bbd86bf542
Only two macros CRYPTO_MDEBUG and CRYPTO_MDEBUG_ABORT to control this. If CRYPTO_MDEBUG is not set, #ifdef out the whole debug machinery. (Thanks to Jakob Bohm for the suggestion!) Make the "change wrapper functions" be the only paradigm. Wrote documentation! Format the 'set func' functions so their paramlists are legible. Format some multi-line comments. Remove ability to get/set the "memory debug" functions at runtme. Remove MemCheck_* and CRYPTO_malloc_debug_init macros. Add CRYPTO_mem_debug(int flag) function. Add test/memleaktest. Rename CRYPTO_malloc_init to OPENSSL_malloc_init; remove needless calls. Reviewed-by: Richard Levitte <levitte@openssl.org>
169 lines
4 KiB
C
169 lines
4 KiB
C
/* NOCW */
|
|
/* cc -o ssdemo -I../include selfsign.c ../libcrypto.a */
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
|
|
#include <openssl/pem.h>
|
|
#include <openssl/conf.h>
|
|
#include <openssl/x509v3.h>
|
|
|
|
int mkit(X509 **x509p, EVP_PKEY **pkeyp, int bits, int serial, int days);
|
|
|
|
int main()
|
|
{
|
|
BIO *bio_err;
|
|
X509 *x509 = NULL;
|
|
EVP_PKEY *pkey = NULL;
|
|
|
|
CRYPTO_set_mem_debug(1);
|
|
CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ON);
|
|
|
|
bio_err = BIO_new_fp(stderr, BIO_NOCLOSE);
|
|
|
|
mkit(&x509, &pkey, 512, 0, 365);
|
|
|
|
RSA_print_fp(stdout, pkey->pkey.rsa, 0);
|
|
X509_print_fp(stdout, x509);
|
|
|
|
PEM_write_PrivateKey(stdout, pkey, NULL, NULL, 0, NULL, NULL);
|
|
PEM_write_X509(stdout, x509);
|
|
|
|
X509_free(x509);
|
|
EVP_PKEY_free(pkey);
|
|
|
|
#ifdef CUSTOM_EXT
|
|
/* Only needed if we add objects or custom extensions */
|
|
X509V3_EXT_cleanup();
|
|
OBJ_cleanup();
|
|
#endif
|
|
|
|
CRYPTO_mem_leaks(bio_err);
|
|
BIO_free(bio_err);
|
|
return (0);
|
|
}
|
|
|
|
static void callback(p, n, arg)
|
|
int p;
|
|
int n;
|
|
void *arg;
|
|
{
|
|
char c = 'B';
|
|
|
|
if (p == 0)
|
|
c = '.';
|
|
if (p == 1)
|
|
c = '+';
|
|
if (p == 2)
|
|
c = '*';
|
|
if (p == 3)
|
|
c = '\n';
|
|
fputc(c, stderr);
|
|
}
|
|
|
|
int mkit(x509p, pkeyp, bits, serial, days)
|
|
X509 **x509p;
|
|
EVP_PKEY **pkeyp;
|
|
int bits;
|
|
int serial;
|
|
int days;
|
|
{
|
|
X509 *x;
|
|
EVP_PKEY *pk;
|
|
RSA *rsa;
|
|
X509_NAME *name = NULL;
|
|
X509_NAME_ENTRY *ne = NULL;
|
|
X509_EXTENSION *ex = NULL;
|
|
|
|
if ((pkeyp == NULL) || (*pkeyp == NULL)) {
|
|
if ((pk = EVP_PKEY_new()) == NULL) {
|
|
abort();
|
|
return (0);
|
|
}
|
|
} else
|
|
pk = *pkeyp;
|
|
|
|
if ((x509p == NULL) || (*x509p == NULL)) {
|
|
if ((x = X509_new()) == NULL)
|
|
goto err;
|
|
} else
|
|
x = *x509p;
|
|
|
|
rsa = RSA_generate_key(bits, RSA_F4, callback, NULL);
|
|
if (!EVP_PKEY_assign_RSA(pk, rsa)) {
|
|
abort();
|
|
goto err;
|
|
}
|
|
rsa = NULL;
|
|
|
|
X509_set_version(x, 3);
|
|
ASN1_INTEGER_set(X509_get_serialNumber(x), serial);
|
|
X509_gmtime_adj(X509_get_notBefore(x), 0);
|
|
X509_gmtime_adj(X509_get_notAfter(x), (long)60 * 60 * 24 * days);
|
|
X509_set_pubkey(x, pk);
|
|
|
|
name = X509_get_subject_name(x);
|
|
|
|
/*
|
|
* This function creates and adds the entry, working out the correct
|
|
* string type and performing checks on its length. Normally we'd check
|
|
* the return value for errors...
|
|
*/
|
|
X509_NAME_add_entry_by_txt(name, "C", MBSTRING_ASC, "UK", -1, -1, 0);
|
|
X509_NAME_add_entry_by_txt(name, "CN",
|
|
MBSTRING_ASC, "OpenSSL Group", -1, -1, 0);
|
|
|
|
X509_set_issuer_name(x, name);
|
|
|
|
/*
|
|
* Add extension using V3 code: we can set the config file as NULL
|
|
* because we wont reference any other sections. We can also set the
|
|
* context to NULL because none of these extensions below will need to
|
|
* access it.
|
|
*/
|
|
|
|
ex = X509V3_EXT_conf_nid(NULL, NULL, NID_netscape_cert_type, "server");
|
|
X509_add_ext(x, ex, -1);
|
|
X509_EXTENSION_free(ex);
|
|
|
|
ex = X509V3_EXT_conf_nid(NULL, NULL, NID_netscape_comment,
|
|
"example comment extension");
|
|
X509_add_ext(x, ex, -1);
|
|
X509_EXTENSION_free(ex);
|
|
|
|
ex = X509V3_EXT_conf_nid(NULL, NULL, NID_netscape_ssl_server_name,
|
|
"www.openssl.org");
|
|
|
|
X509_add_ext(x, ex, -1);
|
|
X509_EXTENSION_free(ex);
|
|
|
|
#ifdef ADD_CA_CONSTRAINT
|
|
/* might want something like this too.... */
|
|
ex = X509V3_EXT_conf_nid(NULL, NULL, NID_basic_constraints,
|
|
"critical,CA:TRUE");
|
|
|
|
X509_add_ext(x, ex, -1);
|
|
X509_EXTENSION_free(ex);
|
|
#endif
|
|
|
|
#ifdef ADD_A_CUSTOM_EXTENSION
|
|
/* Maybe even add our own extension based on existing */
|
|
{
|
|
int nid;
|
|
nid = OBJ_create("1.2.3.4", "MyAlias", "My Test Alias Extension");
|
|
X509V3_EXT_add_alias(nid, NID_netscape_comment);
|
|
ex = X509V3_EXT_conf_nid(NULL, NULL, nid, "example comment alias");
|
|
X509_add_ext(x, ex, -1);
|
|
X509_EXTENSION_free(ex);
|
|
}
|
|
#endif
|
|
|
|
if (!X509_sign(x, pk, EVP_md5()))
|
|
goto err;
|
|
|
|
*x509p = x;
|
|
*pkeyp = pk;
|
|
return (1);
|
|
err:
|
|
return (0);
|
|
}
|