diff options
author | miod <> | 2014-11-09 19:17:13 +0000 |
---|---|---|
committer | miod <> | 2014-11-09 19:17:13 +0000 |
commit | 12455d6eff265f95b0a7e20595630321799f50a2 (patch) | |
tree | 8f4747a1df4b007feca32e262b38052339c686c1 /src/lib/libcrypto/pkcs7 | |
parent | a3c50c7d270773c83559454fd2b75ec6e04f43ab (diff) | |
download | openbsd-12455d6eff265f95b0a7e20595630321799f50a2.tar.gz openbsd-12455d6eff265f95b0a7e20595630321799f50a2.tar.bz2 openbsd-12455d6eff265f95b0a7e20595630321799f50a2.zip |
GOST crypto algorithms (well, most of them), ported from the removed GOST
engine to regular EVP citizens, contributed by Dmitry Eremin-Solenikov;
libcrypto bits only for now.
This is a verbatim import of Dmitry's work, and does not compile in this
state; the forthcoming commits will address these issues.
None of the GOST code is enabled in libcrypto yet, for it still gets
compiled with OPENSSL_NO_GOST defined. However, the public header gost.h
will be installed.
Diffstat (limited to 'src/lib/libcrypto/pkcs7')
-rw-r--r-- | src/lib/libcrypto/pkcs7/pk7_smime.c | 4 |
1 files changed, 3 insertions, 1 deletions
diff --git a/src/lib/libcrypto/pkcs7/pk7_smime.c b/src/lib/libcrypto/pkcs7/pk7_smime.c index b76e2b1915..576866f5c2 100644 --- a/src/lib/libcrypto/pkcs7/pk7_smime.c +++ b/src/lib/libcrypto/pkcs7/pk7_smime.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: pk7_smime.c,v 1.18 2014/07/11 08:44:49 jsing Exp $ */ | 1 | /* $OpenBSD: pk7_smime.c,v 1.19 2014/11/09 19:17:13 miod Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project. | 3 | * project. |
4 | */ | 4 | */ |
@@ -192,6 +192,8 @@ PKCS7_sign_add_signer(PKCS7 *p7, X509 *signcert, EVP_PKEY *pkey, | |||
192 | } | 192 | } |
193 | if (!add_cipher_smcap(smcap, NID_aes_256_cbc, -1) || | 193 | if (!add_cipher_smcap(smcap, NID_aes_256_cbc, -1) || |
194 | !add_digest_smcap(smcap, NID_id_GostR3411_94, -1) || | 194 | !add_digest_smcap(smcap, NID_id_GostR3411_94, -1) || |
195 | !add_digest_smcap(smcap, NID_id_tc26_gost3411_2012_256, -1) || | ||
196 | !add_digest_smcap(smcap, NID_id_tc26_gost3411_2012_512, -1) || | ||
195 | !add_cipher_smcap(smcap, NID_id_Gost28147_89, -1) || | 197 | !add_cipher_smcap(smcap, NID_id_Gost28147_89, -1) || |
196 | !add_cipher_smcap(smcap, NID_aes_192_cbc, -1) || | 198 | !add_cipher_smcap(smcap, NID_aes_192_cbc, -1) || |
197 | !add_cipher_smcap(smcap, NID_aes_128_cbc, -1) || | 199 | !add_cipher_smcap(smcap, NID_aes_128_cbc, -1) || |