亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? req.c

?? openssl中req程序的VC實現(xiàn)
?? C
?? 第 1 頁 / 共 3 頁
字號:
/* apps/req.c *//* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) * All rights reserved. * * This package is an SSL implementation written * by Eric Young (eay@cryptsoft.com). * The implementation was written so as to conform with Netscapes SSL. *  * This library is free for commercial and non-commercial use as long as * the following conditions are aheared to.  The following conditions * apply to all code found in this distribution, be it the RC4, RSA, * lhash, DES, etc., code; not just the SSL code.  The SSL documentation * included with this distribution is covered by the same copyright terms * except that the holder is Tim Hudson (tjh@cryptsoft.com). *  * Copyright remains Eric Young's, and as such any Copyright notices in * the code are not to be removed. * If this package is used in a product, Eric Young should be given attribution * as the author of the parts of the library used. * This can be in the form of a textual message at program startup or * in documentation (online or textual) provided with the package. *  * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the copyright *    notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright *    notice, this list of conditions and the following disclaimer in the *    documentation and/or other materials provided with the distribution. * 3. All advertising materials mentioning features or use of this software *    must display the following acknowledgement: *    "This product includes cryptographic software written by *     Eric Young (eay@cryptsoft.com)" *    The word 'cryptographic' can be left out if the rouines from the library *    being used are not cryptographic related :-). * 4. If you include any Windows specific code (or a derivative thereof) from  *    the apps directory (application code) you must include an acknowledgement: *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" *  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. *  * The licence and distribution terms for any publically available version or * derivative of this code cannot be changed.  i.e. this code cannot simply be * copied and put under another distribution licence * [including the GNU Public Licence.] */#include <stdio.h>#include <stdlib.h>#include <time.h>#include <string.h>#ifdef NO_STDIO#define APPS_WIN16#endif#include "apps.h"#include <openssl/bio.h>#include <openssl/evp.h>#include <openssl/conf.h>#include <openssl/err.h>#include <openssl/asn1.h>#include <openssl/x509.h>#include <openssl/x509v3.h>#include <openssl/objects.h>#include <openssl/pem.h>#define SECTION		"req"#define BITS		"default_bits"#define KEYFILE		"default_keyfile"#define PROMPT		"prompt"#define DISTINGUISHED_NAME	"distinguished_name"#define ATTRIBUTES	"attributes"#define V3_EXTENSIONS	"x509_extensions"#define REQ_EXTENSIONS	"req_extensions"#define STRING_MASK	"string_mask"#define DEFAULT_KEY_LENGTH	512#define MIN_KEY_LENGTH		384#undef PROG#define PROG	req_main/* -inform arg	- input format - default PEM (DER or PEM) * -outform arg - output format - default PEM * -in arg	- input file - default stdin * -out arg	- output file - default stdout * -verify	- check request signature * -noout	- don't print stuff out. * -text	- print out human readable text. * -nodes	- no des encryption * -config file	- Load configuration file. * -key file	- make a request using key in file (or use it for verification). * -keyform	- key file format. * -rand file(s) - load the file(s) into the PRNG. * -newkey	- make a key and a request. * -modulus	- print RSA modulus. * -x509	- output a self signed X509 structure instead. * -asn1-kludge	- output new certificate request in a format that some CA's *		  require.  This format is wrong */static int make_REQ(X509_REQ *req,EVP_PKEY *pkey,int attribs);static int prompt_info(X509_REQ *req,		STACK_OF(CONF_VALUE) *dn_sk, char *dn_sect,		STACK_OF(CONF_VALUE) *attr_sk, char *attr_sect, int attribs);static int auto_info(X509_REQ *req, STACK_OF(CONF_VALUE) *sk,				STACK_OF(CONF_VALUE) *attr, int attribs);static int add_attribute_object(X509_REQ *req, char *text,				char *def, char *value, int nid, int min,				int max);static int add_DN_object(X509_NAME *n, char *text, char *def, char *value,	int nid,int min,int max);#ifndef NO_RSAstatic void MS_CALLBACK req_cb(int p,int n,void *arg);#endifstatic int req_check_len(int len,int min,int max);static int check_end(char *str, char *end);#ifndef MONOLITHstatic char *default_config_file=NULL;//static LHASH *config=NULL;#endifstatic LHASH *req_conf=NULL;#define TYPE_RSA	1#define TYPE_DSA	2#define TYPE_DH		3int MAIN(int, char **);int MAIN(int argc, char **argv)	{#ifndef NO_DSA	DSA *dsa_params=NULL;#endif	int ex=1,x509=0,days=30;	X509 *x509ss=NULL;	X509_REQ *req=NULL;	EVP_PKEY *pkey=NULL;	int i,badops=0,newreq=0,newkey= -1,pkey_type=0;	BIO *in=NULL,*out=NULL;	int informat,outformat,verify=0,noout=0,text=0,keyform=FORMAT_PEM;	int nodes=0,kludge=0,newhdr=0;	char *infile,*outfile,*prog,*keyfile=NULL,*template=NULL,*keyout=NULL;	char *extensions = NULL;	char *req_exts = NULL;	EVP_CIPHER *cipher=NULL;	int modulus=0;	char *inrand=NULL;	char *passargin = NULL, *passargout = NULL;	char *passin = NULL, *passout = NULL;	char *p;	const EVP_MD *md_alg=NULL,*digest=EVP_md5();#ifndef MONOLITH	MS_STATIC char config_name[256];#endif	req_conf = NULL;#ifndef NO_DES	cipher=EVP_des_ede3_cbc();#endif	apps_startup();	if (bio_err == NULL)		if ((bio_err=BIO_new(BIO_s_file())) != NULL)			BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);	infile=NULL;	outfile=NULL;	informat=FORMAT_PEM;	outformat=FORMAT_PEM;	prog=argv[0];	argc--;	argv++;	while (argc >= 1)		{		if 	(strcmp(*argv,"-inform") == 0)			{			if (--argc < 1) goto bad;			informat=str2fmt(*(++argv));			}		else if (strcmp(*argv,"-outform") == 0)			{			if (--argc < 1) goto bad;			outformat=str2fmt(*(++argv));			}		else if (strcmp(*argv,"-key") == 0)			{			if (--argc < 1) goto bad;			keyfile= *(++argv);			}		else if (strcmp(*argv,"-new") == 0)			{			pkey_type=TYPE_RSA;			newreq=1;			}		else if (strcmp(*argv,"-config") == 0)			{				if (--argc < 1) goto bad;			template= *(++argv);			}		else if (strcmp(*argv,"-keyform") == 0)			{			if (--argc < 1) goto bad;			keyform=str2fmt(*(++argv));			}		else if (strcmp(*argv,"-in") == 0)			{			if (--argc < 1) goto bad;			infile= *(++argv);			}		else if (strcmp(*argv,"-out") == 0)			{			if (--argc < 1) goto bad;			outfile= *(++argv);			}		else if (strcmp(*argv,"-keyout") == 0)			{			if (--argc < 1) goto bad;			keyout= *(++argv);			}		else if (strcmp(*argv,"-passin") == 0)			{			if (--argc < 1) goto bad;			passargin= *(++argv);			}		else if (strcmp(*argv,"-passout") == 0)			{			if (--argc < 1) goto bad;			passargout= *(++argv);			}		else if (strcmp(*argv,"-rand") == 0)			{			if (--argc < 1) goto bad;			inrand= *(++argv);			}		else if (strcmp(*argv,"-newkey") == 0)			{			int is_numeric;			if (--argc < 1) goto bad;			p= *(++argv);			is_numeric = p[0] >= '0' && p[0] <= '9';			if (strncmp("rsa:",p,4) == 0 || is_numeric)				{				pkey_type=TYPE_RSA;				if(!is_numeric)				    p+=4;				newkey= atoi(p);				}			else#ifndef NO_DSA				if (strncmp("dsa:",p,4) == 0)				{				X509 *xtmp=NULL;				EVP_PKEY *dtmp;				pkey_type=TYPE_DSA;				p+=4;				if ((in=BIO_new_file(p,"r")) == NULL)					{					perror(p);					goto end;					}				if ((dsa_params=PEM_read_bio_DSAparams(in,NULL,NULL,NULL)) == NULL)					{					ERR_clear_error();					(void)BIO_reset(in);					if ((xtmp=PEM_read_bio_X509(in,NULL,NULL,NULL)) == NULL)						{						BIO_printf(bio_err,"unable to load DSA parameters from file\n");						goto end;						}					if ((dtmp=X509_get_pubkey(xtmp)) == NULL) goto end;					if (dtmp->type == EVP_PKEY_DSA)						dsa_params=DSAparams_dup(dtmp->pkey.dsa);					EVP_PKEY_free(dtmp);					X509_free(xtmp);					if (dsa_params == NULL)						{						BIO_printf(bio_err,"Certificate does not contain DSA parameters\n");						goto end;						}					}				BIO_free(in);				newkey=BN_num_bits(dsa_params->p);				in=NULL;				}			else #endif#ifndef NO_DH				if (strncmp("dh:",p,4) == 0)				{				pkey_type=TYPE_DH;				p+=3;				}			else#endif				pkey_type=TYPE_RSA;			newreq=1;			}		else if (strcmp(*argv,"-newhdr") == 0)			newhdr=1;		else if (strcmp(*argv,"-modulus") == 0)			modulus=1;		else if (strcmp(*argv,"-verify") == 0)			verify=1;		else if (strcmp(*argv,"-nodes") == 0)			nodes=1;		else if (strcmp(*argv,"-noout") == 0)			noout=1;		else if (strcmp(*argv,"-text") == 0)			text=1;		else if (strcmp(*argv,"-x509") == 0)			x509=1;		else if (strcmp(*argv,"-asn1-kludge") == 0)			kludge=1;		else if (strcmp(*argv,"-no-asn1-kludge") == 0)			kludge=0;		else if (strcmp(*argv,"-days") == 0)			{			if (--argc < 1) goto bad;			days= atoi(*(++argv));			if (days == 0) days=30;			}		else if ((md_alg=EVP_get_digestbyname(&((*argv)[1]))) != NULL)			{			/* ok */			digest=md_alg;			}		else if (strcmp(*argv,"-extensions") == 0)			{			if (--argc < 1) goto bad;			extensions = *(++argv);			}		else if (strcmp(*argv,"-reqexts") == 0)			{			if (--argc < 1) goto bad;			req_exts = *(++argv);			}		else			{			BIO_printf(bio_err,"unknown option %s\n",*argv);			badops=1;			break;			}		argc--;		argv++;		}	if (badops)		{bad:		BIO_printf(bio_err,"%s [options] <infile >outfile\n",prog);		BIO_printf(bio_err,"where options  are\n");		BIO_printf(bio_err," -inform arg    input format - DER or PEM\n");		BIO_printf(bio_err," -outform arg   output format - DER or PEM\n");		BIO_printf(bio_err," -in arg        input file\n");		BIO_printf(bio_err," -out arg       output file\n");		BIO_printf(bio_err," -text          text form of request\n");		BIO_printf(bio_err," -noout         do not output REQ\n");		BIO_printf(bio_err," -verify        verify signature on REQ\n");		BIO_printf(bio_err," -modulus       RSA modulus\n");		BIO_printf(bio_err," -nodes         don't encrypt the output key\n");		BIO_printf(bio_err," -key file	use the private key contained in file\n");		BIO_printf(bio_err," -keyform arg   key file format\n");		BIO_printf(bio_err," -keyout arg    file to send the key to\n");		BIO_printf(bio_err," -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);		BIO_printf(bio_err,"                load the file (or the files in the directory) into\n");		BIO_printf(bio_err,"                the random number generator\n");		BIO_printf(bio_err," -newkey rsa:bits generate a new RSA key of 'bits' in size\n");		BIO_printf(bio_err," -newkey dsa:file generate a new DSA key, parameters taken from CA in 'file'\n");		BIO_printf(bio_err," -[digest]      Digest to sign with (md5, sha1, md2, mdc2, md4)\n");		BIO_printf(bio_err," -config file   request template file.\n");		BIO_printf(bio_err," -new           new request.\n");		BIO_printf(bio_err," -x509          output a x509 structure instead of a cert. req.\n");		BIO_printf(bio_err," -days          number of days a x509 generated by -x509 is valid for.\n");		BIO_printf(bio_err," -newhdr        output \"NEW\" in the header lines\n");		BIO_printf(bio_err," -asn1-kludge   Output the 'request' in a format that is wrong but some CA's\n");		BIO_printf(bio_err,"                have been reported as requiring\n");		BIO_printf(bio_err," -extensions .. specify certificate extension section (override value in config file)\n");		BIO_printf(bio_err," -reqexts ..    specify request extension section (override value in config file)\n");		goto end;		}	ERR_load_crypto_strings();	if(!app_passwd(bio_err, passargin, passargout, &passin, &passout)) {		BIO_printf(bio_err, "Error getting passwords\n");		goto end;	}#ifndef MONOLITH /* else this has happened in openssl.c (global `config') */	/* Lets load up our environment a little */	p=getenv("OPENSSL_CONF");	if (p == NULL)		p=getenv("SSLEAY_CONF");	if (p == NULL)		{		strcpy(config_name,X509_get_default_cert_area());#ifndef VMS		strcat(config_name,"/");#endif		strcat(config_name,OPENSSL_CONF);		p=config_name;		}	default_config_file=p;	config=CONF_load(config,p,NULL);#endif	if (template != NULL)		{		long errline = -1;		BIO_printf(bio_err,"Using configuration from %s\n",template);		req_conf=CONF_load(NULL,template,&errline);		if (req_conf == NULL)			{			BIO_printf(bio_err,"error on line %ld of %s\n",errline,template);

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲.国产.中文慕字在线| 日韩午夜激情电影| 亚洲黄色小视频| 欧美在线影院一区二区| 亚洲制服丝袜av| 欧美日韩高清不卡| 九一九一国产精品| 国产亚洲短视频| 一本到不卡免费一区二区| 亚洲在线观看免费| 欧美一区午夜精品| 国产麻豆成人传媒免费观看| 国产精品污污网站在线观看| 一本到不卡精品视频在线观看| 香蕉av福利精品导航| 精品粉嫩超白一线天av| 成人一级黄色片| 五月综合激情日本mⅴ| 欧美电影免费观看高清完整版在 | 欧美大尺度电影在线| 精品一区二区在线观看| 中文字幕亚洲一区二区av在线| 色综合天天综合网天天狠天天| 美腿丝袜亚洲色图| 国产婷婷色一区二区三区| 色老汉av一区二区三区| 久久国内精品视频| 成人免费一区二区三区视频 | 国产专区综合网| ...中文天堂在线一区| 欧美精品 日韩| 成人激情免费电影网址| 日韩影视精彩在线| 日韩美女视频一区| 欧美成人精精品一区二区频| 91欧美一区二区| 国产最新精品免费| 亚洲va欧美va国产va天堂影院| 久久久久99精品一区| 欧美高清性hdvideosex| 成人av第一页| 狠狠色狠狠色综合系列| 午夜电影网亚洲视频| 国产精品福利一区二区三区| 欧美一区二区私人影院日本| 91麻豆文化传媒在线观看| 国产在线精品一区二区| 五月天亚洲婷婷| 亚洲日本在线视频观看| 国产欧美日韩精品a在线观看| 3d动漫精品啪啪1区2区免费| 色狠狠av一区二区三区| 国产**成人网毛片九色| 麻豆91免费观看| 天堂一区二区在线免费观看| 亚洲激情男女视频| 国产精品的网站| 欧美激情在线免费观看| 久久一日本道色综合| 日韩欧美三级在线| 欧美另类久久久品| 欧美日韩一区 二区 三区 久久精品| 成人午夜视频福利| 成人中文字幕合集| 懂色av中文一区二区三区| 久久精品国产免费看久久精品| 亚洲动漫第一页| 亚洲综合激情网| 亚洲精品午夜久久久| 亚洲人成伊人成综合网小说| 中文字幕精品一区| 中文字幕av一区二区三区高 | 亚洲天堂av一区| 中文字幕一区二区三区四区不卡| 久久精品人人做| 国产午夜精品美女毛片视频| 精品国产露脸精彩对白| 26uuu精品一区二区在线观看| 日韩女优视频免费观看| 欧美成人精品高清在线播放| 欧美成人激情免费网| 欧美精品一区二区三区视频| 国产午夜精品一区二区三区四区| 久久久久免费观看| 国产精品久久免费看| 亚洲男人电影天堂| 亚洲一区视频在线观看视频| 亚洲成人你懂的| 激情久久久久久久久久久久久久久久| 秋霞午夜鲁丝一区二区老狼| 免费看欧美美女黄的网站| 极品少妇xxxx精品少妇| 国产乱理伦片在线观看夜一区| 大胆亚洲人体视频| 色综合天天天天做夜夜夜夜做| 91成人免费网站| 日韩一级黄色大片| 国产亚洲精品中文字幕| 亚洲欧美在线高清| 亚洲二区视频在线| 黑人巨大精品欧美一区| 国产99精品视频| 欧美影院午夜播放| 久久综合一区二区| 成人欧美一区二区三区黑人麻豆| 一区二区视频在线| 免费高清在线一区| 成人激情校园春色| 欧美少妇xxx| 国产亚洲精品久| 亚洲图片欧美一区| 国产乱子伦视频一区二区三区 | 韩国三级电影一区二区| 99在线热播精品免费| 7799精品视频| 中文字幕不卡在线| 日韩av一区二区三区四区| 国产91丝袜在线播放| 欧美三级电影网站| 日本一区二区三区电影| 亚洲国产日韩精品| 成人一区二区三区中文字幕| 欧美乱妇23p| 成人免费在线观看入口| 久热成人在线视频| 欧日韩精品视频| 国产午夜精品一区二区三区视频| 亚洲一区二区视频在线观看| 粉嫩欧美一区二区三区高清影视 | 久久91精品久久久久久秒播 | 欧美精品色一区二区三区| 久久久精品综合| 日本v片在线高清不卡在线观看| 99久久婷婷国产综合精品| 精品毛片乱码1区2区3区| 亚洲成在线观看| 91性感美女视频| 国产亚洲精品久| 国产成人av电影在线| 欧美一区二区精品在线| 亚洲精品国产高清久久伦理二区| 国产真实乱对白精彩久久| 精品视频在线免费| 亚洲视频免费观看| 成人手机在线视频| 久久久久国产精品厨房| 久久av老司机精品网站导航| 欧美丝袜丝nylons| 亚洲啪啪综合av一区二区三区| 国产一区二区三区高清播放| 欧美一区二区三区系列电影| 一区二区三区免费| 91丝袜美腿高跟国产极品老师 | 亚洲欧洲综合另类| 成人黄色a**站在线观看| 久久嫩草精品久久久精品一| 日本va欧美va欧美va精品| 3d成人动漫网站| 日韩精品久久久久久| 欧美精品v国产精品v日韩精品| 亚洲国产成人av好男人在线观看| 91一区二区在线| 亚洲欧美一区二区三区国产精品| 成人精品免费视频| 国产精品久久久久久久久免费桃花 | 欧美色图一区二区三区| 一区二区免费视频| 欧美性受xxxx| 伊人婷婷欧美激情| 欧美午夜免费电影| 亚洲国产aⅴ天堂久久| 欧美日韩精品福利| 男男视频亚洲欧美| 日韩视频一区在线观看| 蜜桃免费网站一区二区三区| 精品人在线二区三区| 国产一区二区三区精品欧美日韩一区二区三区 | 精品成人免费观看| 国产一区视频网站| 中文久久乱码一区二区| 成人动漫一区二区在线| 亚洲精品视频在线| 欧美日韩国产一区二区三区地区| 五月天网站亚洲| 欧美mv日韩mv国产网站app| 韩国午夜理伦三级不卡影院| 欧美韩日一区二区三区四区| 色综合一区二区| 日韩成人精品视频| 中文乱码免费一区二区| 欧日韩精品视频| 久久精品免费观看| 国产精品看片你懂得| 欧美午夜精品久久久| 久久99精品久久久久婷婷| 国产精品区一区二区三区| 欧美日韩一区二区三区四区 | 韩国成人福利片在线播放| 中文字幕乱码日本亚洲一区二区| 日本韩国一区二区三区视频|