003 File Manager
Current Path:
/usr/src/crypto/openssl/apps
usr
/
src
/
crypto
/
openssl
/
apps
/
📁
..
📄
CA.pl.in
(7.4 KB)
📄
app_rand.c
(2.18 KB)
📄
apps.c
(72.85 KB)
📄
apps.h
(24.69 KB)
📄
asn1pars.c
(10.31 KB)
📄
bf_prefix.c
(4.77 KB)
📄
build.info
(2.32 KB)
📄
ca-cert.srl
(3 B)
📄
ca-key.pem
(916 B)
📄
ca-req.pem
(635 B)
📄
ca.c
(83.78 KB)
📄
cert.pem
(623 B)
📄
ciphers.c
(7.19 KB)
📄
client.pem
(3.21 KB)
📄
cms.c
(44.05 KB)
📄
crl.c
(10.79 KB)
📄
crl2p7.c
(6.18 KB)
📄
ct_log_list.cnf
(412 B)
📄
dgst.c
(18.17 KB)
📄
dh1024.pem
(446 B)
📄
dh2048.pem
(662 B)
📄
dh4096.pem
(1007 B)
📄
dhparam.c
(11.15 KB)
📄
dsa-ca.pem
(2.66 KB)
📄
dsa-pca.pem
(2.67 KB)
📄
dsa.c
(7.53 KB)
📄
dsa1024.pem
(455 B)
📄
dsa512.pem
(280 B)
📄
dsap.pem
(276 B)
📄
dsaparam.c
(7.8 KB)
📄
ec.c
(8.13 KB)
📄
ecparam.c
(14.65 KB)
📄
enc.c
(20.74 KB)
📄
engine.c
(15.56 KB)
📄
errstr.c
(1.83 KB)
📄
gendsa.c
(3.92 KB)
📄
genpkey.c
(8.64 KB)
📄
genrsa.c
(5.36 KB)
📄
nseq.c
(3 KB)
📄
ocsp.c
(49.51 KB)
📄
openssl.c
(21.23 KB)
📄
openssl.cnf
(10.67 KB)
📄
opt.c
(23.61 KB)
📄
passwd.c
(26.43 KB)
📄
pca-cert.srl
(3 B)
📄
pca-key.pem
(916 B)
📄
pca-req.pem
(635 B)
📄
pkcs12.c
(30.81 KB)
📄
pkcs7.c
(5.38 KB)
📄
pkcs8.c
(11.26 KB)
📄
pkey.c
(7.24 KB)
📄
pkeyparam.c
(3.66 KB)
📄
pkeyutl.c
(15.58 KB)
📄
prime.c
(3.56 KB)
📄
privkey.pem
(916 B)
📄
progs.h
(16.05 KB)
📄
progs.pl
(5.43 KB)
📄
rand.c
(3.35 KB)
📄
rehash.c
(15.3 KB)
📄
req.c
(51.46 KB)
📄
req.pem
(627 B)
📄
rsa.c
(9.3 KB)
📄
rsa8192.pem
(6.21 KB)
📄
rsautl.c
(7.81 KB)
📄
s1024key.pem
(891 B)
📄
s1024req.pem
(643 B)
📄
s512-key.pem
(497 B)
📄
s512-req.pem
(460 B)
📄
s_apps.h
(3.3 KB)
📄
s_cb.c
(47.04 KB)
📄
s_client.c
(115.39 KB)
📄
s_server.c
(116.36 KB)
📄
s_socket.c
(13.43 KB)
📄
s_time.c
(11.92 KB)
📄
server.pem
(2.79 KB)
📄
server.srl
(3 B)
📄
server2.pem
(3.21 KB)
📄
sess_id.c
(5.4 KB)
📄
smime.c
(20.95 KB)
📄
speed.c
(120.17 KB)
📄
spkac.c
(5.73 KB)
📄
srp.c
(20.09 KB)
📄
storeutl.c
(16.13 KB)
📄
testCA.pem
(432 B)
📄
testdsa.h
(11.77 KB)
📄
testrsa.h
(121.12 KB)
📄
timeouts.h
(560 B)
📄
ts.c
(30.19 KB)
📄
tsget.in
(6.45 KB)
📄
verify.c
(10.52 KB)
📄
version.c
(5.07 KB)
📄
x509.c
(39.25 KB)
Editing: ciphers.c
/* * Copyright 1995-2018 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the OpenSSL license (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include <stdio.h> #include <stdlib.h> #include <string.h> #include "apps.h" #include "progs.h" #include <openssl/err.h> #include <openssl/ssl.h> typedef enum OPTION_choice { OPT_ERR = -1, OPT_EOF = 0, OPT_HELP, OPT_STDNAME, OPT_CONVERT, OPT_SSL3, OPT_TLS1, OPT_TLS1_1, OPT_TLS1_2, OPT_TLS1_3, OPT_PSK, OPT_SRP, OPT_CIPHERSUITES, OPT_V, OPT_UPPER_V, OPT_S } OPTION_CHOICE; const OPTIONS ciphers_options[] = { {"help", OPT_HELP, '-', "Display this summary"}, {"v", OPT_V, '-', "Verbose listing of the SSL/TLS ciphers"}, {"V", OPT_UPPER_V, '-', "Even more verbose"}, {"s", OPT_S, '-', "Only supported ciphers"}, #ifndef OPENSSL_NO_SSL3 {"ssl3", OPT_SSL3, '-', "SSL3 mode"}, #endif #ifndef OPENSSL_NO_TLS1 {"tls1", OPT_TLS1, '-', "TLS1 mode"}, #endif #ifndef OPENSSL_NO_TLS1_1 {"tls1_1", OPT_TLS1_1, '-', "TLS1.1 mode"}, #endif #ifndef OPENSSL_NO_TLS1_2 {"tls1_2", OPT_TLS1_2, '-', "TLS1.2 mode"}, #endif #ifndef OPENSSL_NO_TLS1_3 {"tls1_3", OPT_TLS1_3, '-', "TLS1.3 mode"}, #endif {"stdname", OPT_STDNAME, '-', "Show standard cipher names"}, #ifndef OPENSSL_NO_PSK {"psk", OPT_PSK, '-', "include ciphersuites requiring PSK"}, #endif #ifndef OPENSSL_NO_SRP {"srp", OPT_SRP, '-', "include ciphersuites requiring SRP"}, #endif {"convert", OPT_CONVERT, 's', "Convert standard name into OpenSSL name"}, {"ciphersuites", OPT_CIPHERSUITES, 's', "Configure the TLSv1.3 ciphersuites to use"}, {NULL} }; #ifndef OPENSSL_NO_PSK static unsigned int dummy_psk(SSL *ssl, const char *hint, char *identity, unsigned int max_identity_len, unsigned char *psk, unsigned int max_psk_len) { return 0; } #endif #ifndef OPENSSL_NO_SRP static char *dummy_srp(SSL *ssl, void *arg) { return ""; } #endif int ciphers_main(int argc, char **argv) { SSL_CTX *ctx = NULL; SSL *ssl = NULL; STACK_OF(SSL_CIPHER) *sk = NULL; const SSL_METHOD *meth = TLS_server_method(); int ret = 1, i, verbose = 0, Verbose = 0, use_supported = 0; int stdname = 0; #ifndef OPENSSL_NO_PSK int psk = 0; #endif #ifndef OPENSSL_NO_SRP int srp = 0; #endif const char *p; char *ciphers = NULL, *prog, *convert = NULL, *ciphersuites = NULL; char buf[512]; OPTION_CHOICE o; int min_version = 0, max_version = 0; prog = opt_init(argc, argv, ciphers_options); while ((o = opt_next()) != OPT_EOF) { switch (o) { case OPT_EOF: case OPT_ERR: opthelp: BIO_printf(bio_err, "%s: Use -help for summary.\n", prog); goto end; case OPT_HELP: opt_help(ciphers_options); ret = 0; goto end; case OPT_V: verbose = 1; break; case OPT_UPPER_V: verbose = Verbose = 1; break; case OPT_S: use_supported = 1; break; case OPT_STDNAME: stdname = verbose = 1; break; case OPT_CONVERT: convert = opt_arg(); break; case OPT_SSL3: min_version = SSL3_VERSION; max_version = SSL3_VERSION; break; case OPT_TLS1: min_version = TLS1_VERSION; max_version = TLS1_VERSION; break; case OPT_TLS1_1: min_version = TLS1_1_VERSION; max_version = TLS1_1_VERSION; break; case OPT_TLS1_2: min_version = TLS1_2_VERSION; max_version = TLS1_2_VERSION; break; case OPT_TLS1_3: min_version = TLS1_3_VERSION; max_version = TLS1_3_VERSION; break; case OPT_PSK: #ifndef OPENSSL_NO_PSK psk = 1; #endif break; case OPT_SRP: #ifndef OPENSSL_NO_SRP srp = 1; #endif break; case OPT_CIPHERSUITES: ciphersuites = opt_arg(); break; } } argv = opt_rest(); argc = opt_num_rest(); if (argc == 1) ciphers = *argv; else if (argc != 0) goto opthelp; if (convert != NULL) { BIO_printf(bio_out, "OpenSSL cipher name: %s\n", OPENSSL_cipher_name(convert)); goto end; } ctx = SSL_CTX_new(meth); if (ctx == NULL) goto err; if (SSL_CTX_set_min_proto_version(ctx, min_version) == 0) goto err; if (SSL_CTX_set_max_proto_version(ctx, max_version) == 0) goto err; #ifndef OPENSSL_NO_PSK if (psk) SSL_CTX_set_psk_client_callback(ctx, dummy_psk); #endif #ifndef OPENSSL_NO_SRP if (srp) SSL_CTX_set_srp_client_pwd_callback(ctx, dummy_srp); #endif if (ciphersuites != NULL && !SSL_CTX_set_ciphersuites(ctx, ciphersuites)) { BIO_printf(bio_err, "Error setting TLSv1.3 ciphersuites\n"); goto err; } if (ciphers != NULL) { if (!SSL_CTX_set_cipher_list(ctx, ciphers)) { BIO_printf(bio_err, "Error in cipher list\n"); goto err; } } ssl = SSL_new(ctx); if (ssl == NULL) goto err; if (use_supported) sk = SSL_get1_supported_ciphers(ssl); else sk = SSL_get_ciphers(ssl); if (!verbose) { for (i = 0; i < sk_SSL_CIPHER_num(sk); i++) { const SSL_CIPHER *c = sk_SSL_CIPHER_value(sk, i); p = SSL_CIPHER_get_name(c); if (p == NULL) break; if (i != 0) BIO_printf(bio_out, ":"); BIO_printf(bio_out, "%s", p); } BIO_printf(bio_out, "\n"); } else { for (i = 0; i < sk_SSL_CIPHER_num(sk); i++) { const SSL_CIPHER *c; c = sk_SSL_CIPHER_value(sk, i); if (Verbose) { unsigned long id = SSL_CIPHER_get_id(c); int id0 = (int)(id >> 24); int id1 = (int)((id >> 16) & 0xffL); int id2 = (int)((id >> 8) & 0xffL); int id3 = (int)(id & 0xffL); if ((id & 0xff000000L) == 0x03000000L) BIO_printf(bio_out, " 0x%02X,0x%02X - ", id2, id3); /* SSL3 * cipher */ else BIO_printf(bio_out, "0x%02X,0x%02X,0x%02X,0x%02X - ", id0, id1, id2, id3); /* whatever */ } if (stdname) { const char *nm = SSL_CIPHER_standard_name(c); if (nm == NULL) nm = "UNKNOWN"; BIO_printf(bio_out, "%s - ", nm); } BIO_puts(bio_out, SSL_CIPHER_description(c, buf, sizeof(buf))); } } ret = 0; goto end; err: ERR_print_errors(bio_err); end: if (use_supported) sk_SSL_CIPHER_free(sk); SSL_CTX_free(ctx); SSL_free(ssl); return ret; }
Upload File
Create Folder