG_NO_ISSUER, 0},
|
||||
{ "no_pubkey", X509_FLAG_NO_PUBKEY, 0},
|
||||
{ "no_extensions", X509_FLAG_NO_EXTENSIONS, 0},
|
||||
{ "no_sigdump", X509_FLAG_NO_SIGDUMP, 0},
|
||||
@@ -751,7 +1069,7 @@ int set_cert_ex(unsigned long *flags, const char *arg)
|
||||
{ "ext_dump", X509V3_EXT_DUMP_UNKNOWN, X509V3_EXT_UNKNOWN_MASK},
|
||||
{ NULL, 0, 0}
|
||||
};
|
||||
return set_table_opts(flags, arg, cert_tbl);
|
||||
return set_multi_opts(flags, arg, cert_tbl);
|
||||
}
|
||||
|
||||
int set_name_ex(unsigned long *flags, const char *arg)
|
||||
@@ -776,15 +1094,89 @@ int set_name_ex(unsigned long *flags, const char *arg)
|
||||
{ "nofname", XN_FLAG_FN_NONE, XN_FLAG_FN_MASK},
|
||||
{ "sname", XN_FLAG_FN_SN, XN_FLAG_FN_MASK},
|
||||
{ "lname", XN_FLAG_FN_LN, XN_FLAG_FN_MASK},
|
||||
{ "align", XN_FLAG_FN_ALIGN, 0},
|
||||
{ "oid", XN_FLAG_FN_OID, XN_FLAG_FN_MASK},
|
||||
{ "space_eq", XN_FLAG_SPC_EQ, 0},
|
||||
{ "dump_unknown", XN_FLAG_DUMP_UNKNOWN_FIELDS, 0},
|
||||
{ "RFC2253", XN_FLAG_RFC2253, 0xffffffffL},
|
||||
{ "oneline", XN_FLAG_ONELINE, 0xffffffffL},
|
||||
{ "multiline", XN_FLAG_MULTILINE, 0xffffffffL},
|
||||
{ "ca_default", XN_FLAG_MULTILINE, 0xffffffffL},
|
||||
{ NULL, 0, 0}
|
||||
};
|
||||
return set_table_opts(flags, arg, ex_tbl);
|
||||
return set_multi_opts(flags, arg, ex_tbl);
|
||||
}
|
||||
|
||||
int set_ext_copy(int *copy_type, const char *arg)
|
||||
{
|
||||
if (!strcasecmp(arg, "none"))
|
||||
*copy_type = EXT_COPY_NONE;
|
||||
else if (!strcasecmp(arg, "copy"))
|
||||
*copy_type = EXT_COPY_ADD;
|
||||
else if (!strcasecmp(arg, "copyall"))
|
||||
*copy_type = EXT_COPY_ALL;
|
||||
else
|
||||
return 0;
|
||||
return 1;
|
||||
}
|
||||
|
||||
int copy_extensions(X509 *x, X509_REQ *req, int copy_type)
|
||||
{
|
||||
STACK_OF(X509_EXTENSION) *exts = NULL;
|
||||
X509_EXTENSION *ext, *tmpext;
|
||||
ASN1_OBJECT *obj;
|
||||
int i, idx, ret = 0;
|
||||
if (!x || !req || (copy_type == EXT_COPY_NONE))
|
||||
return 1;
|
||||
exts = X509_REQ_get_extensions(req);
|
||||
|
||||
for(i = 0; i < sk_X509_EXTENSION_num(exts); i++) {
|
||||
ext = sk_X509_EXTENSION_value(exts, i);
|
||||
obj = X509_EXTENSION_get_object(ext);
|
||||
idx = X509_get_ext_by_OBJ(x, obj, -1);
|
||||
/* Does extension exist? */
|
||||
if (idx != -1) {
|
||||
/* If normal copy don't override existing extension */
|
||||
if (copy_type == EXT_COPY_ADD)
|
||||
continue;
|
||||
/* Delete all extensions of same type */
|
||||
do {
|
||||
tmpext = X509_get_ext(x, idx);
|
||||
X509_delete_ext(x, idx);
|
||||
X509_EXTENSION_free(tmpext);
|
||||
idx = X509_get_ext_by_OBJ(x, obj, -1);
|
||||
} while (idx != -1);
|
||||
}
|
||||
if (!X509_add_ext(x, ext, -1))
|
||||
goto end;
|
||||
}
|
||||
|
||||
ret = 1;
|
||||
|
||||
end:
|
||||
|
||||
sk_X509_EXTENSION_pop_free(exts, X509_EXTENSION_free);
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
|
||||
|
||||
|
||||
static int set_multi_opts(unsigned long *flags, const char *arg, const NAME_EX_TBL *in_tbl)
|
||||
{
|
||||
STACK_OF(CONF_VALUE) *vals;
|
||||
CONF_VALUE *val;
|
||||
int i, ret = 1;
|
||||
if(!arg) return 0;
|
||||
vals = X509V3_parse_list(arg);
|
||||
for (i = 0; i < sk_CONF_VALUE_num(vals); i++) {
|
||||
val = sk_CONF_VALUE_value(vals, i);
|
||||
if (!set_table_opts(flags, val->name, in_tbl))
|
||||
ret = 0;
|
||||
}
|
||||
sk_CONF_VALUE_pop_free(vals, X509V3_conf_free);
|
||||
return ret;
|
||||
}
|
||||
|
||||
static int set_table_opts(unsigned long *flags, const char *arg, const NAME_EX_TBL *in_tbl)
|
||||
@@ -802,7 +1194,7 @@ static int set_table_opts(unsigned long *flags, const char *arg, const NAME_EX_T
|
||||
} else c = 1;
|
||||
|
||||
for(ptbl = in_tbl; ptbl->name; ptbl++) {
|
||||
if(!strcmp(arg, ptbl->name)) {
|
||||
if(!strcasecmp(arg, ptbl->name)) {
|
||||
*flags &= ~ptbl->mask;
|
||||
if(c) *flags |= ptbl->flag;
|
||||
else *flags &= ~ptbl->flag;
|
||||
@@ -833,3 +1225,107 @@ void print_name(BIO *out, char *title, X509_NAME *nm, unsigned long lflags)
|
||||
}
|
||||
}
|
||||
|
||||
X509_STORE *setup_verify(BIO *bp, char *CAfile, char *CApath)
|
||||
{
|
||||
X509_STORE *store;
|
||||
X509_LOOKUP *lookup;
|
||||
if(!(store = X509_STORE_new())) goto end;
|
||||
lookup=X509_STORE_add_lookup(store,X509_LOOKUP_file());
|
||||
if (lookup == NULL) goto end;
|
||||
if (CAfile) {
|
||||
if(!X509_LOOKUP_load_file(lookup,CAfile,X509_FILETYPE_PEM)) {
|
||||
BIO_printf(bp, "Error loading file %s\n", CAfile);
|
||||
goto end;
|
||||
}
|
||||
} else X509_LOOKUP_load_file(lookup,NULL,X509_FILETYPE_DEFAULT);
|
||||
|
||||
lookup=X509_STORE_add_lookup(store,X509_LOOKUP_hash_dir());
|
||||
if (lookup == NULL) goto end;
|
||||
if (CApath) {
|
||||
if(!X509_LOOKUP_add_dir(lookup,CApath,X509_FILETYPE_PEM)) {
|
||||
BIO_printf(bp, "Error loading directory %s\n", CApath);
|
||||
goto end;
|
||||
}
|
||||
} else X509_LOOKUP_add_dir(lookup,NULL,X509_FILETYPE_DEFAULT);
|
||||
|
||||
ERR_clear_error();
|
||||
return store;
|
||||
end:
|
||||
X509_STORE_free(store);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
/* Try to load an engine in a shareable library */
|
||||
ENGINE *try_load_engine(BIO *err, const char *engine, int debug)
|
||||
{
|
||||
ENGINE *e = ENGINE_by_id("dynamic");
|
||||
if (e)
|
||||
{
|
||||
if (!ENGINE_ctrl_cmd_string(e, "SO_PATH", engine, 0)
|
||||
|| !ENGINE_ctrl_cmd_string(e, "LOAD", NULL, 0))
|
||||
{
|
||||
ENGINE_free(e);
|
||||
e = NULL;
|
||||
}
|
||||
}
|
||||
return e;
|
||||
}
|
||||
|
||||
ENGINE *setup_engine(BIO *err, const char *engine, int debug)
|
||||
{
|
||||
ENGINE *e = NULL;
|
||||
|
||||
if (engine)
|
||||
{
|
||||
if(strcmp(engine, "auto") == 0)
|
||||
{
|
||||
BIO_printf(err,"enabling auto ENGINE support\n");
|
||||
ENGINE_register_all_complete();
|
||||
return NULL;
|
||||
}
|
||||
if((e = ENGINE_by_id(engine)) == NULL
|
||||
&& (e = try_load_engine(err, engine, debug)) == NULL)
|
||||
{
|
||||
BIO_printf(err,"invalid engine \"%s\"\n", engine);
|
||||
ERR_print_errors(err);
|
||||
return NULL;
|
||||
}
|
||||
if (debug)
|
||||
{
|
||||
ENGINE_ctrl(e, ENGINE_CTRL_SET_LOGSTREAM,
|
||||
0, err, 0);
|
||||
}
|
||||
ENGINE_ctrl_cmd(e, "SET_USER_INTERFACE", 0, ui_method, 0, 1);
|
||||
if(!ENGINE_set_default(e, ENGINE_METHOD_ALL))
|
||||
{
|
||||
BIO_printf(err,"can't use that engine\n");
|
||||
ERR_print_errors(err);
|
||||
ENGINE_free(e);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
BIO_printf(err,"engine \"%s\" set.\n", ENGINE_get_id(e));
|
||||
|
||||
/* Free our "structural" reference. */
|
||||
ENGINE_free(e);
|
||||
}
|
||||
return e;
|
||||
}
|
||||
|
||||
int load_config(BIO *err, CONF *cnf)
|
||||
{
|
||||
if (!cnf)
|
||||
cnf = config;
|
||||
if (!cnf)
|
||||
return 1;
|
||||
|
||||
OPENSSL_load_builtin_modules();
|
||||
|
||||
if (CONF_modules_load(cnf, NULL, 0) <= 0)
|
||||
{
|
||||
BIO_printf(err, "Error configuring OpenSSL\n");
|
||||
ERR_print_errors(err);
|
||||
return 0;
|
||||
}
|
||||
return 1;
|
||||
}
|
||||
|
||||
136
apps/apps.h
136
apps/apps.h
@@ -55,11 +55,64 @@
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
/* ====================================================================
|
||||
* Copyright (c) 1998-2001 The OpenSSL Project. All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
*
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
*
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in
|
||||
* the documentation and/or other materials provided with the
|
||||
* distribution.
|
||||
*
|
||||
* 3. All advertising materials mentioning features or use of this
|
||||
* software must display the following acknowledgment:
|
||||
* "This product includes software developed by the OpenSSL Project
|
||||
* for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
|
||||
*
|
||||
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
|
||||
* endorse or promote products derived from this software without
|
||||
* prior written permission. For written permission, please contact
|
||||
* openssl-core@openssl.org.
|
||||
*
|
||||
* 5. Products derived from this software may not be called "OpenSSL"
|
||||
* nor may "OpenSSL" appear in their names without prior written
|
||||
* permission of the OpenSSL Project.
|
||||
*
|
||||
* 6. Redistributions of any form whatsoever must retain the following
|
||||
* acknowledgment:
|
||||
* "This product includes software developed by the OpenSSL Project
|
||||
* for use in the OpenSSL Toolkit (http://www.openssl.org/)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
|
||||
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
|
||||
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||||
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
||||
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
||||
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
||||
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
||||
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
||||
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
* ====================================================================
|
||||
*
|
||||
* This product includes cryptographic software written by Eric Young
|
||||
* (eay@cryptsoft.com). This product includes software written by Tim
|
||||
* Hudson (tjh@cryptsoft.com).
|
||||
*
|
||||
*/
|
||||
|
||||
#ifndef HEADER_APPS_H
|
||||
#define HEADER_APPS_H
|
||||
|
||||
#include "openssl/e_os.h"
|
||||
#include "e_os.h"
|
||||
|
||||
#include <openssl/buffer.h>
|
||||
#include <openssl/bio.h>
|
||||
@@ -67,7 +120,9 @@
|
||||
#include <openssl/x509.h>
|
||||
#include <openssl/lhash.h>
|
||||
#include <openssl/conf.h>
|
||||
#include <openssl/txt_db.h>
|
||||
#include <openssl/engine.h>
|
||||
#include <openssl/ossl_typ.h>
|
||||
|
||||
int app_RAND_load_file(const char *file, BIO *bio_e, int dont_warn);
|
||||
int app_RAND_write_file(const char *file, BIO *bio_e);
|
||||
@@ -79,11 +134,11 @@ long app_RAND_load_files(char *file); /* `file' is a list of files to read,
|
||||
* (see e_os.h). The string is
|
||||
* destroyed! */
|
||||
|
||||
#ifdef NO_STDIO
|
||||
#ifdef OPENSSL_NO_STDIO
|
||||
BIO_METHOD *BIO_s_file();
|
||||
#endif
|
||||
|
||||
#ifdef WIN32
|
||||
#ifdef OPENSSL_SYS_WIN32
|
||||
#define rename(from,to) WIN32_rename((from),(to))
|
||||
int WIN32_rename(char *oldname,char *newname);
|
||||
#endif
|
||||
@@ -101,7 +156,7 @@ extern BIO *bio_err;
|
||||
#else
|
||||
|
||||
#define MAIN(a,v) PROG(a,v)
|
||||
extern LHASH *config;
|
||||
extern CONF *config;
|
||||
extern char *default_config_file;
|
||||
extern BIO *bio_err;
|
||||
|
||||
@@ -116,23 +171,34 @@ extern BIO *bio_err;
|
||||
#endif
|
||||
|
||||
#if defined(MONOLITH) && !defined(OPENSSL_C)
|
||||
# define apps_startup() do_pipe_sig()
|
||||
# define apps_startup() \
|
||||
do_pipe_sig()
|
||||
# define apps_shutdown()
|
||||
#else
|
||||
# if defined(MSDOS) || defined(WIN16) || defined(WIN32)
|
||||
# if defined(OPENSSL_SYS_MSDOS) || defined(OPENSSL_SYS_WIN16) || \
|
||||
defined(OPENSSL_SYS_WIN32)
|
||||
# ifdef _O_BINARY
|
||||
# define apps_startup() \
|
||||
_fmode=_O_BINARY; do_pipe_sig(); CRYPTO_malloc_init(); \
|
||||
SSLeay_add_all_algorithms(); ENGINE_load_builtin_engines()
|
||||
do { _fmode=_O_BINARY; do_pipe_sig(); CRYPTO_malloc_init(); \
|
||||
ERR_load_crypto_strings(); OpenSSL_add_all_algorithms(); \
|
||||
ENGINE_load_builtin_engines(); setup_ui_method(); } while(0)
|
||||
# else
|
||||
# define apps_startup() \
|
||||
_fmode=O_BINARY; do_pipe_sig(); CRYPTO_malloc_init(); \
|
||||
SSLeay_add_all_algorithms(); ENGINE_load_builtin_engines()
|
||||
do { _fmode=O_BINARY; do_pipe_sig(); CRYPTO_malloc_init(); \
|
||||
ERR_load_crypto_strings(); OpenSSL_add_all_algorithms(); \
|
||||
ENGINE_load_builtin_engines(); setup_ui_method(); } while(0)
|
||||
# endif
|
||||
# else
|
||||
# define apps_startup() \
|
||||
do_pipe_sig(); SSLeay_add_all_algorithms(); \
|
||||
ENGINE_load_builtin_engines()
|
||||
do { do_pipe_sig(); OpenSSL_add_all_algorithms(); \
|
||||
ERR_load_crypto_strings(); ENGINE_load_builtin_engines(); \
|
||||
setup_ui_method(); } while(0)
|
||||
# endif
|
||||
# define apps_shutdown() \
|
||||
do { CONF_modules_unload(1); destroy_ui_method(); \
|
||||
EVP_cleanup(); ENGINE_cleanup(); \
|
||||
CRYPTO_cleanup_all_ex_data(); ERR_remove_state(0); \
|
||||
ERR_free_strings(); } while(0)
|
||||
#endif
|
||||
|
||||
typedef struct args_st
|
||||
@@ -141,6 +207,19 @@ typedef struct args_st
|
||||
int count;
|
||||
} ARGS;
|
||||
|
||||
#define PW_MIN_LENGTH 4
|
||||
typedef struct pw_cb_data
|
||||
{
|
||||
const void *password;
|
||||
const char *prompt_info;
|
||||
} PW_CB_DATA;
|
||||
|
||||
int password_callback(char *buf, int bufsiz, int verify,
|
||||
PW_CB_DATA *cb_data);
|
||||
|
||||
int setup_ui_method();
|
||||
void destroy_ui_method();
|
||||
|
||||
int should_retry(int i);
|
||||
int args_from_file(char *file, int *argc, char **argv[]);
|
||||
int str2fmt(char *s);
|
||||
@@ -152,12 +231,29 @@ void print_name(BIO *out, char *title, X509_NAME *nm, unsigned long lflags);
|
||||
#endif
|
||||
int set_cert_ex(unsigned long *flags, const char *arg);
|
||||
int set_name_ex(unsigned long *flags, const char *arg);
|
||||
int set_ext_copy(int *copy_type, const char *arg);
|
||||
int copy_extensions(X509 *x, X509_REQ *req, int copy_type);
|
||||
int app_passwd(BIO *err, char *arg1, char *arg2, char **pass1, char **pass2);
|
||||
int add_oid_section(BIO *err, LHASH *conf);
|
||||
X509 *load_cert(BIO *err, char *file, int format);
|
||||
EVP_PKEY *load_key(BIO *err, char *file, int format, char *pass, ENGINE *e);
|
||||
EVP_PKEY *load_pubkey(BIO *err, char *file, int format, ENGINE *e);
|
||||
STACK_OF(X509) *load_certs(BIO *err, char *file, int format);
|
||||
int add_oid_section(BIO *err, CONF *conf);
|
||||
X509 *load_cert(BIO *err, const char *file, int format,
|
||||
const char *pass, ENGINE *e, const char *cert_descrip);
|
||||
EVP_PKEY *load_key(BIO *err, const char *file, int format,
|
||||
const char *pass, ENGINE *e, const char *key_descrip);
|
||||
EVP_PKEY *load_pubkey(BIO *err, const char *file, int format,
|
||||
const char *pass, ENGINE *e, const char *key_descrip);
|
||||
STACK_OF(X509) *load_certs(BIO *err, const char *file, int format,
|
||||
const char *pass, ENGINE *e, const char *cert_descrip);
|
||||
X509_STORE *setup_verify(BIO *bp, char *CAfile, char *CApath);
|
||||
ENGINE *setup_engine(BIO *err, const char *engine, int debug);
|
||||
|
||||
int load_config(BIO *err, CONF *cnf);
|
||||
|
||||
/* Functions defined in ca.c and also used in ocsp.c */
|
||||
int unpack_revinfo(ASN1_TIME **prevtm, int *preason, ASN1_OBJECT **phold,
|
||||
ASN1_GENERALIZEDTIME **pinvtm, char *str);
|
||||
int make_serial_index(TXT_DB *db);
|
||||
|
||||
X509_NAME *do_subject(char *str, long chtype);
|
||||
|
||||
#define FORMAT_UNDEF 0
|
||||
#define FORMAT_ASN1 1
|
||||
@@ -167,6 +263,12 @@ STACK_OF(X509) *load_certs(BIO *err, char *file, int format);
|
||||
#define FORMAT_PKCS12 5
|
||||
#define FORMAT_SMIME 6
|
||||
#define FORMAT_ENGINE 7
|
||||
#define FORMAT_IISSGC 8 /* XXX this stupid macro helps us to avoid
|
||||
* adding yet another param to load_*key() */
|
||||
|
||||
#define EXT_COPY_NONE 0
|
||||
#define EXT_COPY_ADD 1
|
||||
#define EXT_COPY_ALL 2
|
||||
|
||||
#define NETSCAPE_CERT_HDR "certificate"
|
||||
|
||||
|
||||
@@ -103,6 +103,9 @@ int MAIN(int argc, char **argv)
|
||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
||||
|
||||
if (!load_config(bio_err, NULL))
|
||||
goto end;
|
||||
|
||||
prog=argv[0];
|
||||
argc--;
|
||||
argv++;
|
||||
@@ -206,7 +209,7 @@ bad:
|
||||
goto end;
|
||||
}
|
||||
BIO_set_fp(out,stdout,BIO_NOCLOSE|BIO_FP_TEXT);
|
||||
#ifdef VMS
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
{
|
||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||
out = BIO_push(tmpbio, out);
|
||||
@@ -329,6 +332,7 @@ end:
|
||||
if (at != NULL) ASN1_TYPE_free(at);
|
||||
if (osk != NULL) sk_free(osk);
|
||||
OBJ_cleanup();
|
||||
apps_shutdown();
|
||||
EXIT(ret);
|
||||
}
|
||||
|
||||
|
||||
@@ -59,7 +59,7 @@
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#ifdef NO_STDIO
|
||||
#ifdef OPENSSL_NO_STDIO
|
||||
#define APPS_WIN16
|
||||
#endif
|
||||
#include "apps.h"
|
||||
@@ -95,11 +95,11 @@ int MAIN(int argc, char **argv)
|
||||
char buf[512];
|
||||
BIO *STDout=NULL;
|
||||
|
||||
#if !defined(NO_SSL2) && !defined(NO_SSL3)
|
||||
#if !defined(OPENSSL_NO_SSL2) && !defined(OPENSSL_NO_SSL3)
|
||||
meth=SSLv23_server_method();
|
||||
#elif !defined(NO_SSL3)
|
||||
#elif !defined(OPENSSL_NO_SSL3)
|
||||
meth=SSLv3_server_method();
|
||||
#elif !defined(NO_SSL2)
|
||||
#elif !defined(OPENSSL_NO_SSL2)
|
||||
meth=SSLv2_server_method();
|
||||
#endif
|
||||
|
||||
@@ -108,7 +108,7 @@ int MAIN(int argc, char **argv)
|
||||
if (bio_err == NULL)
|
||||
bio_err=BIO_new_fp(stderr,BIO_NOCLOSE);
|
||||
STDout=BIO_new_fp(stdout,BIO_NOCLOSE);
|
||||
#ifdef VMS
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
{
|
||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||
STDout = BIO_push(tmpbio, STDout);
|
||||
@@ -121,15 +121,15 @@ int MAIN(int argc, char **argv)
|
||||
{
|
||||
if (strcmp(*argv,"-v") == 0)
|
||||
verbose=1;
|
||||
#ifndef NO_SSL2
|
||||
#ifndef OPENSSL_NO_SSL2
|
||||
else if (strcmp(*argv,"-ssl2") == 0)
|
||||
meth=SSLv2_client_method();
|
||||
#endif
|
||||
#ifndef NO_SSL3
|
||||
#ifndef OPENSSL_NO_SSL3
|
||||
else if (strcmp(*argv,"-ssl3") == 0)
|
||||
meth=SSLv3_client_method();
|
||||
#endif
|
||||
#ifndef NO_TLS1
|
||||
#ifndef OPENSSL_NO_TLS1
|
||||
else if (strcmp(*argv,"-tls1") == 0)
|
||||
meth=TLSv1_client_method();
|
||||
#endif
|
||||
@@ -150,7 +150,7 @@ int MAIN(int argc, char **argv)
|
||||
if (badops)
|
||||
{
|
||||
for (pp=ciphers_usage; (*pp != NULL); pp++)
|
||||
BIO_printf(bio_err,*pp);
|
||||
BIO_printf(bio_err,"%s",*pp);
|
||||
goto end;
|
||||
}
|
||||
|
||||
@@ -202,6 +202,7 @@ end:
|
||||
if (ctx != NULL) SSL_CTX_free(ctx);
|
||||
if (ssl != NULL) SSL_free(ssl);
|
||||
if (STDout != NULL) BIO_free_all(STDout);
|
||||
apps_shutdown();
|
||||
EXIT(ret);
|
||||
}
|
||||
|
||||
|
||||
29
apps/crl.c
29
apps/crl.c
@@ -87,6 +87,7 @@ static char *crl_usage[]={
|
||||
" -noout - no CRL output\n",
|
||||
" -CAfile name - verify CRL using certificates in file \"name\"\n",
|
||||
" -CApath dir - verify CRL using certificates in \"dir\"\n",
|
||||
" -nameopt arg - various certificate name options\n",
|
||||
NULL
|
||||
};
|
||||
|
||||
@@ -97,6 +98,7 @@ int MAIN(int, char **);
|
||||
|
||||
int MAIN(int argc, char **argv)
|
||||
{
|
||||
unsigned long nmflag = 0;
|
||||
X509_CRL *x=NULL;
|
||||
char *CAfile = NULL, *CApath = NULL;
|
||||
int ret=1,i,num,badops=0;
|
||||
@@ -105,7 +107,7 @@ int MAIN(int argc, char **argv)
|
||||
char *infile=NULL,*outfile=NULL;
|
||||
int hash=0,issuer=0,lastupdate=0,nextupdate=0,noout=0,text=0;
|
||||
int fingerprint = 0;
|
||||
char **pp,buf[256];
|
||||
char **pp;
|
||||
X509_STORE *store = NULL;
|
||||
X509_STORE_CTX ctx;
|
||||
X509_LOOKUP *lookup = NULL;
|
||||
@@ -120,11 +122,14 @@ int MAIN(int argc, char **argv)
|
||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
||||
|
||||
if (!load_config(bio_err, NULL))
|
||||
goto end;
|
||||
|
||||
if (bio_out == NULL)
|
||||
if ((bio_out=BIO_new(BIO_s_file())) != NULL)
|
||||
{
|
||||
BIO_set_fp(bio_out,stdout,BIO_NOCLOSE);
|
||||
#ifdef VMS
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
{
|
||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||
bio_out = BIO_push(tmpbio, bio_out);
|
||||
@@ -185,6 +190,11 @@ int MAIN(int argc, char **argv)
|
||||
text = 1;
|
||||
else if (strcmp(*argv,"-hash") == 0)
|
||||
hash= ++num;
|
||||
else if (strcmp(*argv,"-nameopt") == 0)
|
||||
{
|
||||
if (--argc < 1) goto bad;
|
||||
if (!set_name_ex(&nmflag, *(++argv))) goto bad;
|
||||
}
|
||||
else if (strcmp(*argv,"-issuer") == 0)
|
||||
issuer= ++num;
|
||||
else if (strcmp(*argv,"-lastupdate") == 0)
|
||||
@@ -214,7 +224,7 @@ int MAIN(int argc, char **argv)
|
||||
{
|
||||
bad:
|
||||
for (pp=crl_usage; (*pp != NULL); pp++)
|
||||
BIO_printf(bio_err,*pp);
|
||||
BIO_printf(bio_err,"%s",*pp);
|
||||
goto end;
|
||||
}
|
||||
|
||||
@@ -235,7 +245,11 @@ bad:
|
||||
X509_LOOKUP_add_dir(lookup,NULL,X509_FILETYPE_DEFAULT);
|
||||
ERR_clear_error();
|
||||
|
||||
X509_STORE_CTX_init(&ctx, store, NULL, NULL);
|
||||
if(!X509_STORE_CTX_init(&ctx, store, NULL, NULL)) {
|
||||
BIO_printf(bio_err,
|
||||
"Error initialising X509 store\n");
|
||||
goto end;
|
||||
}
|
||||
|
||||
i = X509_STORE_get_by_subject(&ctx, X509_LU_X509,
|
||||
X509_CRL_get_issuer(x), &xobj);
|
||||
@@ -264,9 +278,7 @@ bad:
|
||||
{
|
||||
if (issuer == i)
|
||||
{
|
||||
X509_NAME_oneline(X509_CRL_get_issuer(x),
|
||||
buf,256);
|
||||
BIO_printf(bio_out,"issuer= %s\n",buf);
|
||||
print_name(bio_out, "issuer=", X509_CRL_get_issuer(x), nmflag);
|
||||
}
|
||||
|
||||
if (hash == i)
|
||||
@@ -324,7 +336,7 @@ bad:
|
||||
if (outfile == NULL)
|
||||
{
|
||||
BIO_set_fp(out,stdout,BIO_NOCLOSE);
|
||||
#ifdef VMS
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
{
|
||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||
out = BIO_push(tmpbio, out);
|
||||
@@ -364,6 +376,7 @@ end:
|
||||
X509_STORE_CTX_cleanup(&ctx);
|
||||
X509_STORE_free(store);
|
||||
}
|
||||
apps_shutdown();
|
||||
EXIT(ret);
|
||||
}
|
||||
|
||||
|
||||
@@ -166,7 +166,8 @@ bad:
|
||||
BIO_printf(bio_err," -certfile arg certificates file of chain to a trusted CA\n");
|
||||
BIO_printf(bio_err," (can be used more than once)\n");
|
||||
BIO_printf(bio_err," -nocrl no crl to load, just certs from '-certfile'\n");
|
||||
EXIT(1);
|
||||
ret = 1;
|
||||
goto end;
|
||||
}
|
||||
|
||||
ERR_load_crypto_strings();
|
||||
@@ -241,7 +242,7 @@ bad:
|
||||
if (outfile == NULL)
|
||||
{
|
||||
BIO_set_fp(out,stdout,BIO_NOCLOSE);
|
||||
#ifdef VMS
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
{
|
||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||
out = BIO_push(tmpbio, out);
|
||||
@@ -278,6 +279,7 @@ end:
|
||||
if (p7 != NULL) PKCS7_free(p7);
|
||||
if (crl != NULL) X509_CRL_free(crl);
|
||||
|
||||
apps_shutdown();
|
||||
EXIT(ret);
|
||||
}
|
||||
|
||||
|
||||
78
apps/dgst.c
78
apps/dgst.c
@@ -66,7 +66,6 @@
|
||||
#include <openssl/objects.h>
|
||||
#include <openssl/x509.h>
|
||||
#include <openssl/pem.h>
|
||||
#include <openssl/engine.h>
|
||||
|
||||
#undef BUFSIZE
|
||||
#define BUFSIZE 1024*8
|
||||
@@ -89,8 +88,8 @@ int MAIN(int argc, char **argv)
|
||||
BIO *bmd=NULL;
|
||||
BIO *out = NULL;
|
||||
const char *name;
|
||||
#define PROG_NAME_SIZE 16
|
||||
char pname[PROG_NAME_SIZE];
|
||||
#define PROG_NAME_SIZE 39
|
||||
char pname[PROG_NAME_SIZE+1];
|
||||
int separator=0;
|
||||
int debug=0;
|
||||
int keyform=FORMAT_PEM;
|
||||
@@ -113,6 +112,9 @@ int MAIN(int argc, char **argv)
|
||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
||||
|
||||
if (!load_config(bio_err, NULL))
|
||||
goto end;
|
||||
|
||||
/* first check the program name */
|
||||
program_name(argv[0],pname,PROG_NAME_SIZE);
|
||||
|
||||
@@ -225,23 +227,7 @@ int MAIN(int argc, char **argv)
|
||||
goto end;
|
||||
}
|
||||
|
||||
if (engine != NULL)
|
||||
{
|
||||
if((e = ENGINE_by_id(engine)) == NULL)
|
||||
{
|
||||
BIO_printf(bio_err,"invalid engine \"%s\"\n",
|
||||
engine);
|
||||
goto end;
|
||||
}
|
||||
if(!ENGINE_set_default(e, ENGINE_METHOD_ALL))
|
||||
{
|
||||
BIO_printf(bio_err,"can't use that engine\n");
|
||||
goto end;
|
||||
}
|
||||
BIO_printf(bio_err,"engine \"%s\" set.\n", engine);
|
||||
/* Free our "structural" reference. */
|
||||
ENGINE_free(e);
|
||||
}
|
||||
e = setup_engine(bio_err, engine, 0);
|
||||
|
||||
in=BIO_new(BIO_s_file());
|
||||
bmd=BIO_new(BIO_f_md());
|
||||
@@ -272,7 +258,7 @@ int MAIN(int argc, char **argv)
|
||||
else out = BIO_new_file(outfile, "w");
|
||||
} else {
|
||||
out = BIO_new_fp(stdout, BIO_NOCLOSE);
|
||||
#ifdef VMS
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
{
|
||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||
out = BIO_push(tmpbio, out);
|
||||
@@ -289,52 +275,19 @@ int MAIN(int argc, char **argv)
|
||||
|
||||
if(keyfile)
|
||||
{
|
||||
if (keyform == FORMAT_PEM)
|
||||
{
|
||||
BIO *keybio;
|
||||
keybio = BIO_new_file(keyfile, "r");
|
||||
if(!keybio)
|
||||
{
|
||||
BIO_printf(bio_err,
|
||||
"Error opening key file %s\n",
|
||||
keyfile);
|
||||
ERR_print_errors(bio_err);
|
||||
goto end;
|
||||
}
|
||||
if(want_pub)
|
||||
sigkey = PEM_read_bio_PUBKEY(keybio,
|
||||
NULL, NULL, NULL);
|
||||
else
|
||||
sigkey = PEM_read_bio_PrivateKey(keybio,
|
||||
NULL, NULL, NULL);
|
||||
BIO_free(keybio);
|
||||
}
|
||||
else if (keyform == FORMAT_ENGINE)
|
||||
{
|
||||
if (!e)
|
||||
{
|
||||
BIO_printf(bio_err,"no engine specified\n");
|
||||
goto end;
|
||||
}
|
||||
if (want_pub)
|
||||
sigkey = ENGINE_load_public_key(e, keyfile, NULL);
|
||||
else
|
||||
sigkey = ENGINE_load_private_key(e, keyfile, NULL);
|
||||
}
|
||||
if (want_pub)
|
||||
sigkey = load_pubkey(bio_err, keyfile, keyform, NULL,
|
||||
e, "key file");
|
||||
else
|
||||
sigkey = load_key(bio_err, keyfile, keyform, NULL,
|
||||
e, "key file");
|
||||
if (!sigkey)
|
||||
{
|
||||
BIO_printf(bio_err,
|
||||
"bad input format specified for key file\n");
|
||||
/* load_[pub]key() has already printed an appropriate
|
||||
message */
|
||||
goto end;
|
||||
}
|
||||
|
||||
if(!sigkey) {
|
||||
BIO_printf(bio_err, "Error reading key file %s\n",
|
||||
keyfile);
|
||||
ERR_print_errors(bio_err);
|
||||
goto end;
|
||||
}
|
||||
}
|
||||
|
||||
if(sigfile && sigkey) {
|
||||
BIO *sigbio;
|
||||
@@ -396,6 +349,7 @@ end:
|
||||
EVP_PKEY_free(sigkey);
|
||||
if(sigbuf) OPENSSL_free(sigbuf);
|
||||
if (bmd != NULL) BIO_free(bmd);
|
||||
apps_shutdown();
|
||||
EXIT(err);
|
||||
}
|
||||
|
||||
|
||||
27
apps/dh.c
27
apps/dh.c
@@ -57,7 +57,7 @@
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
#ifndef NO_DH
|
||||
#ifndef OPENSSL_NO_DH
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <time.h>
|
||||
@@ -69,7 +69,6 @@
|
||||
#include <openssl/dh.h>
|
||||
#include <openssl/x509.h>
|
||||
#include <openssl/pem.h>
|
||||
#include <openssl/engine.h>
|
||||
|
||||
#undef PROG
|
||||
#define PROG dh_main
|
||||
@@ -101,6 +100,9 @@ int MAIN(int argc, char **argv)
|
||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
||||
|
||||
if (!load_config(bio_err, NULL))
|
||||
goto end;
|
||||
|
||||
engine=NULL;
|
||||
infile=NULL;
|
||||
outfile=NULL;
|
||||
@@ -174,23 +176,7 @@ bad:
|
||||
|
||||
ERR_load_crypto_strings();
|
||||
|
||||
if (engine != NULL)
|
||||
{
|
||||
if((e = ENGINE_by_id(engine)) == NULL)
|
||||
{
|
||||
BIO_printf(bio_err,"invalid engine \"%s\"\n",
|
||||
engine);
|
||||
goto end;
|
||||
}
|
||||
if(!ENGINE_set_default(e, ENGINE_METHOD_ALL))
|
||||
{
|
||||
BIO_printf(bio_err,"can't use that engine\n");
|
||||
goto end;
|
||||
}
|
||||
BIO_printf(bio_err,"engine \"%s\" set.\n", engine);
|
||||
/* Free our "structural" reference. */
|
||||
ENGINE_free(e);
|
||||
}
|
||||
e = setup_engine(bio_err, engine, 0);
|
||||
|
||||
in=BIO_new(BIO_s_file());
|
||||
out=BIO_new(BIO_s_file());
|
||||
@@ -213,7 +199,7 @@ bad:
|
||||
if (outfile == NULL)
|
||||
{
|
||||
BIO_set_fp(out,stdout,BIO_NOCLOSE);
|
||||
#ifdef VMS
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
{
|
||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||
out = BIO_push(tmpbio, out);
|
||||
@@ -346,6 +332,7 @@ end:
|
||||
if (in != NULL) BIO_free(in);
|
||||
if (out != NULL) BIO_free_all(out);
|
||||
if (dh != NULL) DH_free(dh);
|
||||
apps_shutdown();
|
||||
EXIT(ret);
|
||||
}
|
||||
#endif
|
||||
|
||||
@@ -109,7 +109,7 @@
|
||||
*
|
||||
*/
|
||||
|
||||
#ifndef NO_DH
|
||||
#ifndef OPENSSL_NO_DH
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <time.h>
|
||||
@@ -121,9 +121,8 @@
|
||||
#include <openssl/dh.h>
|
||||
#include <openssl/x509.h>
|
||||
#include <openssl/pem.h>
|
||||
#include <openssl/engine.h>
|
||||
|
||||
#ifndef NO_DSA
|
||||
#ifndef OPENSSL_NO_DSA
|
||||
#include <openssl/dsa.h>
|
||||
#endif
|
||||
|
||||
@@ -152,7 +151,7 @@ int MAIN(int argc, char **argv)
|
||||
ENGINE *e = NULL;
|
||||
DH *dh=NULL;
|
||||
int i,badops=0,text=0;
|
||||
#ifndef NO_DSA
|
||||
#ifndef OPENSSL_NO_DSA
|
||||
int dsaparam=0;
|
||||
#endif
|
||||
BIO *in=NULL,*out=NULL;
|
||||
@@ -167,6 +166,9 @@ int MAIN(int argc, char **argv)
|
||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
||||
|
||||
if (!load_config(bio_err, NULL))
|
||||
goto end;
|
||||
|
||||
infile=NULL;
|
||||
outfile=NULL;
|
||||
informat=FORMAT_PEM;
|
||||
@@ -206,7 +208,7 @@ int MAIN(int argc, char **argv)
|
||||
check=1;
|
||||
else if (strcmp(*argv,"-text") == 0)
|
||||
text=1;
|
||||
#ifndef NO_DSA
|
||||
#ifndef OPENSSL_NO_DSA
|
||||
else if (strcmp(*argv,"-dsaparam") == 0)
|
||||
dsaparam=1;
|
||||
#endif
|
||||
@@ -238,7 +240,7 @@ bad:
|
||||
BIO_printf(bio_err," -outform arg output format - one of DER PEM\n");
|
||||
BIO_printf(bio_err," -in arg input file\n");
|
||||
BIO_printf(bio_err," -out arg output file\n");
|
||||
#ifndef NO_DSA
|
||||
#ifndef OPENSSL_NO_DSA
|
||||
BIO_printf(bio_err," -dsaparam read or generate DSA parameters, convert to DH\n");
|
||||
#endif
|
||||
BIO_printf(bio_err," -check check the DH parameters\n");
|
||||
@@ -257,28 +259,12 @@ bad:
|
||||
|
||||
ERR_load_crypto_strings();
|
||||
|
||||
if (engine != NULL)
|
||||
{
|
||||
if((e = ENGINE_by_id(engine)) == NULL)
|
||||
{
|
||||
BIO_printf(bio_err,"invalid engine \"%s\"\n",
|
||||
engine);
|
||||
goto end;
|
||||
}
|
||||
if(!ENGINE_set_default(e, ENGINE_METHOD_ALL))
|
||||
{
|
||||
BIO_printf(bio_err,"can't use that engine\n");
|
||||
goto end;
|
||||
}
|
||||
BIO_printf(bio_err,"engine \"%s\" set.\n", engine);
|
||||
/* Free our "structural" reference. */
|
||||
ENGINE_free(e);
|
||||
}
|
||||
e = setup_engine(bio_err, engine, 0);
|
||||
|
||||
if (g && !num)
|
||||
num = DEFBITS;
|
||||
|
||||
#ifndef NO_DSA
|
||||
#ifndef OPENSSL_NO_DSA
|
||||
if (dsaparam)
|
||||
{
|
||||
if (g)
|
||||
@@ -305,7 +291,7 @@ bad:
|
||||
BIO_printf(bio_err,"%ld semi-random bytes loaded\n",
|
||||
app_RAND_load_files(inrand));
|
||||
|
||||
#ifndef NO_DSA
|
||||
#ifndef OPENSSL_NO_DSA
|
||||
if (dsaparam)
|
||||
{
|
||||
DSA *dsa;
|
||||
@@ -366,7 +352,7 @@ bad:
|
||||
goto end;
|
||||
}
|
||||
|
||||
#ifndef NO_DSA
|
||||
#ifndef OPENSSL_NO_DSA
|
||||
if (dsaparam)
|
||||
{
|
||||
DSA *dsa;
|
||||
@@ -419,7 +405,7 @@ bad:
|
||||
if (outfile == NULL)
|
||||
{
|
||||
BIO_set_fp(out,stdout,BIO_NOCLOSE);
|
||||
#ifdef VMS
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
{
|
||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||
out = BIO_push(tmpbio, out);
|
||||
@@ -504,7 +490,7 @@ bad:
|
||||
printf("\tif ((dh->p == NULL) || (dh->g == NULL))\n");
|
||||
printf("\t\t{ DH_free(dh); return(NULL); }\n");
|
||||
if (dh->length)
|
||||
printf("\tdh->length = %d;\n", dh->length);
|
||||
printf("\tdh->length = %ld;\n", dh->length);
|
||||
printf("\treturn(dh);\n\t}\n");
|
||||
OPENSSL_free(data);
|
||||
}
|
||||
@@ -532,6 +518,7 @@ end:
|
||||
if (in != NULL) BIO_free(in);
|
||||
if (out != NULL) BIO_free_all(out);
|
||||
if (dh != NULL) DH_free(dh);
|
||||
apps_shutdown();
|
||||
EXIT(ret);
|
||||
}
|
||||
|
||||
|
||||
36
apps/dsa.c
36
apps/dsa.c
@@ -56,7 +56,7 @@
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
#ifndef NO_DSA
|
||||
#ifndef OPENSSL_NO_DSA
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
@@ -68,7 +68,6 @@
|
||||
#include <openssl/evp.h>
|
||||
#include <openssl/x509.h>
|
||||
#include <openssl/pem.h>
|
||||
#include <openssl/engine.h>
|
||||
|
||||
#undef PROG
|
||||
#define PROG dsa_main
|
||||
@@ -80,6 +79,9 @@
|
||||
* -des - encrypt output if PEM format with DES in cbc mode
|
||||
* -des3 - encrypt output if PEM format
|
||||
* -idea - encrypt output if PEM format
|
||||
* -aes128 - encrypt output if PEM format
|
||||
* -aes192 - encrypt output if PEM format
|
||||
* -aes256 - encrypt output if PEM format
|
||||
* -text - print a text version
|
||||
* -modulus - print the DSA public key
|
||||
*/
|
||||
@@ -107,6 +109,9 @@ int MAIN(int argc, char **argv)
|
||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
||||
|
||||
if (!load_config(bio_err, NULL))
|
||||
goto end;
|
||||
|
||||
engine=NULL;
|
||||
infile=NULL;
|
||||
outfile=NULL;
|
||||
@@ -187,8 +192,12 @@ bad:
|
||||
BIO_printf(bio_err," -engine e use engine e, possibly a hardware device.\n");
|
||||
BIO_printf(bio_err," -des encrypt PEM output with cbc des\n");
|
||||
BIO_printf(bio_err," -des3 encrypt PEM output with ede cbc des using 168 bit key\n");
|
||||
#ifndef NO_IDEA
|
||||
#ifndef OPENSSL_NO_IDEA
|
||||
BIO_printf(bio_err," -idea encrypt PEM output with cbc idea\n");
|
||||
#endif
|
||||
#ifndef OPENSSL_NO_AES
|
||||
BIO_printf(bio_err," -aes128, -aes192, -aes256\n");
|
||||
BIO_printf(bio_err," encrypt PEM output with cbc aes\n");
|
||||
#endif
|
||||
BIO_printf(bio_err," -text print the key in text\n");
|
||||
BIO_printf(bio_err," -noout don't print key out\n");
|
||||
@@ -198,23 +207,7 @@ bad:
|
||||
|
||||
ERR_load_crypto_strings();
|
||||
|
||||
if (engine != NULL)
|
||||
{
|
||||
if((e = ENGINE_by_id(engine)) == NULL)
|
||||
{
|
||||
BIO_printf(bio_err,"invalid engine \"%s\"\n",
|
||||
engine);
|
||||
goto end;
|
||||
}
|
||||
if(!ENGINE_set_default(e, ENGINE_METHOD_ALL))
|
||||
{
|
||||
BIO_printf(bio_err,"can't use that engine\n");
|
||||
goto end;
|
||||
}
|
||||
BIO_printf(bio_err,"engine \"%s\" set.\n", engine);
|
||||
/* Free our "structural" reference. */
|
||||
ENGINE_free(e);
|
||||
}
|
||||
e = setup_engine(bio_err, engine, 0);
|
||||
|
||||
if(!app_passwd(bio_err, passargin, passargout, &passin, &passout)) {
|
||||
BIO_printf(bio_err, "Error getting passwords\n");
|
||||
@@ -262,7 +255,7 @@ bad:
|
||||
if (outfile == NULL)
|
||||
{
|
||||
BIO_set_fp(out,stdout,BIO_NOCLOSE);
|
||||
#ifdef VMS
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
{
|
||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||
out = BIO_push(tmpbio, out);
|
||||
@@ -320,6 +313,7 @@ end:
|
||||
if(dsa != NULL) DSA_free(dsa);
|
||||
if(passin) OPENSSL_free(passin);
|
||||
if(passout) OPENSSL_free(passout);
|
||||
apps_shutdown();
|
||||
EXIT(ret);
|
||||
}
|
||||
#endif
|
||||
|
||||
@@ -56,7 +56,7 @@
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
#ifndef NO_DSA
|
||||
#ifndef OPENSSL_NO_DSA
|
||||
#include <assert.h>
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
@@ -69,7 +69,6 @@
|
||||
#include <openssl/dsa.h>
|
||||
#include <openssl/x509.h>
|
||||
#include <openssl/pem.h>
|
||||
#include <openssl/engine.h>
|
||||
|
||||
#undef PROG
|
||||
#define PROG dsaparam_main
|
||||
@@ -107,6 +106,9 @@ int MAIN(int argc, char **argv)
|
||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
||||
|
||||
if (!load_config(bio_err, NULL))
|
||||
goto end;
|
||||
|
||||
infile=NULL;
|
||||
outfile=NULL;
|
||||
informat=FORMAT_PEM;
|
||||
@@ -184,9 +186,10 @@ bad:
|
||||
BIO_printf(bio_err," -outform arg output format - DER or PEM\n");
|
||||
BIO_printf(bio_err," -in arg input file\n");
|
||||
BIO_printf(bio_err," -out arg output file\n");
|
||||
BIO_printf(bio_err," -text print the key in text\n");
|
||||
BIO_printf(bio_err," -text print as text\n");
|
||||
BIO_printf(bio_err," -C Output C code\n");
|
||||
BIO_printf(bio_err," -noout no output\n");
|
||||
BIO_printf(bio_err," -genkey generate a DSA key\n");
|
||||
BIO_printf(bio_err," -rand files to use for random number input\n");
|
||||
BIO_printf(bio_err," -engine e use engine e, possibly a hardware device.\n");
|
||||
BIO_printf(bio_err," number number of bits to use for generating private key\n");
|
||||
@@ -216,7 +219,7 @@ bad:
|
||||
if (outfile == NULL)
|
||||
{
|
||||
BIO_set_fp(out,stdout,BIO_NOCLOSE);
|
||||
#ifdef VMS
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
{
|
||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||
out = BIO_push(tmpbio, out);
|
||||
@@ -232,23 +235,7 @@ bad:
|
||||
}
|
||||
}
|
||||
|
||||
if (engine != NULL)
|
||||
{
|
||||
if((e = ENGINE_by_id(engine)) == NULL)
|
||||
{
|
||||
BIO_printf(bio_err,"invalid engine \"%s\"\n",
|
||||
engine);
|
||||
goto end;
|
||||
}
|
||||
if(!ENGINE_set_default(e, ENGINE_METHOD_ALL))
|
||||
{
|
||||
BIO_printf(bio_err,"can't use that engine\n");
|
||||
goto end;
|
||||
}
|
||||
BIO_printf(bio_err,"engine \"%s\" set.\n", engine);
|
||||
/* Free our "structural" reference. */
|
||||
ENGINE_free(e);
|
||||
}
|
||||
e = setup_engine(bio_err, engine, 0);
|
||||
|
||||
if (need_rand)
|
||||
{
|
||||
@@ -338,7 +325,7 @@ bad:
|
||||
printf("\tdsa->g=BN_bin2bn(dsa%d_g,sizeof(dsa%d_g),NULL);\n",
|
||||
bits_p,bits_p);
|
||||
printf("\tif ((dsa->p == NULL) || (dsa->q == NULL) || (dsa->g == NULL))\n");
|
||||
printf("\t\treturn(NULL);\n");
|
||||
printf("\t\t{ DSA_free(dsa); return(NULL); }\n");
|
||||
printf("\treturn(dsa);\n\t}\n");
|
||||
}
|
||||
|
||||
@@ -384,6 +371,7 @@ end:
|
||||
if (in != NULL) BIO_free(in);
|
||||
if (out != NULL) BIO_free_all(out);
|
||||
if (dsa != NULL) DSA_free(dsa);
|
||||
apps_shutdown();
|
||||
EXIT(ret);
|
||||
}
|
||||
|
||||
|
||||
445
apps/ecdsa.c
Normal file
445
apps/ecdsa.c
Normal file
@@ -0,0 +1,445 @@
|
||||
/* apps/ecdsa.c */
|
||||
/* ====================================================================
|
||||
* Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
*
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
*
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in
|
||||
* the documentation and/or other materials provided with the
|
||||
* distribution.
|
||||
*
|
||||
* 3. All advertising materials mentioning features or use of this
|
||||
* software must display the following acknowledgment:
|
||||
* "This product includes software developed by the OpenSSL Project
|
||||
* for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
|
||||
*
|
||||
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
|
||||
* endorse or promote products derived from this software without
|
||||
* prior written permission. For written permission, please contact
|
||||
* openssl-core@openssl.org.
|
||||
*
|
||||
* 5. Products derived from this software may not be called "OpenSSL"
|
||||
* nor may "OpenSSL" appear in their names without prior written
|
||||
* permission of the OpenSSL Project.
|
||||
*
|
||||
* 6. Redistributions of any form whatsoever must retain the following
|
||||
* acknowledgment:
|
||||
* "This product includes software developed by the OpenSSL Project
|
||||
* for use in the OpenSSL Toolkit (http://www.openssl.org/)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
|
||||
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
|
||||
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||||
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
||||
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
||||
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
||||
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
||||
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
||||
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
* ====================================================================
|
||||
*
|
||||
* This product includes cryptographic software written by Eric Young
|
||||
* (eay@cryptsoft.com). This product includes software written by Tim
|
||||
* Hudson (tjh@cryptsoft.com).
|
||||
*
|
||||
*/
|
||||
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
|
||||
* All rights reserved.
|
||||
*
|
||||
* This package is an SSL implementation written
|
||||
* by Eric Young (eay@cryptsoft.com).
|
||||
* The implementation was written so as to conform with Netscapes SSL.
|
||||
*
|
||||
* This library is free for commercial and non-commercial use as long as
|
||||
* the following conditions are aheared to. The following conditions
|
||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||
* included with this distribution is covered by the same copyright terms
|
||||
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed.
|
||||
* If this package is used in a product, Eric Young should be given attribution
|
||||
* as the author of the parts of the library used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* "This product includes cryptographic software written by
|
||||
* Eric Young (eay@cryptsoft.com)"
|
||||
* The word 'cryptographic' can be left out if the rouines from the library
|
||||
* being used are not cryptographic related :-).
|
||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||
* the apps directory (application code) you must include an acknowledgement:
|
||||
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
#ifndef OPENSSL_NO_ECDSA
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include <time.h>
|
||||
#include "apps.h"
|
||||
#include <openssl/bio.h>
|
||||
#include <openssl/err.h>
|
||||
#include <openssl/ecdsa.h>
|
||||
#include <openssl/evp.h>
|
||||
#include <openssl/x509.h>
|
||||
#include <openssl/pem.h>
|
||||
|
||||
#undef PROG
|
||||
#define PROG ecdsa_main
|
||||
|
||||
/* -inform arg - input format - default PEM (one of DER, NET or PEM)
|
||||
* -outform arg - output format - default PEM
|
||||
* -in arg - input file - default stdin
|
||||
* -out arg - output file - default stdout
|
||||
* -des - encrypt output if PEM format with DES in cbc mode
|
||||
* -des3 - encrypt output if PEM format
|
||||
* -idea - encrypt output if PEM format
|
||||
* -aes128 - encrypt output if PEM format
|
||||
* -aes192 - encrypt output if PEM format
|
||||
* -aes256 - encrypt output if PEM format
|
||||
* -text - print a text version
|
||||
* -pub - print the ECDSA public key
|
||||
* -compressed - print the public key in compressed form ( default )
|
||||
* -hybrid - print the public key in hybrid form
|
||||
* -uncompressed - print the public key in uncompressed form
|
||||
* the last three options ( compressed, hybrid and uncompressed )
|
||||
* are only used if the "-pub" option is also selected.
|
||||
* For a precise description of the the meaning of compressed,
|
||||
* hybrid and uncompressed please refer to the X9.62 standart.
|
||||
* All three forms represents ways to express the ecdsa public
|
||||
* key ( a point on a elliptic curve ) as octet string. Let len be
|
||||
* the length ( in bytes ) of an element of the field over which
|
||||
* the curve is defined, then a compressed octet string has the form
|
||||
* 0x02 + result of BN_bn2bin() of the x coordinate of the public key
|
||||
*/
|
||||
|
||||
int MAIN(int, char **);
|
||||
|
||||
int MAIN(int argc, char **argv)
|
||||
{
|
||||
ENGINE *e = NULL;
|
||||
int ret = 1;
|
||||
ECDSA *ecdsa = NULL;
|
||||
int i, badops = 0;
|
||||
const EVP_CIPHER *enc = NULL;
|
||||
BIO *in = NULL, *out = NULL;
|
||||
int informat, outformat, text=0, noout=0;
|
||||
int pubin = 0, pubout = 0;
|
||||
char *infile, *outfile, *prog, *engine;
|
||||
char *passargin = NULL, *passargout = NULL;
|
||||
char *passin = NULL, *passout = NULL;
|
||||
int pub = 0, point_form = 0;
|
||||
unsigned char *buffer = NULL;
|
||||
unsigned int buf_len = 0;
|
||||
BIGNUM *tmp_bn = NULL;
|
||||
|
||||
apps_startup();
|
||||
|
||||
if (bio_err == NULL)
|
||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
||||
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE|BIO_FP_TEXT);
|
||||
|
||||
if (!load_config(bio_err, NULL))
|
||||
goto end;
|
||||
|
||||
engine = NULL;
|
||||
infile = NULL;
|
||||
outfile = NULL;
|
||||
informat = FORMAT_PEM;
|
||||
outformat = FORMAT_PEM;
|
||||
|
||||
prog = argv[0];
|
||||
argc--;
|
||||
argv++;
|
||||
while (argc >= 1)
|
||||
{
|
||||
if (strcmp(*argv,"-inform") == 0)
|
||||
{
|
||||
if (--argc < 1) goto bad;
|
||||
informat=str2fmt(*(++argv));
|
||||
}
|
||||
else if (strcmp(*argv,"-outform") == 0)
|
||||
{
|
||||
if (--argc < 1) goto bad;
|
||||
outformat=str2fmt(*(++argv));
|
||||
}
|
||||
else if (strcmp(*argv,"-in") == 0)
|
||||
{
|
||||
if (--argc < 1) goto bad;
|
||||
infile= *(++argv);
|
||||
}
|
||||
else if (strcmp(*argv,"-out") == 0)
|
||||
{
|
||||
if (--argc < 1) goto bad;
|
||||
outfile= *(++argv);
|
||||
}
|
||||
else if (strcmp(*argv,"-passin") == 0)
|
||||
{
|
||||
if (--argc < 1) goto bad;
|
||||
passargin= *(++argv);
|
||||
}
|
||||
else if (strcmp(*argv,"-passout") == 0)
|
||||
{
|
||||
if (--argc < 1) goto bad;
|
||||
passargout= *(++argv);
|
||||
}
|
||||
else if (strcmp(*argv, "-engine") == 0)
|
||||
{
|
||||
if (--argc < 1) goto bad;
|
||||
engine= *(++argv);
|
||||
}
|
||||
else if (strcmp(*argv, "-noout") == 0)
|
||||
noout = 1;
|
||||
else if (strcmp(*argv, "-text") == 0)
|
||||
text = 1;
|
||||
else if (strcmp(*argv, "-pub") == 0)
|
||||
{
|
||||
pub = 1;
|
||||
buffer = (unsigned char *)(*(argv+1));
|
||||
if (strcmp((char *)buffer, "compressed") == 0)
|
||||
point_form = POINT_CONVERSION_COMPRESSED;
|
||||
else if (strcmp((char *)buffer, "hybrid") == 0)
|
||||
point_form = POINT_CONVERSION_HYBRID;
|
||||
else if (strcmp((char *)buffer, "uncompressed") == 0)
|
||||
point_form = POINT_CONVERSION_UNCOMPRESSED;
|
||||
if (point_form)
|
||||
{
|
||||
argc--;
|
||||
argv++;
|
||||
}
|
||||
}
|
||||
else if (strcmp(*argv, "-pubin") == 0)
|
||||
pubin=1;
|
||||
else if (strcmp(*argv, "-pubout") == 0)
|
||||
pubout=1;
|
||||
else if ((enc=EVP_get_cipherbyname(&(argv[0][1]))) == NULL)
|
||||
{
|
||||
BIO_printf(bio_err,"unknown option %s\n",*argv);
|
||||
badops=1;
|
||||
break;
|
||||
}
|
||||
argc--;
|
||||
argv++;
|
||||
}
|
||||
|
||||
if (badops)
|
||||
{
|
||||
bad:
|
||||
BIO_printf(bio_err, "%s [options] <infile >outfile\n",prog);
|
||||
BIO_printf(bio_err, "where options are\n");
|
||||
BIO_printf(bio_err, " -inform arg input format - DER or PEM\n");
|
||||
BIO_printf(bio_err, " -outform arg output format - DER or PEM\n");
|
||||
BIO_printf(bio_err, " -in arg input file\n");
|
||||
BIO_printf(bio_err, " -passin arg input file pass phrase source\n");
|
||||
BIO_printf(bio_err, " -out arg output file\n");
|
||||
BIO_printf(bio_err, " -passout arg output file pass phrase source\n");
|
||||
BIO_printf(bio_err, " -engine e use engine e, possibly a hardware device.\n");
|
||||
BIO_printf(bio_err, " -des encrypt PEM output with cbc des\n");
|
||||
BIO_printf(bio_err, " -des3 encrypt PEM output with ede cbc des using 168 bit key\n");
|
||||
#ifndef OPENSSL_NO_IDEA
|
||||
BIO_printf(bio_err, " -idea encrypt PEM output with cbc idea\n");
|
||||
#endif
|
||||
#ifndef OPENSSL_NO_AES
|
||||
BIO_printf(bio_err, " -aes128, -aes192, -aes256\n");
|
||||
BIO_printf(bio_err, " encrypt PEM output with cbc aes\n");
|
||||
#endif
|
||||
BIO_printf(bio_err, " -text print the key in text\n");
|
||||
BIO_printf(bio_err, " -noout don't print key out\n");
|
||||
BIO_printf(bio_err, " -pub [compressed | hybrid | uncompressed] \n");
|
||||
BIO_printf(bio_err, " compressed print the public key in compressed form ( default )\n");
|
||||
BIO_printf(bio_err, " hybrid print the public key in hybrid form\n");
|
||||
BIO_printf(bio_err, " uncompressed print the public key in uncompressed form\n");
|
||||
goto end;
|
||||
}
|
||||
|
||||
ERR_load_crypto_strings();
|
||||
|
||||
e = setup_engine(bio_err, engine, 0);
|
||||
|
||||
if(!app_passwd(bio_err, passargin, passargout, &passin, &passout))
|
||||
{
|
||||
BIO_printf(bio_err, "Error getting passwords\n");
|
||||
goto end;
|
||||
}
|
||||
|
||||
in = BIO_new(BIO_s_file());
|
||||
out = BIO_new(BIO_s_file());
|
||||
if ((in == NULL) || (out == NULL))
|
||||
{
|
||||
ERR_print_errors(bio_err);
|
||||
goto end;
|
||||
}
|
||||
|
||||
if (infile == NULL)
|
||||
BIO_set_fp(in,stdin,BIO_NOCLOSE);
|
||||
else
|
||||
{
|
||||
if (BIO_read_filename(in,infile) <= 0)
|
||||
{
|
||||
perror(infile);
|
||||
goto end;
|
||||
}
|
||||
}
|
||||
|
||||
BIO_printf(bio_err,"read ECDSA key\n");
|
||||
if (informat == FORMAT_ASN1)
|
||||
{
|
||||
if (pubin)
|
||||
ecdsa = d2i_ECDSA_PUBKEY_bio(in, NULL);
|
||||
else
|
||||
ecdsa = d2i_ECDSAPrivateKey_bio(in, NULL);
|
||||
} else if (informat == FORMAT_PEM)
|
||||
{
|
||||
if (pubin)
|
||||
ecdsa = PEM_read_bio_ECDSA_PUBKEY(in, NULL, NULL, NULL);
|
||||
else
|
||||
ecdsa = PEM_read_bio_ECDSAPrivateKey(in, NULL, NULL, passin);
|
||||
} else
|
||||
{
|
||||
BIO_printf(bio_err, "bad input format specified for key\n");
|
||||
goto end;
|
||||
}
|
||||
if (ecdsa == NULL)
|
||||
{
|
||||
BIO_printf(bio_err,"unable to load Key\n");
|
||||
ERR_print_errors(bio_err);
|
||||
goto end;
|
||||
}
|
||||
|
||||
if (outfile == NULL)
|
||||
{
|
||||
BIO_set_fp(out, stdout, BIO_NOCLOSE);
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
{
|
||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||
out = BIO_push(tmpbio, out);
|
||||
}
|
||||
#endif
|
||||
}
|
||||
else
|
||||
{
|
||||
if (BIO_write_filename(out, outfile) <= 0)
|
||||
{
|
||||
perror(outfile);
|
||||
goto end;
|
||||
}
|
||||
}
|
||||
|
||||
if (text)
|
||||
if (!ECDSA_print(out, ecdsa, 0))
|
||||
{
|
||||
perror(outfile);
|
||||
ERR_print_errors(bio_err);
|
||||
goto end;
|
||||
}
|
||||
|
||||
if (pub)
|
||||
{
|
||||
fprintf(stdout, "Public Key (");
|
||||
if (point_form == POINT_CONVERSION_COMPRESSED)
|
||||
fprintf(stdout, "COMPRESSED");
|
||||
else if (point_form == POINT_CONVERSION_UNCOMPRESSED)
|
||||
fprintf(stdout, "UNCOMPRESSED");
|
||||
else if (point_form == POINT_CONVERSION_HYBRID)
|
||||
fprintf(stdout, "HYBRID");
|
||||
fprintf(stdout, ")=");
|
||||
buf_len = EC_POINT_point2oct(ecdsa->group, EC_GROUP_get0_generator(ecdsa->group),
|
||||
point_form, NULL, 0, NULL);
|
||||
if (!buf_len)
|
||||
{
|
||||
BIO_printf(bio_err,"invalid public key length\n");
|
||||
ERR_print_errors(bio_err);
|
||||
goto end;
|
||||
}
|
||||
if ((tmp_bn = BN_new()) == NULL ||
|
||||
(buffer = OPENSSL_malloc(buf_len)) == NULL) goto end;
|
||||
if (!EC_POINT_point2oct(ecdsa->group, EC_GROUP_get0_generator(ecdsa->group),
|
||||
point_form, buffer, buf_len, NULL) ||
|
||||
!BN_bin2bn(buffer, buf_len, tmp_bn))
|
||||
{
|
||||
BIO_printf(bio_err,"can not encode public key\n");
|
||||
ERR_print_errors(bio_err);
|
||||
OPENSSL_free(buffer);
|
||||
goto end;
|
||||
}
|
||||
BN_print(out, tmp_bn);
|
||||
fprintf(stdout,"\n");
|
||||
}
|
||||
|
||||
if (noout)
|
||||
goto end;
|
||||
BIO_printf(bio_err, "writing ECDSA key\n");
|
||||
if (outformat == FORMAT_ASN1)
|
||||
{
|
||||
if(pubin || pubout)
|
||||
i = i2d_ECDSA_PUBKEY_bio(out, ecdsa);
|
||||
else
|
||||
i = i2d_ECDSAPrivateKey_bio(out, ecdsa);
|
||||
} else if (outformat == FORMAT_PEM)
|
||||
{
|
||||
if(pubin || pubout)
|
||||
i = PEM_write_bio_ECDSA_PUBKEY(out, ecdsa);
|
||||
else
|
||||
i = PEM_write_bio_ECDSAPrivateKey(out, ecdsa, enc,
|
||||
NULL, 0, NULL, passout);
|
||||
} else
|
||||
{
|
||||
BIO_printf(bio_err, "bad output format specified for outfile\n");
|
||||
goto end;
|
||||
}
|
||||
if (!i)
|
||||
{
|
||||
BIO_printf(bio_err, "unable to write private key\n");
|
||||
ERR_print_errors(bio_err);
|
||||
}
|
||||
else
|
||||
ret=0;
|
||||
end:
|
||||
if (in) BIO_free(in);
|
||||
if (out) BIO_free_all(out);
|
||||
if (ecdsa) ECDSA_free(ecdsa);
|
||||
if (tmp_bn) BN_free(tmp_bn);
|
||||
if (passin) OPENSSL_free(passin);
|
||||
if (passout) OPENSSL_free(passout);
|
||||
apps_shutdown();
|
||||
EXIT(ret);
|
||||
}
|
||||
#endif
|
||||
660
apps/ecdsaparam.c
Normal file
660
apps/ecdsaparam.c
Normal file
@@ -0,0 +1,660 @@
|
||||
/* apps/ecdsaparam.c */
|
||||
/* ====================================================================
|
||||
* Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
*
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
*
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in
|
||||
* the documentation and/or other materials provided with the
|
||||
* distribution.
|
||||
*
|
||||
* 3. All advertising materials mentioning features or use of this
|
||||
* software must display the following acknowledgment:
|
||||
* "This product includes software developed by the OpenSSL Project
|
||||
* for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
|
||||
*
|
||||
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
|
||||
* endorse or promote products derived from this software without
|
||||
* prior written permission. For written permission, please contact
|
||||
* openssl-core@openssl.org.
|
||||
*
|
||||
* 5. Products derived from this software may not be called "OpenSSL"
|
||||
* nor may "OpenSSL" appear in their names without prior written
|
||||
* permission of the OpenSSL Project.
|
||||
*
|
||||
* 6. Redistributions of any form whatsoever must retain the following
|
||||
* acknowledgment:
|
||||
* "This product includes software developed by the OpenSSL Project
|
||||
* for use in the OpenSSL Toolkit (http://www.openssl.org/)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
|
||||
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
|
||||
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||||
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
||||
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
||||
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
||||
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
||||
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
||||
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
* ====================================================================
|
||||
*
|
||||
* This product includes cryptographic software written by Eric Young
|
||||
* (eay@cryptsoft.com). This product includes software written by Tim
|
||||
* Hudson (tjh@cryptsoft.com).
|
||||
*
|
||||
*/
|
||||
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
|
||||
* All rights reserved.
|
||||
*
|
||||
* This package is an SSL implementation written
|
||||
* by Eric Young (eay@cryptsoft.com).
|
||||
* The implementation was written so as to conform with Netscapes SSL.
|
||||
*
|
||||
* This library is free for commercial and non-commercial use as long as
|
||||
* the following conditions are aheared to. The following conditions
|
||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||
* included with this distribution is covered by the same copyright terms
|
||||
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed.
|
||||
* If this package is used in a product, Eric Young should be given attribution
|
||||
* as the author of the parts of the library used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* "This product includes cryptographic software written by
|
||||
* Eric Young (eay@cryptsoft.com)"
|
||||
* The word 'cryptographic' can be left out if the rouines from the library
|
||||
* being used are not cryptographic related :-).
|
||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||
* the apps directory (application code) you must include an acknowledgement:
|
||||
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
#ifndef OPENSSL_NO_ECDSA
|
||||
#include <assert.h>
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <time.h>
|
||||
#include <string.h>
|
||||
#include "apps.h"
|
||||
#include <openssl/bio.h>
|
||||
#include <openssl/err.h>
|
||||
#include <openssl/bn.h>
|
||||
#include <openssl/ec.h>
|
||||
#include <openssl/ecdsa.h>
|
||||
#include <openssl/x509.h>
|
||||
#include <openssl/pem.h>
|
||||
|
||||
#undef PROG
|
||||
#define PROG ecdsaparam_main
|
||||
|
||||
/* -inform arg - input format - default PEM (DER or PEM)
|
||||
* -outform arg - output format - default PEM
|
||||
* -in arg - input file - default stdin
|
||||
* -out arg - output file - default stdout
|
||||
* -noout
|
||||
* -text
|
||||
* -check - validate the ec parameters
|
||||
* -C
|
||||
* -noout
|
||||
* -genkey - generate a private public keypair based on the supplied curve
|
||||
* -named_curve - use the curve oid instead of the parameters
|
||||
* -NIST_192 - use the NIST recommended curve parameters over a 192 bit prime field
|
||||
* -NIST_224 - use the NIST recommended curve parameters over a 224 bit prime field
|
||||
* -NIST_256 - use the NIST recommended curve parameters over a 256 bit prime field
|
||||
* -NIST_384 - use the NIST recommended curve parameters over a 384 bit prime field
|
||||
* -NIST_521 - use the NIST recommended curve parameters over a 521 bit prime field
|
||||
* -X9_62_192v1 - use the X9_62 192v1 example curve over a 192 bit prime field
|
||||
* -X9_62_192v2 - use the X9_62 192v2 example curve over a 192 bit prime field
|
||||
* -X9_62_192v3 - use the X9_62 192v3 example curve over a 192 bit prime field
|
||||
* -X9_62_239v1 - use the X9_62 239v1 example curve over a 239 bit prime field
|
||||
* -X9_62_239v2 - use the X9_62 239v2 example curve over a 239 bit prime field
|
||||
* -X9_62_239v3 - use the X9_62 239v3 example curve over a 239 bit prime field
|
||||
* -X9_62_256v1 - use the X9_62 239v1 example curve over a 256 bit prime field
|
||||
* -SECG_PRIME_112R1 - use the SECG 112r1 recommended curve over a 112 bit prime field
|
||||
* -SECG_PRIME_112R2 - use the SECG 112r2 recommended curve over a 112 bit prime field
|
||||
* -SECG_PRIME_128R1 - use the SECG 128r1 recommended curve over a 128 bit prime field
|
||||
* -SECG_PRIME_128R2 - use the SECG 128r2 recommended curve over a 128 bit prime field
|
||||
* -SECG_PRIME_160K1 - use the SECG 160k1 recommended curve over a 160 bit prime field
|
||||
* -SECG_PRIME_160R1 - use the SECG 160r1 recommended curve over a 160 bit prime field
|
||||
* -SECG_PRIME_160R2 - use the SECG 160r2 recommended curve over a 160 bit prime field
|
||||
* -SECG_PRIME_192K1 - use the SECG 192k1 recommended curve over a 192 bit prime field
|
||||
* -SECG_PRIME_192R1 - use the SECG 192r1 recommended curve over a 192 bit prime field
|
||||
* -SECG_PRIME_224K1 - use the SECG 224k1 recommended curve over a 224 bit prime field
|
||||
* -SECG_PRIME_224R1 - use the SECG 224r1 recommended curve over a 224 bit prime field
|
||||
* -SECG_PRIME_256K1 - use the SECG 256k1 recommended curve over a 256 bit prime field
|
||||
* -SECG_PRIME_256R1 - use the SECG 256r1 recommended curve over a 256 bit prime field
|
||||
* -SECG_PRIME_384R1 - use the SECG 384r1 recommended curve over a 384 bit prime field
|
||||
* -SECG_PRIME_521R1 - use the SECG 521r1 recommended curve over a 521 bit prime field
|
||||
* -WTLS_6 - use the WAP/WTLS recommended curve number 6 over a 112 bit field
|
||||
* -WTLS_8 - use the WAP/WTLS recommended curve number 8 over a 112 bit field
|
||||
* -WTLS_9 - use the WAP/WTLS recommended curve number 9 over a 160 bit field
|
||||
*/
|
||||
|
||||
int MAIN(int, char **);
|
||||
|
||||
int MAIN(int argc, char **argv)
|
||||
{
|
||||
ENGINE *e = NULL;
|
||||
ECDSA *ecdsa = NULL;
|
||||
int i, badops = 0, text = 0;
|
||||
BIO *in = NULL, *out = NULL;
|
||||
int informat, outformat, noout = 0, C = 0, ret = 1;
|
||||
char *infile, *outfile, *prog, *inrand = NULL;
|
||||
int genkey = 0;
|
||||
int check = 0;
|
||||
int need_rand = 0;
|
||||
char *engine=NULL;
|
||||
int curve_type = EC_GROUP_NO_CURVE;
|
||||
int named_curve = 0;
|
||||
BIGNUM *tmp_1 = NULL, *tmp_2 = NULL, *tmp_3 = NULL, *tmp_4 = NULL, *tmp_5 = NULL,
|
||||
*tmp_6 = NULL, *tmp_7 = NULL;
|
||||
BN_CTX *ctx = NULL;
|
||||
EC_POINT *point = NULL;
|
||||
unsigned char *data = NULL;
|
||||
|
||||
apps_startup();
|
||||
|
||||
if (bio_err == NULL)
|
||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
||||
|
||||
if (!load_config(bio_err, NULL))
|
||||
goto end;
|
||||
|
||||
infile=NULL;
|
||||
outfile=NULL;
|
||||
informat=FORMAT_PEM;
|
||||
outformat=FORMAT_PEM;
|
||||
|
||||
prog=argv[0];
|
||||
argc--;
|
||||
argv++;
|
||||
while (argc >= 1)
|
||||
{
|
||||
if (strcmp(*argv,"-inform") == 0)
|
||||
{
|
||||
if (--argc < 1) goto bad;
|
||||
informat=str2fmt(*(++argv));
|
||||
}
|
||||
else if (strcmp(*argv,"-outform") == 0)
|
||||
{
|
||||
if (--argc < 1) goto bad;
|
||||
outformat=str2fmt(*(++argv));
|
||||
}
|
||||
else if (strcmp(*argv,"-in") == 0)
|
||||
{
|
||||
if (--argc < 1) goto bad;
|
||||
infile= *(++argv);
|
||||
}
|
||||
else if (strcmp(*argv,"-out") == 0)
|
||||
{
|
||||
if (--argc < 1) goto bad;
|
||||
outfile= *(++argv);
|
||||
}
|
||||
else if(strcmp(*argv, "-engine") == 0)
|
||||
{
|
||||
if (--argc < 1) goto bad;
|
||||
engine = *(++argv);
|
||||
}
|
||||
else if (strcmp(*argv,"-text") == 0)
|
||||
text = 1;
|
||||
else if (strcmp(*argv,"-C") == 0)
|
||||
C = 1;
|
||||
else if (strcmp(*argv,"-check") == 0)
|
||||
check = 1;
|
||||
else if (strcmp(*argv,"-genkey") == 0)
|
||||
{
|
||||
genkey = 1;
|
||||
need_rand = 1;
|
||||
}
|
||||
else if (strcmp(*argv,"-rand") == 0)
|
||||
{
|
||||
if (--argc < 1) goto bad;
|
||||
inrand= *(++argv);
|
||||
need_rand=1;
|
||||
}
|
||||
else if (strcmp(*argv, "-named_curve") == 0)
|
||||
named_curve = 1;
|
||||
else if (strcmp(*argv, "-NIST_192") == 0)
|
||||
curve_type = EC_GROUP_NIST_PRIME_192;
|
||||
else if (strcmp(*argv, "-NIST_224") == 0)
|
||||
curve_type = EC_GROUP_NIST_PRIME_224;
|
||||
else if (strcmp(*argv, "-NIST_256") == 0)
|
||||
curve_type = EC_GROUP_NIST_PRIME_256;
|
||||
else if (strcmp(*argv, "-NIST_384") == 0)
|
||||
curve_type = EC_GROUP_NIST_PRIME_384;
|
||||
else if (strcmp(*argv, "-NIST_521") == 0)
|
||||
curve_type = EC_GROUP_NIST_PRIME_521;
|
||||
else if (strcmp(*argv, "-X9_62_192v1") == 0)
|
||||
curve_type = EC_GROUP_X9_62_PRIME_192V1;
|
||||
else if (strcmp(*argv, "-X9_62_192v2") == 0)
|
||||
curve_type = EC_GROUP_X9_62_PRIME_192V2;
|
||||
else if (strcmp(*argv, "-X9_62_192v3") == 0)
|
||||
curve_type = EC_GROUP_X9_62_PRIME_192V3;
|
||||
else if (strcmp(*argv, "-X9_62_239v1") == 0)
|
||||
curve_type = EC_GROUP_X9_62_PRIME_239V1;
|
||||
else if (strcmp(*argv, "-X9_62_239v2") == 0)
|
||||
curve_type = EC_GROUP_X9_62_PRIME_239V2;
|
||||
else if (strcmp(*argv, "-X9_62_239v3") == 0)
|
||||
curve_type = EC_GROUP_X9_62_PRIME_239V3;
|
||||
else if (strcmp(*argv, "-X9_62_256v1") == 0)
|
||||
curve_type = EC_GROUP_X9_62_PRIME_256V1;
|
||||
else if (strcmp(*argv, "-SECG_PRIME_112R1") == 0)
|
||||
curve_type = EC_GROUP_SECG_PRIME_112R1;
|
||||
else if (strcmp(*argv, "-SECG_PRIME_112R2") == 0)
|
||||
curve_type = EC_GROUP_SECG_PRIME_112R2;
|
||||
else if (strcmp(*argv, "-SECG_PRIME_128R1") == 0)
|
||||
curve_type = EC_GROUP_SECG_PRIME_128R1;
|
||||
else if (strcmp(*argv, "-SECG_PRIME_128R2") == 0)
|
||||
curve_type = EC_GROUP_SECG_PRIME_128R2;
|
||||
else if (strcmp(*argv, "-SECG_PRIME_160K1") == 0)
|
||||
curve_type = EC_GROUP_SECG_PRIME_160K1;
|
||||
else if (strcmp(*argv, "-SECG_PRIME_160R1") == 0)
|
||||
curve_type = EC_GROUP_SECG_PRIME_160R1;
|
||||
else if (strcmp(*argv, "-SECG_PRIME_160R2") == 0)
|
||||
curve_type = EC_GROUP_SECG_PRIME_160R2;
|
||||
else if (strcmp(*argv, "-SECG_PRIME_192K1") == 0)
|
||||
curve_type = EC_GROUP_SECG_PRIME_192K1;
|
||||
else if (strcmp(*argv, "-SECG_PRIME_192R1") == 0)
|
||||
curve_type = EC_GROUP_SECG_PRIME_192R1;
|
||||
else if (strcmp(*argv, "-SECG_PRIME_224K1") == 0)
|
||||
curve_type = EC_GROUP_SECG_PRIME_224K1;
|
||||
else if (strcmp(*argv, "-SECG_PRIME_224R1") == 0)
|
||||
curve_type = EC_GROUP_SECG_PRIME_224R1;
|
||||
else if (strcmp(*argv, "-SECG_PRIME_256K1") == 0)
|
||||
curve_type = EC_GROUP_SECG_PRIME_256K1;
|
||||
else if (strcmp(*argv, "-SECG_PRIME_256R1") == 0)
|
||||
curve_type = EC_GROUP_SECG_PRIME_256R1;
|
||||
else if (strcmp(*argv, "-SECG_PRIME_384R1") == 0)
|
||||
curve_type = EC_GROUP_SECG_PRIME_384R1;
|
||||
else if (strcmp(*argv, "-SECG_PRIME_521R1") == 0)
|
||||
curve_type = EC_GROUP_SECG_PRIME_521R1;
|
||||
else if (strcmp(*argv, "-WTLS_6") == 0)
|
||||
curve_type = EC_GROUP_WTLS_6;
|
||||
else if (strcmp(*argv, "-WTLS_8") == 0)
|
||||
curve_type = EC_GROUP_WTLS_8;
|
||||
else if (strcmp(*argv, "-WTLS_9") == 0)
|
||||
curve_type = EC_GROUP_WTLS_9;
|
||||
else if (strcmp(*argv, "-noout") == 0)
|
||||
noout=1;
|
||||
else
|
||||
{
|
||||
BIO_printf(bio_err,"unknown option %s\n",*argv);
|
||||
badops=1;
|
||||
break;
|
||||
}
|
||||
argc--;
|
||||
argv++;
|
||||
}
|
||||
|
||||
if (badops)
|
||||
{
|
||||
bad:
|
||||
BIO_printf(bio_err,"%s [options] [bits] <infile >outfile\n",prog);
|
||||
BIO_printf(bio_err,"where options are\n");
|
||||
BIO_printf(bio_err," -inform arg input format - DER or PEM\n");
|
||||
BIO_printf(bio_err," -outform arg output format - DER or PEM\n");
|
||||
BIO_printf(bio_err," -in arg input file\n");
|
||||
BIO_printf(bio_err," -out arg output file\n");
|
||||
BIO_printf(bio_err," -text print as text\n");
|
||||
BIO_printf(bio_err," -C Output C code\n");
|
||||
BIO_printf(bio_err," -check validate the ec parameters\n");
|
||||
BIO_printf(bio_err," -noout no output\n");
|
||||
BIO_printf(bio_err," -rand files to use for random number input\n");
|
||||
BIO_printf(bio_err," -engine e use engine e, possibly a hardware device.\n");
|
||||
BIO_printf(bio_err," -named_curve use the curve oid instead of the parameters\n");
|
||||
BIO_printf(bio_err," -NIST_192 use the NIST recommended curve parameters over a 192 bit prime field\n");
|
||||
BIO_printf(bio_err," -NIST_224 use the NIST recommended curve parameters over a 224 bit prime field\n");
|
||||
BIO_printf(bio_err," -NIST_256 use the NIST recommended curve parameters over a 256 bit prime field\n");
|
||||
BIO_printf(bio_err," -NIST_384 use the NIST recommended curve parameters over a 384 bit prime field\n");
|
||||
BIO_printf(bio_err," -NIST_521 use the NIST recommended curve parameters over a 521 bit prime field\n");
|
||||
BIO_printf(bio_err," -X9_62_192v1 use the X9_62 192v1 example curve over a 192 bit prime field\n");
|
||||
BIO_printf(bio_err," -X9_62_192v2 use the X9_62 192v2 example curve over a 192 bit prime field\n");
|
||||
BIO_printf(bio_err," -X9_62_192v3 use the X9_62 192v3 example curve over a 192 bit prime field\n");
|
||||
BIO_printf(bio_err," -X9_62_239v1 use the X9_62 239v1 example curve over a 239 bit prime field\n");
|
||||
BIO_printf(bio_err," -X9_62_239v2 use the X9_62 239v2 example curve over a 239 bit prime field\n");
|
||||
BIO_printf(bio_err," -X9_62_239v3 use the X9_62 239v3 example curve over a 239 bit prime field\n");
|
||||
BIO_printf(bio_err," -X9_62_256v1 use the X9_62 239v1 example curve over a 256 bit prime field\n");
|
||||
BIO_printf(bio_err," -SECG_PRIME_112R1 use the SECG 112r1 recommended curve over a 112 bit prime field\n");
|
||||
BIO_printf(bio_err," -SECG_PRIME_112R2 use the SECG 112r2 recommended curve over a 112 bit prime field\n");
|
||||
BIO_printf(bio_err," -SECG_PRIME_128R1 use the SECG 128r1 recommended curve over a 128 bit prime field\n");
|
||||
BIO_printf(bio_err," -SECG_PRIME_128R2 use the SECG 128r2 recommended curve over a 128 bit prime field\n");
|
||||
BIO_printf(bio_err," -SECG_PRIME_160K1 use the SECG 160k1 recommended curve over a 160 bit prime field\n");
|
||||
BIO_printf(bio_err," -SECG_PRIME_160R1 use the SECG 160r1 recommended curve over a 160 bit prime field\n");
|
||||
BIO_printf(bio_err," -SECG_PRIME_160R2 use the SECG 160r2 recommended curve over a 160 bit prime field\n");
|
||||
BIO_printf(bio_err," -SECG_PRIME_192K1 use the SECG 192k1 recommended curve over a 192 bit prime field\n");
|
||||
BIO_printf(bio_err," -SECG_PRIME_192R1 use the SECG 192r1 recommended curve over a 192 bit prime field\n");
|
||||
BIO_printf(bio_err," -SECG_PRIME_224K1 use the SECG 224k1 recommended curve over a 224 bit prime field\n");
|
||||
BIO_printf(bio_err," -SECG_PRIME_224R1 use the SECG 224r1 recommended curve over a 224 bit prime field\n");
|
||||
BIO_printf(bio_err," -SECG_PRIME_256K1 use the SECG 256k1 recommended curve over a 256 bit prime field\n");
|
||||
BIO_printf(bio_err," -SECG_PRIME_256R1 use the SECG 256r1 recommended curve over a 256 bit prime field\n");
|
||||
BIO_printf(bio_err," -SECG_PRIME_384R1 use the SECG 384r1 recommended curve over a 384 bit prime field\n");
|
||||
BIO_printf(bio_err," -SECG_PRIME_521R1 use the SECG 521r1 recommended curve over a 521 bit prime field\n");
|
||||
BIO_printf(bio_err," -WTLS_6 use the WAP/WTLS recommended curve number 6 over a 112 bit field\n");
|
||||
BIO_printf(bio_err," -WTLS_8 use the WAP/WTLS recommended curve number 8 over a 112 bit field\n");
|
||||
BIO_printf(bio_err," -WTLS_9 use the WAP/WTLS recommended curve number 9 over a 112 bit field\n");
|
||||
goto end;
|
||||
}
|
||||
|
||||
ERR_load_crypto_strings();
|
||||
|
||||
in=BIO_new(BIO_s_file());
|
||||
out=BIO_new(BIO_s_file());
|
||||
if ((in == NULL) || (out == NULL))
|
||||
{
|
||||
ERR_print_errors(bio_err);
|
||||
goto end;
|
||||
}
|
||||
|
||||
if (infile == NULL)
|
||||
BIO_set_fp(in,stdin,BIO_NOCLOSE);
|
||||
else
|
||||
{
|
||||
if (BIO_read_filename(in,infile) <= 0)
|
||||
{
|
||||
perror(infile);
|
||||
goto end;
|
||||
}
|
||||
}
|
||||
if (outfile == NULL)
|
||||
{
|
||||
BIO_set_fp(out,stdout,BIO_NOCLOSE);
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
{
|
||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||
out = BIO_push(tmpbio, out);
|
||||
}
|
||||
#endif
|
||||
}
|
||||
else
|
||||
{
|
||||
if (BIO_write_filename(out,outfile) <= 0)
|
||||
{
|
||||
perror(outfile);
|
||||
goto end;
|
||||
}
|
||||
}
|
||||
|
||||
e = setup_engine(bio_err, engine, 0);
|
||||
|
||||
if (need_rand)
|
||||
{
|
||||
app_RAND_load_file(NULL, bio_err, (inrand != NULL));
|
||||
if (inrand != NULL)
|
||||
BIO_printf(bio_err,"%ld semi-random bytes loaded\n",
|
||||
app_RAND_load_files(inrand));
|
||||
}
|
||||
|
||||
if (curve_type != EC_GROUP_NO_CURVE)
|
||||
{
|
||||
if ((ecdsa = ECDSA_new()) == NULL)
|
||||
goto end;
|
||||
ecdsa->group = EC_GROUP_new_by_name(curve_type);
|
||||
if (named_curve)
|
||||
ECDSA_set_parameter_flags(ecdsa, ECDSA_FLAG_NAMED_CURVE);
|
||||
}
|
||||
else if (informat == FORMAT_ASN1)
|
||||
ecdsa = d2i_ECDSAParameters_bio(in,NULL);
|
||||
else if (informat == FORMAT_PEM)
|
||||
ecdsa = PEM_read_bio_ECDSAParameters(in, NULL, NULL, NULL);
|
||||
else
|
||||
{
|
||||
BIO_printf(bio_err, "bad input format specified\n");
|
||||
goto end;
|
||||
}
|
||||
if (ecdsa == NULL)
|
||||
{
|
||||
BIO_printf(bio_err, "unable to load ECDSA parameters\n");
|
||||
ERR_print_errors(bio_err);
|
||||
goto end;
|
||||
}
|
||||
|
||||
if (text)
|
||||
{
|
||||
ECDSAParameters_print(out, ecdsa);
|
||||
}
|
||||
|
||||
if (check)
|
||||
{
|
||||
if (ecdsa == NULL)
|
||||
BIO_printf(bio_err, "no elliptic curve parameters\n");
|
||||
BIO_printf(bio_err, "checking elliptic curve parameters: ");
|
||||
if (!EC_GROUP_check(ecdsa->group, NULL))
|
||||
{
|
||||
BIO_printf(bio_err, "failed\n");
|
||||
ERR_print_errors(bio_err);
|
||||
}
|
||||
else
|
||||
BIO_printf(bio_err, "ok\n");
|
||||
|
||||
}
|
||||
|
||||
if (C)
|
||||
{ /* TODO: characteristic two */
|
||||
int l, len, bits_p;
|
||||
if ((tmp_1 = BN_new()) == NULL || (tmp_2 = BN_new()) == NULL ||
|
||||
(tmp_3 = BN_new()) == NULL || (tmp_4 = BN_new()) == NULL ||
|
||||
(tmp_5 = BN_new()) == NULL || (tmp_6 = BN_new()) == NULL ||
|
||||
(tmp_7 = BN_new()) == NULL || (ctx = BN_CTX_new()) == NULL)
|
||||
{
|
||||
perror("OPENSSL_malloc");
|
||||
goto end;
|
||||
}
|
||||
if (!EC_GROUP_get_curve_GFp(ecdsa->group, tmp_1, tmp_2, tmp_3, ctx))
|
||||
goto end;
|
||||
if ((point = EC_GROUP_get0_generator(ecdsa->group)) == NULL)
|
||||
goto end;
|
||||
if (!EC_POINT_get_affine_coordinates_GFp(ecdsa->group, point, tmp_4, tmp_5, ctx))
|
||||
goto end;
|
||||
if (!EC_GROUP_get_order(ecdsa->group, tmp_6, ctx))
|
||||
goto end;
|
||||
if (!EC_GROUP_get_cofactor(ecdsa->group, tmp_7, ctx))
|
||||
goto end;
|
||||
|
||||
len = BN_num_bytes(tmp_1);
|
||||
bits_p = BN_num_bits(tmp_1);
|
||||
data=(unsigned char *)OPENSSL_malloc(len+20);
|
||||
if (data == NULL)
|
||||
{
|
||||
perror("OPENSSL_malloc");
|
||||
goto end;
|
||||
}
|
||||
l = BN_bn2bin(tmp_1, data);
|
||||
printf("static unsigned char ecdsa%d_p[]={", bits_p);
|
||||
for (i=0; i<l; i++)
|
||||
{
|
||||
if ((i%12) == 0) printf("\n\t");
|
||||
printf("0x%02X,",data[i]);
|
||||
}
|
||||
printf("\n\t};\n\n");
|
||||
|
||||
l = BN_bn2bin(tmp_2, data);
|
||||
printf("static unsigned char ecdsa%d_a[]={",bits_p);
|
||||
for (i=0; i<l; i++)
|
||||
{
|
||||
if ((i%12) == 0) printf("\n\t");
|
||||
printf("0x%02X,",data[i]);
|
||||
}
|
||||
printf("\n\t};\n");
|
||||
|
||||
l = BN_bn2bin(tmp_3, data);
|
||||
printf("static unsigned char ecdsa%d_b[]={", bits_p);
|
||||
for (i=0; i<l; i++)
|
||||
{
|
||||
if ((i%12) == 0) printf("\n\t");
|
||||
printf("0x%02X,",data[i]);
|
||||
}
|
||||
printf("\n\t};\n\n");
|
||||
|
||||
l = BN_bn2bin(tmp_4, data);
|
||||
printf("static unsigned char ecdsa%d_x[]={", bits_p);
|
||||
for (i=0; i<l; i++)
|
||||
{
|
||||
if ((i%12) == 0) printf("\n\t");
|
||||
printf("0x%02X,",data[i]);
|
||||
}
|
||||
printf("\n\t};\n");
|
||||
|
||||
l = BN_bn2bin(tmp_5, data);
|
||||
printf("static unsigned char ecdsa%d_y[]={", bits_p);
|
||||
for (i=0; i<l; i++)
|
||||
{
|
||||
if ((i%12) == 0) printf("\n\t");
|
||||
printf("0x%02X,",data[i]);
|
||||
}
|
||||
printf("\n\t};\n");
|
||||
|
||||
l = BN_bn2bin(tmp_6, data);
|
||||
printf("static unsigned char ecdsa%d_o[]={", bits_p);
|
||||
for (i=0; i<l; i++)
|
||||
{
|
||||
if ((i%12) == 0) printf("\n\t");
|
||||
printf("0x%02X,",data[i]);
|
||||
}
|
||||
printf("\n\t};\n");
|
||||
|
||||
l = BN_bn2bin(tmp_7, data);
|
||||
printf("static unsigned char ecdsa%d_c[]={", bits_p);
|
||||
for (i=0; i<l; i++)
|
||||
{
|
||||
if ((i%12) == 0) printf("\n\t");
|
||||
printf("0x%02X,",data[i]);
|
||||
}
|
||||
printf("\n\t};\n\n");
|
||||
|
||||
/* FIXME:
|
||||
* generated code should check for errors
|
||||
*/
|
||||
|
||||
printf("ECDSA *get_ecdsa%d(void)\n\t{\n",bits_p);
|
||||
printf("\tint ok=0;\n");
|
||||
printf("\tECDSA *ecdsa=NULL;\n");
|
||||
printf("\tEC_POINT *point=NULL;\n");
|
||||
printf("\tBIGNUM *tmp_1=NULL,*tmp_2=NULL,*tmp_3=NULL;\n\n");
|
||||
printf("\tif ((ecdsa=ECDSA_new()) == NULL)\n");
|
||||
printf("\t\treturn(NULL);\n\n");
|
||||
printf("\t/* generate EC_GROUP structure */\n");
|
||||
printf("\tif ((tmp_1 = BN_bin2bn(ecdsa%d_p, sizeof(ecdsa%d_p), NULL)) == NULL) goto err;\n", bits_p, bits_p);
|
||||
printf("\tif ((tmp_2 = BN_bin2bn(ecdsa%d_a, sizeof(ecdsa%d_a), NULL)) == NULL) goto err;\n", bits_p, bits_p);
|
||||
printf("\tif ((tmp_3 = BN_bin2bn(ecdsa%d_b, sizeof(ecdsa%d_b), NULL)) == NULL) goto err;\n", bits_p, bits_p);
|
||||
printf("\tif ((ecdsa->group = EC_GROUP_new_curve_GFp(tmp_1, tmp_2, tmp_3, NULL)) == NULL) goto err;\n\n");
|
||||
printf("\t/* build generator */\n");
|
||||
printf("\tif (!BN_bin2bn(ecdsa%d_x, sizeof(ecdsa%d_x), tmp_1)) goto err;\n", bits_p, bits_p);
|
||||
printf("\tif (!BN_bin2bn(ecdsa%d_y, sizeof(ecdsa%d_y), tmp_2)) goto err;\n", bits_p, bits_p);
|
||||
printf("\tif ((point = EC_POINT_new(ecdsa->group)) == NULL) goto err;\n");
|
||||
printf("\tif (!EC_POINT_set_affine_coordinates_GFp(ecdsa->group, point, tmp_1, tmp_2, NULL)) goto err;\n");
|
||||
printf("\t/* set generator, order and cofactor */\n");
|
||||
printf("\tif (!BN_bin2bn(ecdsa%d_o, sizeof(ecdsa%d_o), tmp_1)) goto err;\n", bits_p, bits_p);
|
||||
printf("\tif (!BN_bin2bn(ecdsa%d_c, sizeof(ecdsa%d_c), tmp_2)) goto err;\n", bits_p, bits_p);
|
||||
printf("\tif (!EC_GROUP_set_generator(ecdsa->group, point, tmp_1, tmp_2)) goto err;\n");
|
||||
printf("\n\tok=1;\n");
|
||||
printf("err:\n");
|
||||
printf("\tif (tmp_1) BN_free(tmp_1);\n");
|
||||
printf("\tif (tmp_2) BN_free(tmp_2);\n");
|
||||
printf("\tif (tmp_3) BN_free(tmp_3);\n");
|
||||
printf("\tif (point) EC_POINT_free(point);\n");
|
||||
printf("\tif (!ok)\n");
|
||||
printf("\t\t{\n");
|
||||
printf("\t\tECDSA_free(ecdsa);\n");
|
||||
printf("\t\tecdsa = NULL;\n");
|
||||
printf("\t\t}\n");
|
||||
printf("\treturn(ecdsa);\n\t}\n");
|
||||
}
|
||||
|
||||
|
||||
if (!noout)
|
||||
{
|
||||
if (outformat == FORMAT_ASN1)
|
||||
i = i2d_ECDSAParameters_bio(out, ecdsa);
|
||||
else if (outformat == FORMAT_PEM)
|
||||
i = PEM_write_bio_ECDSAParameters(out, ecdsa);
|
||||
else
|
||||
{
|
||||
BIO_printf(bio_err,"bad output format specified for outfile\n");
|
||||
goto end;
|
||||
}
|
||||
if (!i)
|
||||
{
|
||||
BIO_printf(bio_err, "unable to write ECDSA parameters\n");
|
||||
ERR_print_errors(bio_err);
|
||||
goto end;
|
||||
}
|
||||
}
|
||||
if (genkey)
|
||||
{
|
||||
ECDSA *ecdsakey;
|
||||
|
||||
assert(need_rand);
|
||||
if ((ecdsakey = ECDSAParameters_dup(ecdsa)) == NULL) goto end;
|
||||
if (!ECDSA_generate_key(ecdsakey)) goto end;
|
||||
if (outformat == FORMAT_ASN1)
|
||||
i = i2d_ECDSAPrivateKey_bio(out, ecdsakey);
|
||||
else if (outformat == FORMAT_PEM)
|
||||
i = PEM_write_bio_ECDSAPrivateKey(out, ecdsakey, NULL, NULL, 0, NULL, NULL);
|
||||
else
|
||||
{
|
||||
BIO_printf(bio_err, "bad output format specified for outfile\n");
|
||||
goto end;
|
||||
}
|
||||
ECDSA_free(ecdsakey);
|
||||
}
|
||||
if (need_rand)
|
||||
app_RAND_write_file(NULL, bio_err);
|
||||
ret=0;
|
||||
end:
|
||||
if (in != NULL) BIO_free(in);
|
||||
if (out != NULL) BIO_free_all(out);
|
||||
if (ecdsa != NULL) ECDSA_free(ecdsa);
|
||||
if (tmp_1) BN_free(tmp_1);
|
||||
if (tmp_2) BN_free(tmp_2);
|
||||
if (tmp_3) BN_free(tmp_3);
|
||||
if (tmp_3) BN_free(tmp_4);
|
||||
if (tmp_3) BN_free(tmp_5);
|
||||
if (tmp_3) BN_free(tmp_6);
|
||||
if (tmp_3) BN_free(tmp_7);
|
||||
if (ctx) BN_CTX_free(ctx);
|
||||
if (data) OPENSSL_free(data);
|
||||
apps_shutdown();
|
||||
EXIT(ret);
|
||||
}
|
||||
#endif
|
||||
150
apps/enc.c
150
apps/enc.c
@@ -66,11 +66,8 @@
|
||||
#include <openssl/objects.h>
|
||||
#include <openssl/x509.h>
|
||||
#include <openssl/rand.h>
|
||||
#ifndef NO_MD5
|
||||
#include <openssl/md5.h>
|
||||
#endif
|
||||
#include <openssl/pem.h>
|
||||
#include <openssl/engine.h>
|
||||
#include <ctype.h>
|
||||
|
||||
int set_hex(char *in,unsigned char *out,int size);
|
||||
#undef SIZE
|
||||
@@ -81,6 +78,24 @@ int set_hex(char *in,unsigned char *out,int size);
|
||||
#define BSIZE (8*1024)
|
||||
#define PROG enc_main
|
||||
|
||||
void show_ciphers(const OBJ_NAME *name,void *bio_)
|
||||
{
|
||||
BIO *bio=bio_;
|
||||
static int n;
|
||||
|
||||
if(!islower((unsigned char)*name->name))
|
||||
return;
|
||||
|
||||
BIO_printf(bio,"-%-25s",name->name);
|
||||
if(++n == 3)
|
||||
{
|
||||
BIO_printf(bio,"\n");
|
||||
n=0;
|
||||
}
|
||||
else
|
||||
BIO_printf(bio," ");
|
||||
}
|
||||
|
||||
int MAIN(int, char **);
|
||||
|
||||
int MAIN(int argc, char **argv)
|
||||
@@ -92,7 +107,8 @@ int MAIN(int argc, char **argv)
|
||||
unsigned char *buff=NULL,*bufsize=NULL;
|
||||
int bsize=BSIZE,verbose=0;
|
||||
int ret=1,inl;
|
||||
unsigned char key[24],iv[MD5_DIGEST_LENGTH];
|
||||
int nopad = 0;
|
||||
unsigned char key[EVP_MAX_KEY_LENGTH],iv[EVP_MAX_IV_LENGTH];
|
||||
unsigned char salt[PKCS5_SALT_LEN];
|
||||
char *str=NULL, *passarg = NULL, *pass = NULL;
|
||||
char *hkey=NULL,*hiv=NULL,*hsalt = NULL;
|
||||
@@ -101,8 +117,8 @@ int MAIN(int argc, char **argv)
|
||||
const EVP_CIPHER *cipher=NULL,*c;
|
||||
char *inf=NULL,*outf=NULL;
|
||||
BIO *in=NULL,*out=NULL,*b64=NULL,*benc=NULL,*rbio=NULL,*wbio=NULL;
|
||||
#define PROG_NAME_SIZE 16
|
||||
char pname[PROG_NAME_SIZE];
|
||||
#define PROG_NAME_SIZE 39
|
||||
char pname[PROG_NAME_SIZE+1];
|
||||
char *engine = NULL;
|
||||
|
||||
apps_startup();
|
||||
@@ -111,6 +127,9 @@ int MAIN(int argc, char **argv)
|
||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
||||
|
||||
if (!load_config(bio_err, NULL))
|
||||
goto end;
|
||||
|
||||
/* first check the program name */
|
||||
program_name(argv[0],pname,PROG_NAME_SIZE);
|
||||
if (strcmp(pname,"base64") == 0)
|
||||
@@ -155,6 +174,8 @@ int MAIN(int argc, char **argv)
|
||||
printkey=1;
|
||||
else if (strcmp(*argv,"-v") == 0)
|
||||
verbose=1;
|
||||
else if (strcmp(*argv,"-nopad") == 0)
|
||||
nopad=1;
|
||||
else if (strcmp(*argv,"-salt") == 0)
|
||||
nosalt=0;
|
||||
else if (strcmp(*argv,"-nosalt") == 0)
|
||||
@@ -252,99 +273,18 @@ bad:
|
||||
BIO_printf(bio_err,"%-14s use engine e, possibly a hardware device.\n","-engine e");
|
||||
|
||||
BIO_printf(bio_err,"Cipher Types\n");
|
||||
BIO_printf(bio_err,"des : 56 bit key DES encryption\n");
|
||||
BIO_printf(bio_err,"des_ede :112 bit key ede DES encryption\n");
|
||||
BIO_printf(bio_err,"des_ede3:168 bit key ede DES encryption\n");
|
||||
#ifndef NO_IDEA
|
||||
BIO_printf(bio_err,"idea :128 bit key IDEA encryption\n");
|
||||
#endif
|
||||
#ifndef NO_RC4
|
||||
BIO_printf(bio_err,"rc2 :128 bit key RC2 encryption\n");
|
||||
#endif
|
||||
#ifndef NO_BF
|
||||
BIO_printf(bio_err,"bf :128 bit key Blowfish encryption\n");
|
||||
#endif
|
||||
#ifndef NO_RC4
|
||||
BIO_printf(bio_err," -%-5s :128 bit key RC4 encryption\n",
|
||||
LN_rc4);
|
||||
#endif
|
||||
OBJ_NAME_do_all_sorted(OBJ_NAME_TYPE_CIPHER_METH,
|
||||
show_ciphers,
|
||||
bio_err);
|
||||
BIO_printf(bio_err,"\n");
|
||||
|
||||
BIO_printf(bio_err," -%-12s -%-12s -%-12s -%-12s",
|
||||
LN_des_ecb,LN_des_cbc,
|
||||
LN_des_cfb64,LN_des_ofb64);
|
||||
BIO_printf(bio_err," -%-4s (%s)\n",
|
||||
"des", LN_des_cbc);
|
||||
|
||||
BIO_printf(bio_err," -%-12s -%-12s -%-12s -%-12s",
|
||||
LN_des_ede,LN_des_ede_cbc,
|
||||
LN_des_ede_cfb64,LN_des_ede_ofb64);
|
||||
BIO_printf(bio_err," -desx -none\n");
|
||||
|
||||
|
||||
BIO_printf(bio_err," -%-12s -%-12s -%-12s -%-12s",
|
||||
LN_des_ede3,LN_des_ede3_cbc,
|
||||
LN_des_ede3_cfb64,LN_des_ede3_ofb64);
|
||||
BIO_printf(bio_err," -%-4s (%s)\n",
|
||||
"des3", LN_des_ede3_cbc);
|
||||
|
||||
#ifndef NO_IDEA
|
||||
BIO_printf(bio_err," -%-12s -%-12s -%-12s -%-12s",
|
||||
LN_idea_ecb, LN_idea_cbc,
|
||||
LN_idea_cfb64, LN_idea_ofb64);
|
||||
BIO_printf(bio_err," -%-4s (%s)\n","idea",LN_idea_cbc);
|
||||
#endif
|
||||
#ifndef NO_RC2
|
||||
BIO_printf(bio_err," -%-12s -%-12s -%-12s -%-12s",
|
||||
LN_rc2_ecb, LN_rc2_cbc,
|
||||
LN_rc2_cfb64, LN_rc2_ofb64);
|
||||
BIO_printf(bio_err," -%-4s (%s)\n","rc2", LN_rc2_cbc);
|
||||
#endif
|
||||
#ifndef NO_BF
|
||||
BIO_printf(bio_err," -%-12s -%-12s -%-12s -%-12s",
|
||||
LN_bf_ecb, LN_bf_cbc,
|
||||
LN_bf_cfb64, LN_bf_ofb64);
|
||||
BIO_printf(bio_err," -%-4s (%s)\n","bf", LN_bf_cbc);
|
||||
#endif
|
||||
#ifndef NO_CAST
|
||||
BIO_printf(bio_err," -%-12s -%-12s -%-12s -%-12s",
|
||||
LN_cast5_ecb, LN_cast5_cbc,
|
||||
LN_cast5_cfb64, LN_cast5_ofb64);
|
||||
BIO_printf(bio_err," -%-4s (%s)\n","cast", LN_cast5_cbc);
|
||||
#endif
|
||||
#ifndef NO_RC5
|
||||
BIO_printf(bio_err," -%-12s -%-12s -%-12s -%-12s",
|
||||
LN_rc5_ecb, LN_rc5_cbc,
|
||||
LN_rc5_cfb64, LN_rc5_ofb64);
|
||||
BIO_printf(bio_err," -%-4s (%s)\n","rc5", LN_rc5_cbc);
|
||||
#endif
|
||||
#ifndef NO_RIJNDAEL
|
||||
BIO_printf(bio_err," -%-12s -%-12s -%-12s -%-12s\n",
|
||||
LN_rijndael_ecb_k128_b128,"","","","");
|
||||
#endif
|
||||
|
||||
goto end;
|
||||
}
|
||||
argc--;
|
||||
argv++;
|
||||
}
|
||||
|
||||
if (engine != NULL)
|
||||
{
|
||||
if((e = ENGINE_by_id(engine)) == NULL)
|
||||
{
|
||||
BIO_printf(bio_err,"invalid engine \"%s\"\n",
|
||||
engine);
|
||||
goto end;
|
||||
}
|
||||
if(!ENGINE_set_default(e, ENGINE_METHOD_ALL))
|
||||
{
|
||||
BIO_printf(bio_err,"can't use that engine\n");
|
||||
goto end;
|
||||
}
|
||||
BIO_printf(bio_err,"engine \"%s\" set.\n", engine);
|
||||
/* Free our "structural" reference. */
|
||||
ENGINE_free(e);
|
||||
}
|
||||
e = setup_engine(bio_err, engine, 0);
|
||||
|
||||
if (bufsize != NULL)
|
||||
{
|
||||
@@ -450,7 +390,7 @@ bad:
|
||||
if (outf == NULL)
|
||||
{
|
||||
BIO_set_fp(out,stdout,BIO_NOCLOSE);
|
||||
#ifdef VMS
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
{
|
||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||
out = BIO_push(tmpbio, out);
|
||||
@@ -488,6 +428,9 @@ bad:
|
||||
|
||||
if (cipher != NULL)
|
||||
{
|
||||
/* Note that str is NULL if a key was passed on the command
|
||||
* line, so we get no salt in that case. Is this a bug?
|
||||
*/
|
||||
if (str != NULL)
|
||||
{
|
||||
/* Salt handling: if encrypting generate a salt and
|
||||
@@ -542,12 +485,20 @@ bad:
|
||||
else
|
||||
memset(str,0,strlen(str));
|
||||
}
|
||||
if ((hiv != NULL) && !set_hex(hiv,iv,8))
|
||||
if ((hiv == NULL) && (str == NULL))
|
||||
{
|
||||
/* No IV was explicitly set and no IV was generated
|
||||
* during EVP_BytesToKey. Hence the IV is undefined,
|
||||
* making correct decryption impossible. */
|
||||
BIO_printf(bio_err, "iv undefined\n");
|
||||
goto end;
|
||||
}
|
||||
if ((hiv != NULL) && !set_hex(hiv,iv,sizeof iv))
|
||||
{
|
||||
BIO_printf(bio_err,"invalid hex iv value\n");
|
||||
goto end;
|
||||
}
|
||||
if ((hkey != NULL) && !set_hex(hkey,key,24))
|
||||
if ((hkey != NULL) && !set_hex(hkey,key,sizeof key))
|
||||
{
|
||||
BIO_printf(bio_err,"invalid hex key value\n");
|
||||
goto end;
|
||||
@@ -556,6 +507,12 @@ bad:
|
||||
if ((benc=BIO_new(BIO_f_cipher())) == NULL)
|
||||
goto end;
|
||||
BIO_set_cipher(benc,cipher,key,iv,enc);
|
||||
if (nopad)
|
||||
{
|
||||
EVP_CIPHER_CTX *ctx;
|
||||
BIO_get_cipher_ctx(benc, &ctx);
|
||||
EVP_CIPHER_CTX_set_padding(ctx, 0);
|
||||
}
|
||||
if (debug)
|
||||
{
|
||||
BIO_set_callback(benc,BIO_debug_callback);
|
||||
@@ -628,6 +585,7 @@ end:
|
||||
if (benc != NULL) BIO_free(benc);
|
||||
if (b64 != NULL) BIO_free(b64);
|
||||
if(pass) OPENSSL_free(pass);
|
||||
apps_shutdown();
|
||||
EXIT(ret);
|
||||
}
|
||||
|
||||
|
||||
341
apps/engine.c
341
apps/engine.c
@@ -59,7 +59,7 @@
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#ifdef NO_STDIO
|
||||
#ifdef OPENSSL_NO_STDIO
|
||||
#define APPS_WIN16
|
||||
#endif
|
||||
#include "apps.h"
|
||||
@@ -72,9 +72,20 @@
|
||||
|
||||
static char *engine_usage[]={
|
||||
"usage: engine opts [engine ...]\n",
|
||||
" -v - verbose mode, a textual listing of the engines in OpenSSL\n",
|
||||
" -v[v[v[v]]] - verbose mode, for each engine, list its 'control commands'\n",
|
||||
" -vv will additionally display each command's description\n",
|
||||
" -vvv will also add the input flags for each command\n",
|
||||
" -vvvv will also show internal input flags\n",
|
||||
" -c - for each engine, also list the capabilities\n",
|
||||
" -t - for each engine, check that they are really available\n",
|
||||
" -pre <cmd> - runs command 'cmd' against the ENGINE before any attempts\n",
|
||||
" to load it (if -t is used)\n",
|
||||
" -post <cmd> - runs command 'cmd' against the ENGINE after loading it\n",
|
||||
" (only used if -t is also provided)\n",
|
||||
" NB: -pre and -post will be applied to all ENGINEs supplied on the command\n",
|
||||
" line, or all supported ENGINEs if none are specified.\n",
|
||||
" Eg. '-pre \"SO_PATH:/lib/libdriver.so\"' calls command \"SO_PATH\" with\n",
|
||||
" argument \"/lib/libdriver.so\".\n",
|
||||
NULL
|
||||
};
|
||||
|
||||
@@ -83,7 +94,7 @@ static void identity(void *ptr)
|
||||
return;
|
||||
}
|
||||
|
||||
static int append_buf(char **buf, char *s, int *size, int step)
|
||||
static int append_buf(char **buf, const char *s, int *size, int step)
|
||||
{
|
||||
int l = strlen(s);
|
||||
|
||||
@@ -99,7 +110,7 @@ static int append_buf(char **buf, char *s, int *size, int step)
|
||||
if (**buf != '\0')
|
||||
l += 2; /* ", " */
|
||||
|
||||
if (strlen(*buf) + strlen(s) >= *size)
|
||||
if (strlen(*buf) + strlen(s) >= (unsigned int)*size)
|
||||
{
|
||||
*size += step;
|
||||
*buf = OPENSSL_realloc(*buf, *size);
|
||||
@@ -115,6 +126,216 @@ static int append_buf(char **buf, char *s, int *size, int step)
|
||||
return 1;
|
||||
}
|
||||
|
||||
static int util_flags(BIO *bio_out, unsigned int flags, const char *indent)
|
||||
{
|
||||
int started = 0, err = 0;
|
||||
/* Indent before displaying input flags */
|
||||
BIO_printf(bio_out, "%s%s(input flags): ", indent, indent);
|
||||
if(flags == 0)
|
||||
{
|
||||
BIO_printf(bio_out, "<no flags>\n");
|
||||
return 1;
|
||||
}
|
||||
/* If the object is internal, mark it in a way that shows instead of
|
||||
* having it part of all the other flags, even if it really is. */
|
||||
if(flags & ENGINE_CMD_FLAG_INTERNAL)
|
||||
{
|
||||
BIO_printf(bio_out, "[Internal] ");
|
||||
}
|
||||
|
||||
if(flags & ENGINE_CMD_FLAG_NUMERIC)
|
||||
{
|
||||
if(started)
|
||||
{
|
||||
BIO_printf(bio_out, "|");
|
||||
err = 1;
|
||||
}
|
||||
BIO_printf(bio_out, "NUMERIC");
|
||||
started = 1;
|
||||
}
|
||||
/* Now we check that no combinations of the mutually exclusive NUMERIC,
|
||||
* STRING, and NO_INPUT flags have been used. Future flags that can be
|
||||
* OR'd together with these would need to added after these to preserve
|
||||
* the testing logic. */
|
||||
if(flags & ENGINE_CMD_FLAG_STRING)
|
||||
{
|
||||
if(started)
|
||||
{
|
||||
BIO_printf(bio_out, "|");
|
||||
err = 1;
|
||||
}
|
||||
BIO_printf(bio_out, "STRING");
|
||||
started = 1;
|
||||
}
|
||||
if(flags & ENGINE_CMD_FLAG_NO_INPUT)
|
||||
{
|
||||
if(started)
|
||||
{
|
||||
BIO_printf(bio_out, "|");
|
||||
err = 1;
|
||||
}
|
||||
BIO_printf(bio_out, "NO_INPUT");
|
||||
started = 1;
|
||||
}
|
||||
/* Check for unknown flags */
|
||||
flags = flags & ~ENGINE_CMD_FLAG_NUMERIC &
|
||||
~ENGINE_CMD_FLAG_STRING &
|
||||
~ENGINE_CMD_FLAG_NO_INPUT &
|
||||
~ENGINE_CMD_FLAG_INTERNAL;
|
||||
if(flags)
|
||||
{
|
||||
if(started) BIO_printf(bio_out, "|");
|
||||
BIO_printf(bio_out, "<0x%04X>", flags);
|
||||
}
|
||||
if(err)
|
||||
BIO_printf(bio_out, " <illegal flags!>");
|
||||
BIO_printf(bio_out, "\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
static int util_verbose(ENGINE *e, int verbose, BIO *bio_out, const char *indent)
|
||||
{
|
||||
static const int line_wrap = 78;
|
||||
int num;
|
||||
int ret = 0;
|
||||
char *name = NULL;
|
||||
char *desc = NULL;
|
||||
int flags;
|
||||
int xpos = 0;
|
||||
STACK *cmds = NULL;
|
||||
if(!ENGINE_ctrl(e, ENGINE_CTRL_HAS_CTRL_FUNCTION, 0, NULL, NULL) ||
|
||||
((num = ENGINE_ctrl(e, ENGINE_CTRL_GET_FIRST_CMD_TYPE,
|
||||
0, NULL, NULL)) <= 0))
|
||||
{
|
||||
#if 0
|
||||
BIO_printf(bio_out, "%s<no control commands>\n", indent);
|
||||
#endif
|
||||
return 1;
|
||||
}
|
||||
|
||||
cmds = sk_new_null();
|
||||
|
||||
if(!cmds)
|
||||
goto err;
|
||||
do {
|
||||
int len;
|
||||
/* Get the command input flags */
|
||||
if((flags = ENGINE_ctrl(e, ENGINE_CTRL_GET_CMD_FLAGS, num,
|
||||
NULL, NULL)) < 0)
|
||||
goto err;
|
||||
if (!(flags & ENGINE_CMD_FLAG_INTERNAL) || verbose >= 4)
|
||||
{
|
||||
/* Get the command name */
|
||||
if((len = ENGINE_ctrl(e, ENGINE_CTRL_GET_NAME_LEN_FROM_CMD, num,
|
||||
NULL, NULL)) <= 0)
|
||||
goto err;
|
||||
if((name = OPENSSL_malloc(len + 1)) == NULL)
|
||||
goto err;
|
||||
if(ENGINE_ctrl(e, ENGINE_CTRL_GET_NAME_FROM_CMD, num, name,
|
||||
NULL) <= 0)
|
||||
goto err;
|
||||
/* Get the command description */
|
||||
if((len = ENGINE_ctrl(e, ENGINE_CTRL_GET_DESC_LEN_FROM_CMD, num,
|
||||
NULL, NULL)) < 0)
|
||||
goto err;
|
||||
if(len > 0)
|
||||
{
|
||||
if((desc = OPENSSL_malloc(len + 1)) == NULL)
|
||||
goto err;
|
||||
if(ENGINE_ctrl(e, ENGINE_CTRL_GET_DESC_FROM_CMD, num, desc,
|
||||
NULL) <= 0)
|
||||
goto err;
|
||||
}
|
||||
/* Now decide on the output */
|
||||
if(xpos == 0)
|
||||
/* Do an indent */
|
||||
xpos = BIO_printf(bio_out, indent);
|
||||
else
|
||||
/* Otherwise prepend a ", " */
|
||||
xpos += BIO_printf(bio_out, ", ");
|
||||
if(verbose == 1)
|
||||
{
|
||||
/* We're just listing names, comma-delimited */
|
||||
if((xpos > (int)strlen(indent)) &&
|
||||
(xpos + (int)strlen(name) > line_wrap))
|
||||
{
|
||||
BIO_printf(bio_out, "\n");
|
||||
xpos = BIO_printf(bio_out, indent);
|
||||
}
|
||||
xpos += BIO_printf(bio_out, "%s", name);
|
||||
}
|
||||
else
|
||||
{
|
||||
/* We're listing names plus descriptions */
|
||||
BIO_printf(bio_out, "%s: %s\n", name,
|
||||
(desc == NULL) ? "<no description>" : desc);
|
||||
/* ... and sometimes input flags */
|
||||
if((verbose >= 3) && !util_flags(bio_out, flags,
|
||||
indent))
|
||||
goto err;
|
||||
xpos = 0;
|
||||
}
|
||||
}
|
||||
OPENSSL_free(name); name = NULL;
|
||||
if(desc) { OPENSSL_free(desc); desc = NULL; }
|
||||
/* Move to the next command */
|
||||
num = ENGINE_ctrl(e, ENGINE_CTRL_GET_NEXT_CMD_TYPE,
|
||||
num, NULL, NULL);
|
||||
} while(num > 0);
|
||||
if(xpos > 0)
|
||||
BIO_printf(bio_out, "\n");
|
||||
ret = 1;
|
||||
err:
|
||||
if(cmds) sk_pop_free(cmds, identity);
|
||||
if(name) OPENSSL_free(name);
|
||||
if(desc) OPENSSL_free(desc);
|
||||
return ret;
|
||||
}
|
||||
|
||||
static void util_do_cmds(ENGINE *e, STACK *cmds, BIO *bio_out, const char *indent)
|
||||
{
|
||||
int loop, res, num = sk_num(cmds);
|
||||
if(num < 0)
|
||||
{
|
||||
BIO_printf(bio_out, "[Error]: internal stack error\n");
|
||||
return;
|
||||
}
|
||||
for(loop = 0; loop < num; loop++)
|
||||
{
|
||||
char buf[256];
|
||||
const char *cmd, *arg;
|
||||
cmd = sk_value(cmds, loop);
|
||||
res = 1; /* assume success */
|
||||
/* Check if this command has no ":arg" */
|
||||
if((arg = strstr(cmd, ":")) == NULL)
|
||||
{
|
||||
if(!ENGINE_ctrl_cmd_string(e, cmd, NULL, 0))
|
||||
res = 0;
|
||||
}
|
||||
else
|
||||
{
|
||||
if((int)(arg - cmd) > 254)
|
||||
{
|
||||
BIO_printf(bio_out,"[Error]: command name too long\n");
|
||||
return;
|
||||
}
|
||||
memcpy(buf, cmd, (int)(arg - cmd));
|
||||
buf[arg-cmd] = '\0';
|
||||
arg++; /* Move past the ":" */
|
||||
/* Call the command with the argument */
|
||||
if(!ENGINE_ctrl_cmd_string(e, buf, arg, 0))
|
||||
res = 0;
|
||||
}
|
||||
if(res)
|
||||
BIO_printf(bio_out, "[Success]: %s\n", cmd);
|
||||
else
|
||||
{
|
||||
BIO_printf(bio_out, "[Failure]: %s\n", cmd);
|
||||
ERR_print_errors(bio_out);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
int MAIN(int, char **);
|
||||
|
||||
int MAIN(int argc, char **argv)
|
||||
@@ -124,16 +345,22 @@ int MAIN(int argc, char **argv)
|
||||
int verbose=0, list_cap=0, test_avail=0;
|
||||
ENGINE *e;
|
||||
STACK *engines = sk_new_null();
|
||||
int badops=0;
|
||||
STACK *pre_cmds = sk_new_null();
|
||||
STACK *post_cmds = sk_new_null();
|
||||
int badops=1;
|
||||
BIO *bio_out=NULL;
|
||||
const char *indent = " ";
|
||||
|
||||
apps_startup();
|
||||
SSL_load_error_strings();
|
||||
|
||||
if (bio_err == NULL)
|
||||
bio_err=BIO_new_fp(stderr,BIO_NOCLOSE);
|
||||
|
||||
if (!load_config(bio_err, NULL))
|
||||
goto end;
|
||||
bio_out=BIO_new_fp(stdout,BIO_NOCLOSE);
|
||||
#ifdef VMS
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
{
|
||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||
bio_out = BIO_push(tmpbio, bio_out);
|
||||
@@ -144,25 +371,38 @@ int MAIN(int argc, char **argv)
|
||||
argv++;
|
||||
while (argc >= 1)
|
||||
{
|
||||
if (strcmp(*argv,"-v") == 0)
|
||||
verbose=1;
|
||||
if (strncmp(*argv,"-v",2) == 0)
|
||||
{
|
||||
if(strspn(*argv + 1, "v") < strlen(*argv + 1))
|
||||
goto skip_arg_loop;
|
||||
if((verbose=strlen(*argv + 1)) > 4)
|
||||
goto skip_arg_loop;
|
||||
}
|
||||
else if (strcmp(*argv,"-c") == 0)
|
||||
list_cap=1;
|
||||
else if (strcmp(*argv,"-t") == 0)
|
||||
test_avail=1;
|
||||
else if (strcmp(*argv,"-pre") == 0)
|
||||
{
|
||||
argc--; argv++;
|
||||
sk_push(pre_cmds,*argv);
|
||||
}
|
||||
else if (strcmp(*argv,"-post") == 0)
|
||||
{
|
||||
argc--; argv++;
|
||||
sk_push(post_cmds,*argv);
|
||||
}
|
||||
else if ((strncmp(*argv,"-h",2) == 0) ||
|
||||
(strcmp(*argv,"-?") == 0))
|
||||
{
|
||||
badops=1;
|
||||
break;
|
||||
}
|
||||
(strcmp(*argv,"-?") == 0))
|
||||
goto skip_arg_loop;
|
||||
else
|
||||
{
|
||||
sk_push(engines,*argv);
|
||||
}
|
||||
argc--;
|
||||
argv++;
|
||||
}
|
||||
/* Looks like everything went OK */
|
||||
badops = 0;
|
||||
skip_arg_loop:
|
||||
|
||||
if (badops)
|
||||
{
|
||||
@@ -185,26 +425,22 @@ int MAIN(int argc, char **argv)
|
||||
if ((e = ENGINE_by_id(id)) != NULL)
|
||||
{
|
||||
const char *name = ENGINE_get_name(e);
|
||||
BIO_printf(bio_out, "%s (%s)", name, id);
|
||||
if (list_cap || test_avail)
|
||||
BIO_printf(bio_out, ":");
|
||||
if (test_avail)
|
||||
/* Do "id" first, then "name". Easier to auto-parse. */
|
||||
BIO_printf(bio_out, "(%s) %s\n", id, name);
|
||||
util_do_cmds(e, pre_cmds, bio_out, indent);
|
||||
if (strcmp(ENGINE_get_id(e), id) != 0)
|
||||
{
|
||||
if (ENGINE_init(e))
|
||||
{
|
||||
BIO_printf(bio_out, " available");
|
||||
ENGINE_finish(e);
|
||||
}
|
||||
else
|
||||
{
|
||||
BIO_printf(bio_out, " unavailable");
|
||||
ERR_clear_error();
|
||||
}
|
||||
BIO_printf(bio_out, "Loaded: (%s) %s\n",
|
||||
ENGINE_get_id(e), ENGINE_get_name(e));
|
||||
}
|
||||
if (list_cap)
|
||||
{
|
||||
int cap_size = 256;
|
||||
char *cap_buf = NULL;
|
||||
int k,n;
|
||||
const int *nids;
|
||||
ENGINE_CIPHERS_PTR fn_c;
|
||||
ENGINE_DIGESTS_PTR fn_d;
|
||||
|
||||
if (ENGINE_get_RSA(e) != NULL
|
||||
&& !append_buf(&cap_buf, "RSA",
|
||||
@@ -223,12 +459,50 @@ int MAIN(int argc, char **argv)
|
||||
&cap_size, 256))
|
||||
goto end;
|
||||
|
||||
if (*cap_buf != '\0')
|
||||
BIO_printf(bio_out, " [%s]", cap_buf);
|
||||
fn_c = ENGINE_get_ciphers(e);
|
||||
if(!fn_c) goto skip_ciphers;
|
||||
n = fn_c(e, NULL, &nids, 0);
|
||||
for(k=0 ; k < n ; ++k)
|
||||
if(!append_buf(&cap_buf,
|
||||
OBJ_nid2sn(nids[k]),
|
||||
&cap_size, 256))
|
||||
goto end;
|
||||
|
||||
skip_ciphers:
|
||||
fn_d = ENGINE_get_digests(e);
|
||||
if(!fn_d) goto skip_digests;
|
||||
n = fn_d(e, NULL, &nids, 0);
|
||||
for(k=0 ; k < n ; ++k)
|
||||
if(!append_buf(&cap_buf,
|
||||
OBJ_nid2sn(nids[k]),
|
||||
&cap_size, 256))
|
||||
goto end;
|
||||
|
||||
skip_digests:
|
||||
if (cap_buf && (*cap_buf != '\0'))
|
||||
BIO_printf(bio_out, " [%s]\n", cap_buf);
|
||||
|
||||
OPENSSL_free(cap_buf);
|
||||
}
|
||||
BIO_printf(bio_out, "\n");
|
||||
if(test_avail)
|
||||
{
|
||||
BIO_printf(bio_out, "%s", indent);
|
||||
if (ENGINE_init(e))
|
||||
{
|
||||
BIO_printf(bio_out, "[ available ]\n");
|
||||
util_do_cmds(e, post_cmds, bio_out, indent);
|
||||
ENGINE_finish(e);
|
||||
}
|
||||
else
|
||||
{
|
||||
BIO_printf(bio_out, "[ unavailable ]\n");
|
||||
ERR_print_errors_fp(stdout);
|
||||
ERR_clear_error();
|
||||
}
|
||||
}
|
||||
if((verbose > 0) && !util_verbose(e, verbose, bio_out, indent))
|
||||
goto end;
|
||||
ENGINE_free(e);
|
||||
}
|
||||
else
|
||||
ERR_print_errors(bio_err);
|
||||
@@ -238,6 +512,9 @@ int MAIN(int argc, char **argv)
|
||||
end:
|
||||
ERR_print_errors(bio_err);
|
||||
sk_pop_free(engines, identity);
|
||||
sk_pop_free(pre_cmds, identity);
|
||||
sk_pop_free(post_cmds, identity);
|
||||
if (bio_out != NULL) BIO_free_all(bio_out);
|
||||
apps_shutdown();
|
||||
EXIT(ret);
|
||||
}
|
||||
|
||||
@@ -91,7 +91,7 @@ int MAIN(int argc, char **argv)
|
||||
out=BIO_new(BIO_s_file());
|
||||
if ((out != NULL) && BIO_set_fp(out,stdout,BIO_NOCLOSE))
|
||||
{
|
||||
#ifdef VMS
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
{
|
||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||
out = BIO_push(tmpbio, out);
|
||||
@@ -121,5 +121,6 @@ int MAIN(int argc, char **argv)
|
||||
ret++;
|
||||
}
|
||||
}
|
||||
apps_shutdown();
|
||||
EXIT(ret);
|
||||
}
|
||||
|
||||
27
apps/gendh.c
27
apps/gendh.c
@@ -57,7 +57,7 @@
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
#ifndef NO_DH
|
||||
#ifndef OPENSSL_NO_DH
|
||||
#include <stdio.h>
|
||||
#include <string.h>
|
||||
#include <sys/types.h>
|
||||
@@ -70,7 +70,6 @@
|
||||
#include <openssl/dh.h>
|
||||
#include <openssl/x509.h>
|
||||
#include <openssl/pem.h>
|
||||
#include <openssl/engine.h>
|
||||
|
||||
#define DEFBITS 512
|
||||
#undef PROG
|
||||
@@ -97,6 +96,9 @@ int MAIN(int argc, char **argv)
|
||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
||||
|
||||
if (!load_config(bio_err, NULL))
|
||||
goto end;
|
||||
|
||||
argv++;
|
||||
argc--;
|
||||
for (;;)
|
||||
@@ -143,23 +145,7 @@ bad:
|
||||
goto end;
|
||||
}
|
||||
|
||||
if (engine != NULL)
|
||||
{
|
||||
if((e = ENGINE_by_id(engine)) == NULL)
|
||||
{
|
||||
BIO_printf(bio_err,"invalid engine \"%s\"\n",
|
||||
engine);
|
||||
goto end;
|
||||
}
|
||||
if(!ENGINE_set_default(e, ENGINE_METHOD_ALL))
|
||||
{
|
||||
BIO_printf(bio_err,"can't use that engine\n");
|
||||
goto end;
|
||||
}
|
||||
BIO_printf(bio_err,"engine \"%s\" set.\n", engine);
|
||||
/* Free our "structural" reference. */
|
||||
ENGINE_free(e);
|
||||
}
|
||||
e = setup_engine(bio_err, engine, 0);
|
||||
|
||||
out=BIO_new(BIO_s_file());
|
||||
if (out == NULL)
|
||||
@@ -171,7 +157,7 @@ bad:
|
||||
if (outfile == NULL)
|
||||
{
|
||||
BIO_set_fp(out,stdout,BIO_NOCLOSE);
|
||||
#ifdef VMS
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
{
|
||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||
out = BIO_push(tmpbio, out);
|
||||
@@ -211,6 +197,7 @@ end:
|
||||
ERR_print_errors(bio_err);
|
||||
if (out != NULL) BIO_free_all(out);
|
||||
if (dh != NULL) DH_free(dh);
|
||||
apps_shutdown();
|
||||
EXIT(ret);
|
||||
}
|
||||
|
||||
|
||||
@@ -56,7 +56,7 @@
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
#ifndef NO_DSA
|
||||
#ifndef OPENSSL_NO_DSA
|
||||
#include <stdio.h>
|
||||
#include <string.h>
|
||||
#include <sys/types.h>
|
||||
@@ -68,7 +68,6 @@
|
||||
#include <openssl/dsa.h>
|
||||
#include <openssl/x509.h>
|
||||
#include <openssl/pem.h>
|
||||
#include <openssl/engine.h>
|
||||
|
||||
#define DEFBITS 512
|
||||
#undef PROG
|
||||
@@ -85,7 +84,7 @@ int MAIN(int argc, char **argv)
|
||||
char *inrand=NULL,*dsaparams=NULL;
|
||||
char *passargout = NULL, *passout = NULL;
|
||||
BIO *out=NULL,*in=NULL;
|
||||
EVP_CIPHER *enc=NULL;
|
||||
const EVP_CIPHER *enc=NULL;
|
||||
char *engine=NULL;
|
||||
|
||||
apps_startup();
|
||||
@@ -94,6 +93,9 @@ int MAIN(int argc, char **argv)
|
||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
||||
|
||||
if (!load_config(bio_err, NULL))
|
||||
goto end;
|
||||
|
||||
argv++;
|
||||
argc--;
|
||||
for (;;)
|
||||
@@ -121,15 +123,23 @@ int MAIN(int argc, char **argv)
|
||||
}
|
||||
else if (strcmp(*argv,"-") == 0)
|
||||
goto bad;
|
||||
#ifndef NO_DES
|
||||
#ifndef OPENSSL_NO_DES
|
||||
else if (strcmp(*argv,"-des") == 0)
|
||||
enc=EVP_des_cbc();
|
||||
else if (strcmp(*argv,"-des3") == 0)
|
||||
enc=EVP_des_ede3_cbc();
|
||||
#endif
|
||||
#ifndef NO_IDEA
|
||||
#ifndef OPENSSL_NO_IDEA
|
||||
else if (strcmp(*argv,"-idea") == 0)
|
||||
enc=EVP_idea_cbc();
|
||||
#endif
|
||||
#ifndef OPENSSL_NO_AES
|
||||
else if (strcmp(*argv,"-aes128") == 0)
|
||||
enc=EVP_aes_128_cbc();
|
||||
else if (strcmp(*argv,"-aes192") == 0)
|
||||
enc=EVP_aes_192_cbc();
|
||||
else if (strcmp(*argv,"-aes256") == 0)
|
||||
enc=EVP_aes_256_cbc();
|
||||
#endif
|
||||
else if (**argv != '-' && dsaparams == NULL)
|
||||
{
|
||||
@@ -146,12 +156,16 @@ int MAIN(int argc, char **argv)
|
||||
bad:
|
||||
BIO_printf(bio_err,"usage: gendsa [args] dsaparam-file\n");
|
||||
BIO_printf(bio_err," -out file - output the key to 'file'\n");
|
||||
#ifndef NO_DES
|
||||
#ifndef OPENSSL_NO_DES
|
||||
BIO_printf(bio_err," -des - encrypt the generated key with DES in cbc mode\n");
|
||||
BIO_printf(bio_err," -des3 - encrypt the generated key with DES in ede cbc mode (168 bit key)\n");
|
||||
#endif
|
||||
#ifndef NO_IDEA
|
||||
#ifndef OPENSSL_NO_IDEA
|
||||
BIO_printf(bio_err," -idea - encrypt the generated key with IDEA in cbc mode\n");
|
||||
#endif
|
||||
#ifndef OPENSSL_NO_AES
|
||||
BIO_printf(bio_err," -aes128, -aes192, -aes256\n");
|
||||
BIO_printf(bio_err," encrypt PEM output with cbc aes\n");
|
||||
#endif
|
||||
BIO_printf(bio_err," -engine e - use engine e, possibly a hardware device.\n");
|
||||
BIO_printf(bio_err," -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
|
||||
@@ -162,23 +176,7 @@ bad:
|
||||
goto end;
|
||||
}
|
||||
|
||||
if (engine != NULL)
|
||||
{
|
||||
if((e = ENGINE_by_id(engine)) == NULL)
|
||||
{
|
||||
BIO_printf(bio_err,"invalid engine \"%s\"\n",
|
||||
engine);
|
||||
goto end;
|
||||
}
|
||||
if(!ENGINE_set_default(e, ENGINE_METHOD_ALL))
|
||||
{
|
||||
BIO_printf(bio_err,"can't use that engine\n");
|
||||
goto end;
|
||||
}
|
||||
BIO_printf(bio_err,"engine \"%s\" set.\n", engine);
|
||||
/* Free our "structural" reference. */
|
||||
ENGINE_free(e);
|
||||
}
|
||||
e = setup_engine(bio_err, engine, 0);
|
||||
|
||||
if(!app_passwd(bio_err, NULL, passargout, NULL, &passout)) {
|
||||
BIO_printf(bio_err, "Error getting password\n");
|
||||
@@ -207,7 +205,7 @@ bad:
|
||||
if (outfile == NULL)
|
||||
{
|
||||
BIO_set_fp(out,stdout,BIO_NOCLOSE);
|
||||
#ifdef VMS
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
{
|
||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||
out = BIO_push(tmpbio, out);
|
||||
@@ -247,6 +245,7 @@ end:
|
||||
if (out != NULL) BIO_free_all(out);
|
||||
if (dsa != NULL) DSA_free(dsa);
|
||||
if(passout) OPENSSL_free(passout);
|
||||
apps_shutdown();
|
||||
EXIT(ret);
|
||||
}
|
||||
#endif
|
||||
|
||||
@@ -56,7 +56,7 @@
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
#ifndef NO_RSA
|
||||
#ifndef OPENSSL_NO_RSA
|
||||
#include <stdio.h>
|
||||
#include <string.h>
|
||||
#include <sys/types.h>
|
||||
@@ -69,7 +69,7 @@
|
||||
#include <openssl/evp.h>
|
||||
#include <openssl/x509.h>
|
||||
#include <openssl/pem.h>
|
||||
#include <openssl/engine.h>
|
||||
#include <openssl/rand.h>
|
||||
|
||||
#define DEFBITS 512
|
||||
#undef PROG
|
||||
@@ -86,7 +86,7 @@ int MAIN(int argc, char **argv)
|
||||
RSA *rsa=NULL;
|
||||
int i,num=DEFBITS;
|
||||
long l;
|
||||
EVP_CIPHER *enc=NULL;
|
||||
const EVP_CIPHER *enc=NULL;
|
||||
unsigned long f4=RSA_F4;
|
||||
char *outfile=NULL;
|
||||
char *passargout = NULL, *passout = NULL;
|
||||
@@ -99,6 +99,9 @@ int MAIN(int argc, char **argv)
|
||||
if (bio_err == NULL)
|
||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
||||
|
||||
if (!load_config(bio_err, NULL))
|
||||
goto err;
|
||||
if ((out=BIO_new(BIO_s_file())) == NULL)
|
||||
{
|
||||
BIO_printf(bio_err,"unable to create BIO for output\n");
|
||||
@@ -129,15 +132,23 @@ int MAIN(int argc, char **argv)
|
||||
if (--argc < 1) goto bad;
|
||||
inrand= *(++argv);
|
||||
}
|
||||
#ifndef NO_DES
|
||||
#ifndef OPENSSL_NO_DES
|
||||
else if (strcmp(*argv,"-des") == 0)
|
||||
enc=EVP_des_cbc();
|
||||
else if (strcmp(*argv,"-des3") == 0)
|
||||
enc=EVP_des_ede3_cbc();
|
||||
#endif
|
||||
#ifndef NO_IDEA
|
||||
#ifndef OPENSSL_NO_IDEA
|
||||
else if (strcmp(*argv,"-idea") == 0)
|
||||
enc=EVP_idea_cbc();
|
||||
#endif
|
||||
#ifndef OPENSSL_NO_AES
|
||||
else if (strcmp(*argv,"-aes128") == 0)
|
||||
enc=EVP_aes_128_cbc();
|
||||
else if (strcmp(*argv,"-aes192") == 0)
|
||||
enc=EVP_aes_192_cbc();
|
||||
else if (strcmp(*argv,"-aes256") == 0)
|
||||
enc=EVP_aes_256_cbc();
|
||||
#endif
|
||||
else if (strcmp(*argv,"-passout") == 0)
|
||||
{
|
||||
@@ -155,8 +166,12 @@ bad:
|
||||
BIO_printf(bio_err,"usage: genrsa [args] [numbits]\n");
|
||||
BIO_printf(bio_err," -des encrypt the generated key with DES in cbc mode\n");
|
||||
BIO_printf(bio_err," -des3 encrypt the generated key with DES in ede cbc mode (168 bit key)\n");
|
||||
#ifndef NO_IDEA
|
||||
#ifndef OPENSSL_NO_IDEA
|
||||
BIO_printf(bio_err," -idea encrypt the generated key with IDEA in cbc mode\n");
|
||||
#endif
|
||||
#ifndef OPENSSL_NO_AES
|
||||
BIO_printf(bio_err," -aes128, -aes192, -aes256\n");
|
||||
BIO_printf(bio_err," encrypt PEM output with cbc aes\n");
|
||||
#endif
|
||||
BIO_printf(bio_err," -out file output the key to 'file\n");
|
||||
BIO_printf(bio_err," -passout arg output file pass phrase source\n");
|
||||
@@ -176,28 +191,12 @@ bad:
|
||||
goto err;
|
||||
}
|
||||
|
||||
if (engine != NULL)
|
||||
{
|
||||
if((e = ENGINE_by_id(engine)) == NULL)
|
||||
{
|
||||
BIO_printf(bio_err,"invalid engine \"%s\"\n",
|
||||
engine);
|
||||
goto err;
|
||||
}
|
||||
if(!ENGINE_set_default(e, ENGINE_METHOD_ALL))
|
||||
{
|
||||
BIO_printf(bio_err,"can't use that engine\n");
|
||||
goto err;
|
||||
}
|
||||
BIO_printf(bio_err,"engine \"%s\" set.\n", engine);
|
||||
/* Free our "structural" reference. */
|
||||
ENGINE_free(e);
|
||||
}
|
||||
e = setup_engine(bio_err, engine, 0);
|
||||
|
||||
if (outfile == NULL)
|
||||
{
|
||||
BIO_set_fp(out,stdout,BIO_NOCLOSE);
|
||||
#ifdef VMS
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
{
|
||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||
out = BIO_push(tmpbio, out);
|
||||
@@ -242,8 +241,14 @@ bad:
|
||||
l+=rsa->e->d[i];
|
||||
}
|
||||
BIO_printf(bio_err,"e is %ld (0x%lX)\n",l,l);
|
||||
if (!PEM_write_bio_RSAPrivateKey(out,rsa,enc,NULL,0,NULL, passout))
|
||||
{
|
||||
PW_CB_DATA cb_data;
|
||||
cb_data.password = passout;
|
||||
cb_data.prompt_info = outfile;
|
||||
if (!PEM_write_bio_RSAPrivateKey(out,rsa,enc,NULL,0,
|
||||
(pem_password_cb *)password_callback,&cb_data))
|
||||
goto err;
|
||||
}
|
||||
|
||||
ret=0;
|
||||
err:
|
||||
@@ -252,6 +257,7 @@ err:
|
||||
if(passout) OPENSSL_free(passout);
|
||||
if (ret != 0)
|
||||
ERR_print_errors(bio_err);
|
||||
apps_shutdown();
|
||||
EXIT(ret);
|
||||
}
|
||||
|
||||
@@ -269,7 +275,7 @@ static void MS_CALLBACK genrsa_cb(int p, int n, void *arg)
|
||||
p=n;
|
||||
#endif
|
||||
}
|
||||
#else /* !NO_RSA */
|
||||
#else /* !OPENSSL_NO_RSA */
|
||||
|
||||
# if PEDANTIC
|
||||
static void *dummy=&dummy;
|
||||
|
||||
@@ -62,7 +62,9 @@ $ COPY CA.COM WRK_SSLAEXE:CA.COM/LOG
|
||||
$ SET FILE/PROT=W:RE WRK_SSLAEXE:CA.COM
|
||||
$ COPY CA.COM WRK_SSLVEXE:CA.COM/LOG
|
||||
$ SET FILE/PROT=W:RE WRK_SSLVEXE:CA.COM
|
||||
$ COPY OPENSSL-VMS.CNF WRK_SSLROOT:[000000]OPENSSL.CNF/LOG
|
||||
$ COPY OPENSSL-VMS.CNF WRK_SSLROOT:[000000]OPENSSL-VMS.CNF/LOG
|
||||
$ SET FILE/PROT=W:R WRK_SSLROOT:[000000]OPENSSL-VMS.CNF
|
||||
$ COPY OPENSSL.CNF WRK_SSLROOT:[000000]OPENSSL.CNF/LOG
|
||||
$ SET FILE/PROT=W:R WRK_SSLROOT:[000000]OPENSSL.CNF
|
||||
$ SET ON
|
||||
$
|
||||
|
||||
@@ -44,12 +44,19 @@ $! keywords:
|
||||
$!
|
||||
$! UCX for UCX
|
||||
$! SOCKETSHR for SOCKETSHR+NETLIB
|
||||
$! TCPIP for TCPIP (post UCX)
|
||||
$!
|
||||
$! P5, if defined, sets a compiler thread NOT needed on OpenVMS 7.1 (and up)
|
||||
$!
|
||||
$! P6, if defined, sets a choice of programs to compile.
|
||||
$!
|
||||
$!
|
||||
$!
|
||||
$! Define USER_CCFLAGS
|
||||
$!
|
||||
$ @[-]vms_build_info.com
|
||||
$ WRITE SYS$OUTPUT " Using USER_CCFLAGS = ", USER_CCFLAGS
|
||||
$!
|
||||
$! Define A TCP/IP Library That We Will Need To Link To.
|
||||
$! (That Is, If We Need To Link To One.)
|
||||
$!
|
||||
@@ -98,15 +105,15 @@ $ WRITE SYS$OUTPUT "Compiling On A ",ARCH," Machine."
|
||||
$!
|
||||
$! Define The CRYPTO Library.
|
||||
$!
|
||||
$ CRYPTO_LIB := SYS$DISK:[-.'ARCH'.EXE.CRYPTO]LIBCRYPTO.OLB
|
||||
$ CRYPTO_LIB := SYS$DISK:[-.'ARCH'.EXE.CRYPTO]LIBCRYPTO'build_bits'.OLB
|
||||
$!
|
||||
$! Define The RSAREF Library.
|
||||
$!
|
||||
$ RSAREF_LIB := SYS$DISK:[-.'ARCH'.EXE.RSAREF]LIBRSAGLUE.OLB
|
||||
$ RSAREF_LIB := SYS$DISK:[-.'ARCH'.EXE.RSAREF]LIBRSAGLUE'build_bits'.OLB
|
||||
$!
|
||||
$! Define The SSL Library.
|
||||
$!
|
||||
$ SSL_LIB := SYS$DISK:[-.'ARCH'.EXE.SSL]LIBSSL.OLB
|
||||
$ SSL_LIB := SYS$DISK:[-.'ARCH'.EXE.SSL]LIBSSL'build_bits'.OLB
|
||||
$!
|
||||
$! Define The OBJ Directory.
|
||||
$!
|
||||
@@ -125,6 +132,23 @@ $! End The OBJ Directory Check.
|
||||
$!
|
||||
$ ENDIF
|
||||
$!
|
||||
$! Define The LIS Directory.
|
||||
$!
|
||||
$ LIS_DIR := SYS$DISK:[-.'ARCH'.LIS.APPS]
|
||||
$!
|
||||
$! Check To See If The OBJ Directory Exists.
|
||||
$!
|
||||
$ IF (F$PARSE(LIS_DIR).EQS."")
|
||||
$ THEN
|
||||
$!
|
||||
$! It Dosen't Exist, So Create It.
|
||||
$!
|
||||
$ CREATE/DIRECTORY 'LIS_DIR'
|
||||
$!
|
||||
$! End The LIS Directory Check.
|
||||
$!
|
||||
$ ENDIF
|
||||
$!
|
||||
$! Define The EXE Directory.
|
||||
$!
|
||||
$ EXE_DIR := SYS$DISK:[-.'ARCH'.EXE.APPS]
|
||||
@@ -155,15 +179,15 @@ $!
|
||||
$ LIB_FILES = "VERIFY;ASN1PARS;REQ;DGST;DH;DHPARAM;ENC;PASSWD;GENDH;ERRSTR;"+-
|
||||
"CA;PKCS7;CRL2P7;CRL;"+-
|
||||
"RSA;RSAUTL;DSA;DSAPARAM;"+-
|
||||
"X509;GENRSA;GENDSA;S_SERVER;S_CLIENT;SPEED;"+-
|
||||
"X509;GENRSA;GENDSA;TERM_SOCK;S_SERVER;S_CLIENT;SPEED;"+-
|
||||
"S_TIME;APPS;S_CB;S_SOCKET;APP_RAND;VERSION;SESS_ID;"+-
|
||||
"CIPHERS;NSEQ;PKCS12;PKCS8;SPKAC;SMIME;RAND"
|
||||
"CIPHERS;NSEQ;PKCS12;PKCS8;SPKAC;SMIME;RAND;ENGINE;OCSP"
|
||||
$ APP_FILES := OPENSSL,'OBJ_DIR'VERIFY.OBJ,ASN1PARS.OBJ,REQ.OBJ,DGST.OBJ,DH.OBJ,DHPARAM.OBJ,ENC.OBJ,PASSWD.OBJ,GENDH.OBJ,ERRSTR.OBJ,-
|
||||
CA.OBJ,PKCS7.OBJ,CRL2P7.OBJ,CRL.OBJ,-
|
||||
RSA.OBJ,RSAUTL.OBJ,DSA.OBJ,DSAPARAM.OBJ,-
|
||||
X509.OBJ,GENRSA.OBJ,GENDSA.OBJ,S_SERVER.OBJ,S_CLIENT.OBJ,SPEED.OBJ,-
|
||||
X509.OBJ,GENRSA.OBJ,GENDSA.OBJ,TERM_SOCK.OBJ,S_SERVER.OBJ,S_CLIENT.OBJ,SPEED.OBJ,-
|
||||
S_TIME.OBJ,APPS.OBJ,S_CB.OBJ,S_SOCKET.OBJ,APP_RAND.OBJ,VERSION.OBJ,SESS_ID.OBJ,-
|
||||
CIPHERS.OBJ,NSEQ.OBJ,PKCS12.OBJ,PKCS8.OBJ,SPKAC.OBJ,SMIME.OBJ,RAND.OBJ
|
||||
CIPHERS.OBJ,NSEQ.OBJ,PKCS12.OBJ,PKCS8.OBJ,SPKAC.OBJ,SMIME.OBJ,RAND.OBJ,ENGINE.OBJ,OCSP.OBJ
|
||||
$ TCPIP_PROGRAMS = ",,"
|
||||
$ IF COMPILER .EQS. "VAXC" THEN -
|
||||
TCPIP_PROGRAMS = ",OPENSSL,"
|
||||
@@ -234,6 +258,10 @@ $! Create The Object File Name.
|
||||
$!
|
||||
$ OBJECT_FILE = OBJ_DIR + FILE_NAME + ".OBJ"
|
||||
$!
|
||||
$! Create The Listing File Name.
|
||||
$!
|
||||
$ LIST_FILE = LIS_DIR + FILE_NAME + ".LIS"
|
||||
$!
|
||||
$! Create The Executable File Name.
|
||||
$!
|
||||
$ EXE_FILE = EXE_DIR + FILE_NAME + ".EXE"
|
||||
@@ -247,7 +275,7 @@ $!
|
||||
$! Tell The User That The File Dosen't Exist.
|
||||
$!
|
||||
$ WRITE SYS$OUTPUT ""
|
||||
$ WRITE SYS$OUTPUT "The File ",SOURCE_FILE," Dosen't Exist."
|
||||
$ WRITE SYS$OUTPUT F$MESSAGE("%X10018290") + ". The File ",SOURCE_FILE," Dosen't Exist."
|
||||
$ WRITE SYS$OUTPUT ""
|
||||
$!
|
||||
$! Exit The Build.
|
||||
@@ -272,9 +300,9 @@ $!
|
||||
$ ON ERROR THEN GOTO NEXT_FILE
|
||||
$ IF COMPILEWITH_CC2 - FILE_NAME .NES. COMPILEWITH_CC2
|
||||
$ THEN
|
||||
$ CC2/OBJECT='OBJECT_FILE' 'SOURCE_FILE'
|
||||
$ CC2/OBJECT='OBJECT_FILE'/LIST='LIST_FILE'/MACHINE_CODE 'SOURCE_FILE'
|
||||
$ ELSE
|
||||
$ CC/OBJECT='OBJECT_FILE' 'SOURCE_FILE'
|
||||
$ CC/OBJECT='OBJECT_FILE'/LIST='LIST_FILE'/MACHINE_CODE 'SOURCE_FILE'
|
||||
$ ENDIF
|
||||
$!
|
||||
$ ON WARNING THEN GOTO NEXT_FILE
|
||||
@@ -304,10 +332,14 @@ $ THEN
|
||||
$!
|
||||
$! Link With The RSAREF Library And A Specific TCP/IP Library.
|
||||
$!
|
||||
$ LINK/'DEBUGGER'/'TRACEBACK' /EXE='EXE_FILE' -
|
||||
$ LINK /'DEBUGGER'/'TRACEBACK' /EXE='EXE_FILE' /MAP='MAP_FILE' /FULL/CROSS -
|
||||
'OBJECT_FILE''EXTRA_OBJ', -
|
||||
'SSL_LIB'/LIBRARY,'CRYPTO_LIB'/LIBRARY,'RSAREF_LIB'/LIBRARY, -
|
||||
'TCPIP_LIB','OPT_FILE'/OPTION
|
||||
'SSL_LIB'/LIBRARY,-
|
||||
'CRYPTO_LIB'/LIBRARY, -
|
||||
'RSAREF_LIB'/LIBRARY, -
|
||||
'TCPIP_LIB', -
|
||||
'OPT_FILE'/OPTION, -
|
||||
SYS$DISK:[-]SSL_IDENT.OPT/OPTION
|
||||
$!
|
||||
$! Else...
|
||||
$!
|
||||
@@ -315,10 +347,13 @@ $ ELSE
|
||||
$!
|
||||
$! Link With The RSAREF Library And NO TCP/IP Library.
|
||||
$!
|
||||
$ LINK/'DEBUGGER'/'TRACEBACK' /EXE='EXE_FILE' -
|
||||
$ LINK /'DEBUGGER'/'TRACEBACK' /EXE='EXE_FILE' /MAP='MAP_FILE' /FULL/CROSS -
|
||||
'OBJECT_FILE''EXTRA_OBJ', -
|
||||
'SSL_LIB'/LIBRARY,'CRYPTO_LIB'/LIBRARY,'RSAREF_LIB'/LIBRARY, -
|
||||
'OPT_FILE'/OPTION
|
||||
'SSL_LIB'/LIBRARY, -
|
||||
'CRYPTO_LIB'/LIBRARY, -
|
||||
'RSAREF_LIB'/LIBRARY, -
|
||||
'OPT_FILE'/OPTION, -
|
||||
SYS$DISK:[-]SSL_IDENT.OPT/OPTION
|
||||
$!
|
||||
$! End The TCP/IP Library Check.
|
||||
$!
|
||||
@@ -338,10 +373,14 @@ $ THEN
|
||||
$!
|
||||
$! Don't Link With The RSAREF Routines And TCP/IP Library.
|
||||
$!
|
||||
$ LINK/'DEBUGGER'/'TRACEBACK' /EXE='EXE_FILE' -
|
||||
$ LINK/'DEBUGGER'/'TRACEBACK' /EXE='EXE_FILE' /MAP='MAP_FILE' /FULL/CROSS -
|
||||
'OBJECT_FILE''EXTRA_OBJ', -
|
||||
'SSL_LIB'/LIBRARY,'CRYPTO_LIB'/LIBRARY, -
|
||||
'TCPIP_LIB','OPT_FILE'/OPTION
|
||||
'SSL_LIB'/LIBRARY, -
|
||||
'CRYPTO_LIB'/LIBRARY, -
|
||||
'TCPIP_LIB', -
|
||||
'OPT_FILE'/OPTION, -
|
||||
SYS$DISK:[-]SSL_IDENT.OPT/OPTION
|
||||
|
||||
$!
|
||||
$! Else...
|
||||
$!
|
||||
@@ -349,10 +388,13 @@ $ ELSE
|
||||
$!
|
||||
$! Don't Link With The RSAREF Routines And Link With A TCP/IP Library.
|
||||
$!
|
||||
$ LINK/'DEBUGGER'/'TRACEBACK' /EXE='EXE_FILE' -
|
||||
$ LINK/'DEBUGGER'/'TRACEBACK' /EXE='EXE_FILE' /MAP='MAP_FILE' /FULL/CROSS -
|
||||
'OBJECT_FILE''EXTRA_OBJ', -
|
||||
'SSL_LIB'/LIBRARY,'CRYPTO_LIB'/LIBRARY, -
|
||||
'OPT_FILE'/OPTION
|
||||
'SSL_LIB'/LIBRARY, -
|
||||
'CRYPTO_LIB'/LIBRARY, -
|
||||
'OPT_FILE'/OPTION, -
|
||||
SYS$DISK:[-]SSL_IDENT.OPT/OPTION
|
||||
$!
|
||||
$!
|
||||
$! End The TCP/IP Library Check.
|
||||
$!
|
||||
@@ -489,6 +531,7 @@ $! End The Option File Search.
|
||||
$!
|
||||
$ ENDIF
|
||||
$!
|
||||
$!
|
||||
$! End The DEC C Check.
|
||||
$!
|
||||
$ ENDIF
|
||||
@@ -581,6 +624,7 @@ $ CHECK_OPTIONS:
|
||||
$!
|
||||
$! Check To See If P1 Is Blank.
|
||||
$!
|
||||
$ P1 = "NORSAREF"
|
||||
$ IF (P1.EQS."NORSAREF")
|
||||
$ THEN
|
||||
$!
|
||||
@@ -805,31 +849,7 @@ $ ENDIF
|
||||
$!
|
||||
$! Set Up Initial CC Definitions, Possibly With User Ones
|
||||
$!
|
||||
$ CCDEFS = "VMS=1,MONOLITH"
|
||||
$ IF F$TRNLNM("OPENSSL_NO_ASM") THEN CCDEFS = CCDEFS + ",NO_ASM"
|
||||
$ IF F$TRNLNM("OPENSSL_NO_RSA") THEN CCDEFS = CCDEFS + ",NO_RSA"
|
||||
$ IF F$TRNLNM("OPENSSL_NO_DSA") THEN CCDEFS = CCDEFS + ",NO_DSA"
|
||||
$ IF F$TRNLNM("OPENSSL_NO_DH") THEN CCDEFS = CCDEFS + ",NO_DH"
|
||||
$ IF F$TRNLNM("OPENSSL_NO_MD2") THEN CCDEFS = CCDEFS + ",NO_MD2"
|
||||
$ IF F$TRNLNM("OPENSSL_NO_MD5") THEN CCDEFS = CCDEFS + ",NO_MD5"
|
||||
$ IF F$TRNLNM("OPENSSL_NO_RIPEMD") THEN CCDEFS = CCDEFS + ",NO_RIPEMD"
|
||||
$ IF F$TRNLNM("OPENSSL_NO_SHA") THEN CCDEFS = CCDEFS + ",NO_SHA"
|
||||
$ IF F$TRNLNM("OPENSSL_NO_SHA0") THEN CCDEFS = CCDEFS + ",NO_SHA0"
|
||||
$ IF F$TRNLNM("OPENSSL_NO_SHA1") THEN CCDEFS = CCDEFS + ",NO_SHA1"
|
||||
$ IF F$TRNLNM("OPENSSL_NO_DES")
|
||||
$ THEN
|
||||
$ CCDEFS = CCDEFS + ",NO_DES,NO_MDC2"
|
||||
$ ELSE
|
||||
$ IF F$TRNLNM("OPENSSL_NO_MDC2") THEN CCDEFS = CCDEFS + ",NO_MDC2"
|
||||
$ ENDIF
|
||||
$ IF F$TRNLNM("OPENSSL_NO_RC2") THEN CCDEFS = CCDEFS + ",NO_RC2"
|
||||
$ IF F$TRNLNM("OPENSSL_NO_RC4") THEN CCDEFS = CCDEFS + ",NO_RC4"
|
||||
$ IF F$TRNLNM("OPENSSL_NO_RC5") THEN CCDEFS = CCDEFS + ",NO_RC5"
|
||||
$ IF F$TRNLNM("OPENSSL_NO_IDEA") THEN CCDEFS = CCDEFS + ",NO_IDEA"
|
||||
$ IF F$TRNLNM("OPENSSL_NO_BF") THEN CCDEFS = CCDEFS + ",NO_BF"
|
||||
$ IF F$TRNLNM("OPENSSL_NO_CAST") THEN CCDEFS = CCDEFS + ",NO_CAST"
|
||||
$ IF F$TRNLNM("OPENSSL_NO_HMAC") THEN CCDEFS = CCDEFS + ",NO_HMAC"
|
||||
$ IF F$TRNLNM("OPENSSL_NO_SSL2") THEN CCDEFS = CCDEFS + ",NO_SSL2"
|
||||
$ CCDEFS = "MONOLITH"
|
||||
$ IF F$TYPE(USER_CCDEFS) .NES. "" THEN CCDEFS = CCDEFS + "," + USER_CCDEFS
|
||||
$ CCEXTRAFLAGS = ""
|
||||
$ IF F$TYPE(USER_CCFLAGS) .NES. "" THEN CCEXTRAFLAGS = USER_CCFLAGS
|
||||
@@ -861,11 +881,12 @@ $ CC = "CC"
|
||||
$ IF ARCH.EQS."VAX" .AND. F$TRNLNM("DECC$CC_DEFAULT").NES."/DECC" -
|
||||
THEN CC = "CC/DECC"
|
||||
$ CC = CC + "/''CC_OPTIMIZE'/''DEBUGGER'/STANDARD=ANSI89" + -
|
||||
"/NOLIST/PREFIX=ALL" + CCEXTRAFLAGS
|
||||
"/PREFIX=ALL" + -
|
||||
"/INCLUDE=(SYS$DISK:[-])" + CCEXTRAFLAGS
|
||||
$!
|
||||
$! Define The Linker Options File Name.
|
||||
$!
|
||||
$ OPT_FILE = "SYS$DISK:[]VAX_DECC_OPTIONS.OPT"
|
||||
$ OPT_FILE = "SYS$DISK:[]''arch'_DECC_OPTIONS.OPT"
|
||||
$!
|
||||
$! End DECC Check.
|
||||
$!
|
||||
@@ -892,7 +913,8 @@ $ WRITE SYS$OUTPUT "There is no VAX C on Alpha!"
|
||||
$ EXIT
|
||||
$ ENDIF
|
||||
$ IF F$TRNLNM("DECC$CC_DEFAULT").EQS."/DECC" THEN CC = "CC/VAXC"
|
||||
$ CC = CC + "/''CC_OPTIMIZE'/''DEBUGGER'/NOLIST" + CCEXTRAFLAGS
|
||||
$ CC = CC + "/''CC_OPTIMIZE'/''DEBUGGER'" + -
|
||||
"/INCLUDE=(SYS$DISK:[-])" + CCEXTRAFLAGS
|
||||
$ CCDEFS = CCDEFS + ",""VAXC"""
|
||||
$!
|
||||
$! Define <sys> As SYS$COMMON:[SYSLIB]
|
||||
@@ -901,7 +923,7 @@ $ DEFINE/NOLOG SYS SYS$COMMON:[SYSLIB]
|
||||
$!
|
||||
$! Define The Linker Options File Name.
|
||||
$!
|
||||
$ OPT_FILE = "SYS$DISK:[]VAX_VAXC_OPTIONS.OPT"
|
||||
$ OPT_FILE = "SYS$DISK:[]''arch'_VAXC_OPTIONS.OPT"
|
||||
$!
|
||||
$! End VAXC Check
|
||||
$!
|
||||
@@ -923,11 +945,12 @@ $!
|
||||
$! Use GNU C...
|
||||
$!
|
||||
$ IF F$TYPE(GCC) .EQS. "" THEN GCC := GCC
|
||||
$ CC = GCC+"/NOCASE_HACK/''GCC_OPTIMIZE'/''DEBUGGER'/NOLIST" + CCEXTRAFLAGS
|
||||
$ CC = GCC+"/NOCASE_HACK/''GCC_OPTIMIZE'/''DEBUGGER'" + -
|
||||
"/INCLUDE=(SYS$DISK:[-])" + CCEXTRAFLAGS
|
||||
$!
|
||||
$! Define The Linker Options File Name.
|
||||
$!
|
||||
$ OPT_FILE = "SYS$DISK:[]VAX_GNUC_OPTIONS.OPT"
|
||||
$ OPT_FILE = "SYS$DISK:[]''arch'_GNUC_OPTIONS.OPT"
|
||||
$!
|
||||
$! End The GNU C Check.
|
||||
$!
|
||||
@@ -983,7 +1006,7 @@ $ ENDIF
|
||||
$!
|
||||
$! Time to check the contents, and to make sure we get the correct library.
|
||||
$!
|
||||
$ IF P4.EQS."SOCKETSHR" .OR. P4.EQS."MULTINET" .OR. P4.EQS."UCX"
|
||||
$ IF P4.EQS."SOCKETSHR" .OR. P4.EQS."MULTINET" .OR. P4.EQS."UCX" .OR. P4.EQS."TCPIP" .OR. P4.EQS."NONE"
|
||||
$ THEN
|
||||
$!
|
||||
$! Check to see if SOCKETSHR was chosen
|
||||
@@ -993,7 +1016,7 @@ $ THEN
|
||||
$!
|
||||
$! Set the library to use SOCKETSHR
|
||||
$!
|
||||
$ TCPIP_LIB = "[-.VMS]SOCKETSHR_SHR.OPT/OPT"
|
||||
$ TCPIP_LIB = "SYS$DISK:[-.VMS]SOCKETSHR_SHR.OPT/OPT"
|
||||
$!
|
||||
$! Done with SOCKETSHR
|
||||
$!
|
||||
@@ -1019,19 +1042,45 @@ $ THEN
|
||||
$!
|
||||
$! Set the library to use UCX.
|
||||
$!
|
||||
$ TCPIP_LIB = "[-.VMS]UCX_SHR_DECC.OPT/OPT"
|
||||
$ TCPIP_LIB = "SYS$DISK:[-.VMS]UCX_SHR_DECC.OPT/OPT"
|
||||
$ IF F$TRNLNM("UCX$IPC_SHR") .NES. ""
|
||||
$ THEN
|
||||
$ TCPIP_LIB = "[-.VMS]UCX_SHR_DECC_LOG.OPT/OPT"
|
||||
$ TCPIP_LIB = "SYS$DISK:[-.VMS]UCX_SHR_DECC_LOG.OPT/OPT"
|
||||
$ ELSE
|
||||
$ IF COMPILER .NES. "DECC" .AND. ARCH .EQS. "VAX" THEN -
|
||||
TCPIP_LIB = "[-.VMS]UCX_SHR_VAXC.OPT/OPT"
|
||||
TCPIP_LIB = "SYS$DISK:[-.VMS]UCX_SHR_VAXC.OPT/OPT"
|
||||
$ ENDIF
|
||||
$!
|
||||
$! Done with UCX
|
||||
$!
|
||||
$ ENDIF
|
||||
$!
|
||||
$! Check to see if TCPIP (post UCX) was chosen
|
||||
$!
|
||||
$ IF P4.EQS."TCPIP"
|
||||
$ THEN
|
||||
$!
|
||||
$! Set the library to use TCPIP.
|
||||
$!
|
||||
$ TCPIP_LIB = "SYS$DISK:[-.VMS]TCPIP_SHR_DECC.OPT/OPT"
|
||||
$!
|
||||
$! Done with TCPIP
|
||||
$!
|
||||
$ ENDIF
|
||||
$!
|
||||
$! Check to see if NONE was chosen
|
||||
$!
|
||||
$ IF P4.EQS."NONE"
|
||||
$ THEN
|
||||
$!
|
||||
$! Do not use TCPIP.
|
||||
$!
|
||||
$ TCPIP_LIB = ""
|
||||
$!
|
||||
$! Done with TCPIP
|
||||
$!
|
||||
$ ENDIF
|
||||
$!
|
||||
$! Add TCP/IP type to CC definitions.
|
||||
$!
|
||||
$ CCDEFS = CCDEFS + ",TCPIP_TYPE_''P4'"
|
||||
@@ -1051,6 +1100,7 @@ $ WRITE SYS$OUTPUT "The Option ",P4," Is Invalid. The Valid Options Are:"
|
||||
$ WRITE SYS$OUTPUT ""
|
||||
$ WRITE SYS$OUTPUT " SOCKETSHR : To link with SOCKETSHR TCP/IP library."
|
||||
$ WRITE SYS$OUTPUT " UCX : To link with UCX TCP/IP library."
|
||||
$ WRITE SYS$OUTPUT " TCPIP : To link with TCPIP (post UCX) TCP/IP library."
|
||||
$ WRITE SYS$OUTPUT ""
|
||||
$!
|
||||
$! Time To EXIT.
|
||||
@@ -1133,6 +1183,7 @@ $!
|
||||
$! Save directory information
|
||||
$!
|
||||
$ __HERE = F$PARSE(F$PARSE("A.;",F$ENVIRONMENT("PROCEDURE"))-"A.;","[]A.;") - "A.;"
|
||||
$ __HERE = F$EDIT(__HERE,"UPCASE")
|
||||
$ __TOP = __HERE - "APPS]"
|
||||
$ __INCLUDE = __TOP + "INCLUDE.OPENSSL]"
|
||||
$!
|
||||
|
||||
@@ -121,7 +121,7 @@ int MAIN(int argc, char **argv)
|
||||
}
|
||||
} else {
|
||||
out = BIO_new_fp(stdout, BIO_NOCLOSE);
|
||||
#ifdef VMS
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
{
|
||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||
out = BIO_push(tmpbio, out);
|
||||
|
||||
1211
apps/ocsp.c
Normal file
1211
apps/ocsp.c
Normal file
File diff suppressed because it is too large
Load Diff
@@ -3,8 +3,8 @@
|
||||
# This is mostly being used for generation of certificate requests.
|
||||
#
|
||||
|
||||
RANDFILE = $ENV::HOME/.rnd
|
||||
oid_file = $ENV::HOME/.oid
|
||||
RANDFILE = ${ENV::HOME}/.rnd
|
||||
oid_file = ${ENV::HOME}/.oid
|
||||
oid_section = new_oids
|
||||
|
||||
# To use this configuration file with the "-extfile" option of the
|
||||
@@ -29,17 +29,17 @@ default_ca = CA_default # The default ca section
|
||||
####################################################################
|
||||
[ CA_default ]
|
||||
|
||||
dir = sys\$disk:[.demoCA # Where everything is kept
|
||||
certs = $dir.certs] # Where the issued certs are kept
|
||||
crl_dir = $dir.crl] # Where the issued crl are kept
|
||||
database = $dir]index.txt # database index file.
|
||||
new_certs_dir = $dir.newcerts] # default place for new certs.
|
||||
dir = ssl$root:[000000 # Where everything is kept
|
||||
certs = ${dir}.certs] # Where the issued certs are kept
|
||||
crl_dir = ${dir}.certs] # Where the issued crl are kept
|
||||
database = ${dir}.private]index.txt # database index file.
|
||||
new_certs_dir = ${dir}.certs] # default place for new certs.
|
||||
|
||||
certificate = $dir]cacert.pem # The CA certificate
|
||||
serial = $dir]serial. # The current serial number
|
||||
crl = $dir]crl.pem # The current CRL
|
||||
private_key = $dir.private]cakey.pem# The private key
|
||||
RANDFILE = $dir.private].rand # private random number file
|
||||
certificate = ${dir}]cacert.pem # The CA certificate
|
||||
serial = ${dir}.private]serial.txt # The current serial number
|
||||
crl = ${dir}]crl.pem # The current CRL
|
||||
private_key = ${dir}.private]cakey.pem # The private key
|
||||
RANDFILE = ${dir}.private].rand # private random number file
|
||||
|
||||
x509_extensions = usr_cert # The extentions to add to the cert
|
||||
|
||||
@@ -60,8 +60,8 @@ policy = policy_match
|
||||
# For the CA policy
|
||||
[ policy_match ]
|
||||
countryName = match
|
||||
stateOrProvinceName = match
|
||||
organizationName = match
|
||||
stateOrProvinceName = supplied
|
||||
organizationName = supplied
|
||||
organizationalUnitName = optional
|
||||
commonName = supplied
|
||||
emailAddress = optional
|
||||
|
||||
263
apps/openssl.c
263
apps/openssl.c
@@ -55,6 +55,60 @@
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
/* ====================================================================
|
||||
* Copyright (c) 1998-2001 The OpenSSL Project. All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
*
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
*
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in
|
||||
* the documentation and/or other materials provided with the
|
||||
* distribution.
|
||||
*
|
||||
* 3. All advertising materials mentioning features or use of this
|
||||
* software must display the following acknowledgment:
|
||||
* "This product includes software developed by the OpenSSL Project
|
||||
* for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
|
||||
*
|
||||
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
|
||||
* endorse or promote products derived from this software without
|
||||
* prior written permission. For written permission, please contact
|
||||
* openssl-core@openssl.org.
|
||||
*
|
||||
* 5. Products derived from this software may not be called "OpenSSL"
|
||||
* nor may "OpenSSL" appear in their names without prior written
|
||||
* permission of the OpenSSL Project.
|
||||
*
|
||||
* 6. Redistributions of any form whatsoever must retain the following
|
||||
* acknowledgment:
|
||||
* "This product includes software developed by the OpenSSL Project
|
||||
* for use in the OpenSSL Toolkit (http://www.openssl.org/)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
|
||||
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
|
||||
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||||
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
||||
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
||||
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
||||
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
||||
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
||||
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
* ====================================================================
|
||||
*
|
||||
* This product includes cryptographic software written by Eric Young
|
||||
* (eay@cryptsoft.com). This product includes software written by Tim
|
||||
* Hudson (tjh@cryptsoft.com).
|
||||
*
|
||||
*/
|
||||
|
||||
|
||||
#include <stdio.h>
|
||||
#include <string.h>
|
||||
@@ -67,17 +121,37 @@
|
||||
#include <openssl/x509.h>
|
||||
#include <openssl/pem.h>
|
||||
#include <openssl/ssl.h>
|
||||
#include <openssl/engine.h>
|
||||
#define USE_SOCKETS /* needed for the _O_BINARY defs in the MS world */
|
||||
#include "apps.h"
|
||||
#include "progs.h"
|
||||
#include "s_apps.h"
|
||||
#include <openssl/err.h>
|
||||
|
||||
static unsigned long MS_CALLBACK hash(FUNCTION *a);
|
||||
static int MS_CALLBACK cmp(FUNCTION *a,FUNCTION *b);
|
||||
/* The LHASH callbacks ("hash" & "cmp") have been replaced by functions with the
|
||||
* base prototypes (we cast each variable inside the function to the required
|
||||
* type of "FUNCTION*"). This removes the necessity for macro-generated wrapper
|
||||
* functions. */
|
||||
|
||||
/* static unsigned long MS_CALLBACK hash(FUNCTION *a); */
|
||||
static unsigned long MS_CALLBACK hash(const void *a_void);
|
||||
/* static int MS_CALLBACK cmp(FUNCTION *a,FUNCTION *b); */
|
||||
static int MS_CALLBACK cmp(const void *a_void,const void *b_void);
|
||||
static LHASH *prog_init(void );
|
||||
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
#if __INITIAL_POINTER_SIZE == 64
|
||||
#pragma __required_pointer_size __save
|
||||
#pragma __required_pointer_size 32
|
||||
#endif
|
||||
typedef char ** Argv_32;
|
||||
#if __INITIAL_POINTER_SIZE == 64
|
||||
#pragma __required_pointer_size __restore
|
||||
#endif
|
||||
#endif
|
||||
|
||||
static int do_cmd(LHASH *prog,int argc,char *argv[]);
|
||||
LHASH *config=NULL;
|
||||
CONF *config=NULL;
|
||||
char *default_config_file=NULL;
|
||||
|
||||
/* Make sure there is only one when MONOLITH is defined */
|
||||
@@ -85,35 +159,127 @@ char *default_config_file=NULL;
|
||||
BIO *bio_err=NULL;
|
||||
#endif
|
||||
|
||||
|
||||
static void lock_dbg_cb(int mode, int type, const char *file, int line)
|
||||
{
|
||||
static int modes[CRYPTO_NUM_LOCKS]; /* = {0, 0, ... } */
|
||||
const char *errstr = NULL;
|
||||
int rw;
|
||||
|
||||
rw = mode & (CRYPTO_READ|CRYPTO_WRITE);
|
||||
if (!((rw == CRYPTO_READ) || (rw == CRYPTO_WRITE)))
|
||||
{
|
||||
errstr = "invalid mode";
|
||||
goto err;
|
||||
}
|
||||
|
||||
if (type < 0 || type > CRYPTO_NUM_LOCKS)
|
||||
{
|
||||
errstr = "type out of bounds";
|
||||
goto err;
|
||||
}
|
||||
|
||||
if (mode & CRYPTO_LOCK)
|
||||
{
|
||||
if (modes[type])
|
||||
{
|
||||
errstr = "already locked";
|
||||
/* must not happen in a single-threaded program
|
||||
* (would deadlock) */
|
||||
goto err;
|
||||
}
|
||||
|
||||
modes[type] = rw;
|
||||
}
|
||||
else if (mode & CRYPTO_UNLOCK)
|
||||
{
|
||||
if (!modes[type])
|
||||
{
|
||||
errstr = "not locked";
|
||||
goto err;
|
||||
}
|
||||
|
||||
if (modes[type] != rw)
|
||||
{
|
||||
errstr = (rw == CRYPTO_READ) ?
|
||||
"CRYPTO_r_unlock on write lock" :
|
||||
"CRYPTO_w_unlock on read lock";
|
||||
}
|
||||
|
||||
modes[type] = 0;
|
||||
}
|
||||
else
|
||||
{
|
||||
errstr = "invalid mode";
|
||||
goto err;
|
||||
}
|
||||
|
||||
err:
|
||||
if (errstr)
|
||||
{
|
||||
/* we cannot use bio_err here */
|
||||
fprintf(stderr, "openssl (lock_dbg_cb): %s (mode=%d, type=%d) at %s:%d\n",
|
||||
errstr, mode, type, file, line);
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
int main(int Argc, Argv_32 argv32)
|
||||
#else
|
||||
int main(int Argc, char *Argv[])
|
||||
#endif
|
||||
{
|
||||
ARGS arg;
|
||||
#define PROG_NAME_SIZE 16
|
||||
char pname[PROG_NAME_SIZE];
|
||||
#define PROG_NAME_SIZE 39
|
||||
char pname[PROG_NAME_SIZE+1];
|
||||
FUNCTION f,*fp;
|
||||
MS_STATIC char *prompt,buf[1024],config_name[256];
|
||||
int n,i,ret=0;
|
||||
int argc;
|
||||
char **argv,*p;
|
||||
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
#if __INITIAL_POINTER_SIZE == 64
|
||||
char **argv64;
|
||||
#endif
|
||||
#endif
|
||||
|
||||
LHASH *prog=NULL;
|
||||
long errline;
|
||||
int loop; /* For checking if it's first round in the OpenSSL commandline loop */
|
||||
|
||||
arg.data=NULL;
|
||||
arg.count=0;
|
||||
|
||||
if (getenv("OPENSSL_DEBUG_MEMORY") != NULL)
|
||||
CRYPTO_malloc_debug_init();
|
||||
if (getenv("OPENSSL_DEBUG_MEMORY") != NULL) /* if not defined, use compiled-in library defaults */
|
||||
{
|
||||
if (!(0 == strcmp(getenv("OPENSSL_DEBUG_MEMORY"), "off")))
|
||||
{
|
||||
CRYPTO_malloc_debug_init();
|
||||
CRYPTO_set_mem_debug_options(V_CRYPTO_MDEBUG_ALL);
|
||||
}
|
||||
else
|
||||
{
|
||||
/* OPENSSL_DEBUG_MEMORY=off */
|
||||
CRYPTO_set_mem_debug_functions(0, 0, 0, 0, 0);
|
||||
}
|
||||
}
|
||||
CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ON);
|
||||
|
||||
#if 0
|
||||
if (getenv("OPENSSL_DEBUG_LOCKING") != NULL)
|
||||
#endif
|
||||
{
|
||||
CRYPTO_set_locking_callback(lock_dbg_cb);
|
||||
}
|
||||
|
||||
apps_startup();
|
||||
|
||||
if (bio_err == NULL)
|
||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
||||
|
||||
ERR_load_crypto_strings();
|
||||
ENGINE_load_builtin_engines();
|
||||
|
||||
/* Lets load up our environment a little */
|
||||
p=getenv("OPENSSL_CONF");
|
||||
if (p == NULL)
|
||||
@@ -121,7 +287,7 @@ int main(int Argc, char *Argv[])
|
||||
if (p == NULL)
|
||||
{
|
||||
strcpy(config_name,X509_get_default_cert_area());
|
||||
#ifndef VMS
|
||||
#ifndef OPENSSL_SYS_VMS
|
||||
strcat(config_name,"/");
|
||||
#endif
|
||||
strcat(config_name,OPENSSL_CONF);
|
||||
@@ -130,20 +296,35 @@ int main(int Argc, char *Argv[])
|
||||
|
||||
default_config_file=p;
|
||||
|
||||
config=CONF_load(config,p,&errline);
|
||||
if (config == NULL) ERR_clear_error();
|
||||
config=NCONF_new(NULL);
|
||||
i=NCONF_load(config,p,&errline);
|
||||
if (i == 0)
|
||||
{
|
||||
NCONF_free(config);
|
||||
config = NULL;
|
||||
ERR_clear_error();
|
||||
}
|
||||
|
||||
prog=prog_init();
|
||||
|
||||
/* first check the program name */
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
program_name(argv32[0],pname,PROG_NAME_SIZE);
|
||||
#else
|
||||
program_name(Argv[0],pname,PROG_NAME_SIZE);
|
||||
#endif
|
||||
|
||||
f.name=pname;
|
||||
fp=(FUNCTION *)lh_retrieve(prog,&f);
|
||||
if (fp != NULL)
|
||||
{
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
argv32[0]=pname;
|
||||
ret=fp->func(Argc,argv32);
|
||||
#else
|
||||
Argv[0]=pname;
|
||||
ret=fp->func(Argc,Argv);
|
||||
#endif
|
||||
goto end;
|
||||
}
|
||||
|
||||
@@ -152,14 +333,32 @@ int main(int Argc, char *Argv[])
|
||||
if (Argc != 1)
|
||||
{
|
||||
Argc--;
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
argv32++;
|
||||
#if __INITIAL_POINTER_SIZE == 64
|
||||
argv64=(char **)_malloc64(sizeof(char *)*Argc); /* memory allocation in 64-bit address */
|
||||
|
||||
for (i=0;i<Argc;i++)
|
||||
{
|
||||
argv64[i]=argv32[i]; /* copying 32-bit Argv to 64-bit argv*/
|
||||
}
|
||||
|
||||
ret=do_cmd(prog,Argc,argv64);
|
||||
free(argv64);
|
||||
#else
|
||||
ret=do_cmd(prog,Argc,argv32);
|
||||
#endif
|
||||
#else
|
||||
Argv++;
|
||||
ret=do_cmd(prog,Argc,Argv);
|
||||
#endif
|
||||
|
||||
if (ret < 0) ret=0;
|
||||
goto end;
|
||||
}
|
||||
|
||||
/* ok, lets enter the old 'OpenSSL>' mode */
|
||||
|
||||
loop=0;
|
||||
for (;;)
|
||||
{
|
||||
ret=0;
|
||||
@@ -171,7 +370,14 @@ int main(int Argc, char *Argv[])
|
||||
p[0]='\0';
|
||||
if (i++)
|
||||
prompt=">";
|
||||
else prompt="OpenSSL> ";
|
||||
else
|
||||
if(loop == 0){ /* first round in this loop*/
|
||||
prompt="OpenSSL> ";
|
||||
loop++;
|
||||
}
|
||||
else
|
||||
prompt="\nOpenSSL> ";
|
||||
|
||||
fputs(prompt,stdout);
|
||||
fflush(stdout);
|
||||
fgets(p,n,stdin);
|
||||
@@ -200,16 +406,14 @@ int main(int Argc, char *Argv[])
|
||||
end:
|
||||
if (config != NULL)
|
||||
{
|
||||
CONF_free(config);
|
||||
NCONF_free(config);
|
||||
config=NULL;
|
||||
}
|
||||
if (prog != NULL) lh_free(prog);
|
||||
if (arg.data != NULL) OPENSSL_free(arg.data);
|
||||
ERR_remove_state(0);
|
||||
|
||||
EVP_cleanup();
|
||||
ERR_free_strings();
|
||||
|
||||
apps_shutdown();
|
||||
|
||||
CRYPTO_mem_leaks(bio_err);
|
||||
if (bio_err != NULL)
|
||||
{
|
||||
@@ -223,6 +427,7 @@ end:
|
||||
#define LIST_MESSAGE_DIGEST_COMMANDS "list-message-digest-commands"
|
||||
#define LIST_CIPHER_COMMANDS "list-cipher-commands"
|
||||
|
||||
|
||||
static int do_cmd(LHASH *prog, int argc, char *argv[])
|
||||
{
|
||||
FUNCTION f,*fp;
|
||||
@@ -239,7 +444,7 @@ static int do_cmd(LHASH *prog, int argc, char *argv[])
|
||||
else if ((strncmp(argv[0],"no-",3)) == 0)
|
||||
{
|
||||
BIO *bio_stdout = BIO_new_fp(stdout,BIO_NOCLOSE);
|
||||
#ifdef VMS
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
{
|
||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||
bio_stdout = BIO_push(tmpbio, bio_stdout);
|
||||
@@ -276,7 +481,7 @@ static int do_cmd(LHASH *prog, int argc, char *argv[])
|
||||
else /* strcmp(argv[0],LIST_CIPHER_COMMANDS) == 0 */
|
||||
list_type = FUNC_TYPE_CIPHER;
|
||||
bio_stdout = BIO_new_fp(stdout,BIO_NOCLOSE);
|
||||
#ifdef VMS
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
{
|
||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||
bio_stdout = BIO_push(tmpbio, bio_stdout);
|
||||
@@ -351,19 +556,23 @@ static LHASH *prog_init(void)
|
||||
;
|
||||
qsort(functions,i,sizeof *functions,SortFnByName);
|
||||
|
||||
if ((ret=lh_new(hash,cmp)) == NULL) return(NULL);
|
||||
if ((ret=lh_new(hash, cmp)) == NULL)
|
||||
return(NULL);
|
||||
|
||||
for (f=functions; f->name != NULL; f++)
|
||||
lh_insert(ret,f);
|
||||
return(ret);
|
||||
}
|
||||
|
||||
static int MS_CALLBACK cmp(FUNCTION *a, FUNCTION *b)
|
||||
/* static int MS_CALLBACK cmp(FUNCTION *a, FUNCTION *b) */
|
||||
static int MS_CALLBACK cmp(const void *a_void, const void *b_void)
|
||||
{
|
||||
return(strncmp(a->name,b->name,8));
|
||||
return(strncmp(((FUNCTION *)a_void)->name,
|
||||
((FUNCTION *)b_void)->name,8));
|
||||
}
|
||||
|
||||
static unsigned long MS_CALLBACK hash(FUNCTION *a)
|
||||
/* static unsigned long MS_CALLBACK hash(FUNCTION *a) */
|
||||
static unsigned long MS_CALLBACK hash(const void *a_void)
|
||||
{
|
||||
return(lh_strhash(a->name));
|
||||
return(lh_strhash(((FUNCTION *)a_void)->name));
|
||||
}
|
||||
|
||||
@@ -6,7 +6,15 @@
|
||||
# This definition stops the following lines choking if HOME isn't
|
||||
# defined.
|
||||
HOME = .
|
||||
RANDFILE = $ENV::HOME/.rnd
|
||||
|
||||
#
|
||||
# From the instructions at http://www.free.lp.se/openssl/docs/openssl3.html#ss3.1,
|
||||
# change the value of RANDFILE. Also moved definition of dir up since RANDFILE
|
||||
# depends on it.
|
||||
#
|
||||
#RANDFILE = $ENV::HOME/.rnd
|
||||
dir = SSLROOT:[000000 # Where everything is kept
|
||||
RANDFILE = $dir.private]RANDFILE.;
|
||||
|
||||
# Extra OBJECT IDENTIFIER info:
|
||||
#oid_file = $ENV::HOME/.oid
|
||||
@@ -33,8 +41,12 @@ default_ca = CA_default # The default ca section
|
||||
|
||||
####################################################################
|
||||
[ CA_default ]
|
||||
|
||||
dir = ./demoCA # Where everything is kept
|
||||
#
|
||||
# From the instructions at http://www.free.lp.se/openssl/docs/openssl3.html#ss3.1,
|
||||
# change the value of dir.
|
||||
#
|
||||
#dir = sys\$disk:[.demoCA # Where everything is kept
|
||||
dir = SSLROOT:[000000 # Where everything is kept
|
||||
certs = $dir/certs # Where the issued certs are kept
|
||||
crl_dir = $dir/crl # Where the issued crl are kept
|
||||
database = $dir/index.txt # database index file.
|
||||
@@ -48,6 +60,14 @@ RANDFILE = $dir/private/.rand # private random number file
|
||||
|
||||
x509_extensions = usr_cert # The extentions to add to the cert
|
||||
|
||||
# Comment out the following two lines for the "traditional"
|
||||
# (and highly broken) format.
|
||||
name_opt = ca_default # Subject Name options
|
||||
cert_opt = ca_default # Certificate field options
|
||||
|
||||
# Extension copying option: use with caution.
|
||||
# copy_extensions = copy
|
||||
|
||||
# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
|
||||
# so this is commented out by default to leave a V1 CRL.
|
||||
# crl_extensions = crl_ext
|
||||
@@ -132,7 +152,7 @@ commonName = Common Name (eg, YOUR name)
|
||||
commonName_max = 64
|
||||
|
||||
emailAddress = Email Address
|
||||
emailAddress_max = 40
|
||||
emailAddress_max = 64
|
||||
|
||||
# SET-ex3 = SET extension number 3
|
||||
|
||||
@@ -166,6 +186,11 @@ basicConstraints=CA:FALSE
|
||||
|
||||
# and for everything including object signing:
|
||||
# nsCertType = client, email, objsign
|
||||
#
|
||||
# From the instructions at http://www.free.lp.se/openssl/docs/openssl3.html#ss3.1,
|
||||
# include server in the nsCertType.
|
||||
#
|
||||
nsCertType = client, email, objsign, server
|
||||
|
||||
# This is typical in keyUsage for a client certificate.
|
||||
# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
|
||||
@@ -180,6 +205,9 @@ authorityKeyIdentifier=keyid,issuer:always
|
||||
# This stuff is for subjectAltName and issuerAltname.
|
||||
# Import the email address.
|
||||
# subjectAltName=email:copy
|
||||
# An alternative to produce certificates that aren't
|
||||
# deprecated according to PKIX.
|
||||
# subjectAltName=email:move
|
||||
|
||||
# Copy subject details
|
||||
# issuerAltName=issuer:copy
|
||||
|
||||
@@ -1,10 +1,10 @@
|
||||
/* apps/passwd.c */
|
||||
|
||||
#if defined NO_MD5 || defined CHARSET_EBCDIC
|
||||
#if defined OPENSSL_NO_MD5 || defined CHARSET_EBCDIC
|
||||
# define NO_MD5CRYPT_1
|
||||
#endif
|
||||
|
||||
#if !defined(NO_DES) || !defined(NO_MD5CRYPT_1)
|
||||
#if !defined(OPENSSL_NO_DES) || !defined(NO_MD5CRYPT_1)
|
||||
|
||||
#include <assert.h>
|
||||
#include <string.h>
|
||||
@@ -15,11 +15,11 @@
|
||||
#include <openssl/err.h>
|
||||
#include <openssl/evp.h>
|
||||
#include <openssl/rand.h>
|
||||
|
||||
#ifndef NO_DES
|
||||
#ifndef OPENSSL_NO_DES
|
||||
# include <openssl/des.h>
|
||||
#endif
|
||||
#ifndef NO_MD5CRYPT_1
|
||||
# include <openssl/evp.h>
|
||||
# include <openssl/md5.h>
|
||||
#endif
|
||||
|
||||
@@ -50,6 +50,7 @@ static int do_passwd(int passed_salt, char **salt_p, char **salt_malloc_p,
|
||||
* -salt string - salt
|
||||
* -in file - read passwords from file
|
||||
* -stdin - read passwords from stdin
|
||||
* -noverify - never verify when reading password from terminal
|
||||
* -quiet - no warnings
|
||||
* -table - format output as table
|
||||
* -reverse - switch table columns
|
||||
@@ -62,6 +63,7 @@ int MAIN(int argc, char **argv)
|
||||
int ret = 1;
|
||||
char *infile = NULL;
|
||||
int in_stdin = 0;
|
||||
int in_noverify = 0;
|
||||
char *salt = NULL, *passwd = NULL, **passwds = NULL;
|
||||
char *salt_malloc = NULL, *passwd_malloc = NULL;
|
||||
size_t passwd_malloc_size = 0;
|
||||
@@ -77,11 +79,14 @@ int MAIN(int argc, char **argv)
|
||||
if (bio_err == NULL)
|
||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
||||
|
||||
if (!load_config(bio_err, NULL))
|
||||
goto err;
|
||||
out = BIO_new(BIO_s_file());
|
||||
if (out == NULL)
|
||||
goto err;
|
||||
BIO_set_fp(out, stdout, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||
#ifdef VMS
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
{
|
||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||
out = BIO_push(tmpbio, out);
|
||||
@@ -128,6 +133,8 @@ int MAIN(int argc, char **argv)
|
||||
else
|
||||
badopt = 1;
|
||||
}
|
||||
else if (strcmp(argv[i], "-noverify") == 0)
|
||||
in_noverify = 1;
|
||||
else if (strcmp(argv[i], "-quiet") == 0)
|
||||
quiet = 1;
|
||||
else if (strcmp(argv[i], "-table") == 0)
|
||||
@@ -153,7 +160,7 @@ int MAIN(int argc, char **argv)
|
||||
badopt = 1;
|
||||
|
||||
/* reject unsupported algorithms */
|
||||
#ifdef NO_DES
|
||||
#ifdef OPENSSL_NO_DES
|
||||
if (usecrypt) badopt = 1;
|
||||
#endif
|
||||
#ifdef NO_MD5CRYPT_1
|
||||
@@ -164,7 +171,7 @@ int MAIN(int argc, char **argv)
|
||||
{
|
||||
BIO_printf(bio_err, "Usage: passwd [options] [passwords]\n");
|
||||
BIO_printf(bio_err, "where options are\n");
|
||||
#ifndef NO_DES
|
||||
#ifndef OPENSSL_NO_DES
|
||||
BIO_printf(bio_err, "-crypt standard Unix password algorithm (default)\n");
|
||||
#endif
|
||||
#ifndef NO_MD5CRYPT_1
|
||||
@@ -174,6 +181,7 @@ int MAIN(int argc, char **argv)
|
||||
BIO_printf(bio_err, "-salt string use provided salt\n");
|
||||
BIO_printf(bio_err, "-in file read passwords from file\n");
|
||||
BIO_printf(bio_err, "-stdin read passwords from stdin\n");
|
||||
BIO_printf(bio_err, "-noverify never verify when reading password from terminal\n");
|
||||
BIO_printf(bio_err, "-quiet no warnings\n");
|
||||
BIO_printf(bio_err, "-table format output as table\n");
|
||||
BIO_printf(bio_err, "-reverse switch table columns\n");
|
||||
@@ -222,7 +230,7 @@ int MAIN(int argc, char **argv)
|
||||
|
||||
passwds = passwds_static;
|
||||
if (in == NULL)
|
||||
if (EVP_read_pw_string(passwd_malloc, passwd_malloc_size, "Password: ", 0) != 0)
|
||||
if (EVP_read_pw_string(passwd_malloc, passwd_malloc_size, "Password: ", !(passed_salt || in_noverify)) != 0)
|
||||
goto err;
|
||||
passwds[0] = passwd_malloc;
|
||||
}
|
||||
@@ -272,6 +280,7 @@ int MAIN(int argc, char **argv)
|
||||
}
|
||||
while (!done);
|
||||
}
|
||||
ret = 0;
|
||||
|
||||
err:
|
||||
ERR_print_errors(bio_err);
|
||||
@@ -283,6 +292,7 @@ err:
|
||||
BIO_free(in);
|
||||
if (out)
|
||||
BIO_free_all(out);
|
||||
apps_shutdown();
|
||||
EXIT(ret);
|
||||
}
|
||||
|
||||
@@ -304,7 +314,7 @@ static char *md5crypt(const char *passwd, const char *magic, const char *salt)
|
||||
unsigned char buf[MD5_DIGEST_LENGTH];
|
||||
char *salt_out;
|
||||
int n, i;
|
||||
MD5_CTX md;
|
||||
EVP_MD_CTX md,md2;
|
||||
size_t passwd_len, salt_len;
|
||||
|
||||
passwd_len = strlen(passwd);
|
||||
@@ -315,53 +325,51 @@ static char *md5crypt(const char *passwd, const char *magic, const char *salt)
|
||||
strncat(out_buf, "$", 1);
|
||||
strncat(out_buf, salt, 8);
|
||||
assert(strlen(out_buf) <= 6 + 8); /* "$apr1$..salt.." */
|
||||
salt_out = out_buf + 6;
|
||||
salt_out = out_buf + 2 + strlen(magic);
|
||||
salt_len = strlen(salt_out);
|
||||
assert(salt_len <= 8);
|
||||
|
||||
MD5_Init(&md);
|
||||
MD5_Update(&md, passwd, passwd_len);
|
||||
MD5_Update(&md, "$", 1);
|
||||
MD5_Update(&md, magic, strlen(magic));
|
||||
MD5_Update(&md, "$", 1);
|
||||
MD5_Update(&md, salt_out, salt_len);
|
||||
EVP_MD_CTX_init(&md);
|
||||
EVP_DigestInit_ex(&md,EVP_md5(), NULL);
|
||||
EVP_DigestUpdate(&md, passwd, passwd_len);
|
||||
EVP_DigestUpdate(&md, "$", 1);
|
||||
EVP_DigestUpdate(&md, magic, strlen(magic));
|
||||
EVP_DigestUpdate(&md, "$", 1);
|
||||
EVP_DigestUpdate(&md, salt_out, salt_len);
|
||||
|
||||
{
|
||||
MD5_CTX md2;
|
||||
EVP_MD_CTX_init(&md2);
|
||||
EVP_DigestInit_ex(&md2,EVP_md5(), NULL);
|
||||
EVP_DigestUpdate(&md2, passwd, passwd_len);
|
||||
EVP_DigestUpdate(&md2, salt_out, salt_len);
|
||||
EVP_DigestUpdate(&md2, passwd, passwd_len);
|
||||
EVP_DigestFinal_ex(&md2, buf, NULL);
|
||||
|
||||
MD5_Init(&md2);
|
||||
MD5_Update(&md2, passwd, passwd_len);
|
||||
MD5_Update(&md2, salt_out, salt_len);
|
||||
MD5_Update(&md2, passwd, passwd_len);
|
||||
MD5_Final(buf, &md2);
|
||||
}
|
||||
for (i = passwd_len; i > sizeof buf; i -= sizeof buf)
|
||||
MD5_Update(&md, buf, sizeof buf);
|
||||
MD5_Update(&md, buf, i);
|
||||
EVP_DigestUpdate(&md, buf, sizeof buf);
|
||||
EVP_DigestUpdate(&md, buf, i);
|
||||
|
||||
n = passwd_len;
|
||||
while (n)
|
||||
{
|
||||
MD5_Update(&md, (n & 1) ? "\0" : passwd, 1);
|
||||
EVP_DigestUpdate(&md, (n & 1) ? "\0" : passwd, 1);
|
||||
n >>= 1;
|
||||
}
|
||||
MD5_Final(buf, &md);
|
||||
EVP_DigestFinal_ex(&md, buf, NULL);
|
||||
|
||||
for (i = 0; i < 1000; i++)
|
||||
{
|
||||
MD5_CTX md2;
|
||||
|
||||
MD5_Init(&md2);
|
||||
MD5_Update(&md2, (i & 1) ? (unsigned char *) passwd : buf,
|
||||
(i & 1) ? passwd_len : sizeof buf);
|
||||
EVP_DigestInit_ex(&md2,EVP_md5(), NULL);
|
||||
EVP_DigestUpdate(&md2, (i & 1) ? (unsigned char *) passwd : buf,
|
||||
(i & 1) ? passwd_len : sizeof buf);
|
||||
if (i % 3)
|
||||
MD5_Update(&md2, salt_out, salt_len);
|
||||
EVP_DigestUpdate(&md2, salt_out, salt_len);
|
||||
if (i % 7)
|
||||
MD5_Update(&md2, passwd, passwd_len);
|
||||
MD5_Update(&md2, (i & 1) ? buf : (unsigned char *) passwd,
|
||||
(i & 1) ? sizeof buf : passwd_len);
|
||||
MD5_Final(buf, &md2);
|
||||
EVP_DigestUpdate(&md2, passwd, passwd_len);
|
||||
EVP_DigestUpdate(&md2, (i & 1) ? buf : (unsigned char *) passwd,
|
||||
(i & 1) ? sizeof buf : passwd_len);
|
||||
EVP_DigestFinal_ex(&md2, buf, NULL);
|
||||
}
|
||||
EVP_MD_CTX_cleanup(&md2);
|
||||
|
||||
{
|
||||
/* transform buf into output string */
|
||||
@@ -399,6 +407,7 @@ static char *md5crypt(const char *passwd, const char *magic, const char *salt)
|
||||
*output = 0;
|
||||
assert(strlen(out_buf) < sizeof(out_buf));
|
||||
}
|
||||
EVP_MD_CTX_cleanup(&md);
|
||||
|
||||
return out_buf;
|
||||
}
|
||||
@@ -417,7 +426,7 @@ static int do_passwd(int passed_salt, char **salt_p, char **salt_malloc_p,
|
||||
/* first make sure we have a salt */
|
||||
if (!passed_salt)
|
||||
{
|
||||
#ifndef NO_DES
|
||||
#ifndef OPENSSL_NO_DES
|
||||
if (usecrypt)
|
||||
{
|
||||
if (*salt_malloc_p == NULL)
|
||||
@@ -436,7 +445,7 @@ static int do_passwd(int passed_salt, char **salt_p, char **salt_malloc_p,
|
||||
* back to ASCII */
|
||||
#endif
|
||||
}
|
||||
#endif /* !NO_DES */
|
||||
#endif /* !OPENSSL_NO_DES */
|
||||
|
||||
#ifndef NO_MD5CRYPT_1
|
||||
if (use1 || useapr1)
|
||||
@@ -471,9 +480,9 @@ static int do_passwd(int passed_salt, char **salt_p, char **salt_malloc_p,
|
||||
assert(strlen(passwd) <= pw_maxlen);
|
||||
|
||||
/* now compute password hash */
|
||||
#ifndef NO_DES
|
||||
#ifndef OPENSSL_NO_DES
|
||||
if (usecrypt)
|
||||
hash = des_crypt(passwd, *salt_p);
|
||||
hash = DES_crypt(passwd, *salt_p);
|
||||
#endif
|
||||
#ifndef NO_MD5CRYPT_1
|
||||
if (use1 || useapr1)
|
||||
|
||||
105
apps/pkcs12.c
105
apps/pkcs12.c
@@ -1,5 +1,5 @@
|
||||
/* pkcs12.c */
|
||||
#if !defined(NO_DES) && !defined(NO_SHA1)
|
||||
#if !defined(OPENSSL_NO_DES) && !defined(OPENSSL_NO_SHA1)
|
||||
|
||||
/* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
|
||||
* project 1999.
|
||||
@@ -66,11 +66,10 @@
|
||||
#include <openssl/err.h>
|
||||
#include <openssl/pem.h>
|
||||
#include <openssl/pkcs12.h>
|
||||
#include <openssl/engine.h>
|
||||
|
||||
#define PROG pkcs12_main
|
||||
|
||||
EVP_CIPHER *enc;
|
||||
const EVP_CIPHER *enc;
|
||||
|
||||
|
||||
#define NOKEYS 0x1
|
||||
@@ -96,9 +95,10 @@ int MAIN(int argc, char **argv)
|
||||
ENGINE *e = NULL;
|
||||
char *infile=NULL, *outfile=NULL, *keyname = NULL;
|
||||
char *certfile=NULL;
|
||||
BIO *in=NULL, *out = NULL, *inkey = NULL, *certsin = NULL;
|
||||
BIO *in=NULL, *out = NULL;
|
||||
char **args;
|
||||
char *name = NULL;
|
||||
char *csp_name = NULL;
|
||||
PKCS12 *p12 = NULL;
|
||||
char pass[50], macpass[50];
|
||||
int export_cert = 0;
|
||||
@@ -127,6 +127,9 @@ int MAIN(int argc, char **argv)
|
||||
enc = EVP_des_ede3_cbc();
|
||||
if (bio_err == NULL ) bio_err = BIO_new_fp (stderr, BIO_NOCLOSE);
|
||||
|
||||
if (!load_config(bio_err, NULL))
|
||||
goto end;
|
||||
|
||||
args = argv + 1;
|
||||
|
||||
|
||||
@@ -147,10 +150,15 @@ int MAIN(int argc, char **argv)
|
||||
cert_pbe = NID_pbe_WithSHA1And3_Key_TripleDES_CBC;
|
||||
else if (!strcmp (*args, "-export")) export_cert = 1;
|
||||
else if (!strcmp (*args, "-des")) enc=EVP_des_cbc();
|
||||
#ifndef NO_IDEA
|
||||
#ifndef OPENSSL_NO_IDEA
|
||||
else if (!strcmp (*args, "-idea")) enc=EVP_idea_cbc();
|
||||
#endif
|
||||
else if (!strcmp (*args, "-des3")) enc = EVP_des_ede3_cbc();
|
||||
#ifndef OPENSSL_NO_AES
|
||||
else if (!strcmp(*args,"-aes128")) enc=EVP_aes_128_cbc();
|
||||
else if (!strcmp(*args,"-aes192")) enc=EVP_aes_192_cbc();
|
||||
else if (!strcmp(*args,"-aes256")) enc=EVP_aes_256_cbc();
|
||||
#endif
|
||||
else if (!strcmp (*args, "-noiter")) iter = 1;
|
||||
else if (!strcmp (*args, "-maciter"))
|
||||
maciter = PKCS12_DEFAULT_ITER;
|
||||
@@ -197,6 +205,11 @@ int MAIN(int argc, char **argv)
|
||||
args++;
|
||||
name = *args;
|
||||
} else badarg = 1;
|
||||
} else if (!strcmp (*args, "-CSP")) {
|
||||
if (args[1]) {
|
||||
args++;
|
||||
csp_name = *args;
|
||||
} else badarg = 1;
|
||||
} else if (!strcmp (*args, "-caname")) {
|
||||
if (args[1]) {
|
||||
args++;
|
||||
@@ -272,8 +285,12 @@ int MAIN(int argc, char **argv)
|
||||
BIO_printf (bio_err, "-info give info about PKCS#12 structure.\n");
|
||||
BIO_printf (bio_err, "-des encrypt private keys with DES\n");
|
||||
BIO_printf (bio_err, "-des3 encrypt private keys with triple DES (default)\n");
|
||||
#ifndef NO_IDEA
|
||||
#ifndef OPENSSL_NO_IDEA
|
||||
BIO_printf (bio_err, "-idea encrypt private keys with idea\n");
|
||||
#endif
|
||||
#ifndef OPENSSL_NO_AES
|
||||
BIO_printf (bio_err, "-aes128, -aes192, -aes256\n");
|
||||
BIO_printf (bio_err, " encrypt PEM output with cbc aes\n");
|
||||
#endif
|
||||
BIO_printf (bio_err, "-nodes don't encrypt private keys\n");
|
||||
BIO_printf (bio_err, "-noiter don't use encryption iteration\n");
|
||||
@@ -294,19 +311,7 @@ int MAIN(int argc, char **argv)
|
||||
goto end;
|
||||
}
|
||||
|
||||
if (engine != NULL) {
|
||||
if((e = ENGINE_by_id(engine)) == NULL) {
|
||||
BIO_printf(bio_err,"invalid engine \"%s\"\n", engine);
|
||||
goto end;
|
||||
}
|
||||
if(!ENGINE_set_default(e, ENGINE_METHOD_ALL)) {
|
||||
BIO_printf(bio_err,"can't use that engine\n");
|
||||
goto end;
|
||||
}
|
||||
BIO_printf(bio_err,"engine \"%s\" set.\n", engine);
|
||||
/* Free our "structural" reference. */
|
||||
ENGINE_free(e);
|
||||
}
|
||||
e = setup_engine(bio_err, engine, 0);
|
||||
|
||||
if(passarg) {
|
||||
if(export_cert) passargout = passarg;
|
||||
@@ -352,6 +357,7 @@ int MAIN(int argc, char **argv)
|
||||
goto end;
|
||||
}
|
||||
|
||||
#if 0
|
||||
if (certfile) {
|
||||
if(!(certsin = BIO_new_file(certfile, "r"))) {
|
||||
BIO_printf(bio_err, "Can't open certificate file %s\n", certfile);
|
||||
@@ -367,6 +373,7 @@ int MAIN(int argc, char **argv)
|
||||
goto end;
|
||||
}
|
||||
}
|
||||
#endif
|
||||
|
||||
#ifdef CRYPTO_MDEBUG
|
||||
CRYPTO_pop_info();
|
||||
@@ -375,7 +382,7 @@ int MAIN(int argc, char **argv)
|
||||
|
||||
if (!outfile) {
|
||||
out = BIO_new_fp(stdout, BIO_NOCLOSE);
|
||||
#ifdef VMS
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
{
|
||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||
out = BIO_push(tmpbio, out);
|
||||
@@ -420,12 +427,9 @@ int MAIN(int argc, char **argv)
|
||||
CRYPTO_push_info("process -export_cert");
|
||||
CRYPTO_push_info("reading private key");
|
||||
#endif
|
||||
key = PEM_read_bio_PrivateKey(inkey ? inkey : in, NULL, NULL, passin);
|
||||
if (!inkey) (void) BIO_reset(in);
|
||||
else BIO_free(inkey);
|
||||
key = load_key(bio_err, keyname ? keyname : infile, FORMAT_PEM,
|
||||
passin, e, "private key");
|
||||
if (!key) {
|
||||
BIO_printf (bio_err, "Error loading private key\n");
|
||||
ERR_print_errors(bio_err);
|
||||
goto export_end;
|
||||
}
|
||||
|
||||
@@ -434,12 +438,9 @@ int MAIN(int argc, char **argv)
|
||||
CRYPTO_push_info("reading certs from input");
|
||||
#endif
|
||||
|
||||
certs = sk_X509_new_null();
|
||||
|
||||
/* Load in all certs in input file */
|
||||
if(!cert_load(in, certs)) {
|
||||
BIO_printf(bio_err, "Error loading certificates from input\n");
|
||||
ERR_print_errors(bio_err);
|
||||
if(!(certs = load_certs(bio_err, infile, FORMAT_PEM, NULL, e,
|
||||
"certificates"))) {
|
||||
goto export_end;
|
||||
}
|
||||
|
||||
@@ -469,13 +470,17 @@ int MAIN(int argc, char **argv)
|
||||
bags = sk_PKCS12_SAFEBAG_new_null ();
|
||||
|
||||
/* Add any more certificates asked for */
|
||||
if (certsin) {
|
||||
if(!cert_load(certsin, certs)) {
|
||||
BIO_printf(bio_err, "Error loading certificates from certfile\n");
|
||||
ERR_print_errors(bio_err);
|
||||
if (certfile) {
|
||||
STACK_OF(X509) *morecerts=NULL;
|
||||
if(!(morecerts = load_certs(bio_err, certfile, FORMAT_PEM,
|
||||
NULL, e,
|
||||
"certificates from certfile"))) {
|
||||
goto export_end;
|
||||
}
|
||||
BIO_free(certsin);
|
||||
while(sk_X509_num(morecerts) > 0) {
|
||||
sk_X509_push(certs, sk_X509_shift(morecerts));
|
||||
}
|
||||
sk_X509_free(morecerts);
|
||||
}
|
||||
|
||||
#ifdef CRYPTO_MDEBUG
|
||||
@@ -521,7 +526,7 @@ int MAIN(int argc, char **argv)
|
||||
for(i = 0; i < sk_X509_num(certs); i++) {
|
||||
X509 *cert = NULL;
|
||||
cert = sk_X509_value(certs, i);
|
||||
bag = M_PKCS12_x5092certbag(cert);
|
||||
bag = PKCS12_x5092certbag(cert);
|
||||
/* If it matches private key set id */
|
||||
if(cert == ucert) {
|
||||
if(name) PKCS12_add_friendlyname(bag, name, -1);
|
||||
@@ -572,6 +577,7 @@ int MAIN(int argc, char **argv)
|
||||
PKCS8_PRIV_KEY_INFO_free(p8);
|
||||
p8 = NULL;
|
||||
if (name) PKCS12_add_friendlyname (bag, name, -1);
|
||||
if(csp_name) PKCS12_add_CSPName_asc(bag, csp_name, -1);
|
||||
PKCS12_add_localkeyid (bag, keyid, keyidlen);
|
||||
bags = sk_PKCS12_SAFEBAG_new_null();
|
||||
sk_PKCS12_SAFEBAG_push (bags, bag);
|
||||
@@ -592,9 +598,9 @@ int MAIN(int argc, char **argv)
|
||||
CRYPTO_push_info("building pkcs12");
|
||||
#endif
|
||||
|
||||
p12 = PKCS12_init (NID_pkcs7_data);
|
||||
p12 = PKCS12_init(NID_pkcs7_data);
|
||||
|
||||
M_PKCS12_pack_authsafes (p12, safes);
|
||||
PKCS12_pack_authsafes(p12, safes);
|
||||
|
||||
sk_PKCS7_pop_free(safes, PKCS7_free);
|
||||
safes = NULL;
|
||||
@@ -691,6 +697,7 @@ int MAIN(int argc, char **argv)
|
||||
if (canames) sk_free(canames);
|
||||
if(passin) OPENSSL_free(passin);
|
||||
if(passout) OPENSSL_free(passout);
|
||||
apps_shutdown();
|
||||
EXIT(ret);
|
||||
}
|
||||
|
||||
@@ -702,20 +709,20 @@ int dump_certs_keys_p12 (BIO *out, PKCS12 *p12, char *pass,
|
||||
int i, bagnid;
|
||||
PKCS7 *p7;
|
||||
|
||||
if (!( asafes = M_PKCS12_unpack_authsafes (p12))) return 0;
|
||||
if (!( asafes = PKCS12_unpack_authsafes(p12))) return 0;
|
||||
for (i = 0; i < sk_PKCS7_num (asafes); i++) {
|
||||
p7 = sk_PKCS7_value (asafes, i);
|
||||
bagnid = OBJ_obj2nid (p7->type);
|
||||
if (bagnid == NID_pkcs7_data) {
|
||||
bags = M_PKCS12_unpack_p7data (p7);
|
||||
bags = PKCS12_unpack_p7data(p7);
|
||||
if (options & INFO) BIO_printf (bio_err, "PKCS7 Data\n");
|
||||
} else if (bagnid == NID_pkcs7_encrypted) {
|
||||
if (options & INFO) {
|
||||
BIO_printf (bio_err, "PKCS7 Encrypted data: ");
|
||||
alg_print (bio_err,
|
||||
BIO_printf(bio_err, "PKCS7 Encrypted data: ");
|
||||
alg_print(bio_err,
|
||||
p7->d.encrypted->enc_data->algorithm);
|
||||
}
|
||||
bags = M_PKCS12_unpack_p7encdata (p7, pass, passlen);
|
||||
bags = PKCS12_unpack_p7encdata(p7, pass, passlen);
|
||||
} else continue;
|
||||
if (!bags) return 0;
|
||||
if (!dump_certs_pkeys_bags (out, bags, pass, passlen,
|
||||
@@ -770,9 +777,12 @@ int dump_certs_pkeys_bag (BIO *out, PKCS12_SAFEBAG *bag, char *pass,
|
||||
}
|
||||
if (options & NOKEYS) return 1;
|
||||
print_attribs (out, bag->attrib, "Bag Attributes");
|
||||
if (!(p8 = M_PKCS12_decrypt_skey (bag, pass, passlen)))
|
||||
if (!(p8 = PKCS12_decrypt_skey(bag, pass, passlen)))
|
||||
return 0;
|
||||
if (!(pkey = EVP_PKCS82PKEY (p8))) return 0;
|
||||
if (!(pkey = EVP_PKCS82PKEY (p8))) {
|
||||
PKCS8_PRIV_KEY_INFO_free(p8);
|
||||
return 0;
|
||||
}
|
||||
print_attribs (out, p8->attributes, "Key Attributes");
|
||||
PKCS8_PRIV_KEY_INFO_free(p8);
|
||||
PEM_write_bio_PrivateKey (out, pkey, enc, NULL, 0, NULL, pempass);
|
||||
@@ -788,7 +798,7 @@ int dump_certs_pkeys_bag (BIO *out, PKCS12_SAFEBAG *bag, char *pass,
|
||||
print_attribs (out, bag->attrib, "Bag Attributes");
|
||||
if (M_PKCS12_cert_bag_type(bag) != NID_x509Certificate )
|
||||
return 1;
|
||||
if (!(x509 = M_PKCS12_certbag2x509(bag))) return 0;
|
||||
if (!(x509 = PKCS12_certbag2x509(bag))) return 0;
|
||||
dump_cert_text (out, x509);
|
||||
PEM_write_bio_X509 (out, x509);
|
||||
X509_free(x509);
|
||||
@@ -820,6 +830,9 @@ int get_cert_chain (X509 *cert, X509_STORE *store, STACK_OF(X509) **chain)
|
||||
STACK_OF(X509) *chn;
|
||||
int i;
|
||||
|
||||
/* FIXME: Should really check the return status of X509_STORE_CTX_init
|
||||
* for an error, but how that fits into the return value of this
|
||||
* function is less obvious. */
|
||||
X509_STORE_CTX_init(&store_ctx, store, cert, NULL);
|
||||
if (X509_verify_cert(&store_ctx) <= 0) {
|
||||
i = X509_STORE_CTX_get_error (&store_ctx);
|
||||
|
||||
25
apps/pkcs7.c
25
apps/pkcs7.c
@@ -67,7 +67,6 @@
|
||||
#include <openssl/x509.h>
|
||||
#include <openssl/pkcs7.h>
|
||||
#include <openssl/pem.h>
|
||||
#include <openssl/engine.h>
|
||||
|
||||
#undef PROG
|
||||
#define PROG pkcs7_main
|
||||
@@ -163,28 +162,13 @@ bad:
|
||||
BIO_printf(bio_err," -text print full details of certificates\n");
|
||||
BIO_printf(bio_err," -noout don't output encoded data\n");
|
||||
BIO_printf(bio_err," -engine e use engine e, possibly a hardware device.\n");
|
||||
EXIT(1);
|
||||
ret = 1;
|
||||
goto end;
|
||||
}
|
||||
|
||||
ERR_load_crypto_strings();
|
||||
|
||||
if (engine != NULL)
|
||||
{
|
||||
if((e = ENGINE_by_id(engine)) == NULL)
|
||||
{
|
||||
BIO_printf(bio_err,"invalid engine \"%s\"\n",
|
||||
engine);
|
||||
goto end;
|
||||
}
|
||||
if(!ENGINE_set_default(e, ENGINE_METHOD_ALL))
|
||||
{
|
||||
BIO_printf(bio_err,"can't use that engine\n");
|
||||
goto end;
|
||||
}
|
||||
BIO_printf(bio_err,"engine \"%s\" set.\n", engine);
|
||||
/* Free our "structural" reference. */
|
||||
ENGINE_free(e);
|
||||
}
|
||||
e = setup_engine(bio_err, engine, 0);
|
||||
|
||||
in=BIO_new(BIO_s_file());
|
||||
out=BIO_new(BIO_s_file());
|
||||
@@ -225,7 +209,7 @@ bad:
|
||||
if (outfile == NULL)
|
||||
{
|
||||
BIO_set_fp(out,stdout,BIO_NOCLOSE);
|
||||
#ifdef VMS
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
{
|
||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||
out = BIO_push(tmpbio, out);
|
||||
@@ -316,5 +300,6 @@ end:
|
||||
if (p7 != NULL) PKCS7_free(p7);
|
||||
if (in != NULL) BIO_free(in);
|
||||
if (out != NULL) BIO_free_all(out);
|
||||
apps_shutdown();
|
||||
EXIT(ret);
|
||||
}
|
||||
|
||||
45
apps/pkcs8.c
45
apps/pkcs8.c
@@ -62,7 +62,6 @@
|
||||
#include <openssl/err.h>
|
||||
#include <openssl/evp.h>
|
||||
#include <openssl/pkcs12.h>
|
||||
#include <openssl/engine.h>
|
||||
|
||||
#include "apps.h"
|
||||
#define PROG pkcs8_main
|
||||
@@ -84,13 +83,16 @@ int MAIN(int argc, char **argv)
|
||||
int nocrypt = 0;
|
||||
X509_SIG *p8;
|
||||
PKCS8_PRIV_KEY_INFO *p8inf;
|
||||
EVP_PKEY *pkey;
|
||||
EVP_PKEY *pkey=NULL;
|
||||
char pass[50], *passin = NULL, *passout = NULL, *p8pass = NULL;
|
||||
int badarg = 0;
|
||||
char *engine=NULL;
|
||||
|
||||
if (bio_err == NULL) bio_err = BIO_new_fp (stderr, BIO_NOCLOSE);
|
||||
|
||||
if (!load_config(bio_err, NULL))
|
||||
goto end;
|
||||
|
||||
informat=FORMAT_PEM;
|
||||
outformat=FORMAT_PEM;
|
||||
|
||||
@@ -185,23 +187,7 @@ int MAIN(int argc, char **argv)
|
||||
return (1);
|
||||
}
|
||||
|
||||
if (engine != NULL)
|
||||
{
|
||||
if((e = ENGINE_by_id(engine)) == NULL)
|
||||
{
|
||||
BIO_printf(bio_err,"invalid engine \"%s\"\n",
|
||||
engine);
|
||||
return (1);
|
||||
}
|
||||
if(!ENGINE_set_default(e, ENGINE_METHOD_ALL))
|
||||
{
|
||||
BIO_printf(bio_err,"can't use that engine\n");
|
||||
return (1);
|
||||
}
|
||||
BIO_printf(bio_err,"engine \"%s\" set.\n", engine);
|
||||
/* Free our "structural" reference. */
|
||||
ENGINE_free(e);
|
||||
}
|
||||
e = setup_engine(bio_err, engine, 0);
|
||||
|
||||
if(!app_passwd(bio_err, passargin, passargout, &passin, &passout)) {
|
||||
BIO_printf(bio_err, "Error getting passwords\n");
|
||||
@@ -226,28 +212,20 @@ int MAIN(int argc, char **argv)
|
||||
}
|
||||
} else {
|
||||
out = BIO_new_fp (stdout, BIO_NOCLOSE);
|
||||
#ifdef VMS
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
{
|
||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||
out = BIO_push(tmpbio, out);
|
||||
}
|
||||
#endif
|
||||
}
|
||||
if (topk8) {
|
||||
if(informat == FORMAT_PEM)
|
||||
pkey = PEM_read_bio_PrivateKey(in, NULL, NULL, passin);
|
||||
else if(informat == FORMAT_ASN1)
|
||||
pkey = d2i_PrivateKey_bio(in, NULL);
|
||||
else {
|
||||
BIO_printf(bio_err, "Bad format specified for key\n");
|
||||
return (1);
|
||||
}
|
||||
if (topk8)
|
||||
{
|
||||
BIO_free(in); /* Not needed in this section */
|
||||
pkey = load_key(bio_err, infile, informat, passin, e, "key");
|
||||
if (!pkey) {
|
||||
BIO_printf(bio_err, "Error reading key\n", outfile);
|
||||
ERR_print_errors(bio_err);
|
||||
return (1);
|
||||
}
|
||||
BIO_free(in);
|
||||
if (!(p8inf = EVP_PKEY2PKCS8_broken(pkey, p8_broken))) {
|
||||
BIO_printf(bio_err, "Error converting key\n", outfile);
|
||||
ERR_print_errors(bio_err);
|
||||
@@ -325,7 +303,7 @@ int MAIN(int argc, char **argv)
|
||||
p8pass = pass;
|
||||
EVP_read_pw_string(pass, 50, "Enter Password:", 0);
|
||||
}
|
||||
p8inf = M_PKCS8_decrypt(p8, p8pass, strlen(p8pass));
|
||||
p8inf = PKCS8_decrypt(p8, p8pass, strlen(p8pass));
|
||||
X509_SIG_free(p8);
|
||||
}
|
||||
|
||||
@@ -372,6 +350,7 @@ int MAIN(int argc, char **argv)
|
||||
return (1);
|
||||
}
|
||||
|
||||
end:
|
||||
EVP_PKEY_free(pkey);
|
||||
BIO_free_all(out);
|
||||
BIO_free(in);
|
||||
|
||||
160
apps/progs.h
160
apps/progs.h
@@ -17,6 +17,8 @@ extern int rsa_main(int argc,char *argv[]);
|
||||
extern int rsautl_main(int argc,char *argv[]);
|
||||
extern int dsa_main(int argc,char *argv[]);
|
||||
extern int dsaparam_main(int argc,char *argv[]);
|
||||
extern int ecdsa_main(int argc,char *argv[]);
|
||||
extern int ecdsaparam_main(int argc,char *argv[]);
|
||||
extern int x509_main(int argc,char *argv[]);
|
||||
extern int genrsa_main(int argc,char *argv[]);
|
||||
extern int gendsa_main(int argc,char *argv[]);
|
||||
@@ -36,6 +38,7 @@ extern int spkac_main(int argc,char *argv[]);
|
||||
extern int smime_main(int argc,char *argv[]);
|
||||
extern int rand_main(int argc,char *argv[]);
|
||||
extern int engine_main(int argc,char *argv[]);
|
||||
extern int ocsp_main(int argc,char *argv[]);
|
||||
|
||||
#define FUNC_TYPE_GENERAL 1
|
||||
#define FUNC_TYPE_MD 2
|
||||
@@ -52,58 +55,64 @@ FUNCTION functions[] = {
|
||||
{FUNC_TYPE_GENERAL,"asn1parse",asn1parse_main},
|
||||
{FUNC_TYPE_GENERAL,"req",req_main},
|
||||
{FUNC_TYPE_GENERAL,"dgst",dgst_main},
|
||||
#ifndef NO_DH
|
||||
#ifndef OPENSSL_NO_DH
|
||||
{FUNC_TYPE_GENERAL,"dh",dh_main},
|
||||
#endif
|
||||
#ifndef NO_DH
|
||||
#ifndef OPENSSL_NO_DH
|
||||
{FUNC_TYPE_GENERAL,"dhparam",dhparam_main},
|
||||
#endif
|
||||
{FUNC_TYPE_GENERAL,"enc",enc_main},
|
||||
{FUNC_TYPE_GENERAL,"passwd",passwd_main},
|
||||
#ifndef NO_DH
|
||||
#ifndef OPENSSL_NO_DH
|
||||
{FUNC_TYPE_GENERAL,"gendh",gendh_main},
|
||||
#endif
|
||||
{FUNC_TYPE_GENERAL,"errstr",errstr_main},
|
||||
{FUNC_TYPE_GENERAL,"ca",ca_main},
|
||||
{FUNC_TYPE_GENERAL,"crl",crl_main},
|
||||
#ifndef NO_RSA
|
||||
#ifndef OPENSSL_NO_RSA
|
||||
{FUNC_TYPE_GENERAL,"rsa",rsa_main},
|
||||
#endif
|
||||
#ifndef NO_RSA
|
||||
#ifndef OPENSSL_NO_RSA
|
||||
{FUNC_TYPE_GENERAL,"rsautl",rsautl_main},
|
||||
#endif
|
||||
#ifndef NO_DSA
|
||||
#ifndef OPENSSL_NO_DSA
|
||||
{FUNC_TYPE_GENERAL,"dsa",dsa_main},
|
||||
#endif
|
||||
#ifndef NO_DSA
|
||||
#ifndef OPENSSL_NO_DSA
|
||||
{FUNC_TYPE_GENERAL,"dsaparam",dsaparam_main},
|
||||
#endif
|
||||
#ifndef OPENSSL_NO_ECDSA
|
||||
{FUNC_TYPE_GENERAL,"ecdsa",ecdsa_main},
|
||||
#endif
|
||||
#ifndef OPENSSL_NO_ECDSA
|
||||
{FUNC_TYPE_GENERAL,"ecdsaparam",ecdsaparam_main},
|
||||
#endif
|
||||
{FUNC_TYPE_GENERAL,"x509",x509_main},
|
||||
#ifndef NO_RSA
|
||||
#ifndef OPENSSL_NO_RSA
|
||||
{FUNC_TYPE_GENERAL,"genrsa",genrsa_main},
|
||||
#endif
|
||||
#ifndef NO_DSA
|
||||
#ifndef OPENSSL_NO_DSA
|
||||
{FUNC_TYPE_GENERAL,"gendsa",gendsa_main},
|
||||
#endif
|
||||
#if !defined(NO_SOCK) && !(defined(NO_SSL2) && defined(NO_SSL3))
|
||||
#if !defined(OPENSSL_NO_SOCK) && !(defined(OPENSSL_NO_SSL2) && defined(OPENSSL_NO_SSL3))
|
||||
{FUNC_TYPE_GENERAL,"s_server",s_server_main},
|
||||
#endif
|
||||
#if !defined(NO_SOCK) && !(defined(NO_SSL2) && defined(NO_SSL3))
|
||||
#if !defined(OPENSSL_NO_SOCK) && !(defined(OPENSSL_NO_SSL2) && defined(OPENSSL_NO_SSL3))
|
||||
{FUNC_TYPE_GENERAL,"s_client",s_client_main},
|
||||
#endif
|
||||
{FUNC_TYPE_GENERAL,"speed",speed_main},
|
||||
#if !defined(NO_SOCK) && !(defined(NO_SSL2) && defined(NO_SSL3))
|
||||
#if !defined(OPENSSL_NO_SOCK) && !(defined(OPENSSL_NO_SSL2) && defined(OPENSSL_NO_SSL3))
|
||||
{FUNC_TYPE_GENERAL,"s_time",s_time_main},
|
||||
#endif
|
||||
{FUNC_TYPE_GENERAL,"version",version_main},
|
||||
{FUNC_TYPE_GENERAL,"pkcs7",pkcs7_main},
|
||||
{FUNC_TYPE_GENERAL,"crl2pkcs7",crl2pkcs7_main},
|
||||
{FUNC_TYPE_GENERAL,"sess_id",sess_id_main},
|
||||
#if !defined(NO_SOCK) && !(defined(NO_SSL2) && defined(NO_SSL3))
|
||||
#if !defined(OPENSSL_NO_SOCK) && !(defined(OPENSSL_NO_SSL2) && defined(OPENSSL_NO_SSL3))
|
||||
{FUNC_TYPE_GENERAL,"ciphers",ciphers_main},
|
||||
#endif
|
||||
{FUNC_TYPE_GENERAL,"nseq",nseq_main},
|
||||
#if !defined(NO_DES) && !defined(NO_SHA1)
|
||||
#if !defined(OPENSSL_NO_DES) && !defined(OPENSSL_NO_SHA1)
|
||||
{FUNC_TYPE_GENERAL,"pkcs12",pkcs12_main},
|
||||
#endif
|
||||
{FUNC_TYPE_GENERAL,"pkcs8",pkcs8_main},
|
||||
@@ -111,147 +120,180 @@ FUNCTION functions[] = {
|
||||
{FUNC_TYPE_GENERAL,"smime",smime_main},
|
||||
{FUNC_TYPE_GENERAL,"rand",rand_main},
|
||||
{FUNC_TYPE_GENERAL,"engine",engine_main},
|
||||
{FUNC_TYPE_GENERAL,"ocsp",ocsp_main},
|
||||
#ifndef OPENSSL_NO_MD2
|
||||
{FUNC_TYPE_MD,"md2",dgst_main},
|
||||
#endif
|
||||
#ifndef OPENSSL_NO_MD4
|
||||
{FUNC_TYPE_MD,"md4",dgst_main},
|
||||
#endif
|
||||
#ifndef OPENSSL_NO_MD5
|
||||
{FUNC_TYPE_MD,"md5",dgst_main},
|
||||
#endif
|
||||
#ifndef OPENSSL_NO_SHA
|
||||
{FUNC_TYPE_MD,"sha",dgst_main},
|
||||
#endif
|
||||
#ifndef OPENSSL_NO_SHA1
|
||||
{FUNC_TYPE_MD,"sha1",dgst_main},
|
||||
#endif
|
||||
#ifndef OPENSSL_NO_MDC2
|
||||
{FUNC_TYPE_MD,"mdc2",dgst_main},
|
||||
#endif
|
||||
#ifndef OPENSSL_NO_RMD160
|
||||
{FUNC_TYPE_MD,"rmd160",dgst_main},
|
||||
#endif
|
||||
#ifndef OPENSSL_NO_AES
|
||||
{FUNC_TYPE_CIPHER,"aes-128-cbc",enc_main},
|
||||
#endif
|
||||
#ifndef OPENSSL_NO_AES
|
||||
{FUNC_TYPE_CIPHER,"aes-128-ecb",enc_main},
|
||||
#endif
|
||||
#ifndef OPENSSL_NO_AES
|
||||
{FUNC_TYPE_CIPHER,"aes-192-cbc",enc_main},
|
||||
#endif
|
||||
#ifndef OPENSSL_NO_AES
|
||||
{FUNC_TYPE_CIPHER,"aes-192-ecb",enc_main},
|
||||
#endif
|
||||
#ifndef OPENSSL_NO_AES
|
||||
{FUNC_TYPE_CIPHER,"aes-256-cbc",enc_main},
|
||||
#endif
|
||||
#ifndef OPENSSL_NO_AES
|
||||
{FUNC_TYPE_CIPHER,"aes-256-ecb",enc_main},
|
||||
#endif
|
||||
{FUNC_TYPE_CIPHER,"base64",enc_main},
|
||||
#ifndef NO_DES
|
||||
#ifndef OPENSSL_NO_DES
|
||||
{FUNC_TYPE_CIPHER,"des",enc_main},
|
||||
#endif
|
||||
#ifndef NO_DES
|
||||
#ifndef OPENSSL_NO_DES
|
||||
{FUNC_TYPE_CIPHER,"des3",enc_main},
|
||||
#endif
|
||||
#ifndef NO_DES
|
||||
#ifndef OPENSSL_NO_DES
|
||||
{FUNC_TYPE_CIPHER,"desx",enc_main},
|
||||
#endif
|
||||
#ifndef NO_IDEA
|
||||
#ifndef OPENSSL_NO_IDEA
|
||||
{FUNC_TYPE_CIPHER,"idea",enc_main},
|
||||
#endif
|
||||
#ifndef NO_RC4
|
||||
#ifndef OPENSSL_NO_RC4
|
||||
{FUNC_TYPE_CIPHER,"rc4",enc_main},
|
||||
#endif
|
||||
#ifndef NO_RC4
|
||||
#ifndef OPENSSL_NO_RC4
|
||||
{FUNC_TYPE_CIPHER,"rc4-40",enc_main},
|
||||
#endif
|
||||
#ifndef NO_RC2
|
||||
#ifndef OPENSSL_NO_RC2
|
||||
{FUNC_TYPE_CIPHER,"rc2",enc_main},
|
||||
#endif
|
||||
#ifndef NO_BF
|
||||
#ifndef OPENSSL_NO_BF
|
||||
{FUNC_TYPE_CIPHER,"bf",enc_main},
|
||||
#endif
|
||||
#ifndef NO_CAST
|
||||
#ifndef OPENSSL_NO_CAST
|
||||
{FUNC_TYPE_CIPHER,"cast",enc_main},
|
||||
#endif
|
||||
#ifndef NO_RC5
|
||||
#ifndef OPENSSL_NO_RC5
|
||||
{FUNC_TYPE_CIPHER,"rc5",enc_main},
|
||||
#endif
|
||||
#ifndef NO_DES
|
||||
#ifndef OPENSSL_NO_DES
|
||||
{FUNC_TYPE_CIPHER,"des-ecb",enc_main},
|
||||
#endif
|
||||
#ifndef NO_DES
|
||||
#ifndef OPENSSL_NO_DES
|
||||
{FUNC_TYPE_CIPHER,"des-ede",enc_main},
|
||||
#endif
|
||||
#ifndef NO_DES
|
||||
#ifndef OPENSSL_NO_DES
|
||||
{FUNC_TYPE_CIPHER,"des-ede3",enc_main},
|
||||
#endif
|
||||
#ifndef NO_DES
|
||||
#ifndef OPENSSL_NO_DES
|
||||
{FUNC_TYPE_CIPHER,"des-cbc",enc_main},
|
||||
#endif
|
||||
#ifndef NO_DES
|
||||
#ifndef OPENSSL_NO_DES
|
||||
{FUNC_TYPE_CIPHER,"des-ede-cbc",enc_main},
|
||||
#endif
|
||||
#ifndef NO_DES
|
||||
#ifndef OPENSSL_NO_DES
|
||||
{FUNC_TYPE_CIPHER,"des-ede3-cbc",enc_main},
|
||||
#endif
|
||||
#ifndef NO_DES
|
||||
#ifndef OPENSSL_NO_DES
|
||||
{FUNC_TYPE_CIPHER,"des-cfb",enc_main},
|
||||
#endif
|
||||
#ifndef NO_DES
|
||||
#ifndef OPENSSL_NO_DES
|
||||
{FUNC_TYPE_CIPHER,"des-ede-cfb",enc_main},
|
||||
#endif
|
||||
#ifndef NO_DES
|
||||
#ifndef OPENSSL_NO_DES
|
||||
{FUNC_TYPE_CIPHER,"des-ede3-cfb",enc_main},
|
||||
#endif
|
||||
#ifndef NO_DES
|
||||
#ifndef OPENSSL_NO_DES
|
||||
{FUNC_TYPE_CIPHER,"des-ofb",enc_main},
|
||||
#endif
|
||||
#ifndef NO_DES
|
||||
#ifndef OPENSSL_NO_DES
|
||||
{FUNC_TYPE_CIPHER,"des-ede-ofb",enc_main},
|
||||
#endif
|
||||
#ifndef NO_DES
|
||||
#ifndef OPENSSL_NO_DES
|
||||
{FUNC_TYPE_CIPHER,"des-ede3-ofb",enc_main},
|
||||
#endif
|
||||
#ifndef NO_IDEA
|
||||
#ifndef OPENSSL_NO_IDEA
|
||||
{FUNC_TYPE_CIPHER,"idea-cbc",enc_main},
|
||||
#endif
|
||||
#ifndef NO_IDEA
|
||||
#ifndef OPENSSL_NO_IDEA
|
||||
{FUNC_TYPE_CIPHER,"idea-ecb",enc_main},
|
||||
#endif
|
||||
#ifndef NO_IDEA
|
||||
#ifndef OPENSSL_NO_IDEA
|
||||
{FUNC_TYPE_CIPHER,"idea-cfb",enc_main},
|
||||
#endif
|
||||
#ifndef NO_IDEA
|
||||
#ifndef OPENSSL_NO_IDEA
|
||||
{FUNC_TYPE_CIPHER,"idea-ofb",enc_main},
|
||||
#endif
|
||||
#ifndef NO_RC2
|
||||
#ifndef OPENSSL_NO_RC2
|
||||
{FUNC_TYPE_CIPHER,"rc2-cbc",enc_main},
|
||||
#endif
|
||||
#ifndef NO_RC2
|
||||
#ifndef OPENSSL_NO_RC2
|
||||
{FUNC_TYPE_CIPHER,"rc2-ecb",enc_main},
|
||||
#endif
|
||||
#ifndef NO_RC2
|
||||
#ifndef OPENSSL_NO_RC2
|
||||
{FUNC_TYPE_CIPHER,"rc2-cfb",enc_main},
|
||||
#endif
|
||||
#ifndef NO_RC2
|
||||
#ifndef OPENSSL_NO_RC2
|
||||
{FUNC_TYPE_CIPHER,"rc2-ofb",enc_main},
|
||||
#endif
|
||||
#ifndef NO_RC2
|
||||
#ifndef OPENSSL_NO_RC2
|
||||
{FUNC_TYPE_CIPHER,"rc2-64-cbc",enc_main},
|
||||
#endif
|
||||
#ifndef NO_RC2
|
||||
#ifndef OPENSSL_NO_RC2
|
||||
{FUNC_TYPE_CIPHER,"rc2-40-cbc",enc_main},
|
||||
#endif
|
||||
#ifndef NO_BF
|
||||
#ifndef OPENSSL_NO_BF
|
||||
{FUNC_TYPE_CIPHER,"bf-cbc",enc_main},
|
||||
#endif
|
||||
#ifndef NO_BF
|
||||
#ifndef OPENSSL_NO_BF
|
||||
{FUNC_TYPE_CIPHER,"bf-ecb",enc_main},
|
||||
#endif
|
||||
#ifndef NO_BF
|
||||
#ifndef OPENSSL_NO_BF
|
||||
{FUNC_TYPE_CIPHER,"bf-cfb",enc_main},
|
||||
#endif
|
||||
#ifndef NO_BF
|
||||
#ifndef OPENSSL_NO_BF
|
||||
{FUNC_TYPE_CIPHER,"bf-ofb",enc_main},
|
||||
#endif
|
||||
#ifndef NO_CAST
|
||||
#ifndef OPENSSL_NO_CAST
|
||||
{FUNC_TYPE_CIPHER,"cast5-cbc",enc_main},
|
||||
#endif
|
||||
#ifndef NO_CAST
|
||||
#ifndef OPENSSL_NO_CAST
|
||||
{FUNC_TYPE_CIPHER,"cast5-ecb",enc_main},
|
||||
#endif
|
||||
#ifndef NO_CAST
|
||||
#ifndef OPENSSL_NO_CAST
|
||||
{FUNC_TYPE_CIPHER,"cast5-cfb",enc_main},
|
||||
#endif
|
||||
#ifndef NO_CAST
|
||||
#ifndef OPENSSL_NO_CAST
|
||||
{FUNC_TYPE_CIPHER,"cast5-ofb",enc_main},
|
||||
#endif
|
||||
#ifndef NO_CAST
|
||||
#ifndef OPENSSL_NO_CAST
|
||||
{FUNC_TYPE_CIPHER,"cast-cbc",enc_main},
|
||||
#endif
|
||||
#ifndef NO_RC5
|
||||
#ifndef OPENSSL_NO_RC5
|
||||
{FUNC_TYPE_CIPHER,"rc5-cbc",enc_main},
|
||||
#endif
|
||||
#ifndef NO_RC5
|
||||
#ifndef OPENSSL_NO_RC5
|
||||
{FUNC_TYPE_CIPHER,"rc5-ecb",enc_main},
|
||||
#endif
|
||||
#ifndef NO_RC5
|
||||
#ifndef OPENSSL_NO_RC5
|
||||
{FUNC_TYPE_CIPHER,"rc5-cfb",enc_main},
|
||||
#endif
|
||||
#ifndef NO_RC5
|
||||
#ifndef OPENSSL_NO_RC5
|
||||
{FUNC_TYPE_CIPHER,"rc5-ofb",enc_main},
|
||||
#endif
|
||||
{0,NULL,NULL}
|
||||
|
||||
@@ -28,15 +28,17 @@ foreach (@ARGV)
|
||||
push(@files,$_);
|
||||
$str="\t{FUNC_TYPE_GENERAL,\"$_\",${_}_main},\n";
|
||||
if (($_ =~ /^s_/) || ($_ =~ /^ciphers$/))
|
||||
{ print "#if !defined(NO_SOCK) && !(defined(NO_SSL2) && defined(NO_SSL3))\n${str}#endif\n"; }
|
||||
{ print "#if !defined(OPENSSL_NO_SOCK) && !(defined(OPENSSL_NO_SSL2) && defined(OPENSSL_NO_SSL3))\n${str}#endif\n"; }
|
||||
elsif ( ($_ =~ /^rsa$/) || ($_ =~ /^genrsa$/) || ($_ =~ /^rsautl$/))
|
||||
{ print "#ifndef NO_RSA\n${str}#endif\n"; }
|
||||
{ print "#ifndef OPENSSL_NO_RSA\n${str}#endif\n"; }
|
||||
elsif ( ($_ =~ /^dsa$/) || ($_ =~ /^gendsa$/) || ($_ =~ /^dsaparam$/))
|
||||
{ print "#ifndef NO_DSA\n${str}#endif\n"; }
|
||||
{ print "#ifndef OPENSSL_NO_DSA\n${str}#endif\n"; }
|
||||
elsif ( ($_ =~ /^ecdsa$/) || ($_ =~ /^ecdsaparam$/))
|
||||
{ print "#ifndef OPENSSL_NO_ECDSA\n${str}#endif\n";}
|
||||
elsif ( ($_ =~ /^dh$/) || ($_ =~ /^gendh$/) || ($_ =~ /^dhparam$/))
|
||||
{ print "#ifndef NO_DH\n${str}#endif\n"; }
|
||||
{ print "#ifndef OPENSSL_NO_DH\n${str}#endif\n"; }
|
||||
elsif ( ($_ =~ /^pkcs12$/))
|
||||
{ print "#if !defined(NO_DES) && !defined(NO_SHA1)\n${str}#endif\n"; }
|
||||
{ print "#if !defined(OPENSSL_NO_DES) && !defined(OPENSSL_NO_SHA1)\n${str}#endif\n"; }
|
||||
else
|
||||
{ print $str; }
|
||||
}
|
||||
@@ -44,10 +46,13 @@ foreach (@ARGV)
|
||||
foreach ("md2","md4","md5","sha","sha1","mdc2","rmd160")
|
||||
{
|
||||
push(@files,$_);
|
||||
printf "\t{FUNC_TYPE_MD,\"%s\",dgst_main},\n",$_;
|
||||
printf "#ifndef OPENSSL_NO_".uc($_)."\n\t{FUNC_TYPE_MD,\"".$_."\",dgst_main},\n#endif\n";
|
||||
}
|
||||
|
||||
foreach (
|
||||
"aes-128-cbc", "aes-128-ecb",
|
||||
"aes-192-cbc", "aes-192-ecb",
|
||||
"aes-256-cbc", "aes-256-ecb",
|
||||
"base64",
|
||||
"des", "des3", "desx", "idea", "rc4", "rc4-40",
|
||||
"rc2", "bf", "cast", "rc5",
|
||||
@@ -64,13 +69,14 @@ foreach (
|
||||
push(@files,$_);
|
||||
|
||||
$t=sprintf("\t{FUNC_TYPE_CIPHER,\"%s\",enc_main},\n",$_);
|
||||
if ($_ =~ /des/) { $t="#ifndef NO_DES\n${t}#endif\n"; }
|
||||
elsif ($_ =~ /idea/) { $t="#ifndef NO_IDEA\n${t}#endif\n"; }
|
||||
elsif ($_ =~ /rc4/) { $t="#ifndef NO_RC4\n${t}#endif\n"; }
|
||||
elsif ($_ =~ /rc2/) { $t="#ifndef NO_RC2\n${t}#endif\n"; }
|
||||
elsif ($_ =~ /bf/) { $t="#ifndef NO_BF\n${t}#endif\n"; }
|
||||
elsif ($_ =~ /cast/) { $t="#ifndef NO_CAST\n${t}#endif\n"; }
|
||||
elsif ($_ =~ /rc5/) { $t="#ifndef NO_RC5\n${t}#endif\n"; }
|
||||
if ($_ =~ /des/) { $t="#ifndef OPENSSL_NO_DES\n${t}#endif\n"; }
|
||||
elsif ($_ =~ /aes/) { $t="#ifndef OPENSSL_NO_AES\n${t}#endif\n"; }
|
||||
elsif ($_ =~ /idea/) { $t="#ifndef OPENSSL_NO_IDEA\n${t}#endif\n"; }
|
||||
elsif ($_ =~ /rc4/) { $t="#ifndef OPENSSL_NO_RC4\n${t}#endif\n"; }
|
||||
elsif ($_ =~ /rc2/) { $t="#ifndef OPENSSL_NO_RC2\n${t}#endif\n"; }
|
||||
elsif ($_ =~ /bf/) { $t="#ifndef OPENSSL_NO_BF\n${t}#endif\n"; }
|
||||
elsif ($_ =~ /cast/) { $t="#ifndef OPENSSL_NO_CAST\n${t}#endif\n"; }
|
||||
elsif ($_ =~ /rc5/) { $t="#ifndef OPENSSL_NO_RC5\n${t}#endif\n"; }
|
||||
print $t;
|
||||
}
|
||||
|
||||
|
||||
82
apps/rand.c
82
apps/rand.c
@@ -1,4 +1,57 @@
|
||||
/* apps/rand.c */
|
||||
/* ====================================================================
|
||||
* Copyright (c) 1998-2001 The OpenSSL Project. All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
*
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
*
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in
|
||||
* the documentation and/or other materials provided with the
|
||||
* distribution.
|
||||
*
|
||||
* 3. All advertising materials mentioning features or use of this
|
||||
* software must display the following acknowledgment:
|
||||
* "This product includes software developed by the OpenSSL Project
|
||||
* for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
|
||||
*
|
||||
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
|
||||
* endorse or promote products derived from this software without
|
||||
* prior written permission. For written permission, please contact
|
||||
* openssl-core@openssl.org.
|
||||
*
|
||||
* 5. Products derived from this software may not be called "OpenSSL"
|
||||
* nor may "OpenSSL" appear in their names without prior written
|
||||
* permission of the OpenSSL Project.
|
||||
*
|
||||
* 6. Redistributions of any form whatsoever must retain the following
|
||||
* acknowledgment:
|
||||
* "This product includes software developed by the OpenSSL Project
|
||||
* for use in the OpenSSL Toolkit (http://www.openssl.org/)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
|
||||
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
|
||||
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||||
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
||||
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
||||
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
||||
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
||||
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
||||
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
* ====================================================================
|
||||
*
|
||||
* This product includes cryptographic software written by Eric Young
|
||||
* (eay@cryptsoft.com). This product includes software written by Tim
|
||||
* Hudson (tjh@cryptsoft.com).
|
||||
*
|
||||
*/
|
||||
|
||||
#include "apps.h"
|
||||
|
||||
@@ -9,7 +62,6 @@
|
||||
#include <openssl/bio.h>
|
||||
#include <openssl/err.h>
|
||||
#include <openssl/rand.h>
|
||||
#include <openssl/engine.h>
|
||||
|
||||
#undef PROG
|
||||
#define PROG rand_main
|
||||
@@ -40,6 +92,9 @@ int MAIN(int argc, char **argv)
|
||||
if ((bio_err = BIO_new(BIO_s_file())) != NULL)
|
||||
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE|BIO_FP_TEXT);
|
||||
|
||||
if (!load_config(bio_err, NULL))
|
||||
goto err;
|
||||
|
||||
badopt = 0;
|
||||
i = 0;
|
||||
while (!badopt && argv[++i] != NULL)
|
||||
@@ -51,7 +106,7 @@ int MAIN(int argc, char **argv)
|
||||
else
|
||||
badopt = 1;
|
||||
}
|
||||
if (strcmp(argv[i], "-engine") == 0)
|
||||
else if (strcmp(argv[i], "-engine") == 0)
|
||||
{
|
||||
if ((argv[i+1] != NULL) && (engine == NULL))
|
||||
engine = argv[++i];
|
||||
@@ -95,29 +150,13 @@ int MAIN(int argc, char **argv)
|
||||
BIO_printf(bio_err, "Usage: rand [options] num\n");
|
||||
BIO_printf(bio_err, "where options are\n");
|
||||
BIO_printf(bio_err, "-out file - write to file\n");
|
||||
BIO_printf(bio_err," -engine e - use engine e, possibly a hardware device.\n");
|
||||
BIO_printf(bio_err, "-engine e - use engine e, possibly a hardware device.\n");
|
||||
BIO_printf(bio_err, "-rand file%cfile%c... - seed PRNG from files\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
|
||||
BIO_printf(bio_err, "-base64 - encode output\n");
|
||||
goto err;
|
||||
}
|
||||
|
||||
if (engine != NULL)
|
||||
{
|
||||
if((e = ENGINE_by_id(engine)) == NULL)
|
||||
{
|
||||
BIO_printf(bio_err,"invalid engine \"%s\"\n",
|
||||
engine);
|
||||
goto err;
|
||||
}
|
||||
if(!ENGINE_set_default(e, ENGINE_METHOD_ALL))
|
||||
{
|
||||
BIO_printf(bio_err,"can't use that engine\n");
|
||||
goto err;
|
||||
}
|
||||
BIO_printf(bio_err,"engine \"%s\" set.\n", engine);
|
||||
/* Free our "structural" reference. */
|
||||
ENGINE_free(e);
|
||||
}
|
||||
e = setup_engine(bio_err, engine, 0);
|
||||
|
||||
app_RAND_load_file(NULL, bio_err, (inrand != NULL));
|
||||
if (inrand != NULL)
|
||||
@@ -132,7 +171,7 @@ int MAIN(int argc, char **argv)
|
||||
else
|
||||
{
|
||||
r = BIO_set_fp(out, stdout, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||
#ifdef VMS
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
{
|
||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||
out = BIO_push(tmpbio, out);
|
||||
@@ -173,5 +212,6 @@ err:
|
||||
ERR_print_errors(bio_err);
|
||||
if (out)
|
||||
BIO_free_all(out);
|
||||
apps_shutdown();
|
||||
EXIT(ret);
|
||||
}
|
||||
|
||||
669
apps/req.c
669
apps/req.c
File diff suppressed because it is too large
Load Diff
115
apps/rsa.c
115
apps/rsa.c
@@ -56,7 +56,7 @@
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
#ifndef NO_RSA
|
||||
#ifndef OPENSSL_NO_RSA
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
@@ -68,7 +68,6 @@
|
||||
#include <openssl/evp.h>
|
||||
#include <openssl/x509.h>
|
||||
#include <openssl/pem.h>
|
||||
#include <openssl/engine.h>
|
||||
|
||||
#undef PROG
|
||||
#define PROG rsa_main
|
||||
@@ -80,6 +79,9 @@
|
||||
* -des - encrypt output if PEM format with DES in cbc mode
|
||||
* -des3 - encrypt output if PEM format
|
||||
* -idea - encrypt output if PEM format
|
||||
* -aes128 - encrypt output if PEM format
|
||||
* -aes192 - encrypt output if PEM format
|
||||
* -aes256 - encrypt output if PEM format
|
||||
* -text - print a text version
|
||||
* -modulus - print the RSA key modulus
|
||||
* -check - verify key consistency
|
||||
@@ -96,7 +98,7 @@ int MAIN(int argc, char **argv)
|
||||
RSA *rsa=NULL;
|
||||
int i,badops=0, sgckey=0;
|
||||
const EVP_CIPHER *enc=NULL;
|
||||
BIO *in=NULL,*out=NULL;
|
||||
BIO *out=NULL;
|
||||
int informat,outformat,text=0,check=0,noout=0;
|
||||
int pubin = 0, pubout = 0;
|
||||
char *infile,*outfile,*prog;
|
||||
@@ -111,6 +113,9 @@ int MAIN(int argc, char **argv)
|
||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
||||
|
||||
if (!load_config(bio_err, NULL))
|
||||
goto end;
|
||||
|
||||
infile=NULL;
|
||||
outfile=NULL;
|
||||
informat=FORMAT_PEM;
|
||||
@@ -194,8 +199,12 @@ bad:
|
||||
BIO_printf(bio_err," -passout arg output file pass phrase source\n");
|
||||
BIO_printf(bio_err," -des encrypt PEM output with cbc des\n");
|
||||
BIO_printf(bio_err," -des3 encrypt PEM output with ede cbc des using 168 bit key\n");
|
||||
#ifndef NO_IDEA
|
||||
#ifndef OPENSSL_NO_IDEA
|
||||
BIO_printf(bio_err," -idea encrypt PEM output with cbc idea\n");
|
||||
#endif
|
||||
#ifndef OPENSSL_NO_AES
|
||||
BIO_printf(bio_err," -aes128, -aes192, -aes256\n");
|
||||
BIO_printf(bio_err," encrypt PEM output with cbc aes\n");
|
||||
#endif
|
||||
BIO_printf(bio_err," -text print the key in text\n");
|
||||
BIO_printf(bio_err," -noout don't print key out\n");
|
||||
@@ -209,23 +218,7 @@ bad:
|
||||
|
||||
ERR_load_crypto_strings();
|
||||
|
||||
if (engine != NULL)
|
||||
{
|
||||
if((e = ENGINE_by_id(engine)) == NULL)
|
||||
{
|
||||
BIO_printf(bio_err,"invalid engine \"%s\"\n",
|
||||
engine);
|
||||
goto end;
|
||||
}
|
||||
if(!ENGINE_set_default(e, ENGINE_METHOD_ALL))
|
||||
{
|
||||
BIO_printf(bio_err,"can't use that engine\n");
|
||||
goto end;
|
||||
}
|
||||
BIO_printf(bio_err,"engine \"%s\" set.\n", engine);
|
||||
/* Free our "structural" reference. */
|
||||
ENGINE_free(e);
|
||||
}
|
||||
e = setup_engine(bio_err, engine, 0);
|
||||
|
||||
if(!app_passwd(bio_err, passargin, passargout, &passin, &passout)) {
|
||||
BIO_printf(bio_err, "Error getting passwords\n");
|
||||
@@ -237,69 +230,29 @@ bad:
|
||||
goto end;
|
||||
}
|
||||
|
||||
in=BIO_new(BIO_s_file());
|
||||
out=BIO_new(BIO_s_file());
|
||||
if ((in == NULL) || (out == NULL))
|
||||
{
|
||||
ERR_print_errors(bio_err);
|
||||
goto end;
|
||||
}
|
||||
|
||||
if (infile == NULL)
|
||||
BIO_set_fp(in,stdin,BIO_NOCLOSE);
|
||||
else
|
||||
{
|
||||
if (BIO_read_filename(in,infile) <= 0)
|
||||
{
|
||||
perror(infile);
|
||||
goto end;
|
||||
}
|
||||
}
|
||||
{
|
||||
EVP_PKEY *pkey;
|
||||
|
||||
BIO_printf(bio_err,"read RSA key\n");
|
||||
if (informat == FORMAT_ASN1) {
|
||||
if (pubin) rsa=d2i_RSA_PUBKEY_bio(in,NULL);
|
||||
else rsa=d2i_RSAPrivateKey_bio(in,NULL);
|
||||
if (pubin)
|
||||
pkey = load_pubkey(bio_err, infile,
|
||||
(informat == FORMAT_NETSCAPE && sgckey ?
|
||||
FORMAT_IISSGC : informat),
|
||||
passin, e, "Public Key");
|
||||
else
|
||||
pkey = load_key(bio_err, infile,
|
||||
(informat == FORMAT_NETSCAPE && sgckey ?
|
||||
FORMAT_IISSGC : informat),
|
||||
passin, e, "Private Key");
|
||||
|
||||
if (pkey != NULL)
|
||||
rsa = pkey == NULL ? NULL : EVP_PKEY_get1_RSA(pkey);
|
||||
EVP_PKEY_free(pkey);
|
||||
}
|
||||
#ifndef NO_RC4
|
||||
else if (informat == FORMAT_NETSCAPE)
|
||||
{
|
||||
BUF_MEM *buf=NULL;
|
||||
const unsigned char *p;
|
||||
int size=0;
|
||||
|
||||
buf=BUF_MEM_new();
|
||||
for (;;)
|
||||
{
|
||||
if ((buf == NULL) || (!BUF_MEM_grow(buf,size+1024*10)))
|
||||
goto end;
|
||||
i=BIO_read(in,&(buf->data[size]),1024*10);
|
||||
size+=i;
|
||||
if (i == 0) break;
|
||||
if (i < 0)
|
||||
{
|
||||
perror("reading private key");
|
||||
BUF_MEM_free(buf);
|
||||
goto end;
|
||||
}
|
||||
}
|
||||
p=(unsigned char *)buf->data;
|
||||
rsa=d2i_RSA_NET(NULL,&p,(long)size,NULL, sgckey);
|
||||
BUF_MEM_free(buf);
|
||||
}
|
||||
#endif
|
||||
else if (informat == FORMAT_PEM) {
|
||||
if(pubin) rsa=PEM_read_bio_RSA_PUBKEY(in,NULL,NULL,NULL);
|
||||
else rsa=PEM_read_bio_RSAPrivateKey(in,NULL, NULL,passin);
|
||||
}
|
||||
else
|
||||
{
|
||||
BIO_printf(bio_err,"bad input format specified for key\n");
|
||||
goto end;
|
||||
}
|
||||
if (rsa == NULL)
|
||||
{
|
||||
BIO_printf(bio_err,"unable to load key\n");
|
||||
ERR_print_errors(bio_err);
|
||||
goto end;
|
||||
}
|
||||
@@ -307,7 +260,7 @@ bad:
|
||||
if (outfile == NULL)
|
||||
{
|
||||
BIO_set_fp(out,stdout,BIO_NOCLOSE);
|
||||
#ifdef VMS
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
{
|
||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||
out = BIO_push(tmpbio, out);
|
||||
@@ -375,7 +328,7 @@ bad:
|
||||
if(pubout || pubin) i=i2d_RSA_PUBKEY_bio(out,rsa);
|
||||
else i=i2d_RSAPrivateKey_bio(out,rsa);
|
||||
}
|
||||
#ifndef NO_RC4
|
||||
#ifndef OPENSSL_NO_RC4
|
||||
else if (outformat == FORMAT_NETSCAPE)
|
||||
{
|
||||
unsigned char *p,*pp;
|
||||
@@ -411,14 +364,14 @@ bad:
|
||||
else
|
||||
ret=0;
|
||||
end:
|
||||
if(in != NULL) BIO_free(in);
|
||||
if(out != NULL) BIO_free_all(out);
|
||||
if(rsa != NULL) RSA_free(rsa);
|
||||
if(passin) OPENSSL_free(passin);
|
||||
if(passout) OPENSSL_free(passout);
|
||||
apps_shutdown();
|
||||
EXIT(ret);
|
||||
}
|
||||
#else /* !NO_RSA */
|
||||
#else /* !OPENSSL_NO_RSA */
|
||||
|
||||
# if PEDANTIC
|
||||
static void *dummy=&dummy;
|
||||
|
||||
@@ -56,13 +56,12 @@
|
||||
*
|
||||
*/
|
||||
|
||||
#ifndef NO_RSA
|
||||
#ifndef OPENSSL_NO_RSA
|
||||
|
||||
#include "apps.h"
|
||||
#include <string.h>
|
||||
#include <openssl/err.h>
|
||||
#include <openssl/pem.h>
|
||||
#include <openssl/engine.h>
|
||||
|
||||
#define RSA_SIGN 1
|
||||
#define RSA_VERIFY 2
|
||||
@@ -105,6 +104,9 @@ int MAIN(int argc, char **argv)
|
||||
argv++;
|
||||
|
||||
if(!bio_err) bio_err = BIO_new_fp(stderr, BIO_NOCLOSE);
|
||||
|
||||
if (!load_config(bio_err, NULL))
|
||||
goto end;
|
||||
ERR_load_crypto_strings();
|
||||
OpenSSL_add_all_algorithms();
|
||||
pad = RSA_PKCS1_PADDING;
|
||||
@@ -120,6 +122,9 @@ int MAIN(int argc, char **argv)
|
||||
} else if(!strcmp(*argv, "-inkey")) {
|
||||
if (--argc < 1) badarg = 1;
|
||||
keyfile = *(++argv);
|
||||
} else if (strcmp(*argv,"-keyform") == 0) {
|
||||
if (--argc < 1) badarg = 1;
|
||||
keyform=str2fmt(*(++argv));
|
||||
} else if(!strcmp(*argv, "-engine")) {
|
||||
if (--argc < 1) badarg = 1;
|
||||
engine = *(++argv);
|
||||
@@ -157,38 +162,25 @@ int MAIN(int argc, char **argv)
|
||||
goto end;
|
||||
}
|
||||
|
||||
if (engine != NULL)
|
||||
{
|
||||
if((e = ENGINE_by_id(engine)) == NULL)
|
||||
{
|
||||
BIO_printf(bio_err,"invalid engine \"%s\"\n",
|
||||
engine);
|
||||
goto end;
|
||||
}
|
||||
if(!ENGINE_set_default(e, ENGINE_METHOD_ALL))
|
||||
{
|
||||
BIO_printf(bio_err,"can't use that engine\n");
|
||||
goto end;
|
||||
}
|
||||
BIO_printf(bio_err,"engine \"%s\" set.\n", engine);
|
||||
/* Free our "structural" reference. */
|
||||
ENGINE_free(e);
|
||||
}
|
||||
e = setup_engine(bio_err, engine, 0);
|
||||
|
||||
/* FIXME: seed PRNG only if needed */
|
||||
app_RAND_load_file(NULL, bio_err, 0);
|
||||
|
||||
switch(key_type) {
|
||||
case KEY_PRIVKEY:
|
||||
pkey = load_key(bio_err, keyfile, keyform, NULL, e);
|
||||
pkey = load_key(bio_err, keyfile, keyform,
|
||||
NULL, e, "Private Key");
|
||||
break;
|
||||
|
||||
case KEY_PUBKEY:
|
||||
pkey = load_pubkey(bio_err, keyfile, keyform, e);
|
||||
pkey = load_pubkey(bio_err, keyfile, keyform,
|
||||
NULL, e, "Public Key");
|
||||
break;
|
||||
|
||||
case KEY_CERT:
|
||||
x = load_cert(bio_err, keyfile, keyform);
|
||||
x = load_cert(bio_err, keyfile, keyform,
|
||||
NULL, e, "Certificate");
|
||||
if(x) {
|
||||
pkey = X509_get_pubkey(x);
|
||||
X509_free(x);
|
||||
@@ -197,7 +189,6 @@ int MAIN(int argc, char **argv)
|
||||
}
|
||||
|
||||
if(!pkey) {
|
||||
BIO_printf(bio_err, "Error loading key\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
@@ -227,7 +218,7 @@ int MAIN(int argc, char **argv)
|
||||
}
|
||||
} else {
|
||||
out = BIO_new_fp(stdout, BIO_NOCLOSE);
|
||||
#ifdef VMS
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
{
|
||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||
out = BIO_push(tmpbio, out);
|
||||
@@ -302,6 +293,7 @@ static void usage()
|
||||
BIO_printf(bio_err, "-in file input file\n");
|
||||
BIO_printf(bio_err, "-out file output file\n");
|
||||
BIO_printf(bio_err, "-inkey file input key\n");
|
||||
BIO_printf(bio_err, "-keyform arg private key format - default PEM\n");
|
||||
BIO_printf(bio_err, "-pubin input is an RSA public\n");
|
||||
BIO_printf(bio_err, "-certin input is a certificate carrying an RSA public key\n");
|
||||
BIO_printf(bio_err, "-ssl use SSL v2 padding\n");
|
||||
@@ -313,6 +305,8 @@ static void usage()
|
||||
BIO_printf(bio_err, "-encrypt encrypt with public key\n");
|
||||
BIO_printf(bio_err, "-decrypt decrypt with private key\n");
|
||||
BIO_printf(bio_err, "-hexdump hex dump output\n");
|
||||
BIO_printf(bio_err, "-engine e use engine e, possibly a hardware device.\n");
|
||||
|
||||
}
|
||||
|
||||
#endif
|
||||
|
||||
@@ -55,9 +55,64 @@
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
/* ====================================================================
|
||||
* Copyright (c) 1998-2001 The OpenSSL Project. All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
*
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
*
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in
|
||||
* the documentation and/or other materials provided with the
|
||||
* distribution.
|
||||
*
|
||||
* 3. All advertising materials mentioning features or use of this
|
||||
* software must display the following acknowledgment:
|
||||
* "This product includes software developed by the OpenSSL Project
|
||||
* for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
|
||||
*
|
||||
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
|
||||
* endorse or promote products derived from this software without
|
||||
* prior written permission. For written permission, please contact
|
||||
* openssl-core@openssl.org.
|
||||
*
|
||||
* 5. Products derived from this software may not be called "OpenSSL"
|
||||
* nor may "OpenSSL" appear in their names without prior written
|
||||
* permission of the OpenSSL Project.
|
||||
*
|
||||
* 6. Redistributions of any form whatsoever must retain the following
|
||||
* acknowledgment:
|
||||
* "This product includes software developed by the OpenSSL Project
|
||||
* for use in the OpenSSL Toolkit (http://www.openssl.org/)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
|
||||
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
|
||||
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||||
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
||||
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
||||
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
||||
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
||||
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
||||
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
* ====================================================================
|
||||
*
|
||||
* This product includes cryptographic software written by Eric Young
|
||||
* (eay@cryptsoft.com). This product includes software written by Tim
|
||||
* Hudson (tjh@cryptsoft.com).
|
||||
*
|
||||
*/
|
||||
|
||||
#include <sys/types.h>
|
||||
#if (defined(VMS) || defined(__VMS)) && !defined(FD_SET)
|
||||
#include <openssl/opensslconf.h>
|
||||
|
||||
#if defined(OPENSSL_SYS_VMS) && !defined(FD_SET)
|
||||
/* VAX C does not defined fd_set and friends, but it's actually quite simple */
|
||||
/* These definitions are borrowed from SOCKETSHR. /Richard Levitte */
|
||||
#define MAX_NOFILE 32
|
||||
@@ -87,13 +142,9 @@ typedef fd_mask fd_set;
|
||||
int do_server(int port, int *ret, int (*cb) (), char *context);
|
||||
#ifdef HEADER_X509_H
|
||||
int MS_CALLBACK verify_callback(int ok, X509_STORE_CTX *ctx);
|
||||
#else
|
||||
int MS_CALLBACK verify_callback(int ok, char *ctx);
|
||||
#endif
|
||||
#ifdef HEADER_SSL_H
|
||||
int set_cert_stuff(SSL_CTX *ctx, char *cert_file, char *key_file);
|
||||
#else
|
||||
int set_cert_stuff(char *ctx, char *cert_file, char *key_file);
|
||||
#endif
|
||||
int init_client(int *sock, char *server, int port);
|
||||
int should_retry(int i);
|
||||
@@ -104,8 +155,6 @@ long MS_CALLBACK bio_dump_cb(BIO *bio, int cmd, const char *argp,
|
||||
int argi, long argl, long ret);
|
||||
|
||||
#ifdef HEADER_SSL_H
|
||||
void MS_CALLBACK apps_ssl_info_callback(SSL *s, int where, int ret);
|
||||
#else
|
||||
void MS_CALLBACK apps_ssl_info_callback(char *s, int where, int ret);
|
||||
void MS_CALLBACK apps_ssl_info_callback(const SSL *s, int where, int ret);
|
||||
void MS_CALLBACK msg_cb(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg);
|
||||
#endif
|
||||
|
||||
|
||||
321
apps/s_cb.c
321
apps/s_cb.c
@@ -55,6 +55,59 @@
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
/* ====================================================================
|
||||
* Copyright (c) 1998-2001 The OpenSSL Project. All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
*
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
*
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in
|
||||
* the documentation and/or other materials provided with the
|
||||
* distribution.
|
||||
*
|
||||
* 3. All advertising materials mentioning features or use of this
|
||||
* software must display the following acknowledgment:
|
||||
* "This product includes software developed by the OpenSSL Project
|
||||
* for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
|
||||
*
|
||||
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
|
||||
* endorse or promote products derived from this software without
|
||||
* prior written permission. For written permission, please contact
|
||||
* openssl-core@openssl.org.
|
||||
*
|
||||
* 5. Products derived from this software may not be called "OpenSSL"
|
||||
* nor may "OpenSSL" appear in their names without prior written
|
||||
* permission of the OpenSSL Project.
|
||||
*
|
||||
* 6. Redistributions of any form whatsoever must retain the following
|
||||
* acknowledgment:
|
||||
* "This product includes software developed by the OpenSSL Project
|
||||
* for use in the OpenSSL Toolkit (http://www.openssl.org/)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
|
||||
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
|
||||
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||||
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
||||
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
||||
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
||||
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
||||
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
||||
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
* ====================================================================
|
||||
*
|
||||
* This product includes cryptographic software written by Eric Young
|
||||
* (eay@cryptsoft.com). This product includes software written by Tim
|
||||
* Hudson (tjh@cryptsoft.com).
|
||||
*
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
@@ -186,21 +239,23 @@ long MS_CALLBACK bio_dump_cb(BIO *bio, int cmd, const char *argp, int argi,
|
||||
|
||||
if (cmd == (BIO_CB_READ|BIO_CB_RETURN))
|
||||
{
|
||||
BIO_printf(out,"read from %08X [%08lX] (%d bytes => %ld (0x%X))\n",
|
||||
BIO_printf(out,"read from %08X [%08lX] (%d bytes => %ld (0x%X))\n\n",
|
||||
bio,argp,argi,ret,ret);
|
||||
BIO_dump(out,argp,(int)ret);
|
||||
BIO_printf(out,"\n");
|
||||
return(ret);
|
||||
}
|
||||
else if (cmd == (BIO_CB_WRITE|BIO_CB_RETURN))
|
||||
{
|
||||
BIO_printf(out,"write to %08X [%08lX] (%d bytes => %ld (0x%X))\n",
|
||||
BIO_printf(out,"write to %08X [%08lX] (%d bytes => %ld (0x%X))\n\n",
|
||||
bio,argp,argi,ret,ret);
|
||||
BIO_dump(out,argp,(int)ret);
|
||||
BIO_printf(out,"\n");
|
||||
}
|
||||
return(ret);
|
||||
}
|
||||
|
||||
void MS_CALLBACK apps_ssl_info_callback(SSL *s, int where, int ret)
|
||||
void MS_CALLBACK apps_ssl_info_callback(const SSL *s, int where, int ret)
|
||||
{
|
||||
char *str;
|
||||
int w;
|
||||
@@ -213,7 +268,7 @@ void MS_CALLBACK apps_ssl_info_callback(SSL *s, int where, int ret)
|
||||
|
||||
if (where & SSL_CB_LOOP)
|
||||
{
|
||||
BIO_printf(bio_err,"%s:%s\n",str,SSL_state_string_long(s));
|
||||
BIO_printf(bio_err,"%s:%s\n\n",str,SSL_state_string_long(s));
|
||||
}
|
||||
else if (where & SSL_CB_ALERT)
|
||||
{
|
||||
@@ -236,3 +291,261 @@ void MS_CALLBACK apps_ssl_info_callback(SSL *s, int where, int ret)
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
void MS_CALLBACK msg_cb(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg)
|
||||
{
|
||||
BIO *bio = arg;
|
||||
const char *str_write_p, *str_version, *str_content_type = "", *str_details1 = "", *str_details2= "";
|
||||
|
||||
str_write_p = write_p ? ">>>" : "<<<";
|
||||
|
||||
switch (version)
|
||||
{
|
||||
case SSL2_VERSION:
|
||||
str_version = "SSL 2.0";
|
||||
break;
|
||||
case SSL3_VERSION:
|
||||
str_version = "SSL 3.0 ";
|
||||
break;
|
||||
case TLS1_VERSION:
|
||||
str_version = "TLS 1.0 ";
|
||||
break;
|
||||
default:
|
||||
str_version = "???";
|
||||
}
|
||||
|
||||
if (version == SSL2_VERSION)
|
||||
{
|
||||
str_details1 = "???";
|
||||
|
||||
if (len > 0)
|
||||
{
|
||||
switch (((unsigned char*)buf)[0])
|
||||
{
|
||||
case 0:
|
||||
str_details1 = ", ERROR:";
|
||||
str_details2 = " ???";
|
||||
if (len >= 3)
|
||||
{
|
||||
unsigned err = (((unsigned char*)buf)[1]<<8) + ((unsigned char*)buf)[2];
|
||||
|
||||
switch (err)
|
||||
{
|
||||
case 0x0001:
|
||||
str_details2 = " NO-CIPHER-ERROR";
|
||||
break;
|
||||
case 0x0002:
|
||||
str_details2 = " NO-CERTIFICATE-ERROR";
|
||||
break;
|
||||
case 0x0004:
|
||||
str_details2 = " BAD-CERTIFICATE-ERROR";
|
||||
break;
|
||||
case 0x0006:
|
||||
str_details2 = " UNSUPPORTED-CERTIFICATE-TYPE-ERROR";
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
break;
|
||||
case 1:
|
||||
str_details1 = ", CLIENT-HELLO";
|
||||
break;
|
||||
case 2:
|
||||
str_details1 = ", CLIENT-MASTER-KEY";
|
||||
break;
|
||||
case 3:
|
||||
str_details1 = ", CLIENT-FINISHED";
|
||||
break;
|
||||
case 4:
|
||||
str_details1 = ", SERVER-HELLO";
|
||||
break;
|
||||
case 5:
|
||||
str_details1 = ", SERVER-VERIFY";
|
||||
break;
|
||||
case 6:
|
||||
str_details1 = ", SERVER-FINISHED";
|
||||
break;
|
||||
case 7:
|
||||
str_details1 = ", REQUEST-CERTIFICATE";
|
||||
break;
|
||||
case 8:
|
||||
str_details1 = ", CLIENT-CERTIFICATE";
|
||||
break;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
if (version == SSL3_VERSION || version == TLS1_VERSION)
|
||||
{
|
||||
switch (content_type)
|
||||
{
|
||||
case 20:
|
||||
str_content_type = "ChangeCipherSpec";
|
||||
break;
|
||||
case 21:
|
||||
str_content_type = "Alert";
|
||||
break;
|
||||
case 22:
|
||||
str_content_type = "Handshake";
|
||||
break;
|
||||
}
|
||||
|
||||
if (content_type == 21) /* Alert */
|
||||
{
|
||||
str_details1 = ", ???";
|
||||
|
||||
if (len == 2)
|
||||
{
|
||||
switch (((unsigned char*)buf)[0])
|
||||
{
|
||||
case 1:
|
||||
str_details1 = ", warning";
|
||||
break;
|
||||
case 2:
|
||||
str_details1 = ", fatal";
|
||||
break;
|
||||
}
|
||||
|
||||
str_details2 = " ???";
|
||||
switch (((unsigned char*)buf)[1])
|
||||
{
|
||||
case 0:
|
||||
str_details2 = " close_notify";
|
||||
break;
|
||||
case 10:
|
||||
str_details2 = " unexpected_message";
|
||||
break;
|
||||
case 20:
|
||||
str_details2 = " bad_record_mac";
|
||||
break;
|
||||
case 21:
|
||||
str_details2 = " decryption_failed";
|
||||
break;
|
||||
case 22:
|
||||
str_details2 = " record_overflow";
|
||||
break;
|
||||
case 30:
|
||||
str_details2 = " decompression_failure";
|
||||
break;
|
||||
case 40:
|
||||
str_details2 = " handshake_failure";
|
||||
break;
|
||||
case 42:
|
||||
str_details2 = " bad_certificate";
|
||||
break;
|
||||
case 43:
|
||||
str_details2 = " unsupported_certificate";
|
||||
break;
|
||||
case 44:
|
||||
str_details2 = " certificate_revoked";
|
||||
break;
|
||||
case 45:
|
||||
str_details2 = " certificate_expired";
|
||||
break;
|
||||
case 46:
|
||||
str_details2 = " certificate_unknown";
|
||||
break;
|
||||
case 47:
|
||||
str_details2 = " illegal_parameter";
|
||||
break;
|
||||
case 48:
|
||||
str_details2 = " unknown_ca";
|
||||
break;
|
||||
case 49:
|
||||
str_details2 = " access_denied";
|
||||
break;
|
||||
case 50:
|
||||
str_details2 = " decode_error";
|
||||
break;
|
||||
case 51:
|
||||
str_details2 = " decrypt_error";
|
||||
break;
|
||||
case 60:
|
||||
str_details2 = " export_restriction";
|
||||
break;
|
||||
case 70:
|
||||
str_details2 = " protocol_version";
|
||||
break;
|
||||
case 71:
|
||||
str_details2 = " insufficient_security";
|
||||
break;
|
||||
case 80:
|
||||
str_details2 = " internal_error";
|
||||
break;
|
||||
case 90:
|
||||
str_details2 = " user_canceled";
|
||||
break;
|
||||
case 100:
|
||||
str_details2 = " no_renegotiation";
|
||||
break;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
if (content_type == 22) /* Handshake */
|
||||
{
|
||||
str_details1 = "???";
|
||||
|
||||
if (len > 0)
|
||||
{
|
||||
switch (((unsigned char*)buf)[0])
|
||||
{
|
||||
case 0:
|
||||
str_details1 = ", HelloRequest";
|
||||
break;
|
||||
case 1:
|
||||
str_details1 = ", ClientHello";
|
||||
break;
|
||||
case 2:
|
||||
str_details1 = ", ServerHello";
|
||||
break;
|
||||
case 11:
|
||||
str_details1 = ", Certificate";
|
||||
break;
|
||||
case 12:
|
||||
str_details1 = ", ServerKeyExchange";
|
||||
break;
|
||||
case 13:
|
||||
str_details1 = ", CertificateRequest";
|
||||
break;
|
||||
case 14:
|
||||
str_details1 = ", ServerHelloDone";
|
||||
break;
|
||||
case 15:
|
||||
str_details1 = ", CertificateVerify";
|
||||
break;
|
||||
case 16:
|
||||
str_details1 = ", ClientKeyExchange";
|
||||
break;
|
||||
case 20:
|
||||
str_details1 = ", Finished";
|
||||
break;
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
BIO_printf(bio, "%s %s%s [length %04lx]%s%s\n", str_write_p, str_version, str_content_type, (unsigned long)len, str_details1, str_details2);
|
||||
|
||||
if (len > 0)
|
||||
{
|
||||
size_t num, i;
|
||||
|
||||
BIO_printf(bio, " ");
|
||||
num = len;
|
||||
#if 0
|
||||
if (num > 16)
|
||||
num = 16;
|
||||
#endif
|
||||
for (i = 0; i < num; i++)
|
||||
{
|
||||
if (i % 16 == 0 && i > 0)
|
||||
BIO_printf(bio, "\n ");
|
||||
BIO_printf(bio, " %02x", ((unsigned char*)buf)[i]);
|
||||
}
|
||||
if (i < len)
|
||||
BIO_printf(bio, " ...");
|
||||
BIO_printf(bio, "\n");
|
||||
}
|
||||
BIO_flush(bio);
|
||||
}
|
||||
|
||||
248
apps/s_client.c
248
apps/s_client.c
@@ -55,12 +55,66 @@
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
/* ====================================================================
|
||||
* Copyright (c) 1998-2001 The OpenSSL Project. All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
*
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
*
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in
|
||||
* the documentation and/or other materials provided with the
|
||||
* distribution.
|
||||
*
|
||||
* 3. All advertising materials mentioning features or use of this
|
||||
* software must display the following acknowledgment:
|
||||
* "This product includes software developed by the OpenSSL Project
|
||||
* for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
|
||||
*
|
||||
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
|
||||
* endorse or promote products derived from this software without
|
||||
* prior written permission. For written permission, please contact
|
||||
* openssl-core@openssl.org.
|
||||
*
|
||||
* 5. Products derived from this software may not be called "OpenSSL"
|
||||
* nor may "OpenSSL" appear in their names without prior written
|
||||
* permission of the OpenSSL Project.
|
||||
*
|
||||
* 6. Redistributions of any form whatsoever must retain the following
|
||||
* acknowledgment:
|
||||
* "This product includes software developed by the OpenSSL Project
|
||||
* for use in the OpenSSL Toolkit (http://www.openssl.org/)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
|
||||
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
|
||||
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||||
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
||||
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
||||
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
||||
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
||||
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
||||
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
* ====================================================================
|
||||
*
|
||||
* This product includes cryptographic software written by Eric Young
|
||||
* (eay@cryptsoft.com). This product includes software written by Tim
|
||||
* Hudson (tjh@cryptsoft.com).
|
||||
*
|
||||
*/
|
||||
|
||||
#include <assert.h>
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#ifdef NO_STDIO
|
||||
#include <openssl/e_os2.h>
|
||||
#ifdef OPENSSL_NO_STDIO
|
||||
#define APPS_WIN16
|
||||
#endif
|
||||
|
||||
@@ -68,7 +122,7 @@
|
||||
recursive header file inclusion, resulting in the compiler complaining
|
||||
that u_int isn't defined, but only if _POSIX_C_SOURCE is defined, which
|
||||
is needed to have fileno() declared correctly... So let's define u_int */
|
||||
#if defined(VMS) && defined(__DECC) && !defined(__U_INT)
|
||||
#if defined(OPENSSL_SYS_VMS_DECC) && !defined(__U_INT)
|
||||
#define __U_INT
|
||||
typedef unsigned int u_int;
|
||||
#endif
|
||||
@@ -79,15 +133,19 @@ typedef unsigned int u_int;
|
||||
#include <openssl/ssl.h>
|
||||
#include <openssl/err.h>
|
||||
#include <openssl/pem.h>
|
||||
#include <openssl/engine.h>
|
||||
#include <openssl/rand.h>
|
||||
#include "s_apps.h"
|
||||
|
||||
#ifdef WINDOWS
|
||||
#ifdef OPENSSL_SYS_WINDOWS
|
||||
#include <conio.h>
|
||||
#endif
|
||||
|
||||
|
||||
#if (defined(VMS) && __VMS_VER < 70000000)
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
#include "term_sock.h"
|
||||
#endif
|
||||
|
||||
#if (defined(OPENSSL_SYS_VMS) && __VMS_VER < 70000000)
|
||||
/* FIONBIO used as a switch to enable ioctl, and that isn't in VMS < 7.0 */
|
||||
#undef FIONBIO
|
||||
#endif
|
||||
@@ -112,6 +170,7 @@ static int c_nbio=0;
|
||||
#endif
|
||||
static int c_Pause=0;
|
||||
static int c_debug=0;
|
||||
static int c_msg=0;
|
||||
static int c_showcerts=0;
|
||||
|
||||
static void sc_usage(void);
|
||||
@@ -138,6 +197,7 @@ static void sc_usage(void)
|
||||
BIO_printf(bio_err," -pause - sleep(1) after each read(2) and write(2) system call\n");
|
||||
BIO_printf(bio_err," -showcerts - show all certificates in the chain\n");
|
||||
BIO_printf(bio_err," -debug - extra output\n");
|
||||
BIO_printf(bio_err," -msg - Show protocol messages\n");
|
||||
BIO_printf(bio_err," -nbio_test - more ssl protocol testing\n");
|
||||
BIO_printf(bio_err," -state - print the 'ssl' states\n");
|
||||
#ifdef FIONBIO
|
||||
@@ -151,9 +211,15 @@ static void sc_usage(void)
|
||||
BIO_printf(bio_err," -tls1 - just use TLSv1\n");
|
||||
BIO_printf(bio_err," -no_tls1/-no_ssl3/-no_ssl2 - turn off that protocol\n");
|
||||
BIO_printf(bio_err," -bugs - Switch on all SSL implementation bug workarounds\n");
|
||||
BIO_printf(bio_err," -serverpref - Use server's cipher preferences (only SSLv2)\n");
|
||||
BIO_printf(bio_err," -cipher - preferred cipher to use, use the 'openssl ciphers'\n");
|
||||
BIO_printf(bio_err," command to see what is available\n");
|
||||
BIO_printf(bio_err," -starttls prot - use the STARTTLS command before starting TLS\n");
|
||||
BIO_printf(bio_err," for those protocols that support it, where\n");
|
||||
BIO_printf(bio_err," 'prot' defines which one to assume. Currently,\n");
|
||||
BIO_printf(bio_err," only \"smtp\" is supported.\n");
|
||||
BIO_printf(bio_err," -engine id - Initialise and use the specified engine\n");
|
||||
BIO_printf(bio_err," -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
|
||||
|
||||
}
|
||||
|
||||
@@ -163,8 +229,9 @@ int MAIN(int argc, char **argv)
|
||||
{
|
||||
int off=0;
|
||||
SSL *con=NULL,*con2=NULL;
|
||||
X509_STORE *store = NULL;
|
||||
int s,k,width,state=0;
|
||||
char *cbuf=NULL,*sbuf=NULL;
|
||||
char *cbuf=NULL,*sbuf=NULL,*mbuf=NULL;
|
||||
int cbuf_len,cbuf_off;
|
||||
int sbuf_len,sbuf_off;
|
||||
fd_set readfds,writefds;
|
||||
@@ -178,20 +245,26 @@ int MAIN(int argc, char **argv)
|
||||
int write_tty,read_tty,write_ssl,read_ssl,tty_on,ssl_pending;
|
||||
SSL_CTX *ctx=NULL;
|
||||
int ret=1,in_init=1,i,nbio_test=0;
|
||||
int prexit = 0;
|
||||
int smtp_starttls = 0;
|
||||
int prexit = 0, vflags = 0;
|
||||
SSL_METHOD *meth=NULL;
|
||||
BIO *sbio;
|
||||
char *inrand=NULL;
|
||||
char *engine_id=NULL;
|
||||
ENGINE *e=NULL;
|
||||
#ifdef WINDOWS
|
||||
#ifdef OPENSSL_SYS_WINDOWS
|
||||
struct timeval tv;
|
||||
#endif
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
int stdin_sock;
|
||||
TerminalSocket (TERM_SOCK_CREATE, &stdin_sock);
|
||||
#endif
|
||||
|
||||
#if !defined(NO_SSL2) && !defined(NO_SSL3)
|
||||
#if !defined(OPENSSL_NO_SSL2) && !defined(OPENSSL_NO_SSL3)
|
||||
meth=SSLv23_client_method();
|
||||
#elif !defined(NO_SSL3)
|
||||
#elif !defined(OPENSSL_NO_SSL3)
|
||||
meth=SSLv3_client_method();
|
||||
#elif !defined(NO_SSL2)
|
||||
#elif !defined(OPENSSL_NO_SSL2)
|
||||
meth=SSLv2_client_method();
|
||||
#endif
|
||||
|
||||
@@ -200,13 +273,18 @@ int MAIN(int argc, char **argv)
|
||||
c_quiet=0;
|
||||
c_ign_eof=0;
|
||||
c_debug=0;
|
||||
c_msg=0;
|
||||
c_showcerts=0;
|
||||
|
||||
if (bio_err == NULL)
|
||||
bio_err=BIO_new_fp(stderr,BIO_NOCLOSE);
|
||||
|
||||
if (!load_config(bio_err, NULL))
|
||||
goto end;
|
||||
|
||||
if ( ((cbuf=OPENSSL_malloc(BUFSIZZ)) == NULL) ||
|
||||
((sbuf=OPENSSL_malloc(BUFSIZZ)) == NULL))
|
||||
((sbuf=OPENSSL_malloc(BUFSIZZ)) == NULL) ||
|
||||
((mbuf=OPENSSL_malloc(BUFSIZZ)) == NULL))
|
||||
{
|
||||
BIO_printf(bio_err,"out of memory\n");
|
||||
goto end;
|
||||
@@ -251,6 +329,10 @@ int MAIN(int argc, char **argv)
|
||||
if (--argc < 1) goto bad;
|
||||
cert_file= *(++argv);
|
||||
}
|
||||
else if (strcmp(*argv,"-crl_check") == 0)
|
||||
vflags |= X509_V_FLAG_CRL_CHECK;
|
||||
else if (strcmp(*argv,"-crl_check_all") == 0)
|
||||
vflags |= X509_V_FLAG_CRL_CHECK|X509_V_FLAG_CRL_CHECK_ALL;
|
||||
else if (strcmp(*argv,"-prexit") == 0)
|
||||
prexit=1;
|
||||
else if (strcmp(*argv,"-crlf") == 0)
|
||||
@@ -266,21 +348,23 @@ int MAIN(int argc, char **argv)
|
||||
c_Pause=1;
|
||||
else if (strcmp(*argv,"-debug") == 0)
|
||||
c_debug=1;
|
||||
else if (strcmp(*argv,"-msg") == 0)
|
||||
c_msg=1;
|
||||
else if (strcmp(*argv,"-showcerts") == 0)
|
||||
c_showcerts=1;
|
||||
else if (strcmp(*argv,"-nbio_test") == 0)
|
||||
nbio_test=1;
|
||||
else if (strcmp(*argv,"-state") == 0)
|
||||
state=1;
|
||||
#ifndef NO_SSL2
|
||||
#ifndef OPENSSL_NO_SSL2
|
||||
else if (strcmp(*argv,"-ssl2") == 0)
|
||||
meth=SSLv2_client_method();
|
||||
#endif
|
||||
#ifndef NO_SSL3
|
||||
#ifndef OPENSSL_NO_SSL3
|
||||
else if (strcmp(*argv,"-ssl3") == 0)
|
||||
meth=SSLv3_client_method();
|
||||
#endif
|
||||
#ifndef NO_TLS1
|
||||
#ifndef OPENSSL_NO_TLS1
|
||||
else if (strcmp(*argv,"-tls1") == 0)
|
||||
meth=TLSv1_client_method();
|
||||
#endif
|
||||
@@ -311,6 +395,8 @@ int MAIN(int argc, char **argv)
|
||||
off|=SSL_OP_NO_SSLv3;
|
||||
else if (strcmp(*argv,"-no_ssl2") == 0)
|
||||
off|=SSL_OP_NO_SSLv2;
|
||||
else if (strcmp(*argv,"-serverpref") == 0)
|
||||
off|=SSL_OP_CIPHER_SERVER_PREFERENCE;
|
||||
else if (strcmp(*argv,"-cipher") == 0)
|
||||
{
|
||||
if (--argc < 1) goto bad;
|
||||
@@ -320,11 +406,25 @@ int MAIN(int argc, char **argv)
|
||||
else if (strcmp(*argv,"-nbio") == 0)
|
||||
{ c_nbio=1; }
|
||||
#endif
|
||||
else if (strcmp(*argv,"-starttls") == 0)
|
||||
{
|
||||
if (--argc < 1) goto bad;
|
||||
++argv;
|
||||
if (strcmp(*argv,"smtp") == 0)
|
||||
smtp_starttls = 1;
|
||||
else
|
||||
goto bad;
|
||||
}
|
||||
else if (strcmp(*argv,"-engine") == 0)
|
||||
{
|
||||
if (--argc < 1) goto bad;
|
||||
engine_id = *(++argv);
|
||||
}
|
||||
else if (strcmp(*argv,"-rand") == 0)
|
||||
{
|
||||
if (--argc < 1) goto bad;
|
||||
inrand= *(++argv);
|
||||
}
|
||||
else
|
||||
{
|
||||
BIO_printf(bio_err,"unknown option %s\n",*argv);
|
||||
@@ -341,11 +441,18 @@ bad:
|
||||
goto end;
|
||||
}
|
||||
|
||||
app_RAND_load_file(NULL, bio_err, 0);
|
||||
if (!app_RAND_load_file(NULL, bio_err, 1) && inrand == NULL
|
||||
&& !RAND_status())
|
||||
{
|
||||
BIO_printf(bio_err,"warning, not much extra random data, consider using the -rand option\n\n");
|
||||
}
|
||||
if (inrand != NULL)
|
||||
BIO_printf(bio_err,"%ld semi-random bytes loaded\n\n",
|
||||
app_RAND_load_files(inrand));
|
||||
|
||||
if (bio_c_out == NULL)
|
||||
{
|
||||
if (c_quiet)
|
||||
if (c_quiet && !c_debug && !c_msg)
|
||||
{
|
||||
bio_c_out=BIO_new(BIO_s_null());
|
||||
}
|
||||
@@ -359,28 +466,7 @@ bad:
|
||||
OpenSSL_add_ssl_algorithms();
|
||||
SSL_load_error_strings();
|
||||
|
||||
if (engine_id != NULL)
|
||||
{
|
||||
if((e = ENGINE_by_id(engine_id)) == NULL)
|
||||
{
|
||||
BIO_printf(bio_err,"invalid engine\n");
|
||||
ERR_print_errors(bio_err);
|
||||
goto end;
|
||||
}
|
||||
if (c_debug)
|
||||
{
|
||||
ENGINE_ctrl(e, ENGINE_CTRL_SET_LOGSTREAM,
|
||||
0, bio_err, 0);
|
||||
}
|
||||
if(!ENGINE_set_default(e, ENGINE_METHOD_ALL))
|
||||
{
|
||||
BIO_printf(bio_err,"can't use that engine\n");
|
||||
ERR_print_errors(bio_err);
|
||||
goto end;
|
||||
}
|
||||
BIO_printf(bio_err,"engine \"%s\" set.\n", engine_id);
|
||||
ENGINE_free(e);
|
||||
}
|
||||
e = setup_engine(bio_err, engine_id, 1);
|
||||
|
||||
ctx=SSL_CTX_new(meth);
|
||||
if (ctx == NULL)
|
||||
@@ -418,8 +504,16 @@ bad:
|
||||
/* goto end; */
|
||||
}
|
||||
|
||||
store = SSL_CTX_get_cert_store(ctx);
|
||||
X509_STORE_set_flags(store, vflags);
|
||||
|
||||
con=SSL_new(ctx);
|
||||
#ifndef OPENSSL_NO_KRB5
|
||||
if (con && (con->kssl_ctx = kssl_ctx_new()) != NULL)
|
||||
{
|
||||
kssl_ctx_setstring(con->kssl_ctx, KSSL_SERVER, host);
|
||||
}
|
||||
#endif /* OPENSSL_NO_KRB5 */
|
||||
/* SSL_set_cipher_list(con,"RC4-MD5"); */
|
||||
|
||||
re_start:
|
||||
@@ -430,7 +524,7 @@ re_start:
|
||||
SHUTDOWN(s);
|
||||
goto end;
|
||||
}
|
||||
BIO_printf(bio_c_out,"CONNECTED(%08X)\n",s);
|
||||
BIO_printf(bio_c_out,"CONNECTED(%08X)\n\n",s);
|
||||
|
||||
#ifdef FIONBIO
|
||||
if (c_nbio)
|
||||
@@ -461,11 +555,21 @@ re_start:
|
||||
BIO_set_callback(sbio,bio_dump_cb);
|
||||
BIO_set_callback_arg(sbio,bio_c_out);
|
||||
}
|
||||
if (c_msg)
|
||||
{
|
||||
SSL_set_msg_callback(con, msg_cb);
|
||||
SSL_set_msg_callback_arg(con, bio_c_out);
|
||||
}
|
||||
|
||||
SSL_set_bio(con,sbio,sbio);
|
||||
SSL_set_connect_state(con);
|
||||
|
||||
/* ok, lets connect */
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
if (stdin_sock > SSL_get_fd(con))
|
||||
width=stdin_sock+1;
|
||||
else
|
||||
#endif
|
||||
width=SSL_get_fd(con)+1;
|
||||
|
||||
read_tty=1;
|
||||
@@ -479,6 +583,14 @@ re_start:
|
||||
sbuf_len=0;
|
||||
sbuf_off=0;
|
||||
|
||||
/* This is an ugly hack that does a lot of assumptions */
|
||||
if (smtp_starttls)
|
||||
{
|
||||
BIO_read(sbio,mbuf,BUFSIZZ);
|
||||
BIO_printf(sbio,"STARTTLS\r\n");
|
||||
BIO_read(sbio,sbuf,BUFSIZZ);
|
||||
}
|
||||
|
||||
for (;;)
|
||||
{
|
||||
FD_ZERO(&readfds);
|
||||
@@ -498,6 +610,13 @@ re_start:
|
||||
print_stuff(bio_c_out,con,full_log);
|
||||
if (full_log > 0) full_log--;
|
||||
|
||||
if (smtp_starttls)
|
||||
{
|
||||
BIO_printf(bio_err,"%s",mbuf);
|
||||
/* We don't need to know any more */
|
||||
smtp_starttls = 0;
|
||||
}
|
||||
|
||||
if (reconnect)
|
||||
{
|
||||
reconnect--;
|
||||
@@ -514,11 +633,15 @@ re_start:
|
||||
|
||||
if (!ssl_pending)
|
||||
{
|
||||
#ifndef WINDOWS
|
||||
#ifndef OPENSSL_SYS_WINDOWS
|
||||
if (tty_on)
|
||||
{
|
||||
if (read_tty) FD_SET(fileno(stdin),&readfds);
|
||||
if (write_tty) FD_SET(fileno(stdout),&writefds);
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
if (read_tty) FD_SET(stdin_sock,&readfds);
|
||||
#else
|
||||
if (read_tty) FD_SET(fileno(stdin),&readfds);
|
||||
if (write_tty) FD_SET(fileno(stdout),&writefds);
|
||||
#endif
|
||||
}
|
||||
if (read_ssl)
|
||||
FD_SET(SSL_get_fd(con),&readfds);
|
||||
@@ -541,7 +664,7 @@ re_start:
|
||||
* will choke the compiler: if you do have a cast then
|
||||
* you can either go for (int *) or (void *).
|
||||
*/
|
||||
#ifdef WINDOWS
|
||||
#ifdef OPENSSL_SYS_WINDOWS
|
||||
/* Under Windows we make the assumption that we can
|
||||
* always write to the tty: therefore if we need to
|
||||
* write to the tty we just fall through. Otherwise
|
||||
@@ -640,7 +763,7 @@ re_start:
|
||||
goto shut;
|
||||
}
|
||||
}
|
||||
#ifdef WINDOWS
|
||||
#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_VMS)
|
||||
/* Assume Windows can always write */
|
||||
else if (!ssl_pending && write_tty)
|
||||
#else
|
||||
@@ -699,7 +822,7 @@ printf("read=%d pending=%d peek=%d\n",k,SSL_pending(con),SSL_peek(con,zbuf,10240
|
||||
read_tty=0;
|
||||
break;
|
||||
case SSL_ERROR_WANT_READ:
|
||||
BIO_printf(bio_c_out,"read R BLOCK\n");
|
||||
BIO_printf(bio_c_out,"read R BLOCK\n\n");
|
||||
write_tty=0;
|
||||
read_ssl=1;
|
||||
if ((read_tty == 0) && (write_ssl == 0))
|
||||
@@ -721,17 +844,25 @@ printf("read=%d pending=%d peek=%d\n",k,SSL_pending(con),SSL_peek(con,zbuf,10240
|
||||
}
|
||||
}
|
||||
|
||||
#ifdef WINDOWS
|
||||
#ifdef OPENSSL_SYS_WINDOWS
|
||||
else if ((_kbhit()) || (WAIT_OBJECT_0 == WaitForSingleObject(GetStdHandle(STD_INPUT_HANDLE), 0)))
|
||||
#else
|
||||
else if (FD_ISSET(fileno(stdin),&readfds))
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
else if (FD_ISSET(stdin_sock,&readfds))
|
||||
#else
|
||||
else if (FD_ISSET(fileno(stdin),&readfds))
|
||||
#endif
|
||||
#endif
|
||||
{
|
||||
if (crlf)
|
||||
{
|
||||
int j, lf_num;
|
||||
|
||||
i=read(fileno(stdin),cbuf,BUFSIZZ/2);
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
i=recv(stdin_sock,cbuf,BUFSIZZ/2,0);
|
||||
#else
|
||||
i=read(fileno(stdin),cbuf,BUFSIZZ/2);
|
||||
#endif
|
||||
lf_num = 0;
|
||||
/* both loops are skipped when i <= 0 */
|
||||
for (j = 0; j < i; j++)
|
||||
@@ -750,7 +881,11 @@ printf("read=%d pending=%d peek=%d\n",k,SSL_pending(con),SSL_peek(con,zbuf,10240
|
||||
assert(lf_num == 0);
|
||||
}
|
||||
else
|
||||
i=read(fileno(stdin),cbuf,BUFSIZZ);
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
i=recv(stdin_sock,cbuf,BUFSIZZ,0);
|
||||
#else
|
||||
i=read(fileno(stdin),cbuf,BUFSIZZ);
|
||||
#endif
|
||||
|
||||
if ((!c_ign_eof) && ((i <= 0) || (cbuf[0] == 'Q')))
|
||||
{
|
||||
@@ -788,11 +923,16 @@ end:
|
||||
if (ctx != NULL) SSL_CTX_free(ctx);
|
||||
if (cbuf != NULL) { memset(cbuf,0,BUFSIZZ); OPENSSL_free(cbuf); }
|
||||
if (sbuf != NULL) { memset(sbuf,0,BUFSIZZ); OPENSSL_free(sbuf); }
|
||||
if (mbuf != NULL) { memset(mbuf,0,BUFSIZZ); OPENSSL_free(mbuf); }
|
||||
if (bio_c_out != NULL)
|
||||
{
|
||||
BIO_free(bio_c_out);
|
||||
bio_c_out=NULL;
|
||||
}
|
||||
apps_shutdown();
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
TerminalSocket (TERM_SOCK_DELETE, &stdin_sock);
|
||||
#endif
|
||||
EXIT(ret);
|
||||
}
|
||||
|
||||
@@ -826,7 +966,7 @@ static void print_stuff(BIO *bio, SSL *s, int full)
|
||||
BIO_printf(bio,"%2d s:%s\n",i,buf);
|
||||
X509_NAME_oneline(X509_get_issuer_name(
|
||||
sk_X509_value(sk,i)),buf,BUFSIZ);
|
||||
BIO_printf(bio," i:%s\n",buf);
|
||||
BIO_printf(bio," i:%s\n\n",buf);
|
||||
if (c_showcerts)
|
||||
PEM_write_bio_X509(bio,sk_X509_value(sk,i));
|
||||
}
|
||||
@@ -900,7 +1040,7 @@ static void print_stuff(BIO *bio, SSL *s, int full)
|
||||
}
|
||||
BIO_printf(bio,((s->hit)?"---\nReused, ":"---\nNew, "));
|
||||
c=SSL_get_current_cipher(s);
|
||||
BIO_printf(bio,"%s, Cipher is %s\n",
|
||||
BIO_printf(bio,"%s, Cipher is %s\n\n",
|
||||
SSL_CIPHER_get_version(c),
|
||||
SSL_CIPHER_get_name(c));
|
||||
if (peer != NULL) {
|
||||
@@ -911,8 +1051,10 @@ static void print_stuff(BIO *bio, SSL *s, int full)
|
||||
EVP_PKEY_free(pktmp);
|
||||
}
|
||||
SSL_SESSION_print(bio,SSL_get_session(s));
|
||||
BIO_printf(bio,"---\n");
|
||||
BIO_printf(bio,"---\n\n");
|
||||
if (peer != NULL)
|
||||
X509_free(peer);
|
||||
/* flush, or debugging output gets mixed with http response */
|
||||
BIO_flush(bio);
|
||||
}
|
||||
|
||||
|
||||
364
apps/s_server.c
364
apps/s_server.c
@@ -55,6 +55,59 @@
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
/* ====================================================================
|
||||
* Copyright (c) 1998-2001 The OpenSSL Project. All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
*
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
*
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in
|
||||
* the documentation and/or other materials provided with the
|
||||
* distribution.
|
||||
*
|
||||
* 3. All advertising materials mentioning features or use of this
|
||||
* software must display the following acknowledgment:
|
||||
* "This product includes software developed by the OpenSSL Project
|
||||
* for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
|
||||
*
|
||||
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
|
||||
* endorse or promote products derived from this software without
|
||||
* prior written permission. For written permission, please contact
|
||||
* openssl-core@openssl.org.
|
||||
*
|
||||
* 5. Products derived from this software may not be called "OpenSSL"
|
||||
* nor may "OpenSSL" appear in their names without prior written
|
||||
* permission of the OpenSSL Project.
|
||||
*
|
||||
* 6. Redistributions of any form whatsoever must retain the following
|
||||
* acknowledgment:
|
||||
* "This product includes software developed by the OpenSSL Project
|
||||
* for use in the OpenSSL Toolkit (http://www.openssl.org/)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
|
||||
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
|
||||
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||||
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
||||
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
||||
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
||||
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
||||
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
||||
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
* ====================================================================
|
||||
*
|
||||
* This product includes cryptographic software written by Eric Young
|
||||
* (eay@cryptsoft.com). This product includes software written by Tim
|
||||
* Hudson (tjh@cryptsoft.com).
|
||||
*
|
||||
*/
|
||||
|
||||
#include <assert.h>
|
||||
#include <stdio.h>
|
||||
@@ -62,7 +115,8 @@
|
||||
#include <string.h>
|
||||
#include <sys/types.h>
|
||||
#include <sys/stat.h>
|
||||
#ifdef NO_STDIO
|
||||
#include <openssl/e_os2.h>
|
||||
#ifdef OPENSSL_NO_STDIO
|
||||
#define APPS_WIN16
|
||||
#endif
|
||||
|
||||
@@ -70,7 +124,7 @@
|
||||
recursive header file inclusion, resulting in the compiler complaining
|
||||
that u_int isn't defined, but only if _POSIX_C_SOURCE is defined, which
|
||||
is needed to have fileno() declared correctly... So let's define u_int */
|
||||
#if defined(VMS) && defined(__DECC) && !defined(__U_INT)
|
||||
#if defined(OPENSSL_SYS_VMS_DECC) && !defined(__U_INT)
|
||||
#define __U_INT
|
||||
typedef unsigned int u_int;
|
||||
#endif
|
||||
@@ -83,19 +137,23 @@ typedef unsigned int u_int;
|
||||
#include <openssl/pem.h>
|
||||
#include <openssl/x509.h>
|
||||
#include <openssl/ssl.h>
|
||||
#include <openssl/engine.h>
|
||||
#include <openssl/rand.h>
|
||||
#include "s_apps.h"
|
||||
|
||||
#ifdef WINDOWS
|
||||
#ifdef OPENSSL_SYS_WINDOWS
|
||||
#include <conio.h>
|
||||
#endif
|
||||
|
||||
#if (defined(VMS) && __VMS_VER < 70000000)
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
#include "term_sock.h"
|
||||
#endif
|
||||
|
||||
#if (defined(OPENSSL_SYS_VMS) && __VMS_VER < 70000000)
|
||||
/* FIONBIO used as a switch to enable ioctl, and that isn't in VMS < 7.0 */
|
||||
#undef FIONBIO
|
||||
#endif
|
||||
|
||||
#ifndef NO_RSA
|
||||
#ifndef OPENSSL_NO_RSA
|
||||
static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export, int keylength);
|
||||
#endif
|
||||
static int sv_body(char *hostname, int s, unsigned char *context);
|
||||
@@ -104,7 +162,9 @@ static void close_accept_socket(void );
|
||||
static void sv_usage(void);
|
||||
static int init_ssl_connection(SSL *s);
|
||||
static void print_stats(BIO *bp,SSL_CTX *ctx);
|
||||
#ifndef NO_DH
|
||||
static int generate_session_id(const SSL *ssl, unsigned char *id,
|
||||
unsigned int *id_len);
|
||||
#ifndef OPENSSL_NO_DH
|
||||
static DH *load_dh_param(char *dhfile);
|
||||
static DH *get_dh512(void);
|
||||
#endif
|
||||
@@ -120,7 +180,7 @@ static void s_server_init(void);
|
||||
# endif
|
||||
#endif
|
||||
|
||||
#ifndef NO_DH
|
||||
#ifndef OPENSSL_NO_DH
|
||||
static unsigned char dh512_p[]={
|
||||
0xDA,0x58,0x3C,0x16,0xD9,0x85,0x22,0x89,0xD0,0xE4,0xAF,0x75,
|
||||
0x6F,0x4C,0xCA,0x92,0xDD,0x4B,0xE5,0x33,0xB8,0x04,0xFB,0x0F,
|
||||
@@ -174,10 +234,12 @@ static int www=0;
|
||||
|
||||
static BIO *bio_s_out=NULL;
|
||||
static int s_debug=0;
|
||||
static int s_msg=0;
|
||||
static int s_quiet=0;
|
||||
|
||||
static int hack=0;
|
||||
static char *engine_id=NULL;
|
||||
static const char *session_id_prefix=NULL;
|
||||
|
||||
#ifdef MONOLITH
|
||||
static void s_server_init(void)
|
||||
@@ -198,6 +260,7 @@ static void s_server_init(void)
|
||||
|
||||
bio_s_out=NULL;
|
||||
s_debug=0;
|
||||
s_msg=0;
|
||||
s_quiet=0;
|
||||
hack=0;
|
||||
engine_id=NULL;
|
||||
@@ -226,11 +289,13 @@ static void sv_usage(void)
|
||||
BIO_printf(bio_err," -nbio_test - test with the non-blocking test bio\n");
|
||||
BIO_printf(bio_err," -crlf - convert LF from terminal into CRLF\n");
|
||||
BIO_printf(bio_err," -debug - Print more output\n");
|
||||
BIO_printf(bio_err," -msg - Show protocol messages\n");
|
||||
BIO_printf(bio_err," -state - Print the SSL states\n");
|
||||
BIO_printf(bio_err," -CApath arg - PEM format directory of CA's\n");
|
||||
BIO_printf(bio_err," -CAfile arg - PEM format file of CA's\n");
|
||||
BIO_printf(bio_err," -nocert - Don't use any certificates (Anon-DH)\n");
|
||||
BIO_printf(bio_err," -cipher arg - play with 'openssl ciphers' to see what goes here\n");
|
||||
BIO_printf(bio_err," -serverpref - Use server's cipher preferences\n");
|
||||
BIO_printf(bio_err," -quiet - No server output\n");
|
||||
BIO_printf(bio_err," -no_tmp_rsa - Do not generate a tmp RSA key\n");
|
||||
BIO_printf(bio_err," -ssl2 - Just talk SSLv2\n");
|
||||
@@ -239,13 +304,17 @@ static void sv_usage(void)
|
||||
BIO_printf(bio_err," -no_ssl2 - Just disable SSLv2\n");
|
||||
BIO_printf(bio_err," -no_ssl3 - Just disable SSLv3\n");
|
||||
BIO_printf(bio_err," -no_tls1 - Just disable TLSv1\n");
|
||||
#ifndef NO_DH
|
||||
#ifndef OPENSSL_NO_DH
|
||||
BIO_printf(bio_err," -no_dhe - Disable ephemeral DH\n");
|
||||
#endif
|
||||
BIO_printf(bio_err," -bugs - Turn on SSL bug compatibility\n");
|
||||
BIO_printf(bio_err," -www - Respond to a 'GET /' with a status page\n");
|
||||
BIO_printf(bio_err," -WWW - Respond to a 'GET /<path> HTTP/1.0' with file ./<path>\n");
|
||||
BIO_printf(bio_err," -HTTP - Respond to a 'GET /<path> HTTP/1.0' with file ./<path>\n");
|
||||
BIO_printf(bio_err," with the assumption it contains a complete HTTP response.\n");
|
||||
BIO_printf(bio_err," -engine id - Initialise and use the specified engine\n");
|
||||
BIO_printf(bio_err," -id_prefix arg - Generate SSL/TLS session IDs prefixed by 'arg'\n");
|
||||
BIO_printf(bio_err," -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
|
||||
}
|
||||
|
||||
static int local_argc=0;
|
||||
@@ -405,6 +474,8 @@ int MAIN(int, char **);
|
||||
|
||||
int MAIN(int argc, char *argv[])
|
||||
{
|
||||
X509_STORE *store = NULL;
|
||||
int vflags = 0;
|
||||
short port=PORT;
|
||||
char *CApath=NULL,*CAfile=NULL;
|
||||
char *context = NULL;
|
||||
@@ -416,12 +487,13 @@ int MAIN(int argc, char *argv[])
|
||||
int state=0;
|
||||
SSL_METHOD *meth=NULL;
|
||||
ENGINE *e=NULL;
|
||||
char *inrand=NULL;
|
||||
|
||||
#if !defined(NO_SSL2) && !defined(NO_SSL3)
|
||||
#if !defined(OPENSSL_NO_SSL2) && !defined(OPENSSL_NO_SSL3)
|
||||
meth=SSLv23_server_method();
|
||||
#elif !defined(NO_SSL3)
|
||||
#elif !defined(OPENSSL_NO_SSL3)
|
||||
meth=SSLv3_server_method();
|
||||
#elif !defined(NO_SSL2)
|
||||
#elif !defined(OPENSSL_NO_SSL2)
|
||||
meth=SSLv2_server_method();
|
||||
#endif
|
||||
|
||||
@@ -436,6 +508,9 @@ int MAIN(int argc, char *argv[])
|
||||
if (bio_err == NULL)
|
||||
bio_err=BIO_new_fp(stderr,BIO_NOCLOSE);
|
||||
|
||||
if (!load_config(bio_err, NULL))
|
||||
goto end;
|
||||
|
||||
verify_depth=0;
|
||||
#ifdef FIONBIO
|
||||
s_nbio=0;
|
||||
@@ -508,6 +583,16 @@ int MAIN(int argc, char *argv[])
|
||||
if (--argc < 1) goto bad;
|
||||
CApath= *(++argv);
|
||||
}
|
||||
else if (strcmp(*argv,"-crl_check") == 0)
|
||||
{
|
||||
vflags |= X509_V_FLAG_CRL_CHECK;
|
||||
}
|
||||
else if (strcmp(*argv,"-crl_check") == 0)
|
||||
{
|
||||
vflags |= X509_V_FLAG_CRL_CHECK|X509_V_FLAG_CRL_CHECK_ALL;
|
||||
}
|
||||
else if (strcmp(*argv,"-serverpref") == 0)
|
||||
{ off|=SSL_OP_CIPHER_SERVER_PREFERENCE; }
|
||||
else if (strcmp(*argv,"-cipher") == 0)
|
||||
{
|
||||
if (--argc < 1) goto bad;
|
||||
@@ -531,6 +616,8 @@ int MAIN(int argc, char *argv[])
|
||||
}
|
||||
else if (strcmp(*argv,"-debug") == 0)
|
||||
{ s_debug=1; }
|
||||
else if (strcmp(*argv,"-msg") == 0)
|
||||
{ s_msg=1; }
|
||||
else if (strcmp(*argv,"-hack") == 0)
|
||||
{ hack=1; }
|
||||
else if (strcmp(*argv,"-state") == 0)
|
||||
@@ -549,29 +636,41 @@ int MAIN(int argc, char *argv[])
|
||||
{ www=1; }
|
||||
else if (strcmp(*argv,"-WWW") == 0)
|
||||
{ www=2; }
|
||||
else if (strcmp(*argv,"-HTTP") == 0)
|
||||
{ www=3; }
|
||||
else if (strcmp(*argv,"-no_ssl2") == 0)
|
||||
{ off|=SSL_OP_NO_SSLv2; }
|
||||
else if (strcmp(*argv,"-no_ssl3") == 0)
|
||||
{ off|=SSL_OP_NO_SSLv3; }
|
||||
else if (strcmp(*argv,"-no_tls1") == 0)
|
||||
{ off|=SSL_OP_NO_TLSv1; }
|
||||
#ifndef NO_SSL2
|
||||
#ifndef OPENSSL_NO_SSL2
|
||||
else if (strcmp(*argv,"-ssl2") == 0)
|
||||
{ meth=SSLv2_server_method(); }
|
||||
#endif
|
||||
#ifndef NO_SSL3
|
||||
#ifndef OPENSSL_NO_SSL3
|
||||
else if (strcmp(*argv,"-ssl3") == 0)
|
||||
{ meth=SSLv3_server_method(); }
|
||||
#endif
|
||||
#ifndef NO_TLS1
|
||||
#ifndef OPENSSL_NO_TLS1
|
||||
else if (strcmp(*argv,"-tls1") == 0)
|
||||
{ meth=TLSv1_server_method(); }
|
||||
#endif
|
||||
else if (strcmp(*argv, "-id_prefix") == 0)
|
||||
{
|
||||
if (--argc < 1) goto bad;
|
||||
session_id_prefix = *(++argv);
|
||||
}
|
||||
else if (strcmp(*argv,"-engine") == 0)
|
||||
{
|
||||
if (--argc < 1) goto bad;
|
||||
engine_id= *(++argv);
|
||||
}
|
||||
else if (strcmp(*argv,"-rand") == 0)
|
||||
{
|
||||
if (--argc < 1) goto bad;
|
||||
inrand= *(++argv);
|
||||
}
|
||||
else
|
||||
{
|
||||
BIO_printf(bio_err,"unknown option %s\n",*argv);
|
||||
@@ -588,11 +687,18 @@ bad:
|
||||
goto end;
|
||||
}
|
||||
|
||||
app_RAND_load_file(NULL, bio_err, 0);
|
||||
if (!app_RAND_load_file(NULL, bio_err, 1) && inrand == NULL
|
||||
&& !RAND_status())
|
||||
{
|
||||
BIO_printf(bio_err,"warning, not much extra random data, consider using the -rand option\n");
|
||||
}
|
||||
if (inrand != NULL)
|
||||
BIO_printf(bio_err,"%ld semi-random bytes loaded\n",
|
||||
app_RAND_load_files(inrand));
|
||||
|
||||
if (bio_s_out == NULL)
|
||||
{
|
||||
if (s_quiet && !s_debug)
|
||||
if (s_quiet && !s_debug && !s_msg)
|
||||
{
|
||||
bio_s_out=BIO_new(BIO_s_null());
|
||||
}
|
||||
@@ -603,7 +709,7 @@ bad:
|
||||
}
|
||||
}
|
||||
|
||||
#if !defined(NO_RSA) || !defined(NO_DSA)
|
||||
#if !defined(OPENSSL_NO_RSA) || !defined(OPENSSL_NO_DSA) || !defined(OPENSSL_NO_ECDSA)
|
||||
if (nocert)
|
||||
#endif
|
||||
{
|
||||
@@ -616,28 +722,7 @@ bad:
|
||||
SSL_load_error_strings();
|
||||
OpenSSL_add_ssl_algorithms();
|
||||
|
||||
if (engine_id != NULL)
|
||||
{
|
||||
if((e = ENGINE_by_id(engine_id)) == NULL)
|
||||
{
|
||||
BIO_printf(bio_err,"invalid engine\n");
|
||||
ERR_print_errors(bio_err);
|
||||
goto end;
|
||||
}
|
||||
if (s_debug)
|
||||
{
|
||||
ENGINE_ctrl(e, ENGINE_CTRL_SET_LOGSTREAM,
|
||||
0, bio_err, 0);
|
||||
}
|
||||
if(!ENGINE_set_default(e, ENGINE_METHOD_ALL))
|
||||
{
|
||||
BIO_printf(bio_err,"can't use that engine\n");
|
||||
ERR_print_errors(bio_err);
|
||||
goto end;
|
||||
}
|
||||
BIO_printf(bio_err,"engine \"%s\" set.\n", engine_id);
|
||||
ENGINE_free(e);
|
||||
}
|
||||
e = setup_engine(bio_err, engine_id, 1);
|
||||
|
||||
ctx=SSL_CTX_new(meth);
|
||||
if (ctx == NULL)
|
||||
@@ -645,12 +730,26 @@ bad:
|
||||
ERR_print_errors(bio_err);
|
||||
goto end;
|
||||
}
|
||||
|
||||
if (session_id_prefix)
|
||||
{
|
||||
if(strlen(session_id_prefix) >= 32)
|
||||
BIO_printf(bio_err,
|
||||
"warning: id_prefix is too long, only one new session will be possible\n");
|
||||
else if(strlen(session_id_prefix) >= 16)
|
||||
BIO_printf(bio_err,
|
||||
"warning: id_prefix is too long if you use SSLv2\n");
|
||||
if(!SSL_CTX_set_generate_session_id(ctx, generate_session_id))
|
||||
{
|
||||
BIO_printf(bio_err,"error setting 'id_prefix'\n");
|
||||
ERR_print_errors(bio_err);
|
||||
goto end;
|
||||
}
|
||||
BIO_printf(bio_err,"id_prefix '%s' set.\n", session_id_prefix);
|
||||
}
|
||||
SSL_CTX_set_quiet_shutdown(ctx,1);
|
||||
if (bugs) SSL_CTX_set_options(ctx,SSL_OP_ALL);
|
||||
if (hack) SSL_CTX_set_options(ctx,SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG);
|
||||
SSL_CTX_set_options(ctx,off);
|
||||
if (hack) SSL_CTX_set_options(ctx,SSL_OP_NON_EXPORT_FIRST);
|
||||
|
||||
if (state) SSL_CTX_set_info_callback(ctx,apps_ssl_info_callback);
|
||||
|
||||
@@ -675,8 +774,10 @@ bad:
|
||||
ERR_print_errors(bio_err);
|
||||
/* goto end; */
|
||||
}
|
||||
store = SSL_CTX_get_cert_store(ctx);
|
||||
X509_STORE_set_flags(store, vflags);
|
||||
|
||||
#ifndef NO_DH
|
||||
#ifndef OPENSSL_NO_DH
|
||||
if (!no_dhe)
|
||||
{
|
||||
DH *dh=NULL;
|
||||
@@ -710,9 +811,10 @@ bad:
|
||||
goto end;
|
||||
}
|
||||
|
||||
#ifndef NO_RSA
|
||||
#ifndef OPENSSL_NO_RSA
|
||||
#if 1
|
||||
SSL_CTX_set_tmp_rsa_callback(ctx,tmp_rsa_cb);
|
||||
if (!no_tmp_rsa)
|
||||
SSL_CTX_set_tmp_rsa_callback(ctx,tmp_rsa_cb);
|
||||
#else
|
||||
if (!no_tmp_rsa && SSL_CTX_need_tmp_RSA(ctx))
|
||||
{
|
||||
@@ -729,7 +831,7 @@ bad:
|
||||
goto end;
|
||||
}
|
||||
RSA_free(rsa);
|
||||
BIO_printf(bio_s_out,"\n");
|
||||
BIO_printf(bio_s_out,"\n\n");
|
||||
}
|
||||
#endif
|
||||
#endif
|
||||
@@ -761,6 +863,7 @@ end:
|
||||
BIO_free(bio_s_out);
|
||||
bio_s_out=NULL;
|
||||
}
|
||||
apps_shutdown();
|
||||
EXIT(ret);
|
||||
}
|
||||
|
||||
@@ -784,7 +887,7 @@ static void print_stats(BIO *bio, SSL_CTX *ssl_ctx)
|
||||
BIO_printf(bio,"%4d session cache misses\n",SSL_CTX_sess_misses(ssl_ctx));
|
||||
BIO_printf(bio,"%4d session cache timeouts\n",SSL_CTX_sess_timeouts(ssl_ctx));
|
||||
BIO_printf(bio,"%4d callback cache hits\n",SSL_CTX_sess_cb_hits(ssl_ctx));
|
||||
BIO_printf(bio,"%4d cache full overflows (%d allowed)\n",
|
||||
BIO_printf(bio,"%4d cache full overflows (%d allowed)\n\n",
|
||||
SSL_CTX_sess_cache_full(ssl_ctx),
|
||||
SSL_CTX_sess_get_cache_size(ssl_ctx));
|
||||
}
|
||||
@@ -798,10 +901,15 @@ static int sv_body(char *hostname, int s, unsigned char *context)
|
||||
unsigned long l;
|
||||
SSL *con=NULL;
|
||||
BIO *sbio;
|
||||
#ifdef WINDOWS
|
||||
#ifdef OPENSSL_SYS_WINDOWS
|
||||
struct timeval tv;
|
||||
#endif
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
int stdin_sock;
|
||||
|
||||
TerminalSocket (TERM_SOCK_CREATE, &stdin_sock);
|
||||
#endif
|
||||
|
||||
if ((buf=OPENSSL_malloc(bufsize)) == NULL)
|
||||
{
|
||||
BIO_printf(bio_err,"out of memory\n");
|
||||
@@ -821,6 +929,15 @@ static int sv_body(char *hostname, int s, unsigned char *context)
|
||||
|
||||
if (con == NULL) {
|
||||
con=SSL_new(ctx);
|
||||
#ifndef OPENSSL_NO_KRB5
|
||||
if ((con->kssl_ctx = kssl_ctx_new()) != NULL)
|
||||
{
|
||||
kssl_ctx_setstring(con->kssl_ctx, KSSL_SERVICE,
|
||||
KRB5SVC);
|
||||
kssl_ctx_setstring(con->kssl_ctx, KSSL_KEYTAB,
|
||||
KRB5KEYTAB);
|
||||
}
|
||||
#endif /* OPENSSL_NO_KRB5 */
|
||||
if(context)
|
||||
SSL_set_session_id_context(con, context,
|
||||
strlen((char *)context));
|
||||
@@ -845,8 +962,18 @@ static int sv_body(char *hostname, int s, unsigned char *context)
|
||||
BIO_set_callback(SSL_get_rbio(con),bio_dump_cb);
|
||||
BIO_set_callback_arg(SSL_get_rbio(con),bio_s_out);
|
||||
}
|
||||
if (s_msg)
|
||||
{
|
||||
SSL_set_msg_callback(con, msg_cb);
|
||||
SSL_set_msg_callback_arg(con, bio_s_out);
|
||||
}
|
||||
|
||||
width=s+1;
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
if (stdin_sock > s)
|
||||
width = stdin_sock + 1;
|
||||
else
|
||||
#endif
|
||||
width=s+1;
|
||||
for (;;)
|
||||
{
|
||||
int read_from_terminal;
|
||||
@@ -858,8 +985,12 @@ static int sv_body(char *hostname, int s, unsigned char *context)
|
||||
if (!read_from_sslcon)
|
||||
{
|
||||
FD_ZERO(&readfds);
|
||||
#ifndef WINDOWS
|
||||
#ifndef OPENSSL_SYS_WINDOWS
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
FD_SET(stdin_sock,&readfds);
|
||||
#else
|
||||
FD_SET(fileno(stdin),&readfds);
|
||||
#endif
|
||||
#endif
|
||||
FD_SET(s,&readfds);
|
||||
/* Note: under VMS with SOCKETSHR the second parameter is
|
||||
@@ -868,7 +999,7 @@ static int sv_body(char *hostname, int s, unsigned char *context)
|
||||
* the compiler: if you do have a cast then you can either
|
||||
* go for (int *) or (void *).
|
||||
*/
|
||||
#ifdef WINDOWS
|
||||
#ifdef OPENSSL_SYS_WINDOWS
|
||||
/* Under Windows we can't select on stdin: only
|
||||
* on sockets. As a workaround we timeout the select every
|
||||
* second and check for any keypress. In a proper Windows
|
||||
@@ -883,8 +1014,12 @@ static int sv_body(char *hostname, int s, unsigned char *context)
|
||||
#else
|
||||
i=select(width,(void *)&readfds,NULL,NULL,NULL);
|
||||
if (i <= 0) continue;
|
||||
if (FD_ISSET(fileno(stdin),&readfds))
|
||||
read_from_terminal = 1;
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
if (FD_ISSET(stdin_sock,&readfds))
|
||||
#else
|
||||
if (FD_ISSET(fileno(stdin),&readfds))
|
||||
#endif
|
||||
read_from_terminal = 1;
|
||||
#endif
|
||||
if (FD_ISSET(s,&readfds))
|
||||
read_from_sslcon = 1;
|
||||
@@ -895,7 +1030,11 @@ static int sv_body(char *hostname, int s, unsigned char *context)
|
||||
{
|
||||
int j, lf_num;
|
||||
|
||||
i=read(fileno(stdin), buf, bufsize/2);
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
i=recv(stdin_sock, buf, bufsize/2, 0);
|
||||
#else
|
||||
i=read(fileno(stdin), buf, bufsize/2);
|
||||
#endif
|
||||
lf_num = 0;
|
||||
/* both loops are skipped when i <= 0 */
|
||||
for (j = 0; j < i; j++)
|
||||
@@ -914,7 +1053,11 @@ static int sv_body(char *hostname, int s, unsigned char *context)
|
||||
assert(lf_num == 0);
|
||||
}
|
||||
else
|
||||
i=read(fileno(stdin),buf,bufsize);
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
i=recv(stdin_sock,buf,bufsize, 0);
|
||||
#else
|
||||
i=read(fileno(stdin),buf,bufsize);
|
||||
#endif
|
||||
if (!s_quiet)
|
||||
{
|
||||
if ((i <= 0) || (buf[0] == 'Q'))
|
||||
@@ -983,7 +1126,7 @@ static int sv_body(char *hostname, int s, unsigned char *context)
|
||||
case SSL_ERROR_WANT_WRITE:
|
||||
case SSL_ERROR_WANT_READ:
|
||||
case SSL_ERROR_WANT_X509_LOOKUP:
|
||||
BIO_printf(bio_s_out,"Write BLOCK\n");
|
||||
BIO_printf(bio_s_out,"Write BLOCK\n\n");
|
||||
break;
|
||||
case SSL_ERROR_SYSCALL:
|
||||
case SSL_ERROR_SSL:
|
||||
@@ -993,7 +1136,7 @@ static int sv_body(char *hostname, int s, unsigned char *context)
|
||||
goto err;
|
||||
/* break; */
|
||||
case SSL_ERROR_ZERO_RETURN:
|
||||
BIO_printf(bio_s_out,"DONE\n");
|
||||
BIO_printf(bio_s_out,"DONE\n\n");
|
||||
ret=1;
|
||||
goto err;
|
||||
}
|
||||
@@ -1031,12 +1174,13 @@ again:
|
||||
#endif
|
||||
write(fileno(stdout),buf,
|
||||
(unsigned int)i);
|
||||
BIO_printf(bio_s_out,"\n");
|
||||
if (SSL_pending(con)) goto again;
|
||||
break;
|
||||
case SSL_ERROR_WANT_WRITE:
|
||||
case SSL_ERROR_WANT_READ:
|
||||
case SSL_ERROR_WANT_X509_LOOKUP:
|
||||
BIO_printf(bio_s_out,"Read BLOCK\n");
|
||||
BIO_printf(bio_s_out,"Read BLOCK\n\n");
|
||||
break;
|
||||
case SSL_ERROR_SYSCALL:
|
||||
case SSL_ERROR_SSL:
|
||||
@@ -1068,6 +1212,9 @@ err:
|
||||
}
|
||||
if (ret >= 0)
|
||||
BIO_printf(bio_s_out,"ACCEPT\n");
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
TerminalSocket (TERM_SOCK_DELETE, &stdin_sock);
|
||||
#endif
|
||||
return(ret);
|
||||
}
|
||||
|
||||
@@ -1125,7 +1272,7 @@ static int init_ssl_connection(SSL *con)
|
||||
if (SSL_get_shared_ciphers(con,buf,BUFSIZ) != NULL)
|
||||
BIO_printf(bio_s_out,"Shared ciphers:%s\n",buf);
|
||||
str=SSL_CIPHER_get_name(SSL_get_current_cipher(con));
|
||||
BIO_printf(bio_s_out,"CIPHER is %s\n",(str != NULL)?str:"(NONE)");
|
||||
BIO_printf(bio_s_out,"CIPHER is %s\n\n",(str != NULL)?str:"(NONE)");
|
||||
if (con->hit) BIO_printf(bio_s_out,"Reused session-id\n");
|
||||
if (SSL_ctrl(con,SSL_CTRL_GET_FLAGS,0,NULL) &
|
||||
TLS1_FLAGS_TLS_PADDING_BUG)
|
||||
@@ -1134,7 +1281,7 @@ static int init_ssl_connection(SSL *con)
|
||||
return(1);
|
||||
}
|
||||
|
||||
#ifndef NO_DH
|
||||
#ifndef OPENSSL_NO_DH
|
||||
static DH *load_dh_param(char *dhfile)
|
||||
{
|
||||
DH *ret=NULL;
|
||||
@@ -1203,6 +1350,13 @@ static int www_body(char *hostname, int s, unsigned char *context)
|
||||
if (!BIO_set_write_buffer_size(io,bufsize)) goto err;
|
||||
|
||||
if ((con=SSL_new(ctx)) == NULL) goto err;
|
||||
#ifndef OPENSSL_NO_KRB5
|
||||
if ((con->kssl_ctx = kssl_ctx_new()) != NULL)
|
||||
{
|
||||
kssl_ctx_setstring(con->kssl_ctx, KSSL_SERVICE, KRB5SVC);
|
||||
kssl_ctx_setstring(con->kssl_ctx, KSSL_KEYTAB, KRB5KEYTAB);
|
||||
}
|
||||
#endif /* OPENSSL_NO_KRB5 */
|
||||
if(context) SSL_set_session_id_context(con, context,
|
||||
strlen((char *)context));
|
||||
|
||||
@@ -1230,6 +1384,11 @@ static int www_body(char *hostname, int s, unsigned char *context)
|
||||
BIO_set_callback(SSL_get_rbio(con),bio_dump_cb);
|
||||
BIO_set_callback_arg(SSL_get_rbio(con),bio_s_out);
|
||||
}
|
||||
if (s_msg)
|
||||
{
|
||||
SSL_set_msg_callback(con, msg_cb);
|
||||
SSL_set_msg_callback_arg(con, bio_s_out);
|
||||
}
|
||||
|
||||
blank=0;
|
||||
for (;;)
|
||||
@@ -1269,8 +1428,8 @@ static int www_body(char *hostname, int s, unsigned char *context)
|
||||
}
|
||||
else
|
||||
{
|
||||
BIO_printf(bio_s_out,"read R BLOCK\n");
|
||||
#ifndef MSDOS
|
||||
BIO_printf(bio_s_out,"read R BLOCK\n\n");
|
||||
#ifndef OPENSSL_SYS_MSDOS
|
||||
sleep(1);
|
||||
#endif
|
||||
continue;
|
||||
@@ -1364,7 +1523,8 @@ static int www_body(char *hostname, int s, unsigned char *context)
|
||||
BIO_puts(io,"</BODY></HTML>\r\n\r\n");
|
||||
break;
|
||||
}
|
||||
else if ((www == 2) && (strncmp("GET /",buf,5) == 0))
|
||||
else if ((www == 2 || www == 3)
|
||||
&& (strncmp("GET /",buf,5) == 0))
|
||||
{
|
||||
BIO *file;
|
||||
char *p,*e;
|
||||
@@ -1372,15 +1532,29 @@ static int www_body(char *hostname, int s, unsigned char *context)
|
||||
|
||||
/* skip the '/' */
|
||||
p= &(buf[5]);
|
||||
dot=0;
|
||||
|
||||
dot = 1;
|
||||
for (e=p; *e != '\0'; e++)
|
||||
{
|
||||
if (e[0] == ' ') break;
|
||||
if ( (e[0] == '.') &&
|
||||
(strncmp(&(e[-1]),"/../",4) == 0))
|
||||
dot=1;
|
||||
if (e[0] == ' ')
|
||||
break;
|
||||
|
||||
switch (dot)
|
||||
{
|
||||
case 1:
|
||||
dot = (e[0] == '.') ? 2 : 0;
|
||||
break;
|
||||
case 2:
|
||||
dot = (e[0] == '.') ? 3 : 0;
|
||||
break;
|
||||
case 3:
|
||||
dot = (e[0] == '/') ? -1 : 0;
|
||||
break;
|
||||
}
|
||||
if (dot == 0)
|
||||
dot = (e[0] == '/') ? 1 : 0;
|
||||
}
|
||||
|
||||
dot = (dot == 3) || (dot == -1); /* filename contains ".." component */
|
||||
|
||||
if (*e == '\0')
|
||||
{
|
||||
@@ -1404,9 +1578,11 @@ static int www_body(char *hostname, int s, unsigned char *context)
|
||||
break;
|
||||
}
|
||||
|
||||
#if 0
|
||||
/* append if a directory lookup */
|
||||
if (e[-1] == '/')
|
||||
strcat(p,"index.html");
|
||||
#endif
|
||||
|
||||
/* if a directory, do the index thang */
|
||||
if (stat(p,&st_buf) < 0)
|
||||
@@ -1418,7 +1594,13 @@ static int www_body(char *hostname, int s, unsigned char *context)
|
||||
}
|
||||
if (S_ISDIR(st_buf.st_mode))
|
||||
{
|
||||
#if 0 /* must check buffer size */
|
||||
strcat(p,"/index.html");
|
||||
#else
|
||||
BIO_puts(io,text);
|
||||
BIO_printf(io,"'%s' is a directory\r\n",p);
|
||||
break;
|
||||
#endif
|
||||
}
|
||||
|
||||
if ((file=BIO_new_file(p,"r")) == NULL)
|
||||
@@ -1432,13 +1614,16 @@ static int www_body(char *hostname, int s, unsigned char *context)
|
||||
if (!s_quiet)
|
||||
BIO_printf(bio_err,"FILE:%s\n",p);
|
||||
|
||||
i=strlen(p);
|
||||
if ( ((i > 5) && (strcmp(&(p[i-5]),".html") == 0)) ||
|
||||
((i > 4) && (strcmp(&(p[i-4]),".php") == 0)) ||
|
||||
((i > 4) && (strcmp(&(p[i-4]),".htm") == 0)))
|
||||
BIO_puts(io,"HTTP/1.0 200 ok\r\nContent-type: text/html\r\n\r\n");
|
||||
else
|
||||
BIO_puts(io,"HTTP/1.0 200 ok\r\nContent-type: text/plain\r\n\r\n");
|
||||
if (www == 2)
|
||||
{
|
||||
i=strlen(p);
|
||||
if ( ((i > 5) && (strcmp(&(p[i-5]),".html") == 0)) ||
|
||||
((i > 4) && (strcmp(&(p[i-4]),".php") == 0)) ||
|
||||
((i > 4) && (strcmp(&(p[i-4]),".htm") == 0)))
|
||||
BIO_puts(io,"HTTP/1.0 200 ok\r\nContent-type: text/html\r\n\r\n");
|
||||
else
|
||||
BIO_puts(io,"HTTP/1.0 200 ok\r\nContent-type: text/plain\r\n\r\n");
|
||||
}
|
||||
/* send the file */
|
||||
total_bytes=0;
|
||||
for (;;)
|
||||
@@ -1469,7 +1654,7 @@ static int www_body(char *hostname, int s, unsigned char *context)
|
||||
goto write_error;
|
||||
else
|
||||
{
|
||||
BIO_printf(bio_s_out,"rwrite W BLOCK\n");
|
||||
BIO_printf(bio_s_out,"rwrite W BLOCK\n\n");
|
||||
}
|
||||
}
|
||||
else
|
||||
@@ -1516,7 +1701,7 @@ err:
|
||||
return(ret);
|
||||
}
|
||||
|
||||
#ifndef NO_RSA
|
||||
#ifndef OPENSSL_NO_RSA
|
||||
static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export, int keylength)
|
||||
{
|
||||
static RSA *rsa_tmp=NULL;
|
||||
@@ -1538,3 +1723,26 @@ static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export, int keylength)
|
||||
return(rsa_tmp);
|
||||
}
|
||||
#endif
|
||||
|
||||
#define MAX_SESSION_ID_ATTEMPTS 10
|
||||
static int generate_session_id(const SSL *ssl, unsigned char *id,
|
||||
unsigned int *id_len)
|
||||
{
|
||||
unsigned int count = 0;
|
||||
do {
|
||||
RAND_pseudo_bytes(id, *id_len);
|
||||
/* Prefix the session_id with the required prefix. NB: If our
|
||||
* prefix is too long, clip it - but there will be worse effects
|
||||
* anyway, eg. the server could only possibly create 1 session
|
||||
* ID (ie. the prefix!) so all future session negotiations will
|
||||
* fail due to conflicts. */
|
||||
memcpy(id, session_id_prefix,
|
||||
(strlen(session_id_prefix) < *id_len) ?
|
||||
strlen(session_id_prefix) : *id_len);
|
||||
}
|
||||
while(SSL_has_matching_session_id(ssl, id, *id_len) &&
|
||||
(++count < MAX_SESSION_ID_ATTEMPTS));
|
||||
if(count >= MAX_SESSION_ID_ATTEMPTS)
|
||||
return 0;
|
||||
return 1;
|
||||
}
|
||||
|
||||
@@ -62,11 +62,13 @@
|
||||
#include <errno.h>
|
||||
#include <signal.h>
|
||||
|
||||
#include <openssl/e_os2.h>
|
||||
|
||||
/* With IPv6, it looks like Digital has mixed up the proper order of
|
||||
recursive header file inclusion, resulting in the compiler complaining
|
||||
that u_int isn't defined, but only if _POSIX_C_SOURCE is defined, which
|
||||
is needed to have fileno() declared correctly... So let's define u_int */
|
||||
#if defined(VMS) && defined(__DECC) && !defined(__U_INT)
|
||||
#if defined(OPENSSL_SYS_VMS_DECC) && !defined(__U_INT)
|
||||
#define __U_INT
|
||||
typedef unsigned int u_int;
|
||||
#endif
|
||||
@@ -80,7 +82,7 @@ typedef unsigned int u_int;
|
||||
#include <openssl/ssl.h>
|
||||
|
||||
static struct hostent *GetHostByName(char *name);
|
||||
#ifdef WINDOWS
|
||||
#ifdef OPENSSL_SYS_WINDOWS
|
||||
static void sock_cleanup(void);
|
||||
#endif
|
||||
static int sock_init(void);
|
||||
@@ -90,17 +92,17 @@ static int init_server_long(int *sock, int port,char *ip);
|
||||
static int do_accept(int acc_sock, int *sock, char **host);
|
||||
static int host_ip(char *str, unsigned char ip[4]);
|
||||
|
||||
#ifdef WIN16
|
||||
#ifdef OPENSSL_SYS_WIN16
|
||||
#define SOCKET_PROTOCOL 0 /* more microsoft stupidity */
|
||||
#else
|
||||
#define SOCKET_PROTOCOL IPPROTO_TCP
|
||||
#endif
|
||||
|
||||
#ifdef WINDOWS
|
||||
#ifdef OPENSSL_SYS_WINDOWS
|
||||
static struct WSAData wsa_state;
|
||||
static int wsa_init_done=0;
|
||||
|
||||
#ifdef WIN16
|
||||
#ifdef OPENSSL_SYS_WIN16
|
||||
static HWND topWnd=0;
|
||||
static FARPROC lpTopWndProc=NULL;
|
||||
static FARPROC lpTopHookProc=NULL;
|
||||
@@ -129,10 +131,10 @@ static BOOL CALLBACK enumproc(HWND hwnd,LPARAM lParam)
|
||||
return(FALSE);
|
||||
}
|
||||
|
||||
#endif /* WIN32 */
|
||||
#endif /* WINDOWS */
|
||||
#endif /* OPENSSL_SYS_WIN32 */
|
||||
#endif /* OPENSSL_SYS_WINDOWS */
|
||||
|
||||
#ifdef WINDOWS
|
||||
#ifdef OPENSSL_SYS_WINDOWS
|
||||
static void sock_cleanup(void)
|
||||
{
|
||||
if (wsa_init_done)
|
||||
@@ -146,7 +148,7 @@ static void sock_cleanup(void)
|
||||
|
||||
static int sock_init(void)
|
||||
{
|
||||
#ifdef WINDOWS
|
||||
#ifdef OPENSSL_SYS_WINDOWS
|
||||
if (!wsa_init_done)
|
||||
{
|
||||
int err;
|
||||
@@ -163,15 +165,15 @@ static int sock_init(void)
|
||||
return(0);
|
||||
}
|
||||
|
||||
#ifdef WIN16
|
||||
#ifdef OPENSSL_SYS_WIN16
|
||||
EnumTaskWindows(GetCurrentTask(),enumproc,0L);
|
||||
lpTopWndProc=(FARPROC)GetWindowLong(topWnd,GWL_WNDPROC);
|
||||
lpTopHookProc=MakeProcInstance((FARPROC)topHookProc,_hInstance);
|
||||
|
||||
SetWindowLong(topWnd,GWL_WNDPROC,(LONG)lpTopHookProc);
|
||||
#endif /* WIN16 */
|
||||
#endif /* OPENSSL_SYS_WIN16 */
|
||||
}
|
||||
#endif /* WINDOWS */
|
||||
#endif /* OPENSSL_SYS_WINDOWS */
|
||||
return(1);
|
||||
}
|
||||
|
||||
@@ -209,7 +211,7 @@ static int init_client_ip(int *sock, unsigned char ip[4], int port)
|
||||
s=socket(AF_INET,SOCK_STREAM,SOCKET_PROTOCOL);
|
||||
if (s == INVALID_SOCKET) { perror("socket"); return(0); }
|
||||
|
||||
#ifndef MPE
|
||||
#ifndef OPENSSL_SYS_MPE
|
||||
i=0;
|
||||
i=setsockopt(s,SOL_SOCKET,SO_KEEPALIVE,(char *)&i,sizeof(i));
|
||||
if (i < 0) { perror("keepalive"); return(0); }
|
||||
@@ -285,7 +287,7 @@ static int init_server_long(int *sock, int port, char *ip)
|
||||
#endif
|
||||
if (bind(s,(struct sockaddr *)&server,sizeof(server)) == -1)
|
||||
{
|
||||
#ifndef WINDOWS
|
||||
#ifndef OPENSSL_SYS_WINDOWS
|
||||
perror("bind");
|
||||
#endif
|
||||
goto err;
|
||||
@@ -318,7 +320,7 @@ static int do_accept(int acc_sock, int *sock, char **host)
|
||||
|
||||
if (!sock_init()) return(0);
|
||||
|
||||
#ifndef WINDOWS
|
||||
#ifndef OPENSSL_SYS_WINDOWS
|
||||
redoit:
|
||||
#endif
|
||||
|
||||
@@ -332,7 +334,7 @@ redoit:
|
||||
ret=accept(acc_sock,(struct sockaddr *)&from,(void *)&len);
|
||||
if (ret == INVALID_SOCKET)
|
||||
{
|
||||
#ifdef WINDOWS
|
||||
#ifdef OPENSSL_SYS_WINDOWS
|
||||
i=WSAGetLastError();
|
||||
BIO_printf(bio_err,"accept error %d\n",i);
|
||||
#else
|
||||
|
||||
@@ -67,22 +67,25 @@
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
|
||||
#ifdef NO_STDIO
|
||||
#define USE_SOCKETS
|
||||
#include "apps.h"
|
||||
#ifdef OPENSSL_NO_STDIO
|
||||
#define APPS_WIN16
|
||||
#endif
|
||||
#define USE_SOCKETS
|
||||
#include <openssl/x509.h>
|
||||
#include <openssl/ssl.h>
|
||||
#include <openssl/pem.h>
|
||||
#include "apps.h"
|
||||
#include "s_apps.h"
|
||||
#include <openssl/err.h>
|
||||
#ifdef WIN32_STUFF
|
||||
#include "winmain.h"
|
||||
#include "wintext.h"
|
||||
#endif
|
||||
#if !defined(OPENSSL_SYS_MSDOS)
|
||||
#include OPENSSL_UNISTD
|
||||
#endif
|
||||
|
||||
#if !defined(MSDOS) && (!defined(VMS) || defined(__DECC))
|
||||
#if !defined(OPENSSL_SYS_MSDOS) && !defined(OPENSSL_SYS_VXWORKS) && (!defined(OPENSSL_SYS_VMS) || defined(__DECC)) && !defined(OPENSSL_SYS_MACOSX)
|
||||
#define TIMES
|
||||
#endif
|
||||
|
||||
@@ -98,11 +101,11 @@
|
||||
The __TMS macro will show if it was. If it wasn't defined, we should
|
||||
undefine TIMES, since that tells the rest of the program how things
|
||||
should be handled. -- Richard Levitte */
|
||||
#if defined(VMS) && defined(__DECC) && !defined(__TMS)
|
||||
#if defined(OPENSSL_SYS_VMS_DECC) && !defined(__TMS)
|
||||
#undef TIMES
|
||||
#endif
|
||||
|
||||
#ifndef TIMES
|
||||
#if !defined(TIMES) && !defined(OPENSSL_SYS_VXWORKS)
|
||||
#include <sys/timeb.h>
|
||||
#endif
|
||||
|
||||
@@ -119,11 +122,19 @@
|
||||
/* The following if from times(3) man page. It may need to be changed
|
||||
*/
|
||||
#ifndef HZ
|
||||
#ifndef CLK_TCK
|
||||
#define HZ 100.0
|
||||
#else /* CLK_TCK */
|
||||
#define HZ ((double)CLK_TCK)
|
||||
#endif
|
||||
# ifdef _SC_CLK_TCK
|
||||
# define HZ ((double)sysconf(_SC_CLK_TCK))
|
||||
# else
|
||||
# ifndef CLK_TCK
|
||||
# ifndef _BSD_CLK_TCK_ /* FreeBSD hack */
|
||||
# define HZ 100.0
|
||||
# else /* _BSD_CLK_TCK_ */
|
||||
# define HZ ((double)_BSD_CLK_TCK_)
|
||||
# endif
|
||||
# else /* CLK_TCK */
|
||||
# define HZ ((double)CLK_TCK)
|
||||
# endif
|
||||
# endif
|
||||
#endif
|
||||
|
||||
#undef PROG
|
||||
@@ -139,6 +150,8 @@
|
||||
#undef BUFSIZZ
|
||||
#define BUFSIZZ 1024*10
|
||||
|
||||
#undef min
|
||||
#undef max
|
||||
#define min(a,b) (((a) < (b)) ? (a) : (b))
|
||||
#define max(a,b) (((a) > (b)) ? (a) : (b))
|
||||
|
||||
@@ -174,7 +187,7 @@ static int perform=0;
|
||||
#ifdef FIONBIO
|
||||
static int t_nbio=0;
|
||||
#endif
|
||||
#ifdef WIN32
|
||||
#ifdef OPENSSL_SYS_WIN32
|
||||
static int exitNow = 0; /* Set when it's time to exit main */
|
||||
#endif
|
||||
|
||||
@@ -198,7 +211,7 @@ static void s_time_init(void)
|
||||
#ifdef FIONBIO
|
||||
t_nbio=0;
|
||||
#endif
|
||||
#ifdef WIN32
|
||||
#ifdef OPENSSL_SYS_WIN32
|
||||
exitNow = 0; /* Set when it's time to exit main */
|
||||
#endif
|
||||
}
|
||||
@@ -314,11 +327,11 @@ static int parseArgs(int argc, char **argv)
|
||||
}
|
||||
else if(strcmp(*argv,"-bugs") == 0)
|
||||
st_bugs=1;
|
||||
#ifndef NO_SSL2
|
||||
#ifndef OPENSSL_NO_SSL2
|
||||
else if(strcmp(*argv,"-ssl2") == 0)
|
||||
s_time_meth=SSLv2_client_method();
|
||||
#endif
|
||||
#ifndef NO_SSL3
|
||||
#ifndef OPENSSL_NO_SSL3
|
||||
else if(strcmp(*argv,"-ssl3") == 0)
|
||||
s_time_meth=SSLv3_client_method();
|
||||
#endif
|
||||
@@ -368,6 +381,22 @@ static double tm_Time_F(int s)
|
||||
ret=((double)(tend.tms_utime-tstart.tms_utime))/HZ;
|
||||
return((ret == 0.0)?1e-6:ret);
|
||||
}
|
||||
#elif defined(OPENSSL_SYS_VXWORKS)
|
||||
{
|
||||
static unsigned long tick_start, tick_end;
|
||||
|
||||
if( s == START )
|
||||
{
|
||||
tick_start = tickGet();
|
||||
return 0;
|
||||
}
|
||||
else
|
||||
{
|
||||
tick_end = tickGet();
|
||||
ret = (double)(tick_end - tick_start) / (double)sysClkRateGet();
|
||||
return((ret == 0.0)?1e-6:ret);
|
||||
}
|
||||
}
|
||||
#else /* !times() */
|
||||
static struct timeb tstart,tend;
|
||||
long i;
|
||||
@@ -406,11 +435,11 @@ int MAIN(int argc, char **argv)
|
||||
if (bio_err == NULL)
|
||||
bio_err=BIO_new_fp(stderr,BIO_NOCLOSE);
|
||||
|
||||
#if !defined(NO_SSL2) && !defined(NO_SSL3)
|
||||
#if !defined(OPENSSL_NO_SSL2) && !defined(OPENSSL_NO_SSL3)
|
||||
s_time_meth=SSLv23_client_method();
|
||||
#elif !defined(NO_SSL3)
|
||||
#elif !defined(OPENSSL_NO_SSL3)
|
||||
s_time_meth=SSLv3_client_method();
|
||||
#elif !defined(NO_SSL2)
|
||||
#elif !defined(OPENSSL_NO_SSL2)
|
||||
s_time_meth=SSLv2_client_method();
|
||||
#endif
|
||||
|
||||
@@ -443,7 +472,6 @@ int MAIN(int argc, char **argv)
|
||||
|
||||
if (tm_cipher == NULL ) {
|
||||
fprintf( stderr, "No CIPHER specified\n" );
|
||||
/* EXIT(1); */
|
||||
}
|
||||
|
||||
if (!(perform & 1)) goto next;
|
||||
@@ -610,6 +638,7 @@ end:
|
||||
SSL_CTX_free(tm_ctx);
|
||||
tm_ctx=NULL;
|
||||
}
|
||||
apps_shutdown();
|
||||
EXIT(ret);
|
||||
}
|
||||
|
||||
|
||||
@@ -156,7 +156,7 @@ int MAIN(int argc, char **argv)
|
||||
{
|
||||
bad:
|
||||
for (pp=sess_id_usage; (*pp != NULL); pp++)
|
||||
BIO_printf(bio_err,*pp);
|
||||
BIO_printf(bio_err,"%s",*pp);
|
||||
goto end;
|
||||
}
|
||||
|
||||
@@ -208,7 +208,7 @@ bad:
|
||||
if (outfile == NULL)
|
||||
{
|
||||
BIO_set_fp(out,stdout,BIO_NOCLOSE);
|
||||
#ifdef VMS
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
{
|
||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||
out = BIO_push(tmpbio, out);
|
||||
@@ -272,6 +272,7 @@ bad:
|
||||
end:
|
||||
if (out != NULL) BIO_free_all(out);
|
||||
if (x != NULL) SSL_SESSION_free(x);
|
||||
apps_shutdown();
|
||||
EXIT(ret);
|
||||
}
|
||||
|
||||
|
||||
142
apps/smime.c
142
apps/smime.c
@@ -64,11 +64,9 @@
|
||||
#include <openssl/crypto.h>
|
||||
#include <openssl/pem.h>
|
||||
#include <openssl/err.h>
|
||||
#include <openssl/engine.h>
|
||||
|
||||
#undef PROG
|
||||
#define PROG smime_main
|
||||
static X509_STORE *setup_verify(char *CAfile, char *CApath);
|
||||
static int save_certs(char *signerfile, STACK_OF(X509) *signers);
|
||||
|
||||
#define SMIME_OP 0x10
|
||||
@@ -90,7 +88,7 @@ int MAIN(int argc, char **argv)
|
||||
char *infile = NULL, *outfile = NULL;
|
||||
char *signerfile = NULL, *recipfile = NULL;
|
||||
char *certfile = NULL, *keyfile = NULL, *contfile=NULL;
|
||||
EVP_CIPHER *cipher = NULL;
|
||||
const EVP_CIPHER *cipher = NULL;
|
||||
PKCS7 *p7 = NULL;
|
||||
X509_STORE *store = NULL;
|
||||
X509 *cert = NULL, *recip = NULL, *signer = NULL;
|
||||
@@ -98,37 +96,55 @@ int MAIN(int argc, char **argv)
|
||||
STACK_OF(X509) *encerts = NULL, *other = NULL;
|
||||
BIO *in = NULL, *out = NULL, *indata = NULL;
|
||||
int badarg = 0;
|
||||
int flags = PKCS7_DETACHED;
|
||||
int flags = PKCS7_DETACHED, store_flags = 0;
|
||||
char *to = NULL, *from = NULL, *subject = NULL;
|
||||
char *CAfile = NULL, *CApath = NULL;
|
||||
char *passargin = NULL, *passin = NULL;
|
||||
char *inrand = NULL;
|
||||
int need_rand = 0;
|
||||
int informat = FORMAT_SMIME, outformat = FORMAT_SMIME;
|
||||
int keyform = FORMAT_PEM;
|
||||
char *engine=NULL;
|
||||
|
||||
args = argv + 1;
|
||||
ret = 1;
|
||||
|
||||
apps_startup();
|
||||
|
||||
if (bio_err == NULL)
|
||||
if ((bio_err = BIO_new(BIO_s_file())) != NULL)
|
||||
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE|BIO_FP_TEXT);
|
||||
|
||||
if (!load_config(bio_err, NULL))
|
||||
goto end;
|
||||
|
||||
while (!badarg && *args && *args[0] == '-') {
|
||||
if (!strcmp (*args, "-encrypt")) operation = SMIME_ENCRYPT;
|
||||
else if (!strcmp (*args, "-decrypt")) operation = SMIME_DECRYPT;
|
||||
else if (!strcmp (*args, "-sign")) operation = SMIME_SIGN;
|
||||
else if (!strcmp (*args, "-verify")) operation = SMIME_VERIFY;
|
||||
else if (!strcmp (*args, "-pk7out")) operation = SMIME_PK7OUT;
|
||||
#ifndef NO_DES
|
||||
#ifndef OPENSSL_NO_DES
|
||||
else if (!strcmp (*args, "-des3"))
|
||||
cipher = EVP_des_ede3_cbc();
|
||||
else if (!strcmp (*args, "-des"))
|
||||
cipher = EVP_des_cbc();
|
||||
#endif
|
||||
#ifndef NO_RC2
|
||||
#ifndef OPENSSL_NO_RC2
|
||||
else if (!strcmp (*args, "-rc2-40"))
|
||||
cipher = EVP_rc2_40_cbc();
|
||||
else if (!strcmp (*args, "-rc2-128"))
|
||||
cipher = EVP_rc2_cbc();
|
||||
else if (!strcmp (*args, "-rc2-64"))
|
||||
cipher = EVP_rc2_64_cbc();
|
||||
#endif
|
||||
#ifndef OPENSSL_NO_AES
|
||||
else if (!strcmp(*args,"-aes128"))
|
||||
cipher = EVP_aes_128_cbc();
|
||||
else if (!strcmp(*args,"-aes192"))
|
||||
cipher = EVP_aes_192_cbc();
|
||||
else if (!strcmp(*args,"-aes256"))
|
||||
cipher = EVP_aes_256_cbc();
|
||||
#endif
|
||||
else if (!strcmp (*args, "-text"))
|
||||
flags |= PKCS7_TEXT;
|
||||
@@ -150,6 +166,10 @@ int MAIN(int argc, char **argv)
|
||||
flags |= PKCS7_BINARY;
|
||||
else if (!strcmp (*args, "-nosigs"))
|
||||
flags |= PKCS7_NOSIGS;
|
||||
else if (!strcmp (*args, "-crl_check"))
|
||||
store_flags |= X509_V_FLAG_CRL_CHECK;
|
||||
else if (!strcmp (*args, "-crl_check_all"))
|
||||
store_flags |= X509_V_FLAG_CRL_CHECK|X509_V_FLAG_CRL_CHECK_ALL;
|
||||
else if (!strcmp(*args,"-rand")) {
|
||||
if (args[1]) {
|
||||
args++;
|
||||
@@ -196,6 +216,11 @@ int MAIN(int argc, char **argv)
|
||||
args++;
|
||||
keyfile = *args;
|
||||
} else badarg = 1;
|
||||
} else if (!strcmp (*args, "-keyform")) {
|
||||
if (args[1]) {
|
||||
args++;
|
||||
keyform = str2fmt(*args);
|
||||
} else badarg = 1;
|
||||
} else if (!strcmp (*args, "-certfile")) {
|
||||
if (args[1]) {
|
||||
args++;
|
||||
@@ -267,14 +292,18 @@ int MAIN(int argc, char **argv)
|
||||
BIO_printf (bio_err, "-sign sign message\n");
|
||||
BIO_printf (bio_err, "-verify verify signed message\n");
|
||||
BIO_printf (bio_err, "-pk7out output PKCS#7 structure\n");
|
||||
#ifndef NO_DES
|
||||
#ifndef OPENSSL_NO_DES
|
||||
BIO_printf (bio_err, "-des3 encrypt with triple DES\n");
|
||||
BIO_printf (bio_err, "-des encrypt with DES\n");
|
||||
#endif
|
||||
#ifndef NO_RC2
|
||||
#ifndef OPENSSL_NO_RC2
|
||||
BIO_printf (bio_err, "-rc2-40 encrypt with RC2-40 (default)\n");
|
||||
BIO_printf (bio_err, "-rc2-64 encrypt with RC2-64\n");
|
||||
BIO_printf (bio_err, "-rc2-128 encrypt with RC2-128\n");
|
||||
#endif
|
||||
#ifndef OPENSSL_NO_AES
|
||||
BIO_printf (bio_err, "-aes128, -aes192, -aes256\n");
|
||||
BIO_printf (bio_err, " encrypt PEM output with cbc aes\n");
|
||||
#endif
|
||||
BIO_printf (bio_err, "-nointern don't search certificates in message for signer\n");
|
||||
BIO_printf (bio_err, "-nosigs don't verify message signature\n");
|
||||
@@ -289,6 +318,7 @@ int MAIN(int argc, char **argv)
|
||||
BIO_printf (bio_err, "-in file input file\n");
|
||||
BIO_printf (bio_err, "-inform arg input format SMIME (default), PEM or DER\n");
|
||||
BIO_printf (bio_err, "-inkey file input private key (if not signer or recipient)\n");
|
||||
BIO_printf (bio_err, "-keyform arg input private key format (PEM or ENGINE)\n");
|
||||
BIO_printf (bio_err, "-out file output file\n");
|
||||
BIO_printf (bio_err, "-outform arg output format SMIME (default), PEM or DER\n");
|
||||
BIO_printf (bio_err, "-content file supply or override content for detached signature\n");
|
||||
@@ -298,7 +328,10 @@ int MAIN(int argc, char **argv)
|
||||
BIO_printf (bio_err, "-text include or delete text MIME headers\n");
|
||||
BIO_printf (bio_err, "-CApath dir trusted certificates directory\n");
|
||||
BIO_printf (bio_err, "-CAfile file trusted certificates file\n");
|
||||
BIO_printf (bio_err, "-crl_check check revocation status of signer's certificate using CRLs\n");
|
||||
BIO_printf (bio_err, "-crl_check_all check revocation status of signer's certificate chain using CRLs\n");
|
||||
BIO_printf (bio_err, "-engine e use engine e, possibly a hardware device.\n");
|
||||
BIO_printf (bio_err, "-passin arg input file pass phrase source\n");
|
||||
BIO_printf(bio_err, "-rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
|
||||
BIO_printf(bio_err, " load the file (or the files in the directory) into\n");
|
||||
BIO_printf(bio_err, " the random number generator\n");
|
||||
@@ -306,23 +339,7 @@ int MAIN(int argc, char **argv)
|
||||
goto end;
|
||||
}
|
||||
|
||||
if (engine != NULL)
|
||||
{
|
||||
if((e = ENGINE_by_id(engine)) == NULL)
|
||||
{
|
||||
BIO_printf(bio_err,"invalid engine \"%s\"\n",
|
||||
engine);
|
||||
goto end;
|
||||
}
|
||||
if(!ENGINE_set_default(e, ENGINE_METHOD_ALL))
|
||||
{
|
||||
BIO_printf(bio_err,"can't use that engine\n");
|
||||
goto end;
|
||||
}
|
||||
BIO_printf(bio_err,"engine \"%s\" set.\n", engine);
|
||||
/* Free our "structural" reference. */
|
||||
ENGINE_free(e);
|
||||
}
|
||||
e = setup_engine(bio_err, engine, 0);
|
||||
|
||||
if(!app_passwd(bio_err, passargin, NULL, &passin, NULL)) {
|
||||
BIO_printf(bio_err, "Error getting password\n");
|
||||
@@ -350,7 +367,7 @@ int MAIN(int argc, char **argv)
|
||||
|
||||
if(operation == SMIME_ENCRYPT) {
|
||||
if (!cipher) {
|
||||
#ifndef NO_RC2
|
||||
#ifndef OPENSSL_NO_RC2
|
||||
cipher = EVP_rc2_40_cbc();
|
||||
#else
|
||||
BIO_printf(bio_err, "No cipher selected\n");
|
||||
@@ -359,8 +376,11 @@ int MAIN(int argc, char **argv)
|
||||
}
|
||||
encerts = sk_X509_new_null();
|
||||
while (*args) {
|
||||
if(!(cert = load_cert(bio_err,*args,FORMAT_PEM))) {
|
||||
if(!(cert = load_cert(bio_err,*args,FORMAT_PEM,
|
||||
NULL, e, "recipient certificate file"))) {
|
||||
#if 0 /* An appropriate message is already printed */
|
||||
BIO_printf(bio_err, "Can't read recipient certificate file %s\n", *args);
|
||||
#endif
|
||||
goto end;
|
||||
}
|
||||
sk_X509_push(encerts, cert);
|
||||
@@ -370,23 +390,32 @@ int MAIN(int argc, char **argv)
|
||||
}
|
||||
|
||||
if(signerfile && (operation == SMIME_SIGN)) {
|
||||
if(!(signer = load_cert(bio_err,signerfile,FORMAT_PEM))) {
|
||||
if(!(signer = load_cert(bio_err,signerfile,FORMAT_PEM, NULL,
|
||||
e, "signer certificate"))) {
|
||||
#if 0 /* An appropri message has already been printed */
|
||||
BIO_printf(bio_err, "Can't read signer certificate file %s\n", signerfile);
|
||||
#endif
|
||||
goto end;
|
||||
}
|
||||
}
|
||||
|
||||
if(certfile) {
|
||||
if(!(other = load_certs(bio_err,certfile,FORMAT_PEM))) {
|
||||
if(!(other = load_certs(bio_err,certfile,FORMAT_PEM, NULL,
|
||||
e, "certificate file"))) {
|
||||
#if 0 /* An appropriate message has already been printed */
|
||||
BIO_printf(bio_err, "Can't read certificate file %s\n", certfile);
|
||||
#endif
|
||||
ERR_print_errors(bio_err);
|
||||
goto end;
|
||||
}
|
||||
}
|
||||
|
||||
if(recipfile && (operation == SMIME_DECRYPT)) {
|
||||
if(!(recip = load_cert(bio_err,recipfile,FORMAT_PEM))) {
|
||||
if(!(recip = load_cert(bio_err,recipfile,FORMAT_PEM,NULL,
|
||||
e, "recipient certificate file"))) {
|
||||
#if 0 /* An appropriate message has alrady been printed */
|
||||
BIO_printf(bio_err, "Can't read recipient certificate file %s\n", recipfile);
|
||||
#endif
|
||||
ERR_print_errors(bio_err);
|
||||
goto end;
|
||||
}
|
||||
@@ -399,11 +428,11 @@ int MAIN(int argc, char **argv)
|
||||
} else keyfile = NULL;
|
||||
|
||||
if(keyfile) {
|
||||
if(!(key = load_key(bio_err,keyfile, FORMAT_PEM, passin, NULL))) {
|
||||
BIO_printf(bio_err, "Can't read recipient certificate file %s\n", keyfile);
|
||||
ERR_print_errors(bio_err);
|
||||
key = load_key(bio_err, keyfile, keyform, passin, e,
|
||||
"signing key file");
|
||||
if (!key) {
|
||||
goto end;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
if (infile) {
|
||||
@@ -422,7 +451,7 @@ int MAIN(int argc, char **argv)
|
||||
}
|
||||
} else {
|
||||
out = BIO_new_fp(stdout, BIO_NOCLOSE);
|
||||
#ifdef VMS
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
{
|
||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||
out = BIO_push(tmpbio, out);
|
||||
@@ -431,16 +460,21 @@ int MAIN(int argc, char **argv)
|
||||
}
|
||||
|
||||
if(operation == SMIME_VERIFY) {
|
||||
if(!(store = setup_verify(CAfile, CApath))) goto end;
|
||||
if(!(store = setup_verify(bio_err, CAfile, CApath))) goto end;
|
||||
X509_STORE_set_flags(store, store_flags);
|
||||
}
|
||||
|
||||
|
||||
ret = 3;
|
||||
|
||||
if(operation == SMIME_ENCRYPT) {
|
||||
p7 = PKCS7_encrypt(encerts, in, cipher, flags);
|
||||
} else if(operation == SMIME_SIGN) {
|
||||
p7 = PKCS7_sign(signer, key, other, in, flags);
|
||||
BIO_reset(in);
|
||||
if (BIO_reset(in) != 0 && (flags & PKCS7_DETACHED)) {
|
||||
BIO_printf(bio_err, "Can't rewind input file\n");
|
||||
goto end;
|
||||
}
|
||||
} else {
|
||||
if(informat == FORMAT_SMIME)
|
||||
p7 = SMIME_read_PKCS7(in, &indata);
|
||||
@@ -480,9 +514,9 @@ int MAIN(int argc, char **argv)
|
||||
} else if(operation == SMIME_VERIFY) {
|
||||
STACK_OF(X509) *signers;
|
||||
if(PKCS7_verify(p7, other, store, indata, out, flags)) {
|
||||
BIO_printf(bio_err, "Verification Successful\n");
|
||||
BIO_printf(bio_err, "Verification successful\n");
|
||||
} else {
|
||||
BIO_printf(bio_err, "Verification Failure\n");
|
||||
BIO_printf(bio_err, "Verification failure\n");
|
||||
goto end;
|
||||
}
|
||||
signers = PKCS7_get0_signers(p7, other, flags);
|
||||
@@ -530,36 +564,6 @@ end:
|
||||
return (ret);
|
||||
}
|
||||
|
||||
static X509_STORE *setup_verify(char *CAfile, char *CApath)
|
||||
{
|
||||
X509_STORE *store;
|
||||
X509_LOOKUP *lookup;
|
||||
if(!(store = X509_STORE_new())) goto end;
|
||||
lookup=X509_STORE_add_lookup(store,X509_LOOKUP_file());
|
||||
if (lookup == NULL) goto end;
|
||||
if (CAfile) {
|
||||
if(!X509_LOOKUP_load_file(lookup,CAfile,X509_FILETYPE_PEM)) {
|
||||
BIO_printf(bio_err, "Error loading file %s\n", CAfile);
|
||||
goto end;
|
||||
}
|
||||
} else X509_LOOKUP_load_file(lookup,NULL,X509_FILETYPE_DEFAULT);
|
||||
|
||||
lookup=X509_STORE_add_lookup(store,X509_LOOKUP_hash_dir());
|
||||
if (lookup == NULL) goto end;
|
||||
if (CApath) {
|
||||
if(!X509_LOOKUP_add_dir(lookup,CApath,X509_FILETYPE_PEM)) {
|
||||
BIO_printf(bio_err, "Error loading directory %s\n", CApath);
|
||||
goto end;
|
||||
}
|
||||
} else X509_LOOKUP_add_dir(lookup,NULL,X509_FILETYPE_DEFAULT);
|
||||
|
||||
ERR_clear_error();
|
||||
return store;
|
||||
end:
|
||||
X509_STORE_free(store);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
static int save_certs(char *signerfile, STACK_OF(X509) *signers)
|
||||
{
|
||||
int i;
|
||||
|
||||
1134
apps/speed.c
1134
apps/speed.c
File diff suppressed because it is too large
Load Diff
54
apps/spkac.c
54
apps/spkac.c
@@ -69,7 +69,6 @@
|
||||
#include <openssl/lhash.h>
|
||||
#include <openssl/x509.h>
|
||||
#include <openssl/pem.h>
|
||||
#include <openssl/engine.h>
|
||||
|
||||
#undef PROG
|
||||
#define PROG spkac_main
|
||||
@@ -84,13 +83,13 @@ int MAIN(int argc, char **argv)
|
||||
{
|
||||
ENGINE *e = NULL;
|
||||
int i,badops=0, ret = 1;
|
||||
BIO *in = NULL,*out = NULL, *key = NULL;
|
||||
BIO *in = NULL,*out = NULL;
|
||||
int verify=0,noout=0,pubkey=0;
|
||||
char *infile = NULL,*outfile = NULL,*prog;
|
||||
char *passargin = NULL, *passin = NULL;
|
||||
char *spkac = "SPKAC", *spksect = "default", *spkstr = NULL;
|
||||
char *challenge = NULL, *keyfile = NULL;
|
||||
LHASH *conf = NULL;
|
||||
CONF *conf = NULL;
|
||||
NETSCAPE_SPKI *spki = NULL;
|
||||
EVP_PKEY *pkey = NULL;
|
||||
char *engine=NULL;
|
||||
@@ -99,6 +98,9 @@ int MAIN(int argc, char **argv)
|
||||
|
||||
if (!bio_err) bio_err = BIO_new_fp(stderr, BIO_NOCLOSE);
|
||||
|
||||
if (!load_config(bio_err, NULL))
|
||||
goto end;
|
||||
|
||||
prog=argv[0];
|
||||
argc--;
|
||||
argv++;
|
||||
@@ -179,36 +181,13 @@ bad:
|
||||
goto end;
|
||||
}
|
||||
|
||||
if (engine != NULL)
|
||||
{
|
||||
if((e = ENGINE_by_id(engine)) == NULL)
|
||||
{
|
||||
BIO_printf(bio_err,"invalid engine \"%s\"\n",
|
||||
engine);
|
||||
goto end;
|
||||
}
|
||||
if(!ENGINE_set_default(e, ENGINE_METHOD_ALL))
|
||||
{
|
||||
BIO_printf(bio_err,"can't use that engine\n");
|
||||
goto end;
|
||||
}
|
||||
BIO_printf(bio_err,"engine \"%s\" set.\n", engine);
|
||||
/* Free our "structural" reference. */
|
||||
ENGINE_free(e);
|
||||
}
|
||||
e = setup_engine(bio_err, engine, 0);
|
||||
|
||||
if(keyfile) {
|
||||
if(strcmp(keyfile, "-")) key = BIO_new_file(keyfile, "r");
|
||||
else key = BIO_new_fp(stdin, BIO_NOCLOSE);
|
||||
if(!key) {
|
||||
BIO_printf(bio_err, "Error opening key file\n");
|
||||
ERR_print_errors(bio_err);
|
||||
goto end;
|
||||
}
|
||||
pkey = PEM_read_bio_PrivateKey(key, NULL, NULL, passin);
|
||||
pkey = load_key(bio_err,
|
||||
strcmp(keyfile, "-") ? keyfile : NULL,
|
||||
FORMAT_PEM, passin, e, "private key");
|
||||
if(!pkey) {
|
||||
BIO_printf(bio_err, "Error reading private key\n");
|
||||
ERR_print_errors(bio_err);
|
||||
goto end;
|
||||
}
|
||||
spki = NETSCAPE_SPKI_new();
|
||||
@@ -221,7 +200,7 @@ bad:
|
||||
if (outfile) out = BIO_new_file(outfile, "w");
|
||||
else {
|
||||
out = BIO_new_fp(stdout, BIO_NOCLOSE);
|
||||
#ifdef VMS
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
{
|
||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||
out = BIO_push(tmpbio, out);
|
||||
@@ -251,15 +230,16 @@ bad:
|
||||
goto end;
|
||||
}
|
||||
|
||||
conf = CONF_load_bio(NULL, in, NULL);
|
||||
conf = NCONF_new(NULL);
|
||||
i = NCONF_load_bio(conf, in, NULL);
|
||||
|
||||
if(!conf) {
|
||||
if(!i) {
|
||||
BIO_printf(bio_err, "Error parsing config file\n");
|
||||
ERR_print_errors(bio_err);
|
||||
goto end;
|
||||
}
|
||||
|
||||
spkstr = CONF_get_string(conf, spksect, spkac);
|
||||
spkstr = NCONF_get_string(conf, spksect, spkac);
|
||||
|
||||
if(!spkstr) {
|
||||
BIO_printf(bio_err, "Can't find SPKAC called \"%s\"\n", spkac);
|
||||
@@ -278,7 +258,7 @@ bad:
|
||||
if (outfile) out = BIO_new_file(outfile, "w");
|
||||
else {
|
||||
out = BIO_new_fp(stdout, BIO_NOCLOSE);
|
||||
#ifdef VMS
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
{
|
||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||
out = BIO_push(tmpbio, out);
|
||||
@@ -308,12 +288,12 @@ bad:
|
||||
ret = 0;
|
||||
|
||||
end:
|
||||
CONF_free(conf);
|
||||
NCONF_free(conf);
|
||||
NETSCAPE_SPKI_free(spki);
|
||||
BIO_free(in);
|
||||
BIO_free_all(out);
|
||||
BIO_free(key);
|
||||
EVP_PKEY_free(pkey);
|
||||
if(passin) OPENSSL_free(passin);
|
||||
apps_shutdown();
|
||||
EXIT(ret);
|
||||
}
|
||||
|
||||
581
apps/term_sock.c
Normal file
581
apps/term_sock.c
Normal file
@@ -0,0 +1,581 @@
|
||||
#ifdef VMS
|
||||
|
||||
#include <sys/types.h>
|
||||
#include <sys/socket.h>
|
||||
#include <netinet/in.h>
|
||||
#include <inet.h>
|
||||
#include <stdio.h>
|
||||
#include <string.h>
|
||||
#include <unistd.h>
|
||||
#include <errno.h>
|
||||
#include <starlet.h>
|
||||
#include <iodef.h>
|
||||
#ifdef __alpha
|
||||
#include <iosbdef.h>
|
||||
#else
|
||||
typedef struct _iosb { /* Copied from IOSBDEF.H for Alpha */
|
||||
#pragma __nomember_alignment
|
||||
__union {
|
||||
__struct {
|
||||
unsigned short int iosb$w_status; /* Final I/O status */
|
||||
__union {
|
||||
__struct { /* 16-bit byte count variant */
|
||||
unsigned short int iosb$w_bcnt; /* 16-bit byte count */
|
||||
__union {
|
||||
unsigned int iosb$l_dev_depend; /* 32-bit device dependent info */
|
||||
unsigned int iosb$l_pid; /* 32-bit pid */
|
||||
} iosb$r_l;
|
||||
} iosb$r_bcnt_16;
|
||||
__struct { /* 32-bit byte count variant */
|
||||
unsigned int iosb$l_bcnt; /* 32-bit byte count (unaligned) */
|
||||
unsigned short int iosb$w_dev_depend_high; /* 16-bit device dependent info */
|
||||
} iosb$r_bcnt_32;
|
||||
} iosb$r_devdepend;
|
||||
} iosb$r_io_64;
|
||||
__struct {
|
||||
__union {
|
||||
unsigned int iosb$l_getxxi_status; /* Final GETxxI status */
|
||||
unsigned int iosb$l_reg_status; /* Final $Registry status */
|
||||
} iosb$r_l_status;
|
||||
unsigned int iosb$l_reserved; /* Reserved field */
|
||||
} iosb$r_get_64;
|
||||
} iosb$r_io_get;
|
||||
} IOSB;
|
||||
|
||||
#if !defined(__VAXC)
|
||||
#define iosb$w_status iosb$r_io_get.iosb$r_io_64.iosb$w_status
|
||||
#define iosb$w_bcnt iosb$r_io_get.iosb$r_io_64.iosb$r_devdepend.iosb$r_bcnt_16.iosb$w_bcnt
|
||||
#define iosb$r_l iosb$r_io_get.iosb$r_io_64.iosb$r_devdepend.iosb$r_bcnt_16.iosb$r_l
|
||||
#define iosb$l_dev_depend iosb$r_l.iosb$l_dev_depend
|
||||
#define iosb$l_pid iosb$r_l.iosb$l_pid
|
||||
#define iosb$l_bcnt iosb$r_io_get.iosb$r_io_64.iosb$r_devdepend.iosb$r_bcnt_32.iosb$l_bcnt
|
||||
#define iosb$w_dev_depend_high iosb$r_io_get.iosb$r_io_64.iosb$r_devdepend.iosb$r_bcnt_32.iosb$w_dev_depend_high
|
||||
#define iosb$l_getxxi_status iosb$r_io_get.iosb$r_get_64.iosb$r_l_status.iosb$l_getxxi_status
|
||||
#define iosb$l_reg_status iosb$r_io_get.iosb$r_get_64.iosb$r_l_status.iosb$l_reg_status
|
||||
#endif /* #if !defined(__VAXC) */
|
||||
|
||||
#endif /* End of IOSBDEF */
|
||||
|
||||
#include <efndef.h>
|
||||
#include <stdlib.h>
|
||||
#include <ssdef.h>
|
||||
#include <time.h>
|
||||
#include <stdarg.h>
|
||||
#include <descrip.h>
|
||||
|
||||
#include "term_sock.h"
|
||||
|
||||
#ifdef __alpha
|
||||
static struct _iosb TerminalDeviceIosb;
|
||||
#else
|
||||
IOSB TerminalDeviceIosb;
|
||||
#endif
|
||||
|
||||
static char TerminalDeviceBuff[255 + 2];
|
||||
static int TerminalSocketPair[2] = {0, 0};
|
||||
static unsigned short TerminalDeviceChan = 0;
|
||||
|
||||
static int CreateSocketPair (int, int, int, int *);
|
||||
static void SocketPairTimeoutAst (int);
|
||||
static int TerminalDeviceAst (int);
|
||||
static void LogMessage (char *, ...);
|
||||
|
||||
/*
|
||||
** Socket Pair Timeout Value (must be 0-59 seconds)
|
||||
*/
|
||||
#define SOCKET_PAIR_TIMEOUT_VALUE 20
|
||||
|
||||
/*
|
||||
** Socket Pair Timeout Block which is passed to timeout AST
|
||||
*/
|
||||
typedef struct _SocketPairTimeoutBlock {
|
||||
unsigned short SockChan1;
|
||||
unsigned short SockChan2;
|
||||
} SPTB;
|
||||
|
||||
#ifdef TERM_SOCK_TEST
|
||||
|
||||
/*----------------------------------------------------------------------------*/
|
||||
/* */
|
||||
/*----------------------------------------------------------------------------*/
|
||||
int main (int argc, char *argv[], char *envp[])
|
||||
{
|
||||
char TermBuff[80];
|
||||
int TermSock,
|
||||
status,
|
||||
len;
|
||||
|
||||
LogMessage ("Enter 'q' or 'Q' to quit ...");
|
||||
while (strcasecmp (TermBuff, "Q"))
|
||||
{
|
||||
/*
|
||||
** Create the terminal socket
|
||||
*/
|
||||
status = TerminalSocket (TERM_SOCK_CREATE, &TermSock);
|
||||
if (status != TERM_SOCK_SUCCESS)
|
||||
exit (1);
|
||||
|
||||
/*
|
||||
** Process the terminal input
|
||||
*/
|
||||
LogMessage ("Waiting on terminal I/O ...\n");
|
||||
len = recv (TermSock, TermBuff, sizeof (TermBuff), 0) ;
|
||||
TermBuff[len] = '\0';
|
||||
LogMessage ("Received terminal I/O [%s]", TermBuff);
|
||||
|
||||
/*
|
||||
** Delete the terminal socket
|
||||
*/
|
||||
status = TerminalSocket (TERM_SOCK_DELETE, &TermSock);
|
||||
if (status != TERM_SOCK_SUCCESS)
|
||||
exit (1);
|
||||
}
|
||||
|
||||
return 1;
|
||||
|
||||
}
|
||||
#endif
|
||||
|
||||
/*----------------------------------------------------------------------------*/
|
||||
/* */
|
||||
/*----------------------------------------------------------------------------*/
|
||||
int TerminalSocket (int FunctionCode, int *ReturnSocket)
|
||||
{
|
||||
int status;
|
||||
$DESCRIPTOR (TerminalDeviceDesc, "SYS$COMMAND");
|
||||
|
||||
/*
|
||||
** Process the requested function code
|
||||
*/
|
||||
switch (FunctionCode)
|
||||
{
|
||||
case TERM_SOCK_CREATE:
|
||||
/*
|
||||
** Create a socket pair
|
||||
*/
|
||||
status = CreateSocketPair (AF_INET, SOCK_STREAM, 0, TerminalSocketPair);
|
||||
if (status == -1)
|
||||
{
|
||||
LogMessage ("TerminalSocket: CreateSocketPair () - %08X", status);
|
||||
if (TerminalSocketPair[0])
|
||||
close (TerminalSocketPair[0]);
|
||||
if (TerminalSocketPair[1])
|
||||
close (TerminalSocketPair[1]);
|
||||
return (TERM_SOCK_FAILURE);
|
||||
}
|
||||
|
||||
/*
|
||||
** Assign a channel to the terminal device
|
||||
*/
|
||||
status = sys$assign (&TerminalDeviceDesc,
|
||||
&TerminalDeviceChan,
|
||||
0, 0, 0);
|
||||
if (! (status & 1))
|
||||
{
|
||||
LogMessage ("TerminalSocket: SYS$ASSIGN () - %08X", status);
|
||||
close (TerminalSocketPair[0]);
|
||||
close (TerminalSocketPair[1]);
|
||||
return (TERM_SOCK_FAILURE);
|
||||
}
|
||||
|
||||
/*
|
||||
** Queue an async IO to the terminal device
|
||||
*/
|
||||
status = sys$qio (EFN$C_ENF,
|
||||
TerminalDeviceChan,
|
||||
IO$_READVBLK,
|
||||
&TerminalDeviceIosb,
|
||||
TerminalDeviceAst,
|
||||
0,
|
||||
TerminalDeviceBuff,
|
||||
sizeof (TerminalDeviceBuff) - 2,
|
||||
0, 0, 0, 0);
|
||||
if (! (status & 1))
|
||||
{
|
||||
LogMessage ("TerminalSocket: SYS$QIO () - %08X", status);
|
||||
close (TerminalSocketPair[0]);
|
||||
close (TerminalSocketPair[1]);
|
||||
return (TERM_SOCK_FAILURE);
|
||||
}
|
||||
|
||||
/*
|
||||
** Return the input side of the socket pair
|
||||
*/
|
||||
*ReturnSocket = TerminalSocketPair[1];
|
||||
break;
|
||||
|
||||
case TERM_SOCK_DELETE:
|
||||
/*
|
||||
** Cancel any pending IO on the terminal channel
|
||||
*/
|
||||
status = sys$cancel (TerminalDeviceChan);
|
||||
if (! (status & 1))
|
||||
{
|
||||
LogMessage ("TerminalSocket: SYS$CANCEL () - %08X", status);
|
||||
close (TerminalSocketPair[0]);
|
||||
close (TerminalSocketPair[1]);
|
||||
return (TERM_SOCK_FAILURE);
|
||||
}
|
||||
|
||||
/*
|
||||
** Deassign the terminal channel
|
||||
*/
|
||||
status = sys$dassgn (TerminalDeviceChan);
|
||||
if (! (status & 1))
|
||||
{
|
||||
LogMessage ("TerminalSocket: SYS$DASSGN () - %08X", status);
|
||||
close (TerminalSocketPair[0]);
|
||||
close (TerminalSocketPair[1]);
|
||||
return (TERM_SOCK_FAILURE);
|
||||
}
|
||||
|
||||
/*
|
||||
** Close the terminal socket pair
|
||||
*/
|
||||
close (TerminalSocketPair[0]);
|
||||
close (TerminalSocketPair[1]);
|
||||
|
||||
/*
|
||||
** Return the initialized socket
|
||||
*/
|
||||
*ReturnSocket = 0;
|
||||
break;
|
||||
|
||||
default:
|
||||
/*
|
||||
** Invalid function code
|
||||
*/
|
||||
LogMessage ("TerminalSocket: Invalid Function Code - %d", FunctionCode);
|
||||
return (TERM_SOCK_FAILURE);
|
||||
break;
|
||||
}
|
||||
|
||||
/*
|
||||
** Return success
|
||||
*/
|
||||
return (TERM_SOCK_SUCCESS);
|
||||
|
||||
}
|
||||
|
||||
/*----------------------------------------------------------------------------*/
|
||||
/* */
|
||||
/*----------------------------------------------------------------------------*/
|
||||
static int CreateSocketPair (
|
||||
int SocketFamily,
|
||||
int SocketType,
|
||||
int SocketProtocol,
|
||||
int *SocketPair)
|
||||
{
|
||||
struct dsc$descriptor AscTimeDesc = {0, DSC$K_DTYPE_T, DSC$K_CLASS_S, NULL};
|
||||
static const char* LocalHostAddr = {"127.0.0.1"};
|
||||
unsigned short TcpAcceptChan = 0,
|
||||
TcpDeviceChan = 0;
|
||||
unsigned long BinTimeBuff[2];
|
||||
struct sockaddr_in sin;
|
||||
char AscTimeBuff[32];
|
||||
short LocalHostPort;
|
||||
unsigned int status,
|
||||
slen;
|
||||
|
||||
#ifdef __alpha
|
||||
struct _iosb iosb;
|
||||
#else
|
||||
IOSB iosb;
|
||||
#endif
|
||||
|
||||
int SockDesc1 = 0,
|
||||
SockDesc2 = 0;
|
||||
SPTB sptb;
|
||||
$DESCRIPTOR (TcpDeviceDesc, "TCPIP$DEVICE");
|
||||
|
||||
/*
|
||||
** Create a socket
|
||||
*/
|
||||
SockDesc1 = socket (SocketFamily, SocketType, 0);
|
||||
if (SockDesc1 < 0)
|
||||
{
|
||||
LogMessage ("CreateSocketPair: socket () - %d", errno);
|
||||
return (-1);
|
||||
}
|
||||
|
||||
/*
|
||||
** Initialize the socket information
|
||||
*/
|
||||
slen = sizeof (sin);
|
||||
memset ((char *) &sin, 0, slen);
|
||||
sin.sin_family = SocketFamily;
|
||||
sin.sin_addr.s_addr = inet_addr (LocalHostAddr);
|
||||
sin.sin_port = 0;
|
||||
|
||||
/*
|
||||
** Bind the socket to the local IP
|
||||
*/
|
||||
status = bind (SockDesc1, (struct sockaddr *) &sin, slen);
|
||||
if (status < 0)
|
||||
{
|
||||
LogMessage ("CreateSocketPair: bind () - %d", errno);
|
||||
close (SockDesc1);
|
||||
return (-1);
|
||||
}
|
||||
|
||||
/*
|
||||
** Get the socket name so we can save the port number
|
||||
*/
|
||||
status = getsockname (SockDesc1, (struct sockaddr *) &sin, &slen);
|
||||
if (status < 0)
|
||||
{
|
||||
LogMessage ("CreateSocketPair: getsockname () - %d", errno);
|
||||
close (SockDesc1);
|
||||
return (-1);
|
||||
}
|
||||
else
|
||||
LocalHostPort = sin.sin_port;
|
||||
|
||||
/*
|
||||
** Setup a listen for the socket
|
||||
*/
|
||||
listen (SockDesc1, 5);
|
||||
|
||||
/*
|
||||
** Get the binary (64-bit) time of the specified timeout value
|
||||
*/
|
||||
sprintf (AscTimeBuff, "0 0:0:%02d.00", SOCKET_PAIR_TIMEOUT_VALUE);
|
||||
AscTimeDesc.dsc$w_length = strlen (AscTimeBuff);
|
||||
AscTimeDesc.dsc$a_pointer = AscTimeBuff;
|
||||
status = sys$bintim (&AscTimeDesc, BinTimeBuff);
|
||||
if (! (status & 1))
|
||||
{
|
||||
LogMessage ("CreateSocketPair: SYS$BINTIM () - %08X", status);
|
||||
close (SockDesc1);
|
||||
return (-1);
|
||||
}
|
||||
|
||||
/*
|
||||
** Assign another channel to the TCP/IP device for the accept.
|
||||
** This is the channel that ends up being connected to.
|
||||
*/
|
||||
status = sys$assign (&TcpDeviceDesc, &TcpDeviceChan, 0, 0, 0);
|
||||
if (! (status & 1))
|
||||
{
|
||||
LogMessage ("CreateSocketPair: SYS$ASSIGN () - %08X", status);
|
||||
close (SockDesc1);
|
||||
return (-1);
|
||||
}
|
||||
|
||||
/*
|
||||
** Get the channel of the first socket for the accept
|
||||
*/
|
||||
TcpAcceptChan = decc$get_sdc (SockDesc1);
|
||||
|
||||
/*
|
||||
** Perform the accept using $QIO so we can do this asynchronously
|
||||
*/
|
||||
status = sys$qio (EFN$C_ENF,
|
||||
TcpAcceptChan,
|
||||
IO$_ACCESS | IO$M_ACCEPT,
|
||||
&iosb,
|
||||
0, 0, 0, 0, 0,
|
||||
&TcpDeviceChan,
|
||||
0, 0);
|
||||
if (! (status & 1))
|
||||
{
|
||||
LogMessage ("CreateSocketPair: SYS$QIO () - %08X", status);
|
||||
close (SockDesc1);
|
||||
sys$dassgn (TcpDeviceChan);
|
||||
return (-1);
|
||||
}
|
||||
|
||||
/*
|
||||
** Create the second socket to do the connect
|
||||
*/
|
||||
SockDesc2 = socket (SocketFamily, SocketType, 0);
|
||||
if (SockDesc2 < 0)
|
||||
{
|
||||
LogMessage ("CreateSocketPair: socket () - %d", errno);
|
||||
sys$cancel (TcpAcceptChan);
|
||||
close (SockDesc1);
|
||||
sys$dassgn (TcpDeviceChan);
|
||||
return (-1) ;
|
||||
}
|
||||
|
||||
/*
|
||||
** Setup the Socket Pair Timeout Block
|
||||
*/
|
||||
sptb.SockChan1 = TcpAcceptChan;
|
||||
sptb.SockChan2 = decc$get_sdc (SockDesc2);
|
||||
|
||||
/*
|
||||
** Before we block on the connect, set a timer that can cancel I/O on our two
|
||||
** sockets if it never connects.
|
||||
*/
|
||||
status = sys$setimr (EFN$C_ENF,
|
||||
BinTimeBuff,
|
||||
SocketPairTimeoutAst,
|
||||
&sptb,
|
||||
0);
|
||||
if (! (status & 1))
|
||||
{
|
||||
LogMessage ("CreateSocketPair: SYS$SETIMR () - %08X", status);
|
||||
sys$cancel (TcpAcceptChan);
|
||||
close (SockDesc1);
|
||||
close (SockDesc2);
|
||||
sys$dassgn (TcpDeviceChan);
|
||||
return (-1);
|
||||
}
|
||||
|
||||
/*
|
||||
** Now issue the connect
|
||||
*/
|
||||
memset ((char *) &sin, 0, sizeof (sin)) ;
|
||||
sin.sin_family = SocketFamily;
|
||||
sin.sin_addr.s_addr = inet_addr (LocalHostAddr) ;
|
||||
sin.sin_port = LocalHostPort ;
|
||||
|
||||
status = connect (SockDesc2, (struct sockaddr *) &sin, sizeof (sin));
|
||||
if (status < 0 )
|
||||
{
|
||||
LogMessage ("CreateSocketPair: connect () - %d", errno);
|
||||
sys$cantim (&sptb, 0);
|
||||
sys$cancel (TcpAcceptChan);
|
||||
close (SockDesc1);
|
||||
close (SockDesc2);
|
||||
sys$dassgn (TcpDeviceChan);
|
||||
return (-1);
|
||||
}
|
||||
|
||||
/*
|
||||
** Wait for the asynch $QIO to finish. Note that if the I/O was aborted
|
||||
** (SS$_ABORT), then we probably canceled it from the AST routine - so log a
|
||||
** timeout.
|
||||
*/
|
||||
status = sys$synch (EFN$C_ENF, &iosb);
|
||||
if (! (iosb.iosb$w_status & 1))
|
||||
{
|
||||
if (iosb.iosb$w_status == SS$_ABORT)
|
||||
LogMessage ("CreateSocketPair: SYS$QIO(iosb) timeout");
|
||||
else
|
||||
{
|
||||
LogMessage ("CreateSocketPair: SYS$QIO(iosb) - %d", iosb.iosb$w_status);
|
||||
sys$cantim (&sptb, 0);
|
||||
}
|
||||
close (SockDesc1);
|
||||
close (SockDesc2);
|
||||
sys$dassgn (TcpDeviceChan);
|
||||
return (-1);
|
||||
}
|
||||
|
||||
/*
|
||||
** Here we're successfully connected, so cancel the timer, convert the I/O
|
||||
** channel to a socket fd, close the listener socket and return the connected
|
||||
** pair.
|
||||
*/
|
||||
sys$cantim (&sptb, 0);
|
||||
|
||||
close (SockDesc1) ;
|
||||
SocketPair[0] = SockDesc2 ;
|
||||
SocketPair[1] = socket_fd (TcpDeviceChan);
|
||||
|
||||
return (0) ;
|
||||
|
||||
}
|
||||
|
||||
/*----------------------------------------------------------------------------*/
|
||||
/* */
|
||||
/*----------------------------------------------------------------------------*/
|
||||
static void SocketPairTimeoutAst (int astparm)
|
||||
{
|
||||
SPTB *sptb = (SPTB *) astparm;
|
||||
|
||||
sys$cancel (sptb->SockChan2); /* Cancel the connect() */
|
||||
sys$cancel (sptb->SockChan1); /* Cancel the accept() */
|
||||
|
||||
return;
|
||||
|
||||
}
|
||||
|
||||
/*----------------------------------------------------------------------------*/
|
||||
/* */
|
||||
/*----------------------------------------------------------------------------*/
|
||||
static int TerminalDeviceAst (int astparm)
|
||||
{
|
||||
int status;
|
||||
|
||||
/*
|
||||
** Terminate the terminal buffer
|
||||
*/
|
||||
TerminalDeviceBuff[TerminalDeviceIosb.iosb$w_bcnt] = '\0';
|
||||
strcat (TerminalDeviceBuff, "\n");
|
||||
|
||||
/*
|
||||
** Send the data read from the terminal device throught the socket pair
|
||||
*/
|
||||
send (TerminalSocketPair[0], TerminalDeviceBuff, TerminalDeviceIosb.iosb$w_bcnt + 1, 0);
|
||||
|
||||
/*
|
||||
** Queue another async IO to the terminal device
|
||||
*/
|
||||
status = sys$qio (EFN$C_ENF,
|
||||
TerminalDeviceChan,
|
||||
IO$_READVBLK,
|
||||
&TerminalDeviceIosb,
|
||||
TerminalDeviceAst,
|
||||
0,
|
||||
TerminalDeviceBuff,
|
||||
sizeof (TerminalDeviceBuff) - 1,
|
||||
0, 0, 0, 0);
|
||||
|
||||
/*
|
||||
** Return status
|
||||
*/
|
||||
return status;
|
||||
|
||||
}
|
||||
|
||||
/*----------------------------------------------------------------------------*/
|
||||
/* */
|
||||
/*----------------------------------------------------------------------------*/
|
||||
static void LogMessage (char *msg, ...)
|
||||
{
|
||||
char *Month[] = {"Jan", "Feb", "Mar", "Apr", "May", "Jun",
|
||||
"Jul", "Aug", "Sep", "Oct", "Nov", "Dec"};
|
||||
static unsigned int pid = 0;
|
||||
va_list args;
|
||||
time_t CurTime;
|
||||
struct tm *LocTime;
|
||||
char MsgBuff[256];
|
||||
|
||||
/*
|
||||
** Get the process pid
|
||||
*/
|
||||
if (pid == 0)
|
||||
pid = getpid ();
|
||||
|
||||
/*
|
||||
** Convert the current time into local time
|
||||
*/
|
||||
CurTime = time (NULL);
|
||||
LocTime = localtime (&CurTime);
|
||||
|
||||
/*
|
||||
** Format the message buffer
|
||||
*/
|
||||
sprintf (MsgBuff, "%02d-%s-%04d %02d:%02d:%02d [%08X] %s\n",
|
||||
LocTime->tm_mday, Month[LocTime->tm_mon], (LocTime->tm_year + 1900),
|
||||
LocTime->tm_hour, LocTime->tm_min, LocTime->tm_sec, pid, msg);
|
||||
|
||||
/*
|
||||
** Get any variable arguments and add them to the print of the message buffer
|
||||
*/
|
||||
va_start (args, msg);
|
||||
vfprintf (stderr, MsgBuff, args);
|
||||
va_end (args);
|
||||
|
||||
/*
|
||||
** Flush standard error output
|
||||
*/
|
||||
fsync (fileno (stderr));
|
||||
|
||||
return;
|
||||
|
||||
}
|
||||
#endif
|
||||
21
apps/term_sock.h
Normal file
21
apps/term_sock.h
Normal file
@@ -0,0 +1,21 @@
|
||||
#ifndef TERM_SOCK_H
|
||||
#define TERM_SOCK_H
|
||||
|
||||
/*
|
||||
** Terminal Socket Function Codes
|
||||
*/
|
||||
#define TERM_SOCK_CREATE 1
|
||||
#define TERM_SOCK_DELETE 2
|
||||
|
||||
/*
|
||||
** Terminal Socket Status Codes
|
||||
*/
|
||||
#define TERM_SOCK_FAILURE 0
|
||||
#define TERM_SOCK_SUCCESS 1
|
||||
|
||||
/*
|
||||
** Terminal Socket Prototype
|
||||
*/
|
||||
int TerminalSocket (int FunctionCode, int *ReturnSocket);
|
||||
|
||||
#endif
|
||||
@@ -3,6 +3,18 @@
|
||||
DSA *get_dsa512(void );
|
||||
DSA *get_dsa1024(void );
|
||||
DSA *get_dsa2048(void );
|
||||
static unsigned char dsa512_priv[] = {
|
||||
0x65,0xe5,0xc7,0x38,0x60,0x24,0xb5,0x89,0xd4,0x9c,0xeb,0x4c,
|
||||
0x9c,0x1d,0x7a,0x22,0xbd,0xd1,0xc2,0xd2,
|
||||
};
|
||||
static unsigned char dsa512_pub[] = {
|
||||
0x00,0x95,0xa7,0x0d,0xec,0x93,0x68,0xba,0x5f,0xf7,0x5f,0x07,
|
||||
0xf2,0x3b,0xad,0x6b,0x01,0xdc,0xbe,0xec,0xde,0x04,0x7a,0x3a,
|
||||
0x27,0xb3,0xec,0x49,0xfd,0x08,0x43,0x3d,0x7e,0xa8,0x2c,0x5e,
|
||||
0x7b,0xbb,0xfc,0xf4,0x6e,0xeb,0x6c,0xb0,0x6e,0xf8,0x02,0x12,
|
||||
0x8c,0x38,0x5d,0x83,0x56,0x7d,0xee,0x53,0x05,0x3e,0x24,0x84,
|
||||
0xbe,0xba,0x0a,0x6b,0xc8,
|
||||
};
|
||||
static unsigned char dsa512_p[]={
|
||||
0x9D,0x1B,0x69,0x8E,0x26,0xDB,0xF2,0x2B,0x11,0x70,0x19,0x86,
|
||||
0xF6,0x19,0xC8,0xF8,0x19,0xF2,0x18,0x53,0x94,0x46,0x06,0xD0,
|
||||
@@ -29,14 +41,34 @@ DSA *get_dsa512()
|
||||
DSA *dsa;
|
||||
|
||||
if ((dsa=DSA_new()) == NULL) return(NULL);
|
||||
dsa->priv_key=BN_bin2bn(dsa512_priv,sizeof(dsa512_priv),NULL);
|
||||
dsa->pub_key=BN_bin2bn(dsa512_pub,sizeof(dsa512_pub),NULL);
|
||||
dsa->p=BN_bin2bn(dsa512_p,sizeof(dsa512_p),NULL);
|
||||
dsa->q=BN_bin2bn(dsa512_q,sizeof(dsa512_q),NULL);
|
||||
dsa->g=BN_bin2bn(dsa512_g,sizeof(dsa512_g),NULL);
|
||||
if ((dsa->p == NULL) || (dsa->q == NULL) || (dsa->g == NULL))
|
||||
if ((dsa->priv_key == NULL) || (dsa->pub_key == NULL) || (dsa->p == NULL) ||
|
||||
(dsa->q == NULL) || (dsa->g == NULL))
|
||||
return(NULL);
|
||||
return(dsa);
|
||||
}
|
||||
|
||||
static unsigned char dsa1024_priv[]={
|
||||
0x7d,0x21,0xda,0xbb,0x62,0x15,0x47,0x36,0x07,0x67,0x12,0xe8,
|
||||
0x8c,0xaa,0x1c,0xcd,0x38,0x12,0x61,0x18,
|
||||
};
|
||||
static unsigned char dsa1024_pub[]={
|
||||
0x3c,0x4e,0x9c,0x2a,0x7f,0x16,0xc1,0x25,0xeb,0xac,0x78,0x63,
|
||||
0x90,0x14,0x8c,0x8b,0xf4,0x68,0x43,0x3c,0x2d,0xee,0x65,0x50,
|
||||
0x7d,0x9c,0x8f,0x8c,0x8a,0x51,0xd6,0x11,0x2b,0x99,0xaf,0x1e,
|
||||
0x90,0x97,0xb5,0xd3,0xa6,0x20,0x25,0xd6,0xfe,0x43,0x02,0xd5,
|
||||
0x91,0x7d,0xa7,0x8c,0xdb,0xc9,0x85,0xa3,0x36,0x48,0xf7,0x68,
|
||||
0xaa,0x60,0xb1,0xf7,0x05,0x68,0x3a,0xa3,0x3f,0xd3,0x19,0x82,
|
||||
0xd8,0x82,0x7a,0x77,0xfb,0xef,0xf4,0x15,0x0a,0xeb,0x06,0x04,
|
||||
0x7f,0x53,0x07,0x0c,0xbc,0xcb,0x2d,0x83,0xdb,0x3e,0xd1,0x28,
|
||||
0xa5,0xa1,0x31,0xe0,0x67,0xfa,0x50,0xde,0x9b,0x07,0x83,0x7e,
|
||||
0x2c,0x0b,0xc3,0x13,0x50,0x61,0xe5,0xad,0xbd,0x36,0xb8,0x97,
|
||||
0x4e,0x40,0x7d,0xe8,0x83,0x0d,0xbc,0x4b
|
||||
};
|
||||
static unsigned char dsa1024_p[]={
|
||||
0xA7,0x3F,0x6E,0x85,0xBF,0x41,0x6A,0x29,0x7D,0xF0,0x9F,0x47,
|
||||
0x19,0x30,0x90,0x9A,0x09,0x1D,0xDA,0x6A,0x33,0x1E,0xC5,0x3D,
|
||||
@@ -73,14 +105,45 @@ DSA *get_dsa1024()
|
||||
DSA *dsa;
|
||||
|
||||
if ((dsa=DSA_new()) == NULL) return(NULL);
|
||||
dsa->priv_key=BN_bin2bn(dsa1024_priv,sizeof(dsa1024_priv),NULL);
|
||||
dsa->pub_key=BN_bin2bn(dsa1024_pub,sizeof(dsa1024_pub),NULL);
|
||||
dsa->p=BN_bin2bn(dsa1024_p,sizeof(dsa1024_p),NULL);
|
||||
dsa->q=BN_bin2bn(dsa1024_q,sizeof(dsa1024_q),NULL);
|
||||
dsa->g=BN_bin2bn(dsa1024_g,sizeof(dsa1024_g),NULL);
|
||||
if ((dsa->p == NULL) || (dsa->q == NULL) || (dsa->g == NULL))
|
||||
if ((dsa->priv_key == NULL) || (dsa->pub_key == NULL) || (dsa->p == NULL) ||
|
||||
(dsa->q == NULL) || (dsa->g == NULL))
|
||||
return(NULL);
|
||||
return(dsa);
|
||||
}
|
||||
|
||||
static unsigned char dsa2048_priv[]={
|
||||
0x32,0x67,0x92,0xf6,0xc4,0xe2,0xe2,0xe8,0xa0,0x8b,0x6b,0x45,
|
||||
0x0c,0x8a,0x76,0xb0,0xee,0xcf,0x91,0xa7,
|
||||
};
|
||||
static unsigned char dsa2048_pub[]={
|
||||
0x17,0x8f,0xa8,0x11,0x84,0x92,0xec,0x83,0x47,0xc7,0x6a,0xb0,
|
||||
0x92,0xaf,0x5a,0x20,0x37,0xa3,0x64,0x79,0xd2,0xd0,0x3d,0xcd,
|
||||
0xe0,0x61,0x88,0x88,0x21,0xcc,0x74,0x5d,0xce,0x4c,0x51,0x47,
|
||||
0xf0,0xc5,0x5c,0x4c,0x82,0x7a,0xaf,0x72,0xad,0xb9,0xe0,0x53,
|
||||
0xf2,0x78,0xb7,0xf0,0xb5,0x48,0x7f,0x8a,0x3a,0x18,0xd1,0x9f,
|
||||
0x8b,0x7d,0xa5,0x47,0xb7,0x95,0xab,0x98,0xf8,0x7b,0x74,0x50,
|
||||
0x56,0x8e,0x57,0xf0,0xee,0xf5,0xb7,0xba,0xab,0x85,0x86,0xf9,
|
||||
0x2b,0xef,0x41,0x56,0xa0,0xa4,0x9f,0xb7,0x38,0x00,0x46,0x0a,
|
||||
0xa6,0xf1,0xfc,0x1f,0xd8,0x4e,0x85,0x44,0x92,0x43,0x21,0x5d,
|
||||
0x6e,0xcc,0xc2,0xcb,0x26,0x31,0x0d,0x21,0xc4,0xbd,0x8d,0x24,
|
||||
0xbc,0xd9,0x18,0x19,0xd7,0xdc,0xf1,0xe7,0x93,0x50,0x48,0x03,
|
||||
0x2c,0xae,0x2e,0xe7,0x49,0x88,0x5f,0x93,0x57,0x27,0x99,0x36,
|
||||
0xb4,0x20,0xab,0xfc,0xa7,0x2b,0xf2,0xd9,0x98,0xd7,0xd4,0x34,
|
||||
0x9d,0x96,0x50,0x58,0x9a,0xea,0x54,0xf3,0xee,0xf5,0x63,0x14,
|
||||
0xee,0x85,0x83,0x74,0x76,0xe1,0x52,0x95,0xc3,0xf7,0xeb,0x04,
|
||||
0x04,0x7b,0xa7,0x28,0x1b,0xcc,0xea,0x4a,0x4e,0x84,0xda,0xd8,
|
||||
0x9c,0x79,0xd8,0x9b,0x66,0x89,0x2f,0xcf,0xac,0xd7,0x79,0xf9,
|
||||
0xa9,0xd8,0x45,0x13,0x78,0xb9,0x00,0x14,0xc9,0x7e,0x22,0x51,
|
||||
0x86,0x67,0xb0,0x9f,0x26,0x11,0x23,0xc8,0x38,0xd7,0x70,0x1d,
|
||||
0x15,0x8e,0x4d,0x4f,0x95,0x97,0x40,0xa1,0xc2,0x7e,0x01,0x18,
|
||||
0x72,0xf4,0x10,0xe6,0x8d,0x52,0x16,0x7f,0xf2,0xc9,0xf8,0x33,
|
||||
0x8b,0x33,0xb7,0xce,
|
||||
};
|
||||
static unsigned char dsa2048_p[]={
|
||||
0xA0,0x25,0xFA,0xAD,0xF4,0x8E,0xB9,0xE5,0x99,0xF3,0x5D,0x6F,
|
||||
0x4F,0x83,0x34,0xE2,0x7E,0xCF,0x6F,0xBF,0x30,0xAF,0x6F,0x81,
|
||||
@@ -139,10 +202,13 @@ DSA *get_dsa2048()
|
||||
DSA *dsa;
|
||||
|
||||
if ((dsa=DSA_new()) == NULL) return(NULL);
|
||||
dsa->priv_key=BN_bin2bn(dsa2048_priv,sizeof(dsa2048_priv),NULL);
|
||||
dsa->pub_key=BN_bin2bn(dsa2048_pub,sizeof(dsa2048_pub),NULL);
|
||||
dsa->p=BN_bin2bn(dsa2048_p,sizeof(dsa2048_p),NULL);
|
||||
dsa->q=BN_bin2bn(dsa2048_q,sizeof(dsa2048_q),NULL);
|
||||
dsa->g=BN_bin2bn(dsa2048_g,sizeof(dsa2048_g),NULL);
|
||||
if ((dsa->p == NULL) || (dsa->q == NULL) || (dsa->g == NULL))
|
||||
if ((dsa->priv_key == NULL) || (dsa->pub_key == NULL) || (dsa->p == NULL) ||
|
||||
(dsa->q == NULL) || (dsa->g == NULL))
|
||||
return(NULL);
|
||||
return(dsa);
|
||||
}
|
||||
|
||||
@@ -65,15 +65,14 @@
|
||||
#include <openssl/x509.h>
|
||||
#include <openssl/x509v3.h>
|
||||
#include <openssl/pem.h>
|
||||
#include <openssl/engine.h>
|
||||
|
||||
#undef PROG
|
||||
#define PROG verify_main
|
||||
|
||||
static int MS_CALLBACK cb(int ok, X509_STORE_CTX *ctx);
|
||||
static int check(X509_STORE *ctx, char *file, STACK_OF(X509) *uchain, STACK_OF(X509) *tchain, int purpose);
|
||||
static int check(X509_STORE *ctx, char *file, STACK_OF(X509) *uchain, STACK_OF(X509) *tchain, int purpose, ENGINE *e);
|
||||
static STACK_OF(X509) *load_untrusted(char *file);
|
||||
static int v_verbose=0, issuer_checks = 0;
|
||||
static int v_verbose=0, vflags = 0;
|
||||
|
||||
int MAIN(int, char **);
|
||||
|
||||
@@ -101,6 +100,9 @@ int MAIN(int argc, char **argv)
|
||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
||||
|
||||
if (!load_config(bio_err, NULL))
|
||||
goto end;
|
||||
|
||||
argc--;
|
||||
argv++;
|
||||
for (;;)
|
||||
@@ -147,8 +149,14 @@ int MAIN(int argc, char **argv)
|
||||
}
|
||||
else if (strcmp(*argv,"-help") == 0)
|
||||
goto end;
|
||||
else if (strcmp(*argv,"-ignore_critical") == 0)
|
||||
vflags |= X509_V_FLAG_IGNORE_CRITICAL;
|
||||
else if (strcmp(*argv,"-issuer_checks") == 0)
|
||||
issuer_checks=1;
|
||||
vflags |= X509_V_FLAG_CB_ISSUER_CHECK;
|
||||
else if (strcmp(*argv,"-crl_check") == 0)
|
||||
vflags |= X509_V_FLAG_CRL_CHECK;
|
||||
else if (strcmp(*argv,"-crl_check_all") == 0)
|
||||
vflags |= X509_V_FLAG_CRL_CHECK|X509_V_FLAG_CRL_CHECK_ALL;
|
||||
else if (strcmp(*argv,"-verbose") == 0)
|
||||
v_verbose=1;
|
||||
else if (argv[0][0] == '-')
|
||||
@@ -162,23 +170,7 @@ int MAIN(int argc, char **argv)
|
||||
break;
|
||||
}
|
||||
|
||||
if (engine != NULL)
|
||||
{
|
||||
if((e = ENGINE_by_id(engine)) == NULL)
|
||||
{
|
||||
BIO_printf(bio_err,"invalid engine \"%s\"\n",
|
||||
engine);
|
||||
goto end;
|
||||
}
|
||||
if(!ENGINE_set_default(e, ENGINE_METHOD_ALL))
|
||||
{
|
||||
BIO_printf(bio_err,"can't use that engine\n");
|
||||
goto end;
|
||||
}
|
||||
BIO_printf(bio_err,"engine \"%s\" set.\n", engine);
|
||||
/* Free our "structural" reference. */
|
||||
ENGINE_free(e);
|
||||
}
|
||||
e = setup_engine(bio_err, engine, 0);
|
||||
|
||||
lookup=X509_STORE_add_lookup(cert_ctx,X509_LOOKUP_file());
|
||||
if (lookup == NULL) abort();
|
||||
@@ -220,14 +212,14 @@ int MAIN(int argc, char **argv)
|
||||
}
|
||||
}
|
||||
|
||||
if (argc < 1) check(cert_ctx, NULL, untrusted, trusted, purpose);
|
||||
if (argc < 1) check(cert_ctx, NULL, untrusted, trusted, purpose, e);
|
||||
else
|
||||
for (i=0; i<argc; i++)
|
||||
check(cert_ctx,argv[i], untrusted, trusted, purpose);
|
||||
check(cert_ctx,argv[i], untrusted, trusted, purpose, e);
|
||||
ret=0;
|
||||
end:
|
||||
if (ret == 1) {
|
||||
BIO_printf(bio_err,"usage: verify [-verbose] [-CApath path] [-CAfile file] [-purpose purpose] [-engine e] cert1 cert2 ...\n");
|
||||
BIO_printf(bio_err,"usage: verify [-verbose] [-CApath path] [-CAfile file] [-purpose purpose] [-crl_check] [-engine e] cert1 cert2 ...\n");
|
||||
BIO_printf(bio_err,"recognized usages:\n");
|
||||
for(i = 0; i < X509_PURPOSE_get_count(); i++) {
|
||||
X509_PURPOSE *ptmp;
|
||||
@@ -239,42 +231,19 @@ end:
|
||||
if (cert_ctx != NULL) X509_STORE_free(cert_ctx);
|
||||
sk_X509_pop_free(untrusted, X509_free);
|
||||
sk_X509_pop_free(trusted, X509_free);
|
||||
apps_shutdown();
|
||||
EXIT(ret);
|
||||
}
|
||||
|
||||
static int check(X509_STORE *ctx, char *file, STACK_OF(X509) *uchain, STACK_OF(X509) *tchain, int purpose)
|
||||
static int check(X509_STORE *ctx, char *file, STACK_OF(X509) *uchain, STACK_OF(X509) *tchain, int purpose, ENGINE *e)
|
||||
{
|
||||
X509 *x=NULL;
|
||||
BIO *in=NULL;
|
||||
int i=0,ret=0;
|
||||
X509_STORE_CTX *csc;
|
||||
|
||||
in=BIO_new(BIO_s_file());
|
||||
if (in == NULL)
|
||||
{
|
||||
ERR_print_errors(bio_err);
|
||||
goto end;
|
||||
}
|
||||
|
||||
if (file == NULL)
|
||||
BIO_set_fp(in,stdin,BIO_NOCLOSE);
|
||||
else
|
||||
{
|
||||
if (BIO_read_filename(in,file) <= 0)
|
||||
{
|
||||
perror(file);
|
||||
goto end;
|
||||
}
|
||||
}
|
||||
|
||||
x=PEM_read_bio_X509(in,NULL,NULL,NULL);
|
||||
x = load_cert(bio_err, file, FORMAT_PEM, NULL, e, "certificate file");
|
||||
if (x == NULL)
|
||||
{
|
||||
fprintf(stdout,"%s: unable to load certificate file\n",
|
||||
(file == NULL)?"stdin":file);
|
||||
ERR_print_errors(bio_err);
|
||||
goto end;
|
||||
}
|
||||
fprintf(stdout,"%s: ",(file == NULL)?"stdin":file);
|
||||
|
||||
csc = X509_STORE_CTX_new();
|
||||
@@ -283,11 +252,14 @@ static int check(X509_STORE *ctx, char *file, STACK_OF(X509) *uchain, STACK_OF(X
|
||||
ERR_print_errors(bio_err);
|
||||
goto end;
|
||||
}
|
||||
X509_STORE_CTX_init(csc,ctx,x,uchain);
|
||||
X509_STORE_set_flags(ctx, vflags);
|
||||
if(!X509_STORE_CTX_init(csc,ctx,x,uchain))
|
||||
{
|
||||
ERR_print_errors(bio_err);
|
||||
goto end;
|
||||
}
|
||||
if(tchain) X509_STORE_CTX_trusted_stack(csc, tchain);
|
||||
if(purpose >= 0) X509_STORE_CTX_set_purpose(csc, purpose);
|
||||
if(issuer_checks)
|
||||
X509_STORE_CTX_set_flags(csc, X509_V_FLAG_CB_ISSUER_CHECK);
|
||||
i=X509_verify_cert(csc);
|
||||
X509_STORE_CTX_free(csc);
|
||||
|
||||
@@ -301,7 +273,6 @@ end:
|
||||
else
|
||||
ERR_print_errors(bio_err);
|
||||
if (x != NULL) X509_free(x);
|
||||
if (in != NULL) BIO_free(in);
|
||||
|
||||
return(ret);
|
||||
}
|
||||
@@ -375,6 +346,9 @@ static int MS_CALLBACK cb(int ok, X509_STORE_CTX *ctx)
|
||||
if (ctx->error == X509_V_ERR_PATH_LENGTH_EXCEEDED) ok=1;
|
||||
if (ctx->error == X509_V_ERR_INVALID_PURPOSE) ok=1;
|
||||
if (ctx->error == X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT) ok=1;
|
||||
if (ctx->error == X509_V_ERR_CRL_HAS_EXPIRED) ok=1;
|
||||
if (ctx->error == X509_V_ERR_CRL_NOT_YET_VALID) ok=1;
|
||||
if (ctx->error == X509_V_ERR_UNHANDLED_CRITICAL_EXTENSION) ok=1;
|
||||
}
|
||||
if (!v_verbose)
|
||||
ERR_clear_error();
|
||||
|
||||
@@ -55,6 +55,59 @@
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
/* ====================================================================
|
||||
* Copyright (c) 1998-2001 The OpenSSL Project. All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
*
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
*
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in
|
||||
* the documentation and/or other materials provided with the
|
||||
* distribution.
|
||||
*
|
||||
* 3. All advertising materials mentioning features or use of this
|
||||
* software must display the following acknowledgment:
|
||||
* "This product includes software developed by the OpenSSL Project
|
||||
* for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
|
||||
*
|
||||
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
|
||||
* endorse or promote products derived from this software without
|
||||
* prior written permission. For written permission, please contact
|
||||
* openssl-core@openssl.org.
|
||||
*
|
||||
* 5. Products derived from this software may not be called "OpenSSL"
|
||||
* nor may "OpenSSL" appear in their names without prior written
|
||||
* permission of the OpenSSL Project.
|
||||
*
|
||||
* 6. Redistributions of any form whatsoever must retain the following
|
||||
* acknowledgment:
|
||||
* "This product includes software developed by the OpenSSL Project
|
||||
* for use in the OpenSSL Toolkit (http://www.openssl.org/)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
|
||||
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
|
||||
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||||
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
||||
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
||||
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
||||
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
||||
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
||||
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
* ====================================================================
|
||||
*
|
||||
* This product includes cryptographic software written by Eric Young
|
||||
* (eay@cryptsoft.com). This product includes software written by Tim
|
||||
* Hudson (tjh@cryptsoft.com).
|
||||
*
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
@@ -62,6 +115,21 @@
|
||||
#include "apps.h"
|
||||
#include <openssl/evp.h>
|
||||
#include <openssl/crypto.h>
|
||||
#ifndef OPENSSL_NO_MD2
|
||||
# include <openssl/md2.h>
|
||||
#endif
|
||||
#ifndef OPENSSL_NO_RC4
|
||||
# include <openssl/rc4.h>
|
||||
#endif
|
||||
#ifndef OPENSSL_NO_DES
|
||||
# include <openssl/des.h>
|
||||
#endif
|
||||
#ifndef OPENSSL_NO_IDEA
|
||||
# include <openssl/idea.h>
|
||||
#endif
|
||||
#ifndef OPENSSL_NO_BF
|
||||
# include <openssl/blowfish.h>
|
||||
#endif
|
||||
|
||||
#undef PROG
|
||||
#define PROG version_main
|
||||
@@ -71,7 +139,7 @@ int MAIN(int, char **);
|
||||
int MAIN(int argc, char **argv)
|
||||
{
|
||||
int i,ret=0;
|
||||
int cflags=0,version=0,date=0,options=0,platform=0;
|
||||
int cflags=0,version=0,date=0,options=0,platform=0,dir=0;
|
||||
|
||||
apps_startup();
|
||||
|
||||
@@ -92,8 +160,10 @@ int MAIN(int argc, char **argv)
|
||||
options=1;
|
||||
else if (strcmp(argv[i],"-p") == 0)
|
||||
platform=1;
|
||||
else if (strcmp(argv[i],"-d") == 0)
|
||||
dir=1;
|
||||
else if (strcmp(argv[i],"-a") == 0)
|
||||
date=version=cflags=options=platform=1;
|
||||
date=version=cflags=options=platform=dir=1;
|
||||
else
|
||||
{
|
||||
BIO_printf(bio_err,"usage:version -[avbofp]\n");
|
||||
@@ -109,24 +179,26 @@ int MAIN(int argc, char **argv)
|
||||
{
|
||||
printf("options: ");
|
||||
printf("%s ",BN_options());
|
||||
#ifndef NO_MD2
|
||||
#ifndef OPENSSL_NO_MD2
|
||||
printf("%s ",MD2_options());
|
||||
#endif
|
||||
#ifndef NO_RC4
|
||||
#ifndef OPENSSL_NO_RC4
|
||||
printf("%s ",RC4_options());
|
||||
#endif
|
||||
#ifndef NO_DES
|
||||
printf("%s ",des_options());
|
||||
#ifndef OPENSSL_NO_DES
|
||||
printf("%s ",DES_options());
|
||||
#endif
|
||||
#ifndef NO_IDEA
|
||||
#ifndef OPENSSL_NO_IDEA
|
||||
printf("%s ",idea_options());
|
||||
#endif
|
||||
#ifndef NO_BF
|
||||
#ifndef OPENSSL_NO_BF
|
||||
printf("%s ",BF_options());
|
||||
#endif
|
||||
printf("\n");
|
||||
}
|
||||
if (cflags) printf("%s\n",SSLeay_version(SSLEAY_CFLAGS));
|
||||
if (dir) printf("%s\n",SSLeay_version(SSLEAY_DIR));
|
||||
end:
|
||||
apps_shutdown();
|
||||
EXIT(ret);
|
||||
}
|
||||
|
||||
192
apps/x509.c
192
apps/x509.c
@@ -60,7 +60,7 @@
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#ifdef NO_STDIO
|
||||
#ifdef OPENSSL_NO_STDIO
|
||||
#define APPS_WIN16
|
||||
#endif
|
||||
#include "apps.h"
|
||||
@@ -73,7 +73,6 @@
|
||||
#include <openssl/x509v3.h>
|
||||
#include <openssl/objects.h>
|
||||
#include <openssl/pem.h>
|
||||
#include <openssl/engine.h>
|
||||
|
||||
#undef PROG
|
||||
#define PROG x509_main
|
||||
@@ -124,6 +123,7 @@ static char *x509_usage[]={
|
||||
" missing, it is assumed to be in the CA file.\n",
|
||||
" -CAcreateserial - create serial number file if it does not exist\n",
|
||||
" -CAserial - serial file\n",
|
||||
" -set_serial - serial number to use\n",
|
||||
" -text - print the certificate in text form\n",
|
||||
" -C - print out C code forms\n",
|
||||
" -md2/-md5/-sha1/-mdc2 - digest to use\n",
|
||||
@@ -138,10 +138,11 @@ NULL
|
||||
|
||||
static int MS_CALLBACK callb(int ok, X509_STORE_CTX *ctx);
|
||||
static int sign (X509 *x, EVP_PKEY *pkey,int days,int clrext, const EVP_MD *digest,
|
||||
LHASH *conf, char *section);
|
||||
CONF *conf, char *section);
|
||||
static int x509_certify (X509_STORE *ctx,char *CAfile,const EVP_MD *digest,
|
||||
X509 *x,X509 *xca,EVP_PKEY *pkey,char *serial,
|
||||
int create,int days, int clrext, LHASH *conf, char *section);
|
||||
int create,int days, int clrext, CONF *conf, char *section,
|
||||
ASN1_INTEGER *sno);
|
||||
static int purpose_print(BIO *bio, X509 *cert, X509_PURPOSE *pt);
|
||||
static int reqfile=0;
|
||||
|
||||
@@ -155,6 +156,7 @@ int MAIN(int argc, char **argv)
|
||||
X509 *x=NULL,*xca=NULL;
|
||||
ASN1_OBJECT *objtmp;
|
||||
EVP_PKEY *Upkey=NULL,*CApkey=NULL;
|
||||
ASN1_INTEGER *sno = NULL;
|
||||
int i,num,badops=0;
|
||||
BIO *out=NULL;
|
||||
BIO *STDout=NULL;
|
||||
@@ -176,7 +178,7 @@ int MAIN(int argc, char **argv)
|
||||
int fingerprint=0;
|
||||
char buf[256];
|
||||
const EVP_MD *md_alg,*digest=EVP_md5();
|
||||
LHASH *extconf = NULL;
|
||||
CONF *extconf = NULL;
|
||||
char *extsect = NULL, *extfile = NULL, *passin = NULL, *passargin = NULL;
|
||||
int need_rand = 0;
|
||||
int checkend=0,checkoffset=0;
|
||||
@@ -189,8 +191,11 @@ int MAIN(int argc, char **argv)
|
||||
|
||||
if (bio_err == NULL)
|
||||
bio_err=BIO_new_fp(stderr,BIO_NOCLOSE);
|
||||
|
||||
if (!load_config(bio_err, NULL))
|
||||
goto end;
|
||||
STDout=BIO_new_fp(stdout,BIO_NOCLOSE);
|
||||
#ifdef VMS
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
{
|
||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||
STDout = BIO_push(tmpbio, STDout);
|
||||
@@ -301,6 +306,12 @@ int MAIN(int argc, char **argv)
|
||||
if (--argc < 1) goto bad;
|
||||
CAserial= *(++argv);
|
||||
}
|
||||
else if (strcmp(*argv,"-set_serial") == 0)
|
||||
{
|
||||
if (--argc < 1) goto bad;
|
||||
if (!(sno = s2i_ASN1_INTEGER(NULL, *(++argv))))
|
||||
goto bad;
|
||||
}
|
||||
else if (strcmp(*argv,"-addtrust") == 0)
|
||||
{
|
||||
if (--argc < 1) goto bad;
|
||||
@@ -435,27 +446,11 @@ int MAIN(int argc, char **argv)
|
||||
{
|
||||
bad:
|
||||
for (pp=x509_usage; (*pp != NULL); pp++)
|
||||
BIO_printf(bio_err,*pp);
|
||||
BIO_printf(bio_err,"%s",*pp);
|
||||
goto end;
|
||||
}
|
||||
|
||||
if (engine != NULL)
|
||||
{
|
||||
if((e = ENGINE_by_id(engine)) == NULL)
|
||||
{
|
||||
BIO_printf(bio_err,"invalid engine \"%s\"\n",
|
||||
engine);
|
||||
goto end;
|
||||
}
|
||||
if(!ENGINE_set_default(e, ENGINE_METHOD_ALL))
|
||||
{
|
||||
BIO_printf(bio_err,"can't use that engine\n");
|
||||
goto end;
|
||||
}
|
||||
BIO_printf(bio_err,"engine \"%s\" set.\n", engine);
|
||||
/* Free our "structural" reference. */
|
||||
ENGINE_free(e);
|
||||
}
|
||||
e = setup_engine(bio_err, engine, 0);
|
||||
|
||||
if (need_rand)
|
||||
app_RAND_load_file(NULL, bio_err, 0);
|
||||
@@ -486,7 +481,8 @@ bad:
|
||||
{
|
||||
long errorline;
|
||||
X509V3_CTX ctx2;
|
||||
if (!(extconf=CONF_load(NULL,extfile,&errorline)))
|
||||
extconf = NCONF_new(NULL);
|
||||
if (!NCONF_load(extconf, extfile,&errorline))
|
||||
{
|
||||
if (errorline <= 0)
|
||||
BIO_printf(bio_err,
|
||||
@@ -498,11 +494,18 @@ bad:
|
||||
,errorline,extfile);
|
||||
goto end;
|
||||
}
|
||||
if (!extsect && !(extsect = CONF_get_string(extconf, "default",
|
||||
"extensions"))) extsect = "default";
|
||||
if (!extsect)
|
||||
{
|
||||
extsect = NCONF_get_string(extconf, "default", "extensions");
|
||||
if (!extsect)
|
||||
{
|
||||
ERR_clear_error();
|
||||
extsect = "default";
|
||||
}
|
||||
}
|
||||
X509V3_set_ctx_test(&ctx2);
|
||||
X509V3_set_conf_lhash(&ctx2, extconf);
|
||||
if (!X509V3_EXT_add_conf(extconf, &ctx2, extsect, NULL))
|
||||
X509V3_set_nconf(&ctx2, extconf);
|
||||
if (!X509V3_EXT_add_nconf(extconf, &ctx2, extsect, NULL))
|
||||
{
|
||||
BIO_printf(bio_err,
|
||||
"Error Loading extension section %s\n",
|
||||
@@ -586,7 +589,12 @@ bad:
|
||||
if ((x=X509_new()) == NULL) goto end;
|
||||
ci=x->cert_info;
|
||||
|
||||
if (!ASN1_INTEGER_set(X509_get_serialNumber(x),0)) goto end;
|
||||
if (sno)
|
||||
{
|
||||
if (!X509_set_serialNumber(x, sno))
|
||||
goto end;
|
||||
}
|
||||
else if (!ASN1_INTEGER_set(X509_get_serialNumber(x),0)) goto end;
|
||||
if (!X509_set_issuer_name(x,req->req_info->subject)) goto end;
|
||||
if (!X509_set_subject_name(x,req->req_info->subject)) goto end;
|
||||
|
||||
@@ -598,12 +606,12 @@ bad:
|
||||
EVP_PKEY_free(pkey);
|
||||
}
|
||||
else
|
||||
x=load_cert(bio_err,infile,informat);
|
||||
x=load_cert(bio_err,infile,informat,NULL,e,"Certificate");
|
||||
|
||||
if (x == NULL) goto end;
|
||||
if (CA_flag)
|
||||
{
|
||||
xca=load_cert(bio_err,CAfile,CAformat);
|
||||
xca=load_cert(bio_err,CAfile,CAformat,NULL,e,"CA Certificate");
|
||||
if (xca == NULL) goto end;
|
||||
}
|
||||
|
||||
@@ -621,7 +629,7 @@ bad:
|
||||
if (outfile == NULL)
|
||||
{
|
||||
BIO_set_fp(out,stdout,BIO_NOCLOSE);
|
||||
#ifdef VMS
|
||||
#ifdef OPENSSL_SYS_VMS
|
||||
{
|
||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||
out = BIO_push(tmpbio, out);
|
||||
@@ -725,12 +733,12 @@ bad:
|
||||
goto end;
|
||||
}
|
||||
BIO_printf(STDout,"Modulus=");
|
||||
#ifndef NO_RSA
|
||||
#ifndef OPENSSL_NO_RSA
|
||||
if (pkey->type == EVP_PKEY_RSA)
|
||||
BN_print(STDout,pkey->pkey.rsa->n);
|
||||
else
|
||||
#endif
|
||||
#ifndef NO_DSA
|
||||
#ifndef OPENSSL_NO_DSA
|
||||
if (pkey->type == EVP_PKEY_DSA)
|
||||
BN_print(STDout,pkey->pkey.dsa->pub_key);
|
||||
else
|
||||
@@ -853,13 +861,18 @@ bad:
|
||||
if (Upkey == NULL)
|
||||
{
|
||||
Upkey=load_key(bio_err,
|
||||
keyfile,keyformat, passin, e);
|
||||
keyfile,keyformat, passin, e,
|
||||
"Private key");
|
||||
if (Upkey == NULL) goto end;
|
||||
}
|
||||
#ifndef NO_DSA
|
||||
#ifndef OPENSSL_NO_DSA
|
||||
if (Upkey->type == EVP_PKEY_DSA)
|
||||
digest=EVP_dss1();
|
||||
#endif
|
||||
#ifndef OPENSSL_NO_ECDSA
|
||||
if (Upkey->type == EVP_PKEY_ECDSA)
|
||||
digest=EVP_ecdsa();
|
||||
#endif
|
||||
|
||||
assert(need_rand);
|
||||
if (!sign(x,Upkey,days,clrext,digest,
|
||||
@@ -872,18 +885,22 @@ bad:
|
||||
{
|
||||
CApkey=load_key(bio_err,
|
||||
CAkeyfile,CAkeyformat, passin,
|
||||
e);
|
||||
e, "CA Private Key");
|
||||
if (CApkey == NULL) goto end;
|
||||
}
|
||||
#ifndef NO_DSA
|
||||
#ifndef OPENSSL_NO_DSA
|
||||
if (CApkey->type == EVP_PKEY_DSA)
|
||||
digest=EVP_dss1();
|
||||
#endif
|
||||
#ifndef OPENSSL_NO_ECDSA
|
||||
if (CApkey->type == EVP_PKEY_ECDSA)
|
||||
digest = EVP_ecdsa();
|
||||
#endif
|
||||
|
||||
assert(need_rand);
|
||||
if (!x509_certify(ctx,CAfile,digest,x,xca,
|
||||
CApkey, CAserial,CA_createserial,days, clrext,
|
||||
extconf, extsect))
|
||||
extconf, extsect, sno))
|
||||
goto end;
|
||||
}
|
||||
else if (x509req == i)
|
||||
@@ -899,7 +916,8 @@ bad:
|
||||
else
|
||||
{
|
||||
pk=load_key(bio_err,
|
||||
keyfile,FORMAT_PEM, passin, e);
|
||||
keyfile,FORMAT_PEM, passin, e,
|
||||
"request key");
|
||||
if (pk == NULL) goto end;
|
||||
}
|
||||
|
||||
@@ -907,6 +925,8 @@ bad:
|
||||
|
||||
if (pk->type == EVP_PKEY_DSA)
|
||||
digest=EVP_dss1();
|
||||
else if (pk->type == EVP_PKEY_ECDSA)
|
||||
digest=EVP_ecdsa();
|
||||
|
||||
rq=X509_to_X509_REQ(x,pk,digest);
|
||||
EVP_PKEY_free(pk);
|
||||
@@ -988,7 +1008,7 @@ end:
|
||||
if (need_rand)
|
||||
app_RAND_write_file(NULL, bio_err);
|
||||
OBJ_cleanup();
|
||||
CONF_free(extconf);
|
||||
NCONF_free(extconf);
|
||||
BIO_free_all(out);
|
||||
BIO_free_all(STDout);
|
||||
X509_STORE_free(ctx);
|
||||
@@ -998,32 +1018,23 @@ end:
|
||||
EVP_PKEY_free(Upkey);
|
||||
EVP_PKEY_free(CApkey);
|
||||
X509_REQ_free(rq);
|
||||
ASN1_INTEGER_free(sno);
|
||||
sk_ASN1_OBJECT_pop_free(trust, ASN1_OBJECT_free);
|
||||
sk_ASN1_OBJECT_pop_free(reject, ASN1_OBJECT_free);
|
||||
if (passin) OPENSSL_free(passin);
|
||||
apps_shutdown();
|
||||
EXIT(ret);
|
||||
}
|
||||
|
||||
static int x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest,
|
||||
X509 *x, X509 *xca, EVP_PKEY *pkey, char *serialfile, int create,
|
||||
int days, int clrext, LHASH *conf, char *section)
|
||||
static ASN1_INTEGER *load_serial(char *CAfile, char *serialfile, int create)
|
||||
{
|
||||
int ret=0;
|
||||
BIO *io=NULL;
|
||||
char *buf = NULL, *p;
|
||||
MS_STATIC char buf2[1024];
|
||||
char *buf=NULL,*p;
|
||||
BIGNUM *serial=NULL;
|
||||
ASN1_INTEGER *bs=NULL,bs2;
|
||||
X509_STORE_CTX xsc;
|
||||
EVP_PKEY *upkey;
|
||||
ASN1_INTEGER *bs = NULL, *bs2 = NULL;
|
||||
BIO *io = NULL;
|
||||
BIGNUM *serial = NULL;
|
||||
|
||||
upkey = X509_get_pubkey(xca);
|
||||
EVP_PKEY_copy_parameters(upkey,pkey);
|
||||
EVP_PKEY_free(upkey);
|
||||
|
||||
X509_STORE_CTX_init(&xsc,ctx,x,NULL);
|
||||
buf=OPENSSL_malloc(EVP_PKEY_size(pkey)*2+
|
||||
((serialfile == NULL)
|
||||
buf=OPENSSL_malloc( ((serialfile == NULL)
|
||||
?(strlen(CAfile)+strlen(POSTFIX)+1)
|
||||
:(strlen(serialfile)))+1);
|
||||
if (buf == NULL) { BIO_printf(bio_err,"out of mem\n"); goto end; }
|
||||
@@ -1089,20 +1100,55 @@ static int x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest,
|
||||
|
||||
if (!BN_add_word(serial,1))
|
||||
{ BIO_printf(bio_err,"add_word failure\n"); goto end; }
|
||||
bs2.data=(unsigned char *)buf2;
|
||||
bs2.length=BN_bn2bin(serial,bs2.data);
|
||||
|
||||
if (!(bs2 = BN_to_ASN1_INTEGER(serial, NULL)))
|
||||
{ BIO_printf(bio_err,"error converting bn 2 asn1_integer\n"); goto end; }
|
||||
if (BIO_write_filename(io,buf) <= 0)
|
||||
{
|
||||
BIO_printf(bio_err,"error attempting to write serial number file\n");
|
||||
perror(buf);
|
||||
goto end;
|
||||
}
|
||||
i2a_ASN1_INTEGER(io,&bs2);
|
||||
i2a_ASN1_INTEGER(io,bs2);
|
||||
BIO_puts(io,"\n");
|
||||
|
||||
BIO_free(io);
|
||||
if (buf) OPENSSL_free(buf);
|
||||
ASN1_INTEGER_free(bs2);
|
||||
BN_free(serial);
|
||||
io=NULL;
|
||||
|
||||
return bs;
|
||||
|
||||
end:
|
||||
if (buf) OPENSSL_free(buf);
|
||||
BIO_free(io);
|
||||
ASN1_INTEGER_free(bs);
|
||||
BN_free(serial);
|
||||
return NULL;
|
||||
|
||||
}
|
||||
|
||||
static int x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest,
|
||||
X509 *x, X509 *xca, EVP_PKEY *pkey, char *serialfile, int create,
|
||||
int days, int clrext, CONF *conf, char *section, ASN1_INTEGER *sno)
|
||||
{
|
||||
int ret=0;
|
||||
ASN1_INTEGER *bs=NULL;
|
||||
X509_STORE_CTX xsc;
|
||||
EVP_PKEY *upkey;
|
||||
|
||||
upkey = X509_get_pubkey(xca);
|
||||
EVP_PKEY_copy_parameters(upkey,pkey);
|
||||
EVP_PKEY_free(upkey);
|
||||
|
||||
if(!X509_STORE_CTX_init(&xsc,ctx,x,NULL))
|
||||
{
|
||||
BIO_printf(bio_err,"Error initialising X509 store\n");
|
||||
goto end;
|
||||
}
|
||||
if (sno) bs = sno;
|
||||
else if (!(bs = load_serial(CAfile, serialfile, create)))
|
||||
goto end;
|
||||
|
||||
if (!X509_STORE_add_cert(ctx,x)) goto end;
|
||||
|
||||
/* NOTE: this certificate can/should be self signed, unless it was
|
||||
@@ -1137,8 +1183,8 @@ static int x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest,
|
||||
X509V3_CTX ctx2;
|
||||
X509_set_version(x,2); /* version 3 certificate */
|
||||
X509V3_set_ctx(&ctx2, xca, x, NULL, NULL, 0);
|
||||
X509V3_set_conf_lhash(&ctx2, conf);
|
||||
if (!X509V3_EXT_add_conf(conf, &ctx2, section, x)) goto end;
|
||||
X509V3_set_nconf(&ctx2, conf);
|
||||
if (!X509V3_EXT_add_nconf(conf, &ctx2, section, x)) goto end;
|
||||
}
|
||||
|
||||
if (!X509_sign(x,pkey,digest)) goto end;
|
||||
@@ -1147,10 +1193,7 @@ end:
|
||||
X509_STORE_CTX_cleanup(&xsc);
|
||||
if (!ret)
|
||||
ERR_print_errors(bio_err);
|
||||
if (buf != NULL) OPENSSL_free(buf);
|
||||
if (bs != NULL) ASN1_INTEGER_free(bs);
|
||||
if (io != NULL) BIO_free(io);
|
||||
if (serial != NULL) BN_free(serial);
|
||||
if (!sno) ASN1_INTEGER_free(bs);
|
||||
return ret;
|
||||
}
|
||||
|
||||
@@ -1187,7 +1230,7 @@ static int MS_CALLBACK callb(int ok, X509_STORE_CTX *ctx)
|
||||
|
||||
/* self sign */
|
||||
static int sign(X509 *x, EVP_PKEY *pkey, int days, int clrext, const EVP_MD *digest,
|
||||
LHASH *conf, char *section)
|
||||
CONF *conf, char *section)
|
||||
{
|
||||
|
||||
EVP_PKEY *pktmp;
|
||||
@@ -1217,8 +1260,8 @@ static int sign(X509 *x, EVP_PKEY *pkey, int days, int clrext, const EVP_MD *dig
|
||||
X509V3_CTX ctx;
|
||||
X509_set_version(x,2); /* version 3 certificate */
|
||||
X509V3_set_ctx(&ctx, x, x, NULL, NULL, 0);
|
||||
X509V3_set_conf_lhash(&ctx, conf);
|
||||
if (!X509V3_EXT_add_conf(conf, &ctx, section, x)) goto err;
|
||||
X509V3_set_nconf(&ctx, conf);
|
||||
if (!X509V3_EXT_add_nconf(conf, &ctx, section, x)) goto err;
|
||||
}
|
||||
if (!X509_sign(x,pkey,digest)) goto err;
|
||||
return 1;
|
||||
@@ -1243,6 +1286,3 @@ static int purpose_print(BIO *bio, X509 *cert, X509_PURPOSE *pt)
|
||||
}
|
||||
return 1;
|
||||
}
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -58,7 +58,7 @@
|
||||
|
||||
#include <stdio.h>
|
||||
#include <openssl/rc4.h>
|
||||
#ifdef NO_DES
|
||||
#ifdef OPENSSL_NO_DES
|
||||
#include <des.h>
|
||||
#else
|
||||
#include <openssl/des.h>
|
||||
|
||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user