Skip to content

Commit bb8eb7f

Browse files
committed
Fix Openssl compilling.
It's working for linux and windows only.
1 parent 364d5cc commit bb8eb7f

File tree

313 files changed

+89232
-73
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

313 files changed

+89232
-73
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,252 @@
1+
#!/usr/bin/env perl
2+
3+
# WARNING: do not edit!
4+
# Generated by Makefile from tools/c_rehash.in
5+
# Copyright 1999-2022 The OpenSSL Project Authors. All Rights Reserved.
6+
#
7+
# Licensed under the Apache License 2.0 (the "License"). You may not use
8+
# this file except in compliance with the License. You can obtain a copy
9+
# in the file LICENSE in the source distribution or at
10+
# https://www.openssl.org/source/license.html
11+
12+
# Perl c_rehash script, scan all files in a directory
13+
# and add symbolic links to their hash values.
14+
15+
my $dir = "/media/cleber/DATA/COMPILATIONS/godot_modules/mysql/3party/bin/linuxbsd/x86_64/openssl";
16+
my $prefix = "/media/cleber/DATA/COMPILATIONS/godot_modules/mysql/3party/bin/linuxbsd/x86_64/openssl";
17+
18+
my $errorcount = 0;
19+
my $openssl = $ENV{OPENSSL} || "openssl";
20+
my $pwd;
21+
my $x509hash = "-subject_hash";
22+
my $crlhash = "-hash";
23+
my $verbose = 0;
24+
my $symlink_exists=eval {symlink("",""); 1};
25+
my $removelinks = 1;
26+
27+
## Parse flags.
28+
while ( $ARGV[0] =~ /^-/ ) {
29+
my $flag = shift @ARGV;
30+
last if ( $flag eq '--');
31+
if ( $flag eq '-old') {
32+
$x509hash = "-subject_hash_old";
33+
$crlhash = "-hash_old";
34+
} elsif ( $flag eq '-h' || $flag eq '-help' ) {
35+
help();
36+
} elsif ( $flag eq '-n' ) {
37+
$removelinks = 0;
38+
} elsif ( $flag eq '-v' ) {
39+
$verbose++;
40+
}
41+
else {
42+
print STDERR "Usage error; try -h.\n";
43+
exit 1;
44+
}
45+
}
46+
47+
sub help {
48+
print "Usage: c_rehash [-old] [-h] [-help] [-v] [dirs...]\n";
49+
print " -old use old-style digest\n";
50+
print " -h or -help print this help text\n";
51+
print " -v print files removed and linked\n";
52+
exit 0;
53+
}
54+
55+
eval "require Cwd";
56+
if (defined(&Cwd::getcwd)) {
57+
$pwd=Cwd::getcwd();
58+
} else {
59+
$pwd=`pwd`;
60+
chomp($pwd);
61+
}
62+
63+
# DOS/Win32 or Unix delimiter? Prefix our installdir, then search.
64+
my $path_delim = ($pwd =~ /^[a-z]\:/i) ? ';' : ':';
65+
$ENV{PATH} = "$prefix/bin" . ($ENV{PATH} ? $path_delim . $ENV{PATH} : "");
66+
67+
if (! -x $openssl) {
68+
my $found = 0;
69+
foreach (split /$path_delim/, $ENV{PATH}) {
70+
if (-x "$_/$openssl") {
71+
$found = 1;
72+
$openssl = "$_/$openssl";
73+
last;
74+
}
75+
}
76+
if ($found == 0) {
77+
print STDERR "c_rehash: rehashing skipped ('openssl' program not available)\n";
78+
exit 0;
79+
}
80+
}
81+
82+
if (@ARGV) {
83+
@dirlist = @ARGV;
84+
} elsif ($ENV{SSL_CERT_DIR}) {
85+
@dirlist = split /$path_delim/, $ENV{SSL_CERT_DIR};
86+
} else {
87+
$dirlist[0] = "$dir/certs";
88+
}
89+
90+
if (-d $dirlist[0]) {
91+
chdir $dirlist[0];
92+
$openssl="$pwd/$openssl" if (!-x $openssl);
93+
chdir $pwd;
94+
}
95+
96+
foreach (@dirlist) {
97+
if (-d $_ ) {
98+
if ( -w $_) {
99+
hash_dir($_);
100+
} else {
101+
print "Skipping $_, can't write\n";
102+
$errorcount++;
103+
}
104+
}
105+
}
106+
exit($errorcount);
107+
108+
sub copy_file {
109+
my ($src_fname, $dst_fname) = @_;
110+
111+
if (open(my $in, "<", $src_fname)) {
112+
if (open(my $out, ">", $dst_fname)) {
113+
print $out $_ while (<$in>);
114+
close $out;
115+
} else {
116+
warn "Cannot open $dst_fname for write, $!";
117+
}
118+
close $in;
119+
} else {
120+
warn "Cannot open $src_fname for read, $!";
121+
}
122+
}
123+
124+
sub hash_dir {
125+
my $dir = shift;
126+
my %hashlist;
127+
128+
print "Doing $dir\n";
129+
130+
if (!chdir $dir) {
131+
print STDERR "WARNING: Cannot chdir to '$dir', $!\n";
132+
return;
133+
}
134+
135+
opendir(DIR, ".") || print STDERR "WARNING: Cannot opendir '.', $!\n";
136+
my @flist = sort readdir(DIR);
137+
closedir DIR;
138+
if ( $removelinks ) {
139+
# Delete any existing symbolic links
140+
foreach (grep {/^[\da-f]+\.r{0,1}\d+$/} @flist) {
141+
if (-l $_) {
142+
print "unlink $_\n" if $verbose;
143+
unlink $_ || warn "Can't unlink $_, $!\n";
144+
}
145+
}
146+
}
147+
FILE: foreach $fname (grep {/\.(pem|crt|cer|crl)$/} @flist) {
148+
# Check to see if certificates and/or CRLs present.
149+
my ($cert, $crl) = check_file($fname);
150+
if (!$cert && !$crl) {
151+
print STDERR "WARNING: $fname does not contain a certificate or CRL: skipping\n";
152+
next;
153+
}
154+
link_hash_cert($fname) if ($cert);
155+
link_hash_crl($fname) if ($crl);
156+
}
157+
158+
chdir $pwd;
159+
}
160+
161+
sub check_file {
162+
my ($is_cert, $is_crl) = (0,0);
163+
my $fname = $_[0];
164+
165+
open(my $in, "<", $fname);
166+
while(<$in>) {
167+
if (/^-----BEGIN (.*)-----/) {
168+
my $hdr = $1;
169+
if ($hdr =~ /^(X509 |TRUSTED |)CERTIFICATE$/) {
170+
$is_cert = 1;
171+
last if ($is_crl);
172+
} elsif ($hdr eq "X509 CRL") {
173+
$is_crl = 1;
174+
last if ($is_cert);
175+
}
176+
}
177+
}
178+
close $in;
179+
return ($is_cert, $is_crl);
180+
}
181+
182+
sub compute_hash {
183+
my $fh;
184+
if ( $^O eq "VMS" ) {
185+
# VMS uses the open through shell
186+
# The file names are safe there and list form is unsupported
187+
if (!open($fh, "-|", join(' ', @_))) {
188+
print STDERR "Cannot compute hash on '$fname'\n";
189+
return;
190+
}
191+
} else {
192+
if (!open($fh, "-|", @_)) {
193+
print STDERR "Cannot compute hash on '$fname'\n";
194+
return;
195+
}
196+
}
197+
return (<$fh>, <$fh>);
198+
}
199+
200+
# Link a certificate to its subject name hash value, each hash is of
201+
# the form <hash>.<n> where n is an integer. If the hash value already exists
202+
# then we need to up the value of n, unless its a duplicate in which
203+
# case we skip the link. We check for duplicates by comparing the
204+
# certificate fingerprints
205+
206+
sub link_hash_cert {
207+
link_hash($_[0], 'cert');
208+
}
209+
210+
# Same as above except for a CRL. CRL links are of the form <hash>.r<n>
211+
212+
sub link_hash_crl {
213+
link_hash($_[0], 'crl');
214+
}
215+
216+
sub link_hash {
217+
my ($fname, $type) = @_;
218+
my $is_cert = $type eq 'cert';
219+
220+
my ($hash, $fprint) = compute_hash($openssl,
221+
$is_cert ? "x509" : "crl",
222+
$is_cert ? $x509hash : $crlhash,
223+
"-fingerprint", "-noout",
224+
"-in", $fname);
225+
chomp $hash;
226+
$hash =~ s/^.*=// if !$is_cert;
227+
chomp $fprint;
228+
return if !$hash;
229+
$fprint =~ s/^.*=//;
230+
$fprint =~ tr/://d;
231+
my $suffix = 0;
232+
# Search for an unused hash filename
233+
my $crlmark = $is_cert ? "" : "r";
234+
while(exists $hashlist{"$hash.$crlmark$suffix"}) {
235+
# Hash matches: if fingerprint matches its a duplicate cert
236+
if ($hashlist{"$hash.$crlmark$suffix"} eq $fprint) {
237+
my $what = $is_cert ? 'certificate' : 'CRL';
238+
print STDERR "WARNING: Skipping duplicate $what $fname\n";
239+
return;
240+
}
241+
$suffix++;
242+
}
243+
$hash .= ".$crlmark$suffix";
244+
if ($symlink_exists) {
245+
print "link $fname -> $hash\n" if $verbose;
246+
symlink $fname, $hash || warn "Can't symlink, $!";
247+
} else {
248+
print "copy $fname -> $hash\n" if $verbose;
249+
copy_file($fname, $hash);
250+
}
251+
$hashlist{$hash} = $fprint;
252+
}
7.51 MB
Binary file not shown.
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
# This file specifies the Certificate Transparency logs
2+
# that are to be trusted.
3+
4+
# Google's list of logs can be found here:
5+
# www.certificate-transparency.org/known-logs
6+
# A Python program to convert the log list to OpenSSL's format can be
7+
# found here:
8+
# https://github.com/google/certificate-transparency/blob/master/python/utilities/log_list/print_log_list.py
9+
# Use the "--openssl_output" flag.
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
# This file specifies the Certificate Transparency logs
2+
# that are to be trusted.
3+
4+
# Google's list of logs can be found here:
5+
# www.certificate-transparency.org/known-logs
6+
# A Python program to convert the log list to OpenSSL's format can be
7+
# found here:
8+
# https://github.com/google/certificate-transparency/blob/master/python/utilities/log_list/print_log_list.py
9+
# Use the "--openssl_output" flag.
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,111 @@
1+
/*
2+
* Copyright 2002-2020 The OpenSSL Project Authors. All Rights Reserved.
3+
*
4+
* Licensed under the Apache License 2.0 (the "License"). You may not use
5+
* this file except in compliance with the License. You can obtain a copy
6+
* in the file LICENSE in the source distribution or at
7+
* https://www.openssl.org/source/license.html
8+
*/
9+
10+
#ifndef OPENSSL_AES_H
11+
# define OPENSSL_AES_H
12+
# pragma once
13+
14+
# include <openssl/macros.h>
15+
# ifndef OPENSSL_NO_DEPRECATED_3_0
16+
# define HEADER_AES_H
17+
# endif
18+
19+
# include <openssl/opensslconf.h>
20+
21+
# include <stddef.h>
22+
# ifdef __cplusplus
23+
extern "C" {
24+
# endif
25+
26+
# define AES_BLOCK_SIZE 16
27+
28+
# ifndef OPENSSL_NO_DEPRECATED_3_0
29+
30+
# define AES_ENCRYPT 1
31+
# define AES_DECRYPT 0
32+
33+
# define AES_MAXNR 14
34+
35+
36+
/* This should be a hidden type, but EVP requires that the size be known */
37+
struct aes_key_st {
38+
# ifdef AES_LONG
39+
unsigned long rd_key[4 * (AES_MAXNR + 1)];
40+
# else
41+
unsigned int rd_key[4 * (AES_MAXNR + 1)];
42+
# endif
43+
int rounds;
44+
};
45+
typedef struct aes_key_st AES_KEY;
46+
47+
# endif
48+
# ifndef OPENSSL_NO_DEPRECATED_3_0
49+
OSSL_DEPRECATEDIN_3_0 const char *AES_options(void);
50+
OSSL_DEPRECATEDIN_3_0
51+
int AES_set_encrypt_key(const unsigned char *userKey, const int bits,
52+
AES_KEY *key);
53+
OSSL_DEPRECATEDIN_3_0
54+
int AES_set_decrypt_key(const unsigned char *userKey, const int bits,
55+
AES_KEY *key);
56+
OSSL_DEPRECATEDIN_3_0
57+
void AES_encrypt(const unsigned char *in, unsigned char *out,
58+
const AES_KEY *key);
59+
OSSL_DEPRECATEDIN_3_0
60+
void AES_decrypt(const unsigned char *in, unsigned char *out,
61+
const AES_KEY *key);
62+
OSSL_DEPRECATEDIN_3_0
63+
void AES_ecb_encrypt(const unsigned char *in, unsigned char *out,
64+
const AES_KEY *key, const int enc);
65+
OSSL_DEPRECATEDIN_3_0
66+
void AES_cbc_encrypt(const unsigned char *in, unsigned char *out,
67+
size_t length, const AES_KEY *key,
68+
unsigned char *ivec, const int enc);
69+
OSSL_DEPRECATEDIN_3_0
70+
void AES_cfb128_encrypt(const unsigned char *in, unsigned char *out,
71+
size_t length, const AES_KEY *key,
72+
unsigned char *ivec, int *num, const int enc);
73+
OSSL_DEPRECATEDIN_3_0
74+
void AES_cfb1_encrypt(const unsigned char *in, unsigned char *out,
75+
size_t length, const AES_KEY *key,
76+
unsigned char *ivec, int *num, const int enc);
77+
OSSL_DEPRECATEDIN_3_0
78+
void AES_cfb8_encrypt(const unsigned char *in, unsigned char *out,
79+
size_t length, const AES_KEY *key,
80+
unsigned char *ivec, int *num, const int enc);
81+
OSSL_DEPRECATEDIN_3_0
82+
void AES_ofb128_encrypt(const unsigned char *in, unsigned char *out,
83+
size_t length, const AES_KEY *key,
84+
unsigned char *ivec, int *num);
85+
86+
/* NB: the IV is _two_ blocks long */
87+
OSSL_DEPRECATEDIN_3_0
88+
void AES_ige_encrypt(const unsigned char *in, unsigned char *out,
89+
size_t length, const AES_KEY *key,
90+
unsigned char *ivec, const int enc);
91+
/* NB: the IV is _four_ blocks long */
92+
OSSL_DEPRECATEDIN_3_0
93+
void AES_bi_ige_encrypt(const unsigned char *in, unsigned char *out,
94+
size_t length, const AES_KEY *key, const AES_KEY *key2,
95+
const unsigned char *ivec, const int enc);
96+
OSSL_DEPRECATEDIN_3_0
97+
int AES_wrap_key(AES_KEY *key, const unsigned char *iv,
98+
unsigned char *out, const unsigned char *in,
99+
unsigned int inlen);
100+
OSSL_DEPRECATEDIN_3_0
101+
int AES_unwrap_key(AES_KEY *key, const unsigned char *iv,
102+
unsigned char *out, const unsigned char *in,
103+
unsigned int inlen);
104+
# endif
105+
106+
107+
# ifdef __cplusplus
108+
}
109+
# endif
110+
111+
#endif

0 commit comments

Comments
 (0)