diff options
| author | tedu <> | 2014-07-09 21:02:35 +0000 |
|---|---|---|
| committer | tedu <> | 2014-07-09 21:02:35 +0000 |
| commit | 3959f9f6f990883581554dcab8e72a0a88435215 (patch) | |
| tree | f2eda96cf09f45abd8f8a4b603044f1f495fa2be /src | |
| parent | c754d242334164abfaf99184420a18b9d36e8d1b (diff) | |
| download | openbsd-3959f9f6f990883581554dcab8e72a0a88435215.tar.gz openbsd-3959f9f6f990883581554dcab8e72a0a88435215.tar.bz2 openbsd-3959f9f6f990883581554dcab8e72a0a88435215.zip | |
unifdef a whole bunch of NO RSA/DSA/ECDH defines i deleted from libssl
Diffstat (limited to 'src')
| -rw-r--r-- | src/lib/libssl/src/apps/apps.c | 6 | ||||
| -rw-r--r-- | src/lib/libssl/src/apps/dhparam.c | 16 | ||||
| -rw-r--r-- | src/lib/libssl/src/apps/dsa.c | 4 | ||||
| -rw-r--r-- | src/lib/libssl/src/apps/dsaparam.c | 4 | ||||
| -rw-r--r-- | src/lib/libssl/src/apps/gendsa.c | 4 | ||||
| -rw-r--r-- | src/lib/libssl/src/apps/genrsa.c | 4 | ||||
| -rw-r--r-- | src/lib/libssl/src/apps/req.c | 12 | ||||
| -rw-r--r-- | src/lib/libssl/src/apps/rsa.c | 4 | ||||
| -rw-r--r-- | src/lib/libssl/src/apps/rsautl.c | 4 | ||||
| -rw-r--r-- | src/lib/libssl/src/apps/s_server.c | 22 | ||||
| -rw-r--r-- | src/lib/libssl/src/apps/speed.c | 112 | ||||
| -rw-r--r-- | src/lib/libssl/src/apps/x509.c | 10 |
12 files changed, 12 insertions, 190 deletions
diff --git a/src/lib/libssl/src/apps/apps.c b/src/lib/libssl/src/apps/apps.c index 17f4f7668c..e586ec26cc 100644 --- a/src/lib/libssl/src/apps/apps.c +++ b/src/lib/libssl/src/apps/apps.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: apps.c,v 1.62 2014/07/09 20:37:20 tedu Exp $ */ | 1 | /* $OpenBSD: apps.c,v 1.63 2014/07/09 21:02:35 tedu Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -137,9 +137,7 @@ | |||
| 137 | #include <openssl/engine.h> | 137 | #include <openssl/engine.h> |
| 138 | #endif | 138 | #endif |
| 139 | 139 | ||
| 140 | #ifndef OPENSSL_NO_RSA | ||
| 141 | #include <openssl/rsa.h> | 140 | #include <openssl/rsa.h> |
| 142 | #endif | ||
| 143 | 141 | ||
| 144 | typedef struct { | 142 | typedef struct { |
| 145 | const char *name; | 143 | const char *name; |
| @@ -797,7 +795,6 @@ load_pubkey(BIO *err, const char *file, int format, int maybe_stdin, | |||
| 797 | if (format == FORMAT_ASN1) { | 795 | if (format == FORMAT_ASN1) { |
| 798 | pkey = d2i_PUBKEY_bio(key, NULL); | 796 | pkey = d2i_PUBKEY_bio(key, NULL); |
| 799 | } | 797 | } |
| 800 | #ifndef OPENSSL_NO_RSA | ||
| 801 | else if (format == FORMAT_ASN1RSA) { | 798 | else if (format == FORMAT_ASN1RSA) { |
| 802 | RSA *rsa; | 799 | RSA *rsa; |
| 803 | rsa = d2i_RSAPublicKey_bio(key, NULL); | 800 | rsa = d2i_RSAPublicKey_bio(key, NULL); |
| @@ -819,7 +816,6 @@ load_pubkey(BIO *err, const char *file, int format, int maybe_stdin, | |||
| 819 | } else | 816 | } else |
| 820 | pkey = NULL; | 817 | pkey = NULL; |
| 821 | } | 818 | } |
| 822 | #endif | ||
| 823 | else if (format == FORMAT_PEM) { | 819 | else if (format == FORMAT_PEM) { |
| 824 | pkey = PEM_read_bio_PUBKEY(key, NULL, password_callback, &cb_data); | 820 | pkey = PEM_read_bio_PUBKEY(key, NULL, password_callback, &cb_data); |
| 825 | } | 821 | } |
diff --git a/src/lib/libssl/src/apps/dhparam.c b/src/lib/libssl/src/apps/dhparam.c index 935687ffeb..4bd888541b 100644 --- a/src/lib/libssl/src/apps/dhparam.c +++ b/src/lib/libssl/src/apps/dhparam.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: dhparam.c,v 1.30 2014/06/12 15:49:27 deraadt Exp $ */ | 1 | /* $OpenBSD: dhparam.c,v 1.31 2014/07/09 21:02:35 tedu Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -127,9 +127,7 @@ | |||
| 127 | #include <openssl/pem.h> | 127 | #include <openssl/pem.h> |
| 128 | #include <openssl/x509.h> | 128 | #include <openssl/x509.h> |
| 129 | 129 | ||
| 130 | #ifndef OPENSSL_NO_DSA | ||
| 131 | #include <openssl/dsa.h> | 130 | #include <openssl/dsa.h> |
| 132 | #endif | ||
| 133 | 131 | ||
| 134 | #define DEFBITS 512 | 132 | #define DEFBITS 512 |
| 135 | 133 | ||
| @@ -153,9 +151,7 @@ dhparam_main(int argc, char **argv) | |||
| 153 | { | 151 | { |
| 154 | DH *dh = NULL; | 152 | DH *dh = NULL; |
| 155 | int i, badops = 0, text = 0; | 153 | int i, badops = 0, text = 0; |
| 156 | #ifndef OPENSSL_NO_DSA | ||
| 157 | int dsaparam = 0; | 154 | int dsaparam = 0; |
| 158 | #endif | ||
| 159 | BIO *in = NULL, *out = NULL; | 155 | BIO *in = NULL, *out = NULL; |
| 160 | int informat, outformat, check = 0, noout = 0, C = 0, ret = 1; | 156 | int informat, outformat, check = 0, noout = 0, C = 0, ret = 1; |
| 161 | char *infile, *outfile, *prog; | 157 | char *infile, *outfile, *prog; |
| @@ -204,10 +200,8 @@ dhparam_main(int argc, char **argv) | |||
| 204 | check = 1; | 200 | check = 1; |
| 205 | else if (strcmp(*argv, "-text") == 0) | 201 | else if (strcmp(*argv, "-text") == 0) |
| 206 | text = 1; | 202 | text = 1; |
| 207 | #ifndef OPENSSL_NO_DSA | ||
| 208 | else if (strcmp(*argv, "-dsaparam") == 0) | 203 | else if (strcmp(*argv, "-dsaparam") == 0) |
| 209 | dsaparam = 1; | 204 | dsaparam = 1; |
| 210 | #endif | ||
| 211 | else if (strcmp(*argv, "-C") == 0) | 205 | else if (strcmp(*argv, "-C") == 0) |
| 212 | C = 1; | 206 | C = 1; |
| 213 | else if (strcmp(*argv, "-noout") == 0) | 207 | else if (strcmp(*argv, "-noout") == 0) |
| @@ -230,9 +224,7 @@ bad: | |||
| 230 | BIO_printf(bio_err, " -outform arg output format - one of DER PEM\n"); | 224 | BIO_printf(bio_err, " -outform arg output format - one of DER PEM\n"); |
| 231 | BIO_printf(bio_err, " -in arg input file\n"); | 225 | BIO_printf(bio_err, " -in arg input file\n"); |
| 232 | BIO_printf(bio_err, " -out arg output file\n"); | 226 | BIO_printf(bio_err, " -out arg output file\n"); |
| 233 | #ifndef OPENSSL_NO_DSA | ||
| 234 | BIO_printf(bio_err, " -dsaparam read or generate DSA parameters, convert to DH\n"); | 227 | BIO_printf(bio_err, " -dsaparam read or generate DSA parameters, convert to DH\n"); |
| 235 | #endif | ||
| 236 | BIO_printf(bio_err, " -check check the DH parameters\n"); | 228 | BIO_printf(bio_err, " -check check the DH parameters\n"); |
| 237 | BIO_printf(bio_err, " -text print a text form of the DH parameters\n"); | 229 | BIO_printf(bio_err, " -text print a text form of the DH parameters\n"); |
| 238 | BIO_printf(bio_err, " -C Output C code\n"); | 230 | BIO_printf(bio_err, " -C Output C code\n"); |
| @@ -254,14 +246,12 @@ bad: | |||
| 254 | if (g && !num) | 246 | if (g && !num) |
| 255 | num = DEFBITS; | 247 | num = DEFBITS; |
| 256 | 248 | ||
| 257 | #ifndef OPENSSL_NO_DSA | ||
| 258 | if (dsaparam) { | 249 | if (dsaparam) { |
| 259 | if (g) { | 250 | if (g) { |
| 260 | BIO_printf(bio_err, "generator may not be chosen for DSA parameters\n"); | 251 | BIO_printf(bio_err, "generator may not be chosen for DSA parameters\n"); |
| 261 | goto end; | 252 | goto end; |
| 262 | } | 253 | } |
| 263 | } else | 254 | } else |
| 264 | #endif | ||
| 265 | { | 255 | { |
| 266 | /* DH parameters */ | 256 | /* DH parameters */ |
| 267 | if (num && !g) | 257 | if (num && !g) |
| @@ -272,7 +262,6 @@ bad: | |||
| 272 | 262 | ||
| 273 | BN_GENCB cb; | 263 | BN_GENCB cb; |
| 274 | BN_GENCB_set(&cb, dh_cb, bio_err); | 264 | BN_GENCB_set(&cb, dh_cb, bio_err); |
| 275 | #ifndef OPENSSL_NO_DSA | ||
| 276 | if (dsaparam) { | 265 | if (dsaparam) { |
| 277 | DSA *dsa = DSA_new(); | 266 | DSA *dsa = DSA_new(); |
| 278 | 267 | ||
| @@ -291,7 +280,6 @@ bad: | |||
| 291 | goto end; | 280 | goto end; |
| 292 | } | 281 | } |
| 293 | } else | 282 | } else |
| 294 | #endif | ||
| 295 | { | 283 | { |
| 296 | dh = DH_new(); | 284 | dh = DH_new(); |
| 297 | BIO_printf(bio_err, "Generating DH parameters, %d bit long safe prime, generator %d\n", num, g); | 285 | BIO_printf(bio_err, "Generating DH parameters, %d bit long safe prime, generator %d\n", num, g); |
| @@ -321,7 +309,6 @@ bad: | |||
| 321 | BIO_printf(bio_err, "bad input format specified\n"); | 309 | BIO_printf(bio_err, "bad input format specified\n"); |
| 322 | goto end; | 310 | goto end; |
| 323 | } | 311 | } |
| 324 | #ifndef OPENSSL_NO_DSA | ||
| 325 | if (dsaparam) { | 312 | if (dsaparam) { |
| 326 | DSA *dsa; | 313 | DSA *dsa; |
| 327 | 314 | ||
| @@ -342,7 +329,6 @@ bad: | |||
| 342 | goto end; | 329 | goto end; |
| 343 | } | 330 | } |
| 344 | } else | 331 | } else |
| 345 | #endif | ||
| 346 | { | 332 | { |
| 347 | if (informat == FORMAT_ASN1) | 333 | if (informat == FORMAT_ASN1) |
| 348 | dh = d2i_DHparams_bio(in, NULL); | 334 | dh = d2i_DHparams_bio(in, NULL); |
diff --git a/src/lib/libssl/src/apps/dsa.c b/src/lib/libssl/src/apps/dsa.c index 4a05e2d174..d667d6efb7 100644 --- a/src/lib/libssl/src/apps/dsa.c +++ b/src/lib/libssl/src/apps/dsa.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: dsa.c,v 1.25 2014/06/12 15:49:27 deraadt Exp $ */ | 1 | /* $OpenBSD: dsa.c,v 1.26 2014/07/09 21:02:35 tedu Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -58,7 +58,6 @@ | |||
| 58 | 58 | ||
| 59 | #include <openssl/opensslconf.h> /* for OPENSSL_NO_DSA */ | 59 | #include <openssl/opensslconf.h> /* for OPENSSL_NO_DSA */ |
| 60 | 60 | ||
| 61 | #ifndef OPENSSL_NO_DSA | ||
| 62 | 61 | ||
| 63 | #include <stdio.h> | 62 | #include <stdio.h> |
| 64 | #include <stdlib.h> | 63 | #include <stdlib.h> |
| @@ -335,4 +334,3 @@ end: | |||
| 335 | 334 | ||
| 336 | return (ret); | 335 | return (ret); |
| 337 | } | 336 | } |
| 338 | #endif | ||
diff --git a/src/lib/libssl/src/apps/dsaparam.c b/src/lib/libssl/src/apps/dsaparam.c index 18e25d1a21..217679f366 100644 --- a/src/lib/libssl/src/apps/dsaparam.c +++ b/src/lib/libssl/src/apps/dsaparam.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: dsaparam.c,v 1.31 2014/06/29 18:26:26 logan Exp $ */ | 1 | /* $OpenBSD: dsaparam.c,v 1.32 2014/07/09 21:02:35 tedu Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -64,7 +64,6 @@ | |||
| 64 | #undef OPENSSL_NO_DEPRECATED | 64 | #undef OPENSSL_NO_DEPRECATED |
| 65 | #endif | 65 | #endif |
| 66 | 66 | ||
| 67 | #ifndef OPENSSL_NO_DSA | ||
| 68 | 67 | ||
| 69 | #include <stdio.h> | 68 | #include <stdio.h> |
| 70 | #include <stdlib.h> | 69 | #include <stdlib.h> |
| @@ -417,4 +416,3 @@ dsa_cb(int p, int n, BN_GENCB * cb) | |||
| 417 | #endif | 416 | #endif |
| 418 | return 1; | 417 | return 1; |
| 419 | } | 418 | } |
| 420 | #endif | ||
diff --git a/src/lib/libssl/src/apps/gendsa.c b/src/lib/libssl/src/apps/gendsa.c index 92e58a5792..cb86c4ac3e 100644 --- a/src/lib/libssl/src/apps/gendsa.c +++ b/src/lib/libssl/src/apps/gendsa.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: gendsa.c,v 1.27 2014/06/12 15:49:27 deraadt Exp $ */ | 1 | /* $OpenBSD: gendsa.c,v 1.28 2014/07/09 21:02:35 tedu Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -58,7 +58,6 @@ | |||
| 58 | 58 | ||
| 59 | #include <openssl/opensslconf.h> /* for OPENSSL_NO_DSA */ | 59 | #include <openssl/opensslconf.h> /* for OPENSSL_NO_DSA */ |
| 60 | 60 | ||
| 61 | #ifndef OPENSSL_NO_DSA | ||
| 62 | 61 | ||
| 63 | #include <sys/types.h> | 62 | #include <sys/types.h> |
| 64 | #include <sys/stat.h> | 63 | #include <sys/stat.h> |
| @@ -233,4 +232,3 @@ end: | |||
| 233 | 232 | ||
| 234 | return (ret); | 233 | return (ret); |
| 235 | } | 234 | } |
| 236 | #endif | ||
diff --git a/src/lib/libssl/src/apps/genrsa.c b/src/lib/libssl/src/apps/genrsa.c index 9398120809..7b670ece6b 100644 --- a/src/lib/libssl/src/apps/genrsa.c +++ b/src/lib/libssl/src/apps/genrsa.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: genrsa.c,v 1.34 2014/07/09 09:06:58 bcook Exp $ */ | 1 | /* $OpenBSD: genrsa.c,v 1.35 2014/07/09 21:02:35 tedu Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -64,7 +64,6 @@ | |||
| 64 | #undef OPENSSL_NO_DEPRECATED | 64 | #undef OPENSSL_NO_DEPRECATED |
| 65 | #endif | 65 | #endif |
| 66 | 66 | ||
| 67 | #ifndef OPENSSL_NO_RSA | ||
| 68 | 67 | ||
| 69 | #include <sys/types.h> | 68 | #include <sys/types.h> |
| 70 | #include <sys/stat.h> | 69 | #include <sys/stat.h> |
| @@ -288,4 +287,3 @@ genrsa_cb(int p, int n, BN_GENCB * cb) | |||
| 288 | (void) BIO_flush(cb->arg); | 287 | (void) BIO_flush(cb->arg); |
| 289 | return 1; | 288 | return 1; |
| 290 | } | 289 | } |
| 291 | #endif | ||
diff --git a/src/lib/libssl/src/apps/req.c b/src/lib/libssl/src/apps/req.c index dcb7ab4a4a..81a58ca54b 100644 --- a/src/lib/libssl/src/apps/req.c +++ b/src/lib/libssl/src/apps/req.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: req.c,v 1.44 2014/06/28 04:39:41 deraadt Exp $ */ | 1 | /* $OpenBSD: req.c,v 1.45 2014/07/09 21:02:35 tedu Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -81,13 +81,9 @@ | |||
| 81 | #include <openssl/x509.h> | 81 | #include <openssl/x509.h> |
| 82 | #include <openssl/x509v3.h> | 82 | #include <openssl/x509v3.h> |
| 83 | 83 | ||
| 84 | #ifndef OPENSSL_NO_DSA | ||
| 85 | #include <openssl/dsa.h> | 84 | #include <openssl/dsa.h> |
| 86 | #endif | ||
| 87 | 85 | ||
| 88 | #ifndef OPENSSL_NO_RSA | ||
| 89 | #include <openssl/rsa.h> | 86 | #include <openssl/rsa.h> |
| 90 | #endif | ||
| 91 | 87 | ||
| 92 | #define SECTION "req" | 88 | #define SECTION "req" |
| 93 | 89 | ||
| @@ -383,9 +379,7 @@ bad: | |||
| 383 | BIO_printf(bio_err, " -keyout arg file to send the key to\n"); | 379 | BIO_printf(bio_err, " -keyout arg file to send the key to\n"); |
| 384 | BIO_printf(bio_err, " -newkey rsa:bits generate a new RSA key of 'bits' in size\n"); | 380 | BIO_printf(bio_err, " -newkey rsa:bits generate a new RSA key of 'bits' in size\n"); |
| 385 | BIO_printf(bio_err, " -newkey dsa:file generate a new DSA key, parameters taken from CA in 'file'\n"); | 381 | BIO_printf(bio_err, " -newkey dsa:file generate a new DSA key, parameters taken from CA in 'file'\n"); |
| 386 | #ifndef OPENSSL_NO_ECDSA | ||
| 387 | BIO_printf(bio_err, " -newkey ec:file generate a new EC key, parameters taken from CA in 'file'\n"); | 382 | BIO_printf(bio_err, " -newkey ec:file generate a new EC key, parameters taken from CA in 'file'\n"); |
| 388 | #endif | ||
| 389 | BIO_printf(bio_err, " -[digest] Digest to sign with (md5, sha1, md2, mdc2, md4)\n"); | 383 | BIO_printf(bio_err, " -[digest] Digest to sign with (md5, sha1, md2, mdc2, md4)\n"); |
| 390 | BIO_printf(bio_err, " -config file request template file.\n"); | 384 | BIO_printf(bio_err, " -config file request template file.\n"); |
| 391 | BIO_printf(bio_err, " -subj arg set or modify request subject\n"); | 385 | BIO_printf(bio_err, " -subj arg set or modify request subject\n"); |
| @@ -848,11 +842,9 @@ loop: | |||
| 848 | goto end; | 842 | goto end; |
| 849 | } | 843 | } |
| 850 | fprintf(stdout, "Modulus="); | 844 | fprintf(stdout, "Modulus="); |
| 851 | #ifndef OPENSSL_NO_RSA | ||
| 852 | if (EVP_PKEY_base_id(tpubkey) == EVP_PKEY_RSA) | 845 | if (EVP_PKEY_base_id(tpubkey) == EVP_PKEY_RSA) |
| 853 | BN_print(out, tpubkey->pkey.rsa->n); | 846 | BN_print(out, tpubkey->pkey.rsa->n); |
| 854 | else | 847 | else |
| 855 | #endif | ||
| 856 | fprintf(stdout, "Wrong Algorithm type"); | 848 | fprintf(stdout, "Wrong Algorithm type"); |
| 857 | EVP_PKEY_free(tpubkey); | 849 | EVP_PKEY_free(tpubkey); |
| 858 | fprintf(stdout, "\n"); | 850 | fprintf(stdout, "\n"); |
| @@ -1512,7 +1504,6 @@ set_keygen_ctx(BIO * err, const char *gstr, int *pkey_type, | |||
| 1512 | ERR_print_errors(err); | 1504 | ERR_print_errors(err); |
| 1513 | return NULL; | 1505 | return NULL; |
| 1514 | } | 1506 | } |
| 1515 | #ifndef OPENSSL_NO_RSA | ||
| 1516 | if ((*pkey_type == EVP_PKEY_RSA) && (keylen != -1)) { | 1507 | if ((*pkey_type == EVP_PKEY_RSA) && (keylen != -1)) { |
| 1517 | if (EVP_PKEY_CTX_set_rsa_keygen_bits(gctx, keylen) <= 0) { | 1508 | if (EVP_PKEY_CTX_set_rsa_keygen_bits(gctx, keylen) <= 0) { |
| 1518 | BIO_puts(err, "Error setting RSA keysize\n"); | 1509 | BIO_puts(err, "Error setting RSA keysize\n"); |
| @@ -1521,7 +1512,6 @@ set_keygen_ctx(BIO * err, const char *gstr, int *pkey_type, | |||
| 1521 | return NULL; | 1512 | return NULL; |
| 1522 | } | 1513 | } |
| 1523 | } | 1514 | } |
| 1524 | #endif | ||
| 1525 | 1515 | ||
| 1526 | return gctx; | 1516 | return gctx; |
| 1527 | } | 1517 | } |
diff --git a/src/lib/libssl/src/apps/rsa.c b/src/lib/libssl/src/apps/rsa.c index 1fe7e4bae8..2a9995ed5e 100644 --- a/src/lib/libssl/src/apps/rsa.c +++ b/src/lib/libssl/src/apps/rsa.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: rsa.c,v 1.24 2014/06/12 15:49:27 deraadt Exp $ */ | 1 | /* $OpenBSD: rsa.c,v 1.25 2014/07/09 21:02:35 tedu Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -58,7 +58,6 @@ | |||
| 58 | 58 | ||
| 59 | #include <openssl/opensslconf.h> | 59 | #include <openssl/opensslconf.h> |
| 60 | 60 | ||
| 61 | #ifndef OPENSSL_NO_RSA | ||
| 62 | 61 | ||
| 63 | #include <stdio.h> | 62 | #include <stdio.h> |
| 64 | #include <stdlib.h> | 63 | #include <stdlib.h> |
| @@ -394,4 +393,3 @@ end: | |||
| 394 | 393 | ||
| 395 | return (ret); | 394 | return (ret); |
| 396 | } | 395 | } |
| 397 | #endif | ||
diff --git a/src/lib/libssl/src/apps/rsautl.c b/src/lib/libssl/src/apps/rsautl.c index adfae34896..85003780d0 100644 --- a/src/lib/libssl/src/apps/rsautl.c +++ b/src/lib/libssl/src/apps/rsautl.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: rsautl.c,v 1.21 2014/06/12 15:49:27 deraadt Exp $ */ | 1 | /* $OpenBSD: rsautl.c,v 1.22 2014/07/09 21:02:35 tedu Exp $ */ |
| 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
| 3 | * project 2000. | 3 | * project 2000. |
| 4 | */ | 4 | */ |
| @@ -58,7 +58,6 @@ | |||
| 58 | 58 | ||
| 59 | #include <openssl/opensslconf.h> | 59 | #include <openssl/opensslconf.h> |
| 60 | 60 | ||
| 61 | #ifndef OPENSSL_NO_RSA | ||
| 62 | 61 | ||
| 63 | #include <string.h> | 62 | #include <string.h> |
| 64 | 63 | ||
| @@ -343,4 +342,3 @@ usage() | |||
| 343 | 342 | ||
| 344 | } | 343 | } |
| 345 | 344 | ||
| 346 | #endif | ||
diff --git a/src/lib/libssl/src/apps/s_server.c b/src/lib/libssl/src/apps/s_server.c index 1f80a8f7d9..1c13d5517d 100644 --- a/src/lib/libssl/src/apps/s_server.c +++ b/src/lib/libssl/src/apps/s_server.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: s_server.c,v 1.55 2014/07/09 20:59:41 tedu Exp $ */ | 1 | /* $OpenBSD: s_server.c,v 1.56 2014/07/09 21:02:35 tedu Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -173,16 +173,12 @@ | |||
| 173 | #include <openssl/dh.h> | 173 | #include <openssl/dh.h> |
| 174 | #endif | 174 | #endif |
| 175 | 175 | ||
| 176 | #ifndef OPENSSL_NO_RSA | ||
| 177 | #include <openssl/rsa.h> | 176 | #include <openssl/rsa.h> |
| 178 | #endif | ||
| 179 | 177 | ||
| 180 | #include "s_apps.h" | 178 | #include "s_apps.h" |
| 181 | #include "timeouts.h" | 179 | #include "timeouts.h" |
| 182 | 180 | ||
| 183 | #ifndef OPENSSL_NO_RSA | ||
| 184 | static RSA *tmp_rsa_cb(SSL * s, int is_export, int keylength); | 181 | static RSA *tmp_rsa_cb(SSL * s, int is_export, int keylength); |
| 185 | #endif | ||
| 186 | static int sv_body(char *hostname, int s, unsigned char *context); | 182 | static int sv_body(char *hostname, int s, unsigned char *context); |
| 187 | static int www_body(char *hostname, int s, unsigned char *context); | 183 | static int www_body(char *hostname, int s, unsigned char *context); |
| 188 | static void close_accept_socket(void); | 184 | static void close_accept_socket(void); |
| @@ -406,11 +402,9 @@ sv_usage(void) | |||
| 406 | BIO_printf(bio_err, " -dpass arg - second private key file pass phrase source\n"); | 402 | BIO_printf(bio_err, " -dpass arg - second private key file pass phrase source\n"); |
| 407 | BIO_printf(bio_err, " -dhparam arg - DH parameter file to use, in cert file if not specified\n"); | 403 | BIO_printf(bio_err, " -dhparam arg - DH parameter file to use, in cert file if not specified\n"); |
| 408 | BIO_printf(bio_err, " or a default set of parameters is used\n"); | 404 | BIO_printf(bio_err, " or a default set of parameters is used\n"); |
| 409 | #ifndef OPENSSL_NO_ECDH | ||
| 410 | BIO_printf(bio_err, " -named_curve arg - Elliptic curve name to use for ephemeral ECDH keys.\n" \ | 405 | BIO_printf(bio_err, " -named_curve arg - Elliptic curve name to use for ephemeral ECDH keys.\n" \ |
| 411 | " Use \"openssl ecparam -list_curves\" for all names\n" \ | 406 | " Use \"openssl ecparam -list_curves\" for all names\n" \ |
| 412 | " (default is nistp256).\n"); | 407 | " (default is nistp256).\n"); |
| 413 | #endif | ||
| 414 | BIO_printf(bio_err, " -nbio - Run with non-blocking IO\n"); | 408 | BIO_printf(bio_err, " -nbio - Run with non-blocking IO\n"); |
| 415 | BIO_printf(bio_err, " -nbio_test - test with the non-blocking test bio\n"); | 409 | BIO_printf(bio_err, " -nbio_test - test with the non-blocking test bio\n"); |
| 416 | BIO_printf(bio_err, " -crlf - convert LF from terminal into CRLF\n"); | 410 | BIO_printf(bio_err, " -crlf - convert LF from terminal into CRLF\n"); |
| @@ -444,9 +438,7 @@ sv_usage(void) | |||
| 444 | #ifndef OPENSSL_NO_DH | 438 | #ifndef OPENSSL_NO_DH |
| 445 | BIO_printf(bio_err, " -no_dhe - Disable ephemeral DH\n"); | 439 | BIO_printf(bio_err, " -no_dhe - Disable ephemeral DH\n"); |
| 446 | #endif | 440 | #endif |
| 447 | #ifndef OPENSSL_NO_ECDH | ||
| 448 | BIO_printf(bio_err, " -no_ecdhe - Disable ephemeral ECDH\n"); | 441 | BIO_printf(bio_err, " -no_ecdhe - Disable ephemeral ECDH\n"); |
| 449 | #endif | ||
| 450 | BIO_printf(bio_err, " -bugs - Turn on SSL bug compatibility\n"); | 442 | BIO_printf(bio_err, " -bugs - Turn on SSL bug compatibility\n"); |
| 451 | BIO_printf(bio_err, " -www - Respond to a 'GET /' with a status page\n"); | 443 | BIO_printf(bio_err, " -www - Respond to a 'GET /' with a status page\n"); |
| 452 | BIO_printf(bio_err, " -WWW - Respond to a 'GET /<path> HTTP/1.0' with file ./<path>\n"); | 444 | BIO_printf(bio_err, " -WWW - Respond to a 'GET /<path> HTTP/1.0' with file ./<path>\n"); |
| @@ -681,9 +673,7 @@ s_server_main(int argc, char *argv[]) | |||
| 681 | char *CApath = NULL, *CAfile = NULL; | 673 | char *CApath = NULL, *CAfile = NULL; |
| 682 | unsigned char *context = NULL; | 674 | unsigned char *context = NULL; |
| 683 | char *dhfile = NULL; | 675 | char *dhfile = NULL; |
| 684 | #ifndef OPENSSL_NO_ECDH | ||
| 685 | char *named_curve = NULL; | 676 | char *named_curve = NULL; |
| 686 | #endif | ||
| 687 | int badop = 0, bugs = 0; | 677 | int badop = 0, bugs = 0; |
| 688 | int ret = 1; | 678 | int ret = 1; |
| 689 | int off = 0; | 679 | int off = 0; |
| @@ -783,13 +773,11 @@ s_server_main(int argc, char *argv[]) | |||
| 783 | goto bad; | 773 | goto bad; |
| 784 | dhfile = *(++argv); | 774 | dhfile = *(++argv); |
| 785 | } | 775 | } |
| 786 | #ifndef OPENSSL_NO_ECDH | ||
| 787 | else if (strcmp(*argv, "-named_curve") == 0) { | 776 | else if (strcmp(*argv, "-named_curve") == 0) { |
| 788 | if (--argc < 1) | 777 | if (--argc < 1) |
| 789 | goto bad; | 778 | goto bad; |
| 790 | named_curve = *(++argv); | 779 | named_curve = *(++argv); |
| 791 | } | 780 | } |
| 792 | #endif | ||
| 793 | else if (strcmp(*argv, "-dcertform") == 0) { | 781 | else if (strcmp(*argv, "-dcertform") == 0) { |
| 794 | if (--argc < 1) | 782 | if (--argc < 1) |
| 795 | goto bad; | 783 | goto bad; |
| @@ -1123,9 +1111,7 @@ bad: | |||
| 1123 | bio_s_out = BIO_new_fp(stdout, BIO_NOCLOSE); | 1111 | bio_s_out = BIO_new_fp(stdout, BIO_NOCLOSE); |
| 1124 | } | 1112 | } |
| 1125 | } | 1113 | } |
| 1126 | #if !defined(OPENSSL_NO_RSA) || !defined(OPENSSL_NO_DSA) || !defined(OPENSSL_NO_ECDSA) | ||
| 1127 | if (nocert) | 1114 | if (nocert) |
| 1128 | #endif | ||
| 1129 | { | 1115 | { |
| 1130 | s_cert_file = NULL; | 1116 | s_cert_file = NULL; |
| 1131 | s_key_file = NULL; | 1117 | s_key_file = NULL; |
| @@ -1286,7 +1272,6 @@ bad: | |||
| 1286 | } | 1272 | } |
| 1287 | #endif | 1273 | #endif |
| 1288 | 1274 | ||
| 1289 | #ifndef OPENSSL_NO_ECDH | ||
| 1290 | if (!no_ecdhe) { | 1275 | if (!no_ecdhe) { |
| 1291 | EC_KEY *ecdh = NULL; | 1276 | EC_KEY *ecdh = NULL; |
| 1292 | 1277 | ||
| @@ -1324,7 +1309,6 @@ bad: | |||
| 1324 | #endif | 1309 | #endif |
| 1325 | EC_KEY_free(ecdh); | 1310 | EC_KEY_free(ecdh); |
| 1326 | } | 1311 | } |
| 1327 | #endif | ||
| 1328 | 1312 | ||
| 1329 | if (!set_cert_key_stuff(ctx, s_cert, s_key)) | 1313 | if (!set_cert_key_stuff(ctx, s_cert, s_key)) |
| 1330 | goto end; | 1314 | goto end; |
| @@ -1336,7 +1320,6 @@ bad: | |||
| 1336 | if (!set_cert_key_stuff(ctx, s_dcert, s_dkey)) | 1320 | if (!set_cert_key_stuff(ctx, s_dcert, s_dkey)) |
| 1337 | goto end; | 1321 | goto end; |
| 1338 | } | 1322 | } |
| 1339 | #ifndef OPENSSL_NO_RSA | ||
| 1340 | if (!no_tmp_rsa) { | 1323 | if (!no_tmp_rsa) { |
| 1341 | SSL_CTX_set_tmp_rsa_callback(ctx, tmp_rsa_cb); | 1324 | SSL_CTX_set_tmp_rsa_callback(ctx, tmp_rsa_cb); |
| 1342 | #ifndef OPENSSL_NO_TLSEXT | 1325 | #ifndef OPENSSL_NO_TLSEXT |
| @@ -1344,7 +1327,6 @@ bad: | |||
| 1344 | SSL_CTX_set_tmp_rsa_callback(ctx2, tmp_rsa_cb); | 1327 | SSL_CTX_set_tmp_rsa_callback(ctx2, tmp_rsa_cb); |
| 1345 | #endif | 1328 | #endif |
| 1346 | } | 1329 | } |
| 1347 | #endif | ||
| 1348 | 1330 | ||
| 1349 | #ifndef OPENSSL_NO_PSK | 1331 | #ifndef OPENSSL_NO_PSK |
| 1350 | if (psk_key != NULL) { | 1332 | if (psk_key != NULL) { |
| @@ -2213,7 +2195,6 @@ err: | |||
| 2213 | return (ret); | 2195 | return (ret); |
| 2214 | } | 2196 | } |
| 2215 | 2197 | ||
| 2216 | #ifndef OPENSSL_NO_RSA | ||
| 2217 | static RSA * | 2198 | static RSA * |
| 2218 | tmp_rsa_cb(SSL * s, int is_export, int keylength) | 2199 | tmp_rsa_cb(SSL * s, int is_export, int keylength) |
| 2219 | { | 2200 | { |
| @@ -2241,7 +2222,6 @@ tmp_rsa_cb(SSL * s, int is_export, int keylength) | |||
| 2241 | } | 2222 | } |
| 2242 | return (rsa_tmp); | 2223 | return (rsa_tmp); |
| 2243 | } | 2224 | } |
| 2244 | #endif | ||
| 2245 | 2225 | ||
| 2246 | #define MAX_SESSION_ID_ATTEMPTS 10 | 2226 | #define MAX_SESSION_ID_ATTEMPTS 10 |
| 2247 | static int | 2227 | static int |
diff --git a/src/lib/libssl/src/apps/speed.c b/src/lib/libssl/src/apps/speed.c index 1d320db010..8ff12b27c3 100644 --- a/src/lib/libssl/src/apps/speed.c +++ b/src/lib/libssl/src/apps/speed.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: speed.c,v 1.49 2014/06/28 04:39:41 deraadt Exp $ */ | 1 | /* $OpenBSD: speed.c,v 1.50 2014/07/09 21:02:35 tedu Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -116,15 +116,9 @@ | |||
| 116 | #ifndef OPENSSL_NO_DES | 116 | #ifndef OPENSSL_NO_DES |
| 117 | #include <openssl/des.h> | 117 | #include <openssl/des.h> |
| 118 | #endif | 118 | #endif |
| 119 | #ifndef OPENSSL_NO_DSA | ||
| 120 | #include <openssl/dsa.h> | 119 | #include <openssl/dsa.h> |
| 121 | #endif | ||
| 122 | #ifndef OPENSSL_NO_ECDH | ||
| 123 | #include <openssl/ecdh.h> | 120 | #include <openssl/ecdh.h> |
| 124 | #endif | ||
| 125 | #ifndef OPENSSL_NO_ECDSA | ||
| 126 | #include <openssl/ecdsa.h> | 121 | #include <openssl/ecdsa.h> |
| 127 | #endif | ||
| 128 | #ifndef OPENSSL_NO_HMAC | 122 | #ifndef OPENSSL_NO_HMAC |
| 129 | #include <openssl/hmac.h> | 123 | #include <openssl/hmac.h> |
| 130 | #endif | 124 | #endif |
| @@ -149,9 +143,7 @@ | |||
| 149 | #ifndef OPENSSL_NO_RC5 | 143 | #ifndef OPENSSL_NO_RC5 |
| 150 | #include <openssl/rc5.h> | 144 | #include <openssl/rc5.h> |
| 151 | #endif | 145 | #endif |
| 152 | #ifndef OPENSSL_NO_RSA | ||
| 153 | #include <openssl/rsa.h> | 146 | #include <openssl/rsa.h> |
| 154 | #endif | ||
| 155 | #ifndef OPENSSL_NO_RIPEMD | 147 | #ifndef OPENSSL_NO_RIPEMD |
| 156 | #include <openssl/ripemd.h> | 148 | #include <openssl/ripemd.h> |
| 157 | #endif | 149 | #endif |
| @@ -162,12 +154,8 @@ | |||
| 162 | #include <openssl/whrlpool.h> | 154 | #include <openssl/whrlpool.h> |
| 163 | #endif | 155 | #endif |
| 164 | 156 | ||
| 165 | #ifndef OPENSSL_NO_DSA | ||
| 166 | #include "./testdsa.h" | 157 | #include "./testdsa.h" |
| 167 | #endif | ||
| 168 | #ifndef OPENSSL_NO_RSA | ||
| 169 | #include "./testrsa.h" | 158 | #include "./testrsa.h" |
| 170 | #endif | ||
| 171 | 159 | ||
| 172 | #define BUFSIZE ((long)1024*8+1) | 160 | #define BUFSIZE ((long)1024*8+1) |
| 173 | int run = 0; | 161 | int run = 0; |
| @@ -201,18 +189,10 @@ static const char *names[ALGOR_NUM] = { | |||
| 201 | "aes-128 ige", "aes-192 ige", "aes-256 ige", "ghash"}; | 189 | "aes-128 ige", "aes-192 ige", "aes-256 ige", "ghash"}; |
| 202 | static double results[ALGOR_NUM][SIZE_NUM]; | 190 | static double results[ALGOR_NUM][SIZE_NUM]; |
| 203 | static int lengths[SIZE_NUM] = {16, 64, 256, 1024, 8 * 1024}; | 191 | static int lengths[SIZE_NUM] = {16, 64, 256, 1024, 8 * 1024}; |
| 204 | #ifndef OPENSSL_NO_RSA | ||
| 205 | static double rsa_results[RSA_NUM][2]; | 192 | static double rsa_results[RSA_NUM][2]; |
| 206 | #endif | ||
| 207 | #ifndef OPENSSL_NO_DSA | ||
| 208 | static double dsa_results[DSA_NUM][2]; | 193 | static double dsa_results[DSA_NUM][2]; |
| 209 | #endif | ||
| 210 | #ifndef OPENSSL_NO_ECDSA | ||
| 211 | static double ecdsa_results[EC_NUM][2]; | 194 | static double ecdsa_results[EC_NUM][2]; |
| 212 | #endif | ||
| 213 | #ifndef OPENSSL_NO_ECDH | ||
| 214 | static double ecdh_results[EC_NUM][1]; | 195 | static double ecdh_results[EC_NUM][1]; |
| 215 | #endif | ||
| 216 | 196 | ||
| 217 | static void sig_done(int sig); | 197 | static void sig_done(int sig); |
| 218 | 198 | ||
| @@ -234,7 +214,6 @@ Time_F(int s) | |||
| 234 | } | 214 | } |
| 235 | 215 | ||
| 236 | 216 | ||
| 237 | #ifndef OPENSSL_NO_ECDH | ||
| 238 | static const int KDF1_SHA1_len = 20; | 217 | static const int KDF1_SHA1_len = 20; |
| 239 | static void * | 218 | static void * |
| 240 | KDF1_SHA1(const void *in, size_t inlen, void *out, size_t * outlen) | 219 | KDF1_SHA1(const void *in, size_t inlen, void *out, size_t * outlen) |
| @@ -249,7 +228,6 @@ KDF1_SHA1(const void *in, size_t inlen, void *out, size_t * outlen) | |||
| 249 | return NULL; | 228 | return NULL; |
| 250 | #endif /* OPENSSL_NO_SHA */ | 229 | #endif /* OPENSSL_NO_SHA */ |
| 251 | } | 230 | } |
| 252 | #endif /* OPENSSL_NO_ECDH */ | ||
| 253 | 231 | ||
| 254 | 232 | ||
| 255 | int speed_main(int, char **); | 233 | int speed_main(int, char **); |
| @@ -261,12 +239,8 @@ speed_main(int argc, char **argv) | |||
| 261 | int mret = 1; | 239 | int mret = 1; |
| 262 | long count = 0, save_count = 0; | 240 | long count = 0, save_count = 0; |
| 263 | int i, j, k; | 241 | int i, j, k; |
| 264 | #if !defined(OPENSSL_NO_RSA) || !defined(OPENSSL_NO_DSA) | ||
| 265 | long rsa_count; | 242 | long rsa_count; |
| 266 | #endif | ||
| 267 | #ifndef OPENSSL_NO_RSA | ||
| 268 | unsigned rsa_num; | 243 | unsigned rsa_num; |
| 269 | #endif | ||
| 270 | unsigned char md[EVP_MAX_MD_SIZE]; | 244 | unsigned char md[EVP_MAX_MD_SIZE]; |
| 271 | #ifndef OPENSSL_NO_MDC2 | 245 | #ifndef OPENSSL_NO_MDC2 |
| 272 | unsigned char mdc2[MDC2_DIGEST_LENGTH]; | 246 | unsigned char mdc2[MDC2_DIGEST_LENGTH]; |
| @@ -414,7 +388,6 @@ speed_main(int argc, char **argv) | |||
| 414 | #define R_EC_B409 14 | 388 | #define R_EC_B409 14 |
| 415 | #define R_EC_B571 15 | 389 | #define R_EC_B571 15 |
| 416 | 390 | ||
| 417 | #ifndef OPENSSL_NO_RSA | ||
| 418 | RSA *rsa_key[RSA_NUM]; | 391 | RSA *rsa_key[RSA_NUM]; |
| 419 | long rsa_c[RSA_NUM][2]; | 392 | long rsa_c[RSA_NUM][2]; |
| 420 | static unsigned int rsa_bits[RSA_NUM] = {512, 1024, 2048, 4096}; | 393 | static unsigned int rsa_bits[RSA_NUM] = {512, 1024, 2048, 4096}; |
| @@ -423,12 +396,9 @@ speed_main(int argc, char **argv) | |||
| 423 | static int rsa_data_length[RSA_NUM] = { | 396 | static int rsa_data_length[RSA_NUM] = { |
| 424 | sizeof(test512), sizeof(test1024), | 397 | sizeof(test512), sizeof(test1024), |
| 425 | sizeof(test2048), sizeof(test4096)}; | 398 | sizeof(test2048), sizeof(test4096)}; |
| 426 | #endif | ||
| 427 | #ifndef OPENSSL_NO_DSA | ||
| 428 | DSA *dsa_key[DSA_NUM]; | 399 | DSA *dsa_key[DSA_NUM]; |
| 429 | long dsa_c[DSA_NUM][2]; | 400 | long dsa_c[DSA_NUM][2]; |
| 430 | static unsigned int dsa_bits[DSA_NUM] = {512, 1024, 2048}; | 401 | static unsigned int dsa_bits[DSA_NUM] = {512, 1024, 2048}; |
| 431 | #endif | ||
| 432 | #ifndef OPENSSL_NO_EC | 402 | #ifndef OPENSSL_NO_EC |
| 433 | /* | 403 | /* |
| 434 | * We only test over the following curves as they are representative, | 404 | * We only test over the following curves as they are representative, |
| @@ -487,30 +457,22 @@ speed_main(int argc, char **argv) | |||
| 487 | 457 | ||
| 488 | #endif | 458 | #endif |
| 489 | 459 | ||
| 490 | #ifndef OPENSSL_NO_ECDSA | ||
| 491 | unsigned char ecdsasig[256]; | 460 | unsigned char ecdsasig[256]; |
| 492 | unsigned int ecdsasiglen; | 461 | unsigned int ecdsasiglen; |
| 493 | EC_KEY *ecdsa[EC_NUM]; | 462 | EC_KEY *ecdsa[EC_NUM]; |
| 494 | long ecdsa_c[EC_NUM][2]; | 463 | long ecdsa_c[EC_NUM][2]; |
| 495 | #endif | ||
| 496 | 464 | ||
| 497 | #ifndef OPENSSL_NO_ECDH | ||
| 498 | EC_KEY *ecdh_a[EC_NUM], *ecdh_b[EC_NUM]; | 465 | EC_KEY *ecdh_a[EC_NUM], *ecdh_b[EC_NUM]; |
| 499 | unsigned char secret_a[MAX_ECDH_SIZE], secret_b[MAX_ECDH_SIZE]; | 466 | unsigned char secret_a[MAX_ECDH_SIZE], secret_b[MAX_ECDH_SIZE]; |
| 500 | int secret_size_a, secret_size_b; | 467 | int secret_size_a, secret_size_b; |
| 501 | int ecdh_checks = 0; | 468 | int ecdh_checks = 0; |
| 502 | int secret_idx = 0; | 469 | int secret_idx = 0; |
| 503 | long ecdh_c[EC_NUM][2]; | 470 | long ecdh_c[EC_NUM][2]; |
| 504 | #endif | ||
| 505 | 471 | ||
| 506 | int rsa_doit[RSA_NUM]; | 472 | int rsa_doit[RSA_NUM]; |
| 507 | int dsa_doit[DSA_NUM]; | 473 | int dsa_doit[DSA_NUM]; |
| 508 | #ifndef OPENSSL_NO_ECDSA | ||
| 509 | int ecdsa_doit[EC_NUM]; | 474 | int ecdsa_doit[EC_NUM]; |
| 510 | #endif | ||
| 511 | #ifndef OPENSSL_NO_ECDH | ||
| 512 | int ecdh_doit[EC_NUM]; | 475 | int ecdh_doit[EC_NUM]; |
| 513 | #endif | ||
| 514 | int doit[ALGOR_NUM]; | 476 | int doit[ALGOR_NUM]; |
| 515 | int pr_header = 0; | 477 | int pr_header = 0; |
| 516 | const EVP_CIPHER *evp_cipher = NULL; | 478 | const EVP_CIPHER *evp_cipher = NULL; |
| @@ -524,28 +486,20 @@ speed_main(int argc, char **argv) | |||
| 524 | #endif | 486 | #endif |
| 525 | 487 | ||
| 526 | memset(results, 0, sizeof(results)); | 488 | memset(results, 0, sizeof(results)); |
| 527 | #ifndef OPENSSL_NO_DSA | ||
| 528 | memset(dsa_key, 0, sizeof(dsa_key)); | 489 | memset(dsa_key, 0, sizeof(dsa_key)); |
| 529 | #endif | ||
| 530 | #ifndef OPENSSL_NO_ECDSA | ||
| 531 | for (i = 0; i < EC_NUM; i++) | 490 | for (i = 0; i < EC_NUM; i++) |
| 532 | ecdsa[i] = NULL; | 491 | ecdsa[i] = NULL; |
| 533 | #endif | ||
| 534 | #ifndef OPENSSL_NO_ECDH | ||
| 535 | for (i = 0; i < EC_NUM; i++) { | 492 | for (i = 0; i < EC_NUM; i++) { |
| 536 | ecdh_a[i] = NULL; | 493 | ecdh_a[i] = NULL; |
| 537 | ecdh_b[i] = NULL; | 494 | ecdh_b[i] = NULL; |
| 538 | } | 495 | } |
| 539 | #endif | ||
| 540 | 496 | ||
| 541 | if (!load_config(bio_err, NULL)) | 497 | if (!load_config(bio_err, NULL)) |
| 542 | goto end; | 498 | goto end; |
| 543 | 499 | ||
| 544 | #ifndef OPENSSL_NO_RSA | ||
| 545 | memset(rsa_key, 0, sizeof(rsa_key)); | 500 | memset(rsa_key, 0, sizeof(rsa_key)); |
| 546 | for (i = 0; i < RSA_NUM; i++) | 501 | for (i = 0; i < RSA_NUM; i++) |
| 547 | rsa_key[i] = NULL; | 502 | rsa_key[i] = NULL; |
| 548 | #endif | ||
| 549 | 503 | ||
| 550 | if ((buf = malloc((int) BUFSIZE)) == NULL) { | 504 | if ((buf = malloc((int) BUFSIZE)) == NULL) { |
| 551 | BIO_printf(bio_err, "out of memory\n"); | 505 | BIO_printf(bio_err, "out of memory\n"); |
| @@ -565,14 +519,10 @@ speed_main(int argc, char **argv) | |||
| 565 | rsa_doit[i] = 0; | 519 | rsa_doit[i] = 0; |
| 566 | for (i = 0; i < DSA_NUM; i++) | 520 | for (i = 0; i < DSA_NUM; i++) |
| 567 | dsa_doit[i] = 0; | 521 | dsa_doit[i] = 0; |
| 568 | #ifndef OPENSSL_NO_ECDSA | ||
| 569 | for (i = 0; i < EC_NUM; i++) | 522 | for (i = 0; i < EC_NUM; i++) |
| 570 | ecdsa_doit[i] = 0; | 523 | ecdsa_doit[i] = 0; |
| 571 | #endif | ||
| 572 | #ifndef OPENSSL_NO_ECDH | ||
| 573 | for (i = 0; i < EC_NUM; i++) | 524 | for (i = 0; i < EC_NUM; i++) |
| 574 | ecdh_doit[i] = 0; | 525 | ecdh_doit[i] = 0; |
| 575 | #endif | ||
| 576 | 526 | ||
| 577 | 527 | ||
| 578 | j = 0; | 528 | j = 0; |
| @@ -731,7 +681,6 @@ speed_main(int argc, char **argv) | |||
| 731 | doit[D_CBC_256_CML] = 1; | 681 | doit[D_CBC_256_CML] = 1; |
| 732 | else | 682 | else |
| 733 | #endif | 683 | #endif |
| 734 | #ifndef OPENSSL_NO_RSA | ||
| 735 | #if 0 /* was: #ifdef RSAref */ | 684 | #if 0 /* was: #ifdef RSAref */ |
| 736 | if (strcmp(*argv, "rsaref") == 0) { | 685 | if (strcmp(*argv, "rsaref") == 0) { |
| 737 | RSA_set_default_openssl_method(RSA_PKCS1_RSAref()); | 686 | RSA_set_default_openssl_method(RSA_PKCS1_RSAref()); |
| @@ -744,7 +693,6 @@ speed_main(int argc, char **argv) | |||
| 744 | j--; | 693 | j--; |
| 745 | } else | 694 | } else |
| 746 | #endif | 695 | #endif |
| 747 | #endif /* !OPENSSL_NO_RSA */ | ||
| 748 | if (strcmp(*argv, "dsa512") == 0) | 696 | if (strcmp(*argv, "dsa512") == 0) |
| 749 | dsa_doit[R_DSA_512] = 2; | 697 | dsa_doit[R_DSA_512] = 2; |
| 750 | else if (strcmp(*argv, "dsa1024") == 0) | 698 | else if (strcmp(*argv, "dsa1024") == 0) |
| @@ -821,22 +769,17 @@ speed_main(int argc, char **argv) | |||
| 821 | doit[D_CBC_256_CML] = 1; | 769 | doit[D_CBC_256_CML] = 1; |
| 822 | } else | 770 | } else |
| 823 | #endif | 771 | #endif |
| 824 | #ifndef OPENSSL_NO_RSA | ||
| 825 | if (strcmp(*argv, "rsa") == 0) { | 772 | if (strcmp(*argv, "rsa") == 0) { |
| 826 | rsa_doit[R_RSA_512] = 1; | 773 | rsa_doit[R_RSA_512] = 1; |
| 827 | rsa_doit[R_RSA_1024] = 1; | 774 | rsa_doit[R_RSA_1024] = 1; |
| 828 | rsa_doit[R_RSA_2048] = 1; | 775 | rsa_doit[R_RSA_2048] = 1; |
| 829 | rsa_doit[R_RSA_4096] = 1; | 776 | rsa_doit[R_RSA_4096] = 1; |
| 830 | } else | 777 | } else |
| 831 | #endif | ||
| 832 | #ifndef OPENSSL_NO_DSA | ||
| 833 | if (strcmp(*argv, "dsa") == 0) { | 778 | if (strcmp(*argv, "dsa") == 0) { |
| 834 | dsa_doit[R_DSA_512] = 1; | 779 | dsa_doit[R_DSA_512] = 1; |
| 835 | dsa_doit[R_DSA_1024] = 1; | 780 | dsa_doit[R_DSA_1024] = 1; |
| 836 | dsa_doit[R_DSA_2048] = 1; | 781 | dsa_doit[R_DSA_2048] = 1; |
| 837 | } else | 782 | } else |
| 838 | #endif | ||
| 839 | #ifndef OPENSSL_NO_ECDSA | ||
| 840 | if (strcmp(*argv, "ecdsap160") == 0) | 783 | if (strcmp(*argv, "ecdsap160") == 0) |
| 841 | ecdsa_doit[R_EC_P160] = 2; | 784 | ecdsa_doit[R_EC_P160] = 2; |
| 842 | else if (strcmp(*argv, "ecdsap192") == 0) | 785 | else if (strcmp(*argv, "ecdsap192") == 0) |
| @@ -873,8 +816,6 @@ speed_main(int argc, char **argv) | |||
| 873 | for (i = 0; i < EC_NUM; i++) | 816 | for (i = 0; i < EC_NUM; i++) |
| 874 | ecdsa_doit[i] = 1; | 817 | ecdsa_doit[i] = 1; |
| 875 | } else | 818 | } else |
| 876 | #endif | ||
| 877 | #ifndef OPENSSL_NO_ECDH | ||
| 878 | if (strcmp(*argv, "ecdhp160") == 0) | 819 | if (strcmp(*argv, "ecdhp160") == 0) |
| 879 | ecdh_doit[R_EC_P160] = 2; | 820 | ecdh_doit[R_EC_P160] = 2; |
| 880 | else if (strcmp(*argv, "ecdhp192") == 0) | 821 | else if (strcmp(*argv, "ecdhp192") == 0) |
| @@ -911,7 +852,6 @@ speed_main(int argc, char **argv) | |||
| 911 | for (i = 0; i < EC_NUM; i++) | 852 | for (i = 0; i < EC_NUM; i++) |
| 912 | ecdh_doit[i] = 1; | 853 | ecdh_doit[i] = 1; |
| 913 | } else | 854 | } else |
| 914 | #endif | ||
| 915 | { | 855 | { |
| 916 | BIO_printf(bio_err, "Error: bad option or value\n"); | 856 | BIO_printf(bio_err, "Error: bad option or value\n"); |
| 917 | BIO_printf(bio_err, "\n"); | 857 | BIO_printf(bio_err, "\n"); |
| @@ -982,25 +922,17 @@ speed_main(int argc, char **argv) | |||
| 982 | #endif | 922 | #endif |
| 983 | BIO_printf(bio_err, "\n"); | 923 | BIO_printf(bio_err, "\n"); |
| 984 | 924 | ||
| 985 | #ifndef OPENSSL_NO_RSA | ||
| 986 | BIO_printf(bio_err, "rsa512 rsa1024 rsa2048 rsa4096\n"); | 925 | BIO_printf(bio_err, "rsa512 rsa1024 rsa2048 rsa4096\n"); |
| 987 | #endif | ||
| 988 | 926 | ||
| 989 | #ifndef OPENSSL_NO_DSA | ||
| 990 | BIO_printf(bio_err, "dsa512 dsa1024 dsa2048\n"); | 927 | BIO_printf(bio_err, "dsa512 dsa1024 dsa2048\n"); |
| 991 | #endif | ||
| 992 | #ifndef OPENSSL_NO_ECDSA | ||
| 993 | BIO_printf(bio_err, "ecdsap160 ecdsap192 ecdsap224 ecdsap256 ecdsap384 ecdsap521\n"); | 928 | BIO_printf(bio_err, "ecdsap160 ecdsap192 ecdsap224 ecdsap256 ecdsap384 ecdsap521\n"); |
| 994 | BIO_printf(bio_err, "ecdsak163 ecdsak233 ecdsak283 ecdsak409 ecdsak571\n"); | 929 | BIO_printf(bio_err, "ecdsak163 ecdsak233 ecdsak283 ecdsak409 ecdsak571\n"); |
| 995 | BIO_printf(bio_err, "ecdsab163 ecdsab233 ecdsab283 ecdsab409 ecdsab571\n"); | 930 | BIO_printf(bio_err, "ecdsab163 ecdsab233 ecdsab283 ecdsab409 ecdsab571\n"); |
| 996 | BIO_printf(bio_err, "ecdsa\n"); | 931 | BIO_printf(bio_err, "ecdsa\n"); |
| 997 | #endif | ||
| 998 | #ifndef OPENSSL_NO_ECDH | ||
| 999 | BIO_printf(bio_err, "ecdhp160 ecdhp192 ecdhp224 ecdhp256 ecdhp384 ecdhp521\n"); | 932 | BIO_printf(bio_err, "ecdhp160 ecdhp192 ecdhp224 ecdhp256 ecdhp384 ecdhp521\n"); |
| 1000 | BIO_printf(bio_err, "ecdhk163 ecdhk233 ecdhk283 ecdhk409 ecdhk571\n"); | 933 | BIO_printf(bio_err, "ecdhk163 ecdhk233 ecdhk283 ecdhk409 ecdhk571\n"); |
| 1001 | BIO_printf(bio_err, "ecdhb163 ecdhb233 ecdhb283 ecdhb409 ecdhb571\n"); | 934 | BIO_printf(bio_err, "ecdhb163 ecdhb233 ecdhb283 ecdhb409 ecdhb571\n"); |
| 1002 | BIO_printf(bio_err, "ecdh\n"); | 935 | BIO_printf(bio_err, "ecdh\n"); |
| 1003 | #endif | ||
| 1004 | 936 | ||
| 1005 | #ifndef OPENSSL_NO_IDEA | 937 | #ifndef OPENSSL_NO_IDEA |
| 1006 | BIO_printf(bio_err, "idea "); | 938 | BIO_printf(bio_err, "idea "); |
| @@ -1017,9 +949,7 @@ speed_main(int argc, char **argv) | |||
| 1017 | #ifndef OPENSSL_NO_CAMELLIA | 949 | #ifndef OPENSSL_NO_CAMELLIA |
| 1018 | BIO_printf(bio_err, "camellia "); | 950 | BIO_printf(bio_err, "camellia "); |
| 1019 | #endif | 951 | #endif |
| 1020 | #ifndef OPENSSL_NO_RSA | ||
| 1021 | BIO_printf(bio_err, "rsa "); | 952 | BIO_printf(bio_err, "rsa "); |
| 1022 | #endif | ||
| 1023 | #ifndef OPENSSL_NO_BF | 953 | #ifndef OPENSSL_NO_BF |
| 1024 | BIO_printf(bio_err, "blowfish"); | 954 | BIO_printf(bio_err, "blowfish"); |
| 1025 | #endif | 955 | #endif |
| @@ -1061,14 +991,10 @@ speed_main(int argc, char **argv) | |||
| 1061 | rsa_doit[i] = 1; | 991 | rsa_doit[i] = 1; |
| 1062 | for (i = 0; i < DSA_NUM; i++) | 992 | for (i = 0; i < DSA_NUM; i++) |
| 1063 | dsa_doit[i] = 1; | 993 | dsa_doit[i] = 1; |
| 1064 | #ifndef OPENSSL_NO_ECDSA | ||
| 1065 | for (i = 0; i < EC_NUM; i++) | 994 | for (i = 0; i < EC_NUM; i++) |
| 1066 | ecdsa_doit[i] = 1; | 995 | ecdsa_doit[i] = 1; |
| 1067 | #endif | ||
| 1068 | #ifndef OPENSSL_NO_ECDH | ||
| 1069 | for (i = 0; i < EC_NUM; i++) | 996 | for (i = 0; i < EC_NUM; i++) |
| 1070 | ecdh_doit[i] = 1; | 997 | ecdh_doit[i] = 1; |
| 1071 | #endif | ||
| 1072 | } | 998 | } |
| 1073 | for (i = 0; i < ALGOR_NUM; i++) | 999 | for (i = 0; i < ALGOR_NUM; i++) |
| 1074 | if (doit[i]) | 1000 | if (doit[i]) |
| @@ -1077,7 +1003,6 @@ speed_main(int argc, char **argv) | |||
| 1077 | if (usertime == 0 && !mr) | 1003 | if (usertime == 0 && !mr) |
| 1078 | BIO_printf(bio_err, "You have chosen to measure elapsed time instead of user CPU time.\n"); | 1004 | BIO_printf(bio_err, "You have chosen to measure elapsed time instead of user CPU time.\n"); |
| 1079 | 1005 | ||
| 1080 | #ifndef OPENSSL_NO_RSA | ||
| 1081 | for (i = 0; i < RSA_NUM; i++) { | 1006 | for (i = 0; i < RSA_NUM; i++) { |
| 1082 | const unsigned char *p; | 1007 | const unsigned char *p; |
| 1083 | 1008 | ||
| @@ -1097,13 +1022,10 @@ speed_main(int argc, char **argv) | |||
| 1097 | } | 1022 | } |
| 1098 | #endif | 1023 | #endif |
| 1099 | } | 1024 | } |
| 1100 | #endif | ||
| 1101 | 1025 | ||
| 1102 | #ifndef OPENSSL_NO_DSA | ||
| 1103 | dsa_key[0] = get_dsa512(); | 1026 | dsa_key[0] = get_dsa512(); |
| 1104 | dsa_key[1] = get_dsa1024(); | 1027 | dsa_key[1] = get_dsa1024(); |
| 1105 | dsa_key[2] = get_dsa2048(); | 1028 | dsa_key[2] = get_dsa2048(); |
| 1106 | #endif | ||
| 1107 | 1029 | ||
| 1108 | #ifndef OPENSSL_NO_DES | 1030 | #ifndef OPENSSL_NO_DES |
| 1109 | DES_set_key_unchecked(&key, &sch); | 1031 | DES_set_key_unchecked(&key, &sch); |
| @@ -1138,9 +1060,7 @@ speed_main(int argc, char **argv) | |||
| 1138 | #ifndef OPENSSL_NO_CAST | 1060 | #ifndef OPENSSL_NO_CAST |
| 1139 | CAST_set_key(&cast_ks, 16, key16); | 1061 | CAST_set_key(&cast_ks, 16, key16); |
| 1140 | #endif | 1062 | #endif |
| 1141 | #ifndef OPENSSL_NO_RSA | ||
| 1142 | memset(rsa_c, 0, sizeof(rsa_c)); | 1063 | memset(rsa_c, 0, sizeof(rsa_c)); |
| 1143 | #endif | ||
| 1144 | #define COND(c) (run && count<0x7fffffff) | 1064 | #define COND(c) (run && count<0x7fffffff) |
| 1145 | #define COUNT(d) (count) | 1065 | #define COUNT(d) (count) |
| 1146 | signal(SIGALRM, sig_done); | 1066 | signal(SIGALRM, sig_done); |
| @@ -1555,7 +1475,6 @@ speed_main(int argc, char **argv) | |||
| 1555 | } | 1475 | } |
| 1556 | } | 1476 | } |
| 1557 | RAND_pseudo_bytes(buf, 36); | 1477 | RAND_pseudo_bytes(buf, 36); |
| 1558 | #ifndef OPENSSL_NO_RSA | ||
| 1559 | for (j = 0; j < RSA_NUM; j++) { | 1478 | for (j = 0; j < RSA_NUM; j++) { |
| 1560 | int ret; | 1479 | int ret; |
| 1561 | if (!rsa_doit[j]) | 1480 | if (!rsa_doit[j]) |
| @@ -1626,10 +1545,8 @@ speed_main(int argc, char **argv) | |||
| 1626 | rsa_doit[j] = 0; | 1545 | rsa_doit[j] = 0; |
| 1627 | } | 1546 | } |
| 1628 | } | 1547 | } |
| 1629 | #endif | ||
| 1630 | 1548 | ||
| 1631 | RAND_pseudo_bytes(buf, 20); | 1549 | RAND_pseudo_bytes(buf, 20); |
| 1632 | #ifndef OPENSSL_NO_DSA | ||
| 1633 | for (j = 0; j < DSA_NUM; j++) { | 1550 | for (j = 0; j < DSA_NUM; j++) { |
| 1634 | unsigned int kk; | 1551 | unsigned int kk; |
| 1635 | int ret; | 1552 | int ret; |
| @@ -1703,9 +1620,7 @@ speed_main(int argc, char **argv) | |||
| 1703 | dsa_doit[j] = 0; | 1620 | dsa_doit[j] = 0; |
| 1704 | } | 1621 | } |
| 1705 | } | 1622 | } |
| 1706 | #endif | ||
| 1707 | 1623 | ||
| 1708 | #ifndef OPENSSL_NO_ECDSA | ||
| 1709 | for (j = 0; j < EC_NUM; j++) { | 1624 | for (j = 0; j < EC_NUM; j++) { |
| 1710 | int ret; | 1625 | int ret; |
| 1711 | 1626 | ||
| @@ -1792,9 +1707,7 @@ speed_main(int argc, char **argv) | |||
| 1792 | } | 1707 | } |
| 1793 | } | 1708 | } |
| 1794 | } | 1709 | } |
| 1795 | #endif | ||
| 1796 | 1710 | ||
| 1797 | #ifndef OPENSSL_NO_ECDH | ||
| 1798 | for (j = 0; j < EC_NUM; j++) { | 1711 | for (j = 0; j < EC_NUM; j++) { |
| 1799 | if (!ecdh_doit[j]) | 1712 | if (!ecdh_doit[j]) |
| 1800 | continue; | 1713 | continue; |
| @@ -1877,7 +1790,6 @@ speed_main(int argc, char **argv) | |||
| 1877 | ecdh_doit[j] = 0; | 1790 | ecdh_doit[j] = 0; |
| 1878 | } | 1791 | } |
| 1879 | } | 1792 | } |
| 1880 | #endif | ||
| 1881 | show_res: | 1793 | show_res: |
| 1882 | if (!mr) { | 1794 | if (!mr) { |
| 1883 | fprintf(stdout, "%s\n", SSLeay_version(SSLEAY_VERSION)); | 1795 | fprintf(stdout, "%s\n", SSLeay_version(SSLEAY_VERSION)); |
| @@ -1927,7 +1839,6 @@ show_res: | |||
| 1927 | } | 1839 | } |
| 1928 | fprintf(stdout, "\n"); | 1840 | fprintf(stdout, "\n"); |
| 1929 | } | 1841 | } |
| 1930 | #ifndef OPENSSL_NO_RSA | ||
| 1931 | j = 1; | 1842 | j = 1; |
| 1932 | for (k = 0; k < RSA_NUM; k++) { | 1843 | for (k = 0; k < RSA_NUM; k++) { |
| 1933 | if (!rsa_doit[k]) | 1844 | if (!rsa_doit[k]) |
| @@ -1945,8 +1856,6 @@ show_res: | |||
| 1945 | rsa_bits[k], rsa_results[k][0], rsa_results[k][1], | 1856 | rsa_bits[k], rsa_results[k][0], rsa_results[k][1], |
| 1946 | 1.0 / rsa_results[k][0], 1.0 / rsa_results[k][1]); | 1857 | 1.0 / rsa_results[k][0], 1.0 / rsa_results[k][1]); |
| 1947 | } | 1858 | } |
| 1948 | #endif | ||
| 1949 | #ifndef OPENSSL_NO_DSA | ||
| 1950 | j = 1; | 1859 | j = 1; |
| 1951 | for (k = 0; k < DSA_NUM; k++) { | 1860 | for (k = 0; k < DSA_NUM; k++) { |
| 1952 | if (!dsa_doit[k]) | 1861 | if (!dsa_doit[k]) |
| @@ -1963,8 +1872,6 @@ show_res: | |||
| 1963 | dsa_bits[k], dsa_results[k][0], dsa_results[k][1], | 1872 | dsa_bits[k], dsa_results[k][0], dsa_results[k][1], |
| 1964 | 1.0 / dsa_results[k][0], 1.0 / dsa_results[k][1]); | 1873 | 1.0 / dsa_results[k][0], 1.0 / dsa_results[k][1]); |
| 1965 | } | 1874 | } |
| 1966 | #endif | ||
| 1967 | #ifndef OPENSSL_NO_ECDSA | ||
| 1968 | j = 1; | 1875 | j = 1; |
| 1969 | for (k = 0; k < EC_NUM; k++) { | 1876 | for (k = 0; k < EC_NUM; k++) { |
| 1970 | if (!ecdsa_doit[k]) | 1877 | if (!ecdsa_doit[k]) |
| @@ -1985,10 +1892,8 @@ show_res: | |||
| 1985 | ecdsa_results[k][0], ecdsa_results[k][1], | 1892 | ecdsa_results[k][0], ecdsa_results[k][1], |
| 1986 | 1.0 / ecdsa_results[k][0], 1.0 / ecdsa_results[k][1]); | 1893 | 1.0 / ecdsa_results[k][0], 1.0 / ecdsa_results[k][1]); |
| 1987 | } | 1894 | } |
| 1988 | #endif | ||
| 1989 | 1895 | ||
| 1990 | 1896 | ||
| 1991 | #ifndef OPENSSL_NO_ECDH | ||
| 1992 | j = 1; | 1897 | j = 1; |
| 1993 | for (k = 0; k < EC_NUM; k++) { | 1898 | for (k = 0; k < EC_NUM; k++) { |
| 1994 | if (!ecdh_doit[k]) | 1899 | if (!ecdh_doit[k]) |
| @@ -2008,7 +1913,6 @@ show_res: | |||
| 2008 | test_curves_names[k], | 1913 | test_curves_names[k], |
| 2009 | ecdh_results[k][0], 1.0 / ecdh_results[k][0]); | 1914 | ecdh_results[k][0], 1.0 / ecdh_results[k][0]); |
| 2010 | } | 1915 | } |
| 2011 | #endif | ||
| 2012 | 1916 | ||
| 2013 | mret = 0; | 1917 | mret = 0; |
| 2014 | 1918 | ||
| @@ -2016,30 +1920,22 @@ end: | |||
| 2016 | ERR_print_errors(bio_err); | 1920 | ERR_print_errors(bio_err); |
| 2017 | free(buf); | 1921 | free(buf); |
| 2018 | free(buf2); | 1922 | free(buf2); |
| 2019 | #ifndef OPENSSL_NO_RSA | ||
| 2020 | for (i = 0; i < RSA_NUM; i++) | 1923 | for (i = 0; i < RSA_NUM; i++) |
| 2021 | if (rsa_key[i] != NULL) | 1924 | if (rsa_key[i] != NULL) |
| 2022 | RSA_free(rsa_key[i]); | 1925 | RSA_free(rsa_key[i]); |
| 2023 | #endif | ||
| 2024 | #ifndef OPENSSL_NO_DSA | ||
| 2025 | for (i = 0; i < DSA_NUM; i++) | 1926 | for (i = 0; i < DSA_NUM; i++) |
| 2026 | if (dsa_key[i] != NULL) | 1927 | if (dsa_key[i] != NULL) |
| 2027 | DSA_free(dsa_key[i]); | 1928 | DSA_free(dsa_key[i]); |
| 2028 | #endif | ||
| 2029 | 1929 | ||
| 2030 | #ifndef OPENSSL_NO_ECDSA | ||
| 2031 | for (i = 0; i < EC_NUM; i++) | 1930 | for (i = 0; i < EC_NUM; i++) |
| 2032 | if (ecdsa[i] != NULL) | 1931 | if (ecdsa[i] != NULL) |
| 2033 | EC_KEY_free(ecdsa[i]); | 1932 | EC_KEY_free(ecdsa[i]); |
| 2034 | #endif | ||
| 2035 | #ifndef OPENSSL_NO_ECDH | ||
| 2036 | for (i = 0; i < EC_NUM; i++) { | 1933 | for (i = 0; i < EC_NUM; i++) { |
| 2037 | if (ecdh_a[i] != NULL) | 1934 | if (ecdh_a[i] != NULL) |
| 2038 | EC_KEY_free(ecdh_a[i]); | 1935 | EC_KEY_free(ecdh_a[i]); |
| 2039 | if (ecdh_b[i] != NULL) | 1936 | if (ecdh_b[i] != NULL) |
| 2040 | EC_KEY_free(ecdh_b[i]); | 1937 | EC_KEY_free(ecdh_b[i]); |
| 2041 | } | 1938 | } |
| 2042 | #endif | ||
| 2043 | 1939 | ||
| 2044 | 1940 | ||
| 2045 | return (mret); | 1941 | return (mret); |
| @@ -2204,7 +2100,6 @@ do_multi(int multi) | |||
| 2204 | else | 2100 | else |
| 2205 | rsa_results[k][1] = d; | 2101 | rsa_results[k][1] = d; |
| 2206 | } | 2102 | } |
| 2207 | #ifndef OPENSSL_NO_DSA | ||
| 2208 | else if (!strncmp(buf, "+F3:", 4)) { | 2103 | else if (!strncmp(buf, "+F3:", 4)) { |
| 2209 | int k; | 2104 | int k; |
| 2210 | double d; | 2105 | double d; |
| @@ -2226,8 +2121,6 @@ do_multi(int multi) | |||
| 2226 | else | 2121 | else |
| 2227 | dsa_results[k][1] = d; | 2122 | dsa_results[k][1] = d; |
| 2228 | } | 2123 | } |
| 2229 | #endif | ||
| 2230 | #ifndef OPENSSL_NO_ECDSA | ||
| 2231 | else if (!strncmp(buf, "+F4:", 4)) { | 2124 | else if (!strncmp(buf, "+F4:", 4)) { |
| 2232 | int k; | 2125 | int k; |
| 2233 | double d; | 2126 | double d; |
| @@ -2249,9 +2142,7 @@ do_multi(int multi) | |||
| 2249 | else | 2142 | else |
| 2250 | ecdsa_results[k][1] = d; | 2143 | ecdsa_results[k][1] = d; |
| 2251 | } | 2144 | } |
| 2252 | #endif | ||
| 2253 | 2145 | ||
| 2254 | #ifndef OPENSSL_NO_ECDH | ||
| 2255 | else if (!strncmp(buf, "+F5:", 4)) { | 2146 | else if (!strncmp(buf, "+F5:", 4)) { |
| 2256 | int k; | 2147 | int k; |
| 2257 | double d; | 2148 | double d; |
| @@ -2268,7 +2159,6 @@ do_multi(int multi) | |||
| 2268 | ecdh_results[k][0] = d; | 2159 | ecdh_results[k][0] = d; |
| 2269 | 2160 | ||
| 2270 | } | 2161 | } |
| 2271 | #endif | ||
| 2272 | 2162 | ||
| 2273 | else if (!strncmp(buf, "+H:", 3)) { | 2163 | else if (!strncmp(buf, "+H:", 3)) { |
| 2274 | } else | 2164 | } else |
diff --git a/src/lib/libssl/src/apps/x509.c b/src/lib/libssl/src/apps/x509.c index 4f86a1bb53..e6b33c7a19 100644 --- a/src/lib/libssl/src/apps/x509.c +++ b/src/lib/libssl/src/apps/x509.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: x509.c,v 1.46 2014/06/28 04:39:41 deraadt Exp $ */ | 1 | /* $OpenBSD: x509.c,v 1.47 2014/07/09 21:02:35 tedu Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -74,13 +74,9 @@ | |||
| 74 | #include <openssl/x509.h> | 74 | #include <openssl/x509.h> |
| 75 | #include <openssl/x509v3.h> | 75 | #include <openssl/x509v3.h> |
| 76 | 76 | ||
| 77 | #ifndef OPENSSL_NO_DSA | ||
| 78 | #include <openssl/dsa.h> | 77 | #include <openssl/dsa.h> |
| 79 | #endif | ||
| 80 | 78 | ||
| 81 | #ifndef OPENSSL_NO_RSA | ||
| 82 | #include <openssl/rsa.h> | 79 | #include <openssl/rsa.h> |
| 83 | #endif | ||
| 84 | 80 | ||
| 85 | #define POSTFIX ".srl" | 81 | #define POSTFIX ".srl" |
| 86 | #define DEF_DAYS 30 | 82 | #define DEF_DAYS 30 |
| @@ -713,16 +709,12 @@ bad: | |||
| 713 | goto end; | 709 | goto end; |
| 714 | } | 710 | } |
| 715 | BIO_printf(STDout, "Modulus="); | 711 | BIO_printf(STDout, "Modulus="); |
| 716 | #ifndef OPENSSL_NO_RSA | ||
| 717 | if (pkey->type == EVP_PKEY_RSA) | 712 | if (pkey->type == EVP_PKEY_RSA) |
| 718 | BN_print(STDout, pkey->pkey.rsa->n); | 713 | BN_print(STDout, pkey->pkey.rsa->n); |
| 719 | else | 714 | else |
| 720 | #endif | ||
| 721 | #ifndef OPENSSL_NO_DSA | ||
| 722 | if (pkey->type == EVP_PKEY_DSA) | 715 | if (pkey->type == EVP_PKEY_DSA) |
| 723 | BN_print(STDout, pkey->pkey.dsa->pub_key); | 716 | BN_print(STDout, pkey->pkey.dsa->pub_key); |
| 724 | else | 717 | else |
| 725 | #endif | ||
| 726 | BIO_printf(STDout, "Wrong Algorithm type"); | 718 | BIO_printf(STDout, "Wrong Algorithm type"); |
| 727 | BIO_printf(STDout, "\n"); | 719 | BIO_printf(STDout, "\n"); |
| 728 | EVP_PKEY_free(pkey); | 720 | EVP_PKEY_free(pkey); |
